{"id":"https://openalex.org/W7128160141","doi":"https://doi.org/10.1007/s11704-025-50541-7","title":"Fault-tolerant encoding and decoding method in Steane code: comprehensive analysis of maximum threshold","display_name":"Fault-tolerant encoding and decoding method in Steane code: comprehensive analysis of maximum threshold","publication_year":2026,"publication_date":"2026-02-06","ids":{"openalex":"https://openalex.org/W7128160141","doi":"https://doi.org/10.1007/s11704-025-50541-7"},"language":"en","primary_location":{"id":"doi:10.1007/s11704-025-50541-7","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11704-025-50541-7","pdf_url":null,"source":{"id":"https://openalex.org/S4210231404","display_name":"Frontiers of Computer Science","issn_l":"2095-2228","issn":["2095-2228","2095-2236"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311889","host_organization_name":"Higher Education Press","host_organization_lineage":["https://openalex.org/P4310311889"],"host_organization_lineage_names":["Higher Education Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers of Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5106638463","display_name":"Qiqing Xia","orcid":"https://orcid.org/0009-0008-3689-9157"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiqing Xia","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100085, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, 100049, China","State Key Laboratory of Cyberspace Security Defense, Beijing, 100085, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100085, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, 100049, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Cyberspace Security Defense, Beijing, 100085, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036189156","display_name":"Huiqin Xie","orcid":"https://orcid.org/0000-0003-1466-3705"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huiqin Xie","raw_affiliation_strings":["Beijing Electronic Science and Technology Institute, Beijing, 100070, China"],"affiliations":[{"raw_affiliation_string":"Beijing Electronic Science and Technology Institute, Beijing, 100070, China","institution_ids":["https://openalex.org/I202334528"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5125262147","display_name":"Li Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Li Yang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100085, China","State Key Laboratory of Cyberspace Security Defense, Beijing, 100085, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100085, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"State Key Laboratory of Cyberspace Security Defense, Beijing, 100085, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5125262147"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.62524603,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"20","issue":"8","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.42649999260902405,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.42649999260902405,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.11079999804496765,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.060600001364946365,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encoding","display_name":"Encoding (memory)","score":0.8338000178337097},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.826200008392334},{"id":"https://openalex.org/keywords/sequential-decoding","display_name":"Sequential decoding","score":0.37869998812675476},{"id":"https://openalex.org/keywords/list-decoding","display_name":"List decoding","score":0.2727999985218048},{"id":"https://openalex.org/keywords/detection-threshold","display_name":"Detection threshold","score":0.25519999861717224}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8446999788284302},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.8338000178337097},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.826200008392334},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.6276000142097473},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.42320001125335693},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.39089998602867126},{"id":"https://openalex.org/C193969084","wikidata":"https://www.wikidata.org/wiki/Q7452500","display_name":"Sequential decoding","level":4,"score":0.37869998812675476},{"id":"https://openalex.org/C204397858","wikidata":"https://www.wikidata.org/wiki/Q4437907","display_name":"List decoding","level":5,"score":0.2727999985218048},{"id":"https://openalex.org/C3019361169","wikidata":"https://www.wikidata.org/wiki/Q2609467","display_name":"Detection threshold","level":2,"score":0.25519999861717224},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.22030000388622284}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s11704-025-50541-7","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11704-025-50541-7","pdf_url":null,"source":{"id":"https://openalex.org/S4210231404","display_name":"Frontiers of Computer Science","issn_l":"2095-2228","issn":["2095-2228","2095-2236"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311889","host_organization_name":"Higher Education Press","host_organization_lineage":["https://openalex.org/P4310311889"],"host_organization_lineage_names":["Higher Education Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers of Computer Science","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","score":0.6969059705734253,"display_name":"Climate action"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W1639600422","https://openalex.org/W1972603977","https://openalex.org/W2042474962","https://openalex.org/W2131690084","https://openalex.org/W2612455436","https://openalex.org/W2797549298","https://openalex.org/W4290935155"],"related_works":[],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2026-02-07T23:14:19.703344","created_date":"2026-02-07T00:00:00"}
