{"id":1046,"date":"2021-06-17T16:53:28","date_gmt":"2021-06-17T16:53:28","guid":{"rendered":"https:\/\/faculty.engineering.ucdavis.edu\/lai-new\/?page_id=1046"},"modified":"2026-01-27T14:14:30","modified_gmt":"2026-01-27T22:14:30","slug":"publicationsbytopics","status":"publish","type":"page","link":"https:\/\/faculty.engineering.ucdavis.edu\/lai\/publicationsbytopics\/","title":{"rendered":"Selected Recent Publications by Topics"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1046\" class=\"elementor elementor-1046\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1ac82938 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1ac82938\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-77e1b32a\" data-id=\"77e1b32a\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3ad42cd7 elementor-widget elementor-widget-page-title\" data-id=\"3ad42cd7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"page-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\n\t\t<div class=\"hfe-page-title hfe-page-title-wrapper elementor-widget-heading\">\n\n\t\t\t\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\n\t\t\t\t\t\t\t\t\n\t\t\t\tSelected Recent Publications by Topics  \n\t\t\t<\/h2 > \n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-659ea748 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"659ea748\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e12d7d elementor-widget elementor-widget-button\" data-id=\"6e12d7d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/publicationschronologicalorder\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Selected Publications in Reverse Chronological Order<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7bb19c65 elementor-widget elementor-widget-text-editor\" data-id=\"7bb19c65\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Adversarial Machine Learning<\/h3><ul><li>H. Liang, Y. Jin, K. Balasubramanian and L. Lai, &#8220;<a href=\"https:\/\/arxiv.org\/abs\/2509.22794\">Differentially Private Two-Stage Gradient Descent for Instrumental Variable Regression<\/a>&#8220;. International Conference on Learning Representations (ICLR), 2026.\u00a0<\/li><li>M. Lyu, C. Yang, G. Liu and L. Lai, &#8220;<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2025\/09\/Attack_and_Defense_on_Dueling_Bandits.pdf\">Dueling Bandit: Adversarial Attack and Robust Defense<\/a>&#8220;.<\/li><li>Z. Lu, G. Liu, L. Lai and W. Xu, &#8220;<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2025\/05\/Camouflageattack.pdf\">Camouflage Adversarial Attacks on Multi-agent Reinforcement Learning Systems<\/a>&#8220;. IEEE Transactions on Signal Processing.<\/li><li>W. Wang, V. Huynh, C. Feres, L. Lai and Z. Ding, &#8220;<a href=\"https:\/\/ieeexplore.ieee.org\/document\/11306337\">Byzantine Attacks in Over-the-Air Cooperative Sensing Networks: Analysis and Defense<\/a>&#8220;. IEEE Transactions on Signal Processing.<\/li><li>C. Yang, M. Lyu, G. Liu and L. Lai, &#8220;<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2025\/05\/Draft-v7.pdf\">Human Feedback Attack on Online RLHF: Attack and Robust Defense<\/a>&#8220;, IEEE Transactions on Signal Processing. To appear.\u00a0<\/li><li>P. Zhao, L. Lai, L. Shen, Q. Li, J. Wu and Z. Liu, &#8220;<a href=\"https:\/\/arxiv.org\/abs\/2405.13453\">A Huber Loss Minimization Approach to Mean Estimation under User-level Differential Privacy<\/a>&#8220;, \u00a0Conference on Neural Information Processing Systems (NeurIPS), 2024.<\/li><li>G. Liu, Z. Zhou, H. Liu and L. Lai, &#8220;<a href=\"https:\/\/arxiv.org\/abs\/2307.07666\">Efficient Action Robust Reinforcement Learning with Probabilistic Policy Execution Uncertainty<\/a>&#8220;. Transactions on Machine Learning Research. 2024.<\/li><li>C. Yang, G. Liu and L. Lai, \u201c<a href=\"https:\/\/drive.google.com\/file\/d\/1FVQ5RxZsFp4V-1sYPQo-3O_Oi--5gvEI\/view?usp=sharing\">Stochastic Bandits with Non-stationary Rewards: Reward Attack and Defense<\/a>,\u201d IEEE Transactions on Signal Processing, 2024.\u00a0<\/li><li>G. Liu and L. Lai, &#8220;<a href=\"https:\/\/arxiv.org\/abs\/2307.07670\">Efficient Adversarial Attacks on Online Multi-agent Reinforcement Learning<\/a>&#8220;, \u00a0Conference on Neural Information Processing Systems (NeurIPS), 2023.<\/li><li>Y. Jin and L. Lai, &#8220;<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2022\/11\/Final_submission.pdf\">Fairness-aware Regression Robust to Adversarial Attacks<\/a>&#8220;. IEEE Transactions on Signal Processing, 2023.<\/li><li>G. Liu and L. Lai, &#8220;<a href=\"https:\/\/arxiv.org\/pdf\/2110.04471.pdf\">Provably Efficient Black-Box Action Poisoning Attacks Against Reinforcement Learning<\/a>&#8220;, \u00a0Conference on Neural Information Processing Systems (NeurIPS), 2021.<\/li><li>G. Liu and L. Lai, &#8220;<a href=\"https:\/\/openreview.net\/pdf?id=yhGCKUsKJS\">Action Poisoning Attacks on Linear Contextual Bandits<\/a>&#8220;. Transactions on Machine Learning Research.<\/li><li>Y. Jin and L. Lai, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/07\/draft_V11.pdf\">Optimal Accuracy-Privacy Trade-off of Inference as Service<\/a>,&#8221; IEEE Transactions on Signal Processing.\u00a0<\/li><li>F. Li, L. Lai and S. Cui, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/revise_v9.pdf\">Optimal Feature Manipulation Attacks Against Linear Regression<\/a>,\u201d IEEE Transactions on Signal Processing.\u00a0<\/li><li>F. Li, L. Lai and S. Cui, \u201c<a href=\"https:\/\/arxiv.org\/abs\/2010.10045\">On the Adversarial Robustness of LASSO Based Feature Selection<\/a>,\u201d IEEE Transactions on Signal Processing.\u00a0<\/li><li>Y. Jin and L. Lai, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/9298957\">On the Adversarial Robustness of Hypothesis Testing<\/a>,\u201d IEEE Transactions on Signal Processing, vol. 69, pp. 515-530, 2021.<\/li><li>X. Cao and L. Lai, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/9217941\">Distributed Approximate Newton\u2019s Method Robust to Byzantine Attackers<\/a>,\u201d IEEE Transactions on Signal Processing, vol. 68, pp. 6011-6025, 2020.<\/li><li>G. Liu and L. Lai, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/9186632\">Action-Manipulation Attacks Against Stochastic Bandits: Attacks and Defense<\/a>,\u201d IEEE Transactions on Signal Processing, vol. 68, pp. 5152-5165, 2020.<\/li><li>L. Lai and E. Bayraktar, \u201d<a href=\"https:\/\/ieeexplore.ieee.org\/document\/9057588\">On the Adversarial Robustness of Robust Estimators<\/a>\u201c. IEEE Transactions on Information Theory, vol. 66, no. 8, pp. 5097- 5109, Aug. 2020.<\/li><li>F. Li, L. Lai and S. Cui, \u201c<a href=\"https:\/\/arxiv.org\/pdf\/1908.06210.pdf\">On the Adversarial Robustness of Subspace Learning<\/a>,\u201d IEEE Transactions on Signal Processing, vol. 68, pp. 1470-1483, Mar. 2020.<\/li><li>X. Cao and L. Lai, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?arnumber=8861393\">Distributed Gradient Descent Algorithm Robust to an Arbitrary Number of Byzantine Attackers<\/a>,\u201d IEEE Transactions on Signal Processing, vol.67, no. 22, pp. 5850-5864, Nov. 2019.<\/li><li>G. Fellouris, E. Bayraktar and L. Lai, \u201c<a href=\"http:\/\/arxiv.org\/abs\/1609.02661\">Efficient Byzantine Sequential Change Detection<\/a>,\u201d IEEE Transactions on Information Theory, vol. 64, no. 5, pp. 3346- 3360, May 2018.<\/li><li>E. Bayraktar and L. Lai, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/130924445.pdf\">Byzantine Fault Tolerant Distributed Quickest Change Detection<\/a>,\u201d SIAM Journal on Control and Optimization, vol. 53, no. 2, pp. 575-591, Mar. 2015.<\/li><\/ul><h3>Statistical Inference<\/h3><ul><li>H. Liang, Y. Jin, K. Balasubramanian and L. Lai, &#8220;<a href=\"https:\/\/arxiv.org\/abs\/2509.22794\">Differentially Private Two-Stage Gradient Descent for Instrumental Variable Regression<\/a>&#8220;. International Conference on Learning Representations (ICLR), 2026.\u00a0<\/li><li>Y. Liang, R. Huang, L. Lai, N. Shroff and Y. Liang, \u201c<a href=\"https:\/\/arxiv.org\/abs\/2506.02318\">Absorb and Converge: Provable Convergence Guarantee for Absorbing Discrete Diffusion Models,<\/a>\u201d Conference on Neural Information Processing Systems (NeurIPS), 2025.\u00a0<\/li><li>Y. Liang, Y. Liang, L. Lai and N. Shroff, \u201c<a href=\"https:\/\/arxiv.org\/abs\/2509.16756\">Discrete Diffusion Models: Novel Analysis and New Sampler Guarantees<\/a>,\u201d Conference on Neural Information Processing Systems (NeurIPS), 2025.\u00a0<\/li><li>Y. Jin, K. Balasubramanian, L. Lai, \u201c<a href=\"https:\/\/arxiv.org\/abs\/2410.14183\">In-context Learning for Mixture of Linear Regressions: Existence, Generalization and Training Dynamics<\/a>\u201d. Transaction on Machine Learning Research.<\/li><li>H. Liang, K. Balasubramanian, L. Lai, \u201c<a href=\"https:\/\/arxiv.org\/abs\/2410.01265\">Transformers Handle Endogeneity in In-Context Linear Regression<\/a>\u201d International Conference on Learning Representations (ICLR), 2025.\u00a0<\/li><li>P. Zhao and L. Lai, \u201c<a href=\"https:\/\/arxiv.org\/abs\/2308.01490\">Minimax Optimal Q Learning with Nearest Neighbors<\/a>,\u201d IEEE Transactions on Information Theory, 2025.\u00a0\u00a0<\/li><li>X. Ma, L. Lai and S. Cui, &#8220;<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2022\/12\/V7.pdf\">Bayesian Two-stage Sequential Change Diagnosis Via Sensor Arrays<\/a>&#8220;. IEEE Transactions on Information Theory.<\/li><li>M. Huang, K. Ji, S. Ma and L. Lai, &#8220;<a href=\"https:\/\/arxiv.org\/pdf\/2202.03684.pdf\">Efficiently Escaping Saddle Points in Bilevel Optimization<\/a>&#8220;. Journal on Machine Learning Research. Submitted.<\/li><li>M. Huang, S. Ma and L. Lai, &#8220;<a href=\"https:\/\/www.jmlr.org\/papers\/v25\/22-0524.html\">On the Convergence of Projected Alternating Maximization for Equitable and Optimal Transport<\/a>&#8220;. Journal on Machine Learning Research, 2024.<\/li><li>P. Zhao and L. Lai, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/knndensityv8.pdf\">Analysis of KNN Density Estimation<\/a>,\u201d IEEE Transactions on Information Theory.\u00a0<\/li><li>X. Ma, L. Lai and S. Cui, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/TSP2021_V4.pdf\">Two-Stage Bayesian Sequential Change Diagnosis<\/a>,\u201d IEEE Transactions on Signal Processing.\u00a0<\/li><li>M. Huang, S. Ma and L. Lai, \u201c<a href=\"https:\/\/arxiv.org\/pdf\/2012.05199.pdf\">A Riemannian Block Coordinate Descent Method for Computing the Projection Robust Wasserstein Distance<\/a>,\u201d International Conference on Machine Learning (ICML), 2021.<\/li><li>M. Huang, S. Ma and L. Lai, \u201c<a href=\"https:\/\/arxiv.org\/pdf\/2102.03390.pdf\">Projection Robust Wasserstein Barycenter<\/a>,\u201d International Conference on Machine Learning (ICML), 2021.<\/li><li>M. Huang, S. Ma and L. Lai, \u201c<a href=\"https:\/\/arxiv.org\/pdf\/2008.07740.pdf\">Robust Low-rank Matrix Completion via an Alternating Manifold Proximal Gradient Continuation Method<\/a>,\u201d IEEE Transactions on Signal Processing.\u00a0<\/li><li>P. Zhao and L. Lai, \u201c<a href=\"https:\/\/arxiv.org\/abs\/1910.10513\">Minimax Rate Optimal Adaptive Nearest Neighbor Classification and Regression<\/a>,\u201d IEEE Transactions on Information Theory.\u00a0<\/li><li>M. Cho, L. Lai and W. Xu, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/main_JSAC_R2_Final_double.pdf\">Distributed Dual Coordinate Ascent in General Tree Networks and Communication Network Effect on Synchronous Machine Learning<\/a>,\u201d IEEE JSAC Series on Machine Learning for Communications and Networks.\u00a0<\/li><li>P. Zhao and L. Lai, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/2046.PuningZ.pdf\">Efficient Classification with Adaptive KNN<\/a>,\u201d AAAI Conference on Articial Intelligence (AAAI), Feb. 2021.<\/li><li>P. Zhao and L. Lai, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/9142281\">Minimax Optimal Estimation of KL Divergence for Continuous Distributions<\/a>,\u201d IEEE Transactions on Information Theory, vol. 66, no. 12, pp. 7787- 7811, Dec. 2020.<\/li><li>P. Zhao and L. Lai, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/KSGjournal_finalv1.pdf\">Analysis of KNN Information Estimators for Smooth Distributions<\/a>,\u201d IEEE Transactions on Information Theory, vol. 66, no. 6, pp. 3798-3826, June 2020.<\/li><li>J. Geng, B. Zhang, L. Huie and L. Lai, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=8705307\">Online Change-Point Detection of Linear Regression Models<\/a>,\u201d IEEE Transactions on Signal Processing, vol, 67, no. 12, pp. 3316-3329, June 2019.<\/li><li>W. Zhao and L. Lai, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=8355669\">Distributed Testing With Cascaded Encoders<\/a>\u201c, IEEE Transactions on Information Theory,\u00a0vol. 64, no. 11, pp. 7339- 7348, Nov. 2018.<\/li><li>M. El Gamal and L. Lai, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/Distributedestimation.pdf\">On Rate Requirements for Achieving the Centralized Performance in Distributed Estimation<\/a>,\u201d IEEE Transactions on Signal Processing,\u00a0vol. 65, no. 8, pp. 2020- 2032, Apr. 2017.<\/li><li>W. Zhao and L. Lai, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/07398150.pdf\">Distributed Detection with Vector Quantizer<\/a>,\u201d IEEE Transactions on Signal and Information Processing over Networks, vol.2, no. 2, pp. 105-119, June 2016.<\/li><li>B. Zhang, J. Geng and L. Lai, \u201c<a href=\"https:\/\/ucdavis.box.com\/s\/ccqvl23l4w0kswoa7pkb4e70kyzovi5n\">Multiple Change-Points Estimation in Linear Regression Models via Sparse Group Lasso<\/a>,\u201d IEEE Transactions on Signal Processing, vol. 63, no. 9, pp. 2209-2224, May 2015.<\/li><\/ul><h3>Sequential Analysis and Applications<\/h3><ul><li>M. Cho, W. Xu and L. Lai, &#8220;<a href=\"https:\/\/ieeexplore.ieee.org\/document\/11205868\">Hypothesis Testing for Subset Identification: A Linear Measurement Scheme<\/a>&#8220;. IEEE Transactions on Signal Processing.<\/li><li>X. Ni and L. Lai, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2024\/11\/TIT_submission.pdf\">Risk-Sensitive Reinforcement Learning with Phi-Divergence-Risk<\/a>,\u201d IEEE Transactions on Information Theory. Submitted.\u00a0<\/li><li>P. Zhao and L. Lai, \u201c<a href=\"https:\/\/arxiv.org\/abs\/2308.01490\">Minimax Optimal Q Learning with Nearest Neighbors<\/a>,\u201d IEEE Transactions on Information Theory, 2025.\u00a0\u00a0<\/li><li>X. Ni, G. Liu and L. Lai, &#8220;<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2024\/05\/paper_v2.pdf\">Risk-Sensitive Reward-Free Reinforcement Learning with CVaR<\/a>&#8220;,\u00a0 International Conference on Machine Learning (ICML), 2024.<\/li><li>X. Ma, L. Lai and S. Cui, &#8220;<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2022\/12\/V7.pdf\">Bayesian Two-stage Sequential Change Diagnosis Via Sensor Arrays<\/a>&#8220;. IEEE Transactions on Information Theory.<\/li><li>X. Ma, L. Lai and S. Cui, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/TSP2021_V4.pdf\">Two-Stage Bayesian Sequential Change Diagnosis<\/a>,\u201d IEEE Transactions on Signal Processing.\u00a0<\/li><li>J. Geng, B. Zhang, L. Huie and L. Lai, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=8705307\">Online Change-Point Detection of Linear Regression Models<\/a>,\u201d IEEE Transactions on Signal Processing, vol, 67, no. 12, pp. 3316-3329, June 2019.<\/li><li>G. Fellouris, E. Bayraktar and L. Lai, \u201c<a href=\"http:\/\/arxiv.org\/abs\/1609.02661\">Efficient Byzantine Sequential Change Detection<\/a>,\u201d IEEE Transactions on Information Theory, vol. 64, no. 5, pp. 3346- 3360, May 2018.<\/li><li>C. Tsinos, F. Foukalas, T. Khattab and L. Lai, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/8052574\">On Channel Selection for Carrier Aggregation Systems,<\/a>\u201d IEEE Transactions on Communications,\u00a0vol. 66, no. 2, pp. 808-818, Feb. 2018.<\/li><li>J. Geng, W. Xu and L. Lai, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=7551219\">Quickest Sequential Muti-Band Spectrum Sensing with Mixed Observations<\/a>,\u201d IEEE Transactions on Signal Processing, vol. 64, no. 22, pp. 5861-5874, Nov. 2016.<\/li><li>E. Bayraktar and L. Lai, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/130924445.pdf\">Byzantine Fault Tolerant Distributed Quickest Change Detection<\/a>,\u201d SIAM Journal on Control and Optimization, vol. 53, no. 2, pp. 575-591, Mar. 2015.<\/li><li>J. Geng, E. Bayraktar and L. Lai, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/06862025.pdf\">Bayesian Quickest Change Point Detection with Sampling Right Constraints<\/a>,\u201d IEEE Transactions on Information Theory, vol. 60, no. 10, pp.6474-6490, Oct. 2014.<\/li><li>R. Caromi, S. Mohan and L. Lai, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/06842636.pdf\">Optimal Sequential Channel Estimation and Probing for Multiband Cognitive Radio Systems<\/a>,\u201d IEEE Transactions on Communications, vol. 62, no. 8, pp. 2696-2708, Aug. 2014.<\/li><li>Y. Xin, H. Zhang and L. Lai, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/06683128.pdf\">A Low-Complexity Sequential Spectrum Sensing Algorithm for Cognitive Radio<\/a>,\u201d IEEE Journal on Selected Areas in Communications: Cognitive Radio Series, vol. 32, no. 3, pp. 387-399, Mar. 2014.<\/li><li>J. Geng and L. Lai, \u201c<a href=\"https:\/\/ucdavis.box.com\/s\/xohh3n5410i9r5qk3fvsg5tn5ndbbze0\">Non-Bayesian Quickest Change Detection with Stochastic Sample Right Constraints<\/a>,\u201d IEEE Transactions on Signal Processing, vol. 61, no. 20, pp. 5090-5102, Oct. 2013.<\/li><li>R. Caromi, Y. Xin and L. Lai, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/06336758.pdf\">Fast Multi-band Spectrum Scanning for Cognitive Radio Systems<\/a>,\u201d IEEE Transactions on Communications, vol. 61, no. 1, pp. 63-75, Jan. 2013.<\/li><li>L. Lai , H. Vincent Poor, Y. Xin and G. Georgiadis, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/05961845.pdf\">Quickest Search over Multiple Sequences<\/a>,\u201d IEEE Transactions on Information Theory, vol. 57, no. 8, pp. 5375 -5386, Aug. 2011.<\/li><li>Y. Liang, L. Lai\u00a0 and J. Halloran, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/5701688\">Distributed Cognitive Radio Network Management via Algorithms in Probabilistic Graphical Models<\/a>,\u201d IEEE Journal on Selected Areas in Communications, Special Issue on Advances in Cognitive Radio Networking and Communications, vol. 29, no. 2, pp. 338-348, Feb. 2011.<\/li><li>L. Lai , H. El Gamal, H. Jiang and H. Vincent Poor, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/05440181.pdf\">Cognitive Medium Access: Exploration, Exploitation and Competition<\/a>,\u201d IEEE Transactions on Mobile Computing, vol. 10, no. 2, pp. 239-253, Feb. 2011.<\/li><li>H. Jiang, L. Lai , R. Fan and H. Vincent Poor, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/04786510.pdf\">Optimal Selection of Channel Sensing Order in Cognitive Radios<\/a>,\u201d IEEE Transactions on Wireless Communications , vol. 8, no. 1, pp. 297-307, Jan. 2009.<\/li><\/ul><h3>Information Theoretic Security<\/h3><ul><li>W. Tu and L. Lai, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/SecureFunctionComputing.pdf\">On Function Computation with Privacy and Secrecy Constraints<\/a>,\u201d IEEE Transactions on Information Theory, vol. 65, no. 10, pp. 6716-6733, Oct. 2019.<\/li><li>W. Tu and L. Lai, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/KeylessAuthenticationAndAuthenticatedCapacity.pdf\">Keyless Authentication and Authenticated Capacity<\/a>,\u201d IEEE Transactions on Information Theory, vol. 64, no. 5, pp. 3696- 3714, May 2018.<\/li><li>S. Zou, Y. Liang, L. Lai, H. V. Poor and S. Shamai (Shitz), \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=8254375\">Degraded Broadcast Channel with Secrecy Outside a Bounded Range<\/a>,\u201d IEEE Transactions on Information Theory, vol. 64, no. 3, pp. 2104-2120, Mar. 2018.<\/li><li>S. Zou, Y. Liang, L. Lai\u00a0 and S. Shamai (Shitz), \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/07084122.pdf\">An Information Theoretic Approach to Secret Sharing<\/a>,\u201d IEEE Transactions on Information Theory, vol. 61, no. 6, pp. 3121-3136, June 2015.<\/li><li>Y. Liang, L. Lai , H. Vincent Poor and S. Shamai (Shitz), \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/06687232broadcast.pdf\">A Broadcast Approach for Fading Gaussian Wiretap Channels<\/a>,\u201d IEEE Transactions on Information Theory, vol. 60, no. 2, pp. 842-858, Feb. 2014.<\/li><li>O. O. Koyluoglu, H. El Gamal, L. Lai\u00a0 and H. Vincent Poor, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/05773067.pdf\">Interference Alignment for Secrecy<\/a>,\u201d IEEE Transactions on Information Theory, vol. 57, no. 6, pp. 3323 \u2013 3332, June 2011.<\/li><li>L. Lai , S.-W. Ho and H. Vincent Poor, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/05664788.pdf\">Privacy-Security Tradeoff in Biometric Security Systems Part II: Multiple Uses Case<\/a>,\u201d IEEE Transactions on Information Forensics and Security, vol. 6, no. 1, pp. 140-151, Mar. 2011.<\/li><li>L. Lai , S.-W. Ho and H. Vincent Poor, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/05664787.pdf\">Privacy-Security Tradeoff in Biometric Security Systems Part I: Single Use Case<\/a>,\u201d IEEE Transactions on Information Forensics and Security, vol. 6, no. 1, pp. 122-139, Mar. 2011.<\/li><li>L. Lai , H. El Gamal and H. Vincent Poor, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/04777632.pdf\">Authentication over Noisy Channels<\/a>,\u201d IEEE Transactions on Information Theory, vol. 55, no. 2, pp. 906-916, Feb. 2009.<\/li><li>L. Lai , H. El Gamal and H. Vincent Poor, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/04655457.pdf\">The Wiretap Channel with Feedback: Encryption over the Channel<\/a>,\u201dIEEE Transactions on Information Theory, vol. 54, no. 11, pp. 5059 \u2013 5067, Nov. 2008.<\/li><li>P. K. Gopala, L. Lai\u00a0 and H. El Gamal, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/04626059.pdf\">On the Secrecy Capacity of Fading Channels<\/a>,\u201d IEEE Transactions on Information Theory, vol. 54, no. 10, pp. 4687 \u2013 4698, Oct. 2008.<\/li><li>L. Lai\u00a0 and H. El Gamal, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/04608977.pdf\">The Relay-Eavesdropper Channel: Cooperation for Secrecy<\/a>,\u201d IEEE Transactions on Information Theory , vol. 54, no. 9, pp. 4005 \u2013 4019, Sept. 2008.<\/li><\/ul><h3>Secret Key Generation<\/h3><ul><li>H. Zhang, Y. Liang, L. Lai\u00a0 and S. Shamai (Shitz), \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/KeyCellularModel_IT2015-sub.pdf\">Multi-Key Generation over a Cellular Model with a Helper<\/a>,\u201d IEEE Transactions on Information Theory,\u00a0vol. 63, no. 6, pp. 3804- 3822, June 2017.<\/li><li>W. Tu, M. Goldenbaum, L. Lai\u00a0 and H. V. Poor, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/Simutaneously_keys_Source_Channel_modelv2.pdf\">On Simultaneously Generating Multiple Keys in Joint Source-Channel Model,<\/a>\u201d IEEE Transactions on Information Forensics and Security, vol. 12, no. 2, pp. 298-308, Feb. 2017.<\/li><li>L. Lai\u00a0 and S.-W. Ho, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/07138609.pdf\">Key Generation Algorithms for Pairwise Independent Networks Based on Graphical Models<\/a>,\u201d IEEE Transactions on Information Theory, vol. 61, no. 9, pp. 4828-4837, Sept. 2015.<\/li><li>H. Zhang, L. Lai , Y. Liang and H. Wang, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/06858050.pdf\">The Capacity Region of the Source-Type Model for Secret Key and Private Key Generation<\/a>,\u201d IEEE Transactions on Information Theory, vol. 60, no. 10, pp.6389-6398, Oct. 2014.<\/li><li>H. Zhou, L. Huie and L. Lai, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/06716049.pdf\">Secret Key Generation in the Two-Way Relay Channel with Active Attackers<\/a>,\u201d IEEE Transactions on Information Forensics and Security, vol. 9, no. 3, pp. 476-488, Mar. 2014.<\/li><li>L. Lai , Y. Liang and W. Du, \u201c<a href=\"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-content\/uploads\/sites\/38\/2021\/06\/06280261.pdf\">Cooperative Key Generation in Wireless Networks<\/a>,\u201d IEEE Journal on Selected Areas in Communications, Special Issue on Theories and Methods for Advanced Wireless Relays, vol. 30, no. 8, pp. 1578 \u2013 1588, Sept. 2012.<\/li><li>L. Lai , Y. Liang and H. Vincent Poor, \u201c<a href=\"https:\/\/ucdavis.box.com\/s\/8cksir9tppye505m9icsy7a9w8lrqt6r\">A Unified Framework for Key Agreement over Wireless Fading Channels<\/a>,\u201d IEEE Transactions on Information Forensics and Security, vol 7, no. 2, pp. 480 \u2013 490, Apr. 2012.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Selected Recent Publications by Topics Selected Publications in Reverse Chronological Order Adversarial Machine Learning H. Liang, Y. Jin, K. Balasubramanian and L. Lai, &#8220;Differentially Private Two-Stage Gradient Descent for Instrumental Variable Regression&#8220;. International Conference on Learning Representations (ICLR), 2026.\u00a0 M. Lyu, C. Yang, G. Liu and L. Lai, &#8220;Dueling Bandit: Adversarial Attack and Robust Defense&#8220;. [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-1046","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-json\/wp\/v2\/pages\/1046","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-json\/wp\/v2\/comments?post=1046"}],"version-history":[{"count":209,"href":"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-json\/wp\/v2\/pages\/1046\/revisions"}],"predecessor-version":[{"id":2327,"href":"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-json\/wp\/v2\/pages\/1046\/revisions\/2327"}],"wp:attachment":[{"href":"https:\/\/faculty.engineering.ucdavis.edu\/lai\/wp-json\/wp\/v2\/media?parent=1046"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}