Journal of Computer Applications
WANG Hao1, WANG Jinwei1,2,
CHENG Xin3*, ZHANG Jiawei4, WU Hao5,LUO Xiangyang5,
MA Bin6
(1. College of Automation, Nanjing University of Science and Technology, Nanjing 210094, China;
2. College of Cyber Science, Nankai University, Tianjin, 300350, China;
3.College of Computer Science, Cyber Science and Engineering, Nanjing University of Information Science and Technology, Nanjing,210044, China;
4.College of Cyber Security and Information Law, Chongqing University of Posts and Telecommunications, Chongqing, 400065, China;
5. Department of State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, 450000, China;
6. College of Cyber Science, Qilu University of Technology, Jinan, 250353, China)
王昊1,王金伟2,程鑫3,张家伟4,吴昊5,罗向阳6,马宾7
(1.南京理工大学 自动化学院, 南京210044;
2. 南开大学 网络空间安全学院, 天津 300350;
3. 南京信息工程大学 计算机学院、网络空间安全学院, 南京 210044;
4. 重庆邮电大学 网络空间安全与信息法学院, 重庆 400065;
5. 数学工程与先进计算国家重点实验室, 郑州 450001;
6. 齐鲁工业大学 网络空间安全学院, 济南 250353)