Funding for this research was provided by:
The Opening Project of Guangdong Provincial Key Laboratory of Information Security Technology (2017B030314131)
National Natural Science Foundation of China (61802033)
National Natural Science Foundation of China (61751110)
Postdoctoral Research Foundation of China (216638)
Article History
Received: 28 May 2018
Accepted: 16 March 2019
First Online: 30 March 2019