Selected Publications in Reverse Chronological Order
Preprint
- Y. Jin, K. Balasubramanian, L. Lai, “Provable In-context Learning for Mixture of Linear Regressions using Transformers”. Submitted.
- H. Liang, K. Balasubramanian, L. Lai, “Transformers Handle Endogeneity in In-Context Linear Regression”. Submitted.
- X. Ni and L. Lai, “Risk-Sensitive Reinforcement Learning with Phi-Divergence-Risk,” IEEE Transactions on Information Theory. Submitted.
- P. Zhao and L. Lai, “Minimax Optimal Q Learning with Nearest Neighbors,” IEEE Transactions on Information Theory. Submitted.
- M. Huang, K. Ji, S. Ma and L. Lai, “Efficiently Escaping Saddle Points in Bilevel Optimization“. Journal on Machine Learning Research. Submitted.
Accepted or Published
2024
- P. Zhao, L. Lai, L. Shen, Q. Li, J. Wu and Z. Liu, “A Huber Loss Minimization Approach to Mean Estimation under User-level Differential Privacy“, Conference on Neural Information Processing Systems (NeurIPS), 2024.
- C. Yang, G. Liu and L. Lai, “Stochastic Bandits with Non-stationary Rewards: Reward Attack and Defense,” IEEE Transactions on Signal Processing. To appear.
- G. Liu, Z. Zhou, H. Liu and L. Lai, “Efficient Action Robust Reinforcement Learning with Probabilistic Policy Execution Uncertainty“. Transaction on Machine Learning Research. 2024.
- X. Ni, G. Liu and L. Lai, “Risk-Sensitive Reward-Free Reinforcement Learning with CVaR“, International Conference on Machine Learning (ICML), 2024.
- M. Huang, S. Ma and L. Lai, “On the Convergence of Projected Alternating Maximization for Equitable and Optimal Transport“. Journal on Machine Learning Research. 2024.
2023
- G. Liu and L. Lai, “Efficient Adversarial Attacks on Online Multi-agent Reinforcement Learning“, Conference on Neural Information Processing Systems (NeurIPS), 2023.
- Y. Jin and L. Lai, “Fairness-aware Regression Robust to Adversarial Attacks“. IEEE Transactions on Signal Processing.
- X. Ma, L. Lai and S. Cui, “Bayesian Two-stage Sequential Change Diagnosis Via Sensor Arrays“. IEEE Transactions on Information Theory.
- G. Liu and L. Lai, “Action Poisoning Attacks on Linear Contextual Bandits“. Transactions on Machine Learning Research.
2022
- P. Zhao and L. Lai, “Analysis of KNN Density Estimation,” IEEE Transactions on Information Theory.
- Y. Jin and L. Lai, “Optimal Accuracy-Privacy Trade-off of Inference as Service,” IEEE Transactions on Signal Processing.
2021
- G. Liu and L. Lai, “Provably Efficient Black-Box Action Poisoning Attacks Against Reinforcement Learning“, Conference on Neural Information Processing Systems (NeurIPS), 2021
- M. Huang, S. Ma and L. Lai, “A Riemannian Block Coordinate Descent Method for Computing the Projection Robust Wasserstein Distance,” International Conference on Machine Learning (ICML), 2021.
- M. Huang, S. Ma and L. Lai, “Projection Robust Wasserstein Barycenter,” International Conference on Machine Learning (ICML), 2021.
- X. Ma, L. Lai and S. Cui, “Two-Stage Bayesian Sequential Change Diagnosis,” IEEE Transactions on Signal Processing.
- F. Li, L. Lai and S. Cui, “Optimal Feature Manipulation Attacks Against Linear Regression,” IEEE Transactions on Signal Processing.
- F. Li, L. Lai and S. Cui, “On the Adversarial Robustness of LASSO Based Feature Selection,” IEEE Transactions on Signal Processing.
- P. Zhao and L. Lai, “Minimax Rate Optimal Adaptive Nearest Neighbor Classification and Regression,” IEEE Transactions on Information Theory.
- M. Huang, S. Ma and L. Lai, “Robust Low-rank Matrix Completion via an Alternating Manifold Proximal Gradient Continuation Method,” IEEE Transactions on Signal Processing.
- M. Cho, L. Lai and W. Xu, “Distributed Dual Coordinate Ascent in General Tree Networks and Communication Network Effect on Synchronous Machine Learning,” IEEE JSAC Series on Machine Learning for Communications and Networks.
- P. Zhao and L. Lai, “Efficient Classification with Adaptive KNN,” AAAI Conference on Articial Intelligence (AAAI), Feb. 2021.
- Y. Jin and L. Lai, “On the Adversarial Robustness of Hypothesis Testing,” IEEE Transactions on Signal Processing, vol. 69, pp. 515-530, 2021.
2020
- P. Zhao and L. Lai, “Minimax Optimal Estimation of KL Divergence for Continuous Distributions,” IEEE Transactions on Information Theory, vol. 66, no. 12, pp. 7787- 7811, Dec. 2020.
- X. Cao and L. Lai, “Distributed Approximate Newton’s Method Robust to Byzantine Attackers,” IEEE Transactions on Signal Processing, vol. 68, pp. 6011-6025, 2020.
- G. Liu and L. Lai, “Action-Manipulation Attacks Against Stochastic Bandits: Attacks and Defense,” IEEE Transactions on Signal Processing, vol. 68, pp. 5152-5165, 2020.
- L. Lai and E. Bayraktar, ”On the Adversarial Robustness of Robust Estimators“. IEEE Transactions on Information Theory, vol. 66, no. 8, pp. 5097- 5109, Aug. 2020.
- P. Zhao and L. Lai, “Analysis of KNN Information Estimators for Smooth Distributions,” IEEE Transactions on Information Theory, vol. 66, no. 6, pp. 3798-3826, June 2020.
- F. Li, L. Lai and S. Cui, “On the Adversarial Robustness of Subspace Learning,” IEEE Transactions on Signal Processing, vol. 68, pp. 1470-1483, Mar. 2020.
2019
- X. Cao and L. Lai, “Distributed Gradient Descent Algorithm Robust to an Arbitrary Number of Byzantine Attackers,” IEEE Transactions on Signal Processing, vol.67, no. 22, pp. 5850-5864, Nov. 2019.
- W. Tu and L. Lai, “On Function Computation with Privacy and Secrecy Constraints,” IEEE Transactions on Information Theory, vol. 65, no. 10, pp. 6716-6733, Oct. 2019.
- J. Geng, B. Zhang, L. Huie and L. Lai, “Online Change-Point Detection of Linear Regression Models,” IEEE Transactions on Signal Processing, vol, 67, no. 12, pp. 3316-3329, June 2019.
2018
- W. Zhao and L. Lai, “Distributed Testing With Cascaded Encoders“, IEEE Transactions on Information Theory, vol. 64, no. 11, pp. 7339- 7348, Nov. 2018.
- W. Tu and L. Lai, “Keyless Authentication and Authenticated Capacity,” IEEE Transactions on Information Theory, vol. 64, no. 5, pp. 3696- 3714, May 2018.
- G. Fellouris, E. Bayraktar and L. Lai, “Efficient Byzantine Sequential Change Detection,” IEEE Transactions on Information Theory, vol. 64, no. 5, pp. 3346- 3360, May 2018.
- S. Zou, Y. Liang, L. Lai, H. V. Poor and S. Shamai (Shitz), “Degraded Broadcast Channel with Secrecy Outside a Bounded Range,” IEEE Transactions on Information Theory, vol. 64, no. 3, pp. 2104-2120, Mar. 2018.
- C. Tsinos, F. Foukalas, T. Khattab and L. Lai, “On Channel Selection for Carrier Aggregation Systems,” IEEE Transactions on Communications, vol. 66, no. 2, pp. 808-818, Feb. 2018.
- S.-W. Ho, A. A. Saed, L. Lai and C. W. Sung, “Coding and Bounds for Channel Estimation in Visible Light Communications and Positioning,” IEEE Journal on Selected Areas in Communications, vol. 36, no. 1, pp. 34-44, Jan. 2018.
2017
- Ain-ul-Aisha, L. Lai , Y. Liang and S. Shamai (Shitz), “Sum-Rate Capacity of Poisson MIMO Multiple-Access Channels,” IEEE Transactions on Communications, vol. 65, no. 11, pp. 4765-4776, Nov. 2017.
- Ain-ul-Aisha, L. Lai , Y. Liang and S. Shamai (Shitz), “On the Sum-Rate Capacity of Poisson MISO Multiple Access Channels,” IEEE Transactions on Information Theory, vol. 63, no. 10, pp. 6457-6473, Oct. 2017.
- H. Zhang, Y. Liang, L. Lai and S. Shamai (Shitz), “Multi-Key Generation over a Cellular Model with a Helper,” IEEE Transactions on Information Theory, vol. 63, no. 6, pp. 3804- 3822, June 2017.
- M. El Gamal and L. Lai, “On Rate Requirements for Achieving the Centralized Performance in Distributed Estimation,” IEEE Transactions on Signal Processing, vol. 65, no. 8, pp. 2020- 2032, Apr. 2017.
- W. Tu, M. Goldenbaum, L. Lai and H. V. Poor, “On Simultaneously Generating Multiple Keys in Joint Source-Channel Model,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 2, pp. 298-308, Feb. 2017.
2016
- J. Geng, W. Xu and L. Lai, “Quickest Sequential Muti-Band Spectrum Sensing with Mixed Observations,” IEEE Transactions on Signal Processing, vol. 64, no. 22, pp. 5861-5874, Nov. 2016.
- Y. Huang, S. Zhou, Z. Shi and L. Lai, “Channel Frequency Response-Based Secret Key Generation in Underwater Acoustic Systems,” IEEE Transactions on Wireless Communications, vol. 15, no. 9, pp. 5875-5888, Sept. 2016.
- W. Zhao and L. Lai, “Distributed Detection with Vector Quantizer,” IEEE Transactions on Signal and Information Processing over Networks, vol.2, no. 2, pp. 105-119, June 2016.
2015
- Ain-ul-Aisha, L. Lai and Y. Liang, “Optimal Power Allocation for Poisson Channels with Time-Varying Background Light,” IEEE Transactions on Communications, vol. 63, no. 11, pp. 4327-4338, Nov. 2015.
- L. Lai and S.-W. Ho, “Key Generation Algorithms for Pairwise Independent Networks Based on Graphical Models,” IEEE Transactions on Information Theory, vol. 61, no. 9, pp. 4828-4837, Sept. 2015.
- S. Zou, Y. Liang, L. Lai and S. Shamai (Shitz), “An Information Theoretic Approach to Secret Sharing,” IEEE Transactions on Information Theory, vol. 61, no. 6, pp. 3121-3136, June 2015.
- B. Zhang, J. Geng and L. Lai, “Multiple Change-Points Estimation in Linear Regression Models via Sparse Group Lasso,” IEEE Transactions on Signal Processing, vol. 63, no. 9, pp. 2209-2224, May 2015.
- E. Bayraktar and L. Lai, “Byzantine Fault Tolerant Distributed Quickest Change Detection,” SIAM Journal on Control and Optimization, vol. 53, no. 2, pp. 575-591, Mar. 2015.
- L. Lai , Y. Liang and S. Shamai (Shitz), “On the Capacity Bounds for Poisson Interference Channels,” IEEE Transactions on Information Theory, vol. 61, no. 1, pp. 223-238, Jan. 2015.
2014
- H. Zhang, L. Lai , Y. Liang and H. Wang, “The Capacity Region of the Source-Type Model for Secret Key and Private Key Generation,” IEEE Transactions on Information Theory, vol. 60, no. 10, pp.6389-6398, Oct. 2014.
- J. Geng, E. Bayraktar and L. Lai, “Bayesian Quickest Change Point Detection with Sampling Right Constraints,” IEEE Transactions on Information Theory, vol. 60, no. 10, pp.6474-6490, Oct. 2014.
- R. Caromi, S. Mohan and L. Lai, “Optimal Sequential Channel Estimation and Probing for Multiband Cognitive Radio Systems,” IEEE Transactions on Communications, vol. 62, no. 8, pp. 2696-2708, Aug. 2014.
- H. Zhou, L. Huie and L. Lai, “Secret Key Generation in the Two-Way Relay Channel with Active Attackers,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 3, pp. 476-488, Mar. 2014.
- Y. Xin, H. Zhang and L. Lai, “A Low-Complexity Sequential Spectrum Sensing Algorithm for Cognitive Radio,” IEEE Journal on Selected Areas in Communications: Cognitive Radio Series, vol. 32, no. 3, pp. 387-399, Mar. 2014.
- H. Li, J. Song, C. Chen, L. Lai and R. Qiu, “Behavior Propagation in Cognitive Radio Networks: A Social Network Approach,” IEEE Transactions on Wireless Communications, vol 13, no. 2, pp. 646-657, Feb. 2014.
- Y. Liang, L. Lai , H. Vincent Poor and S. Shamai (Shitz), “A Broadcast Approach for Fading Gaussian Wiretap Channels,” IEEE Transactions on Information Theory, vol. 60, no. 2, pp. 842-858, Feb. 2014.
2013
- J. Geng and L. Lai, “Non-Bayesian Quickest Change Detection with Stochastic Sample Right Constraints,” IEEE Transactions on Signal Processing, vol. 61, no. 20, pp. 5090-5102, Oct. 2013.
- R. Caromi, Y. Xin and L. Lai, “Fast Multi-band Spectrum Scanning for Cognitive Radio Systems,” IEEE Transactions on Communications, vol. 61, no. 1, pp. 63-75, Jan. 2013.
2012
- H. Li, L. Lai and R. Qiu, “Scheduling of Wireless Metering for Power Market Pricing in Smart Grid,” IEEE Transactions on Smart Grid, vol. 3, no. 4, pp. 1611-1620, Dec. 2012.
- L. Lai , Y. Liang and W. Du, “Cooperative Key Generation in Wireless Networks,” IEEE Journal on Selected Areas in Communications, Special Issue on Theories and Methods for Advanced Wireless Relays, vol. 30, no. 8, pp. 1578 – 1588, Sept. 2012.
- H. Li, S. Gong, L. Lai, H. Zhu, R. C. Qiu and D. Yang, “Efficient and Secure Wireless Communications for Advanced Metering Infrastructure in Smart Grids,” IEEE Transactions on Smart Grid, vol. 3, no. 3, pp. 1540 – 1551, Sept. 2012.
- H. Li, L. Lai, H. Vincent Poor, “Multicast Routing for Decentralized Control of Cyber Physical Systems with an Application in Smart Grid,” IEEE Journal on Selected Areas in Communications: Smart Grid Communications Series, vol. 30, no. 6, pp. 1097-1107, July 2012.
- L. Lai , Y. Liang and H. Vincent Poor, “A Unified Framework for Key Agreement over Wireless Fading Channels,” IEEE Transactions on Information Forensics and Security, vol 7, no. 2, pp. 480 – 490, Apr. 2012.
2011
- L. Lai , H. Vincent Poor, Y. Xin and G. Georgiadis, “Quickest Search over Multiple Sequences,” IEEE Transactions on Information Theory, vol. 57, no. 8, pp. 5375 -5386, Aug. 2011.
- O. O. Koyluoglu, H. El Gamal, L. Lai and H. Vincent Poor, “Interference Alignment for Secrecy,” IEEE Transactions on Information Theory, vol. 57, no. 6, pp. 3323 – 3332, June 2011.
- L. Lai , S.-W. Ho and H. Vincent Poor, “Privacy-Security Tradeoff in Biometric Security Systems Part II: Multiple Uses Case,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 1, pp. 140-151, Mar. 2011.
- L. Lai , S.-W. Ho and H. Vincent Poor, “Privacy-Security Tradeoff in Biometric Security Systems Part I: Single Use Case,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 1, pp. 122-139, Mar. 2011.
- Y. Liang, L. Lai and J. Halloran, “Distributed Cognitive Radio Network Management via Algorithms in Probabilistic Graphical Models,” IEEE Journal on Selected Areas in Communications, Special Issue on Advances in Cognitive Radio Networking and Communications, vol. 29, no. 2, pp. 338-348, Feb. 2011.
- L. Lai , H. El Gamal, H. Jiang and H. Vincent Poor, “Cognitive Medium Access: Exploration, Exploitation and Competition,” IEEE Transactions on Mobile Computing, vol. 10, no. 2, pp. 239-253, Feb. 2011.
2010
- Y. Fan, L. Lai , E. Erkip and H. Vincent Poor, “Rateless Coding for MIMO Fading Channels: Performance Limit and Code Construction,” IEEE Transactions on Wireless Communications, vol. 9, no. 4, pp. 1288-1292, Apr. 2010.
2009
- L. Lai , H. El Gamal and H. Vincent Poor, “Authentication over Noisy Channels,” IEEE Transactions on Information Theory, vol. 55, no. 2, pp. 906-916, Feb. 2009.
- H. Jiang, L. Lai , R. Fan and H. Vincent Poor, “Optimal Selection of Channel Sensing Order in Cognitive Radios,” IEEE Transactions on Wireless Communications , vol. 8, no. 1, pp. 297-307, Jan. 2009.
2008
- L. Lai , H. El Gamal and H. Vincent Poor, “The Wiretap Channel with Feedback: Encryption over the Channel,”IEEE Transactions on Information Theory, vol. 54, no. 11, pp. 5059 – 5067, Nov. 2008.
- P. K. Gopala, L. Lai and H. El Gamal, “On the Secrecy Capacity of Fading Channels,” IEEE Transactions on Information Theory, vol. 54, no. 10, pp. 4687 – 4698, Oct. 2008.
- L. Lai and H. El Gamal, “The Relay-Eavesdropper Channel: Cooperation for Secrecy,” IEEE Transactions on Information Theory , vol. 54, no. 9, pp. 4005 – 4019, Sept. 2008.
- L. Lai and H. El Gamal, “The Water-filling Game in Fading Multiple Access Channel,” IEEE Transactions on Information Theory, vol. 54, no. 5, pp. 2110 – 2122, May 2008.
- L. Lai and H. El Gamal, “On Cooperation in Energy Efficient Wireless Networks: the Role of Altruistic Nodes,” IEEE Transactions on Wireless Communications , vol. 7, no.5, pp. 1868 – 1878, May 2008.
2006
- L. Lai , K. Liu and H. El Gamal, “The Three Node Wireless Network: Achievable Rates and Cooperation Strategies,” IEEE Transactions on Information Theory , vol. 52, no. 3, pp. 805 – 828, Mar. 2006.