Access Statistics for Jun Zhuang

Author contact details at EconPapers.

Working Paper File Downloads Abstract Views
Last month 3 months 12 months Total Last month 3 months 12 months Total
Chinese Consumers' Preferences for Livestock Products 0 0 0 16 0 3 4 148
Economic Analysis of Cellulase Production by Clostridium thermocellum in Solid State and Submerged Fermentation 0 0 0 26 1 4 5 176
Economic Analysis of Cellulase Production by Clostridium thermocellum in Solid State and Submerged Fermentation 0 0 0 247 2 7 14 1,139
INVESTMENT ANALYSIS OF REPLACING ENDOPHYTE-INFECTED WITH ENDOPHYTE-FREE TALL FESCUE PASTURES 0 0 0 4 2 6 6 99
Total Working Papers 0 0 0 293 5 20 29 1,562


Journal Article File Downloads Abstract Views
Last month 3 months 12 months Total Last month 3 months 12 months Total
A Study on a Sequential One‐Defender‐N‐Attacker Game 0 0 0 1 0 3 8 28
A Two-Stage Optimization Model for Large-Scale Group Decision-Making in Disaster Management: Minimizing Group Conflict and Maximizing Individual Satisfaction 0 0 0 6 1 7 11 39
A data-driven integer programming model for soccer clubs’ decision making on player transfers 0 3 10 33 1 6 21 90
A game-theoretic approach to modeling attacks and defenses of smart grids at three levels 0 0 1 4 2 4 7 20
A medical resource allocation model for serving emergency victims with deteriorating health conditions 0 0 0 6 1 39 44 99
A medical resource allocation model for serving emergency victims with deteriorating health conditions 0 0 0 4 0 5 6 43
A review of game theory applications in natural disaster management research 0 0 4 88 6 20 39 437
An Attacker–defender Resource Allocation Game with Substitution and Complementary Effects 0 0 0 2 0 3 6 16
An exploratory analysis for performance assessment of state police forces in india: an eclectic approach 1 1 2 15 1 7 15 76
Analysis of fire protection efficiency in the United States: a two-stage DEA-based approach 0 0 1 11 0 6 10 72
Analyzing passengers’ emotions following flight delays- a 2011–2019 case study on SKYTRAX comments 0 1 2 15 1 7 16 82
Are NFL Coaches Risk and Loss Averse? Evidence from Their Use of Kickoff Strategies 0 0 0 26 1 3 8 204
Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort 0 0 0 6 0 7 14 41
Balancing congestion and security in the presence of strategic applicants with private information 0 0 1 13 0 10 15 89
Balancing pre-disaster preparedness and post-disaster relief 0 0 0 18 1 4 5 114
Behavior Analysis of Illegal Fishing in the Gulf of Mexico 0 0 0 4 1 2 2 29
Big Data and Predictive Analytics in Fire Risk Using Weather Data 0 1 4 12 1 6 13 39
Call for Papers on Emerging Topics in Health Decision Analysis 0 0 0 4 0 0 0 21
Case study in disaster relief: A descriptive analysis of agency partnerships in the aftermath of the January 12th, 2010 Haitian earthquake 0 0 0 18 0 1 4 107
Chinese Consumers' Preferences for Livestock Products 0 0 0 19 3 5 6 148
Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker 0 0 0 3 1 4 6 17
Crime risk analysis through big data algorithm with urban metrics 1 1 1 18 2 5 12 76
Crisis information distribution on Twitter: a content analysis of tweets during Hurricane Sandy 0 0 0 25 1 5 6 140
Cross‐Milieu Terrorist Collaboration: Using Game Theory to Assess the Risk of a Novel Threat 0 0 0 1 0 4 6 19
Cyber–Physical Correlation Effects in Defense Games for Large Discrete Infrastructures 0 0 0 1 0 4 5 36
Decisions in Disaster Recovery Operations: A Game Theoretic Perspective on Organization Cooperation 0 0 0 0 0 2 3 10
Defender–Attacker Games with Asymmetric Player Utilities 0 0 1 4 2 6 16 60
Defending Against a Stockpiling Terrorist 0 0 0 1 0 3 4 18
Defense of Cyber Infrastructures Against Cyber‐Physical Attacks Using Game‐Theoretic Models 0 0 0 1 0 5 10 18
Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts 0 0 0 2 1 5 7 20
Discrete Dynamic Gaming Models in Supply Chain Management and Project Management 0 0 0 1 3 7 7 11
Discrete game-theoretic analysis of defense in correlated cyber-physical systems 0 0 1 4 0 5 10 29
Does New Rural Pension Scheme decrease elderly labor supply? Evidence from CHARLS 0 0 2 39 0 5 16 291
Driving-forces model on individual behavior in scenarios considering moving threat agents 0 0 0 0 1 3 5 14
Dynamic Forecasting Conditional Probability of Bombing Attacks Based on Time‐Series and Intervention Analysis 0 0 0 2 0 2 5 16
Fire Code Inspection and Compliance: A Game-Theoretic Model Between Fire Inspection Agencies and Building Owners 1 1 4 17 5 6 16 68
Fluid approximations and control of queues in emergency departments 0 0 1 4 1 8 13 36
Governments' and Terrorists' Defense and Attack in a T -Period Game 0 0 0 8 0 2 4 50
How companies and governments react to disasters 0 0 0 0 0 1 2 18
Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game 0 0 1 9 0 3 11 68
Incorporating risk preferences in stochastic noncooperative games 0 0 0 0 1 3 3 13
Introductions to Adversary Behavior: Validating the Models 0 0 0 1 3 4 7 10
Keep it or give back? Optimal pricing strategy of reward-based crowdfunding with a hybrid mechanism in the sharing economy 0 0 0 8 0 1 2 23
Managing consumer behavior toward on-time return of the waste electrical and electronic equipment: A game theoretic approach 0 0 1 8 1 2 4 40
Misinformation debunking and cross-platform information sharing through Twitter during Hurricanes Harvey and Irma: a case study on shelters and ID checks 0 1 1 9 2 9 15 49
Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers 0 0 0 0 0 1 2 14
Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game 0 0 0 2 1 7 8 29
Modeling Parking Behavior Under Uncertainty: A Static Game Theoretic versus a Sequential Neo-additive Capacity Modeling Approach 0 0 0 19 2 5 12 108
Modeling Precheck Parallel Screening Process in the Face of Strategic Applicants with Incomplete Information and Screening Errors 0 0 0 0 1 2 4 13
Modeling Public–Private Partnerships in Disaster Management via Centralized and Decentralized Models 0 0 0 7 0 5 6 49
Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF 0 0 0 1 2 3 6 11
Modeling a multi-target attacker-defender game with multiple attack types 0 0 0 21 1 8 8 171
Modeling and mitigating the effects of supply chain disruption in a defender–attacker game 0 0 0 3 2 4 8 62
Modeling and mitigating the effects of supply chain disruption in a defender–attacker game 0 0 0 3 1 7 9 47
Modeling costly learning and counter-learning in a defender-attacker game with private defender information 0 0 0 1 1 6 11 29
Modeling costly learning and counter-learning in a defender-attacker game with private defender information 0 0 0 0 1 9 10 32
Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game 0 0 0 6 1 5 8 34
Modeling multi-target defender-attacker games with quantal response attack strategies 0 1 2 7 0 3 6 32
Modeling secrecy and deception in a multiple-period attacker-defender signaling game 0 0 0 40 2 6 10 153
Modeling the Cost Effectiveness of Fire Protection Resource Allocation in the United States: Models and a 1980–2014 Case Study 0 0 1 8 1 7 11 32
Modelling ‘contracts’ between a terrorist group and a government in a sequential game 0 0 0 2 0 6 8 46
N-stage security screening strategies in the face of strategic applicants 0 0 0 3 2 4 5 31
On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness 0 0 0 0 1 5 5 29
Partnership behavior in disaster relief operations: a case study comparison of the responses to the tornado in Joplin, Missouri and Hurricane Sandy along the Jersey Coast 0 0 1 9 2 6 7 55
Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders Using a Decision‐Theoretic Approach 1 1 2 6 1 3 6 28
Publicity vs. impact in nonprofit disclosures and donor preferences: a sequential game with one nonprofit organization and N donors 0 0 0 5 1 7 12 56
Reasons for Secrecy and Deception in Homeland‐Security Resource Allocation 0 0 0 0 0 2 3 10
Reciprocal spreading and debunking processes of online misinformation: A new rumor spreading–debunking model with a case study 0 0 5 28 0 3 17 93
Regulation Games Between Government and Competing Companies: Oil Spills and Other Disasters 0 0 0 3 1 5 6 32
Research on Factors Influencing Municipal Household Solid Waste Separate Collection: Bayesian Belief Networks 0 0 0 2 2 5 7 94
Robust Allocation of a Defensive Budget Considering an Attacker's Private Information 0 0 0 2 1 5 6 20
Rumor response, debunking response, and decision makings of misinformed Twitter users during disasters 0 0 0 10 2 6 9 76
SECRECY AND DECEPTION AT EQUILIBRIUM, WITH APPLICATIONS TO ANTI-TERRORISM RESOURCE ALLOCATION 0 0 0 14 1 5 6 98
Scalable simulation of a Disaster Response Agent-based network Management and Adaptation System (DRAMAS) 0 0 0 3 1 2 2 13
Security screening queues with impatient applicants: A new model with a case study 0 0 0 12 0 5 5 46
Stability analysis and control strategies for worm attack in mobile networks via a VEIQS propagation model 0 0 0 1 0 2 3 21
Stochastic shortest path network interdiction with a case study of Arizona–Mexico border 0 0 0 13 4 9 12 60
Subsidizing to disrupt a terrorism supply chain—a four-player game 0 0 0 3 3 8 11 26
Supervision after Certification: An Evolutionary Game Analysis for Chinese Environmental Labeled Enterprises 0 0 0 6 0 1 2 46
Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game 0 0 0 4 1 6 11 31
The impact of disaster on the strategic interaction between company and government 1 1 1 13 1 4 7 65
The role of risk preferences in a multi-target defender-attacker resource allocation game 0 0 0 16 1 9 10 60
The strategic interaction between a company and the government surrounding disasters 0 0 0 0 0 3 8 33
The strategic interaction between a company and the government surrounding disasters 0 0 0 2 2 4 7 48
The timing and deterrence of terrorist attacks due to exogenous dynamics 0 0 0 9 2 4 6 56
Toward an integrated sustainable-resilient supply chain: A pharmaceutical case study 0 0 0 66 1 9 17 236
Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors 0 0 0 4 0 4 5 112
Understanding Conflicting Interests of a Government and a Tobacco Manufacturer: A Game-Theoretic Approach 0 0 1 3 0 3 6 30
Total Journal Articles 5 12 51 828 90 462 773 5,311


Chapter File Downloads Abstract Views
Last month 3 months 12 months Total Last month 3 months 12 months Total
Defending Against Terrorism, Natural Disaster, and All Hazards 0 0 0 1 1 4 5 44
Simulating a Multi-Stage Screening Network: A Queueing Theory and Game Theory Application 0 0 0 0 2 5 5 9
Total Chapters 0 0 0 1 3 9 10 53


Statistics updated 2026-03-04