Skip to main content

Showing 1–30 of 30 results for author: Yue, Q

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.18023  [pdf, ps, other

    cs.IT

    Generator polynomials of cyclic expurgated or extended Goppa codes

    Authors: Xue Jia, Fengwei Li, Huan Sun, Qin Yue

    Abstract: Classical Goppa codes are a well-known class of codes with applications in code-based cryptography, which are a special case of alternant codes. Many papers are devoted to the search for Goppa codes with a cyclic extension or with a cyclic parity-check subcode. Let $\Bbb F_q$ be a finite field with $q=2^l$ elements, where $l$ is a positive integer. In this paper, we determine all the generator pol… ▽ More

    Submitted 28 May, 2024; originally announced May 2024.

  2. arXiv:2404.04971  [pdf, other

    cs.CV

    FPL+: Filtered Pseudo Label-based Unsupervised Cross-Modality Adaptation for 3D Medical Image Segmentation

    Authors: Jianghao Wu, Dong Guo, Guotai Wang, Qiang Yue, Huijun Yu, Kang Li, Shaoting Zhang

    Abstract: Adapting a medical image segmentation model to a new domain is important for improving its cross-domain transferability, and due to the expensive annotation process, Unsupervised Domain Adaptation (UDA) is appealing where only unlabeled images are needed for the adaptation. Existing UDA methods are mainly based on image or feature alignment with adversarial training for regularization, and they ar… ▽ More

    Submitted 7 April, 2024; originally announced April 2024.

    Comments: 12 pages, 7 figures

  3. arXiv:2401.13394  [pdf, ps, other

    cs.IT

    Determining hulls of generalized Reed-Solomon codes from algebraic geometry codes

    Authors: Xue Jia, Qin Yue, Huan Sun, Junzhen Sui

    Abstract: In this paper, we provide conditions that hulls of generalized Reed-Solomon (GRS) codes are also GRS codes from algebraic geometry codes. If the conditions are not satisfied, we provide a method of linear algebra to find the bases of hulls of GRS codes and give formulas to compute their dimensions. Besides, we explain that the conditions are too good to be improved by some examples. Moreover, we s… ▽ More

    Submitted 24 January, 2024; originally announced January 2024.

  4. arXiv:2311.18724  [pdf, other

    cs.IR

    Routing-Guided Learned Product Quantization for Graph-Based Approximate Nearest Neighbor Search

    Authors: Qiang Yue, Xiaoliang Xu, Yuxiang Wang, Yikun Tao, Xuliyuan Luo

    Abstract: Given a vector dataset $\mathcal{X}$, a query vector $\vec{x}_q$, graph-based Approximate Nearest Neighbor Search (ANNS) aims to build a proximity graph (PG) as an index of $\mathcal{X}$ and approximately return vectors with minimum distances to $\vec{x}_q$ by searching over the PG index. It suffers from the large-scale $\mathcal{X}$ because a PG with full vectors is too large to fit into the memo… ▽ More

    Submitted 30 November, 2023; originally announced November 2023.

    Comments: 14 pages, 12 figures

  5. arXiv:2309.07173  [pdf, other

    cs.LG cs.CV

    Using Unsupervised and Supervised Learning and Digital Twin for Deep Convective Ice Storm Classification

    Authors: Jason Swope, Steve Chien, Emily Dunkel, Xavier Bosch-Lluis, Qing Yue, William Deal

    Abstract: Smart Ice Cloud Sensing (SMICES) is a small-sat concept in which a primary radar intelligently targets ice storms based on information collected by a lookahead radiometer. Critical to the intelligent targeting is accurate identification of storm/cloud types from eight bands of radiance collected by the radiometer. The cloud types of interest are: clear sky, thin cirrus, cirrus, rainy anvil, and co… ▽ More

    Submitted 12 September, 2023; originally announced September 2023.

  6. arXiv:2208.05669  [pdf, other

    cs.CV

    PA-Seg: Learning from Point Annotations for 3D Medical Image Segmentation using Contextual Regularization and Cross Knowledge Distillation

    Authors: Shuwei Zhai, Guotai Wang, Xiangde Luo, Qiang Yue, Kang Li, Shaoting Zhang

    Abstract: The success of Convolutional Neural Networks (CNNs) in 3D medical image segmentation relies on massive fully annotated 3D volumes for training that are time-consuming and labor-intensive to acquire. In this paper, we propose to annotate a segmentation target with only seven points in 3D medical images, and design a two-stage weakly supervised learning framework PA-Seg. In the first stage, we emplo… ▽ More

    Submitted 13 February, 2023; v1 submitted 11 August, 2022; originally announced August 2022.

    Comments: 12 pages, 10 figures, 4 tables; Accepted by IEEE TMI

  7. arXiv:2203.13601  [pdf, other

    cs.DB cs.CV cs.IR

    Navigable Proximity Graph-Driven Native Hybrid Queries with Structured and Unstructured Constraints

    Authors: Mengzhao Wang, Lingwei Lv, Xiaoliang Xu, Yuxiang Wang, Qiang Yue, Jiongkang Ni

    Abstract: As research interest surges, vector similarity search is applied in multiple fields, including data mining, computer vision, and information retrieval. {Given a set of objects (e.g., a set of images) and a query object, we can easily transform each object into a feature vector and apply the vector similarity search to retrieve the most similar objects. However, the original vector similarity searc… ▽ More

    Submitted 25 March, 2022; originally announced March 2022.

    Comments: 16 pages, 10 figures

  8. arXiv:2109.13413  [pdf, ps, other

    cs.IT

    Extended Irreducible Binary Sextic Goppa codes

    Authors: Daitao Huang, Qin Yue

    Abstract: Let $n (>3)$ be a prime number and $\Bbb F_{2^n}$ a finite field of $2^n$ elements. Let $L =\Bbb F_{2^n}\cup \{\infty\}$ be the support set and $g(x)$ an irreducible polynomial of degree $6$ over $\Bbb F_{2^n}$. In this paper, we obtain an upper bound on the number of extended irreducible binary Goppa codes $Γ(L, g)$ of degree $6$ and length $2^n+1$.

    Submitted 27 September, 2021; originally announced September 2021.

    Comments: 17 pages

    MSC Class: 11T71 ACM Class: H.1.1

  9. arXiv:2107.10494  [pdf, ps, other

    cs.IT

    Binary irreducible quasi-cyclic parity-check subcodes of Goppa codes and extended Goppa codes

    Authors: Xia Li, Qin Yue, Daitao Huang

    Abstract: Goppa codes are particularly appealing for cryptographic applications. Every improvement of our knowledge of Goppa codes is of particular interest. In this paper, we present a sufficient and necessary condition for an irreducible monic polynomial $g(x)$ of degree $r$ over $\mathbb{F}_{q}$ satisfying $γg(x)=(x+d)^rg({A}(x))$, where $q=2^n$,… ▽ More

    Submitted 22 July, 2021; originally announced July 2021.

  10. arXiv:2104.04193  [pdf, ps, other

    cs.IT

    Ternary primitive LCD BCH codes

    Authors: Xinmei Huang, Qin Yue, Yansheng Wu, ** Shi

    Abstract: Absolute coset leaders were first proposed by the authors which have advantages in constructing binary LCD BCH codes. As a continue work, in this paper we focus on ternary linear codes. Firstly, we find the largest, second largest, and third largest absolute coset leaders of ternary primitive BCH codes. Secondly, we present three classes of ternary primitive BCH codes and determine their weight di… ▽ More

    Submitted 9 April, 2021; originally announced April 2021.

    Comments: 16 pages. To appear in Advances in Mathematics of Communications

  11. arXiv:2101.12631  [pdf, other

    cs.IR cs.DB

    A Comprehensive Survey and Experimental Comparison of Graph-Based Approximate Nearest Neighbor Search

    Authors: Mengzhao Wang, Xiaoliang Xu, Qiang Yue, Yuxiang Wang

    Abstract: Approximate nearest neighbor search (ANNS) constitutes an important operation in a multitude of applications, including recommendation systems, information retrieval, and pattern recognition. In the past decade, graph-based ANNS algorithms have been the leading paradigm in this domain, with dozens of graph-based ANNS algorithms proposed. Such algorithms aim to provide effective, efficient solution… ▽ More

    Submitted 10 May, 2021; v1 submitted 29 January, 2021; originally announced January 2021.

    Comments: 28 pages, 21 figures, 24 tables, conference

  12. arXiv:2012.08161  [pdf, ps, other

    cs.IT

    Further factorization of $x^n-1$ over finite fields (II)

    Authors: Yansheng Wu, Qin Yue

    Abstract: Let $\Bbb F_q$ be a finite field with $q$ elements. Let $n$ be a positive integer with radical $rad(n)$, namely, the product of distinct prime divisors of $n$. If the order of $q$ modulo $rad(n)$ is either 1 or a prime, then the irreducible factorization and a counting formula of irreducible factors of $x^n-1$ over $\Bbb F_q$ were obtained by Martínez, Vergara, and Oliveira (Des Codes Cryptogr 77… ▽ More

    Submitted 15 December, 2020; originally announced December 2020.

    Comments: 23 pages. Accepted by Discrete Mathematics, Algorithms and Applications

  13. arXiv:2009.06298  [pdf, ps, other

    cs.IT

    MDS or NMDS self-dual codes from twisted generalized Reed-Solomon codes

    Authors: Daitao Huang, Qin Yue, Yongfeng Niu, Xia Li

    Abstract: Self-dual maximum distance separable codes (self-dual MDS codes) and self-dual near MDS codes are very important in coding theory and practice. Thus, it is interesting to construct self-dual MDS or self-dual near MDS codes. In this paper, we not only give check matrices of dual codes of twisted generalized Reed-Solomon codes (TGRS codes) but also present the efficient and necessary condition of se… ▽ More

    Submitted 14 September, 2020; originally announced September 2020.

    Comments: 14 pages

    MSC Class: 94Bxx ACM Class: H.4

  14. arXiv:2008.07212  [pdf, ps, other

    cs.IT math.CO

    Optimal minimal Linear codes from posets

    Authors: Jong Yoon Hyun, Hyun Kwang Kim, Yansheng Wu, Qin Yue

    Abstract: Recently, some infinite families of minimal and optimal binary linear codes were constructed from simplicial complexes by Hyun {\em et al.} We extend this construction method to arbitrary posets. Especially, anti-chains are corresponded to simplicial complexes. In this paper, we present two constructions of binary linear codes from hierarchical posets of two levels. In particular, we determine t… ▽ More

    Submitted 17 August, 2020; originally announced August 2020.

    Comments: 22 pages, to appear in DCC

  15. arXiv:2001.04766  [pdf, ps, other

    cs.IT

    Self-reciprocal and self-conjugate-reciprocal irreducible factors of $x^n-λ$ and their applications

    Authors: Yansheng Wu, Qin Yue, Shuqin Fan

    Abstract: In this paper, we present some necessary and sufficient conditions under which an irreducible polynomial is self-reciprocal (SR) or self-conjugate-reciprocal (SCR). By these characterizations, we obtain some enumeration formulas of SR and SCR irreducible factors of $x^n-λ$, $λ\in \Bbb F_q^*$, over $\Bbb F_q$, which are just open questions posed by Boripan {\em et al} (2019). We also count the numb… ▽ More

    Submitted 14 January, 2020; originally announced January 2020.

    Comments: 14 pages. To appear in Finite Fields and Their Applications

  16. arXiv:1911.07542  [pdf, ps, other

    cs.IT

    On the Hamming distances of repeated-root cyclic codes of length $5p^s$

    Authors: Xia Li, Qin Yue

    Abstract: Due to the wide applications in consumer electronics, data storage systems and communication systems, cyclic codes have been an interesting research topic in coding theory. In this paper, let $p$ be a prime with $p\ge 7$. We determine the weight distributions of all cyclic codes of length $5$ over $\f_q$ and the Hamming distances of all repeated-root cyclic codes of length $5p^s$ over $\F_q$, wher… ▽ More

    Submitted 19 November, 2019; v1 submitted 18 November, 2019; originally announced November 2019.

    Comments: 21 pages

  17. arXiv:1910.12242  [pdf, ps, other

    cs.IT

    New quaternary codes derived from posets of the disjoint union of two chains

    Authors: Xiaomeng Zhu, Yansheng Wu, Qin Yue

    Abstract: Based on the generic construction of linear codes, we construct linear codes over the ring $\Bbb Z_4$ via posets of the disjoint union of two chains. We determine the Lee weight distributions of the quaternary codes. Moreover, we obtain some new linear quaternary codes and good binary codes by using the Gray map.

    Submitted 27 October, 2019; originally announced October 2019.

    Comments: 5 pages. Tp appear in IEEE Communications Letters

  18. arXiv:1910.12036  [pdf, ps, other

    cs.IT

    A class of functions with low-valued Walsh spectrum

    Authors: Fengwei Li, Yansheng Wu, Qin Yue

    Abstract: Let $l\equiv 3\pmod 4$, $l\ne 3$, be a prime, $N=l^2$, $f=\frac{l(l-1)}2$ the multiplicative order of a prime $p$ modulo $N$, and $q=p^f$. In this paper, we investigate the Walsh spectrum of the monomial functions $f(x)={\rm Tr}_{q/p}(x^{\frac{q-1}{l^2}})$ in index two case. In special, we explicitly present the value distribution of the Walsh transform of $f(x)$ if $1+l=4p^h$, where $h$ is a clas… ▽ More

    Submitted 26 October, 2019; originally announced October 2019.

    Comments: 15 pages. To appear in Discrete Applied Mathematics

  19. arXiv:1910.04334  [pdf, ps, other

    cs.IT

    Optimal few-weight codes from simplicial complexes

    Authors: Yansheng Wu, Xiaomeng Zhu, Qin Yue

    Abstract: Recently, some infinite families of binary minimal and optimal linear codes are constructed from simplicial complexes by Hyun {\em et al}. Inspired by their work, we present two new constructions of codes over the ring $\Bbb F_2+u\Bbb F_2$ by employing simplicial complexes. When the simplicial complexes are all generated by a maximal element, we determine the Lee weight distributions of two classe… ▽ More

    Submitted 9 October, 2019; originally announced October 2019.

    Comments: 17 pages, To appear in IEEE IT

  20. arXiv:1906.12017  [pdf, ps, other

    cs.IT math.CO

    Binary optimal linear codes from posets of the disjoint union of two chains

    Authors: Yansheng Wu, Jong Yoon Hyun, Qin Yue

    Abstract: Recently, Chang and Hyun obtained some classes of binary optimal codes via simplicial complexes. In this letter, we utilize posets of the disjoint union of two chains to construct binary optimal linear codes.

    Submitted 27 June, 2019; originally announced June 2019.

    Comments: 4 pages

  21. arXiv:1906.07347  [pdf

    eess.IV cs.CV

    Cardiac Segmentation from LGE MRI Using Deep Neural Network Incorporating Shape and Spatial Priors

    Authors: Qian Yue, Xinzhe Luo, Qing Ye, Lingchao Xu, Xiahai Zhuang

    Abstract: Cardiac segmentation from late gadolinium enhancement MRI is an important task in clinics to identify and evaluate the infarction of myocardium. The automatic segmentation is however still challenging, due to the heterogeneous intensity distributions and indistinct boundaries in the images. In this paper, we propose a new method, based on deep neural networks (DNN), for fully automatic segmentatio… ▽ More

    Submitted 25 June, 2019; v1 submitted 17 June, 2019; originally announced June 2019.

    Comments: Accepted for publication in MICCAI 2019

  22. arXiv:1710.07943  [pdf, ps, other

    cs.IT math.NT

    Further factorization of $x^n-1$ over a finite field

    Authors: Yansheng Wu, Qin Yue, Shuqin Fan

    Abstract: Let $\Bbb F_q$ be a finite field with $q$ elements and $n$ a positive integer. Martínez, Vergara and Oliveira \cite{MVO} explicitly factorized $x^{n} - 1$ over $\Bbb F_q$ under the condition of $rad(n)|(q-1)$. In this paper, suppose that $rad(n)\nmid (q-1)$ and $rad(n)|(q^w-1)$, where $w$ is a prime, we explicitly factorize $x^{n}-1$ into irreducible factors in $\Bbb F_q[x]$ and count the number o… ▽ More

    Submitted 22 October, 2017; originally announced October 2017.

  23. arXiv:1605.04063  [pdf, ps, other

    cs.IT

    A construction of $q$-ary linear codes with two weights

    Authors: Ziling Heng, Qin Yue

    Abstract: Linear codes with a few weights are very important in coding theory and have attracted a lot of attention. In this paper, we present a construction of $q$-ary linear codes from trace and norm functions over finite fields. The weight distributions of the linear codes are determined in some cases based on Gauss sums. It is interesting that our construction can produce optimal or almost optimal codes… ▽ More

    Submitted 23 July, 2017; v1 submitted 13 May, 2016; originally announced May 2016.

    Comments: 19 pages

  24. arXiv:1511.09174   

    cs.IT

    A class of $q$-ary linear codes derived from irreducible cyclic codes

    Authors: Ziling Heng, Qin Yue

    Abstract: Recently, linear codes with a few weights were widely investigated due to their applications in secret sharing schemes and authentication schemes. In this letter, we present a class of $q$-ary linear codes derived from irreducible cyclic codes with $q$ a prime power. We use Gauss sums to represent its Hamming weights and obtain the bounds of its minimum Hamming distance. In some cases, we explicit… ▽ More

    Submitted 14 April, 2016; v1 submitted 30 November, 2015; originally announced November 2015.

    Comments: This paper has been withdraw because a part of the main results has been reported before

    MSC Class: 11T71; 11T55

  25. arXiv:1511.02093  [pdf, ps, other

    cs.IT

    Evaluation of the Hamming weights of a class of linear codes based on Gauss sums

    Authors: Ziling Heng, Qin Yue

    Abstract: Linear codes with a few weights have been widely investigated in recent years. In this paper, we mainly use Gauss sums to represent the Hamming weights of a class of $q$-ary linear codes under some certain conditions, where $q$ is a power of a prime. The lower bound of its minimum Hamming distance is obtained. In some special cases, we evaluate the weight distributions of the linear codes by semi-… ▽ More

    Submitted 11 May, 2016; v1 submitted 6 November, 2015; originally announced November 2015.

    MSC Class: 11T71; 11T55

  26. arXiv:1510.05355  [pdf, ps, other

    cs.IT

    Several classes of cyclic codes with either optimal three weights or a few weights

    Authors: Ziling Heng, Qin Yue

    Abstract: Cyclic codes with a few weights are very useful in the design of frequency hop** sequences and the development of secret sharing schemes. In this paper, we mainly use Gauss sums to represent the Hamming weights of a general construction of cyclic codes. As applications, we obtain a class of optimal three-weight codes achieving the Griesmer bound, which generalizes a Vega's result in \cite{V1}, a… ▽ More

    Submitted 19 October, 2015; originally announced October 2015.

    Comments: 24 pages

    MSC Class: 11T71; 11T55; 12E20

  27. arXiv:1403.4829  [pdf, other

    cs.CR

    Blind Recognition of Touched Keys: Attack and Countermeasures

    Authors: Qinggang Yue, Zhen Ling, Benyuan Liu, Xinwen Fu, Wei Zhao

    Abstract: In this paper, we introduce a novel computer vision based attack that discloses inputs on a touch enabled device, while the attacker cannot see any text or popups from a video of the victim tap** on the touch screen. In the attack, we use the optical flow algorithm to identify touching frames where the finger touches the screen surface. We innovatively use intersections of detected edges of the… ▽ More

    Submitted 19 March, 2014; originally announced March 2014.

  28. arXiv:1306.5809  [pdf, ps, other

    cs.IT

    Weight distributions of cyclic codes with respect to pairwise coprime order elements

    Authors: Chengju Li, Qin Yue, Fengwei Li

    Abstract: Let $\Bbb F_r$ be an extension of a finite field $\Bbb F_q$ with $r=q^m$. Let each $g_i$ be of order $n_i$ in $\Bbb F_r^*$ and $\gcd(n_i, n_j)=1$ for $1\leq i \neq j \leq u$. We define a cyclic code over $\Bbb F_q$ by $$\mathcal C_{(q, m, n_1,n_2, ..., n_u)}=\{c(a_1, a_2, ..., a_u) : a_1, a_2, ..., a_u \in \Bbb F_r\},$$ where… ▽ More

    Submitted 29 June, 2013; v1 submitted 24 June, 2013; originally announced June 2013.

    Comments: 18 pages. arXiv admin note: substantial text overlap with arXiv:1306.5277

    MSC Class: 94B15; 11T71; 11T24

  29. arXiv:1306.5277  [pdf, ps, other

    cs.IT math.NT

    Weight distribution of two classes of cyclic codes with respect to two distinct order elements

    Authors: Chengju Li, Qin Yue

    Abstract: Cyclic codes are an interesting type of linear codes and have wide applications in communication and storage systems due to their efficient encoding and decoding algorithms. Cyclic codes have been studied for many years, but their weight distribution are known only for a few cases. In this paper, let $\Bbb F_r$ be an extension of a finite field $\Bbb F_q$ and $r=q^m$, we determine the weight distr… ▽ More

    Submitted 21 June, 2013; originally announced June 2013.

    MSC Class: 94B15; 11T71; 11T24

  30. arXiv:0901.2391  [pdf, ps, other

    cs.IT cs.DM

    Weight Distribution of A p-ary Cyclic Code

    Authors: Xiangyong Zeng, Lei Hu, Wenfeng Jiang, Qin Yue, Xiwang Cao

    Abstract: For an odd prime $p$ and two positive integers $n\geq 3$ and $k$ with $\frac{n}{{\rm gcd}(n,k)}$ being odd, the paper determines the weight distribution of a $p$-ary cyclic code $\mathcal{C}$ over $\mathbb{F}_{p}$ with nonzeros $α^{-1}$, $α^{-(p^k+1)}$ and $α^{-(p^{3k}+1)}$, where $α$ is a primitive element of $\mathbb{F}_{p^n}$

    Submitted 15 January, 2009; originally announced January 2009.

    Comments: 15 pages