Journal Papers

International Journal Papers 

[J34] W.-J. Jang, J.-Y. Yoon, J.-M. Park, and S.-H. Lee, "Federated learning algorithm for estimating the number of error bits from NAND flash threshold voltage distribution," submitted. 

[J33] K.-H. Cho and S.-H. Lee, "Covert communication over block fading channels with a half-duplex relay," submitted. 

[J32] J. Hur and S.-H. Lee, "Joint trajectory and power optimization for UAV redeployment against an eavesdropper under consistent fairness constraint," submitted. 

[J31] S.-H. Nam, V. Y. F. Tan, and S.-H. Lee, "Optimal private discrete distribution estimation with one-bit communication," submitted. (available at arXiv)

[J30]  H.-S. Im, K. Kim, and S.-H. Lee, "Trajectory optimization for cellular-enabled UAV with connectivity and battery constraints," submitted.  (available at arXiv)

[J29] S.-H. Nam, H.-Y. Park, and S.-H.Lee, "Achieving the exactly optimal privacy-utility trade-off with low communication cost via shared randomness," submitted. (S.-H. Nam and H.-Y. Park equally contributed to this work, available at arXiv)

[J28] J.-M. Park, W.-J. Jang, T.-H. Oh, S.-H. Lee, "Overcoming client data deficiency in federated learning by exploiting unlabeled data on the server," submitted. 

[J27] H.-Y. Park, S.-H. Nam, and S.-H.Lee, "Exactly optimal and communication-efficient private estimation via block designs," IEEE Journal on Selected Areas in Information Theory, 2024.  

[J26] J. Lee, H. Yeom, S.-H. Lee, and J. Ha, "Channel correlation in multi-user covert communication: Friend or foe?," IEEE Transactions on Information Forensics and Security, vol. 19, pp.1469-1482, 2024. 

[J25] J. Lee, D. T. Dinh, H. Yeom, S.-H. Lee, and J. Ha, "Multi-user cooperation for covert communication under quasi-static fading, " IEEE Transactions on Information Forensics and Security, vol. 18, pp. 4625-4639, 2023

[J24] S. Hong, K. Kim, and S.-H. Lee, "A hybrid jamming detection algorithm for wireless communications: Simultaneous classification of known attacks and detection of unknown attacks," IEEE Communications Letters, vol. 27, pp. 1769-1773, July 2023.

[J23] H.-S. Im and S.-H. Lee, "Anti-jamming games in multi-band wireless ad hoc networks," IEEE Transactions on Information Forensics and Security, vol. 18, pp. 872-887, 2023.  

[J22] S.-H. Nam and S.-H. Lee, "A tighter converse for the locally differentially private discrete distribution estimation under the one-bit communication constraint", IEEE Signal Processing Letters, vol. 29, pp. 1923-1927, 2022.

[J21] K.-H. Cho and S.-H. Lee, "Covert communication over Gaussian multiple-access channels with feedback," IEEE Wireless Communications Letters, vol. 11, no. 9, pp. 1985-1989, Sept. 2022.   

[J20] S.-H. Nam and S.-H. Lee, "Secrecy capacity of a Gaussian wiretap channel with ADCs is always positive," IEEE Transactions on Information Theory, vol. 68, pp. 1186-1196, Feb. 2022. 

[J19] H.-S. Im and S.-H. Lee, "Mobility-assisted covert communication over wireless ad hoc networks," IEEE Transactions on Information Forensics and Security., vol. 16, pp. 1768-1781, 2021.

[J18] K.-H. Cho and S.-H. Lee, "Treating interference as noise is optimal for covert communication over interference channels," IEEE Transactions on Information Forensics and Security, vol. 16, pp. 322-332, 2021.  

[J17] K.-H. Cho, S.-H. Lee, and V. Y. F. Tan, "Throughput scaling of covert communication over wireless adhoc networks,"  IEEE Transactions on Information Theory, vol. 66, pp. 7684-7701, Dec. 2020.

[J16] K.-H. Cho, S.-H. Lee, and A. Khisti, "Effect of user cooperation on smart meter privacy with rechargeable batteries," IEEE Signal Processing Letters, vol. 26, pp. 971-975, July 2019. 

[J15] V. Y. F. Tan and S.-H. Lee,  “Time-division is optimal for covert communication over some broadcast channels," IEEE Transactions on Information Forensics and Security, vol. 14, pp. 1377-1389, May 2019. 

[J14] S.-H. Lee and A. Khisti, “The wiretapped diamond-relay channel,” IEEE Transactions on Information Theory, vol. 64, pp. 7194-7207, Nov. 2018.

[J13] S.-H. Lee and S.-Y. Chung, “A unified random coding bound,” IEEE Transactions on Information Theory, vol. 64, pp. 6779-6802, Oct. 2018. 

[J12] S.-H. Lee, L. Wang, A. Khisti, G. W. Wornell  "Covert communication with channel-state information at the transmitter," IEEE Transactions on Information Forensics and Security, vol. 13, pp. 2310-2319, Sept. 2018.  

[J11] S.-H. Lee, V. Y. F. Tan, and A. Khisti, "Exact moderate deviation asymptotics in streaming data transmission,''  IEEE Transactions on Information Theory, vol. 63, pp. 2726-2737, May 2017.

[J10] S.-H. Lee, S.-W. Jeon, and B. C. Jung, “Successive interference cancellation with feedback for random access networks,” IEEE Communications Letters, vol. 21, pp. 825-828, April 2017.

[J9] Y. Liu, S.-H. Lee*, and A. Khisti, "Information-theoretic privacy in smart metering systems using cascaded rechargeable batteries,''  IEEE Signal Processing Letters, vol. 24, pp. 314-318, Mar 2017.

[J8] S.-H. Lee and A. Khisti, “The Gaussian diamond-wiretap channel with rate-limited relay cooperation,” IEEE Communications Letters, vol. 21, pp. 338-341, Feb. 2017.

[J7] S.-H. Lee, W. Zhao, and A. Khisti, “Secure degrees of freedom of the Gaussian diamond-wiretap channel,” IEEE Transactions on Information Theory, vol. 63, pp. 496-508, Jan. 2017.

[J6] S.-H. Lee, V. Y. F. Tan, and A. Khisti, “Streaming data transmission in the moderate deviations and central limit regimes,” IEEE Transactions on Information Theory, vol. 62, pp. 6816-6830, Dec. 2016.

[J5] W. Zhao, S.-H. Lee, and A. Khisti, “Phase-only zero forcing for secure communication with multiple antennas,” IEEE Journal of Selected Topics in Signal Processing, vol. 10, pp. 1334-1345, Dec. 2016.

[J4] S.-H. Lee and A. Khisti, “The Gaussian diamond-wiretap channel with conferencing relays,” IEEE Communications Letters, vol. 20, pp. 1393-1396, July 2016.

[J3] S.-H. Lee and A. Khisti, “Degraded Gaussian diamond-wiretap channel,” IEEE Transactions on Communications, vol. 63, pp. 5027-5038, Dec. 2015.

[J2] S.-H. Lee and S.-Y. Chung, “Capacity of a class of multicast tree networks,” IEEE Transactions on Information Theory, vol. 59, no. 6, pp. 3848-3857, June 2013.

[J1] S.-H. Lee and S.-Y. Chung, “Capacity scaling of wireless ad hoc networks: Shannon meets Maxwell," IEEE Transactions on Information Theory, vol. 58, no. 3, pp. 1702- 1715, Mar. 2012.