Follow
Lifeng Lai
Title
Cited by
Cited by
Year
On the secrecy capacity of fading channels
PK Gopala, L Lai, H El Gamal
Information Theory, IEEE Transactions on 54 (10), 4687-4698, 2008
13362008
The relay–eavesdropper channel: Cooperation for secrecy
L Lai, H El Gamal
Information Theory, IEEE Transactions on 54 (9), 4005-4019, 2008
8432008
Cognitive medium access: Exploration, exploitation, and competition
L Lai, H El Gamal, H Jiang, HV Poor
Mobile Computing, IEEE Transactions on 10 (2), 239-253, 2011
3792011
Optimal selection of channel sensing order in cognitive radio
H Jiang, L Lai, R Fan, HV Poor
Wireless Communications, IEEE Transactions on 8 (1), 297-307, 2009
3582009
Quickest detection in cognitive radio: A sequential change detection framework
L Lai, Y Fan, HV Poor
Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE, 1-5, 2008
2152008
Interference alignment for secrecy
OO Koyluoglu, H El Gamal, L Lai, HV Poor
IEEE Transactions on Information Theory 57 (6), 3323-3332, 2011
1972011
The water-filling game in fading multiple-access channels
L Lai, H El Gamal
IEEE Transactions on Information Theory 54 (5), 2110-2122, 2008
1842008
A Denial-of-Service Jamming Game for Remote State Monitoring in Smart grid
H Li, L Lai, R Qiu
Conference on Information Sciences and Systems, 2011
176*2011
The wiretap channel with feedback: Encryption over the channel
L Lai, H El Gamal, HV Poor
IEEE Transactions on Information Theory 54 (11), 5059-5067, 2008
1762008
Multicast routing for decentralized control of cyber physical systems with an application in smart grid
H Li, L Lai, HV Poor
IEEE Journal on Selected Areas in Communications 30 (6), 1097-1107, 2012
1702012
Compressed meter reading for delay-sensitive and secure load report in smart grid
H Li, R Mao, L Lai, RC Qiu
Smart Grid Communications (SmartGridComm), 2010 First IEEE International …, 2010
1422010
Security of autonomous systems employing embedded computing and sensors
AM Wyglinski, X Huang, T Padir, L Lai, TR Eisenbarth, ...
IEEE Micro 33 (1), 80-86, 2013
1322013
The three-node wireless network: Achievable rates and cooperation strategies
L Lai, K Liu, H El Gamal
Information Theory, IEEE Transactions on 52 (3), 805-828, 2006
1312006
A unified framework for key agreement over wireless fading channels
L Lai, Y Liang, HV Poor
IEEE Transactions on Information Forensics and Security 7 (2), 480-490, 2011
1212011
Authentication over noisy channels
L Lai, H El Gamal, HV Poor
Information Theory, IEEE Transactions on 55 (2), 906-916, 2009
1162009
Communication Requirement for Reliable and Secure State Estimation and Control in Smart Grid
H Li, L Lai, W Zhang
Smart Grid, IEEE Transactions on 2 (3), 476-486, 2011
1092011
Privacy–Security Trade-Offs in Biometric Security Systems—Part I: Single Use Case
L Lai, SW Ho, HV Poor
Information Forensics and Security, IEEE Transactions on 6 (1), 122-139, 2011
1042011
Medium access in cognitive radio networks: A competitive multi-armed bandit framework
L Lai, H Jiang, HV Poor
Signals, Systems and Computers, 2008 42nd Asilomar Conference on, 98-102, 2008
1042008
Efficient and secure wireless communications for advanced metering infrastructure in smart grids
H Li, S Gong, L Lai, Z Han, RC Qiu, D Yang
IEEE Transactions on Smart Grid 3 (3), 1540-1551, 2012
1012012
Cooperative key generation in wireless networks
L Lai, Y Liang, W Du
Selected Areas in Communications, IEEE Journal on 30 (8), 1578-1588, 2012
992012
The system can't perform the operation now. Try again later.
Articles 1–20