[1]     Cui Wangyun, Xiao Yanghua, Wang Haixun, Wang Wei. Local Search of Communities in Large Graphs. Proceedings of the 2014 ACM SIGMOD international conference on Management of data. ACM, 2014: 991-1002.

[2]     Song Renchu, Sun Weiwei, Zheng Baihua, Zheng Yu. PRESS A Novel Framework of Trajectory Compression in Road Networks. VLDB, 2014.

[3]     Wang Lu, Xiao Yanghua, Shao Bin, Wang Haixun. How to Partition a Billion-Node Graph. Data Engineering (ICDE), 2014 IEEE 30th International Conference on. IEEE, 2014: 568-579.

[4]     Yang Deqing, Xiao Yanghua, Yangqiu Song, Zhang Junqi, Zhang Kezun, et al. Tag Propagation Based Recommendation across Diverse Social Media. Proceedings of the companion publication of the 23rd international conference on World Wide Web (WWW), 2014: 407-408.

[5]     Yun Xiong, Yangyong Zhu, Philip Yu, Top-k Similarity Join in Heterogeneous Information Networks, IEEE Transactions on Knowledge & Data Engineering, no. 1, pp. 1, PrePrints, doi:10.1109/TKDE.2014.2373385

[6]     Sun Weiwei, Chen Chunan, Zheng Baihua, Chen Chong, Liu Peng. An Air Index for Spatial Query Processing in Road Networks. [J]. IEEE Transactions on Knowledge and Data Engineering (TKDE), 2014: 1.

[7]     Chan Wen, Du Jintao, Yang Weidong, Tang Jinhui, Zhou Xiangdong. Term Selection and Result Reranking for Question Retrieval by Exploiting Hierarchical Classification. Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management (CIKM). ACM, 2014: 141-150.

[8]     Zhang Kezun, Xiao Yanghua, Tong Hanghang, Wang Haixun, Wang Wei. WiiCluster a Platform for Wikipedia Infobox Generation. Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management (CIKM). ACM, 2014: 2033-2035.

[9]     Andrew Chi-Chih Yao, Yunlei Zhao: Privacy-Preserving Authenticated Key-Exchange Over Internet. IEEE Transactions on Information Forensics and Security 9(1): 125-140 (2014)

[10] Du Jintao, Chan Wen, Zhou Xiangdong. A Product Aspects Identification Method by Using Translation-based Language Model. Pattern Recognition (ICPR), 2014 22nd International Conference on. IEEE, 2014: 2790-2795.

[11] Wei Hui, Zuo Qingsong. A Bio-inspired Early-Level Image Representation and Its Contribution to Object Recognition. Pattern Recognition (ICPR), 2014 22nd International Conference on. IEEE, 2014: 4263-4268.

[12] Xiao Jinwen, Wei Hui. Scale-invariant contour segment contextin object detection. Image and Vision Computing, 2014, 32(12): 1055-1066.

[13] Hu Hao, Zhang Mingxi, He Zhengying, Wang Peng, Wang Wei, et al. Topical Presentation of Search Results on Database. Database Systems for Advanced Applications (DASFAA). Springer International Publishing, 2014: 343-360.

[14] Li Qiuhong, Wang Peng, Wang Wei, Hao Hu, Li Zhongsheng. An Efficient K-means Clustering Algorithm on MapReduce. Database Systems for Advanced Applications (DASFAA). Springer International Publishing, 2014: 357-371.

[15] ] He Chu, Tan Zijing, Chen Qing, Sha Chaofeng, Wang Zhihui, et al. Repair Diversification for Functional Dependency Violations. Database Systems for Advanced Applications (DASFAA). Springer International Publishing, 2014: 468-482.

[16] Sun Weiwei, Qin Yongrui, Wu Jingjing, Zheng Baihua, Zhang Zhuoyao, et al. Air Indexing for On-Demand XML Data Broadcast. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(6): 1371-1381.

[17] Liao Zhicheng, Zhu Yangyong. When a Classifier Meets More Data. Procedia Computer Science, 2014, 30: 50-59.

[18] Wei Hui, Dong Zheng. V4 Neural Network Model for Visual Saliency and Discriminative Local Representation of Shapes. Neural Networks (IJCNN), 2014 International Joint Conference on. IEEE, 2014: 3420-3427.

[19] Wei Hui, Lang Bo, Zuo Qingsong. An image representation of infrastructure based on non-classical receptive field. Soft Computing, 2014, 18(1): 109-123.

[20] Wei Hui, Li Qiang, Dong Zheng. Learning and Representing Object Shape Through an Array of Orientation Columns. Neural Networks and Learning Systems, IEEE Transactions on, 2014, 25(7): 1346-1358. SCI: 4.370

[21] Wei Hui, Li Hu. Shape description and recognition method inspired by the primary visual cortex. Cognitive Computation, 2014, 6(2): 164-174.

[22] Wei Hui, Xiao Jinwen. A shape-based object class detection model using local scale-invariant fragment feature. Image Processing (ICIP), 2014 IEEE International Conference on. IEEE, 2014: 5941-5945.

[23] Li Zhigong, Han Weili, Xu Wenyuan. A Large-Scale Empirical Analysis of Chinese Web Passwords. Proc. USENIX Security. 2014: 1-16.

[24] Lin Yun, Xing Zhengchang, Peng Xin, Liu Yang, Sun Jun, et al. Clonepedia Summarizing Code Clones by Common Syntactic Context for Software Maintenance. Software Maintenance and Evolution (ICSME), 2014 IEEE International Conference on. IEEE, 2014: 341-350.

[25] Lin Yun, Xing Zhenchang, Xue Yinxing, Liu Yang, Peng Xin, et al. Detecting Differences across Multiple Instances of Code Clones. Proceedings of the 36th International Conference on Software Engineering. ACM, 2014: 164-174.

[26] Chen Xuxu, Zheng Yu, Chen Yubiao, Jin Qiwei, Sun Weiwei, et al. Indoor air quality monitoring system for smart building. Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 2014: 471-475.

[27] Peng Xin, Xie Yi, Yu Yijun, John Mylopoulos, Zhao Wenyun. Evolving Commitments for Self-Adaptive Socio-Technical Systems. Engineering of Complex Computer Systems (ICECCS), 2014 19th International Conference on. IEEE, 2014: 98-107.

[28] Peng Xin, Muhammad Ali Babar, Christof Ebert. Collaborative Software Development Platforms for Crowdsourcing. [J]. IEEE software, 2014, 31(2): 30-36. SCI: 1.230

[29] Chen Bihuan, Peng Xin, Yu Yijun, Bashar Nuseibeh, Zhao Wenyun. Self-Adaptation through Incremental Generative Model Transformations at Runtime. 36th International Conference on Software Engineering, Hyderabad. ACM/IEEE, 2014.

[30] Chen Bihuan, Peng Xin, Yu Yijun, Zhao Wenyun. Uncertainty Handling in Goal-Driven Self-Optimization-Limiting the Negative Effect on Adaptation. [J]. Journal of Systems and Software, 2014, 90: 114-127. SCI: 1.245

[31] Qian Wenyi, Peng Xin, Chen Bihuan, John Mylopoulos, Wang Huanhuan, et al. Rationalism with a Dose of Empiricism Case-Based Reasoning for Requirements-Driven Self-Adaptation. Requirements Engineering Conference (RE), 2014 IEEE 22nd International. IEEE, 2014: 113-122.

[32] Zhang Yuan, Yang Min, Yang Zhemin, Gu Guofei, Ning Peng, et al. Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps. [J]. IEEE Transaction on Information Forensics and Security, 2014, 9(11): 1828-1842.

[33] Peng Shu, Gu Jun, X.Sean Wang, Rao Weixiong, Yang Min, et al. Cost-Based Optimization of Logical Partitions for a Query Workload in a Hadoop Data Warehouse. Web Technologies and Applications. Springer International Publishing, 2014: 559-567.

[34] Dai Zhuofang, Wang Haojun, Zhang Weihua, Chen Haibo, Zang Binyu. Hydra Efficient Detection of Multiple Concurrency Bugs on Fused CPU-GPU Architecture. Parallel Processing (ICPP), 2014 43rd International Conference on. IEEE, 2014: 331-340.

[35] Fang Zheran, Han Weili, Li Yingjiu. Permission based Android security: Issues and countermeasures. computers & security, 2014, 43: 205-218.

[36] Dai Zhuofang, Zhang Zheng, Wang Haojun, Li Yi, Zhang Weihua. Parallelized Race Detection Based on GPU Architecture. [M]Advanced Computer Architecture. Springer Berlin Heidelberg, 2014: 113-127.

[37] Wei Hui, Tang Xuesong. A Genetic-Algorithm-Based Explicit Description of Object Contour and its Ability to Facilitate Recognition. IEEE Trans Cybern. 2014

[38] Wang Haojun, Min Qinghao, Li Yi, Zhang Weihua. RPSim a Rapid Prototyping Full-system Simulator for SoC Software Development. Networking, Architecture, and Storage (NAS), 2014 9th IEEE International Conference on. IEEE, 2014: 259-267.

[39] He Kejun, Niu Junyu, Sha Chaofeng. DivRec A Framework for Top-N Recommendation with Diversification in E-commerce. Web Technologies and Applications. Springer International Publishing, 2014: 391-400.

[40] Han Weili, Sun Chen, Shen Chenguang, Lei Chang, Shen Sean. Dynamic combination of authentication factors based on quantified risk and benefit. [J]. Security and Communication Networks, 2014, 7(2): 385-396.

[41] Han Weili, Fang Zheran, Laurence Tianruo Yang, Pan Gang, Wu Zhaohui. Collaborative Policy Administration. Parallel and Distributed Systems, IEEE Transactions on, 2014, 25(2): 498-507.

[42] Zhao Weidong, Zhao Xudong. Process Mining from the Organizational Perspective. Foundations of Intelligent Systems. Springer Berlin Heidelberg, 2014: 701-708.

[43] Li Congcong, Sun Jing, Xiong Yun, Zheng Guangyong. An Efficient Drug-Target Interaction Mining Algorithm in Heterogeneous Biological Networks. Trends and Applications in Knowledge Discovery and Data Mining. Springer International Publishing, 2014: 65-76.

[44] Wei Hui, Dong Zheng. Local Image Descriptor Inspired by Visual Cortex. ECAI, 2014, published online with Open Access by IOS Press, 1125-1126.

[45] Zhao Weidong, Liu Xi, Dai Weihui. Simplified Process Model Discovery Based on Role-Oriented Genetic Mining. [J]. The Scientific World Journal, 2014.

[46] Yun Xiong, Yangyong Zhu, Philip S. Yu, Jian Pei. Towards Cohesive Anomaly Mining. The Twenty-Seventh AAAI Conference on Artificial Intelligence (AAAI-13), 2013.

[47] Xue Bai, Yun Xiong, Yangyong Zhu, Hengshu Zhu. Time Series Representation: A Random Shifting Perspective. Web-Age Information Management (WAIM’13), 2013. (The Best Student Paper Award)

[48] Xue Bai, Yun Xiong, Yangyong Zhu, Qi Liu, Zhiyuan Chen. Co-anomaly Event Detection in Multiple Temperature Series. The 2013 International Conference on Knowledge Science, Engineering and Management (KSEM’13), 2013. (The Best Student Paper Award)

[49] Li Xue, Yun Xiong, Yangyong Zhu, Jianfeng Wu, Zhiyuan Chen. Stock Trend Prediction By Classifying Aggregative Web Topic-Opinion. PAKDD, 2013.

[50]   王肇国, 易涵, 张为华. 基于机器学习特性的数据中心能耗优化方法. 软件学报, 2014, 25(7): 1432-1447. SCI: 0.919

[51]  董瑞志, 彭鑫, 赵文耘. 一种基于问题框架的软件密集型系统增量需求问题求解方法. 计算机学报, 2014, 37(3): 551-567. SCI: 0.921

[52] 林日昶, 陈碧欢, 彭鑫, . 支持风险偏好的 Web 服务动态组合方法. 中国科学: 信息科学, 2014 (001): 130-141.