- Supply Chain and Inventory Management
- Blockchain Technology Applications and Security
- Advanced Queuing Theory Analysis
- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Sustainable Supply Chain Management
- Scheduling and Optimization Algorithms
- Auction Theory and Applications
- Consumer Market Behavior and Pricing
- Cloud Data Security Solutions
- Corporate Finance and Governance
- Financial Markets and Investment Strategies
- Transportation Planning and Optimization
- Supply Chain Resilience and Risk Management
- Digital Platforms and Economics
- Wireless Communication Networks Research
- Data Quality and Management
- Experimental Behavioral Economics Studies
- Power Line Communications and Noise
- Transportation and Mobility Innovations
- IPv6, Mobility, Handover, Networks, Security
- Access Control and Trust
- Cryptographic Implementations and Security
- Economic theories and models
- Distributed systems and fault tolerance
Yunnan University of Finance And Economics
2019-2024
City University of Hong Kong
2014-2024
Foshan University
2024
Shanghai Institute of Quality Inspection and Technical Research
2015-2018
Hsuan Chuang University
2011
National Central University
2011
University of Minnesota System
2008
University of Minnesota
2006
Huazhong University of Science and Technology
2005
Nowadays, the integration of blockchain technology with Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has drawn researcher attention because it can provide key security auditing and transaction traceability in context data sharing. However, a majority existing blockchain-based CP-ABE schemes, private keys were still issued by one central authority that would lead to heavy computation, higher costs, restricted scalability within decentralized system. To address these challenges, we...
Prior research documents the value of network relationships to firm behavior but is relatively silent on how networks influence opportunism in distribution channels. Focusing a common type which multiple distributors serve single, dominant supplier, this study moves beyond dyadic view examine focal distributor's relational and structural embeddedness such influences its toward supplier. In particular, we postulate that curbs opportunism, whereas centrality, as form network, promotes...
Probabilistic or opaque selling, whereby a seller hides the exact identity of product until after buyer makes payment, has been used in practice and received considerable attention literature. Under what conditions, why, is probabilistic selling attractive to firms? The extant literature offered following explanations: price discriminate heterogeneous consumers, reduce supply–demand mismatches, soften competition. In this paper, we provide new explanation: exploit consumer bounded...
We analyze the benefit of production/service capacity sharing for a set independent firms. Firms have choice either operating their own facilities or investing in facility that is shared. Facilities are modeled as queueing systems with finite service rates. decide on levels (the rate) to minimize delay costs and investment possibly subject service‐level constraints delay. If firms operate shared they must also scheme cost. formulate problem cooperative game identify settings under which...
This article considers a periodic-review inventory problem with two suppliers. The regular supplier has longer lead time than the expedited but lower unit cost. structural properties of optimal orders are characterized using notion L♮-convexity. Interestingly, order is more sensitive to late-to-arrive outstanding orders, soon-to-arrive orders. A heuristic policy designed that provides an average cost saving 1.02% over best in literature.
For experience goods (products or services), given the uncertainty about their actual quality and growing popularity of social media, potential customers nowadays depend on experiences peers who have used previously to learn quality. In this paper, we study how such customer learning affects a firm's (credible) disclosure strategy as well other relevant decisions. To model learning, adopt anecdotal reasoning framework, which show be rational special case Bayesian framework. There are two...
Abstract The rapid development of healthcare big data has brought certain convenience to medical research and health management, but privacy protection is an issue that must be considered in the process application. Access control one methods for protection, traditional access models cannot adapt dynamic, continuous, real-time characteristics scenarios. In this paper, we propose model based on risk quantification usage (RQ-UCON). adds a module UCON achieve data. This classifies risks into...
Linear contracts and their variants are quite popular in practice, for example, salesforce incentives chief executive officer compensation. However, agency theory typically stipulates complex contract forms. Yimin Yu Xiangyin Kong provide an alternative explanation the popularity of linear contracts: robustness to model uncertainty renders or generalized forms under moral hazard. They adopt worst-case decision criterion, robust incentive compatibility ensure that agent always behaves. The...
We consider a periodic review, joint inventory and pricing control problem for firm that faces general random price‐dependent demands. Any unsatisfied demand can be either backordered or lost immediately. The objective is to maximize the expected profit over finite selling horizon by coordinating decisions in each period. For both backorder model sales model, we derive some quite sufficient conditions ensure optimality of base‐stock list price (BSLP) policy based on strict monotonicity...
Due to the advantages in self-sovereignty identity management and scalability of blockchain, digital verification systems (DIVMS) blockchain-based verifiable certificates (VC) are getting more attention. However, user privacy systems’ traditional architectures cannot be guaranteed. In this paper, zero-knowledge succinct noninteractive arguments knowledge (zkSNARKs) referred as Groth16 introduced order implement protection user’s behavior DIVMS VC. proposed architecture, malleability attack...
To address the quantum attacks on number theory-based ciphertext policy attribute-based encryption (CP-ABE), and to avoid private key leakage problems by relying a trustworthy central authority, we propose lattice-inspired CP-ABE scheme for data access sharing based blockchain in this paper. Firstly, CP-ABE-based algorithm using learning with errors (LWE) assumption is constructed, which selective security under linear independence restriction random oracle model. Secondly, nodes can act as...
Problem definition: We consider capacity sharing through demand allocation among firms with multiple sources and service facilities. Firms decide on the of from different to facilities minimize delay costs service-fulfillment possibly subject service-level requirements. If operate collectively as a coalition, they must also scheme for total cost. Academic/practical relevance: study in systems presence costs. Our problem is motivated by collaboration healthcare involving public–private...
We consider a periodic review, single‐stage inventory system with multiple demand classes and fixed replenishment lead time. Inventory expediting is allowed to alleviate demand–supply mismatches. Priority demands are commonly used in practice provide differentiated services for customers, an effective strategy improve the service levels of high‐priority demands. However, it challenging coordinate ordering, allocation decisions supply chains. partially characterize structure optimal policy....
This study investigated the relationship between corporate life cycle and determinants of firms’ repurchasing decisions. Our sample firms were gathered from Taiwan Stock Market over period 2000 to 2009. used descriptors cluster analysis determine firm years’ stages. The results showed that signaling information is general reason for share repurchases, regardless In growth stage, repurchase decisions may mix different motivations, including undervaluation signaling. mature stages, not only...
Abstract In this paper we study the structure of optimal policies for periodic review inventory systems with concave ordering costs and general demand distributions. By extending Scarf ( ) model to piecewise linear costs, show that, except a bounded region, generalized s , S policy is optimal. We do so by introducing notion c ‐convexity b proving conditional monotonicity property order‐up‐to levels. also provide conditions under which all regions state space.
We provide an exact myopic analysis for N‐stage serial inventory system with batch ordering, linear ordering costs, and nonstationary demands under a finite planning horizon. characterize the optimality conditions of nested batching newsvendor (NBN) policy independent (IBN) policy, which is single‐stage approximation. show that echelon reorder levels NBN are upper bounds counterparts both optimal IBN policy. In particular, we find has bounded deviations from further extend our results to...
the instinct characteristics of blockchain technology to write transactions on distributed ledgers offers new opportunities for government improve transparency, prevent fraud, and establish trust in public sector. However, there still exits challenge protect data confidentiality, authenticity ownership when sharing exchanging e-document decentralized network. In order address this concern, we propose a fusion scheme CP-ABE Blockchain called GovChain. GovChain, framework is used implement...
Digital identity management system is the securi-ty infrastructure of computer and internet applications. However, currently, most digital systems are faced with problems such as difficulty cross-domain authentication interoperation, lack credibility authentication, weakness security data. Although advantages block-chain technology have attached attentions experts scholars in field many based on been built, still can't completely solve mentioned above. Therefore, this pa-per, an effective...