Search results
IEEE Robotics and Automation Letters > 2018 > 3 > 2 > 627 - 634
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 3 > 648 - 661
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 3 > 621 - 636
IEEE Transactions on Image Processing > 2018 > 27 > 3 > 1311 - 1322
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 3 > 637 - 647
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 3 > 733 - 744
IEEE Transactions on Image Processing > 2018 > 27 > 3 > 1259 - 1270
IEEE Transactions on Image Processing > 2018 > 27 > 3 > 1164 - 1177
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 3 > 758 - 772
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 3 > 717 - 732
IEEE Transactions on Image Processing > 2018 > 27 > 3 > 1112 - 1125
IEEE Transactions on Image Processing > 2018 > 27 > 3 > 1323 - 1335
IEEE Transactions on Image Processing > 2018 > 27 > 3 > 1347 - 1360
IEEE Transactions on Image Processing > 2018 > 27 > 3 > 1487 - 1500
IEEE Transactions on Image Processing > 2018 > 27 > 3 > 1138 - 1151
IEEE Transactions on Image Processing > 2018 > 27 > 3 > 1336 - 1346
IEEE Transactions on Image Processing > 2018 > 27 > 3 > 1418 - 1432
IEEE Transactions on Industrial Electronics > 2018 > 65 > 3 > 2578 - 2589
IEEE Transactions on Industrial Electronics > 2018 > 65 > 3 > 2525 - 2536
IEEE Transactions on Industrial Electronics > 2018 > 65 > 3 > 2727 - 2736