“Parameter estimation in wireless sensor networks with faulty transducers: A distributed EM approach”, Signal Processing, vol. 144, pp. 226-237, 2018.
, “Partial-Duplex Amplify-and-Forward Relaying: Spectral Efficiency Analysis under Self-Interference”, IEEE Transactions on Wireless Communications, vol. 18, no. 4, pp. 2271-2285, 2019. TWC2902390.pdf (668.18 KB)
, “Performance Analysis of a 2D-Multipulse Amplitude Modulation Scheme for Data Hiding and Watermarking of Still Images”, IEEE Journal on Selected Areas in Communications, vol. 16, pp. 510–524, 1998.
, “Performance Analysis of Existing and New Methods for Data Hiding with Known-Host Information in Additive Channels”, IEEE Transactions on Signal Processing, vol. 51, pp. 960-980, 2003.
, “Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method”, IEEE Transactions on Information Forensics and Security, vol. 4, pp. 570-577, 2009. tifs09performanceanalysis.pdf (232.67 KB)
, “Performance of the Multibeam Satellite Return Link with Correlated Rain Attenuation”, IEEE Transactions on Wireless Communications, pp. 1-1, 2014. multibeam_channel_rain_attenuation_arnau_christopoulos_et_al.pdf (4.89 MB)
, “Performance study of multiuser interference mitigation schemes for hybrid broadband multibeam satellite architectures”, EURASIP Journal on Wireless Communications and Networking, vol. 2012, p. 132, 2012.
, “Primary User Enters the Game: Performance of Dynamic Spectrum Leasing in Cognitive Radio Networks”, IEEE Transactions on Wireless Communications, 2010.
, “Privacy-Preserving Data Aggregation in Smart Metering Systems: An Overview”, IEEE Signal Processing Magazine, vol. 30, no. 2, pp. 75-86, 2013. smartmeteringspm2013.pdf (547.21 KB)
, “Properties of real and complex ETFs and their application to the design of low coherence frames”, Linear Algebra and its Applications, vol. 508, pp. 81-90, 2016.
, “Quantization-Based Data-Hiding Robust to Linear Time-Invariant Filtering”, IEEE Transactions on Information Forensics and Security, vol. 3, pp. 137-152, 2008.
, “Quantization-Based Methods: Additive Attacks Performance Analysis”, Transactions on Data Hiding and Multimedia Security III, vol. 4920, pp. 70-90, 2008.
, “A Random Matrix Approach to the Forensic Analysis of Upscaled Images”, IEEE Transactions on Information Forensics and Security, vol. 12, no. 9, pp. 2115-2130, 2017. TIFS17_resampling.pdf (1.04 MB)
, “Rational Dither Modulation: a high-rate data-hiding method robust to gain attacks”, IEEE Transactions on Signal Processing, vol. 53, pp. 3960-3975, 2005.
, “Realizable linear and decision feedback equalizers: properties and connections”, IEEE Transactions on Signal Processing, vol. 52, pp. 757–773, 2004.
, “Realizable minimum mean-squared error channel shorteners”, IEEE Transactions on Signal Processing, vol. 53, pp. 4354–4362, 2005. T_SP_02192_2004.pdf (149.65 KB)
, “Revisiting multivariate ring learning with errors and its applications on lattice-based cryptography”, Mathematics, vol. 9, no. 8, 2021. PTGGP21.pdf (1.04 MB)
, “Robust analog precoding designs for millimeter wave MIMO transceivers with frequency and time division duplexing”, IEEE Trans. Communications, vol. 64, no. 11, pp. 4622 - 4634, 2016.
, “The robust SPR problem: design algorithms and new applications”, Signal Processing, vol. 76, pp. 269-283, 1999.
, “Robustness Improvement of Known-Host-State Watermarking Using Host Statistics”, Signal Processing, vol. 86, pp. 1076-1088, 2006.
, “Second order statistical properties of nonlinearly distorted PSK signals”, IEEE Communications Letters, vol. 7, pp. 323–325, 2003. VALCARCE_CL2002-915.pdf (60.04 KB)
, “Second-order blind algorithms for adaptive recursive linear equalizers: Analysis and lattice implementation”, International Journal of Adaptive Control and Signal Processing, vol. 20, pp. 265–289, 2006.
, “Secure Adaptive Filtering”, IEEE Transactions on Information Forensics and Security, vol. 6, pp. 469 -485, 2011. TPPGTIFS11-Secure_Adaptive_Filtering.pdf (396.27 KB)
, “Secure Signal Processing in the Cloud: enabling technologies for privacy-preserving multimedia cloud processing”, IEEE Signal Processing Magazine, vol. 30, no. 2, pp. 29-41, 2013. cloudspm2013.pdf (965.61 KB)
, “Security in automotive radar and vehicular networks”, Microwave Journal, 2016.
,