Primary tabs
“Technical Report TSC/FPG/20032014: Performance Analysis of the Least Squares Disclosure Attack with Time-Varying User Behavior”, 2014.
techrep.pdf (267.69 KB)
, 
“Technical Report TSC/SO/02052014: Derivation of the Mean Squared Error of the Least Squares Estimator in a Timed Pool Mix with Dummy Traffic”, 2014.
trpets14.pdf (205.16 KB)
, 
“Technical Report UV/TSC/APU/02102014: Multivariate Ring Learning with Errors”, University of Vigo, 2014.
TRMLWE2014.pdf (349.18 KB)
, 
“Transportation-theoretic image counterforensics to first significant digit histogram forensics”, in IEEE International Conference on Audio, Speech, and Signal Processing (ICASSP), Florence, Italy, 2014.
cecilia_icassp2014.pdf (390.14 KB)
, 
“Understanding the Effects of Real-World Behavior in Statistical Disclosure Attacks”, in IEEE Workshop on Information Forensics and Security, 2014.
wifs14.pdf (347.72 KB)
, 
“Coping with the enemy: Advances in adversary-aware signal processing”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Vancouver, Canada, 2013, pp. 8682–8686.
, “The flow fingerprinting game”, in IEEE International Workshop on Information Forensics and Security (WIFS), Guangzhou, China, 2013, pp. 97–102.
wifs13_elices.pdf (534.58 KB)
, 
“Forensic analysis of full-frame linearly filtered JPEG images”, in IEEE International Conference on Image Processing, Melbourne, Australia, 2013, pp. 4517-4521.
conotter.pdf (780.94 KB)
, 
“Fully Private Noninteractive Face Verification”, IEEE Transactions on Information Forensics and Security, vol. 8, no. 7, pp. 1101-1114, 2013.
TPFJPGTIFS11-FullyPrivateFaceVerif.pdf (745.76 KB)
, 
“Joint detection of full-frame linear filtering and JPEG compression in digital images”, in IEEE International Workshop on Information Forensics and Security, Guangzhou, China, 2013.
wifs13_jpeg.pdf (1.02 MB)
, 
“Least Squares Disclosure Attacks: User Profiling for Mix-based Anonymous Communication Systems”, University of Vigo, Vigo, 2013.
lssda-main-tifs.pdf (516.78 KB)
, 
“Locating Tor hidden services through an interval-based traffic-correlation attack”, 2013 IEEE Conference on Communications and Network Security (CNS). Washington, DC, pp. 385–386, 2013.
elices_cns.pdf (174.69 KB)
, 
“Meet the Family of Statistical Disclosure Attacks”, in GlobalSIP, 2013.
main-globalsip.pdf (115.96 KB)
, 
“Near optimal detection of quantized signals and application to JPEG forensics”, 2013 IEEE International Workshop on Information Forensics and Security (WIFS). Guangzhou, China, pp. 168-173, 2013.
wifs13_bianchi.pdf (293.74 KB)
, 
“Optimal counterforensics for histogram-based forensics”, in IEEE International Conference on Audio, Speech and Signal Processing, Vancouver, Canada, 2013, pp. 3048-3052.
icassp13.pdf (84.89 KB)
Source code (5.47 MB)
, 

“Privacy-Preserving Data Aggregation in Smart Metering Systems: An Overview”, IEEE Signal Processing Magazine, vol. 30, no. 2, pp. 75-86, 2013.
smartmeteringspm2013.pdf (547.21 KB)
, 
“Quantization lattice estimation for multimedia forensics”, in IEEE International Conference on Image Processing, Melbourne, Australia, 2013, pp. 4452-4456.
icip13.pdf (88.9 KB)
, 
“Secure Signal Processing in the Cloud: enabling technologies for privacy-preserving multimedia cloud processing”, IEEE Signal Processing Magazine, vol. 30, no. 2, pp. 29-41, 2013.
cloudspm2013.pdf (965.61 KB)
, 
“Set-Membership Identification of Resampled Signals”, in IEEE International Workshop on Information Forensics and Security (WIFS), Guangzhou, China, 2013.
wifs13_dvazquez_pcomesan_fperez.pdf (171.35 KB)
, 
“Taking advantage of source correlation in forensic analysis”, in IEEE International Workshop on Multimedia Signal Processing, Pula (Sardinia), Italy, 2013, pp. 159-164.
mmsp13.pdf (167.27 KB)
, 
“An Adaptive Feedback Canceller for Full-Duplex Relays Based on Spectrum Shaping”, IEEE J. Selected Areas in Communications, vol. 30, no. 8, pp. 1566 - 1577, 2012.
jsac_paper.pdf (656.09 KB)
, 
“Fingerprinting a flow of messages to an anonymous server.”, in IEEE International Workshop on Information Forensics and Security (WIFS), Tenerife, Spain, 2012, pp. 97–102.
wifs2012_elices.pdf (277.81 KB)
, 
“Fully Homomorphic Faces”, in IEEE International Conference on Image Processing (ICIP), Lake Buena Vista, Florida, USA, 2012.
cryptofaces.pdf (213.56 KB)
, 
“A Least Squares approach to user profiling in pool mix-based anonymous communication systems.”, in IEEE International Workshop on Information Forensics and Security (WIFS), Tenerife, Spain, 2012, pp. 115–120.
wifs2012_pg.pdf (321.08 KB)
, 
“Multimedia operator chain topology and ordering estimation based on detection and information theoretic tools”, in International Workshop on Digital-forensics and Watermarking, Shanghai, China, 2012.
iwdw12.pdf (326.11 KB)
, 