YANG YANG1,2,3, YU-CHAO ZHANG1,2, JIA LIU1,2, XI-MENG LIU1,2,
FENG YUAN4 AND SHANG-PING ZHONG1,2,+
1College of Mathematics and Computer Science
2University Key Laboratory of Information Security of Network Systems
Fuzhou University
Fuzhou, 350116 P.R. China
3Fujian Provincial Key Laboratory of Information Processing and Intelligent Control
Minjiang University
Fujian, 350108 P.R. China
4Information Security Institute
Beijing Electronic Science and Technology Institute
Beijing, 100070 P.R. China
E-mail: yang.yang.research@gmail.com; spzhong@fzu.edu.cn