IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 2 > 502 - 510
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 2 > 421 - 436
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 2 > 465 - 477
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 2 > 437 - 448
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 2 > 377 - 392
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 2 > 393 - 407
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 2 > 511 - 520
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 2 > 521 - 534
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 2 > 490 - 501
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 2 > 408 - 420
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 2 > 478 - 489
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 2 > 449 - 464
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 2 > 327 - 340
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 2 > 292 - 305
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 2 > 341 - 355
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 2 > 356 - 365
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 2 > 318 - 326
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 2 > 269 - 279
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 2 > 366 - 376
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 2 > 280 - 291