Journal Articles

Disclaimer: The papers below are intended for private viewing by the page owner or those who otherwise have legitimate access to them. No part of it may in any form or by any electronic, mechanical, photocopying, recording, or any other means be reproduced, stored in a retrieval system or be broadcast or transmitted without the prior permission of the respective publishers. If your organization has a valid subscription of the journals, click on the DOI link for the legitimate copy of the papers.

Granger Causality-based Information Fusion Applied to Electrical Measurements from Power Transformers Information Fusion

Fatigue detection during Sit-To-Stand Test based on surface electromyography and acceleration: a case study Sensors 2019, 19(19), 4202

Assessing Physical Activity and Functional Fitness Level Using Convolutional Neural Networks Knowledge-Based Systems

Parkinson’s Disease Detection Using Isosurfaces-Based Features and Convolutional Neural Networks Frontiers in Neuroinformatics

Studying the Manifold Structure of Alzheimer’s Disease: A Deep Learning Approach Using Convolutional Autoencoders IEEE Journal of Biomedical and Health Informatics (J-BHI)

Label aided deep ranking for the automatic diagnosis of Parkinsonian syndromes Neurocomputing Vol. 330, pp. 162--171.

Reconstruction of a 1940 Spanish strip cipher by means of a cyclic rotation model applied to encrypted telegrams Cryptologia Vol. 0, No. 0, pp. 1-18.

Discriminative Sparse Features for Alzheimer’s Disease Diagnosis Using Multimodal Image Data Current Alzheimer Research Vol. 15, No. 1, pp. 67--79.

Ensemble of random forests one vs. rest classifiers for MCI and AD prediction using ANOVA cortical and subcortical feature selection and partial least squares Journal of neuroscience methods Vol. 302, pp. 47--57.

Assessing mild cognitive impairment progression using a spherical brain mapping of magnetic resonance imaging Journal of Alzheimer's Disease Vol. , No. Preprint, pp. 1--17.

Comments on “Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems” IEEE Transactions on Information Forensics and Security Vol. 13, No. 11, pp. 2929--2931.

Convolutional Neural Networks for Neuroimaging in Parkinson’s Disease: Is Preprocessing Needed? International journal of neural systems Vol. , pp. 1850035--1850035.

Empirical Functional PCA for 3D Image Feature Extraction Through Fractal Sampling. International journal of neural systems Vol. , pp. 1850040--1850040.

Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks Peer-to-Peer Networking and Applications Vol. 10, No. 1, pp. 79--91.

Performance Analysis of LDPC-Based {RFID} Group Coding {IEEE} Trans. Automation Science and Engineering Vol. 14, No. 1, pp. 398--402.

A supervised filter method for multi-objective feature selection in EEG classification based on multi-resolution analysis for BCI Neurocomputing Vol. 250, pp. 45--56.

Automatic computation of regions of interest by robust principal component analysis. Application to automatic dementia diagnosis Knowledge-Based Systems Vol. 123, pp. 229--237.

Construction and Analysis of Weighted Brain Networks from SICE for the Study of Alzheimer’s Disease Frontiers in neuroinformatics Vol. 11, pp. 19.

Case-based statistical learning: a non-parametric implementation with a conditional-error rate SVM IEEE Access Vol. 5, pp. 11468--11478.

An RFID-based smart structure for the supply chain: Resilient scanning proofs and ownership transfer with positive secrecy capacity channels Sensors Vol. 17, No. 7, pp. 1562.

A semi-supervised learning approach for model selection based on class-hypothesis testing Expert Systems with Applications Vol. 90, pp. 40--49.

PET image classification using HHT-based features through fractal sampling Vol. , pp. .

Security of distance-bounding: A survey ACM Computing Surveys Vol. 4, pp. .

RFID ownership transfer with positive secrecy capacity channels Sensors Vol. 17, No. 1, pp. 53.

Tag Memory-Erasure Tradeoff of {RFID} Grouping Codes {IEEE} Communications Letters Vol. 20, No. 6, pp. 1144--1147.

Attacks on ownership transfer scheme for multi-tag multi-owner passive RFID environments Computer Communications Vol. 88, pp. 84--88.

Optimal modes of operation of pseudorandom sequence generators based on DLFSRs Logic Journal of the IGPL Vol. 24, No. 6, pp. 933--943.

Content-based image authentication using sparse features and SOM trajectories Logic Journal of the IGPL Vol. 24, pp. 4-15.

A structural parametrization of the brain using hidden Markov models-based paths in Alzheimer’s disease International journal of neural systems Vol. 26, No. 07, pp. 1650024.

A spherical brain mapping of MR images for the detection of Alzheimer’s disease Current Alzheimer Research Vol. 13, No. 5, pp. 575--588.

Ensembles of deep learning architectures for the early diagnosis of the Alzheimer’s disease International journal of neural systems Vol. 26, No. 07, pp. 1650025.

Classification of motor imagery tasks for BCI with multiresolution analysis and multiobjective feature selection Biomedical engineering online Vol. 15, No. 1, pp. 73.

Revision of J3Gen and Validity of the Attacks by Peinado et al. Sensors Vol. 15, No. 5, pp. 11988--11992.

Parallel alternatives for evolutionary multi-objective optimization in unsupervised feature selection Expert Systems with Applications Vol. 42, No. 9, pp. 4239--4252.

PCA filtering and probabilistic SOM for network intrusion detection Neurocomputing Vol. 164, pp. 71--81.

Tuning compilations by multi-objective optimization: Application to apache web server Applied Soft Computing Vol. 29, pp. 461--470.

Leveraging cooperation for parallel multi-objective feature selection in high-dimensional EEG data Concurrency and Computation: Practice and Experience Vol. 27, No. 18, pp. 5476--5499.

Exploratory graphical models of functional and structural connectivity patterns for Alzheimer’s disease diagnosis Frontiers in computational neuroscience Vol. 9, pp. 132.

EPCGen2 pseudorandom number generators: analysis of J3Gen Sensors Vol. 14, No. 4, pp. 6500--6515.

Pre vs Post State Update: Trading Privacy for Availability in {RFID} {IEEE} Wireless Commun. Letters Vol. 3, No. 3, pp. 317--320.

Improving MR brain image segmentation using self-organising maps and entropy-gradient clustering Information Sciences Vol. 262, pp. 117--136.

Multi-objective adaptive evolutionary strategy for tuning compilations Neurocomputing Vol. 123, pp. 381--389.

Automatic detection of Parkinsonism using significance measures and component analysis in DaTSCAN imaging Neurocomputing Vol. 126, pp. 58--70.

Automatic ROI selection in structural brain MRI using SOM 3D projection PloS one Vol. 9, No. 4, pp. e93851.

Feature selection by multi-objective optimisation: Application to network anomaly detection by hierarchical self-organising maps Knowledge-Based Systems Vol. 71, pp. 322--338.

Generation of pseudorandom binary sequences by means of linear feedback shift registers (LFSRs) with dynamic feedback Mathematical and Computer Modelling Vol. 57, No. 11-12, pp. 2596--2604.

Cryptanalaysis of an {EPCC1G2} Standard Compliant Ownership Transfer Scheme Wireless Personal Communications Vol. 72, No. 1, pp. 245--258.

Improving MRI segmentation with probabilistic GHSOM and multiobjective optimization Neurocomputing Vol. 114, pp. 118--131.

Two fully-unsupervised methods for MR brain image segmentation using SOM-based strategies Applied Soft Computing Vol. 13, No. 5, pp. 2668--2682.

Affinity-based network interfaces for efficient communication on multicore architectures Journal of Computer Science and Technology Vol. 28, No. 3, pp. 508--524.

Segmentation of brain MRI using SOM-FCM-based method and 3D statistical descriptors Computational and mathematical methods in medicine Vol. 2013, pp. .

Parameterization of the distribution of white and grey matter in MRI using the $alpha$-stable distribution Computers in biology and medicine Vol. 43, No. 5, pp. 559--567.

Application of empirical mode decomposition (EMD) on DaTSCAN SPECT images to explore Parkinson disease Expert Systems with Applications Vol. 40, No. 7, pp. 2756--2766.

LVQ-SVM based CAD tool applied to structural MRI for the diagnosis of the Alzheimer’s disease Pattern Recognition Letters Vol. 34, No. 14, pp. 1725--1733.

Leveraging bandwidth improvements to web servers through enhanced network interfaces The Journal of Supercomputing Vol. 65, No. 3, pp. 1020--1036.

Erratum to “Unsupervised Neural Techniques Applied to MR Brain Image Segmentation” Advances in Artificial Neural Systems Vol. 2013, pp. .

Unsupervised neural techniques applied to MR brain image segmentation Advances in Artificial Neural Systems Vol. 2012, pp. 1.

Cryptanalysis of a key refreshment scheme for multicast protocols by means of genetic algorithm Logic Journal of IGPL Vol. 21, No. 4, pp. 671--679.

Lightweight {RFID} authentication with forward and backward security {ACM} Trans. Inf. Syst. Secur. Vol. 14, No. 1, pp. 11:1--11:26.

MR brain image segmentation by growing hierarchical SOM and probability clustering Electronics Letters Vol. 47, No. 10, pp. 585--586.

Accelerating network applications by distributed interfaces on heterogeneous multiprocessor architectures The Journal of Supercomputing Vol. 58, No. 3, pp. 302--313.

Attacks on a distance bounding protocol Computer Communications Vol. 33, No. 7, pp. 884--889.

Enhanced low-cost RFID protocol to detect relay attacks Wireless Communications and Mobile Computing Vol. 10, No. 3, pp. 361--371.

Network interfaces for programmable NICs and multicore platforms Computer Networks Vol. 54, No. 3, pp. 357--376.

Security flaw of H{«o}lbl et al.�s protocol Computer Communications Vol. 32, No. 4, pp. 736--739.

Protocol offload analysis by simulation Journal of Systems Architecture Vol. 55, No. 1, pp. 25--42.

Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels Wireless communications and mobile computing Vol. 8, No. 9, pp. 1227--1232.

HB-MP: A further step in the HB-family of lightweight authentication protocols Computer Networks Vol. 51, No. 9, pp. 2262--2267.

Modeling Network Behaviour By Full-System Simulation JSW Vol. 2, No. 2, pp. 11--18.

Off-line password-guessing attack to Peyravian–Jeffries�s remote user authentication protocol Computer Communications Vol. 30, No. 1, pp. 52--54.

Comment on �A technique for image encryption using digital signature� Optics communications Vol. 268, No. 2, pp. 261--265.

Privacy and authentication protocol providing anonymous channels in GSM Computer Communications Vol. 27, No. 17, pp. 1709--1715.

Cryptanalysis of LHL-key authentication scheme Applied Mathematics and Computation Vol. 152, No. 3, pp. 721--724.

Cryptanalysis of anonymous channel protocol for large-scale area in wireless communications Computer Networks Vol. 43, No. 6, pp. 777--785.