Publicacións en colaboración con investigadores/as de Gradiant, Centro Tecnolóxico de Telecomunicacións de Galicia (65)

2019

  1. A practical approach for small cell sharing using a time-multiplexing scheme

    Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST

  2. Generalized Presentation Attack Detection: A face anti-spoofing evaluation proposal

    2019 International Conference on Biometrics, ICB 2019

2016

  1. Lightweight container-based OpenEPC deployment and its evaluation

    IEEE NETSOFT 2016 - 2016 IEEE NetSoft Conference and Workshops: Software-Defined Infrastructure for Networks, Clouds, IoT and Services

2015

  1. A software architecture for virtualized educational multimedia games in IPTV environments

    Software - Practice and Experience, Vol. 45, Núm. 2, pp. 143-160

  2. Providing iot services in smart cities through dynamic augmented reality markers

    Sensors (Switzerland), Vol. 15, Núm. 7, pp. 16083-16104

  3. Your Phone as a Personal Emergency Beacon: A Portable GSM Base Station to Locate Lost Persons

    IEEE Industrial Electronics Magazine, Vol. 9, Núm. 4, pp. 49-57

2014

  1. A Benford-Fourier JPEG compression detector

    2014 IEEE International Conference on Image Processing, ICIP 2014

  2. A least squares approach to the static traffic analysis of high-latency anonymous communication systems

    IEEE Transactions on Information Forensics and Security, Vol. 9, Núm. 9, pp. 1341-1355

  3. A new look at ML step-size estimation for Scalar Costa scheme data hiding

    2014 IEEE International Conference on Image Processing, ICIP 2014

  4. A semantic approach to improve neighborhood formation in collaborative recommender systems

    Expert Systems with Applications, Vol. 41, Núm. 17, pp. 7776-7788

  5. Flat fading channel estimation based on Dirty Paper Coding

    ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings

  6. Is Cooperative Spectrum Leasing by third-party relays advantageous in next-generation cellular networks?

    20th European Wireless Conference, EW 2014

  7. The optimal attack to histogram-based forensic detectors is simple(x)

    2014 IEEE International Workshop on Information Forensics and Security, WIFS 2014

  8. Transportation-theoretic image counterforensics to First Significant Digit histogram forensics

    ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings

  9. Understanding the effects of real-world behavior in statistical disclosure attacks

    2014 IEEE International Workshop on Information Forensics and Security, WIFS 2014

2013

  1. Cancelling self-interference in full-duplex relays without angle-of-arrival information

    ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings