Skip to main content

Showing 1–3 of 3 results for author: Lo, H K

.
  1. arXiv:2102.12209  [pdf

    eess.SY

    Designing zonal-based flexible bus services under stochastic demand

    Authors: Enoch Lee, Xuekai Cen, Hong K. Lo, Ka Fai Ng

    Abstract: In this paper, we develop a zonal-based flexible bus services (ZBFBS) by considering both passenger demands spatial (origin-destination or OD) and volume stochastic variations. Service requests are grouped by zonal OD pairs and number of passengers per request, and aggregated into demand categories which follow certain probability distributions. A two-stage stochastic program is formulated to mini… ▽ More

    Submitted 31 October, 2021; v1 submitted 24 February, 2021; originally announced February 2021.

    Comments: 42 pages, 12 figures, manuscript accepted by Transportation Science

  2. Toward A Reconfigurable Quantum Network Enabled by a Broadband Entangled Source

    Authors: E. Y. Zhu, C. Corbari, A. V. Gladyshev, P. G. Kazansky, H. K. Lo, L. Qian

    Abstract: We present a proof-of-principle experimental demonstration of a reconfigurable entanglement distribution scheme utilizing a poled fiber-based source of broadband polarization-entangled photon pairs and dense wavelength-division multiplexing. A large bandwidth (> 90 nm, centered at 1555 nm) and highly spectrally correlated nature of the entangled source can be exploited to allow for the generation… ▽ More

    Submitted 16 January, 2019; v1 submitted 12 June, 2015; originally announced June 2015.

    Comments: 10 pages, 5 figures

    Journal ref: J. Opt. Soc. Am. B 36, B1-B6 (2019)

  3. Insecurity of position-based quantum cryptography protocols against entanglement attacks

    Authors: Hoi Kwan Lau, Hoi Kwong Lo

    Abstract: Recently, position-based quantum cryptography has been claimed to be unconditionally secure. In contrary, here we show that the existing proposals for position-based quantum cryptography are, in fact, insecure if entanglement is shared among two adversaries. Specifically, we demonstrate how the adversaries can incorporate ideas of quantum teleportation and quantum secret sharing to compromise the… ▽ More

    Submitted 21 September, 2010; v1 submitted 12 September, 2010; originally announced September 2010.