default search action
Hyoungsuk Jeon
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2015
- [j10]Sanghun Im, Hyoungsuk Jeon, Jinho Choi, Jeongseok Ha:
Secret Key Agreement With Large Antenna Arrays Under the Pilot Contamination Attack. IEEE Trans. Wirel. Commun. 14(12): 6579-6594 (2015) - 2014
- [j9]Hyoungsuk Jeon, Steven W. McLaughlin, Il-Min Kim, Jeongseok Ha:
Secure Communications with Untrusted Secondary Nodes in Cognitive Radio Networks. IEEE Trans. Wirel. Commun. 13(4): 1790-1805 (2014) - 2013
- [j8]Jinho Choi, Jeongseok Ha, Hyoungsuk Jeon:
On the Energy Delay Tradeoff of HARQ-IR in Wireless Multiuser Systems. IEEE Trans. Commun. 61(8): 3518-3529 (2013) - [j7]Hyoungsuk Jeon, Jinho Choi, Steven W. McLaughlin, Jeongseok Ha:
Channel Aware Encryption and Decision Fusion for Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 8(4): 619-625 (2013) - 2012
- [j6]Sooyeol Im, Hyoungsuk Jeon, Seunghee Kim, Jinup Kim, Hyuckjae Lee:
Dynamic spectrum access based on interruptible spectrum leasing. Wirel. Networks 18(7): 763-770 (2012) - 2011
- [j5]Hyoungsuk Jeon, Daesung Hwang, Jinho Choi, Hyuckjae Lee, Jeongseok Ha:
Secure Type-Based Multiple Access. IEEE Trans. Inf. Forensics Secur. 6(3-1): 763-774 (2011) - [j4]Hyoungsuk Jeon, Namshik Kim, Jinho Choi, Hyuckjae Lee, Jeongseok Ha:
Bounds on Secrecy Capacity Over Correlated Ergodic Fading Channels at High SNR. IEEE Trans. Inf. Theory 57(4): 1975-1983 (2011) - 2010
- [j3]Hyoungsuk Jeon, Jinho Choi, Hyuckjae Lee, Jeongseok Ha:
Channel-Aware Energy Efficient Transmission Strategies for Large Wireless Sensor Networks. IEEE Signal Process. Lett. 17(7): 643-646 (2010) - 2009
- [j2]Hyoungsuk Jeon, Sooyeol Im, Youmin Kim, Seunghee Kim, Jinup Kim, Hyuckjae Lee:
Dynamic Spectrum Access to the Combined Resource of Commercial and Public Safety Bands Based on a WCDMA Shared Network. IEICE Trans. Commun. 92-B(12): 3581-3585 (2009) - 2008
- [j1]Jongsub Cha, Hyoungsuk Jeon, Hyuckjae Lee:
Low Complexity Fano-Based Detection Algorithm with Iterative Structure for V-BLAST Systems. IEICE Trans. Commun. 91-B(1): 347-350 (2008)
Conference and Workshop Papers
- 2014
- [c17]Daesung Hwang, Hyoungsuk Jeon, Jeongseok Ha, Jinho Choi:
Energy efficient transmission strategies for distributed detection in wireless sensor networks. ISSNIP 2014: 1-5 - 2013
- [c16]Sanghun Im, Hyoungsuk Jeon, Jinho Choi, Jeongseok Ha:
Secret key agreement under an active attack in MU-TDD systems with large antenna arrays. GLOBECOM 2013: 1849-1855 - [c15]Sanghun Im, Hyoungsuk Jeon, Jinho Choi, Jeongseok Ha:
Robustness of secret key agreement protocol with massive MIMO under pilot contamination attack. ICTC 2013: 1053-1058 - [c14]Jinho Choi, Jeongseok Ha, Hyoungsuk Jeon:
Physical layer security for wireless sensor networks. PIMRC 2013: 1-6 - 2012
- [c13]Hyoungsuk Jeon, Steven W. McLaughlin, Jeongseok Ha:
Secure communications with untrusted secondary users in cognitive radio networks. GLOBECOM 2012: 1072-1078 - 2011
- [c12]Hyoungsuk Jeon, Jinho Choi, Steven W. McLaughlin, Jeongseok Ha:
Channel aware encryption and decision fusion for wireless sensor networks. WIFS 2011: 1-6 - 2010
- [c11]Hyoungsuk Jeon, Hyuckjae Lee, Jeongseok Ha, Jinho Choi:
Channel-Aware Energy Efficient Transmission Strategies for Large Wireless Sensor Networks. GLOBECOM 2010: 1-5 - [c10]Hyoungsuk Jeon, Daesung Hwang, Hyuckjae Lee, Jeongseok Ha, Jinho Choi:
Secure type-based multiple access: Transmission strategy and analysis for perfect secrecy. ITW 2010: 1-5 - 2009
- [c9]Okkyeong Bang, Hyoungsuk Jeon, Sunghyun Kim, Hyuckjae Lee:
Efficient Reader Anti-collision Methods for Passive RFID Systems. VTC Fall 2009 - 2008
- [c8]Sooyeol Im, Hyoungsuk Jeon, Hyuckjae Lee:
Autonomous Distributed Power Control for Cognitive Radio Networks. VTC Fall 2008: 1-5 - 2007
- [c7]Ji Hwan Choi, Dongwook Lee, Hyoungsuk Jeon, Jongsub Cha, Hyuckjae Lee:
Enhanced Binary Search with Time-Divided Responses for Efficient RFID Tag Anti-Collision. ICC 2007: 3853-3858 - [c6]Sunghun Kim, Hyoungsuk Jeon, Hyuckjae Lee, Joongsoo Ma:
Robust Transmission Power and Position Estimation in Cognitive Radio. ICOIN 2007: 719-728 - [c5]Hoiyoon Jung, Jongsub Cha, Hyoungsuk Jeon, Hyuckjae Lee:
Efficient Transmit Power Allocation and Feedback Reduction Algorithm for SQRD based V-Blast Systems. PIMRC 2007: 1-5 - [c4]Hoiyoon Jung, Jongsub Cha, Hyoungsuk Jeon, Hyuckjae Lee:
Efficient Transmit Strategy Using a Fraction of Feedback for QRD Based V-BLAST Systems. VTC Fall 2007: 387-391 - [c3]Hyunseok Lee, Hyoungsuk Jeon, Hoiyoon Jung, Hyuckjae Lee:
Signal Detection Using Log-Likelihood Ratio Based Sorting QR Decomposition for V-BLAST Systems. VTC Spring 2007: 1881-1885 - [c2]Youngwoo Youn, Hyoungsuk Jeon, Hoiyoon Jung, Hyuckjae Lee:
Discrete Wavelet Packet Transform based Energy Detector for Cognitive Radios. VTC Spring 2007: 2641-2645 - 2006
- [c1]Wonsop Kim, Hyun Kyu Chung, Kwang Chun Lee, Hyoungsuk Jeon, Jongsub Cha, Hyuckjae Lee:
LS Codes Aided Channel Estimation for MIMO-OFDM Systems in Multipath Environment. VTC Fall 2006: 1-5
Informal and Other Publications
- 2015
- [i2]Sanghun Im, Hyoungsuk Jeon, Jinho Choi, Jeongseok Ha:
Secret Key Agreement with Large Antenna Arrays under the Pilot Contamination Attack. CoRR abs/1507.00095 (2015) - 2008
- [i1]Hyoungsuk Jeon, Namshik Kim, Minki Kim, Hyuckjae Lee, Jeongseok Ha:
Secrecy Capacity over Correlated Ergodic Fading Channel. CoRR abs/0809.5212 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint