default search action
Lifeng Lai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j81]Chenye Yang, Guanlin Liu, Lifeng Lai:
Stochastic Bandits With Non-Stationary Rewards: Reward Attack and Defense. IEEE Trans. Signal Process. 72: 5007-5020 (2024) - [j80]Lifeng Lai, Fu-Chun Zheng, Jingjing Luo, Daquan Feng:
Fuzzy Logic Based Handover Under Multi-Connectivity in Cellular-Connected UAV Communications. IEEE Trans. Veh. Technol. 73(9): 13926-13931 (2024) - [j79]Lifeng Lai, Fu-Chun Zheng, Jingjing Luo:
Flight Direction-Based Handover in Cellular-Connected UAV Communications. IEEE Trans. Veh. Technol. 73(11): 17771-17775 (2024) - [c131]Ziqing Lu, Guanlin Liu, Lifeng Lai, Weiyu Xu:
Optimal Cost Constrained Adversarial Attacks for Multiple Agent Systems. CISS 2024: 1-6 - [c130]Myung Cho, Meghana Chikkam, Weiyu Xu, Lifeng Lai:
Tree Network Design for Faster Distributed Machine Learning Process with Distributed Dual Coordinate Ascent. ICASSP 2024: 6080-6084 - [c129]Xinyi Ni, Guanlin Liu, Lifeng Lai:
Risk-Sensitive Reward-Free Reinforcement Learning with CVaR. ICML 2024 - [c128]Ziqing Lu, Guanlin Liu, Lifeng Lai, Weiyu Xu:
Camouflage Adversarial Attacks on Multiple Agent Systems. ISIT 2024: 7-12 - [i64]Ziqing Lu, Guanlin Liu, Lifeng Lai, Weiyu Xu:
Camouflage Adversarial Attacks on Multiple Agent Systems. CoRR abs/2401.17405 (2024) - [i63]Xinyi Ni, Lifeng Lai:
Robust Risk-Sensitive Reinforcement Learning with Conditional Value-at-Risk. CoRR abs/2405.01718 (2024) - [i62]Puning Zhao, Lifeng Lai, Li Shen, Qingming Li, Jiafei Wu, Zhe Liu:
A Huber Loss Minimization Approach to Mean Estimation under User-level Differential Privacy. CoRR abs/2405.13453 (2024) - [i61]Haodong Liang, Krishnakumar Balasubramanian, Lifeng Lai:
Transformers Handle Endogeneity in In-Context Linear Regression. CoRR abs/2410.01265 (2024) - [i60]Yanhao Jin, Krishnakumar Balasubramanian, Lifeng Lai:
Provable In-context Learning for Mixture of Linear Regressions using Transformers. CoRR abs/2410.14183 (2024) - 2023
- [j78]Xiaochuan Ma, Lifeng Lai, Shuguang Cui:
Bayesian Two-Stage Sequential Change Diagnosis via Sensor Arrays. IEEE Trans. Inf. Theory 69(11): 7276-7294 (2023) - [j77]Guanlin Liu, Lifeng Lai:
Action Poisoning Attacks on Linear Contextual Bandits. Trans. Mach. Learn. Res. 2023 (2023) - [j76]Yulu Jin, Lifeng Lai:
Fairness-Aware Regression Robust to Adversarial Attacks. IEEE Trans. Signal Process. 71: 4092-4105 (2023) - [j75]Yan Xin, Kai Yang, Chih-Lin I, Sanyogita Shamsunder, Xingqin Lin, Lifeng Lai:
Guest Editorial: AI-Powered Telco Network Automation: 5G Evolution and 6G. IEEE Wirel. Commun. 30(1): 68-69 (2023) - [c127]Chenye Yang, Guanlin Liu, Lifeng Lai:
Reward Attack on Stochastic Bandits with Non-Stationary Rewards. ACSSC 2023: 1387-1393 - [c126]Yulu Jin, Lifeng Lai:
Adversarially Robust Fairness-Aware Regression. ICASSP 2023: 1-5 - [c125]Puning Zhao, Lifeng Lai:
Entropy Rate Estimation for Markov Chains with Continuous Distributions. ISIT 2023: 1884-1889 - [c124]Myung Cho, Lifeng Lai, Weiyu Xu:
Distributed Dual Coordinate Ascent With Imbalanced Data on a General Tree Network. MLSP 2023: 1-6 - [c123]Guanlin Liu, Lifeng Lai:
Efficient Adversarial Attacks on Online Multi-agent Reinforcement Learning. NeurIPS 2023 - [i59]Guanlin Liu, Zhihan Zhou, Han Liu, Lifeng Lai:
Efficient Action Robust Reinforcement Learning with Probabilistic Policy Execution Uncertainty. CoRR abs/2307.07666 (2023) - [i58]Guanlin Liu, Lifeng Lai:
Efficient Adversarial Attacks on Online Multi-agent Reinforcement Learning. CoRR abs/2307.07670 (2023) - [i57]Puning Zhao, Lifeng Lai:
Minimax Optimal Q Learning with Nearest Neighbors. CoRR abs/2308.01490 (2023) - [i56]Myung Cho, Lifeng Lai, Weiyu Xu:
Distributed Dual Coordinate Ascent with Imbalanced Data on a General Tree Network. CoRR abs/2308.14783 (2023) - [i55]Ziqing Lu, Guanlin Liu, Lifeng Lai, Weiyu Xu:
Optimal Cost Constrained Adversarial Attacks For Multiple Agent Systems. CoRR abs/2311.00859 (2023) - 2022
- [b1]Fuwei Li, Lifeng Lai, Shuguang Cui:
Machine Learning Algorithms - Adversarial Robustness in Signal Processing. Wireless Networks, Springer 2022, ISBN 978-3-031-16374-6, pp. 1-85 - [j74]Tianjie Huang, Fu-Chun Zheng, Lifeng Lai:
On the local delay and energy efficiency under decoupled uplink and downlink in HetNets. Sci. China Inf. Sci. 65(3) (2022) - [j73]Puning Zhao, Lifeng Lai:
Analysis of KNN Density Estimation. IEEE Trans. Inf. Theory 68(12): 7971-7995 (2022) - [j72]Yulu Jin, Lifeng Lai:
Optimal Accuracy-Privacy Trade-Off of Inference as Service. IEEE Trans. Signal Process. 70: 4031-4046 (2022) - [c122]Xinyi Ni, Lifeng Lai:
Risk-Sensitive Reinforcement Learning Via Entropic- VaR Optimization. IEEECONF 2022: 953-959 - [c121]Xinyi Ni, Lifeng Lai:
Policy Gradient Based Entropic-VaR Optimization in Risk-Sensitive Reinforcement Learning. Allerton 2022: 1-6 - [c120]Yulu Jin, Lifeng Lai:
Privacy Protection In Learning Fair Representations. ICASSP 2022: 2964-2968 - [c119]Lifeng Lai, Fu-Chun Zheng, Wanli Wen, Jingjing Luo, Ge Li:
Dynamic Content Caching Based on Actor-Critic Reinforcement Learning for IoT Systems. VTC Fall 2022: 1-6 - [i54]Minhui Huang, Kaiyi Ji, Shiqian Ma, Lifeng Lai:
Efficiently Escaping Saddle Points in Bilevel Optimization. CoRR abs/2202.03684 (2022) - [i53]Yulu Jin, Lifeng Lai:
Fairness-aware Regression Robust to Adversarial Attacks. CoRR abs/2211.04449 (2022) - 2021
- [j71]Daquan Feng, Lifeng Lai, Jingjing Luo, Yi Zhong, Canjian Zheng, Kai Ying:
Ultra-reliable and low-latency communications: applications, opportunities and challenges. Sci. China Inf. Sci. 64(2) (2021) - [j70]Myung Cho, Lifeng Lai, Weiyu Xu:
Distributed Dual Coordinate Ascent in General Tree Networks and Communication Network Effect on Synchronous Machine Learning. IEEE J. Sel. Areas Commun. 39(7): 2105-2119 (2021) - [j69]Puning Zhao, Lifeng Lai:
Minimax Rate Optimal Adaptive Nearest Neighbor Classification and Regression. IEEE Trans. Inf. Theory 67(5): 3155-3182 (2021) - [j68]Yulu Jin, Lifeng Lai:
On the Adversarial Robustness of Hypothesis Testing. IEEE Trans. Signal Process. 69: 515-530 (2021) - [j67]Minhui Huang, Shiqian Ma, Lifeng Lai:
Robust Low-Rank Matrix Completion via an Alternating Manifold Proximal Gradient Continuation Method. IEEE Trans. Signal Process. 69: 2639-2652 (2021) - [j66]Fuwei Li, Lifeng Lai, Shuguang Cui:
On the Adversarial Robustness of LASSO Based Feature Selection. IEEE Trans. Signal Process. 69: 5555-5567 (2021) - [j65]Fuwei Li, Lifeng Lai, Shuguang Cui:
Optimal Feature Manipulation Attacks Against Linear Regression. IEEE Trans. Signal Process. 69: 5580-5594 (2021) - [j64]Xiaochuan Ma, Lifeng Lai, Shuguang Cui:
Two-Stage Bayesian Sequential Change Diagnosis. IEEE Trans. Signal Process. 69: 6131-6147 (2021) - [j63]Lifeng Lai, Daquan Feng, Fu-Chun Zheng, Xijun Wang, Howard H. Yang, Tony Q. S. Quek:
CQI-Based Interference Detection and Resource Allocation With QoS Provision in LTE-U Systems. IEEE Trans. Veh. Technol. 70(2): 1421-1433 (2021) - [c118]Puning Zhao, Lifeng Lai:
Efficient Classification with Adaptive KNN. AAAI 2021: 11007-11014 - [c117]Yulu Jin, Lifeng Lai:
Privacy-Accuracy Trade-Off of Inference as Service. ICASSP 2021: 2645-2649 - [c116]Ying Li, Fuwei Li, Lifeng Lai, Jun Wu:
On The Adversarial Robustness of Principal Component Analysis. ICASSP 2021: 3695-3699 - [c115]Minhui Huang, Shiqian Ma, Lifeng Lai:
A Riemannian Block Coordinate Descent Method for Computing the Projection Robust Wasserstein Distance. ICML 2021: 4446-4455 - [c114]Minhui Huang, Shiqian Ma, Lifeng Lai:
Projection Robust Wasserstein Barycenters. ICML 2021: 4456-4465 - [c113]Puning Zhao, Lifeng Lai:
On the Convergence Rates of KNN Density Estimation. ISIT 2021: 2840-2845 - [c112]Xiaochuan Ma, Lifeng Lai, Shuguang Cui:
Bayesian Two-Stage Sequential Change Diagnosis Via Multi-Sensor Array. MLSP 2021: 1-6 - [c111]Xiaochuan Ma, Lifeng Lai, Shuguang Cui:
A Deep Q-Network Based Approach for Online Bayesian Change Point Detection. MLSP 2021: 1-6 - [c110]Guanlin Liu, Lifeng Lai:
Provably Efficient Black-Box Action Poisoning Attacks Against Reinforcement Learning. NeurIPS 2021: 12400-12410 - [i52]Minhui Huang, Shiqian Ma, Lifeng Lai:
Projection Robust Wasserstein Barycenters. CoRR abs/2102.03390 (2021) - [i51]Puning Zhao, Lifeng Lai:
Optimal Stochastic Nonconvex Optimization with Bandit Feedback. CoRR abs/2103.16082 (2021) - [i50]Minhui Huang, Shiqian Ma, Lifeng Lai:
On the Convergence of Projected Alternating Maximization for Equitable and Optimal Transport. CoRR abs/2109.15030 (2021) - [i49]Guanlin Liu, Lifeng Lai:
Provably Efficient Black-Box Action Poisoning Attacks Against Reinforcement Learning. CoRR abs/2110.04471 (2021) - [i48]Guanlin Liu, Lifeng Lai:
Efficient Action Poisoning Attacks on Linear Contextual Bandits. CoRR abs/2112.05367 (2021) - 2020
- [j62]Puning Zhao, Lifeng Lai:
Analysis of KNN Information Estimators for Smooth Distributions. IEEE Trans. Inf. Theory 66(6): 3798-3826 (2020) - [j61]Lifeng Lai, Erhan Bayraktar:
On the Adversarial Robustness of Robust Estimators. IEEE Trans. Inf. Theory 66(8): 5097-5109 (2020) - [j60]Puning Zhao, Lifeng Lai:
Minimax Optimal Estimation of KL Divergence for Continuous Distributions. IEEE Trans. Inf. Theory 66(12): 7787-7811 (2020) - [j59]Fuwei Li, Lifeng Lai, Shuguang Cui:
On the Adversarial Robustness of Subspace Learning. IEEE Trans. Signal Process. 68: 1470-1483 (2020) - [j58]Guanlin Liu, Lifeng Lai:
Action-Manipulation Attacks Against Stochastic Bandits: Attacks and Defense. IEEE Trans. Signal Process. 68: 5152-5165 (2020) - [j57]Xinyang Cao, Lifeng Lai:
Distributed Approximate Newton's Method Robust to Byzantine Attackers. IEEE Trans. Signal Process. 68: 6011-6025 (2020) - [c109]Guanlin Liu, Lifeng Lai:
Action-Manipulation Attacks on Stochastic Bandits. ICASSP 2020: 3112-3116 - [c108]Xiaochuan Ma, Lifeng Lai, Shuguang Cui:
Optimal Two-Stage Bayesian Sequential Change Diagnosis. ISIT 2020: 1130-1135 - [c107]Puning Zhao, Lifeng Lai:
Analysis of K Nearest Neighbor KL Divergence Estimation for Continuous Distributions. ISIT 2020: 2562-2567 - [c106]Fuwei Li, Lifeng Lai, Shuguang Cui:
On the Adversarial Robustness of Feature Selection Using LASSO. MLSP 2020: 1-6 - [c105]Fuwei Li, Lifeng Lai, Shuguang Cui:
On the Adversarial Robustness of Linear Regression. MLSP 2020: 1-6 - [c104]Lifeng Lai, Daquan Feng, Fu-Chun Zheng:
Interference Detection and Resource Allocation in LTE Unlicensed Systems. WCNC 2020: 1-6 - [i47]Guanlin Liu, Lifeng Lai:
Action-Manipulation Attacks Against Stochastic Bandits: Attacks and Defense. CoRR abs/2002.08000 (2020) - [i46]Puning Zhao, Lifeng Lai:
Minimax Optimal Estimation of KL Divergence for Continuous Distributions. CoRR abs/2002.11599 (2020) - [i45]Fuwei Li, Lifeng Lai, Shuguang Cui:
Optimal Feature Manipulation Attacks Against Linear Regression. CoRR abs/2003.00177 (2020) - [i44]Minhui Huang, Shiqian Ma, Lifeng Lai:
Robust Low-rank Matrix Completion via an Alternating Manifold Proximal Gradient Continuation Method. CoRR abs/2008.07740 (2020) - [i43]Puning Zhao, Lifeng Lai:
Analysis of KNN Density Estimation. CoRR abs/2010.00438 (2020) - [i42]Fuwei Li, Lifeng Lai, Shuguang Cui:
On the Adversarial Robustness of LASSO Based Feature Selection. CoRR abs/2010.10045 (2020) - [i41]Minhui Huang, Shiqian Ma, Lifeng Lai:
A Riemannian Block Coordinate Descent Method for Computing the Projection Robust Wasserstein Distance. CoRR abs/2012.05199 (2020)
2010 – 2019
- 2019
- [j56]Wenwen Tu, Lifeng Lai:
On Function Computation With Privacy and Secrecy Constraints. IEEE Trans. Inf. Theory 65(10): 6716-6733 (2019) - [j55]Jun Geng, Bingwen Zhang, Lauren M. Huie, Lifeng Lai:
Online Change-Point Detection of Linear Regression Models. IEEE Trans. Signal Process. 67(12): 3316-3329 (2019) - [j54]Xinyang Cao, Lifeng Lai:
Distributed Gradient Descent Algorithm Robust to an Arbitrary Number of Byzantine Attackers. IEEE Trans. Signal Process. 67(22): 5850-5864 (2019) - [j53]Daquan Feng, Changyang She, Kai Ying, Lifeng Lai, Zhanwei Hou, Tony Q. S. Quek, Yonghui Li, Branka Vucetic:
Toward Ultrareliable Low-Latency Communications: Typical Scenarios, Possible Solutions, and Open Issues. IEEE Veh. Technol. Mag. 14(2): 94-102 (2019) - [c103]Yulu Jin, Lifeng Lai:
Adversarially Robust Hypothesis Testing. ACSSC 2019: 1806-1810 - [c102]Wenwen Tu, Lifeng Lai:
Secret Key and Private Key Capacities Over an Unauthenticated Public Channel. CNS 2019: 1-5 - [c101]Fuwei Li, Lifeng Lai, Shuguang Cui:
On the Adversarial Robustness of Subspace Learning. ICASSP 2019: 2477-2481 - [c100]Myung Cho, Lifeng Lai, Weiyu Xu:
Generalized Distributed Dual Coordinate Ascent in a Tree Network for Machine Learning. ICASSP 2019: 3512-3516 - [c99]Puning Zhao, Lifeng Lai:
Minimax Regression via Adaptive Nearest Neighbor. ISIT 2019: 1447-1451 - [i40]Daquan Feng, Changyang She, Kai Ying, Lifeng Lai, Zhanwei Hou, Tony Q. S. Quek, Yonghui Li, Branka Vucetic:
Towards Ultra-Reliable Low-Latency Communications: Typical Scenarios, Possible Solutions, and Open Issues. CoRR abs/1903.03913 (2019) - [i39]Erhan Bayraktar, Lifeng Lai:
On the Adversarial Robustness of Multivariate Robust Estimation. CoRR abs/1903.11220 (2019) - [i38]Fuwei Li, Lifeng Lai, Shuguang Cui:
On the Adversarial Robustness of Subspace Learning. CoRR abs/1908.06210 (2019) - [i37]Puning Zhao, Lifeng Lai:
Minimax Rate Optimal Adaptive Nearest Neighbor Classification and Regression. CoRR abs/1910.10513 (2019) - 2018
- [j52]Siu-Wai Ho, Abdullah A. Saed, Lifeng Lai, Chi Wan Sung:
Coding and Bounds for Channel Estimation in Visible Light Communications and Positioning. IEEE J. Sel. Areas Commun. 36(1): 34-44 (2018) - [j51]Christos G. Tsinos, Fotis Foukalas, Tamer Khattab, Lifeng Lai:
On Channel Selection for Carrier Aggregation Systems. IEEE Trans. Commun. 66(2): 808-818 (2018) - [j50]Shaofeng Zou, Yingbin Liang, Lifeng Lai, H. Vincent Poor, Shlomo Shamai Shitz:
Degraded Broadcast Channel With Secrecy Outside a Bounded Range. IEEE Trans. Inf. Theory 64(3): 2104-2120 (2018) - [j49]Georgios Fellouris, Erhan Bayraktar, Lifeng Lai:
Efficient Byzantine Sequential Change Detection. IEEE Trans. Inf. Theory 64(5): 3346-3360 (2018) - [j48]Wenwen Tu, Lifeng Lai:
Keyless Authentication and Authenticated Capacity. IEEE Trans. Inf. Theory 64(5): 3696-3714 (2018) - [j47]Wenwen Zhao, Lifeng Lai:
Distributed Testing With Cascaded Encoders. IEEE Trans. Inf. Theory 64(11): 7339-7348 (2018) - [c98]Jun Geng, Lifeng Lai:
Quick Best Action Identification in Linear Bandit Problems. ACSSC 2018: 1312-1316 - [c97]Puning Zhao, Lifeng Lai:
Analysis of KNN Information Estimators for Smooth Distributions. Allerton 2018: 322-327 - [c96]Bingwen Zhang, Jun Geng, Weiyu Xu, Lifeng Lai:
Communication efficient distributed learning with feature partitioned data. CISS 2018: 1-6 - [c95]Jun Geng, Lifeng Lai:
Quickest Change-Point Detection Over Multiple Data Streams via Sequential Observations. ICASSP 2018: 4404-4408 - [c94]Xinyang Cao, Lifeng Lai:
Robust Distributed Gradient Descent with Arbitrary Number of Byzantine Attackers. ICASSP 2018: 6373-6377 - [c93]Abdullah A. Saed, Siu-Wai Ho, Lifeng Lai, Chi Wan Sung:
Combinational Code for Channel Estimation in Visible Light Communications and Positioning. ICC 2018: 1-6 - [c92]Puning Zhao, Lifeng Lai:
Nonparametric Direct Entropy Difference Estimation. ITW 2018: 1-5 - [c91]Wenwen Tu, Lifeng Lai:
On Private Lossy Function Computation. SPAWC 2018: 1-5 - [i36]Puning Zhao, Lifeng Lai:
Analysis of KNN Information Estimators for Smooth Distributions. CoRR abs/1810.11571 (2018) - [i35]Jun Geng, Lifeng Lai:
Quick Best Action Identification in Linear Bandit Problems. CoRR abs/1812.00365 (2018) - [i34]Weiyu Xu, Lifeng Lai, M. Amin Khajehnejad:
How did Donald Trump Surprisingly Win the 2016 United States Presidential Election? an Information-Theoretic Perspective (Clean Sensing for Big Data Analytics: Optimal Strategies, Estimation Error Bounds Tighter than the Cramér-Rao Bound). CoRR abs/1812.11891 (2018) - 2017
- [j46]Ain Ul Aisha, Lifeng Lai, Yingbin Liang, Shlomo Shamai Shitz:
Sum-Rate Capacity of Poisson MIMO Multiple-Access Channels. IEEE Trans. Commun. 65(11): 4765-4776 (2017) - [j45]Wenwen Tu, Mario Goldenbaum, Lifeng Lai, H. Vincent Poor:
On Simultaneously Generating Multiple Keys in a Joint Source-Channel Model. IEEE Trans. Inf. Forensics Secur. 12(2): 298-308 (2017) - [j44]Huishuai Zhang, Yingbin Liang, Lifeng Lai, Shlomo Shamai Shitz:
Multi-Key Generation Over a Cellular Model With a Helper. IEEE Trans. Inf. Theory 63(6): 3804-3822 (2017) - [j43]Ain Ul Aisha, Lifeng Lai, Yingbin Liang, Shlomo Shamai Shitz:
On the Sum-Rate Capacity of Poisson MISO Multiple Access Channels. IEEE Trans. Inf. Theory 63(10): 6457-6473 (2017) - [j42]Mostafa El Gamal, Lifeng Lai:
On Rate Requirements for Achieving the Centralized Performance in Distributed Estimation. IEEE Trans. Signal Process. 65(8): 2020-2032 (2017) - [c90]Wenwen Tu, Lifeng Lai:
Function computation with privacy constraints. ACSSC 2017: 1672-1676 - [c89]Mostafa El Gamal, Lifeng Lai:
On randomized distributed coordinate descent with quantized updates. CISS 2017: 1-5 - [c88]Miguel R. D. Rodrigues, Nikos Deligiannis, Lifeng Lai, Yonina C. Eldar:
Rate-distortion trade-offs in acquisition of signal parameters. ICASSP 2017: 6105-6109 - [c87]Jun Geng, Weiyu Xu, Lifeng Lai:
Identifying correlated components in high-dimensional multivariate Gaussian models. ICASSP 2017: 6424-6428 - [c86]Wenwen Zhao, Lifeng Lai:
Distributed identity testing with zero-rate compression. ISIT 2017: 3135-3139 - [i33]Myung Cho, Lifeng Lai, Weiyu Xu:
Network Constrained Distributed Dual Coordinate Ascent for Machine Learning. CoRR abs/1703.04785 (2017) - [i32]Jun Geng, Erhan Bayraktar, Lifeng Lai:
Multi-Chart Detection Procedure for Bayesian Quickest Change-Point Detection with Unknown Post-Change Parameters. CoRR abs/1708.06901 (2017) - 2016
- [j41]Wenwen Zhao, Lifeng Lai:
Distributed Detection With Vector Quantizer. IEEE Trans. Signal Inf. Process. over Networks 2(2): 105-119 (2016) - [j40]Jun Geng, Weiyu Xu, Lifeng Lai:
Quickest Sequential Multiband Spectrum Sensing With Mixed Observations. IEEE Trans. Signal Process. 64(22): 5861-5874 (2016) - [j39]Yi Huang, Shengli Zhou, Zhijie Jerry Shi, Lifeng Lai:
Channel Frequency Response-Based Secret Key Generation in Underwater Acoustic Systems. IEEE Trans. Wirel. Commun. 15(9): 5875-5888 (2016) - [c85]Bo Jiang, Lifeng Lai:
Distributed quickest detection with optional observations at the fusion center. ACSSC 2016: 112-116 - [c84]Abdallah Fayed, Tamer Khattab, Lifeng Lai:
Secret communication on the Z-Channel with cooperative receivers. ACSSC 2016: 909-914 - [c83]Wenwen Tu, Lifeng Lai:
Keyless authentication over noisy channel. ACSSC 2016: 1665-1669 - [c82]Abdallah Fayed, Tamer Khattab, Lifeng Lai:
On secure communication over the Z-Channel. CNS 2016: 606-610 - [c81]Wenwen Tu, Mario Goldenbaum, Lifeng Lai, H. Vincent Poor:
Multiple key generation with restricted public discussion structure. CNS 2016: 641-645 - [c80]Jun Geng, Lifeng Lai:
Bayesian quickest detection with unknown post-change parameter. ICASSP 2016: 4169-4173 - [c79]Bingwen Zhang, Weiyu Xu, Jian-Feng Cai, Lifeng Lai:
Precise phase transition of total variation minimization. ICASSP 2016: 4518-4522 - [c78]Jun Geng, Bingwen Zhang, Lauren M. Huie, Lifeng Lai:
Online change detection of linear regression models. ICASSP 2016: 4910-4914 - [c77]Ain Ul Aisha, Lifeng Lai, Yingbin Liang, Shlomo Shamai Shitz:
On the sum-rate capacity of poisson MISO multiple access channels. ICCS 2016: 1-5 - [c76]Ain Ul Aisha, Yingbin Liang, Lifeng Lai, Shlomo Shamai:
On the sum-rate capacity of non-symmetric Poisson multiple access channel. ISIT 2016: 375-379 - [c75]Shaofeng Zou, Yingbin Liang, Lifeng Lai, H. Vincent Poor, Shlomo Shamai:
K-user degraded broadcast channel with secrecy outside a bounded range. ITW 2016: 31-35 - [c74]Wenwen Tu, Mario Goldenbaum, Lifeng Lai, H. Vincent Poor:
Simultaneously generating multiple keys over a cascade of a noiseless channel and a wiretap channel. ITW 2016: 206-210 - [i31]Erhan Bayraktar, Georgios Fellouris, Lifeng Lai:
Efficient Byzantine Sequential Change Detection. CoRR abs/1609.02661 (2016) - [i30]Mostafa El Gamal, Lifeng Lai:
On Randomized Distributed Coordinate Descent with Quantized Updates. CoRR abs/1609.05539 (2016) - [i29]Shaofeng Zou, Yingbin Liang, Lifeng Lai, H. Vincent Poor, Shlomo Shamai:
Degraded Broadcast Channel with Secrecy Outside a Bounded Range. CoRR abs/1609.06353 (2016) - [i28]Myung Cho, Weiyu Xu, Lifeng Lai:
Compressed Hypothesis Testing: To Mix or Not to Mix? CoRR abs/1609.07528 (2016) - 2015
- [j38]Shaofeng Zou, Yingbin Liang, Lifeng Lai, H. Vincent Poor, Shlomo Shamai:
Broadcast Networks With Layered Decoding and Layered Secrecy: Theory and Applications. Proc. IEEE 103(10): 1841-1856 (2015) - [j37]Erhan Bayraktar, Lifeng Lai:
Byzantine Fault Tolerant Distributed Quickest Change Detection. SIAM J. Control. Optim. 53(2): 575-591 (2015) - [j36]Ain Ul Aisha, Lifeng Lai, Yingbin Liang:
Optimal Power Allocation for Poisson Channels With Time-Varying Background Light. IEEE Trans. Commun. 63(11): 4327-4338 (2015) - [j35]Lifeng Lai, Yingbin Liang, Shlomo Shamai (Shitz):
On the Capacity Bounds for Poisson Interference Channels. IEEE Trans. Inf. Theory 61(1): 223-238 (2015) - [j34]Shaofeng Zou, Yingbin Liang, Lifeng Lai, Shlomo Shamai:
An Information Theoretic Approach to Secret Sharing. IEEE Trans. Inf. Theory 61(6): 3121-3136 (2015) - [j33]Lifeng Lai, Siu-Wai Ho:
Key Generation Algorithms for Pairwise Independent Networks Based on Graphical Models. IEEE Trans. Inf. Theory 61(9): 4828-4837 (2015) - [j32]Bingwen Zhang, Jun Geng, Lifeng Lai:
Multiple Change-Points Estimation in Linear Regression Models via Sparse Group Lasso. IEEE Trans. Signal Process. 63(9): 2209-2224 (2015) - [c73]Bingwen Zhang, Jun Geng, Lifeng Lai:
Change-point estimation in high dimensional linear regression models via sparse group Lasso. Allerton 2015: 815-821 - [c72]Mostafa El Gamal, Lifeng Lai:
Are Slepian-Wolf rates necessary for distributed parameter estimation? Allerton 2015: 1249-1255 - [c71]Wenwen Tu, Lifeng Lai:
Key generation with a Byzantine helper. ICC Workshops 2015: 429-434 - [c70]Huishuai Zhang, Yingbin Liang, Lifeng Lai:
Secret key capacity: Talk or keep silent? ISIT 2015: 291-295 - [c69]Huishuai Zhang, Yingbin Liang, Lifeng Lai, Shlomo Shamai:
Two-key generation for a cellular model with a helper. ISIT 2015: 715-719 - [c68]Wenwen Tu, Lifeng Lai:
On the simulatability condition in key generation over a non-authenticated public channel. ISIT 2015: 720-724 - [c67]Shaofeng Zou, Yingbin Liang, Lifeng Lai, Shlomo Shamai:
Rate splitting and sharing for degraded broadcast channel with secrecy outside a bounded range. ISIT 2015: 1357-1361 - [c66]Wenwen Zhao, Lifeng Lai:
Distributed testing with zero-rate compression. ISIT 2015: 2792-2796 - [c65]Shaofeng Zou, Yingbin Liang, Lifeng Lai, Shlomo Shamai:
Degraded broadcast channel: Secrecy outside of a bounded range. ITW 2015: 1-5 - [c64]Wenwen Zhao, Lifeng Lai:
Distributed testing against independence with conferencing encoders. ITW Fall 2015: 19-23 - [c63]Jun Geng, Weiyu Xu, Lifeng Lai:
Detection of correlated components in multivariate Gaussian models. ITW Fall 2015: 224-228 - [i27]Mostafa El Gamal, Lifeng Lai:
Are Slepian-Wolf Rates Necessary for Distributed Parameter Estimation? CoRR abs/1508.02765 (2015) - [i26]Bingwen Zhang, Weiyu Xu, Jian-Feng Cai, Lifeng Lai:
Precise Phase Transition of Total Variation Minimization. CoRR abs/1509.04376 (2015) - 2014
- [j31]Yan Xin, Honghai Zhang, Lifeng Lai:
A Low-Complexity Sequential Spectrum Sensing Algorithm for Cognitive Radio. IEEE J. Sel. Areas Commun. 32(3): 387-399 (2014) - [j30]Raied Caromi, Seshadri Mohan, Lifeng Lai:
Optimal Sequential Channel Estimation and Probing for Multiband Cognitive Radio Systems. IEEE Trans. Commun. 62(8): 2696-2708 (2014) - [j29]Heng Zhou, Lauren M. Huie, Lifeng Lai:
Secret Key Generation in the Two-Way Relay Channel With Active Attackers. IEEE Trans. Inf. Forensics Secur. 9(3): 476-488 (2014) - [j28]Yingbin Liang, Lifeng Lai, H. Vincent Poor, Shlomo Shamai:
A Broadcast Approach for Fading Wiretap Channels. IEEE Trans. Inf. Theory 60(2): 842-858 (2014) - [j27]Huishuai Zhang, Lifeng Lai, Yingbin Liang, Hua Wang:
The Capacity Region of the Source-Type Model for Secret Key and Private Key Generation. IEEE Trans. Inf. Theory 60(10): 6389-6398 (2014) - [j26]Jun Geng, Erhan Bayraktar, Lifeng Lai:
Bayesian Quickest Change-Point Detection With Sampling Right Constraints. IEEE Trans. Inf. Theory 60(10): 6474-6490 (2014) - [j25]Husheng Li, Ju Bin Song, Chien-Fei Chen, Lifeng Lai, Robert C. Qiu:
Behavior Propagation in Cognitive Radio Networks: A Social Network Approach. IEEE Trans. Wirel. Commun. 13(2): 646-657 (2014) - [c62]Huishuai Zhang, Yingbin Liang, Lifeng Lai:
Helper-assisted asymmetric two key generation. ACSSC 2014: 65-69 - [c61]Yi Huang, Shengli Zhou, Zhijie Shi, Lifeng Lai:
Experimental study of secret key generation in underwater acoustic channels. ACSSC 2014: 323-327 - [c60]Wenwen Zhao, Lifeng Lai:
Distributed testing against independence with multiple terminals. Allerton 2014: 1246-1251 - [c59]Ain Ul Aisha, Lifeng Lai, Yingbin Liang:
On fading poisson channels with varying noise levels. CISS 2014: 1-5 - [c58]Wenwen Tu, Lifeng Lai:
On secret key generation from finite source observations. CISS 2014: 1-6 - [c57]Jun Geng, Lifeng Lai:
Bayesian quickest detection with stochastic energy constraint. ICASSP 2014: 1846-1850 - [c56]Shaofeng Zou, Yingbin Liang, Lifeng Lai, Shlomo Shamai:
Layered secure broadcasting over MIMO channels and application in secret sharing. ISIT 2014: 396-400 - [c55]Huishuai Zhang, Lifeng Lai, Yingbin Liang, Hua Wang:
Secret key-private key generation over three terminals: Capacity region. ISIT 2014: 1141-1145 - [c54]Huishuai Zhang, Yingbin Liang, Lifeng Lai:
Key capacity region for a cellular source model. ITW 2014: 321-325 - [i25]Huishuai Zhang, Lifeng Lai, Yingbin Liang, Hua Wang:
The Capacity Region of the Source-Type Model for Secret Key and Private Key Generation. CoRR abs/1404.6471 (2014) - [i24]Shaofeng Zou, Yingbin Liang, Lifeng Lai, Shlomo Shamai:
An Information Theoretic Approach to Secret Sharing. CoRR abs/1404.6474 (2014) - [i23]Wenwen Tu, Lifeng Lai:
On the Simulatability Condition in Key Generation Over a Non-authenticated Public Channel. CoRR abs/1409.4064 (2014) - 2013
- [j24]Eduard A. Jorswieck, Lifeng Lai, Wing-Kin Ma, H. Vincent Poor, Walid Saad, A. Lee Swindlehurst:
Guest Editorial: Signal Processing for Wireless Physical Layer Security. IEEE J. Sel. Areas Commun. 31(9): 1657-1659 (2013) - [j23]Raied Caromi, Yan Xin, Lifeng Lai:
Fast Multiband Spectrum Scanning for Cognitive Radio Systems. IEEE Trans. Commun. 61(1): 63-75 (2013) - [j22]Jun Geng, Lifeng Lai:
Non-Bayesian Quickest Change Detection With Stochastic Sample Right Constraints. IEEE Trans. Signal Process. 61(20): 5090-5102 (2013) - [c53]Heng Zhou, Lauren M. Huie, Lifeng Lai:
Key generation through two-way relay channels under active attacks. ACSSC 2013: 56-60 - [c52]Weiyu Xu, Lifeng Lai:
Compressed hypothesis testing: To mix or not to mix? Allerton 2013: 1443-1449 - [c51]Bingwen Zhang, Lifeng Lai:
Optimal strategies in jamming resistant uncoordinated frequency hopping systems. CISS 2013: 1-6 - [c50]Heng Zhou, Lauren M. Huie, Lifeng Lai:
Key generation in two-way relay wireless channels. CISS 2013: 1-6 - [c49]Di Li, Lifeng Lai, Shuguang Cui:
Quickest change detection and identification across a sensor array. GlobalSIP 2013: 145-148 - [c48]Jun Geng, Lifeng Lai:
Bayesian quickest change point detection and localization in sensor networks. GlobalSIP 2013: 871-874 - [c47]Jun Geng, Lifeng Lai:
Non-Bayesian quickest detection with a stochastic energy constraint. ICASSP 2013: 6372-6376 - [c46]Siu-Wai Ho, Lifeng Lai, Alex J. Grant:
Source coding with side information for error free perfect secrecy systems. ISIT 2013: 2214-2218 - [c45]Lifeng Lai, Lauren M. Huie:
Simultaneously generating multiple keys in many to one networks. ISIT 2013: 2394-2398 - [c44]Jun Geng, Weiyu Xu, Lifeng Lai:
Quickest search over multiple sequences with mixed observations. ISIT 2013: 2582-2586 - [c43]Shaofeng Zou, Yingbin Liang, Lifeng Lai, Shlomo Shamai:
Layered decoding and secrecy over degraded broadcast channels. SPAWC 2013: 679-683 - [c42]Adam Blumenau, Alec Ishak, Brett Limone, Zachary Mintz, Corey Russell, Adrian Sudol, R. J. Linton, Lifeng Lai, Taskin Padir, Richard Van Hook:
Design and implementation of an Intelligent Portable Aerial Surveillance System (IPASS). TePRA 2013: 1-6 - [i22]Jun Geng, Weiyu Xu, Lifeng Lai:
Quickest Search Over Multiple Sequences with Mixed Observations. CoRR abs/1302.3826 (2013) - [i21]Jun Geng, Lifeng Lai:
Non-Bayesian Quickest Detection with Stochastic Sample Right Constraints. CoRR abs/1302.3834 (2013) - [i20]Di Li, Lifeng Lai, Shuguang Cui:
Quickest Change Point Detection and Identification Across a Generic Sensor Array. CoRR abs/1305.4199 (2013) - [i19]Erhan Bayraktar, Lifeng Lai:
Byzantine Fault Tolerant Distributed Quickest Change Detection. CoRR abs/1306.2086 (2013) - [i18]Jun Geng, Erhan Bayraktar, Lifeng Lai:
Bayesian Quickest Change Point Detection with Sampling Right Constraints. CoRR abs/1309.5396 (2013) - [i17]Jun Geng, Weiyu Xu, Lifeng Lai:
Quickest Search over Multiple Sequences with Mixed Observation. CoRR abs/1312.2287 (2013) - 2012
- [j21]Husheng Li, Lifeng Lai, H. Vincent Poor:
Multicast Routing for Decentralized Control of Cyber Physical Systems with an Application in Smart Grid. IEEE J. Sel. Areas Commun. 30(6): 1097-1107 (2012) - [j20]Lifeng Lai, Yingbin Liang, Wenliang Du:
Cooperative Key Generation in Wireless Networks. IEEE J. Sel. Areas Commun. 30(8): 1578-1588 (2012) - [j19]Lifeng Lai, Yingbin Liang, H. Vincent Poor:
A Unified Framework for Key Agreement Over Wireless Fading Channels. IEEE Trans. Inf. Forensics Secur. 7(2): 480-490 (2012) - [j18]Husheng Li, Shuping Gong, Lifeng Lai, Zhu Han, Robert Caiming Qiu, Depeng Yang:
Efficient and Secure Wireless Communications for Advanced Metering Infrastructure in Smart Grids. IEEE Trans. Smart Grid 3(3): 1540-1551 (2012) - [j17]Husheng Li, Lifeng Lai, Robert Caiming Qiu:
Scheduling of Wireless Metering for Power Market Pricing in Smart Grid. IEEE Trans. Smart Grid 3(4): 1611-1620 (2012) - [c41]Raied Caromi, Seshadri Mohan, Lifeng Lai:
Sequential good channel search for multi-channel cognitive radio. ACSCC 2012: 313-317 - [c40]Lifeng Lai:
Session TP8a2: Sensor and interference networks. ACSCC 2012: 1380-1382 - [c39]Jun Geng, Lifeng Lai, Erhan Bayraktar:
Quickest change point detection with sampling right constraints. Allerton Conference 2012: 874-881 - [c38]Raied Caromi, Lifeng Lai:
Optimal sequential channel estimation for multi-channel cognitive radio. CISS 2012: 1-6 - [c37]Jun Geng, Husheng Li, Lifeng Lai:
Smart grid system state measurement estimation over wireless channels. CISS 2012: 1-6 - [c36]Yingbin Liang, Lifeng Lai, H. Vincent Poor, Shlomo Shamai (Shitz):
Broadcasting over fading wiretap channels. ISIT 2012: 234-238 - [c35]Lifeng Lai, Siu-Wai Ho:
Simultaneously generating multiple keys and multi-commodity flow in networks. ITW 2012: 627-631 - [c34]Lifeng Lai:
Quickest change point identification across a sensor array. MILCOM 2012: 1-5 - [c33]Yi Huang, Lifeng Lai, Husheng Li, Wei Chen, Zhu Han:
Online quickest multiarmed bandit algorithm for distributive renewable energy resources. SmartGridComm 2012: 558-563 - [i16]Weiyu Xu, Lifeng Lai:
Compressed Hypothesis Testing: to Mix or Not to Mix? CoRR abs/1208.2311 (2012) - 2011
- [j16]Yingbin Liang, Lifeng Lai, John Halloran:
Distributed Cognitive Radio Network Management via Algorithms in Probabilistic Graphical Models. IEEE J. Sel. Areas Commun. 29(2): 338-348 (2011) - [j15]Lifeng Lai, Siu-Wai Ho, H. Vincent Poor:
Privacy-Security Trade-Offs in Biometric Security Systems - Part I: Single Use Case. IEEE Trans. Inf. Forensics Secur. 6(1): 122-139 (2011) - [j14]Lifeng Lai, Siu-Wai Ho, H. Vincent Poor:
Privacy-Security Trade-Offs in Biometric Security Systems - Part II: Multiple Use Case. IEEE Trans. Inf. Forensics Secur. 6(1): 140-151 (2011) - [j13]Onur Ozan Koyluoglu, Hesham El Gamal, Lifeng Lai, H. Vincent Poor:
Interference Alignment for Secrecy. IEEE Trans. Inf. Theory 57(6): 3323-3332 (2011) - [j12]Lifeng Lai, H. Vincent Poor, Yan Xin, Georgios Georgiadis:
Quickest Search Over Multiple Sequences. IEEE Trans. Inf. Theory 57(8): 5375-5386 (2011) - [j11]Lifeng Lai, Hesham El Gamal, Hai Jiang, H. Vincent Poor:
Cognitive Medium Access: Exploration, Exploitation, and Competition. IEEE Trans. Mob. Comput. 10(2): 239-253 (2011) - [j10]Husheng Li, Lifeng Lai, Weiyi Zhang:
Communication Requirement for Reliable and Secure State Estimation and Control in Smart Grid. IEEE Trans. Smart Grid 2(3): 476-486 (2011) - [c32]Lifeng Lai, Yingbin Liang, Wenliang Du:
PHY-based cooperative key generation in wireless networks. Allerton 2011: 662-669 - [c31]Husheng Li, Lifeng Lai, Seddik M. Djouadi, Xiao Ma:
Key establishment via common state information in networked control systems. ACC 2011: 2234-2239 - [c30]Husheng Li, Lifeng Lai, Robert Caiming Qiu:
A denial-of-service jamming game for remote state monitoring in smart grid. CISS 2011: 1-6 - [c29]Shuping Gong, Husheng Li, Lifeng Lai, Robert Caiming Qiu:
Decoding the 'Nature Encoded' Messages for Distributed Energy Generation Control in Microgrid. ICC 2011: 1-5 - [c28]Husheng Li, Chien-Fei Chen, Lifeng Lai:
Propagation of Spectrum Preference in Cognitive Radio Networks: A Social Network Approach. ICC 2011: 1-5 - [c27]Husheng Li, Lifeng Lai, Seddik M. Djouadi:
Combating False Reports for Secure Networked Control in Smart Grid via Trustiness Evaluation. ICC 2011: 1-5 - [c26]Lifeng Lai, Yingbin Liang, Wenliang Du, Shlomo Shamai:
Secret sharing via noisy broadcast channels. ISIT 2011: 1955-1959 - [c25]Siu-Wai Ho, Lifeng Lai, Alex J. Grant:
On the separation of encryption and compression in secure distributed source coding. ITW 2011: 653-657 - [c24]Jun Geng, Lifeng Lai:
Optimal Sequential Detection with Stochastic Energy Constraint. MSN 2011: 423-427 - [c23]Husheng Li, Zhu Han, Lifeng Lai, Robert C. Qiu, Depeng Yang:
Efficient and reliable multiple access for advanced metering in future smart grid. SmartGridComm 2011: 440-444 - 2010
- [j9]Yijia Fan, Lifeng Lai, Elza Erkip, H. Vincent Poor:
Rateless coding for MIMO fading channels: performance limits and code construction. IEEE Trans. Wirel. Commun. 9(4): 1288-1292 (2010) - [c22]Lifeng Lai, Yingbin Liang, H. Vincent Poor:
Key agreement over wireless fading channels with an active attacker. Allerton 2010: 1391-1396 - [c21]Yan Xin, Lifeng Lai:
Fast wideband spectrum scanning for multi-channel cognitive radio systems. CISS 2010: 1-6 - [c20]Yan Xin, Guosen Yue, Lifeng Lai:
Efficient Channel Search Algorithms for Cognitive Radio in a Multichannel System. GLOBECOM 2010: 1-5 - [c19]Lifeng Lai, Siu-Wai Ho, H. Vincent Poor:
Privacy-security tradeoffs in reusable biometric security systems. ICASSP 2010: 1722-1725 - [c18]Lifeng Lai, Yingbin Liang, Shlomo Shamai:
On the capacity region of the Poisson interference channels. ISIT 2010: 330-334 - [c17]Raied Caromi, Yan Xin, Lifeng Lai:
Fast multichannel spectrum scanning with multiple simultaneous observations. WCSP 2010: 1-5 - [i15]Shuping Gong, Husheng Li, Lifeng Lai, Robert Caiming Qiu:
Decoding the 'Nature Encoded' Messages for Distributed Energy Generation Control in Microgrid. CoRR abs/1010.3469 (2010) - [i14]Husheng Li, Lifeng Lai, Seddik M. Djouadi:
Combating False Reports for Secure Networked Control in Smart Grid via Trustiness Evaluation. CoRR abs/1010.3956 (2010)
2000 – 2009
- 2009
- [j8]Lifeng Lai, Hesham El Gamal, H. Vincent Poor:
Authentication Over Noisy Channels. IEEE Trans. Inf. Theory 55(2): 906-916 (2009) - [j7]Hai Jiang, Lifeng Lai, Rongfei Fan, H. Vincent Poor:
Optimal selection of channel sensing order in cognitive radio. IEEE Trans. Wirel. Commun. 8(1): 297-307 (2009) - [c16]Yingbin Liang, Lifeng Lai, John Halloran:
Distributed algorithm for collaborative detection in cognitive radio networks. Allerton 2009: 394-399 - [c15]Lifeng Lai, Siu-Wai Ho, H. Vincent Poor:
An Information Theoretic Framework for Biometric Security Systems. ICB 2009: 879-888 - [c14]Vaneet Aggarwal, Lifeng Lai, A. Robert Calderbank, H. Vincent Poor:
Wiretap channel type II with an active eavesdropper. ISIT 2009: 1944-1948 - 2008
- [j6]Lifeng Lai, Hesham El Gamal:
The Water-Filling Game in Fading Multiple-Access Channels. IEEE Trans. Inf. Theory 54(5): 2110-2122 (2008) - [j5]Lifeng Lai, Hesham El Gamal:
The Relay-Eavesdropper Channel: Cooperation for Secrecy. IEEE Trans. Inf. Theory 54(9): 4005-4019 (2008) - [j4]Praveen Kumar Gopala, Lifeng Lai, Hesham El Gamal:
On the Secrecy Capacity of Fading Channels. IEEE Trans. Inf. Theory 54(10): 4687-4698 (2008) - [j3]Lifeng Lai, Hesham El Gamal, H. Vincent Poor:
The Wiretap Channel With Feedback: Encryption Over the Channel. IEEE Trans. Inf. Theory 54(11): 5059-5067 (2008) - [j2]Lifeng Lai, Hesham El Gamal:
On cooperation in energy efficient wireless networks: the role of altruistic nodes. IEEE Trans. Wirel. Commun. 7(5-2): 1868-1878 (2008) - [c13]Lifeng Lai, Hai Jiang, H. Vincent Poor:
Medium access in cognitive radio networks: A competitive multi-armed bandit framework. ACSCC 2008: 98-102 - [c12]Lifeng Lai, Siu-Wai Ho, H. Vincent Poor:
Privacy-security tradeoffs in biometric security systems. Allerton 2008: 268-273 - [c11]Lifeng Lai, Yijia Fan, H. Vincent Poor:
Quickest Detection in Cognitive Radio: A Sequential Change Detection Framework. GLOBECOM 2008: 2957-2961 - [c10]Hai Jiang, Lifeng Lai, Rongfei Fan, H. Vincent Poor:
Cognitive Radio: How to Maximally Utilize Spectrum Opportunities in Sequential Sensing. GLOBECOM 2008: 4851-4855 - [c9]Lifeng Lai, Hesham El Gamal, Hai Jiang, H. Vincent Poor:
Optimal medium access control in cognitive radios: A sequential design approach. ICASSP 2008: 2073-2076 - [c8]Onur Ozan Koyluoglu, Hesham El Gamal, Lifeng Lai, H. Vincent Poor:
On the secure degrees of freedom in the K-user Gaussian interference channel. ISIT 2008: 384-388 - [c7]Yijia Fan, Lifeng Lai, Elza Erkip, H. Vincent Poor:
Rateless coding for MIMO block fading channels. ISIT 2008: 2252-2256 - [c6]Lifeng Lai, Hesham El Gamal, Hai Jiang, H. Vincent Poor:
Optimal medium access protocols for cognitive radio networks. WiOpt 2008: 328-334 - [i13]Lifeng Lai, Hesham El Gamal, Hai Jiang, H. Vincent Poor:
Optimal Medium Access Control in Cognitive Radios: A Sequential Design Approach. CoRR abs/0801.3289 (2008) - [i12]Lifeng Lai, Hesham El Gamal, H. Vincent Poor:
Authentication over Noisy Channels. CoRR abs/0802.2701 (2008) - [i11]Lifeng Lai, Hesham El Gamal, Hai Jiang, H. Vincent Poor:
Optimal Medium Access Protocols for Cognitive Radio Networks. CoRR abs/0802.2703 (2008) - [i10]Yijia Fan, Lifeng Lai, Elza Erkip, H. Vincent Poor:
Rateless Coding for MIMO Block Fading Channels. CoRR abs/0804.4662 (2008) - [i9]Onur Ozan Koyluoglu, Hesham El Gamal, Lifeng Lai, H. Vincent Poor:
On the Secure Degrees of Freedom in the K-User Gaussian Interference Channel. CoRR abs/0805.1340 (2008) - [i8]Onur Ozan Koyluoglu, Hesham El Gamal, Lifeng Lai, H. Vincent Poor:
Interference Alignment for Secrecy. CoRR abs/0810.1187 (2008) - 2007
- [c5]Lifeng Lai, Hesham El Gamal:
Cooperation for Secure Communication: The Relay Wiretap Channel. ICASSP (3) 2007: 149-152 - [c4]Lifeng Lai, Hesham El Gamal:
On Cooperation in Energy Limited Wireless Networks. INFOCOM 2007: 508-516 - [c3]Lifeng Lai, Hesham El Gamal:
Cooperative Secrecy: The Relay-Eavesdropper Channel. ISIT 2007: 931-935 - [c2]Praveen Kumar Gopala, Lifeng Lai, Hesham El Gamal:
On the Secrecy Capacity of Fading Channels. ISIT 2007: 1306-1310 - [i7]Lifeng Lai, Hesham El Gamal, H. Vincent Poor:
The Wiretap Channel with Feedback: Encryption over the Channel. CoRR abs/0704.2259 (2007) - [i6]Lifeng Lai, Hesham El Gamal, H. Vincent Poor:
Secrecy Capacity of the Wiretap Channel with Noisy Feedback. CoRR abs/0710.0865 (2007) - [i5]Lifeng Lai, Hesham El Gamal, Hai Jiang, H. Vincent Poor:
Cognitive Medium Access: Exploration, Exploitation and Competition. CoRR abs/0710.1385 (2007) - 2006
- [j1]Lifeng Lai, Ke Liu, Hesham El Gamal:
The three-node wireless network: achievable rates and Cooperation strategies. IEEE Trans. Inf. Theory 52(3): 805-828 (2006) - [c1]Lifeng Lai, Hesham El Gamal:
Fading Multiple Access Channels: A Game Theoretic Perspective. ISIT 2006: 1334-1338 - [i4]Praveen Kumar Gopala, Lifeng Lai, Hesham El Gamal:
On the Secrecy Capacity of Fading Channels. CoRR abs/cs/0610103 (2006) - [i3]Lifeng Lai, Hesham El Gamal:
The Relay-Eavesdropper Channel: Cooperation for Secrecy. CoRR abs/cs/0612044 (2006) - 2005
- [i2]Lifeng Lai, Ke Liu, Hesham El Gamal:
The Three Node Wireless Network: Achievable Rates and Cooperation Strategies. CoRR abs/cs/0507002 (2005) - [i1]Lifeng Lai, Hesham El Gamal:
The Water-Filling Game in Fading Multiple Access Channels. CoRR abs/cs/0512013 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint