Skip to main content

Showing 1–35 of 35 results for author: Miao, Y

Searching in archive math. Search in all archives.
.
  1. arXiv:2406.00588  [pdf, other

    cs.LG cs.CR math.ST

    Generalization Bound and New Algorithm for Clean-Label Backdoor Attack

    Authors: Lijia Yu, Shuang Liu, Yibo Miao, Xiao-Shan Gao, Lijun Zhang

    Abstract: The generalization bound is a crucial theoretical tool for assessing the generalizability of learning methods and there exist vast literatures on generalizability of normal learning, adversarial learning, and data poisoning. Unlike other data poison attacks, the backdoor attack has the special property that the poisoned triggers are contained in both the training set and the test set and the purpo… ▽ More

    Submitted 1 June, 2024; originally announced June 2024.

  2. arXiv:2404.10802  [pdf, ps, other

    math.PR

    Cramer's moderate deviations of modularity in network

    Authors: Yu Miao, Qing Yin

    Abstract: Complex networks play a crucial role in understanding physical, biological, social and technological systems. One of the most relevant features of graphs representing real systems is community structure. In this paper, for a specific partition of a given network, we prove the Cramer's moderate deviations of modularity for the partition when the size of the network gets large.

    Submitted 16 April, 2024; originally announced April 2024.

    Comments: arXiv admin note: text overlap with arXiv:2404.10325

    MSC Class: 05C82; 60F05

  3. arXiv:2404.10325  [pdf, ps, other

    math.PR

    Berry-Esseen bound of modularity in network

    Authors: Yu Miao, Qing Yin

    Abstract: In this paper, the model is a specific partition of a given network. Berry-Esseen bound and strong law of large numbers of modularity for the partition are proved when the size of the network gets large.

    Submitted 16 April, 2024; originally announced April 2024.

    MSC Class: 05C82; 60F05

  4. arXiv:2402.06146  [pdf, ps, other

    math.PR

    Well-posedness and propagation of chaos for jump-type McKean-Vlasov SDEs with irregular coefficients

    Authors: Zhen Wang, Jie Ren, Yu Miao

    Abstract: In this paper, we study the existence and pathwise uniqueness of strong solutions for jump-type McKean-Vlasov SDEs with irregular coefficients but uniform linear growth assumption. Moreover, the propagation of chaos and the convergence rate for Euler's scheme of jump-type McKean-Vlasov SDEs are also obtained by taking advantage of Yamada-Watanabe's approximation approach and stop** time.

    Submitted 8 February, 2024; originally announced February 2024.

  5. arXiv:2401.09118  [pdf, other

    math.NA

    Learning based numerical methods for Helmholtz equation with high frequency

    Authors: Yu Chen, ** Cheng, Tingyue Li, Yun Miao

    Abstract: High-frequency issues have been remarkably challenges in numerical methods for partial differential equations. In this paper, a learning based numerical method (LbNM) is proposed for Helmholtz equation with high frequency. The main novelty is using Tikhonov regularization method to stably learn the solution operator by utilizing relevant information especially the fundamental solutions. Then apply… ▽ More

    Submitted 17 January, 2024; originally announced January 2024.

  6. arXiv:2306.04240  [pdf, other

    cs.CV math.NA

    T-ADAF: Adaptive Data Augmentation Framework for Image Classification Network based on Tensor T-product Operator

    Authors: Feiyang Han, Yun Miao, Zhaoyi Sun, Yimin Wei

    Abstract: Image classification is one of the most fundamental tasks in Computer Vision. In practical applications, the datasets are usually not as abundant as those in the laboratory and simulation, which is always called as Data Hungry. How to extract the information of data more completely and effectively is very important. Therefore, an Adaptive Data Augmentation Framework based on the tensor T-product O… ▽ More

    Submitted 7 June, 2023; originally announced June 2023.

  7. arXiv:2304.08741  [pdf, ps, other

    math.CO

    Ideal Secret Sharing Schemes: Combinatorial Characterizations, Certain Access Structures, and Related Geometric Problems

    Authors: Ryoh Fuji-Hara, Ying Miao

    Abstract: An ideal secret sharing scheme is a method of sharing a secret key in some key space among a finite set of participants in such a way that only the authorized subsets of participants can reconstruct the secret key from their shares which are of the same length as that of the secret key. The set of all authorized subsets of participants is the access structure of the secret sharing scheme. In this… ▽ More

    Submitted 18 April, 2023; originally announced April 2023.

    Comments: This paper was published in 2009 in the "Journal of Statistics and Applications Vol 4, No. 2-3", which is now inaccessible and has been removed from MathSciNet. I have decided to upload the paper here for those who wish to refer to it

  8. arXiv:2302.02414  [pdf, ps, other

    cs.IT cs.CR cs.DM math.CO

    Secure Codes with List Decoding

    Authors: Yujie Gu, Ilya Vorobyev, Ying Miao

    Abstract: In this paper we consider combinatorial secure codes in traitor tracing for protecting copyright of multimedia content. First, we introduce a new notion of secure codes with list decoding (SCLDs) for collusion-resistant multimedia fingerprinting, which includes many existing types of fingerprinting codes as special cases. Next, we build efficient identifying algorithms for SCLDs with complete trac… ▽ More

    Submitted 5 February, 2023; originally announced February 2023.

    Comments: 20 pages

  9. arXiv:2207.03545  [pdf, ps, other

    math.PR

    A new type of results on probabilities of moderate deviations for i.i.d. random variables

    Authors: Deli Li, Yu Miao, Yongcheng Qi

    Abstract: Let $\{X, X_{n}; n \geq 1\}$ be a sequence of i.i.d. non-degenerate real-valued random variables with $\mathbb{E}X^{2} < \infty$. Let $S_{n} = \sum_{i=1}^{n} X_{i}$, $n \geq 1$. Let $g(\cdot): ~[0, \infty) \rightarrow [0, \infty)$ be a nondecreasing regularly varying function with index $ρ\geq 0$ and $\lim_{t \rightarrow \infty} g(t) = \infty$. Let $μ= \mathbb{E}X$ and… ▽ More

    Submitted 7 July, 2022; originally announced July 2022.

    MSC Class: Primary: 60F10; Secondary 60B12; 60F05; 60G50

  10. arXiv:2206.15142  [pdf, other

    math-ph cond-mat.stat-mech hep-th math.QA quant-ph

    The Floquet Baxterisation

    Authors: Yuan Miao, Vladimir Gritsev, Denis V. Kurlov

    Abstract: Quantum integrability has proven to be a useful tool to study quantum many-body systems out of equilibrium. In this paper we construct a generic framework for integrable quantum circuits through the procedure of Floquet Baxterisation. The integrability is guaranteed by establishing a connection between Floquet evolution operators and inhomogeneous transfer matrices obtained from the Yang-Baxter re… ▽ More

    Submitted 8 January, 2024; v1 submitted 30 June, 2022; originally announced June 2022.

    Comments: 45 pages, 16 figures

    Journal ref: SciPost Phys. 16, 078 (2024)

  11. arXiv:2203.11749  [pdf, ps, other

    math.AP math-ph

    Global existence and blow-up for a stochastic transport equation with non-local velocity

    Authors: Diego Alonso-Orán, Yingting Miao, Hao Tang

    Abstract: In this paper we investigate a non-linear and non-local one dimensional transport equation under random perturbations on the real line. We first establish a local-in-time theory, i.e., existence, uniqueness and blow-up criterion for pathwise solutions in Sobolev spaces $H^{s}$ with $s>3$. Thereafter, we give a complete picture of the long time behavior of the solutions based on the type of noise w… ▽ More

    Submitted 22 March, 2022; originally announced March 2022.

    Comments: 32 pages

  12. arXiv:2202.10280  [pdf, ps, other

    cs.IT cs.CR math.CO

    On the Information-theoretic Security of Combinatorial All-or-nothing Transforms

    Authors: Yujie Gu, Sonata Akao, Navid Nasr Esfahani, Ying Miao, Kouichi Sakurai

    Abstract: All-or-nothing transforms (AONT) were proposed by Rivest as a message preprocessing technique for encrypting data to protect against brute-force attacks, and have numerous applications in cryptography and information security. Later the unconditionally secure AONT and their combinatorial characterization were introduced by Stinson. Informally, a combinatorial AONT is an array with the unbiased req… ▽ More

    Submitted 21 February, 2022; originally announced February 2022.

    Comments: 16 pages

  13. arXiv:2202.08422  [pdf, ps, other

    math.PR

    Euler's scheme of Mckean-Vlasov SDEs with non-Lipschitz coefficients

    Authors: Zhen Wang, Jie Ren, Yu Miao

    Abstract: In this paper, we show the strong well-posedness of Mckean-Vlasov SDEs with non-Lipschitz coefficients. Moreover, propagation of chaos and the convergence rate for Euler's scheme of Mckean-Vlasov SDEs are also obtained.

    Submitted 16 February, 2022; originally announced February 2022.

  14. Well-posedness for a stochastic Camassa-Holm type equation with higher order nonlinearities

    Authors: Yingting Miao, Christian Rohde, Hao Tang

    Abstract: This paper aims at studying a generalized Camassa--Holm equation under random perturbation. We establish a local well-posedness result in the sense of Hadamard, i.e., existence, uniqueness and continuous dependence on initial data, as well as blow-up criteria for pathwise solutions in the Sobolev spaces $H^s$ with $s>3/2$ for $x\in\mathbb{R}$. The analysis on continuous dependence on initial data… ▽ More

    Submitted 31 March, 2023; v1 submitted 18 May, 2021; originally announced May 2021.

    MSC Class: Primary: 60H15; 35Q51. Secondary: 35A01; 35B30

    Journal ref: Stochastics and Partial Differential Equations: Analysis and Computations, 2023

  15. arXiv:2010.02518  [pdf, ps, other

    math.CO

    Strongly separable matrices for nonadaptive combinatorial group testing

    Authors: **** Fan, Hung-Lin Fu, Yujie Gu, Ying Miao, Maiko Shigeno

    Abstract: In nonadaptive combinatorial group testing (CGT), it is desirable to identify a small set of up to $d$ defectives from a large population of $n$ items with as few tests (i.e. large rate) and efficient identifying algorithm as possible. In the literature, $d$-disjunct matrices ($d$-DM) and $\bar{d}$-separable matrices ($\bar{d}$-SM) are two classical combinatorial structures having been studied for… ▽ More

    Submitted 6 October, 2020; v1 submitted 6 October, 2020; originally announced October 2020.

  16. arXiv:2009.12791  [pdf, ps, other

    math.PR

    Euler-Maruyama scheme for SDEs with Dini continuous coefficients

    Authors: Zhen Wang, Yu Miao, RenJie

    Abstract: In this paper, we show the convergence rate of Euler-Maruyama scheme for non-degenerate SDEs with Dini continuous coefficients, by the aid of the regularity of the solution to the associated Kolmogorov equation. We obtain the same conclusions using a simple and clever way to simplify the proof and weaken the conditions in \cite{BHY} by the properties of Dini continuous and Taylor expansion.

    Submitted 16 February, 2022; v1 submitted 27 September, 2020; originally announced September 2020.

  17. arXiv:2008.11021  [pdf, ps, other

    math.PR

    Limiting Spectral Radii of Circular Unitary Matrices under Light Truncation

    Authors: Yu Miao, Yongcheng Qi

    Abstract: Consider a truncated circular unitary matrix which is a $p_n$ by $p_n$ submatrix of an $n$ by $n$ circular unitary matrix after deleting the last $n-p_n$ columns and rows. Jiang and Qi \cite{JiangQi2017} and Gui and Qi \cite{GQ2018} study the limiting distributions of the maximum absolute value of the eigenvalues (known as spectral radius) of the truncated matrix. Some limiting distributions for t… ▽ More

    Submitted 23 August, 2020; originally announced August 2020.

    Comments: arXiv admin note: text overlap with arXiv:1709.05441

  18. arXiv:2007.05150  [pdf, ps, other

    math.PR

    A supplement to the laws of large numbers and the large deviations

    Authors: Deli Li, Yu Miao

    Abstract: Let $0 < p < 2$. Let $\{X, X_{n}; n \geq 1\}$ be a sequence of independent and identically distributed $\mathbf{B}$-valued random variables and set $S_{n} = \sum_{i=1}^{n}X_{i},~n \geq 1$. In this paper, a supplement to the classical laws of large numbers and the classical large deviations is provided. We show that if $S_{n}/n^{1/p} \rightarrow_{\mathbb{P}} 0$, then, for all $s > 0$, \[ \limsup_{n… ▽ More

    Submitted 9 July, 2020; originally announced July 2020.

    Comments: 19 pages

  19. arXiv:2002.03724  [pdf, ps, other

    math.CO

    Algebraic Manipulation Detection Codes via Highly Nonlinear Functions

    Authors: Minfeng Shao, Ying Miao

    Abstract: In this paper, we study the relationship between algebraic manipulation detection (AMD) codes and highly nonlinear functions. As applications, on one hand, a generic construction for systematic AMD codes is introduced based on highly nonlinear functions. Systematic AMD codes with new parameters can be generated from known highly nonlinear functions. Especially, several infinite classes of optimal… ▽ More

    Submitted 10 February, 2020; originally announced February 2020.

  20. arXiv:1906.01031  [pdf, other

    cs.IT cs.DM math.CO

    Probabilistic Existence Results for Parent-Identifying Schemes

    Authors: Yujie Gu, Minquan Cheng, Grigory Kabatiansky, Ying Miao

    Abstract: Parent-identifying schemes provide a way to identify causes from effects for some information systems such as digital fingerprinting and group testing. In this paper, we consider combinatorial structures for parent-identifying schemes. First, we establish an equivalent relationship between parent-identifying schemes and forbidden configurations. Based on this relationship, we derive probabilistic… ▽ More

    Submitted 3 June, 2019; originally announced June 2019.

    Comments: 14 pages

  21. arXiv:1905.01412  [pdf, ps, other

    math.CO cs.CR cs.IT

    On optimal weak algebraic manipulation detection codes and weighted external difference families

    Authors: Minfeng Shao, Ying Miao

    Abstract: This paper provides a combinatorial characterization of weak algebraic manipulation detection (AMD) codes via a kind of generalized external difference families called bounded standard weighted external difference families (BSWEDFs). By means of this characterization, we improve a known lower bound on the maximum probability of successful tampering for the adversary's all possible strategies in we… ▽ More

    Submitted 13 June, 2019; v1 submitted 3 May, 2019; originally announced May 2019.

  22. arXiv:1902.07024  [pdf, other

    math.NA

    T-Jordan Canonical Form and T-Drazin Inverse based on the T-Product

    Authors: Yun Miao, Liqun Qi, Yimin Wei

    Abstract: In this paper, we introduce the tensor similar transforation and propose the T-Jordan canonical form and its properties. The concept of T-minimal polynomial and T-characteristic polynomial are raised. As a special case, we present properties when two tensors commutes via the tensor T-product. The Cayley-Hamilton theorem also holds for tensor cases. Then we focus on the tensor decomposition theory.… ▽ More

    Submitted 21 October, 2019; v1 submitted 19 February, 2019; originally announced February 2019.

    Comments: 28 pages. arXiv admin note: text overlap with arXiv:1901.04255

    MSC Class: 15A48; 15A69; 65F10; 65H10; 65N22

  23. arXiv:1901.04255  [pdf, other

    math.NA

    Generalized Tensor Function via the Tensor Singular Value Decomposition based on the T-Product

    Authors: Yun Miao, Liqun Qi, Yimin Wei

    Abstract: In this paper, we present the definition of generalized tensor function according to the tensor singular value decomposition (T-SVD) via the tensor T-product. Also, we introduce the compact singular value decomposition (T-CSVD) of tensors via the T-product, from which the projection operators and Moore Penrose inverse of tensors are also obtained. We also establish the Cauchy integral formula for… ▽ More

    Submitted 15 October, 2019; v1 submitted 14 January, 2019; originally announced January 2019.

    Comments: 39 pages

    MSC Class: 15A48; 15A69; 65F10; 65H10; 65N22

  24. arXiv:1808.01882  [pdf, ps, other

    math.DG

    M-eigenvalues of Riemann Curvature Tensor of Conformally Flat Manifolds

    Authors: Yun Miao, Liqun Qi, Yimin Wei

    Abstract: We generalized Xiang, Qi and Wei's results on the M-eigenvalues of Riemann curvature tensor to higher dimensional conformal flat manifolds. The expression of M-eigenvalues and M-eigenvectors are found in our paper. As a special case, M-eigenvalues of conformal flat Einstein manifold have also been discussed, and the conformal the invariance of M-eigentriple has been found. We also discussed the re… ▽ More

    Submitted 28 July, 2018; originally announced August 2018.

  25. arXiv:1411.5782  [pdf, ps, other

    cs.IT math.CO

    New Bounds For Frameproof Codes

    Authors: Chong Shangguan, Xin Wang, Gennian Ge, Ying Miao

    Abstract: Frameproof codes are used to fingerprint digital data. It can prevent copyrighted materials from unauthorized use. In this paper, we study upper and lower bounds for $w$-frameproof codes of length $N$ over an alphabet of size $q$. The upper bound is based on a combinatorial approach and the lower bound is based on a probabilistic construction. Both bounds can improve previous results when $q$ is s… ▽ More

    Submitted 21 November, 2014; originally announced November 2014.

    Comments: 7 pages, submitted to IEEE Transactions on Information Theory

  26. arXiv:1302.0457  [pdf, other

    math.CO

    Spectra of the subdivision-vertex and subdivision-edge coronae

    Authors: Pengli Lu, Yufang Miao

    Abstract: The subdivision graph $\mathcal{S}(G)$ of a graph $G$ is the graph obtained by inserting a new vertex into every edge of $G$. Let $G_1$ and $G_2$ be two vertex disjoint graphs. The \emph{subdivision-vertex corona} of $G_1$ and $G_2$, denoted by $G_1\odot G_2$, is the graph obtained from $\mathcal{S}(G_1)$ and $|V(G_1)|$ copies of $G_2$, all vertex-disjoint, by joining the $i$th vertex of $V(G_1)$… ▽ More

    Submitted 27 July, 2013; v1 submitted 3 February, 2013; originally announced February 2013.

    Comments: 15 pages, 3 figure. arXiv admin note: text overlap with arXiv:1212.0851, arXiv:1212.0619; and with 1209.5906 by other authors

  27. arXiv:1207.4031  [pdf, ps, other

    math.PR

    Moderate deviations principle for empirical covariance from a unit root

    Authors: Yu Miao, Yanling Wang, Guangyu Yang

    Abstract: In the present paper, we consider the linear autoregressive model in $\rr$, $$ X_{k,n}=θ_n X_{k,n-1}+ξ_k, k=0,1,...,n, n\ge 1$$ where $θ_n\in [0,1)$ is unknown, $(ξ_k)_{k\in\zz}$ is a sequence of centered i.i.d. r.v. valued in $\rr$ representing the noise. When $θ_n\to 1$, the moderate deviations principle for empirical covariance is discussed and as statistical applications we provide the moder… ▽ More

    Submitted 17 July, 2012; originally announced July 2012.

    Comments: 33 pages

    MSC Class: 60F10; 60G10; 62J05

  28. arXiv:1110.0189  [pdf, ps, other

    math.CO

    Eulerian pairs on Fibonacci words

    Authors: Teresa X. S. Li, Charles B. Mei, Melissa Y. F. Miao

    Abstract: Recently, Sagan and Savage introduced the notion of Eulerian pairs. In this note, we find Eulerian pairs on Fibonacci words based on Foata's first transformation or Han's bijection and a map in the spirit of a bijection of Steingrímsson.

    Submitted 28 March, 2013; v1 submitted 2 October, 2011; originally announced October 2011.

    Comments: 8 pages

    MSC Class: 05A05; 05A19

  29. arXiv:1108.3525  [pdf, ps, other

    cs.CV math.DS

    Hamiltonian Streamline Guided Feature Extraction with Applications to Face Detection

    Authors: Yingjie Miao, Jason J. Corso

    Abstract: We propose a new feature extraction method based on two dynamical systems induced by intensity landscape: the negative gradient system and the Hamiltonian system. We build features based on the Hamiltonian streamlines. These features contain nice global topological information about the intensity landscape, and can be used for object detection. We show that for training images of same size, our fe… ▽ More

    Submitted 17 August, 2011; originally announced August 2011.

  30. arXiv:1004.2994  [pdf, ps, other

    math.PR

    Strassen's invariance principle for random walk in random environment

    Authors: Guangyu Yang, Yu Miao, Dihe Hu

    Abstract: In this paper, we consider random walk in random environment on $\mathbb{Z}^{d}\,(d\geq1)$ and prove the Strassen's strong invariance principle for this model, via martingale argument and the theory of fractional coboundaries of Derriennic and Lin \cite{DL}, under some conditions which require the variance of the quenched mean has a subdiffusive bound. The results partially fill the gaps between l… ▽ More

    Submitted 17 April, 2010; originally announced April 2010.

    Comments: 16 pages

    MSC Class: 60B10; 60B15

  31. arXiv:0707.4549  [pdf, ps, other

    math.PR

    Central limit theorem and almost sure central limit theorem for the product of some partial sums

    Authors: Yu Miao

    Abstract: In this paper, we give the central limit theorem and almost sure central limit theorem for products of some partial sums of independent identically distributed random variables.

    Submitted 31 July, 2007; originally announced July 2007.

    Comments: 6 pages. To appear Proceedings of the Indian Academy of Sciences-Mathematical Sciences

    MSC Class: 60F05; 60F15

  32. arXiv:math/0701183  [pdf, ps, other

    math.PR

    A note for extension of almost sure central limit theory

    Authors: Yu Miao, Guangyu Yang

    Abstract: Hörmann (2006) gave an extension of almost sure central limit theorem for bounded Lipschitz 1 function. In this paper, we show that his result of almost sure central limit theorem is also hold for any Lipschitz function under stronger conditions.

    Submitted 5 January, 2007; originally announced January 2007.

    Comments: 8 pages

    MSC Class: 60F05

  33. arXiv:math/0701167  [pdf, ps, other

    math.PR

    The law of the iterated logarithm for additive functionals of Markov chains

    Authors: Yu Miao, Guangyu Yang

    Abstract: In the paper, the law of the iterated logarithm for additive functionals of Markov chains is obtained under some weak conditions, which are weaker than the conditions of invariance principle of additive functionals of Markov chains in M. Maxwell and M. Woodroofe (2000). The main technique is the martingale argument and the theory of fractional coboundaries.

    Submitted 22 February, 2007; v1 submitted 5 January, 2007; originally announced January 2007.

    Comments: 7 pages

    MSC Class: 60F05

  34. arXiv:math/0701162  [pdf, ps, other

    math.PR

    The Central Limit Theorem for LS Estimator in Simple Linear Ev Regression Models

    Authors: Yu Miao, Guangyu Yang, Luming Shen

    Abstract: In this paper, we obtain the central limit theorems for LS estimator in simple linear errors-in-variables (EV) regression models under some mild conditions. And we also show that those conditions are necessary in some sense.

    Submitted 5 January, 2007; originally announced January 2007.

    Comments: 12 pages

    MSC Class: Primary 62F12; Secondary 60F05

  35. arXiv:math/0609593  [pdf, ps, other

    math.PR

    An invariance principle for the law of the iterated logarithm for additive functionals of Markov chains

    Authors: Guangyu Yang, Yu Miao

    Abstract: In this paper, we prove Strassen's strong invariance principle for a vector-valued additive functionals of a Markov chain via the martingale argument and the theory of fractional coboundaries. The hypothesis is a moment bound on the resolvent.

    Submitted 27 February, 2007; v1 submitted 21 September, 2006; originally announced September 2006.

    Comments: 9 pages

    MSC Class: 60F17; 60J10; 60J55