Cuiling Fan

ORCID: 0000-0001-8467-9871
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Coding theory and cryptography
  • graph theory and CDMA systems
  • Cellular Automata and Applications
  • Wireless Communication Networks Research
  • PAPR reduction in OFDM
  • Advanced Data Storage Technologies
  • Cooperative Communication and Network Coding
  • Advanced Wireless Communication Techniques
  • Cryptographic Implementations and Security
  • Finite Group Theory Research
  • Cancer Mechanisms and Therapy
  • DNA and Biological Computing
  • Error Correcting Code Techniques
  • semigroups and automata theory
  • Mathematics and Applications
  • Advanced Wireless Communication Technologies
  • Islamic Finance and Communication
  • Mathematical Analysis and Transform Methods
  • Bioactive Compounds in Plants
  • Cryptography and Data Security
  • Chronic Kidney Disease and Diabetes
  • Mathematical Approximation and Integration
  • Ultra-Wideband Communications Technology
  • Advanced ceramic materials synthesis
  • Inflammasome and immune disorders

Southwest Jiaotong University
2016-2025

Southern Medical University
2022-2024

Nanfang Hospital
2024

Zhujiang Hospital
2022

State Key Laboratory of Cryptology
2019-2021

Shandong University of Technology
2021

John Wiley & Sons (United States)
2020

Hudson Institute
2020

Chinese Academy of Sciences
2016-2017

Institute of Information Engineering
2016-2017

10.1016/j.ffa.2016.12.009 article EN publisher-specific-oa Finite Fields and Their Applications 2017-01-10

10.1007/s10623-022-01099-z article EN Designs Codes and Cryptography 2022-08-24

Chronic kidney disease (CKD), a involving damage to the structure and function, is global public health problem. Tubulointerstitial fibrosis (TIF) both an inevitable pathological change in individuals with CKD driving force progression of renal fibrosis. Nicotinamide N-methyltransferase (NNMT) its metabolite 1-methylnicotinamide (MNAM) have been shown protect against lipotoxicity-induced tubular injury. However, biological roles NNMT MNAM regulating TIF remain elusive. This study aimed...

10.1096/fj.202100913rrr article EN The FASEB Journal 2022-02-02

Objective To collect real-world data regarding the attainment of early-achieved lupus low disease activity state (LLDAS) in systemic erythematosus (SLE) patients receiving telitacicept or belimumab treatment, and identify factors predictive target achievement. Methods Eighty-seven SLE who received (N=42) (N=45) were retrospectively reviewed this observational study. Clinical laboratory data, assessment, glucocorticoid dosage collected for analysis. Achieving LLDAS at least once within 24...

10.3389/fimmu.2024.1423035 article EN cc-by Frontiers in Immunology 2024-06-14

The theory of cyclotomy dates back to Gauss and has a number applications in combinatorics, coding theory, cryptography. Cyclotomy over residue class ring <formula formulatype="inline" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><tex Notation="TeX">${\BBZ}_{v}$</tex></formula> can be divided into classical or generalized cyclotomy, depending on Notation="TeX">$v$</tex> </formula> prime composite. In this paper, we introduce order...

10.1109/tit.2013.2290694 article EN IEEE Transactions on Information Theory 2014-01-24

10.1016/j.ffa.2015.10.004 article EN publisher-specific-oa Finite Fields and Their Applications 2015-11-10

Abstract Combinatorial ‐designs have wide applications in coding theory, cryptography, communications, and statistics. It is well known that the supports of all codewords with a fixed weight code may give ‐design. In this paper, we first determine distributions class linear codes derived from dual some extended cyclic codes. We then obtain infinite families 2‐designs explicitly compute their parameters By simple counting argument, exponentially many 2‐designs.

10.1002/jcd.21682 article EN Journal of Combinatorial Designs 2019-11-27

As a class of optimal combinatorial objects, bent functions have important applications in cryptography, sequence design, and coding theory. Bent idempotents are subclass great interest, since they can be stored less space allow faster computation the Walsh-Hadamard transform. The objective this paper is to present generic construction from known ones. It includes previous constructions by Mesnager Xu et al. as special cases, produces new functions, which cannot produced earlier In...

10.1109/tit.2017.2717966 article EN IEEE Transactions on Information Theory 2017-06-21

<p style='text-indent:20px;'>Functions with good differential-uniformity properties have important applications in coding theory and sequence design addition to the cryptography. The differential spectrum of a cryptographic function is useful for estimating its resistance some variants cryptanalysis. objective this paper determine power <inline-formula><tex-math id="M1">\begin{document}$ x^{p^{2k}-p^k+1} $\end{document}</tex-math></inline-formula> over id="M2">\begin{document}$ \mathbb...

10.3934/amc.2020080 article EN Advances in Mathematics of Communications 2020-04-13

In frequency hopping (FH) communication systems, sequences (FHSs) are crucial in determining the system's anti-jamming performance. If FHSs can ensure a wide-gap between two adjacent points to avoid with high interference probability, it will significantly improve FH anti-interference ability. Moreover, if each point appears at same number of times sequence period, anti-electromagnetic be enhanced. Therefore, is desirable employ low Hamming autocorrelation, wide frequency-hopping gap, and...

10.1109/tit.2021.3123395 article EN IEEE Transactions on Information Theory 2021-10-27

Locally repairable codes are desirable for distributed storage systems to improve the repair efficiency. In this paper, a connection between locally with multiple disjoint sets and packings is derived under condition that each set contains exactly one check symbol. Particularly, conditions which an optimal code corresponds packing also characterized. As application of connection, some can be obtained by packings. Specifically, two constructions proposed not only generalize known explicit but...

10.1109/tcomm.2018.2869800 article EN IEEE Transactions on Communications 2018-09-12

We study the Singleton-type bound that provides an upper limit on minimum distance of locally repairable codes. present improved by carefully analyzing combinatorial structure repair sets. Thus, we show previous is unachievable for certain parameters. then also provide explicit constructions optimal codes which parameters new sharp. Additionally, as a byproduct, some previously known are shown to attain and thus proved be optimal.

10.1109/tit.2022.3161613 article EN IEEE Transactions on Information Theory 2022-03-22

Spatial modulation (SM) is a special kind of multiple-input multiple-output (MIMO) technique, in which one transmit antenna activated during each symbol duration. Recently, cross Z-complementary sequence pairs (CZCPs) have been evolved as new pair to be used for pilot design SM over frequency-selective channels. CZCPs are having zero autocorrelation sums and cross-correlation within specific time-shifts. In this letter, we propose systematic constructions binary with lengths the form 2 <sup...

10.1109/lcomm.2020.2990969 article EN IEEE Communications Letters 2020-04-28

Subfield codes of linear over finite fields have recently received much attention since they can produce optimal codes, which may applications in secret sharing, authentication and association schemes. In this paper, we first present a construction framework 3-dimensional <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">C</i> <sub xmlns:xlink="http://www.w3.org/1999/xlink"><i>f,g</i></sub> F...

10.1109/tit.2023.3328932 article EN IEEE Transactions on Information Theory 2023-11-03

In a frequency-hopping (FH) system, to avoid that the received signal would be prone interfered, equipped FH sequence of each user should have wide gap, i.e., adjacent two frequencies some gap. this letter, we extend Lempel-Greenberger bound and Peng-Fan bounds for wide-gap sequences (WGFHSs). The proposed are tight in sense they can achieved by parameters WGFHSs.

10.1109/lcomm.2019.2914207 article EN IEEE Communications Letters 2019-05-01

<para xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> Difference systems of sets (DSSs) are combinatorial structures that a generalization cyclic difference and arise in connection with code synchronization. In this correspondence, we give some constructions DSS from designs get infinite classes optimal sets. </para>

10.1109/tit.2008.924673 article EN IEEE Transactions on Information Theory 2008-06-16

The defect of an <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$[n,k,d]$ </tex-math></inline-formula> linear code is defined as notation="LaTeX">$s({\mathcal{ C}})=n-k+1-d$ . Codes with C}})=0$ are called maximum distance separable (MDS), while codes C}})=s({\mathcal{ C}}^{\perp})=1$ near (NMDS). NMDS correspond to interesting objects in finite geometry and have nice applications combinatorics...

10.1109/tit.2023.3272384 article EN IEEE Transactions on Information Theory 2023-05-08

10.1007/s10623-018-0456-7 article EN Designs Codes and Cryptography 2018-01-15

Linear codes with few weights have applications in secrete sharing, authentication codes, association schemes, and strongly regular graphs. In this paper, several classes of $p$-ary linear two or three are constructed from quadratic Bent functions over the finite field $\gf_p$, where $p$ is an odd prime. They include some earlier as special cases. The weight distributions these also determined.

10.48550/arxiv.1506.06830 preprint EN other-oa arXiv (Cornell University) 2015-01-01
Coming Soon ...