Faculty of Computer Science and Information Technol ogy, University of Malaya, Malaysia 2Malaysian Institute of Information Technology, Universiti Kuala Lumpur, Malaysia
Xi Luo1,2 and Ying An1 1Institute of Information Security and Big Data, Central South University, China 2Department of Information Technology, Hunan Police Academy, China
Arup Kumar Pal1, Kshiramani Naik1, and Rohit Agarwal2 1Department of Computer Science and Engineering, Indian Institute of Technology(ISM), India 2Department of Computer Science and Engineering, JSS Academy of Technical Education, India