Bingjie Xu

Follow

Generating author description...

All published works
Action Title Year Authors
+ PDF Chat Story-Adapter: A Training-free Iterative Framework for Long Story Visualization 2024 Jiawei Mao
Xiaoke Huang
Yunfei Xie
Y.-L. Betty Chang
Mude Hui
Bingjie Xu
Yuyin Zhou
+ PDF Chat Highly stable power control for chip-based continuous-variable quantum key distribution system 2024 Yiming Bian
Yang Li
Xuesong Xu
Tao Zhang
Yan Pan
Wei Huang
Song Yu
Lei Zhang
Yichen Zhang
Bingjie Xu
+ Accurate and Fast VR Eye-Tracking using Deflectometric Information 2023 Jiazhang Wang
Tianfu Wang
Bingjie Xu
Oliver Cossairt
Florian Willomitzer
+ Accurate Eye Tracking from Dense 3D Surface Reconstructions using Single-Shot Deflectometry 2023 Jiazhang Wang
Tianfu Wang
Bingjie Xu
Oliver Cossairt And Florian Willomitzer
+ PDF Chat Accurate and Fast VR Eye-Tracking using Deflectometric Information 2023 Jiazhang Wang
Tianfu Wang
Bingjie Xu
Oliver Cossairt
Florian Willomitzer
+ PDF Chat ARShopping: In-Store Shopping Decision Support Through Augmented Reality and Immersive Visualization 2022 Bingjie Xu
Shunan Guo
Eunyee Koh
Jane Hoffswell
Ryan A. Rossi
Fan Du
+ Performance analysis for OFDM-based multi-carrier continuous-variable quantum key distribution with arbitrary modulation protocol 2022 Heng Wang
Yan Pan
Yun Shao
Yaodi Pi
Ting Ye
Yang Li
Tao Zhang
Jinlu Liu
Jie Yang
Li Ma
+ PDF Chat Can deep learning assist automatic identification of layered pigments from XRF data? 2022 Bingjie Xu
Yunan Wu
Pengxiao Hao
Marc Vermeulen
Alicia C. McGeachy
K.M. Smith
Katherine Eremin
Georgina Rayner
Giovanni Verri
Florian Willomitzer
+ ARShopping: In-Store Shopping Decision Support Through Augmented Reality and Immersive Visualization 2022 Bingjie Xu
Shunan Guo
Eunyee Koh
Jane Hoffswell
Ryan A. Rossi
Fan Du
+ PDF Chat Phase-reference intensity attack on continuous-variable quantum key distribution with a real local oscillator 2021 Yun Shao
Yang Li
Heng Wang
Yan Pan
Yaodi Pi
Yichen Zhang
Wei Huang
Bingjie Xu
+ Sub-Gbps key rate four-state continuous-variable quantum key distribution within metropolitan area 2021 Heng Wang
Yang Li
Yaodi Pi
Yan Pan
Yun Shao
Ma Li
Jie Yang
Yichen Zhang
Wei Huang
Bingjie Xu
+ PDF Chat Skinscan: Low-Cost 3D-Scanning for Dermatologic Diagnosis and Documentation 2021 Merlin A. Nau
Florian Schiffers
Yunhao Li
Bingjie Xu
Andreas Maier
Jack Tumblin
Marc Walton
Aggelos K. Katsaggelos
Florian Willomitzer
Oliver Cossairt
+ A novel approach to estimating reconciliation leakage for quantum key distribution 2021 Haokun Mao
Qiang Zhao
Yucheng Qiao
Bingze Yan
Bingjie Xu
Ahmed A. Abd El‐Latif
Qiong Li
+ Realizing downstream access network using continuous-variable quantum key distribution 2021 Yundi Huang
Tao Shen
Xiangyu Wang
Ziyang Chen
Bingjie Xu
Song Yu
Hong Guo
+ A novel approach to reducing information leakage for quantum key distribution 2021 Haokun Mao
Qiang Zhao
Yucheng Qiao
Bingze Yan
Bingjie Xu
Ahmed A. Abd El‐Latif
Qiong Li
+ Security proof for twin-field quantum key distribution with discrete phase randomization 2019 Rong Wang
Zhen−Qiang Yin
Feng-Yu Lu
Shuang Wang
Wei Chen
Wei Huang
Bingjie Xu
Guang‐Can Guo
Zheng‐Fu Han
+ Practical issues of twin-field quantum key distribution 2019 Feng-Yu Lu
Zhen−Qiang Yin
Rong-Wang
Guan‐Jie Fan‐Yuan
Shuang Wang
De‐Yong He
Wei Chen
Wei Huang
Bingjie Xu
Guang‐Can Guo
+ Efficient rate-adaptive reconciliation for continuous-variable quantum key distribution 2017 Xiangyu Wang
Yichen Zhang
Song Yu
Bingjie Xu
Zhengyu Li
Hong Guo
+ PDF Chat Efficient rate-adaptive reconciliation for continuous-variable quantum key distribution 2017 Xiangyu Wang
Yichen Zhang
Zhengyu Li
Bingjie Xu
Song Yu
Hong Guo
+ PDF Chat Source monitoring for continuous-variable quantum key distribution 2012 Jian Yang
Bingjie Xu
Hong Guo
+ PDF Chat Four-state continuous-variable quantum key distribution with long secure distance 2012 Jian Yang
Bingjie Xu
Xiang Peng
Hong Guo
+ PDF Chat Passive scheme with a photon-number-resolving detector for monitoring the untrusted source in a plug-and-play quantum-key-distribution system 2010 Bingjie Xu
Xiang Peng
Hong Guo
+ PDF Chat Passive-scheme analysis for solving the untrusted source problem in quantum key distribution 2010 Xiang Peng
Bingjie Xu
Hong Guo
+ PDF Chat Experimental quantum-key distribution with an untrusted source 2008 Xiang Peng
Hao Jiang
Bingjie Xu
Xiongfeng Ma
Hong Guo
Common Coauthors
Commonly Cited References
Action Title Year Authors # of times referenced
+ PDF Chat Continuous Variable Quantum Cryptography Using Coherent States 2002 Frédéric Grosshans
Philippe Grangier
6
+ PDF Chat The security of practical quantum key distribution 2009 Valerio Scarani
H. Bechmann-Pasquinucci
Nicolas J. Cerf
Miloslav DuĆĄek
Norbert LĂŒtkenhaus
Momtchil Peev
6
+ PDF Chat Practical decoy state for quantum key distribution 2005 Xiongfeng Ma
Bing Qi
Yi Zhao
Hoi‐Kwong Lo
5
+ PDF Chat Quantum Cryptography Without Switching 2004 Christian Weedbrook
Andrew M. Lance
Warwick P. Bowen
Thomas Symul
Timothy C. Ralph
Ping Koy Lam
5
+ PDF Chat Beating the Photon-Number-Splitting Attack in Practical Quantum Cryptography 2005 Xiang‐Bin Wang
5
+ PDF Chat Decoy State Quantum Key Distribution 2005 Hoi‐Kwong Lo
Xiongfeng Ma
Kai Chen
5
+ PDF Chat Decoy-state protocol for quantum cryptography with four different intensities of coherent light 2005 Xiang‐Bin Wang
5
+ PDF Chat Long-distance continuous-variable quantum key distribution with a Gaussian modulation 2011 Paul Jouguet
SĂ©bastien Kunz-Jacques
Anthony Leverrier
4
+ PDF Chat Quantum key distribution over<mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" display="inline"><mml:mrow><mml:mn>25</mml:mn><mml:mspace width="0.3em" /><mml:mi>km</mml:mi></mml:mrow></mml:math>with an all-fiber continuous-variable system 2007 JĂ©rĂŽme Lodewyck
Matthieu R. Bloch
RaĂșl GarcĂ­a−PatrĂłn
Simon Fossier
Evgueni Karpov
Eleni Diamanti
Thierry Debuisschert
Nicolas J. Cerf
Rosa Tualle-Brouri
Stephen McLaughlin
4
+ PDF Chat Gaussian quantum information 2012 Christian Weedbrook
Stefano Pirandola
RaĂșl GarcĂ­a−PatrĂłn
Nicolas J. Cerf
Timothy C. Ralph
Jeffrey H. Shapiro
Seth Lloyd
4
+ PDF Chat Quantum key distribution using gaussian-modulated coherent states 2003 Frédéric Grosshans
Gilles Van Assche
JĂ©rĂŽme Wenger
Rosa Brouri
Nicolas J. Cerf
Philippe Grangier
4
+ PDF Chat Quantum cryptography 2002 Nicolas Gisin
G. Ribordy
Wolfgang Tittel
Hugo Zbinden
4
+ PDF Chat Quantum Key Distribution with High Loss: Toward Global Secure Communication 2003 Won-Young Hwang
4
+ PDF Chat General theory of decoy-state quantum cryptography with source errors 2008 Xiang‐Bin Wang
Cheng-Zhi Peng
Jun Zhang
Lin Yang
Jian-Wei Pan
3
+ PDF Chat Finite-size analysis of a continuous-variable quantum key distribution 2010 Anthony Leverrier
Frédéric Grosshans
Philippe Grangier
3
+ PDF Chat Security against individual attacks for realistic quantum key distribution 2000 Norbert LĂŒtkenhaus
3
+ PDF Chat Simple Proof of Security of the BB84 Quantum Key Distribution Protocol 2000 Peter W. Shor
John Preskill
3
+ PDF Chat Quantum key distribution with an unknown and untrusted source 2008 Yi Zhao
Bing Qi
Hoi‐Kwong Lo
3
+ PDF Chat Optimality of Gaussian Attacks in Continuous-Variable Quantum Cryptography 2006 Miguel Navascués
Frédéric Grosshans
Antonio AcĂ­n
3
+ PDF Chat Experimental demonstration of long-distance continuous-variable quantum key distribution 2013 Paul Jouguet
SĂ©bastien Kunz-Jacques
Anthony Leverrier
Philippe Grangier
Eleni Diamanti
3
+ PDF Chat Symmetric Blind Information Reconciliation for Quantum Key Distribution 2017 Evgeniy O. Kiktenko
А. ĐĄ. ĐąŃ€ŃƒŃˆĐ”Ń‡ĐșĐžĐœ
Charles Ci Wen Lim
Yury Kurochkin
Aleksey K. Fedorov
3
+ PDF Chat Unconditional Optimality of Gaussian Attacks against Continuous-Variable Quantum Key Distribution 2006 RaĂșl GarcĂ­a−PatrĂłn
Nicolas J. Cerf
3
+ PDF Chat Decoy-state quantum key distribution with large random errors of light intensity 2007 Xiang‐Bin Wang
2
+ PDF Chat Multidimensional reconciliation for a continuous-variable quantum key distribution 2008 Anthony Leverrier
Romain Alléaume
Joseph J. Boutros
Gilles ZĂ©mor
Philippe Grangier
2
+ PDF Chat Secure quantum key distribution with realistic devices 2020 Feihu Xu
Xiongfeng Ma
Qiang Zhang
Hoi‐Kwong Lo
Jian-Wei Pan
2
+ PDF Chat Overcoming the rate–distance limit of quantum key distribution without quantum repeaters 2018 Marco Lucamarini
Zhiliang Yuan
J. F. Dynes
A. J. Shields
2
+ PDF Chat Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variables 2003 Frédéric Grosshans
Nicolas J. Cerf
JĂ©rĂŽme Wenger
Rosa Tualle-Brouri
Philippe Grangier
2
+ PDF Chat Trojan-horse attacks on quantum-key-distribution systems 2006 Nicolas Gisin
Sylvain Fasel
Barbara Kraus
Hugo Zbinden
G. Ribordy
2
+ PDF Chat Unconditional Security of Quantum Key Distribution over Arbitrarily Long Distances 1999 Hoi-Kwong Lo
H. F. Chau
2
+ PDF Chat Unconditional Security Proof of Long-Distance Continuous-Variable Quantum Key Distribution with Discrete Modulation 2009 Anthony Leverrier
Philippe Grangier
2
+ Information Reconciliation for Continuous-Variable Quantum Key Distribution using Non-Binary Low-Density Parity-Check Codes 2016 Christoph Pacher
JesĂșs MartĂ­nez-Mateo
Jörg Duhme
Tobias Gehring
Fabian Furrer
2
+ PDF Chat High-throughput and low-cost LDPC reconciliation for quantum key distribution 2019 Haokun Mao
Qiong Li
Han Qi
Hong Guo
2
+ Advances in quantum cryptography 2020 Stefano Pirandola
Ulrik L. Andersen
Leonardo Banchi
Mario Berta
Darius Bunandar
Roger Colbeck
Dirk Englund
Tobias Gehring
Cosmo Lupo
Carlo Ottaviani
2
+ PDF Chat Reply to 'Discrete and continuous variables for measurement-device-independent quantum cryptography' 2015 Stefano Pirandola
Carlo Ottaviani
Gaetana Spedalieri
Christian Weedbrook
Samuel L. Braunstein
Seth Lloyd
Tobias Gehring
Christian S. Jacobsen
Ulrik L. Andersen
2
+ PDF Chat Quantum information with continuous variables 2005 Samuel L. Braunstein
Peter van Loock
2
+ PDF Chat SecurityBounds for Continuous Variables Quantum Key Distribution 2005 Miguel Navascués
Antonio AcĂ­n
2
+ PDF Chat Continuous-variable quantum cryptography using two-way quantum communication 2008 Stefano Pirandola
Stefano Mancini
Seth Lloyd
Samuel L. Braunstein
2
+ PDF Chat Unconditional security in quantum cryptography 2001 Dominic Mayers
2
+ PDF Chat Reconciliation of a Quantum-Distributed Gaussian Key 2004 G. VanAssche
Jean Cardinal
Nicolas J. Cerf
2
+ PDF Chat Continuous-variable quantum key distribution with Gaussian source noise 2011 Yujie Shen
Xiang Peng
Jian Yang
Hong Guo
2
+ PDF Chat Decoy-state quantum key distribution with both source errors and statistical fluctuations 2009 Xiang‐Bin Wang
Lin Yang
Cheng-Zhi Peng
Jian-Wei Pan
2
+ PDF Chat Limitations on Practical Quantum Cryptography 2000 Gilles Brassard
Norbert LĂŒtkenhaus
Tal Mor
Barry C. Sanders
2
+ PDF Chat de Finetti Representation Theorem for Infinite-Dimensional Quantum Systems and Applications to Quantum Cryptography 2009 Renato Renner
J. I. Cirac
2
+ PDF Chat Non-Poissonian statistics from Poissonian light sources with application to passive decoy state quantum key distribution 2009 Marcos Curty
Tobias Moroder
Xiongfeng Ma
Norbert LĂŒtkenhaus
2
+ Quantum key distribution with passive decoy state selection 2007 Wolfgang Mauerer
Christine Silberhorn
2
+ PDF Chat High-bit-rate continuous-variable quantum key distribution 2014 Paul Jouguet
David Elkouss
SĂ©bastien Kunz-Jacques
2
+ PDF Chat High-rate measurement-device-independent quantum cryptography 2015 Stefano Pirandola
Carlo Ottaviani
Gaetana Spedalieri
Christian Weedbrook
Samuel L. Braunstein
Seth Lloyd
Tobias Gehring
Christian S. Jacobsen
Ulrik L. Andersen
2
+ Quantum key distribution over 67 km with a plug&amp;play system 2002 Damien Stucki
Nicolas Gisin
Olivier Guinnard
G. Ribordy
Hugo Zbinden
2
+ PDF Chat Analysis of imperfections in practical continuous-variable quantum key distribution 2012 Paul Jouguet
SĂ©bastien Kunz-Jacques
Eleni Diamanti
Anthony Leverrier
2
+ PDF Chat CollectiveAttacks and Unconditional Security in Continuous Variable Quantum KeyDistribution 2005 Frédéric Grosshans
2