«Partial-Duplex Amplify-and-Forward Relaying: Spectral Efficiency Analysis under Self-Interference», IEEE Transactions on Wireless Communications, vol. 18, n.º 4, pp. 2271-2285, 2019. TWC2902390.pdf (668.18 KB)
, «Performance Analysis of a 2D-Multipulse Amplitude Modulation Scheme for Data Hiding and Watermarking of Still Images», IEEE Journal on Selected Areas in Communications, vol. 16, pp. 510–524, 1998.
, «Performance Analysis of Existing and New Methods for Data Hiding with Known-Host Information in Additive Channels», IEEE Transactions on Signal Processing, vol. 51, pp. 960-980, 2003.
, «Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method», IEEE Transactions on Information Forensics and Security, vol. 4, pp. 570-577, 2009. tifs09performanceanalysis.pdf (232.67 KB)
, «Performance of the Multibeam Satellite Return Link with Correlated Rain Attenuation», IEEE Transactions on Wireless Communications, pp. 1-1, 2014. multibeam_channel_rain_attenuation_arnau_christopoulos_et_al.pdf (4.89 MB)
, «Performance study of multiuser interference mitigation schemes for hybrid broadband multibeam satellite architectures», EURASIP Journal on Wireless Communications and Networking, vol. 2012, p. 132, 2012.
, «Primary User Enters the Game: Performance of Dynamic Spectrum Leasing in Cognitive Radio Networks», IEEE Transactions on Wireless Communications, 2010.
, «Privacy-Preserving Data Aggregation in Smart Metering Systems: An Overview», IEEE Signal Processing Magazine, vol. 30, n.º 2, pp. 75-86, 2013. smartmeteringspm2013.pdf (547.21 KB)
, «Properties of real and complex ETFs and their application to the design of low coherence frames», Linear Algebra and its Applications, vol. 508, pp. 81-90, 2016.
, «Quantization-Based Data-Hiding Robust to Linear Time-Invariant Filtering», IEEE Transactions on Information Forensics and Security, vol. 3, pp. 137-152, 2008.
, «Quantization-Based Methods: Additive Attacks Performance Analysis», Transactions on Data Hiding and Multimedia Security III, vol. 4920, pp. 70-90, 2008.
, «A Random Matrix Approach to the Forensic Analysis of Upscaled Images», IEEE Transactions on Information Forensics and Security, vol. 12, n.º 9, pp. 2115-2130, 2017. TIFS17_resampling.pdf (1.04 MB)
, «Rational Dither Modulation: a high-rate data-hiding method robust to gain attacks», IEEE Transactions on Signal Processing, vol. 53, pp. 3960-3975, 2005.
, «Realizable linear and decision feedback equalizers: properties and connections», IEEE Transactions on Signal Processing, vol. 52, pp. 757–773, 2004.
, «Realizable minimum mean-squared error channel shorteners», IEEE Transactions on Signal Processing, vol. 53, pp. 4354–4362, 2005. T_SP_02192_2004.pdf (149.65 KB)
, «Revisiting multivariate ring learning with errors and its applications on lattice-based cryptography», Mathematics, vol. 9, n.º 8, 2021. PTGGP21.pdf (1.04 MB)
, «Robust analog precoding designs for millimeter wave MIMO transceivers with frequency and time division duplexing», IEEE Trans. Communications, vol. 64, n.º 11, pp. 4622 - 4634, 2016.
, «The robust SPR problem: design algorithms and new applications», Signal Processing, vol. 76, pp. 269-283, 1999.
, «Robustness Improvement of Known-Host-State Watermarking Using Host Statistics», Signal Processing, vol. 86, pp. 1076-1088, 2006.
, «Second order statistical properties of nonlinearly distorted PSK signals», IEEE Communications Letters, vol. 7, pp. 323–325, 2003. VALCARCE_CL2002-915.pdf (60.04 KB)
, «Second-order blind algorithms for adaptive recursive linear equalizers: Analysis and lattice implementation», International Journal of Adaptive Control and Signal Processing, vol. 20, pp. 265–289, 2006.
, «Secure Adaptive Filtering», IEEE Transactions on Information Forensics and Security, vol. 6, pp. 469 -485, 2011. TPPGTIFS11-Secure_Adaptive_Filtering.pdf (396.27 KB)
, «Secure Signal Processing in the Cloud: enabling technologies for privacy-preserving multimedia cloud processing», IEEE Signal Processing Magazine, vol. 30, n.º 2, pp. 29-41, 2013. cloudspm2013.pdf (965.61 KB)
, «Security in automotive radar and vehicular networks», Microwave Journal, 2016.
, «Security of lattice-based data hiding against the Known Message Attack», IEEE Transactions on Information Forensics and Security, vol. 1, pp. 421-439, 2006. tifs06security.pdf (563.51 KB)
,