| 
Details about Jun ZhuangAccess statistics for papers by Jun Zhuang.
 Last updated 2021-09-21. Update your information in the RePEc Author Service.
 Short-id: pzh735
 
 
Jump to Journal Articles Edited books Chapters Working Papers2004
Economic Analysis of Cellulase Production by Clostridium thermocellum in Solid State and Submerged Fermentation
Staff Papers, University of Kentucky, Department of Agricultural Economics
  View citations (1) Also in 2004 Annual meeting, August 1-4, Denver, CO, American Agricultural Economics Association (New Name 2008: Agricultural and Applied Economics Association) (2004)
  View citations (1)INVESTMENT ANALYSIS OF REPLACING ENDOPHYTE-INFECTED WITH ENDOPHYTE-FREE TALL FESCUE PASTURES
2004 Annual Meeting, February 14-18, 2004, Tulsa, Oklahoma, Southern Agricultural Economics Association
  View citations (5) 2003
Chinese Consumers' Preferences for Livestock Products
2003 Annual meeting, July 27-30, Montreal, Canada, American Agricultural Economics Association (New Name 2008: Agricultural and Applied Economics Association)
  View citations (4) See also  Journal Article Chinese Consumers' Preferences for Livestock Products, International Food and Agribusiness Management Review, International Food and Agribusiness Management Association (2005)
  View citations (1) (2005) Journal Articles2021
An exploratory analysis for performance assessment of state police forces in india: an eclectic approach
Operational Research, 2021, 21, (2), 1125-1151
  Modeling multi-target defender-attacker games with quantal response attack strategies
Reliability Engineering and System Safety, 2021, 205, (C)
  View citations (15)Reciprocal spreading and debunking processes of online misinformation: A new rumor spreading–debunking model with a case study
Physica A: Statistical Mechanics and its Applications, 2021, 565, (C)
  View citations (3)Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game
Reliability Engineering and System Safety, 2021, 207, (C)
  View citations (8) 2020
A Two-Stage Optimization Model for Large-Scale Group Decision-Making in Disaster Management: Minimizing Group Conflict and Maximizing Individual Satisfaction
Group Decision and Negotiation, 2020, 29, (5), 901-921
  View citations (6)A game-theoretic approach to modeling attacks and defenses of smart grids at three levels
Reliability Engineering and System Safety, 2020, 195, (C)
  View citations (17)An Attacker–defender Resource Allocation Game with Substitution and Complementary Effects
Risk Analysis, 2020, 40, (7), 1481-1506
  View citations (2)Analyzing passengers’ emotions following flight delays- a 2011–2019 case study on SKYTRAX comments
Journal of Air Transport Management, 2020, 89, (C)
  View citations (5)Big Data and Predictive Analytics in Fire Risk Using Weather Data
Risk Analysis, 2020, 40, (7), 1438-1449
  View citations (4)Call for Papers on Emerging Topics in Health Decision Analysis
Decision Analysis, 2020, 17, (2), 185-185
  Crime risk analysis through big data algorithm with urban metrics
Physica A: Statistical Mechanics and its Applications, 2020, 545, (C)
  View citations (2)Defender–Attacker Games with Asymmetric Player Utilities
Risk Analysis, 2020, 40, (2), 408-420
  View citations (11)Discrete game-theoretic analysis of defense in correlated cyber-physical systems
Annals of Operations Research, 2020, 294, (1), 741-767
  View citations (3)Fire Code Inspection and Compliance: A Game-Theoretic Model Between Fire Inspection Agencies and Building Owners
Decision Analysis, 2020, 17, (3), 208-226
  View citations (3)Keep it or give back? Optimal pricing strategy of reward-based crowdfunding with a hybrid mechanism in the sharing economy
International Journal of Production Research, 2020, 58, (22), 6868-6889
  View citations (3)Misinformation debunking and cross-platform information sharing through Twitter during Hurricanes Harvey and Irma: a case study on shelters and ID checks
Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, 2020, 103, (1), 861-883
  View citations (8)Stability analysis and control strategies for worm attack in mobile networks via a VEIQS propagation model
Applied Mathematics and Computation, 2020, 368, (C)
  View citations (5) 2019
A Study on a Sequential One‐Defender‐N‐Attacker Game
Risk Analysis, 2019, 39, (6), 1414-1432
  View citations (6)A data-driven integer programming model for soccer clubs’ decision making on player transfers
Environment Systems and Decisions, 2019, 39, (4), 466-481
  View citations (3)Modeling a multi-target attacker-defender game with multiple attack types
Reliability Engineering and System Safety, 2019, 185, (C), 465-475
  View citations (16)Modeling the Cost Effectiveness of Fire Protection Resource Allocation in the United States: Models and a 1980–2014 Case Study
Risk Analysis, 2019, 39, (6), 1358-1381
  View citations (2)Scalable simulation of a Disaster Response Agent-based network Management and Adaptation System (DRAMAS)
Journal of Risk Research, 2019, 22, (3), 269-290
   2018
Analysis of fire protection efficiency in the United States: a two-stage DEA-based approach
OR Spectrum: Quantitative Approaches in Management, 2018, 40, (1), 23-68
  View citations (7)Behavior Analysis of Illegal Fishing in the Gulf of Mexico
Journal of Homeland Security and Emergency Management, 2018, 15, (1), 10
  Cyber–Physical Correlation Effects in Defense Games for Large Discrete Infrastructures
Games, 2018, 9, (3), 1-24
  View citations (2)Incorporating risk preferences in stochastic noncooperative games
IISE Transactions, 2018, 50, (1), 1-13
  View citations (3)Modeling Precheck Parallel Screening Process in the Face of Strategic Applicants with Incomplete Information and Screening Errors
Risk Analysis, 2018, 38, (1), 118-133
  View citations (6)Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game
Reliability Engineering and System Safety, 2018, 179, (C), 12-26
  View citations (19)Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders Using a Decision‐Theoretic Approach
Risk Analysis, 2018, 38, (2), 215-225
  View citations (8)Rumor response, debunking response, and decision makings of misinformed Twitter users during disasters
Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, 2018, 93, (3), 1145-1162
  View citations (18)Security screening queues with impatient applicants: A new model with a case study
European Journal of Operational Research, 2018, 265, (3), 919-930
  View citations (4)Stochastic shortest path network interdiction with a case study of Arizona–Mexico border
Reliability Engineering and System Safety, 2018, 179, (C), 62-73
  View citations (11)Supervision after Certification: An Evolutionary Game Analysis for Chinese Environmental Labeled Enterprises
Sustainability, 2018, 10, (5), 1-22
  View citations (9)The role of risk preferences in a multi-target defender-attacker resource allocation game
Reliability Engineering and System Safety, 2018, 169, (C), 95-104
  View citations (23) 2017
A review of game theory applications in natural disaster management research
Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, 2017, 89, (3), 1461-1483
  View citations (23)Crisis information distribution on Twitter: a content analysis of tweets during Hurricane Sandy
Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, 2017, 89, (1), 161-181
  View citations (22)Cross‐Milieu Terrorist Collaboration: Using Game Theory to Assess the Risk of a Novel Threat
Risk Analysis, 2017, 37, (2), 342-371
  View citations (3)Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts
Risk Analysis, 2017, 37, (11), 2229-2245
  View citations (12)Driving-forces model on individual behavior in scenarios considering moving threat agents
Physica A: Statistical Mechanics and its Applications, 2017, 481, (C), 127-140
  View citations (5)Dynamic Forecasting Conditional Probability of Bombing Attacks Based on Time‐Series and Intervention Analysis
Risk Analysis, 2017, 37, (7), 1287-1297
  Fluid approximations and control of queues in emergency departments
European Journal of Operational Research, 2017, 261, (3), 1110-1124
  View citations (9)N-stage security screening strategies in the face of strategic applicants
Reliability Engineering and System Safety, 2017, 165, (C), 292-301
  View citations (9)Toward an integrated sustainable-resilient supply chain: A pharmaceutical case study
Transportation Research Part E: Logistics and Transportation Review, 2017, 103, (C), 109-142
  View citations (64)Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors
Annals of Operations Research, 2017, 258, (2), 237-262
  View citations (7)Understanding Conflicting Interests of a Government and a Tobacco Manufacturer: A Game-Theoretic Approach
Group Decision and Negotiation, 2017, 26, (6), 1209-1230
   2016
A medical resource allocation model for serving emergency victims with deteriorating health conditions
Annals of Operations Research, 2016, 236, (1), 177-196
  View citations (20) Also in Annals of Operations Research, 2016, 236, (1), 177-196 (2016)
  View citations (21)Balancing pre-disaster preparedness and post-disaster relief
European Journal of Operational Research, 2016, 252, (1), 246-256
  View citations (19)Defense of Cyber Infrastructures Against Cyber‐Physical Attacks Using Game‐Theoretic Models
Risk Analysis, 2016, 36, (4), 694-710
  View citations (10)Does New Rural Pension Scheme decrease elderly labor supply? Evidence from CHARLS
China Economic Review, 2016, 41, (C), 315-330
  View citations (33)How companies and governments react to disasters
Journal of Risk and Reliability, 2016, 230, (4), 417-426
  View citations (3)Introductions to Adversary Behavior: Validating the Models
Risk Analysis, 2016, 36, (4), 650-652
  View citations (2)Managing consumer behavior toward on-time return of the waste electrical and electronic equipment: A game theoretic approach
International Journal of Production Economics, 2016, 182, (C), 545-563
  View citations (15)Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF
Risk Analysis, 2016, 36, (4), 776-791
  View citations (5)Modeling and mitigating the effects of supply chain disruption in a defender–attacker game
Annals of Operations Research, 2016, 236, (1), 255-270
  View citations (9) Also in Annals of Operations Research, 2016, 236, (1), 255-270 (2016)
  View citations (10)Modeling costly learning and counter-learning in a defender-attacker game with private defender information
Annals of Operations Research, 2016, 236, (1), 271-289
  View citations (12) Also in Annals of Operations Research, 2016, 236, (1), 271-289 (2016)
  View citations (15)Partnership behavior in disaster relief operations: a case study comparison of the responses to the tornado in Joplin, Missouri and Hurricane Sandy along the Jersey Coast
Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, 2016, 84, (1), 625-647
  Research on Factors Influencing Municipal Household Solid Waste Separate Collection: Bayesian Belief Networks
Sustainability, 2016, 8, (2), 1-14
  View citations (6)The strategic interaction between a company and the government surrounding disasters
Annals of Operations Research, 2016, 237, (1), 27-40
  View citations (16) Also in Annals of Operations Research, 2016, 237, (1), 27-40 (2016)
  View citations (16) 2015
Modeling Public–Private Partnerships in Disaster Management via Centralized and Decentralized Models
Decision Analysis, 2015, 12, (4), 173-189
  View citations (8)On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness
European Journal of Operational Research, 2015, 246, (1), 320-330
  View citations (21) 2014
Discrete Dynamic Gaming Models in Supply Chain Management and Project Management
Discrete Dynamics in Nature and Society, 2014, 2014, 1-2
  Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game
Decision Analysis, 2014, 11, (1), 43-62
  View citations (14)Publicity vs. impact in nonprofit disclosures and donor preferences: a sequential game with one nonprofit organization and N donors
Annals of Operations Research, 2014, 221, (1), 469-491
  View citations (15)Subsidizing to disrupt a terrorism supply chain—a four-player game
Journal of the Operational Research Society, 2014, 65, (7), 1108-1119
  View citations (12) 2013
Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker
Risk Analysis, 2013, 33, (6), 1083-1099
  View citations (32)Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game
European Journal of Operational Research, 2013, 228, (1), 262-272
  View citations (50)Modeling Parking Behavior Under Uncertainty: A Static Game Theoretic versus a Sequential Neo-additive Capacity Modeling Approach
Networks and Spatial Economics, 2013, 13, (3), 327-350
  View citations (10)The impact of disaster on the strategic interaction between company and government
European Journal of Operational Research, 2013, 225, (2), 363-376
  View citations (23) 2012
Case study in disaster relief: A descriptive analysis of agency partnerships in the aftermath of the January 12th, 2010 Haitian earthquake
Socio-Economic Planning Sciences, 2012, 46, (1), 67-77
  View citations (6)Modelling ‘contracts’ between a terrorist group and a government in a sequential game
Journal of the Operational Research Society, 2012, 63, (6), 790-809
  View citations (6)Regulation Games Between Government and Competing Companies: Oil Spills and Other Disasters
Decision Analysis, 2012, 9, (2), 156-164
  View citations (17)Robust Allocation of a Defensive Budget Considering an Attacker's Private Information
Risk Analysis, 2012, 32, (5), 930-943
  View citations (28)The timing and deterrence of terrorist attacks due to exogenous dynamics
Journal of the Operational Research Society, 2012, 63, (6), 726-735
  View citations (35) 2011
Are NFL Coaches Risk and Loss Averse? Evidence from Their Use of Kickoff Strategies
Journal of Quantitative Analysis in Sports, 2011, 7, (3), 17
  View citations (3)Balancing congestion and security in the presence of strategic applicants with private information
European Journal of Operational Research, 2011, 212, (1), 100-111
  View citations (26)Decisions in Disaster Recovery Operations: A Game Theoretic Perspective on Organization Cooperation
Journal of Homeland Security and Emergency Management, 2011, 8, (1), 16
  View citations (4)Defending Against a Stockpiling Terrorist
The Engineering Economist, 2011, 56, (4), 321-353
  View citations (11)Governments' and Terrorists' Defense and Attack in a T -Period Game
Decision Analysis, 2011, 8, (1), 46-70
  View citations (43)Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers
Risk Analysis, 2011, 31, (4), 533-547
  View citations (17)SECRECY AND DECEPTION AT EQUILIBRIUM, WITH APPLICATIONS TO ANTI-TERRORISM RESOURCE ALLOCATION
Defence and Peace Economics, 2011, 22, (1), 43-61
  View citations (33) 2010
Modeling secrecy and deception in a multiple-period attacker-defender signaling game
European Journal of Operational Research, 2010, 203, (2), 409-418
  View citations (78)Reasons for Secrecy and Deception in Homeland‐Security Resource Allocation
Risk Analysis, 2010, 30, (12), 1737-1743
  View citations (22) 2007
Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort
Operations Research, 2007, 55, (5), 976-991
  View citations (169) 2005
Chinese Consumers' Preferences for Livestock Products
International Food and Agribusiness Management Review, 2005, 08, (4), 15
  View citations (1) See also  Working Paper Chinese Consumers' Preferences for Livestock Products, 2003 Annual meeting, July 27-30, Montreal, Canada (2003)
  View citations (4) (2003) Edited books2015
Game Theoretic Analysis of Congestion, Safety and Security
Springer Series in Reliability Engineering, Springer View citations (7)
Game Theoretic Analysis of Congestion, Safety and Security
Springer Series in Reliability Engineering, Springer View citations (7)
 Chapters2015
Simulating a Multi-Stage Screening Network: A Queueing Theory and Game Theory Application
Springer View citations (1)
 2009
Defending Against Terrorism, Natural Disaster, and All Hazards
Springer View citations (52)
 | 
The links between different versions of a paper are constructed automatically by matching on the titles. 
 Please contact  if a link is incorrect. 
 Use this form 
to add links between versions where the titles do not match.
             |