Quantum hacking of two-way continuous-variable quantum key distribution using Trojan-horse attack
Ma Hong-Xin1, 2, Bao Wan-Su1, 2, †, , Li Hong-Wei1, 2, Chou Chun1, 2
       

The equivalent scheme to figure 1 with post processing when Alice is switched ON.