Email:
Password:
Register
See all articles by this author
Published June 09, 2022
Volume: 30 issue: 6, page(s): 795-827
Issue published: August 01 2022
DOI:10.3233/JCS-210165
Xiaoning Liu xiaoning.trust@gmail.com , Yifeng Zheng yifeng.zheng@hit.edu.cn , Xingliang Yuan xingliang.yuan@monash.edu , Xun Yi xun.yi@rmit.edu.au , School of Computing Technologies, , , Melbourne, VIC 3001, , School of Computer Science and Technology, , , Shenzhen, , Faculty of Information Technology, , , Clayton, VIC 3800,
1
This paper is an extended and revised version of a paper presented at ESORICS 2021.
cite
Xiaoning Liu, Yifeng Zheng, Xingliang Yuan, Xun Yi
Journal of Computer Security
Vol 30, Issue 6, pp. 795 - 827
Issue published date: August-01-2022
10.3233/JCS-210165
View permissions information for this article
View