Search results
IEEE Security & Privacy > 2014 > 12 > 2 > 44 - 50
IEEE Internet Computing > 2012 > 16 > 2 > 62 - 67
IEEE Network > 2012 > 26 > 5 > 15 - 21
IEEE Transactions on Automatic Control > 2010 > 55 > 12 > 2896 - 2901
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 3 > 745 - 757
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 3 > 788 - 801
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 3 > 695 - 705
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 2 > 502 - 510
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 2 > 449 - 464
IEEE Sensors Journal > 2018 > 18 > 2 > 849 - 859
IEEE Sensors Journal > 2018 > 18 > 2 > 559 - 568
IEEE/CAA Journal of Automatica Sinica > 2018 > 5 > 1 > 232 - 239
IEEE Transactions on Cybernetics > 2018 > 48 > 1 > 240 - 252
IEEE/CAA Journal of Automatica Sinica > 2018 > 5 > 1 > 148 - 154
IEEE Transactions on Parallel and Distributed Systems > 2018 > 29 > 1 > 56 - 69
IEEE Industry Applications Magazine > 2018 > 24 > 1 > 60 - 70
IEEE Industry Applications Magazine > 2018 > 24 > 1 > 14 - 23
IEEE Transactions on Information Theory > 2018 > 64 > 1 > 26 - 37
IET Networks > 2018 > 7 > 1 > 44 - 49
IEEE Control Systems Letters > 2018 > 2 > 1 > 157 - 162