Weijun Zhong

According to our database1, Weijun Zhong authored at least 45 papers between 1997 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Personalized pricing with persuasive advertising and the value of consumer information: a duopoly framework.
Electron. Commer. Res., September, 2024

Information Collection and Personalized Service Strategy of Monopoly under Consumer Misrepresentation.
J. Theor. Appl. Electron. Commer. Res., June, 2024

Advanced Multiprobe Dual-Polarized Arch System for Microwave Reflectance Measurement.
IEEE Trans. Instrum. Meas., 2024

Automatic Instantaneous Attitude Estimation Framework for Spacecraft Based on Colocated Optical/ISAR Observation.
IEEE Geosci. Remote. Sens. Lett., 2024

Advertising mode selection strategy under manufacturer encroachment.
Electron. Commer. Res. Appl., 2024

Video platforms' advertising and pricing decisions in the presence of derivative videos.
Electron. Commer. Res. Appl., 2024

2023
Supply chain coordination by manufacturer reward contract.
Oper. Res. Lett., July, 2023

Managing consumer privacy risk: The effects of privacy breach insurance.
Electron. Commer. Res., June, 2023

2022
UP-Net: unique keyPoint description and detection net.
Mach. Vis. Appl., 2022

2021
Axial Attitude Estimation of Spacecraft in Orbit Based on ISAR Image Sequence.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2021

Space Target Attitude Estimation From ISAR Image Sequences With Key Point Extraction Network.
IEEE Signal Process. Lett., 2021

2020
Impact of Customer's Social Value on Optimizing Referral Reward Programs.
J. Organ. Comput. Electron. Commer., 2020

Two Dimensional Targeted Coupon Strategy in Competition.
Proceedings of the EBIMCS 2020: 3rd International Conference on E-Business, 2020

Analysis of Advertising Strategy of Enterprises and Advertising Platforms under Clicking Fraud.
Proceedings of the EBIMCS 2020: 3rd International Conference on E-Business, 2020

2019
Configuration of intrusion prevention systems based on a legal user: the case for using intrusion prevention systems instead of intrusion detection systems.
Inf. Technol. Manag., 2019

2018
The Effect of Consumer Anti-Advertising Behaviors to Media Platform Competition.
Proceedings of the International Conference on E-Business, 2018

2017
Impression Effect vs. Click-through Effect: Mechanism Design of Online Advertising.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

2016
Should sophisticated expectations facilitate reaching equilibrium behavior?
Oper. Res. Lett., 2016

Economic incentives in security information sharing: the effects of market structures.
Inf. Technol. Manag., 2016

2015
Bidirectional Role of Accuracy and Recognition in Internet-Based Targeted Advertising.
J. Electron. Commer. Organ., 2015

Security investment and information sharing under an alternative security breach probability function.
Inf. Syst. Frontiers, 2015

Information security investment for competitive firms with hacker behavior and security requirements.
Ann. Oper. Res., 2015

Contractual or Relational? Effect of Environmental Uncertainty on IOS Governance.
Proceedings of the International Conference on Information Systems, 2015

How Do B2B Patterns Shape IOS Application Capabilities - The Moderating Effect on IT Capability Building.
Proceedings of the 23rd European Conference on Information Systems, 2015

2014
A game-theoretic analysis of information sharing and security investment for complementary firms.
J. Oper. Res. Soc., 2014

Value Creation through Inter-Organizational Systems (iOS): from Governance Process View.
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014

2013
A game-theory approach to configuration of detection software with decision errors.
Reliab. Eng. Syst. Saf., 2013

Should R&D risk always be preferable?
Oper. Res. Lett., 2013

A differential game approach to information security investment under hackers' knowledge dissemination.
Oper. Res. Lett., 2013

Information Security Investment When Hackers Disseminate Knowledge.
Decis. Anal., 2013

2012
On local stability of Cournot models with simultaneous and sequential decisions.
Math. Soc. Sci., 2012

Equilibrium stability of a nonlinear heterogeneous duopoly game with extrapolative foresight.
Math. Comput. Simul., 2012

Resource Structuring or Capability Building? An Empirical Study of the Business Value of Information Technology.
J. Manag. Inf. Syst., 2012

Competitive Effects of Purchase-Based Targeted Advertising.
J. Electron. Commer. Organ., 2012

2011
An LQP-based descent method for structured monotone variational inequalities.
J. Comput. Appl. Math., 2011

Chaotic time series forecasting based on Cdf9/7 biorthogonal wavelet kernel support vector machine.
Proceedings of the Seventh International Conference on Natural Computation, 2011

2009
Existence results for nonlinear nonlocal problems in Banach spaces.
Appl. Math. Lett., 2009

R&D Strategy and Cournot Competition with Labor-Managed and Profit-Maximizing Firms.
Proceedings of the Business Intelligence: Artificial Intelligence in Business, 2009

2008
A novel data distortion approach via selective SSVD for privacy protection.
Int. J. Inf. Comput. Secur., 2008

2006
A general meshsize fourth-order compact difference discretization scheme for 3D Poisson equation.
Appl. Math. Comput., 2006

High order compact computation and nonuniform grids for streamfunction vorticity equations.
Appl. Math. Comput., 2006

Selective Data Distortion via Structural Partition and SSVD for Privacy Preservation.
Proceedings of the 2006 International Conference on Information & Knowledge Engineering, 2006

NNMF-Based Factorization Techniques for High-Accuracy Privacy Protection on Non-negative-valued Datasets.
Proceedings of the Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006

2004
Support Vector Machine Approach for Partner Selection of Virtual Enterprises.
Proceedings of the Computational and Information Science, First International Symposium, 2004

1997
Views on Designing Human-Computer Interface for ELS.
Proceedings of the Design of Computing Systems: Cognitive Considerations, 1997


  Loading...