«Robust analog precoding designs for millimeter wave MIMO transceivers», in 20th International ITG Workshop on Smart Antennas (WSA), 2016.
, «Robust Adaptive Coding and Modulation Scheme for the Mobile Satellite Forward Link», in IEEE International Workshop on Signal Processing Advances in Wireless Communications, SPAWC, 2015.
SPAWCfinalversion.pdf (499.99 KB)
, 
«Road vehicle speed estimation from a two-microphone array», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Orlando, FL, USA, 2002, vol. 2, pp. 1321–1324.
, «Revisiting multivariate ring learning with errors and its applications on lattice-based cryptography», Mathematics, vol. 9, n.º 8, 2021.
PTGGP21.pdf (1.04 MB)
, 
«Revisiting Multivariate Lattices for Encrypted Signal Processing», in ACM Information Hiding and Multimedia Security Workshop (IH&MMSec), Paris, France, 2019.
PTP19_IHMMSec19.pdf (1.67 MB)
, 
«A Review of "Camera Attribution Forensic Analyzer in the Encrypted Domain"», in VI Jornadas Nacionales de Investigación en Ciberseguridad (JNIC), 2021.
PMTP21-JNIC21.pdf (259.84 KB)
, 
«On reversibility of random binning techniques: multimedia perspectives», in Conference on Communications and Multimedia Security (CMS), Salzburg, Austria, 2005.
cms05.pdf (267.92 KB)
, 
«Revealing the true achievable rates of Scalar Costa Scheme», in IEEE International Workshop on Multimedia Signal Processing, Siena, Italy, 2004, pp. 203-206.
, «The return of the sensitivity attack», in International Workshop on Digital Watermarking (IWDW), Siena, Italy, 2005, vol. 3710, pp. 260-274.
iwdw05.pdf (190.47 KB)
, 
«Rethinking Location Privacy for Unknown Mobility Behaviors», in IEEE European Symposium on Security and Privacy (EuroS&P), 2019.
ms.pdf (634.43 KB)
, 
«Resource Management in the multibeam NOMA-based satellite downlink», in 45th International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2020.
Resource_Management_in_the_multibeam_NOMA_based_satellite_downlink.pdf (200.8 KB)
, 
«Relaxation of the SPR condition with applications to the convergence of adaptive recursive algorithms», University of Vigo, Spain, 1998.
, «Realizable minimum mean-squared error channel shorteners», IEEE Transactions on Signal Processing, vol. 53, pp. 4354–4362, 2005.
T_SP_02192_2004.pdf (149.65 KB)
, 
«Realizable linear and decision feedback equalizers: properties and connections», IEEE Transactions on Signal Processing, vol. 52, pp. 757–773, 2004.
, «Rational Dither Modulation: a novel data-hiding method robust to value-metric attacks», in IEEE International Workshop on Multimedia Signal Processing, Siena, Italy, 2004, pp. 139-142.
, «Rational Dither Modulation: a high-rate data-hiding method robust to gain attacks», IEEE Transactions on Signal Processing, vol. 53, pp. 3960-3975, 2005.
, «Random Matrix Theory for Modeling the Eigenvalue Distribution of Images under Upscaling», in International Tyrrhenian Workshop on Digital Communication 2017, Palermo, Italy, 2017, pp. 109-124.
TIWDC17_dvazquez_fperez_pcomesan.pdf (394.61 KB)
, 
«A Random Matrix Approach to the Forensic Analysis of Upscaled Images», IEEE Transactions on Information Forensics and Security, vol. 12, n.º 9, pp. 2115-2130, 2017.
TIFS17_resampling.pdf (1.04 MB)
, 
«Radar aided mmWave beam alignment in V2I communications supporting antenna diversity», in Information Theory and Applications Workshop (ITA, 2016.
, «Quantized Projection Data Hiding», in IEEE International Conference on Image Processing (ICIP), Rochester (NY), USA, 2002.
, «Quantization-based watermarking performance improvement using host statistics: additive noise attack», in ACM Workshop on Multimedia and Security (MMSEC), Magdeburg, Germany, 2004.
, «Quantization-Based Methods: Additive Attacks Performance Analysis», Transactions on Data Hiding and Multimedia Security III, vol. 4920, pp. 70-90, 2008.
, «Quantization-Based Data-Hiding Robust to Linear Time-Invariant Filtering», IEEE Transactions on Information Forensics and Security, vol. 3, pp. 137-152, 2008.
, «Quantization lattice estimation for multimedia forensics», in IEEE International Conference on Image Processing, Melbourne, Australia, 2013, pp. 4452-4456.
icip13.pdf (88.9 KB)
, 
«Quantifying Security Leaks in Spread Spectrum Data Hiding: A Game Theoretic Approach», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 592-601.
spie04.ps (572.73 KB)
, 