Access Statistics for Jun Zhuang

Author contact details at EconPapers.

Working Paper File Downloads Abstract Views
Last month 3 months 12 months Total Last month 3 months 12 months Total
Chinese Consumers' Preferences for Livestock Products 0 0 0 16 1 4 4 148
Economic Analysis of Cellulase Production by Clostridium thermocellum in Solid State and Submerged Fermentation 0 0 0 26 2 3 5 175
Economic Analysis of Cellulase Production by Clostridium thermocellum in Solid State and Submerged Fermentation 0 0 0 247 4 7 13 1,137
INVESTMENT ANALYSIS OF REPLACING ENDOPHYTE-INFECTED WITH ENDOPHYTE-FREE TALL FESCUE PASTURES 0 0 0 4 3 4 6 97
Total Working Papers 0 0 0 293 10 18 28 1,557


Journal Article File Downloads Abstract Views
Last month 3 months 12 months Total Last month 3 months 12 months Total
A Study on a Sequential One‐Defender‐N‐Attacker Game 0 0 0 1 2 3 11 28
A Two-Stage Optimization Model for Large-Scale Group Decision-Making in Disaster Management: Minimizing Group Conflict and Maximizing Individual Satisfaction 0 0 0 6 3 7 10 38
A data-driven integer programming model for soccer clubs’ decision making on player transfers 1 3 11 33 3 5 23 89
A game-theoretic approach to modeling attacks and defenses of smart grids at three levels 0 0 1 4 2 2 5 18
A medical resource allocation model for serving emergency victims with deteriorating health conditions 0 0 0 4 3 5 7 43
A medical resource allocation model for serving emergency victims with deteriorating health conditions 0 0 0 6 37 40 43 98
A review of game theory applications in natural disaster management research 0 1 4 88 9 19 34 431
An Attacker–defender Resource Allocation Game with Substitution and Complementary Effects 0 0 0 2 3 3 6 16
An exploratory analysis for performance assessment of state police forces in india: an eclectic approach 0 1 1 14 5 11 16 75
Analysis of fire protection efficiency in the United States: a two-stage DEA-based approach 0 0 1 11 6 8 11 72
Analyzing passengers’ emotions following flight delays- a 2011–2019 case study on SKYTRAX comments 1 1 2 15 3 8 15 81
Are NFL Coaches Risk and Loss Averse? Evidence from Their Use of Kickoff Strategies 0 0 0 26 2 5 8 203
Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort 0 0 0 6 5 9 15 41
Balancing congestion and security in the presence of strategic applicants with private information 0 0 1 13 9 10 15 89
Balancing pre-disaster preparedness and post-disaster relief 0 0 0 18 2 3 4 113
Behavior Analysis of Illegal Fishing in the Gulf of Mexico 0 0 0 4 1 1 1 28
Big Data and Predictive Analytics in Fire Risk Using Weather Data 1 1 4 12 5 5 13 38
Call for Papers on Emerging Topics in Health Decision Analysis 0 0 0 4 0 0 0 21
Case study in disaster relief: A descriptive analysis of agency partnerships in the aftermath of the January 12th, 2010 Haitian earthquake 0 0 0 18 1 3 4 107
Chinese Consumers' Preferences for Livestock Products 0 0 0 19 2 2 3 145
Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker 0 0 0 3 3 4 5 16
Crime risk analysis through big data algorithm with urban metrics 0 0 1 17 3 5 11 74
Crisis information distribution on Twitter: a content analysis of tweets during Hurricane Sandy 0 0 0 25 3 4 5 139
Cross‐Milieu Terrorist Collaboration: Using Game Theory to Assess the Risk of a Novel Threat 0 0 0 1 3 4 7 19
Cyber–Physical Correlation Effects in Defense Games for Large Discrete Infrastructures 0 0 0 1 3 4 5 36
Decisions in Disaster Recovery Operations: A Game Theoretic Perspective on Organization Cooperation 0 0 0 0 1 2 3 10
Defender–Attacker Games with Asymmetric Player Utilities 0 0 1 4 2 8 14 58
Defending Against a Stockpiling Terrorist 0 0 0 1 1 3 4 18
Defense of Cyber Infrastructures Against Cyber‐Physical Attacks Using Game‐Theoretic Models 0 0 1 1 3 5 12 18
Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts 0 0 0 2 2 5 6 19
Discrete Dynamic Gaming Models in Supply Chain Management and Project Management 0 0 0 1 4 4 4 8
Discrete game-theoretic analysis of defense in correlated cyber-physical systems 0 0 1 4 1 5 11 29
Does New Rural Pension Scheme decrease elderly labor supply? Evidence from CHARLS 0 0 2 39 4 5 16 291
Driving-forces model on individual behavior in scenarios considering moving threat agents 0 0 0 0 2 2 5 13
Dynamic Forecasting Conditional Probability of Bombing Attacks Based on Time‐Series and Intervention Analysis 0 0 0 2 1 2 5 16
Fire Code Inspection and Compliance: A Game-Theoretic Model Between Fire Inspection Agencies and Building Owners 0 0 4 16 1 4 12 63
Fluid approximations and control of queues in emergency departments 0 1 1 4 4 11 12 35
Governments' and Terrorists' Defense and Attack in a T -Period Game 0 0 0 8 1 2 4 50
How companies and governments react to disasters 0 0 0 0 1 2 2 18
Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game 0 1 1 9 2 6 11 68
Incorporating risk preferences in stochastic noncooperative games 0 0 0 0 1 2 2 12
Introductions to Adversary Behavior: Validating the Models 0 0 0 1 1 1 4 7
Keep it or give back? Optimal pricing strategy of reward-based crowdfunding with a hybrid mechanism in the sharing economy 0 0 0 8 0 2 3 23
Managing consumer behavior toward on-time return of the waste electrical and electronic equipment: A game theoretic approach 0 0 1 8 0 2 3 39
Misinformation debunking and cross-platform information sharing through Twitter during Hurricanes Harvey and Irma: a case study on shelters and ID checks 0 1 1 9 3 9 13 47
Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers 0 0 0 0 1 1 3 14
Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game 0 0 0 2 5 6 7 28
Modeling Parking Behavior Under Uncertainty: A Static Game Theoretic versus a Sequential Neo-additive Capacity Modeling Approach 0 0 0 19 2 4 10 106
Modeling Precheck Parallel Screening Process in the Face of Strategic Applicants with Incomplete Information and Screening Errors 0 0 0 0 0 2 3 12
Modeling Public–Private Partnerships in Disaster Management via Centralized and Decentralized Models 0 0 0 7 3 5 7 49
Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF 0 0 0 1 1 2 4 9
Modeling a multi-target attacker-defender game with multiple attack types 0 0 0 21 7 7 7 170
Modeling and mitigating the effects of supply chain disruption in a defender–attacker game 0 0 0 3 6 6 8 46
Modeling and mitigating the effects of supply chain disruption in a defender–attacker game 0 0 0 3 2 4 6 60
Modeling costly learning and counter-learning in a defender-attacker game with private defender information 0 0 0 1 2 6 10 28
Modeling costly learning and counter-learning in a defender-attacker game with private defender information 0 0 0 0 7 9 9 31
Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game 0 0 0 6 2 5 7 33
Modeling multi-target defender-attacker games with quantal response attack strategies 1 1 2 7 3 3 6 32
Modeling secrecy and deception in a multiple-period attacker-defender signaling game 0 0 0 40 3 5 8 151
Modeling the Cost Effectiveness of Fire Protection Resource Allocation in the United States: Models and a 1980–2014 Case Study 0 0 1 8 4 6 11 31
Modelling ‘contracts’ between a terrorist group and a government in a sequential game 0 0 1 2 4 7 9 46
N-stage security screening strategies in the face of strategic applicants 0 0 0 3 1 2 3 29
On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness 0 0 0 0 4 4 4 28
Partnership behavior in disaster relief operations: a case study comparison of the responses to the tornado in Joplin, Missouri and Hurricane Sandy along the Jersey Coast 0 1 1 9 4 5 5 53
Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders Using a Decision‐Theoretic Approach 0 0 1 5 1 2 5 27
Publicity vs. impact in nonprofit disclosures and donor preferences: a sequential game with one nonprofit organization and N donors 0 0 0 5 5 6 11 55
Reasons for Secrecy and Deception in Homeland‐Security Resource Allocation 0 0 0 0 2 2 3 10
Reciprocal spreading and debunking processes of online misinformation: A new rumor spreading–debunking model with a case study 0 1 5 28 2 4 17 93
Regulation Games Between Government and Competing Companies: Oil Spills and Other Disasters 0 0 0 3 2 4 6 31
Research on Factors Influencing Municipal Household Solid Waste Separate Collection: Bayesian Belief Networks 0 0 0 2 3 3 5 92
Robust Allocation of a Defensive Budget Considering an Attacker's Private Information 0 0 0 2 3 4 5 19
Rumor response, debunking response, and decision makings of misinformed Twitter users during disasters 0 0 0 10 2 4 8 74
SECRECY AND DECEPTION AT EQUILIBRIUM, WITH APPLICATIONS TO ANTI-TERRORISM RESOURCE ALLOCATION 0 0 0 14 3 5 6 97
Scalable simulation of a Disaster Response Agent-based network Management and Adaptation System (DRAMAS) 0 0 0 3 1 1 2 12
Security screening queues with impatient applicants: A new model with a case study 0 0 0 12 3 5 7 46
Stability analysis and control strategies for worm attack in mobile networks via a VEIQS propagation model 0 0 0 1 2 2 3 21
Stochastic shortest path network interdiction with a case study of Arizona–Mexico border 0 0 1 13 4 6 11 56
Subsidizing to disrupt a terrorism supply chain—a four-player game 0 0 0 3 3 6 8 23
Supervision after Certification: An Evolutionary Game Analysis for Chinese Environmental Labeled Enterprises 0 0 0 6 1 2 2 46
Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game 0 0 0 4 3 5 10 30
The impact of disaster on the strategic interaction between company and government 0 0 0 12 3 4 6 64
The role of risk preferences in a multi-target defender-attacker resource allocation game 0 0 0 16 5 9 9 59
The strategic interaction between a company and the government surrounding disasters 0 0 0 2 1 4 6 46
The strategic interaction between a company and the government surrounding disasters 0 0 0 0 2 5 8 33
The timing and deterrence of terrorist attacks due to exogenous dynamics 0 0 0 9 1 3 6 54
Toward an integrated sustainable-resilient supply chain: A pharmaceutical case study 0 0 0 66 5 9 18 235
Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors 0 0 0 4 3 4 6 112
Understanding Conflicting Interests of a Government and a Tobacco Manufacturer: A Game-Theoretic Approach 0 0 1 3 2 4 6 30
Total Journal Articles 4 13 52 823 276 444 724 5,221


Chapter File Downloads Abstract Views
Last month 3 months 12 months Total Last month 3 months 12 months Total
Defending Against Terrorism, Natural Disaster, and All Hazards 0 0 0 1 3 3 4 43
Simulating a Multi-Stage Screening Network: A Queueing Theory and Game Theory Application 0 0 0 0 3 3 4 7
Total Chapters 0 0 0 1 6 6 8 50


Statistics updated 2026-02-12