Search Results - "Lee, JeMin"

Refine Results
  1. 1

    Capacity Enhancement Using an Interference Limited Area for Device-to-Device Uplink Underlaying Cellular Networks by MIN, Hyunkee, LEE, Jemin, PARK, Sungsoo, HONG, Daesik

    “…A new interference management strategy is proposed to enhance the overall capacity of cellular networks (CNs) and device-to-device (D2D) systems. We consider M…”
    Get full text
    Journal Article
  2. 2

    Hybrid Full-/Half-Duplex System Analysis in Heterogeneous Wireless Networks by Jemin Lee, Quek, Tony Q. S.

    “…Full-duplex (FD) radio has been introduced for bidirectional communications on the same temporal and spectral resources so as to maximize spectral efficiency…”
    Get full text
    Journal Article
  3. 3

    Outage Probability of Cognitive Relay Networks with Interference Constraints by Jemin Lee, Hano Wang, Andrews, Jeffrey G, Daesik Hong

    “…This paper evaluates the outage probability of cognitive relay networks with cooperation between secondary users based on the underlay approach, while adhering…”
    Get full text
    Journal Article
  4. 4

    Base Station Coordination Scheme for Multi-Tier Ultra-Dense Networks by Mukherjee, Sudarshan, Kim, Dongsun, Lee, Jemin

    “…In this paper, we consider a relative received link power (RRLP)-based coordinated multi-point (CoMP) joint transmission (JT) in the multi-tier ultra-dense…”
    Get full text
    Journal Article
  5. 5

    Reliability Improvement Using Receive Mode Selection in the Device-to-Device Uplink Period Underlaying Cellular Networks by MIN, Hyunkee, SEO, Woohyun, LEE, Jemin, PARK, Sungsoo, HONG, Daesik

    “…A new interference management scheme is proposed to improve the reliability of a device-to-device (D2D) communication in the uplink (UL) period without…”
    Get full text
    Journal Article
  6. 6

    Sensing Performance of Energy Detector With Correlated Multiple Antennas by Sungtae Kim, Sungtae Kim, Jemin Lee, Jemin Lee, Hano Wang, Hano Wang, Daesik Hong, Daesik Hong

    Published in IEEE signal processing letters (01-08-2009)
    “…This paper describes the derivation of detection and false-alarm probabilities for energy detectors in cognitive radio networks when a sensing node of the…”
    Get full text
    Journal Article
  7. 7

    Heterogeneous Cellular Network With Energy Harvesting-Based D2D Communication by Yang, Howard H., Jemin Lee, Quek, Tony Q. S.

    “…The concept of mobile user equipment (UE) relay (UER) has been introduced to support device-to-device (D2D) communications for enhancing communication…”
    Get full text
    Journal Article
  8. 8

    Resilience of DoS Attacks in Designing Anonymous User Authentication Protocol for Wireless Sensor Networks by Gope, Prosanta, Jemin Lee, Quek, Tony Q. S.

    Published in IEEE sensors journal (15-01-2017)
    “…Wireless sensor networks (WSNs) include spatially allotted autonomous instruments that employ sensors to check environmental or physical conditions. These…”
    Get full text
    Journal Article
  9. 9

    Heterogeneous Cellular Networks With LoS and NLoS Transmissions-The Role of Massive MIMO and Small Cells by Qi Zhang, Yang, Howard H., Quek, Tony Q. S., Jemin Lee

    “…We develop a framework for downlink heterogeneous cellular networks with line-of-sight (LoS) and non-LoS transmissions. Using stochastic geometry, we derive…”
    Get full text
    Journal Article
  10. 10

    Physical-Layer Secret Key Generation With Colluding Untrusted Relays by Chan Dai Truyen Thai, Jemin Lee, Quek, Tony Q. S.

    “…In this paper, we propose a physical-layer secret key generation scheme for multiantenna legitimate nodes with the help of multiple untrusted relays, equipped…”
    Get full text
    Journal Article
  11. 11

    Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding by Chi Cheng, Jemin Lee, Tao Jiang, Takagi, Tsuyoshi

    “…Recently, based on the homomorphic signatures, the authentication schemes, such as homomorphic subspace signature (HSS) and key predistribution-based tag…”
    Get full text
    Journal Article
  12. 12

    Capacity of Reactive DF Scheme in Cognitive Relay Networks by SAGONG, Sanguk, LEE, Jemin, HONG, Daesik

    “…This paper evaluates the capacity of the reactive decode-and-forward (R-DF) scheme, which considers the reduced relay candidates based on the signal-to-noise…”
    Get full text
    Journal Article
  13. 13

    Jamming-Aided Secure Communication in Massive MIMO Rician Channels by Jue Wang, Jemin Lee, Fanggang Wang, Quek, Tony Q. S.

    “…In this paper, we investigate the artificial noise-aided jamming design for a transmitter equipped with large antenna array in Rician fading channels. We…”
    Get full text
    Journal Article
  14. 14

    tomato (Solanum lycopersicum) APETALA2/ERF gene, SlAP2a, is a negative regulator of fruit ripening by Chung, Mi‐Young, Vrebalov, Julia, Alba, Rob, Lee, JeMin, McQuinn, Ryan, Chung, Jae‐Dong, Klein, Patricia, Giovannoni, James

    “…The transition of fleshy fruit maturation to ripening is regulated by exogenous and endogenous signals that coordinate the transition of the fruit to a final…”
    Get full text
    Journal Article
  15. 15

    Detecting Illegal Online Gambling (IOG) Services in the Mobile Environment by Min, Moohong, Lee, Jemin J., Lee, Kyungho

    Published in Security and communication networks (23-02-2022)
    “…Despite the extensive ramifications of illegal online gambling (IOG) services, actions taken by government authorities have had little effect in halting these…”
    Get full text
    Journal Article
  16. 16

    Secure and efficient communications with fine-grained access control in underwater wireless sensor networks by Yu, Donghyun, Yun, Sinwoong, Lee, Jemin

    Published in ICT express (01-08-2024)
    “…As UWSN have received attention, a need for an efficient and secure communication protocol has arisen to overcome the low device performance, node failure, and…”
    Get full text
    Journal Article
  17. 17

    Capacity enhancement of secondary links through spatial diversity in spectrum sharing by Wang, Hano, Lee, Jemin, Kim, Sungtae, Hong, Daesik

    “…Previous investigations on capacity of secondary users in spectrum-sharing environments have determined the capacity of a secondary link based on the…”
    Get full text
    Journal Article
  18. 18

    Impact of Elevated Base Stations on the Ultra-Dense Networks by Hewon Cho, Chenxi Liu, Jemin Lee, Taegyun Noh, Quek, Tony Q. S.

    Published in IEEE communications letters (01-06-2018)
    “…In this letter, we examine the impact of the elevated base stations (BSs) on the performance of ultra-dense networks (UDNs). To this end, we first model the…”
    Get full text
    Journal Article
  19. 19

    Secret Group-Key Generation at Physical Layer for Multi-Antenna Mesh Topology by Chan Dai Truyen Thai, Jemin Lee, Prakash, Jay, Quek, Tony Q. S.

    “…In this paper, we propose a secret group-key generation scheme in physical layer, where an arbitrary number of multi-antenna LNs (LN) exist in mesh topology…”
    Get full text
    Journal Article
  20. 20

    On the Secrecy Capacity Region of the Two-User Symmetric Z Interference Channel With Unidirectional Transmitter Cooperation by Mohapatra, Parthajit, Murthy, Chandra R., Jemin Lee

    “…In this paper, the role of unidirectional limited rate transmitter cooperation is studied for the two-user symmetric Z interference channel (Z-IC) with secrecy…”
    Get full text
    Journal Article