default search action
Qiu-Hong Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Qiu-Hong Wang, Ruibin Geng, Seung Hyun Kim:
Chilling Effect of the Enforcement of Computer Misuse Act: Evidence from Publicly Accessible Hack Forums. Inf. Syst. Res. 35(3): 1195-1215 (2024) - [j19]Haolin Chen, Xiaohua Zhao, Zhenlong Li, Qiang Fu, Qiuhong Wang, Libo Zhao:
Construction and Analysis of Driver Takeover Behavior Modes Based on Situation Awareness Theory. IEEE Trans. Intell. Veh. 9(2): 4040-4054 (2024) - [c29]Qiuhong Wang, Jingjing Gu:
Dynamic Environment-driven Autonomous Drone Path Planning via Deep Reinforcement Learning. IJCNN 2024: 1-8 - 2023
- [j18]Zeng Gao, Yi Zhuang, Chen Chen, Qiuhong Wang:
Hybrid modified marine predators algorithm with teaching-learning-based optimization for global optimization and abrupt motion tracking. Multim. Tools Appl. 82(13): 19793-19828 (2023) - 2022
- [j17]Qiuhong Wang, Jingjing Gu, Haitao Huang, Yanchao Zhao, Mohsen Guizani:
A Resource-Efficient Online Target Detection System With Autonomous Drone-Assisted IoT. IEEE Internet Things J. 9(15): 13755-13766 (2022) - [c28]Yang Liu, Qiuhong Wang, Xiaochen Liu:
Research on Evaluation Method of Driving Ability Based on Digital Training Process. ICITE 2022: 290-295 - 2021
- [c27]Qiang Zhou, Jingjing Gu, Xinjiang Lu, Fuzhen Zhuang, Yanchao Zhao, Qiuhong Wang, Xiao Zhang:
Modeling Heterogeneous Relations across Multiple Modes for Potential Crowd Flow Prediction. AAAI 2021: 4723-4731 - [c26]Wentao Fang, Jingjing Gu, Zujia Yan, Qiuhong Wang:
SDC Error Detection by Exploring the Importance of Instruction Features. WASA (1) 2021: 351-363 - [i1]Qiang Zhou, Jingjing Gu, Xinjiang Lu, Fuzhen Zhuang, Yanchao Zhao, Qiuhong Wang, Xiao Zhang:
Modeling Heterogeneous Relations across Multiple Modes for Potential Crowd Flow Prediction. CoRR abs/2101.06954 (2021) - 2020
- [j16]Yi Li, Xu Wei, Qiuhong Wang, Wei Li, Tao Yang:
Inverse screening of Simvastatin kinase targets from glioblastoma druggable kinome. Comput. Biol. Chem. 86: 107243 (2020) - [j15]David C. W. Phang, Kanliang Wang, Qiuhong Wang, Robert J. Kauffman, Maurizio Naldi:
A 2020 perspective on "How to derive causal insights for digital commerce in China? A research commentary on computational social science methods". Electron. Commer. Res. Appl. 41: 100975 (2020) - [j14]Qiu-Hong Wang, Steven M. Miller, Robert H. Deng:
Driving Cybersecurity Policy Insights From Information on the Internet. IEEE Secur. Priv. 18(6): 42-50 (2020) - [j13]Aixia Duan, Yong Zhihuang, Yanling Duan, Qiuhong Wang:
Heat exchanger simulation and recovery device design of waste heat boiler of gas turbine generator set on ocean platform. J. Intell. Fuzzy Syst. 38(2): 1257-1263 (2020) - [c25]Jingyan Ma, Jingjing Gu, Qiang Zhou, Qiuhong Wang, Ming Sun:
Dynamic-Static-based Spatiotemporal Multi-Graph Neural Networks for Passenger Flow Prediction. ICPADS 2020: 673-678
2010 – 2019
- 2019
- [j12]Chee Wei David Phang, Kanliang Wang, Qiuhong Wang, Robert J. Kauffman, Maurizio Naldi:
How to derive causal insights for digital commerce in China? A research commentary on computational social science methods. Electron. Commer. Res. Appl. 35 (2019) - [j11]Wei T. Yue, Qiu-Hong Wang, Kai Lung Hui:
See No Evil, Hear No Evil? Dissecting the Impact of Online Hacker Forums. MIS Q. 43(1) (2019) - [c24]Kai Luo, Qiu-Hong Wang, Hock-Hai Teo:
The Dynamic Impacts of Online Healthcare Community on Physician Altruism: A Hidden Markov Model. ICIS 2019 - [c23]Fang Zhou, Qiu-Hong Wang, Hock-Hai Teo:
Examining the Theoretical Mechanisms Underlying Health Information Exchange Impact on Healthcare Outcomes: A Physician Agency Perspective. ICIS 2019 - [c22]Haitao Huang, Jingjing Gu, Qiuhong Wang, Yi Zhuang:
An Autonomous UAV Navigation System for Unknown Flight Environment. MSN 2019: 63-68 - 2018
- [j10]Jingjing Gu, Tao Su, Qiuhong Wang, Xiaojiang Du, Mohsen Guizani:
Multiple Moving Targets Surveillance Based on a Cooperative Network for Multi-UAV. IEEE Commun. Mag. 56(4): 82-89 (2018) - [j9]Aixia Duan, Yongzhi Huang, Yanling Duan, Qiuhong Wang:
Thermal Sensor Boiler Monitoring based on Wireless Sensing. Int. J. Online Eng. 14(8): 107-120 (2018) - [c21]Kai Luo, Qiu-Hong Wang, Hock-Hai Teo, Xi Chen:
Better Inpatient Health Quality at Lower Cost: Should I Participate in the Online Healthcare Community First? ICIS 2018 - [c20]Qiuhong Wang, Jingjing Gu, Haitao Huang, Yanchao Zhao:
Online Drone-Based Moving Target Detection System in Dense-Obstructer Environment. ICPADS 2018: 860-867 - 2017
- [j8]Qiu-Hong Wang, Kai Lung Hui:
Technology Mergers and Acquisitions in the Presence of an Installed Base: A Strategic Analysis. Inf. Syst. Res. 28(1): 46-63 (2017) - [j7]Kai Lung Hui, Seung-Hyun Kim, Qiu-Hong Wang:
Cybercrime Deterrence and International Legislation: Evidence from Distributed Denial of Service Attacks. MIS Q. 41(2): 497-523 (2017) - [c19]Qiu-Hong Wang, Le-Ting Zhang, Meng-Ke Qiao:
Online Hacker Forum Censorship: Would Banning the Bad Guys Attract Good Guys? HICSS 2017: 1-10 - 2016
- [c18]Qiuhong Wang, Xueyang Fu, Xiao-Ping (Steven) Zhang, Xinghao Ding:
A fusion-based method for single backlit image enhancement. ICIP 2016: 4077-4081 - [c17]Yue Yu, Meiqiu Yan, Qiu-Hong Wang:
From Offline to Online: How Health Insurance Policies Drive the demand for Online Healthcare Service? PACIS 2016: 387 - 2015
- [c16]Yuanrong Hu, Si Fan, Qiuhong Wang:
Digital Rights Strategies in a Virtual World Marketplace. HCI (23) 2015: 300-311 - [c15]Chunbao Wang, Lin Wang, Jian Qin, Zhengzhi Wu, Lihong Duan, Zhongqiu Li, Meiqun Cao, Weiguang Li, Zhijiang Lu, Mengjie Li, Yulong Wang, Jianjun Long, Meiling Huang, Yinghong Li, Qiuhong Wang:
Development of an ankle rehabilitation robot for ankle training. ICIA 2015: 94-99 - [c14]Chunbao Wang, Lin Wang, Jian Qin, Zhengzhi Wu, Lihong Duan, Zhongqiu Li, Mequn Cao, Xicui Ou, Xia Su, Weiguang Li, Zhijiang Lu, Mengjie Li, Yulong Wang, Jianjun Long, Meiling Huang, Yinghong Li, Qiuhong Wang:
Path planning of automated guided vehicles based on improved A-Star algorithm. ICIA 2015: 2071-2076 - [c13]Chunbao Wang, Lin Wang, Jian Qin, Zhengzhi Wu, Lihong Duan, Meiqun Cao, Zhongqiu Li, Weiguang Li, Zhijiang Lu, Yunzhi Ling, Mengjie Li, Yulong Wang, Jianjun Long, Meiling Huang, Yinghong Li, Qiuhong Wang:
Development of a vision navigation system with Fuzzy Control Algorithm for Automated Guided Vehicle. ICIA 2015: 2077-2082 - 2013
- [j6]Qiu-Hong Wang, Viktor Mayer-Schönberger, Xue Yang:
The determinants of monetary value of virtual goods: An empirical study for a cross-section of MMORPGs. Inf. Syst. Frontiers 15(3): 481-495 (2013) - 2012
- [j5]Seung-Hyun Kim, Qiu-Hong Wang, Johannes Ullrich:
A comparative study of cyberattacks. Commun. ACM 55(3): 66-73 (2012) - [j4]Qiu-Hong Wang, Kai Lung Hui:
Delayed product introduction. Decis. Support Syst. 53(4): 870-880 (2012) - [c12]Xue Yang, Yan Li, Qiu-Hong Wang, Quansheng Wang:
The antecedents and effects of consumers' active coping in B2C mobile shopping in China. ICEC 2012: 326-327 - [c11]Kok Wei Ooi, Seung-Hyun Kim, Qiu-Hong Wang, Kai Lung Hui:
Do Hackers Seek Variety? An Empirical Analysis of Website Defacements. ICIS 2012 - 2011
- [c10]Qiu-Hong Wang, Wei T. Yue, Kai Lung Hui:
Do Hacker Forums Contribute to Security Attacks? WEB 2011: 143-152 - 2010
- [j3]Ling Zhao, Yaobin Lu, Wayne Huang, Qiuhong Wang:
Internet inequality: The relationship between high school students' Internet use in different locations and their Internet self-efficacy. Comput. Educ. 55(4): 1405-1423 (2010) - [c9]Wei Zhang, Ranran Du, Minhui Pang, Qiuhong Wang:
Automatic Speech Corpus Construction from Broadcasting Speech Databases. CIS 2010: 639-643 - [c8]Qiu-Hong Wang, Viktor Mayer-Schönberger:
The Monetary Value of Virtual Goods: An Exploratory Study in MMORPGs. HICSS 2010: 1-11 - [c7]Wei Zhang, Qiuhong Wang, Ye Deng, Ranran Du:
Marine literature categorization based on minimizing the labelled data. NLPKE 2010: 1-6 - [c6]Qiu-Hong Wang, Kai Lung Hui:
Delayed Product Introduction. PACIS 2010: 29
2000 – 2009
- 2009
- [j2]Ivan P. L. Png, Qiu-Hong Wang:
Information Security: Facilitating User Precautions Vis-à-Vis Enforcement Against Attackers. J. Manag. Inf. Syst. 26(2) (2009) - [c5]Ivan P. L. Png, Qiu-Hong Wang:
Information Security: User Precautions, Attacker Efforts, and Enforcement. HICSS 2009: 1-11 - [c4]Qiu-Hong Wang, Seung-Hyun Kim:
Cyberattacks: Does Physical Boundry Matter? ICIS 2009: 48 - 2008
- [j1]Ivan P. L. Png, Chen-Yu Wang, Qiu-Hong Wang:
The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence. J. Manag. Inf. Syst. 25(2): 125-144 (2008) - [c3]Ivan P. L. Png, Chen-Yu Wang, Qiu-Hong Wang:
The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence. HICSS 2008: 388 - 2006
- [c2]Ivan P. L. Png, Candy Q. Tang, Qiu-Hong Wang:
Hackers, Users, Information Security. WEIS 2006 - 2005
- [c1]Qiu-Hong Wang, Kai Lung Hui:
To Launch or Not to Launch: An Economic Analysis of Delayed Product Introduction. HICSS 2005
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint