Publicacións en colaboración con investigadores/as de University of New Mexico (54)

2016

  1. V-DIFT: Vector-based dynamic information flow tracking with application to locating cryptographic keys for reverse engineering

    Proceedings - 2016 11th International Conference on Availability, Reliability and Security, ARES 2016

2015

  1. Bounding the errors in constructive Function approximation

    European Signal Processing Conference

  2. Electromagnetic scattering from vegetation cylindrical components

    IEEE Geoscience and Remote Sensing Letters, Vol. 12, Núm. 4, pp. 751-755

2013

  1. Exploiting geometrical structure for forensic applications of timing inference channels

    International Journal of Digital Crime and Forensics, Vol. 5, Núm. 1, pp. 54-69

  2. Fully private noninteractive face verification

    IEEE Transactions on Information Forensics and Security, Vol. 8, Núm. 7, pp. 1101-1114

  3. Locating Tor hidden services through an interval-based traffic-correlation attack

    2013 IEEE Conference on Communications and Network Security, CNS 2013

  4. The flow fingerprinting game

    Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, WIFS 2013

2012

  1. A least squares approach to user profiling in pool mix-based anonymous communication systems

    WIFS 2012 - Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security

  2. An adaptive feedback canceller for full-duplex relays based on spectrum shaping

    IEEE Journal on Selected Areas in Communications, Vol. 30, Núm. 8, pp. 1566-1577

  3. Exposing original and duplicated regions using SIFT features and resampling traces

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

  4. Fingerprinting a flow of messages to an anonymous

    2012 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS)

  5. Fingerprinting a flow of messages to an anonymous server

    WIFS 2012 - Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security

  6. Fully homomorphic faces

    Proceedings - International Conference on Image Processing, ICIP

  7. Multiple electromagnetic scattering from two finite oriented cylinders at oblique incidence

    International Geoscience and Remote Sensing Symposium (IGARSS)

  8. Overlay cognitive transmission in a multicarrier broadcast network with dominant line of sight reception

    IEEE Transactions on Wireless Communications, Vol. 11, Núm. 11, pp. 4128-4139

  9. Understanding statistical disclosure: A least squares approach

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

  10. Witsenhausen's counterexample and its links with multimedia security problems

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2011

  1. A new method for perspective correction of document images

    Proceedings of SPIE - The International Society for Optical Engineering

  2. A subspace-based policy enforcement method in dynamic spectrum leasing schemes

    International Conference on Communication Technology Proceedings, ICCT

  3. CryptoDSPs for cloud privacy

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)