“A Greedy Topology Design to Accelerate Consensus in Broadcast Wireless Sensor Networks”, Information Processing Letters, vol. 115, no. 3, pp. 408-413, 2015. IPL_ack.pdf (380.47 KB)
, “Time-domain channel estimation for wideband millimeter wave systems with hybrid architecture”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2017, pp. 6193-6197.
, “Co-creating Security-and-Privacy-by-Design Systems”, in International Conference on Availability, Reliability and Security (ARES), Salzburg, Germany, 2016, pp. 768-775.
, “Worst case additive attack against quantization-based data-hiding methods”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, “Quantization-Based Methods: Additive Attacks Performance Analysis”, Transactions on Data Hiding and Multimedia Security III, vol. 4920, pp. 70-90, 2008.
, “Worst case additive attack against quantization-based watermarking techniques”, in IEEE International Workshop on Multimedia Signal Processing, Siena, Italy, 2004, pp. 135-138.
, “On reversibility of random binning techniques: multimedia perspectives”, in Conference on Communications and Multimedia Security (CMS), Salzburg, Austria, 2005. cms05.pdf (267.92 KB)
, “Robust analog precoding designs for millimeter wave MIMO transceivers with frequency and time division duplexing”, IEEE Trans. Communications, vol. 64, no. 11, pp. 4622 - 4634, 2016.
, “Robust analog precoding designs for millimeter wave MIMO transceivers”, in 20th International ITG Workshop on Smart Antennas (WSA), 2016.
, “Security in automotive radar and vehicular networks”, Microwave Journal, 2016.
,