{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T04:56:25Z","timestamp":1771476985240,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,11,5]],"date-time":"2024-11-05T00:00:00Z","timestamp":1730764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,5]],"date-time":"2024-11-05T00:00:00Z","timestamp":1730764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"crossref","award":["BK20230867"],"award-info":[{"award-number":["BK20230867"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"crossref","award":["12171241"],"award-info":[{"award-number":["12171241"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Postgraduate Research & Practice Innovation Program of Jiangsu Province","award":["KYCX23_0345"],"award-info":[{"award-number":["KYCX23_0345"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s10623-024-01513-8","type":"journal-article","created":{"date-parts":[[2024,11,5]],"date-time":"2024-11-05T15:56:11Z","timestamp":1730822171000},"page":"197-225","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Generalized bilateral multilevel construction for constant dimension codes"],"prefix":"10.1007","volume":"93","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5890-4035","authenticated-orcid":false,"given":"Xiaoqin","family":"Hong","sequence":"first","affiliation":[]},{"given":"Xiwang","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Gaojun","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,5]]},"reference":[{"issue":"10","key":"1513_CR1","doi-asserted-by":"publisher","first-page":"6204","DOI":"10.1109\/TIT.2019.2926256","volume":"65","author":"J Antrobus","year":"2019","unstructured":"Antrobus J., Gluesing-Luerssen H.: Maximal Ferrers diagram codes: constructions and genericity considerations. IEEE Trans. Inf. Theory 65(10), 6204\u20136223 (2019).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"9","key":"1513_CR2","doi-asserted-by":"publisher","first-page":"5317","DOI":"10.1109\/TIT.2020.2975776","volume":"66","author":"H Chen","year":"2020","unstructured":"Chen H., He X., Weng J., Xu L.: New constructions of subspace codes using subsets of MRD codes in several blocks. IEEE Trans. Inf. Theory 66(9), 5317\u20135321 (2020).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"1513_CR3","first-page":"536","volume":"17","author":"A Cossidente","year":"2023","unstructured":"Cossidente A., Kurz S., Marino G., Pavese F.: Combining subspace codes. Adv. Math. Commun. 17(3), 536\u2013550 (2023).","journal-title":"Math. Commun."},{"issue":"6","key":"1513_CR4","doi-asserted-by":"publisher","first-page":"1073","DOI":"10.1007\/s00493-016-3354-5","volume":"37","author":"A Cossidente","year":"2017","unstructured":"Cossidente A., Pavese F.: Subspace codes in PG(2n\u20131, q). Combinatorica 37(6), 1073\u20131095 (2017).","journal-title":"Combinatorica"},{"issue":"3","key":"1513_CR5","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/0097-3165(78)90015-8","volume":"25","author":"P Delsarte","year":"1978","unstructured":"Delsarte P.: Bilinear forms over a finite field, with applications to coding theory. J. Combin. Theory Ser. A 25(3), 226\u2013241 (1978).","journal-title":"J. Combin. Theory Ser. A"},{"issue":"4","key":"1513_CR6","doi-asserted-by":"publisher","first-page":"1616","DOI":"10.1109\/TIT.2016.2522971","volume":"62","author":"T Etzion","year":"2016","unstructured":"Etzion T., Gorla E., Ravagnani A., Wachter-Zeh A.: Optimal Ferrers diagram rank-metric codes. IEEE Trans. Inf. Theory 62(4), 1616\u20131630 (2016).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"7","key":"1513_CR7","doi-asserted-by":"publisher","first-page":"2909","DOI":"10.1109\/TIT.2009.2021376","volume":"55","author":"T Etzion","year":"2009","unstructured":"Etzion T., Silberstein N.: Error-correcting codes in projective spaces via rank-metric codes and Ferrers diagrams. IEEE Trans. Inf. Theory 55(7), 2909\u20132919 (2009).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"1513_CR8","doi-asserted-by":"publisher","first-page":"1004","DOI":"10.1109\/TIT.2012.2220119","volume":"59","author":"T Etzion","year":"2013","unstructured":"Etzion T., Silberstein N.: Codes and designs related to lifted MRD codes. IEEE Trans. Inf. Theory 59(2), 1004\u20131017 (2013).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"1513_CR9","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.1109\/TIT.2010.2095232","volume":"57","author":"T Etzion","year":"2011","unstructured":"Etzion T., Vardy A.: Error-correcting codes in projective space. IEEE Trans. Inf. Theory 57(2), 1165\u20131173 (2011).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"1513_CR10","first-page":"3","volume":"21","author":"\u00c8M Gabidulin","year":"1985","unstructured":"Gabidulin \u00c8.M.: Theory of codes with maximum rank distance. Problemy Peredachi Informat. 21(1), 3\u201316 (1985).","journal-title":"Problemy Peredachi Informat."},{"issue":"3","key":"1513_CR11","doi-asserted-by":"publisher","first-page":"525","DOI":"10.3934\/amc.2016023","volume":"10","author":"H Gluesing-Luerssen","year":"2016","unstructured":"Gluesing-Luerssen H., Troha C.: Construction of subspace codes through linkage. Adv. Math. Commun. 10(3), 525\u2013540 (2016).","journal-title":"Adv. Math. Commun."},{"issue":"7","key":"1513_CR12","doi-asserted-by":"publisher","first-page":"Art. no. 175013","DOI":"10.1142\/S0219498817501316","volume":"16","author":"E Gorla","year":"2017","unstructured":"Gorla E., Ravagnani A.: Subspace codes from Ferrers diagrams. J. Algebra Appl. 16(7), Art. no. 1750131 (2017).","journal-title":"J. Algebra Appl."},{"issue":"11","key":"1513_CR13","doi-asserted-by":"publisher","first-page":"2392","DOI":"10.1109\/LCOMM.2020.3012488","volume":"24","author":"X He","year":"2020","unstructured":"He X.: Construction of constant dimension codes from two parallel versions of linkage construction. IEEE Commun. Lett. 24(11), 2392\u20132395 (2020).","journal-title":"IEEE Commun. Lett."},{"issue":"12","key":"1513_CR14","doi-asserted-by":"publisher","first-page":"2991","DOI":"10.1007\/s10623-022-01065-9","volume":"90","author":"X He","year":"2022","unstructured":"He X., Chen Y., Zhang Z., Zhou K.: Parallel sub-code construction for constant-dimension codes. Des. Codes Cryptogr. 90(12), 2991\u20133001 (2022).","journal-title":"Des. Codes Cryptogr."},{"issue":"2","key":"1513_CR15","doi-asserted-by":"publisher","first-page":"705","DOI":"10.1109\/TIT.2020.3038272","volume":"67","author":"D Heinlein","year":"2021","unstructured":"Heinlein D.: Generalized linkage construction for constant-dimension codes. IEEE Trans. Inf. Theory 67(2), 705\u2013715 (2021).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1513_CR16","unstructured":"Heinlein, D., Kiermaier, M., Kurz, S., Wassermann, A.: Tables of subspace codes (2016). arXiv:1601.02864."},{"issue":"12","key":"1513_CR17","doi-asserted-by":"publisher","first-page":"7651","DOI":"10.1109\/TIT.2017.2753822","volume":"63","author":"D Heinlein","year":"2017","unstructured":"Heinlein D., Kurz S.: Coset construction for subspace codes. IEEE Trans. Inf. Theory 63(12), 7651\u20137660 (2017).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"1513_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12095-022-00590-7","volume":"15","author":"X Hong","year":"2023","unstructured":"Hong X., Cao X.: Generalized block inserting for constructing new constant dimension codes. Cryptogr. Commun. 15(1), 1\u201315 (2023).","journal-title":"Cryptogr. Commun."},{"issue":"2","key":"1513_CR19","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/s10623-022-01117-0","volume":"91","author":"X Hong","year":"2023","unstructured":"Hong X., Cao X.: Improved generalized block inserting construction of constant dimension codes. Des. Codes Cryptogr. 91(2), 475\u2013495 (2023).","journal-title":"Des. Codes Cryptogr."},{"key":"1513_CR20","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.dam.2024.05.023","volume":"356","author":"X Hong","year":"2024","unstructured":"Hong X., Cao X.: New constant dimension subspace codes from improved parallel subcode construction. Discret. Appl. Math. 356, 142\u2013148 (2024).","journal-title":"Discret. Appl. Math."},{"issue":"8","key":"1513_CR21","doi-asserted-by":"publisher","first-page":"3579","DOI":"10.1109\/TIT.2008.926449","volume":"54","author":"R K\u00f6etter","year":"2008","unstructured":"K\u00f6etter R., Kschischang F.R.: Coding for errors and erasures in random network coding. IEEE Trans. Inf. Theory 54(8), 3579\u20133591 (2008).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1513_CR22","unstructured":"Kurz, S.: Lifted codes and the multilevel construction for constant dimension codes. arXiv:2004.14241v1 (2020)."},{"issue":"4","key":"1513_CR23","doi-asserted-by":"publisher","first-page":"956","DOI":"10.3934\/amc.2022039","volume":"18","author":"H Lao","year":"2024","unstructured":"Lao H., Chen H.: New constant dimension subspace codes from multilevel linkage construction. Adv. Math. Commun. 18(4), 956\u2013966 (2024).","journal-title":"Adv. Math. Commun."},{"issue":"7","key":"1513_CR24","doi-asserted-by":"publisher","first-page":"4333","DOI":"10.1109\/TIT.2023.3255929","volume":"69","author":"H Lao","year":"2023","unstructured":"Lao H., Chen H., Li F., Lyu S.: New constant dimension subspace codes from the mixed dimension construction. IEEE Trans. Inf. Theory 69(7), 4333\u20134344 (2023).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"1513_CR25","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/s12095-021-00524-9","volume":"14","author":"H Lao","year":"2022","unstructured":"Lao H., Chen H., Tan X.: New constant dimension subspace codes from block inserting constructions. Cryptogr. Commun. 14(1), 87\u201399 (2022).","journal-title":"Cryptogr. Commun."},{"issue":"5","key":"1513_CR26","doi-asserted-by":"publisher","first-page":"1760","DOI":"10.1109\/TIT.2019.2950299","volume":"66","author":"F Li","year":"2020","unstructured":"Li F.: Construction of constant dimension subspace codes by modifying linkage construction. IEEE Trans. Inf. Theory 66(5), 1760\u20131764 (2020).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"7","key":"1513_CR27","doi-asserted-by":"publisher","first-page":"4115","DOI":"10.1109\/TIT.2019.2894401","volume":"65","author":"S Liu","year":"2019","unstructured":"Liu S., Chang Y., Feng T.: Constructions for optimal Ferrers diagram rank-metric codes. IEEE Trans. Inf. Theory 65(7), 4115\u20134130 (2019).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1513_CR28","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.laa.2019.07.011","volume":"581","author":"S Liu","year":"2019","unstructured":"Liu S., Chang Y., Feng T.: Several classes of optimal Ferrers diagram rank-metric codes. Linear Algebra Appl. 581, 128\u2013144 (2019).","journal-title":"Linear Algebra Appl."},{"issue":"11","key":"1513_CR29","doi-asserted-by":"publisher","first-page":"6884","DOI":"10.1109\/TIT.2020.3004315","volume":"66","author":"S Liu","year":"2020","unstructured":"Liu S., Chang Y., Feng T.: Parallel multilevel constructions for constant dimension codes. IEEE Trans. Inf. Theory 66(11), 6884\u20136897 (2020).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"1513_CR30","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1109\/TIT.2022.3200052","volume":"69","author":"S Liu","year":"2023","unstructured":"Liu S., Ji L.: Double multilevel constructions for constant dimension codes. IEEE Trans. Inf. Theory 69(1), 157\u2013168 (2023).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1513_CR31","volume":"446","author":"M Niu","year":"2023","unstructured":"Niu M., Xiao J., Gao Y.: New constructions of constant dimension codes by improved inserting construction. Appl. Math. Comput. 446, 127885 (2023).","journal-title":"Appl. Math. Comput."},{"issue":"4","key":"1513_CR32","doi-asserted-by":"publisher","first-page":"1066","DOI":"10.1109\/LCOMM.2020.3046042","volume":"25","author":"Y Niu","year":"2021","unstructured":"Niu Y., Yue Q., Huang D.: New constant dimension subspace codes from generalized inserting construction. IEEE Commun. Lett. 25(4), 1066\u20131069 (2021).","journal-title":"IEEE Commun. Lett."},{"issue":"2","key":"1513_CR33","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/s12095-021-00504-z","volume":"14","author":"Y Niu","year":"2022","unstructured":"Niu Y., Yue Q., Huang D.: New constant dimension subspace codes from parallel linkage construction and multilevel construction. Cryptogr. Commun. 14(2), 201\u2013214 (2022).","journal-title":"Cryptogr. Commun."},{"issue":"6","key":"1513_CR34","doi-asserted-by":"publisher","first-page":"1045","DOI":"10.1007\/s00200-021-00537-0","volume":"34","author":"Y Niu","year":"2023","unstructured":"Niu Y., Yue Q., Huang D.: Construction of constant dimension codes via improved inserting construction. Appl. Algebr. Eng. Commun. Comuput. 34(6), 1045\u20131062 (2023).","journal-title":"Appl. Algebr. Eng. Commun. Comuput."},{"issue":"7","key":"1513_CR35","doi-asserted-by":"publisher","first-page":"3937","DOI":"10.1109\/TIT.2015.2435743","volume":"61","author":"N Silberstein","year":"2015","unstructured":"Silberstein N., Trautmann A.-L.: Subspace codes based on graph matchings, Ferrers diagrams, and pending blocks. IEEE Trans. Inf. Theory 61(7), 3937\u20133953 (2015).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"9","key":"1513_CR36","doi-asserted-by":"publisher","first-page":"3951","DOI":"10.1109\/TIT.2008.928291","volume":"54","author":"D Silva","year":"2008","unstructured":"Silva D., Kschischang F.R., K\u00f6tter R.: A rank-metric approach to error control in random network coding. IEEE Trans. Inf. Theory 54(9), 3951\u20133967 (2008).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1513_CR37","unstructured":"Trautmann, A.-L., Rosenthal, J.: New improvements on the Echelon\u2013Ferrers construction. In: Proceedings of the International Symposium on Mathematical Theory of Networks and Systems, pp. 405\u2013408 (2010)."},{"issue":"2","key":"1513_CR38","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s10623-008-9221-7","volume":"50","author":"S Xia","year":"2009","unstructured":"Xia S., Fu F.: Johnson type bounds on constant dimension codes. Des. Codes Cryptogr. 50(2), 163\u2013172 (2009).","journal-title":"Des. Codes Cryptogr."},{"issue":"9","key":"1513_CR39","doi-asserted-by":"publisher","first-page":"6315","DOI":"10.1109\/TIT.2018.2839596","volume":"64","author":"L Xu","year":"2018","unstructured":"Xu L., Chen H.: New constant-dimension subspace codes from maximum rank distance codes. IEEE Trans. Inf. Theory 64(9), 6315\u20136319 (2018).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"1513_CR40","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.3934\/amc.2022056","volume":"16","author":"S Yu","year":"2022","unstructured":"Yu S., Ji L., Liu S.: Bilateral multilevel construction of constant dimension codes. Adv. Math. Commun. 16(4), 1165\u20131183 (2022).","journal-title":"Adv. Math. Commun."},{"issue":"1","key":"1513_CR41","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/s10623-018-0491-4","volume":"87","author":"T Zhang","year":"2019","unstructured":"Zhang T., Ge G.: Constructions of optimal Ferrers diagram rank metric codes. Des. Codes Cryptogr. 87(1), 107\u2013121 (2019).","journal-title":"Des. Codes Cryptogr."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-024-01513-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-024-01513-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-024-01513-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T17:10:55Z","timestamp":1737565855000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-024-01513-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,5]]},"references-count":41,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["1513"],"URL":"https:\/\/doi.org\/10.1007\/s10623-024-01513-8","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,5]]},"assertion":[{"value":"19 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 July 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 October 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 November 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"The authors declare that there is no conflict of interest in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}