Duoyong Sun

Orcid: 0000-0001-6471-7885

According to our database1, Duoyong Sun authored at least 29 papers between 2009 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Research on modeling method of organizational decision-making behavior based on group social network.
Proceedings of the 5th International Conference on Information Management and Management Science, 2022

2021
A reduction model on multiplex terrorist network.
Proceedings of the 14th International Symposium on Computational Intelligence and Design, 2021

A Simulation model on the propagation of terrorist ideology in social community.
Proceedings of the ACAI 2021: 4th International Conference on Algorithms, Computing and Artificial Intelligence, Sanya, China, December 22, 2021

2017
Tie strength still matters: Investigating interaction patterns of Al-Qaeda network in terror operations.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

Social Network Based Anomaly Detection of Organizational Behavior using Temporal Pattern Mining.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

2016
Identifying the socio-spatial dynamics of terrorist attacks in the Middle East.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Detecting Cooperation Behavior of Terrorist Organization Based on Adaboost Classifier.
Proceedings of the 9th International Symposium on Computational Intelligence and Design, 2016

Social network change detection using a genetic algorithm based back propagation neural network model.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

2015
The "six-element" analysis method for the research on the characteristics of terrorist activities.
Ann. Oper. Res., 2015

Research on construction methods of the Shanghai cooperation organization meta-network model.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

Research on the Evaluation Method of National Military Development Based on Net Assessment.
Proceedings of the 2015 European Intelligence and Security Informatics Conference, 2015

Game Analysis on the Counter-Terrorism Cooperation of Shanghai Cooperation Organization.
Proceedings of the 2015 European Intelligence and Security Informatics Conference, 2015

Understanding the Dynamic of Covert Organization with Multilayer Networks Model.
Proceedings of the 2015 European Intelligence and Security Informatics Conference, 2015

Detecting Changes in Terrorism Networks: A Perspective of Multi-Meta-Network Modeling.
Proceedings of the 2015 European Intelligence and Security Informatics Conference, 2015

Sentiment Analysis for Topics based on Interaction Chain Model.
Proceedings of the 2015 European Intelligence and Security Informatics Conference, 2015

Research on the Shanghai Cooperation Organization Network Architecture from the Big Data Perspective.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Agent-based simulation research on group emotion evolution of public emergency.
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014

Detecting key individuals in terrorist network based on FANP model.
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014

2013
Organization Network Construction and Understanding Based on Photo Face Recognition.
Proceedings of the 2013 European Intelligence and Security Informatics Conference, 2013

Social Network Construction and Analysis Based on Community Photo Collections with Face Recognition.
Proceedings of the Sixth International Conference on Business Intelligence and Financial Engineering, 2013

Modeling Multiple Locations Defence and Attack Dynamic Bayesian Decision Game.
Proceedings of the Sixth International Conference on Business Intelligence and Financial Engineering, 2013

2012
A robust evaluation of terrorist network based on node-lap degree of triads.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012

Evaluation method for node importance based on node condensation in terrorism networks.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012

Multi-factor Analysis of Terrorist Activities Based on Social Network.
Proceedings of the Fifth International Conference on Business Intelligence and Financial Engineering, 2012

2011
Study on covert networks of terroristic organizations based on text analysis.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Study on covert networks of terrorists based on interactive relationship hypothesis.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Multi-relational Network Analysis for Covert Organizations.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

2009
Organizational Adaptative Behavior: The Complex Perspective of Individuals-Tasks Interaction.
Proceedings of the Complex Sciences, 2009

Topological Analysis and Measurements of an Online Chinese Student Social Network.
Proceedings of the Complex Sciences, 2009


  Loading...