default search action
Weijun Zhong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Lei Yan, Yuxiang Zhang, Shue Mei, Weijun Zhong:
Personalized pricing with persuasive advertising and the value of consumer information: a duopoly framework. Electron. Commer. Res. 24(3): 1533-1562 (2024) - [j31]Xueyu Liu, Shue Mei, Weijun Zhong:
Video platforms' advertising and pricing decisions in the presence of derivative videos. Electron. Commer. Res. Appl. 65: 101405 (2024) - [j30]Yuxiang Zhang, Weijun Zhong:
Advertising mode selection strategy under manufacturer encroachment. Electron. Commer. Res. Appl. 67: 101425 (2024) - [j29]Mingyue Zhong, Yan Cheng, Shu-e Mei, Weijun Zhong:
Information Collection and Personalized Service Strategy of Monopoly under Consumer Misrepresentation. J. Theor. Appl. Electron. Commer. Res. 19(2): 1321-1336 (2024) - [j28]Canyu Wang, Libing Jiang, Xiaoyuan Ren, Weijun Zhong, Zhuang Wang:
Automatic Instantaneous Attitude Estimation Framework for Spacecraft Based on Colocated Optical/ISAR Observation. IEEE Geosci. Remote. Sens. Lett. 21: 1-5 (2024) - [j27]Haidong Chen, Zhaoling He, Jieyao Yang, Weijun Zhong, Haitian Zhou, Mengzhu Yan, Yi Wang, Jun Zhang, Weijie Lin, Linbo Chen, Ye Han, Wenquan Che, Jian Hu, Quan Xue:
Advanced Multiprobe Dual-Polarized Arch System for Microwave Reflectance Measurement. IEEE Trans. Instrum. Meas. 73: 1-11 (2024) - 2023
- [j26]Yan Cheng, Shue Mei, Weijun Zhong, Xing Gao:
Managing consumer privacy risk: The effects of privacy breach insurance. Electron. Commer. Res. 23(2): 807-841 (2023) - [j25]Yuxiang Zhang, Weijun Zhong, Shu-e Mei:
Supply chain coordination by manufacturer reward contract. Oper. Res. Lett. 51(4): 432-438 (2023) - 2022
- [j24]Ning Yang, Yunlong Han, Jun Fang, Weijun Zhong, Anlin Xu:
UP-Net: unique keyPoint description and detection net. Mach. Vis. Appl. 33(1): 13 (2022) - 2021
- [j23]Pengfei Xie, Lei Zhang, Chuan Du, Xiaoqing Wang, Weijun Zhong:
Space Target Attitude Estimation From ISAR Image Sequences With Key Point Extraction Network. IEEE Signal Process. Lett. 28: 1041-1045 (2021) - [j22]Peng Kou, Yongxiang Liu, Weijun Zhong, Biao Tian, Wenzhen Wu, Chi Zhang:
Axial Attitude Estimation of Spacecraft in Orbit Based on ISAR Image Sequence. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 14: 7246-7258 (2021) - 2020
- [j21]Fenfen Jiang, Shue Mei, Weijun Zhong:
Impact of Customer's Social Value on Optimizing Referral Reward Programs. J. Organ. Comput. Electron. Commer. 30(3): 279-295 (2020) - [c13]Yuxiang Zhang, Weijun Zhong, Shu-e Mei:
Two Dimensional Targeted Coupon Strategy in Competition. EBIMCS 2020: 67-72 - [c12]Lijiang Bao, Weijun Zhong, Shu-e Mei:
Analysis of Advertising Strategy of Enterprises and Advertising Platforms under Clicking Fraud. EBIMCS 2020: 73-78
2010 – 2019
- 2019
- [j20]Chuanxi Cai, Shue Mei, Weijun Zhong:
Configuration of intrusion prevention systems based on a legal user: the case for using intrusion prevention systems instead of intrusion detection systems. Inf. Technol. Manag. 20(2): 55-71 (2019) - 2018
- [c11]Lei Yan, Shu-e Mei, Weijun Zhong:
The Effect of Consumer Anti-Advertising Behaviors to Media Platform Competition. EBIMCS 2018: 28-33 - 2017
- [c10]Xiang Zou, Ruhai Wu, Weijun Zhong:
Impression Effect vs. Click-through Effect: Mechanism Design of Online Advertising. HICSS 2017: 1-10 - 2016
- [j19]Xing Gao, Weijun Zhong:
Economic incentives in security information sharing: the effects of market structures. Inf. Technol. Manag. 17(4): 361-377 (2016) - [j18]Xing Gao, Weijun Zhong, Chao Huang:
Should sophisticated expectations facilitate reaching equilibrium behavior? Oper. Res. Lett. 44(6): 812-817 (2016) - 2015
- [j17]Xing Gao, Weijun Zhong:
Information security investment for competitive firms with hacker behavior and security requirements. Ann. Oper. Res. 235(1): 277-300 (2015) - [j16]Xing Gao, Weijun Zhong, Shue Mei:
Security investment and information sharing under an alternative security breach probability function. Inf. Syst. Frontiers 17(2): 423-438 (2015) - [j15]Jiang Zhao, Shue Mei, Weijun Zhong:
Bidirectional Role of Accuracy and Recognition in Internet-Based Targeted Advertising. J. Electron. Commer. Organ. 13(1): 50-66 (2015) - [c9]Shuting Zhu, Arvind Tripathi, Weijun Zhong:
How Do B2B Patterns Shape IOS Application Capabilities - The Moderating Effect on IT Capability Building. ECIS 2015 - [c8]Shuting Zhu, Arvind Tripathi, Weijun Zhong:
Contractual or Relational? Effect of Environmental Uncertainty on IOS Governance. ICIS 2015 - 2014
- [j14]Xing Gao, Weijun Zhong, Shue Mei:
A game-theoretic analysis of information sharing and security investment for complementary firms. J. Oper. Res. Soc. 65(11): 1682-1691 (2014) - [c7]Shuting Zhu, Weijun Zhong, Shue Mei:
Value Creation through Inter-Organizational Systems (iOS): from Governance Process View. PACIS 2014: 304 - 2013
- [j13]Xing Gao, Weijun Zhong, Shue Mei:
Information Security Investment When Hackers Disseminate Knowledge. Decis. Anal. 10(4): 352-368 (2013) - [j12]Yanfang Zhang, Shue Mei, Weijun Zhong:
Should R&D risk always be preferable? Oper. Res. Lett. 41(2): 147-149 (2013) - [j11]Xing Gao, Weijun Zhong, Shue Mei:
A differential game approach to information security investment under hackers' knowledge dissemination. Oper. Res. Lett. 41(5): 421-425 (2013) - [j10]Xing Gao, Weijun Zhong, Shue Mei:
A game-theory approach to configuration of detection software with decision errors. Reliab. Eng. Syst. Saf. 119: 35-43 (2013) - 2012
- [j9]Jianqiang Zhang, Weijun Zhong, Shue Mei:
Competitive Effects of Purchase-Based Targeted Advertising. J. Electron. Commer. Organ. 10(4): 71-84 (2012) - [j8]Nianxin Wang, Huigang Liang, Weijun Zhong, Yajiong Xue, Jinghua Xiao:
Resource Structuring or Capability Building? An Empirical Study of the Business Value of Information Technology. J. Manag. Inf. Syst. 29(2): 325-367 (2012) - [j7]Xing Gao, Weijun Zhong, Shue Mei:
Equilibrium stability of a nonlinear heterogeneous duopoly game with extrapolative foresight. Math. Comput. Simul. 82(11): 2069-2078 (2012) - [j6]Xing Gao, Weijun Zhong, Shue Mei:
On local stability of Cournot models with simultaneous and sequential decisions. Math. Soc. Sci. 63(3): 207-212 (2012) - 2011
- [j5]Min Li, Weijun Zhong:
An LQP-based descent method for structured monotone variational inequalities. J. Comput. Appl. Math. 235(5): 1523-1530 (2011) - [c6]Chao Huang, Lili Huang, Weijun Zhong:
Chaotic time series forecasting based on Cdf9/7 biorthogonal wavelet kernel support vector machine. ICNC 2011: 348-352
2000 – 2009
- 2009
- [j4]Cuihua Xie, Weijun Zhong, Zhenbin Fan:
Existence results for nonlinear nonlocal problems in Banach spaces. Appl. Math. Lett. 22(7): 998-1002 (2009) - [c5]Jianli Luo, Weijun Zhong:
R&D Strategy and Cournot Competition with Labor-Managed and Profit-Maximizing Firms. BIFE 2009: 718-721 - 2008
- [j3]Jie Wang, Jun Zhang, Shuting Xu, Weijun Zhong:
A novel data distortion approach via selective SSVD for privacy protection. Int. J. Inf. Comput. Secur. 2(1): 48-70 (2008) - 2006
- [j2]Jie Wang, Weijun Zhong, Jun Zhang:
High order compact computation and nonuniform grids for streamfunction vorticity equations. Appl. Math. Comput. 179(1): 108-120 (2006) - [j1]Jie Wang, Weijun Zhong, Jun Zhang:
A general meshsize fourth-order compact difference discretization scheme for 3D Poisson equation. Appl. Math. Comput. 183(2): 804-812 (2006) - [c4]Jie Wang, Weijun Zhong, Jun Zhang:
NNMF-Based Factorization Techniques for High-Accuracy Privacy Protection on Non-negative-valued Datasets. ICDM Workshops 2006: 513-517 - [c3]Jie Wang, Weijun Zhong, Jun Zhang, Shuting Xu:
Selective Data Distortion via Structural Partition and SSVD for Privacy Preservation. IKE 2006: 114-120 - 2004
- [c2]Jie Wang, Weijun Zhong, Jun Zhang:
Support Vector Machine Approach for Partner Selection of Virtual Enterprises. CIS 2004: 1247-1253
1990 – 1999
- 1997
- [c1]Wanxia Hu, Weijun Zhong, Nanrong Xu:
Views on Designing Human-Computer Interface for ELS. HCI (1) 1997: 809-812
Coauthor Index
aka: Shu-e Mei
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint