Weijun Zhong
According to our database1,
Weijun Zhong
authored at least 45 papers
between 1997 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Personalized pricing with persuasive advertising and the value of consumer information: a duopoly framework.
Electron. Commer. Res., September, 2024
Information Collection and Personalized Service Strategy of Monopoly under Consumer Misrepresentation.
J. Theor. Appl. Electron. Commer. Res., June, 2024
Advanced Multiprobe Dual-Polarized Arch System for Microwave Reflectance Measurement.
IEEE Trans. Instrum. Meas., 2024
Automatic Instantaneous Attitude Estimation Framework for Spacecraft Based on Colocated Optical/ISAR Observation.
IEEE Geosci. Remote. Sens. Lett., 2024
Electron. Commer. Res. Appl., 2024
Video platforms' advertising and pricing decisions in the presence of derivative videos.
Electron. Commer. Res. Appl., 2024
2023
Oper. Res. Lett., July, 2023
Electron. Commer. Res., June, 2023
2022
2021
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2021
Space Target Attitude Estimation From ISAR Image Sequences With Key Point Extraction Network.
IEEE Signal Process. Lett., 2021
2020
J. Organ. Comput. Electron. Commer., 2020
Proceedings of the EBIMCS 2020: 3rd International Conference on E-Business, 2020
Analysis of Advertising Strategy of Enterprises and Advertising Platforms under Clicking Fraud.
Proceedings of the EBIMCS 2020: 3rd International Conference on E-Business, 2020
2019
Configuration of intrusion prevention systems based on a legal user: the case for using intrusion prevention systems instead of intrusion detection systems.
Inf. Technol. Manag., 2019
2018
Proceedings of the International Conference on E-Business, 2018
2017
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
2016
Oper. Res. Lett., 2016
Economic incentives in security information sharing: the effects of market structures.
Inf. Technol. Manag., 2016
2015
Bidirectional Role of Accuracy and Recognition in Internet-Based Targeted Advertising.
J. Electron. Commer. Organ., 2015
Security investment and information sharing under an alternative security breach probability function.
Inf. Syst. Frontiers, 2015
Information security investment for competitive firms with hacker behavior and security requirements.
Ann. Oper. Res., 2015
Proceedings of the International Conference on Information Systems, 2015
How Do B2B Patterns Shape IOS Application Capabilities - The Moderating Effect on IT Capability Building.
Proceedings of the 23rd European Conference on Information Systems, 2015
2014
A game-theoretic analysis of information sharing and security investment for complementary firms.
J. Oper. Res. Soc., 2014
Value Creation through Inter-Organizational Systems (iOS): from Governance Process View.
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014
2013
Reliab. Eng. Syst. Saf., 2013
A differential game approach to information security investment under hackers' knowledge dissemination.
Oper. Res. Lett., 2013
Decis. Anal., 2013
2012
Math. Soc. Sci., 2012
Equilibrium stability of a nonlinear heterogeneous duopoly game with extrapolative foresight.
Math. Comput. Simul., 2012
Resource Structuring or Capability Building? An Empirical Study of the Business Value of Information Technology.
J. Manag. Inf. Syst., 2012
J. Electron. Commer. Organ., 2012
2011
J. Comput. Appl. Math., 2011
Chaotic time series forecasting based on Cdf9/7 biorthogonal wavelet kernel support vector machine.
Proceedings of the Seventh International Conference on Natural Computation, 2011
2009
Appl. Math. Lett., 2009
Proceedings of the Business Intelligence: Artificial Intelligence in Business, 2009
2008
Int. J. Inf. Comput. Secur., 2008
2006
A general meshsize fourth-order compact difference discretization scheme for 3D Poisson equation.
Appl. Math. Comput., 2006
High order compact computation and nonuniform grids for streamfunction vorticity equations.
Appl. Math. Comput., 2006
Selective Data Distortion via Structural Partition and SSVD for Privacy Preservation.
Proceedings of the 2006 International Conference on Information & Knowledge Engineering, 2006
NNMF-Based Factorization Techniques for High-Accuracy Privacy Protection on Non-negative-valued Datasets.
Proceedings of the Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006
2004
Proceedings of the Computational and Information Science, First International Symposium, 2004
1997
Views on Designing Human-Computer Interface for ELS.
Proceedings of the Design of Computing Systems: Cognitive Considerations, 1997