Exportar 34 resultados:
[ Autor
Filtros: First Letter Of Last Name es T [Elimina todos los filtros]
«Secure Adaptive Filtering», IEEE Transactions on Information Forensics and Security, vol. 6, pp. 469 -485, 2011.
TPPGTIFS11-Secure_Adaptive_Filtering.pdf (396.27 KB)
, 
«Efficient Non-Interactive Zero-Knowledge Watermark Detector Robust to Sensitivity Attacks», in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
, «Bootstrap-based Proxy Reencryption for Private Multi-user Computing», in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014.
TroncosoCaputo-BootstrappingMultiKey.pdf (795.89 KB)
, 
«A new model for Gabor Coefficients' Magnitude in Face Recognition», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Dallas, USA, 2010.
, «Secure Signal Processing in the Cloud: enabling technologies for privacy-preserving multimedia cloud processing», IEEE Signal Processing Magazine, vol. 30, n.º 2, pp. 29-41, 2013.
cloudspm2013.pdf (965.61 KB)
, 
«Zero-Knowledge watermark detector robust to sensitivity attacks», in ACM Workshop on Multimedia and Security (MMSEC), Geneva, Switzerland, 2006, pp. 97-107.
, «Secure and Private Medical Clouds using Encrypted Processing», in Virtual Physiological Human (VPH), Brussels, Belgium, 2010.
, «Privacy Preserving Error Resilient DNA Searching through Oblivious Automata», in ACM Conference on Computer and Communications Security (CCS), Alexandria, Virginia, USA, 2007, pp. 519–528.
, «Secure Genomic Susceptibility Testing based on Lattice Encryption», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), New Orleans, USA, 2017.
TPP17_ICASSP17.pdf (403.53 KB)
, 
«Skewed Log-Stable model for natural images pixel block-variance», in IEEE International Conference on Image Processing (ICIP), Cairo, Egypt, 2009.
, «Fully Private Noninteractive Face Verification», IEEE Transactions on Information Forensics and Security, vol. 8, n.º 7, pp. 1101-1114, 2013.
TPFJPGTIFS11-FullyPrivateFaceVerif.pdf (745.76 KB)
, 
«CryptoDSPs for Cloud Privacy», in International Workshop on Cloud Information System Engineering (CISE), Hong Kong, China, 2010, vol. 6724.
, «Efficient Zero-Knowledge Watermark Detection with Improved Robustness to Sensitivity Attacks», EURASIP Journal on Information Security, 2007.
, «Videosurveillance and privacy: covering the two sides of the mirror with DRM», in ACM Workshop on Digital Rights Management (DRM), Chicago, IL, USA, 2009.
drm18-troncoso.pdf (417.17 KB)
, 
«Encrypted Domain Processing for Signal Processing Applications», University of Vigo, Vigo, 2012.
jr_troncoso_thesis.pdf (4.44 MB)
, 
«Efficient Protocols for Secure Adaptive Filtering», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Prage, Czech Republic, 2011, pp. 5860-5863.
secure_adaptive_filteringICASSP2011.pdf (115.55 KB)
, 
«A Secure Multidimensional Point Inclusion Protocol», in ACM Workshop on Multimedia and Security (MMSEC), Dallas, Texas, USA, 2007, pp. 109–120.
, «Secure Direct and Iterative Protocols for Solving Systems of Linear Equations», in Signal Processing in the Encrypted Domain (SPEED) Workshop, Lausanne, Switzerland, 2009, pp. 122–141.
secure_sle_speedws09.pdf (193.97 KB)
, 
«Fully Homomorphic Faces», in IEEE International Conference on Image Processing (ICIP), Lake Buena Vista, Florida, USA, 2012.
cryptofaces.pdf (213.56 KB)
, 
«Smart Detection of Line-Search Oracle Attacks», IEEE Transactions on Information Forensics and Security, vol. 12, n.º 3, pp. 588-603, 2017.
TIFS_smartOracle.pdf (3.73 MB)
, 
«Power Spectrum Blind Sampling Using Minimum Mean Square Error and Weighted Least Squares», in Asilomar Conference on Signals, Systems and Computers, 2013.
td_wls_mmse.pdf (294.2 KB)
, 
«Power spectrum blind sampling using optimal multicoset sampling patterns in the MSE sense», in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2014.
, «Link Adaptation Algorithms for Dual Polarization Mobile Satellite Systems», 9th EAI International Conference on Wireless and Satellite Systems, WISATS, vol. Wireless and Satellite Systems. Springer International Publishing, Oxford, pp. 52-61, 2017.
WiSATs2017_vf.pdf (310.76 KB)
, 
«Neural Network Aided Computation of Mutual Information for Adaptation of Spatial Modulation», IEEE Transactions on Communications, 2020.
SpatialModulation2020.pdf (1.28 MB)
, 
«Deep Learning Assisted Rate Adaptation in Spatial Modulation Links», in 16th International Symposium on Wireless Communication Systems (ISWCS), Oulu (Finland), 2019.
ISWCS_2019_UVigo_August_31_cr.pdf (375.26 KB)
, 