«Deep Learning Assisted Rate Adaptation in Spatial Modulation Links», in 16th International Symposium on Wireless Communication Systems (ISWCS), Oulu (Finland), 2019.
ISWCS_2019_UVigo_August_31_cr.pdf (375.26 KB)
, 
«Link Adaptation Techniques for Future Terrestrial and Satellite Communications», 2019.
Thesis_Anxo_Tato.zip (9.21 MB)
, 
«Software Defined Radio: A Brief Introduction», XoveTIC Congress. MDPI, A Coruña, Spain, 2018.
Artigo_SDR_XoveTIC.pdf (1.09 MB)
, 
«Neural Network Aided Computation of Mutual Information for Adaptation of Spatial Modulation», IEEE Transactions on Communications, 2020.
SpatialModulation2020.pdf (1.28 MB)
, 
«Spatial Modulation Link Adaptation: a Deep Learning Approach», in 2019 53rd Asilomar Conference on Signals, Systems, and Computers, California, 2019.
Asilomar_2019_vf.pdf (314.11 KB)
, 
«Link Adaptation and Carriers Detection Errors in Multibeam Satellite Systems with Linear Precoding», in 9th Advanced Satellite Multimedia Systems Conference (ASMS) and 15th Signal Processing for Space Communications Workshop (SPSC), Berlin, Germany, 2018.
ASMS_2018_ACM_precoding_-_camera_ready.pdf (563.55 KB)
, 
«Power Spectrum Blind Sampling Using Minimum Mean Square Error and Weighted Least Squares», in Asilomar Conference on Signals, Systems and Computers, 2013.
td_wls_mmse.pdf (294.2 KB)
, 
«Power spectrum blind sampling using optimal multicoset sampling patterns in the MSE sense», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2014.
, «Smart Detection of Line-Search Oracle Attacks», IEEE Transactions on Information Forensics and Security, vol. 12, n.º 3, pp. 588-603, 2017.
TIFS_smartOracle.pdf (3.73 MB)
, 
«A new model for Gabor Coefficients' Magnitude in Face Recognition», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Dallas, USA, 2010.
, «Secure Adaptive Filtering», IEEE Transactions on Information Forensics and Security, vol. 6, pp. 469 -485, 2011.
TPPGTIFS11-Secure_Adaptive_Filtering.pdf (396.27 KB)
, 
«Zero-Knowledge watermark detector robust to sensitivity attacks», in ACM Workshop on Multimedia and Security (MMSEC), Geneva, Switzerland, 2006, pp. 97-107.
, «Encrypted Domain Processing for Signal Processing Applications», University of Vigo, Vigo, 2012.
jr_troncoso_thesis.pdf (4.44 MB)
, 
«Secure and Private Medical Clouds using Encrypted Processing», in Virtual Physiological Human (VPH), Brussels, Belgium, 2010.
, «Fully Private Noninteractive Face Verification», IEEE Transactions on Information Forensics and Security, vol. 8, n.º 7, pp. 1101-1114, 2013.
TPFJPGTIFS11-FullyPrivateFaceVerif.pdf (745.76 KB)
, 
«Privacy Preserving Error Resilient DNA Searching through Oblivious Automata», in ACM Conference on Computer and Communications Security (CCS), Alexandria, Virginia, USA, 2007, pp. 519–528.
, «Skewed Log-Stable model for natural images pixel block-variance», in IEEE International Conference on Image Processing (ICIP), Cairo, Egypt, 2009.
, «Bootstrap-based Proxy Reencryption for Private Multi-user Computing», in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014.
TroncosoCaputo-BootstrappingMultiKey.pdf (795.89 KB)
, 
«Secure Genomic Susceptibility Testing based on Lattice Encryption», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), New Orleans, USA, 2017.
TPP17_ICASSP17.pdf (403.53 KB)
, 
«CryptoDSPs for Cloud Privacy», in International Workshop on Cloud Information System Engineering (CISE), Hong Kong, China, 2010, vol. 6724.
, «Efficient Zero-Knowledge Watermark Detection with Improved Robustness to Sensitivity Attacks», EURASIP Journal on Information Security, 2007.
, «Videosurveillance and privacy: covering the two sides of the mirror with DRM», in ACM Workshop on Digital Rights Management (DRM), Chicago, IL, USA, 2009.
drm18-troncoso.pdf (417.17 KB)
, 
«Secure Signal Processing in the Cloud: enabling technologies for privacy-preserving multimedia cloud processing», IEEE Signal Processing Magazine, vol. 30, n.º 2, pp. 29-41, 2013.
cloudspm2013.pdf (965.61 KB)
, 
«A Secure Multidimensional Point Inclusion Protocol», in ACM Workshop on Multimedia and Security (MMSEC), Dallas, Texas, USA, 2007, pp. 109–120.
, «Secure Direct and Iterative Protocols for Solving Systems of Linear Equations», in Signal Processing in the Encrypted Domain (SPEED) Workshop, Lausanne, Switzerland, 2009, pp. 122–141.
secure_sle_speedws09.pdf (193.97 KB)
, 