«A study on the Application of Different Two-objective Evolutionary Algorithms to the Node Localization Problem in Wireless Sensor Networks», in IEEE International Conference on Intelligent Systems Design and Applications (ISDA), 2011.
isda2011_1.pdf (212.19 KB)
, 
«A two-objective evolutionary approach based on topological constraints for node localization in wireless sensor networks», Applied Soft Computing, vol. 12, n.º 7, pp. 1891-1901, 2011.
asoc-d-10-00754r1.pdf (597.83 KB)
, 
«An Effective Metaheuristic Approach to Node Localization in Wireless Sensor Networks», in IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), 2011.
mass_final.pdf (279.61 KB)
, 
«Improving Area Coverage of Wireless Sensor Networks Via Controllable Mobile Nodes: a Greedy Approach», Journal of Network and Computer Applications, vol. 48, pp. 1-13, 2015.
JNCA_accepted.pdf (4.31 MB)
, 
«Solving the Node Localization Problem in WSNs by a Two-objective Evolutionary Algorithm and Gradient Descent», in the 3-th IEEE World Congress on Nature and Biologically Inspired Computing (NaBIC 2011), 2011.
nabic2011.pdf (227.26 KB)
, 
«A Greedy Topology Design to Accelerate Consensus in Broadcast Wireless Sensor Networks», Information Processing Letters, vol. 115, n.º 3, pp. 408-413, 2015.
IPL_ack.pdf (380.47 KB)
, 
«Time-domain channel estimation for wideband millimeter wave systems with hybrid architecture», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2017, pp. 6193-6197.
, «Co-creating Security-and-Privacy-by-Design Systems», in International Conference on Availability, Reliability and Security (ARES), Salzburg, Germany, 2016, pp. 768-775.
, «Worst case additive attack against quantization-based data-hiding methods», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, «Quantization-Based Methods: Additive Attacks Performance Analysis», Transactions on Data Hiding and Multimedia Security III, vol. 4920, pp. 70-90, 2008.
, «Worst case additive attack against quantization-based watermarking techniques», in IEEE International Workshop on Multimedia Signal Processing, Siena, Italy, 2004, pp. 135-138.
, «On reversibility of random binning techniques: multimedia perspectives», in Conference on Communications and Multimedia Security (CMS), Salzburg, Austria, 2005.
cms05.pdf (267.92 KB)
, 
«Robust analog precoding designs for millimeter wave MIMO transceivers with frequency and time division duplexing», IEEE Trans. Communications, vol. 64, n.º 11, pp. 4622 - 4634, 2016.
, «Robust analog precoding designs for millimeter wave MIMO transceivers», in 20th International ITG Workshop on Smart Antennas (WSA), 2016.
, «Security in automotive radar and vehicular networks», Microwave Journal, 2016.
,