default search action
Nan Feng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j49]Nan Feng, Shixin Tu, Feng Guo:
Big-data analytics capability, value creation process, and collaboration innovation quality in manufacturing enterprises: A knowledge-based view. Comput. Ind. Eng. 187: 109804 (2024) - [j48]Ling Zhang, Nan Feng, Haiyang Feng, Minqiang Li:
Optimal employment model for an entrant platform in on-demand service market. Ind. Manag. Data Syst. 124(1): 29-63 (2024) - [j47]Nan Feng, Yanan Shi, Yadi Li, Dahui Li, Jie Zhang, Minqiang Li:
An Exploration of the Dynamics Between Social Media and Box Office Performance. Inf. Syst. Frontiers 26(2): 591-608 (2024) - [j46]Nan Feng, Tianlu Zhou, Haiyang Feng, Minqiang Li:
Optimal Launch Timing of Bug Bounty Programs for Software Products under Different Licensing Models. J. Assoc. Inf. Syst. 25(2): 8 (2024) - [j45]Nan Feng, Kunkun Li, Zishan Huang, Zhongcheng Wei, Wei Wang, Jijun Zhao:
NISAC-EKF: An integrated localization deployment algorithm for UAV swarms based on NARX and EKF. Phys. Commun. 64: 102310 (2024) - [j44]Chongkai Wang, Minqiang Li, Haiyang Feng, Nan Feng:
Sponsored Data: Cooperative Pricing and Subsidizing Strategies of Mobile Telecom Carriers and Internet Content Providers. IEEE Trans. Engineering Management 71: 8923-8937 (2024) - [j43]Yongze Jin, Xin Ye, Nan Feng, Zirong Wang, Xinhong Hei, Junqi Liu, Lingxia Mu, Yankai Li:
Lesion Classification of Coronary Artery CTA Images Based on CBAM and Transfer Learning. IEEE Trans. Instrum. Meas. 73: 1-14 (2024) - [j42]Lingxia Mu, Jian Zhang, Nan Feng, Yongze Jin, Youmin Zhang, Hongxin Wang, Shihai Wu, Lu Tian:
A Condition Monitoring Method via Optimization-Based Adaptive Feature Extraction Strategy. IEEE Trans. Instrum. Meas. 73: 1-16 (2024) - [j41]Nan Feng, Yaping Du, Yuxuan Ding:
A Heuristic-Search-Based Topology Identification and Parameter Estimation Method in Low Voltage Distribution Grids With Low Observability. IEEE Trans. Smart Grid 15(6): 5826-5839 (2024) - [j40]Chuang Zhao, Hongke Zhao, Hengshu Zhu, Zhenya Huang, Nan Feng, Enhong Chen, Hui Xiong:
Bi-Discriminator Domain Adversarial Neural Networks With Class-Level Gradient Alignment. IEEE Trans. Syst. Man Cybern. Syst. 54(9): 5283-5295 (2024) - [i3]Zipeng Liu, Likang Wu, Ming He, Zhong Guan, Hongke Zhao, Nan Feng:
Dr.E Bridges Graphs with Large Language Models through Words. CoRR abs/2406.15504 (2024) - 2023
- [j39]Nan Feng, Yubo Zhang, Binbin Ren, Runliang Dou, Minqiang Li:
How Industrial Internet Platforms guide high-quality information sharing for semiconductor manufacturing? An evolutionary game model. Comput. Ind. Eng. 183: 109449 (2023) - [j38]Siyu Gao, Yuchen Wang, Nan Feng, Zhongcheng Wei, Jijun Zhao:
Deep Reinforcement Learning-Based Video Offloading and Resource Allocation in NOMA-Enabled Networks. Future Internet 15(5): 184 (2023) - [j37]Chongkai Wang, Minqiang Li, Haiyang Feng, Nan Feng:
When Should Competing Mobile Telecom Carriers Provide Sponsored Data Plans Under Cross-Side Network Effects? Int. J. Electron. Commer. 27(3): 406-440 (2023) - [j36]Nan Feng, Zhongtao Hu, Yi Wu, Ben Choi:
Avoiding the Diffusion of Responsibility in Social Networking Groups: A Field Experiment on Responses to Online Help-Request Referrals. J. Assoc. Inf. Syst. 24(2): 6 (2023) - [j35]Nan Feng, Yuguang Wang, Zhiguo Chen, Tingting Song:
The Status Quo and Development Countermeasures of Venture Capital in the New Energy Economy Based on Big Data Analysis. J. Database Manag. 34(1): 1-23 (2023) - [j34]Anqi Shangguan, Nan Feng, Lingxia Mu, Rong Fei, Xinhong Hei, Guo Xie:
SVAE-GRU-based degradation generation and prediction for small samples. Qual. Reliab. Eng. Int. 39(7): 2851-2868 (2023) - [j33]Yongze Jin, Lingxia Mu, Nan Feng, Xinhong Hei, Yankai Li, Guo Xie, Xin Ye, Jiajie Li:
Maximum Correntropy-Based Extended Particle Filter for Nonlinear System. IEEE Trans. Circuits Syst. II Express Briefs 70(7): 2520-2524 (2023) - [c15]Gaochen Min, Yifan Wu, Nan Feng, Xinbo Yu, Guang Li, Wei He:
Hybrid Vision-Force Control for Human Robot Co-Carrying on Ball and Board Systems. ICDL 2023: 220-224 - [c14]Tianlu Zhou, Dan Ma, Nan Feng:
An Economic Analysis of Third-Party Software Reliability Improvement using the Bug Bounty Program. ICIS 2023 - [c13]Lingxia Mu, Wenzhe Sun, Youmin Zhang, Nan Feng:
Incipient Gradual Fault Detection via Transformed Component and Dissimilarity Analysis. ICPS 2023: 1-6 - [c12]Nan Feng, Yun Su, Yuyao Feng, Yufan Zhang, Ren Zhang, Haoming Liu:
Probabilistic Risk Assessment of Over-voltage Based on Voltage Sensitivity Analysis in Distribution Networks. iSPEC 2023: 1-5 - [c11]Tianlu Zhou, Dan Ma, Nan Feng:
The Use of Bug Bounty Programs for Software Reliability Improvement. PACIS 2023: 99 - [c10]Wanying Chen, Haiyang Feng, Nan Feng, Yi Wu:
Impacts of Instant Booking on Listings: Theory and Evidence from Airbnb. PACIS 2023: 196 - 2022
- [j32]Nan Feng, Jia Su, Haiyang Feng, Minqiang Li:
Designing subscription menu for software products: Whether to release a long-length option. Inf. Manag. 59(6): 103665 (2022) - [j31]Nan Yuan, Haiyang Feng, Minqiang Li, Nan Feng:
Penetration or Skimming? Pricing Strategies for Software Platforms Considering Asymmetric Cross-Side Network Effects. J. Assoc. Inf. Syst. 23(4): 3 (2022) - 2021
- [j30]Nan Feng, Jianjian Chen, Haiyang Feng, Minqiang Li:
Promotional pricing strategies for platform vendors: Competition between first- and third-party products. Decis. Support Syst. 151: 113627 (2021) - [j29]Nan Feng, Shiyue Zhang, Minqiang Li, Dahui Li:
Contracting managed security service: Double moral hazard and risk interdependency. Electron. Commer. Res. Appl. 50: 101097 (2021) - [j28]Charlie Wang, Minqiang Li, Haiyang Feng, Nan Feng:
Should subscription-revenue internet content providers adopt sponsored data plans by mobile telecom carriers in duopoly market? Electron. Commer. Res. Appl. 50: 101106 (2021) - [j27]Chenglong Zhang, Nan Feng, Jianjian Chen, Dahui Li, Minqiang Li:
Outsourcing Strategies for Information Security: Correlated Losses and Security Externalities. Inf. Syst. Frontiers 23(3): 773-790 (2021) - [i2]Nan Feng, Guodong Zhang, Kapil Khandelwal:
On the Application of Data-Driven Deep Neural Networks in Linear and Nonlinear Structural Dynamics. CoRR abs/2111.02784 (2021) - 2020
- [j26]Nan Feng, Huanhuan Feng, Dahui Li, Minqiang Li:
Online media coverage, consumer engagement and movie sales: A PVAR approach. Decis. Support Syst. 131: 113267 (2020) - [j25]Nan Feng, Jianjian Chen, Haiyang Feng, Minqiang Li:
Optimal product selection and pricing strategies for platform vendors under two-sided network effects. Electron. Commer. Res. Appl. 43: 100990 (2020) - [j24]Nan Feng, Yufan Chen, Haiyang Feng, Dahui Li, Minqiang Li:
To outsource or not: The impact of information leakage risk on information security strategy. Inf. Manag. 57(5): 103215 (2020) - [j23]Yu Wang, Minqiang Li, Haiyang Feng, Nan Feng:
Optimal Release Strategy for the Competing Software Vendors Based on Word-of-Mouth Effect. Int. J. Electron. Commer. 24(1): 130-156 (2020) - [j22]Haiyang Feng, Zhengrui Jiang, Minqiang Li, Nan Feng:
First- or Second-Mover Advantage? The Case of IT-Enabled Platform Markets. MIS Q. 44(3) (2020) - [i1]Guodong Zhang, Nan Feng, Kapil Khandelwal:
Computational frameworks for homogenization and multiscale stability analyses of nonlinear periodic metamaterials. CoRR abs/2010.02371 (2020)
2010 – 2019
- 2019
- [j21]Nan Feng, Meiyun Wang, Minqiang Li, Dahui Li:
Effect of security investment strategy on the business value of managed security service providers. Electron. Commer. Res. Appl. 35 (2019) - [j20]Yu Wang, Minqiang Li, Haiyang Feng, Nan Feng:
Optimal sequential releasing strategy for software products in the presence of word-of-mouth and requirements uncertainty. Inf. Technol. Manag. 20(3): 153-174 (2019) - [c9]Pengkai Zhu, Durmus Alp Emre Acar, Nan Feng, Prateek Jain, Venkatesh Saligrama:
Cost aware Inference for IoT Devices. AISTATS 2019: 2770-2779 - [c8]Nan Feng, Zhongtao Hu, Yi Wu:
Avoiding the Diffusion of Responsibility in SNS Group: An Investigation on Responses to Help-Requests during Online Marketing Campaigns. ICIS 2019 - [c7]Nan Feng, Zhongtao Hu, Yi Wu:
Examining Responses to Help-Requests in SNS Groups: The Perspective of Perceived Responsibility. PACIS 2019: 125 - 2018
- [j19]Nan Feng, Zhenjing Su, Dahui Li, Chundong Zheng, Minqiang Li:
Effects of review spam in a firm-initiated virtual brand community: Evidence from smartphone customers. Inf. Manag. 55(8): 1061-1070 (2018) - [c6]Nan Feng, Haiyang Feng, Jie Zhang, Yufan Chen, Minqiang Li:
Outsourcing Information Security: The Role of Information Leakage in Outsourcing Decisions. CONF-IRM 2018: 26 - [c5]Nan Feng, Siyu Lin, Gang Zhu, Shichao Li, Huimin Zhang:
Interference Performance Analysis of Frequency Reuse Techniques for LTE-R Systems. ITSC 2018: 3415-3420 - 2017
- [j18]Xiaoxiao Luo, Minqiang Li, Nan Feng, Fuzan Chen:
Optimal Design on Customized Bundling Strategy of Information Goods for Customers with Two-Dimensional Heterogeneity. Asia Pac. J. Oper. Res. 34(2): 1750007:1-1750007:32 (2017) - [j17]Xiaoxiao Luo, Minqiang Li, Haiyang Feng, Nan Feng:
Intertemporal mixed bundling strategy of information products with network externality. Comput. Ind. Eng. 113: 369-381 (2017) - [c4]Nan Feng, Jianwen Ding, Gang Zhu, Siyu Lin, Jiaying Song, Shichao Li, Xiaobing Guo:
Performance analysis and evaluation of EDGE system for high-speed railway. ITSC 2017: 1-6 - 2016
- [j16]Nan Feng, Harris Wu, Minqiang Li, Desheng Wu, Fuzan Chen, Jin Tian:
Managing security risks for inter-organisational information systems: a multiagent collaborative model. Enterp. Inf. Syst. 10(7): 751-770 (2016) - [j15]Nan Feng, Sijing Cai, Li Yang:
An identification method of D-S evidence conflict based on the measurement factors. Int. J. Adv. Media Commun. 6(2/3/4): 143-155 (2016) - [j14]Nan Feng, Zhiqi Hao, Sibo Yang, Harris Wu:
Supporting Business Privacy Protection in Wireless Sensor Networks. J. Sensors 2016: 7638149:1-7638149:11 (2016) - [j13]Jin Tian, Minqiang Li, Fuzan Chen, Nan Feng:
Learning Subspace-Based RBFNN Using Coevolutionary Algorithm for Complex Classification Tasks. IEEE Trans. Neural Networks Learn. Syst. 27(1): 47-61 (2016) - 2015
- [j12]Nan Feng, Xue Yu, Runliang Dou, Bingning Pan:
Managing risk for business processes: A fuzzy based multi-agent system. J. Intell. Fuzzy Syst. 29(6): 2717-2726 (2015) - 2014
- [j11]Jin Tian, Nan Feng:
Adaptive generalized ensemble construction with feature selection and its application in recommendation. Int. J. Comput. Intell. Syst. 7(sup2): 35-43 (2014) - [j10]Nan Feng, Harry Jiannan Wang, Minqiang Li:
A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis. Inf. Sci. 256: 57-73 (2014) - [j9]Jijun Zhao, Nan Feng, Xin Liu, Wei Bai, Martin Maier:
Implementing Network Coding in Service Interoperability Ethernet Passive Optical Network (IEEE P19041 SIEPON). JOCN 6(5): 510-522 (2014) - [j8]Zan Wang, Xue Yu, Nan Feng, Zhenhua Wang:
An improved collaborative movie recommendation system using computational intelligence. J. Vis. Lang. Comput. 25(6): 667-675 (2014) - [c3]Zan Wang, Xue Yu, Nan Feng, Zhenhua Wang:
An Improved Collaborative Movie Recommendation system using Computational Intelligence. DMS 2014: 30-38 - 2012
- [j7]Nan Feng, Xue Yu:
A Data-driven Assessment Model for Information Systems Security Risk Management. J. Comput. 7(12): 3103-3109 (2012) - [j6]Nan Feng, Jing Xie:
A Hybrid Approach of Evidence Theory and Rough Sets for ISS Risk Assessment. J. Networks 7(2): 337-344 (2012) - 2011
- [j5]Tie Zhang, Nan Feng:
A posteriori error analysis of the discontinuous finite element methods for first order hyperbolic problems. Appl. Math. Comput. 218(5): 1752-1764 (2011) - [j4]Nan Feng, Minqiang Li:
An information systems security risk assessment model under uncertain environment. Appl. Soft Comput. 11(7): 4332-4340 (2011) - 2010
- [c2]Hon Fah Chong, Mehul Motani, Nan Feng:
Transmitter optimization for distributed Gaussian MIMO channels. ITA 2010: 323-328
2000 – 2009
- 2009
- [j3]Ling-Li Li, Guohua Ding, Nan Feng, Ming-Huang Wang, Yuh-Shan Ho:
Global stem cell research trend: Bibliometric analysis as a tool for mapping of trends from 1991 to 2006. Scientometrics 80(1): 39-58 (2009) - 2005
- [j2]Nan Feng, Siun-Chuon Mau, Narayan B. Mandayam:
Joint network-centric and user-centric radio resource management in a multicell system. IEEE Trans. Commun. 53(7): 1114-1118 (2005) - 2004
- [j1]Nan Feng, Siun-Chuon Mau, Narayan B. Mandayam:
Pricing and power control for joint network-centric and user-centric radio resource management. IEEE Trans. Commun. 52(9): 1547-1557 (2004) - [c1]Tingfang Ji, H. Jonathan Chao, Nan Feng:
Wireless coexistence: Pareto optimality. GLOBECOM 2004: 3803-3807
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint