Grupo de Procesado de Sinal en Comunicacións
SC10
University of New Mexico
Albuquerque, Estados UnidosPublicacións en colaboración con investigadores/as de University of New Mexico (51)
2016
-
V-DIFT: Vector-based dynamic information flow tracking with application to locating cryptographic keys for reverse engineering
Proceedings - 2016 11th International Conference on Availability, Reliability and Security, ARES 2016
2015
-
Bounding the errors in constructive Function approximation
European Signal Processing Conference
2013
-
Exploiting geometrical structure for forensic applications of timing inference channels
International Journal of Digital Crime and Forensics, Vol. 5, Núm. 1, pp. 54-69
-
Fully private noninteractive face verification
IEEE Transactions on Information Forensics and Security, Vol. 8, Núm. 7, pp. 1101-1114
-
Locating Tor hidden services through an interval-based traffic-correlation attack
2013 IEEE Conference on Communications and Network Security, CNS 2013
-
The flow fingerprinting game
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, WIFS 2013
2012
-
A least squares approach to user profiling in pool mix-based anonymous communication systems
WIFS 2012 - Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security
-
An adaptive feedback canceller for full-duplex relays based on spectrum shaping
IEEE Journal on Selected Areas in Communications, Vol. 30, Núm. 8, pp. 1566-1577
-
Exposing original and duplicated regions using SIFT features and resampling traces
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
-
Fingerprinting a flow of messages to an anonymous
2012 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS)
-
Fingerprinting a flow of messages to an anonymous server
WIFS 2012 - Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security
-
Fully homomorphic faces
Proceedings - International Conference on Image Processing, ICIP
-
Overlay cognitive transmission in a multicarrier broadcast network with dominant line of sight reception
IEEE Transactions on Wireless Communications, Vol. 11, Núm. 11, pp. 4128-4139
-
Understanding statistical disclosure: A least squares approach
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
-
Witsenhausen's counterexample and its links with multimedia security problems
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2011
-
A new method for perspective correction of document images
Proceedings of SPIE - The International Society for Optical Engineering
-
A subspace-based policy enforcement method in dynamic spectrum leasing schemes
International Conference on Communication Technology Proceedings, ICCT
-
CryptoDSPs for cloud privacy
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
-
Efficient protocols for secure adaptive filtering
ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings
-
Fingerprinting Tor's hidden service log files using a timing channel
2011 IEEE International Workshop on Information Forensics and Security, WIFS 2011