Jorge Munilla

Orcid: 0000-0003-2795-312X

Affiliations:
  • University of Málaga, Spain


According to our database1, Jorge Munilla authored at least 60 papers between 2006 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Patient privacy in smart cities by blockchain technology and feature selection with Harris Hawks Optimization (HHO) algorithm and machine learning.
Multim. Tools Appl., 2022

5G Early Data Transmission (Rel-16): Security Review and Open Issues.
IEEE Access, 2022

Graph signal processing to identify biomarkers in brain networks in dementia.
Proceedings of the Medical Imaging 2022: Biomedical Applications in Molecular, 2022

Enhanced Computation of the EEG-IC Polarities using a Genetic Algorithm.
Proceedings of the 12th International Congress on Advanced Applied Informatics, 2022

NB-IoT latency evaluation with real measurements.
Proceedings of the IEEE Workshop on Complexity in Engineering, 2022

2021
5G Numerologies Assessment for URLLC in Industrial Communications.
Sensors, 2021

An enhanced symmetric-key based 5G-AKA protocol.
Comput. Networks, 2021

Identifying the diffusion source of dementia spreading in structural brain networks.
Proceedings of the Medical Imaging 2021: Biomedical Applications in Molecular, 2021

Performance Study of Ant Colony Optimization for Feature Selection in EEG Classification.
Proceedings of the Bioengineering and Biomedical Signal and Image Processing, 2021

2020
Secure lightweight password authenticated key exchange for heterogeneous wireless sensor networks.
Inf. Syst., 2020

e-Academy to support Smart Cities Operations in Palestine (eSCO) project: final achievements.
Proceedings of the IEEE International Smart Cities Conference, 2020

2019
Label aided deep ranking for the automatic diagnosis of Parkinsonian syndromes.
Neurocomputing, 2019

Empirical Functional PCA for 3D Image Feature Extraction Through Fractal Sampling.
Int. J. Neural Syst., 2019

Parkinson's Disease Detection Using Isosurfaces-Based Features and Convolutional Neural Networks.
Frontiers Neuroinformatics, 2019

Security of Distance-Bounding: A Survey.
ACM Comput. Surv., 2019

Isosurface Modelling of DatSCAN Images for Parkinson Disease Diagnosis.
Proceedings of the Understanding the Brain Function and Emotions, 2019

e-Academy to support Smart Cities Operations in Palestine (eSCO) project: progress report.
Proceedings of the 2019 IEEE International Smart Cities Conference, 2019

2018
Comments on "Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems".
IEEE Trans. Inf. Forensics Secur., 2018

2017
Performance Analysis of LDPC-Based RFID Group Coding.
IEEE Trans Autom. Sci. Eng., 2017

RFID Ownership Transfer with Positive Secrecy Capacity Channels.
Sensors, 2017

An RFID-Based Smart Structure for the Supply Chain: Resilient Scanning Proofs and Ownership Transfer with Positive Secrecy Capacity Channels.
Sensors, 2017

Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks.
Peer-to-Peer Netw. Appl., 2017

Automatic computation of regions of interest by robust principal component analysis. Application to automatic dementia diagnosis.
Knowl. Based Syst., 2017

Construction and Analysis of Weighted Brain Networks from SICE for the Study of Alzheimer's Disease.
Frontiers Neuroinformatics, 2017

Learning Longitudinal MRI Patterns by SICE and Deep Learning: Assessing the Alzheimer's Disease Progression.
Proceedings of the Medical Image Understanding and Analysis - 21st Annual Conference, 2017

Secure UAV-Based System to Detect and Filter Sea Objects Using Image Processing.
Proceedings of the Computer Aided Systems Theory - EUROCAST 2017, 2017

2016
Ensembles of Deep Learning Architectures for the Early Diagnosis of the Alzheimer's Disease.
Int. J. Neural Syst., 2016

Optimal modes of operation of pseudorandom sequence generators based on DLFSRs.
Log. J. IGPL, 2016

Tag Memory-Erasure Tradeoff of RFID Grouping Codes.
IEEE Commun. Lett., 2016

KP+ : Fixing Availability Issues on KP Ownership Transfer Protocols.
IACR Cryptol. ePrint Arch., 2016

Attacks on ownership transfer scheme for multi-tag multi-owner passive RFID environments.
Comput. Commun., 2016

Resilient Grouping Proofs with Missing Tag Identification.
Proceedings of the Ubiquitous Computing and Ambient Intelligence, 2016

An anonymous RFID grouping-proof with missing tag identification.
Proceedings of the 2016 IEEE International Conference on RFID, 2016

Resilient Metro-scale Smart Structures: Challenges & Future Directions.
Proceedings of the International Conference on Internet of Things and Big Data, 2016

2015
Revision of J3Gen and Validity of the Attacks by Peinado et al.
Sensors, 2015

Exploratory graphical models of functional and structural connectivity patterns for Alzheimer's Disease diagnosis.
Frontiers Comput. Neurosci., 2015

Automated Diagnosis of Alzheimer's Disease by Integrating Genetic Biomarkers and Tissue Density Information.
Proceedings of the Artificial Computation in Biology and Medicine, 2015

2014
Pre vs Post State Update: Trading Privacy for Availability in RFID.
IEEE Wirel. Commun. Lett., 2014

EPCGen2 Pseudorandom Number Generators: Analysis of J3Gen.
Sensors, 2014

Attacks on Secure Ownership Transfer for Multi-Tag Multi-Owner Passive RFID Environments.
IACR Cryptol. ePrint Arch., 2014

Improving the Period and Linear Span of the Sequences Generated by DLFSRs.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014

Group-scanning for supply chain management.
Proceedings of the IEEE RFID Technology and Applications Conference, 2014

2013
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme.
Wirel. Pers. Commun., 2013

Enhanced Ownership Transfer Protocol for RFID in an Extended Communication Model.
IACR Cryptol. ePrint Arch., 2013

Distributed Group Authentication for RFID Supply Management.
IACR Cryptol. ePrint Arch., 2013

2012
Lightweight Authentication Protocols based on Rotations and the LPN Problem.
Proceedings of the SENSORNETS 2012, 2012

2011
Lightweight RFID authentication with forward and backward security.
ACM Trans. Inf. Syst. Secur., 2011

2010
Enhanced low-cost RFID protocol to detect relay attacks.
Wirel. Commun. Mob. Comput., 2010

Attacks on a distance bounding protocol.
Comput. Commun., 2010

Robotic vehicles to simulate RFID-based vehicular ad hoc networks.
Proceedings of the 3rd International Conference on Simulation Tools and Techniques, 2010

What can RFID do for Vanets? - A Cryptographic Point of View.
Proceedings of the SECRYPT 2010, 2010

2009
Secure EPC Gen2 compliant Radio Frequency Identification.
IACR Cryptol. ePrint Arch., 2009

Security flaw of Hölbl et al.'s protocol.
Comput. Commun., 2009

A Scaled Test Bench for Vanets with RFID Signalling.
Proceedings of the Computational Intelligence in Security for Information Systems, 2009

2008
Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels.
Wirel. Commun. Mob. Comput., 2008

Simulador de Estudio de Grabación de Audio.
Rev. Iberoam. de Tecnol. del Aprendiz., 2008

Attacks on Singelee and Preneel's protocol.
IACR Cryptol. ePrint Arch., 2008

Security Analysis of Tu and Piramuthu's Protocol.
Proceedings of the NTMS 2008, 2008

2007
HB-MP: A further step in the HB-family of lightweight authentication protocols.
Comput. Networks, 2007

2006
Off-line password-guessing attack to Peyravian-Jeffries's remote user authentication protocol.
Comput. Commun., 2006


  Loading...