Can Xiang

ORCID: 0000-0003-1929-9658
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Coding theory and cryptography
  • graph theory and CDMA systems
  • Cooperative Communication and Network Coding
  • Error Correcting Code Techniques
  • Finite Group Theory Research
  • Cellular Automata and Applications
  • Cryptographic Implementations and Security
  • Advanced Wireless Communication Techniques
  • Wireless Communication Networks Research
  • Cancer Mechanisms and Therapy
  • Islamic Finance and Communication
  • semigroups and automata theory
  • VLSI and Analog Circuit Testing
  • PAPR reduction in OFDM
  • Forensic Fingerprint Detection Methods
  • Probabilistic and Robust Engineering Design
  • Educational Methods and Media Use
  • Advanced biosensing and bioanalysis techniques
  • Nanoplatforms for cancer theranostics
  • Biometric Identification and Security
  • Reliability and Maintenance Optimization
  • Advanced Steganography and Watermarking Techniques
  • Cloud Data Security Solutions
  • Advanced Wireless Communication Technologies
  • Photodynamic Therapy Research Studies

South China Agricultural University
2016-2025

Union Hospital
2024

Huazhong University of Science and Technology
2024

Northwestern Polytechnical University
2016

Guangzhou University
2015

Hainan Normal University
2009

10.1109/tit.2025.3556433 article EN IEEE Transactions on Information Theory 2025-01-01

In this paper, we investigate properties of generalized bent Boolean functions and 2k-bent (i.e., negabent, octabent, hexadecabent, et al.) in a uniform framework. From the Hadamard matrices, Hodzic Pasalic presented sufficient conditions for functions. Using cyclotomic fields decomposition functions, generalize their results, prove that Pasalic's are not only but also necessary, completely characterize terms component Furthermore, present secondary construction or semibent from Finally,...

10.1109/tit.2017.2686987 article EN IEEE Transactions on Information Theory 2017-03-25

In this paper, a generic construction of codebooks based on binary codes is introduced. With construction, few previous constructions optimal are extended, and new class almost meeting the Levenshtein bound presented. Exponentially many or from obtained in paper. The constructed paper have alphabet size 4. As byproduct, three bounds parameters derived.

10.1109/tit.2015.2487451 article EN IEEE Transactions on Information Theory 2015-10-06

10.1007/s12095-015-0158-1 article EN Cryptography and Communications 2015-09-30

Linear codes generated by component functions of perfect nonlinear (PN for short) and almost (APN the first-order Reed-Muller have been an object intensive study in coding theory. The objective this paper is to investigate some binary shortened two families linear from APN <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$p$ </tex-math></inline-formula> -ary associated with PN functions. weight distributions...

10.1109/tit.2022.3145519 article EN IEEE Transactions on Information Theory 2022-01-24

10.1007/s10623-019-00696-9 article EN Designs Codes and Cryptography 2019-11-18

Linear codes are widely employed in communication systems, consumer electronics, and storage devices. All linear over finite fields can be generated by a generator matrix. Due to this, the matrix approach is called fundamental construction of codes. This only known method that produce all fields. Recently, defining-set has attracted lot attention, have been huge number classes It was claimed this also generate But so far, no proof claim given literature. The objective paper prove claim,...

10.48550/arxiv.1610.06355 preprint EN other-oa arXiv (Cornell University) 2016-01-01

10.1007/s12095-020-00457-9 article EN Cryptography and Communications 2020-10-06

10.1007/s12095-016-0200-y article EN Cryptography and Communications 2016-08-05

The traditional algorithm for smoothing fingerprint orientation fields was based on the low-pass filter. To improve this algorithm, a variable window adaptive is proposed consistency. Our uses correctness of field to compute weighted average field. Experiments show that our can effectively deal with images which have noises and really describe topological structure ridge.

10.1109/cinc.2009.197 article EN 2009-06-01

In this paper, we present a construction of linear codes over F <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2t</sub> from Boolean functions, which is generalization Ding's method. Based on construction, give two classes C̃ xmlns:xlink="http://www.w3.org/1999/xlink">f</sub> and C function f : xmlns:xlink="http://www.w3.org/1999/xlink">q</sub> → xmlns:xlink="http://www.w3.org/1999/xlink">2</sub> , where q = 2 <sup...

10.1109/tit.2016.2620497 article EN IEEE Transactions on Information Theory 2016-11-01

10.1007/s12095-021-00546-3 article EN Cryptography and Communications 2021-11-04

In this paper, we present a construction of linear codes over $\f_{2^t}$ from Boolean functions, which is generalization Ding's method \cite[Theorem 9]{Ding15}. Based on construction, give two classes $\tilde{\C}_{f}$ and $\C_f$ (see Theorem \ref{thm-maincode1} \ref{thm-maincodenew}) function $f:\f_{q}\rightarrow \f_2$, where $q=2^n$ some subfield $\f_{q}$. The complete weight enumerator can be easily determined the Walsh spectrum $f$, while distribution code also settled. Particularly,...

10.48550/arxiv.1511.02264 preprint EN other-oa arXiv (Cornell University) 2015-01-01

10.1016/j.ffa.2023.102201 article EN Finite Fields and Their Applications 2023-05-05

10.1007/s00200-017-0338-7 article EN Applicable Algebra in Engineering Communication and Computing 2017-08-18

Linear codes generated by component functions of perfect nonlinear (PN) and almost (APN) the first-order Reed-Muller have been an object intensive study in coding theory. The objective this paper is to investigate some binary shortened two families linear from APN $p$-ary associated with PN functions. weight distributions these parameters their duals are determined. flexible. Many presented optimal or optimal. results show that shortening technique very promising for constructing good codes.

10.48550/arxiv.2007.05923 preprint EN other-oa arXiv (Cornell University) 2020-01-01

&lt;p style='text-indent:20px;'&gt;In this paper, we present two constructions of low-hit-zone frequen-cy-hopping sequence (LHZ FHS) sets. The in paper generalize the previous based on &lt;inline-formula&gt;&lt;tex-math id="M1"&gt;\begin{document}$ m $\end{document}&lt;/tex-math&gt;&lt;/inline-formula&gt;-sequences and id="M2"&gt;\begin{document}$ d $\end{document}&lt;/tex-math&gt;&lt;/inline-formula&gt;-form functions with difference-balanced property, generate several classes optimal LHZ...

10.3934/amc.2020110 article EN Advances in Mathematics of Communications 2020-09-18

Linear codes can be employed to construct authentication codes, which is an interesting area of cryptography. The parameters the depend on complete weight enumerator underlying linear codes. In order obtain code with good parameters, must have proper parameters. first objective this paper determine enumerators a class two weights and three weights. second employ these new

10.48550/arxiv.1505.06502 preprint EN other-oa arXiv (Cornell University) 2015-01-01

A generic construction of linear codes over finite fields has recently received a lot attention, and many one-weight, two-weight three-weight with good error correcting capability have been produced this approach. The first objective paper is to establish relationships among some classes obtained approach, so that the parameters can be derived from those other known parameters. In way, new will derived. second present class binary consider their applications in secret sharing.

10.48550/arxiv.1505.07726 preprint EN other-oa arXiv (Cornell University) 2015-01-01
Coming Soon ...