Exportar 78 resultados:
Autor Título Tipo [ Año] Filtros: First Letter Of Last Name es B [Elimina todos los filtros]
«Information Forensics and Security: A quarter-century-long journey», IEEE Signal Processing Magazine, vol. 40, pp. 67-79, 2023.
, «Overview of Use Cases in Single Channel Full Duplex Techniques for Satellite Communication», in 40th International Communications Satellite Systems Conference (ICSSC), 2023.
, «Practical Multi-Key Homomorphic Encryption for More Flexible and Efficient Secure Federated Average Aggregation», in IEEE International Conference on Cyber Security and Resilience (CSR), Venice, Italy, 2023, pp. 612-617.
, «Efficient protocols for oblivious linear function evaluation from ring-LWE», Journal of Computer Security, vol. 30, n.º 1, p. 40, 2022.
, «Gpu-Accelerated Sift-Aided Source Identification of Stabilized Videos», in 2022 IEEE International Conference on Image Processing (ICIP), 2022, pp. 2616-2620. Gpu-Accelerated.pdf (5.05 MB)
, «DNN Watermarking: Four Challenges and a Funeral», in 2021 ACM Workshop on Information Hiding and Multimedia Security, IH&MMSEC'21, Virtual Event Belgium, 2021, pp. 189-196. ihmm13-barniA.pdf (515.94 KB)
, «Full-stack Hybrid Beamforming in mmWave 5G Networks», in 2021 19th Mediterranean Communication and Computer Networking Conference (MedComNet), 2021, pp. 1–7.
, «Efficient Protocols for Oblivious Linear Function Evaluation from Ring-LWE», in International Conference on Security and Cryptography for Networks (SCN), 2020. BEPST20-SCN20.pdf (457.81 KB)
, «Energy-efficient analog beamforming with short packets in millimeter-wave MIMO systems», in 2020 54th Asilomar Conference on Signals, Systems, and Computers, California, 2020, Virtual event, 2020. Asilomar2020.pdf (353.1 KB)
, «Study on the Application of NOMA Techniques for Heterogeneous Satellite Terminals», in 10th Advanced Satellite Multimedia Systems Conference (ASMS) and 16th Signal Processing for Space Communications Workshop (SPSC), 2020. Study_on_the_Application_of_NOMA_Techniques_for_Heterogeneous_Satellite_Terminals.pdf (2.21 MB)
, «Study on the Application of NOMA Techniques for Heterogeneous Satellite Terminals», in 10th Advanced Satellite Multimedia Systems Conference (ASMS) and 16th Signal Processing for Space Communications Workshop (SPSC), 2020. Study_on_the_Application_of_NOMA_Techniques_for_Heterogeneous_Satellite_Terminals.pdf (2.21 MB)
, «Video Integrity Verification and GOP Size Estimation via Generalized Variation of Prediction Footprint», IEEE Transactions on Information Forensics and Security, vol. 15, n.º 1, pp. 1815-1830, 2020. TIFS19_GVPF.pdf (1.01 MB)
, «Improving PRNU Compression Through Preprocessing, Quantization, and Coding», IEEE Transactions on Information Forensics and Security, vol. 14, n.º 3, p. 13, 2019. 2018_prnu_resize_deadzone.pdf (3.81 MB)
, «Improving PRNU Compression Through Preprocessing, Quantization, and Coding», IEEE Transactions on Information Forensics and Security, vol. 14, n.º 3, p. 13, 2019. 2018_prnu_resize_deadzone.pdf (3.81 MB)
, «Design of projection matrices for PRNU compression», in 2017 IEEE Workshop on Information Forensics and Security (WIFS), 2017, pp. 1-6. 2017_prnu_projection.pdf (689.14 KB)
, «Design of projection matrices for PRNU compression», in 2017 IEEE Workshop on Information Forensics and Security (WIFS), 2017, pp. 1-6. 2017_prnu_projection.pdf (689.14 KB)
, «Smart Detection of Line-Search Oracle Attacks», IEEE Transactions on Information Forensics and Security, vol. 12, n.º 3, pp. 588-603, 2017. TIFS_smartOracle.pdf (3.73 MB)
, «Statistical detection of JPEG traces in digital images in uncompressed formats», IEEE Transactions on Information Forensics and Security, vol. 12, n.º Pending, 2017. TIFSbenford.pdf (5.94 MB)
, «Data Hiding Robust to Mobile Communication Vocoders», IEEE Transactions on Multimedia, vol. 18, n.º 12, pp. 2345-2357, 2016. TMM2599149.pdf (3.04 MB)
, «Forensics of high quality and nearly identical JPEG image recompression», in ACM Workshop on Information Hiding and Multimedia Security, 2016. HQ_multipleJPEG.pdf (1.33 MB)
, «Forensics of high quality and nearly identical JPEG image recompression», in ACM Workshop on Information Hiding and Multimedia Security, 2016. HQ_multipleJPEG.pdf (1.33 MB)
, «Security in automotive radar and vehicular networks», Microwave Journal, 2016.
, «On the analysis of scheduling in dynamic duplex multi-hop mmWave cellular systems», IEEE Transactions on Wireless Communications, vol. 14, pp. 6028 – 6042, 2015. mmWaveScheduling.pdf (801.38 KB)
, «A Microeconomic Approach to Data Trading in User Provided Networks», in IEEE Globecom Workshops, 2015, pp. 1–7.
, «Are you threatening me? Towards smart detectors in watermarking», in Media Watermarking, Security, and Forensics, San Francisco, CA, USA, 2014. spie14_2.0.pdf (430.73 KB)
,