Export 125 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is C  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B. Cortiñas-Lorenzo and Pérez-González, F., Adam and the Ants: On the Influence of the Optimization Algorithm on the Detectability of DNN Watermarks, vol. 22, no. 12, p. 36, 2020.
T. Ramírez, Mosquera, C., Caus, M., Pastore, A., Alagha, N., and Noels, N., Adjacent Beams Resource Sharing to Serve Hot Spots : A Rate Splitting Approach, in 36th International Communications Satellite Systems Conference (ICSSC), Niagara Falls, Canada, 2018.PDF icon ADJACENT_BEAMS_RESOURCE_SHARING_TO_SERVE_HOT_SPOTS_A_RATE_SPLITTING_APPROACH.pdf (756.71 KB)
P. Comesaña, Pérez-González, F., and Willems, F. M. J., Applying Erez and Ten Brink's Dirty Paper Codes to Data-Hiding, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2005, vol. 5306, pp. 592-601.PDF icon spie05_dpc.pdf (165.56 KB)
M. Barni, Comesaña, P., Pérez-González, F., and Tondi, B., Are you threatening me? Towards smart detectors in watermarking, in Media Watermarking, Security, and Forensics, San Francisco, CA, USA, 2014.PDF icon spie14_2.0.pdf (430.73 KB)
P. Comesaña, Merhav, N., and Barni, M., Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, 2008, vol. 6819.PDF icon spie08one-bit-wm.pdf (277.85 KB)
P. Comesaña, Merhav, N., and Barni, M., Asymptotically Optimum Universal Watermark Embedding and Detection in the High-SNR Regime, IEEE Transactions on Information Theory, vol. 56, pp. 2804-2815, 2010.PDF icon tit-2010.pdf (240.81 KB)
J. F. Schmidt, Cousseau, J. E., Wichman, R., and Werner, S., Bit Loading Using Imperfect CSIT for Prediction-Based Resource Allocation in Mobile OFDMA, Vehicular Technology, IEEE Transactions on, vol. 60, pp. 4082 -4088, 2011.
F. Balado, Pérez-González, F., and Comesaña, P., Blind iterative decoding of side-informed data hiding using the Expectation-Maximization algorithm, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2004, vol. 5306, pp. 805-815.PDF icon spie04em.pdf (434.03 KB)
P. Comesaña, Pérez-Freire, L., and Pérez-González, F., Blind Newton Sensitivity Attack, IEE Proceedings on Information Security, vol. 153, pp. 115-125, 2006.File iee-06bnsa.ps (1.67 MB)
P. Comesaña, Pérez-Freire, L., and Pérez-González, F., The blind Newton senstivity attack, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2006, vol. 5306, pp. 592-601.File spie06_sensitivity.ps (1.62 MB)
J. R. Troncoso-Pastoriza and Caputo, S., Bootstrap-based Proxy Reencryption for Private Multi-user Computing, in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014.PDF icon TroncosoCaputo-BootstrappingMultiKey.pdf (795.89 KB)
P. Comesaña and Pérez-González, F., Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks, EURASIP Journal on Information Security, vol. 2007, 2007.PDF icon jis07bows.pdf (436.69 KB)File Source code available here. (8.51 MB)
P. Comesaña and Pérez-González, F., On the capacity of stegosystems, in ACM Workshop on Multimedia and Security (MMSEC), Dallas, TX, USA, 2007, pp. 1261-1264.PDF icon acm07stego.pdf (198.41 KB)
F. Gomez-Cuba, Chowdhury, M., Manolakos, A., Erkip, E., and Goldsmith, A. J., Capacity scaling in a non-coherent wideband massive SIMO block fading channel, IEEE Transactions on Wireless Communications, vol. 18, pp. 5691–5704, 2019.PDF icon FINAL_VERSION.pdf (2.5 MB)
M. Chowdhury, Manolakos, A., Gomez-Cuba, F., Erkip, E., and Goldsmith, A. J., Capacity scaling in noncoherent wideband massive SIMO systems, in IEEE Information Theory Workshop (ITW), 2015.
N. González-Prelcic, Mosquera, C., Degara-Quintela, N., and Currais, A., A Channel Model for the Galician Low Voltage Main Network, in International Symposium on Power Line Communications and Its Applications (ISPLC), Malmo, Sweden, 2001.
J. F. Schmidt, Costas-Sanz, S., and López-Valcarce, R., Choose Your Subcarriers Wisely: Active Interference Cancellation for Cognitive OFDM, IEEE Journal on Emerging and Selected Topics in Circuits and Systems, vol. 3, no. 4, pp. 615-625, 2013.PDF icon spectrumshaping_final.pdf (3.05 MB)
R. Elasmi-Ksibi, Cherif, S., López-Valcarce, R., and Besbes, H., Closed-form real single-tone frequency estimator based on a normalized IIR notch filter, Signal Processing, vol. 90, pp. 1905-1915, 2010.PDF icon ieee_version_finale_july_2008.pdf (193.5 KB)
S. Vicini, Alberti, F., Notario, N., Crespo, A., Troncoso-Pastoriza, J. R., and Sanna, A., Co-creating Security-and-Privacy-by-Design Systems, in International Conference on Availability, Reliability and Security (ARES), Salzburg, Germany, 2016, pp. 768-775.
J. Muñoz, Vales-Alonso, J., Quiñoy-García, F., Costas-Sanz, S., Pillado, M., González-Castaño, F. J., García-Sanchez, M., López-Valcarce, R., and López-Bravo, C., A Cognitive Mobile BTS Solution with Software-Defined Radioelectric Sensing, Sensors, vol. 13, no. 2, pp. 2051-2075, 2013.PDF icon sensors-13-02051.pdf (2.93 MB)
A. Artés-Rodríguez, Pérez-González, F., Cid-Sueiro, J., López-Valcarce, R., Mosquera, C., and Pérez-Cruz, F., Comunicaciones Digitales. Pearson - Prentice Hall, 2007.
E. Rodríguez-Lois, Vázquez-Padín, D., Pérez-González, F., and Comesaña, P., A Critical Look into Quantization Table Generalization Capabilities of CNN-based Double JPEG Compression Detection, in EUSIPCO, Belgrade, Serbia, 2022.PDF icon EUSIPCO22_erodriguez_dvazquez_fperez_pcomesan.pdf (518.97 KB)