Folgen
Lifeng Lai
Titel
Zitiert von
Zitiert von
Jahr
On the secrecy capacity of fading channels
PK Gopala, L Lai, H El Gamal
Information Theory, IEEE Transactions on 54 (10), 4687-4698, 2008
13502008
The relay–eavesdropper channel: Cooperation for secrecy
L Lai, H El Gamal
Information Theory, IEEE Transactions on 54 (9), 4005-4019, 2008
8492008
Cognitive medium access: Exploration, exploitation, and competition
L Lai, H El Gamal, H Jiang, HV Poor
Mobile Computing, IEEE Transactions on 10 (2), 239-253, 2011
3822011
Optimal selection of channel sensing order in cognitive radio
H Jiang, L Lai, R Fan, HV Poor
Wireless Communications, IEEE Transactions on 8 (1), 297-307, 2009
3582009
Quickest detection in cognitive radio: A sequential change detection framework
L Lai, Y Fan, HV Poor
Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE, 1-5, 2008
2162008
Interference alignment for secrecy
OO Koyluoglu, H El Gamal, L Lai, HV Poor
IEEE Transactions on Information Theory 57 (6), 3323-3332, 2011
1962011
The water-filling game in fading multiple-access channels
L Lai, H El Gamal
IEEE Transactions on Information Theory 54 (5), 2110-2122, 2008
1842008
The wiretap channel with feedback: Encryption over the channel
L Lai, H El Gamal, HV Poor
IEEE Transactions on Information Theory 54 (11), 5059-5067, 2008
1782008
A Denial-of-Service Jamming Game for Remote State Monitoring in Smart grid
H Li, L Lai, R Qiu
Conference on Information Sciences and Systems, 2011
177*2011
Multicast routing for decentralized control of cyber physical systems with an application in smart grid
H Li, L Lai, HV Poor
IEEE Journal on Selected Areas in Communications 30 (6), 1097-1107, 2012
1762012
Compressed meter reading for delay-sensitive and secure load report in smart grid
H Li, R Mao, L Lai, RC Qiu
Smart Grid Communications (SmartGridComm), 2010 First IEEE International …, 2010
1422010
Security of autonomous systems employing embedded computing and sensors
AM Wyglinski, X Huang, T Padir, L Lai, TR Eisenbarth, ...
IEEE Micro 33 (1), 80-86, 2013
1402013
The three-node wireless network: Achievable rates and cooperation strategies
L Lai, K Liu, H El Gamal
Information Theory, IEEE Transactions on 52 (3), 805-828, 2006
1302006
A unified framework for key agreement over wireless fading channels
L Lai, Y Liang, HV Poor
IEEE Transactions on Information Forensics and Security 7 (2), 480-490, 2011
1232011
Authentication over noisy channels
L Lai, H El Gamal, HV Poor
Information Theory, IEEE Transactions on 55 (2), 906-916, 2009
1202009
Communication Requirement for Reliable and Secure State Estimation and Control in Smart Grid
H Li, L Lai, W Zhang
Smart Grid, IEEE Transactions on 2 (3), 476-486, 2011
1122011
Medium access in cognitive radio networks: A competitive multi-armed bandit framework
L Lai, H Jiang, HV Poor
Signals, Systems and Computers, 2008 42nd Asilomar Conference on, 98-102, 2008
1092008
Privacy–Security Trade-Offs in Biometric Security Systems—Part I: Single Use Case
L Lai, SW Ho, HV Poor
Information Forensics and Security, IEEE Transactions on 6 (1), 122-139, 2011
1072011
Efficient and secure wireless communications for advanced metering infrastructure in smart grids
H Li, S Gong, L Lai, Z Han, RC Qiu, D Yang
IEEE Transactions on Smart Grid 3 (3), 1540-1551, 2012
1032012
Cooperative key generation in wireless networks
L Lai, Y Liang, W Du
Selected Areas in Communications, IEEE Journal on 30 (8), 1578-1588, 2012
1002012
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20