“On the Co-existence of Primary and Secondary Transmitters in a Broadcast Network”, in International Conference on Cognitive Radio and Advanced Spectrum Management, Barcelona, Catalonia, Spain, 2011.
, “Coding at the Sample Level for Data Hiding: Turbo and Concatenated Codes”, in Security and Watermarking of Multimedia Contents, San José, USA, 2001, vol. 4314, pp. 532–543.
, “Coding and Synchronization: A Boost and a Bottleneck for the Development of Image Watermarking”, in COST #254 Int. Workshop on Intelligent Communications, L'Aquila, Italy, 1998, pp. 77–82.
, “Co-creating Security-and-Privacy-by-Design Systems”, in International Conference on Availability, Reliability and Security (ARES), Salzburg, Germany, 2016, pp. 768-775.
, “Closed-form real single-tone frequency estimator based on a normalized IIR notch filter”, Signal Processing, vol. 90, pp. 1905-1915, 2010. ieee_version_finale_july_2008.pdf (193.5 KB)
, “Clock and Orientation-Robust Simultaneous Radio Localization and Mapping at Millimeter Wave Bands”, in 2023 IEEE Wireless Communications and Networking Conference (WCNC), 2023, pp. 1-7. mplocwcnc.pdf (684.15 KB)
, “A Class of Circular Sparse Rulers for Compressive Power Spectrum Estimation”, in European Signal Processing Conf. (EUSIPCO), Marrakech (Morocco), 2013. circular-ruler2.pdf (245.21 KB)
, “Circular Sparse Rulers Based On Co-prime Sampling For Compressive Power Spectrum Estimation”, in IEEE Global Communications Conference, Austin, TX, 2014.
, “Choose Your Subcarriers Wisely: Active Interference Cancellation for Cognitive OFDM”, IEEE Journal on Emerging and Selected Topics in Circuits and Systems, vol. 3, no. 4, pp. 615-625, 2013. spectrumshaping_final.pdf (3.05 MB)
, “Characterization of the Railroad Satellite Channel within the FIFTH Project”, in IST Mobile & Wireless Communications Summit, Aveiro, Portugal, 2003.
, “Characterization and Algebraic Solution to the Extreme-Point Robust SPR Problem”, in IFAC World Congress, San Francisco, CA, USA, 1996, pp. 391-396.
, “A Channel Model for the Galician Low Voltage Main Network”, in International Symposium on Power Line Communications and Its Applications (ISPLC), Malmo, Sweden, 2001.
, “Channel estimation in millimeter wave MIMO systems with one-bit quantization”, in Asilomar Conf. on Signals, Systems and Computers, 2014. asil14_1bit.pdf (916.97 KB)
, “Channel equalization with staggered modulation formats”, in IEEE International Conference on Digital Signal Processing (DSP), Santorini, Greece, 2002, pp. 769–772.
, “Channel dependent Mutual Information in Index Modulations”, in ICCASP, IEEE International Conference on Acoustics, Speech, and Signal Processing, 2018. ICASSP-CTTC-Pol-vf.pdf (99.09 KB)
, “CDMA-based Acoustic Local Positioning System for Portable Devices with Multipath Cancellation”, Digital Signal Processing, vol. 62, pp. 38-51, 2017. dsp16_R3.pdf (7.32 MB)
, “Capacity Scaling of Cellular Networks: Impact of Bandwidth, Infrastructure Density and Number of Antennas”, IEEE Transactions on Wireless Communications, vol. 17, pp. 652–666, 2018. bandwidthScaling_TWC_final.pdf (758.89 KB)
, “Capacity scaling in noncoherent wideband massive SIMO systems”, in IEEE Information Theory Workshop (ITW), 2015.
, “Capacity scaling in a non-coherent wideband massive SIMO block fading channel”, IEEE Transactions on Wireless Communications, vol. 18, pp. 5691–5704, 2019. FINAL_VERSION.pdf (2.5 MB)
, “On the capacity of stegosystems”, in ACM Workshop on Multimedia and Security (MMSEC), Dallas, TX, USA, 2007, pp. 1261-1264. acm07stego.pdf (198.41 KB)
, “Cancelling self-interference in full-duplex relays without Angle-of-Arrival information”, in Int. Conf. Acoust., Speech, Signal Process. (ICASSP), 2013. aoa_blind_canceller_final.pdf (519.88 KB)
, “Camera Attribution Forensic Analyzer in the Encrypted Domain”, in IEEE International Workshop on Information Forensics and Security (WIFS), Hong Kong, 2018. PMTP18_WIFS18.pdf (655.48 KB)
, “Broadband analysis of a microphone array based road traffic speed estimator”, in IEEE Sensor Array and Multichannel Signal Processing Workshop (SAM), Sitges, Barcelona, Spain, 2004. wideband.pdf (204.08 KB)
, “Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks”, EURASIP Journal on Information Security, vol. 2007, 2007. jis07bows.pdf (436.69 KB) Source code available here. (8.51 MB)
, “Bootstrap-based Proxy Reencryption for Private Multi-user Computing”, in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014. TroncosoCaputo-BootstrappingMultiKey.pdf (795.89 KB)
,