首页 > 最新文献

IEEE Transactions on Information Theory最新文献

英文 中文
Improved Decoding Algorithms for MDS and Almost-MDS Codes From Twisted GRS Codes 基于扭曲GRS码的MDS和近MDS码译码改进算法
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-07-30 DOI: 10.1109/TIT.2025.3594174
Guodong Wang;Hongwei Liu;Jinquan Luo
In this paper, firstly, we study decoding of a general class of twisted generalized Reed-Solomon (TGRS) codes and provide a precise characterization of the key equation for TGRS codes and propose a decoding algorithm. Secondly, we further study decoding of almost-MDS TGRS codes and provide a decoding algorithm. These two decoding algorithms are more efficient in terms of performance compared with the decoding algorithms presented in [Sun et al., IEEE-TIT, 2024] and [Sui et al., IEEE-TIT, 2023] respectively. Moreover, these two optimized decoding algorithms can be applied to the decoding of a more general class of twisted Goppa codes.
本文首先研究了一类扭曲广义Reed-Solomon (TGRS)码的译码,给出了TGRS码的关键方程的精确刻画,并提出了译码算法。其次,进一步研究了近mds TGRS码的译码,并给出了译码算法。与[Sun et al., IEEE-TIT, 2024]和[Sui et al., IEEE-TIT, 2023]中提出的解码算法相比,这两种解码算法在性能上更加高效。此外,这两种优化的解码算法可以应用于更一般的扭曲Goppa码的解码。
{"title":"Improved Decoding Algorithms for MDS and Almost-MDS Codes From Twisted GRS Codes","authors":"Guodong Wang;Hongwei Liu;Jinquan Luo","doi":"10.1109/TIT.2025.3594174","DOIUrl":"https://doi.org/10.1109/TIT.2025.3594174","url":null,"abstract":"In this paper, firstly, we study decoding of a general class of twisted generalized Reed-Solomon (TGRS) codes and provide a precise characterization of the key equation for TGRS codes and propose a decoding algorithm. Secondly, we further study decoding of almost-MDS TGRS codes and provide a decoding algorithm. These two decoding algorithms are more efficient in terms of performance compared with the decoding algorithms presented in [Sun et al., IEEE-TIT, 2024] and [Sui et al., IEEE-TIT, 2023] respectively. Moreover, these two optimized decoding algorithms can be applied to the decoding of a more general class of twisted Goppa codes.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 10","pages":"7688-7698"},"PeriodicalIF":2.9,"publicationDate":"2025-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145110254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low-SNR Asymptotic Capacity of Two Types of Optical Wireless Channels Under Average-Intensity Constraints 平均强度约束下两类无线光信道的低信噪比渐近容量
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-07-30 DOI: 10.1109/TIT.2025.3593888
Longguang Li
In this paper, we study two types of optical wireless channels under average-intensity constraints. One is called the Gaussian optical intensity channel, where the channel output models the converted electrical current corrupted by additive white Gaussian noise. The other one is the Poisson optical intensity channel, where the channel output models the number of received photons whose arrival rates are corrupted by a dark current. When the average input intensity $mathcal {E}$ is small, the capacity of the Gaussian optical intensity channel is shown to scale as $mathcal {E}sqrt {frac {log frac {1}{mathcal {E}}}{2}}$ , and the capacity of the Poisson optical intensity channel as $mathcal {E}log log frac {1}{mathcal {E}}$ . This closes the gaps between previously-derived upper and lower bounds on the asymptotic capacity of these two types of channels.
本文研究了平均强度约束下的两类无线光信道。一种称为高斯光强通道,其中通道输出模拟被加性高斯白噪声破坏的转换电流。另一个是泊松光强通道,其中通道输出模拟接收光子的数量,这些光子的到达率被暗电流破坏。当平均输入强度$mathcal {E}$较小时,高斯光强通道容量按比例表示为$mathcal {E}sqrt {frac {log frac {1}{mathcal {E}}}{2}}$,泊松光强通道容量按比例表示为$mathcal {E}log log frac {1}{mathcal {E}}$。这缩小了这两种信道渐近容量的上下界之间的差距。
{"title":"Low-SNR Asymptotic Capacity of Two Types of Optical Wireless Channels Under Average-Intensity Constraints","authors":"Longguang Li","doi":"10.1109/TIT.2025.3593888","DOIUrl":"https://doi.org/10.1109/TIT.2025.3593888","url":null,"abstract":"In this paper, we study two types of optical wireless channels under average-intensity constraints. One is called the Gaussian optical intensity channel, where the channel output models the converted electrical current corrupted by additive white Gaussian noise. The other one is the Poisson optical intensity channel, where the channel output models the number of received photons whose arrival rates are corrupted by a dark current. When the average input intensity <inline-formula> <tex-math>$mathcal {E}$ </tex-math></inline-formula> is small, the capacity of the Gaussian optical intensity channel is shown to scale as <inline-formula> <tex-math>$mathcal {E}sqrt {frac {log frac {1}{mathcal {E}}}{2}}$ </tex-math></inline-formula>, and the capacity of the Poisson optical intensity channel as <inline-formula> <tex-math>$mathcal {E}log log frac {1}{mathcal {E}}$ </tex-math></inline-formula>. This closes the gaps between previously-derived upper and lower bounds on the asymptotic capacity of these two types of channels.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 10","pages":"7504-7517"},"PeriodicalIF":2.9,"publicationDate":"2025-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145110268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Capacity Bounds for Broadcast Channels With Bidirectional Conferencing Decoders 双向会议解码器广播信道的容量界限
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-07-30 DOI: 10.1109/TIT.2025.3594183
Reza K. Farsani;Wei Yu
The two-user broadcast channel (BC) with receivers connected by bidirectional cooperation links of finite capacities, known as conferencing decoders, is considered. A novel capacity region outer bound is established based on multiple applications of the Csiszár-Körner identity. Achievable rate regions are derived by using Marton’s coding as the transmission scheme, together with different combinations of decode-and-forward and quantize-bin-and-forward strategies at the receivers. It is shown that the outer bound coincides with the achievable rate region for a new class of semi-deterministic BCs with degraded message sets; for this class of channels, one-round cooperation is sufficient to achieve the capacity. Capacity result is also derived for a class of more capable semi-deterministic BCs with both common and private messages and one-sided conferencing. For the Gaussian BC with conferencing decoders, if the noises at the decoders are perfectly correlated (i.e., the correlation is either 1 or −1), the new outer bound yields exact capacity region for two cases: 1) BC with degraded message sets; 2) BC with one-sided conferencing from the weaker receiver to the stronger receiver. When the noises have arbitrary correlation, the outer bound is shown to be within half a bit from the capacity region for these same two cases. Finally, for the general Gaussian BC, a one-sided cooperation scheme based on decode-and-forward from the stronger receiver to the weaker receiver is shown to achieve the capacity region to within $frac {1}{2}log left ({{frac {2}{1-|lambda |}}}right)$ bits, where $lambda $ is the noise correlation. An interesting implication of these results is that for a Gaussian BC with perfectly negatively correlated noises and conferencing decoders with finite cooperation link capacities, it is possible to achieve a strictly positive rate using only an infinitesimal amount of transmit power.
考虑了由有限容量的双向合作链路连接的双用户广播信道(BC),即会议解码器。基于Csiszár-Körner恒等式的多重应用,建立了一种新的容量域外界。采用马尔顿编码作为传输方案,在接收端采用译码转发和量子化转发策略的不同组合,导出了可实现的速率区域。结果表明,对于一类具有降级消息集的半确定性bc,其外边界与可达到的速率区域重合;对于这类渠道,一轮合作就足以实现容量。对于具有公共消息和私有消息以及单边会议的一类更有能力的半确定性bc,还导出了容量结果。对于具有会议解码器的高斯BC,如果解码器处的噪声是完全相关的(即相关性为1或- 1),则新的外边界产生两种情况的精确容量区域:1)具有降级消息集的BC;2)从较弱的接收方到较强的接收方单向会议的BC。当噪声具有任意相关性时,表明这两种情况下的外界距离容量区域在半位以内。最后,对于一般高斯BC,给出了一种基于从强接收机到弱接收机的解码转发的单边合作方案,以实现到$frac {1}{2}log left ({{frac {2}{1-|lambda |}}}right)$位以内的容量区域,其中$lambda $为噪声相关。这些结果的一个有趣的含义是,对于具有完全负相关噪声的高斯BC和具有有限合作链路容量的会议解码器,仅使用无限小的发射功率就可以实现严格的正速率。
{"title":"Capacity Bounds for Broadcast Channels With Bidirectional Conferencing Decoders","authors":"Reza K. Farsani;Wei Yu","doi":"10.1109/TIT.2025.3594183","DOIUrl":"https://doi.org/10.1109/TIT.2025.3594183","url":null,"abstract":"The two-user broadcast channel (BC) with receivers connected by bidirectional cooperation links of finite capacities, known as conferencing decoders, is considered. A novel capacity region outer bound is established based on multiple applications of the Csiszár-Körner identity. Achievable rate regions are derived by using Marton’s coding as the transmission scheme, together with different combinations of decode-and-forward and quantize-bin-and-forward strategies at the receivers. It is shown that the outer bound coincides with the achievable rate region for a new class of semi-deterministic BCs with degraded message sets; for this class of channels, one-round cooperation is sufficient to achieve the capacity. Capacity result is also derived for a class of more capable semi-deterministic BCs with both common and private messages and one-sided conferencing. For the Gaussian BC with conferencing decoders, if the noises at the decoders are perfectly correlated (i.e., the correlation is either 1 or −1), the new outer bound yields exact capacity region for two cases: 1) BC with degraded message sets; 2) BC with one-sided conferencing from the weaker receiver to the stronger receiver. When the noises have arbitrary correlation, the outer bound is shown to be within half a bit from the capacity region for these same two cases. Finally, for the general Gaussian BC, a one-sided cooperation scheme based on decode-and-forward from the stronger receiver to the weaker receiver is shown to achieve the capacity region to within <inline-formula> <tex-math>$frac {1}{2}log left ({{frac {2}{1-|lambda |}}}right)$ </tex-math></inline-formula> bits, where <inline-formula> <tex-math>$lambda $ </tex-math></inline-formula> is the noise correlation. An interesting implication of these results is that for a Gaussian BC with perfectly negatively correlated noises and conferencing decoders with finite cooperation link capacities, it is possible to achieve a strictly positive rate using only an infinitesimal amount of transmit power.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 10","pages":"7484-7503"},"PeriodicalIF":2.9,"publicationDate":"2025-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145110335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Difficulties Constructing Lattices With Exponential Kissing Number From Codes 用码构造指数吻数格的困难
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-07-28 DOI: 10.1109/TIT.2025.3593195
Huck Bennett;Alexander Golovnev;Noah Stephens-Davidowitz
In this note, we present examples showing that several natural ways of constructing lattices from error-correcting codes do not in general yield a correspondence between minimum-weight non-zero codewords and shortest non-zero lattice vectors. From these examples, we conclude that the main results in two works of Vlăduţ (Moscow J. Comb. Number Th., 2019 and Discrete Comput. Geom., 2021) on constructing lattices with exponential kissing number from error-correcting codes are invalid. A more recent preprint (arXiv, 2024) that Vlăduţ posted after an initial version of this work was made public is also invalid. Exhibiting a family of lattices with exponential kissing number therefore remains an open problem (as of July 2025).
在这篇文章中,我们给出了一些例子,表明从纠错码构造格的几种自然方法通常不会产生最小权值非零码字和最短非零格向量之间的对应关系。从这些例子中,我们得出结论,主要结果在莫斯科J.库姆的两部作品。Th数量。2019年和离散计算。几何学。, 2021)从纠错码构造具有指数亲吻数的格是无效的。最近的预印本(arXiv, 2024),在这个作品的初始版本被公开后,vl发布的也是无效的。因此,显示具有指数亲吻数的晶格族仍然是一个开放的问题(截至2025年7月)。
{"title":"Difficulties Constructing Lattices With Exponential Kissing Number From Codes","authors":"Huck Bennett;Alexander Golovnev;Noah Stephens-Davidowitz","doi":"10.1109/TIT.2025.3593195","DOIUrl":"https://doi.org/10.1109/TIT.2025.3593195","url":null,"abstract":"In this note, we present examples showing that several natural ways of constructing lattices from error-correcting codes do not in general yield a correspondence between minimum-weight non-zero codewords and shortest non-zero lattice vectors. From these examples, we conclude that the main results in two works of Vlăduţ (Moscow J. Comb. Number Th., 2019 and Discrete Comput. Geom., 2021) on constructing lattices with exponential kissing number from error-correcting codes are invalid. A more recent preprint (arXiv, 2024) that Vlăduţ posted after an initial version of this work was made public is also invalid. Exhibiting a family of lattices with exponential kissing number therefore remains an open problem (as of July 2025).","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 10","pages":"7644-7648"},"PeriodicalIF":2.9,"publicationDate":"2025-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145110193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distribution-Preserving Integrated Sensing and Communication 保持分布的集成传感与通信
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-07-28 DOI: 10.1109/TIT.2025.3592995
Yiqi Chen;Tobias J. Oechtering;Holger Boche;Mikael Skoglund;Yuan Luo
Distribution-preserving integrated sensing and communication is investigated in this paper. In addition to the distortion constraint, we impose another constraint on the distance between the reconstructed sequence distribution and the original state distribution to force the system to preserve the statistical property of the channel states. An inner bound of the distribution-preserving capacity-distortion region is provided with some capacity region results under special cases. Furthermore, we consider the case where the system aims to keep the reconstructed sequence secret from an eavesdropper who also observes the channel output and receives rate-limited side information about the estimator. An inner bound of the tradeoff region and a capacity-achieving special case are presented. In addition, we provide some numerical examples to illustrate the tradeoff between the communication rate, distortion, and the preservation of the distribution.
本文研究了保持分布的集成传感与通信。除了失真约束外,我们还对重构序列分布与原始状态分布之间的距离施加了另一个约束,以迫使系统保持信道状态的统计特性。给出了保持分布的容量畸变区域的一个内界,并给出了一些特殊情况下的容量区域结果。此外,我们还考虑了这样一种情况,即系统的目标是对窃听者保持重构序列的机密性,窃听者也观察信道输出并接收关于估计器的速率限制侧信息。给出了一个权衡区域的内界和一个能力实现的特例。此外,我们还提供了一些数值例子来说明通信速率,失真和分布保存之间的权衡。
{"title":"Distribution-Preserving Integrated Sensing and Communication","authors":"Yiqi Chen;Tobias J. Oechtering;Holger Boche;Mikael Skoglund;Yuan Luo","doi":"10.1109/TIT.2025.3592995","DOIUrl":"https://doi.org/10.1109/TIT.2025.3592995","url":null,"abstract":"Distribution-preserving integrated sensing and communication is investigated in this paper. In addition to the distortion constraint, we impose another constraint on the distance between the reconstructed sequence distribution and the original state distribution to force the system to preserve the statistical property of the channel states. An inner bound of the distribution-preserving capacity-distortion region is provided with some capacity region results under special cases. Furthermore, we consider the case where the system aims to keep the reconstructed sequence secret from an eavesdropper who also observes the channel output and receives rate-limited side information about the estimator. An inner bound of the tradeoff region and a capacity-achieving special case are presented. In addition, we provide some numerical examples to illustrate the tradeoff between the communication rate, distortion, and the preservation of the distribution.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 10","pages":"7518-7539"},"PeriodicalIF":2.9,"publicationDate":"2025-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11097316","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145110278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Geometric Structure and Transversal Logic of Quantum Reed–Muller Codes 量子Reed-Muller码的几何结构和横向逻辑
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-07-25 DOI: 10.1109/TIT.2025.3592631
Alexander Barg;Nolan J. Coble;Dominik Hangleiter;Christopher Kang
Designing efficient and noise-tolerant quantum computation protocols generally begins with an understanding of quantum error-correcting codes and their native logical operations. The simplest class of native operations are transversal gates, which are naturally fault-tolerant. In this paper, we aim to characterize the transversal gates of quantum Reed–Muller (RM) codes by exploiting the well-studied properties of their classical counterparts. We start our work by establishing a new geometric characterization of quantum RM codes via the Boolean hypercube and its associated subcube complex. More specifically, a set of stabilizer generators for a quantum RM code can be described via transversal X and Z operators acting on subcubes of particular dimensions. This characterization leads us to define subcube operators composed of single-qubit $pi /2^{k}~Z$ -rotations that act on subcubes of given dimensions. We first characterize the action of subcube operators on the code space: depending on the dimension of the subcube, these operators either (1) act as a logical identity on the code space, (2) implement non-trivial logic, or (3) rotate a state away from the code space. Second, and more remarkably, we uncover that the logic implemented by these operators corresponds to circuits of multi-controlled-Z gates that have an explicit and simple combinatorial description. Overall, this suite of results yields a comprehensive understanding of a class of natural transversal operators for quantum RM codes.
设计高效且耐噪的量子计算协议通常始于对量子纠错码及其原生逻辑运算的理解。最简单的原生操作是横向门,它具有天生的容错性。在本文中,我们的目的是通过利用量子里德-穆勒码的经典对应物的充分研究性质来表征量子里德-穆勒码的横门。我们首先通过布尔超立方体及其相关的子立方体复合体建立了量子RM码的新几何表征。更具体地说,量子RM码的一组稳定器生成器可以通过作用于特定维数的子立方体上的横向X和Z算子来描述。这个特性使我们定义了由单量子位$pi /2^{k}~Z$ -旋转组成的子立方体算子,这些旋转作用于给定维度的子立方体。我们首先描述子多维数据集运算符在代码空间上的作用:根据子多维数据集的维数,这些运算符可以(1)作为代码空间上的逻辑同一性,(2)实现非平凡逻辑,或者(3)从代码空间旋转状态。其次,更值得注意的是,我们发现由这些运算符实现的逻辑对应于具有明确和简单组合描述的多控制z门电路。总的来说,这组结果产生了对量子RM码的一类自然横算符的全面理解。
{"title":"Geometric Structure and Transversal Logic of Quantum Reed–Muller Codes","authors":"Alexander Barg;Nolan J. Coble;Dominik Hangleiter;Christopher Kang","doi":"10.1109/TIT.2025.3592631","DOIUrl":"https://doi.org/10.1109/TIT.2025.3592631","url":null,"abstract":"Designing efficient and noise-tolerant quantum computation protocols generally begins with an understanding of quantum error-correcting codes and their native logical operations. The simplest class of native operations are transversal gates, which are naturally fault-tolerant. In this paper, we aim to characterize the transversal gates of quantum Reed–Muller (RM) codes by exploiting the well-studied properties of their classical counterparts. We start our work by establishing a new geometric characterization of quantum RM codes via the Boolean hypercube and its associated subcube complex. More specifically, a set of stabilizer generators for a quantum RM code can be described via transversal <italic>X</i> and <italic>Z</i> operators acting on subcubes of particular dimensions. This characterization leads us to define <italic>subcube operators</i> composed of single-qubit <inline-formula> <tex-math>$pi /2^{k}~Z$ </tex-math></inline-formula>-rotations that act on subcubes of given dimensions. We first characterize the action of subcube operators on the code space: depending on the dimension of the subcube, these operators either (1) act as a logical identity on the code space, (2) implement non-trivial logic, or (3) rotate a state away from the code space. Second, and more remarkably, we uncover that the logic implemented by these operators corresponds to circuits of multi-controlled-<italic>Z</i> gates that have an explicit and simple combinatorial description. Overall, this suite of results yields a comprehensive understanding of a class of natural transversal operators for quantum RM codes.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 1","pages":"415-436"},"PeriodicalIF":2.9,"publicationDate":"2025-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145808559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exact Matching in Correlated Networks With Node Attributes for Improved Community Recovery 基于节点属性的相关网络精确匹配改进社区恢复
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-07-25 DOI: 10.1109/TIT.2025.3592704
Joonhyuk Yang;Hye Won Chung
We study community detection in multiple networks with jointly correlated node attributes and edges. This setting arises naturally in applications such as social platforms, where a shared set of users may exhibit both correlated friendship patterns and correlated attributes across different platforms. Extending the classical Stochastic Block Model (SBM) and its contextual counterpart (Contextual SBM or CSBM), we introduce the correlated CSBM, which incorporates structural and attribute correlations across graphs. To build intuition, we first analyze correlated Gaussian Mixture Models, wherein only correlated node attributes are available without edges, and identify the conditions under which an estimator minimizing the distance between attributes achieves exact matching of nodes across the two databases. For the correlated CSBMs, we develop a two-step procedure that first applies k-core matching to most nodes using edge information, then refines the matching for the remaining unmatched nodes by leveraging their attributes with a distance-based estimator. We identify the conditions under which the algorithm recovers the exact node correspondence, enabling us to merge the correlated edges and average the correlated attributes for enhanced community detection. Crucially, by aligning and combining graphs, we identify regimes in which community detection is impossible in a single graph but becomes feasible when side information from correlated graphs is incorporated. Our results illustrate how the interplay between graph matching and community recovery can boost performance, broadening the scope of multi-graph, attribute-based community detection.
我们研究了具有联合关联节点属性和边的多个网络中的社区检测。这种设置在社交平台等应用程序中自然出现,在这些应用程序中,一组共享的用户可能在不同平台上显示出相关的友谊模式和相关属性。在经典随机块模型(SBM)及其上下文对应模型(contextual SBM或CSBM)的基础上,引入了关联的随机块模型(CSBM),该模型包含了图间的结构和属性关联。为了建立直觉,我们首先分析了相关高斯混合模型,其中只有相关节点属性可用而没有边缘,并确定了最小化属性之间距离的估计器在两个数据库之间实现节点精确匹配的条件。对于相关的csbm,我们开发了一个两步过程,首先使用边缘信息对大多数节点应用k-core匹配,然后通过使用基于距离的估计器利用其属性来改进剩余未匹配节点的匹配。我们确定了算法恢复精确节点对应的条件,使我们能够合并相关边并平均相关属性以增强社区检测。至关重要的是,通过对齐和组合图,我们确定了在单个图中不可能进行社区检测的制度,但当来自相关图的侧信息被合并时,社区检测变得可行。我们的研究结果说明了图匹配和社区恢复之间的相互作用如何提高性能,扩大了多图、基于属性的社区检测的范围。
{"title":"Exact Matching in Correlated Networks With Node Attributes for Improved Community Recovery","authors":"Joonhyuk Yang;Hye Won Chung","doi":"10.1109/TIT.2025.3592704","DOIUrl":"https://doi.org/10.1109/TIT.2025.3592704","url":null,"abstract":"We study community detection in multiple networks with jointly correlated node attributes and edges. This setting arises naturally in applications such as social platforms, where a shared set of users may exhibit both correlated friendship patterns and correlated attributes across different platforms. Extending the classical Stochastic Block Model (SBM) and its contextual counterpart (Contextual SBM or CSBM), we introduce the correlated CSBM, which incorporates structural and attribute correlations across graphs. To build intuition, we first analyze correlated Gaussian Mixture Models, wherein only correlated node attributes are available without edges, and identify the conditions under which an estimator minimizing the distance between attributes achieves exact matching of nodes across the two databases. For the correlated CSBMs, we develop a two-step procedure that first applies <italic>k</i>-core matching to most nodes using edge information, then refines the matching for the remaining unmatched nodes by leveraging their attributes with a distance-based estimator. We identify the conditions under which the algorithm recovers the exact node correspondence, enabling us to merge the correlated edges and average the correlated attributes for enhanced community detection. Crucially, by aligning and combining graphs, we identify regimes in which community detection is impossible in a single graph but becomes feasible when side information from correlated graphs is incorporated. Our results illustrate how the interplay between graph matching and community recovery can boost performance, broadening the scope of multi-graph, attribute-based community detection.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 10","pages":"7916-7941"},"PeriodicalIF":2.9,"publicationDate":"2025-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145110273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Decomposition of Cascade Connections of NFSRs: Old and New Results NFSRs级联连接的分解:新旧结果
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-07-24 DOI: 10.1109/TIT.2025.3592293
Xiao-Xin Zhao;Wen-Feng Qi;Zhong-Xiao Wang;Qun-Xiong Zheng;Deng Tang
Cascade connection architectures of nonlinear feedback shift registers (NFSRs) have been widely used as the main components in the design of cryptographic algorithms, such as the Grain family of stream ciphers. It is known that the cascade connection of an n-stage NFSR into an m-stage NFSR is equivalent to an $(n+m)$ -stage NFSR. However, the converse problem on decomposing an NFSR into the cascade connection of two smaller NFSRs has not been well addressed, which can be transformed to decomposing the characteristic function h of the NFSR into the form $h=f ast g$ for some nonlinear $f,g$ , where “ $ast $ ” is a special composition of Boolean functions. In this paper, we present a complete and efficient method for such decomposition problem based on previous works. The framework of the decomposition consists of two steps. The first is to construct a candidate set for g as precise as possible, and the second is to verify each candidate g and recover the corresponding f. We propose the notion of $ast $ -multiples of Boolean functions, and present three ways to take derivatives of h to extract the low-degree $ast $ -multiples of g, which are useful to determine g efficiently. Compared to existing methods, the new approach can provide a very small candidate set for g in most cases, with the size being $O(deg (h))$ , thereby achieving lower and more stable time costs in determining whether h is $ast $ -reducible and enumerating all pairs $(f,g)$ such that $h=f ast g$ (if it is $ast $ -reducible). Moreover, we show that the decomposition method also applies to shift-invariant maps, by establishing a connection between the $ast $ -product of Boolean functions and the composition of shift-invariant maps.
非线性反馈移位寄存器(NFSRs)的级联连接体系结构已被广泛用作加密算法设计的主要组成部分,例如流密码的Grain族。众所周知,n级NFSR与m级NFSR的级联连接相当于$(n+m)$级NFSR。然而,将一个NFSR分解为两个较小的NFSR的级联连接的逆向问题还没有得到很好的解决,这可以转化为将NFSR的特征函数h分解为对于某些非线性$f,g$的形式$h=f ast g$,其中“$ast $”是布尔函数的特殊组合。本文在前人工作的基础上,提出了一种完整而有效的分解方法。分解的框架包括两个步骤。首先是尽可能精确地构造g的候选集,其次是验证每个候选g并恢复相应的f。我们提出了布尔函数的$ast $ -倍数的概念,并提出了三种对h求导以提取g的低次$ast $ -倍数的方法,这有助于有效地确定g。与现有方法相比,新方法在大多数情况下可以为g提供一个非常小的候选集,其大小为$O(deg (h))$,从而在确定h是否$ast $ -可约和枚举所有对$(f,g)$使得$h=f ast g$(如果$ast $ -可约)时实现更低和更稳定的时间成本。此外,我们通过建立布尔函数的$ast $积与移位不变映射的组合之间的联系,证明了分解方法也适用于移位不变映射。
{"title":"The Decomposition of Cascade Connections of NFSRs: Old and New Results","authors":"Xiao-Xin Zhao;Wen-Feng Qi;Zhong-Xiao Wang;Qun-Xiong Zheng;Deng Tang","doi":"10.1109/TIT.2025.3592293","DOIUrl":"https://doi.org/10.1109/TIT.2025.3592293","url":null,"abstract":"Cascade connection architectures of nonlinear feedback shift registers (NFSRs) have been widely used as the main components in the design of cryptographic algorithms, such as the Grain family of stream ciphers. It is known that the cascade connection of an <italic>n</i>-stage NFSR into an <italic>m</i>-stage NFSR is equivalent to an <inline-formula> <tex-math>$(n+m)$ </tex-math></inline-formula>-stage NFSR. However, the converse problem on decomposing an NFSR into the cascade connection of two smaller NFSRs has not been well addressed, which can be transformed to decomposing the characteristic function <italic>h</i> of the NFSR into the form <inline-formula> <tex-math>$h=f ast g$ </tex-math></inline-formula> for some nonlinear <inline-formula> <tex-math>$f,g$ </tex-math></inline-formula>, where “<inline-formula> <tex-math>$ast $ </tex-math></inline-formula>” is a special composition of Boolean functions. In this paper, we present a complete and efficient method for such decomposition problem based on previous works. The framework of the decomposition consists of two steps. The first is to construct a candidate set for <italic>g</i> as precise as possible, and the second is to verify each candidate <italic>g</i> and recover the corresponding <italic>f</i>. We propose the notion of <inline-formula> <tex-math>$ast $ </tex-math></inline-formula>-multiples of Boolean functions, and present three ways to take derivatives of <italic>h</i> to extract the low-degree <inline-formula> <tex-math>$ast $ </tex-math></inline-formula>-multiples of <italic>g</i>, which are useful to determine <italic>g</i> efficiently. Compared to existing methods, the new approach can provide a very small candidate set for <italic>g</i> in most cases, with the size being <inline-formula> <tex-math>$O(deg (h))$ </tex-math></inline-formula>, thereby achieving lower and more stable time costs in determining whether <italic>h</i> is <inline-formula> <tex-math>$ast $ </tex-math></inline-formula>-reducible and enumerating all pairs <inline-formula> <tex-math>$(f,g)$ </tex-math></inline-formula> such that <inline-formula> <tex-math>$h=f ast g$ </tex-math></inline-formula> (if it is <inline-formula> <tex-math>$ast $ </tex-math></inline-formula>-reducible). Moreover, we show that the decomposition method also applies to shift-invariant maps, by establishing a connection between the <inline-formula> <tex-math>$ast $ </tex-math></inline-formula>-product of Boolean functions and the composition of shift-invariant maps.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 10","pages":"8029-8047"},"PeriodicalIF":2.9,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145110338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Transactions on Information Theory Information for Authors IEEE信息理论汇刊:作者信息
IF 2.2 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-07-24 DOI: 10.1109/TIT.2025.3583661
{"title":"IEEE Transactions on Information Theory Information for Authors","authors":"","doi":"10.1109/TIT.2025.3583661","DOIUrl":"https://doi.org/10.1109/TIT.2025.3583661","url":null,"abstract":"","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 8","pages":"C3-C3"},"PeriodicalIF":2.2,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11095974","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144695536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Transactions on Information Theory Publication Information IEEE信息论学报,出版信息
IF 2.2 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-07-24 DOI: 10.1109/TIT.2025.3583663
{"title":"IEEE Transactions on Information Theory Publication Information","authors":"","doi":"10.1109/TIT.2025.3583663","DOIUrl":"https://doi.org/10.1109/TIT.2025.3583663","url":null,"abstract":"","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 8","pages":"C2-C2"},"PeriodicalIF":2.2,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11095972","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144695537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Information Theory
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1