Publicacións en colaboración con investigadores/as de University of New Mexico (60)

2017

  1. Omics in fish mucosal immunity

    Developmental and Comparative Immunology, Vol. 75, pp. 99-108

2016

  1. V-DIFT: Vector-based dynamic information flow tracking with application to locating cryptographic keys for reverse engineering

    Proceedings - 2016 11th International Conference on Availability, Reliability and Security, ARES 2016

2015

  1. Bounding the errors in constructive Function approximation

    European Signal Processing Conference

  2. Electromagnetic scattering from vegetation cylindrical components

    IEEE Geoscience and Remote Sensing Letters, Vol. 12, Núm. 4, pp. 751-755

2013

  1. Exploiting geometrical structure for forensic applications of timing inference channels

    International Journal of Digital Crime and Forensics, Vol. 5, Núm. 1, pp. 54-69

  2. Fully private noninteractive face verification

    IEEE Transactions on Information Forensics and Security, Vol. 8, Núm. 7, pp. 1101-1114

  3. Locating Tor hidden services through an interval-based traffic-correlation attack

    2013 IEEE Conference on Communications and Network Security, CNS 2013

  4. The flow fingerprinting game

    Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, WIFS 2013

2012

  1. A least squares approach to user profiling in pool mix-based anonymous communication systems

    WIFS 2012 - Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security

  2. An adaptive feedback canceller for full-duplex relays based on spectrum shaping

    IEEE Journal on Selected Areas in Communications, Vol. 30, Núm. 8, pp. 1566-1577

  3. Exposing original and duplicated regions using SIFT features and resampling traces

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

  4. Fingerprinting a flow of messages to an anonymous

    2012 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS)

  5. Fingerprinting a flow of messages to an anonymous server

    WIFS 2012 - Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security

  6. Fully homomorphic faces

    Proceedings - International Conference on Image Processing, ICIP

  7. Multiple electromagnetic scattering from two finite oriented cylinders at oblique incidence

    International Geoscience and Remote Sensing Symposium (IGARSS)

  8. Overlay cognitive transmission in a multicarrier broadcast network with dominant line of sight reception

    IEEE Transactions on Wireless Communications, Vol. 11, Núm. 11, pp. 4128-4139