WEIDONG QIU1, ZHENG GONG2,3,+, YIDONG GUO1, BOZHONG LIU1, XIAOMING TANG1 AND YUHENG YUAN2
1School of Information Security Engineering
Shanghai Jiao Tong University
Shanghai, 200240 P.R. China
E-mail: qiuwd@sjtu.edu.cn
2School of Computer Science
South China Normal University
Guangzhou, 510631 P.R. China
3State Key Laboratory of Information Security
Institute of Information Engineering
Chinese Academy of Sciences
Beijing, 100093 P.R. China
E-mail: cis.gong@gmail.com