Ren, Xin
Wang, Peng-fei
Zhou, Xu
Lu, Kai
Funding for this research was provided by:
the Hunan Provincial Key Laboratory of Intelligent and Parallel Analysis for Software Security
the science and technology innovation Program of Hunan Province (2024RC3136, 2024RC3136, 2024RC3136, 2024RC3136)
the National Natural Science Foundation China (62272472, 62272472, 62272472, 62272472)
Article History
Received: 26 March 2025
Accepted: 30 June 2025
First Online: 8 July 2025
Competing interests
: The authors declare no competing interests.