Qiu-Hong Wang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Construction and Analysis of Driver Takeover Behavior Modes Based on Situation Awareness Theory.
IEEE Trans. Intell. Veh., February, 2024

Chilling Effect of the Enforcement of Computer Misuse Act: Evidence from Publicly Accessible Hack Forums.
Inf. Syst. Res., 2024

Dynamic Environment-driven Autonomous Drone Path Planning via Deep Reinforcement Learning.
Proceedings of the International Joint Conference on Neural Networks, 2024

2023
Hybrid modified marine predators algorithm with teaching-learning-based optimization for global optimization and abrupt motion tracking.
Multim. Tools Appl., May, 2023

2022
A Resource-Efficient Online Target Detection System With Autonomous Drone-Assisted IoT.
IEEE Internet Things J., 2022

Research on Evaluation Method of Driving Ability Based on Digital Training Process.
Proceedings of the 7th IEEE International Conference on Intelligent Transportation Engineering, 2022

2021
SDC Error Detection by Exploring the Importance of Instruction Features.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Modeling Heterogeneous Relations across Multiple Modes for Potential Crowd Flow Prediction.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Heat exchanger simulation and recovery device design of waste heat boiler of gas turbine generator set on ocean platform.
J. Intell. Fuzzy Syst., 2020

Driving Cybersecurity Policy Insights From Information on the Internet.
IEEE Secur. Priv., 2020

A 2020 perspective on "How to derive causal insights for digital commerce in China? A research commentary on computational social science methods".
Electron. Commer. Res. Appl., 2020

Inverse screening of Simvastatin kinase targets from glioblastoma druggable kinome.
Comput. Biol. Chem., 2020

Dynamic-Static-based Spatiotemporal Multi-Graph Neural Networks for Passenger Flow Prediction.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020

2019
See No Evil, Hear No Evil? Dissecting the Impact of Online Hacker Forums.
MIS Q., 2019

How to derive causal insights for digital commerce in China? A research commentary on computational social science methods.
Electron. Commer. Res. Appl., 2019

An Autonomous UAV Navigation System for Unknown Flight Environment.
Proceedings of the 15th International Conference on Mobile Ad-Hoc and Sensor Networks, 2019

Examining the Theoretical Mechanisms Underlying Health Information Exchange Impact on Healthcare Outcomes: A Physician Agency Perspective.
Proceedings of the 40th International Conference on Information Systems, 2019

The Dynamic Impacts of Online Healthcare Community on Physician Altruism: A Hidden Markov Model.
Proceedings of the 40th International Conference on Information Systems, 2019

2018
Thermal Sensor Boiler Monitoring based on Wireless Sensing.
Int. J. Online Eng., 2018

Multiple Moving Targets Surveillance Based on a Cooperative Network for Multi-UAV.
IEEE Commun. Mag., 2018

Online Drone-Based Moving Target Detection System in Dense-Obstructer Environment.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018

Better Inpatient Health Quality at Lower Cost: Should I Participate in the Online Healthcare Community First?
Proceedings of the International Conference on Information Systems, 2018

2017
Cybercrime Deterrence and International Legislation: Evidence from Distributed Denial of Service Attacks.
MIS Q., 2017

Technology Mergers and Acquisitions in the Presence of an Installed Base: A Strategic Analysis.
Inf. Syst. Res., 2017

Online Hacker Forum Censorship: Would Banning the Bad Guys Attract Good Guys?
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

2016
From Offline to Online: How Health Insurance Policies Drive the demand for Online Healthcare Service?
Proceedings of the 20th Pacific Asia Conference on Information Systems, 2016

A fusion-based method for single backlit image enhancement.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

2015
Path planning of automated guided vehicles based on improved A-Star algorithm.
Proceedings of the IEEE International Conference on Information and Automation, 2015

Development of an ankle rehabilitation robot for ankle training.
Proceedings of the IEEE International Conference on Information and Automation, 2015

Development of a vision navigation system with Fuzzy Control Algorithm for Automated Guided Vehicle.
Proceedings of the IEEE International Conference on Information and Automation, 2015

Digital Rights Strategies in a Virtual World Marketplace.
Proceedings of the HCI in Business - Second International Conference, 2015

2013
The determinants of monetary value of virtual goods: An empirical study for a cross-section of MMORPGs.
Inf. Syst. Frontiers, 2013

2012
Delayed product introduction.
Decis. Support Syst., 2012

A comparative study of cyberattacks.
Commun. ACM, 2012

Do Hackers Seek Variety? An Empirical Analysis of Website Defacements.
Proceedings of the International Conference on Information Systems, 2012

The antecedents and effects of consumers' active coping in B2C mobile shopping in China.
Proceedings of the Fourteenth International Conference on Electronic Commerce, 2012

2011
Do Hacker Forums Contribute to Security Attacks?
Proceedings of the E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life, 2011

2010
Internet inequality: The relationship between high school students' Internet use in different locations and their Internet self-efficacy.
Comput. Educ., 2010

Marine literature categorization based on minimizing the labelled data.
Proceedings of the 6th International Conference on Natural Language Processing and Knowledge Engineering, 2010

The Monetary Value of Virtual Goods: An Exploratory Study in MMORPGs.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

Automatic Speech Corpus Construction from Broadcasting Speech Databases.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2009
Information Security: Facilitating User Precautions Vis-à-Vis Enforcement Against Attackers.
J. Manag. Inf. Syst., 2009

Cyberattacks: Does Physical Boundry Matter?
Proceedings of the International Conference on Information Systems, 2009

Information Security: User Precautions, Attacker Efforts, and Enforcement.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

2008
The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence.
J. Manag. Inf. Syst., 2008

2006
Hackers, Users, Information Security.
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006

2005
To Launch or Not to Launch: An Economic Analysis of Delayed Product Introduction.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005


  Loading...