“…of Captchas With Large Character Sets; TDSC Nov.-Dec. 2021 2953-2968 Wang, Q., see Wang, Z., TDSC May-June 2021 1474-1488 Wang, X., see Lee, Y., TDSC Sept.-Oct. 2021 2390-2402 Wang, X., see Lee, Y., TDSC Sept.-Oct. 2021 2390-2402 Wang, X., see Yao, L., TDSC Nov.-Dec. 2021 2848-2860 Wang, X., see Wu, Y., TDSC Nov.-Dec. 2021 2820-2834 Wang, X.S., see Han, W., TDSC Nov.-Dec. 2021 2705-2718 Wang, Y., see Zheng, S., TDSC March-April 2021 692-705 Wang, Y., see Chang, H., TDSC July-Aug. 2021 1733-1750 Wang, Z., Song, M., Zheng, S., Zhang, Z., Song, Y., and Wang, Q., Invisible Adversarial Attack against Deep Neural Networks: An Adaptive Penalization Approach; TDSC May-June 2021 1474-1488 Wang, Z., seeCheng, Y., TDSC July-Aug. 2021 1989-2004 Wang, Z., see 2569-2581 Wang, Z., seeWei, C., TDSC Nov.-Dec. 2021 2719-2735 Wei, C., see Hu, X., TDSC March-April 2021 843-857 Wei, C., Gu, Q., Ji, S., Chen, W., Wang, Z., and Beyah, R., OB-WSPES: A Uniform Evaluation System for Obfuscation-Based Web Search Privacy; TDSC Nov.-Dec. 2021 2719-2735 Wei, G., see Wang, H., TDSC May-June 2021 1307-1319 Wei, J., Chen, X., Huang, X., Hu, X., and Susilo, W., RS-HABE: Revocable-Storage and Hierarchical Attribute-Based Access Scheme for Secure Sharing of e-Health Records in Public Cloud; TDSC Sept.-Oct. 2021 2301-2315 Wei, W., and Liu, L., Robust Deep Learning Ensemble Against Deception; TDSC July-Aug. 2021 1513-1527 Wei, W., see Gursoy, M.E., TDSC Sept.-Oct. 2021 2365-2378 Wei, Y., see Li, J., TDSC Jan.-Feb. 2021 460-474 Weimer, W., see Zhou, L., Wesemeyer, S., see Han, J., TDSC July-Aug. 2021 1836-1849 Wojciechowski, P.T., see Konczak, J., TDSC March-April 2021 623-640 Wong, H.W.H., see Aloufi, A., TDSC July-Aug. 2021 1821-1835 Wu, C., see Li, X., TDSC July-Aug. 2021 1933-1949 Wu, G., see Yao, L., TDSC March-April 2021 904-917 Wu, G., see Yao, L., TDSC Nov.-Dec. 2021 2848-2860 Wu, H., see Chen, Y., TDSC May-June 2021 1320-1335 Wu, H., see Miao, Y., TDSC July-Aug. 2021 1667-1680 Wu, H., see Xu, L., TDSC Nov.-Dec. 2021 2941-2952 + Check author entry for coauthors Wu, P., X Xia, J., see Ge, C., TDSC May-June 2021 1214-1226 Xia, J., see Ge, C., TDSC Nov.-Dec. 2021 2787-2800 Xiang, Y., see Liu, J., TDSC Jan.-Feb. 2021 448-459 Xiang, Y., see Zhang, Y., TDSC March-April 2021 652-666 Xiang, Y., see Li, X., TDSC July-Aug. 2021 1591-1604 Xiang, Y., see Wang, D., TDSC Sept.-Oct. 2021 2074-2087 Xiang, Y., see Lin, G., TDSC Sept.-Oct. 2021 2469-2485 Xiang, Y., see Xu, L., TDSC Nov.-Dec. 2021 2941-2952 Xiao, J., see Zhou, L., TDSC July-Aug. 2021 1920-1932 Xiao, Q., see Chen, Y., TDSC Sept.-Oct. 2021 2017-2028 Xiao, R., Ren, W., Zhu, T., and Choo, K.R., A Mixing Scheme Using a Decentralized Signature Protocol for Privacy Protection in Bitcoin Blockchain; TDSC July-Aug. 2021 1793-1803 Xiao, S., see Liang, J., TDSC July-Aug. 2021 1632-1644 Xie, N., Chen, C., and Ming, Z., Security Model of Authentication at the Physical Layer and Performance Analysis over Fading Channels; TDSC Jan.-Feb. 2021 253-268 Xie, S., see Liu, B., TDSC Nov.-Dec. 2021 2643-2657 Xie, X., see Ma, S., TDSC March-April 2021 641-651 Xie, Y., Wu, Y., Feng, D., and Long, D., P-Gaussian: Provenance-Based Gaussian Distribution for Detecting Intrusion Behavior Variants Using High Efficient and Real Time Memory Databases; TDSC Nov.-Dec. 2021 2658-2674 Xing, L., see Mo, Y., TDSC Jan.-Feb. 2021 1-14 Xiong, H., see Sun, J., TDSC Sept.-Oct. 2021 2518-2519 Xu, C., see Zhang, X., TDSC May-June 2021 1019-1032 Xu, C., see Zhang, C., TDSC May-June 2021 1245-1260 Xu, F., see Zhang, Y., TDSC May-June 2021 1008-1018 Xu, F., see Hu, Y., TDSC May-June 2021 1033-1050 Xu, J., see Guo, H., TDSC Jan.-Feb. 2021 145-159 Xu, L., see Chen, S., TDSC Nov.-Dec. 2021 2551-2568 Xu, L., Xu, P., see Wu, Y., TDSC Nov.-Dec. 2021 2820-2834 Xu, R., Joshi, J., and Krishnamurthy, P., An Integrated Privacy Preserving Attribute-Based Access Control Framework Supporting Secure Deduplication; TDSC March-April 2021 706-721 Xu, S., see Zou, D., TDSC Sept.-Oct. 202...…”