default search action
Jieyu Zhan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j12]Xudong Luo, Yanling Li, Qiaojuan Huang, Jieyu Zhan:
A survey of automated negotiation: Human factor, learning, and application. Comput. Sci. Rev. 54: 100683 (2024) - [j11]Haozhe Zhou, Jieyu Zhan, Wenjun Ma:
A negotiation protocol with recommendation for multilateral negotiation in trust networks. Expert Syst. Appl. 246: 123185 (2024) - 2023
- [j10]Yizhao Wang, Chenxi Wang, Jieyu Zhan, Wenjun Ma, Yuncheng Jiang:
Text FCG: Fusing Contextual Information via Graph Learning for text classification. Expert Syst. Appl. 219: 119658 (2023) - [j9]Jianlong Cai, Jieyu Zhan, Yuncheng Jiang:
CP-nets-based user preference learning in automated negotiation through completion and correction. Knowl. Inf. Syst. 65(9): 3567-3590 (2023) - [j8]Shun Mao, Jieyu Zhan, Yizhao Wang, Yuncheng Jiang:
Improving Knowledge Tracing via Considering Two Types of Actual Differences From Exercises and Prior Knowledge. IEEE Trans. Learn. Technol. 16(3): 324-338 (2023) - 2022
- [j7]Siyuan Wang, Wenjun Ma, Jieyu Zhan:
A Clustering Multi-Criteria Decision-Making Method for Large-Scale Discrete and Continuous Uncertain Evaluation. Entropy 24(11): 1621 (2022) - [j6]Weishan Cai, Yizhao Wang, Shun Mao, Jieyu Zhan, Yuncheng Jiang:
Multi-heterogeneous neighborhood-aware for Knowledge Graphs alignment. Inf. Process. Manag. 59(1): 102790 (2022) - 2021
- [j5]Wenjun Ma, Weiru Liu, Kevin McAreavey, Xudong Luo, Yuncheng Jiang, Jieyu Zhan, Zhenzhou Chen:
A decision support framework for security resource allocation under ambiguity. Int. J. Intell. Syst. 36(1): 5-52 (2021) - 2019
- [j4]Xudong Luo, Qiaojuan Huang, Jieyu Zhan:
自动谈判及其基于模糊集的模型综述 (A Survey of Automated Negotiation and Its Fuzzy Set Based Models). 计算机科学 46(12): 220-230 (2019) - 2018
- [j3]Jieyu Zhan, Xudong Luo, Cong Feng, Minghua He:
A multi-demand negotiation model based on fuzzy rules elicited via psychological experiments. Appl. Soft Comput. 67: 840-864 (2018) - [j2]Jieyu Zhan, Xudong Luo, Yuncheng Jiang:
An Atanassov intuitionistic fuzzy constraint based method for offer evaluation and trade-off making in automated negotiation. Knowl. Based Syst. 139: 170-188 (2018) - 2016
- [j1]Xiaoxin Jing, Dongmo Zhang, Xudong Luo, Jieyu Zhan:
A Logical Multidemand Bargaining Model with Integrity Constraints. Int. J. Intell. Syst. 31(7): 673-697 (2016)
Conference and Workshop Papers
- 2023
- [c14]Jiehui Liu, Jieyu Zhan:
Constructing Knowledge Graph from Cyber Threat Intelligence Using Large Language Model. IEEE Big Data 2023: 516-521 - 2022
- [c13]Jianlong Cai, Jieyu Zhan, Yuncheng Jiang:
Completion of User Preference based on CP-nets in Automated Negotiation. ICAART (1) 2022: 383-390 - [c12]Weishan Cai, Wenjun Ma, Jieyu Zhan, Yuncheng Jiang:
Entity Alignment with Reliable Path Reasoning and Relation-aware Heterogeneous Graph Transformer. IJCAI 2022: 1930-1937 - [c11]Shun Mao, Jieyu Zhan, Jiawei Li, Yuncheng Jiang:
Knowledge Structure-Aware Graph-Attention Networks for Knowledge Tracing. KSEM (1) 2022: 309-321 - 2021
- [c10]Wenjun Ma, Jieyu Zhan, Yuncheng Jiang:
A Measurement for Essential Conflict in Dempster-Shafer Theory. ICAART (2) 2021: 1282-1289 - [c9]Yibing Zhao, Wenjun Ma, Yuncheng Jiang, Jieyu Zhan:
A MOOCs Recommender System Based on User's Knowledge Background. KSEM 2021: 140-153 - 2019
- [c8]Jieyu Zhan, Yuncheng Jiang, Wenjun Ma, Xudong Luo, Weiru Liu:
A Trust Network Model Based on Hesitant Fuzzy Linguistic Term Sets. KSEM (2) 2019: 284-297 - 2017
- [c7]Jieyu Zhan, Xudong Luo, Yuncheng Jiang, Wenjun Ma, Mukun Cao:
A Fuzzy Logic Based Policy Negotiation Model. KSEM 2017: 79-92 - 2016
- [c6]Jieyu Zhan, Xudong Luo, Fenghui Ren, Minjie Zhang, Mukun Cao:
An Adaptive Procedure for Settling Multiple Issues in Bilateral Negotiation with Time Constraints. KMO 2016: 7 - [c5]Jieyu Zhan, Xudong Luo:
Adaptive Conceding Strategies for Negotiating Agents Based on Interval Type-2 Fuzzy Logic. KSEM 2016: 222-235 - [c4]Jieyu Zhan, Xudong Luo:
Offer Evaluation and Trade-Off Making in Automated Negotiation Based on Intuitionistic Fuzzy Constraints. PRIMA 2016: 197-215 - 2014
- [c3]Jieyu Zhan, Xudong Luo, Cong Feng, Wenjun Ma:
A fuzzy logic based bargaining model in discrete domains: Axiom, elicitation and property. FUZZ-IEEE 2014: 424-431 - [c2]Jieyu Zhan, Xudong Luo, Wenjun Ma, Youzhi Zhang:
A Multi-demand Adaptive Bargaining based on Fuzzy Logic. ICAART (1) 2014: 577-585 - 2013
- [c1]Jieyu Zhan, Xudong Luo, Kwang Mong Sim, Cong Feng, Youzhi Zhang:
A Fuzzy Logic Based Model of a Bargaining Game. KSEM 2013: 387-403
Informal and Other Publications
- 2022
- [i1]Weishan Cai, Wenjun Ma, Jieyu Zhan, Yuncheng Jiang:
Entity Alignment with Reliable Path Reasoning and Relation-Aware Heterogeneous Graph Transformer. CoRR abs/2205.08806 (2022)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint