“Watermarking security: a survey”, Transactions on Data Hiding and Multimedia Security I, vol. 4300, pp. 41-72, 2006.
survey06security.pdf (268.87 KB)
, 
“Wavelet Packet based subband adaptive equalization”, in Baiona Workshop on Emerging Technologies in Telecommunications, Baiona, Spain, 1999.
, “Wavelet-packet-based subband adaptive equalization”, Signal Processing, vol. 81, pp. 1641-1662, 2001.
, “Weber's law-based side-informed data hiding”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Prague, Czech Republic, 2011, pp. 1840-1843.
comesanaicassp11.pdf (119.42 KB)
, 
“Wideband full-duplex MIMO relays with blind adaptive self-interference cancellation”, Signal Processing, vol. 130, pp. 74-85, 2017.
SIGPRO_6170.pdf (1.41 MB)
, 
“Wideband self-interference cancellation for better spectrum use”, in IEEE WoWMoM 2016 Workshop on Fifth Generation Wireless, 2016.
SIcancellationFinal.pdf (435.86 KB)
, 
“Wideband Spectral Estimation from Compressed Measurements Exploiting Spectral a priori Information in Cognitive Radio Systems”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Dallas, U.S.A., 2010.
, “Wideband Spectrum Sensing From Compressed Measurements Using Spectral Prior Information”, IEEE Trans. Signal Process., vol. 61, pp. 6232-6246, 2013.
, “Wideband Spectrum Sensing in Cognitive Radio: Joint Estimation of Noise Variance and Multiple Signal Levels”, in IEEE Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Perugia, Italy, 2009.
, “Witsenhausen's counterexample and its links with multimedia security problems”, in International Workshop on Digital Watermarking (IWDW), Atlantic City, USA, 2011.
iwdw11_witsenhausen.pdf (152.97 KB)
, 
“Worst case additive attack against quantization-based data-hiding methods”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, “Worst case additive attack against quantization-based watermarking techniques”, in IEEE International Workshop on Multimedia Signal Processing, Siena, Italy, 2004, pp. 135-138.
, “Worst case attacks against binary probabilistic traitor tracing codes”, in IEEE International Workshop on Information Forensics and Security (WIFS), London, UK, 2009, pp. 46-50.
, “Zero-Knowledge watermark detector robust to sensitivity attacks”, in ACM Workshop on Multimedia and Security (MMSEC), Geneva, Switzerland, 2006, pp. 97-107.
,