“Filter design for delay-based anonymous communications”, in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2017. ICASSPmain.pdf (382.42 KB)
, “Understanding the Effects of Real-World Behavior in Statistical Disclosure Attacks”, in IEEE Workshop on Information Forensics and Security, 2014. wifs14.pdf (347.72 KB)
, “Meet the Family of Statistical Disclosure Attacks”, in GlobalSIP, 2013. main-globalsip.pdf (115.96 KB)
, “Design of pool mixes against profiling attacks in real conditions”, IEEE/ACM Transactions on Networking, vol. 24, no. 6, pp. 3662-3675, 2016. TNET2547391_author_version.pdf (1.96 MB)
, “Technical Report TSC/SO/02052014: Derivation of the Mean Squared Error of the Least Squares Estimator in a Timed Pool Mix with Dummy Traffic”, 2014. trpets14.pdf (205.16 KB)
, “Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms”, in ACM Conference on Computer and Communications Security (CCS), 2017. CCSmain.pdf (1.82 MB)
, , “Robust clustering of data collected via crowdsourcing”, in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), New Orleans, 2017, pp. 4014 - 4018. 20160908114915_548170_1427.pdf (385.63 KB)
, “A Dynamic Codebook Design for Analog Beamforming in MIMO LEO Satellite Communications”, in IEEE International Conference on Communications (ICC), 2022. 2111.08655.pdf (1.49 MB)
, “A Hybrid Beamforming Design for Massive MIMO LEO Satellite Communications ”, Frontiers in Space Technologies, vol. 2, 2021.
, “A Benford-Fourier JPEG compression detector”, in IEEE International Conference on Image Processing (ICIP), Paris, France, 2014. benford_icip_rice_new.pdf (235.58 KB)
, “Statistical detection of JPEG traces in digital images in uncompressed formats”, IEEE Transactions on Information Forensics and Security, vol. 12, no. Pending, 2017. TIFSbenford.pdf (5.94 MB)
, “Forensics of high quality and nearly identical JPEG image recompression”, in ACM Workshop on Information Hiding and Multimedia Security, 2016. HQ_multipleJPEG.pdf (1.33 MB)
, “Multiple JPEG compression detection by means of Benford-Fourier coefficients”, in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014.
, “Transportation-theoretic image counterforensics to first significant digit histogram forensics”, in IEEE International Conference on Audio, Speech, and Signal Processing (ICASSP), Florence, Italy, 2014. cecilia_icassp2014.pdf (390.14 KB)
, “Flexible Reinforcement Learning Scheduler for 5G Networks”, in 2024 IEEE International Conference on Machine Learning for Communication and Networking (ICMLCN), 2024, pp. 566-572. a105-paz-perez_final.pdf (514.6 KB)
, “Digital Satellite Communications”, Springer, 2007.
, “A Review of "Camera Attribution Forensic Analyzer in the Encrypted Domain"”, in VI Jornadas Nacionales de Investigación en Ciberseguridad (JNIC), 2021. PMTP21-JNIC21.pdf (259.84 KB)
, “Multivariate Lattices for Encrypted Image Processing”, in IEEE International Conference on Acoustics, Speech and Signal Processing, Brisbane, Australia, 2015. PedrouzoICASSP2015.pdf (348.56 KB)
, “Introducing the TRUMPET project: TRUstworthy Multi-site Privacy Enhancing Technologies”, in IEEE International Conference on Cyber Security and Resilience (CSR), Venice, Italy, 2023, pp. 604-611.
, “Revisiting multivariate ring learning with errors and its applications on lattice-based cryptography”, Mathematics, vol. 9, no. 8, 2021. PTGGP21.pdf (1.04 MB)
, “Technical Report UV/TSC/APU/02102014: Multivariate Ring Learning with Errors”, University of Vigo, 2014. TRMLWE2014.pdf (349.18 KB)
, “Efficient PRNU Matching in the Encrypted Domain”, in XoveTIC, A Coruña, Spain, 2019. PMTP19_XoveTIC19.pdf (517.32 KB)
, “Number Theoretic Transforms for Secure Signal Processing”, IEEE Transactions on Information Forensics and Security, vol. 12, no. 5, pp. 1125-1140, 2017. PTP17_TIFS.pdf (651.54 KB)
, “Multiquadratic Rings and Walsh-Hadamard Transforms for Oblivious Linear Function Evaluation”, in IEEE International Workshop on Information Forensics and Security (WIFS), 2020. PTGGP20-WIFS20.pdf (645.17 KB)
,