Chen, Pei
Tan, Wuzheng
Zhong, YiJian
Wang, Hailong
Fan, Linlin
Weng, Jian
Funding for this research was provided by:
National Natural Science Foundation of China (62272199)
Science and Technology Major Project of Tibetan Autonomous Region of China (XZ202201ZD0006G)
Guangdong Key Laboratory of Data Security and Privacy Preserving (2023B1212060036)
Guangdong Hong Kong Joint Laboratory for Data Security and Privacy Protection (2023B1212120007)
National Joint Engineering Research Center of Network Security Detection and Protection Technology
Engineering Research Center of Trustworthy AI, Ministry of Education
Article History
Received: 12 March 2025
Revised: 5 October 2025
Accepted: 25 December 2025
First Online: 2 February 2026
Declarations
:
: The authors have no conflict of interest to declare that are relevant to the content of this article.
: This article does not contain studies with human participants or animals performed by any of the authors.
: Not applicable.
: Not applicable.