Export 68 results:
[ Author
Filters: First Letter Of Title is S [Clear All Filters]
“Software Defined Radio: A Brief Introduction”, XoveTIC Congress. MDPI, A Coruña, Spain, 2018.
Artigo_SDR_XoveTIC.pdf (1.09 MB)
, 
“Spatial Modulation Link Adaptation: a Deep Learning Approach”, in 2019 53rd Asilomar Conference on Signals, Systems, and Computers, California, 2019.
Asilomar_2019_vf.pdf (314.11 KB)
, 
“Spatial Modulation for Beyond 5G Communications: Capacity Calculation and Link Adaptation”, in 2nd XoveTIC Conference, A Coruña (Spain), 2019.
XoveTIC2019_published.pdf (377.92 KB)
, 
“Smart Detection of Line-Search Oracle Attacks”, IEEE Transactions on Information Forensics and Security, vol. 12, no. 3, pp. 588-603, 2017.
TIFS_smartOracle.pdf (3.73 MB)
, 
“Secure and Private Medical Clouds using Encrypted Processing”, in Virtual Physiological Human (VPH), Brussels, Belgium, 2010.
, “Secure Adaptive Filtering”, IEEE Transactions on Information Forensics and Security, vol. 6, pp. 469 -485, 2011.
TPPGTIFS11-Secure_Adaptive_Filtering.pdf (396.27 KB)
, 
“A Secure Multidimensional Point Inclusion Protocol”, in ACM Workshop on Multimedia and Security (MMSEC), Dallas, Texas, USA, 2007, pp. 109–120.
, “Secure Signal Processing in the Cloud: enabling technologies for privacy-preserving multimedia cloud processing”, IEEE Signal Processing Magazine, vol. 30, no. 2, pp. 29-41, 2013.
cloudspm2013.pdf (965.61 KB)
, 
“Skewed Log-Stable model for natural images pixel block-variance”, in IEEE International Conference on Image Processing (ICIP), Cairo, Egypt, 2009.
, “Secure Direct and Iterative Protocols for Solving Systems of Linear Equations”, in Signal Processing in the Encrypted Domain (SPEED) Workshop, Lausanne, Switzerland, 2009, pp. 122–141.
secure_sle_speedws09.pdf (193.97 KB)
, 
“Secure Genomic Susceptibility Testing based on Lattice Encryption”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), New Orleans, USA, 2017.
TPP17_ICASSP17.pdf (403.53 KB)
, 
“Satellite Communications: Research Trends and Open Issues”, in International Workshop on Satellite and Space Communications (IWSSC), 2007.
, “Set-Membership Identification of Resampled Signals”, in IEEE International Workshop on Information Forensics and Security (WIFS), Guangzhou, China, 2013.
wifs13_dvazquez_pcomesan_fperez.pdf (171.35 KB)
, 
“An SVD Approach to Forensic Image Resampling Detection”, in EUSIPCO, 2015, pp. 2112-2116.
eusipco15_dvazquez_pcomesan_fperez.pdf (169.61 KB)
, 
“Spectrum Sensing Exploiting Guard Bands and Weak Channels”, IEEE Trans. on Signal Processing, vol. 59, no. 12, pp. 6045-6057, 2011.
double_submitted.pdf (373.72 KB)
, 
“Solving the Node Localization Problem in WSNs by a Two-objective Evolutionary Algorithm and Gradient Descent”, in the 3-th IEEE World Congress on Nature and Biologically Inspired Computing (NaBIC 2011), 2011.
nabic2011.pdf (227.26 KB)
, 
“A study on the Application of Different Two-objective Evolutionary Algorithms to the Node Localization Problem in Wireless Sensor Networks”, in IEEE International Conference on Intelligent Systems Design and Applications (ISDA), 2011.
isda2011_1.pdf (212.19 KB)
, 
“Security in automotive radar and vehicular networks”, Microwave Journal, 2016.
,