Search results
China Communications > 2017 > 14 > 11 > 237 - 246
IEEE Transactions on Information Forensics and Security > 2017 > 12 > 9 > 2052 - 2066
IEEE Transactions on Mobile Computing > 2017 > 16 > 8 > 2174 - 2183
IEEE Transactions on Control of Network Systems > 2017 > 4 > 1 > 37 - 48
IEEE Access > 2017 > 5 > 7798 - 7807
IEEE Communications Surveys & Tutorials > 2017 > 19 > 2 > 1054 - 1079
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 12 > 2854 - 2865
IEEE Transactions on Vehicular Technology > 2016 > 65 > 8 > 6703 - 6714
IEEE Transactions on Control of Network Systems > 2016 > 3 > 2 > 206 - 217
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 6 > 1177 - 1191
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 6 > 1128 - 1138
IEEE Transactions on Intelligent Transportation Systems > 2016 > 17 > 4 > 960 - 969
IEEE Transactions on Communications > 2016 > 64 > 2 > 753 - 764
IEEE Communications Surveys & Tutorials > 2016 > 18 > 1 > 285 - 323
IEEE Transactions on Dependable and Secure Computing > 2016 > 13 > 1 > 32 - 45
IEEE Transactions on Mobile Computing > 2015 > 14 > 11 > 2376 - 2391
IEEE Transactions on Network and Service Management > 2015 > 12 > 3 > 483 - 495
IEEE Transactions on Parallel and Distributed Systems > 2015 > 26 > 4 > 1117 - 1128
IEEE Systems Journal > 2015 > 9 > 1 > 65 - 75
IEEE Transactions on Mobile Computing > 2014 > 13 > 7 > 1409 - 1423