Zhuang, Huan
Tan, Weijie https://orcid.org/0000-0001-6590-5757
Lv, Shangyu
Bi, Yang
Chen, Yuling
Li, Chunguo
Funding for this research was provided by:
National Natural Science Foundation of China (62361010 and 62462012)
Major Scientific and Technological Special Project of Guizhou Province ([2024]014)
Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province (SKLACSS-202414)
Key Research and Development Plan of Jiangsu Province (BE2021013-3)
Article History
Received: 1 August 2025
Accepted: 4 October 2025
First Online: 28 November 2025
Declarations
:
: All authors declare no conflicts of interest. This work is supported by the National Natural Science Foundation of China (No. 62361010, 62462012), Scientific and Technological Innovation Talent Team of Guizhou Province for Cybersecurity Protection of Computing Power Network (Qiankehe Talent CXTD [2025] No. 029) and the Major Scientific and Technological Special Project of Guizhou Province (No. [2024]014), the Key Research and Development Plan of Jiangsu Province (No. BE2021013-3).