Order:
Disambiguations
Weike Pan [3]Weifeng Pan [2]Wei Pan [2]Weigang Pan [1]
Weijun Pan [1]Weishuan Pan [1]Weijiang Pan [1]Weijie Pan [1]
  1.  4
    Transfer learning in heterogeneous collaborative filtering domains.Weike Pan & Qiang Yang - 2013 - Artificial Intelligence 197 (C):39-55.
  2.  14
    Privacy-preserving graph convolution network for federated item recommendation.Pengqing Hu, Zhaohao Lin, Weike Pan, Qiang Yang, Xiaogang Peng & Zhong Ming - 2023 - Artificial Intelligence 324 (C):103996.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  10
    Transfer learning for collaborative recommendation with biased and unbiased data.Zinan Lin, Dugang Liu, Weike Pan, Qiang Yang & Zhong Ming - 2023 - Artificial Intelligence 324 (C):103992.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  5
    When and How Knowledge Hiding Motivates Perpetrators' Organizational Citizenship Behavior.Wei Pan, Egan Lua, Zaoli Yang & Yi Su - forthcoming - Journal of Business Ethics:1-20.
    Research on knowledge hiding has largely focused on its antecedents while overlooking its consequences. Drawing on moral cleansing theory, we adopt a “perpetrator-centric view” and posit that employees who engage in playing dumb and evasive hiding–two specific knowledge hiding behaviors that involve deception–will subsequently perform more organizational citizenship behavior directed toward individuals (OCB-I) because they perceive a loss of moral credits following their moral transgression. Further, we propose that the indirect effects are contingent on perpetrators’ moral identity internalization. We tested (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5. Spontaneous Brain Activity Did Not Show the Effect of Violent Video Games on Aggression: A Resting-State fMRI Study.Wei Pan, Xuemei Gao, Shuo Shi, Fuqu Liu & Chao Li - 2018 - Frontiers in Psychology 8.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  6.  8
    Development of a Family of Chaotic Systems with Infinite Equilibria and Its Application for Image Encryption.Xiaofeng Li, Yulong Bai, Weishuan Pan & Yong-Jie di WangMa - 2022 - Complexity 2022:1-18.
    Fourth-order autonomous nonlinear differential equations can exhibit chaotic properties. In this study, we propose a family of fourth-order chaotic systems with infinite equilibrium points whose equilibria form closed curves of different shapes. First, the phase diagrams and Lyapunov exponents of the system family are simulated. The results show that the system family has complex phase diagrams and dynamic behaviors. Simulation analysis of the Poincarè mapping and bifurcation diagrams shows that the system has chaotic characteristics. The circuit simulation model is constructed (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  6
    Fa lü xi tong de zi wo fan si: gong neng fen hua shi dai de fa li xue.Weijiang Pan - 2020 - Beijing: Shang wu yin shu guan.
    Direct download  
     
    Export citation  
     
    Bookmark  
  8.  6
    Xian dai zheng zhi de xian fa ji chu.Weijie Pan - 2001 - Shanghai Shi: Hua dong shi fan da xue chu ban she.
    Direct download  
     
    Export citation  
     
    Bookmark  
  9.  15
    Identifying Important Packages of Object-Oriented Software Using Weighted k-Core Decomposition.Bo Xie, Bo Jiang, Bo Hu & Weifeng Pan - 2014 - Journal of Intelligent Systems 23 (4):461-476.
    Identifying important entities in software systems has many implications for effective resource allocation. Complex network research opens new opportunities for identifying important entities from software networks. However, the existing methods only focus on identifying important classes. Little work has been done on the identification of important packages. Moreover, the metrics they used to quantify the class importance are only designed for unweighted software networks and cannot fit in with the weighted software networks. To overcome these limitations, in this article, we (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  10.  25
    CLEAR: Class Level Software Refactoring Using Evolutionary Algorithms.Chenxiang Yuan, Bo Jiang, Weifeng Pan & Muchou Wang - 2015 - Journal of Intelligent Systems 24 (1):85-97.
    The original design of a software system is rarely prepared for every new requirement. Software systems should be updated frequently, which is usually accompanied by the decline in software modularity and quality. Although many approaches have been proposed to improve the quality of software, a majority of them are guided by metrics defined on the local properties of software. In this article, we propose to use a global metric borrowed from the network science to detect the moving method refactoring. First, (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  11.  9
    The Memory Effect of Reflected Self-Appraisals on Different Types of Others.Caizhen Yue, Yajun Yang, Weijie He, Tong Yue & Weigang Pan - 2020 - Frontiers in Psychology 11.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12.  12
    Information Entropy Based on Propagation Feature of Node for Identifying the Influential Nodes.Linfeng Zhong, Yu Bai, Yan Tian, Chen Luo, Jin Huang & Weijun Pan - 2021 - Complexity 2021:1-8.
    For understanding and controlling spreading in complex networks, identifying the most influential nodes, which can be applied to disease control, viral marketing, air traffic control, and many other fields, is of great importance. By taking the effect of the spreading rate on information entropy into account, we proposed an improved information entropy method. Compared to the benchmark methods in the six different empirical networks, the IIE method has been found with a better performance on Kendall’s Tau and imprecision function under (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark