- O. Kosut, L. Tong, and D. Tse
Polytope codes against adversaries in networks
IEEE Transactions on Information Theory,vol. 60, no. 6, June 2014
- Stefano Marano, Vincenzo Matta, Ting He, and Lang Tong
The Embedding Capacity of Information Flows Under Renewal Traffic
IEEE Transactions on Information Theory, vol. 20, no. 6, June 2013
- O. Kosut and L. Tong
Distributed source coding with Byzantine sensors
IEEE Transactions on Information Theory,vol. 54, no. 6, pp. 2550-2565, June, 2008.
- P. Venkitasubramniam, T. He, and L. Tong
Anonymous networking amidst eavesdroppers
IEEE Transactions on Information Theory,
vol. 54, no. 6, pp. 2770-2784, June, 2008.
- T. He and L. Tong
Detection of information flows
IEEE Transactions on Information Theory,vol. 54, no. 11, pp. 4925-4945, Nov., 2008.
- Z. Yang and L. Tong
Cooperative sensor networks with misinformed nodes
IEEE Transactions on Information Theory,Vol. 51, no. 12, pp. 4118-4133, Dec. 2005.
- S. Misra, A. Swami, and L. Tong
Cutoff Rate Optimal Binary Inputs with Imperfect
CSI
IEEE Transactions on Wireless Communications, vol. 5, no. 10, pp.
2903-2913, Oct., 2006.
- V. Naware, G. Mergen and L. Tong
Stability and Delay of Finite User Slotted ALOHA
with Multipacket Reception
IEEE Transactions on Information Theory, vol. 51, no. 7, pp. 2636-2656, July 2005.
- G. Mergen and L. Tong
Stability and Capacity of Regular Wireless Networks
IEEE Transactions on Information Theory
, vol. 51, no. 6, pp. 1938-1953, June 2005.
IEEE Copyright
Information: Personal use of this material is permitted. However, permission
to reprint/republishthis material for advertising or promotional purposes
or for creating new collective works for resale or redistribution to servers
or lists, or to reuse any copyrighted component of this work in other works,
must be obtained from the copyright holder.
ACSP Bibliography Database: Journal.bib