Search results for: . .
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 2 > 511 - 520
IEEE Control Systems Letters > 2018 > 2 > 1 > 109 - 114
IEEE Transactions on Dependable and Secure Computing > 2017 > 14 > 6 > 605 - 619
IEEE Security & Privacy > 2017 > 15 > 6 > 33 - 41
IEEE Security & Privacy > 2017 > 15 > 6 > 25 - 32
IEEE Transactions on Multi-Scale Computing Systems > 2017 > 3 > 4 > 255 - 268
IEEE Transactions on Dependable and Secure Computing > 2017 > 14 > 5 > 550 - 564
IEEE Transactions on Smart Grid > 2017 > 8 > 5 > 2411 - 2419
IEEE Transactions on Information Forensics and Security > 2017 > 12 > 8 > 1801 - 1815
IEEE Transactions on Information Theory > 2017 > 63 > 8 > 5011 - 5038
IEEE Systems Journal > 2017 > 11 > 2 > 471 - 482
IEEE Transactions on Wireless Communications > 2017 > 16 > 5 > 3416 - 3430
IEEE Transactions on Information Forensics and Security > 2017 > 12 > 3 > 631 - 646
IEEE Transactions on Vehicular Technology > 2017 > 66 > 3 > 2658 - 2673
IEEE Security & Privacy > 2017 > 15 > 2 > 70 - 77
IEEE Access > 2017 > 5 > 26973 - 26989
IEEE Access > 2017 > 5 > 20111 - 20123
IEEE Access > 2017 > 5 > 19293 - 19304
IEEE Access > 2017 > 5 > 14966 - 14980
IEEE Access > 2017 > 5 > 11677 - 11687