Exportar 28 resultados:
Autor Título [ Tipo(Desc)] Año
Filtros: First Letter Of Last Name es F  [Elimina todos los filtros]
Conference Paper
L. Pérez-Freire, Pérez-González, F., y Furon, T., «On achievable security levels for lattice data hiding in the Known Message Attack scenario», in ACM Workshop on Multimedia and Security (MMSEC), Geneva, Switzerland, 2006, pp. 68-79.
M. Richharia, Kaluvala, N., Fines, P., Álvarez-Díaz, M., y Jahn, A., «Aeronautical Channel Model for Broadband L-Band Satellite Communication», in AIAA International Communications Satellite Systems Conference (ICSSC), Rome, Italy, 2005.
L. Pérez-Freire y Furon, T., «Blind decoder for binary probabilistic traitor tracing codes», in IEEE International Workshop on Information Forensics and Security (WIFS), London, UK, 2009, pp. 56-60.
F. Gomez-Cuba, Feijoo-Rodríguez, G., y González-Prelcic, N., «Clock and Orientation-Robust Simultaneous Radio Localization and Mapping at Millimeter Wave Bands», in 2023 IEEE Wireless Communications and Networking Conference (WCNC), 2023, pp. 1-7.Icono PDF mplocwcnc.pdf (684.15 KB)
D. Vázquez-Padín, Fontani, M., Bianchi, T., Comesaña, P., Piva, A., y Barni, M., «Detection of video double encoding with GOP size estimation», in IEEE International Workshop on Information Forensics and Security (WIFS), Tenerife, Spain, 2012, pp. 151-156.Icono PDF wifs2012_dvazquez_mfontani_tbianchi_pcomesan_apiva_mbarni.pdf (839.39 KB)
T. Furon y Pérez-Freire, L., «EM decoding of Tardos traitor tracing codes», in ACM Workshop on Multimedia and Security (MMSEC), Princeton, NJ, USA, 2009.
D. A. Rodríguez-Silva, González-Castaño, J. F., Adkinson-Orellana, L., Fernández-Cordeiro, A., Troncoso-Pastoriza, J. R., y González-Martínez, D., «Encrypted Domain Processing for Cloud Privacy: Concept and Practical Experience», in International Conference on Cloud Computing and Services Science (CLOSER), Noordwijkerhout, The Netherlands, 2011.
T. Furon, Pérez-Freire, L., Guyader, A., y Cérou, F., «Estimating the minimal length of Tardos code», in International Workshop on Information Hiding (IH), Darmstadt, Germany, 2009.
A. Vázquez-Saavedra, Jiménez-Balsa, G., Loureiro-Acuña, J., Fernández-Veiga, M., y Pedrouzo-Ulloa, A., «Homomorphic SVM Inference for Fraud Detection», in VI Jornadas Nacionales de Investigación en Ciberseguridad (JNIC), 2021.Icono PDF VJLFP21-JNIC21.pdf (297.13 KB)
D. Fondo, Cacheda, M., y Mosquera, C., «Indoor Image Acquisition and Distribution System», in International Symposium on Power Line Communications and Its Applications (ISPLC), 2003.
D. Labartino, Bianchi, T., De Rosa, A., Fontani, M., Vázquez-Padín, D., Piva, A., y Barni, M., «Localization of Forgeries in MPEG-2 Video through GOP Size and DQ analysis», in IEEE International Workshop on Multimedia Signal Processing (MMSP), Pula (Sardinia), Italy, 2013, pp. 494-499.Icono PDF mmsp13_dlabartino_tbianchi_aderosa_mfontani_dvazquez_apiva_mbarni.pdf (901.49 KB)
M. Ferreiro, Cacheda, M., y Mosquera, C., «A low complexity all-digital DS-SS transceiver for power-line communications», in International Symposium on Power Line Communications and Its Applications (ISPLC), 2003.
F. Pérez-González y Fernández-Menduiña, S., «PRNU-leaks: facts and remedies», in 2020 28th European Signal Processing Conference (EUSIPCO), Virtual Event Amsterdam, 2020.
F. Pérez-González y Fernández-Menduiña, S., «PRNU-leaks: facts and remedies», in 2020 28th European Signal Processing Conference (EUSIPCO), 2021, pp. 720-724.
R. López-Valcarce, Dasgupta, S., Fu, M., y Tempo, R., «Stability conditions for the time-varying linear predictor», in IEEE Conference on Decision and Control (CDC), Tampa, FL, USA, 1998, pp. 1840–1845.
G. Boato, Fontanari, C., Natale, D. F. G. B., y Pérez-González, F., «Statistical Analysis of a Linear Algebra Asymmetric Watermarking Scheme», in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264.
T. Furon y Pérez-Freire, L., «Worst case attacks against binary probabilistic traitor tracing codes», in IEEE International Workshop on Information Forensics and Security (WIFS), London, UK, 2009, pp. 46-50.