«Security in automotive radar and vehicular networks», Microwave Journal, 2016.
, «Robust analog precoding designs for millimeter wave MIMO transceivers with frequency and time division duplexing», IEEE Trans. Communications, vol. 64, n.º 11, pp. 4622 - 4634, 2016.
, «Robust analog precoding designs for millimeter wave MIMO transceivers», in 20th International ITG Workshop on Smart Antennas (WSA), 2016.
, «On reversibility of random binning techniques: multimedia perspectives», in Conference on Communications and Multimedia Security (CMS), Salzburg, Austria, 2005. cms05.pdf (267.92 KB)
, «Worst case additive attack against quantization-based data-hiding methods», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, «Quantization-Based Methods: Additive Attacks Performance Analysis», Transactions on Data Hiding and Multimedia Security III, vol. 4920, pp. 70-90, 2008.
, «Worst case additive attack against quantization-based watermarking techniques», in IEEE International Workshop on Multimedia Signal Processing, Siena, Italy, 2004, pp. 135-138.
, «Co-creating Security-and-Privacy-by-Design Systems», in International Conference on Availability, Reliability and Security (ARES), Salzburg, Germany, 2016, pp. 768-775.
, «Time-domain channel estimation for wideband millimeter wave systems with hybrid architecture», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2017, pp. 6193-6197.
, «A study on the Application of Different Two-objective Evolutionary Algorithms to the Node Localization Problem in Wireless Sensor Networks», in IEEE International Conference on Intelligent Systems Design and Applications (ISDA), 2011. isda2011_1.pdf (212.19 KB)
, «A two-objective evolutionary approach based on topological constraints for node localization in wireless sensor networks», Applied Soft Computing, vol. 12, n.º 7, pp. 1891-1901, 2011. asoc-d-10-00754r1.pdf (597.83 KB)
, «An Effective Metaheuristic Approach to Node Localization in Wireless Sensor Networks», in IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), 2011. mass_final.pdf (279.61 KB)
, «Improving Area Coverage of Wireless Sensor Networks Via Controllable Mobile Nodes: a Greedy Approach», Journal of Network and Computer Applications, vol. 48, pp. 1-13, 2015. JNCA_accepted.pdf (4.31 MB)
, «Solving the Node Localization Problem in WSNs by a Two-objective Evolutionary Algorithm and Gradient Descent», in the 3-th IEEE World Congress on Nature and Biologically Inspired Computing (NaBIC 2011), 2011. nabic2011.pdf (227.26 KB)
, «A Greedy Topology Design to Accelerate Consensus in Broadcast Wireless Sensor Networks», Information Processing Letters, vol. 115, n.º 3, pp. 408-413, 2015. IPL_ack.pdf (380.47 KB)
, «Wideband Spectral Estimation from Compressed Measurements Exploiting Spectral a priori Information in Cognitive Radio Systems», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Dallas, U.S.A., 2010.
, «Detection diversity of multiantenna spectrum sensors», in IEEE Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP 2011), Prague, Czech Republic, 2011, pp. 2936-2939. vazquezvalcarcepandharipandeicassp11.pdf (156.47 KB)
, «Primary User Enters the Game: Performance of Dynamic Spectrum Leasing in Cognitive Radio Networks», IEEE Transactions on Wireless Communications, 2010.
, «Spectrum Sensing Exploiting Guard Bands and Weak Channels», IEEE Trans. on Signal Processing, vol. 59, n.º 12, pp. 6045-6057, 2011. double_submitted.pdf (373.72 KB)
, «Interference and Network Management in Cognitive Communication Systems», University of Vigo, Vigo, Spain, 2011. PHD_GonzaloVazquezVilar.pdf (2.05 MB)
, «Multiantenna Spectrum Sensing Exploiting Spectral a priori Information», IEEE Trans. on Wireless Communications, vol. 10, n.º 12, pp. 4345 - 4355, 2011. mantennadetection.pdf (464.95 KB)
, «Homomorphic SVM Inference for Fraud Detection», in VI Jornadas Nacionales de Investigación en Ciberseguridad (JNIC), 2021. VJLFP21-JNIC21.pdf (297.13 KB)
, «Video Integrity Verification and GOP Size Estimation via Generalized Variation of Prediction Footprint», IEEE Transactions on Information Forensics and Security, vol. 15, n.º 1, pp. 1815-1830, 2020. TIFS19_GVPF.pdf (1.01 MB)
, «Exposing original and duplicated regions using SIFT features and resampling traces», in International Workshop on Digital Watermarking (IWDW), Atlantic City, USA, 2011, pp. 306-320. iwdw2011_dvazquez_fperez.pdf (943.16 KB)
, «Prefilter Design for Forensic Resampling Estimation», in IEEE International Workshop on Information Forensics and Security (WIFS), Foz do Iguaçu, Brazil, 2011, pp. 1-6. wifs2011_dvazquez_fperez.pdf (301.04 KB)
,