<?xml version="1.0"?>
<dblpperson name="Yuancheng Li 0005" pid="82/3439-5" n="59">
<person key="homepages/82/3439-5" mdate="2026-04-02">
<author pid="82/3439-5">Yuancheng Li 0005</author>
<url>https://orcid.org/0000-0001-8074-7259</url>
<note type="affiliation">North China Electric Power University, Beijing, China</note>
</person>
<homonyms n="6">
<h f="l/Li:Yuancheng"><person publtype="disambiguation" key="homepages/82/3439" mdate="2024-12-29">
<author pid="82/3439">Yuancheng Li</author>
</person>
</h>
<h f="l/Li_0001:Yuancheng"><person key="homepages/82/3439-1" mdate="2025-11-26">
<author pid="82/3439-1">Yuancheng Li 0001</author>
<url>https://orcid.org/0000-0002-7227-7362</url>
<url>https://www.wikidata.org/entity/Q130853115</url>
<note type="affiliation">Shanghai Jiao Tong University, Shanghai, China</note>
</person>
</h>
<h f="l/Li_0002:Yuancheng"><person key="homepages/82/3439-2" mdate="2025-10-20">
<author pid="82/3439-2">Yuancheng Li 0002</author>
<url>https://orcid.org/0000-0003-1723-1959</url>
<note type="affiliation">North China Electric Power University, Beijing, China</note>
</person>
</h>
<h f="l/Li_0003:Yuancheng"><person key="homepages/82/3439-3" mdate="2025-11-26">
<author pid="82/3439-3">Yuancheng Li 0003</author>
<url>https://orcid.org/0000-0002-1245-3176</url>
<url>https://www.wikidata.org/entity/Q92816343</url>
<note type="affiliation">North China Electric Power University, Beijing, China</note>
</person>
</h>
<h f="l/Li_0004:Yuancheng"><person key="homepages/82/3439-4" mdate="2025-10-20">
<author pid="82/3439-4">Yuancheng Li 0004</author>
<url>https://orcid.org/0000-0002-8425-9313</url>
<note type="affiliation">North China Electric Power University, Beijing, China</note>
</person>
</h>
<h f="l/Li_0006:Yuancheng"><person key="homepages/82/3439-6" mdate="2025-10-20">
<author pid="82/3439-6">Yuancheng Li 0006</author>
<url>https://orcid.org/0000-0002-9185-9974</url>
<note type="affiliation">Xi'an University of Science and Technology, China</note>
</person>
</h>
</homonyms>
<r><article key="journals/tr/LiZ26" mdate="2026-01-24">
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author orcid="0009-0006-5882-9163" pid="187/5806">Hefang Zhang</author>
<title>Deep Reinforcement Learning-Based Approach for Identifying Critical Nodes in Cyber Physical Power Systems.</title>
<pages>464-477</pages>
<year>2026</year>
<volume>75</volume>
<journal>IEEE Trans. Reliab.</journal>
<ee>https://doi.org/10.1109/TR.2025.3646881</ee>
<url>db/journals/tr/tr75.html#LiZ26</url>
<stream>streams/journals/tr</stream>
</article>
</r>
<r><article key="journals/mlc/ZangL25" mdate="2025-10-19">
<author orcid="0000-0001-8512-5475" pid="210/4653">Liguang Zang</author>
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<title>Clean-label attack based on negative afterimage on neural networks.</title>
<pages>449-460</pages>
<year>2025</year>
<month>January</month>
<volume>16</volume>
<journal>Int. J. Mach. Learn. Cybern.</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s13042-024-02230-3</ee>
<url>db/journals/mlc/mlc16.html#ZangL25</url>
<stream>streams/journals/mlc</stream>
</article>
</r>
<r><article key="journals/tifs/HuangLYSW25" mdate="2025-10-20">
<author orcid="0000-0002-0396-2681" pid="92/6101-6">Rong Huang 0006</author>
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author orcid="0009-0001-0115-9756" pid="406/3019">Peidong Yin</author>
<author orcid="0000-0001-6603-0497" pid="126/0768">Xingyu Shang</author>
<author pid="95/494-8">Yuanyuan Wang 0008</author>
<title>Transferable Attention-Distracting Adversarial Attack on Data-Driven Models for Power Systems.</title>
<pages>4985-4998</pages>
<year>2025</year>
<volume>20</volume>
<journal>IEEE Trans. Inf. Forensics Secur.</journal>
<ee>https://doi.org/10.1109/TIFS.2025.3565993</ee>
<url>db/journals/tifs/tifs20.html#HuangLYSW25</url>
<stream>streams/journals/tifs</stream>
</article>
</r>
<r><article key="journals/network/JuL24" mdate="2025-10-19">
<author orcid="0000-0001-7444-3929" pid="251/7634">Zhichao Ju</author>
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<title>Vehicle-to-Vehicle Energy Sharing Scheme: A Privacy-Preserving Solution Based on Local Differential Privacy Method.</title>
<pages>106-112</pages>
<year>2024</year>
<month>November</month>
<volume>38</volume>
<journal>IEEE Netw.</journal>
<number>6</number>
<ee>https://doi.org/10.1109/MNET.2024.3391618</ee>
<url>db/journals/network/network38.html#JuL24</url>
<stream>streams/journals/network</stream>
</article>
</r>
<r><article key="journals/peerj-cs/NaqviLU24" mdate="2025-10-19">
<author orcid="0000-0001-7884-8202" pid="369/6651">Sardar Shan Ali Naqvi</author>
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author orcid="0000-0001-5964-4351" pid="60/1273">Muhammad Uzair</author>
<title>DDoS attack detection in smart grid network using reconstructive machine learning models.</title>
<pages>e1784</pages>
<year>2024</year>
<volume>10</volume>
<journal>PeerJ Comput. Sci.</journal>
<ee type="oa">https://doi.org/10.7717/peerj-cs.1784</ee>
<url>db/journals/peerj-cs/peerj-cs10.html#NaqviLU24</url>
</article>
</r>
<r><article key="journals/qip/LiuWMLCS24" mdate="2025-10-19">
<author pid="12/8228">Jiawei Liu</author>
<author orcid="0000-0001-9009-0035" pid="190/7477">Qingle Wang</author>
<author pid="371/5209">Qingxia Mu</author>
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author pid="49/225-3">Long Cheng 0003</author>
<author pid="151/6247">Wenqi Sun</author>
<title>Advancing multi-party quantum key agreement protocols: the power of a two-layer approach.</title>
<pages>97</pages>
<year>2024</year>
<month>March</month>
<volume>23</volume>
<journal>Quantum Inf. Process.</journal>
<number>3</number>
<ee>https://doi.org/10.1007/s11128-024-04302-3</ee>
<url>db/journals/qip/qip23.html#LiuWMLCS24</url>
</article>
</r>
<r><article key="journals/tii/LiuLWL24" mdate="2025-10-19">
<author orcid="0000-0003-2419-6178" pid="92/586">Zhiying Liu</author>
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author orcid="0000-0001-9009-0035" pid="190/7477">Qingle Wang</author>
<author orcid="0009-0001-1552-2923" pid="26/8642">Jianbin Li</author>
<title>TSCW-GAN Based FDIAs Defense for State-of-Charge Estimation of Battery Energy Storage Systems in Smart Distribution Networks.</title>
<pages>5048-5059</pages>
<year>2024</year>
<month>April</month>
<volume>20</volume>
<journal>IEEE Trans. Ind. Informatics</journal>
<number>4</number>
<ee>https://doi.org/10.1109/TII.2023.3331544</ee>
<url>db/journals/tii/tii20.html#LiuLWL24</url>
</article>
</r>
<r><article key="journals/tnse/JuL24" mdate="2025-10-19">
<author orcid="0000-0001-7444-3929" pid="251/7634">Zhichao Ju</author>
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<title>Local Differential Privacy-Based Privacy-Preserving Data Range Query Scheme for Electric Vehicle Charging.</title>
<pages>673-684</pages>
<year>2024</year>
<month>January - February</month>
<volume>11</volume>
<journal>IEEE Trans. Netw. Sci. Eng.</journal>
<number>1</number>
<ee>https://doi.org/10.1109/TNSE.2023.3304413</ee>
<url>db/journals/tnse/tnse11.html#JuL24</url>
</article>
</r>
<r><article key="journals/tnse/JuL24a" mdate="2025-10-19">
<author orcid="0000-0001-7444-3929" pid="251/7634">Zhichao Ju</author>
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<title>V2V-ESP: Vehicle-to-Vehicle Energy Sharing Privacy Protection Scheme Based on SDP Algorithm.</title>
<pages>1093-1105</pages>
<year>2024</year>
<month>January - February</month>
<volume>11</volume>
<journal>IEEE Trans. Netw. Sci. Eng.</journal>
<number>1</number>
<ee>https://doi.org/10.1109/TNSE.2023.3321083</ee>
<url>db/journals/tnse/tnse11.html#JuL24a</url>
</article>
</r>
<r><inproceedings key="conf/iccr/NaqviLU24" mdate="2025-10-19">
<author orcid="0000-0001-7884-8202" pid="369/6651">Sardar Shan Ali Naqvi</author>
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author pid="60/1273">Muhammad Uzair</author>
<title>DDoS Attack Detection in Smart Grid Networks Using Visual Features.</title>
<pages>1-5</pages>
<year>2024</year>
<booktitle>ICCR</booktitle>
<ee>https://doi.org/10.1109/ICCR61006.2024.10533133</ee>
<crossref>conf/iccr/2024</crossref>
<url>db/conf/iccr/iccr2024.html#NaqviLU24</url>
</inproceedings>
</r>
<r><article key="journals/apin/LiYC23" mdate="2025-10-19">
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author pid="269/5207">Chaohang Yu</author>
<author pid="237/5842">Yaqi Cui</author>
<title>TPCaps: a framework for code clone detection and localization based on improved CapsNet.</title>
<pages>16594-16605</pages>
<year>2023</year>
<month>July</month>
<volume>53</volume>
<journal>Appl. Intell.</journal>
<number>13</number>
<ee>https://doi.org/10.1007/s10489-022-03158-3</ee>
<url>db/journals/apin/apin53.html#LiYC23</url>
</article>
</r>
<r><article key="journals/tcsv/ZangLC23" mdate="2025-10-19">
<author orcid="0000-0001-8512-5475" pid="210/4653">Liguang Zang</author>
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author orcid="0000-0003-3846-4671" pid="12/417">Hui Chen</author>
<title>Multilabel Recognition Algorithm With Multigraph Structure.</title>
<pages>782-792</pages>
<year>2023</year>
<month>February</month>
<volume>33</volume>
<journal>IEEE Trans. Circuits Syst. Video Technol.</journal>
<number>2</number>
<ee>https://doi.org/10.1109/TCSVT.2022.3206501</ee>
<url>db/journals/tcsv/tcsv33.html#ZangLC23</url>
</article>
</r>
<r><article key="journals/tsg/HuangL23" mdate="2025-10-19">
<author orcid="0000-0002-0396-2681" pid="92/6101-6">Rong Huang 0006</author>
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<title>Adversarial Attack Mitigation Strategy for Machine Learning-Based Network Attack Detection Model in Power System.</title>
<pages>2367-2376</pages>
<year>2023</year>
<month>May</month>
<volume>14</volume>
<journal>IEEE Trans. Smart Grid</journal>
<number>3</number>
<ee>https://doi.org/10.1109/TSG.2022.3217060</ee>
<url>db/journals/tsg/tsg14.html#HuangL23</url>
</article>
</r>
<r><article key="journals/apin/LiZC22" mdate="2025-10-19">
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author orcid="0000-0003-0422-6325" pid="330/6115">Shenglong Zhou 0004</author>
<author orcid="0000-0003-3846-4671" pid="12/417">Hui Chen</author>
<title>Attention-based fusion factor in FPN for object detection.</title>
<pages>15547-15556</pages>
<year>2022</year>
<volume>52</volume>
<journal>Appl. Intell.</journal>
<number>13</number>
<ee>https://doi.org/10.1007/s10489-022-03220-0</ee>
<url>db/journals/apin/apin52.html#LiZC22</url>
</article>
</r>
<r><article key="journals/concurrency/LiuAHQL22" mdate="2025-10-19">
<author pid="93/10216">Haiqing Liu</author>
<author pid="89/6052">Ming Ai</author>
<author pid="92/6101-6">Rong Huang 0006</author>
<author pid="262/2160">Rixuan Qiu</author>
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<title>Identity authentication for edge devices based on zero-trust architecture.</title>
<year>2022</year>
<volume>34</volume>
<journal>Concurr. Comput. Pract. Exp.</journal>
<number>23</number>
<ee>https://doi.org/10.1002/cpe.7198</ee>
<url>db/journals/concurrency/concurrency34.html#LiuAHQL22</url>
</article>
</r>
<r><article key="journals/ijon/ChenML22" mdate="2025-10-19">
<author orcid="0000-0003-3846-4671" pid="12/417">Hui Chen</author>
<author pid="245/7677">Hao Mao</author>
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<title>Elliptical convolution kernel: More real visual field.</title>
<pages>107-116</pages>
<year>2022</year>
<volume>492</volume>
<journal>Neurocomputing</journal>
<ee>https://doi.org/10.1016/j.neucom.2022.04.033</ee>
<url>db/journals/ijon/ijon492.html#ChenML22</url>
</article>
</r>
<r><article key="journals/nca/ChengKJWQLL22" mdate="2025-10-19">
<author orcid="0000-0003-1638-059X" pid="49/225-3">Long Cheng 0003</author>
<author pid="331/9622">Archana Kalapgar</author>
<author pid="332/0220">Amogh Jain</author>
<author pid="33/4822-73">Yue Wang 0073</author>
<author pid="331/8877">Yongtai Qin</author>
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author orcid="0000-0002-2665-7153" pid="95/6404-12">Cong Liu 0012</author>
<title>Cost-aware real-time job scheduling for hybrid cloud using deep reinforcement learning.</title>
<pages>18579-18593</pages>
<year>2022</year>
<volume>34</volume>
<journal>Neural Comput. Appl.</journal>
<number>21</number>
<ee>https://doi.org/10.1007/s00521-022-07477-x</ee>
<ee>https://www.wikidata.org/entity/Q114959982</ee>
<url>db/journals/nca/nca34.html#ChengKJWQLL22</url>
</article>
</r>
<r><article key="journals/peerj-cs/MengL22" mdate="2025-10-19">
<author pid="219/8869">Mingming Meng</author>
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<title>SFedChain: blockchain-based federated learning scheme for secure data sharing in distributed energy storage networks.</title>
<pages>e1027</pages>
<year>2022</year>
<volume>8</volume>
<journal>PeerJ Comput. Sci.</journal>
<ee type="oa">https://doi.org/10.7717/peerj-cs.1027</ee>
<ee>https://www.wikidata.org/entity/Q113193791</ee>
<url>db/journals/peerj-cs/peerj-cs8.html#MengL22</url>
</article>
</r>
<r><article key="journals/sj/HuangCXLLLW22" mdate="2025-10-19">
<author pid="89/1837">Yifeng Huang</author>
<author orcid="0000-0003-1638-059X" pid="49/225-3">Long Cheng 0003</author>
<author orcid="0000-0002-7453-6575" pid="313/4320">Lianting Xue</author>
<author orcid="0000-0002-5999-2126" pid="95/6404-12">Cong Liu 0012</author>
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author pid="26/8642">Jianbin Li</author>
<author orcid="0000-0002-6173-6607" pid="45/5296">Tom&#225;s Ward</author>
<title>Deep Adversarial Imitation Reinforcement Learning for QoS-Aware Cloud Job Scheduling.</title>
<pages>4232-4242</pages>
<year>2022</year>
<volume>16</volume>
<journal>IEEE Syst. J.</journal>
<number>3</number>
<ee>https://doi.org/10.1109/JSYST.2021.3122126</ee>
<url>db/journals/sj/sj16.html#HuangCXLLLW22</url>
</article>
</r>
<r><article key="journals/tsg/HuangL22" mdate="2025-10-19">
<author orcid="0000-0002-0396-2681" pid="92/6101-6">Rong Huang 0006</author>
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<title>False Phasor Data Detection Under Time Synchronization Attacks: A Neural Network Approach.</title>
<pages>4828-4836</pages>
<year>2022</year>
<volume>13</volume>
<journal>IEEE Trans. Smart Grid</journal>
<number>6</number>
<ee>https://doi.org/10.1109/TSG.2022.3179277</ee>
<url>db/journals/tsg/tsg13.html#HuangL22</url>
</article>
</r>
<r><article key="journals/wpc/LiY22" mdate="2025-10-19">
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author orcid="0000-0002-1797-1431" pid="309/9083">Rongyan Yang</author>
<title>Edge Computing Offloading Strategy Based on Dynamic Non-cooperative Games in D-IoT.</title>
<pages>109-127</pages>
<year>2022</year>
<volume>122</volume>
<journal>Wirel. Pers. Commun.</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s11277-021-08891-5</ee>
<url>db/journals/wpc/wpc122.html#LiY22</url>
</article>
</r>
<r><article key="journals/icl/WangYLLSZ21" mdate="2025-10-19">
<author orcid="0000-0001-9009-0035" pid="190/7477">Qingle Wang</author>
<author pid="269/5207">Chaohang Yu</author>
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author pid="214/2451">Jiangshan Liu</author>
<author orcid="0000-0003-4513-1306" pid="20/2948">Runhua Shi</author>
<author pid="06/2696">Yuqian Zhou</author>
<title>Authenticated Quantum Sortition and Application in &#34;Picking at Random&#34; Problems.</title>
<pages>518-522</pages>
<year>2021</year>
<volume>25</volume>
<journal>IEEE Commun. Lett.</journal>
<number>2</number>
<ee>https://doi.org/10.1109/LCOMM.2020.3025319</ee>
<url>db/journals/icl/icl25.html#WangYLLSZ21</url>
</article>
</r>
<r><article key="journals/iotj/LiHM21" mdate="2025-10-19">
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author orcid="0000-0002-0396-2681" pid="92/6101-6">Rong Huang 0006</author>
<author pid="249/7753">Longqiang Ma</author>
<title>False Data Injection Attack and Defense Method on Load Frequency Control.</title>
<pages>2910-2919</pages>
<year>2021</year>
<volume>8</volume>
<journal>IEEE Internet Things J.</journal>
<number>4</number>
<ee>https://doi.org/10.1109/JIOT.2020.3021429</ee>
<url>db/journals/iotj/iotj8.html#LiHM21</url>
</article>
</r>
<r><article key="journals/iotj/LiHM21a" mdate="2025-10-19">
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author orcid="0000-0002-0396-2681" pid="92/6101-6">Rong Huang 0006</author>
<author pid="249/7753">Longqiang Ma</author>
<title>Hierarchical-Attention-Based Defense Method for Load Frequency Control System Against DoS Attack.</title>
<pages>15522-15530</pages>
<year>2021</year>
<volume>8</volume>
<journal>IEEE Internet Things J.</journal>
<number>20</number>
<ee>https://doi.org/10.1109/JIOT.2021.3073060</ee>
<url>db/journals/iotj/iotj8.html#LiHM21a</url>
</article>
</r>
<r><article key="journals/jifs/LiuLL21b" mdate="2025-10-19">
<author pid="93/10216">Haiqing Liu</author>
<author pid="249/7854">Daoxing Li</author>
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<title>Confident sequence learning: A sequence class-label noise filtering technique to improve scene digit recognition.</title>
<pages>9345-9359</pages>
<year>2021</year>
<volume>40</volume>
<journal>J. Intell. Fuzzy Syst.</journal>
<number>5</number>
<ee>https://doi.org/10.3233/JIFS-201825</ee>
<url>db/journals/jifs/jifs40.html#LiuLL21b</url>
</article>
</r>
<r><article key="journals/jvcir/WuL21" mdate="2025-10-19">
<author pid="283/2249">Guixian Wu</author>
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<title>Non-maximum suppression for object detection based on the chaotic whale optimization algorithm.</title>
<pages>102985</pages>
<year>2021</year>
<volume>74</volume>
<journal>J. Vis. Commun. Image Represent.</journal>
<ee>https://doi.org/10.1016/j.jvcir.2020.102985</ee>
<url>db/journals/jvcir/jvcir74.html#WuL21</url>
</article>
</r>
<r><article key="journals/mta/WuL21" mdate="2025-10-19">
<author pid="283/2249">Guixian Wu</author>
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<title>CyclicNet: an alternately updated network for semantic segmentation.</title>
<pages>3213-3227</pages>
<year>2021</year>
<volume>80</volume>
<journal>Multim. Tools Appl.</journal>
<number>2</number>
<ee>https://doi.org/10.1007/s11042-020-09791-9</ee>
<url>db/journals/mta/mta80.html#WuL21</url>
</article>
</r>
<r><article key="journals/npl/LiuLL21" mdate="2025-10-19">
<author pid="93/10216">Haiqing Liu</author>
<author pid="249/7854">Daoxing Li</author>
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<title>Poisonous Label Attack: Black-Box Data Poisoning Attack with Enhanced Conditional DCGAN.</title>
<pages>4117-4142</pages>
<year>2021</year>
<volume>53</volume>
<journal>Neural Process. Lett.</journal>
<number>6</number>
<ee>https://doi.org/10.1007/s11063-021-10584-w</ee>
<url>db/journals/npl/npl53.html#LiuLL21</url>
</article>
</r>
<r><article key="journals/peerj-cs/QiuLHZLL21" mdate="2025-10-19">
<author pid="262/2160">Rixuan Qiu</author>
<author pid="63/1291">Xiong Liu</author>
<author pid="92/6101-6">Rong Huang 0006</author>
<author pid="225/7761">Fuyong Zheng</author>
<author pid="62/1052">Liang Liang</author>
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<title>Differential privacy EV charging data release based on variable window.</title>
<pages>e481</pages>
<year>2021</year>
<volume>7</volume>
<journal>PeerJ Comput. Sci.</journal>
<ee type="oa">https://doi.org/10.7717/peerj-cs.481</ee>
<ee>https://www.wikidata.org/entity/Q110950097</ee>
<url>db/journals/peerj-cs/peerj-cs7.html#QiuLHZLL21</url>
</article>
</r>
<r><article key="journals/qip/WangLYSZ21" mdate="2025-10-19">
<author pid="190/7477">Qingle Wang</author>
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author pid="269/5207">Chaohang Yu</author>
<author pid="20/2948">Runhua Shi</author>
<author pid="64/5160">Zhichao Zhang</author>
<title>Quantum-based anonymity and secure veto.</title>
<pages>85</pages>
<year>2021</year>
<volume>20</volume>
<journal>Quantum Inf. Process.</journal>
<number>3</number>
<ee>https://doi.org/10.1007/s11128-021-03022-2</ee>
<url>db/journals/qip/qip20.html#WangLYSZ21</url>
</article>
</r>
<r><article key="journals/qip/WangLLYP21" mdate="2025-10-19">
<author pid="190/7477">Qingle Wang</author>
<author pid="214/2451">Jiangshan Liu</author>
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author pid="269/5207">Chaohang Yu</author>
<author orcid="0000-0002-6572-6123" pid="211/5870">Shijie Pan</author>
<title>Quantum Bell states-based anonymous voting with anonymity trace.</title>
<pages>142</pages>
<year>2021</year>
<volume>20</volume>
<journal>Quantum Inf. Process.</journal>
<number>4</number>
<ee>https://doi.org/10.1007/s11128-021-03081-5</ee>
<url>db/journals/qip/qip20.html#WangLLYP21</url>
</article>
</r>
<r><article key="journals/tii/LiH21" mdate="2025-10-19">
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author orcid="0000-0001-7448-400X" pid="265/1557">Baiji Hu</author>
<title>A Consortium Blockchain-Enabled Secure and Privacy-Preserving Optimized Charging and Discharging Trading Scheme for Electric Vehicles.</title>
<pages>1968-1977</pages>
<year>2021</year>
<volume>17</volume>
<journal>IEEE Trans. Ind. Informatics</journal>
<number>3</number>
<ee>https://doi.org/10.1109/TII.2020.2990732</ee>
<url>db/journals/tii/tii17.html#LiH21</url>
</article>
</r>
<r><inproceedings key="conf/ithings/XueCLM21" mdate="2025-10-19">
<author pid="313/4320">Lianting Xue</author>
<author orcid="0000-0003-1638-059X" pid="49/225-3">Long Cheng 0003</author>
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author pid="40/1837-1">Ying Mao 0001</author>
<title>Quantum Machine Learning for Electricity Theft Detection: an Initial Investigation.</title>
<pages>204-208</pages>
<year>2021</year>
<booktitle>iThings/GreenCom/CPSCom/SmartData/Cybermatics</booktitle>
<ee>https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics53846.2021.00043</ee>
<crossref>conf/ithings/2021</crossref>
<url>db/conf/ithings/ithings2021.html#XueCLM21</url>
</inproceedings>
</r>
<r><article key="journals/iet-cps/LiHQZ20" mdate="2025-10-19">
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author pid="262/2180">Wendan Huo</author>
<author pid="262/2160">Rixuan Qiu</author>
<author orcid="0000-0002-8627-1404" pid="44/3331">Jing Zeng</author>
<title>Efficient detection of false data injection attack with invertible automatic encoder and long-short-term memory.</title>
<pages>110-118</pages>
<year>2020</year>
<volume>5</volume>
<journal>IET Cyper-Phys. Syst.: Theory &#38; Appl.</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.1049/iet-cps.2019.0010</ee>
<url>db/journals/iet-cps/iet-cps5.html#LiHQZ20</url>
</article>
</r>
<r><article key="journals/infsof/LiWH20" mdate="2025-10-19">
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author orcid="0000-0002-9142-6896" pid="260/3074">Boyan Wang</author>
<author orcid="0000-0001-7448-400X" pid="265/1557">Baiji Hu</author>
<title>Semantically find similar binary codes with mixed key instruction sequence.</title>
<pages>106320</pages>
<year>2020</year>
<volume>125</volume>
<journal>Inf. Softw. Technol.</journal>
<ee>https://doi.org/10.1016/j.infsof.2020.106320</ee>
<ee>https://www.wikidata.org/entity/Q113316708</ee>
<url>db/journals/infsof/infsof125.html#LiWH20</url>
</article>
</r>
<r><article key="journals/isjgp/LiHC20" mdate="2025-10-19">
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author pid="70/2958">Haiyan Hou</author>
<author pid="04/1620">Wenping Chen</author>
<title>A privacy-preserving multi-keyword ranked retrieval scheme in cloud computing.</title>
<pages>284-296</pages>
<year>2020</year>
<volume>29</volume>
<journal>Inf. Secur. J. A Glob. Perspect.</journal>
<number>6</number>
<ee>https://doi.org/10.1080/19393555.2020.1767241</ee>
<ee>https://www.wikidata.org/entity/Q113437606</ee>
<url>db/journals/isjgp/isjgp29.html#LiHC20</url>
</article>
</r>
<r><article key="journals/qip/WangLYHZ20" mdate="2025-10-19">
<author orcid="0000-0001-9009-0035" pid="190/7477">Qingle Wang</author>
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author pid="269/5207">Chaohang Yu</author>
<author pid="53/1151">Hui He</author>
<author pid="59/2378-2">Kejia Zhang 0002</author>
<title>Quantum anonymous ranking and selection with verifiability.</title>
<pages>166</pages>
<year>2020</year>
<volume>19</volume>
<journal>Quantum Inf. Process.</journal>
<number>5</number>
<ee>https://doi.org/10.1007/s11128-020-02664-y</ee>
<url>db/journals/qip/qip19.html#WangLYHZ20</url>
</article>
</r>
<r><article key="journals/tsg/LiH20" mdate="2025-10-19">
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author orcid="0000-0001-7448-400X" pid="265/1557">Baiji Hu</author>
<title>An Iterative Two-Layer Optimization Charging and Discharging Trading Scheme for Electric Vehicle Using Consortium Blockchain.</title>
<pages>2627-2637</pages>
<year>2020</year>
<volume>11</volume>
<journal>IEEE Trans. Smart Grid</journal>
<number>3</number>
<ee>https://doi.org/10.1109/TSG.2019.2958971</ee>
<url>db/journals/tsg/tsg11.html#LiH20</url>
</article>
</r>
<r><article key="journals/access/LiW19" mdate="2025-10-19">
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author orcid="0000-0001-8289-1449" pid="95/494-8">Yuanyuan Wang 0008</author>
<title>False Data Injection Attacks With Incomplete Network Topology Information in Smart Grid.</title>
<pages>3656-3664</pages>
<year>2019</year>
<volume>7</volume>
<journal>IEEE Access</journal>
<ee type="oa">https://doi.org/10.1109/ACCESS.2018.2888582</ee>
<ee>https://www.wikidata.org/entity/Q128710647</ee>
<url>db/journals/access/access7.html#LiW19</url>
</article>
</r>
<r><article key="journals/access/LiZH19" mdate="2025-10-19">
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author pid="29/1005">Pan Zhang</author>
<author orcid="0000-0002-0396-2681" pid="92/6101-6">Rong Huang 0006</author>
<title>Lightweight Quantum Encryption for Secure Transmission of Power Data in Smart Grid.</title>
<pages>36285-36293</pages>
<year>2019</year>
<volume>7</volume>
<journal>IEEE Access</journal>
<ee type="oa">https://doi.org/10.1109/ACCESS.2019.2893056</ee>
<ee>https://www.wikidata.org/entity/Q120870226</ee>
<url>db/journals/access/access7.html#LiZH19</url>
</article>
</r>
<r><article key="journals/access/AliL19" mdate="2025-10-19">
<author orcid="0000-0001-7884-8202" pid="247/3590">Shan Ali</author>
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<title>Learning Multilevel Auto-Encoders for DDoS Attack Detection in Smart Grid Network.</title>
<pages>108647-108659</pages>
<year>2019</year>
<volume>7</volume>
<journal>IEEE Access</journal>
<ee type="oa">https://doi.org/10.1109/ACCESS.2019.2933304</ee>
<url>db/journals/access/access7.html#AliL19</url>
</article>
</r>
<r><article key="journals/access/LiuZZL19a" mdate="2025-10-19">
<author pid="93/10216">Haiqing Liu</author>
<author pid="04/3348">Yan Zhang</author>
<author pid="26/10889">Shiqiang Zheng</author>
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<title>Electric Vehicle Power Trading Mechanism Based on Blockchain and Smart Contract in V2G Network.</title>
<pages>160546-160558</pages>
<year>2019</year>
<volume>7</volume>
<journal>IEEE Access</journal>
<ee type="oa">https://doi.org/10.1109/ACCESS.2019.2951057</ee>
<ee>https://www.wikidata.org/entity/Q111688823</ee>
<url>db/journals/access/access7.html#LiuZZL19a</url>
</article>
</r>
<r><article key="journals/ijon/LiWL19b" mdate="2025-10-19">
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author orcid="0000-0003-0553-0687" pid="157/3218">Yimeng Wang</author>
<author orcid="0000-0002-5275-8951" pid="249/7854">Daoxing Li</author>
<title>Privacy-preserving lightweight face recognition.</title>
<pages>212-222</pages>
<year>2019</year>
<volume>363</volume>
<journal>Neurocomputing</journal>
<ee>https://doi.org/10.1016/j.neucom.2019.07.039</ee>
<ee>https://www.wikidata.org/entity/Q127480308</ee>
<url>db/journals/ijon/ijon363.html#LiWL19b</url>
</article>
</r>
<r><article key="journals/jei/LiWHZ19" mdate="2025-10-19">
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author pid="95/494-8">Yuanyuan Wang 0008</author>
<author pid="222/2289">Shuhua Hao</author>
<author pid="65/2433">Xiaoyu Zhao</author>
<title>Intelligent terminal face spoofing detection algorithm based on deep belief network.</title>
<pages>043024</pages>
<year>2019</year>
<volume>28</volume>
<journal>J. Electronic Imaging</journal>
<number>4</number>
<ee>https://doi.org/10.1117/1.JEI.28.4.043024</ee>
<url>db/journals/jei/jei28.html#LiWHZ19</url>
</article>
</r>
<r><article key="journals/jfi/LiZM19" mdate="2025-10-19">
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author pid="29/1005">Pan Zhang</author>
<author pid="249/7753">Longqiang Ma</author>
<title>Denial of service attack and defense method on load frequency control system.</title>
<pages>8625-8645</pages>
<year>2019</year>
<volume>356</volume>
<journal>J. Frankl. Inst.</journal>
<number>15</number>
<ee>https://doi.org/10.1016/j.jfranklin.2019.08.036</ee>
<ee>https://www.wikidata.org/entity/Q127299810</ee>
<url>db/journals/jfi/jfi356.html#LiZM19</url>
</article>
</r>
<r><inproceedings key="conf/ispa/LiuYLLNL19" mdate="2025-10-19">
<author pid="35/837">Bin Liu</author>
<author pid="54/4089">Hao Yang</author>
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author pid="71/628">Yuxiang Li</author>
<author pid="184/8238">Dangdang Niu</author>
<author pid="233/7831">Zhiming Lv</author>
<title>An Improved Programming Model for Thread-Level Speculation.</title>
<pages>666-672</pages>
<year>2019</year>
<booktitle>ISPA/BDCloud/SocialCom/SustainCom</booktitle>
<ee>https://doi.org/10.1109/ISPA-BDCloud-SustainCom-SocialCom48970.2019.00101</ee>
<crossref>conf/ispa/2019</crossref>
<url>db/conf/ispa/ispa2019.html#LiuYLLNL19</url>
</inproceedings>
</r>
<r><article key="journals/eswa/LiNH18" mdate="2025-10-19">
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author pid="213/2067">Xiangqian Nie</author>
<author pid="92/6101-6">Rong Huang 0006</author>
<title>Web spam classification method based on deep belief networks.</title>
<pages>261-270</pages>
<year>2018</year>
<volume>96</volume>
<journal>Expert Syst. Appl.</journal>
<ee>https://doi.org/10.1016/j.eswa.2017.12.016</ee>
<ee>https://www.wikidata.org/entity/Q106247896</ee>
<url>db/journals/eswa/eswa96.html#LiNH18</url>
</article>
</r>
<r><article key="journals/jei/LiL17" mdate="2025-10-19">
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author pid="87/660">Yan Li</author>
<title>Face aging effect simulation model based on multilayer representation and shearlet transform.</title>
<pages>53011</pages>
<year>2017</year>
<volume>26</volume>
<journal>J. Electronic Imaging</journal>
<number>5</number>
<ee>https://doi.org/10.1117/1.JEI.26.5.053011</ee>
<url>db/journals/jei/jei26.html#LiL17</url>
</article>
</r>
<r><article key="journals/algorithms/LiGL16" mdate="2025-10-19">
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author pid="192/5226">Panpan Guo</author>
<author orcid="0000-0002-3030-537X" pid="40/1491-7">Xiang Li 0007</author>
<title>Short-Term Load Forecasting Based on the Analysis of User Electricity Behavior.</title>
<pages>80</pages>
<year>2016</year>
<volume>9</volume>
<journal>Algorithms</journal>
<number>4</number>
<ee type="oa">https://doi.org/10.3390/a9040080</ee>
<url>db/journals/algorithms/algorithms9.html#LiGL16</url>
</article>
</r>
<r><article key="journals/eswa/LiYJ10" mdate="2025-10-19">
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author pid="85/1530">Qiu Yang</author>
<author pid="48/4142">Runhai Jiao</author>
<title>Image compression scheme based on curvelet transform and support vector machine.</title>
<pages>3063-3069</pages>
<year>2010</year>
<volume>37</volume>
<journal>Expert Syst. Appl.</journal>
<number>4</number>
<ee>https://doi.org/10.1016/j.eswa.2009.09.024</ee>
<url>db/journals/eswa/eswa37.html#LiYJ10</url>
</article>
</r>
<r><article key="journals/ijiids/MaZLYL09" mdate="2025-10-19">
<author orcid="0000-0003-4732-4865" pid="58/3591-1">Yinglong Ma 0001</author>
<author pid="17/2783">Shipeng Zhang</author>
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author pid="88/4249">Zheng Yi</author>
<author pid="92/2574-2">Shaohua Liu 0002</author>
<title>An approach for multi-agent coordination based on semantic approximation.</title>
<pages>163-179</pages>
<year>2009</year>
<volume>3</volume>
<journal>Int. J. Intell. Inf. Database Syst.</journal>
<number>2</number>
<ee>https://doi.org/10.1504/IJIIDS.2009.025161</ee>
<url>db/journals/ijiids/ijiids3.html#MaZLYL09</url>
</article>
</r>
<r><inproceedings key="conf/jcai/LiY09" mdate="2025-10-19">
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author pid="12/1198">Jie Yang</author>
<title>A Novel Method to Extract Informative Blocks from Web Pages.</title>
<pages>536-539</pages>
<year>2009</year>
<booktitle>JCAI</booktitle>
<ee>https://doi.org/10.1109/JCAI.2009.156</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/JCAI.2009.156</ee>
<crossref>conf/jcai/2009</crossref>
<url>db/conf/jcai/jcai2009.html#LiY09</url>
</inproceedings>
</r>
<r><article key="journals/jcst/LiJL07" mdate="2025-10-19">
<author pid="50/3402-6">Bo Li 0006</author>
<author pid="48/4142">Runhai Jiao</author>
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<title>Fast Adaptive Wavelet for Remote Sensing Image Compression.</title>
<pages>770-778</pages>
<year>2007</year>
<volume>22</volume>
<journal>J. Comput. Sci. Technol.</journal>
<number>5</number>
<ee>https://doi.org/10.1007/s11390-007-9086-7</ee>
<url>db/journals/jcst/jcst22.html#LiJL07</url>
</article>
</r>
<r><inproceedings key="conf/icic/LiH07" mdate="2025-10-19">
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author pid="46/5447">Haitao Hu</author>
<title>Image Compression Using Wavelet Support Vector Machines.</title>
<pages>922-929</pages>
<year>2007</year>
<crossref>conf/icic/2007-1</crossref>
<booktitle>ICIC (1)</booktitle>
<ee>https://doi.org/10.1007/978-3-540-74171-8_93</ee>
<url>db/conf/icic/icic2007-1.html#LiH07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pakdd/MaJLW07" mdate="2025-10-20">
<author pid="58/3591-1">Yinglong Ma 0001</author>
<author pid="75/1099">Beihong Jin</author>
<author pid="82/3439-5">Yuancheng Li 0005</author>
<author pid="85/1085">Kehe Wu</author>
<title>A Timing Analysis Model for Ontology Evolutions Based on Distributed Environments.</title>
<pages>183-192</pages>
<year>2007</year>
<crossref>conf/pakdd/2007</crossref>
<booktitle>PAKDD</booktitle>
<ee>https://doi.org/10.1007/978-3-540-71701-0_20</ee>
<url>db/conf/pakdd/pakdd2007.html#MaJLW07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/rsfdgrc/LiWMZ07" mdate="2025-10-19">
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author pid="85/1085">Kehe Wu</author>
<author orcid="0000-0003-4732-4865" pid="58/3591-1">Yinglong Ma 0001</author>
<author pid="17/2783">Shipeng Zhang</author>
<title>Image Digital Watermarking Technique Based on Kernel Independent Component Analysis.</title>
<pages>467-474</pages>
<year>2007</year>
<crossref>conf/rsfdgrc/2007</crossref>
<booktitle>RSFDGrC</booktitle>
<ee>https://doi.org/10.1007/978-3-540-72530-5_56</ee>
<url>db/conf/rsfdgrc/rsfdgrc2007.html#LiWMZ07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icic/JiaoLWL05" mdate="2025-10-19">
<author pid="48/4142">Runhai Jiao</author>
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author pid="09/3290">Qingyuan Wang</author>
<author pid="50/3402-6">Bo Li 0006</author>
<title>SVM Regression and Its Application to Image Compression.</title>
<pages>747-756</pages>
<year>2005</year>
<crossref>conf/icic/2005-1</crossref>
<booktitle>ICIC (1)</booktitle>
<ee>https://doi.org/10.1007/11538059_78</ee>
<url>db/conf/icic/icic2005-1.html#JiaoLWL05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/rsfdgrc/LiF03" mdate="2025-10-19">
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author pid="39/5191">Tingjian Fang</author>
<title>Rough Set Methods for Constructing Support Vector Machines.</title>
<pages>334-338</pages>
<year>2003</year>
<crossref>conf/rsfdgrc/2003</crossref>
<booktitle>RSFDGrC</booktitle>
<ee>https://doi.org/10.1007/3-540-39205-X_51</ee>
<url>db/conf/rsfdgrc/rsfdgrc2003.html#LiF03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/rsfdgrc/LiF03a" mdate="2025-10-19">
<author orcid="0000-0001-8074-7259" pid="82/3439-5">Yuancheng Li 0005</author>
<author pid="39/5191">Tingjian Fang</author>
<title>Application of Fuzzy Support Vector Machines in Short-Term Load Forecasting.</title>
<pages>363-367</pages>
<year>2003</year>
<crossref>conf/rsfdgrc/2003</crossref>
<booktitle>RSFDGrC</booktitle>
<ee>https://doi.org/10.1007/3-540-39205-X_58</ee>
<url>db/conf/rsfdgrc/rsfdgrc2003.html#LiF03a</url>
</inproceedings>
</r>
<coauthors n="83" nc="4">
<co c="0"><na f="a/Ai:Ming" pid="89/6052">Ming Ai</na></co>
<co c="-1"><na f="a/Ali:Shan" pid="247/3590">Shan Ali</na></co>
<co c="0"><na f="c/Chen:Hui" pid="12/417">Hui Chen</na></co>
<co c="2"><na f="c/Chen:Wenping" pid="04/1620">Wenping Chen</na></co>
<co c="0"><na f="c/Cheng_0003:Long" pid="49/225-3">Long Cheng 0003</na></co>
<co c="0"><na f="c/Cui:Yaqi" pid="237/5842">Yaqi Cui</na></co>
<co c="-1"><na f="f/Fang:Tingjian" pid="39/5191">Tingjian Fang</na></co>
<co c="3"><na f="g/Guo:Panpan" pid="192/5226">Panpan Guo</na></co>
<co c="0"><na f="h/Hao:Shuhua" pid="222/2289">Shuhua Hao</na></co>
<co c="0"><na f="h/He:Hui" pid="53/1151">Hui He</na></co>
<co c="2"><na f="h/Hou:Haiyan" pid="70/2958">Haiyan Hou</na></co>
<co c="2"><na f="h/Hu:Baiji" pid="265/1557">Baiji Hu</na></co>
<co c="-1"><na f="h/Hu:Haitao" pid="46/5447">Haitao Hu</na></co>
<co c="0"><na f="h/Huang_0006:Rong" pid="92/6101-6">Rong Huang 0006</na></co>
<co c="0"><na f="h/Huang:Yifeng" pid="89/1837">Yifeng Huang</na></co>
<co c="0"><na f="h/Huo:Wendan" pid="262/2180">Wendan Huo</na></co>
<co c="0"><na f="j/Jain:Amogh" pid="332/0220">Amogh Jain</na></co>
<co c="0"><na f="j/Jiao:Runhai" pid="48/4142">Runhai Jiao</na></co>
<co c="1"><na f="j/Jin:Beihong" pid="75/1099">Beihong Jin</na></co>
<co c="-1"><na f="j/Ju:Zhichao" pid="251/7634">Zhichao Ju</na></co>
<co c="0"><na f="k/Kalapgar:Archana" pid="331/9622">Archana Kalapgar</na></co>
<co c="0"><na f="l/Li_0006:Bo" pid="50/3402-6">Bo Li 0006</na></co>
<co c="0"><na f="l/Li:Daoxing" pid="249/7854">Daoxing Li</na></co>
<co c="0"><na f="l/Li:Jianbin" pid="26/8642">Jianbin Li</na></co>
<co c="3"><na f="l/Li_0007:Xiang" pid="40/1491-7">Xiang Li 0007</na></co>
<co c="0"><na f="l/Li:Yan" pid="87/660">Yan Li</na></co>
<co c="0"><na f="l/Li:Yuxiang" pid="71/628">Yuxiang Li</na></co>
<co c="0"><na f="l/Liang:Liang" pid="62/1052">Liang Liang</na></co>
<co c="0"><na f="l/Liu:Bin" pid="35/837">Bin Liu</na></co>
<co c="0"><na f="l/Liu_0012:Cong" pid="95/6404-12">Cong Liu 0012</na></co>
<co c="0"><na f="l/Liu:Haiqing" pid="93/10216">Haiqing Liu</na></co>
<co c="0"><na f="l/Liu:Jiangshan" pid="214/2451">Jiangshan Liu</na></co>
<co c="0"><na f="l/Liu:Jiawei" pid="12/8228">Jiawei Liu</na></co>
<co c="1"><na f="l/Liu_0002:Shaohua" pid="92/2574-2">Shaohua Liu 0002</na></co>
<co c="0"><na f="l/Liu:Xiong" pid="63/1291">Xiong Liu</na></co>
<co c="0"><na f="l/Liu:Zhiying" pid="92/586">Zhiying Liu</na></co>
<co c="0"><na f="l/Lv:Zhiming" pid="233/7831">Zhiming Lv</na></co>
<co c="0"><na f="m/Ma:Longqiang" pid="249/7753">Longqiang Ma</na></co>
<co c="1"><na f="m/Ma_0001:Yinglong" pid="58/3591-1">Yinglong Ma 0001</na></co>
<co c="0"><na f="m/Mao:Hao" pid="245/7677">Hao Mao</na></co>
<co c="0"><na f="m/Mao_0001:Ying" pid="40/1837-1">Ying Mao 0001</na></co>
<co c="-1"><na f="m/Meng:Mingming" pid="219/8869">Mingming Meng</na></co>
<co c="0"><na f="m/Mu:Qingxia" pid="371/5209">Qingxia Mu</na></co>
<co c="0"><na f="n/Naqvi:Sardar_Shan_Ali" pid="369/6651">Sardar Shan Ali Naqvi</na></co>
<co c="0"><na f="n/Nie:Xiangqian" pid="213/2067">Xiangqian Nie</na></co>
<co c="0"><na f="n/Niu:Dangdang" pid="184/8238">Dangdang Niu</na></co>
<co c="0"><na f="p/Pan:Shijie" pid="211/5870">Shijie Pan</na></co>
<co c="0"><na f="q/Qin:Yongtai" pid="331/8877">Yongtai Qin</na></co>
<co c="0"><na f="q/Qiu:Rixuan" pid="262/2160">Rixuan Qiu</na></co>
<co c="0"><na f="s/Shang:Xingyu" pid="126/0768">Xingyu Shang</na></co>
<co c="0"><na f="s/Shi:Runhua" pid="20/2948">Runhua Shi</na></co>
<co c="0"><na f="s/Sun:Wenqi" pid="151/6247">Wenqi Sun</na></co>
<co c="0"><na f="u/Uzair:Muhammad" pid="60/1273">Muhammad Uzair</na></co>
<co c="2"><na f="w/Wang:Boyan" pid="260/3074">Boyan Wang</na></co>
<co c="0"><na f="w/Wang:Qingle" pid="190/7477">Qingle Wang</na></co>
<co c="0"><na f="w/Wang:Qingyuan" pid="09/3290">Qingyuan Wang</na></co>
<co c="0"><na f="w/Wang:Yimeng" pid="157/3218">Yimeng Wang</na></co>
<co c="0"><na f="w/Wang_0008:Yuanyuan" pid="95/494-8">Yuanyuan Wang 0008</na></co>
<co c="0"><na f="w/Wang_0073:Yue" pid="33/4822-73">Yue Wang 0073</na></co>
<co c="0"><na f="w/Ward:Tom=aacute=s" pid="45/5296">Tom&#225;s Ward</na></co>
<co c="-1"><na f="w/Wu:Guixian" pid="283/2249">Guixian Wu</na></co>
<co c="1"><na f="w/Wu:Kehe" pid="85/1085">Kehe Wu</na></co>
<co c="0"><na f="x/Xue:Lianting" pid="313/4320">Lianting Xue</na></co>
<co c="0"><na f="y/Yang:Hao" pid="54/4089">Hao Yang</na></co>
<co c="0"><na f="y/Yang:Jie" pid="12/1198">Jie Yang</na></co>
<co c="0"><na f="y/Yang:Qiu" pid="85/1530">Qiu Yang</na></co>
<co c="-1"><na f="y/Yang:Rongyan" pid="309/9083">Rongyan Yang</na></co>
<co c="1"><na f="y/Yi:Zheng" pid="88/4249">Zheng Yi</na></co>
<co c="0"><na f="y/Yin:Peidong" pid="406/3019">Peidong Yin</na></co>
<co c="0"><na f="y/Yu:Chaohang" pid="269/5207">Chaohang Yu</na></co>
<co c="0"><na f="z/Zang:Liguang" pid="210/4653">Liguang Zang</na></co>
<co c="0"><na f="z/Zeng:Jing" pid="44/3331">Jing Zeng</na></co>
<co c="-1"><na f="z/Zhang:Hefang" pid="187/5806">Hefang Zhang</na></co>
<co c="0"><na f="z/Zhang_0002:Kejia" pid="59/2378-2">Kejia Zhang 0002</na></co>
<co c="0"><na f="z/Zhang:Pan" pid="29/1005">Pan Zhang</na></co>
<co c="1"><na f="z/Zhang:Shipeng" pid="17/2783">Shipeng Zhang</na></co>
<co c="0"><na f="z/Zhang:Yan" pid="04/3348">Yan Zhang</na></co>
<co c="0"><na f="z/Zhang:Zhichao" pid="64/5160">Zhichao Zhang</na></co>
<co c="0"><na f="z/Zhao:Xiaoyu" pid="65/2433">Xiaoyu Zhao</na></co>
<co c="0"><na f="z/Zheng:Fuyong" pid="225/7761">Fuyong Zheng</na></co>
<co c="0"><na f="z/Zheng:Shiqiang" pid="26/10889">Shiqiang Zheng</na></co>
<co c="0"><na f="z/Zhou_0004:Shenglong" pid="330/6115">Shenglong Zhou 0004</na></co>
<co c="0"><na f="z/Zhou:Yuqian" pid="06/2696">Yuqian Zhou</na></co>
</coauthors>
</dblpperson>

