Authors
Hongjiao Guan
School of Cyber Security, Qilu University of Technology, Shandong Academy of Sciences, Jinan, China
Shandong Key Laboratory of Computer Networks, Jinan, China
School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China
Yingtao Zhang
School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China
Heng-Da Cheng
School of Computer Science, Utah State University, Logan
Xianglong Tang
School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China