“Revealing the true achievable rates of Scalar Costa Scheme”, in IEEE International Workshop on Multimedia Signal Processing, Siena, Italy, 2004, pp. 203-206.
, “On reversibility of random binning techniques: multimedia perspectives”, in Conference on Communications and Multimedia Security (CMS), Salzburg, Austria, 2005.
cms05.pdf (267.92 KB)
, 
“A Review of "Camera Attribution Forensic Analyzer in the Encrypted Domain"”, in VI Jornadas Nacionales de Investigación en Ciberseguridad (JNIC), 2021.
PMTP21-JNIC21.pdf (259.84 KB)
, 
“Revisiting Multivariate Lattices for Encrypted Signal Processing”, in ACM Information Hiding and Multimedia Security Workshop (IH&MMSec), Paris, France, 2019.
PTP19_IHMMSec19.pdf (1.67 MB)
, 
“Revisiting multivariate ring learning with errors and its applications on lattice-based cryptography”, Mathematics, vol. 9, no. 8, 2021.
PTGGP21.pdf (1.04 MB)
, 
“Road vehicle speed estimation from a two-microphone array”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Orlando, FL, USA, 2002, vol. 2, pp. 1321–1324.
, “Robust Adaptive Coding and Modulation Scheme for the Mobile Satellite Forward Link”, in IEEE International Workshop on Signal Processing Advances in Wireless Communications, SPAWC, 2015.
SPAWCfinalversion.pdf (499.99 KB)
, 
“Robust analog precoding designs for millimeter wave MIMO transceivers with frequency and time division duplexing”, IEEE Trans. Communications, vol. 64, no. 11, pp. 4622 - 4634, 2016.
, “Robust analog precoding designs for millimeter wave MIMO transceivers”, in 20th International ITG Workshop on Smart Antennas (WSA), 2016.
, “Robust clustering of data collected via crowdsourcing”, in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), New Orleans, 2017, pp. 4014 - 4018.
20160908114915_548170_1427.pdf (385.63 KB)
, 
“The robust SPR problem: design algorithms and new applications”, Signal Processing, vol. 76, pp. 269-283, 1999.
, “Robustness analysis of beamforming based designs for mmWave Full-Duplex Amplify-and-Forward relays”, in 2020 14th International Conference on Signal Processing and Communication Systems (ICSPCS), 2020.
robust_relay.pdf (830.24 KB)
, 
“Robustness Improvement of Known-Host-State Watermarking Using Host Statistics”, Signal Processing, vol. 86, pp. 1076-1088, 2006.
, “Robustness Improvement of Known-Host-State Watermarking Using Host Statistics”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.
, “On the Role of Differentiation for Resampling Detection”, in IEEE International Conference on Image Processing (ICIP), Hong Kong, China, 2010.
, “The role of second-order statistics in blind equalization of nonlinear channels”, in IEEE Workshop on Statistical Signal Processing (SSP), Pocono Manor, PA, USA, 2000, pp. 211–215.
, “Satellite Communications: Research Trends and Open Issues”, in International Workshop on Satellite and Space Communications (IWSSC), 2007.
, “Scaling laws for infrastructure single and multihop wireless networks in wideband regimes”, in IEEE International Symposium on Information Theory (ISIT), Honolulu, 2014, pp. 76–80.
, “Second order statistical properties of nonlinearly distorted PSK signals”, IEEE Communications Letters, vol. 7, pp. 323–325, 2003.
VALCARCE_CL2002-915.pdf (60.04 KB)
, 
“Second order statistics based blind channel equalization with correlated sources”, in IEEE International Symposium on Circuits and Systems (ISCAS), Sydney, Australia, 2001, vol. 4, pp. 366–369.
, “Second-order blind algorithms for adaptive recursive linear equalizers: Analysis and lattice implementation”, International Journal of Adaptive Control and Signal Processing, vol. 20, pp. 265–289, 2006.
, “Secret dither estimation in lattice-quantization data hiding: a set-membership approach”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.
spie06_sme.pdf (223.01 KB)
, 
“Secure Adaptive Filtering”, IEEE Transactions on Information Forensics and Security, vol. 6, pp. 469 -485, 2011.
TPPGTIFS11-Secure_Adaptive_Filtering.pdf (396.27 KB)
, 
“Secure and Private Medical Clouds using Encrypted Processing”, in Virtual Physiological Human (VPH), Brussels, Belgium, 2010.
, “Secure Collaborative Camera Attribution”, in European Interdisciplinary Cybersecurity Conference (EICC), Barcelona, Spain, 2022, pp. 97-98.
,