Wang, Xingyuan
Leng, Ziyu http://orcid.org/0000-0002-5846-6562
Funding for this research was provided by:
National Natural Science Foundation of China (61672124)
Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund (MMJJ20170203)
Liaoning Province Science and Technology Innovation Leading Talents Program Project (XLYC1802013)
Key R&D Projects of Liaoning Province (2019020105-JH2/103)
Jinan City ‘20 universities’ Funding Projects Introducing Innovation Team Program (2019GXRC031)
Research Fund of Guangxi Key Lab of Multi-source Information Mining & Security (MIMS20-M-02)
Article History
Received: 29 July 2022
Revised: 6 June 2023
Accepted: 31 August 2023
First Online: 18 September 2023
Declarations
: This manuscript is the authors’ original work and has not been published nor has it been submitted simultaneously elsewhere. All authors have checked the manuscript and have agreed to the submission.
: The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.