Yu, Wenqian
Liu, Ye
Gong, Lihua
Tian, Miaomiao
Tu, Liangqiang
Funding for this research was provided by:
the National Natural Science Foundation of China (61861029, 61462061 and 61262084)
the Major Academic Discipline and Technical Leader of Jiangxi Province (20162BCB22011)
the Opening Project of Shanghai Key Laboratory of Integrate Administration Technologies for Information Security (AGK2018002 and AGK201602)
the Innovation Fund for graduates of Nanchang University (CX2017194)
Cultivation Project of Applied Research of Jiangxi Province (20181BBE58022)
Article History
Received: 21 June 2018
Revised: 27 November 2018
Accepted: 20 December 2018
First Online: 26 February 2019