Exportar 74 resultados:
Autor Título Tipo [ Año
Filtros: First Letter Of Last Name es B [Elimina todos los filtros]
«Efficient protocols for oblivious linear function evaluation from ring-LWE», Journal of Computer Security, vol. 30, n.º 1, p. 40, 2022.
, «DNN Watermarking: Four Challenges and a Funeral», in 2021 ACM Workshop on Information Hiding and Multimedia Security, IH&MMSEC'21, Virtual Event Belgium, 2021, pp. 189-196.
ihmm13-barniA.pdf (515.94 KB)
, 
«Full-stack Hybrid Beamforming in mmWave 5G Networks», in 2021 19th Mediterranean Communication and Computer Networking Conference (MedComNet), 2021, pp. 1–7.
, «Efficient Protocols for Oblivious Linear Function Evaluation from Ring-LWE», in International Conference on Security and Cryptography for Networks (SCN), 2020.
BEPST20-SCN20.pdf (457.81 KB)
, 
«Energy-efficient analog beamforming with short packets in millimeter-wave MIMO systems», in 2020 54th Asilomar Conference on Signals, Systems, and Computers, California, 2020, Virtual event, 2020.
Asilomar2020.pdf (353.1 KB)
, 
«Study on the Application of NOMA Techniques for Heterogeneous Satellite Terminals», in 10th Advanced Satellite Multimedia Systems Conference (ASMS) and 16th Signal Processing for Space Communications Workshop (SPSC), 2020.
Study_on_the_Application_of_NOMA_Techniques_for_Heterogeneous_Satellite_Terminals.pdf (2.21 MB)
, 
«Study on the Application of NOMA Techniques for Heterogeneous Satellite Terminals», in 10th Advanced Satellite Multimedia Systems Conference (ASMS) and 16th Signal Processing for Space Communications Workshop (SPSC), 2020.
Study_on_the_Application_of_NOMA_Techniques_for_Heterogeneous_Satellite_Terminals.pdf (2.21 MB)
, 
«Video Integrity Verification and GOP Size Estimation via Generalized Variation of Prediction Footprint», IEEE Transactions on Information Forensics and Security, vol. 15, n.º 1, pp. 1815-1830, 2020.
TIFS19_GVPF.pdf (1.01 MB)
, 
«Improving PRNU Compression Through Preprocessing, Quantization, and Coding», IEEE Transactions on Information Forensics and Security, vol. 14, n.º 3, p. 13, 2019.
2018_prnu_resize_deadzone.pdf (3.81 MB)
, 
«Improving PRNU Compression Through Preprocessing, Quantization, and Coding», IEEE Transactions on Information Forensics and Security, vol. 14, n.º 3, p. 13, 2019.
2018_prnu_resize_deadzone.pdf (3.81 MB)
, 
«Design of projection matrices for PRNU compression», in 2017 IEEE Workshop on Information Forensics and Security (WIFS), 2017, pp. 1-6.
2017_prnu_projection.pdf (689.14 KB)
, 
«Design of projection matrices for PRNU compression», in 2017 IEEE Workshop on Information Forensics and Security (WIFS), 2017, pp. 1-6.
2017_prnu_projection.pdf (689.14 KB)
, 
«Smart Detection of Line-Search Oracle Attacks», IEEE Transactions on Information Forensics and Security, vol. 12, n.º 3, pp. 588-603, 2017.
TIFS_smartOracle.pdf (3.73 MB)
, 
«Statistical detection of JPEG traces in digital images in uncompressed formats», IEEE Transactions on Information Forensics and Security, vol. 12, n.º Pending, 2017.
TIFSbenford.pdf (5.94 MB)
, 
«Data Hiding Robust to Mobile Communication Vocoders», IEEE Transactions on Multimedia, vol. 18, n.º 12, pp. 2345-2357, 2016.
TMM2599149.pdf (3.04 MB)
, 
«Forensics of high quality and nearly identical JPEG image recompression», in ACM Workshop on Information Hiding and Multimedia Security, 2016.
HQ_multipleJPEG.pdf (1.33 MB)
, 
«Forensics of high quality and nearly identical JPEG image recompression», in ACM Workshop on Information Hiding and Multimedia Security, 2016.
HQ_multipleJPEG.pdf (1.33 MB)
, 
«Security in automotive radar and vehicular networks», Microwave Journal, 2016.
, «On the analysis of scheduling in dynamic duplex multi-hop mmWave cellular systems», IEEE Transactions on Wireless Communications, vol. 14, pp. 6028 – 6042, 2015.
mmWaveScheduling.pdf (801.38 KB)
, 
«A Microeconomic Approach to Data Trading in User Provided Networks», in IEEE Globecom Workshops, 2015, pp. 1–7.
, «Are you threatening me? Towards smart detectors in watermarking», in Media Watermarking, Security, and Forensics, San Francisco, CA, USA, 2014.
spie14_2.0.pdf (430.73 KB)
, 
«A Benford-Fourier JPEG compression detector», in IEEE International Conference on Image Processing (ICIP), Paris, France, 2014.
benford_icip_rice_new.pdf (235.58 KB)
, 
«Multiple JPEG compression detection by means of Benford-Fourier coefficients», in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014.
, «Coping with the enemy: Advances in adversary-aware signal processing», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Vancouver, Canada, 2013, pp. 8682–8686.
, «Lattice implementation of adaptive channel shortening in multicarrier transmission over IIR channels», EURASIP Journal on Advances in Signal Processing, vol. 2013:174, 2013.
,