“Some remarks on the lattice form of the Steiglitz-McBride iteration”, IEEE Signal Processing Letters, vol. 6, pp. 290–292, 1999.
, “Some properties of the matrix exponential”, IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, vol. 48, pp. 213–215, 2001.
, “SNR Estimation for Multilevel Constellations Using Higher-Order Moments”, IEEE Transactions on Signal Processing, vol. 58, pp. 1515–1526, 2010. alvarez-diaz-tsp-10.pdf (295.93 KB)
, “Smart Grid Last-Mile Communications Model and Its Application to the Study of Leased Broadband Wired-Access”, IEEE Transactions on Smart Grid, vol. 4, pp. 5–12, 2013. Smart_Grid_Last-Mile_Communications_Model_and_its_Application_to_the_Study_of_Leased_Broadband_Wired-Access.pdf (298.72 KB)
, “Smart Detection of Line-Search Oracle Attacks”, IEEE Transactions on Information Forensics and Security, vol. 12, no. 3, pp. 588-603, 2017. TIFS_smartOracle.pdf (3.73 MB)
, “Sixth-Order Statistics-Based Non-Data-Aided SNR Estimation”, IEEE Communications Letters, vol. 11, pp. 351-353, 2007. lopezvalcarce_CL2006-1948.pdf (195.93 KB)
, “The SIMO Block Rayleigh Fading Channel Capacity Scaling With Number of Antennas, Bandwidth, and Coherence Length”, IEEE Journal on Selected Areas in Information Theory, vol. 3, pp. 54–68, 2022. FINAL_VERSION.pdf (528.1 KB)
, “Sidelobe Suppression for Multicarrier Signals via Structured Spectral Precoding”, IEEE Transactions on Communications, vol. 72, no. 6, pp. 3155-3168, 2024. TCOMM3357429.pdf (821.23 KB)
, “Security of lattice-based data hiding against the Watermarked Only Attack”, IEEE Transactions on Information Forensics and Security, vol. 3, pp. 593-610, 2008.
, “Security of lattice-based data hiding against the Known Message Attack”, IEEE Transactions on Information Forensics and Security, vol. 1, pp. 421-439, 2006. tifs06security.pdf (563.51 KB)
, “Security in automotive radar and vehicular networks”, Microwave Journal, 2016.
, “Secure Signal Processing in the Cloud: enabling technologies for privacy-preserving multimedia cloud processing”, IEEE Signal Processing Magazine, vol. 30, no. 2, pp. 29-41, 2013. cloudspm2013.pdf (965.61 KB)
, “Secure Adaptive Filtering”, IEEE Transactions on Information Forensics and Security, vol. 6, pp. 469 -485, 2011. TPPGTIFS11-Secure_Adaptive_Filtering.pdf (396.27 KB)
, “Second-order blind algorithms for adaptive recursive linear equalizers: Analysis and lattice implementation”, International Journal of Adaptive Control and Signal Processing, vol. 20, pp. 265–289, 2006.
, “Second order statistical properties of nonlinearly distorted PSK signals”, IEEE Communications Letters, vol. 7, pp. 323–325, 2003. VALCARCE_CL2002-915.pdf (60.04 KB)
, “Robustness Improvement of Known-Host-State Watermarking Using Host Statistics”, Signal Processing, vol. 86, pp. 1076-1088, 2006.
, “The robust SPR problem: design algorithms and new applications”, Signal Processing, vol. 76, pp. 269-283, 1999.
, “Robust analog precoding designs for millimeter wave MIMO transceivers with frequency and time division duplexing”, IEEE Trans. Communications, vol. 64, no. 11, pp. 4622 - 4634, 2016.
, “Revisiting multivariate ring learning with errors and its applications on lattice-based cryptography”, Mathematics, vol. 9, no. 8, 2021. PTGGP21.pdf (1.04 MB)
, “Realizable minimum mean-squared error channel shorteners”, IEEE Transactions on Signal Processing, vol. 53, pp. 4354–4362, 2005. T_SP_02192_2004.pdf (149.65 KB)
, “Realizable linear and decision feedback equalizers: properties and connections”, IEEE Transactions on Signal Processing, vol. 52, pp. 757–773, 2004.
, “Rational Dither Modulation: a high-rate data-hiding method robust to gain attacks”, IEEE Transactions on Signal Processing, vol. 53, pp. 3960-3975, 2005.
, “A Random Matrix Approach to the Forensic Analysis of Upscaled Images”, IEEE Transactions on Information Forensics and Security, vol. 12, no. 9, pp. 2115-2130, 2017. TIFS17_resampling.pdf (1.04 MB)
, “Quantization-Based Methods: Additive Attacks Performance Analysis”, Transactions on Data Hiding and Multimedia Security III, vol. 4920, pp. 70-90, 2008.
, “Quantization-Based Data-Hiding Robust to Linear Time-Invariant Filtering”, IEEE Transactions on Information Forensics and Security, vol. 3, pp. 137-152, 2008.
,