Wang, Kun
Chen, Lei
Cao, Biwei
Liu, Bo
Cao, Jiuxin
Funding for this research was provided by:
National Key R&D Project of China (No.2021QY2102, No.2021QY2102, No.2021QY2102, No.2021QY2102, No.2021QY2102)
National Natural Science Foundation of China (No.62172089, No.61972087, No.62172090, No.62106045, No.62172458)
Natural Science Foundation of Jiangsu Province (No.BK20191258, No.BK20191258, No.BK20191258, No.BK20191258, No.BK20191258)
Jiangsu Provincial Key Laboratory of Computer Networking Technology
Jiangsu Provincial Key Laboratory of Network and Information Security (No. BM2003201, No. BM2003201, No. BM2003201, No. BM2003201, No. BM2003201)
Key Laboratory of Computer Network and Information Integration of Ministry of Education of China (No. 93K-9, No. 93K-9, No. 93K-9, No. 93K-9, No. 93K-9)
Article History
Received: 8 July 2024
Revised: 26 September 2024
Accepted: 15 October 2024
First Online: 22 November 2024
Declarations
:
: We declare that we have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.