Changho Suh – Journal PapersPreprintsK. Lee, H. Kim, K. Lee, C. Suh and K. Ramchandran, ‘‘Synthesizing differentially private datasets using random mixing,’’ in preparation for submission to a journal. G. Suh, S. Jeon and C. Suh, ‘‘When to use graph side information in matrix completion,’’ in preparation for submission to a journal. In ReviewS. Kim, M. Soheil and C. Suh, ‘‘Role of a relay in bursty multiple access channels,’’ submitted to the IEEE Transactions on Information Theory, Apr. 2016. After Oct. 2018[1 ] J. Ahn, A. Elmahdy, S. Mohajer and C. Suh, ‘‘On the fundamental limits of matrix completion: Leveraging hierarchical similarity graphs,’’ IEEE Transactions on Information Theory, vol. 70, no. 3, Mar. 2024. [2 ] Q. Zhang, G. Suh, C. Suh and V. Y. F. Tan ‘‘MC2G: An efficient algorithm for matrix completion with social and item similarity graphs,’’ IEEE Transactions on Signal Processing, 2022. [3 ] H. Kim, K. Lee, G. Hwang and C. Suh, ‘‘Predicting vehicle collisions using data collected from video games,’’ Journal of Machine Vision and Applications, vol. 32, no. 93, June 2021. [4] S. Kim, S. Mohajer and C. Suh, ‘‘On the sum capacity of dual-class parallel packet-erasure broadcast channels,’’ IEEE Transactions on Communications, vol. 69, no. 4, pp. 2271–2289, Apr. 2021. [5] Q. Zhang, V. Y. F. Tan and C. Suh, ‘‘Community detection and matrix completion with social and item similarity graphs,’’ IEEE Transactions on Signal Processing, vol. 69, no. 2, pp. 917–931, Feb. 2021. [6] S. Shin and C. Suh, “Two-way function computation,” IEEE Transactions on Information Theory, vol. 66, no. 2, pp. 813–834, Feb. 2020. [7] K. Ahn, K. Lee and C. Suh, “Community recovery in hypergraphs,” IEEE Transactions on Information Theory, vol. 65, no. 10, pp. 6561–6579, Oct. 2019. [8] K. Lim, C. Suh and J. K. K. Rhee, “Longer distance continuous variable quantum key distribution protocol with photon subtraction at receiver,” Quantum Information Processing, vol. 18, no. 3, Mar. 2019. [9] K. Ahn, K. Lee and C. Suh, “Hypergraph clustering in the weighted stochastic block model,” IEEE Journal of Selected Topcis in Signal Processing, vol. 12, no. 10, pp. 959–974, Oct. 2018. [10] M. Jang, S. Kim and C. Suh, “Top-K rank aggrgation from M-wise comparisons,” IEEE Journal of Selected Topics in Signal Processing, vol. 12, no. 10, pp. 989–1004, Oct. 2018. Apr. 2016 ~ Sep. 2018[11] S. Kim, I.-H. Wang and C. Suh, ‘‘A relay can increase degrees of freedom in bursty MIMO interference networks,’’ IEEE Transactions on Information Theory, vol. 64, no. 6, pp. 4581–4593, June 2018. [12] C. Suh, J. Cho and D. Tse, ‘‘Two-way interference channel capacity: How to have the cake and eat it too,’’ IEEE Transactions on Information Theory, vol. 64, no. 6, pp. 4259–4281, June 2018. [13] K. Lim, H. Ko, C. Suh and J.K.K. Rhee, ‘‘Security analysis of quantum key distribution on passive optical networks,’’ Optics Express, vol. 25, no. 10, May 2017. [14] C. Suh, V. Y. F. Tan and R. Zhao, ‘‘Adversarial top-K ranking,’’ IEEE Transactions on Information Theory, vol. 63, no. 4, pp. 2201–2225, Apr. 2017. [15] H. Yang, W. Shin, B. Jung, C. Suh and A. Paulraj, ‘‘Oportunistic downlink interference alignment for multi-cell MIMO networks,’’ IEEE Transactions on Wireless Communications, vol. 16, no. 3, pp. 1533–1548, Mar. 2017. [16] Y. Chen, C. Suh and A. Goldsmith, ‘‘Information recovery from pairwise measurements,’’ IEEE Transactions on Information Theory, vol. 62. no. 10, pp. 5881–5905, Oct. 2016. [17] S. Jeon and C. Suh, ‘‘Degrees of freedom of uplink-downlink multi-antenna cellular networks,’’ IEEE Transactions on Information Theory, vol. 62, no. 8, pp. 4589–4603, Aug. 2016. [18] C. Suh, N. Goela and M. Gastpar, ‘‘Computation in multicast networks: Function alignment and converse theorems,’’ IEEE Transactions on Information Theory, vol. 62, no. 4, pp. 1866–1877, Apr. 2016. Aug. 2012 ~ Mar. 2016[19] S. Huang, C. Suh and L. Zheng, ‘‘Euclidean information theory of networks,’’ IEEE Transactions on Information Theory, vol. 61, no. 12, pp. 6795–6814, Dec. 2015. [20] S. H. Chae, C. Suh and S.-Y. Chung, ‘‘Degrees of freedom of the rank-deficient interference channel with feedback,’’, IEEE Transactions on Information Theory, vol. 61, no. 6, pp. 3326–3338, June 2015. [21] K. Lim, H. Ko, K. Kim, C. Suh and J. K. K. Lee, ‘‘The error tolerance bound for secure multi-qubit QKD against incoherent attack,’’ IEEE Journal of Selected Topics in Quantum Electronics, vol. 21, no. 3, pp.1–9, May/June 2015. [22] S. Lashgari, S. Avestimehr and C. Suh, ‘‘Linear degrees of freedom of the X-channel with delayed CSIT,’’ IEEE Transactions on Information Theory, vol. 60, no. 5, pp. 2180–189, Apr. 2014. [23] V. Cadambe, S. Jafar, H. Maleki, K. Ramchandran and C. Suh, ‘‘Aymptotic interference alignment for optimal repair of MDS codes in distributed storage,’’ IEEE Transactions on Information Theory, vol. 59, no. 5, pp. 2974–987, May 2013. Before Aug. 2012[24] A. Vahid, C. Suh and S. Avestimehr, ‘‘Interference channels with rate-limited feedback,’’ IEEE Transactions on Information Theory, vol. 58, no. 5, pp. 2788–2812, May 2012. [25] C. Suh, M. Ho and D. Tse, ‘‘Downlink interference alignment,’’ IEEE Transactions on Communications, vol. 59, no. 9, pp. 2616–2626, Sep. 2011 (won the 2013 IEEE Communications Society Stephen O. Rice Prize). [26] C. Suh and D. Tse, ‘‘Feedback capacity of the Gaussian interference channel to within 2 bits,’’ IEEE Transactions on Information Theory, vol. 57, no. 5, pp. 2667–2685, May 2011 (The conference version won the Best Student Paper Award of the IEEE ISIT 2009). [27] C. Suh and K. Ramchandran, ‘‘Exact-repair MDS code construction using interference alignment,’’ IEEE Transactions on Information Theory, vol. 57, no. 3, pp. 1425–1442, Mar. 2011 (The conference version won a finalist of the Best Student Paper Award of the IEEE ISIT 2010). [28] A. G. Dimakis, Y. Wu, K. Ramchandran and C. Suh, ‘‘A survey on network codes for distributed storage,’’ Proceedings of the IEEE, vol. 99, no. 3, pp. 476–489, Mar. 2011 [29] C. Suh and J. Mo, ‘‘Resource allocation for multicast services in multicarrier wireless communications,’’ IEEE Transactions on Wireless Communication, vol. 7, no. 1, pp. 27–31, Jan. 2008. [30] Y. Kim, J. Lim, C. Suh and Y. Lee, ‘‘Designing training sequences for carrier frequency estimation in frequency-selective channels,’’ IEEE Transactions on Vehicular Technology, vol. 55, no. 1, pp.151–157, Jan. 2006 |