«Some remarks on the lattice form of the Steiglitz-McBride iteration», IEEE Signal Processing Letters, vol. 6, pp. 290–292, 1999.
, «Some properties of the matrix exponential», IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, vol. 48, pp. 213–215, 2001.
, «SNR Estimation for Multilevel Constellations Using Higher-Order Moments», IEEE Transactions on Signal Processing, vol. 58, pp. 1515–1526, 2010. alvarez-diaz-tsp-10.pdf (295.93 KB)
, «Smart Grid Last-Mile Communications Model and Its Application to the Study of Leased Broadband Wired-Access», IEEE Transactions on Smart Grid, vol. 4, pp. 5–12, 2013. Smart_Grid_Last-Mile_Communications_Model_and_its_Application_to_the_Study_of_Leased_Broadband_Wired-Access.pdf (298.72 KB)
, «Smart Detection of Line-Search Oracle Attacks», IEEE Transactions on Information Forensics and Security, vol. 12, n.º 3, pp. 588-603, 2017. TIFS_smartOracle.pdf (3.73 MB)
, «Sixth-Order Statistics-Based Non-Data-Aided SNR Estimation», IEEE Communications Letters, vol. 11, pp. 351-353, 2007. lopezvalcarce_CL2006-1948.pdf (195.93 KB)
, «The SIMO Block Rayleigh Fading Channel Capacity Scaling With Number of Antennas, Bandwidth, and Coherence Length», IEEE Journal on Selected Areas in Information Theory, vol. 3, pp. 54–68, 2022. FINAL_VERSION.pdf (528.1 KB)
, «Sidelobe Suppression for Multicarrier Signals via Structured Spectral Precoding», IEEE Transactions on Communications, 2024. TCOMM3357429.pdf (821.23 KB)
, «Security of lattice-based data hiding against the Watermarked Only Attack», IEEE Transactions on Information Forensics and Security, vol. 3, pp. 593-610, 2008.
, «Security of lattice-based data hiding against the Known Message Attack», IEEE Transactions on Information Forensics and Security, vol. 1, pp. 421-439, 2006. tifs06security.pdf (563.51 KB)
, «Security in automotive radar and vehicular networks», Microwave Journal, 2016.
, «Secure Signal Processing in the Cloud: enabling technologies for privacy-preserving multimedia cloud processing», IEEE Signal Processing Magazine, vol. 30, n.º 2, pp. 29-41, 2013. cloudspm2013.pdf (965.61 KB)
, «Secure Adaptive Filtering», IEEE Transactions on Information Forensics and Security, vol. 6, pp. 469 -485, 2011. TPPGTIFS11-Secure_Adaptive_Filtering.pdf (396.27 KB)
, «Second-order blind algorithms for adaptive recursive linear equalizers: Analysis and lattice implementation», International Journal of Adaptive Control and Signal Processing, vol. 20, pp. 265–289, 2006.
, «Second order statistical properties of nonlinearly distorted PSK signals», IEEE Communications Letters, vol. 7, pp. 323–325, 2003. VALCARCE_CL2002-915.pdf (60.04 KB)
, «Robustness Improvement of Known-Host-State Watermarking Using Host Statistics», Signal Processing, vol. 86, pp. 1076-1088, 2006.
, «The robust SPR problem: design algorithms and new applications», Signal Processing, vol. 76, pp. 269-283, 1999.
, «Robust analog precoding designs for millimeter wave MIMO transceivers with frequency and time division duplexing», IEEE Trans. Communications, vol. 64, n.º 11, pp. 4622 - 4634, 2016.
, «Revisiting multivariate ring learning with errors and its applications on lattice-based cryptography», Mathematics, vol. 9, n.º 8, 2021. PTGGP21.pdf (1.04 MB)
, «Realizable minimum mean-squared error channel shorteners», IEEE Transactions on Signal Processing, vol. 53, pp. 4354–4362, 2005. T_SP_02192_2004.pdf (149.65 KB)
, «Realizable linear and decision feedback equalizers: properties and connections», IEEE Transactions on Signal Processing, vol. 52, pp. 757–773, 2004.
, «Rational Dither Modulation: a high-rate data-hiding method robust to gain attacks», IEEE Transactions on Signal Processing, vol. 53, pp. 3960-3975, 2005.
, «A Random Matrix Approach to the Forensic Analysis of Upscaled Images», IEEE Transactions on Information Forensics and Security, vol. 12, n.º 9, pp. 2115-2130, 2017. TIFS17_resampling.pdf (1.04 MB)
, «Quantization-Based Methods: Additive Attacks Performance Analysis», Transactions on Data Hiding and Multimedia Security III, vol. 4920, pp. 70-90, 2008.
, «Quantization-Based Data-Hiding Robust to Linear Time-Invariant Filtering», IEEE Transactions on Information Forensics and Security, vol. 3, pp. 137-152, 2008.
,