default search action
Lili Rong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j13]Lili Rong:
The Evaluation on Development Quality of Open Education Based on Dempster-Shafer With Multigranularity Unbalanced Hesitant Fuzzy Linguistic Information for Chinese Case. IEEE Access 10: 76185-76201 (2022) - [j12]Fei Teng, Lei Wang, Lili Rong, Peide Liu:
Probabilistic Linguistic Z Number Decision-Making Method for Multiple Attribute Group Decision-Making Problems with Heterogeneous Relationships and Incomplete Probability Information. Int. J. Fuzzy Syst. 24(1): 552-573 (2022) - [j11]Lili Rong, Lei Wang, Peide Liu:
Supermarket fresh food suppliers evaluation and selection with multigranularity unbalanced hesitant fuzzy linguistic information based on prospect theory and evidential theory. Int. J. Intell. Syst. 37(3): 1931-1971 (2022) - [j10]Mengmeng Liu, Lili Rong:
An online multi-dimensional opinion dynamic model with misinformation diffusion in emergency events. J. Inf. Sci. 48(5): 640-659 (2022) - 2021
- [j9]Lei Wang, Lili Rong, Fei Teng, Peide Liu:
Teaching Performance Evaluation Based on the Proportional Hesitant Fuzzy Linguistic Prioritized Choquet Aggregation Operator. Int. J. Comput. Intell. Syst. 14(1): 635-650 (2021) - [j8]Lili Rong, Lei Wang, Peide Liu, Baoying Zhu:
Evaluation of MOOCs based on multigranular unbalanced hesitant fuzzy linguistic MABAC method. Int. J. Intell. Syst. 36(10): 5670-5713 (2021) - [j7]Peide Liu, Mengjiao Shen, Fei Teng, Baoying Zhu, Lili Rong:
A Multiple Attribute Decision-Making Method Based On Free Double Hierarchy Hesitant Fuzzy Linguistic Information Considering the Prioritized and Interactive Attributes. Int. J. Inf. Technol. Decis. Mak. 20(1): 225-259 (2021) - [j6]Peide Liu, Mengjiao Shen, Fei Teng, Baoying Zhu, Lili Rong, Yushui Geng:
Double hierarchy hesitant fuzzy linguistic entropy-based TODIM approach using evidential theory. Inf. Sci. 547: 223-243 (2021) - [j5]Peide Liu, Dongyang Wang, Hui Zhang, Liang Yan, Ying Li, Lili Rong:
Multi-attribute decision-making method based on normal T-spherical fuzzy aggregation operator. J. Intell. Fuzzy Syst. 40(5): 9543-9565 (2021) - 2020
- [j4]Peide Liu, Lili Rong:
Multiple Attribute Group Decision-Making Approach Based on Multi-granular Unbalanced Hesitant Fuzzy Linguistic Information. Int. J. Fuzzy Syst. 22(2): 604-618 (2020)
2010 – 2019
- 2019
- [j3]Zi-Jian Ni, Lili Rong, Ning Wang, Shuo Cao:
Knowledge model for emergency response based on contingency planning system of China. Int. J. Inf. Manag. 46: 10-22 (2019) - [c17]Tao Li, Lili Rong:
Resilience of air Transport Network with the Complementary Effects of High-Speed Rail Network. QRS Companion 2019: 348-353 - 2018
- [c16]Lili Rong, Kesheng Yan, Jingwen Zhang:
Optimum Post-Disruption Restoration Plan of Interdependent Critical Infrastructures. QRS Companion 2018: 324-331 - 2017
- [c15]Lili Rong, Zijun Qie:
Modeling of Hazard Affected Regions in Support of Scenario Evolution Analysis for Unconventional Emergency. QRS Companion 2017: 456-463 - 2016
- [c14]Xian Yang, Jiangning Wu, Yanzhong Dang, Lili Rong:
A Product Recommendation Approach Based on the Latent Social Trust Network Model for Collaborative Filtering. QRS Companion 2016: 178-185 - 2014
- [j2]Tingting Gao, Lili Rong:
Study on Management of the Life Cycle of Emergency Plan System Based on Effectiveness. Int. J. Knowl. Syst. Sci. 5(1): 49-64 (2014) - 2013
- [c13]Jing Wang, Lili Rong:
Evolving Model of Emergency Planning System in China. KSEM 2013: 280-288 - 2011
- [c12]Lili Rong, Tian Qi, Mingzheng Wang, Rong Zhang:
Modes-Based-Analysis of Knowledge Transfer in the Organizations. KSEM 2011: 395-403 - 2010
- [c11]Yanzhong Dang, Zhaoguo Xuan, Lili Rong, Ming Liu:
A Novel Initialization Method for Semi-supervised Clustering. KSEM 2010: 317-328
2000 – 2009
- 2009
- [j1]Lili Rong, Tianzhu Guo, Jiyong Zhang:
A new centrality measure based on sub-tree. Frontiers Comput. Sci. China 3(3): 356-360 (2009) - 2008
- [c10]Qingquan Wang, Lili Rong, Kai Yu:
Visual Knowledge Reasoning on Typed Categorical Structure. FSKD (4) 2008: 684-688 - [c9]YongjunYang, Lili Rong:
Establishment of the Evaluation Index System of Emergency Plans Based on Hybrid of SOM Network and K-means Algorithm. ICNC (7) 2008: 347-351 - [c8]Qingquan Wang, Lili Rong, Kai Yu:
Towards a Categorical Matching Method to Process High-Dimensional Emergency Knowledge Structures. ISNN (2) 2008: 740-747 - [c7]Qingquan Wang, Lili Rong, Kai Yu:
Toward a Categorical Link Grammar for Knowledge Piece Generation in Emergency Decision-Making Support. NCM (2) 2008: 732-735 - [c6]Lili Rong, Xiaona Jia:
A systematic study on emergency policy documents for quick response. SMC 2008: 856-861 - 2007
- [c5]Qingquan Wang, Lili Rong:
Agile Knowledge Supply Chain for Emergency Decision-Making Support. International Conference on Computational Science (4) 2007: 178-185 - [c4]Qingquan Wang, Lili Rong:
Typed Category Theory-Based Micro-view Emergency Knowledge Representation. KSEM 2007: 568-574 - 2005
- [c3]Qingquan Wang, Lili Rong:
A Fast Fingerprint Matching Approach in Medicare Identity Verification Based on GAs. ICNC (3) 2005: 151-160
1990 – 1999
- 1993
- [c2]Fumihito Arai, Lili Rong, Toshio Fukuda:
Trajectory Control of Flexible Plate Using Neural Network. ICRA (1) 1993: 155-160 - [c1]Fumihito Arai, Lili Rong, Toshio Fukuda:
Asymptotic convergence of feedback error learning method and improvement of learning speed. IROS 1993: 761-767
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-15 20:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint