Details about Jun Zhuang
Access statistics for papers by Jun Zhuang.
Last updated 2021-09-21. Update your information in the RePEc Author Service.
Short-id: pzh735
Jump to Journal Articles Edited books Chapters
Working Papers
2004
- Economic Analysis of Cellulase Production by Clostridium thermocellum in Solid State and Submerged Fermentation
Staff Papers, University of Kentucky, Department of Agricultural Economics View citations (1)
Also in 2004 Annual meeting, August 1-4, Denver, CO, American Agricultural Economics Association (New Name 2008: Agricultural and Applied Economics Association) (2004) View citations (1)
- INVESTMENT ANALYSIS OF REPLACING ENDOPHYTE-INFECTED WITH ENDOPHYTE-FREE TALL FESCUE PASTURES
2004 Annual Meeting, February 14-18, 2004, Tulsa, Oklahoma, Southern Agricultural Economics Association View citations (5)
2003
- Chinese Consumers' Preferences for Livestock Products
2003 Annual meeting, July 27-30, Montreal, Canada, American Agricultural Economics Association (New Name 2008: Agricultural and Applied Economics Association) View citations (4)
See also Journal Article Chinese Consumers' Preferences for Livestock Products, International Food and Agribusiness Management Review, International Food and Agribusiness Management Association (2005) View citations (1) (2005)
Journal Articles
2021
- An exploratory analysis for performance assessment of state police forces in india: an eclectic approach
Operational Research, 2021, 21, (2), 1125-1151
- Modeling multi-target defender-attacker games with quantal response attack strategies
Reliability Engineering and System Safety, 2021, 205, (C) View citations (14)
- Reciprocal spreading and debunking processes of online misinformation: A new rumor spreading–debunking model with a case study
Physica A: Statistical Mechanics and its Applications, 2021, 565, (C) View citations (3)
- Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game
Reliability Engineering and System Safety, 2021, 207, (C) View citations (6)
2020
- A Two-Stage Optimization Model for Large-Scale Group Decision-Making in Disaster Management: Minimizing Group Conflict and Maximizing Individual Satisfaction
Group Decision and Negotiation, 2020, 29, (5), 901-921 View citations (6)
- A game-theoretic approach to modeling attacks and defenses of smart grids at three levels
Reliability Engineering and System Safety, 2020, 195, (C) View citations (12)
- An Attacker–defender Resource Allocation Game with Substitution and Complementary Effects
Risk Analysis, 2020, 40, (7), 1481-1506 View citations (2)
- Analyzing passengers’ emotions following flight delays- a 2011–2019 case study on SKYTRAX comments
Journal of Air Transport Management, 2020, 89, (C) View citations (3)
- Big Data and Predictive Analytics in Fire Risk Using Weather Data
Risk Analysis, 2020, 40, (7), 1438-1449 View citations (3)
- Call for Papers on Emerging Topics in Health Decision Analysis
Decision Analysis, 2020, 17, (2), 185-185
- Crime risk analysis through big data algorithm with urban metrics
Physica A: Statistical Mechanics and its Applications, 2020, 545, (C) View citations (2)
- Defender–Attacker Games with Asymmetric Player Utilities
Risk Analysis, 2020, 40, (2), 408-420 View citations (11)
- Discrete game-theoretic analysis of defense in correlated cyber-physical systems
Annals of Operations Research, 2020, 294, (1), 741-767 View citations (3)
- Fire Code Inspection and Compliance: A Game-Theoretic Model Between Fire Inspection Agencies and Building Owners
Decision Analysis, 2020, 17, (3), 208-226 View citations (2)
- Keep it or give back? Optimal pricing strategy of reward-based crowdfunding with a hybrid mechanism in the sharing economy
International Journal of Production Research, 2020, 58, (22), 6868-6889 View citations (3)
- Misinformation debunking and cross-platform information sharing through Twitter during Hurricanes Harvey and Irma: a case study on shelters and ID checks
Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, 2020, 103, (1), 861-883 View citations (7)
- Stability analysis and control strategies for worm attack in mobile networks via a VEIQS propagation model
Applied Mathematics and Computation, 2020, 368, (C) View citations (3)
2019
- A Study on a Sequential One‐Defender‐N‐Attacker Game
Risk Analysis, 2019, 39, (6), 1414-1432 View citations (6)
- A data-driven integer programming model for soccer clubs’ decision making on player transfers
Environment Systems and Decisions, 2019, 39, (4), 466-481 View citations (2)
- Modeling a multi-target attacker-defender game with multiple attack types
Reliability Engineering and System Safety, 2019, 185, (C), 465-475 View citations (15)
- Modeling the Cost Effectiveness of Fire Protection Resource Allocation in the United States: Models and a 1980–2014 Case Study
Risk Analysis, 2019, 39, (6), 1358-1381 View citations (2)
- Scalable simulation of a Disaster Response Agent-based network Management and Adaptation System (DRAMAS)
Journal of Risk Research, 2019, 22, (3), 269-290
2018
- Analysis of fire protection efficiency in the United States: a two-stage DEA-based approach
OR Spectrum: Quantitative Approaches in Management, 2018, 40, (1), 23-68 View citations (7)
- Behavior Analysis of Illegal Fishing in the Gulf of Mexico
Journal of Homeland Security and Emergency Management, 2018, 15, (1), 10
- Cyber–Physical Correlation Effects in Defense Games for Large Discrete Infrastructures
Games, 2018, 9, (3), 1-24 View citations (2)
- Incorporating risk preferences in stochastic noncooperative games
IISE Transactions, 2018, 50, (1), 1-13 View citations (3)
- Modeling Precheck Parallel Screening Process in the Face of Strategic Applicants with Incomplete Information and Screening Errors
Risk Analysis, 2018, 38, (1), 118-133 View citations (6)
- Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game
Reliability Engineering and System Safety, 2018, 179, (C), 12-26 View citations (19)
- Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders Using a Decision‐Theoretic Approach
Risk Analysis, 2018, 38, (2), 215-225 View citations (8)
- Rumor response, debunking response, and decision makings of misinformed Twitter users during disasters
Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, 2018, 93, (3), 1145-1162 View citations (16)
- Security screening queues with impatient applicants: A new model with a case study
European Journal of Operational Research, 2018, 265, (3), 919-930 View citations (4)
- Stochastic shortest path network interdiction with a case study of Arizona–Mexico border
Reliability Engineering and System Safety, 2018, 179, (C), 62-73 View citations (10)
- Supervision after Certification: An Evolutionary Game Analysis for Chinese Environmental Labeled Enterprises
Sustainability, 2018, 10, (5), 1-22 View citations (9)
- The role of risk preferences in a multi-target defender-attacker resource allocation game
Reliability Engineering and System Safety, 2018, 169, (C), 95-104 View citations (22)
2017
- A review of game theory applications in natural disaster management research
Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, 2017, 89, (3), 1461-1483 View citations (19)
- Crisis information distribution on Twitter: a content analysis of tweets during Hurricane Sandy
Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, 2017, 89, (1), 161-181 View citations (21)
- Cross‐Milieu Terrorist Collaboration: Using Game Theory to Assess the Risk of a Novel Threat
Risk Analysis, 2017, 37, (2), 342-371 View citations (3)
- Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts
Risk Analysis, 2017, 37, (11), 2229-2245 View citations (12)
- Driving-forces model on individual behavior in scenarios considering moving threat agents
Physica A: Statistical Mechanics and its Applications, 2017, 481, (C), 127-140 View citations (5)
- Dynamic Forecasting Conditional Probability of Bombing Attacks Based on Time‐Series and Intervention Analysis
Risk Analysis, 2017, 37, (7), 1287-1297
- Fluid approximations and control of queues in emergency departments
European Journal of Operational Research, 2017, 261, (3), 1110-1124 View citations (9)
- N-stage security screening strategies in the face of strategic applicants
Reliability Engineering and System Safety, 2017, 165, (C), 292-301 View citations (9)
- Toward an integrated sustainable-resilient supply chain: A pharmaceutical case study
Transportation Research Part E: Logistics and Transportation Review, 2017, 103, (C), 109-142 View citations (49)
- Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors
Annals of Operations Research, 2017, 258, (2), 237-262 View citations (7)
- Understanding Conflicting Interests of a Government and a Tobacco Manufacturer: A Game-Theoretic Approach
Group Decision and Negotiation, 2017, 26, (6), 1209-1230
2016
- A medical resource allocation model for serving emergency victims with deteriorating health conditions
Annals of Operations Research, 2016, 236, (1), 177-196 View citations (19)
Also in Annals of Operations Research, 2016, 236, (1), 177-196 (2016) View citations (18)
- Balancing pre-disaster preparedness and post-disaster relief
European Journal of Operational Research, 2016, 252, (1), 246-256 View citations (18)
- Defense of Cyber Infrastructures Against Cyber‐Physical Attacks Using Game‐Theoretic Models
Risk Analysis, 2016, 36, (4), 694-710 View citations (8)
- Does New Rural Pension Scheme decrease elderly labor supply? Evidence from CHARLS
China Economic Review, 2016, 41, (C), 315-330 View citations (33)
- How companies and governments react to disasters
Journal of Risk and Reliability, 2016, 230, (4), 417-426 View citations (3)
- Introductions to Adversary Behavior: Validating the Models
Risk Analysis, 2016, 36, (4), 650-652 View citations (2)
- Managing consumer behavior toward on-time return of the waste electrical and electronic equipment: A game theoretic approach
International Journal of Production Economics, 2016, 182, (C), 545-563 View citations (14)
- Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF
Risk Analysis, 2016, 36, (4), 776-791 View citations (4)
- Modeling and mitigating the effects of supply chain disruption in a defender–attacker game
Annals of Operations Research, 2016, 236, (1), 255-270 View citations (10)
Also in Annals of Operations Research, 2016, 236, (1), 255-270 (2016) View citations (9)
- Modeling costly learning and counter-learning in a defender-attacker game with private defender information
Annals of Operations Research, 2016, 236, (1), 271-289 View citations (15)
Also in Annals of Operations Research, 2016, 236, (1), 271-289 (2016) View citations (12)
- Partnership behavior in disaster relief operations: a case study comparison of the responses to the tornado in Joplin, Missouri and Hurricane Sandy along the Jersey Coast
Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, 2016, 84, (1), 625-647
- Research on Factors Influencing Municipal Household Solid Waste Separate Collection: Bayesian Belief Networks
Sustainability, 2016, 8, (2), 1-14 View citations (6)
- The strategic interaction between a company and the government surrounding disasters
Annals of Operations Research, 2016, 237, (1), 27-40 View citations (16)
Also in Annals of Operations Research, 2016, 237, (1), 27-40 (2016) View citations (16)
2015
- Modeling Public–Private Partnerships in Disaster Management via Centralized and Decentralized Models
Decision Analysis, 2015, 12, (4), 173-189 View citations (7)
- On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness
European Journal of Operational Research, 2015, 246, (1), 320-330 View citations (21)
2014
- Discrete Dynamic Gaming Models in Supply Chain Management and Project Management
Discrete Dynamics in Nature and Society, 2014, 2014, 1-2
- Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game
Decision Analysis, 2014, 11, (1), 43-62 View citations (14)
- Publicity vs. impact in nonprofit disclosures and donor preferences: a sequential game with one nonprofit organization and N donors
Annals of Operations Research, 2014, 221, (1), 469-491 View citations (15)
- Subsidizing to disrupt a terrorism supply chain—a four-player game
Journal of the Operational Research Society, 2014, 65, (7), 1108-1119 View citations (11)
2013
- Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker
Risk Analysis, 2013, 33, (6), 1083-1099 View citations (32)
- Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game
European Journal of Operational Research, 2013, 228, (1), 262-272 View citations (49)
- Modeling Parking Behavior Under Uncertainty: A Static Game Theoretic versus a Sequential Neo-additive Capacity Modeling Approach
Networks and Spatial Economics, 2013, 13, (3), 327-350 View citations (9)
- The impact of disaster on the strategic interaction between company and government
European Journal of Operational Research, 2013, 225, (2), 363-376 View citations (23)
2012
- Case study in disaster relief: A descriptive analysis of agency partnerships in the aftermath of the January 12th, 2010 Haitian earthquake
Socio-Economic Planning Sciences, 2012, 46, (1), 67-77 View citations (6)
- Modelling ‘contracts’ between a terrorist group and a government in a sequential game
Journal of the Operational Research Society, 2012, 63, (6), 790-809 View citations (6)
- Regulation Games Between Government and Competing Companies: Oil Spills and Other Disasters
Decision Analysis, 2012, 9, (2), 156-164 View citations (17)
- Robust Allocation of a Defensive Budget Considering an Attacker's Private Information
Risk Analysis, 2012, 32, (5), 930-943 View citations (28)
- The timing and deterrence of terrorist attacks due to exogenous dynamics
Journal of the Operational Research Society, 2012, 63, (6), 726-735 View citations (35)
2011
- Are NFL Coaches Risk and Loss Averse? Evidence from Their Use of Kickoff Strategies
Journal of Quantitative Analysis in Sports, 2011, 7, (3), 17 View citations (3)
- Balancing congestion and security in the presence of strategic applicants with private information
European Journal of Operational Research, 2011, 212, (1), 100-111 View citations (26)
- Decisions in Disaster Recovery Operations: A Game Theoretic Perspective on Organization Cooperation
Journal of Homeland Security and Emergency Management, 2011, 8, (1), 16 View citations (3)
- Defending Against a Stockpiling Terrorist
The Engineering Economist, 2011, 56, (4), 321-353 View citations (11)
- Governments' and Terrorists' Defense and Attack in a T -Period Game
Decision Analysis, 2011, 8, (1), 46-70 View citations (43)
- Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers
Risk Analysis, 2011, 31, (4), 533-547 View citations (17)
- SECRECY AND DECEPTION AT EQUILIBRIUM, WITH APPLICATIONS TO ANTI-TERRORISM RESOURCE ALLOCATION
Defence and Peace Economics, 2011, 22, (1), 43-61 View citations (33)
2010
- Modeling secrecy and deception in a multiple-period attacker-defender signaling game
European Journal of Operational Research, 2010, 203, (2), 409-418 View citations (76)
- Reasons for Secrecy and Deception in Homeland‐Security Resource Allocation
Risk Analysis, 2010, 30, (12), 1737-1743 View citations (22)
2007
- Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort
Operations Research, 2007, 55, (5), 976-991 View citations (169)
2005
- Chinese Consumers' Preferences for Livestock Products
International Food and Agribusiness Management Review, 2005, 08, (4), 15 View citations (1)
See also Working Paper Chinese Consumers' Preferences for Livestock Products, 2003 Annual meeting, July 27-30, Montreal, Canada (2003) View citations (4) (2003)
Edited books
2015
- Game Theoretic Analysis of Congestion, Safety and Security
Springer Series in Reliability Engineering, Springer View citations (7)
- Game Theoretic Analysis of Congestion, Safety and Security
Springer Series in Reliability Engineering, Springer View citations (7)
Chapters
2015
- Simulating a Multi-Stage Screening Network: A Queueing Theory and Game Theory Application
Springer View citations (1)
2009
- Defending Against Terrorism, Natural Disaster, and All Hazards
Springer View citations (52)
|
The links between different versions of a paper are constructed automatically by matching on the titles.
Please contact if a link is incorrect.
Use this form
to add links between versions where the titles do not match.
|