default search action
Jeongseok Ha
- > Home > Persons > Jeongseok Ha
Publications
- 2016
- [c45]Jinho Choi, Jeongseok Ha:
Secret key transmission based on channel reciprocity for secure IoT. EuCNC 2016: 388-392 - 2015
- [j23]Sanghun Im, Hyoungsuk Jeon, Jinho Choi, Jeongseok Ha:
Secret Key Agreement With Large Antenna Arrays Under the Pilot Contamination Attack. IEEE Trans. Wirel. Commun. 14(12): 6579-6594 (2015) - [c40]Sanghun Im, Jinho Choi, Jeongseok Ha:
Secret Key Agreement for Massive MIMO Systems with Two-Way Training under Pilot Contamination Attack. GLOBECOM Workshops 2015: 1-6 - [c38]Jinho Choi, Jeongseok Ha:
Power allocation of random masked beamforming for guaranteed secure communications. ICTC 2015: 329-334 - [c35]Jinho Choi, Jeongseok Ha:
A user-aware broadcast scheme using rate-adaptive coded transmission. ICTC 2015: 1103-1108 - [i2]Sanghun Im, Hyoungsuk Jeon, Jinho Choi, Jeongseok Ha:
Secret Key Agreement with Large Antenna Arrays under the Pilot Contamination Attack. CoRR abs/1507.00095 (2015) - 2014
- [j22]Sung-Gun Cho, Daesung Kim, Jinho Choi, Jeongseok Ha:
Block-Wise Concatenated BCH Codes for NAND Flash Memories. IEEE Trans. Commun. 62(4): 1164-1177 (2014) - [c31]Daesung Hwang, Hyoungsuk Jeon, Jeongseok Ha, Jinho Choi:
Energy efficient transmission strategies for distributed detection in wireless sensor networks. ISSNIP 2014: 1-5 - [c29]Jinho Choi, Jeongseok Ha:
On the Estimation of Slow-Fading Coefficients for Pilot Contamination Precoding. VTC Spring 2014: 1-5 - 2013
- [j20]Jinho Choi, Jeongseok Ha:
Iterative Demodulation and Decoding of Uplink Multiuser M-ary FSK Using OFDMA Mapping. IEEE Commun. Lett. 17(9): 1842-1845 (2013) - [j18]Jinho Choi, Jeongseok Ha, Hyoungsuk Jeon:
On the Energy Delay Tradeoff of HARQ-IR in Wireless Multiuser Systems. IEEE Trans. Commun. 61(8): 3518-3529 (2013) - [j17]Hyoungsuk Jeon, Jinho Choi, Steven W. McLaughlin, Jeongseok Ha:
Channel Aware Encryption and Decision Fusion for Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 8(4): 619-625 (2013) - [j16]Jinho Choi, Jeongseok Ha:
On the Energy Efficiency of AMC and HARQ-IR With QoS Constraints. IEEE Trans. Veh. Technol. 62(7): 3261-3270 (2013) - [c28]Sanghun Im, Hyoungsuk Jeon, Jinho Choi, Jeongseok Ha:
Secret key agreement under an active attack in MU-TDD systems with large antenna arrays. GLOBECOM 2013: 1849-1855 - [c27]Jinho Choi, Jeongseok Ha:
Low-dimensional minimum leakage multiuser beamforming in a multicell system. ICTC 2013: 454-458 - [c26]Sanghun Im, Hyoungsuk Jeon, Jinho Choi, Jeongseok Ha:
Robustness of secret key agreement protocol with massive MIMO under pilot contamination attack. ICTC 2013: 1053-1058 - [c25]Jinho Choi, Jeongseok Ha, Hyoungsuk Jeon:
Physical layer security for wireless sensor networks. PIMRC 2013: 1-6 - 2012
- [j14]Won Taek Song, Jinho Choi, Jeongseok Ha:
Perfect Secrecy Over Binary Erasure Wiretap Channel of Type II. IEEE Trans. Inf. Forensics Secur. 7(4): 1414-1418 (2012) - [j13]Jinho Choi, Jeongseok Ha:
On the Achievable Rate for Wideband Channels with Estimated CSI. J. Signal Process. Syst. 66(1): 75-86 (2012) - [c23]Daesung Kim, Jinho Choi, Jeongseok Ha:
On the soft information extraction from hard-decision outputs in MLC NAND flash memory. GLOBECOM 2012: 3208-3213 - [c21]Jinho Choi, Jeongseok Ha:
Iterative Distributed Amplitude Optimization for Distributed Detection in Wireless Sensor Networks. VTC Spring 2012: 1-5 - [c20]Jinho Choi, Jeongseok Ha:
Orthogonal beamforming for overlay mode of OFDMA-based rural broadband wireless access. WCNC 2012: 508-512 - 2011
- [j11]Hyoungsuk Jeon, Daesung Hwang, Jinho Choi, Hyuckjae Lee, Jeongseok Ha:
Secure Type-Based Multiple Access. IEEE Trans. Inf. Forensics Secur. 6(3-1): 763-774 (2011) - [j10]Hyoungsuk Jeon, Namshik Kim, Jinho Choi, Hyuckjae Lee, Jeongseok Ha:
Bounds on Secrecy Capacity Over Correlated Ergodic Fading Channels at High SNR. IEEE Trans. Inf. Theory 57(4): 1975-1983 (2011) - [c19]Myounghae Hyun, Won Taek Song, Jinho Choi, Seungjae Yoo, Jeongseok Ha:
Code design for type-I wiretap channel thanks. Allerton 2011: 1424-1429 - [c17]Hyoungsuk Jeon, Jinho Choi, Steven W. McLaughlin, Jeongseok Ha:
Channel aware encryption and decision fusion for wireless sensor networks. WIFS 2011: 1-6 - 2010
- [j9]Hyoungsuk Jeon, Jinho Choi, Hyuckjae Lee, Jeongseok Ha:
Channel-Aware Energy Efficient Transmission Strategies for Large Wireless Sensor Networks. IEEE Signal Process. Lett. 17(7): 643-646 (2010) - [c16]Hyoungsuk Jeon, Hyuckjae Lee, Jeongseok Ha, Jinho Choi:
Channel-Aware Energy Efficient Transmission Strategies for Large Wireless Sensor Networks. GLOBECOM 2010: 1-5 - [c14]Hyoungsuk Jeon, Daesung Hwang, Hyuckjae Lee, Jeongseok Ha, Jinho Choi:
Secure type-based multiple access: Transmission strategy and analysis for perfect secrecy. ITW 2010: 1-5 - [c13]Jinho Choi, Jeongseok Ha:
On the asymptotic performance of TBMA with multichannel diversity over fading channels. PIMRC 2010: 1957-1961 - 2009
- [j8]Jinho Choi, Jeongseok Ha:
Rate optimization to minimize distortion for source-channel coded H-BLAST with SIC decoding. IEEE Commun. Lett. 13(2): 115-117 (2009) - [j7]Chunsung Jung, Jinho Choi, Jeongseok Ha:
Asymmetric power allocation to improve convergence rate of iterative receivers with soft cancellation. IEEE Commun. Lett. 13(8): 579-581 (2009) - 2007
- [c7]Junyoung Nam, Seong Rag Kim, Hyun Kyu Chung, Jinho Choi, Jeongseok Ha:
Cholesky Based Efficient Algorithms for the MMSE-SIC Receiver. GLOBECOM 2007: 3045-3050
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 02:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint