Search results
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 3 > 545 - 558
IEEE Security & Privacy > 2017 > 15 > 2 > 8 - 10
IEEE Security & Privacy > 2017 > 15 > 5 > 47 - 54
IEEE Security & Privacy > 2017 > 15 > 4 > 72 - 78
IEEE Security & Privacy > 2017 > 15 > 1 > 52 - 57
IEEE Transactions on Communications > 2016 > 64 > 11 > 4764 - 4775
IEEE Micro > 2016 > 36 > 5 > 17 - 27
IEEE Transactions on Information Theory > 2016 > 62 > 6 > 3504 - 3531
China Communications > 2016 > 13 > 3 > 193 - 202
China Communications > 2016 > 13 > 2 > 178 - 188
IEEE Transactions on Electromagnetic Compatibility > 2015 > 57 > 6 > 1752 - 1755
IEEE Security & Privacy > 2015 > 13 > 6 > 82 - 84
IEEE Security & Privacy > 2015 > 13 > 6 > 38 - 43
IEEE Security & Privacy > 2015 > 13 > 6 > 60 - 65
IEEE Security & Privacy > 2015 > 13 > 6 > 18 - 21
IEEE Security & Privacy > 2015 > 13 > 5 > 8 - 10
IEEE Security & Privacy > 2015 > 13 > 3 > 9 - 15
IEEE Security & Privacy > 2015 > 13 > 1 > 80
IEEE Access > 2015 > 3 > 2554 - 2565