1. School of Information and Software Engineering, Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, China
2. Department of Applied Mathematics and Computer Science, Technical University of Denmark, Kongens Lyngby, Denmark
3. Department of Information Management, National Dong Hwa University, Hualien, Taiwan