Computer Science ›› 2022, Vol. 49 ›› Issue (11): 197-205.doi: 10.11896/jsjkx.210900195
• Artificial Intelligence • Previous Articles Next Articles
SONG Mei-qi1,2,3, FU Xiang-ling1,2,3, YAN Chen-wei1,2,3, WU Wei-qiang3, REN Yun3
CLC Number:
[1]BANK W.Global Economic Prospects,January 2021[M].Washington:World Bank Publications,2021:1-210. [2]HAMEL G,VALIKANGAS L.The quest for resilience[J].Harvard Business Review,2003,81(9):52-63. [3]VAN D V G S,ESSENS P,WAHLSTRÖM M,et al.Managing Risk and Resilience[J].Academy of Management Journal,2015,58(4):971-980. [4]LV W D,ZHAO Y,WEI Y.On Resilience-based Risk Management-Organizational Management Technology for Uncertain Situations[J].Management World,2019,35(9):116-132. [5]ALTMAN E I.Financial ratios discriminant analysis and theprediction of corporate bankruptcy[J].Journal of Finance,1968,23(4):589-609. [6]ALTMAN E I,HALDEMAN R G,NARAYANAN P.ZETAAnalysis:a new model to identify bankruptcy risk of corporations[J].Journal of Banking and Finance,1977,1(1):29-54. [7]OHLSON J A.Financial ratio and the probabilistic prediction of bankruptcy[J].Journal of Accounting Research,1980,18(1):109-131. [8]LIU Y,HUANG L H.Supply chain finance credit risk assessment using support vector machine-based ensemble improved with noise elimination[J].International Journal of Distributed Sensor Networks,2020,16(1):1-10. [9]YANG Y X.Adaptive credit scoring with kernel learning me-thods[J].European Journal of Operational Research,2007,183(3):1521-1536. [10]ZHOU L G,SI Y W,FUJITA H.Predicting the listing statuses of Chinese-listed companies using decision trees combined with an improved filter feature selection method[J].Knowledge-Based Systems,2017,128:93-101. [11]WANG X,LI Y Q.XGBoost-based Algorithm for Predicting Financial Default of Listed Companies[J].Journal of Quantitative Economics,2020,37(3):195-201. [12]SUN J,LI H,CHANG P C,et al.Dynamic credit scoring using B & B with incremental-SVM-ensemble[J].Kybernetes,2015,44(4):518-535. [13]BROWN I,MUES C.An experimental comparison of classification algorithms for imbalanced credit scoring data sets[J].Expert Systems with Applications,2012,39(3):3446-3453. [14]WANG M G,YU J Y,JI Z J.Credit risk assessment of high-tech enterprises based on RSNCL-ANN ensemble model[C]//Proceedings of 2018 International Conference on Mathematics and Artificial Intelligence.New York:Association for Computing Machinery,2018:73-78. [15]ZHAO Y,SHEN Y Y,HUANG Y.DMDP:A dynamic multi-source default probability prediction framework[J].Data Science and Engineering,2019,4(1):3-13. [16]BABAEV D,SAVCHENKO M,TUZHILIN A,et al.ET-RNN:Applying deep learning to credit loan applications[C]//Procee-dings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining.New York:Association for Computing Machinery,2019:2183-2190. [17]CEHNG D W,NIU Z B,ZHANG Y Y.Contagious chain riskrating for networked-guarantee loans[C]//Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining.New York:Association for Computing Machinery,2020:2715-2723. [18]DAI L Y.Research on enterprise comprehensive risk manage-ment information system based on COSO framework-Taking China Investment Co.,Ltd.as an example[J].Journal of Liao Ning Normal University(Social Science Edition),2012,35(2):185-189. [19]BROMILEY P,MCSHANE M,NAIR A,et al.Enterprise Risk Management:Review,Critique,and Research Directions[J].Long Range Planning,2015,48(4):265-276. [20]LV W D,ZHAO Y,TIAN D,et al.Innovation of Risk Management Theory:From Enterprise Risk Management to Resilient Risk Management[J].Scientific Decision Making,2017,9:1-24. [21]HOLLING C S.Resilience and Stability of Ecological Systems[J].Annual Review of Ecology & Systematics,1973,4(1):1-23. [22]CHANDLER D.Resilience and human security:The post-interventionist paradigm[J].Security Dialogue,2012,43(3):213-229. [23]BOURBEAU P.Resilience and international politics:Premises,debates,agenda[J].International Studies Review,2015,17(3):374-395. [24]LIU H.Resilience Governance:a new agenda for global gover-nance[J].Social Sciences Abroad,2017,40(5):17-25. [25]CAI J M,GUO H,WANG D G.Review on the Resilient City Research Overseas[J].Progress in Geography,2012,31(10):1245-1255. [26]QIU B X.Methods and Principles of Designing Resilient City Based on Complex Adaptive System Theory[J].Urban Studies,2018,25(10):1-3. [27]ZHU Z W,LIU Y Y.Resilience Governance:A New Approach for Risk and Emergency Management[J].Administrative Forum,2020,161(5):83-89. [28]SCHOLTEN K,STEVENSON M,VAN DONK D P.Dealingwith the unpredictable:supply chain resilience[J].International Journal of Operations & Production Management,2020,40(1):1-10. [29]POLYVIOU M,CROXTON K L,KNEMEYER A M.Resilience of medium-sized firms to supply chain disruptions:the role of internal social capital[J].International Journal of Operations & Production Management,2019,40(1):68-91. [30]LI P,ZHU J Z.A Literature Review of Organizational Resilience[J].Foreign Economics & Management,2021,43(3):25-41. [31]PETTIT T J,CROXTON K L,FIKSEL J.Ensuring supplychain resilience:development and implementation of an assessment tool[J].Journal of Business Logistics,2013,34(1):46-76. [32]LIU M F,ZHOU K,RAN Y X.Internal Social Capital of Small and Medium-sized Enterprises and Supply Chain Resilience[J].Journal of WUT(Information & Management Engineering),2020,42(6):553-571. [33]LU Y,ZHANG Y Q,LI B,et al.Managerial individual characteristics and corporate performance:Evidence from a machine learning approach[J].Journal of Management Sciences in China,2020,23(2):120-140. |
[1] | LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311. |
[2] | PAN Zhi-hao, ZENG Bi, LIAO Wen-xiong, WEI Peng-fei, WEN Song. Interactive Attention Graph Convolutional Networks for Aspect-based Sentiment Classification [J]. Computer Science, 2022, 49(3): 294-300. |
[3] | XING Hao, LI Ming. Deepfake Video Detection Based on 3D Convolutional Neural Networks [J]. Computer Science, 2021, 48(7): 86-92. |
[4] | WANG Qi-fa, WANG Zhong-qing, LI Shou-shan, ZHOU Guo-dong. Comment Sentiment Classification Using Cross-attention Mechanism and News Content [J]. Computer Science, 2020, 47(10): 222-227. |
[5] | XU Deng, HUANG Xiao-dong. Fire Images Features Extraction Based on Improved Two-stream Convolution Network [J]. Computer Science, 2019, 46(11): 291-296. |
[6] | ZHANG Jie, WEN Min-hua, Jame LIN, MENG De-long and LU Hao. Implementation and Optimization of Historical VaR on GPU [J]. Computer Science, 2018, 45(5): 291-294. |
[7] | ZHANG Zi-jian,CAO Jing,ZHANG Li and RAO Guo-zheng. Research on Software Process Life Cycle Risk Management Model [J]. Computer Science, 2014, 41(11): 157-161. |
[8] | LU Zhi-gang,PAN Lin,LIU Bao-xu,XU Rong-sheng,JIANG Wen-bao. Study on Performance of Information Security Risk Management [J]. Computer Science, 2010, 37(6): 40-42. |
[9] | DING Jian-jie,HAO Ke-gang,HOU Hong,GUO Xiao-qun. Research of Software Project Risk Management Based on Rough Set Theory [J]. Computer Science, 2010, 37(4): 117-. |
[10] | LU Xin (State Information Center, Beijing 100045,China). [J]. Computer Science, 2008, 35(11): 42-44. |
[11] | PAN Chun-Guang ,CHEN Ying-Wu (College of Information System and Management, National University of Defense Technology, Changsha 410073). [J]. Computer Science, 2007, 34(4): 279-281. |
[12] | . [J]. Computer Science, 2007, 34(3): 264-267. |
|