Skip to main content

Showing 1–34 of 34 results for author: Yeung, W

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.18017  [pdf, other

    cs.IT cs.ET

    Dependence Analysis and Structured Construction for Batched Sparse Code

    Authors: Jiaxin Qing, Xiaohong Cai, Yijun Fan, Mingyang Zhu, Raymond W. Yeung

    Abstract: In coding theory, codes are usually designed with a certain level of randomness to facilitate analysis and accommodate different channel conditions. However, the resulting random code constructed can be suboptimal in practical implementations. Represented by a bipartite graph, the Batched Sparse Code (BATS Code) is a randomly constructed erasure code that utilizes network coding to achieve near-op… ▽ More

    Submitted 25 June, 2024; originally announced June 2024.

  2. arXiv:2405.04706  [pdf, other

    cs.CY

    Guiding the Way: A Comprehensive Examination of AI Guidelines in Global Media

    Authors: M. F. de-Lima-Santos, W. N. Yeung, T. Dodds

    Abstract: With the increasing adoption of artificial intelligence (AI) technologies in the news industry, media organizations have begun publishing guidelines that aim to promote the responsible, ethical, and unbiased implementation of AI-based technologies. These guidelines are expected to serve journalists and media workers by establishing best practices and a framework that helps them navigate ever-evolv… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

    Comments: 32 pages, 2 tables, 3 figures

  3. arXiv:2401.14916  [pdf, ps, other

    cs.IT

    Proving Information Inequalities by Gaussian Elimination

    Authors: Laigang Guo, Raymond W. Yeung, Xiao-Shan Gao

    Abstract: The proof of information inequalities and identities under linear constraints on the information measures is an important problem in information theory. For this purpose, ITIP and other variant algorithms have been developed and implemented, which are all based on solving a linear program (LP). In this paper, we develop a method with symbolic computation. Compared with the known methods, our appro… ▽ More

    Submitted 26 January, 2024; originally announced January 2024.

    Comments: arXiv admin note: text overlap with arXiv:2202.02786

  4. arXiv:2312.06082  [pdf, other

    cs.AI q-bio.QM

    XAI meets Biology: A Comprehensive Review of Explainable AI in Bioinformatics Applications

    Authors: Zhongliang Zhou, Mengxuan Hu, Mariah Salcedo, Nathan Gravel, Wayland Yeung, Aarya Venkat, Dongliang Guo, Jielu Zhang, Natarajan Kannan, Sheng Li

    Abstract: Artificial intelligence (AI), particularly machine learning and deep learning models, has significantly impacted bioinformatics research by offering powerful tools for analyzing complex biological data. However, the lack of interpretability and transparency of these models presents challenges in leveraging these models for deeper biological insights and for generating testable hypotheses. Explaina… ▽ More

    Submitted 10 December, 2023; originally announced December 2023.

    Comments: 19 pages, 9 figures

  5. arXiv:2306.05436  [pdf, other

    stat.AP cs.CY

    Remaining Useful Life Modelling with an Escalator Health Condition Analytic System

    Authors: Inez M. Zwetsloot, Yu Lin, Jiaqi Qiu, Lishuai Li, William Ka Fai Lee, Edmond Yin San Yeung, Colman Yiu Wah Yeung, Chris Chun Long Wong

    Abstract: The refurbishment of an escalator is usually linked with its design life as recommended by the manufacturer. However, the actual useful life of an escalator should be determined by its operating condition which is affected by the runtime, workload, maintenance quality, vibration, etc., rather than age only. The objective of this project is to develop a comprehensive health condition analytic syste… ▽ More

    Submitted 7 June, 2023; originally announced June 2023.

    Comments: 14 pages, 12 figures, 7 tables

  6. arXiv:2305.06533  [pdf, other

    cs.IT

    Reliable Throughput of Generalized Collision Channel without Synchronization

    Authors: Yijun Fan, Yanxiao Liu, Yi Chen, Shenghao Yang, Raymond W. Yeung

    Abstract: We consider a generalized collision channel model for general multi-user communication systems, an extension of Massey and Mathys' collision channel without feedback for multiple access communications. In our model, there are multiple transmitters and receivers sharing the same communication channel. The transmitters are not synchronized and arbitrary time offsets between transmitters and receiver… ▽ More

    Submitted 10 May, 2023; originally announced May 2023.

  7. arXiv:2207.06757  [pdf, ps, other

    cs.IT

    Secure Network Function Computation for Linear Functions -- Part I: Source Security

    Authors: Xuan Guang, Yang Bai, Raymond W. Yeung

    Abstract: In this paper, we put forward secure network function computation over a directed acyclic network. In such a network, a sink node is required to compute with zero error a target function of which the inputs are generated as source messages at multiple source nodes, while a wiretapper, who can access any one but not more than one wiretap set in a given collection of wiretap sets, is not allowed to… ▽ More

    Submitted 14 July, 2022; originally announced July 2022.

  8. arXiv:2202.02786  [pdf, ps, other

    cs.IT

    Proving Information Inequalities and Identities with Symbolic Computation

    Authors: Laigang Guo, Raymond W. Yeung, Xiao-Shan Gao

    Abstract: Proving linear inequalities and identities of Shannon's information measures, possibly with linear constraints on the information measures, is an important problem in information theory. For this purpose, ITIP and other variant algorithms have been developed and implemented, which are all based on solving a linear program (LP). In particular, an identity $f = 0$ is verified by solving two LPs, one… ▽ More

    Submitted 6 February, 2022; originally announced February 2022.

  9. arXiv:2111.04069  [pdf, other

    eess.IV cs.CV

    Texture-enhanced Light Field Super-resolution with Spatio-Angular Decomposition Kernels

    Authors: Zexi Hu, Xiaoming Chen, Henry Wing Fung Yeung, Yuk Ying Chung, Zhibo Chen

    Abstract: Despite the recent progress in light field super-resolution (LFSR) achieved by convolutional neural networks, the correlation information of light field (LF) images has not been sufficiently studied and exploited due to the complexity of 4D LF data. To cope with such high-dimensional LF data, most of the existing LFSR methods resorted to decomposing it into lower dimensions and subsequently perfor… ▽ More

    Submitted 4 March, 2022; v1 submitted 7 November, 2021; originally announced November 2021.

    Comments: Accepted by IEEE TIM

  10. arXiv:2109.02439  [pdf

    cs.LG cs.CV eess.IV

    Develo** and validating multi-modal models for mortality prediction in COVID-19 patients: a multi-center retrospective study

    Authors: Joy Tzung-yu Wu, Miguel Ángel Armengol de la Hoz, Po-Chih Kuo, Joseph Alexander Paguio, Jasper Seth Yao, Edward Christopher Dee, Wesley Yeung, Jerry Jurado, Achintya Moulick, Carmelo Milazzo, Paloma Peinado, Paula Villares, Antonio Cubillo, José Felipe Varona, Hyung-Chul Lee, Alberto Estirado, José Maria Castellano, Leo Anthony Celi

    Abstract: The unprecedented global crisis brought about by the COVID-19 pandemic has sparked numerous efforts to create predictive models for the detection and prognostication of SARS-CoV-2 infections with the goal of hel** health systems allocate resources. Machine learning models, in particular, hold promise for their ability to leverage patient clinical information and medical images for prediction. Ho… ▽ More

    Submitted 1 September, 2021; originally announced September 2021.

  11. arXiv:2108.03635  [pdf, other

    eess.IV cs.CV

    Efficient Light Field Reconstruction via Spatio-Angular Dense Network

    Authors: Zexi Hu, Henry Wing Fung Yeung, Xiaoming Chen, Yuk Ying Chung, Haisheng Li

    Abstract: As an image sensing instrument, light field images can supply extra angular information compared with monocular images and have facilitated a wide range of measurement applications. Light field image capturing devices usually suffer from the inherent trade-off between the angular and spatial resolutions. To tackle this problem, several methods, such as light field reconstruction and light field su… ▽ More

    Submitted 8 August, 2021; originally announced August 2021.

  12. arXiv:2107.07582  [pdf

    q-bio.QM cs.CY cs.LG stat.AP

    Prediction of Blood Lactate Values in Critically Ill Patients: A Retrospective Multi-center Cohort Study

    Authors: Behrooz Mamandipoor, Wesley Yeung, Louis Agha-Mir-Salim, David J. Stone, Venet Osmani, Leo Anthony Celi

    Abstract: Purpose. Elevations in initially obtained serum lactate levels are strong predictors of mortality in critically ill patients. Identifying patients whose serum lactate levels are more likely to increase can alert physicians to intensify care and guide them in the frequency of tending the blood test. We investigate whether machine learning models can predict subsequent serum lactate changes. Metho… ▽ More

    Submitted 7 July, 2021; originally announced July 2021.

    Comments: 15 pages, 6 Appendices

    Journal ref: J Clin Monit Comput. 2021 PMID: 34224051

  13. arXiv:2105.07609  [pdf, ps, other

    cs.IT cs.NI

    Intrablock Interleaving for Batched Network Coding with Blockwise Adaptive Recoding

    Authors: Hoover H. F. Yin, Ka Hei Ng, Allen Z. Zhong, Raymond W. Yeung, Shenghao Yang, Ian Y. Y. Chan

    Abstract: Batched network coding (BNC) is a low-complexity solution to network transmission in multi-hop packet networks with packet loss. BNC encodes the source data into batches of packets. As a network coding scheme, the intermediate nodes perform recoding on the received packets belonging to the same batch instead of just forwarding them. A recoding scheme that may generate more recoded packets for batc… ▽ More

    Submitted 15 September, 2021; v1 submitted 17 May, 2021; originally announced May 2021.

    Comments: This paper was presented in part at 2021 IEEE International Symposium on Information Theory

  14. arXiv:2104.08867  [pdf

    cs.SI

    User Behavior Discovery in the COVID-19 Era through the Sentiment Analysis of User Tweet Texts

    Authors: Amin Mahmoudi, Victoria Wai-lan Yeung, Eric W. K. See-To

    Abstract: The coronavirus disease (COVID-19) outbreak was declared a pandemic in March 2020 and since then it has had a significant effect on all aspects of life. Although we live in an information era, we do not have accurate information about this disease. Online social networks (OSNs) play a vital role in society, especially people who do not have trust in the government would tend to have more confidenc… ▽ More

    Submitted 18 April, 2021; originally announced April 2021.

    Comments: 24 pages, 7 figuers

  15. arXiv:2103.08081  [pdf, ps, other

    cs.IT

    Linear Network Error Correction Coding: A Revisit

    Authors: Xuan Guang, Raymond W. Yeung

    Abstract: We consider linear network error correction (LNEC) coding when errors may occur on edges of a communication network of which the topology is known. In this paper, we first revisit and explore the framework of LNEC coding, and then unify two well-known LNEC coding approaches. Furthermore, by develo** a graph-theoretic approach to the framework of LNEC coding, we obtain a significantly enhanced ch… ▽ More

    Submitted 14 March, 2021; originally announced March 2021.

    Comments: 41 pages

  16. arXiv:2010.01453  [pdf, other

    cs.CV eess.IV

    3D Orientation Field Transform

    Authors: Wai-Tsun Yeung, Xiaohao Cai, Zizhen Liang, Byung-Ho Kang

    Abstract: The two-dimensional (2D) orientation field transform has been proved to be effective at enhancing 2D contours and curves in images by means of top-down processing. It, however, has no counterpart in three-dimensional (3D) images due to the extremely complicated orientation in 3D compared to 2D. Practically and theoretically, the demand and interest in 3D can only be increasing. In this work, we mo… ▽ More

    Submitted 3 October, 2020; originally announced October 2020.

  17. arXiv:2007.03596  [pdf

    cs.CL cs.CY cs.LG

    An Emergency Medical Services Clinical Audit System driven by Named Entity Recognition from Deep Learning

    Authors: Wang Han, Wesley Yeung, Angeline Tung, Joey Tay Ai Meng, Davin Ryanputera, Feng Mengling, Shalini Arulanadam

    Abstract: Clinical performance audits are routinely performed in Emergency Medical Services (EMS) to ensure adherence to treatment protocols, to identify individual areas of weakness for remediation, and to discover systemic deficiencies to guide the development of the training syllabus. At present, these audits are performed by manual chart review which is time-consuming and laborious. In this paper, we pr… ▽ More

    Submitted 7 July, 2020; originally announced July 2020.

  18. arXiv:2006.05839  [pdf, ps, other

    cs.IT

    Weakly Secure Symmetric Multilevel Diversity Coding

    Authors: Tao Guo, Chao Tian, Tie Liu, Raymond W. Yeung

    Abstract: Multilevel diversity coding is a classical coding model where multiple mutually independent information messages are encoded, such that different reliability requirements can be afforded to different messages. It is well known that {\em superposition coding}, namely separately encoding the independent messages, is optimal for symmetric multilevel diversity coding (SMDC) (Yeung-Zhang 1999). In the… ▽ More

    Submitted 10 June, 2020; originally announced June 2020.

    Comments: The paper has been accepted by IEEE Transactions on Information Theory

  19. arXiv:1903.01747  [pdf, other

    cs.LG stat.ML

    Towards Understanding Chinese Checkers with Heuristics, Monte Carlo Tree Search, and Deep Reinforcement Learning

    Authors: Ziyu Liu, Meng Zhou, Weiqing Cao, Qiang Qu, Henry Wing Fung Yeung, Vera Yuk Ying Chung

    Abstract: The game of Chinese Checkers is a challenging traditional board game of perfect information that differs from other traditional games in two main aspects: first, unlike Chess, all checkers remain indefinitely in the game and hence the branching factor of the search tree does not decrease as the game progresses; second, unlike Go, there are also no upper bounds on the depth of the search tree since… ▽ More

    Submitted 8 March, 2019; v1 submitted 5 March, 2019; originally announced March 2019.

  20. arXiv:1811.02390  [pdf, ps, other

    cs.IT

    Local-Encoding-Preserving Secure Network Coding---Part II: Flexible Rate and Security Level

    Authors: Xuan Guang, Raymond W. Yeung, Fang-Wei Fu

    Abstract: In the two-part paper, we consider the problem of secure network coding when the information rate and the security level can change over time. To efficiently solve this problem, we put forward local-encoding-preserving secure network coding, where a family of secure linear network codes (SLNCs) is called local-encoding-preserving (LEP) if all the SLNCs in this family share a common local encoding… ▽ More

    Submitted 6 November, 2018; originally announced November 2018.

    Comments: 38 pages

  21. arXiv:1811.02388  [pdf, ps, other

    cs.IT

    Local-Encoding-Preserving Secure Network Coding---Part I: Fixed Security Level

    Authors: Xuan Guang, Raymond W. Yeung, Fang-Wei Fu

    Abstract: Information-theoretic security is considered in the paradigm of network coding in the presence of wiretappers, who can access one arbitrary edge subset up to a certain size, also referred to as the security level. Secure network coding is applied to prevent the leakage of the source information to the wiretappers. In this two-part paper, we consider the problem of secure network coding when the in… ▽ More

    Submitted 6 November, 2018; originally announced November 2018.

    Comments: 32 pages

  22. arXiv:1805.02989  [pdf, other

    cs.IT

    On Secure Exact-repair Regenerating Codes with a Single Pareto Optimal Point

    Authors: Fangwei Ye, Shiqiu Liu, Kenneth W. Shum, Raymond W. Yeung

    Abstract: The problem of exact-repair regenerating codes against eavesdrop** attack is studied. The eavesdrop** model we consider is that the eavesdropper has the capability to observe the data involved in the repair of a subset of $\ell$ nodes. An $(n,k,d,\ell)$ secure exact-repair regenerating code is an $(n,k,d)$ exact-repair regenerating code that is secure under this eavesdrop** model. It has bee… ▽ More

    Submitted 8 May, 2018; originally announced May 2018.

    Comments: This paper will be presented in part in ISIT 2018

  23. arXiv:1801.02376  [pdf, ps, other

    cs.IT

    The Explicit Coding Rate Region of Symmetric Multilevel Diversity Coding

    Authors: Tao Guo, Raymond W. Yeung

    Abstract: It is well known that {\em superposition coding}, namely separately encoding the independent sources, is optimal for symmetric multilevel diversity coding (SMDC) (Yeung-Zhang 1999). However, the characterization of the coding rate region therein involves uncountably many linear inequalities and the constant term (i.e., the lower bound) in each inequality is given in terms of the solution of a line… ▽ More

    Submitted 21 May, 2019; v1 submitted 8 January, 2018; originally announced January 2018.

  24. arXiv:1710.02252  [pdf, ps, other

    cs.IT

    Improved Upper Bound on the Network Function Computing Capacity

    Authors: Xuan Guang, Raymond W. Yeung, Shenghao Yang, Congduan Li

    Abstract: The problem of network function computation over a directed acyclic network is investigated in this paper. In such a network, a sink node desires to compute with zero error a {\em target function}, of which the inputs are generated at multiple source nodes. The edges in the network are assumed to be error-free and have limited capacity. The nodes in the network are assumed to have unbounded comput… ▽ More

    Submitted 5 October, 2017; originally announced October 2017.

    Comments: 43 pages

  25. arXiv:1611.09104  [pdf, ps, other

    cs.IT cs.DM math.CO

    Alphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach

    Authors: Xuan Guang, Raymond W. Yeung

    Abstract: We consider a communication network where there exist wiretappers who can access a subset of channels, called a wiretap set, which is chosen from a given collection of wiretap sets. The collection of wiretap sets can be arbitrary. Secure network coding is applied to prevent the source information from being leaked to the wiretappers. In secure network coding, the required alphabet size is an open… ▽ More

    Submitted 28 November, 2016; originally announced November 2016.

    Comments: 35 pages

  26. arXiv:1608.03697  [pdf, other

    cs.DM cs.IT

    On Information-Theoretic Characterizations of Markov Random Fields and Subfields

    Authors: Raymond W. Yeung, Ali Al-Bashabsheh, Chao Chen, Qi Chen, Pierre Moulin

    Abstract: Let $X_i, i \in V$ form a Markov random field (MRF) represented by an undirected graph $G = (V,E)$, and $V'$ be a subset of $V$. We determine the smallest graph that can always represent the subfield $X_i, i \in V'$ as an MRF. Based on this result, we obtain a necessary and sufficient condition for a subfield of a Markov tree to be also a Markov tree. When $G$ is a path so that $X_i, i \in V$ fo… ▽ More

    Submitted 17 January, 2018; v1 submitted 12 August, 2016; originally announced August 2016.

  27. Partition-Symmetrical Entropy Functions

    Authors: Qi Chen, Raymond W. Yeung

    Abstract: Let $\cal{N}=\{1,\cdots,n\}$. The entropy function $\bf h$ of a set of $n$ discrete random variables $\{X_i:i\in\cal N\}$ is a $2^n$-dimensional vector whose entries are ${\bf{h}}({\cal{A}})\triangleq H(X_{\cal{A}}),\cal{A}\subset{\cal N} $, the (joint) entropies of the subsets of the set of $n$ random variables with $H(X_\emptyset)=0$ by convention. The set of all entropy functions for $n$ discre… ▽ More

    Submitted 28 September, 2016; v1 submitted 28 July, 2014; originally announced July 2014.

    Comments: This paper is published in IEEE Transactions on Information Theory

    Journal ref: Issue Date: OCTOBER.2016 Volume: 62 Issue: 10 On page(s): 1-18 Print ISSN: 0018-9448 Online ISSN: 1557-9654

  28. arXiv:1312.4811  [pdf, ps, other

    cs.IT

    Finite-Length Analysis of BATS Codes

    Authors: Shenghao Yang, Tsz-Ching Ng, Raymond W. Yeung

    Abstract: BATS codes were proposed for communication through networks with packet loss. A BATS code consists of an outer code and an inner code. The outer code is a matrix generation of a fountain code, which works with the inner code that comprises random linear coding at the intermediate network nodes. In this paper, the performance of finite-length BATS codes is analyzed with respect to both belief propa… ▽ More

    Submitted 12 February, 2016; v1 submitted 17 December, 2013; originally announced December 2013.

    Comments: 47 pages

  29. Cut-Set Bounds for Networks with Zero-Delay Nodes

    Authors: Silas L. Fong, Raymond W. Yeung

    Abstract: In a network, a node is said to incur a delay if its encoding of each transmitted symbol involves only its received symbols obtained before the time slot in which the transmitted symbol is sent (hence the transmitted symbol sent in a time slot cannot depend on the received symbol obtained in the same time slot). A node is said to incur no delay if its received symbol obtained in a time slot is ava… ▽ More

    Submitted 11 February, 2015; v1 submitted 6 December, 2013; originally announced December 2013.

    Comments: Submitted to IEEE Transactions on Information Theory in Aug, 2012

    Journal ref: IEEE Transactions on Information Theory, vol. 61, pp. 3837-3850, Jul, 2015

  30. arXiv:1212.0101  [pdf, other

    cs.IT

    Performance Bounds on a Wiretap Network with Arbitrary Wiretap Sets

    Authors: Fan Cheng, Raymond W. Yeung

    Abstract: Consider a communication network represented by a directed graph $\mathcal{G}=(\mathcal{V},\mathcal{E})$, where $\mathcal{V}$ is the set of nodes and $\mathcal{E}$ is the set of point-to-point channels in the network. On the network a secure message $M$ is transmitted, and there may exist wiretappers who want to obtain information about the message. In secure network coding, we aim to find a netwo… ▽ More

    Submitted 12 October, 2014; v1 submitted 1 December, 2012; originally announced December 2012.

  31. Batched Sparse Codes

    Authors: Shenghao Yang, Raymond W. Yeung

    Abstract: Network coding can significantly improve the transmission rate of communication networks with packet loss compared with routing. However, using network coding usually incurs high computational and storage costs in the network devices and terminals. For example, some network coding schemes require the computational and/or storage capacities of an intermediate network node to increase linearly with… ▽ More

    Submitted 6 February, 2014; v1 submitted 23 June, 2012; originally announced June 2012.

    Comments: 51 pages, 12 figures, submitted to IEEE Transactions on Information Theory

    Journal ref: Information Theory, IEEE Transactions on , vol.60, no.9, pp.5322-5346, Sept. 2014

  32. arXiv:1202.0859  [pdf, other

    cs.IT cs.CR

    Imperfect Secrecy in Wiretap Channel II

    Authors: Fan Cheng, Raymond W. Yeung, Kenneth W. Shum

    Abstract: In a point-to-point communication system which consists of a sender, a receiver and a set of noiseless channels, the sender wishes to transmit a private message to the receiver through the channels which may be eavesdropped by a wiretapper. The set of wiretap sets is arbitrary. The wiretapper can access any one but not more than one wiretap set. From each wiretap set, the wiretapper can obtain som… ▽ More

    Submitted 12 October, 2014; v1 submitted 3 February, 2012; originally announced February 2012.

    Comments: Submitted to the IEEE Transactions on Information Theory

  33. On Linear Operator Channels over Finite Fields

    Authors: Shenghao Yang, Siu-Wai Ho, ** Meng, En-hui Yang, Raymond W. Yeung

    Abstract: Motivated by linear network coding, communication channels perform linear operation over finite fields, namely linear operator channels (LOCs), are studied in this paper. For such a channel, its output vector is a linear transform of its input vector, and the transformation matrix is randomly and independently generated. The transformation matrix is assumed to remain constant for every T input ve… ▽ More

    Submitted 14 April, 2010; v1 submitted 11 February, 2010; originally announced February 2010.

    Comments: 53 pages, 3 figures, submitted to IEEE Transaction on Information Theory

  34. Refined Coding Bounds and Code Constructions for Coherent Network Error Correction

    Authors: Shenghao Yang, Raymond W. Yeung, Chi-Kin Ngai

    Abstract: Coherent network error correction is the error-control problem in network coding with the knowledge of the network codes at the source and sink nodes. With respect to a given set of local encoding kernels defining a linear network code, we obtain refined versions of the Hamming bound, the Singleton bound and the Gilbert-Varshamov bound for coherent network error correction. Similar to its classi… ▽ More

    Submitted 22 January, 2010; v1 submitted 12 April, 2009; originally announced April 2009.

    Comments: 32 pages

    Journal ref: IEEE-J-IT 57 (2011) 1409 - 1424