Ma, Yiming
Peng, Linning https://orcid.org/0000-0001-5859-7119
Yin, Wenhao
Fu, Hua
Hu, Aiqun
Guo, Peng
Hu, Hongxing
Funding for this research was provided by:
National Natural Science Foundation of China (62171120)
National Natural Science Foundation of China (62001106)
National Key Technologies Research and Development Program of China (2020YFE0200600)
Jiangsu Natural Science Foundation (BK20200350)
Jiangsu Provincial Key Laboratory of Network and Information Security (BM2003201)
Guangdong Key Research and Development Program (2020B0303010001)
Purple Mountain Laboratories for Network and Communication Security
Article History
Received: 27 August 2022
Accepted: 28 August 2023
First Online: 3 November 2023
Declarations
:
: On behalf of all the authors, the corresponding author states that there is no conflict of interest.