Conference Paper
-
Lerch-Hostalot D.,Megias D.
"Real-world actor-based image steganalysis via classifier inconsistency detection".
ACM International Conference Proceeding Series 2023. DOI
-
Thankappan M.,Rifà-Pous H.,Garrigues C.
"Multi-channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks and Their Attack Signatures".
IFIP Advances in Information and Communication Technology vol. 670, 2023. DOI
-
Araghi T.K.,Megías D.,Rosales A.
"Toward the Selection of a Lightweight Authentication Technique for the Security of Smart Homes: Framework Architecture Based on a User Centric Design".
Lecture Notes in Networks and Systems vol. 711 LNNS, 2023. DOI
-
Paul S.,Salas J.,Torra V.
"Edge Local Differential Privacy for Dynamic Graphs".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 14097 LNCS, 2023. DOI
-
Fakolujo O.,Qureshi A.
"Analysis of Detection Systems in a Software-Defined Network".
Lecture Notes in Networks and Systems vol. 739 LNNS, 2023. DOI
-
González-Zelaya V.,Salas J.,Prangle D.,Missier P.
"Preprocessing Matters: Automated Pipeline Selection for Fair Classification".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 13890 LNCS, 2023. DOI
-
Kabir F.,Megías D.,Araghi T.K.
"WaterCrypt: Joint Watermarking and Encryption Scheme for Secure Privacy-Preserving Data Aggregation in Smart Metering Systems".
Lecture Notes in Networks and Systems vol. 614 LNNS, 2023. DOI
-
Salas J.,González-Zelaya V.,Torra V.,Megías D.
"Differentially Private Graph Publishing Through Noise-Graph Addition".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 13890 LNCS, 2023. DOI
-
Araghi T.K.,Megías D.,Rosales A.
"Evaluation and Analysis of Reversible Watermarking Techniques in WSN for Secure, Lightweight Design of IoT Applications: A Survey".
Lecture Notes in Networks and Systems vol. 652 LNNS, 2023. DOI
-
Rahmanikivi M.,Pérez-Solà C.,Garcia-Font V.
"An Empirical Analysis of Running a Bitcoin Minimal Wallet on an IoT Device".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 13619 LNCS, 2023. DOI
-
Salas J.,Torra V.,Megías D.
"Towards Measuring Fairness for Local Differential Privacy".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 13619 LNCS, 2023. DOI
-
Khan S.,Qureshi A.
"Cyberbullying Detection in Urdu Language Using Machine Learning".
2022 International Conference on Emerging Trends in Electrical, Control, and Telecommunication Engineering, ETECTE 2022 - Proceedings 2022. DOI
-
Arnedo-Moreno J.,Garcia-Font V.
"Research opportunities in the application of blockchain in video games: A scoping review".
2022 IEEE International Conference on Omni-Layer Intelligent Systems, COINS 2022 2022. DOI
-
Alatrista-Salas H.,Montalvo-Garcia P.,Nunez-del-Prado M.,Salas J.
"Geolocated Data Generation and Protection Using Generative Adversarial Networks".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 13408 LNAI, 2022. DOI
-
Hospital J.,Megías D.,Mazurczyk W.
"Retransmission steganography in real-world scenarios: A practical study".
ACM International Conference Proceeding Series 2021. DOI
-
Megías D.,Kuribayashi M.,Rosales A.,Mazurczyk W.
"DISSIMILAR: Towards fake news detection using information hiding, signal processing and machine learning".
ACM International Conference Proceeding Series 2021. DOI
-
Qureshi A.,Megias D.,Kuribayashi M.
"Detecting Deepfake Videos using Digital Watermarking".
2021 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA ASC 2021 - Proceedings 2021.
-
Nunez-del-Prado M.,Salas J.,Alatrista-Salas H.,Maehara-Aliaga Y.,Megías D.
"Are Sequential Patterns Shareable? Ensuring Individuals’ Privacy".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 12898 LNAI, 2021. DOI
-
González-Zelaya V.,Salas J.,Prangle D.,Missier P.
"Optimising fairness through parametrised data sampling".
Advances in Database Technology - EDBT vol. 2021-March, 2021. DOI
-
Qureshi A.,Afaqui M.S.,Salas J.
"IoTFC: A Secure and Privacy Preserving Architecture for Smart Buildings".
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST vol. 344, 2021. DOI
-
Megías D.
"Data hiding: New opportunities for security and privacy?".
ACM International Conference Proceeding Series 2020. DOI
-
Arnedo-Moreno J.,Garcia-Solorzano D.
"Programming is Fun! A Survey of the STEAM Digital Distribution Platform".
2020 IEEE 32nd Conference on Software Engineering Education and Training, CSEE and T 2020 2020. DOI
-
Gil R.M.,Arnedo-Moreno J.
"Designing an activity to help reflect on "healthy Engagement vs Video Game Addiction"".
ACM International Conference Proceeding Series 2020. DOI
-
Govender T.,Arnedo-Moreno J.
"A Survey on Gamification Elements in Mobile Language-Learning Applications".
ACM International Conference Proceeding Series 2020. DOI
-
Bourdin P.,Calvet L.,Tesconi S.,Arnedo-Moreno J.
"Reflecting on Attitudes towards Death through the use of Immersive Virtual Reality Commercial Video Games".
ACM International Conference Proceeding Series 2020. DOI
-
Arnedo-Moreno J.,Gonzalez-González C.
"4th International Symposium on Gamification and Games for Learning (GamiLearn'20)".
ACM International Conference Proceeding Series 2020. DOI
-
Faraj O.,Megías D.,Ahmad A.M.,Garcia-Alfaro J.
"Taxonomy and challenges in machine learning-based approaches to detect attacks in the internet of things".
ACM International Conference Proceeding Series 2020. DOI
-
Pérez-Solà C.,Herrera-Joancomartí J.
"BArt: Trading digital contents through digital assets".
Concurrency and Computation: Practice and Experience vol. 32, num. 12, 2020. DOI
-
Salas J.,Torra V.
"Differentially private graph publishing and randomized response for collaborative filtering".
ICETE 2020 - Proceedings of the 17th International Joint Conference on e-Business and Telecommunications vol. 3, 2020. DOI
-
Oleas-Chávez L.E.,Pérez-Solà C.,Herrera-Joacomartí J.
"On the Selection of the LN Client Implementation Parameters".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 12484 LNCS, 2020. DOI
-
Salas J.,González-Zelaya V.
"Fair-MDAV: An algorithm for fair privacy by microaggregation".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 12256 LNAI, 2020. DOI
-
Pérez-Solà C.,Ranchal-Pedrosa A.,Herrera-Joancomartí J.,Navarro-Arribas G.,Garcia-Alfaro J.
"LockDown: Balance Availability Attack Against Lightning Network Channels".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 12059 LNCS, 2020. DOI
-
Salas J.,Nunez-del-Prado M.
"Privacy Preservation and Inference with Minimal Mobility Information".
Communications in Computer and Information Science vol. 1070 CCIS, 2020. DOI
-
Qureshi A.,Megias D.
"Blockchain-based P2P multimedia content distribution using collusion-resistant fingerprinting".
2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA ASC 2019 2019. DOI
-
Casas-Roma J.,Arnedo-Moreno J.
"From games to moral agents: Towards a model for moral actions".
Frontiers in Artificial Intelligence and Applications vol. 319, 2019. DOI
-
Herrera-Joancomartí J.,Navarro-Arribas G.,Ranchal-Pedrosa A.,Pérez-Solà C.,Garcia-Alfaro J.
"On the difficulty of hiding the balance of lightning network channels".
AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security 2019. DOI
-
Lerch-Hostalot D.,Megías D.
"Detection of classifier inconsistencies in image steganalysis".
IH and MMSec 2019 - Proceedings of the ACM Workshop on Information Hiding and Multimedia Security 2019. DOI
-
Mora A.,Tondello G.F.,Calvet L.,González C.,Arnedo-Moreno J.,Nacke L.E.
"The quest for a better tailoring of gameful design: An analysis of player type preferences".
ACM International Conference Proceeding Series 2019. DOI
-
Gil R.M.,González C.,Paderewski P.,Arnedo-Moreno J.,Domenech M.,De Frutos M.L.
"Z generation and fortnite: New ethical paradigms in video games design".
ACM International Conference Proceeding Series 2019. DOI
-
Carrere-Molina J.,Subirats L.,Casas-Roma J.
"Towards an analysis of post-transcriptional gene regulation in psoriasis via microRNAs using machine learning algorithms".
Proceedings - IEEE Symposium on Computer-Based Medical Systems vol. 2019-June, 2019. DOI
-
Carmona F.,Conesa J.,Casas-Roma J.
"Towards the analysis of how anonymization affects usefulness of health data in the context of machine learning".
Proceedings - IEEE Symposium on Computer-Based Medical Systems vol. 2019-June, 2019. DOI
-
Zola F.,Perez-Sola C.,Zubia J.E.,Eguimendia M.,Herrera-Joancomarti J.
"Kriptosare.gen, a Dockerized Bitcoin Testbed: Analysis of Server Performance".
2019 10th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2019 - Proceedings and Workshop 2019. DOI
-
Domingo-Ferrer J.,Perez-Sola C.,Blanco-Justicia A.
"Collaborative explanation of deep models with limited interaction for trade secret and privacy preservation".
The Web Conference 2019 - Companion of the World Wide Web Conference, WWW 2019 2019. DOI
-
Casas-Roma J.,Arnedo-Moreno J.
"Categorizing Morality Systems Through the Lens of Fallout".
12th Digital Games Research Association International Conference, DiGRA 2019 2019.
-
Torra V.,Salas J.
"Graph Perturbation as Noise Graph Addition: A New Perspective for Graph Anonymization".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 11737 LNCS, 2019. DOI
-
Delgado-Segura S.,Bakshi S.,Pérez-Solà C.,Litton J.,Pachulski A.,Miller A.,Bhattacharjee B.
"TxProbe: Discovering Bitcoin’s Network Topology Using Orphan Transactions".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 11598 LNCS, 2019. DOI
-
Casas-Roma J.,Nelson M.J.,Arnedo-Moreno J.,Gaudl S.E.,Saunders R.
"Towards enhancing NPCs' morality: The case of the elder Scrolls IV: Oblivion".
2019 AISB Convention 2019.
-
Arnedo-Moreno J.,Tesconi S.,Marco M.J.,García D.,Fondo M.
"A study on the use of gameful approaches in self-paced "learn to code" (SPL2C) apps".
CEUR Workshop Proceedings vol. 2497, 2019.
-
Parada R.,Font J.,Casas-Roma J.
"Forecasting Water Levels of Catalan Reservoirs".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 11676 LNAI, 2019. DOI
-
Casas-Roma J.,Nelson M.J.,Arnedo-Moreno J.,Gaudl S.E.,Saunders R.
"Towards simulated morality systems: Role-playing games as artificial societies".
ICAART 2019 - Proceedings of the 11th International Conference on Agents and Artificial Intelligence vol. 1, 2019. DOI
-
Delgado-Segura S.,Pérez-Solà C.,Navarro-Arribas G.,Herrera-Joancomartí J.
"Analysis of the Bitcoin UTXO set".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 10958 LNCS, 2019. DOI
-
Kheddar H.,Megias D.,Bouzid M.
"Fourier magnitude-based steganography for hiding 2.4 kbpsMELP secret speech".
Proceedings of the 2018 International Conference on Applied Smart Systems, ICASS 2018 2018. DOI
-
Mora A.,Tondello G.,Nacke L.,Arnedo-Moreno J.
"Effect of personalized gameful design on student engagement".
IEEE Global Engineering Education Conference, EDUCON vol. 2018-April, 2018. DOI
-
Gonzalez-Campos J.S.,Arnedo-Moreno J.,Sanchez-Navarro J.
"The use of digital games to teaching computer graphics: An open opportunity".
IEEE Global Engineering Education Conference, EDUCON vol. 2018-April, 2018. DOI
-
Salas J.,Torra V.
"A General Algorithm for k-anonymity on Dynamic Databases".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 11025 LNCS, 2018. DOI
-
Cánovas Izquierdo J.,Salas J.
"A UML profile for privacy enforcement".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 11176 LNCS, 2018. DOI
-
Hassan F.,Domingo-Ferrer J.,Soria-Comas J.
"Anonymization of Unstructured Data via Named-Entity Recognition".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 11144 LNAI, 2018. DOI
-
Domingo-Ferrer J.,Mulero-Vellido R.,Soria-Comas J.
"Multiparty computation with statistical input confidentiality via randomized response".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 11126 LNCS, 2018. DOI
-
Salas J.,Megías D.,Torra V.
"SwapMob: Swapping trajectories for mobility anonymization".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 11126 LNCS, 2018. DOI
-
Pérez-Solà C.,Herrera-Joancomartí J.,Rifà-Pous H.
"On improving automated self-assessment with moodle quizzes: Experiences from a cryptography course".
Communications in Computer and Information Science vol. 829, 2018. DOI
-
Qureshi A.,Megías D.,Rifà-Pous H.
"VSPReP: Verifiable, secure and privacy-preserving remote polling with untrusted computing devices".
Communications in Computer and Information Science vol. 878, 2018. DOI
-
Amigud A.,Arnedo-Moreno J.,Daradoumis T.,Guerrero-Roldan A.E.
"A Method for Thematic and Structural Visualization of Academic Content".
Proceedings - IEEE 17th International Conference on Advanced Learning Technologies, ICALT 2017 2017. DOI
-
Amigud A.,Arnedo-Moreno J.,Daradoumis T.,Guerrero-Roldan A.
"A Robust and Non-invasive Strategy for Preserving Academic Integrity in an Open and Distance Learning Environment".
Proceedings - IEEE 17th International Conference on Advanced Learning Technologies, ICALT 2017 2017. DOI
-
Sabillon R.,Serra-Ruiz J.,Cavaller V.,Cano J.
"A comprehensive cybersecurity audit model to improve cybersecurity assurance: The cybersecurity audit model (CSAM)".
Proceedings - 2017 International Conference on Information Systems and Computer Science, INCISCOS 2017 vol. 2017-November, 2017. DOI
-
Fallahpour M.,Megias D.
"Flexible image watermarking in JPEG domain".
2016 IEEE International Symposium on Signal Processing and Information Technology, ISSPIT 2016 2017. DOI
-
Marques-Arpa T.,Serra-Ruiz J.
"PRS signal in acquiring evidence of Digital Chain of Custody".
2016 11th International Conference for Internet Technology and Secured Transactions, ICITST 2016 2017. DOI
-
Sabillon R.,Cavaller V.,Cano J.,Serra-Ruiz J.
"Cybercriminals, cyberattacks and cybercrime".
2016 IEEE International Conference on Cybercrime and Computer Forensic, ICCCF 2016 2016. DOI
-
Mora A.,Planas E.,Arnedo-Moreno J.
"Designing game-like activities to engage adult learners in higher education".
ACM International Conference Proceeding Series vol. 02-04-November-2016, 2016. DOI
-
Parada R.,Nur K.,Melia-Segui J.,Pous R.
"Smart surface: RFID-based gesture recognition using k-means algorithm".
Proceedings - 12th International Conference on Intelligent Environments, IE 2016 2016. DOI
-
Amigud A.,Arnedo-Moreno J.,Daradoumis T.,Guerrero-Roldan A.E.
"A behavioral biometrics based and machine learning aided framework for academic integrity in e-assessment".
Proceedings - 2016 International Conference on Intelligent Networking and Collaborative Systems, IEEE INCoS 2016 2016. DOI
-
Mora A.,González C.,Arnedo-Moreno J.,Álvarez A.
"Gamification of cognitive training: A crowdsourcing-inspired approach for older adults".
ACM International Conference Proceeding Series 2016. DOI
-
Domingo-Ferrer J.,Megias D.
"Co-utility for digital content protection and digital forgetting".
2016 Mediterranean Ad Hoc Networking Workshop, Med-Hoc-Net 2016 - 15th IFIP MEDHOCNET 2016 2016. DOI
-
Salas J.
"Faster Univariate Microaggregation for Power Law Distributions: K-Degree-Anonymity for Big Graphs".
IEEE International Conference on Data Mining Workshops, ICDMW vol. 0, 2016. DOI
-
Parada R.,Melià-Seguí J.,Pous R.
"Evaluation and deployment of an industrial spring-based RFID reader antenna".
2016 IEEE International Conference on RFID, RFID 2016 2016. DOI
-
Fallahpour M.,Megias D.
"Transparent high capacity audio watermarking in wavelet domain".
2015 10th International Conference for Internet Technology and Secured Transactions, ICITST 2015 2016. DOI
-
Parada R.,Melià-Seguí J.,Carreras A.,Morenza-Cinos M.,Pous R.
"Measuring user-object interactions in IoT spaces".
2015 IEEE International Conference on RFID Technology and Applications, RFID-TA 2015 2016. DOI
-
Rodriguez-Garcia M.,Batet M.,Sánchez D.
"Semantic noise: Privacy-protection of nominal microdata through uncorrelated noise addition".
Proceedings - International Conference on Tools with Artificial Intelligence, ICTAI vol. 2016-January, 2016. DOI
-
Megías D.,Qureshi A.
"Enhanced collusion resistance for segment-wise recombined fingerprinting in P2P distribution systems".
IH and MMSec 2016 - Proceedings of the 2016 ACM Information Hiding and Multimedia Security Workshop 2016. DOI
-
Qureshi A.,Rifa-Pous H.,Megias D.
"State-of-the-art, challenges and open issues in integrating security and privacy in P2P content distribution systems".
2016 11th International Conference on Digital Information Management, ICDIM 2016 2016. DOI
-
Salas J.
"Sampling and merging for graph anonymization".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 9880 LNAI, 2016. DOI
-
Batet M.,Sánchez D.
"Improving Semantic Relatedness Assessments: Ontologies Meet Textual Corpora".
Procedia Computer Science vol. 96, 2016. DOI
-
Mora A.,Zaharias P.,González C.,Arnedo-Moreno J.
"FRAGGLE: A framework for agile gamification of learning experiences".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 9599, 2016. DOI
-
Romero-Tris C.,Megías D.
"User-centric privacy-preserving collection and analysis of trajectory data".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 9481, 2016. DOI
-
Garcia-Font V.,Garrigues C.,Rifa-Pous H.
"An architecture for the analysis and detection of anomalies in smart city WSNs".
2015 IEEE 1st International Smart Cities Conference, ISC2 2015 2015. DOI
-
Mora A.,Riera D.,Gonzalez C.,Arnedo-Moreno J.
"A Literature Review of Gamification Design Frameworks".
VS-Games 2015 - 7th International Conference on Games and Virtual Worlds for Serious Applications 2015. DOI
-
Casas-Roma J.,Rousseau F.
"Community-preserving generalization of social networks".
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015 2015. DOI
-
Megias D.,Serrano J.,Kuznetsov A.G.
"A systematic method to enhance the robustness of stabilising receding-horizon predictive controllers".
European Control Conference, ECC 1999 - Conference Proceedings 2015. DOI
-
Megias D.,Serrano J.,Ghoumari M.Y.E.
"Extended linearised predictive control: Practical control algorithms for non-linear systems".
European Control Conference, ECC 1999 - Conference Proceedings 2015. DOI
-
Gomez-Miralles L.,Arnedo-Moreno J.
"Lockup: A Software Tool to Harden iOS by Disabling Default Lockdown Services".
Proceedings - 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015 2015. DOI
-
Casas-Roma J.
"An evaluation of edge modification techniques for privacy-preserving on graphs".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 9321, 2015. DOI
-
Rashid Z.,Melià-Seguí J.,Pous R.
"Bridging offline and online world through augmentable smart glass interfaces".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 9254, 2015. DOI
-
Batet M.,Sánchez D.
"Ontology selection for semantic similarity assessment".
ICAART 2015 - 7th International Conference on Agents and Artificial Intelligence, Proceedings vol. 2, 2015. DOI
-
Asif R.,Abd-Alhameed R.A.,Bin-Melha M.,Qureshi A.,See C.H.,Abdulraheem Y.I.,Mapuka T.T.,Noras J.M.
"Study on specific absorption rate".
2014 Loughborough Antennas and Propagation Conference, LAPC 2014 2014. DOI
-
Miguel J.,Caballe S.,Xhafa F.,Prieto J.,Barolli L.
"Towards a normalized trustworthiness approach to enhance security in on-line assessment".
Proceedings - 2014 8th International Conference on Complex, Intelligent and Software Intensive Systems, CISIS 2014 2014. DOI
-
Domingo-Prieto M.,Martinez B.,Monton M.,Vilajosana-Guillen I.,Vilajosana-Guillen X.,Arnedo-Moreno J.
"Balancing power consumption in IoT devices by using variable packet size".
Proceedings - 2014 8th International Conference on Complex, Intelligent and Software Intensive Systems, CISIS 2014 2014. DOI
-
Arnedo-Moreno J.,Baneres D.,Baró X.,Caballé S.,Guerrero A.E.,Mas X.,Porta L.,Prieto J.
"ValID: A trust-based virtual assessment system".
Proceedings - 2014 International Conference on Intelligent Networking and Collaborative Systems, IEEE INCoS 2014 2014. DOI
-
Miguel J.,Caballé S.,Xhafa F.,Prieto J.,Barolli L.
"Predicting trustworthiness behavior to enhance security in on-line assessment".
Proceedings - 2014 International Conference on Intelligent Networking and Collaborative Systems, IEEE INCoS 2014 2014. DOI
-
Miguel J.,Caballé S.,Xhafa F.,Prieto J.,Barolli L.
"A methodological approach to modelling trustworthiness in online collaborative learning".
Proceedings - 2014 International Conference on Intelligent Networking and Collaborative Systems, IEEE INCoS 2014 2014. DOI
-
Fallahpour M.,Megias D.
"Fast and low-complexity audio watermarking".
Proceedings - 2014 10th International Conference on Mobile Ad-Hoc and Sensor Networks, MSN 2014 2014. DOI
-
Fallahpour M.,Megias D.
"Robust audio watermarking based on fibonacci numbers".
Proceedings - 2014 10th International Conference on Mobile Ad-Hoc and Sensor Networks, MSN 2014 2014. DOI
-
Melià-Seguí J.,Pous R.
"Human-object interaction reasoning using RFID-enabled smart shelf".
2014 International Conference on the Internet of Things, IOT 2014 2014. DOI
-
Miguel J.,Caballé S.,Xhafa F.,Prieto J.,Barolli L.
"A collective intelligence approach for building student's trustworthiness profile in online learning".
Proceedings - 2014 9th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2014 2014. DOI
-
Casas-Roma J.
"Privacy-preserving on graphs using randomization and edge-relevance".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 8825, 2014. DOI
-
Rashid Z.,Pous R.,Melià-Seguí J.,Peig E.
"Cricking: Browsing physical space with smart glass".
UbiComp 2014 - Adjunct Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing 2014. DOI
-
Rashid Z.,Pous R.,Melià-Seguí J.,Morenza-Cinos M.
"Mobile Augmented Reality for browsing physical spaces".
UbiComp 2014 - Adjunct Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing 2014. DOI
-
Qureshi A.,Rifà-Pous H.,Megías D.
"Secure and anonymous multimedia content distribution in Peer-to-Peer networks".
MMEDIA - International Conferences on Advances in Multimedia 2014.
-
Megías D.,Macau R.,Mas J.
"International Master in Free Software in a virtual training environment".
4ta. Conferencia Iberoamericana en Sistemas, Cibernetica e Informatica, CISCI 2005, Memorias vol. 3, 2014.
-
Prieto-Blázquez J.,Marco-Galindo M.,Serradell-López E.
"Technological requirements for teaching programming in a distance learning environment".
4ta. Conferencia Iberoamericana en Sistemas, Cibernetica e Informatica, CISCI 2005, Memorias vol. 3, 2014.
-
Miguel J.,Caballe S.,Xhafa F.,Prieto J.
"Security in online learning assessment towards an effective trustworthiness approach to support E-learning teams".
Proceedings - International Conference on Advanced Information Networking and Applications, AINA 2014. DOI
-
Miguel J.,Caballé S.,Prieto J.
"Providing information security to MOOC: Towards effective student authentication".
Proceedings - 5th International Conference on Intelligent Networking and Collaborative Systems, INCoS 2013 2013. DOI
-
Fallahpour M.,Megías D.,Ghanbari M.
"Improving reversible histogram based data hiding schemes with an image preprocessing method".
ACM International Conference Proceeding Series 2013. DOI
-
Casas-Roma J.,Herrera-Joancomartí J.,Torra V.
"Analyzing the impact of edge modifications on networks".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 8234 LNAI, 2013. DOI
-
Liaghat Z.,Pous R.,Meliá-Seguí J.,De Porrata-Doria R.
"Consumer experience modeling and enrichment using rfid".
UbiComp 2013 Adjunct - Adjunct Publication of the 2013 ACM Conference on Ubiquitous Computing 2013. DOI
-
Melià-Seguí J.,Parada R.,Pous R.,Liaghat Z.,Carreras A.,De Porrata-Doria R.,Morenza-Cinos M.
"Enhancing the shopping experience through RFID in an actual retail store".
UbiComp 2013 Adjunct - Adjunct Publication of the 2013 ACM Conference on Ubiquitous Computing 2013. DOI
-
Miguel J.,Caballé S.,Prieto J.
"Information security in support for mobile collaborative learning".
Proceedings - 2013 7th International Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2013 2013. DOI
-
Pous R.,Morenza-Cinos M.,Melià-Seguí J.,Rashid Z.,Carreras A.
"Cricking: Customer-product interaction in retail using pervasive technologies".
UbiComp 2013 Adjunct - Adjunct Publication of the 2013 ACM Conference on Ubiquitous Computing 2013. DOI
-
Carreras A.,Nur K.,Morenza-Cinos M.,Oliver J.,Pous R.,De Porrata-Doria R.,Melià-Seguí J.
"STORE VIEW: Pervasive RFID & indoor navigation based retail inventory management".
UbiComp 2013 Adjunct - Adjunct Publication of the 2013 ACM Conference on Ubiquitous Computing 2013. DOI
-
Stokes K.,Carlsson N.
"A peer-to-peer agent community for digital oblivion in online social networks".
2013 11th Annual Conference on Privacy, Security and Trust, PST 2013 2013. DOI
-
Megias D.,Domingo-Ferrer J.
"DNA-inspired anonymous fingerprinting for efficient peer-to-peer content distribution".
2013 IEEE Congress on Evolutionary Computation, CEC 2013 2013. DOI
-
Colomina I.,Arnedo-Moreno J.,Clariso R.
"A study on practices against malware in free software projects".
Proceedings - 27th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2013 2013. DOI
-
Gomez-Miralles L.,Arnedo-Moreno J.
"Analysis of the forensic traces left by airprint in apple iOS devices".
Proceedings - 27th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2013 2013. DOI
-
Casas-Roma J.,Herrera-Joancomartí J.,Torra V.
"An algorithm for κ-degree anonymity on large networks".
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2013 2013. DOI
-
Stokes K.
"Graph k-anonymity through k-means and as modular decomposition".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 8208 LNCS, 2013. DOI
-
Conesa J.,Caballé S.,Gañán D.,Prieto J.
"Towards an Ontology to Model and Represent Collaborative Learning Data".
Communications in Computer and Information Science vol. 278, 2013. DOI
-
Arnedo-Moreno J.,Pérez-Gilabert N.,Domingo-Prieto M.
"Experimental evaluation of anonymous protocols under the JXTA middlewar".
Proceedings of the 2012 15th International Conference on Network-Based Information Systems, NBIS 2012 2012. DOI
-
Domingo-Prieto M.,Arnedo-Moreno J.,Vilajosana-Guillén X.
"jxSensor: A sensor network integration layer for JXTA".
Proceedings of the 2012 15th International Conference on Network-Based Information Systems, NBIS 2012 2012. DOI
-
Verroios V.,Vicente C.,Delis A.
"Detecting hazardous vehicles and disseminating their behavior in urban areas".
Proceedings - 2012 IEEE 13th International Conference on Mobile Data Management, MDM 2012 2012. DOI
-
Miguel J.,Caballé S.,Prieto J.
"Providing security to computer-supported collaborative learning: An overview".
Proceedings of the 2012 4th International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012 2012. DOI
-
Afaqui M.S.,Qureshi A.
"A review of channel dependent scheduling in wireless networks".
2012 15th International Multitopic Conference, INMIC 2012 2012. DOI
-
Fallahpour M.,Megías D.
"High capacity logarithmic audio watermarking based on the human auditory system".
Proceedings - 2012 IEEE International Symposium on Multimedia, ISM 2012 2012. DOI
-
Serra-Ruiz J.,Megías D.
"Reversible data hiding for tampering detection in remote sensing images using histogram shifting".
Proceedings of SPIE - The International Society for Optical Engineering vol. 8514, 2012. DOI
-
Casas-Roma J.,Herrera-Joancomartí J.,Torra V.
"Comparing random-based and k-anonymity-based algorithms for graph anonymization".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 7647 LNAI, 2012. DOI
-
Melià-Seguí J.,Zhang R.,Bart E.,Price B.,Brdiczka O.
"Activity duration analysis for context-aware services using foursquare check-ins".
Self-IoT'12 - Proceedings of the 2012 International Workshop on Self-Aware Internet of Things, Co-located with ICAC'12 2012. DOI
-
Fallahpour M.,Megias D.,Najaf-Zadeh H.
"Adaptive speech watermarking in wavelet domain based on logarithm".
SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography 2012.
-
Stokes K.,Torra V.
"On the relationship between clustering and coding theory".
IEEE International Conference on Fuzzy Systems 2012. DOI
-
Arnedo-Moreno J.,Pérez-Gilabert N.
"Split message-based anonymity for JXTA applications".
Proceedings - 2012 6th International Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2012 2012. DOI
-
Conesa J.,Caballé S.,Gañan D.,Prieto J.
"Towards the representation of emotional information from online collaborative learning sessions".
Proceedings - 2012 6th International Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2012 2012. DOI
-
Stokes K.,Torra V.
"N-confusion: A generalization of k-anonymity".
ACM International Conference Proceeding Series 2012. DOI
-
Verroios V.,Vicente C.,Delis A.
"Alerting for vehicles demonstrating hazardous driving behavior".
MobiDE 2012 - Proceedings of the 11th ACM International Workshop on Data Engineering for Wireless and Mobile Access - In Conjunction with ACM SIGMOD / PODS 2012 2012. DOI
-
Prieto J.A.N.,Rincón H.D.,Molina M.G.L.,Salcedo G.V.,Guerra B.R.
"The impact of the model blended learning in the ITTLA".
62nd IIE Annual Conference and Expo 2012 2012.
-
Stokes K.
"On computational anonymity".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 7556 LNCS, 2012. DOI
-
Gómez-Miralles L.,Arnedo-Moreno J.
"Versatile iPad forensic acquisition using the Apple Camera Connection Kit".
Computers and Mathematics with Applications vol. 63, num. 2, 2012. DOI
-
Rifà-Pous H.,Panaousis E.A.,Politis C.
"Recipients' anonymity in multihop ad-hoc networks".
IEICE Transactions on Information and Systems vol. E-95-D, num. 1, 2012. DOI
-
Domingo-Prieto M.,Arnedo-Moreno J.
"JXTAnonym: An anonymity layer for JXTA services messaging".
IEICE Transactions on Information and Systems vol. E-95-D, num. 1, 2012. DOI
-
Rifà-Pous H.,Garrigues C.
"A secure and anonymous cooperative sensing protocol for cognitive radio networks".
ACM International Conference Proceeding Series 2011. DOI
-
Rifà-Pous H.,Rifà J.
"Spectrum sharing models in cognitive radio networks".
Proceedings - 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2011 2011. DOI
-
Rifà-Pous H.
"Anonymous reputation based reservations in e-commerce (AMNESIC)".
ACM International Conference Proceeding Series 2011. DOI
-
Conesa J.,Caballé S.,Gañan D.,Prieto J.
"A framework for dealing with knowledge about on-line collaborative learning sessions".
Proceedings - 3rd IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2011 2011. DOI
-
Melià-Seguí J.,Garcia-Alfaro J.,Herrera-Joancomartí J.
"Multiple-polynomial LFSR based pseudorandom number generator for EPC Gen2 RFID tags".
IECON Proceedings (Industrial Electronics Conference) 2011. DOI
-
Vicente C.,Assent I.,Jensen C.
"Effective privacy-preserving online route planning".
Proceedings - IEEE International Conference on Mobile Data Management vol. 1, 2011. DOI
-
Domingo-Prieto M.,Arnedo-Moreno J.
"Lightweight security for JXME-proxied relay authentication".
Proceedings - 2011 International Conference on Network-Based Information Systems, NBiS 2011 2011. DOI
-
Fallahpour M.,Megías D.
"High capacity FFT-based audio watermarking".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 7025 LNCS, 2011. DOI
-
Gómez-Miralles L.,Arnedo-Moreno J.
"Universal, fast method for iPad forensics imaging via USB adapter".
Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011 2011. DOI
-
Arnedo-Moreno J.,Domingo-Prieto M.
"An anonymity layer for JXTA services".
Proceedings - 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2011 2011. DOI
-
Fallahpour M.,Megias D.,Shi Y.
"Lossless image data embedding in plain areas".
Proceedings of SPIE - The International Society for Optical Engineering vol. 7880, 2011. DOI
-
Ogata Y.,Spaho E.,Matsuo K.,Barolli L.,Arnedo-Moreno J.,Xhafa F.
"JXTA-overlay P2P platform and its application for robot control".
Proceedings - 13th International Conference on Network-Based Information Systems, NBiS 2010 2010. DOI
-
Spaho E.,Matsuo K.,Barolli L.,Arnedo-Moreno J.,Xhafa F.,Kolici V.
"A secure JXTA-overlay platform for robot control".
Proceedings - International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2010 2010. DOI
-
Radmand P.,Domingo M.,Singh J.,Arnedo J.,Talevski A.,Petersen S.,Carlsen S.
"ZigBee/ZigBee PRO security assessment based on compromised cryptographic keys".
Proceedings - International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2010 2010. DOI
-
Radman P.,Singh J.,Domingo M.,Arnedo J.,Talevski A.
"VoIP: Making secure calls and maintaining high call quality".
MoMM2010 - 8th International Conference on Advances in Mobile Computing and Multimedia 2010. DOI
-
Serra-Ruiz J.,Megías D.
"DWT and TSVQ-based semi-fragile watermarking scheme for tampering detection in remote sensing images".
Proceedings - 4th Pacific-Rim Symposium on Image and Video Technology, PSIVT 2010 2010. DOI
-
Guerrero-Roldán A.,García-Torà I.,Prieto-Blázquez J.,Minguillón J.
"Using an IMS-LD based questionnaire to create adaptive learning paths".
Proceedings - Frontiers in Education Conference, FIE 2010. DOI
-
Serra-Ruiz J.,Megĺas D.
"Watermarking scheme for tampering detection in remote sensing images using variable size tiling and DWT".
Proceedings of SPIE - The International Society for Optical Engineering vol. 7810, 2010. DOI
-
Melià-Seguí J.,Garcia-Alfaro J.,Herrera-Joancomartí J.
"RFID EPC-Gen2 for postal applications: A security and privacy survey".
Proceedings of 2010 IEEE International Conference on RFID-Technology and Applications, RFID-TA 2010 2010. DOI
-
Melia-Segui J.,Garcia-Alfaro J.,Herrera-Joancomarti J.
"Analysis and improvement of a pseudorandom number generator for EPC Gen2 tags".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 6054 LNCS, 2010. DOI
-
Domingo-Prieto M.,Arnedo-Moreno J.,Herrera-Joancomartí J.
"JXTA security in mobile constrained devices".
24th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2010 2010. DOI
-
Fallahpoure M.,Megías D.
"DWT-based high capacity audio Watermarking".
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences vol. E93-A, num. 1, 2010. DOI
-
Fallahpour M.,Megías D.
"Robust high-capacity audiowatermarking based on FFT amplitude modification".
IEICE Transactions on Information and Systems vol. E93-D, num. 1, 2010. DOI
-
Rifà-Pous H.
"A secure mobile-based authentication system for e-banking".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 5871 LNCS, num. PART 2, 2009. DOI
-
Fallahpour M.,Megías D.
"Reversible data hiding based on H.264/AVC intra prediction".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 5450 LNCS, 2009. DOI
-
Arnedo-Moreno J.,Matsuo K.,Barolli L.,Xhafa F.
"Securing a Java P2P framework: The JXTA-overlay case".
iiWAS2009 - The 11th International Conference on Information Integration and Web-based Applications and Services 2009. DOI
-
Arnedo-Moreno J.,Matsuo K.,Barolli L.,Xhafa F.
"A security-aware approach to JXTA-overlay primitives".
Proceedings of the International Conference on Parallel Processing Workshops 2009. DOI
-
Megias D.,Tebbens W.,Bijlsma L.,Santanach F.
"Free technology academy: A European initiative for distance education about free software and open standards".
Proceedings of the Conference on Integrating Technology into Computer Science Education, ITiCSE 2009. DOI
-
Arnedo-Moreno J.,Matsuo K.,Barolli L.,Xhafa F.
"A security framework for JXTA-overlay".
NBiS 2009 - 12th International Conference on Network-Based Information Systems 2009. DOI
-
Matsuo K.,Barolli L.,Arnedo-Moreno J.,Xhafa F.,Koyama A.,Durresi A.
"Experimental results and evaluation of SmartBox stimulation device in a P2P e-learning system".
NBiS 2009 - 12th International Conference on Network-Based Information Systems 2009. DOI
-
Arnedo-Moreno J.,Herrera-Joancomartí J.
"Maintaining unlinkability in group based P2P environments".
Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE 2009. DOI
-
Arnedo-Moreno J.,Herrera-Joancomartí J.
"A security layer for JXTA core protocols".
Proceedings of the International Conference on Complex, Intelligent and Software Intensive Systems, CISIS 2009 2009. DOI
-
Fallahpour M.,Megias D.,Ghanbari M.
"High capacity, reversible data hiding in medical images".
Proceedings - International Conference on Image Processing, ICIP 2009. DOI
-
Fallahpour M.,Megías D.
"High capacity method for real-time audio data hiding using the fft transform".
Communications in Computer and Information Science vol. 36, 2009. DOI
-
Prieto-Blázquez J.,García-Torà I.,Herrera-Joancomartí J.,Guerrero-Roldán A.E.
"Virtual laboratory ontology for engineering education".
Proceedings - Frontiers in Education Conference, FIE 2008. DOI
-
Arnedo-Moreno J.,Herrera-Joancomartí J.
"Persistent interoperable security for JXTA advertisements".
Proceedings - CISIS 2008: 2nd International Conference on Complex, Intelligent and Software Intensive Systems 2008. DOI
-
Rifà-Pous H.,Herrera-Joancomartí J.
"A forwarding cooperation protocol for plain and cluster-based Ad Hoc networks".
Journal of Communications Software and Systems vol. 4, num. 1, 2008. DOI
-
Rifà-Pous H.,Herrera-Joancomartí J.
"Secure dynamic MANET on-demand (SEDYMO) routing protocol".
Proceedings - CNSR 2007: Fifth Annual Conference on Communication Networks and Services Research 2007. DOI
-
Rifà-Pous H.,Herrera-Joancomartí J.
"A forwarding spurring protocol for multihop ad hoc networks (FURIES)".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 4712 LNCS, 2007. DOI
-
Rifà-Pous H.,Herrera-Joancomartí J.
"An interdomain PKI model based on trust lists".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 4582 LNCS, 2007. DOI
-
Rifa H.,Jordan F.
"A service oriented trust development platform".
ISSE 2006 - Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2006 Conference 2006. DOI
-
Arnedo-Moreno J.,Herrera-Joancomartí J.
"Providing a collaborative mechanism for peer group access control".
2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2006. DOI
-
Serra J.,Megías D.,Herrera-Joancomartí J.,Minguillón J.
"Multiband semifragile watermarking for multi and hyperspectral images based on iterative tree structured vector quantization".
Proceedings of SPIE - The International Society for Optical Engineering vol. 6365, 2006. DOI
-
Castellà-Roca J.,Herrera-Joancomarti J.,Dorca-Josa A.
"A secure e-exam management system".
Proceedings - First International Conference on Availability, Reliability and Security, ARES 2006 vol. 2006, 2006. DOI
-
Megías D.,Herrera-Joancomartí J.,Serra J.,Minguillón J.
"A benchmark assessment of the WAUC watermarking audio algorithm".
Proceedings of SPIE - The International Society for Optical Engineering vol. 6072, 2006. DOI
-
Megías D.,Tebbens W.,Macau R.
"SELF: A collaborative platform for education of free software and open standards".
5ta. Conferencia Iberoamericana en Sistemas, Cibernetica e Informatica, CISCI 2006, Memorias vol. 2, 2006.
-
Rius A.,Prieto-Blazquez J.,Riera D.
"Actual case of an Automatic Program Testing in a virtual learning environment".
5ta. Conferencia Iberoamericana en Sistemas, Cibernetica e Informatica, CISCI 2006, Memorias vol. 2, 2006.
-
Dittmann J.,Megías D.,Lang A.,Herrera-Joancomartí J.
"Theoretical framework for a practical evaluation and comparison of audio watermarking schemes in the triangle of robustness, transparency and capacity".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 4300 LNCS, 2006. DOI
-
Megías D.,Serra J.,MacAu R.
"An international master programme in free software in the european higher education space".
OSS 2005 - Proceedings of the 1st International Conference on Open Source Systems 2005.
-
Minguillón J.,Herrera-Joancomartí J.,Megías D.,Serra J.,Serra-Sagristà J.,García-Vílchez F.
"Influence of mark embedding strategies on lossless compression of ultraspectral images".
International Geoscience and Remote Sensing Symposium (IGARSS) vol. 1, 2005. DOI
-
Serra-Sagristà J.,García-Vílchez F.,Minguillón J.,Megías D.,Huang B.,Ahuja A.
"Wavelet lossless compression of ultraspectral sounder data".
International Geoscience and Remote Sensing Symposium (IGARSS) vol. 1, 2005. DOI
-
Megias D.,Herrera-Joancomarti J.,Minguillön J.
"Total disclosure of the embedding and detection algorithms for a secure digital watermarking scheme for audio".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 3783 LNCS, 2005. DOI
-
Megías D.,Herrera-Joancomartí J.,Minguillón J.
"Robust frequency domain audio watermarking: A tuning analysis".
Lecture Notes in Computer Science vol. 3304, 2005. DOI
-
Minguillón J.,Herrera-Joancomartí J.,Megías D.,Serra-Sagristà J.
"Evaluation of copyright protection schemes for hyperspectral imaging".
Proceedings of SPIE - The International Society for Optical Engineering vol. 5238, 2004. DOI
-
de Prada C.,Cristea S.,Megias D.,Serrano J.
"Hybrid control of a four tanks system".
IFAC Proceedings Volumes (IFAC-PapersOnline) vol. 37, num. 1, 2004.
-
Herrera-Joancomartí J.,Prieto-Blázquez J.,Castellà-Roca J.
"A secure electronic examination protocol using wireless networks".
International Conference on Information Technology: Coding Computing, ITCC vol. 2, 2004. DOI
-
Megías D.,Herrera-Joancomartí J.,Minguillón J.
"An audio watermarking scheme robust against stereo attacks".
Proceedings of the Multimedia and Security Workshop 2004, MM and Sec'04 2004. DOI
-
Megías D.,Herrera-Joancomartí J.,Minguillón J.
"A robust frequency domain audio watermarking scheme, for monophonic and stereophonic PCM formats".
Conference Proceedings of the EUROMICRO vol. 30, 2004. DOI
-
Minguillón J.,Herrera-Joancomartí J.,Megías D.
"Empirical Evaluation of a JPEG2000 Standard-based Robust Watermarking Scheme".
Proceedings of SPIE - The International Society for Optical Engineering vol. 5020, 2003. DOI
-
Herrera-Joancomartí J.,Prieto-Blázquez J.
"A personal authentication scheme using mobile technology".
Proceedings ITCC 2003, International Conference on Information Technology: Computers and Communications 2003. DOI
-
Herrera-Joancomartí J.,Minguillón J.,Megías D.
"A family of image watermarking schemes based on lossy compression".
Proceedings ITCC 2003, International Conference on Information Technology: Computers and Communications 2003. DOI
Review
-
Araya J.I.I.,Rifà-Pous H.
"Anomaly-based cyberattacks detection for smart homes: A systematic literature review".
Internet of Things (Netherlands) vol. 22, 2023. DOI
-
Thankappan M.,Rifà-Pous H.,Garrigues C.
"Multi-Channel Man-in-the-Middle attacks against protected Wi-Fi networks: A state of the art review".
Expert Systems with Applications vol. 210, 2022. DOI
-
Qureshi A.,Jiménez D.M.
"Blockchain-based multimedia content protection: Review and open challenges".
Applied Sciences (Switzerland) vol. 11, num. 1, 2021. DOI
-
Megías D.,Kuribayashi M.,Qureshi A.
"Survey on decentralized fingerprinting solutions: Copyright protection through piracy tracing".
Computers vol. 9, num. 2, 2020. DOI
-
Oukemeni S.,Rifà-Pous H.,Puig J.M.M.
"Privacy analysis on microblogging online social networks: A survey".
ACM Computing Surveys vol. 52, num. 3, 2019. DOI
-
Amigud A.,Arnedo-Moreno J.,Daradoumis T.,Guerrero-Roldan A.E.
"An integrative review of security and integrity strategies in an academic environment: Current understanding and emerging perspectives".
Computers and Security vol. 76, 2018. DOI
-
Torra V.,Shafie T.,Salas J.
"Data Protection for Online Social Networks and P -Stability for Graphs".
IEEE Transactions on Emerging Topics in Computing vol. 4, num. 3, 2016. DOI
-
Torra V.,Stokes K.
"A formalization of record linkage and its application to data protection".
International Journal of Uncertainty, Fuzziness and Knowldege-Based Systems vol. 20, num. 6, 2012. DOI
Article
-
Megias D.,Lerch-Hostalot D.
"Subsequent Embedding in Targeted Image Steganalysis: Theoretical Framework and Practical Applications".
IEEE Transactions on Dependable and Secure Computing vol. 20, num. 2, 2023. DOI
-
Araghi T.K.,Megías D.
"Analysis and effectiveness of deeper levels of SVD on performance of hybrid DWT and SVD watermarking".
Multimedia Tools and Applications 2023. DOI
-
Núñez-Gómez C.,Garcia-Font V.
"HyperNet: A conditional k-anonymous and censorship resistant decentralized hypermedia architecture".
Expert Systems with Applications vol. 208, 2022. DOI
-
Martínez D.,Calle E.,Jové A.,Pérez-Solà C.
"Web-tracking compliance: websites’ level of confidence in the use of information-gathering technologies: Web-tracking level of confidence".
Computers and Security vol. 122, 2022. DOI
-
Kheddar H.,Megías D.
"High capacity speech steganography for the G723.1 coder based on quantised line spectral pairs interpolation and CNN auto-encoding".
Applied Intelligence vol. 52, num. 8, 2022. DOI
-
Megías D.,Kuribayashi M.,Rosales A.,Cabaj K.,Mazurczyk W.
"Architecture of a fake news detection system combining digital watermarking, signal processing, and machine learning".
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications vol. 13, num. 1, 2022. DOI
-
Nunez-Del-prado M.,Maehara-Aliaga Y.,Salas J.,Alatrista-Salas H.,Megías D.
"A Graph-Based Differentially Private Algorithm for Mining Frequent Sequential Patterns".
Applied Sciences (Switzerland) vol. 12, num. 4, 2022. DOI
-
Oleas-Chavez L.E.,Perez-Sola C.,Herrera-Joancomarti J.
"Apples and Oranges: On How to Measure Node Centrality in Payment Channel Networks".
IEEE Access vol. 10, 2022. DOI
-
Marcer A.,Escobar A.,Garcia-Font V.,Uribe F.
"Ali-Bey - an open collaborative georeferencing web application".
Biodiversity Data Journal vol. 10, 2022. DOI
-
Nanni M.,Andrienko G.,Barabási A.L.,Boldrini C.,Bonchi F.,Cattuto C.,Chiaromonte F.,Comandé G.,Conti M.,Coté M.,Dignum F.,Dignum V.,Domingo-Ferrer J.,Ferragina P.,Giannotti F.,Guidotti R.,Helbing D.,Kaski K.,Kertesz J.,Lehmann S.,Lepri B.,Lukowicz P.,Matwin S.,Jiménez D.M.,Monreale A.,Morik K.,Oliver N.,Passarella A.,Passerini A.,Pedreschi D.,Pentland A.,Pianesi F.,Pratesi F.,Rinzivillo S.,Ruggieri S.,Siebes A.,Torra V.,Trasarti R.,Hoven J.v.d.,Vespignani A.
"Give more data, awareness and control to individual citizens, and they will help COVID-19 containment".
Ethics and Information Technology vol. 23, 2021. DOI
-
Arnedo-Moreno J.,Garcia-Font V.
"A study on the design and application of fictional storytelling in online learning of computer security".
Applied Sciences (Switzerland) vol. 11, num. 13, 2021. DOI
-
Garcia-Font V.
"Conceptual technological framework for smart cities to move towards decentralized and user-centric architectures using DLT".
Smart Cities vol. 4, num. 2, 2021. DOI
-
Qureshi A.,Garcia-Font V.,Rifà-Pous H.,Megías D.
"Collaborative and efficient privacy-preserving critical incident management system".
Expert Systems with Applications vol. 163, 2021. DOI
-
Garcia-Font V.
"SocialBlock: An architecture for decentralized user-centric data management applications for communications in smart cities".
Journal of Parallel and Distributed Computing vol. 145, 2020. DOI
-
Casas-Roma J.
"DUEF-GA: data utility and privacy evaluation framework for graph anonymization".
International Journal of Information Security vol. 19, num. 4, 2020. DOI
-
Delgado-Segura S.,Pérez-Solà C.,Navarro-Arribas G.,Herrera-Joancomartí J.
"A fair protocol for data trading based on Bitcoin transactions".
Future Generation Computer Systems vol. 107, 2020. DOI
-
Nanni M.,Andrienko G.,Barabàsi A.L.,Boldrini C.,Bonchi F.,Cattuto C.,Chiaromonte F.,Comandé G.,Conti M.,Coté M.,Dignum F.,Dignum V.,Domingo-Ferrer J.,Ferragina P.,Giannotti F.,Guidotti R.,Helbing D.,Kaski K.,Kertesz J.,Lehmann S.,Lepri B.,Lukowicz P.,Matwin S.,Megías D.,Monreale A.,Morik K.,Oliver N.,Passarella A.,Passerini A.,Pedreschi D.,Pentland A.,Pianesi F.,Pratesi F.,Rinzivillo S.,Ruggieri S.,Siebes A.,Torra V.,Trasarti R.,Van Den Hoven J.,Vespignani A.
"Give more data, awareness and control to individual citizens, and they will help COVID-19 containment".
Transactions on Data Privacy vol. 13, num. 1, 2020.
-
Salas J.,Megías D.,Torra V.,Toger M.,Dahne J.,Sainudiin R.
"Swapping trajectories with a sufficient sanitizer".
Pattern Recognition Letters vol. 131, 2020. DOI
-
Solana E.,Martinez-Heras E.,Casas-Roma J.,Calvet L.,Lopez-Soley E.,Sepulveda M.,Sola-Valls N.,Montejo C.,Blanco Y.,Pulido-Valdeolivas I.,Andorra M.,Saiz A.,Prados F.,Llufriu S.
"Modified connectivity of vulnerable brain nodes in multiple sclerosis, their impact on cognition and their discriminative value".
Scientific Reports vol. 9, num. 1, 2019. DOI
-
González Campos J.S.,Sánchez-Navarro J.,Arnedo-Moreno J.
"An empirical study of the effect that a computer graphics course has on visual-spatial abilities".
International Journal of Educational Technology in Higher Education vol. 16, num. 1, 2019. DOI
-
Casas-Roma J.,Salas J.,Malliaros F.D.,Vazirgiannis M.
"k-Degree anonymity on directed networks".
Knowledge and Information Systems vol. 61, num. 3, 2019. DOI
-
Pérez-Solà C.,Delgado-Segura S.,Navarro-Arribas G.,Herrera-Joancomartí J.
"Double-spending prevention for Bitcoin zero-confirmation transactions".
International Journal of Information Security vol. 18, num. 4, 2019. DOI
-
Ros-Martín M.,Salas J.,Casas-Roma J.
"Scalable non-deterministic clustering-based k-anonymization for rich networks".
International Journal of Information Security vol. 18, num. 2, 2019. DOI
-
Oukemeni S.,Rifa-Pous H.,Marques Puig J.M.
"IPAM: Information Privacy Assessment Metric in Microblogging Online Social Networks".
IEEE Access vol. 7, 2019. DOI
-
Serra-Ruiz J.,Qureshi A.,Megías D.
"Entropy-based semi-fragile watermarking of remote sensing images in the wavelet domain".
Entropy vol. 21, num. 9, 2019. DOI
-
Pérez-Solà C.,Delgado-Segura S.,Navarro-Arribas G.,Herrera-Joancomartí J.
"Another coin bites the dust: An analysis of dust in UTXO-based cryptocurrencies".
Royal Society Open Science vol. 6, num. 1, 2019. DOI
-
Nettleton D.,Estivill-Castro V.,Salas J.
"Privacy in multiple on-line social networks - Re-identification and predictability".
Transactions on Data Privacy vol. 12, num. 1, 2019.
-
Chen D.,Navarro-Arribas G.,Pérez-Solà C.,Borrell J.
"Message anonymity on predictable opportunistic networks".
Journal of Ambient Intelligence and Humanized Computing 2019. DOI
-
Salas J.
"Sanitizing and measuring privacy of large sparse datasets for recommender systems".
Journal of Ambient Intelligence and Humanized Computing 2019. DOI
-
Casas-Roma J.
"An evaluation of vertex and edge modification techniques for privacy-preserving on graphs".
Journal of Ambient Intelligence and Humanized Computing 2019. DOI
-
Parada R.,Font J.,Casas-Roma J.
"Predicting energy generation using forecasting techniques in Catalan reservoirs".
Energies vol. 12, num. 10, 2019. DOI
-
Kheddar H.,Bouzid M.,Megías D.
"Pitch and Fourier magnitude based steganography for hiding 2.4 kbps MELP bitstream".
IET Signal Processing vol. 13, num. 3, 2019. DOI
-
Sabillon R.,Serra-Ruiz J.,Cavaller V.,Cano J.
"An effective cybersecurity training model to support an organizational awareness program: The Cybersecurity Awareness Training Model (CATRAM). A case study in Canada".
Journal of Cases on Information Technology vol. 21, num. 3, 2019. DOI
-
Qureshi A.,Megías D.,Rifa-Pous H.
"SeVEP: Secure and Verifiable Electronic Polling System".
IEEE Access vol. 7, 2019. DOI
-
Pérez-Solà C.,Herrera-Joancomartí J.
"Improving Classification of Interlinked Entities Using Only the Network Structure".
International Journal of Software Engineering and Knowledge Engineering vol. 29, num. 1, 2019. DOI
-
Rodriguez-Garcia M.,Batet M.,Sánchez D.
"Utility-preserving privacy protection of nominal data sets via semantic rank swapping".
Information Fusion vol. 45, 2019. DOI
-
Torra V.,Jonsson A.,Navarro-Arribas G.,Salas J.
"Synthetic generation of spatial graphs".
International Journal of Intelligent Systems vol. 33, num. 12, 2018. DOI
-
Garcia-Font V.,Garrigues C.,Rifà-Pous H.
"Difficulties and challenges of anomaly detection in smart cities: A laboratory analysis".
Sensors (Switzerland) vol. 18, num. 10, 2018. DOI
-
Salas J.,Domingo-Ferrer J.
"Some Basics on Privacy Techniques, Anonymization and their Big Data Challenges".
Mathematics in Computer Science vol. 12, num. 3, 2018. DOI
-
Sánchez D.,Batet M.,Viejo A.,Rodríguez-García M.,Castellà-Roca J.
"A semantic-preserving differentially private method for releasing query logs".
Information Sciences vol. 460-461, 2018. DOI
-
Romero-Tris C.,Megías D.
"Protecting privacy in trajectories with a user-centric approach".
ACM Transactions on Knowledge Discovery from Data vol. 12, num. 6, 2018. DOI
-
Soria-Comas J.,Domingo-Ferrer J.
"Differentially private data publishing via optimal univariate microaggregation and record perturbation".
Knowledge-Based Systems vol. 153, 2018. DOI
-
Hemis M.,Boudraa B.,Megías D.,Merazi-Meksen T.
"Adjustable audio watermarking algorithm based on DWPT and psychoacoustic modeling".
Multimedia Tools and Applications vol. 77, num. 10, 2018. DOI
-
Sánchez D.,Martínez-Sanahuja L.,Batet M.
"Survey and evaluation of web search engine hit counts as research tools in computational linguistics".
Information Systems vol. 73, 2018. DOI
-
Rousseau F.,Casas-Roma J.,Vazirgiannis M.
"Community-preserving anonymization of graphs".
Knowledge and Information Systems vol. 54, num. 2, 2018. DOI
-
Batet M.,Sánchez D.
"Semantic Disclosure Control: semantics meets data privacy".
Online Information Review vol. 42, num. 3, 2018. DOI
-
Mora A.,Riera D.,González C.,Arnedo-Moreno J.
"Gamification: a systematic review of design frameworks".
Journal of Computing in Higher Education vol. 29, num. 3, 2017. DOI
-
Rashid Z.,Melià-Seguí J.,Pous R.,Peig E.
"Using Augmented Reality and Internet of Things to improve accessibility of people with motor disabilities in the context of Smart Cities".
Future Generation Computer Systems vol. 76, 2017. DOI
-
Sánchez D.,Batet M.
"Privacy-preserving data outsourcing in the cloud via semantic data splitting".
Computer Communications vol. 110, 2017. DOI
-
Lastra-Díaz J.J.,García-Serrano A.,Batet M.,Fernández M.,Chirigati F.
"HESML: A scalable ontology-based semantic similarity measures library with a set of reproducible experiments and a replication dataset".
Information Systems vol. 66, 2017. DOI
-
Soria-Comas J.,Domingo-Ferrer J.,Sanchez D.,Megias D.
"Individual differential privacy: A utility-preserving formulation of differential privacy guarantees".
IEEE Transactions on Information Forensics and Security vol. 12, num. 6, 2017. DOI
-
Rodriguez-Garcia M.,Batet M.,Sánchez D.
"A semantic framework for noise addition with nominal data".
Knowledge-Based Systems vol. 122, 2017. DOI
-
Garcia-Font V.,Garrigues C.,Rifà-Pous H.
"Attack classification schema for smart city WSNs".
Sensors (Switzerland) vol. 17, num. 4, 2017. DOI
-
Sabillon R.,Serra-Ruiz J.,Cavaller V.,Cano J.J.
"Digital forensic analysis of cybercrimes: Best practices and methodologies".
International Journal of Information Security and Privacy vol. 11, num. 2, 2017. DOI
-
Megías D.,Qureshi A.
"Collusion-resistant and privacy-preserving P2P multimedia distribution based on recombined fingerprinting".
Expert Systems with Applications vol. 71, 2017. DOI
-
Sánchez D.,Batet M.
"Toward sensitive document release with privacy guarantees".
Engineering Applications of Artificial Intelligence vol. 59, 2017. DOI
-
Casas-Roma J.,Herrera-Joancomartí J.,Torra V.
"A survey of graph-modification techniques for privacy-preserving on networks".
Artificial Intelligence Review vol. 47, num. 3, 2017. DOI
-
Parada R.,Melia-Segui J.
"Gesture Detection Using Passive RFID Tags to Enable People-Centric IoT Applications".
IEEE Communications Magazine vol. 55, num. 2, 2017. DOI
-
Casas-Roma J.,Herrera-Joancomartí J.,Torra V.
"k-Degree anonymity and edge selection: improving data utility in large networks".
Knowledge and Information Systems vol. 50, num. 2, 2017. DOI
-
Parada R.,Cárdenes-Tacoronte D.,Monzo C.,Melià-Seguí J.
"Internet of Things area coverage analyzer (ITHACA) for complex topographical scenarios".
Symmetry vol. 9, num. 10, 2017. DOI
-
Melià-Seguí J.,Bart E.,Zhang R.,Brdiczka O.
"An empirical approach for fake user detection in location-based social networks".
Journal of Ambient Intelligence and Smart Environments vol. 9, num. 6, 2017. DOI
-
Adelantado F.,Vilajosana X.,Tuset-Peiro P.,Martinez B.,Melia-Segui J.,Watteyne T.
"Understanding the Limits of LoRaWAN".
IEEE Communications Magazine vol. 55, num. 9, 2017. DOI
-
Amigud A.,Arnedo-Moreno J.,Daradoumis T.,Guerrero-Roldan A.E.
"Using learning analytics for preserving academic integrity".
International Review of Research in Open and Distance Learning vol. 18, num. 5, 2017. DOI
-
Nettleton D.F.,Salas J.
"A data driven anonymization system for information rich online social network graphs".
Expert Systems with Applications vol. 55, 2016. DOI
-
Salas J.,Torra V.
"Improving the characterization of P-stability for applications in network privacy".
Discrete Applied Mathematics vol. 206, 2016. DOI
-
Garcia-Font V.,Garrigues C.,Rifà-Pous H.
"A comparative study of anomaly detection techniques for smart city wireless sensor networks".
Sensors (Switzerland) vol. 16, num. 6, 2016. DOI
-
Nettleton D.F.,Salas J.
"Approximate Matching of Neighborhood Subgraphs - An Ordered String Graph Levenshtein Method".
International Journal of Uncertainty, Fuzziness and Knowldege-Based Systems vol. 24, num. 3, 2016. DOI
-
Qureshi A.,Megías D.,Rifà-Pous H.
"PSUM: Peer-to-peer multimedia content distribution using collusion-resistant fingerprinting".
Journal of Network and Computer Applications vol. 66, 2016. DOI
-
Lerch-Hostalot D.,Megías D.
"Unsupervised steganalysis based on artificial training sets".
Engineering Applications of Artificial Intelligence vol. 50, 2016. DOI
-
Dalfó C.,Huemer C.,Salas J.
"The degree/diameter problem in maximal planar bipartite graphs".
Electronic Journal of Combinatorics vol. 23, num. 1, 2016. DOI
-
Miguel J.,Caballé S.,Xhafa F.,Prieto J.,Barolli L.
"A methodological approach for trustworthiness assessment and prediction in mobile online collaborative learning".
Computer Standards and Interfaces vol. 44, 2016. DOI
-
Qureshi A.,Rifà-Pous H.,Megías D.
"Enabling collaborative privacy in user-generated emergency reports".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 9867 LNCS, 2016. DOI
-
Rodriguez-Garcia M.,Sánchez D.,Batet M.
"Perturbative data protection of multivariate nominal datasets".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 9867 LNCS, 2016. DOI
-
Sánchez D.,Batet M.
"C-sanitized: A privacy model for document redaction and sanitization".
Journal of the Association for Information Science and Technology vol. 67, num. 1, 2016. DOI
-
Miguel J.,Caballé S.,Xhafa F.,Prieto J.
"Security in online web learning assessment: Providing an effective trustworthiness approach to support e-learning teams".
World Wide Web vol. 18, num. 6, 2015. DOI
-
Casas-Roma J.,Herrera-Joancomartí J.,Torra V.
"Anonymizing graphs: measuring quality for clustering".
Knowledge and Information Systems vol. 44, num. 3, 2015. DOI
-
Balbuena C.,Salas J.
"On a conjecture on the order of cages with a given girth pair".
Discrete Applied Mathematics vol. 190-191, 2015. DOI
-
Fallahpour M.,Megías D.
"Audio watermarking based on Fibonacci numbers".
IEEE Transactions on Audio, Speech and Language Processing vol. 23, num. 8, 2015. DOI
-
Parada R.,Melià-Seguí J.,Morenza-Cinos M.,Carreras A.,Pous R.
"Using RFID to Detect Interactions in Ambient Assisted Living Environments".
IEEE Intelligent Systems vol. 30, num. 4, 2015. DOI
-
Miguel J.,Caballé S.,Xhafa F.,Prieto J.
"A massive data processing approach for effective trustworthiness in online learning groups".
Concurrency and Computation: Practice and Experience vol. 27, num. 8, 2015. DOI
-
Megias D.
"Improved privacy-preserving P2P multimedia distribution based on recombined fingerprints".
IEEE Transactions on Dependable and Secure Computing vol. 12, num. 2, 2015. DOI
-
Sánchez D.,Batet M.,Martínez S.,Domingo-Ferrer J.
"Semantic variance: An intuitive measure for ontology accuracy evaluation".
Engineering Applications of Artificial Intelligence vol. 39, 2015. DOI
-
Romero-Tris C.,Castellà D.,Viejo A.,Castellà-Roca J.,Solsona F.,Mateo-Sanz J.M.
"Design of a P2P network that protects users' privacy in front of Web Search Engines".
Computer Communications vol. 57, 2015. DOI
-
Qureshi A.,Megías D.,Rifà-Pous H.
"Framework for preserving security and privacy in peer-to-peer content distribution systems".
Expert Systems with Applications vol. 42, num. 3, 2015. DOI
-
Gómez-Miralles L.,Arnedo-Moreno J.
"AirPrint Forensics: Recovering the Contents and Metadata of Printed Documents from iOS Devices".
Mobile Information Systems vol. 2015, 2015. DOI
-
Leon O.,Hernandez-Serrano J.,Garrigues C.,Rifa-Pous H.
"A Cognitive-Radio-Based Method for Improving Availability in Body Sensor Networks".
International Journal of Distributed Sensor Networks vol. 2015, 2015. DOI
-
Abreu M.,Araujo-Pardo G.,Balbuena C.,Labbate D.,Salas J.
"Small regular graphs of girth 7".
Electronic Journal of Combinatorics vol. 22, num. 3, 2015. DOI
-
Salas J.,Torra V.
"Graphic sequences, distances and k-degree anonymity".
Discrete Applied Mathematics vol. 188, num. 1, 2015. DOI
-
Casas-Roma J.,Herrera-Joancomartí J.,Torra V.
"A summary of k-degree anonymous methods for privacy-preserving on networks".
Studies in Computational Intelligence vol. 567, 2015. DOI
-
Garcia-Alfaro J.,Herrera-Joancomartí J.,Melià-Seguí J.
"Security and privacy concerns about the RFID layer of EPC Gen2 networks".
Studies in Computational Intelligence vol. 567, 2015. DOI
-
Romero-Tris C.,Viejo A.,Castellà-Roca J.
"Multi-party methods for privacy-preserving web search: Survey and contributions".
Studies in Computational Intelligence vol. 567, 2015. DOI
-
Batet M.,Sánchez D.
"Contributions on semantic similarity and its applications to data privacy".
Studies in Computational Intelligence vol. 567, 2015. DOI
-
Vilajosana X.,Llosa J.,Vilajosana I.,Prieto-Blàzquez J.
"Arp@: Remote experiences with real embedded systems".
Computer Applications in Engineering Education vol. 22, num. 4, 2014. DOI
-
Gañán D.,Guerrero-Roldán A.E.,Prieto-Blázquez J.,Conesa J.
"A domain-specific language for virtual classrooms".
International Journal of Metadata, Semantics and Ontologies vol. 9, num. 4, 2014. DOI
-
Stokes K.,Farràs O.
"Linear spaces and transversal designs: K-anonymous combinatorial configurations for anonymous database search notes".
Designs, Codes, and Cryptography vol. 71, num. 3, 2014. DOI
-
Balbuena C.,Salas J.
"On the order of graphs with a given girth pair".
Discrete Mathematics vol. 321, num. 1, 2014. DOI
-
Megías D.,Domingo-Ferrer J.
"Privacy-aware peer-to-peer content distribution using automatically recombined fingerprints".
Multimedia Systems vol. 20, num. 2, 2014. DOI
-
Fallahpour M.,Megías D.
"Secure logarithmic audio watermarking scheme based on the human auditory system".
Multimedia Systems vol. 20, num. 2, 2014. DOI
-
Melià-Seguí J.,Garcia-Alfaro J.,Herrera-Joancomartí J.
"On the similarity of commercial EPC Gen2 pseudorandom number generators".
Transactions on Emerging Telecommunications Technologies vol. 25, num. 2, 2014. DOI
-
Stokes K.,Bras-Amorós M.
"Linear, non-homogeneous, symmetric patterns and prime power generators in numerical semigroups associated to combinatorial configurations".
Semigroup Forum vol. 88, num. 1, 2014. DOI
-
Caballé S.,Mora N.,Feidakis M.,Gañán D.,Conesa J.,Daradoumis T.,Prieto J.
"CC-LR: Providing interactive, challenging and attractive Collaborative Complex Learning Resources".
Journal of Computer Assisted Learning vol. 30, num. 1, 2014. DOI
-
Salas J.,Torra V.
"Approximating degree sequences with regular graphic sequences (Extended Abstract)".
Electronic Notes in Discrete Mathematics vol. 46, num. 1, 2014. DOI
-
Dalfó C.,Huemer C.,Salas J.
"The degree/diameter problem in maximal planar bipartite graphs".
Electronic Notes in Discrete Mathematics vol. 46, num. 1, 2014. DOI
-
Arnedo-Moreno J.,Pérez-Gilabert N.,Domingo-Prieto M.
"Anonymously accessing JXTA community services through split message forwarding".
Mathematical and Computer Modelling vol. 58, num. 5-6, 2013. DOI
-
Ball S.,Bamberg J.,Devillers A.,Stokes K.
"An alternative way to generalize the pentagon".
Journal of Combinatorial Designs vol. 21, num. 4, 2013. DOI
-
Domingo-Ferrer J.,Megías D.
"Distributed multicast of fingerprinted content based on a rational peer-to-peer community".
Computer Communications vol. 36, num. 5, 2013. DOI
-
Lerch-Hostalot D.,Megías D.
"LSB matching steganalysis based on patterns of pixel differences and random embedding".
Computers and Security vol. 32, 2013. DOI
-
Melià-Seguí J.,Garcia-Alfaro J.,Herrera-Joancomartí J.
"J3Gen: A PRNG for low-cost passive RFID".
Sensors (Switzerland) vol. 13, num. 3, 2013. DOI
-
Torra V.,Stokes K.,Narukawa Y.
"An extension of fuzzy measures to multisets and its relation to distorted probabilities".
IEEE Transactions on Fuzzy Systems vol. 20, num. 6, 2012. DOI
-
Rifà-Pous H.,Blasco M.,Garrigues C.
"Review of robust cooperative spectrum sensing techniques for cognitive radio networks".
Wireless Personal Communications vol. 67, num. 2, 2012. DOI
-
Stokes K.,Torra V.
"Reidentification and k-anonymity: A model for disclosure risk in graphs".
Soft Computing vol. 16, num. 10, 2012. DOI
-
Conesa J.,Caballé S.,Gañán D.,Prieto J.
"Exploiting the Semantic Web to Represent Information from On-line Collaborative Learning".
International Journal of Computational Intelligence Systems vol. 5, num. 4, 2012. DOI
-
Lázaro D.,Marquès J.M.,Cabrera G.,Rifà-Pous H.,Montané A.
"HorNet: Microblogging for a contributory social network".
IEEE Internet Computing vol. 16, num. 3, 2012. DOI
-
Fallahpour M.,Megias D.
"High capacity robust audio watermarking scheme based on FFT and linear regression".
International Journal of Innovative Computing, Information and Control vol. 8, num. 4, 2012.
-
Rifà-Pous H.,Garrigues C.
"Authenticating hard decision sensing reports in cognitive radio networks".
Computer Networks vol. 56, num. 2, 2012. DOI
-
Bras-Amorós M.,Stokes K.
"The semigroup of combinatorial configurations".
Semigroup Forum vol. 84, num. 1, 2012. DOI
-
Stokes K.,Torra V.
"Multiple releases of k-anonymous data sets and k-anonymous relational databases".
International Journal of Uncertainty, Fuzziness and Knowldege-Based Systems vol. 20, num. 6, 2012. DOI
-
Dacuña J.,Melià-Seguí J.,Pous R.
"Multi-tag spatial multiplexing in UHF RFID systems".
IEICE Electronics Express vol. 9, num. 21, 2012. DOI
-
Rifà-Pous H.,Rifà J.,Ronquillo L.
"Z2Z4-additive perfect codes in steganography".
Advances in Mathematics of Communications vol. 5, num. 3, 2011. DOI
-
Melià-Seguí J.,Garcia-Alfaro J.,Herrera-Joancomartí J.
"A practical implementation attack on weak pseudorandom number generator designs for EPC Gen2 tags".
Wireless Personal Communications vol. 59, num. 1, 2011. DOI
-
Sánchez F.,Megías D.,Prieto-Blázquez J.
"SiMR: A simulator for learning computer architecture".
International Journal of Engineering Education vol. 27, num. 2, 2011.
-
Arnedo-Moreno J.,Matsuo K.,Barolli L.,Xhafa F.
"Secure communication setup for a P2P-based JXTA-overlay platform".
IEEE Transactions on Industrial Electronics vol. 58, num. 6, 2011. DOI
-
Ruiz Vicente C.,Freni D.,Bettini C.,Jensen C.S.
"Location-related privacy in Geo-social networks".
IEEE Internet Computing vol. 15, num. 3, 2011. DOI
-
Radmand P.,Singh J.,Talevski A.,Domingo-Prieto M.,Arnedo-Moreno J.
"The impact of security on voip call quality".
Journal of Mobile Multimedia vol. 7, num. 1, 2011.
-
Fallahpour M.,Megias D.,Ghanbari M.
"Subjectively adapted high capacity lossless image data hiding based on prediction errors".
Multimedia Tools and Applications vol. 52, num. 2-3, 2011. DOI
-
Fallahpour M.,Megías D.
"High capacity audio watermarking using the high frequency band of the wavelet domain".
Multimedia Tools and Applications vol. 52, num. 2-3, 2011. DOI
-
Rifà-Pous H.,Herrera-Joancomartí J.
"Computational and energy costs of cryptographic algorithms on handheld devices".
Future Internet vol. 3, num. 1, 2011. DOI
-
Fallahpour M.,Megias D.,Ghanbari M.
"Reversible and high-capacity data hiding in medical images".
IET Image Processing vol. 5, num. 2, 2011. DOI
-
Montolio-Aranda P.,Garcia-Alfaro J.,Megías D.
"Improved flooding of broadcast messages using extended multipoint relaying".
Journal of Network and Computer Applications vol. 34, num. 2, 2011. DOI
-
Rifà-Pous H.,Herrera-Joancomartí J.
"A fair and secure cluster formation process for Ad hoc networks".
Wireless Personal Communications vol. 56, num. 3, 2011. DOI
-
Serra-Ruiz J.,Megías D.
"A novel semi-fragile forensic watermarking scheme for remote-sensing images".
International Journal of Remote Sensing vol. 32, num. 19, 2011. DOI
-
Rifà-Pous H.,Jiménez Blasco M.,Mut Rojas J.
"Robust detection of incumbents in cognitive radio networks using groups".
IEICE Transactions on Communications vol. E94-B, num. 9, 2011. DOI
-
Megías D.,Serra-Ruiz J.,Fallahpour M.
"Efficient self-synchronised blind audio watermarking system based on time domain and FFT amplitude modification".
Signal Processing vol. 90, num. 12, 2010. DOI
-
Garrigues C.,Robles S.,Borrell J.,Navarro-Arribas G.
"Promoting the development of secure mobile agent applications".
Journal of Systems and Software vol. 83, num. 6, 2010. DOI
-
Arnedo-Moreno J.,Herrera-Joancomartí J.
"JXTA resource access control by means of advertisement encryption".
Future Generation Computer Systems vol. 26, num. 1, 2010. DOI
-
Arnedo-Moreno J.,Herrera-Joancomartí J.
"A survey on security in JXTA applications".
Journal of Systems and Software vol. 82, num. 9, 2009. DOI
-
Fallahpour M.,Megias D.
"High capacity audio watermarking using FFT amplitude interpolation".
IEICE Electronics Express vol. 6, num. 14, 2009. DOI
-
Garrigues C.,Migas N.,Buchanan W.,Robles S.,Borrell J.
"Protecting mobile agents from external replay attacks".
Journal of Systems and Software vol. 82, num. 2, 2009. DOI
-
Rifà-Pous H.,Herrera-Joancomartí J.
"Cryptographic energy costs are assumable in ad hoc networks".
IEICE Transactions on Information and Systems vol. E92-D, num. 5, 2009. DOI
-
Rifà-Pous H.,Rifà J.
"Product perfect codes and steganography".
Digital Signal Processing: A Review Journal vol. 19, num. 4, 2009. DOI
-
Gilabert E.R.,Ruiz M.A.,García A.M.D.,García X.M.,Pous H.R.
"Recognition of prior experiential learning, a new challenge for the university system".
Estudios Sobre Educacion num. 15, 2008.
-
Prieto-Blazquez J.,Arnedo-Moreno J.,Herrera-Joancomarti J.
"An integrated structure for a virtual networking laboratory".
IEEE Transactions on Industrial Electronics vol. 55, num. 6, 2008. DOI
-
Garrigues C.,Robles S.,Borrell J.
"Securing dynamic itineraries for mobile agent applications".
Journal of Network and Computer Applications vol. 31, num. 4, 2008. DOI
-
Fallahpour M.
"Reversible image data hiding based on gradient adjusted prediction".
IEICE Electronics Express vol. 5, num. 20, 2008. DOI
-
Minguillón J.,Herrera-Joancomartí J.,Megías D.
"Robust watermarking scheme based on the JPEG2000 standard".
Journal of Electronic Imaging vol. 14, num. 3, 2005. DOI
-
Megías D.,Herrera-Joancomartí J.,Minguillón J.
"A robust audio watermarking scheme based on MPEG 1 layer 3 compression".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 2828, 2003. DOI
Editorial
-
Megías D.,Mazurczyk W.,Kuribayashi M.
"Data hiding and its applications: Digital watermarking and steganography".
Applied Sciences (Switzerland) vol. 11, num. 22, 2021. DOI
-
Arnedo J.,Nacke L.E.,Toups Z.O.,Vanden Abeele V.
"From the General Chairs & Program Chairs".
CHI PLAY 2019 - Proceedings of the Annual Symposium on Computer-Human Interaction in Play 2019.
-
Arnedo J.,Nacke L.E.,Toups Z.O.,Abeele V.V.
"From the General Chairs & Program Chairs".
CHI PLAY 2019 - Extended Abstracts of the Annual Symposium on Computer-Human Interaction in Play 2019.
-
Pérez-Solà C.,Navarro-Arribas G.
"Foreword from the DPM 2019 program chairs".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 11737 LNCS, 2019.
-
Arnedo-Moreno J.,Mora A.,González C.
"Preface".
CEUR Workshop Proceedings vol. 2497, 2019.
-
Ally M.,Prieto-Blázquez J.
"What is the future of mobile learning in education?".
RUSC Universities and Knowledge Society Journal vol. 11, num. 1, 2014. DOI
-
Torra V.,Narukawa Y.,Navarro-Arribas G.,Megías D.
"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 8234 LNAI, 2013. DOI
-
Stokes K.,Torra V.
"Guest editors' introduction: Special issue on computational definitions of privacy and anonymity".
International Journal of Uncertainty, Fuzziness and Knowldege-Based Systems vol. 20, num. 6, 2012. DOI
-
Barni M.,Joancomartí J.,Katzenbeisser S.,Pérez-González F.
"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface".
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 3727 LNCS, 2006.
Book Chapter
-
Sabillon R.,Serra-Ruiz J.,Cavaller V.,Cano J.J.M.
"An effective cybersecurity training model to support an organizational awareness program: The cybersecurity awareness training model (catram). a case study in Canada".
Research Anthology on Artificial Intelligence Applications in Security vol. 1-4, 2020. DOI
-
Garcia-Font V.
"Blockchain: Opportunities and challenges in the educational context".
Lecture Notes on Data Engineering and Communications Technologies vol. 34, 2020. DOI
-
Prieto J.,Gañán D.
"A Methodology Approach to Evaluate Cloud-Based Infrastructures in Support for e-Assessment".
Lecture Notes in Networks and Systems vol. 96, 2020. DOI
-
Prieto-Blazquez J.,Gañan D.
"Engineering cloud-based technological infrastructure".
Lecture Notes on Data Engineering and Communications Technologies vol. 34, 2020. DOI
-
Amigud A.,Arnedo-Moreno J.,Daradoumis T.,Guerrero-Roldan A.E.
"Open proctor: An academic integrity tool for the open learning environment".
Lecture Notes on Data Engineering and Communications Technologies vol. 8, 2018. DOI
-
Amigud A.,Daradoumis T.,Arnedo-Moreno J.,Guerrero-Roldan A.E.
"A procedural learning and institutional analytics framework".
Lecture Notes on Data Engineering and Communications Technologies vol. 11, 2018. DOI
-
Domingo-Ferrer J.,Sánchez D.,Soria-Comas J.
"Co-utility: Designing self-enforcing and mutually beneficial protocols".
Studies in Systems, Decision and Control vol. 110, 2018. DOI
-
Soria-Comas J.,Domingo-Ferrer J.
"Self-enforcing collaborative anonymization via Co-utility".
Studies in Systems, Decision and Control vol. 110, 2018. DOI
-
Domingo-Ferrer J.,Martínez S.,Sánchez D.,Soria-Comas J.
"Co-utile P2P anonymous keyword search".
Studies in Systems, Decision and Control vol. 110, 2018. DOI
-
Megías D.,Domingo-Ferrer J.
"Co-utile privacy-aware P2P content distribution".
Studies in Systems, Decision and Control vol. 110, 2018. DOI
-
Gómez-Miralles L.,Arnedo-Moreno J.
"Hardening iOS Devices Against Remote Forensic Investigation".
Security and Resilience in Intelligent Data-Centric Systems and Communication Networks 2017. DOI
-
Falah B.,Akour M.,Oukemeni S.
"An alternative threat model-based approach for security testing".
Application Development and Design: Concepts, Methodologies, Tools, and Applications 2017. DOI
-
Riera D.,Arnedo-Moreno J.
"κPAX: Experiences on Designing a Gamified Platform for Serious Gaming".
Formative Assessment, Learning Data Analytics and Gamification: In ICT Education 2016. DOI
Letter
-
Baró-Solé X.,Guerrero-Roldan A.E.,Prieto-Blázquez J.,Rozeva A.,Marinov O.,Kiennert C.,Rocher P.O.,Garcia-Alfaro J.
"Integration of an adaptive trust-based e-assessment system into virtual learning environments—The TeSLA project experience".
Internet Technology Letters vol. 1, num. 4, 2018. DOI
-
Garcia-Alfaro J.,Herrera-Joancomartí J.,Melià-Seguí J.
"Remarks on Peinado et al.’s analysis of J3Gen".
Sensors (Switzerland) vol. 15, num. 3, 2015. DOI
Erratum
-
Stokes K.,Farràs O.
"Erratum: Linear spaces and transversal designs: K-anonymous combinatorial configurations for anonymous database search (Designs, Codes, and Cryptography DOI: 10.1007/s10623-012-9745-8)".
Designs, Codes, and Cryptography vol. 71, num. 3, 2014. DOI