About the Authors

Shao-ji Hu

Contributed equally to this work with: Shao-ji Hu, Tiao Ning

Affiliations Laboratory of Biological Invasion and Ecosecurity, Yunnan University, Kunming, China, Yunnan Key Laboratory of International Rivers and Transboundary Eco-security, Yunnan University, Kunming, China

Tiao Ning

Contributed equally to this work with: Shao-ji Hu, Tiao Ning

Affiliations Laboratory for Conservation and Utilization of Bio-resource and Key Laboratory for Microbial Resources of the Ministry of Education, Yunnan University, Kunming, China, Laboratory for Animal Genetic Diversity and Evolution of Higher Education in Yunnan Province, Yunnan University, Kunming, China, State Key Laboratory of Genetic Resources and Evolution, Kunming Institute of Zoology, Chinese Academy of Sciences, Kunming, China

Da-ying Fu

Affiliations Laboratory of Biological Invasion and Ecosecurity, Yunnan University, Kunming, China, Yunnan Key Laboratory of International Rivers and Transboundary Eco-security, Yunnan University, Kunming, China

Robert A. Haack

Affiliation USDA Forest Service, Northern Research Station, East Lansing, Michigan, United States of America

Zhen Zhang

Affiliations Research Institute of Forest Ecology, Environment and Protection, Chinese Academy of Forestry, Beijing, China, The Key Laboratory of Forest Ecology and Environment, State Forestry Administration, Beijing, China

De-dao Chen

Affiliations Laboratory of Biological Invasion and Ecosecurity, Yunnan University, Kunming, China, Yunnan Key Laboratory of International Rivers and Transboundary Eco-security, Yunnan University, Kunming, China

Xue-yu Ma

Affiliations Laboratory of Biological Invasion and Ecosecurity, Yunnan University, Kunming, China, Yunnan Key Laboratory of International Rivers and Transboundary Eco-security, Yunnan University, Kunming, China

Hui Ye

yehui@ynu.edu.cn

Affiliations Laboratory of Biological Invasion and Ecosecurity, Yunnan University, Kunming, China, Yunnan Key Laboratory of International Rivers and Transboundary Eco-security, Yunnan University, Kunming, China

Competing Interests

The authors have declared that no competing interests exist.

Author Contributions

Conceived and designed the experiments: SJH TN HY. Performed the experiments: SJH DYF XYM DDC. Analyzed the data: SJH TN DYF. Contributed reagents/materials/analysis tools: SJH ZZ HY. Wrote the paper: SJH TN RAH HY.