-
Features Reconstruction Disentanglement Cloth-Changing Person Re-Identification
Authors:
Zhihao Chen,
Yiyuan Ge,
Qing Yue
Abstract:
Cloth-changing person re-identification (CC-ReID) aims to retrieve specific pedestrians in a cloth-changing scenario. Its main challenge is to disentangle the clothing-related and clothing-unrelated features. Most existing approaches force the model to learn clothing-unrelated features by changing the color of the clothes. However, due to the lack of ground truth, these methods inevitably introduc…
▽ More
Cloth-changing person re-identification (CC-ReID) aims to retrieve specific pedestrians in a cloth-changing scenario. Its main challenge is to disentangle the clothing-related and clothing-unrelated features. Most existing approaches force the model to learn clothing-unrelated features by changing the color of the clothes. However, due to the lack of ground truth, these methods inevitably introduce noise, which destroys the discriminative features and leads to an uncontrollable disentanglement process. In this paper, we propose a new person re-identification network called features reconstruction disentanglement ReID (FRD-ReID), which can controllably decouple the clothing-unrelated and clothing-related features. Specifically, we first introduce the human parsing mask as the ground truth of the reconstruction process. At the same time, we propose the far away attention (FAA) mechanism and the person contour attention (PCA) mechanism for clothing-unrelated features and pedestrian contour features to improve the feature reconstruction efficiency. In the testing phase, we directly discard the clothing-related features for inference,which leads to a controllable disentanglement process. We conducted extensive experiments on the PRCC, LTCC, and Vc-Clothes datasets and demonstrated that our method outperforms existing state-of-the-art methods.
△ Less
Submitted 15 July, 2024;
originally announced July 2024.
-
Generator polynomials of cyclic expurgated or extended Goppa codes
Authors:
Xue Jia,
Fengwei Li,
Huan Sun,
Qin Yue
Abstract:
Classical Goppa codes are a well-known class of codes with applications in code-based cryptography, which are a special case of alternant codes. Many papers are devoted to the search for Goppa codes with a cyclic extension or with a cyclic parity-check subcode. Let $\Bbb F_q$ be a finite field with $q=2^l$ elements, where $l$ is a positive integer. In this paper, we determine all the generator pol…
▽ More
Classical Goppa codes are a well-known class of codes with applications in code-based cryptography, which are a special case of alternant codes. Many papers are devoted to the search for Goppa codes with a cyclic extension or with a cyclic parity-check subcode. Let $\Bbb F_q$ be a finite field with $q=2^l$ elements, where $l$ is a positive integer. In this paper, we determine all the generator polynomials of cyclic expurgated or extended Goppa codes under some prescribed permutations induced by the projective general linear automorphism $A \in PGL_2(\Bbb F_q)$. Moreover, we provide some examples to support our findings.
△ Less
Submitted 28 May, 2024;
originally announced May 2024.
-
FPL+: Filtered Pseudo Label-based Unsupervised Cross-Modality Adaptation for 3D Medical Image Segmentation
Authors:
Jianghao Wu,
Dong Guo,
Guotai Wang,
Qiang Yue,
Huijun Yu,
Kang Li,
Shaoting Zhang
Abstract:
Adapting a medical image segmentation model to a new domain is important for improving its cross-domain transferability, and due to the expensive annotation process, Unsupervised Domain Adaptation (UDA) is appealing where only unlabeled images are needed for the adaptation. Existing UDA methods are mainly based on image or feature alignment with adversarial training for regularization, and they ar…
▽ More
Adapting a medical image segmentation model to a new domain is important for improving its cross-domain transferability, and due to the expensive annotation process, Unsupervised Domain Adaptation (UDA) is appealing where only unlabeled images are needed for the adaptation. Existing UDA methods are mainly based on image or feature alignment with adversarial training for regularization, and they are limited by insufficient supervision in the target domain. In this paper, we propose an enhanced Filtered Pseudo Label (FPL+)-based UDA method for 3D medical image segmentation. It first uses cross-domain data augmentation to translate labeled images in the source domain to a dual-domain training set consisting of a pseudo source-domain set and a pseudo target-domain set. To leverage the dual-domain augmented images to train a pseudo label generator, domain-specific batch normalization layers are used to deal with the domain shift while learning the domain-invariant structure features, generating high-quality pseudo labels for target-domain images. We then combine labeled source-domain images and target-domain images with pseudo labels to train a final segmentor, where image-level weighting based on uncertainty estimation and pixel-level weighting based on dual-domain consensus are proposed to mitigate the adverse effect of noisy pseudo labels. Experiments on three public multi-modal datasets for Vestibular Schwannoma, brain tumor and whole heart segmentation show that our method surpassed ten state-of-the-art UDA methods, and it even achieved better results than fully supervised learning in the target domain in some cases.
△ Less
Submitted 7 April, 2024;
originally announced April 2024.
-
Determining hulls of generalized Reed-Solomon codes from algebraic geometry codes
Authors:
Xue Jia,
Qin Yue,
Huan Sun,
Junzhen Sui
Abstract:
In this paper, we provide conditions that hulls of generalized Reed-Solomon (GRS) codes are also GRS codes from algebraic geometry codes. If the conditions are not satisfied, we provide a method of linear algebra to find the bases of hulls of GRS codes and give formulas to compute their dimensions. Besides, we explain that the conditions are too good to be improved by some examples. Moreover, we s…
▽ More
In this paper, we provide conditions that hulls of generalized Reed-Solomon (GRS) codes are also GRS codes from algebraic geometry codes. If the conditions are not satisfied, we provide a method of linear algebra to find the bases of hulls of GRS codes and give formulas to compute their dimensions. Besides, we explain that the conditions are too good to be improved by some examples. Moreover, we show self-orthogonal and self-dual GRS codes.
△ Less
Submitted 24 January, 2024;
originally announced January 2024.
-
Routing-Guided Learned Product Quantization for Graph-Based Approximate Nearest Neighbor Search
Authors:
Qiang Yue,
Xiaoliang Xu,
Yuxiang Wang,
Yikun Tao,
Xuliyuan Luo
Abstract:
Given a vector dataset $\mathcal{X}$, a query vector $\vec{x}_q$, graph-based Approximate Nearest Neighbor Search (ANNS) aims to build a proximity graph (PG) as an index of $\mathcal{X}$ and approximately return vectors with minimum distances to $\vec{x}_q$ by searching over the PG index. It suffers from the large-scale $\mathcal{X}$ because a PG with full vectors is too large to fit into the memo…
▽ More
Given a vector dataset $\mathcal{X}$, a query vector $\vec{x}_q$, graph-based Approximate Nearest Neighbor Search (ANNS) aims to build a proximity graph (PG) as an index of $\mathcal{X}$ and approximately return vectors with minimum distances to $\vec{x}_q$ by searching over the PG index. It suffers from the large-scale $\mathcal{X}$ because a PG with full vectors is too large to fit into the memory, e.g., a billion-scale $\mathcal{X}$ in 128 dimensions would consume nearly 600 GB memory. To solve this, Product Quantization (PQ) integrated graph-based ANNS is proposed to reduce the memory usage, using smaller compact codes of quantized vectors in memory instead of the large original vectors. Existing PQ methods do not consider the important routing features of PG, resulting in low-quality quantized vectors that affect the ANNS's effectiveness. In this paper, we present an end-to-end Routing-guided learned Product Quantization (RPQ) for graph-based ANNS. It consists of (1) a \textit{differentiable quantizer} used to make the standard discrete PQ differentiable to suit for back-propagation of end-to-end learning, (2) a \textit{sampling-based feature extractor} used to extract neighborhood and routing features of a PG, and (3) a \textit{multi-feature joint training module} with two types of feature-aware losses to continuously optimize the differentiable quantizer. As a result, the inherent features of a PG would be embedded into the learned PQ, generating high-quality quantized vectors. Moreover, we integrate our RPQ with the state-of-the-art DiskANN and existing popular PGs to improve their performance. Comprehensive experiments on real-world large-scale datasets (from 1M to 1B) demonstrate RPQ's superiority, e.g., 1.7$\times$-4.2$\times$ improvement on QPS at the same recall@10 of 95\%.
△ Less
Submitted 30 November, 2023;
originally announced November 2023.
-
Using Unsupervised and Supervised Learning and Digital Twin for Deep Convective Ice Storm Classification
Authors:
Jason Swope,
Steve Chien,
Emily Dunkel,
Xavier Bosch-Lluis,
Qing Yue,
William Deal
Abstract:
Smart Ice Cloud Sensing (SMICES) is a small-sat concept in which a primary radar intelligently targets ice storms based on information collected by a lookahead radiometer. Critical to the intelligent targeting is accurate identification of storm/cloud types from eight bands of radiance collected by the radiometer. The cloud types of interest are: clear sky, thin cirrus, cirrus, rainy anvil, and co…
▽ More
Smart Ice Cloud Sensing (SMICES) is a small-sat concept in which a primary radar intelligently targets ice storms based on information collected by a lookahead radiometer. Critical to the intelligent targeting is accurate identification of storm/cloud types from eight bands of radiance collected by the radiometer. The cloud types of interest are: clear sky, thin cirrus, cirrus, rainy anvil, and convection core.
We describe multi-step use of Machine Learning and Digital Twin of the Earth's atmosphere to derive such a classifier. First, a digital twin of Earth's atmosphere called a Weather Research Forecast (WRF) is used generate simulated lookahead radiometer data as well as deeper "science" hidden variables. The datasets simulate a tropical region over the Caribbean and a non-tropical region over the Atlantic coast of the United States. A K-means clustering over the scientific hidden variables was utilized by human experts to generate an automatic labelling of the data - mapping each physical data point to cloud types by scientists informed by mean/centroids of hidden variables of the clusters. Next, classifiers were trained with the inputs of the simulated radiometer data and its corresponding label. The classifiers of a random decision forest (RDF), support vector machine (SVM), Gaussian naïve bayes, feed forward artificial neural network (ANN), and a convolutional neural network (CNN) were trained. Over the tropical dataset, the best performing classifier was able to identify non-storm and storm clouds with over 80% accuracy in each class for a held-out test set. Over the non-tropical dataset, the best performing classifier was able to classify non-storm clouds with over 90% accuracy and storm clouds with over 40% accuracy. Additionally both sets of classifiers were shown to be resilient to instrument noise.
△ Less
Submitted 12 September, 2023;
originally announced September 2023.
-
PA-Seg: Learning from Point Annotations for 3D Medical Image Segmentation using Contextual Regularization and Cross Knowledge Distillation
Authors:
Shuwei Zhai,
Guotai Wang,
Xiangde Luo,
Qiang Yue,
Kang Li,
Shaoting Zhang
Abstract:
The success of Convolutional Neural Networks (CNNs) in 3D medical image segmentation relies on massive fully annotated 3D volumes for training that are time-consuming and labor-intensive to acquire. In this paper, we propose to annotate a segmentation target with only seven points in 3D medical images, and design a two-stage weakly supervised learning framework PA-Seg. In the first stage, we emplo…
▽ More
The success of Convolutional Neural Networks (CNNs) in 3D medical image segmentation relies on massive fully annotated 3D volumes for training that are time-consuming and labor-intensive to acquire. In this paper, we propose to annotate a segmentation target with only seven points in 3D medical images, and design a two-stage weakly supervised learning framework PA-Seg. In the first stage, we employ geodesic distance transform to expand the seed points to provide more supervision signal. To further deal with unannotated image regions during training, we propose two contextual regularization strategies, i.e., multi-view Conditional Random Field (mCRF) loss and Variance Minimization (VM) loss, where the first one encourages pixels with similar features to have consistent labels, and the second one minimizes the intensity variance for the segmented foreground and background, respectively. In the second stage, we use predictions obtained by the model pre-trained in the first stage as pseudo labels. To overcome noises in the pseudo labels, we introduce a Self and Cross Monitoring (SCM) strategy, which combines self-training with Cross Knowledge Distillation (CKD) between a primary model and an auxiliary model that learn from soft labels generated by each other. Experiments on public datasets for Vestibular Schwannoma (VS) segmentation and Brain Tumor Segmentation (BraTS) demonstrated that our model trained in the first stage outperformed existing state-of-the-art weakly supervised approaches by a large margin, and after using SCM for additional training, the model's performance was close to its fully supervised counterpart on the BraTS dataset.
△ Less
Submitted 13 February, 2023; v1 submitted 11 August, 2022;
originally announced August 2022.
-
Navigable Proximity Graph-Driven Native Hybrid Queries with Structured and Unstructured Constraints
Authors:
Mengzhao Wang,
Lingwei Lv,
Xiaoliang Xu,
Yuxiang Wang,
Qiang Yue,
Jiongkang Ni
Abstract:
As research interest surges, vector similarity search is applied in multiple fields, including data mining, computer vision, and information retrieval. {Given a set of objects (e.g., a set of images) and a query object, we can easily transform each object into a feature vector and apply the vector similarity search to retrieve the most similar objects. However, the original vector similarity searc…
▽ More
As research interest surges, vector similarity search is applied in multiple fields, including data mining, computer vision, and information retrieval. {Given a set of objects (e.g., a set of images) and a query object, we can easily transform each object into a feature vector and apply the vector similarity search to retrieve the most similar objects. However, the original vector similarity search cannot well support \textit{hybrid queries}, where users not only input unstructured query constraint (i.e., the feature vector of query object) but also structured query constraint (i.e., the desired attributes of interest). Hybrid query processing aims at identifying these objects with similar feature vectors to query object and satisfying the given attribute constraints. Recent efforts have attempted to answer a hybrid query by performing attribute filtering and vector similarity search separately and then merging the results later, which limits efficiency and accuracy because they are not purpose-built for hybrid queries.} In this paper, we propose a native hybrid query (NHQ) framework based on proximity graph (PG), which provides the specialized \textit{composite index and joint pruning} modules for hybrid queries. We easily deploy existing various PGs on this framework to process hybrid queries efficiently. Moreover, we present two novel navigable PGs (NPGs) with optimized edge selection and routing strategies, which obtain better overall performance than existing PGs. After that, we deploy the proposed NPGs in NHQ to form two hybrid query methods, which significantly outperform the state-of-the-art competitors on all experimental datasets (10$\times$ faster under the same \textit{Recall}), including eight public and one in-house real-world datasets. Our code and datasets have been released at \url{https://github.com/AshenOn3/NHQ}.
△ Less
Submitted 25 March, 2022;
originally announced March 2022.
-
Extended Irreducible Binary Sextic Goppa codes
Authors:
Daitao Huang,
Qin Yue
Abstract:
Let $n (>3)$ be a prime number and $\Bbb F_{2^n}$ a finite field of $2^n$ elements. Let $L =\Bbb F_{2^n}\cup \{\infty\}$ be the support set and $g(x)$ an irreducible polynomial of degree $6$ over $\Bbb F_{2^n}$. In this paper, we obtain an upper bound on the number of extended irreducible binary Goppa codes $Γ(L, g)$ of degree $6$ and length $2^n+1$.
Let $n (>3)$ be a prime number and $\Bbb F_{2^n}$ a finite field of $2^n$ elements. Let $L =\Bbb F_{2^n}\cup \{\infty\}$ be the support set and $g(x)$ an irreducible polynomial of degree $6$ over $\Bbb F_{2^n}$. In this paper, we obtain an upper bound on the number of extended irreducible binary Goppa codes $Γ(L, g)$ of degree $6$ and length $2^n+1$.
△ Less
Submitted 27 September, 2021;
originally announced September 2021.
-
Binary irreducible quasi-cyclic parity-check subcodes of Goppa codes and extended Goppa codes
Authors:
Xia Li,
Qin Yue,
Daitao Huang
Abstract:
Goppa codes are particularly appealing for cryptographic applications. Every improvement of our knowledge of Goppa codes is of particular interest. In this paper, we present a sufficient and necessary condition for an irreducible monic polynomial $g(x)$ of degree $r$ over $\mathbb{F}_{q}$ satisfying $γg(x)=(x+d)^rg({A}(x))$, where $q=2^n$,…
▽ More
Goppa codes are particularly appealing for cryptographic applications. Every improvement of our knowledge of Goppa codes is of particular interest. In this paper, we present a sufficient and necessary condition for an irreducible monic polynomial $g(x)$ of degree $r$ over $\mathbb{F}_{q}$ satisfying $γg(x)=(x+d)^rg({A}(x))$, where $q=2^n$, $A=\left(\begin{array}{cc} a&b\\1&d\end{array}\right)\in PGL_2(\Bbb F_{q})$, $\mathrm{ord}(A)$ is a prime, $g(a)\ne 0$, and $0\ne γ\in \Bbb F_q$. And we give a complete characterization of irreducible polynomials $g(x)$ of degree $2s$ or $3s$ as above, where $s$ is a positive integer. Moreover, we construct some binary irreducible quasi-cyclic parity-check subcodes of Goppa codes and extended Goppa codes.
△ Less
Submitted 22 July, 2021;
originally announced July 2021.
-
Ternary primitive LCD BCH codes
Authors:
Xinmei Huang,
Qin Yue,
Yansheng Wu,
Xiaoping Shi
Abstract:
Absolute coset leaders were first proposed by the authors which have advantages in constructing binary LCD BCH codes. As a continue work, in this paper we focus on ternary linear codes. Firstly, we find the largest, second largest, and third largest absolute coset leaders of ternary primitive BCH codes. Secondly, we present three classes of ternary primitive BCH codes and determine their weight di…
▽ More
Absolute coset leaders were first proposed by the authors which have advantages in constructing binary LCD BCH codes. As a continue work, in this paper we focus on ternary linear codes. Firstly, we find the largest, second largest, and third largest absolute coset leaders of ternary primitive BCH codes. Secondly, we present three classes of ternary primitive BCH codes and determine their weight distributions. Finally, we obtain some LCD BCH codes and calculate some weight distributions. However, the calculation of weight distributions of two of these codes is equivalent to that of Kloosterman sums.
△ Less
Submitted 9 April, 2021;
originally announced April 2021.
-
A Comprehensive Survey and Experimental Comparison of Graph-Based Approximate Nearest Neighbor Search
Authors:
Mengzhao Wang,
Xiaoliang Xu,
Qiang Yue,
Yuxiang Wang
Abstract:
Approximate nearest neighbor search (ANNS) constitutes an important operation in a multitude of applications, including recommendation systems, information retrieval, and pattern recognition. In the past decade, graph-based ANNS algorithms have been the leading paradigm in this domain, with dozens of graph-based ANNS algorithms proposed. Such algorithms aim to provide effective, efficient solution…
▽ More
Approximate nearest neighbor search (ANNS) constitutes an important operation in a multitude of applications, including recommendation systems, information retrieval, and pattern recognition. In the past decade, graph-based ANNS algorithms have been the leading paradigm in this domain, with dozens of graph-based ANNS algorithms proposed. Such algorithms aim to provide effective, efficient solutions for retrieving the nearest neighbors for a given query. Nevertheless, these efforts focus on developing and optimizing algorithms with different approaches, so there is a real need for a comprehensive survey about the approaches' relative performance, strengths, and pitfalls. Thus here we provide a thorough comparative analysis and experimental evaluation of 13 representative graph-based ANNS algorithms via a new taxonomy and fine-grained pipeline. We compared each algorithm in a uniform test environment on eight real-world datasets and 12 synthetic datasets with varying sizes and characteristics. Our study yields novel discoveries, offerings several useful principles to improve algorithms, thus designing an optimized method that outperforms the state-of-the-art algorithms. This effort also helped us pinpoint algorithms' working portions, along with rule-of-thumb recommendations about promising research directions and suitable algorithms for practitioners in different fields.
△ Less
Submitted 10 May, 2021; v1 submitted 29 January, 2021;
originally announced January 2021.
-
Further factorization of $x^n-1$ over finite fields (II)
Authors:
Yansheng Wu,
Qin Yue
Abstract:
Let $\Bbb F_q$ be a finite field with $q$ elements. Let $n$ be a positive integer with radical $rad(n)$, namely, the product of distinct prime divisors of $n$. If the order of $q$ modulo $rad(n)$ is either 1 or a prime, then the irreducible factorization and a counting formula of irreducible factors of $x^n-1$ over $\Bbb F_q$ were obtained by Martínez, Vergara, and Oliveira (Des Codes Cryptogr 77…
▽ More
Let $\Bbb F_q$ be a finite field with $q$ elements. Let $n$ be a positive integer with radical $rad(n)$, namely, the product of distinct prime divisors of $n$. If the order of $q$ modulo $rad(n)$ is either 1 or a prime, then the irreducible factorization and a counting formula of irreducible factors of $x^n-1$ over $\Bbb F_q$ were obtained by Martínez, Vergara, and Oliveira (Des Codes Cryptogr 77 (1) : 277-286, 2015) and Wu, Yue, and Fan (Finite Fields Appl 54: 197-215, 2018). In this paper, we explicitly factorize $x^{n}-1$ into irreducible factors in $\Bbb F_q[x]$ and calculate the number of the irreducible factors when the order of $q$ modulo $rad(n)$ is a product of two primes.
△ Less
Submitted 15 December, 2020;
originally announced December 2020.
-
MDS or NMDS self-dual codes from twisted generalized Reed-Solomon codes
Authors:
Daitao Huang,
Qin Yue,
Yongfeng Niu,
Xia Li
Abstract:
Self-dual maximum distance separable codes (self-dual MDS codes) and self-dual near MDS codes are very important in coding theory and practice. Thus, it is interesting to construct self-dual MDS or self-dual near MDS codes. In this paper, we not only give check matrices of dual codes of twisted generalized Reed-Solomon codes (TGRS codes) but also present the efficient and necessary condition of se…
▽ More
Self-dual maximum distance separable codes (self-dual MDS codes) and self-dual near MDS codes are very important in coding theory and practice. Thus, it is interesting to construct self-dual MDS or self-dual near MDS codes. In this paper, we not only give check matrices of dual codes of twisted generalized Reed-Solomon codes (TGRS codes) but also present the efficient and necessary condition of self-dual TGRS codes. Moreover, we construct several classes of self-dual MDS or self-dual near MDS codes from TGRS codes.
△ Less
Submitted 14 September, 2020;
originally announced September 2020.
-
Optimal minimal Linear codes from posets
Authors:
Jong Yoon Hyun,
Hyun Kwang Kim,
Yansheng Wu,
Qin Yue
Abstract:
Recently, some infinite families of minimal and optimal binary linear codes were constructed from simplicial complexes by Hyun {\em et al.} We extend this construction method to arbitrary posets. Especially, anti-chains are corresponded to simplicial complexes.
In this paper, we present two constructions of binary linear codes from hierarchical posets of two levels. In particular, we determine t…
▽ More
Recently, some infinite families of minimal and optimal binary linear codes were constructed from simplicial complexes by Hyun {\em et al.} We extend this construction method to arbitrary posets. Especially, anti-chains are corresponded to simplicial complexes.
In this paper, we present two constructions of binary linear codes from hierarchical posets of two levels. In particular, we determine the weight distributions of binary linear codes associated with hierarchical posets with two levels. Based on these results, we also obtain some optimal and minimal binary linear codes not satisfying the condition of Ashikhmin-Barg.
△ Less
Submitted 17 August, 2020;
originally announced August 2020.
-
Self-reciprocal and self-conjugate-reciprocal irreducible factors of $x^n-λ$ and their applications
Authors:
Yansheng Wu,
Qin Yue,
Shuqin Fan
Abstract:
In this paper, we present some necessary and sufficient conditions under which an irreducible polynomial is self-reciprocal (SR) or self-conjugate-reciprocal (SCR). By these characterizations, we obtain some enumeration formulas of SR and SCR irreducible factors of $x^n-λ$, $λ\in \Bbb F_q^*$, over $\Bbb F_q$, which are just open questions posed by Boripan {\em et al} (2019). We also count the numb…
▽ More
In this paper, we present some necessary and sufficient conditions under which an irreducible polynomial is self-reciprocal (SR) or self-conjugate-reciprocal (SCR). By these characterizations, we obtain some enumeration formulas of SR and SCR irreducible factors of $x^n-λ$, $λ\in \Bbb F_q^*$, over $\Bbb F_q$, which are just open questions posed by Boripan {\em et al} (2019). We also count the numbers of Euclidean and Hermitian LCD constacyclic codes and show some well-known results on Euclidean and Hermitian self-dual constacyclic codes in a simple and direct way.
△ Less
Submitted 14 January, 2020;
originally announced January 2020.
-
On the Hamming distances of repeated-root cyclic codes of length $5p^s$
Authors:
Xia Li,
Qin Yue
Abstract:
Due to the wide applications in consumer electronics, data storage systems and communication systems, cyclic codes have been an interesting research topic in coding theory. In this paper, let $p$ be a prime with $p\ge 7$. We determine the weight distributions of all cyclic codes of length $5$ over $\f_q$ and the Hamming distances of all repeated-root cyclic codes of length $5p^s$ over $\F_q$, wher…
▽ More
Due to the wide applications in consumer electronics, data storage systems and communication systems, cyclic codes have been an interesting research topic in coding theory. In this paper, let $p$ be a prime with $p\ge 7$. We determine the weight distributions of all cyclic codes of length $5$ over $\f_q$ and the Hamming distances of all repeated-root cyclic codes of length $5p^s$ over $\F_q$, where $q=p^m$ and both $s$ and $m$ are positive integers. Furthermore, we find all MDS cyclic codes of length $5p^s$ and take quantum synchronizable codes from repeated-root cyclic codes of length $5p^s$.
△ Less
Submitted 19 November, 2019; v1 submitted 18 November, 2019;
originally announced November 2019.
-
New quaternary codes derived from posets of the disjoint union of two chains
Authors:
Xiaomeng Zhu,
Yansheng Wu,
Qin Yue
Abstract:
Based on the generic construction of linear codes, we construct linear codes over the ring $\Bbb Z_4$ via posets of the disjoint union of two chains. We determine the Lee weight distributions of the quaternary codes. Moreover, we obtain some new linear quaternary codes and good binary codes by using the Gray map.
Based on the generic construction of linear codes, we construct linear codes over the ring $\Bbb Z_4$ via posets of the disjoint union of two chains. We determine the Lee weight distributions of the quaternary codes. Moreover, we obtain some new linear quaternary codes and good binary codes by using the Gray map.
△ Less
Submitted 27 October, 2019;
originally announced October 2019.
-
A class of functions with low-valued Walsh spectrum
Authors:
Fengwei Li,
Yansheng Wu,
Qin Yue
Abstract:
Let $l\equiv 3\pmod 4$, $l\ne 3$, be a prime, $N=l^2$, $f=\frac{l(l-1)}2$ the multiplicative order of a prime $p$ modulo $N$, and $q=p^f$. In this paper, we investigate the Walsh spectrum of the monomial functions $f(x)={\rm Tr}_{q/p}(x^{\frac{q-1}{l^2}})$ in index two case. In special, we explicitly present the value distribution of the Walsh transform of $f(x)$ if $1+l=4p^h$, where $h$ is a clas…
▽ More
Let $l\equiv 3\pmod 4$, $l\ne 3$, be a prime, $N=l^2$, $f=\frac{l(l-1)}2$ the multiplicative order of a prime $p$ modulo $N$, and $q=p^f$. In this paper, we investigate the Walsh spectrum of the monomial functions $f(x)={\rm Tr}_{q/p}(x^{\frac{q-1}{l^2}})$ in index two case. In special, we explicitly present the value distribution of the Walsh transform of $f(x)$ if $1+l=4p^h$, where $h$ is a class number of $\Bbb Q(\sqrt{-l})$.
△ Less
Submitted 26 October, 2019;
originally announced October 2019.
-
Optimal few-weight codes from simplicial complexes
Authors:
Yansheng Wu,
Xiaomeng Zhu,
Qin Yue
Abstract:
Recently, some infinite families of binary minimal and optimal linear codes are constructed from simplicial complexes by Hyun {\em et al}. Inspired by their work, we present two new constructions of codes over the ring $\Bbb F_2+u\Bbb F_2$ by employing simplicial complexes. When the simplicial complexes are all generated by a maximal element, we determine the Lee weight distributions of two classe…
▽ More
Recently, some infinite families of binary minimal and optimal linear codes are constructed from simplicial complexes by Hyun {\em et al}. Inspired by their work, we present two new constructions of codes over the ring $\Bbb F_2+u\Bbb F_2$ by employing simplicial complexes. When the simplicial complexes are all generated by a maximal element, we determine the Lee weight distributions of two classes of the codes over $\Bbb F_2+u\Bbb F_2$. Our results show that the codes have few Lee weights. Via the Gray map, we obtain an infinite family of binary codes meeting the Griesmer bound and a class of binary distance optimal codes.
△ Less
Submitted 9 October, 2019;
originally announced October 2019.
-
Binary optimal linear codes from posets of the disjoint union of two chains
Authors:
Yansheng Wu,
Jong Yoon Hyun,
Qin Yue
Abstract:
Recently, Chang and Hyun obtained some classes of binary optimal codes via simplicial complexes. In this letter, we utilize posets of the disjoint union of two chains to construct binary optimal linear codes.
Recently, Chang and Hyun obtained some classes of binary optimal codes via simplicial complexes. In this letter, we utilize posets of the disjoint union of two chains to construct binary optimal linear codes.
△ Less
Submitted 27 June, 2019;
originally announced June 2019.
-
Cardiac Segmentation from LGE MRI Using Deep Neural Network Incorporating Shape and Spatial Priors
Authors:
Qian Yue,
Xinzhe Luo,
Qing Ye,
Lingchao Xu,
Xiahai Zhuang
Abstract:
Cardiac segmentation from late gadolinium enhancement MRI is an important task in clinics to identify and evaluate the infarction of myocardium. The automatic segmentation is however still challenging, due to the heterogeneous intensity distributions and indistinct boundaries in the images. In this paper, we propose a new method, based on deep neural networks (DNN), for fully automatic segmentatio…
▽ More
Cardiac segmentation from late gadolinium enhancement MRI is an important task in clinics to identify and evaluate the infarction of myocardium. The automatic segmentation is however still challenging, due to the heterogeneous intensity distributions and indistinct boundaries in the images. In this paper, we propose a new method, based on deep neural networks (DNN), for fully automatic segmentation. The proposed network, referred to as SRSCN, comprises a shape reconstruction neural network (SRNN) and a spatial constraint network (SCN). SRNN aims to maintain a realistic shape of the resulting segmentation. It can be pre-trained by a set of label images, and then be embedded into a unified loss function as a regularization term. Hence, no manually designed feature is needed. Furthermore, SCN incorporates the spatial information of the 2D slices. It is formulated and trained with the segmentation network via the multi-task learning strategy. We evaluated the proposed method using 45 patients and compared with two state-of-the-art regularization schemes, i.e., the anatomically constraint neural network and the adversarial neural network. The results show that the proposed SRSCN outperformed the conventional schemes, and obtained a Dice score of 0.758(std=0.227) for myocardial segmentation, which compares with 0.757(std=0.083) from the inter-observer variations.
△ Less
Submitted 25 June, 2019; v1 submitted 17 June, 2019;
originally announced June 2019.
-
Further factorization of $x^n-1$ over a finite field
Authors:
Yansheng Wu,
Qin Yue,
Shuqin Fan
Abstract:
Let $\Bbb F_q$ be a finite field with $q$ elements and $n$ a positive integer. Martínez, Vergara and Oliveira \cite{MVO} explicitly factorized $x^{n} - 1$ over $\Bbb F_q$ under the condition of $rad(n)|(q-1)$. In this paper, suppose that $rad(n)\nmid (q-1)$ and $rad(n)|(q^w-1)$, where $w$ is a prime, we explicitly factorize $x^{n}-1$ into irreducible factors in $\Bbb F_q[x]$ and count the number o…
▽ More
Let $\Bbb F_q$ be a finite field with $q$ elements and $n$ a positive integer. Martínez, Vergara and Oliveira \cite{MVO} explicitly factorized $x^{n} - 1$ over $\Bbb F_q$ under the condition of $rad(n)|(q-1)$. In this paper, suppose that $rad(n)\nmid (q-1)$ and $rad(n)|(q^w-1)$, where $w$ is a prime, we explicitly factorize $x^{n}-1$ into irreducible factors in $\Bbb F_q[x]$ and count the number of its irreducible factors.
△ Less
Submitted 22 October, 2017;
originally announced October 2017.
-
A construction of $q$-ary linear codes with two weights
Authors:
Ziling Heng,
Qin Yue
Abstract:
Linear codes with a few weights are very important in coding theory and have attracted a lot of attention. In this paper, we present a construction of $q$-ary linear codes from trace and norm functions over finite fields. The weight distributions of the linear codes are determined in some cases based on Gauss sums. It is interesting that our construction can produce optimal or almost optimal codes…
▽ More
Linear codes with a few weights are very important in coding theory and have attracted a lot of attention. In this paper, we present a construction of $q$-ary linear codes from trace and norm functions over finite fields. The weight distributions of the linear codes are determined in some cases based on Gauss sums. It is interesting that our construction can produce optimal or almost optimal codes. Furthermore, we show that our codes can be used to construct secret sharing schemes with interesting access structures and strongly regular graphs with new parameters.
△ Less
Submitted 23 July, 2017; v1 submitted 13 May, 2016;
originally announced May 2016.
-
A class of $q$-ary linear codes derived from irreducible cyclic codes
Authors:
Ziling Heng,
Qin Yue
Abstract:
Recently, linear codes with a few weights were widely investigated due to their applications in secret sharing schemes and authentication schemes. In this letter, we present a class of $q$-ary linear codes derived from irreducible cyclic codes with $q$ a prime power. We use Gauss sums to represent its Hamming weights and obtain the bounds of its minimum Hamming distance. In some cases, we explicit…
▽ More
Recently, linear codes with a few weights were widely investigated due to their applications in secret sharing schemes and authentication schemes. In this letter, we present a class of $q$-ary linear codes derived from irreducible cyclic codes with $q$ a prime power. We use Gauss sums to represent its Hamming weights and obtain the bounds of its minimum Hamming distance. In some cases, we explicitly determine its weight distributions which generalize some known results. It is quite interesting that many new codes obtained in this letter are optimal according to some bounds on linear codes.
△ Less
Submitted 14 April, 2016; v1 submitted 30 November, 2015;
originally announced November 2015.
-
Evaluation of the Hamming weights of a class of linear codes based on Gauss sums
Authors:
Ziling Heng,
Qin Yue
Abstract:
Linear codes with a few weights have been widely investigated in recent years. In this paper, we mainly use Gauss sums to represent the Hamming weights of a class of $q$-ary linear codes under some certain conditions, where $q$ is a power of a prime. The lower bound of its minimum Hamming distance is obtained. In some special cases, we evaluate the weight distributions of the linear codes by semi-…
▽ More
Linear codes with a few weights have been widely investigated in recent years. In this paper, we mainly use Gauss sums to represent the Hamming weights of a class of $q$-ary linear codes under some certain conditions, where $q$ is a power of a prime. The lower bound of its minimum Hamming distance is obtained. In some special cases, we evaluate the weight distributions of the linear codes by semi-primitive Gauss sums and obtain some one-weight, two-weight linear codes. It is quite interesting that we find new optimal codes achieving some bounds on linear codes. The linear codes in this paper can be used in secret sharing schemes, authentication codes and data storage systems.
△ Less
Submitted 11 May, 2016; v1 submitted 6 November, 2015;
originally announced November 2015.
-
Several classes of cyclic codes with either optimal three weights or a few weights
Authors:
Ziling Heng,
Qin Yue
Abstract:
Cyclic codes with a few weights are very useful in the design of frequency hopping sequences and the development of secret sharing schemes. In this paper, we mainly use Gauss sums to represent the Hamming weights of a general construction of cyclic codes. As applications, we obtain a class of optimal three-weight codes achieving the Griesmer bound, which generalizes a Vega's result in \cite{V1}, a…
▽ More
Cyclic codes with a few weights are very useful in the design of frequency hopping sequences and the development of secret sharing schemes. In this paper, we mainly use Gauss sums to represent the Hamming weights of a general construction of cyclic codes. As applications, we obtain a class of optimal three-weight codes achieving the Griesmer bound, which generalizes a Vega's result in \cite{V1}, and several classes of cyclic codes with only a few weights, which solve the open problem in \cite{V1}.
△ Less
Submitted 19 October, 2015;
originally announced October 2015.
-
Blind Recognition of Touched Keys: Attack and Countermeasures
Authors:
Qinggang Yue,
Zhen Ling,
Benyuan Liu,
Xinwen Fu,
Wei Zhao
Abstract:
In this paper, we introduce a novel computer vision based attack that discloses inputs on a touch enabled device, while the attacker cannot see any text or popups from a video of the victim tapping on the touch screen. In the attack, we use the optical flow algorithm to identify touching frames where the finger touches the screen surface. We innovatively use intersections of detected edges of the…
▽ More
In this paper, we introduce a novel computer vision based attack that discloses inputs on a touch enabled device, while the attacker cannot see any text or popups from a video of the victim tapping on the touch screen. In the attack, we use the optical flow algorithm to identify touching frames where the finger touches the screen surface. We innovatively use intersections of detected edges of the touch screen to derive the homography matrix mapping the touch screen surface in video frames to a reference image of the virtual keyboard. We analyze the shadow formation around the fingertip and use the k-means clustering algorithm to identify touched points. Homography can then map these touched points to keys of the virtual keyboard. Our work is substantially different from existing work. We target password input and are able to achieve a high success rate. We target scenarios like classrooms, conferences and similar gathering places and use a webcam or smartphone camera. In these scenes, single-lens reflex (SLR) cameras and high-end camcorders used in related work will appear suspicious. To defeat such computer vision based attacks, we design, implement and evaluate the Privacy Enhancing Keyboard (PEK) where a randomized virtual keyboard is used to input sensitive information.
△ Less
Submitted 19 March, 2014;
originally announced March 2014.
-
Weight distributions of cyclic codes with respect to pairwise coprime order elements
Authors:
Chengju Li,
Qin Yue,
Fengwei Li
Abstract:
Let $\Bbb F_r$ be an extension of a finite field $\Bbb F_q$ with $r=q^m$. Let each $g_i$ be of order $n_i$ in $\Bbb F_r^*$ and $\gcd(n_i, n_j)=1$ for $1\leq i \neq j \leq u$.
We define a cyclic code over $\Bbb F_q$ by
$$\mathcal C_{(q, m, n_1,n_2, ..., n_u)}=\{c(a_1, a_2, ..., a_u) : a_1, a_2, ..., a_u \in \Bbb F_r\},$$ where…
▽ More
Let $\Bbb F_r$ be an extension of a finite field $\Bbb F_q$ with $r=q^m$. Let each $g_i$ be of order $n_i$ in $\Bbb F_r^*$ and $\gcd(n_i, n_j)=1$ for $1\leq i \neq j \leq u$.
We define a cyclic code over $\Bbb F_q$ by
$$\mathcal C_{(q, m, n_1,n_2, ..., n_u)}=\{c(a_1, a_2, ..., a_u) : a_1, a_2, ..., a_u \in \Bbb F_r\},$$ where
$$c(a_1, a_2, ..., a_u)=({Tr}_{r/q}(\sum_{i=1}^ua_ig_i^0), ..., {Tr}_{r/q}(\sum_{i=1}^ua_ig_i^{n-1}))$$ and $n=n_1n_2... n_u$. In this paper, we present a method to compute the weights of $\mathcal C_{(q, m, n_1,n_2, ..., n_u)}$. Further, we determine the weight distributions of the cyclic codes $\mathcal C_{(q, m, n_1,n_2)}$ and $\mathcal C_{(q, m, n_1,n_2,1)}$.
△ Less
Submitted 29 June, 2013; v1 submitted 24 June, 2013;
originally announced June 2013.
-
Weight distribution of two classes of cyclic codes with respect to two distinct order elements
Authors:
Chengju Li,
Qin Yue
Abstract:
Cyclic codes are an interesting type of linear codes and have wide applications in communication and storage systems due to their efficient encoding and decoding algorithms. Cyclic codes have been studied for many years, but their weight distribution are known only for a few cases. In this paper, let $\Bbb F_r$ be an extension of a finite field $\Bbb F_q$ and $r=q^m$, we determine the weight distr…
▽ More
Cyclic codes are an interesting type of linear codes and have wide applications in communication and storage systems due to their efficient encoding and decoding algorithms. Cyclic codes have been studied for many years, but their weight distribution are known only for a few cases. In this paper, let $\Bbb F_r$ be an extension of a finite field $\Bbb F_q$ and $r=q^m$, we determine the weight distribution of the cyclic codes $\mathcal C=\{c(a, b): a, b \in \Bbb F_r\},$ $$c(a, b)=(\mbox {Tr}_{r/q}(ag_1^0+bg_2^0), \ldots, \mbox {Tr}_{r/q}(ag_1^{n-1}+bg_2^{n-1})), g_1, g_2\in \Bbb F_r,$$ in the following two cases: (1) $\ord(g_1)=n, n|r-1$ and $g_2=1$; (2) $\ord(g_1)=n$, $g_2=g_1^2$, $\ord(g_2)=\frac n 2$, $m=2$ and $\frac{2(r-1)}n|(q+1)$.
△ Less
Submitted 21 June, 2013;
originally announced June 2013.
-
Weight Distribution of A p-ary Cyclic Code
Authors:
Xiangyong Zeng,
Lei Hu,
Wenfeng Jiang,
Qin Yue,
Xiwang Cao
Abstract:
For an odd prime $p$ and two positive integers $n\geq 3$ and $k$ with $\frac{n}{{\rm gcd}(n,k)}$ being odd, the paper determines the weight distribution of a $p$-ary cyclic code $\mathcal{C}$ over $\mathbb{F}_{p}$ with nonzeros $α^{-1}$, $α^{-(p^k+1)}$ and $α^{-(p^{3k}+1)}$, where $α$ is a primitive element of $\mathbb{F}_{p^n}$
For an odd prime $p$ and two positive integers $n\geq 3$ and $k$ with $\frac{n}{{\rm gcd}(n,k)}$ being odd, the paper determines the weight distribution of a $p$-ary cyclic code $\mathcal{C}$ over $\mathbb{F}_{p}$ with nonzeros $α^{-1}$, $α^{-(p^k+1)}$ and $α^{-(p^{3k}+1)}$, where $α$ is a primitive element of $\mathbb{F}_{p^n}$
△ Less
Submitted 15 January, 2009;
originally announced January 2009.