Publications

[2024]

[J34] W.-J. Jang, J.-Y. Yoon, J.-M. Park, and S.-H. Lee, "Federated learning algorithm for estimating the number of error bits from NAND flash threshold voltage distribution," submitted. 

[J33] K.-H. Cho and S.-H. Lee, "Covert communication over block fading channels with a half-duplex relay," submitted. 

[J32] J. Hur and S.-H. Lee, "Joint trajectory and power optimization for UAV redeployment against an eavesdropper under consistent fairness constraint," submitted. 

[J31] S.-H. Nam, V. Y. F. Tan, and S.-H. Lee, "Optimal private discrete distribution estimation with one-bit communication," submitted. (available at arXiv)

[J30]  H.-S. Im, K. Kim, and S.-H. Lee, "Trajectory optimization for cellular-enabled UAV with connectivity and battery constraints," submitted.  (available at arXiv)

[J29] S.-H. Nam, H.-Y. Park, and S.-H.Lee, "Achieving the exactly optimal privacy-utility trade-off with low communication cost via shared randomness," submitted. (S.-H. Nam and H.-Y. Park equally contributed to this work, available at arXiv)

[J28] J.-M. Park, W.-J. Jang, T.-H. Oh, S.-H. Lee, "Overcoming client data deficiency in federated learning by exploiting unlabeled data on the server," submitted. 

[C31]  S.-H. Nam, V. Y. F. Tan, and S.-H. Lee, "Optimal private discrete distribution estimation with one-bit communication," in Proc. IEEE International Symposium on Information Theory (ISIT), Athens, Greece, July 2024.

[C30]  S.-H. Nam, H.-Y. Park, and S.-H.Lee, "Achieving the exactly optimal privacy-utility trade-off with low communication cost via shared randomness," in Proc. IEEE International Symposium on Information Theory (ISIT), Athens, Greece, July 2024.  (S.-H. Nam and H.-Y. Park equally contributed to this work) 

[J27] H.-Y. Park, S.-H. Nam, and S.-H.Lee, "Exactly optimal and communication-efficient private estimation via block designs," IEEE Journal on Selected Areas in Information Theory, 2024.  

[C29] H. Yeom, J. Lee, S.-H. Lee, and J. Ha, "Covert communication with multi-users cooperation at unequal distances," IEEE  International Conference on Communications (ICC), Denver, USA, June. 2024

[J26] J. Lee, H. Yeom, S.-H. Lee, and J. Ha, "Channel correlation in multi-user covert communication: Friend or foe?," IEEE Transactions on Information Forensics and Security, vol. 19, pp.1469-1482, 2024. 

[2023]

[C28] H.-S. Im, K. Kim, and S.-H. Lee, "Trajectory optimization for cellular-enabled UAV with connectivity and battery constraints," in Proc. IEEE Vehicular Technology Conference (VTC), Oct. 2023. 

[C27] H.-Y. Park, S.-H. Nam, and S.-H.Lee, "Block design-based local differential privacy mechanisms," in Proc. IEEE International Symposium on Information Theory (ISIT), June 2023.

[J25] J. Lee, D. T. Dinh, H. Yeom, S.-H. Lee, and J. Ha, "Multi-user cooperation for covert communication under quasi-static fading, " IEEE Transactions on Information Forensics and Security, vol. 18, pp. 4625-4639, 2023. 

[J24] S. Hong, K. Kim, and S.-H. Lee, "A hybrid jamming detection algorithm for wireless communications: Simultaneous classification of known attacks and detection of unknown attacks," IEEE Communications Letters, vol. 27, pp. 1769-1773, July 2023.

[J23] H.-S. Im and S.-H. Lee, "Anti-jamming games in multi-band wireless ad hoc networks," IEEE Transactions on Information Forensics and Security, vol. 18, pp. 872-887, 2023.  

[2022]

[J22] S.-H. Nam and S.-H. Lee, "A tighter converse for the locally differentially private discrete distribution estimation under the one-bit communication constraint", IEEE Signal Processing Letters, vol. 29, pp. 1923-1927, 2022.

[J21] K.-H. Cho and S.-H. Lee, "Covert communication over Gaussian multiple-access channels with feedback," IEEE Wireless Communications Letters, vol. 11, no. 9, pp. 1985-1989, Sept. 2022.   

[J20]  S.-H. Nam and S.-H. Lee , "Secrecy capacity of a Gaussian wiretap channel with ADCs is always positive," IEEE Transactions on Information Theory, vol. 68, pp. 1186-1196, Feb. 2022. 

[2021]

[J19] H.-S. Im and S.-H. Lee, "Mobility-assisted covert communication over wireless ad hoc networks," IEEE Transactions on Information Forensics and Security., vol. 16, pp. 1768-1781, 2021.

[J18] K.-H. Cho and S.-H. Lee, "Treating interference as noise is optimal for covert communication over interference channels," IEEE Transactions on Information Forensics and Security, vol. 16, pp. 322-332, 2021.  

[2020]

[J17] K.-H. Cho, S.-H. Lee, and V. Y. F. Tan, "Throughput scaling of covert communication over wireless adhoc networks,"  IEEE Transactions on Information Theory, vol. 66, pp. 7684-7701, Dec. 2020.

[C-26] H.-S. Im and S.-H. Lee, "Mobility-assisted covert communication over wireless ad hoc networks," in Proc. IEEE International Symposium on Information Theory (ISIT), June 2020

[C-25] K.-H. Cho and S.-H. Lee, "Treating interference as noise is optimal for covert communication over interference channels," in Proc. IEEE International Symposium on Information Theory (ISIT), June 2020

[2019]

[C-24] S.-H. Nam and S.-H. Lee, "Secrecy capacity of a Gaussian wiretap channel with one-bit ADCs is always positive," in Proc. IEEE Information Theory Workshop (ITW), Visby, Aug. 2019.

[C-23] K.-H. Cho, S.-H. Lee , V. Y. F. Tan, "Throughput scaling of covert communication over wireless adhoc networks," in Proc. IEEE International Symposium on Information Theory (ISIT), Paris, July 2019

[J16] K.-H. Cho, S.-H. Lee, and A. Khisti, "Effect of user cooperation on smart meter privacy with rechargeable batteries," IEEE Signal Processing Letters, vol. 26, pp. 971-975, July 2019. 

[J15] V. Y. F. Tan and S.-H. Lee,  “Time-division is optimal for covert communication over some broadcast channels," IEEE Transactions on Information Forensics and Security, vol. 14, pp. 1377-1389, May 2019. 

[2018]

[J14] S.-H. Lee and A. Khisti, “The wiretapped diamond-relay channel,” IEEE Transactions on Information Theory, vol. 64, pp. 7194-7207, Nov. 2018.

[C-22] V. Y. F. Tan and S.-H. Lee, “Time-division is optimal for covert communication over some broadcast channels," in Proc. IEEE Information Theory Workshop (ITW), Nov. 2018.

[J13] S.-H. Lee and S.-Y. Chung, “A unified random coding bound,” IEEE Transactions on Information Theory, vol. 64, pp. 6779-6802, Oct. 2018. 

[J12] S.-H. Lee, L. Wang, A. Khisti, G. W. Wornell  "Covert communication with channel-state information at the transmitter," IEEE Transactions on Information Forensics and Security, vol. 13, pp. 2310-2319, Sept. 2018.  

[2017]

[C-21] S.-H. Lee, L. Wang, A. Khisti, and G. W. Wornell "Covert communication with noncausal channel-state information at the transmitter,'' in Proc. IEEE International Symposium on Information Theory (ISIT), Aachen, June 2017.

[C-20] S.-H. Lee, V. Y. F. Tan, and A. Khisti, "Exact moderate deviation asymptotics in streaming data transmission,'' in Proc. IEEE International Symposium on Information Theory (ISIT), Aachen, June 2017.

[J11] S.-H. Lee, V. Y. F. Tan, and A. Khisti, "Exact moderate deviation asymptotics in streaming data transmission,''  IEEE Transactions on Information Theory, vol. 63, pp. 2726-2737, May 2017.

[J10] S.-H. Lee, S.-W. Jeon, and B. C. Jung, “Successive interference cancellation with feedback for random access networks,” IEEE Communications Letters, vol. 21, pp. 825-828, April 2017.

[J9] Y. Liu, S.-H. Lee*, and A. Khisti, "Information-theoretic privacy in smart metering systems using cascaded rechargeable batteries,''  IEEE Signal Processing Letters, vol. 24, pp. 314-318, Mar 2017.

[J8] S.-H. Lee and A. Khisti, “The Gaussian diamond-wiretap channel with rate-limited relay cooperation,” IEEE Communications Letters, vol. 21, pp. 338-341, Feb. 2017.

[J7] S.-H. Lee, W. Zhao, and A. Khisti, “Secure degrees of freedom of the Gaussian diamond-wiretap channel,” IEEE Transactions on Information Theory, vol. 63, pp. 496-508, Jan. 2017.

[Before 2017]

[J6] S.-H. Lee, V. Y. F. Tan, and A. Khisti, “Streaming data transmission in the moderate deviations and central limit regimes,” IEEE Transactions on Information Theory, vol. 62, pp. 6816-6830, Dec. 2016.

[J5] W. Zhao, S.-H. Lee, and A. Khisti, “Phase-only zero forcing for secure communication with multiple antennas,” IEEE Journal of Selected Topics in Signal Processing, vol. 10, pp. 1334-1345, Dec. 2016.

[J4] S.-H. Lee and A. Khisti, “The Gaussian diamond-wiretap channel with conferencing relays,” IEEE Communications Letters, vol. 20, pp. 1393-1396, July 2016.

[C-19] S.-H. Lee, V. Y. F. Tan, and A. Khisti, "Streaming data transmission in the moderate deviations and central limit regimes,'' in Proc. IEEE International Symposium on Information Theory (ISIT), Barcelona, July 2016, pp. 3072-3076.

[C-18] S.-H. Lee, W. Zhao, and A. Khisti, "Secure degrees of freedom of the Gaussian diamond-wiretap channel,'' in Proc. IEEE International Symposium on Information Theory (ISIT), Barcelona, July 2016, pp. 2819-2823.

[J3] S.-H. Lee and A. Khisti, “Degraded Gaussian diamond-wiretap channel,” IEEE Transactions on Communications, vol. 63, pp. 5027-5038, Dec. 2015.

[C-17] S.-H. Lee and A. Khisti, "The degraded Gaussian diamond-wiretap channel,'' in Proc. IEEE International Symposium on Information Theory (ISIT), Hong Kong, June 2015, pp. 106-110.

[C-16] S.-H. Lee and S.-Y. Chung, "Noisy network coding with partial DF,'' in  Proc. IEEE  International Symposium on Information Theory (ISIT), Hong Kong, June 2015, pp. 2870-2874.

[C-15] S.-H. Lee and S.-Y. Chung, "A unified approach for network information theory,'' in Proc. IEEE International Symposium on Information Theory (ISIT), Hong Kong, June 2015, pp. 1277-1281.

[C-14] S.-H. Lee and S.-Y. Chung, "A unified approach for network information theory,'' Information Theory and Applications Workshop, San Diego, CA, Feb. 2015. (Invited poster, Selected by the ECE department at University of Toronto for presenting at ITA Graduation Day)

[C-13] S.-H. Lee and S.-Y. Chung, "A unified achievability theorem,'' Information Theory and Applications Workshop, San Diego, CA, Feb. 2014. (Invited talk)

[C-12] B. Kang, S.-H. Lee, S.-Y. Chung, and C. Suh, "A new achievable scheme for interference relay channels,'' in Proc. IEEE International Symposium on Information Theory (ISIT), Istanbul, Turkey, Jul. 2013.

[J2] S.-H. Lee and S.-Y. Chung, “Capacity of a class of multicast tree networks,” IEEE Transactions on Information Theory, vol. 59, no. 6, pp. 3848-3857, June 2013.

[C-11] H. W. Jeong, S.-H. Lee, and S.-Y. Chung, "Flashcast,'' in Proc. 18th Asia-Pacific Conference on Communications, Jeju, Korea, Oct. 2012.

[J1] S.-H. Lee and S.-Y. Chung, “Capacity scaling of wireless ad hoc networks: Shannon meets Maxwell," IEEE Transactions on Information Theory, vol. 58, no. 3, pp. 1702- 1715, Mar. 2012.

[C-10] S.-H. Lee and S.-Y. Chung, "Capacity of less noisy relay channels,'' in Proc. IEEE  International Symposium on Information Theory (ISIT), Saint Petersburg, Russia, Jul.-Aug. 2011, pp. 1529-1533.

[C-9] S.-H. Lee and S.-Y. Chung, "Capacity scaling of wireless ad hoc networks: Effect of finite wavelength,'' Seventh Workshop on Spatial Stochastic Models for Wireless Networks (SpaSWiN), Princeton, NJ, May 2011. (Invited talk)

[C-8] S.-H. Lee and S.-Y. Chung, "Capacity of less noisy relay channels,'' Information Theory and Applications Workshop, La Jolla, CA, Feb. 2011. (Invited talk)

[C-7] S.-H. Lee and S.-Y. Chung, "Capacity of a class of multicast tree networks,'' in Proc. Allerton Conference on Communication, Control, and Computing, Monticello, IL, Sep. 2010, pp. 1104-1109.

[C-6] S.-H. Lee and S.-Y. Chung, "Capacity scaling of wireless ad hoc networks: Effect of finite wavelength,'' in Proc. IEEE International Symposium on Information Theory (ISIT), Austin, TX, June 2010, pp. 1713-1717.

[C-5] S.-H. Lee and S.-Y. Chung, "Capacity of a class of tree networks,'' in Proc. IEEE International Symposium on Information Theory (ISIT), Austin, TX, June 2010, pp. 515-519.

[C-4] S.-H. Lee and S.-Y. Chung, "When is compress-and-forward optimal?'' in Proc. Information Theory and Applications Workshop, La Jolla, CA, Jan.-Feb. 2010. (Invited paper)

[C-3] S.-H. Lee and S.-Y. Chung, "Degrees of freedom of cooperative MIMO in cellular networks,'' in Proc. IEEE International Conference on Communications (ICC), Dresden, Germany, June 2009, pp. 1-5.

[C-2] S.-H. Lee and S.-Y. Chung, "Effect of channel correlation on the capacity scaling in wireless networks,'' in Proc. IEEE International Symposium on Information Theory (ISIT), Toronto, Canada, Jul. 2008, pp. 1128-1132.

[C-1] S.-H. Lee and S.-Y. Chung, "Beyond linear capacity scaling in wireless networks,'' Information Theory and Applications Workshop, La Jolla, CA, Jan. 2008. (Invited talk)