IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 3 > 648 - 661
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 3 > 621 - 636
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 3 > 637 - 647
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 3 > 605 - 620
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 3 > 733 - 744
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 3 > 662 - 670
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 3 > 590 - 604
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 3 > 574 - 589
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 3 > 559 - 573
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 3 > 802 - 817
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 3 > 745 - 757
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 3 > 671 - 684
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 3 > 788 - 801
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 3 > 758 - 772
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 3 > 706 - 716
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 3 > 773 - 787
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 3 > 717 - 732
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 3 > 695 - 705
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 3 > 685 - 694
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 3 > 545 - 558