{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:00:08Z","timestamp":1772283608561,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,1,4]],"date-time":"2019-01-04T00:00:00Z","timestamp":1546560000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Syst Sci Complex"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s11424-018-7414-3","type":"journal-article","created":{"date-parts":[[2019,1,9]],"date-time":"2019-01-09T23:39:45Z","timestamp":1547077185000},"page":"947-969","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Complete Weight Enumerator for a Class of Linear Codes from Defining Sets and Their Applications"],"prefix":"10.1007","volume":"32","author":[{"given":"Haibo","family":"Liu","sequence":"first","affiliation":[]},{"given":"Qunying","family":"Liao","sequence":"additional","affiliation":[]},{"given":"Xiaofeng","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,4]]},"reference":[{"issue":"1","key":"7414_CR1","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.tcs.2004.09.011","volume":"330","author":"C S Ding","year":"2005","unstructured":"Ding C S and Wang X, A coding theory construction of new systematic authentication codes, Theor. Comput. Sci., 2005, 330(1): 81\u201399.","journal-title":"Theor. Comput. Sci."},{"issue":"2","key":"7414_CR2","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1023\/A:1026421315292","volume":"15","author":"R Anderson","year":"1998","unstructured":"Anderson R, Ding C S, Helleseth T, et al., How to build robust shared control systems, Des. Codes Cryptogr., 1998, 15(2): 111\u2013124.","journal-title":"Des. Codes Cryptogr."},{"issue":"6","key":"7414_CR3","doi-asserted-by":"publisher","first-page":"2089","DOI":"10.1109\/TIT.2005.847722","volume":"51","author":"C Carlet","year":"2005","unstructured":"Carlet C, Ding C S, and Yuan J, Linear codes from perfect nonlinear mappings and their secret sharing schemes, IEEE Trans. Inf. Theory, 2005, 51(6): 2089\u20132102.","journal-title":"IEEE Trans. Inf. Theory"},{"key":"7414_CR4","first-page":"143","volume":"39","author":"A R Calderbank","year":"1984","unstructured":"Calderbank A R and Goethals J M, Three-weight codes and association schemes, Philips J. Res., 1984, 39: 143\u2013152.","journal-title":"Philips J. Res."},{"issue":"1","key":"7414_CR5","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/s10623-015-0136-9","volume":"81","author":"C J Li","year":"2016","unstructured":"Li C J, Bae S, Ahn J, et al., Complete weight enumerators of some linear codes and their applications, Des. Codes Cryptogr., 2016, 81(1): 153\u2013168.","journal-title":"Des. Codes Cryptogr."},{"issue":"11","key":"7414_CR6","doi-asserted-by":"publisher","first-page":"5835","DOI":"10.1109\/TIT.2015.2473861","volume":"61","author":"K L Ding","year":"2015","unstructured":"Ding K L and Ding C S, A class of two-weight and three-weight codes and their applications in secret sharing, IEEE Trans. Inf. Theory, 2015, 61(11): 5835\u20135842.","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"6","key":"7414_CR7","first-page":"912","volume":"154","author":"W Chu","year":"2006","unstructured":"Chu W, Colbourn C J, and Dukes P, On constant composition codes, J. Combin. Mathe. Combin. Comput., 2006, 154(6): 912\u2013929.","journal-title":"J. Combin. Mathe. Combin. Comput."},{"issue":"6","key":"7414_CR8","doi-asserted-by":"publisher","first-page":"3265","DOI":"10.1109\/TIT.2015.2420118","volume":"61","author":"C S Ding","year":"2015","unstructured":"Ding C S, Linear codes from some 2-designs, IEEE Trans. Inf. Theory, 2015, 61(6): 3265\u20133275.","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"7414_CR9","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1016\/j.disc.2012.11.009","volume":"313","author":"C S Ding","year":"2013","unstructured":"Ding C S and Yang J, Hamming weights in irreducible cyclic codes, Discret. Math., 2013, 313(4): 434\u2013446.","journal-title":"Discret. Math."},{"issue":"12","key":"7414_CR10","doi-asserted-by":"publisher","first-page":"7940","DOI":"10.1109\/TIT.2013.2281205","volume":"59","author":"C S Ding","year":"2013","unstructured":"Ding C S, Gao Y, and Zhou Z C, Five families of three-weight ternary cyclic codes and their duals, IEEE Trans. Inf. Theory, 2013, 59(12): 7940\u20137946.","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"7414_CR11","doi-asserted-by":"publisher","first-page":"663","DOI":"10.1007\/s10623-016-0191-x","volume":"82","author":"S D Yang","year":"2017","unstructured":"Yang S D and Zheng A Y, Complete weight enumerators of a family of three-weight linear codes, Des. Codes Cryptogr., 2017, 82(3): 663\u2013674.","journal-title":"Des. Codes Cryptogr."},{"issue":"6","key":"7414_CR12","doi-asserted-by":"publisher","first-page":"2229","DOI":"10.1109\/TIT.2007.896872","volume":"53","author":"C S Ding","year":"2007","unstructured":"Ding C S, Helleseth T, Kl\u00f3ve T, et al., A general construction of authentication codes, IEEE Trans. Inf. Theory, 2007, 53(6): 2229\u20132235.","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"5","key":"7414_CR13","doi-asserted-by":"publisher","first-page":"2018","DOI":"10.1109\/TIT.2006.872854","volume":"52","author":"T Helleseth","year":"2006","unstructured":"Helleseth T and Kholosha A, Monomial and quadratic bent functions over the finite fields of odd characteristic, IEEE Trans. Inf. Theory, 2006, 52(5): 2018\u20132032.","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"7414_CR14","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/s10623-016-0205-8","volume":"81","author":"J Ahn","year":"2017","unstructured":"Ahn J, Ka D, and Li C J, Complete weight enumerators of a class of linear codes, Des. Codes Cryptogr., 2017, 81(1): 83\u201399.","journal-title":"Des. Codes Cryptogr."},{"issue":"12","key":"7414_CR15","doi-asserted-by":"publisher","first-page":"2275","DOI":"10.1016\/j.disc.2015.05.016","volume":"338","author":"S Bae","year":"2015","unstructured":"Bae S, Li C J, and Yue Q, On the complete weight enumerators of some reducible cyclic codes, Discret. Math., 2015, 338(12): 2275\u20132287.","journal-title":"Discret. Math."},{"issue":"2","key":"7414_CR16","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1137\/0404016","volume":"4","author":"I F Blake","year":"1991","unstructured":"Blake I F and Kith K, On the complete weight enumerator of Reed-Solomon codes, Siam Jour. on Discret. Math., 1991, 4(2): 164\u2013171.","journal-title":"Siam Jour. on Discret. Math."},{"issue":"1","key":"7414_CR17","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/S0166-218X(00)00348-6","volume":"111","author":"A Kuzmin","year":"2001","unstructured":"Kuzmin A and Nechaev A, Complete weight enumerators of generalized Kerdock code and related linear codes over Galois ring, Discret. Appl. Math., 2001, 111(1): 117\u2013137.","journal-title":"Discret. Appl. Math."},{"issue":"2","key":"7414_CR18","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/s10623-015-0091-5","volume":"80","author":"C J Li","year":"2016","unstructured":"Li C J, Yue Q, and Fu F W, Complete weight enumerators of some cyclic codes, Des. Codes Cryptogr., 2016, 80(2): 295\u2013315.","journal-title":"Des. Codes Cryptogr."},{"issue":"1\u20132","key":"7414_CR19","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1007\/s12190-016-1058-z","volume":"55","author":"F Li","year":"2017","unstructured":"Li F, Wang Q Y, and Lin D D, Complete weight enumerators of a class of three-weight linear codes, J. Appl. Math. Comput., 2017, 55(1\u20132): 733\u2013747.","journal-title":"J. Appl. Math. Comput."},{"issue":"1","key":"7414_CR20","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s12095-016-0187-4","volume":"9","author":"S D Yang","year":"2017","unstructured":"Yang S D, Zheng A Y, and Zhao C A, A class of three-weight linear codes and their complete weight enumerators, Cryptogr. Commun., 2017, 9(1): 133\u2013149.","journal-title":"Cryptogr. Commun."},{"key":"7414_CR21","doi-asserted-by":"publisher","first-page":"729","DOI":"10.1016\/j.disc.2016.11.029","volume":"340","author":"S D Yang","year":"2017","unstructured":"Yang S D and Zheng A Y, Complete weight enumerators of a class of linear codes, Discret. Math., 2017, 340: 729\u2013739.","journal-title":"Discret. Math."},{"key":"7414_CR22","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.ffa.2017.08.001","volume":"48","author":"S D Yang","year":"2017","unstructured":"Yang S D, Kong, X L, and Tang C M, A construction of linear codes and their complete weight enumerators, Finite Fields Appl., 2017, 48: 196\u2013226.","journal-title":"Finite Fields Appl."},{"issue":"4","key":"7414_CR23","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/s00200-015-0255-6","volume":"26","author":"S D Yang","year":"2015","unstructured":"Yang S D, Zheng A Y, and Chang A Z, The weight enumerator of the duals of a class of cyclic codes with three zeros, Applicable Algebra in Engineering Communication and Computing, 2015, 26(4): 347\u2013367.","journal-title":"Applicable Algebra in Engineering Communication and Computing"},{"key":"7414_CR24","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.ffa.2016.11.004","volume":"44","author":"S D Yang","year":"2017","unstructured":"Yang S D, Zheng A Y, and Chang A Z, The weight distribution of two classes of p-ary cyclic codes with few weights, Finite Fields Appl., 2017, 44: 76\u201391.","journal-title":"Finite Fields Appl."},{"issue":"11","key":"7414_CR25","doi-asserted-by":"publisher","first-page":"1879","DOI":"10.1109\/LCOMM.2014.2361516","volume":"18","author":"K L Ding","year":"2014","unstructured":"Ding K L and Ding C S, Binary linear codes with three weights, IEEE Commun. Lett., 2014, 18(11): 1879\u20131882.","journal-title":"IEEE Commun. Lett."},{"key":"7414_CR26","volume-title":"Discret. Appl. Math.","author":"F Li","year":"2017","unstructured":"Li F, Wang Q Y, and Lin D D, A class of three-weight and five-weight linear codes, Discret. Appl. Math., 2017, arXiv: 1509.06242v1."},{"issue":"7","key":"7414_CR27","doi-asserted-by":"publisher","first-page":"1097","DOI":"10.1109\/LCOMM.2015.2431253","volume":"19","author":"Q Wang","year":"2015","unstructured":"Wang Q, Ding K L, and Xue R, Binary linear codes with two weights, IEEE Commun. Lett., 2015, 19(7): 1097\u20131100.","journal-title":"IEEE Commun. Lett."},{"key":"7414_CR28","volume-title":"Finite Fields","author":"R Lidl","year":"1997","unstructured":"Lidl R, Niederreiter H, and Cohn F M, Finite Fields, Cambridge University Press, Cambridge 1997."},{"issue":"1","key":"7414_CR29","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1109\/TIT.2005.860412","volume":"52","author":"J Yuan","year":"2006","unstructured":"Yuan J and Ding C S, Secret sharing schemes from three classes of linear codes, IEEE Trans. Inf. Theory, 2006, 52(1): 206\u2013212.","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"10","key":"7414_CR30","doi-asserted-by":"publisher","first-page":"3668","DOI":"10.1109\/TIT.2005.855609","volume":"51","author":"C S Ding","year":"2015","unstructured":"Ding C S and Yuan J, A family of optimal constant-composition codes, IEEE Trans. Inf. Theory, 2015, 51(10): 3668\u20133671.","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"10","key":"7414_CR31","doi-asserted-by":"publisher","first-page":"3671","DOI":"10.1109\/TIT.2005.855612","volume":"51","author":"C S Ding","year":"2005","unstructured":"Ding C S and Yin J, Combinatorial constructions of optimal constant-composition codes, IEEE Trans. Inf. Theory, 2005, 51(10): 3671\u20133674.","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"11","key":"7414_CR32","doi-asserted-by":"publisher","first-page":"3010","DOI":"10.1109\/TIT.2003.819339","volume":"49","author":"Y Luo","year":"2003","unstructured":"Luo Y, Fu F W, Vinck A H, et al., On constant-composition codes over Zp, IEEE Trans. Inf. Theory, 2003, 49(11): 3010\u20133016.","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"7414_CR33","first-page":"239","volume":"7","author":"R S Rees","year":"1996","unstructured":"Rees R S and Stinson D R, Combinatorial characterizations of authentication codes II, Des. Codes Cryptogr., 1996, 7(3): 239\u2013259.","journal-title":"Des. Codes Cryptogr."}],"container-title":["Journal of Systems Science and Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-018-7414-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11424-018-7414-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-018-7414-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,3]],"date-time":"2020-01-03T19:12:51Z","timestamp":1578078771000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11424-018-7414-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,4]]},"references-count":33,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["7414"],"URL":"https:\/\/doi.org\/10.1007\/s11424-018-7414-3","relation":{},"ISSN":["1009-6124","1559-7067"],"issn-type":[{"value":"1009-6124","type":"print"},{"value":"1559-7067","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,4]]},"assertion":[{"value":"4 December 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 April 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 January 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}