Fraud detections for online businesses: a perspective from blockchain technology Y Cai, D Zhu Financial Innovation 2, 1-10, 2016 | 320 | 2016 |
Time-line based model for software project scheduling with genetic algorithms CK Chang, H Jiang, Y Di, D Zhu, Y Ge Information and Software Technology 50 (11), 1142-1154, 2008 | 179 | 2008 |
Data Mining for Network Intrusion Detection: A Comparison of Alternative Methods* D Zhu, G Premkumar, X Zhang, CH Chu Decision Sciences 32 (4), 635-660, 2007 | 125 | 2007 |
Shilling attack detection—a new approach for a trustworthy recommender system JS Lee, D Zhu INFORMS Journal on Computing 24 (1), 117-131, 2012 | 120 | 2012 |
Randomized allocation with nonparametric estimation for a multi-armed bandit problem with covariates Y Yang, D Zhu The Annals of Statistics 30 (1), 100-121, 2002 | 117 | 2002 |
Organizational memory management: technological and research issues S Nilakanta, LL Miller, D Zhu Journal of Database Management (JDM) 17 (1), 85-94, 2006 | 102 | 2006 |
A new approach to testing nomological validity and its application to a second-order measurement model of trust L Liu, C Li, D Zhu Journal of the Association for Information Systems 13 (12), 4, 2012 | 76 | 2012 |
A hybrid approach for efficient ensembles D Zhu Decision Support Systems 48 (3), 480-487, 2010 | 62 | 2010 |
Identity disclosure protection: A data reconstruction approach for privacy-preserving data mining D Zhu, XB Li, S Wu Decision Support Systems 48 (1), 133-140, 2009 | 61 | 2009 |
Cue recognition and cue elaboration in learning from examples X Zhu, Y Lee, HA Simon, D Zhu Proceedings of the National Academy of Sciences 93 (3), 1346-1351, 1996 | 60 | 1996 |
Reputation in an open source software community: Antecedents and impacts Y Cai, D Zhu Decision Support Systems 91, 103-112, 2016 | 56 | 2016 |
A historic review of management science research in China J Wang, R Yan, K Hollister, D Zhu Omega 36 (6), 919-932, 2008 | 50 | 2008 |
When processes learn: Steps toward crafting an intelligent organization D Zhu, MJ Prietula, WL Hsu Information Systems Research 8 (3), 302-317, 1997 | 46 | 1997 |
Security control in inter-bank fund transfer D Zhu | 39 | 2002 |
A metaheuristic scheduling procedure for resource‐constrained projects with cash flows D Zhu, R Padman Naval Research Logistics (NRL) 46 (8), 912-927, 1999 | 36 | 1999 |
Information visualization in project management and scheduling P Zhang, D Zhu Proceedings of the 4th Conference of the International Society for Decision …, 1997 | 28 | 1997 |
Trustworthy and profit: A new value-based neighbor selection method in recommender systems under shilling attacks Y Cai, D Zhu Decision Support Systems 124, 113112, 2019 | 26 | 2019 |
An integrated e-service model for electronic medical records L Liu, D Zhu Information systems and e-business management 11, 161-183, 2013 | 25 | 2013 |
When costs are unequal and unknown: A subtree grafting approach for unbalanced data classification JS Lee, D Zhu Decision Sciences 42 (4), 803-829, 2011 | 25 | 2011 |
A comparison and scenario analysis of leading data mining software J Wang, X Hu, K Hollister, D Zhu International Journal of Knowledge Management (IJKM) 4 (2), 17-34, 2008 | 22 | 2008 |