Export 85 results:
Author Title [ Type] Year Filters: First Letter Of Last Name is T [Clear All Filters]
“Practical Implementation of Link Adaptation with Dual Polarized Modulation (Best paper award)”, in 11th International Symposium on Communication Systems, Networks, and Digital Signal Processing., 2018. Paper_Budapest_2018_v3_camera_ready.pdf (318.85 KB)
, “Power spectrum blind sampling using optimal multicoset sampling patterns in the MSE sense”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2014.
, “Power Spectrum Blind Sampling Using Minimum Mean Square Error and Weighted Least Squares”, in Asilomar Conference on Signals, Systems and Computers, 2013. td_wls_mmse.pdf (294.2 KB)
, “A novel model for the print-and-capture channel in 2D bar codes”, in International Workshop on Multimedia Content Representation, Classification and Security, Istambul, Turkey, 2006, vol. 4105, pp. 627-634.
, “A new model for Gabor Coefficients' Magnitude in Face Recognition”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Dallas, USA, 2010.
, “Neural Network Aided Computation of Generalized Spatial Modulation Capacity”, in 27th European Signal Processing Conference (EUSIPCO), A Coruña (Spain), 2019. Eusipco-GSM-v6-cr.pdf (308.54 KB)
, “Multivariate Lattices for Encrypted Image Processing”, in IEEE International Conference on Acoustics, Speech and Signal Processing, Brisbane, Australia, 2015. PedrouzoICASSP2015.pdf (348.56 KB)
, “Multiquadratic Rings and Walsh-Hadamard Transforms for Oblivious Linear Function Evaluation”, in IEEE International Workshop on Information Forensics and Security (WIFS), 2020. PTGGP20-WIFS20.pdf (645.17 KB)
, “Multibeam Compact Dual Reflectarray Antenna for High-Throughput Satellites in Ka-Band”, in 18th European Conference on Antennas and Propagation, 2024.
, “Meet the Family of Statistical Disclosure Attacks”, in GlobalSIP, 2013. main-globalsip.pdf (115.96 KB)
, “Link adaptation in mobile satellite links: field trials results”, in 8th Advanced Satellite Multimedia Systems Conference and 14th Signal Processing for Space Communications Workshop, 2016. 1570276720_1.pdf (2.42 MB)
, “Link Adaptation and Carriers Detection Errors in Multibeam Satellite Systems with Linear Precoding”, in 9th Advanced Satellite Multimedia Systems Conference (ASMS) and 15th Signal Processing for Space Communications Workshop (SPSC), Berlin, Germany, 2018. ASMS_2018_ACM_precoding_-_camera_ready.pdf (563.55 KB)
, “A Least Squares approach to user profiling in pool mix-based anonymous communication systems.”, in IEEE International Workshop on Information Forensics and Security (WIFS), Tenerife, Spain, 2012, pp. 115–120. wifs2012_pg.pdf (321.08 KB)
, “Image denoising in the encrypted domain”, in IEEE International Workshop on Information Forensics and Security (WIFS), Abu Dhabi, UAE, 2016. PTP16_WIFS16.pdf (527.76 KB)
, “Hybrid Space-Ground Processing for High-Capacity Multi-beam Satellite Systems”, in IEEE GLOBECOM, Houston, Texas, USA, 2011. arna1112hybrid.pdf (182.79 KB)
, “Is Geo-Indistinguishability what you are looking for?”, in Workshop on Privacy in the Electronic Society (WPES), 2017. 1709.06318.pdf (822.66 KB)
, “Fully Homomorphic Faces”, in IEEE International Conference on Image Processing (ICIP), Lake Buena Vista, Florida, USA, 2012. cryptofaces.pdf (213.56 KB)
, “Filter design for delay-based anonymous communications”, in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2017. ICASSPmain.pdf (382.42 KB)
, “Encrypted Domain Processing for Cloud Privacy: Concept and Practical Experience”, in International Conference on Cloud Computing and Services Science (CLOSER), Noordwijkerhout, The Netherlands, 2011.
, “Efficient Protocols for Secure Adaptive Filtering”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Prage, Czech Republic, 2011, pp. 5860-5863. secure_adaptive_filteringICASSP2011.pdf (115.55 KB)
, “Efficient Protocols for Oblivious Linear Function Evaluation from Ring-LWE”, in International Conference on Security and Cryptography for Networks (SCN), 2020. BEPST20-SCN20.pdf (457.81 KB)
, “Efficient PRNU Matching in the Encrypted Domain”, in XoveTIC, A Coruña, Spain, 2019. PMTP19_XoveTIC19.pdf (517.32 KB)
, “Efficient Non-Interactive Zero-Knowledge Watermark Detector Robust to Sensitivity Attacks”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
, “Dynamic Privacy-Preserving Genomic Susceptibility Testing”, in ACM Workshop on Information Hiding and Multimedia Security, 2016, pp. 45-50. IHMMSec2016-GenomicPrivSusceptibility.pdf (359.18 KB)
, “Do dummies pay off? Limits of dummy traffic protection in anonymous communications”, in Privacy Enhancing Technologies Symposium, 2014. pets14.pdf (421.61 KB) Matlab files used to perform the experiments in the paper. (5.55 KB)
,