Preprints

S. Shin and C. Suh, “Capacity of a two-way function multicast channel,” in preparation for submission to the IEEE Transactions on Information Theory.

S. Kim, S. Mohajer and C. Suh, “Coding across parallel erasure broadcast channels can be very useful,” in preparation for submission to a journal.

B. Kang, S.-H. Lee, S.-Y. Chung and C. Suh, “A new achievable scheme for interference relay channels,” in preparation for submission to the IEEE Transactions on Information Theory.

In Review

K. Ahn, K. Lee and C. Suh, “Community recovery in hypergraphs,” submitted to the IEEE Transactions on Information Theory, Sep. 2017.

S. Kim, M. Soheil and C. Suh, “Role of a relay in bursty multiple access channels,” submitted to the IEEE Transactions on Information Theory, Apr. 2016.

Y. Chen and C. Suh, “Spectral MLE: Top-K rank aggregation from pairwise comparisons,” submitted to the Journal of Machine Learning Research, May 2015 (Bell Labs Prize finalist).

After Aug. 2012

[1] K. Lim, C. Suh and J.K.K. Rhee, “Comment on 'Performance improvement of continuous-variable quantum key distribution via photon subtraction,’” to appear in Physical Review A, 2018.

[2] K. Ahn, K. Lee and C. Suh, “Hypergraph clustering in the weighted stochastic block model,” IEEE Journal of Selected Topcis in Signal Processing, vol. 12, no. 10, Oct. 2018.

[3] M. Jang, S. Kim and C. Suh, “Top-K rank aggrgation from M-wise comparisons,” IEEE Journal of Selected Topics in Signal Processing, vol. 12, no. 10, Oct. 2018.

[4] S. Kim, I.-H. Wang and C. Suh, “A relay can increase degrees of freedom in bursty MIMO interference networks,” IEEE Transactions on Information Theory, vol. 64, no. 6, pp. 4581–4593, June 2018.

[5] C. Suh, J. Cho and D. Tse, “Two-way interference channel capacity: How to have the cake and eat it too,” IEEE Transactions on Information Theory, vol. 64, no. 6, pp. 4259–4281, June 2018.

[6] K. Lim, H. Ko, C. Suh and J.K.K. Rhee, “Security analysis of quantum key distribution on passive optical networks,” Optics Express, vol. 25, no. 10, May 2017.

[7] C. Suh, V. Y. F. Tan and R. Zhao, “Adversarial top-K ranking,” IEEE Transactions on Information Theory, vol. 63, no. 4, pp. 2201–2225, Apr. 2017.

[8] H. Yang, W. Shin, B. Jung, C. Suh and A. Paulraj, “Opportunistic downlink interference alignment for multi-cell MIMO networks,” IEEE Transactions on Wireless Communications, vol. 16, no. 3, pp. 1533–1548, Mar. 2017.

[9] Y. Chen, C. Suh and A. Goldsmith, “Information recovery from pairwise measurements,” IEEE Transactions on Information Theory, vol. 62. no. 10, pp. 5881–5905, Oct. 2016.

[10] S. Jeon and C. Suh, "Degrees of freedom of uplink-downlink multi-antenna cellular networks,” IEEE Transactions on Information Theory, vol. 62, no. 8, pp. 4589–4603, Aug. 2016.

[11] C. Suh, N. Goela and M. Gastpar, “Computation in multicast networks: Function alignment and converse theorems,” IEEE Transactions on Information Theory, vol. 62, no. 4, pp. 1866–1877, Apr. 2016.

[12] S. Huang, C. Suh and L. Zheng, “Euclidean information theory of networks”, IEEE Transactions on Information Theory, vol. 61, no. 12, pp. 6795–6814, Dec. 2015.

[13] S. H. Chae, C. Suh and S.-Y. Chung, “Degrees of freedom of the rank-deficient interference channel with feedback,”, IEEE Transactions on Information Theory, vol. 61, no. 6, pp. 3326–3338, June 2015.

[14] K. Lim, H. Ko, K. Kim, C. Suh and J.K.K. Lee, “The error tolerance bound for secure multi-qubit QKD against incoherent attack,” IEEE Journal of Selected Topics in Quantum Electronics, vol. 21, no. 3, pp.1–9, May/June 2015.

[15] S. Lashgari, S. Avestimehr and C. Suh, “Linear degrees of freedom of the X-channel with delayed CSIT," IEEE Transactions on Information Theory, vol. 60, no. 5, pp. 2180—2189, Apr. 2014

[16] V. Cadambe, S. Jafar, H. Maleki, K. Ramchandran and C. Suh, “Asymptotic interference alignment for optimal repair of MDS codes in distributed storage,” IEEE Transactions on Information Theory, vol. 59, no. 5, pp. 2974—2987, May 2013.

Before Aug. 2012

[17] A. Vahid, C. Suh and S. Avestimehr, “Interference channels with rate-limited feedback,” IEEE Transactions on Information Theory, vol. 58, no. 5, pp. 2788–2812, May 2012.

[18] C. Suh, M. Ho and D. Tse, “Downlink interference alignment,” IEEE Transactions on Communications, vol. 59, no. 9, pp. 2616—2626, Sep. 2011 (won the 2013 IEEE Communications Society Stephen O. Rice Prize).

[19] C. Suh and D. Tse, “Feedback capacity of the Gaussian interference channel to within 2 bits,” IEEE Transactions on Information Theory, vol. 57, no. 5, pp. 2667—2685, May 2011 (The conference version won the Best Student Paper Award of the IEEE ISIT 2009).

[20] C. Suh and K. Ramchandran, “Exact-repair MDS code construction using interference alignment,” IEEE Transactions on Information Theory, vol. 57, no. 3, pp. 1425—1442, Mar. 2011 (The conference version won a finalist of the Best Student Paper Award of the IEEE ISIT 2010).

[21] A. G. Dimakis, Y. Wu, K. Ramchandran and C. Suh, “A survey on network codes for distributed storage,” Proceedings of the IEEE, vol. 99, no. 3, pp. 476—489, Mar. 2011

[22] C. Suh and J. Mo, “Resource allocation for multicast services in multicarrier wireless communications,” IEEE Transactions on Wireless Communication, vol. 7, no. 1, pp. 27—31, Jan. 2008.

[23] Y. Kim, J. Lim, C. Suh and Y. Lee, “Designing training sequences for carrier frequency estimation in frequency-selective channels,” IEEE Transactions on Vehicular Technology, vol. 55, no. 1, pp.151—157, Jan. 2006.