L Fan, M Xia, P Huang, J Hu - Security and Communication …, 2021 - Wiley Online Library
The traditional method only pays attention to hardware construction and ignores the data
processing steps, which leads to high redundant resource occupancy rate, untimely …