“Time-domain channel estimation for wideband millimeter wave systems with hybrid architecture”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2017, pp. 6193-6197.
, “Time-transfer performance in burst-mode communication systems”, in International Workshop on Digital Signal Processing Techniques for Space Communications (DSP), 2001.
, “Time-transfer performance in burst-mode communication systems”, IEEE Journal on Selected Areas in Communications, vol. 19, pp. 2310-2319, 2001.
, “Toward a theory of multirate nonlinear systems”, in IEEE Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Cannes, France, 2006.
, “Towards Traitor Tracing in Black-and-White-Box DNN Watermarking with Tardos-Based Codes”, in 2023 IEEE International Workshop on Information Forensics and Security (WIFS), 2023, pp. 1-6. Towards_Traitor.pdf (1007.31 KB)
, “Transportation-theoretic image counterforensics to first significant digit histogram forensics”, in IEEE International Conference on Audio, Speech, and Signal Processing (ICASSP), Florence, Italy, 2014. cecilia_icassp2014.pdf (390.14 KB)
, “Trellis Shaping Techniques for Satellite Telecommunication Systems”, in International Workshop on Satellite and Space Communications (IWSSC), Leganés, Spain, 2006.
, “Turbo Coding for Sample-Level Watermarking in the DCT Domain”, in IEEE International Conference on Image Processing (ICIP), Thessaloniki, Greece, 2001, pp. 1003–1006.
, “A Tutorial on Digital Watermarking”, in IEEE Annual Carnahan Conference on Security Technology, Madrid, Spain, 1999.
, “Two different approaches for attacking BOWS”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007. spie07bows.pdf (416.45 KB)
, “Two-dimensional Statistical Test for the Presence of Almost Cyclostationarity on Images”, in IEEE International Conference on Image Processing (ICIP), Hong Kong, China, 2010, pp. 1745-1748. icip2010_dvazquez_cmosquera_fperez.pdf (1.32 MB)
, “Two-Level Frame Precoding with non-Cooperative Gateways”, EURASIP Journal on Wireless Communications and Networking, 2020. Two_Level_Frame_Precoding_with_non_Cooperative_Gateways.pdf (2.14 MB)
, “Two-Level Precoding for High Throughput Satellites with non-Cooperative Gateways”, in 22nd International Workshop on Smart Antennas (WSA), 2018. finalversion_WSA.pdf (172.32 KB)
, “A two-objective evolutionary approach based on topological constraints for node localization in wireless sensor networks”, Applied Soft Computing, vol. 12, no. 7, pp. 1891-1901, 2011. asoc-d-10-00754r1.pdf (597.83 KB)
, “A Two-Stage Codebook Building Method Using Fast WAN”, in International Conference on Image Analysis and Processing (ICIAP), Venice, Italy, 1999, pp. 1047–1050.
, “Understanding statistical disclosure: A least squares approach”, in Privacy Enhancing Technologies Symposium (PETS), Vigo, Spain, 2012, pp. 38–57. pets2012_fpg.pdf (450.58 KB)
, “Understanding the Effects of Real-World Behavior in Statistical Disclosure Attacks”, in IEEE Workshop on Information Forensics and Security, 2014. wifs14.pdf (347.72 KB)
, “A Unified Framework for Dynamic Spectrum Leasing (DSL) in Cognitive Radios”, in IEEE Broadband Wireless Access Workshop, 2009.
, “The use of unit norm tight measurement matrices for one-bit compressed sensing”, in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2016.
, “Uvi_Wave, the Ultimate Toolbox for Wavelet Transforms and Filter Banks”, in Baiona Workshop on Intelligent Methods in Signal Processing and Communication, Baiona, Spain, 1996.
, “Video Integrity Verification and GOP Size Estimation via Generalized Variation of Prediction Footprint”, IEEE Transactions on Information Forensics and Security, vol. 15, no. 1, pp. 1815-1830, 2020. TIFS19_GVPF.pdf (1.01 MB)
, “Videosurveillance and privacy: covering the two sides of the mirror with DRM”, in ACM Workshop on Digital Rights Management (DRM), Chicago, IL, USA, 2009. drm18-troncoso.pdf (417.17 KB)
, “Visible Encryption: Using Paper as a Secure Channel”, in Security and Watermarking of Multimedia Contents, Santa Clara, USA, 2003, vol. 5020.
, “On a watermarking scheme in the logarithmic domain and its perceptual advantages”, in IEEE International Conference on Image Processing (ICIP), San Antonio, TX, USA, 2007, pp. 1261-1264. icip07logwat.pdf (77.03 KB)
, “Watermarking security: a survey”, Transactions on Data Hiding and Multimedia Security I, vol. 4300, pp. 41-72, 2006. survey06security.pdf (268.87 KB)
,