Lifeng Lai

Orcid: 0000-0002-9493-8248

According to our database1, Lifeng Lai authored at least 219 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Camouflage Adversarial Attacks on Multiple Agent Systems.
CoRR, 2024

2023
Bayesian Two-Stage Sequential Change Diagnosis via Sensor Arrays.
IEEE Trans. Inf. Theory, November, 2023

Guest Editorial: AI-Powered Telco Network Automation: 5G Evolution and 6G.
IEEE Wirel. Commun., February, 2023

Fairness-Aware Regression Robust to Adversarial Attacks.
IEEE Trans. Signal Process., 2023

Action Poisoning Attacks on Linear Contextual Bandits.
Trans. Mach. Learn. Res., 2023

Optimal Cost Constrained Adversarial Attacks For Multiple Agent Systems.
CoRR, 2023

Minimax Optimal Q Learning with Nearest Neighbors.
CoRR, 2023

Efficient Action Robust Reinforcement Learning with Probabilistic Policy Execution Uncertainty.
CoRR, 2023

Efficient Adversarial Attacks on Online Multi-agent Reinforcement Learning.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Distributed Dual Coordinate Ascent With Imbalanced Data on a General Tree Network.
Proceedings of the 33rd IEEE International Workshop on Machine Learning for Signal Processing, 2023

Entropy Rate Estimation for Markov Chains with Continuous Distributions.
Proceedings of the IEEE International Symposium on Information Theory, 2023

Adversarially Robust Fairness-Aware Regression.
Proceedings of the IEEE International Conference on Acoustics, 2023

2022
Machine Learning Algorithms - Adversarial Robustness in Signal Processing
Wireless Networks, Springer, ISBN: 978-3-031-16374-6, 2022

Optimal Accuracy-Privacy Trade-Off of Inference as Service.
IEEE Trans. Signal Process., 2022

Analysis of KNN Density Estimation.
IEEE Trans. Inf. Theory, 2022

Efficiently Escaping Saddle Points in Bilevel Optimization.
CoRR, 2022

On the local delay and energy efficiency under decoupled uplink and downlink in HetNets.
Sci. China Inf. Sci., 2022

Dynamic Content Caching Based on Actor-Critic Reinforcement Learning for IoT Systems.
Proceedings of the 96th Vehicular Technology Conference, 2022

Privacy Protection In Learning Fair Representations.
Proceedings of the IEEE International Conference on Acoustics, 2022

Policy Gradient Based Entropic-VaR Optimization in Risk-Sensitive Reinforcement Learning.
Proceedings of the 58th Annual Allerton Conference on Communication, 2022

Risk-Sensitive Reinforcement Learning Via Entropic- VaR Optimization.
Proceedings of the 56th Asilomar Conference on Signals, Systems, and Computers, ACSSC 2022, Pacific Grove, CA, USA, October 31, 2022

2021
CQI-Based Interference Detection and Resource Allocation With QoS Provision in LTE-U Systems.
IEEE Trans. Veh. Technol., 2021

Two-Stage Bayesian Sequential Change Diagnosis.
IEEE Trans. Signal Process., 2021

Optimal Feature Manipulation Attacks Against Linear Regression.
IEEE Trans. Signal Process., 2021

On the Adversarial Robustness of LASSO Based Feature Selection.
IEEE Trans. Signal Process., 2021

On the Adversarial Robustness of Hypothesis Testing.
IEEE Trans. Signal Process., 2021

Robust Low-Rank Matrix Completion via an Alternating Manifold Proximal Gradient Continuation Method.
IEEE Trans. Signal Process., 2021

Minimax Rate Optimal Adaptive Nearest Neighbor Classification and Regression.
IEEE Trans. Inf. Theory, 2021

Distributed Dual Coordinate Ascent in General Tree Networks and Communication Network Effect on Synchronous Machine Learning.
IEEE J. Sel. Areas Commun., 2021

Efficient Action Poisoning Attacks on Linear Contextual Bandits.
CoRR, 2021

On the Convergence of Projected Alternating Maximization for Equitable and Optimal Transport.
CoRR, 2021

Optimal Stochastic Nonconvex Optimization with Bandit Feedback.
CoRR, 2021

Ultra-reliable and low-latency communications: applications, opportunities and challenges.
Sci. China Inf. Sci., 2021

Provably Efficient Black-Box Action Poisoning Attacks Against Reinforcement Learning.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

A Deep Q-Network Based Approach for Online Bayesian Change Point Detection.
Proceedings of the 2021 IEEE 31st International Workshop on Machine Learning for Signal Processing (MLSP), 2021

Bayesian Two-Stage Sequential Change Diagnosis Via Multi-Sensor Array.
Proceedings of the 2021 IEEE 31st International Workshop on Machine Learning for Signal Processing (MLSP), 2021

On the Convergence Rates of KNN Density Estimation.
Proceedings of the IEEE International Symposium on Information Theory, 2021

Projection Robust Wasserstein Barycenters.
Proceedings of the 38th International Conference on Machine Learning, 2021

A Riemannian Block Coordinate Descent Method for Computing the Projection Robust Wasserstein Distance.
Proceedings of the 38th International Conference on Machine Learning, 2021

On The Adversarial Robustness of Principal Component Analysis.
Proceedings of the IEEE International Conference on Acoustics, 2021

Privacy-Accuracy Trade-Off of Inference as Service.
Proceedings of the IEEE International Conference on Acoustics, 2021

Efficient Classification with Adaptive KNN.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Action-Manipulation Attacks Against Stochastic Bandits: Attacks and Defense.
IEEE Trans. Signal Process., 2020

On the Adversarial Robustness of Subspace Learning.
IEEE Trans. Signal Process., 2020

Distributed Approximate Newton's Method Robust to Byzantine Attackers.
IEEE Trans. Signal Process., 2020

Minimax Optimal Estimation of KL Divergence for Continuous Distributions.
IEEE Trans. Inf. Theory, 2020

Analysis of KNN Information Estimators for Smooth Distributions.
IEEE Trans. Inf. Theory, 2020

On the Adversarial Robustness of Robust Estimators.
IEEE Trans. Inf. Theory, 2020

Interference Detection and Resource Allocation in LTE Unlicensed Systems.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

On the Adversarial Robustness of Linear Regression.
Proceedings of the 30th IEEE International Workshop on Machine Learning for Signal Processing, 2020

On the Adversarial Robustness of Feature Selection Using LASSO.
Proceedings of the 30th IEEE International Workshop on Machine Learning for Signal Processing, 2020

Analysis of K Nearest Neighbor KL Divergence Estimation for Continuous Distributions.
Proceedings of the IEEE International Symposium on Information Theory, 2020

Optimal Two-Stage Bayesian Sequential Change Diagnosis.
Proceedings of the IEEE International Symposium on Information Theory, 2020

Action-Manipulation Attacks on Stochastic Bandits.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

2019
Toward Ultrareliable Low-Latency Communications: Typical Scenarios, Possible Solutions, and Open Issues.
IEEE Veh. Technol. Mag., 2019

Online Change-Point Detection of Linear Regression Models.
IEEE Trans. Signal Process., 2019

Distributed Gradient Descent Algorithm Robust to an Arbitrary Number of Byzantine Attackers.
IEEE Trans. Signal Process., 2019

On Function Computation With Privacy and Secrecy Constraints.
IEEE Trans. Inf. Theory, 2019

On the Adversarial Robustness of Multivariate Robust Estimation.
CoRR, 2019

Towards Ultra-Reliable Low-Latency Communications: Typical Scenarios, Possible Solutions, and Open Issues.
CoRR, 2019

Minimax Regression via Adaptive Nearest Neighbor.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Generalized Distributed Dual Coordinate Ascent in a Tree Network for Machine Learning.
Proceedings of the IEEE International Conference on Acoustics, 2019

Secret Key and Private Key Capacities Over an Unauthenticated Public Channel.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

Adversarially Robust Hypothesis Testing.
Proceedings of the 53rd Asilomar Conference on Signals, Systems, and Computers, 2019

2018
Degraded Broadcast Channel With Secrecy Outside a Bounded Range.
IEEE Trans. Inf. Theory, 2018

Distributed Testing With Cascaded Encoders.
IEEE Trans. Inf. Theory, 2018

Keyless Authentication and Authenticated Capacity.
IEEE Trans. Inf. Theory, 2018

Efficient Byzantine Sequential Change Detection.
IEEE Trans. Inf. Theory, 2018

On Channel Selection for Carrier Aggregation Systems.
IEEE Trans. Commun., 2018

Coding and Bounds for Channel Estimation in Visible Light Communications and Positioning.
IEEE J. Sel. Areas Commun., 2018

How did Donald Trump Surprisingly Win the 2016 United States Presidential Election? an Information-Theoretic Perspective (Clean Sensing for Big Data Analytics: Optimal Strategies, Estimation Error Bounds Tighter than the Cramér-Rao Bound).
CoRR, 2018

On Private Lossy Function Computation.
Proceedings of the 19th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2018

Nonparametric Direct Entropy Difference Estimation.
Proceedings of the IEEE Information Theory Workshop, 2018

Combinational Code for Channel Estimation in Visible Light Communications and Positioning.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Quickest Change-Point Detection Over Multiple Data Streams via Sequential Observations.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Robust Distributed Gradient Descent with Arbitrary Number of Byzantine Attackers.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Communication efficient distributed learning with feature partitioned data.
Proceedings of the 52nd Annual Conference on Information Sciences and Systems, 2018

Quick Best Action Identification in Linear Bandit Problems.
Proceedings of the 52nd Asilomar Conference on Signals, Systems, and Computers, 2018

2017
On Rate Requirements for Achieving the Centralized Performance in Distributed Estimation.
IEEE Trans. Signal Process., 2017

Multi-Key Generation Over a Cellular Model With a Helper.
IEEE Trans. Inf. Theory, 2017

On the Sum-Rate Capacity of Poisson MISO Multiple Access Channels.
IEEE Trans. Inf. Theory, 2017

On Simultaneously Generating Multiple Keys in a Joint Source-Channel Model.
IEEE Trans. Inf. Forensics Secur., 2017

Sum-Rate Capacity of Poisson MIMO Multiple-Access Channels.
IEEE Trans. Commun., 2017

Multi-Chart Detection Procedure for Bayesian Quickest Change-Point Detection with Unknown Post-Change Parameters.
CoRR, 2017

Network Constrained Distributed Dual Coordinate Ascent for Machine Learning.
CoRR, 2017

Distributed identity testing with zero-rate compression.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Rate-distortion trade-offs in acquisition of signal parameters.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

Identifying correlated components in high-dimensional multivariate Gaussian models.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

On randomized distributed coordinate descent with quantized updates.
Proceedings of the 51st Annual Conference on Information Sciences and Systems, 2017

Function computation with privacy constraints.
Proceedings of the 51st Asilomar Conference on Signals, Systems, and Computers, 2017

2016
Channel Frequency Response-Based Secret Key Generation in Underwater Acoustic Systems.
IEEE Trans. Wirel. Commun., 2016

Quickest Sequential Multiband Spectrum Sensing With Mixed Observations.
IEEE Trans. Signal Process., 2016

Distributed Detection With Vector Quantizer.
IEEE Trans. Signal Inf. Process. over Networks, 2016

Compressed Hypothesis Testing: To Mix or Not to Mix?
CoRR, 2016

K-user degraded broadcast channel with secrecy outside a bounded range.
Proceedings of the 2016 IEEE Information Theory Workshop, 2016

Simultaneously generating multiple keys over a cascade of a noiseless channel and a wiretap channel.
Proceedings of the 2016 IEEE Information Theory Workshop, 2016

On the sum-rate capacity of non-symmetric Poisson multiple access channel.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Precise phase transition of total variation minimization.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

Online change detection of linear regression models.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

Bayesian quickest detection with unknown post-change parameter.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

Multiple key generation with restricted public discussion structure.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

On secure communication over the Z-Channel.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Keyless authentication over noisy channel.
Proceedings of the 50th Asilomar Conference on Signals, Systems and Computers, 2016

Distributed quickest detection with optional observations at the fusion center.
Proceedings of the 50th Asilomar Conference on Signals, Systems and Computers, 2016

Secret communication on the Z-Channel with cooperative receivers.
Proceedings of the 50th Asilomar Conference on Signals, Systems and Computers, 2016

2015
Multiple Change-Points Estimation in Linear Regression Models via Sparse Group Lasso.
IEEE Trans. Signal Process., 2015

An Information Theoretic Approach to Secret Sharing.
IEEE Trans. Inf. Theory, 2015

On the Capacity Bounds for Poisson Interference Channels.
IEEE Trans. Inf. Theory, 2015

Key Generation Algorithms for Pairwise Independent Networks Based on Graphical Models.
IEEE Trans. Inf. Theory, 2015

Optimal Power Allocation for Poisson Channels With Time-Varying Background Light.
IEEE Trans. Commun., 2015

Byzantine Fault Tolerant Distributed Quickest Change Detection.
SIAM J. Control. Optim., 2015

Broadcast Networks With Layered Decoding and Layered Secrecy: Theory and Applications.
Proc. IEEE, 2015

Degraded broadcast channel: Secrecy outside of a bounded range.
Proceedings of the 2015 IEEE Information Theory Workshop, 2015

Distributed testing against independence with conferencing encoders.
Proceedings of the 2015 IEEE Information Theory Workshop, 2015

Detection of correlated components in multivariate Gaussian models.
Proceedings of the 2015 IEEE Information Theory Workshop, 2015

Rate splitting and sharing for degraded broadcast channel with secrecy outside a bounded range.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Distributed testing with zero-rate compression.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Two-key generation for a cellular model with a helper.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Secret key capacity: Talk or keep silent?
Proceedings of the IEEE International Symposium on Information Theory, 2015

On the simulatability condition in key generation over a non-authenticated public channel.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Key generation with a Byzantine helper.
Proceedings of the IEEE International Conference on Communication, 2015

Change-point estimation in high dimensional linear regression models via sparse group Lasso.
Proceedings of the 53rd Annual Allerton Conference on Communication, 2015

Are Slepian-Wolf rates necessary for distributed parameter estimation?
Proceedings of the 53rd Annual Allerton Conference on Communication, 2015

2014
Behavior Propagation in Cognitive Radio Networks: A Social Network Approach.
IEEE Trans. Wirel. Commun., 2014

The Capacity Region of the Source-Type Model for Secret Key and Private Key Generation.
IEEE Trans. Inf. Theory, 2014

A Broadcast Approach for Fading Wiretap Channels.
IEEE Trans. Inf. Theory, 2014

Bayesian Quickest Change-Point Detection With Sampling Right Constraints.
IEEE Trans. Inf. Theory, 2014

Secret Key Generation in the Two-Way Relay Channel With Active Attackers.
IEEE Trans. Inf. Forensics Secur., 2014

Optimal Sequential Channel Estimation and Probing for Multiband Cognitive Radio Systems.
IEEE Trans. Commun., 2014

A Low-Complexity Sequential Spectrum Sensing Algorithm for Cognitive Radio.
IEEE J. Sel. Areas Commun., 2014

Key capacity region for a cellular source model.
Proceedings of the 2014 IEEE Information Theory Workshop, 2014

Layered secure broadcasting over MIMO channels and application in secret sharing.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Secret key-private key generation over three terminals: Capacity region.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Bayesian quickest detection with stochastic energy constraint.
Proceedings of the IEEE International Conference on Acoustics, 2014

On secret key generation from finite source observations.
Proceedings of the 48th Annual Conference on Information Sciences and Systems, 2014

On fading poisson channels with varying noise levels.
Proceedings of the 48th Annual Conference on Information Sciences and Systems, 2014

Distributed testing against independence with multiple terminals.
Proceedings of the 52nd Annual Allerton Conference on Communication, 2014

Helper-assisted asymmetric two key generation.
Proceedings of the 48th Asilomar Conference on Signals, Systems and Computers, 2014

Experimental study of secret key generation in underwater acoustic channels.
Proceedings of the 48th Asilomar Conference on Signals, Systems and Computers, 2014

2013
Non-Bayesian Quickest Change Detection With Stochastic Sample Right Constraints.
IEEE Trans. Signal Process., 2013

Fast Multiband Spectrum Scanning for Cognitive Radio Systems.
IEEE Trans. Commun., 2013

Guest Editorial: Signal Processing for Wireless Physical Layer Security.
IEEE J. Sel. Areas Commun., 2013

Quickest Change Point Detection and Identification Across a Generic Sensor Array
CoRR, 2013

Non-Bayesian Quickest Detection with Stochastic Sample Right Constraints
CoRR, 2013

Quickest Search over Multiple Sequences with Mixed Observation.
CoRR, 2013

Design and implementation of an Intelligent Portable Aerial Surveillance System (IPASS).
Proceedings of the 2013 IEEE Conference on Technologies for Practical Robot Applications, 2013

Layered decoding and secrecy over degraded broadcast channels.
Proceedings of the 14th IEEE Workshop on Signal Processing Advances in Wireless Communications, 2013

Simultaneously generating multiple keys in many to one networks.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Source coding with side information for error free perfect secrecy systems.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Quickest search over multiple sequences with mixed observations.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Non-Bayesian quickest detection with a stochastic energy constraint.
Proceedings of the IEEE International Conference on Acoustics, 2013

Quickest change detection and identification across a sensor array.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013

Bayesian quickest change point detection and localization in sensor networks.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013

Key generation in two-way relay wireless channels.
Proceedings of the 47th Annual Conference on Information Sciences and Systems, 2013

Optimal strategies in jamming resistant uncoordinated frequency hopping systems.
Proceedings of the 47th Annual Conference on Information Sciences and Systems, 2013

Compressed hypothesis testing: To mix or not to mix?
Proceedings of the 51st Annual Allerton Conference on Communication, 2013

Key generation through two-way relay channels under active attacks.
Proceedings of the 2013 Asilomar Conference on Signals, 2013

2012
Scheduling of Wireless Metering for Power Market Pricing in Smart Grid.
IEEE Trans. Smart Grid, 2012

Efficient and Secure Wireless Communications for Advanced Metering Infrastructure in Smart Grids.
IEEE Trans. Smart Grid, 2012

A Unified Framework for Key Agreement Over Wireless Fading Channels.
IEEE Trans. Inf. Forensics Secur., 2012

Multicast Routing for Decentralized Control of Cyber Physical Systems with an Application in Smart Grid.
IEEE J. Sel. Areas Commun., 2012

Cooperative Key Generation in Wireless Networks.
IEEE J. Sel. Areas Commun., 2012

Online quickest multiarmed bandit algorithm for distributive renewable energy resources.
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012

Quickest change point identification across a sensor array.
Proceedings of the 31st IEEE Military Communications Conference, 2012

Simultaneously generating multiple keys and multi-commodity flow in networks.
Proceedings of the 2012 IEEE Information Theory Workshop, 2012

Broadcasting over fading wiretap channels.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

Smart grid system state measurement estimation over wireless channels.
Proceedings of the 46th Annual Conference on Information Sciences and Systems, 2012

Optimal sequential channel estimation for multi-channel cognitive radio.
Proceedings of the 46th Annual Conference on Information Sciences and Systems, 2012

Quickest change point detection with sampling right constraints.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012

Session TP8a2: Sensor and interference networks.
Proceedings of the Conference Record of the Forty Sixth Asilomar Conference on Signals, 2012

Sequential good channel search for multi-channel cognitive radio.
Proceedings of the Conference Record of the Forty Sixth Asilomar Conference on Signals, 2012

2011
Communication Requirement for Reliable and Secure State Estimation and Control in Smart Grid.
IEEE Trans. Smart Grid, 2011

Cognitive Medium Access: Exploration, Exploitation, and Competition.
IEEE Trans. Mob. Comput., 2011

Quickest Search Over Multiple Sequences.
IEEE Trans. Inf. Theory, 2011

Interference Alignment for Secrecy.
IEEE Trans. Inf. Theory, 2011

Privacy-Security Trade-Offs in Biometric Security Systems - Part II: Multiple Use Case.
IEEE Trans. Inf. Forensics Secur., 2011

Privacy-Security Trade-Offs in Biometric Security Systems - Part I: Single Use Case.
IEEE Trans. Inf. Forensics Secur., 2011

Distributed Cognitive Radio Network Management via Algorithms in Probabilistic Graphical Models.
IEEE J. Sel. Areas Commun., 2011

Efficient and reliable multiple access for advanced metering in future smart grid.
Proceedings of the IEEE Second International Conference on Smart Grid Communications, 2011

Optimal Sequential Detection with Stochastic Energy Constraint.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

On the separation of encryption and compression in secure distributed source coding.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011

Secret sharing via noisy broadcast channels.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Combating False Reports for Secure Networked Control in Smart Grid via Trustiness Evaluation.
Proceedings of IEEE International Conference on Communications, 2011

Propagation of Spectrum Preference in Cognitive Radio Networks: A Social Network Approach.
Proceedings of IEEE International Conference on Communications, 2011

Decoding the 'Nature Encoded' Messages for Distributed Energy Generation Control in Microgrid.
Proceedings of IEEE International Conference on Communications, 2011

A denial-of-service jamming game for remote state monitoring in smart grid.
Proceedings of the 45st Annual Conference on Information Sciences and Systems, 2011

Key establishment via common state information in networked control systems.
Proceedings of the American Control Conference, 2011

PHY-based cooperative key generation in wireless networks.
Proceedings of the 49th Annual Allerton Conference on Communication, 2011

2010
Rateless coding for MIMO fading channels: performance limits and code construction.
IEEE Trans. Wirel. Commun., 2010

Fast multichannel spectrum scanning with multiple simultaneous observations.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2010

On the capacity region of the Poisson interference channels.
Proceedings of the IEEE International Symposium on Information Theory, 2010

Privacy-security tradeoffs in reusable biometric security systems.
Proceedings of the IEEE International Conference on Acoustics, 2010

Efficient Channel Search Algorithms for Cognitive Radio in a Multichannel System.
Proceedings of the Global Communications Conference, 2010

Fast wideband spectrum scanning for multi-channel cognitive radio systems.
Proceedings of the 44th Annual Conference on Information Sciences and Systems, 2010

Key agreement over wireless fading channels with an active attacker.
Proceedings of the 48th Annual Allerton Conference on Communication, 2010

2009
Optimal selection of channel sensing order in cognitive radio.
IEEE Trans. Wirel. Commun., 2009

Authentication Over Noisy Channels.
IEEE Trans. Inf. Theory, 2009

Wiretap channel type II with an active eavesdropper.
Proceedings of the IEEE International Symposium on Information Theory, 2009

An Information Theoretic Framework for Biometric Security Systems.
Proceedings of the Advances in Biometrics, Third International Conference, 2009

Distributed algorithm for collaborative detection in cognitive radio networks.
Proceedings of the 47th Annual Allerton Conference on Communication, 2009

2008
On cooperation in energy efficient wireless networks: the role of altruistic nodes.
IEEE Trans. Wirel. Commun., 2008

The Wiretap Channel With Feedback: Encryption Over the Channel.
IEEE Trans. Inf. Theory, 2008

The Relay-Eavesdropper Channel: Cooperation for Secrecy.
IEEE Trans. Inf. Theory, 2008

The Water-Filling Game in Fading Multiple-Access Channels.
IEEE Trans. Inf. Theory, 2008

On the Secrecy Capacity of Fading Channels.
IEEE Trans. Inf. Theory, 2008

Optimal medium access protocols for cognitive radio networks.
Proceedings of the 6th International Symposium on Modeling and Optimization in Mobile, 2008

On the secure degrees of freedom in the K-user Gaussian interference channel.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Rateless coding for MIMO block fading channels.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Optimal medium access control in cognitive radios: A sequential design approach.
Proceedings of the IEEE International Conference on Acoustics, 2008

Quickest Detection in Cognitive Radio: A Sequential Change Detection Framework.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Cognitive Radio: How to Maximally Utilize Spectrum Opportunities in Sequential Sensing.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Privacy-security tradeoffs in biometric security systems.
Proceedings of the 46th Annual Allerton Conference on Communication, 2008

Medium access in cognitive radio networks: A competitive multi-armed bandit framework.
Proceedings of the 42nd Asilomar Conference on Signals, Systems and Computers, 2008

2007
Secrecy Capacity of the Wiretap Channel with Noisy Feedback
CoRR, 2007

Cooperative Secrecy: The Relay-Eavesdropper Channel.
Proceedings of the IEEE International Symposium on Information Theory, 2007

On Cooperation in Energy Limited Wireless Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Cooperation for Secure Communication: The Relay Wiretap Channel.
Proceedings of the IEEE International Conference on Acoustics, 2007

2006
The three-node wireless network: achievable rates and Cooperation strategies.
IEEE Trans. Inf. Theory, 2006

Fading Multiple Access Channels: A Game Theoretic Perspective.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006


  Loading...