«Revealing the true achievable rates of Scalar Costa Scheme», in IEEE International Workshop on Multimedia Signal Processing, Siena, Italy, 2004, pp. 203-206.
, «On reversibility of random binning techniques: multimedia perspectives», in Conference on Communications and Multimedia Security (CMS), Salzburg, Austria, 2005. cms05.pdf (267.92 KB)
, «A Review of "Camera Attribution Forensic Analyzer in the Encrypted Domain"», in VI Jornadas Nacionales de Investigación en Ciberseguridad (JNIC), 2021. PMTP21-JNIC21.pdf (259.84 KB)
, «Revisiting Multivariate Lattices for Encrypted Signal Processing», in ACM Information Hiding and Multimedia Security Workshop (IH&MMSec), Paris, France, 2019. PTP19_IHMMSec19.pdf (1.67 MB)
, «Revisiting multivariate ring learning with errors and its applications on lattice-based cryptography», Mathematics, vol. 9, n.º 8, 2021. PTGGP21.pdf (1.04 MB)
, «Road vehicle speed estimation from a two-microphone array», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Orlando, FL, USA, 2002, vol. 2, pp. 1321–1324.
, «Robust Adaptive Coding and Modulation Scheme for the Mobile Satellite Forward Link», in IEEE International Workshop on Signal Processing Advances in Wireless Communications, SPAWC, 2015. SPAWCfinalversion.pdf (499.99 KB)
, «Robust analog precoding designs for millimeter wave MIMO transceivers», in 20th International ITG Workshop on Smart Antennas (WSA), 2016.
, «Robust analog precoding designs for millimeter wave MIMO transceivers with frequency and time division duplexing», IEEE Trans. Communications, vol. 64, n.º 11, pp. 4622 - 4634, 2016.
, «Robust clustering of data collected via crowdsourcing», in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), New Orleans, 2017, pp. 4014 - 4018. 20160908114915_548170_1427.pdf (385.63 KB)
, «The robust SPR problem: design algorithms and new applications», Signal Processing, vol. 76, pp. 269-283, 1999.
, «Robustness analysis of beamforming based designs for mmWave Full-Duplex Amplify-and-Forward relays», in 2020 14th International Conference on Signal Processing and Communication Systems (ICSPCS), 2020. robust_relay.pdf (830.24 KB)
, «Robustness Improvement of Known-Host-State Watermarking Using Host Statistics», Signal Processing, vol. 86, pp. 1076-1088, 2006.
, «Robustness Improvement of Known-Host-State Watermarking Using Host Statistics», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, «On the Role of Differentiation for Resampling Detection», in IEEE International Conference on Image Processing (ICIP), Hong Kong, China, 2010.
, «The role of second-order statistics in blind equalization of nonlinear channels», in IEEE Workshop on Statistical Signal Processing (SSP), Pocono Manor, PA, USA, 2000, pp. 211–215.
, «Satellite Communications: Research Trends and Open Issues», in International Workshop on Satellite and Space Communications (IWSSC), 2007.
, «Scaling laws for infrastructure single and multihop wireless networks in wideband regimes», in IEEE International Symposium on Information Theory (ISIT), Honolulu, 2014, pp. 76–80.
, «Second order statistical properties of nonlinearly distorted PSK signals», IEEE Communications Letters, vol. 7, pp. 323–325, 2003. VALCARCE_CL2002-915.pdf (60.04 KB)
, «Second order statistics based blind channel equalization with correlated sources», in IEEE International Symposium on Circuits and Systems (ISCAS), Sydney, Australia, 2001, vol. 4, pp. 366–369.
, «Second-order blind algorithms for adaptive recursive linear equalizers: Analysis and lattice implementation», International Journal of Adaptive Control and Signal Processing, vol. 20, pp. 265–289, 2006.
, «Secret dither estimation in lattice-quantization data hiding: a set-membership approach», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601. spie06_sme.pdf (223.01 KB)
, «Secure Adaptive Filtering», IEEE Transactions on Information Forensics and Security, vol. 6, pp. 469 -485, 2011. TPPGTIFS11-Secure_Adaptive_Filtering.pdf (396.27 KB)
, «Secure and Private Medical Clouds using Encrypted Processing», in Virtual Physiological Human (VPH), Brussels, Belgium, 2010.
, «Secure Collaborative Camera Attribution», in European Interdisciplinary Cybersecurity Conference (EICC), Barcelona, Spain, 2022, pp. 97-98.
,