default search action
Jiayin Qi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Chengyi Yang, Kun Jia, Deli Kong, Jiayin Qi, Aimin Zhou:
DP-GSGLD: A Bayesian optimizer inspired by differential privacy defending against privacy leakage in federated learning. Comput. Secur. 142: 103839 (2024) - [j24]Ziwang Fu, Feng Liu, Qing Xu, Xiangling Fu, Jiayin Qi:
LMR-CBT: learning modality-fused representations with CB-Transformer for multimodal emotion recognition from unaligned multimodal sequences. Frontiers Comput. Sci. 18(4) (2024) - [j23]Emmanuel Monod, Anne-Sophie Mayer, Detmar W. Straub, Elisabeth Joyce, Jiayin Qi:
From worker empowerment to managerial control: The devolution of AI tools' intended positive implementation to their negative consequences. Inf. Organ. 34(1): 100498 (2024) - [c51]Chengyi Yang, Jiayin Qi, Aimin Zhou:
Wasserstein Differential Privacy. AAAI 2024: 16299-16307 - [i4]Chengyi Yang, Jiayin Qi, Aimin Zhou:
Wasserstein Differential Privacy. CoRR abs/2401.12436 (2024) - 2023
- [j22]Emmanuel Monod, Raphael Lissillour, Antonia Köster, Jiayin Qi:
Does AI control or support? Power shifts after AI system implementation in customer relationship management. J. Decis. Syst. 32(3): 542-565 (2023) - [j21]Feng Liu, Hanyang Wang, Siyuan Shen, Xun Jia, Jingyi Hu, Jia-Hao Zhang, Xi-Yi Wang, Ying Lei, Aimin Zhou, Jia-Yin Qi, Zhi-Bin Li:
OPO-FCM: A Computational Affection Based OCC-PAD-OCEAN Federation Cognitive Modeling Approach. IEEE Trans. Comput. Soc. Syst. 10(4): 1813-1825 (2023) - [c50]Deli Kong, Jiayin Qi, Xiangling Fu:
Would You Accept Doctor ChatGPT: An Empirical Study Based on the UTAUT Model. AMCIS 2023 - [c49]Jun-Zheng Yang, Lu-Lu Liang, Jia-Yin Qi:
A Practical Non-Intrusive Cyber Security Vulnerability Assessment Method for Cyber-Insurance. DSC 2023: 261-269 - [c48]Yangyang Lv, Feng Liu, Deli Kong, Jiayin Qi:
Identity Change through Affordances Actualization: Evidence from Healthcare Workers. HICSS 2023: 3054-3063 - 2022
- [j20]Feng Liu, Hao-Yang Fan, Jia-Yin Qi:
Blockchain Technology, Cryptocurrency: Entropy-Based Perspective. Entropy 24(4): 557 (2022) - [j19]Feng Liu, Siyuan Shen, Ziwang Fu, Hanyang Wang, Aimin Zhou, Jia-Yin Qi:
LGCCT: A Light Gated and Crossed Complementation Transformer for Multimodal Speech Emotion Recognition. Entropy 24(7): 1010 (2022) - [j18]Feng Liu, Hanyang Wang, Jiahao Zhang, Ziwang Fu, Aimin Zhou, Jiayin Qi, Zhibin Li:
EvoGAN: An evolutionary computation assisted GAN. Neurocomputing 469: 81-90 (2022) - [j17]Jifeng Mu, Jonathan Z. Zhang, Abhishek Borah, Jiayin Qi:
Creative Appeals in Firm-Generated Content and Product Performance. Inf. Syst. Res. 33(1): 18-42 (2022) - [j16]Lianren Wu, Jinjie Li, Jiayin Qi, Nan Shi, Hongmiao Zhu:
How to Promote Public Engagement and Enhance Sentiment Through Government Social Media During the COVID-19 Crisis: A Public Value Management Perspective. J. Organ. End User Comput. 34(6): 1-24 (2022) - [j15]Qing Xu, Feng Liu, Ziwang Fu, Aimin Zhou, Jiayin Qi:
AeS-GCN: Attention-enhanced semantic-guided graph convolutional networks for skeleton-based action recognition. Comput. Animat. Virtual Worlds 33(3-4) (2022) - [j14]Feng Liu, Deli Kong, Jinhua Kong, Shiying Lu, Zilong Xiao, Qing Xu, Aimin Zhou, Jiayin Qi:
Pandemic Bonds Issued by the Chinese Government Supported Post-Disaster Recovery from COVID-19 Pandemic. J. Soc. Comput. 3(2): 158-170 (2022) - [c47]Jun-Zheng Yang, Feng Liu, Yuan-Jie Zhao, Lu-Lu Liang, Jia-Yin Qi:
NiNSRAPM: An Ensemble Learning Based Non-intrusive Network Security Risk Assessment Prediction Model. DSC 2022: 17-23 - [c46]Hongfei Da, Yan Zhou, Pu Song, Min Xiao, Zhefu Feng, Jiayin Qi:
A Distributed Storage System Based on Blockchain Technology: Named Practical Distributed File System. ICBCT 2022: 31-36 - [c45]Zhefu Feng, Hongfei Da, Min Xiao, Chen Zhao, Zongyang Zuo, Jiayin Qi:
Supply Chain Finance in Blockchain-based Digital Asset Platform. ICBCT 2022: 74-80 - [c44]Ziwang Fu, Feng Liu, Qing Xu, Jiayin Qi, Xiangling Fu, Aimin Zhou, Zhibin Li:
NHFNET: A Non-Homogeneous Fusion Network for Multimodal Sentiment Analysis. ICME 2022: 1-6 - 2021
- [c43]Chengyi Yang, Feng Liu, Siyuan Shen, Jiayin Qi:
An Energy-aware Approach with Spectrum Detection in Wireless Sensor Networks. EUC 2021: 1-7 - [c42]Ziwang Fu, Feng Liu, Jiahao Zhang, Hanyang Wang, Chengyi Yang, Qing Xu, Jiayin Qi, Xiangling Fu, Aimin Zhou:
SAGN: Semantic Adaptive Graph Network for Skeleton-Based Human Action Recognition. ICMR 2021: 110-117 - [i3]Feng Liu, Hanyang Wang, Jiahao Zhang, Ziwang Fu, Aimin Zhou, Jiayin Qi, Zhibin Li:
EvoGAN: An Evolutionary Computation Assisted GAN. CoRR abs/2110.11583 (2021) - [i2]Ziwang Fu, Feng Liu, Hanyang Wang, Jiayin Qi, Xiangling Fu, Aimin Zhou, Zhibin Li:
A cross-modal fusion network based on self-attention and residual structure for multimodal emotion recognition. CoRR abs/2111.02172 (2021) - [i1]Ziwang Fu, Feng Liu, Hanyang Wang, Siyuan Shen, Jiahao Zhang, Jiayin Qi, Xiangling Fu, Aimin Zhou:
LMR-CBT: Learning Modality-fused Representations with CB-Transformer for Multimodal Emotion Recognition from Unaligned Multimodal Sequences. CoRR abs/2112.01697 (2021) - 2020
- [c41]Feng Liu, Jie Yang, Deli Kong, Jiayin Qi:
A Secure Multi-party Computation Protocol Combines Pederson Commitment with Schnorr Signature for Blockchain. ICCT 2020: 57-63 - [c40]Feng Liu, Shiying Lu, Jiayin Qi, Zhibing Li:
The Design and Empirical Research of One Main Stem with Others Branches Monetary System Based on Blockchain Technology. ICCT 2020: 1529-1533
2010 – 2019
- 2019
- [j13]Lei Li, Yanjie Feng, Yue Lv, Xiaoyue Cong, Xiangling Fu, Jiayin Qi:
Automatically Detecting Peer-to-Peer Lending Intermediary Risk - Top Management Team Profile Textual Features Perspective. IEEE Access 7: 72551-72560 (2019) - [j12]Lianren Wu, Jinjie Li, Jiayin Qi:
Characterizing popularity dynamics of hot topics using micro-blogs spatio-temporal data. J. Big Data 6: 101 (2019) - [c39]Xiangling Fu, Jiayin Qi, Lulian Zou, Yi Hou:
Analysis on Evolution Model of Zombie Company under the Absence of Bank Data. HICSS 2019: 1-7 - [c38]Menghong Han, Siqi Shen, Yuexin Zhou, Zebing Xu, Tianyue Miao, Jiayin Qi:
An Analysis of the Cause of Privacy Paradox among SNS Users: take Chinese College Students as an Example. HICSS 2019: 1-10 - 2018
- [c37]Lina Liu, Jiayin Qi:
Research on Discrete Emotion Classification of Chinese Online Product Reviews Based on OCC Model. DSC 2018: 371-378 - 2017
- [j11]Seongmin Jeon, Jiayin Qi, Jiyuan Wang:
Do local consumers behave differently from visitors? An exploratory study in online group buying. Electron. Commer. Res. Appl. 25: 95-104 (2017) - 2016
- [j10]Jiayin Qi, Zhenping Zhang, Seongmin Jeon, Yanquan Zhou:
Mining customer requirements from online reviews: A product improvement perspective. Inf. Manag. 53(8): 951-963 (2016) - [j9]Lei Li, Xin Lin, Yue Zhai, Caixia Yuan, Yanquan Zhou, Jiayin Qi:
User communities and contents co-ranking for user-generated content quality evaluation in social networks. Int. J. Commun. Syst. 29(14): 2147-2168 (2016) - [c36]Jiyuan Wang, Jiayin Qi, Seongmin Jeon, Xiangling Fu:
Are you a local or a visitor?: an exploratory study on consumer behavior in online group buying commerce. ICEC 2016: 25:1-25:7 - [c35]Huili Liu, Meng Zhao, Jiayin Qi:
Does a customer's purchase behavior have an impact on its review behavior? ICEC 2016: 33:1-33:7 - [c34]Si Jiang, Jiayin Qi:
Cognitive Detection of Multiple Discrete Emotions from Chinese Online Reviews. DSC 2016: 137-142 - 2015
- [j8]Jiayin Qi, Xiangling Fu, Ge Zhu:
Subjective well-being measurement based on Chinese grassroots blog text sentiment analysis. Inf. Manag. 52(7): 859-869 (2015) - [j7]Jia-Yin Qi, Qi-Xing Qu, Yong-Pin Zhou, Lei Li:
The impact of users' characteristics on customer lifetime value raising: evidence from mobile data service in China. Inf. Technol. Manag. 16(4): 273-290 (2015) - 2014
- [j6]Jia-Yin Qi, Qi-Xing Qu, Yong-Pin Zhou:
How does customer self-construal moderate CRM value creation chain? Electron. Commer. Res. Appl. 13(5): 295-304 (2014) - [j5]Shiyu Du, Jiayin Qi:
Multi-agent Modeling and Simulation on Group Polarization Behavior in Web 2.0. J. Networks 9(8): 2003-2012 (2014) - [c33]Zhenping Zhang, Jiayin Qi, Ge Zhu:
Mining Customer Requirement from Helpful Online Reviews. ES 2014: 249-254 - [c32]Shengsheng Xiao, Xue Tan, Ming Dong, Jiayin Qi:
How to Design Your Project in the Online Crowdfunding Market? Evidence from Kickstarter. ICIS 2014 - [c31]Meng Zhao, Jiayin Qi:
Friends, Crowds, and the Long tail: an Empirical Investigation on Online Music listening. PACIS 2014: 3 - [c30]Qi-Xing Qu, Jiayin Qi, Yong Tan:
User-Generated Content (UGC) encountered Enterprise-Generated Content (EGC): Quantifying the Impact of EGC on the Propagation of Negative UGC. PACIS 2014: 88 - [c29]Xin Lin, Lei Li, Yue Zhai, Jiayin Qi:
UGC quality evaluation based on user communities and contents. VITAE 2014: 1-5 - [c28]Yue Zhai, Lei Li, Xin Lin, Jiayin Qi:
Evaluating user influence based on Web2.0 UGC. VITAE 2014: 1-5 - [c27]Gang Liu, Chuan Shi, Qing Chen, Bin Wu, Jiayin Qi:
A Two-Phase Model for Retweet Number Prediction. WAIM 2014: 781-792 - 2013
- [c26]Jiayin Qi, Linghan Liu, Yong Tan, Xiangling Fu, Meng Zhao, Angela Zhao:
Which Factors Determine User's First and Repeat Online Music Listening Respectively? Music Itself, User Itself, or Online Feedback. ICIS 2013 - 2012
- [j4]Jia-Yin Qi, Yong-Pin Zhou, Wen-Jing Chen, Qi-Xing Qu:
Are customer satisfaction and customer loyalty drivers of customer lifetime value in mobile data services: a comparative cross-country study. Inf. Technol. Manag. 13(4): 281-296 (2012) - 2010
- [c25]Chao Zhu, Chen Wang, Jiayin Qi:
An experimental study of consumption behaviors in telecom social networks. SOLI 2010: 409-414
2000 – 2009
- 2009
- [j3]Jiayin Qi, Li Zhang, Yanping Liu, Ling Li, Yong-Pin Zhou, Yao Shen, Liang Liang, Huaizu Li:
ADTreesLogit model for customer churn prediction. Ann. Oper. Res. 168(1): 247-265 (2009) - [c24]Rong Liu, Jun Ma, Jiayin Qi, Bin Wu, Chen Wang:
A customer network value model based on complex network theory. SMC 2009: 3193-3198 - [c23]Chao Zhu, Jiayin Qi, Chen Wang:
An Experimental Study on Four Models of Customer Churn Prediction. SMC 2009: 3199-3204 - [c22]Yin Wu, Jiayin Qi, Chen Wang:
The Study on Feature Selection in Customer Churn Prediction Modeling. SMC 2009: 3205-3210 - [c21]Jiayin Qi, Yuanquan Li:
A novel and convenient variable selection method for choosing effective input variables for telecommunication customer churn prediction model. SMC 2009: 3217-3222 - 2008
- [c20]Jiayin Qi, Hongli Zhang, Zhenzhou Ji, Liu Yun:
Analyzing BitTorrent Traffic Across Large Network. CW 2008: 759-764 - [c19]Chen Li, Jiayin Qi, Huaying Shu:
A SOA-Based ARIS Model for BPR. ICEBE 2008: 590-595 - 2007
- [j2]Jiayin Qi, Feng Wu, Ling Li, Huaying Shu:
Artificial intelligence applications in the telecommunications industry. Expert Syst. J. Knowl. Eng. 24(4): 271-291 (2007) - [j1]Ling Li, John N. Warfield, Shuo Jia Guo, Wen Dong Guo, Jiayin Qi:
Advances in intelligent information processing. Inf. Syst. 32(7): 941-943 (2007) - [c18]Chen Li, Jiayin Qi, Wei Wei, Huaying Shu:
A Service-Oriented Architecture for Semantic Recommendation and Integration of Products/Application Services (SOA-RIPAS) in Globalization. APSCC 2007: 382-389 - [c17]Yuanquan Li, Jiayin Qi, Huaying Shu:
A Review on the Relationship Between New Variables and Classical TAM Structure. CONFENIS (1) 2007: 53-63 - [c16]Chen Li, Jiayin Qi, Huaying Shu:
A HowNet Based Web Log Mining Algorithm. CONFENIS (2) 2007: 923-931 - [c15]Yuanquan Li, Jiayin Qi, Huaying Shu:
A Study on Customer Satisfaction in Mobile Telecommunication Market by Using SEM and System Dynamic Method. CONFENIS (2) 2007: 1221-1226 - [c14]Yixiang Tong, Jiayin Qi, Ping Li:
A Segmentation Transmission Approach and Information System for Agriculture Information Based on Mobile Communication. CONFENIS (2) 2007: 1529-1534 - [c13]Chen Li, Jiayin Qi, Huaying Shu:
A System Dynamics Model for SMS Governance. CONFENIS (2) 2007: 1585-1595 - [c12]Guangming Lu, Jiayin Qi, Qingmin Liao:
A New Scheme of Iris Image Quality Assessment. IIH-MSP 2007: 147-150 - [c11]Yangming Zhang, Jiayin Qi, Huaying Shu, Jiantong Cao:
Personalized product recommendation based on customer value hierarchy. SMC 2007: 3250-3254 - [c10]Yangming Zhang, Jiayin Qi, Huaying Shu, Jiantong Cao:
A hybrid KNN-LR classifier and its application in customer churn prediction. SMC 2007: 3265-3269 - 2006
- [c9]Jiayin Qi, Yangming Zhang, Yingying Zhang, Shuang Shi:
TreeLogit Model for Customer Churn Prediction. APSCC 2006: 70-75 - [c8]Jiayin Qi, Huaying Shu, Jianqiu Zeng:
An Extended TAM for Subscribers' Adoption of Mobile Data Services Provided by Wireless Communication Systems. CONFENIS 2006: 429-430 - [c7]Jiayin Qi, Huaying Shu, Kaili Kan:
OSS and ERP Systems: Likeness, Difference and Reference. CONFENIS 2006: 457-466 - [c6]Yajing Si, Jiayin Qi, Huaying Shu, Hua Ai:
Mobile Customer Demand Discrimination Modeling in Enterprise Information Systems. CONFENIS 2006: 583-588 - [c5]Yingying Zhang, Jiayin Qi, Huaying Shu, Yuanquan Li:
Predicting Churn Probability of Fixed-line Subscriber with Limited Information: A Data Mining Paradigm for Enterprise Computing. CONFENIS 2006: 589-590 - [c4]Jiayin Qi, Huaying Shu, Huaizu Li:
Study on Purchase Probability Model in CRM Systems. CONFENIS 2006: 643-647 - [c3]Jiayin Qi, Hua (Jones) Ai, Huaying Shu, Zhanhong Xin:
System Dynamics Report of Telecom Industry in China. CONFENIS 2006: 739-747 - [c2]Jiayin Qi, Huaying Shu, Huaizu Li:
An Empirical Research on SMC in an Extended Enterprise Environment. CONFENIS 2006: 749-754 - [c1]Jiayin Qi, Lida Xu, Hong Wang:
An Enterprise Information System in Telecommunication Industry. SMC 2006: 407-411
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint