Wang, Fangzhou
Wang, Qijing
Alrahis, Lilas
Fu, Bangqi
Jiang, Shui
Zhang, Xiaopeng
Sinanoglu, Ozgur
Ho, Tsung-Yi
Young, Evangeline F. Y.
Knechtel, Johann
Funding for this research was provided by:
Chinese University of Hong Kong (Grant number)
New York University/New York University Abu Dhabi (NYU/NYUAD) Center for Cyber Security (Grant number)
Article History
Received: 1 March 2025
Accepted: 18 February 2026
First Online: 1 April 2026
Statements and Declarations
:
: This work is partially sponsored by the Chinese University of Hong Kong and New York University/New York University Abu Dhabi (NYU/NYUAD) Center for Cyber Security (CCS).
: The authors declare no competing interests.
: F. W., Q.W., L.A., J.K. wrote the main manuscript text and figures. B.F., S.J., X.Z. helped to implement part of the proposed flow. O.S., T.H., F.Y. reviewed the manuscript.
: Data is provided within the manuscript or supplementary information files.