About the Authors
- Chen Zhao
-
Roles Conceptualization, Formal analysis, Investigation, Methodology, Resources, Software, Visualization, Writing – review & editing
Affiliations College of Computer and Cyber Security, Hebei Normal University, Shijiazhuang, P.R. China, Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics and Data Security, Shijiazhuang, P.R. China, Hebei Key Laboratory of Network and Information Security, Shijiazhuang, P.R. China
- Jialu Zhang
-
Roles Resources, Software, Visualization
Affiliations College of Computer and Cyber Security, Hebei Normal University, Shijiazhuang, P.R. China, Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics and Data Security, Shijiazhuang, P.R. China, Hebei Key Laboratory of Network and Information Security, Shijiazhuang, P.R. China
- Xiaoyue Hou
-
Roles Resources, Software, Visualization
Affiliations College of Computer and Cyber Security, Hebei Normal University, Shijiazhuang, P.R. China, Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics and Data Security, Shijiazhuang, P.R. China, Hebei Key Laboratory of Network and Information Security, Shijiazhuang, P.R. China
- Chi Ho Yeung
-
Roles Conceptualization, Formal analysis, Investigation, Methodology, Supervision, Validation, Writing – original draft, Writing – review & editing
* E-mail: chyeung@eduhk.hk (CHY); anzeng@bnu.edu.cn (AZ)
Affiliation Department of Science and Environmental Studies, The Education University of Hong Kong, Hong Kong, P.R. China
- An Zeng
-
Roles Conceptualization, Formal analysis, Investigation, Methodology, Supervision, Validation, Writing – original draft, Writing – review & editing
* E-mail: chyeung@eduhk.hk (CHY); anzeng@bnu.edu.cn (AZ)
Affiliation School of Systems Science, Beijing Normal University, Beijing, P.R. China
Competing Interests
The authors have declared that no competing interests exist.