Physical Layer Security
[J35] K.-H. Cho and S.-H. Lee, "Covert communication over block fading channels with a half-duplex relay," submitted.
[J30] J. Hur and S.-H. Lee, "Joint trajectory and power optimization for UAV redeployment against an eavesdropper under consistent fairness constraint," IEEE Communications Letters, vol. 28, 2024.
[C29] H. Yeom, J. Lee, S.-H. Lee, and J. Ha, "Covert communication with multi-users cooperation at unequal distances," IEEE International Conference on Communications (ICC), Denver, USA, June. 2024
[J26] J. Lee, H. Yeom, S.-H. Lee, and J. Ha, "Channel correlation in multi-user covert communication: Friend or foe?," IEEE Transactions on Information Forensics and Security, vol. 19, pp.1469-1482, 2024.
[J25] J. Lee, D. T. Dinh, H. Yeom, S.-H. Lee, and J. Ha, "Multi-user cooperation for covert communication under quasi-static fading, " IEEE Transactions on Information Forensics and Security, vol. 18, pp. 4625-4639, 2023.
[J24] S. Hong, K. Kim, and S.-H. Lee, "A hybrid jamming detection algorithm for wireless communications: Simultaneous classification of known attacks and detection of unknown attacks," IEEE Communications Letters, vol. 27, pp. 1769-1773, July 2023.
[J23] H.-S. Im and S.-H. Lee, "Anti-jamming games in multi-band wireless ad hoc networks," IEEE Transactions on Information Forensics and Security, vol. 18, pp. 872-887, 2023.
[J21] K.-H. Cho and S.-H. Lee, "Covert communication over Gaussian multiple-access channels with feedback," IEEE Wireless Communications Letters, vol. 11, no. 9, pp. 1985-1989, Sept. 2022.
[J20] S.-H. Nam and S.-H. Lee, "Secrecy capacity of a Gaussian wiretap channel with ADCs is always positive," IEEE Transactions on Information Theory, vol. 68, pp. 1186-1196, Feb. 2022.
[J19] H.-S. Im and S.-H. Lee, "Mobility-assisted covert communication over wireless ad hoc networks," IEEE Transactions on Information Forensics and Security., vol. 16, pp. 1768-1781, 2021.
[J18] K.-H. Cho and S.-H. Lee, "Treating interference as noise is optimal for covert communication over interference channels," IEEE Transactions on Information Forensics and Security, vol. 16, pp. 322-332, 2021.
[J17] K.-H. Cho, S.-H. Lee, and V. Y. F. Tan, "Throughput scaling of covert communication over wireless adhoc networks," IEEE Transactions on Information Theory, vol. 66, pp. 7684-7701, Dec. 2020.
[C-26] H.-S. Im and S.-H. Lee, "Mobility-assisted covert communication over wireless ad hoc networks," in Proc. IEEE International Symposium on Information Theory (ISIT), June 2020
[C-25] K.-H. Cho and S.-H. Lee, "Treating interference as noise is optimal for covert communication over interference channels," in Proc. IEEE International Symposium on Information Theory (ISIT), June 2020
[C-24] S.-H. Nam and S.-H. Lee, "Secrecy capacity of a Gaussian wiretap channel with one-bit ADCs is always positive," in Proc. IEEE Information Theory Workshop (ITW), Visby, Aug. 2019.
[C-23] K.-H. Cho, S.-H. Lee , V. Y. F. Tan, "Throughput scaling of covert communication over wireless adhoc networks," in Proc. IEEE International Symposium on Information Theory (ISIT), Paris, July 2019
[J15] V. Y. F. Tan and S.-H. Lee, “Time-division is optimal for covert communication over some broadcast channels," IEEE Transactions on Information Forensics and Security, vol. 14, pp. 1377-1389, May 2019.
[J14] S.-H. Lee and A. Khisti, “The wiretapped diamond-relay channel,” IEEE Transactions on Information Theory, vol. 64, pp. 7194-7207, Nov. 2018.
[C-22] V. Y. F. Tan and S.-H. Lee, “Time-division is optimal for covert communication over some broadcast channels," in Proc. IEEE Information Theory Workshop (ITW), Nov. 2018.
[J12] S.-H. Lee, L. Wang, A. Khisti, G. W. Wornell "Covert communication with channel-state information at the transmitter," IEEE Transactions on Information Forensics and Security, vol. 13, pp. 2310-2319, Sept. 2018.
[C-21] S.-H. Lee, L. Wang, A. Khisti, and G. W. Wornell "Covert communication with noncausal channel-state information at the transmitter,'' in Proc. IEEE International Symposium on Information Theory (ISIT), Aachen, June 2017.
[J8] S.-H. Lee and A. Khisti, “The Gaussian diamond-wiretap channel with rate-limited relay cooperation,” IEEE Communications Letters, vol. 21, pp. 338-341, Feb. 2017.
[J7] S.-H. Lee, W. Zhao, and A. Khisti, “Secure degrees of freedom of the Gaussian diamond-wiretap channel,” IEEE Transactions on Information Theory, vol. 63, pp. 496-508, Jan. 2017.
[J5] W. Zhao, S.-H. Lee, and A. Khisti, “Phase-only zero forcing for secure communication with multiple antennas,” IEEE Journal of Selected Topics in Signal Processing, vol. 10, pp. 1334-1345, Dec. 2016.
[J4] S.-H. Lee and A. Khisti, “The Gaussian diamond-wiretap channel with conferencing relays,” IEEE Communications Letters, vol. 20, pp. 1393-1396, July 2016.
[C-18] S.-H. Lee, W. Zhao, and A. Khisti, "Secure degrees of freedom of the Gaussian diamond-wiretap channel,'' in Proc. IEEE International Symposium on Information Theory (ISIT), Barcelona, July 2016, pp. 2819-2823.
[J3] S.-H. Lee and A. Khisti, “Degraded Gaussian diamond-wiretap channel,” IEEE Transactions on Communications, vol. 63, pp. 5027-5038, Dec. 2015.
[C-17] S.-H. Lee and A. Khisti, "The degraded Gaussian diamond-wiretap channel,'' in Proc. IEEE International Symposium on Information Theory (ISIT), Hong Kong, June 2015, pp. 106-110.