On the secrecy capacity of fading channels PK Gopala, L Lai, H El Gamal Information Theory, IEEE Transactions on 54 (10), 4687-4698, 2008 | 1421 | 2008 |
The relay–eavesdropper channel: Cooperation for secrecy L Lai, H El Gamal Information Theory, IEEE Transactions on 54 (9), 4005-4019, 2008 | 861 | 2008 |
Cognitive medium access: Exploration, exploitation, and competition L Lai, H El Gamal, H Jiang, HV Poor Mobile Computing, IEEE Transactions on 10 (2), 239-253, 2011 | 418 | 2011 |
Optimal selection of channel sensing order in cognitive radio H Jiang, L Lai, R Fan, HV Poor Wireless Communications, IEEE Transactions on 8 (1), 297-307, 2009 | 365 | 2009 |
Quickest detection in cognitive radio: A sequential change detection framework L Lai, Y Fan, HV Poor Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE, 1-5, 2008 | 233 | 2008 |
Interference alignment for secrecy OO Koyluoglu, H El Gamal, L Lai, HV Poor IEEE Transactions on Information Theory 57 (6), 3323-3332, 2011 | 205 | 2011 |
Multicast routing for decentralized control of cyber physical systems with an application in smart grid H Li, L Lai, HV Poor IEEE Journal on Selected Areas in Communications 30 (6), 1097-1107, 2012 | 202 | 2012 |
A Denial-of-Service Jamming Game for Remote State Monitoring in Smart grid H Li, L Lai, R Qiu Conference on Information Sciences and Systems, 2011 | 193* | 2011 |
The water-filling game in fading multiple-access channels L Lai, H El Gamal IEEE Transactions on Information Theory 54 (5), 2110-2122, 2008 | 187 | 2008 |
The wiretap channel with feedback: Encryption over the channel L Lai, H El Gamal, HV Poor IEEE Transactions on Information Theory 54 (11), 5059-5067, 2008 | 182 | 2008 |
Security of autonomous systems employing embedded computing and sensors AM Wyglinski, X Huang, T Padir, L Lai, TR Eisenbarth, ... IEEE Micro 33 (1), 80-86, 2013 | 177 | 2013 |
Compressed meter reading for delay-sensitive and secure load report in smart grid H Li, R Mao, L Lai, RC Qiu Smart Grid Communications (SmartGridComm), 2010 First IEEE International …, 2010 | 146 | 2010 |
A unified framework for key agreement over wireless fading channels L Lai, Y Liang, HV Poor IEEE Transactions on Information Forensics and Security 7 (2), 480-490, 2011 | 134 | 2011 |
The three-node wireless network: Achievable rates and cooperation strategies L Lai, K Liu, H El Gamal Information Theory, IEEE Transactions on 52 (3), 805-828, 2006 | 131 | 2006 |
Authentication over noisy channels L Lai, H El Gamal, HV Poor Information Theory, IEEE Transactions on 55 (2), 906-916, 2009 | 127 | 2009 |
Medium access in cognitive radio networks: A competitive multi-armed bandit framework L Lai, H Jiang, HV Poor Signals, Systems and Computers, 2008 42nd Asilomar Conference on, 98-102, 2008 | 121 | 2008 |
Communication requirement for reliable and secure state estimation and control in smart grid H Li, L Lai, W Zhang IEEE Transactions on Smart Grid 2 (3), 476-486, 2011 | 119 | 2011 |
Efficient and secure wireless communications for advanced metering infrastructure in smart grids H Li, S Gong, L Lai, Z Han, RC Qiu, D Yang IEEE Transactions on Smart Grid 3 (3), 1540-1551, 2012 | 113 | 2012 |
Privacy–Security Trade-Offs in Biometric Security Systems—Part I: Single Use Case L Lai, SW Ho, HV Poor Information Forensics and Security, IEEE Transactions on 6 (1), 122-139, 2011 | 112 | 2011 |
Cooperative key generation in wireless networks L Lai, Y Liang, W Du Selected Areas in Communications, IEEE Journal on 30 (8), 1578-1588, 2012 | 106 | 2012 |