Lifeng Lai
Title
Cited by
Cited by
Year
On the secrecy capacity of fading channels
PK Gopala, L Lai, H El Gamal
Information Theory, IEEE Transactions on 54 (10), 4687-4698, 2008
12822008
The relay–eavesdropper channel: Cooperation for secrecy
L Lai, H El Gamal
Information Theory, IEEE Transactions on 54 (9), 4005-4019, 2008
8242008
Cognitive medium access: Exploration, exploitation, and competition
L Lai, H El Gamal, H Jiang, HV Poor
Mobile Computing, IEEE Transactions on 10 (2), 239-253, 2011
3692011
Optimal selection of channel sensing order in cognitive radio
H Jiang, L Lai, R Fan, HV Poor
Wireless Communications, IEEE Transactions on 8 (1), 297-307, 2009
3542009
Quickest detection in cognitive radio: A sequential change detection framework
L Lai, Y Fan, HV Poor
Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE, 1-5, 2008
2062008
Interference alignment for secrecy
OO Koyluoglu, H El Gamal, L Lai, HV Poor
IEEE Transactions on Information Theory 57 (6), 3323-3332, 2011
1892011
The water-filling game in fading multiple-access channels
L Lai, H El Gamal
IEEE Transactions on Information Theory 54 (5), 2110-2122, 2008
1822008
The wiretap channel with feedback: Encryption over the channel
L Lai, H El Gamal, HV Poor
IEEE Transactions on Information Theory 54 (11), 5059-5067, 2008
1732008
A Denial-of-Service Jamming Game for Remote State Monitoring in Smart grid
H Li, L Lai, R Qiu
Conference on Information Sciences and Systems, 2011
170*2011
Multicast routing for decentralized control of cyber physical systems with an application in smart grid
H Li, L Lai, HV Poor
IEEE Journal on Selected Areas in Communications 30 (6), 1097-1107, 2012
1592012
Compressed meter reading for delay-sensitive and secure load report in smart grid
H Li, R Mao, L Lai, RC Qiu
Smart Grid Communications (SmartGridComm), 2010 First IEEE International …, 2010
1382010
The three-node wireless network: Achievable rates and cooperation strategies
L Lai, K Liu, H El Gamal
Information Theory, IEEE Transactions on 52 (3), 805-828, 2006
1302006
Blind parameter estimation of frequency-hopping signals based on time-frequency analysis [J]
J Zhao, Z ZHANG, LF Lai, Q CAO
Journal of circuits and systems 3, 2003
127*2003
A unified framework for key agreement over wireless fading channels
L Lai, Y Liang, HV Poor
IEEE Transactions on Information Forensics and Security 7 (2), 480-490, 2011
1222011
Security of autonomous systems employing embedded computing and sensors
AM Wyglinski, X Huang, T Padir, L Lai, TR Eisenbarth, ...
IEEE Micro 33 (1), 80-86, 2013
1192013
Authentication over noisy channels
L Lai, H El Gamal, HV Poor
Information Theory, IEEE Transactions on 55 (2), 906-916, 2009
1112009
Communication Requirement for Reliable and Secure State Estimation and Control in Smart Grid
H Li, L Lai, W Zhang
Smart Grid, IEEE Transactions on 2 (3), 476-486, 2011
1052011
Privacy–Security Trade-Offs in Biometric Security Systems—Part I: Single Use Case
L Lai, SW Ho, HV Poor
Information Forensics and Security, IEEE Transactions on 6 (1), 122-139, 2011
992011
Cooperative key generation in wireless networks
L Lai, Y Liang, W Du
Selected Areas in Communications, IEEE Journal on 30 (8), 1578-1588, 2012
982012
Medium access in cognitive radio networks: A competitive multi-armed bandit framework
L Lai, H Jiang, HV Poor
Signals, Systems and Computers, 2008 42nd Asilomar Conference on, 98-102, 2008
962008
The system can't perform the operation now. Try again later.
Articles 1–20