共 47 条
[1]
Abouelenien M, 2017, P 19 ACM INT C MULT, P302, DOI DOI 10.1145/3136755.3136770
[2]
Adjeroh Donald., 2010, Proc. IEEE International Workshop on Information Forensics and Security, P1
[3]
Andersson V.O., 2015, FLAIRS C, P103
[5]
[Anonymous], 2017, SKELETON POSITION TR
[6]
Aoki, 2015, J SYSTEMICS CYBERNET, V13, P75
[7]
Basha Amjath Fareeth, 2012, International Journal of Computer Science Issues (IJCSI), V9, P150
[9]
Bui L., 2012, 2012 INT C IM PROC C, P617
[10]
Çamalan S, 2016, 2016 24TH SIGNAL PROCESSING AND COMMUNICATION APPLICATION CONFERENCE (SIU), P2161, DOI 10.1109/SIU.2016.7496201