“Compressive Angular and Frequency Periodogram Reconstruction for Multiband Signals”, in IEEE Int. Workshop Comput. Advances Multi-Sensor Adaptive Process (CAMSAP), San Martin, 2013.
, “Compressed Sensing Channel Estimation for OTFS Modulation in Non-Integer Delay-Doppler Domain”, in 2021 IEEE Global Communications Conference (GLOBECOM), 2021, pp. 1–6.
ompotfs.pdf (365.98 KB)
, 
“On the Co-existence of Primary and Secondary Transmitters in a Broadcast Network”, in International Conference on Cognitive Radio and Advanced Spectrum Management, Barcelona, Catalonia, Spain, 2011.
, “Coding at the Sample Level for Data Hiding: Turbo and Concatenated Codes”, in Security and Watermarking of Multimedia Contents, San José, USA, 2001, vol. 4314, pp. 532–543.
, “Coding and Synchronization: A Boost and a Bottleneck for the Development of Image Watermarking”, in COST #254 Int. Workshop on Intelligent Communications, L'Aquila, Italy, 1998, pp. 77–82.
, “Co-creating Security-and-Privacy-by-Design Systems”, in International Conference on Availability, Reliability and Security (ARES), Salzburg, Germany, 2016, pp. 768-775.
, “Clock and Orientation-Robust Simultaneous Radio Localization and Mapping at Millimeter Wave Bands”, in 2023 IEEE Wireless Communications and Networking Conference (WCNC), 2023, pp. 1-7.
mplocwcnc.pdf (684.15 KB)
, 
“A Class of Circular Sparse Rulers for Compressive Power Spectrum Estimation”, in European Signal Processing Conf. (EUSIPCO), Marrakech (Morocco), 2013.
circular-ruler2.pdf (245.21 KB)
, 
“Circular Sparse Rulers Based On Co-prime Sampling For Compressive Power Spectrum Estimation”, in IEEE Global Communications Conference, Austin, TX, 2014.
, “Characterization of the Railroad Satellite Channel within the FIFTH Project”, in IST Mobile & Wireless Communications Summit, Aveiro, Portugal, 2003.
, “Characterization and Algebraic Solution to the Extreme-Point Robust SPR Problem”, in IFAC World Congress, San Francisco, CA, USA, 1996, pp. 391-396.
, “A Channel Model for the Galician Low Voltage Main Network”, in International Symposium on Power Line Communications and Its Applications (ISPLC), Malmo, Sweden, 2001.
, “Channel estimation in millimeter wave MIMO systems with one-bit quantization”, in Asilomar Conf. on Signals, Systems and Computers, 2014.
asil14_1bit.pdf (916.97 KB)
, 
“Channel equalization with staggered modulation formats”, in IEEE International Conference on Digital Signal Processing (DSP), Santorini, Greece, 2002, pp. 769–772.
, “Channel dependent Mutual Information in Index Modulations”, in ICCASP, IEEE International Conference on Acoustics, Speech, and Signal Processing, 2018.
ICASSP-CTTC-Pol-vf.pdf (99.09 KB)
, 
“Capacity scaling in noncoherent wideband massive SIMO systems”, in IEEE Information Theory Workshop (ITW), 2015.
, “On the capacity of stegosystems”, in ACM Workshop on Multimedia and Security (MMSEC), Dallas, TX, USA, 2007, pp. 1261-1264.
acm07stego.pdf (198.41 KB)
, 
“Cancelling self-interference in full-duplex relays without Angle-of-Arrival information”, in Int. Conf. Acoust., Speech, Signal Process. (ICASSP), 2013.
aoa_blind_canceller_final.pdf (519.88 KB)
, 
“Camera Attribution Forensic Analyzer in the Encrypted Domain”, in IEEE International Workshop on Information Forensics and Security (WIFS), Hong Kong, 2018.
PMTP18_WIFS18.pdf (655.48 KB)
, 
“Broadband analysis of a microphone array based road traffic speed estimator”, in IEEE Sensor Array and Multichannel Signal Processing Workshop (SAM), Sitges, Barcelona, Spain, 2004.
wideband.pdf (204.08 KB)
, 
“Bootstrap-based Proxy Reencryption for Private Multi-user Computing”, in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014.
TroncosoCaputo-BootstrappingMultiKey.pdf (795.89 KB)
, 
“Blind Turbo Decoding of Side-Informed Data Hiding Using Iterative Channel Estimation”, in International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), Lisboa, 2004.
, “Blind Satellite Inter-Gateway Interference Mitigation”, in IEEE International Conference on Communications (ICC), 2015.
finalICC2015multipleGWs.pdf (171.05 KB)
, 
“The blind Newton senstivity attack”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.
spie06_sensitivity.ps (1.62 MB)
, 
“Blind iterative decoding of side-informed data hiding using the Expectation-Maximization algorithm”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 805-815.
spie04em.pdf (434.03 KB)
, 