Wang, Yilei
Chen, Leisi
Leung, Ho-fung
Hu, Chengyu
Chen, Beijing
Funding for this research was provided by:
Fujian Provincial Key Laboratory of Network Security and Cryptology Research Fund (15004)
Outstanding Young Scientists Foundation Grant of Shandong Province (BS2014DX016)
National Natural Science Foundation of China (61572294)
National Natural Science Foundation of China (61502218)