DONGHAI TIAN1,2, XIAOQI JIA2,3, JUNHUA CHEN4,+ AND CHANGZHEN HU1
1Beijing Key Laboratory of Software Security Engineering Technique
Beijing Institute of Technology
Beijing, 100081 China
2Key Laboratory of Network Assessment Technology, Institute of Information Engineering
Chinese Academy of Sciences
Beijing, 100093 China
3University of Chinese Academy of Sciences
Beijing, 100049 China
4Key Laboratory of IOT Application Technology of Universities in Yunnan Province
Yunnan Minzu University
Kunming, 650500 China
E-mail: chenjunhuabj@163.com