Search

Your search keyword '"Pérez-González, Fernando"' showing total 541 results

Search Constraints

Start Over You searched for: Author "Pérez-González, Fernando" Remove constraint Author: "Pérez-González, Fernando"
541 results on '"Pérez-González, Fernando"'

Search Results

1. Exploring Federated Learning Dynamics for Black-and-White-Box DNN Traitor Tracing

2. Norm inequalities for weighted Dirichlet spaces with applications to conformal maps

3. Information Forensics and Security: A quarter-century-long journey

4. Towards Traitor Tracing in Black-and-White-Box DNN Watermarking with Tardos-based Codes

5. An Adaptive Method for Camera Attribution under Complex Radial Distortion Corrections

6. GPU-accelerated SIFT-aided source identification of stabilized videos

7. PRNU Emphasis: a Generalization of the Multiplicative Model

8. Integral means of derivatives of univalent functions in Hardy spaces

9. On the Information Leakage of Camera Fingerprint Estimates

10. Filter Design for Delay-Based Anonymous Communications

11. Understanding the Effects of Real-World Behavior in Statistical Disclosure Attacks

12. A Least Squares Approach to the Static Traffic Analysis of High-Latency Anonymous Communication Systems

13. Meet the Family of Statistical Disclosure Attacks

14. MPEG-2 Prediction Residue Analysis

17. Rethinking Location Privacy for Unknown Mobility Behaviors

18. Multivariate Cryptosystems for Secure Processing of Multidimensional Signals

19. Is Geo-Indistinguishability What You Are Looking for?

20. Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms

21. Derivation of the Asymptotic Eigenvalue Distribution for Causal 2D-AR Models under Upscaling

22. On Ring Learning with Errors over the Tensor Product of Number Fields

23. Number Theoretic Transforms for Secure Signal Processing

24. Report on Dirty Paper Coding Estimation with multidimensional lattices

25. Fast sequential forensic camera identification

27. A highly optimized flow-correlation attack

29. The Flow Fingerprinting Game

30. Linking Correlated Network Flows through Packet Timing: a Game-Theoretic Approach

31. Operator theoretic differences between Hardy and Dirichlet-type spaces

32. Information Forensics and Security: A quarter-century-long journey

33. Random Matrix Theory for Modeling the Eigenvalue Distribution of Images Under Upscaling

34. Introducing the TRUMPET project: TRUstworthy Multi-site Privacy Enhancing Technologies

37. Multimedia Operator Chain Topology and Ordering Estimation Based on Detection and Information Theoretic Tools

39. Witsenhausen’s Counterexample and Its Links with Multimedia Security Problems

40. Exposing Original and Duplicated Regions Using SIFT Features and Resampling Traces

41. Do Dummies Pay Off? Limits of Dummy Traffic Protection in Anonymous Communications

42. Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis

43. Information-Theoretic Analysis of Security in Side-Informed Data Hiding

46. Understanding Statistical Disclosure: A Least Squares Approach

47. CryptoDSPs for Cloud Privacy

48. Dither Modulation in the Logarithmic Domain

49. Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding

Catalog

Books, media, physical & digital resources