1. School of Information Security Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
2. National Engineering Laboratory for Wireless Security, Xi'an University of Post and Telecommunications, Xi'an 710121, China
Corresponding author (firstname.lastname@example.org
There is no abstract available for this article.
This work was supported by National Natural Science Foundation of China (Grant Nos. 61472472, 61272037, 61402366) and Natural Science Basic Research Plan in Shaanxi Province of China (Grant Nos. 2016JM6033, 2015JQ6262). Qinglan ZHAO is supported by New Star Team of Xi'an University of Posts and Telecommunications.