About the Authors

Chen Zhao

Roles Conceptualization, Formal analysis, Investigation, Methodology, Resources, Software, Visualization, Writing – review & editing

Affiliations College of Computer and Cyber Security, Hebei Normal University, Shijiazhuang, P.R. China, Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics and Data Security, Shijiazhuang, P.R. China, Hebei Key Laboratory of Network and Information Security, Shijiazhuang, P.R. China

Jialu Zhang

Roles Resources, Software, Visualization

Affiliations College of Computer and Cyber Security, Hebei Normal University, Shijiazhuang, P.R. China, Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics and Data Security, Shijiazhuang, P.R. China, Hebei Key Laboratory of Network and Information Security, Shijiazhuang, P.R. China

Xiaoyue Hou

Roles Resources, Software, Visualization

Affiliations College of Computer and Cyber Security, Hebei Normal University, Shijiazhuang, P.R. China, Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics and Data Security, Shijiazhuang, P.R. China, Hebei Key Laboratory of Network and Information Security, Shijiazhuang, P.R. China

Chi Ho Yeung

Roles Conceptualization, Formal analysis, Investigation, Methodology, Supervision, Validation, Writing – original draft, Writing – review & editing

chyeung@eduhk.hk (CHY); anzeng@bnu.edu.cn (AZ)

Affiliation Department of Science and Environmental Studies, The Education University of Hong Kong, Hong Kong, P.R. China

An Zeng

Roles Conceptualization, Formal analysis, Investigation, Methodology, Supervision, Validation, Writing – original draft, Writing – review & editing

chyeung@eduhk.hk (CHY); anzeng@bnu.edu.cn (AZ)

Affiliation School of Systems Science, Beijing Normal University, Beijing, P.R. China

Competing Interests

The authors have declared that no competing interests exist.