{"id":1043,"date":"2021-06-17T16:52:56","date_gmt":"2021-06-17T16:52:56","guid":{"rendered":"https:\/\/faculty.engineering.ucdavis.edu\/lai-new\/?page_id=1043"},"modified":"2026-01-27T14:12:25","modified_gmt":"2026-01-27T22:12:25","slug":"publicationschronologicalorder","status":"publish","type":"page","link":"https:\/\/faculty.engineering.ucdavis.edu\/lai\/publicationschronologicalorder\/","title":{"rendered":"Selected Publications in Reverse Chronological Order"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1043\" class=\"elementor elementor-1043\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-656422a9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"656422a9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1c8eba6c\" data-id=\"1c8eba6c\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4289460b elementor-widget elementor-widget-page-title\" data-id=\"4289460b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"page-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\n\t\t<div class=\"hfe-page-title hfe-page-title-wrapper elementor-widget-heading\">\n\n\t\t\t\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\n\t\t\t\t\t\t\t\t\n\t\t\t\tSelected Publications in Reverse Chronological Order  \n\t\t\t<\/h2 > \n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a4e78ea elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"1a4e78ea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9715450 elementor-widget elementor-widget-button\" data-id=\"9715450\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/publicationsbytopics\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Selected Recent Publications by Topics<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2337143e elementor-widget elementor-widget-text-editor\" data-id=\"2337143e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Preprint<\/h3><ul><li>M. Lyu, C. Yang, G. Liu and L. Lai, &#8220;<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2025\/09\/Attack_and_Defense_on_Dueling_Bandits.pdf\">Dueling Bandit: Adversarial Attack and Robust Defense<\/a>&#8220;.<\/li><\/ul><h3>Accepted or Published<\/h3><p><strong>2026<\/strong><\/p><ul><li>H. Liang, Y. Jin, K. Balasubramanian and L. Lai, &#8220;<a href=\"https:\/\/arxiv.org\/abs\/2509.22794\">Differentially Private Two-Stage Gradient Descent for Instrumental Variable Regression<\/a>&#8220;. International Conference on Learning Representations (ICLR), 2026.\u00a0<\/li><li>Z. Lu, G. Liu, L. Lai and W. Xu, &#8220;<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2025\/05\/Camouflageattack.pdf\">Camouflage Adversarial Attacks on Multi-agent Reinforcement Learning Systems<\/a>&#8220;. IEEE Transactions on Signal Processing.<\/li><li>W. Wang, V. Huynh, C. Feres, L. Lai and Z. Ding, &#8220;<a href=\"https:\/\/ieeexplore.ieee.org\/document\/11306337\">Byzantine Attacks in Over-the-Air Cooperative Sensing Networks: Analysis and Defense<\/a>&#8220;. IEEE Transactions on Signal Processing.<\/li><\/ul><p><strong>2025<\/strong><\/p><ul><li>Y. Liang, R. Huang, L. Lai, N. Shroff and Y. Liang, \u201c<a href=\"https:\/\/arxiv.org\/abs\/2506.02318\">Absorb and Converge: Provable Convergence Guarantee for Absorbing Discrete Diffusion Models,<\/a>\u201d Conference on Neural Information Processing Systems (NeurIPS), 2025.\u00a0<\/li><li>Y. Liang, Y. Liang, L. Lai and N. Shroff, \u201c<a href=\"https:\/\/arxiv.org\/abs\/2509.16756\">Discrete Diffusion Models: Novel Analysis and New Sampler Guarantees<\/a>,\u201d Conference on Neural Information Processing Systems (NeurIPS), 2025.\u00a0<\/li><li style=\"font-size: 16px\">Y. Jin, K. Balasubramanian, L. Lai, \u201c<a style=\"color: #0066cc\" href=\"https:\/\/arxiv.org\/abs\/2410.14183\">In-context Learning for Mixture of Linear Regressions: Existence, Generalization and Training Dynamics<\/a>\u201d. Transaction on Machine Learning Research.\u00a0\u00a0<\/li><li style=\"font-size: 16px\">M. Cho, W. Xu and L. Lai, &#8220;<a href=\"https:\/\/ieeexplore.ieee.org\/document\/11205868\">Hypothesis Testing for Subset Identification: A Linear Measurement Scheme<\/a>&#8220;. IEEE Transactions on Signal Processing.<\/li><li>C. Yang, M. Lyu, G. Liu and L. Lai, &#8220;<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2025\/05\/Draft-v7.pdf\">Human Feedback Attack on Online RLHF: Attack and Robust Defense<\/a>&#8220;. IEEE Transactions on Signal Processing. To appear.<\/li><li>X. Ni and L. Lai, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2024\/11\/TIT_submission.pdf\">Risk-Sensitive Reinforcement Learning with Phi-Divergence-Risk<\/a>,\u201d IEEE Transactions on Information Theory. To appear.\u00a0<\/li><li>H. Liang, K. Balasubramanian, L. Lai, \u201c<a href=\"https:\/\/arxiv.org\/abs\/2410.01265\">Transformers Handle Endogeneity in In-Context Linear Regression<\/a>\u201d. International Conference on Learning Representations (ICLR), 2025.\u00a0<\/li><li>M. Huang, X. Chen, K. Ji, S. Ma and L. Lai, &#8220;<a href=\"https:\/\/arxiv.org\/pdf\/2202.03684.pdf\">Efficiently Escaping Saddle Points in Bilevel Optimization<\/a>&#8220;. Journal on Machine Learning Research. To appear.<\/li><li>P. Zhao and L. Lai, \u201c<a href=\"https:\/\/arxiv.org\/abs\/2308.01490\">Minimax Optimal Q Learning with Nearest Neighbors<\/a>,\u201d IEEE Transactions on Information Theory.\u00a0\u00a0<\/li><\/ul><p><strong>2024<\/strong><\/p><ul><li>P. Zhao, L. Lai, L. Shen, Q. Li, J. Wu and Z. Liu, &#8220;<a href=\"https:\/\/arxiv.org\/abs\/2405.13453\">A Huber Loss Minimization Approach to Mean Estimation under User-level Differential Privacy<\/a>&#8220;, \u00a0Conference on Neural Information Processing Systems (NeurIPS), 2024.<\/li><li>C. Yang, G. Liu and L. Lai, \u201c<a href=\"https:\/\/drive.google.com\/file\/d\/1FVQ5RxZsFp4V-1sYPQo-3O_Oi--5gvEI\/view?usp=sharing\">Stochastic Bandits with Non-stationary Rewards: Reward Attack and Defense<\/a>,\u201d IEEE Transactions on Signal Processing.\u00a0\u00a0<\/li><li>G. Liu, Z. Zhou, H. Liu and L. Lai, &#8220;<a href=\"https:\/\/arxiv.org\/abs\/2307.07666\">Efficient Action Robust Reinforcement Learning with Probabilistic Policy Execution Uncertainty<\/a>&#8220;. Transaction on Machine Learning Research. 2024.<\/li><li>X. Ni, G. Liu and L. Lai, &#8220;<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2024\/05\/paper_v2.pdf\">Risk-Sensitive Reward-Free Reinforcement Learning with CVaR<\/a>&#8220;, International Conference on Machine Learning (ICML), 2024.<\/li><li>M. Huang, S. Ma and L. Lai, &#8220;<a href=\"https:\/\/www.jmlr.org\/papers\/v25\/22-0524.html\">On the Convergence of Projected Alternating Maximization for Equitable and Optimal Transport<\/a>&#8220;. Journal on Machine Learning Research. 2024.<\/li><\/ul><p><strong>2023<\/strong><\/p><ul><li>G. Liu and L. Lai, &#8220;<a href=\"https:\/\/arxiv.org\/abs\/2307.07670\">Efficient Adversarial Attacks on Online Multi-agent Reinforcement Learning<\/a>&#8220;, \u00a0Conference on Neural Information Processing Systems (NeurIPS), 2023.<\/li><li>Y. Jin and L. Lai, &#8220;<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2022\/11\/Final_submission.pdf\">Fairness-aware Regression Robust to Adversarial Attacks<\/a>&#8220;. IEEE Transactions on Signal Processing.<\/li><li>X. Ma, L. Lai and S. Cui, &#8220;<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2022\/12\/V7.pdf\">Bayesian Two-stage Sequential Change Diagnosis Via Sensor Arrays<\/a>&#8220;. IEEE Transactions on Information Theory.<\/li><li>G. Liu and L. Lai, &#8220;<a href=\"https:\/\/openreview.net\/pdf?id=yhGCKUsKJS\">Action Poisoning Attacks on Linear Contextual Bandits<\/a>&#8220;. Transactions on Machine Learning Research.<\/li><\/ul><p><strong>2022<\/strong><\/p><ul><li>P. Zhao and L. Lai, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/knndensityv8.pdf\">Analysis of KNN Density Estimation<\/a>,\u201d IEEE Transactions on Information Theory.\u00a0<\/li><li>Y. Jin and L. Lai, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/07\/draft_V11.pdf\">Optimal Accuracy-Privacy Trade-off of Inference as Service<\/a>,&#8221; IEEE Transactions on Signal Processing.\u00a0<\/li><\/ul><p><strong>2021<\/strong><\/p><ul><li>G. Liu and L. Lai, &#8220;<a href=\"https:\/\/arxiv.org\/pdf\/2110.04471.pdf\">Provably Efficient Black-Box Action Poisoning Attacks Against Reinforcement Learning<\/a>&#8220;, \u00a0Conference on Neural Information Processing Systems (NeurIPS), 2021.<\/li><li>M. Huang, S. Ma and L. Lai, \u201c<a href=\"https:\/\/arxiv.org\/pdf\/2012.05199.pdf\">A Riemannian Block Coordinate Descent Method for Computing the Projection Robust Wasserstein Distance<\/a>,\u201d International Conference on Machine Learning (ICML), 2021.<\/li><li>M. Huang, S. Ma and L. Lai, \u201c<a href=\"https:\/\/arxiv.org\/pdf\/2102.03390.pdf\">Projection Robust Wasserstein Barycenter<\/a>,\u201d International Conference on Machine Learning (ICML), 2021.<\/li><li>X. Ma, L. Lai and S. Cui, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/TSP2021_V4.pdf\">Two-Stage Bayesian Sequential Change Diagnosis<\/a>,\u201d IEEE Transactions on Signal Processing.\u00a0<\/li><li>F. Li, L. Lai and S. Cui, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/revise_v9.pdf\">Optimal Feature Manipulation Attacks Against Linear Regression<\/a>,\u201d IEEE Transactions on Signal Processing.\u00a0<\/li><li>F. Li, L. Lai and S. Cui, \u201c<a href=\"https:\/\/arxiv.org\/abs\/2010.10045\">On the Adversarial Robustness of LASSO Based Feature Selection<\/a>,\u201d IEEE Transactions on Signal Processing.\u00a0<\/li><li>P. Zhao and L. Lai, \u201c<a href=\"https:\/\/arxiv.org\/abs\/1910.10513\">Minimax Rate Optimal Adaptive Nearest Neighbor Classification and Regression<\/a>,\u201d IEEE Transactions on Information Theory.\u00a0<\/li><li>M. Huang, S. Ma and L. Lai, \u201c<a href=\"https:\/\/arxiv.org\/pdf\/2008.07740.pdf\">Robust Low-rank Matrix Completion via an Alternating Manifold Proximal Gradient Continuation Method<\/a>,\u201d IEEE Transactions on Signal Processing.\u00a0<\/li><li>M. Cho, L. Lai and W. Xu, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/main_JSAC_R2_Final_double.pdf\">Distributed Dual Coordinate Ascent in General Tree Networks and Communication Network Effect on Synchronous Machine Learning<\/a>,\u201d IEEE JSAC Series on Machine Learning for Communications and Networks.\u00a0<\/li><li>P. Zhao and L. Lai, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/2046.PuningZ.pdf\">Efficient Classification with Adaptive KNN<\/a>,\u201d AAAI Conference on Articial Intelligence (AAAI), Feb. 2021.<\/li><li>Y. Jin and L. Lai, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/9298957\">On the Adversarial Robustness of Hypothesis Testing<\/a>,\u201d IEEE Transactions on Signal Processing, vol. 69, pp. 515-530, 2021.<\/li><\/ul><p><b>2020<\/b><\/p><ul><li>P. Zhao and L. Lai, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/9142281\">Minimax Optimal Estimation of KL Divergence for Continuous Distributions<\/a>,\u201d IEEE Transactions on Information Theory, vol. 66, no. 12, pp. 7787- 7811, Dec. 2020.<\/li><li>X. Cao and L. Lai, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/9217941\">Distributed Approximate Newton\u2019s Method Robust to Byzantine Attackers<\/a>,\u201d IEEE Transactions on Signal Processing, vol. 68, pp. 6011-6025, 2020.<\/li><li>G. Liu and L. Lai, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/9186632\">Action-Manipulation Attacks Against Stochastic Bandits: Attacks and Defense<\/a>,\u201d IEEE Transactions on Signal Processing, vol. 68, pp. 5152-5165, 2020.<\/li><li>L. Lai and E. Bayraktar, \u201d<a href=\"https:\/\/ieeexplore.ieee.org\/document\/9057588\">On the Adversarial Robustness of Robust Estimators<\/a>\u201c. IEEE Transactions on Information Theory, vol. 66, no. 8, pp. 5097- 5109, Aug. 2020.<\/li><li>P. Zhao and L. Lai, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/KSGjournal_finalv1.pdf\">Analysis of KNN Information Estimators for Smooth Distributions<\/a>,\u201d IEEE Transactions on Information Theory, vol. 66, no. 6, pp. 3798-3826, June 2020.<\/li><li>F. Li, L. Lai and S. Cui, \u201c<a href=\"https:\/\/arxiv.org\/pdf\/1908.06210.pdf\">On the Adversarial Robustness of Subspace Learning<\/a>,\u201d IEEE Transactions on Signal Processing, vol. 68, pp. 1470-1483, Mar. 2020.<\/li><\/ul><p><b>2019<\/b><\/p><ul><li>X. Cao and L. Lai, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?arnumber=8861393\">Distributed Gradient Descent Algorithm Robust to an Arbitrary Number of Byzantine Attackers<\/a>,\u201d IEEE Transactions on Signal Processing, vol.67, no. 22, pp. 5850-5864, Nov. 2019.<\/li><li>W. Tu and L. Lai, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/SecureFunctionComputing.pdf\">On Function Computation with Privacy and Secrecy Constraints<\/a>,\u201d IEEE Transactions on Information Theory, vol. 65, no. 10, pp. 6716-6733, Oct. 2019.<\/li><li>J. Geng, B. Zhang, L. Huie and L. Lai, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=8705307\">Online Change-Point Detection of Linear Regression Models<\/a>,\u201d IEEE Transactions on Signal Processing, vol, 67, no. 12, pp. 3316-3329, June 2019.<\/li><\/ul><p><b>2018<\/b><\/p><ul><li>W. Zhao and L. Lai, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=8355669\">Distributed Testing With Cascaded Encoders<\/a>\u201c, IEEE Transactions on Information Theory,\u00a0vol. 64, no. 11, pp. 7339- 7348, Nov. 2018.<\/li><li>W. Tu and L. Lai, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/KeylessAuthenticationAndAuthenticatedCapacity.pdf\">Keyless Authentication and Authenticated Capacity<\/a>,\u201d IEEE Transactions on Information Theory, vol. 64, no. 5, pp. 3696- 3714, May 2018.<\/li><li>G. Fellouris, E. Bayraktar and L. Lai, \u201c<a href=\"http:\/\/arxiv.org\/abs\/1609.02661\">Efficient Byzantine Sequential Change Detection<\/a>,\u201d IEEE Transactions on Information Theory, vol. 64, no. 5, pp. 3346- 3360, May 2018.<\/li><li>S. Zou, Y. Liang, L. Lai, H. V. Poor and S. Shamai (Shitz), \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=8254375\">Degraded Broadcast Channel with Secrecy Outside a Bounded Range<\/a>,\u201d IEEE Transactions on Information Theory, vol. 64, no. 3, pp. 2104-2120, Mar. 2018.<\/li><li>C. Tsinos, F. Foukalas, T. Khattab and L. Lai, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=8052574\">On Channel Selection for Carrier Aggregation Systems<\/a>,\u201d IEEE Transactions on Communications,\u00a0vol. 66, no. 2, pp. 808-818, Feb. 2018.<\/li><li>S.-W. Ho, A. A. Saed, L. Lai and C. W. Sung, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=8113459\">Coding and Bounds for Channel Estimation in Visible Light Communications and Positioning<\/a>,\u201d IEEE Journal on Selected Areas in Communications, vol. 36, no. 1, pp. 34-44, Jan. 2018.<\/li><\/ul><p><b>2017<\/b><\/p><ul><li>Ain-ul-Aisha, L. Lai , Y. Liang and S. Shamai (Shitz), \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/mimomacv6.pdf\">Sum-Rate Capacity of Poisson MIMO Multiple-Access Channels<\/a>,\u201d IEEE Transactions on Communications, vol. 65, no. 11, pp. 4765-4776, Nov. 2017.<\/li><li>Ain-ul-Aisha, L. Lai , Y. Liang and S. Shamai (Shitz), \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/tit_final_v1.pdf\">On the Sum-Rate Capacity of Poisson MISO\u00a0Multiple Access Channels<\/a>,\u201d IEEE Transactions on Information Theory, vol. 63, no. 10, pp. 6457-6473, Oct. 2017.<\/li><li>H. Zhang, Y. Liang, L. Lai\u00a0 and S. Shamai (Shitz), \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/KeyCellularModel_IT2015-sub.pdf\">Multi-Key Generation over a Cellular Model with a Helper<\/a>,\u201d IEEE Transactions on Information Theory, vol. 63, no. 6, pp. 3804- 3822, June 2017.<\/li><li>M. El Gamal and L. Lai, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/Distributedestimation.pdf\">On Rate Requirements for Achieving the Centralized Performance in Distributed Estimation<\/a>,\u201d IEEE Transactions on Signal Processing,\u00a0vol. 65, no. 8, pp. 2020- 2032, Apr. 2017.<\/li><li>W. Tu, M. Goldenbaum, L. Lai\u00a0 and H. V. Poor, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/Simutaneously_keys_Source_Channel_modelv2.pdf\">On Simultaneously Generating Multiple Keys in Joint Source-Channel Model,<\/a>\u201d IEEE Transactions on Information Forensics and Security, vol. 12, no. 2, pp. 298-308, Feb. 2017.<\/li><\/ul><p><b>2016<\/b><\/p><ul><li>J. Geng, W. Xu and L. Lai, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=7551219\">Quickest Sequential Muti-Band Spectrum Sensing with Mixed Observations<\/a>,\u201d IEEE Transactions on Signal Processing, vol. 64, no. 22, pp. 5861-5874, Nov. 2016.<\/li><li>Y. Huang, S. Zhou, Z. Shi and L. Lai, \u201c<a href=\"http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?arnumber=7478119\">Channel Frequency Response-Based Secret Key Generation in Underwater Acoustic Systems<\/a>,\u201d IEEE Transactions on Wireless Communications, vol. 15, no. 9, pp. 5875-5888, Sept. 2016.<\/li><li>W. Zhao and L. Lai, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/07398150.pdf\">Distributed Detection with Vector Quantizer<\/a>,\u201d IEEE Transactions on Signal and Information Processing over Networks, vol.2, no. 2, pp. 105-119, June 2016.<\/li><\/ul><p><b>2015<\/b><\/p><ul><li>Ain-ul-Aisha, L. Lai\u00a0 and Y. Liang, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/07265012.pdf\">Optimal Power Allocation for Poisson Channels with Time-Varying Background Light<\/a>,\u201d IEEE Transactions on Communications, vol. 63, no. 11, pp. 4327-4338, Nov. 2015.<\/li><li>L. Lai\u00a0 and S.-W. Ho, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/07138609.pdf\">Key Generation Algorithms for Pairwise Independent Networks Based on Graphical Models<\/a>,\u201d IEEE Transactions on Information Theory, vol. 61, no. 9, pp. 4828-4837, Sept. 2015.<\/li><li>S. Zou, Y. Liang, L. Lai\u00a0 and S. Shamai (Shitz), \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/07084122.pdf\">An Information Theoretic Approach to Secret Sharing<\/a>,\u201d IEEE Transactions on Information Theory, vol. 61, no. 6, pp. 3121-3136, June 2015.<\/li><li>B. Zhang, J. Geng and L. Lai, \u201c<a href=\"https:\/\/ucdavis.box.com\/s\/ccqvl23l4w0kswoa7pkb4e70kyzovi5n\">Multiple Change-Points Estimation in Linear Regression Models via Sparse Group Lasso<\/a>,\u201d IEEE Transactions on Signal Processing, vol. 63, no. 9, pp. 2209-2224, May 2015.<\/li><li>E. Bayraktar and L. Lai, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/130924445.pdf\">Byzantine Fault Tolerant Distributed Quickest Change Detection<\/a>,\u201d SIAM Journal on Control and Optimization, vol. 53, no. 2, pp. 575-591, Mar. 2015.<\/li><li>L. Lai , Y. Liang and S. Shamai (Shitz), \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/06954442.pdf\">On the Capacity Bounds for Poisson Interference Channels<\/a>,\u201d IEEE Transactions on Information Theory, vol. 61, no. 1, pp. 223-238, Jan. 2015.<\/li><\/ul><p><b>2014<\/b><\/p><ul><li>H. Zhang, L. Lai , Y. Liang and H. Wang, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/06858050.pdf\">The Capacity Region of the Source-Type Model for Secret Key and Private Key Generation<\/a>,\u201d IEEE Transactions on Information Theory, vol. 60, no. 10, pp.6389-6398, Oct. 2014.<\/li><li>J. Geng, E. Bayraktar and L. Lai, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/06862025.pdf\">Bayesian Quickest Change Point Detection with Sampling Right Constraints<\/a>,\u201d IEEE Transactions on Information Theory, vol. 60, no. 10, pp.6474-6490, Oct. 2014.<\/li><li>R. Caromi, S. Mohan and L. Lai, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/06842636.pdf\">Optimal Sequential Channel Estimation and Probing for Multiband Cognitive Radio Systems<\/a>,\u201d IEEE Transactions on Communications, vol. 62, no. 8, pp. 2696-2708, Aug. 2014.<\/li><li>H. Zhou, L. Huie and L. Lai, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/06716049.pdf\">Secret Key Generation in the Two-Way Relay Channel with Active Attackers<\/a>,\u201d IEEE Transactions on Information Forensics and Security, vol. 9, no. 3, pp. 476-488, Mar. 2014.<\/li><li>Y. Xin, H. Zhang and L. Lai, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/06683128.pdf\">A Low-Complexity Sequential Spectrum Sensing Algorithm for Cognitive Radio<\/a>,\u201d IEEE Journal on Selected Areas in Communications: Cognitive Radio Series, vol. 32, no. 3, pp. 387-399, Mar. 2014.<\/li><li>H. Li, J. Song, C. Chen, L. Lai and R. Qiu, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=6697930\">Behavior Propagation in Cognitive Radio Networks: A Social Network Approach<\/a>,\u201d IEEE Transactions on Wireless Communications, vol 13, no. 2, pp. 646-657, Feb. 2014.<\/li><li>Y. Liang, L. Lai , H. Vincent Poor and S. Shamai (Shitz), \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/06687232broadcast.pdf\">A Broadcast Approach for Fading Gaussian Wiretap Channels<\/a>,\u201d IEEE Transactions on Information Theory, vol. 60, no. 2, pp. 842-858, Feb. 2014.<\/li><\/ul><p><b>2013<\/b><\/p><ul><li>J. Geng and L. Lai, \u201c<a href=\"https:\/\/ucdavis.box.com\/s\/xohh3n5410i9r5qk3fvsg5tn5ndbbze0\">Non-Bayesian Quickest Change Detection with Stochastic Sample Right Constraints<\/a>,\u201d IEEE Transactions on Signal Processing, vol. 61, no. 20, pp. 5090-5102, Oct. 2013.<\/li><li>R. Caromi, Y. Xin and L. Lai, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/06336758.pdf\">Fast Multi-band Spectrum Scanning for Cognitive Radio Systems<\/a>,\u201d IEEE Transactions on Communications, vol. 61, no. 1, pp. 63-75, Jan. 2013.<\/li><\/ul><p><b>2012<\/b><\/p><ul><li>H. Li, L. Lai and R. Qiu, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=6329471\">Scheduling of Wireless Metering for Power Market Pricing in Smart Grid<\/a>,\u201d IEEE Transactions on Smart Grid, vol. 3, no. 4, pp. 1611-1620, Dec. 2012.<\/li><li>L. Lai , Y. Liang and W. Du, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/06280261.pdf\">Cooperative Key Generation in Wireless Networks<\/a>,\u201d IEEE Journal on Selected Areas in Communications, Special Issue on Theories and Methods for Advanced Wireless Relays, vol. 30, no. 8, pp. 1578 \u2013 1588, Sept. 2012.<\/li><li>H. Li, S. Gong, L. Lai, H. Zhu, R. C. Qiu and D. Yang, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?arnumber=6248196\">Efficient and Secure Wireless Communications for Advanced Metering Infrastructure in Smart Grids<\/a>,\u201d IEEE Transactions on Smart Grid, vol. 3, no. 3, pp. 1540 \u2013 1551, Sept. 2012.<\/li><li>H. Li, L. Lai, H. Vincent Poor, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?arnumber=6194237\">Multicast Routing for Decentralized Control of Cyber Physical Systems with an Application in Smart Grid<\/a>,\u201d IEEE Journal on Selected Areas in Communications: Smart Grid Communications Series, vol. 30, no. 6, pp. 1097-1107, July 2012.<\/li><li>L. Lai , Y. Liang and H. Vincent Poor, \u201c<a href=\"https:\/\/ucdavis.box.com\/s\/8cksir9tppye505m9icsy7a9w8lrqt6r\">A Unified Framework for Key Agreement over Wireless Fading Channels<\/a>,\u201d IEEE Transactions on Information Forensics and Security, vol 7, no. 2, pp. 480 \u2013 490, Apr. 2012.<\/li><\/ul><p><b>2011<\/b><\/p><ul><li>L. Lai , H. Vincent Poor, Y. Xin and G. Georgiadis, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/05961845.pdf\">Quickest Search over Multiple Sequences<\/a>,\u201d IEEE Transactions on Information Theory, vol. 57, no. 8, pp. 5375 -5386, Aug. 2011.<\/li><li>O. O. Koyluoglu, H. El Gamal, L. Lai\u00a0 and H. Vincent Poor, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/05773067.pdf\">Interference Alignment for Secrecy<\/a>,\u201d IEEE Transactions on Information Theory, vol. 57, no. 6, pp. 3323 \u2013 3332, June 2011.<\/li><li>L. Lai , S.-W. Ho and H. Vincent Poor, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/05664788.pdf\">Privacy-Security Tradeoff in Biometric Security Systems Part II: Multiple Uses Case<\/a>,\u201d IEEE Transactions on Information Forensics and Security, vol. 6, no. 1, pp. 140-151, Mar. 2011.<\/li><li>L. Lai , S.-W. Ho and H. Vincent Poor, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/05664787.pdf\">Privacy-Security Tradeoff in Biometric Security Systems Part I: Single Use Case<\/a>,\u201d IEEE Transactions on Information Forensics and Security, vol. 6, no. 1, pp. 122-139, Mar. 2011.<\/li><li>Y. Liang, L. Lai\u00a0 and J. Halloran, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/05701688.pdf\">Distributed Cognitive Radio Network Management via Algorithms in Probabilistic Graphical Models<\/a>,\u201d IEEE Journal on Selected Areas in Communications, Special Issue on Advances in Cognitive Radio Networking and Communications, vol. 29, no. 2, pp. 338-348, Feb. 2011.<\/li><li>L. Lai , H. El Gamal, H. Jiang and H. Vincent Poor, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/05440181.pdf\">Cognitive Medium Access: Exploration, Exploitation and Competition<\/a>,\u201d IEEE Transactions on Mobile Computing, vol. 10, no. 2, pp. 239-253, Feb. 2011.<\/li><\/ul><p><b>2010<\/b><\/p><ul><li>Y. Fan, L. Lai , E. Erkip and H. Vincent Poor, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/05441348.pdf\">Rateless Coding for MIMO Fading Channels: Performance Limit and Code Construction<\/a>,\u201d IEEE Transactions on Wireless Communications, vol. 9, no. 4, pp. 1288-1292, Apr. 2010.<\/li><\/ul><p><b>2009<\/b><\/p><ul><li>L. Lai , H. El Gamal and H. Vincent Poor, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/04777632.pdf\">Authentication over Noisy Channels<\/a>,\u201d IEEE Transactions on Information Theory, vol. 55, no. 2, pp. 906-916, Feb. 2009.<\/li><li>H. Jiang, L. Lai , R. Fan and H. Vincent Poor, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/04786510.pdf\">Optimal Selection of Channel Sensing Order in Cognitive Radios<\/a>,\u201d IEEE Transactions on Wireless Communications , vol. 8, no. 1, pp. 297-307, Jan. 2009.<\/li><\/ul><p><b>2008<\/b><\/p><ul><li>L. Lai , H. El Gamal and H. Vincent Poor, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/04655457.pdf\">The Wiretap Channel with Feedback: Encryption over the Channel<\/a>,\u201dIEEE Transactions on Information Theory, vol. 54, no. 11, pp. 5059 \u2013 5067, Nov. 2008.<\/li><li>P. K. Gopala, L. Lai\u00a0 and H. El Gamal, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/04626059.pdf\">On the Secrecy Capacity of Fading Channels<\/a>,\u201d IEEE Transactions on Information Theory, vol. 54, no. 10, pp. 4687 \u2013 4698, Oct. 2008.<\/li><li>L. Lai\u00a0 and H. El Gamal, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/04608977.pdf\">The Relay-Eavesdropper Channel: Cooperation for Secrecy<\/a>,\u201d IEEE Transactions on Information Theory , vol. 54, no. 9, pp. 4005 \u2013 4019, Sept. 2008.<\/li><li>L. Lai\u00a0 and H. El Gamal, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/04494691.pdf\">The Water-filling Game in Fading Multiple Access Channel<\/a>,\u201d IEEE Transactions on Information Theory, vol. 54, no. 5, pp. 2110 \u2013 2122, May 2008.<\/li><li>L. Lai\u00a0 and H. El Gamal, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/04524284.pdf\">On Cooperation in Energy Efficient Wireless Networks: the Role of Altruistic Nodes<\/a>,\u201d IEEE Transactions on Wireless Communications , vol. 7, no.5, pp. 1868 \u2013 1878, May 2008.<\/li><\/ul><p><b>2006<\/b><\/p><ul><li>L. Lai , K. Liu and H. El Gamal, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/01603755.pdf\">The Three Node Wireless Network: Achievable Rates and Cooperation Strategies,<\/a>\u201d IEEE Transactions on Information Theory , vol. 52, no. 3, pp. 805 \u2013 828, Mar. 2006.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Selected Publications in Reverse Chronological Order Selected Recent Publications by Topics Preprint M. Lyu, C. Yang, G. Liu and L. Lai, &#8220;Dueling Bandit: Adversarial Attack and Robust Defense&#8220;. Accepted or Published 2026 H. Liang, Y. Jin, K. Balasubramanian and L. Lai, &#8220;Differentially Private Two-Stage Gradient Descent for Instrumental Variable Regression&#8220;. International Conference on Learning Representations [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-1043","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-json\/wp\/v2\/pages\/1043","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-json\/wp\/v2\/comments?post=1043"}],"version-history":[{"count":263,"href":"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-json\/wp\/v2\/pages\/1043\/revisions"}],"predecessor-version":[{"id":2321,"href":"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-json\/wp\/v2\/pages\/1043\/revisions\/2321"}],"wp:attachment":[{"href":"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-json\/wp\/v2\/media?parent=1043"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}