“…Some articles designed or considered some potential HTs from the attacker’s point of view and put forward solutions to these HTs [ 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 ]. Some researchers applied HTs to the real environment and designed a scheme to defend it [ 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 , 42 , 43 , 44 ]. Individual scholars proposed methods to reduce the effect of the HTs [ 44 , 45 ].…”