default search action
Duoyong Sun
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c28]Yi Tian, Bo Li, Duoyong Sun, Renqi Zhu:
Research on modeling method of organizational decision-making behavior based on group social network. IMMS 2022: 433-441 - 2021
- [c27]Zhanfeng Li, Bo Li, Duoyong Sun, Renqi Zhu:
A Simulation model on the propagation of terrorist ideology in social community. ACAI 2021: 45:1-45:8 - [c26]Zhanfeng Li, Duoyong Sun, Bo Li, Renqi Zhu:
A reduction model on multiplex terrorist network. ISCID 2021: 272-277
2010 – 2019
- 2017
- [c25]Ze Li, Duoyong Sun, Feng Xu, Bo Li:
Social Network Based Anomaly Detection of Organizational Behavior using Temporal Pattern Mining. ASONAM 2017: 1112-1119 - [c24]Ze Li, Duoyong Sun, Kun Cai, Bo Li:
Tie strength still matters: Investigating interaction patterns of Al-Qaeda network in terror operations. ISI 2017: 37-42 - 2016
- [c23]Ze Li, Duoyong Sun, Jie Li, Zhanfeng Li:
Social network change detection using a genetic algorithm based back propagation neural network model. ASONAM 2016: 1386-1387 - [c22]Zihan Lin, Duoyong Sun, Bo Li, Sanjun Nie:
Detecting Cooperation Behavior of Terrorist Organization Based on Adaboost Classifier. ISCID (1) 2016: 386-389 - [c21]Ze Li, Duoyong Sun, Hsinchun Chen, Shin-Ying Huang:
Identifying the socio-spatial dynamics of terrorist attacks in the Middle East. ISI 2016: 175-180 - 2015
- [j1]Julei Fu, Duoyong Sun, Jian Chai, Jin Xiao, Shouyang Wang:
The "six-element" analysis method for the research on the characteristics of terrorist activities. Ann. Oper. Res. 234(1): 17-35 (2015) - [c20]Kun Wang, Duoyong Sun:
Research on the Shanghai Cooperation Organization Network Architecture from the Big Data Perspective. ASONAM 2015: 1208-1211 - [c19]Bo Li, Duoyong Sun, Ze Li, Chaomin Ou, Renqi Zhu:
Understanding the Dynamic of Covert Organization with Multilayer Networks Model. EISIC 2015: 37-44 - [c18]Min Tang, Duoyong Sun, Bo Li, Chaomin Ou, Zi-Han Lin, Ze Li:
Research on the Evaluation Method of National Military Development Based on Net Assessment. EISIC 2015: 129-132 - [c17]Ning Gu, Duoyong Sun, Bo Li, Ze Li:
Sentiment Analysis for Topics based on Interaction Chain Model. EISIC 2015: 133-136 - [c16]Ze Li, Duoyong Sun, Bo Li, Zi-Han Lin, Min Tang:
Detecting Changes in Terrorism Networks: A Perspective of Multi-Meta-Network Modeling. EISIC 2015: 179 - [c15]Zi-Han Lin, Duoyong Sun, Bo Li, Ze Li:
Game Analysis on the Counter-Terrorism Cooperation of Shanghai Cooperation Organization. EISIC 2015: 185 - [c14]Kun Wang, Duoyong Sun:
Research on construction methods of the Shanghai cooperation organization meta-network model. ISI 2015: 192 - 2014
- [c13]Bo Li, Duo-Yong Sun, Zi-Han Lin, Chaomin Ou:
Agent-based simulation research on group emotion evolution of public emergency. ASONAM 2014: 497-502 - [c12]Ze Li, Duo-Yong Sun, Shu-Quan Guo, Bo Li:
Detecting key individuals in terrorist network based on FANP model. ASONAM 2014: 724-727 - 2013
- [c11]Julei Fu, Zhenpeng Li, Duoyong Sun, Wenli Liu:
Modeling Multiple Locations Defence and Attack Dynamic Bayesian Decision Game. BIFE 2013: 449-453 - [c10]Bo Li, Duoyong Sun, Julei Fu, Zi-Han Lin:
Social Network Construction and Analysis Based on Community Photo Collections with Face Recognition. BIFE 2013: 463-467 - [c9]Bo Li, Duo-Yong Sun, Julei Fu, Zi-Han Lin:
Organization Network Construction and Understanding Based on Photo Face Recognition. EISIC 2013: 220 - 2012
- [c8]Julei Fu, Jian Chai, Duoyong Sun, Shouyang Wang:
Multi-factor Analysis of Terrorist Activities Based on Social Network. BIFE 2012: 476-480 - [c7]Ben-xian Li, Meng-jun Li, Duo-Yong Sun, Jiang Li, Wenju Li:
Evaluation method for node importance based on node condensation in terrorism networks. ISI 2012: 193 - [c6]Wenju Li, Duoyong Sun, Ben-xian Li, Shu-Quan Guo, Ning Gu:
A robust evaluation of terrorist network based on node-lap degree of triads. ISI 2012: 194 - 2011
- [c5]Duo-Yong Sun, Shu-Quan Guo, Xiao-Peng Liu, Jiang Li:
Multi-relational Network Analysis for Covert Organizations. EISIC 2011: 263-268 - [c4]Duo-Yong Sun, Shu-Quan Guo, Ben-xian Li, Xiao-Peng Liu:
Study on covert networks of terrorists based on interactive relationship hypothesis. ISI 2011: 26-30 - [c3]Duo-Yong Sun, Shu-Quan Guo, Hai Zhang, Ben-xian Li:
Study on covert networks of terroristic organizations based on text analysis. ISI 2011: 373-378
2000 – 2009
- 2009
- [c2]Jiang Wu, Duoyong Sun, Bin Hu, Yu Zhang:
Organizational Adaptative Behavior: The Complex Perspective of Individuals-Tasks Interaction. Complex (1) 2009: 28-38 - [c1]Duoyong Sun, Jiang Wu, Shenghua Zheng, Bin Hu, Kathleen M. Carley:
Topological Analysis and Measurements of an Online Chinese Student Social Network. Complex (1) 2009: 737-748
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-24 20:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint