Nan Feng

Orcid: 0000-0001-5646-0397

According to our database1, Nan Feng authored at least 65 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Bi-Discriminator Domain Adversarial Neural Networks With Class-Level Gradient Alignment.
IEEE Trans. Syst. Man Cybern. Syst., September, 2024

An Exploration of the Dynamics Between Social Media and Box Office Performance.
Inf. Syst. Frontiers, April, 2024

Big-data analytics capability, value creation process, and collaboration innovation quality in manufacturing enterprises: A knowledge-based view.
Comput. Ind. Eng., January, 2024

A Condition Monitoring Method via Optimization-Based Adaptive Feature Extraction Strategy.
IEEE Trans. Instrum. Meas., 2024

Lesion Classification of Coronary Artery CTA Images Based on CBAM and Transfer Learning.
IEEE Trans. Instrum. Meas., 2024

Sponsored Data: Cooperative Pricing and Subsidizing Strategies of Mobile Telecom Carriers and Internet Content Providers.
IEEE Trans. Engineering Management, 2024

NISAC-EKF: An integrated localization deployment algorithm for UAV swarms based on NARX and EKF.
Phys. Commun., 2024

Optimal Launch Timing of Bug Bounty Programs for Software Products under Different Licensing Models.
J. Assoc. Inf. Syst., 2024

Optimal employment model for an entrant platform in on-demand service market.
Ind. Manag. Data Syst., 2024

Dr.E Bridges Graphs with Large Language Models through Words.
CoRR, 2024

2023
SVAE-GRU-based degradation generation and prediction for small samples.
Qual. Reliab. Eng. Int., November, 2023

How Industrial Internet Platforms guide high-quality information sharing for semiconductor manufacturing? An evolutionary game model.
Comput. Ind. Eng., September, 2023

Maximum Correntropy-Based Extended Particle Filter for Nonlinear System.
IEEE Trans. Circuits Syst. II Express Briefs, July, 2023

When Should Competing Mobile Telecom Carriers Provide Sponsored Data Plans Under Cross-Side Network Effects?
Int. J. Electron. Commer., July, 2023

Deep Reinforcement Learning-Based Video Offloading and Resource Allocation in NOMA-Enabled Networks.
Future Internet, May, 2023

The Status Quo and Development Countermeasures of Venture Capital in the New Energy Economy Based on Big Data Analysis.
J. Database Manag., 2023

Avoiding the Diffusion of Responsibility in Social Networking Groups: A Field Experiment on Responses to Online Help-Request Referrals.
J. Assoc. Inf. Syst., 2023

The Use of Bug Bounty Programs for Software Reliability Improvement.
Proceedings of the 27th Pacific Asia Conference on Information Systems, 2023

Impacts of Instant Booking on Listings: Theory and Evidence from Airbnb.
Proceedings of the 27th Pacific Asia Conference on Information Systems, 2023

Probabilistic Risk Assessment of Over-voltage Based on Voltage Sensitivity Analysis in Distribution Networks.
Proceedings of the IEEE Sustainable Power and Energy Conference, 2023

Incipient Gradual Fault Detection via Transformed Component and Dissimilarity Analysis.
Proceedings of the 6th IEEE International Conference on Industrial Cyber-Physical Systems, 2023

An Economic Analysis of Third-Party Software Reliability Improvement using the Bug Bounty Program.
Proceedings of the 44th International Conference on Information Systems, 2023

Hybrid Vision-Force Control for Human Robot Co-Carrying on Ball and Board Systems.
Proceedings of the IEEE International Conference on Development and Learning, 2023

2022
Penetration or Skimming? Pricing Strategies for Software Platforms Considering Asymmetric Cross-Side Network Effects.
J. Assoc. Inf. Syst., 2022

Designing subscription menu for software products: Whether to release a long-length option.
Inf. Manag., 2022

2021
Outsourcing Strategies for Information Security: Correlated Losses and Security Externalities.
Inf. Syst. Frontiers, 2021

Should subscription-revenue internet content providers adopt sponsored data plans by mobile telecom carriers in duopoly market?
Electron. Commer. Res. Appl., 2021

Contracting managed security service: Double moral hazard and risk interdependency.
Electron. Commer. Res. Appl., 2021

Promotional pricing strategies for platform vendors: Competition between first- and third-party products.
Decis. Support Syst., 2021

On the Application of Data-Driven Deep Neural Networks in Linear and Nonlinear Structural Dynamics.
CoRR, 2021

2020
First- or Second-Mover Advantage? The Case of IT-Enabled Platform Markets.
MIS Q., 2020

Optimal Release Strategy for the Competing Software Vendors Based on Word-of-Mouth Effect.
Int. J. Electron. Commer., 2020

To outsource or not: The impact of information leakage risk on information security strategy.
Inf. Manag., 2020

Optimal product selection and pricing strategies for platform vendors under two-sided network effects.
Electron. Commer. Res. Appl., 2020

Online media coverage, consumer engagement and movie sales: A PVAR approach.
Decis. Support Syst., 2020

Computational frameworks for homogenization and multiscale stability analyses of nonlinear periodic metamaterials.
CoRR, 2020

2019
Optimal sequential releasing strategy for software products in the presence of word-of-mouth and requirements uncertainty.
Inf. Technol. Manag., 2019

Effect of security investment strategy on the business value of managed security service providers.
Electron. Commer. Res. Appl., 2019

Examining Responses to Help-Requests in SNS Groups: The Perspective of Perceived Responsibility.
Proceedings of the 23rd Pacific Asia Conference on Information Systems, 2019

Avoiding the Diffusion of Responsibility in SNS Group: An Investigation on Responses to Help-Requests during Online Marketing Campaigns.
Proceedings of the 40th International Conference on Information Systems, 2019

Cost aware Inference for IoT Devices.
Proceedings of the 22nd International Conference on Artificial Intelligence and Statistics, 2019

2018
Effects of review spam in a firm-initiated virtual brand community: Evidence from smartphone customers.
Inf. Manag., 2018

Interference Performance Analysis of Frequency Reuse Techniques for LTE-R Systems.
Proceedings of the 21st International Conference on Intelligent Transportation Systems, 2018

Outsourcing Information Security: The Role of Information Leakage in Outsourcing Decisions.
Proceedings of the 2018 International Conference on Information Resources Management, 2018

2017
Intertemporal mixed bundling strategy of information products with network externality.
Comput. Ind. Eng., 2017

Optimal Design on Customized Bundling Strategy of Information Goods for Customers with Two-Dimensional Heterogeneity.
Asia Pac. J. Oper. Res., 2017

Performance analysis and evaluation of EDGE system for high-speed railway.
Proceedings of the 20th IEEE International Conference on Intelligent Transportation Systems, 2017

2016
Learning Subspace-Based RBFNN Using Coevolutionary Algorithm for Complex Classification Tasks.
IEEE Trans. Neural Networks Learn. Syst., 2016

Supporting Business Privacy Protection in Wireless Sensor Networks.
J. Sensors, 2016

An identification method of D-S evidence conflict based on the measurement factors.
Int. J. Adv. Media Commun., 2016

Managing security risks for inter-organisational information systems: a multiagent collaborative model.
Enterp. Inf. Syst., 2016

2015
Managing risk for business processes: A fuzzy based multi-agent system.
J. Intell. Fuzzy Syst., 2015

2014
An improved collaborative movie recommendation system using computational intelligence.
J. Vis. Lang. Comput., 2014

Implementing Network Coding in Service Interoperability Ethernet Passive Optical Network (IEEE P19041 SIEPON).
JOCN, 2014

A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis.
Inf. Sci., 2014

Adaptive generalized ensemble construction with feature selection and its application in recommendation.
Int. J. Comput. Intell. Syst., 2014

2012
A Hybrid Approach of Evidence Theory and Rough Sets for ISS Risk Assessment.
J. Networks, 2012

A Data-driven Assessment Model for Information Systems Security Risk Management.
J. Comput., 2012

2011
An information systems security risk assessment model under uncertain environment.
Appl. Soft Comput., 2011

A posteriori error analysis of the discontinuous finite element methods for first order hyperbolic problems.
Appl. Math. Comput., 2011

2010
Transmitter optimization for distributed Gaussian MIMO channels.
Proceedings of the Information Theory and Applications Workshop, 2010

2009
Global stem cell research trend: Bibliometric analysis as a tool for mapping of trends from 1991 to 2006.
Scientometrics, 2009

2005
Joint network-centric and user-centric radio resource management in a multicell system.
IEEE Trans. Commun., 2005

2004
Pricing and power control for joint network-centric and user-centric radio resource management.
IEEE Trans. Commun., 2004

Wireless coexistence: Pareto optimality.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004


  Loading...