IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 1 > 224 - 236
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 1 > 237 - 252
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 1 > 106 - 118
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 1 > 143 - 155
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 1 > 63 - 78
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 1 > 170 - 185
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 1 > 79 - 93
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 1 > 94 - 105
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 1 > 129 - 142
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 1 > 156 - 169
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 1 > 253 - 264
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 1 > 35 - 47
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 1 > 210 - 223
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 1 > 186 - 196
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 1 > 197 - 209
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 1 > 119 - 128
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 1 > 48 - 62
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 1 > 6 - 19
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 1 > 20 - 34
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 2 > 502 - 510