“Security in automotive radar and vehicular networks”, Microwave Journal, 2016.
, “Robust analog precoding designs for millimeter wave MIMO transceivers with frequency and time division duplexing”, IEEE Trans. Communications, vol. 64, no. 11, pp. 4622 - 4634, 2016.
, “Robust analog precoding designs for millimeter wave MIMO transceivers”, in 20th International ITG Workshop on Smart Antennas (WSA), 2016.
, “On reversibility of random binning techniques: multimedia perspectives”, in Conference on Communications and Multimedia Security (CMS), Salzburg, Austria, 2005.
cms05.pdf (267.92 KB)
, 
“Worst case additive attack against quantization-based data-hiding methods”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, “Quantization-Based Methods: Additive Attacks Performance Analysis”, Transactions on Data Hiding and Multimedia Security III, vol. 4920, pp. 70-90, 2008.
, “Worst case additive attack against quantization-based watermarking techniques”, in IEEE International Workshop on Multimedia Signal Processing, Siena, Italy, 2004, pp. 135-138.
, “Co-creating Security-and-Privacy-by-Design Systems”, in International Conference on Availability, Reliability and Security (ARES), Salzburg, Germany, 2016, pp. 768-775.
, “Time-domain channel estimation for wideband millimeter wave systems with hybrid architecture”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2017, pp. 6193-6197.
, “A study on the Application of Different Two-objective Evolutionary Algorithms to the Node Localization Problem in Wireless Sensor Networks”, in IEEE International Conference on Intelligent Systems Design and Applications (ISDA), 2011.
isda2011_1.pdf (212.19 KB)
, 
“A two-objective evolutionary approach based on topological constraints for node localization in wireless sensor networks”, Applied Soft Computing, vol. 12, no. 7, pp. 1891-1901, 2011.
asoc-d-10-00754r1.pdf (597.83 KB)
, 
“An Effective Metaheuristic Approach to Node Localization in Wireless Sensor Networks”, in IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), 2011.
mass_final.pdf (279.61 KB)
, 
“Improving Area Coverage of Wireless Sensor Networks Via Controllable Mobile Nodes: a Greedy Approach”, Journal of Network and Computer Applications, vol. 48, pp. 1-13, 2015.
JNCA_accepted.pdf (4.31 MB)
, 
“Solving the Node Localization Problem in WSNs by a Two-objective Evolutionary Algorithm and Gradient Descent”, in the 3-th IEEE World Congress on Nature and Biologically Inspired Computing (NaBIC 2011), 2011.
nabic2011.pdf (227.26 KB)
, 
“A Greedy Topology Design to Accelerate Consensus in Broadcast Wireless Sensor Networks”, Information Processing Letters, vol. 115, no. 3, pp. 408-413, 2015.
IPL_ack.pdf (380.47 KB)
, 
“Wideband Spectral Estimation from Compressed Measurements Exploiting Spectral a priori Information in Cognitive Radio Systems”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Dallas, U.S.A., 2010.
, “Detection diversity of multiantenna spectrum sensors”, in IEEE Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP 2011), Prague, Czech Republic, 2011, pp. 2936-2939.
vazquezvalcarcepandharipandeicassp11.pdf (156.47 KB)
, 
“Primary User Enters the Game: Performance of Dynamic Spectrum Leasing in Cognitive Radio Networks”, IEEE Transactions on Wireless Communications, 2010.
, “Spectrum Sensing Exploiting Guard Bands and Weak Channels”, IEEE Trans. on Signal Processing, vol. 59, no. 12, pp. 6045-6057, 2011.
double_submitted.pdf (373.72 KB)
, 
“Interference and Network Management in Cognitive Communication Systems”, University of Vigo, Vigo, Spain, 2011.
PHD_GonzaloVazquezVilar.pdf (2.05 MB)
, 
“Multiantenna Spectrum Sensing Exploiting Spectral a priori Information”, IEEE Trans. on Wireless Communications, vol. 10, no. 12, pp. 4345 - 4355, 2011.
mantennadetection.pdf (464.95 KB)
, 
“Homomorphic SVM Inference for Fraud Detection”, in VI Jornadas Nacionales de Investigación en Ciberseguridad (JNIC), 2021.
VJLFP21-JNIC21.pdf (297.13 KB)
, 
“Video Integrity Verification and GOP Size Estimation via Generalized Variation of Prediction Footprint”, IEEE Transactions on Information Forensics and Security, vol. 15, no. 1, pp. 1815-1830, 2020.
TIFS19_GVPF.pdf (1.01 MB)
, 
“Prefilter Design for Forensic Resampling Estimation”, in IEEE International Workshop on Information Forensics and Security (WIFS), Foz do Iguaçu, Brazil, 2011, pp. 1-6.
wifs2011_dvazquez_fperez.pdf (301.04 KB)
, 
“Exposing original and duplicated regions using SIFT features and resampling traces”, in International Workshop on Digital Watermarking (IWDW), Atlantic City, USA, 2011, pp. 306-320.
iwdw2011_dvazquez_fperez.pdf (943.16 KB)
, 