“On distortion-compensated Dither Modulation data-hiding with repetition coding”, IEEE Transactions on Signal Processing, vol. 54, pp. 585-600, 2006. dcdm_uvigo05.pdf (311.95 KB)
, “A Diffusion-Based EM Algorithm for Distributed Estimation in Unreliable Sensor Networks”, IEEE Signal Processing Letters, vol. 20, no. 6, pp. 595-598, 2013. LSP2260329.pdf (326.39 KB)
, “Detection of Rank-P Signals in Cognitive Radio Networks With Uncalibrated Multiple Antennas”, IEEE Trans. on Signal Processing, vol. 59, no. 8, pp. 3764-3774, 2011. manuscript.pdf (587.54 KB)
, “Designing incoherent frames through convex techniques for optimized compressed sensing”, IEEE Transactions on Signal Processing, vol. 64, no. 9, pp. 2334-2344, 2016.
, “Design of pool mixes against profiling attacks in real conditions”, IEEE/ACM Transactions on Networking, vol. 24, no. 6, pp. 3662-3675, 2016. TNET2547391_author_version.pdf (1.96 MB)
, “On the design of a novel two-objective harmony search approach for distance- and connectivity-based localization in wireless sensor networks”, Engineering Applications of Artificial Intelligence, vol. 26, no. 2, pp. 669-676, 2013. eaai2013.pdf (533.7 KB)
, “DCT-Domain Watermarking Techniques for Still Images: Detector Performance Analysis and a New Structure”, IEEE Transactions on Image Processing, vol. 9, pp. 55–68, 2000.
, “Data Hiding Robust to Mobile Communication Vocoders”, IEEE Transactions on Multimedia, vol. 18, no. 12, pp. 2345-2357, 2016. TMM2599149.pdf (3.04 MB)
, “Cramer-Rao Lower Bound and EM Algorithm for Envelope-Based SNR Estimation of Nonconstant Modulus Constellations”, IEEE Transactions on Communications, vol. 57, pp. 1622 - 1627, 2009.
, “Cramér-Rao Bounds for SNR Estimation of Oversampled Linearly Modulated Signals”, IEEE Trans. Signal Processing, vol. 63, no. 7, pp. 1675-1683, 2015. TSP2396013.pdf (1.13 MB)
, “Cost minimisation interpretation of fourth power phase estimator and links to multimodulus algorithm”, IEE Electronics Letters, vol. 40, pp. 278–279, 2004. fourthpower.pdf (52.6 KB)
, “Convergence analysis of the multiple-channel filtered-U recursive LMS algorithm for active noise control”, Signal Processing, vol. 80, pp. 849-856, 2000.
, “Contribution of non-orthogonal multiple access signalling to practical multibeam satellite deployments”, International Journal of Satellite Communications and Networking, 2023. RamirezMosqueraIJSCN2023.pdf (2.87 MB)
, “Compressive Covariance Sensing: Structure-Based Compressive Sensing Beyond Sparsity”, IEEE Signal Processing Magazine, vol. 33, no. 1, p. 78--93, 2016. romero_SPM.pdf (408.02 KB)
, “Compression Limits for Random Vectors with Linearly Parameterized Second-Order Statistics”, IEEE Trans. Information Theory, vol. 61, no. 3, pp. 1410-1425, 2015. TIT2394784.pdf (429.71 KB)
, “A comparison of system architectures for intelligent document understanding”, Signal Processing: Image Communication, vol. 9, pp. 1-19, 1996.
, “A Cognitive Mobile BTS Solution with Software-Defined Radioelectric Sensing”, Sensors, vol. 13, no. 2, pp. 2051-2075, 2013. sensors-13-02051.pdf (2.93 MB)
, “Closed-form real single-tone frequency estimator based on a normalized IIR notch filter”, Signal Processing, vol. 90, pp. 1905-1915, 2010. ieee_version_finale_july_2008.pdf (193.5 KB)
, “Choose Your Subcarriers Wisely: Active Interference Cancellation for Cognitive OFDM”, IEEE Journal on Emerging and Selected Topics in Circuits and Systems, vol. 3, no. 4, pp. 615-625, 2013. spectrumshaping_final.pdf (3.05 MB)
, “CDMA-based Acoustic Local Positioning System for Portable Devices with Multipath Cancellation”, Digital Signal Processing, vol. 62, pp. 38-51, 2017. dsp16_R3.pdf (7.32 MB)
, “Capacity Scaling of Cellular Networks: Impact of Bandwidth, Infrastructure Density and Number of Antennas”, IEEE Transactions on Wireless Communications, vol. 17, pp. 652–666, 2018. bandwidthScaling_TWC_final.pdf (758.89 KB)
, “Capacity scaling in a non-coherent wideband massive SIMO block fading channel”, IEEE Transactions on Wireless Communications, vol. 18, pp. 5691–5704, 2019. FINAL_VERSION.pdf (2.5 MB)
, “Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks”, EURASIP Journal on Information Security, vol. 2007, 2007. jis07bows.pdf (436.69 KB) Source code available here. (8.51 MB)
, “Blind Newton Sensitivity Attack”, IEE Proceedings on Information Security, vol. 153, pp. 115-125, 2006. iee-06bnsa.ps (1.67 MB)
, “Blind l_1-Norm-Based Phase Estimation for Cross-QAM Robust to Finite Precision Effects”, Signal Processing, vol. 90, pp. 2934-2948, 2010. phaserec08_v5_onecol.pdf (292.81 KB)
,