-
Generalization Bound and New Algorithm for Clean-Label Backdoor Attack
Authors:
Lijia Yu,
Shuang Liu,
Yibo Miao,
Xiao-Shan Gao,
Lijun Zhang
Abstract:
The generalization bound is a crucial theoretical tool for assessing the generalizability of learning methods and there exist vast literatures on generalizability of normal learning, adversarial learning, and data poisoning. Unlike other data poison attacks, the backdoor attack has the special property that the poisoned triggers are contained in both the training set and the test set and the purpo…
▽ More
The generalization bound is a crucial theoretical tool for assessing the generalizability of learning methods and there exist vast literatures on generalizability of normal learning, adversarial learning, and data poisoning. Unlike other data poison attacks, the backdoor attack has the special property that the poisoned triggers are contained in both the training set and the test set and the purpose of the attack is two-fold. To our knowledge, the generalization bound for the backdoor attack has not been established. In this paper, we fill this gap by deriving algorithm-independent generalization bounds in the clean-label backdoor attack scenario. Precisely, based on the goals of backdoor attack, we give upper bounds for the clean sample population errors and the poison population errors in terms of the empirical error on the poisoned training dataset. Furthermore, based on the theoretical result, a new clean-label backdoor attack is proposed that computes the poisoning trigger by combining adversarial noise and indiscriminate poison. We show its effectiveness in a variety of settings.
△ Less
Submitted 1 June, 2024;
originally announced June 2024.
-
Cramer's moderate deviations of modularity in network
Authors:
Yu Miao,
Qing Yin
Abstract:
Complex networks play a crucial role in understanding physical, biological, social and technological systems. One of the most relevant features of graphs representing real systems is community structure. In this paper, for a specific partition of a given network, we prove the Cramer's moderate deviations of modularity for the partition when the size of the network gets large.
Complex networks play a crucial role in understanding physical, biological, social and technological systems. One of the most relevant features of graphs representing real systems is community structure. In this paper, for a specific partition of a given network, we prove the Cramer's moderate deviations of modularity for the partition when the size of the network gets large.
△ Less
Submitted 16 April, 2024;
originally announced April 2024.
-
Berry-Esseen bound of modularity in network
Authors:
Yu Miao,
Qing Yin
Abstract:
In this paper, the model is a specific partition of a given network. Berry-Esseen bound and strong law of large numbers of modularity for the partition are proved when the size of the network gets large.
In this paper, the model is a specific partition of a given network. Berry-Esseen bound and strong law of large numbers of modularity for the partition are proved when the size of the network gets large.
△ Less
Submitted 16 April, 2024;
originally announced April 2024.
-
Well-posedness and propagation of chaos for jump-type McKean-Vlasov SDEs with irregular coefficients
Authors:
Zhen Wang,
Jie Ren,
Yu Miao
Abstract:
In this paper, we study the existence and pathwise uniqueness of strong solutions for jump-type McKean-Vlasov SDEs with irregular coefficients but uniform linear growth assumption. Moreover, the propagation of chaos and the convergence rate for Euler's scheme of jump-type McKean-Vlasov SDEs are also obtained by taking advantage of Yamada-Watanabe's approximation approach and stop** time.
In this paper, we study the existence and pathwise uniqueness of strong solutions for jump-type McKean-Vlasov SDEs with irregular coefficients but uniform linear growth assumption. Moreover, the propagation of chaos and the convergence rate for Euler's scheme of jump-type McKean-Vlasov SDEs are also obtained by taking advantage of Yamada-Watanabe's approximation approach and stop** time.
△ Less
Submitted 8 February, 2024;
originally announced February 2024.
-
Learning based numerical methods for Helmholtz equation with high frequency
Authors:
Yu Chen,
** Cheng,
Tingyue Li,
Yun Miao
Abstract:
High-frequency issues have been remarkably challenges in numerical methods for partial differential equations. In this paper, a learning based numerical method (LbNM) is proposed for Helmholtz equation with high frequency. The main novelty is using Tikhonov regularization method to stably learn the solution operator by utilizing relevant information especially the fundamental solutions. Then apply…
▽ More
High-frequency issues have been remarkably challenges in numerical methods for partial differential equations. In this paper, a learning based numerical method (LbNM) is proposed for Helmholtz equation with high frequency. The main novelty is using Tikhonov regularization method to stably learn the solution operator by utilizing relevant information especially the fundamental solutions. Then applying the solution operator to a new boundary input could quickly update the solution. Based on the method of fundamental solutions and the quantitative Runge approximation, we give the error estimate. This indicates interpretability and generalizability of the present method. Numerical results validates the error analysis and demonstrates the high-precision and high-efficiency features.
△ Less
Submitted 17 January, 2024;
originally announced January 2024.
-
T-ADAF: Adaptive Data Augmentation Framework for Image Classification Network based on Tensor T-product Operator
Authors:
Feiyang Han,
Yun Miao,
Zhaoyi Sun,
Yimin Wei
Abstract:
Image classification is one of the most fundamental tasks in Computer Vision. In practical applications, the datasets are usually not as abundant as those in the laboratory and simulation, which is always called as Data Hungry. How to extract the information of data more completely and effectively is very important. Therefore, an Adaptive Data Augmentation Framework based on the tensor T-product O…
▽ More
Image classification is one of the most fundamental tasks in Computer Vision. In practical applications, the datasets are usually not as abundant as those in the laboratory and simulation, which is always called as Data Hungry. How to extract the information of data more completely and effectively is very important. Therefore, an Adaptive Data Augmentation Framework based on the tensor T-product Operator is proposed in this paper, to triple one image data to be trained and gain the result from all these three images together with only less than 0.1% increase in the number of parameters. At the same time, this framework serves the functions of column image embedding and global feature intersection, enabling the model to obtain information in not only spatial but frequency domain, and thus improving the prediction accuracy of the model. Numerical experiments have been designed for several models, and the results demonstrate the effectiveness of this adaptive framework. Numerical experiments show that our data augmentation framework can improve the performance of original neural network model by 2%, which provides competitive results to state-of-the-art methods.
△ Less
Submitted 7 June, 2023;
originally announced June 2023.
-
Ideal Secret Sharing Schemes: Combinatorial Characterizations, Certain Access Structures, and Related Geometric Problems
Authors:
Ryoh Fuji-Hara,
Ying Miao
Abstract:
An ideal secret sharing scheme is a method of sharing a secret key in some key space among a finite set of participants in such a way that only the authorized subsets of participants can reconstruct the secret key from their shares which are of the same length as that of the secret key. The set of all authorized subsets of participants is the access structure of the secret sharing scheme. In this…
▽ More
An ideal secret sharing scheme is a method of sharing a secret key in some key space among a finite set of participants in such a way that only the authorized subsets of participants can reconstruct the secret key from their shares which are of the same length as that of the secret key. The set of all authorized subsets of participants is the access structure of the secret sharing scheme. In this paper, we derive several properties and restate the combinatorial characterization of an ideal secret sharing scheme in Brickell-Stinson model in terms of orthogonality of its representative array. We propose two practical models, namely the parallel and hierarchical models, for access structures, and then, by the restated characterization, we discuss sufficient conditions on finite geometries for ideal secret sharing schemes to realize these access structure models. Several series of ideal secret sharing schemes realizing special parallel or hierarchical access structure model are constructed from finite projective planes.
△ Less
Submitted 18 April, 2023;
originally announced April 2023.
-
Secure Codes with List Decoding
Authors:
Yujie Gu,
Ilya Vorobyev,
Ying Miao
Abstract:
In this paper we consider combinatorial secure codes in traitor tracing for protecting copyright of multimedia content. First, we introduce a new notion of secure codes with list decoding (SCLDs) for collusion-resistant multimedia fingerprinting, which includes many existing types of fingerprinting codes as special cases. Next, we build efficient identifying algorithms for SCLDs with complete trac…
▽ More
In this paper we consider combinatorial secure codes in traitor tracing for protecting copyright of multimedia content. First, we introduce a new notion of secure codes with list decoding (SCLDs) for collusion-resistant multimedia fingerprinting, which includes many existing types of fingerprinting codes as special cases. Next, we build efficient identifying algorithms for SCLDs with complete traceability and establish bounds on its largest possible code rate. In comparison with the existing fingerprinting codes, it is shown that SCLDs have not only much more efficient traceability than separable codes but also a much larger code rate than frameproof codes. As a byproduct, new bounds on the largest code rate of binary separable codes are established as well. Furthermore, a two-stage dynamic traitor tracing framework is proposed for multimedia fingerprinting in the dynamic scenario, which could not only efficiently achieve the complete traceability but also provide a much larger capacity than the static scenario.
△ Less
Submitted 5 February, 2023;
originally announced February 2023.
-
A new type of results on probabilities of moderate deviations for i.i.d. random variables
Authors:
Deli Li,
Yu Miao,
Yongcheng Qi
Abstract:
Let $\{X, X_{n}; n \geq 1\}$ be a sequence of i.i.d. non-degenerate real-valued random variables with $\mathbb{E}X^{2} < \infty$. Let $S_{n} = \sum_{i=1}^{n} X_{i}$, $n \geq 1$. Let $g(\cdot): ~[0, \infty) \rightarrow [0, \infty)$ be a nondecreasing regularly varying function with index $ρ\geq 0$ and $\lim_{t \rightarrow \infty} g(t) = \infty$. Let $μ= \mathbb{E}X$ and…
▽ More
Let $\{X, X_{n}; n \geq 1\}$ be a sequence of i.i.d. non-degenerate real-valued random variables with $\mathbb{E}X^{2} < \infty$. Let $S_{n} = \sum_{i=1}^{n} X_{i}$, $n \geq 1$. Let $g(\cdot): ~[0, \infty) \rightarrow [0, \infty)$ be a nondecreasing regularly varying function with index $ρ\geq 0$ and $\lim_{t \rightarrow \infty} g(t) = \infty$. Let $μ= \mathbb{E}X$ and $σ^{2} = \mathbb{E}(X - μ)^{2}$. In this paper, we obtain precise asymptotic estimates for probabilities of moderate deviations by showing that, for all $x > 0$, \[ \limsup_{n \rightarrow \infty} \frac{\log \mathbb{P}\left(S_{n} - n μ> x \sqrt{n g(\log n)} \right)}{g(\log n)} = - \left(\frac{x^{2}}{2σ^{2}} \wedge \frac{\overlineλ_{1}}{2^ρ} \right), \] \[ \liminf_{n \rightarrow \infty} \frac{\log \mathbb{P}\left(S_{n} - n μ> x \sqrt{n g(\log n)} \right)}{g(\log n)} = - \left(\frac{x^{2}}{2σ^{2}} \wedge \frac{\underlineλ_{1}}{2^ρ} \right), \] \[ \limsup_{n \rightarrow \infty} \frac{\log \mathbb{P}\left(S_{n} - n μ< -x \sqrt{n g(\log n)} \right)}{g(\log n)} = - \left(\frac{x^{2}}{2σ^{2}} \wedge \frac{\overlineλ_{2}}{2^ρ} \right), \] and \[ \liminf_{n \rightarrow \infty} \frac{\log \mathbb{P}\left(S_{n} - n μ< -x \sqrt{n g(\log n)} \right)}{g(\log n)} = - \left(\frac{x^{2}}{2σ^{2}} \wedge \frac{\underlineλ_{2}}{2^ρ} \right), \] where $\overlineλ_{1}$ are $\underlineλ_{1}$ are determined by the asymptotic behavior of $\mathbb{P}(X > t)$ and $\overlineλ_{2}$ and $\underlineλ_{2}$ are determined by the asymptotic behavior of $\mathbb{P}(X < -t)$. Unlike those known results in the literature, the moderate deviation results established in this paper depend on both the variance and the asymptotic behavior of the tail distribution of $X$.
△ Less
Submitted 7 July, 2022;
originally announced July 2022.
-
The Floquet Baxterisation
Authors:
Yuan Miao,
Vladimir Gritsev,
Denis V. Kurlov
Abstract:
Quantum integrability has proven to be a useful tool to study quantum many-body systems out of equilibrium. In this paper we construct a generic framework for integrable quantum circuits through the procedure of Floquet Baxterisation. The integrability is guaranteed by establishing a connection between Floquet evolution operators and inhomogeneous transfer matrices obtained from the Yang-Baxter re…
▽ More
Quantum integrability has proven to be a useful tool to study quantum many-body systems out of equilibrium. In this paper we construct a generic framework for integrable quantum circuits through the procedure of Floquet Baxterisation. The integrability is guaranteed by establishing a connection between Floquet evolution operators and inhomogeneous transfer matrices obtained from the Yang-Baxter relations. This allows us to construct integrable Floquet evolution operators with arbitrary depths and various boundary conditions. Furthermore, we focus on the example related to the staggered 6-vertex model. In the scaling limit we establish a connection of this Floquet protocol with a non-rational conformal field theory. Employing the properties of the underlying affine Temperley--Lieb algebraic structure, we demonstrate the dynamical anti-unitary symmetry breaking in the easy-plane regime. We also give an overview of integrability-related quantum circuits, highlighting future research directions.
△ Less
Submitted 8 January, 2024; v1 submitted 30 June, 2022;
originally announced June 2022.
-
Global existence and blow-up for a stochastic transport equation with non-local velocity
Authors:
Diego Alonso-Orán,
Yingting Miao,
Hao Tang
Abstract:
In this paper we investigate a non-linear and non-local one dimensional transport equation under random perturbations on the real line. We first establish a local-in-time theory, i.e., existence, uniqueness and blow-up criterion for pathwise solutions in Sobolev spaces $H^{s}$ with $s>3$. Thereafter, we give a complete picture of the long time behavior of the solutions based on the type of noise w…
▽ More
In this paper we investigate a non-linear and non-local one dimensional transport equation under random perturbations on the real line. We first establish a local-in-time theory, i.e., existence, uniqueness and blow-up criterion for pathwise solutions in Sobolev spaces $H^{s}$ with $s>3$. Thereafter, we give a complete picture of the long time behavior of the solutions based on the type of noise we consider. On one hand, we identify a family of noises such that blow-up can be prevented with probability $1$, guaranteeing the existence and uniqueness of global solutions almost surely. On the other hand, in the particular linear noise case, we show that singularities occur in finite time with positive probability, and we derive lower bounds of these probabilities. To conclude, we introduce the notion of stability of exiting times and show that one cannot improve the stability of the exiting time and simultaneously improve the continuity of the dependence on initial data.
△ Less
Submitted 22 March, 2022;
originally announced March 2022.
-
On the Information-theoretic Security of Combinatorial All-or-nothing Transforms
Authors:
Yujie Gu,
Sonata Akao,
Navid Nasr Esfahani,
Ying Miao,
Kouichi Sakurai
Abstract:
All-or-nothing transforms (AONT) were proposed by Rivest as a message preprocessing technique for encrypting data to protect against brute-force attacks, and have numerous applications in cryptography and information security. Later the unconditionally secure AONT and their combinatorial characterization were introduced by Stinson. Informally, a combinatorial AONT is an array with the unbiased req…
▽ More
All-or-nothing transforms (AONT) were proposed by Rivest as a message preprocessing technique for encrypting data to protect against brute-force attacks, and have numerous applications in cryptography and information security. Later the unconditionally secure AONT and their combinatorial characterization were introduced by Stinson. Informally, a combinatorial AONT is an array with the unbiased requirements and its security properties in general depend on the prior probability distribution on the inputs $s$-tuples. Recently, it was shown by Esfahani and Stinson that a combinatorial AONT has perfect security provided that all the inputs $s$-tuples are equiprobable, and has weak security provided that all the inputs $s$-tuples are with non-zero probability.
This paper aims to explore on the gap between perfect security and weak security for combinatorial $(t,s,v)$-AONTs. Concretely, we consider the typical scenario that all the $s$ inputs take values independently (but not necessarily identically) and quantify the amount of information $H(\mathcal{X}|\mathcal{Y})$ about any $t$ inputs $\mathcal{X}$ that is not revealed by any $s-t$ outputs $\mathcal{Y}$. In particular, we establish the general lower and upper bounds on $H(\mathcal{X}|\mathcal{Y})$ for combinatorial AONTs using information-theoretic techniques, and also show that the derived bounds can be attained in certain cases. Furthermore, the discussions are extended for the security properties of combinatorial asymmetric AONTs.
△ Less
Submitted 21 February, 2022;
originally announced February 2022.
-
Euler's scheme of Mckean-Vlasov SDEs with non-Lipschitz coefficients
Authors:
Zhen Wang,
Jie Ren,
Yu Miao
Abstract:
In this paper, we show the strong well-posedness of Mckean-Vlasov SDEs with non-Lipschitz coefficients. Moreover, propagation of chaos and the convergence rate for Euler's scheme of Mckean-Vlasov SDEs are also obtained.
In this paper, we show the strong well-posedness of Mckean-Vlasov SDEs with non-Lipschitz coefficients. Moreover, propagation of chaos and the convergence rate for Euler's scheme of Mckean-Vlasov SDEs are also obtained.
△ Less
Submitted 16 February, 2022;
originally announced February 2022.
-
Well-posedness for a stochastic Camassa-Holm type equation with higher order nonlinearities
Authors:
Yingting Miao,
Christian Rohde,
Hao Tang
Abstract:
This paper aims at studying a generalized Camassa--Holm equation under random perturbation. We establish a local well-posedness result in the sense of Hadamard, i.e., existence, uniqueness and continuous dependence on initial data, as well as blow-up criteria for pathwise solutions in the Sobolev spaces $H^s$ with $s>3/2$ for $x\in\mathbb{R}$. The analysis on continuous dependence on initial data…
▽ More
This paper aims at studying a generalized Camassa--Holm equation under random perturbation. We establish a local well-posedness result in the sense of Hadamard, i.e., existence, uniqueness and continuous dependence on initial data, as well as blow-up criteria for pathwise solutions in the Sobolev spaces $H^s$ with $s>3/2$ for $x\in\mathbb{R}$. The analysis on continuous dependence on initial data for nonlinear stochastic partial differential equations has gained less attention in the literature so far. In this work, we first show that the solution map is continuous. Then we introduce a notion of stability of exiting time. We provide an example showing that one cannot improve the stability of the exiting time and simultaneously improve the continuity of the dependence on initial data. Finally, we analyze the regularization effect of nonlinear noise in preventing blow-up. Precisely, we demonstrate that global existence holds true almost surely provided that the noise is strong enough.
△ Less
Submitted 31 March, 2023; v1 submitted 18 May, 2021;
originally announced May 2021.
-
Strongly separable matrices for nonadaptive combinatorial group testing
Authors:
**** Fan,
Hung-Lin Fu,
Yujie Gu,
Ying Miao,
Maiko Shigeno
Abstract:
In nonadaptive combinatorial group testing (CGT), it is desirable to identify a small set of up to $d$ defectives from a large population of $n$ items with as few tests (i.e. large rate) and efficient identifying algorithm as possible. In the literature, $d$-disjunct matrices ($d$-DM) and $\bar{d}$-separable matrices ($\bar{d}$-SM) are two classical combinatorial structures having been studied for…
▽ More
In nonadaptive combinatorial group testing (CGT), it is desirable to identify a small set of up to $d$ defectives from a large population of $n$ items with as few tests (i.e. large rate) and efficient identifying algorithm as possible. In the literature, $d$-disjunct matrices ($d$-DM) and $\bar{d}$-separable matrices ($\bar{d}$-SM) are two classical combinatorial structures having been studied for several decades. It is well-known that a $d$-DM provides a more efficient identifying algorithm than a $\bar{d}$-SM, while a $\bar{d}$-SM could have a larger rate than a $d$-DM. In order to combine the advantages of these two structures, in this paper, we introduce a new notion of \emph{strongly $d$-separable matrix} ($d$-SSM) for nonadaptive CGT and show that a $d$-SSM has the same identifying ability as a $d$-DM, but much weaker requirements than a $d$-DM. Accordingly, the general bounds on the largest rate of a $d$-SSM are established. Moreover, by the random coding method with expurgation, we derive an improved lower bound on the largest rate of a $2$-SSM which is much higher than the best known result of a $2$-DM.
△ Less
Submitted 6 October, 2020; v1 submitted 6 October, 2020;
originally announced October 2020.
-
Euler-Maruyama scheme for SDEs with Dini continuous coefficients
Authors:
Zhen Wang,
Yu Miao,
RenJie
Abstract:
In this paper, we show the convergence rate of Euler-Maruyama scheme for non-degenerate SDEs with Dini continuous coefficients, by the aid of the regularity of the solution to the associated Kolmogorov equation. We obtain the same conclusions using a simple and clever way to simplify the proof and weaken the conditions in \cite{BHY} by the properties of Dini continuous and Taylor expansion.
In this paper, we show the convergence rate of Euler-Maruyama scheme for non-degenerate SDEs with Dini continuous coefficients, by the aid of the regularity of the solution to the associated Kolmogorov equation. We obtain the same conclusions using a simple and clever way to simplify the proof and weaken the conditions in \cite{BHY} by the properties of Dini continuous and Taylor expansion.
△ Less
Submitted 16 February, 2022; v1 submitted 27 September, 2020;
originally announced September 2020.
-
Limiting Spectral Radii of Circular Unitary Matrices under Light Truncation
Authors:
Yu Miao,
Yongcheng Qi
Abstract:
Consider a truncated circular unitary matrix which is a $p_n$ by $p_n$ submatrix of an $n$ by $n$ circular unitary matrix after deleting the last $n-p_n$ columns and rows. Jiang and Qi \cite{JiangQi2017} and Gui and Qi \cite{GQ2018} study the limiting distributions of the maximum absolute value of the eigenvalues (known as spectral radius) of the truncated matrix. Some limiting distributions for t…
▽ More
Consider a truncated circular unitary matrix which is a $p_n$ by $p_n$ submatrix of an $n$ by $n$ circular unitary matrix after deleting the last $n-p_n$ columns and rows. Jiang and Qi \cite{JiangQi2017} and Gui and Qi \cite{GQ2018} study the limiting distributions of the maximum absolute value of the eigenvalues (known as spectral radius) of the truncated matrix. Some limiting distributions for the spectral radius for the truncated circular unitary matrix have been obtained under the following conditions: (1). $p_n/n$ is bounded away from $0$ and $1$; (2). $p_n\to\infty$ and $p_n/n\to 0$ as $n\to\infty$; (3). $(n-p_n)/n\to 0$ and $(n-p_n)/(\log n)^3\to\infty$ as $n\to\infty$; (4). $n-p_n\to\infty$ and $(n-p_n)/\log n\to 0$ as $n\to\infty$; and (5). $n-p_n=k\ge 1$ is a fixed integer. The spectral radius converges in distribution to the Gumbel distribution under the first four conditions and to a reversed Weibull distribution under the fifth condition. Apparently, the conditions above do not cover the case when $n-p_n$ is of order between $\log n$ and $(\log n)^3$. In this paper, we prove that the spectral radius converges in distribution to the Gumbel distribution as well in this case, as conjectured by Gui and Qi \cite{GQ2018}.
△ Less
Submitted 23 August, 2020;
originally announced August 2020.
-
A supplement to the laws of large numbers and the large deviations
Authors:
Deli Li,
Yu Miao
Abstract:
Let $0 < p < 2$. Let $\{X, X_{n}; n \geq 1\}$ be a sequence of independent and identically distributed $\mathbf{B}$-valued random variables and set $S_{n} = \sum_{i=1}^{n}X_{i},~n \geq 1$. In this paper, a supplement to the classical laws of large numbers and the classical large deviations is provided. We show that if $S_{n}/n^{1/p} \rightarrow_{\mathbb{P}} 0$, then, for all $s > 0$, \[ \limsup_{n…
▽ More
Let $0 < p < 2$. Let $\{X, X_{n}; n \geq 1\}$ be a sequence of independent and identically distributed $\mathbf{B}$-valued random variables and set $S_{n} = \sum_{i=1}^{n}X_{i},~n \geq 1$. In this paper, a supplement to the classical laws of large numbers and the classical large deviations is provided. We show that if $S_{n}/n^{1/p} \rightarrow_{\mathbb{P}} 0$, then, for all $s > 0$, \[ \limsup_{n \to \infty} \frac{1}{\log n} \log \mathbb{P}\left(\left\|S_{n} \right\| > s n^{1/p} \right) = - (\barβ - p)/p \] and \[ \liminf_{n \to \infty} \frac{1}{\log n} \log \mathbb{P}\left(\left\|S_{n} \right\| > s n^{1/p} \right) = -(\underlineβ - p)/p, \] where \[ \barβ = - \limsup_{t \rightarrow \infty} \frac{\log \mathbb{P}(\log \|X\| > t)}{t} ~~\mbox{and}~~\underlineβ = - \liminf_{t \rightarrow \infty} \frac{\log \mathbb{P}(\log \|X\| > t)}{t}. \] The main tools employed in proving this result are the symmetrization technique and three powerful inequalities established by Hoffmann-Jørgensen (1974), de Acosta (1981), and Ledoux and Talagrand (1991), respectively. As a special case of this result, the main results of Hu and Nyrhinen (2004) are not only improved, but also extended.
△ Less
Submitted 9 July, 2020;
originally announced July 2020.
-
Algebraic Manipulation Detection Codes via Highly Nonlinear Functions
Authors:
Minfeng Shao,
Ying Miao
Abstract:
In this paper, we study the relationship between algebraic manipulation detection (AMD) codes and highly nonlinear functions. As applications, on one hand, a generic construction for systematic AMD codes is introduced based on highly nonlinear functions. Systematic AMD codes with new parameters can be generated from known highly nonlinear functions. Especially, several infinite classes of optimal…
▽ More
In this paper, we study the relationship between algebraic manipulation detection (AMD) codes and highly nonlinear functions. As applications, on one hand, a generic construction for systematic AMD codes is introduced based on highly nonlinear functions. Systematic AMD codes with new parameters can be generated from known highly nonlinear functions. Especially, several infinite classes of optimal systematic AMD codes, some with asymptotically optimal tag size, can be constructed. On the other hand, systematic AMD codes are used to construct highly nonlinear functions. The known construction by Cramer et al. [10] for systematic AMD codes turns out to be based on a special kind of functions with high nonlinearity.
△ Less
Submitted 10 February, 2020;
originally announced February 2020.
-
Probabilistic Existence Results for Parent-Identifying Schemes
Authors:
Yujie Gu,
Minquan Cheng,
Grigory Kabatiansky,
Ying Miao
Abstract:
Parent-identifying schemes provide a way to identify causes from effects for some information systems such as digital fingerprinting and group testing. In this paper, we consider combinatorial structures for parent-identifying schemes. First, we establish an equivalent relationship between parent-identifying schemes and forbidden configurations. Based on this relationship, we derive probabilistic…
▽ More
Parent-identifying schemes provide a way to identify causes from effects for some information systems such as digital fingerprinting and group testing. In this paper, we consider combinatorial structures for parent-identifying schemes. First, we establish an equivalent relationship between parent-identifying schemes and forbidden configurations. Based on this relationship, we derive probabilistic existence lower bounds for two related combinatorial structures, that is, $t$-parent-identifying set systems ($t$-IPPS) and $t$-multimedia parent-identifying codes ($t$-MIPPC), which are used in broadcast encryption and multimedia fingerprinting respectively. The probabilistic lower bound for the maximum size of a $t$-IPPS has the asymptotically optimal order of magnitude in many cases, and that for $t$-MIPPC provides the asymptotically optimal code rate when $t=2$ and the best known asymptotic code rate when $t\geq 3$. Furthermore, we analyze the structure of $2$-IPPS and prove some bounds for certain cases.
△ Less
Submitted 3 June, 2019;
originally announced June 2019.
-
On optimal weak algebraic manipulation detection codes and weighted external difference families
Authors:
Minfeng Shao,
Ying Miao
Abstract:
This paper provides a combinatorial characterization of weak algebraic manipulation detection (AMD) codes via a kind of generalized external difference families called bounded standard weighted external difference families (BSWEDFs). By means of this characterization, we improve a known lower bound on the maximum probability of successful tampering for the adversary's all possible strategies in we…
▽ More
This paper provides a combinatorial characterization of weak algebraic manipulation detection (AMD) codes via a kind of generalized external difference families called bounded standard weighted external difference families (BSWEDFs). By means of this characterization, we improve a known lower bound on the maximum probability of successful tampering for the adversary's all possible strategies in weak AMD codes. We clarify the relationship between weak AMD codes and BSWEDFs with various properties. We also propose several explicit constructions for BSWEDFs, some of which can generate new optimal weak AMD codes.
△ Less
Submitted 13 June, 2019; v1 submitted 3 May, 2019;
originally announced May 2019.
-
T-Jordan Canonical Form and T-Drazin Inverse based on the T-Product
Authors:
Yun Miao,
Liqun Qi,
Yimin Wei
Abstract:
In this paper, we introduce the tensor similar transforation and propose the T-Jordan canonical form and its properties. The concept of T-minimal polynomial and T-characteristic polynomial are raised. As a special case, we present properties when two tensors commutes via the tensor T-product. The Cayley-Hamilton theorem also holds for tensor cases. Then we focus on the tensor decomposition theory.…
▽ More
In this paper, we introduce the tensor similar transforation and propose the T-Jordan canonical form and its properties. The concept of T-minimal polynomial and T-characteristic polynomial are raised. As a special case, we present properties when two tensors commutes via the tensor T-product. The Cayley-Hamilton theorem also holds for tensor cases. Then we focus on the tensor decomposition theory. T-polar, T-LU, T-QR and T-Schur decomposition of tensors are obtained. When a F-square tensor is not invertible via the T-product, we give the T-group inverse and T-Drazin inverse which can be viewed as the extension of matrix cases. The expression of T-group and T-Drazin inverse are given by the T-Jordan canonical form. The polynomial form of T-Drazin inverse is also proposed. As an application we raise the T-linear system and get its solution. In the last part, we give the T-core-nilpotent decomposition and show that the T-index and T-Drazin inverse can be given by a limitation process.
△ Less
Submitted 21 October, 2019; v1 submitted 19 February, 2019;
originally announced February 2019.
-
Generalized Tensor Function via the Tensor Singular Value Decomposition based on the T-Product
Authors:
Yun Miao,
Liqun Qi,
Yimin Wei
Abstract:
In this paper, we present the definition of generalized tensor function according to the tensor singular value decomposition (T-SVD) via the tensor T-product. Also, we introduce the compact singular value decomposition (T-CSVD) of tensors via the T-product, from which the projection operators and Moore Penrose inverse of tensors are also obtained. We also establish the Cauchy integral formula for…
▽ More
In this paper, we present the definition of generalized tensor function according to the tensor singular value decomposition (T-SVD) via the tensor T-product. Also, we introduce the compact singular value decomposition (T-CSVD) of tensors via the T-product, from which the projection operators and Moore Penrose inverse of tensors are also obtained. We also establish the Cauchy integral formula for tensors by using the partial isometry tensors and applied it into the solution of tensor equations. Then we establish the generalized tensor power and the Taylor expansion of tensors. Explicit generalized tensor functions are also listed. We define the tensor bilinear and sesquilinear forms and proposed theorems on structures preserved by generalized tensor functions. For complex tensors, we established an isomorphism between complex tensors and real tensors. In the last part of our paper, we find that the block circulant operator established an isomorphism between tensors and matrices. This isomorphism is used to prove the F-stochastic structure is invariant under generalized tensor functions. The concept of invariant tensor cones is also raised.
△ Less
Submitted 15 October, 2019; v1 submitted 14 January, 2019;
originally announced January 2019.
-
M-eigenvalues of Riemann Curvature Tensor of Conformally Flat Manifolds
Authors:
Yun Miao,
Liqun Qi,
Yimin Wei
Abstract:
We generalized Xiang, Qi and Wei's results on the M-eigenvalues of Riemann curvature tensor to higher dimensional conformal flat manifolds. The expression of M-eigenvalues and M-eigenvectors are found in our paper. As a special case, M-eigenvalues of conformal flat Einstein manifold have also been discussed, and the conformal the invariance of M-eigentriple has been found. We also discussed the re…
▽ More
We generalized Xiang, Qi and Wei's results on the M-eigenvalues of Riemann curvature tensor to higher dimensional conformal flat manifolds. The expression of M-eigenvalues and M-eigenvectors are found in our paper. As a special case, M-eigenvalues of conformal flat Einstein manifold have also been discussed, and the conformal the invariance of M-eigentriple has been found. We also discussed the relationship between M-eigenvalue and sectional curvature of a Riemannian manifold. We proved that the M-eigenvalue can determine the Riemann curvature tensor uniquely and generalize the real M-eigenvalue to complex cases. In the last part of our paper, we give an example to compute the M-eigentriple of de Sitter spacetime which is well-known in general relativity.
△ Less
Submitted 28 July, 2018;
originally announced August 2018.
-
New Bounds For Frameproof Codes
Authors:
Chong Shangguan,
Xin Wang,
Gennian Ge,
Ying Miao
Abstract:
Frameproof codes are used to fingerprint digital data. It can prevent copyrighted materials from unauthorized use. In this paper, we study upper and lower bounds for $w$-frameproof codes of length $N$ over an alphabet of size $q$. The upper bound is based on a combinatorial approach and the lower bound is based on a probabilistic construction. Both bounds can improve previous results when $q$ is s…
▽ More
Frameproof codes are used to fingerprint digital data. It can prevent copyrighted materials from unauthorized use. In this paper, we study upper and lower bounds for $w$-frameproof codes of length $N$ over an alphabet of size $q$. The upper bound is based on a combinatorial approach and the lower bound is based on a probabilistic construction. Both bounds can improve previous results when $q$ is small compared to $w$, say $cq\leq w$ for some constant $c\leq q$. Furthermore, we pay special attention to binary frameproof codes. We show a binary $w$-frameproof code of length $N$ can not have more than $N$ codewords if $N<\binom{w+1}{2}$.
△ Less
Submitted 21 November, 2014;
originally announced November 2014.
-
Spectra of the subdivision-vertex and subdivision-edge coronae
Authors:
Pengli Lu,
Yufang Miao
Abstract:
The subdivision graph $\mathcal{S}(G)$ of a graph $G$ is the graph obtained by inserting a new vertex into every edge of $G$. Let $G_1$ and $G_2$ be two vertex disjoint graphs. The \emph{subdivision-vertex corona} of $G_1$ and $G_2$, denoted by $G_1\odot G_2$, is the graph obtained from $\mathcal{S}(G_1)$ and $|V(G_1)|$ copies of $G_2$, all vertex-disjoint, by joining the $i$th vertex of $V(G_1)$…
▽ More
The subdivision graph $\mathcal{S}(G)$ of a graph $G$ is the graph obtained by inserting a new vertex into every edge of $G$. Let $G_1$ and $G_2$ be two vertex disjoint graphs. The \emph{subdivision-vertex corona} of $G_1$ and $G_2$, denoted by $G_1\odot G_2$, is the graph obtained from $\mathcal{S}(G_1)$ and $|V(G_1)|$ copies of $G_2$, all vertex-disjoint, by joining the $i$th vertex of $V(G_1)$ to every vertex in the $i$th copy of $G_2$. The \emph{subdivision-edge corona} of $G_1$ and $G_2$, denoted by $G_1\circleddash G_2$, is the graph obtained from $\mathcal{S}(G_1)$ and $|I(G_1)|$ copies of $G_2$, all vertex-disjoint, by joining the $i$th vertex of $I(G_1)$ to every vertex in the $i$th copy of $G_2$, where $I(G_1)$ is the set of inserted vertices of $\mathcal{S}(G_1)$. In this paper we determine the adjacency spectra, the Laplacian spectra and the signless Laplacian spectra of $G_1\odot G_2$ (respectively, $G_1\circleddash G_2$) in terms of the corresponding spectra of $G_1$ and $G_2$. As applications, the results on the spectra of $G_1\odot G_2$ (respectively, $G_1\circleddash G_2$) enable us to construct infinitely many pairs of cospectral graphs. The adjacency spectra of $G_1\odot G_2$ (respectively, $G_1\circleddash G_2$) help us to construct many infinite families of integral graphs. By using the Laplacian spectra, we also obtain the number of spanning trees and Kirchhoff index of $G_1\odot G_2$ and $G_1\circleddash G_2$, respectively.
△ Less
Submitted 27 July, 2013; v1 submitted 3 February, 2013;
originally announced February 2013.
-
Moderate deviations principle for empirical covariance from a unit root
Authors:
Yu Miao,
Yanling Wang,
Guangyu Yang
Abstract:
In the present paper, we consider the linear autoregressive model in $\rr$, $$ X_{k,n}=θ_n X_{k,n-1}+ξ_k, k=0,1,...,n, n\ge 1$$ where $θ_n\in [0,1)$ is unknown, $(ξ_k)_{k\in\zz}$ is a sequence of centered i.i.d. r.v. valued in $\rr$ representing the noise. When $θ_n\to 1$, the moderate deviations principle for empirical covariance is discussed and as statistical applications we provide the moder…
▽ More
In the present paper, we consider the linear autoregressive model in $\rr$, $$ X_{k,n}=θ_n X_{k,n-1}+ξ_k, k=0,1,...,n, n\ge 1$$ where $θ_n\in [0,1)$ is unknown, $(ξ_k)_{k\in\zz}$ is a sequence of centered i.i.d. r.v. valued in $\rr$ representing the noise. When $θ_n\to 1$, the moderate deviations principle for empirical covariance is discussed and as statistical applications we provide the moderate deviation estimates of the least square and the Yule-Walker estimators of the parameter $θ_n$.
△ Less
Submitted 17 July, 2012;
originally announced July 2012.
-
Eulerian pairs on Fibonacci words
Authors:
Teresa X. S. Li,
Charles B. Mei,
Melissa Y. F. Miao
Abstract:
Recently, Sagan and Savage introduced the notion of Eulerian pairs. In this note, we find Eulerian pairs on Fibonacci words based on Foata's first transformation or Han's bijection and a map in the spirit of a bijection of Steingrímsson.
Recently, Sagan and Savage introduced the notion of Eulerian pairs. In this note, we find Eulerian pairs on Fibonacci words based on Foata's first transformation or Han's bijection and a map in the spirit of a bijection of Steingrímsson.
△ Less
Submitted 28 March, 2013; v1 submitted 2 October, 2011;
originally announced October 2011.
-
Hamiltonian Streamline Guided Feature Extraction with Applications to Face Detection
Authors:
Yingjie Miao,
Jason J. Corso
Abstract:
We propose a new feature extraction method based on two dynamical systems induced by intensity landscape: the negative gradient system and the Hamiltonian system. We build features based on the Hamiltonian streamlines. These features contain nice global topological information about the intensity landscape, and can be used for object detection. We show that for training images of same size, our fe…
▽ More
We propose a new feature extraction method based on two dynamical systems induced by intensity landscape: the negative gradient system and the Hamiltonian system. We build features based on the Hamiltonian streamlines. These features contain nice global topological information about the intensity landscape, and can be used for object detection. We show that for training images of same size, our feature space is much smaller than that generated by Haar-like features. The training time is extremely short, and detection speed and accuracy is similar to Haar-like feature based classifiers.
△ Less
Submitted 17 August, 2011;
originally announced August 2011.
-
Strassen's invariance principle for random walk in random environment
Authors:
Guangyu Yang,
Yu Miao,
Dihe Hu
Abstract:
In this paper, we consider random walk in random environment on $\mathbb{Z}^{d}\,(d\geq1)$ and prove the Strassen's strong invariance principle for this model, via martingale argument and the theory of fractional coboundaries of Derriennic and Lin \cite{DL}, under some conditions which require the variance of the quenched mean has a subdiffusive bound. The results partially fill the gaps between l…
▽ More
In this paper, we consider random walk in random environment on $\mathbb{Z}^{d}\,(d\geq1)$ and prove the Strassen's strong invariance principle for this model, via martingale argument and the theory of fractional coboundaries of Derriennic and Lin \cite{DL}, under some conditions which require the variance of the quenched mean has a subdiffusive bound. The results partially fill the gaps between law of large numbers and central limit theorems.
△ Less
Submitted 17 April, 2010;
originally announced April 2010.
-
Central limit theorem and almost sure central limit theorem for the product of some partial sums
Authors:
Yu Miao
Abstract:
In this paper, we give the central limit theorem and almost sure central limit theorem for products of some partial sums of independent identically distributed random variables.
In this paper, we give the central limit theorem and almost sure central limit theorem for products of some partial sums of independent identically distributed random variables.
△ Less
Submitted 31 July, 2007;
originally announced July 2007.
-
A note for extension of almost sure central limit theory
Authors:
Yu Miao,
Guangyu Yang
Abstract:
Hörmann (2006) gave an extension of almost sure central limit theorem for bounded Lipschitz 1 function. In this paper, we show that his result of almost sure central limit theorem is also hold for any Lipschitz function under stronger conditions.
Hörmann (2006) gave an extension of almost sure central limit theorem for bounded Lipschitz 1 function. In this paper, we show that his result of almost sure central limit theorem is also hold for any Lipschitz function under stronger conditions.
△ Less
Submitted 5 January, 2007;
originally announced January 2007.
-
The law of the iterated logarithm for additive functionals of Markov chains
Authors:
Yu Miao,
Guangyu Yang
Abstract:
In the paper, the law of the iterated logarithm for additive functionals of Markov chains is obtained under some weak conditions, which are weaker than the conditions of invariance principle of additive functionals of Markov chains in M. Maxwell and M. Woodroofe (2000). The main technique is the martingale argument and the theory of fractional coboundaries.
In the paper, the law of the iterated logarithm for additive functionals of Markov chains is obtained under some weak conditions, which are weaker than the conditions of invariance principle of additive functionals of Markov chains in M. Maxwell and M. Woodroofe (2000). The main technique is the martingale argument and the theory of fractional coboundaries.
△ Less
Submitted 22 February, 2007; v1 submitted 5 January, 2007;
originally announced January 2007.
-
The Central Limit Theorem for LS Estimator in Simple Linear Ev Regression Models
Authors:
Yu Miao,
Guangyu Yang,
Luming Shen
Abstract:
In this paper, we obtain the central limit theorems for LS estimator in simple linear errors-in-variables (EV) regression models under some mild conditions. And we also show that those conditions are necessary in some sense.
In this paper, we obtain the central limit theorems for LS estimator in simple linear errors-in-variables (EV) regression models under some mild conditions. And we also show that those conditions are necessary in some sense.
△ Less
Submitted 5 January, 2007;
originally announced January 2007.
-
An invariance principle for the law of the iterated logarithm for additive functionals of Markov chains
Authors:
Guangyu Yang,
Yu Miao
Abstract:
In this paper, we prove Strassen's strong invariance principle for a vector-valued additive functionals of a Markov chain via the martingale argument and the theory of fractional coboundaries. The hypothesis is a moment bound on the resolvent.
In this paper, we prove Strassen's strong invariance principle for a vector-valued additive functionals of a Markov chain via the martingale argument and the theory of fractional coboundaries. The hypothesis is a moment bound on the resolvent.
△ Less
Submitted 27 February, 2007; v1 submitted 21 September, 2006;
originally announced September 2006.