“The SIMO Block Rayleigh Fading Channel Capacity Scaling With Number of Antennas, Bandwidth, and Coherence Length”, IEEE Journal on Selected Areas in Information Theory, vol. 3, pp. 54–68, 2022. FINAL_VERSION.pdf (528.1 KB)
, “Sidelobe Suppression for Multicarrier Signals via Structured Spectral Precoding”, IEEE Transactions on Communications, vol. 72, no. 6, pp. 3155-3168, 2024. TCOMM3357429.pdf (821.23 KB)
, “Side-informed data hiding: robustness and security analysis”, University of Vigo, Spain, 2006. thesis_pedro.pdf (2.18 MB)
, “Set-Membership Identification of Resampled Signals”, in IEEE International Workshop on Information Forensics and Security (WIFS), Guangzhou, China, 2013. wifs13_dvazquez_pcomesan_fperez.pdf (171.35 KB)
, “Sensitivity of compressive sensing architectures based on time interleaved analog-to-digital converters to channel mismatches”, in IEEE International New Circuits and Systems Conference (NEWCAS), 2014.
, “Security of Spread-Spectrum-Based Data Hiding”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
, “Security of lattice-based data hiding against the Watermarked Only Attack”, IEEE Transactions on Information Forensics and Security, vol. 3, pp. 593-610, 2008.
, “Security of lattice-based data hiding against the Known Message Attack”, IEEE Transactions on Information Forensics and Security, vol. 1, pp. 421-439, 2006. tifs06security.pdf (563.51 KB)
, “Security in automotive radar and vehicular networks”, Microwave Journal, 2016.
, “Secure Signal Processing in the Cloud: enabling technologies for privacy-preserving multimedia cloud processing”, IEEE Signal Processing Magazine, vol. 30, no. 2, pp. 29-41, 2013. cloudspm2013.pdf (965.61 KB)
, “A Secure Multidimensional Point Inclusion Protocol”, in ACM Workshop on Multimedia and Security (MMSEC), Dallas, Texas, USA, 2007, pp. 109–120.
, “Secure Genomic Susceptibility Testing based on Lattice Encryption”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), New Orleans, USA, 2017. TPP17_ICASSP17.pdf (403.53 KB)
, “Secure Direct and Iterative Protocols for Solving Systems of Linear Equations”, in Signal Processing in the Encrypted Domain (SPEED) Workshop, Lausanne, Switzerland, 2009, pp. 122–141. secure_sle_speedws09.pdf (193.97 KB)
, “Secure Collaborative Camera Attribution”, in European Interdisciplinary Cybersecurity Conference (EICC), Barcelona, Spain, 2022, pp. 97-98.
, “Secure and Private Medical Clouds using Encrypted Processing”, in Virtual Physiological Human (VPH), Brussels, Belgium, 2010.
, “Secure Adaptive Filtering”, IEEE Transactions on Information Forensics and Security, vol. 6, pp. 469 -485, 2011. TPPGTIFS11-Secure_Adaptive_Filtering.pdf (396.27 KB)
, “Secret dither estimation in lattice-quantization data hiding: a set-membership approach”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601. spie06_sme.pdf (223.01 KB)
, “Second-order blind algorithms for adaptive recursive linear equalizers: Analysis and lattice implementation”, International Journal of Adaptive Control and Signal Processing, vol. 20, pp. 265–289, 2006.
, “Second order statistics based blind channel equalization with correlated sources”, in IEEE International Symposium on Circuits and Systems (ISCAS), Sydney, Australia, 2001, vol. 4, pp. 366–369.
, “Second order statistical properties of nonlinearly distorted PSK signals”, IEEE Communications Letters, vol. 7, pp. 323–325, 2003. VALCARCE_CL2002-915.pdf (60.04 KB)
, “Scaling laws for infrastructure single and multihop wireless networks in wideband regimes”, in IEEE International Symposium on Information Theory (ISIT), Honolulu, 2014, pp. 76–80.
, “Satellite Communications: Research Trends and Open Issues”, in International Workshop on Satellite and Space Communications (IWSSC), 2007.
, “The role of second-order statistics in blind equalization of nonlinear channels”, in IEEE Workshop on Statistical Signal Processing (SSP), Pocono Manor, PA, USA, 2000, pp. 211–215.
, “On the Role of Differentiation for Resampling Detection”, in IEEE International Conference on Image Processing (ICIP), Hong Kong, China, 2010.
, “Robustness Improvement of Known-Host-State Watermarking Using Host Statistics”, Signal Processing, vol. 86, pp. 1076-1088, 2006.
,