Have a personal or library account? Click to login
Open Access
|Oct 2019

Authors

Limei Ma

malimei@hebtu.edu.cn

College of Information Technology Hebei Normal University, Shijiazhuang, In China
Key Laboratory of Network and Information Security in Hebei Province, Shijiazhuang, In China
School of Information Studies, Dominican University, River Forest, In USA

Dongmei Zhao

863141000@qq.com

College of Information Technology Hebei Normal University, Shijiazhuang, In China
Key Laboratory of Network and Information Security in Hebei Province, Shijiazhuang, In China

Yijun Gao

ygao@dom.edu

School of Information Studies Dominican University, River Forest, In USA

Chen Zhao

tczxz007@163.com

College of Information Technology Hebei Normal University, Shijiazhuang, In China
Key Laboratory of Network and Information Security in Hebei Province, Shijiazhuang, In China
Language: English
Page range: 35 - 39
Published on: Oct 8, 2019
Published by: Xi’an Technological University
In partnership with: Paradigm Publishing Services
Publication frequency: 4 times per year

© 2019 Limei Ma, Dongmei Zhao, Yijun Gao, Chen Zhao, published by Xi’an Technological University
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.