Exportar 28 resultados:
Autor Título [ Tipo] Año Filtros: First Letter Of Last Name es F [Elimina todos los filtros]
«Analysis and Synthesis Tools for Robust SPRness», in Intelligent methods in signal processing and communications, Birkhauser, 1997, pp. 147-171.
, «Digital Satellite Communications», New York: Springer, 2007, p. -.
, «On achievable security levels for lattice data hiding in the Known Message Attack scenario», in ACM Workshop on Multimedia and Security (MMSEC), Geneva, Switzerland, 2006, pp. 68-79.
, «Aeronautical Channel Model for Broadband L-Band Satellite Communication», in AIAA International Communications Satellite Systems Conference (ICSSC), Rome, Italy, 2005.
, «Blind decoder for binary probabilistic traitor tracing codes», in IEEE International Workshop on Information Forensics and Security (WIFS), London, UK, 2009, pp. 56-60.
, «Clock and Orientation-Robust Simultaneous Radio Localization and Mapping at Millimeter Wave Bands», in 2023 IEEE Wireless Communications and Networking Conference (WCNC), 2023, pp. 1-7. mplocwcnc.pdf (684.15 KB)
, «Detection of video double encoding with GOP size estimation», in IEEE International Workshop on Information Forensics and Security (WIFS), Tenerife, Spain, 2012, pp. 151-156. wifs2012_dvazquez_mfontani_tbianchi_pcomesan_apiva_mbarni.pdf (839.39 KB)
, «EM decoding of Tardos traitor tracing codes», in ACM Workshop on Multimedia and Security (MMSEC), Princeton, NJ, USA, 2009.
, «Encrypted Domain Processing for Cloud Privacy: Concept and Practical Experience», in International Conference on Cloud Computing and Services Science (CLOSER), Noordwijkerhout, The Netherlands, 2011.
, «Estimating the minimal length of Tardos code», in International Workshop on Information Hiding (IH), Darmstadt, Germany, 2009.
, «Homomorphic SVM Inference for Fraud Detection», in VI Jornadas Nacionales de Investigación en Ciberseguridad (JNIC), 2021. VJLFP21-JNIC21.pdf (297.13 KB)
, «Indoor Image Acquisition and Distribution System», in International Symposium on Power Line Communications and Its Applications (ISPLC), 2003.
, «Localization of Forgeries in MPEG-2 Video through GOP Size and DQ analysis», in IEEE International Workshop on Multimedia Signal Processing (MMSP), Pula (Sardinia), Italy, 2013, pp. 494-499. mmsp13_dlabartino_tbianchi_aderosa_mfontani_dvazquez_apiva_mbarni.pdf (901.49 KB)
, «A low complexity all-digital DS-SS transceiver for power-line communications», in International Symposium on Power Line Communications and Its Applications (ISPLC), 2003.
, «PRNU-leaks: facts and remedies», in 2020 28th European Signal Processing Conference (EUSIPCO), Virtual Event Amsterdam, 2020.
, «PRNU-leaks: facts and remedies», in 2020 28th European Signal Processing Conference (EUSIPCO), 2021, pp. 720-724.
, «Stability conditions for the time-varying linear predictor», in IEEE Conference on Decision and Control (CDC), Tampa, FL, USA, 1998, pp. 1840–1845.
, «Statistical Analysis of a Linear Algebra Asymmetric Watermarking Scheme», in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264.
, «Worst case attacks against binary probabilistic traitor tracing codes», in IEEE International Workshop on Information Forensics and Security (WIFS), London, UK, 2009, pp. 46-50.
, «Solving self-interference issues in a Full-Duplex radio transceiver», 2nd XoveTIC Conference. A Coruña (Spain), 2019. xovetic19_fullduplex.pdf (577.96 KB)
, «A comparison of system architectures for intelligent document understanding», Signal Processing: Image Communication, vol. 9, pp. 1-19, 1996.
, «Exponential asymptotic stability of time-varying inverse prediction error filters», IEEE Transactions on Signal Processing, vol. 48, pp. 1928–1936, 2000.
, «Information Forensics and Security: A quarter-century-long journey», IEEE Signal Processing Magazine, vol. 40, pp. 67-79, 2023.
, «On the information leakage quantification of camera fingerprint estimates», Eurasip Journal on Information Security, vol. 2021, n.º 6, p. 18, 2021. bmc_article.pdf (4.19 MB)
, «Security of lattice-based data hiding against the Known Message Attack», IEEE Transactions on Information Forensics and Security, vol. 1, pp. 421-439, 2006. tifs06security.pdf (563.51 KB)
,