Institution
Renmin University of China
Education•Beijing, Beijing, China•
About: Renmin University of China is a education organization based out in Beijing, Beijing, China. It is known for research contribution in the topics: China & Population. The organization has 11325 authors who have published 15498 publications receiving 238419 citations. The organization is also known as: Renmin University & People's University of China.
Topics: China, Population, Computer science, Catalysis, Context (language use)
Papers published on a yearly basis
Papers
More filters
••
TL;DR: In this paper, the authors present a comprehensive literature survey on the impact of the hukou system on the Chinese labor market and economy and show that the current hukhou system has a negative impact on rural-to-urban migration in China as well as on economic efficiency and equality.
220 citations
••
TL;DR: An algorithm is developed to repair an inconsistent fuzzy preference relation and to make it become one with weak transitivity, via a synthesis matrix which reflects the relationship between the fuzzy preference relationship with additive consistency and the initial one given by a decision maker.
219 citations
••
31 May 2014TL;DR: This paper uses static program analysis to attribute a top level function that is usually a user interaction function with the behavior it performs, and analyzes the text extracted from the user interface component associated with the toplevel function to detect stealthy behavior.
Abstract: Android smartphones are becoming increasingly popular. The open nature of Android allows users to install miscellaneous applications, including the malicious ones, from third-party marketplaces without rigorous sanity checks. A large portion of existing malwares perform stealthy operations such as sending short messages, making phone calls and HTTP connections, and installing additional malicious components. In this paper, we propose a novel technique to detect such stealthy behavior. We model stealthy behavior as the program behavior that mismatches with user interface, which denotes the user's expectation of program behavior. We use static program analysis to attribute a top level function that is usually a user interaction function with the behavior it performs. Then we analyze the text extracted from the user interface component associated with the top level function. Semantic mismatch of the two indicates stealthy behavior. To evaluate AsDroid, we download a pool of 182 apps that are potentially problematic by looking at their permissions. Among the 182 apps, AsDroid reports stealthy behaviors in 113 apps, with 28 false positives and 11 false negatives.
218 citations
••
TL;DR: A facile method is proposed to increase the dispersity of graphene through noncovalent functionalization graphene with a water-soluble aromatic electroactive dye, methylene green (MG), during chemical reduction of graphene oxide (GO) with hydrazine.
Abstract: To explore graphene applications in various fields, the processability of graphene becomes one of the important key issues, particularly with the increasing availability of synthetic graphene approaches, because the direct dispersion of hydrophobic graphene in water is prone to forming agglomerates irreversibly. Here, a facile method is proposed to increase the dispersity of graphene through noncovalent functionalization graphene with a water-soluble aromatic electroactive dye, methylene green (MG), during chemical reduction of graphene oxide (GO) with hydrazine. Atomic force microscopic and UV−vis spectrophotometric results demonstrate that chemically reduced graphene (CRG) functionalized with MG (CRG-MG) is well-dispersed into water through the coulomb repulsion between MG-adsorbed CRG sheets. The electrochemical properties of the formed CRG-MG are investigated, and the results demonstrate that CRG-MG confined onto a glassy carbon (GC) electrode has lower charge-transfer resistance and better electrocat...
216 citations
••
TL;DR: In this paper, the authors examined the relation of leader identity with leader behavior and perceived effectiveness and found that abusive behaviors were most frequent when a strong individual identity was paired with a weak collective identity.
Abstract: Drawing from identity-based theories of leadership, we examined relations of leader identity with leader behavior and perceived effectiveness. To do so, we employed multiwave methodology to examine the differential impact of leaders' chronic collective, relational, and individual identities on the frequency and consistency of their subsequent transformational, consideration, and abusive behaviors over a 3-week period. We also examined the relative importance of these leadership behaviors for predicting perceived leader effectiveness as rated by subordinates and peers. Results indicated that leaders' collective and individual identities were uniquely related to transformational and abusive behaviors, respectively. We also observed a significant collective by individual identity interaction, such that abusive behaviors were most frequent when a strong individual identity was paired with a weak collective identity. Frequency of transformational behaviors accounted for the largest proportion of variance in perceived leader effectiveness, followed by frequency of abusive behaviors and consistency of transformational behaviors. We discuss the implications of these findings for leadership theory and development.
216 citations
Authors
Showing all 11512 results
Name | H-index | Papers | Citations |
---|---|---|---|
Tao Zhang | 123 | 2772 | 83866 |
Xuan Zhang | 119 | 1530 | 65398 |
Richard J.H. Smith | 118 | 1308 | 61779 |
Wei Lu | 111 | 1973 | 61911 |
Yongfa Zhu | 105 | 355 | 33765 |
Wei Zhang | 104 | 2911 | 64923 |
Lu Qi | 94 | 566 | 54866 |
Chao-Jun Li | 92 | 731 | 38074 |
Scott Rozelle | 87 | 789 | 30543 |
Peng Cheng | 84 | 749 | 27599 |
Paul A. Kirschner | 82 | 545 | 33626 |
Thomas Reardon | 79 | 285 | 25458 |
Lei Zhang | 78 | 1485 | 30058 |
Hong-Bo Sun | 78 | 691 | 24955 |
G. F. Chen | 77 | 921 | 31485 |