学术论文

Year 2021

1.Xudong Zhu, Joseph M. Plasek, Chunlei Tang, Wasim Al-Assad, Zhikun Zhang, Yun Xiong, Liqin Wang,Sharmitha Yerneni, Carlos Ortega, Min-Jeoung Kang, Li Zhou, David W. Bates and Patricia C. Dykes. Embedding, aligning and reconstructing clinical notes to explore sepsis. BMC research notes, 2021, 14(1), 1-6. 

2.Xiaosu Wang, Yun Xiong, Hao Niu, Jingwen Yue, Yangyong Zhu and Philip S. Yu (2021).Improving Chinese Character Representation with Formation Graph Attention Network.CIKM.


Year 2020

1.Yi Xie, Yun Xiong, Yangyong Zhu. SAST-GNN:A Self-Attention based Spatio-Temporal Graph Neural Network for Traffic Prediction[C]. DASFAA, 2020.(CCF B类)

2.Yun Xiong, Shaofeng Xu, Keyao Rong, Xinyue Liu, Xiangnan Kong, Shanshan Li, Philip Yu, Yangyong Zhu. Code2Text: Dual Attention Syntax Annotation Networks for Structure-aware Code Translation. DASFAA, 2020.

3.Huidi Chen, Yun Xiong, Changdong Wang, Yangyong Zhu, Wei Wang. SpEC: Sparse Embedding-based Community Detection in Attributed Graphs. DASFAA, 2020.

4.Tao Lei, Yun Xiong, Peng Tian, Yangyong Zhu. MinSR: Multi-level Interests Network for Session-based Recommendation. DASFAA, 2020.

5.Qingqin Wang,Yun Xiong,Yangyong Zhu,Philip S. Yu. KASR: Knowledge-Aware Sequential Recommendation. The Asia Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint International Conference on Web and Big Data (APWeb-WAIM) 2020.

6.Yao Zhang, Yun Xiong, Xiangnan Kong, Xinyue Liu, Yangyong Zhu. Multi-task Attributed Graphical Lasso. The Asia Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint International Conference on Web and Big Data (APWeb-WAIM), 2020.

7.Yao Zhang, Yun Xiong, Yun Ye, Tengfei Liu, Weiqiang Wang, Yangyong Zhu, Philip S. Yu. TITLE: SEAL: Learning Heuristics for Community Detection with Generative Adversarial Networks AUTHORS. ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), 2020.

8.Tianyi Tao, Yun Xiong, Guosen Wang, Yao Zhang, Peng Tian, Yangyong Zhu. IASR: an Item-level Attentive Social Recommendation Model for Personalized Ranking. APWeb-WAIM 2020: The 4th APWeb-WAIM International Joint Conference on Web and Big Data.

9.徐攸, 王晓萍, 熊贇. 基于角色的网络表征学习. 计算机工程,2020.

10.陶天一,王清钦,付聿炜,熊贇,俞枫,苑博. 基于知识图谱的金融新闻个性化推荐算法. 计算机工程,2020.

11.郭梦洁,熊贇. 基于 GAN 的异质网络表示学习的疾病关联预测. 计算机工程,2020.

12.朱扬勇, & 熊贇. (2020). 数据的经济活动及其所需要的权利. 大数据, 6(6), 0.

13.朱扬勇, & 熊贇. 数据跨境监管初探. 大数据, 7(1), 0.

14.Jia, X., Xiong, Y., Zhang, J., Zhang, Y., & Zhu, Y. (2020, December). Few-shot Radiology Report Generation for Rare Diseases. In 2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM) (pp. 601-608). IEEE.

15.Tao, T., Xiong, Y., Wang, G., Zhang, Y., Tian, P., & Zhu, Y. (2020, August). IASR: An Item-Level Attentive Social Recommendation Model for Personalized Ranking. In Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint International Conference on Web and Big Data (pp. 394-408). Springer, Cham.


Year 2019

12.Yun Xiong, Yizhou Zhang, Xiangnan Kong, Huidi Chen,Yangyong Zhu. GraphInception: Convolutional Neural Networks for Collective Classification in Heterogeneous Information Networks[J]. TKDE. 2019. (CCF A)

13.Yao Zhang, Yun Xiong, Xiangnan Kong, Zhuang Niu, Yangyong Zhu. IGE+: A Framework for Learning Node Embeddings in Interaction Graphs[J]. TKDE. 2019. (CCF A)

14.Yun Xiong, Yao Zhang, Weiwang, Philip S. Yu, Yangyong Zhu. DynGraphGAN: Dynamic Graph Embedding via Generative Adversarial Networks[C]. DASFAA. 2019,11446: 536-552.(CCF B)

15.Xiancheng Xie, Yun Xiong, Philip S. Yu, Kangan Li, Suhua Zhang, Yangyong Zhu. Attention-based Abnormal-Aware Fusion Network for Radiology Report Generation[C]. DASFAA. 2019, 11448:448-452. (CCF B)

16.Shaofeng Xu, Yun Xiong, Xiangnan Kong, Yangyong Zhu. Net2Text: An Edge Labelling Language Model for Personalized Review Generation[C]. DASFAA. 2019, 11446:484-500. (CCF B)

17.Yizhu Jiao, Yun Xiong, Jiawei Zhang, Yangyong Zhu. Collective Link Prediction Oriented Network Embedding with Hierarchical Graph Attention[C]. CIKM. 2019: 419-428. (CCF B)

18.Xiancheng Xie,Yun Xiong,Philip S Yu,Yangyong Zhu. EHR Coding with Multi-scale Feature Attention and Structured Knowledge Graph Propagation[C]. CIKM. 2019: 649-658. (CCF B)

19.Yao Zhang, Yun Xiong, Lu Ruan, Xiangnan Kong, Yangyong Zhu. NetMerger: Predicting Cross-network Links in Merged Heterogeneous Networks[C]. WI 2019. 2019: 21-28. (CCF C)

20.Qingqin Wang,Yun Xiong,Yangyong Zhu. GAN-based Deep Matrix Factorization for Recommendation Systems[C]. ICDS. 2019, 7: 37650-37663. (CCF C)

21.Yuwei Fu, Yun Xiong, Philip S. Yu, Tianyi Tao, Yangyong Zhu. Metapath Enhanced Graph Attention Encoder for HINs Representation Learning[C]. IEEE BigDate. 2019. (CCF C)

22.叶雅珍,刘国华,朱扬勇. 数据资产相关概念综述[J]. 计算机科学. 2019, 46(11): 20-24. (国内核心)

23.万美含,熊贇,朱扬勇. 基于异质网络层次注意力机制的基因功能预测[J]. 计算机工程. 2019: 1-8. (国内核心)

24.徐少峰,潘文韬,熊贇,朱扬勇. 基于结构感知双编码器的代码注释自动生成[J]. 计算机工程. 2019: 1-7. (国内核心)

25.符汉杰,熊贇,朱扬勇. TLP:一个动态网络中时序链路预测算法[J]. 计算机工程. 2019: 1-8. (国内核心)

26.阮璐, 熊贇. 基于网络表示学习的miRNA功能相似性研究[J]. 计算机工程. 2019, 45(02):154-159. (国内核心)

Year 2018

27.Yun Xiong, Yizhou Zhang, Xiangnan Kong, Yangyong Zhu. NetCycle+: A Framework for Collective Evolution Inference in Dynamic Heterogeneous Networks[J]. IEEE Transactions on Knowledge and Data Engineering, 2018, 30(8), 1547-1560.CCF A

28.Zhang Y, Xiong Y, Kong X, et al. Deep Collective Classification in Heterogeneous Information Networks [C]. WWW, 2018: 399-408.CCF A

29.朱扬勇,熊贇,廖志成,等.数据自治开放模式[J].大数据,20184(2)3-14. (国内核心)

30.沈逸,姚旭,朱扬勇.数据自治开放与治理模式创新[J].大数据,20184(2)14-20. (国内核心)

31.熊贇,朱扬勇.面向数据自治开放的数据盒模型[J].大数据,20184(2)21-30. (国内核心)

32.吴毅坚,陈士壮,葛佳丽,等.数据自治开放的软件开发和运行环境[J].大数据,20184(2)31-41. (国内核心)

33.王智慧,周旭晨,朱云.数据自治开放模式下的隐私保护[J].大数据,20184(2)42-49. (国内核心)

34.黄霖,黎源,汪星辰,等.数据自治开放的加密技术挑战[J].大数据,20184(2)50-62. (国内核心)

35.陈德华,潘乔,王梅,等.数据自治开放应用平台设计与实践[J].大数据,20184(2)63-71. (国内核心)

Year 2017

36.Jiang Q, Peng X, Wang H, et al. Understanding systematic and collaborative code changes by mining evolutionary trajectory patterns[J]. Journal of Software: Evolution & Process, 2017, 29(3): 1840-1861.CCF B

37.Lin Y, Meng G, Xue Y, et al. Mining implicit design templates for actionable code reuse[C]. ASE, 2017:394-404.CCF A

38.Qian W, Peng X, Yu Y, et al.O2O service composition with social collaboration [C]. ASE, 2017: 451-461.CCF A

39.Sun G, Xiong Y, Zhu Y. How the passengers flow in complex metro networks ? [C]. International Conference on Scientific and Statistical Database Management (SSDBM). 2017:23.CCF C

40.Wang J, Peng X, Xing Z, et al. Contextual Recommendation of Relevant Program Elements in an Interactive Feature Location Process[C]. SCAM, 2017: 61-70.CCF C

41.Wang X, Zhang W, Wang Z, et al. Eunomia: Scaling concurrent search trees under contention using HTM[C]. ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming (PPoPP), 2017:385-399.CCF A

42.Wei H, Yang C, Yu Q. Efficient graph-based search for object detection[J]. Information Sciences, 2017, 385-386:395-414.CCF B

43.Yu Q, Wei H, Yang C. Local part chamfer matching for shape-based object detection[J]. Pattern Recognition, 2017, 65:82-96.CCF B

44.Zhang W, Ji X, Song B, et al. VarCatcher: A framework for tackling performance variability of parallel workloads on multi-core[J]. IEEE Transactions on Parallel & Distributed Systems, 2017, 28(4):1215-1228.CCF A

45.Zhang Y, Xiong Y, Liu X, et al. Meta-path graphical lasso for learning heterogeneous connectivities[C]. SIAM International Conference on Data Mining (SDM), 2017: .642-650.CCF B

46.Zhang Y, Xiong Y, Kong X, et al. Learning Node Embeddings in Interaction Graphs[C]// ACM on Conference on Information and Knowledge Management. ACM, 2017:397-406.CCF B

47.Zheng J, Peng X, Yang J, et al. CollaDroid: Automatic augmentation of android application with lightweight interactive collaboration[C]. ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW), 2017:2462-2474.CCF A

48.朱扬勇,熊贇.大数据的若干基础研究方向[J].大数据,20173(2):104-114. (国内核心)

Year 2016

49.Chen B, Peng X, Liu Y, et al. Architecture-based behavioral adaptation with generated alternatives and relaxed constraints[J]. IEEE Transactions on Services Computing, 2016, PP(99):1-1.CCF B

50.Chen J, Zhang Q, Huang X. Incorporate group information to enhance network embedding[C]. ACM International on Conference on Information and Knowledge Management (CIKM), 2016:1901-1904.CCF B

51.Chen J, Zhang Q, Liu P, et al. Discourse relations detection via a mixed Generative-Discriminative framework[C]. AAAI Conference on Artificial Intelligence (AAAI), 2016:2921-2927.CCF A

52.Chen J, Zhang Q, Liu P, et al. Implicit discourse relation detection via a deep architecture with gated relevance network[C]. Annual Meeting of the Association for Computational Linguistics (ACL), 2016:1726-1735.CCF A

53.Chi M, Plaza A, Benediktsson J, et al. Big data for remote sensing: challenges and opportunities[J]. Proceedings of the IEEE, 2016, 104(11):2207-2219.CCF A

54.Cui W, Xiao Y, Wang W. KBQA: an online template based question answering system over freebase[C]. International Joint Conference on Artificial Intelligence (IJCAI), 2016:4240-4241.CCF A

55.Cui W, Zhou X, Lin H, et al. Verb pattern: a probabilistic semantic representation on verbs[C]. AAAI Conference on Artificial Intelligence (AAAI), 2016:2587-2593.CCF A

56.Fang Z, Han W, Li D, et al. revDroid: Code analysis of the side effects after dynamic permission revocation of android Apps[C]. ACM on Asia Conference on Computer and Communications Security (ASIA CCS), 2016:747-758.CCF A

57.Gong Y, Zhang Q. Hashtag recommendation using attention-based convolutional neural network[C]. International Joint Conference on Artificial Intelligence (IJCAI), 2016:2782-2788.CCF A

58.Han W, Li Z, Yuan L, et al. Regional patterns and vulnerability analysis of Chinese web passwords[J]. IEEE Transactions on Information Forensics & Security, 2016, 11(2):258-272.CCF A

59.He C, Tan Z, Chen Q, et al. Repair diversification: A new approach for data repairing[J]. Information Sciences, 2016, s 346–347:90-105.CCF B

60.He X, Wang X, Li D, et al. Semi-homogenous generalization: Improving homogenous generalization for privacy preservation in cloud computing [J]. 2016, Journal of computer science and technology (JCST). 2016, 31(6): 1124–1135.CCF B

61.Lei J, Bai R, Guo L, et al. Towards a scalable framework for artifact-centric business process management systems[C]. International Conference on Web Information Systems Engineering (WISE), 2016:309-323.CCF C

62.Liao M, Liu X, Gao X, et al. iSim: An efficient integrated similarity based collaborative filtering approach for trust prediction in Service-Oriented social networks[C]. International Conference on Service-Oriented Computing (ICSOC). 2016:501-516.CCF B

63.Lin Y, Peng X, Cai Y, et al. Interactive and guided architectural refactoring with search-based recommendation[C]. ACM SIGSOFT International Symposium on Foundations of Software Engineering (STOC), 2016: 535-546.CCF A

64.Ma J, Sun L, Wang H, et al. Supervised anomaly detection in uncertain pseudoperiodic data streams[C]. ACM Transaction on Internet Technology (TOIT), 2016: 1-20.CCF B

65.Ni M, Zhang Y, Han W, et al. An empirical study on user access control in online social networks[C]. ACM on Symposium on Access Control MODELS and Technologies (SACMAT), 2016:13-23.CCF C

66.Lu Y, Li Y, Song B, et al. Parallelizing image feature extraction algorithms on multi-core platforms[J]. Journal of Parallel and Distributed Computing, 2016, 92(C): 1-14.CCF B

67.Lu Y, Wang X, Zhang W, et al. Performance analysis of multimedia retrieval workloads running on multicores[J]. IEEE Transactions on Parallel & Distributed Systems, 2016, 27(11):3323-3337.CCF A

68.Peng X, Gu J, Tan T H, et al. Crowd Service: serving the individuals through mobile crowdsourcing and service composition[C]. IEEE/ACM International Conference on Automated Software Engineering (ASE), 2016:214-219.CCF A

69.Qian W, Peng X, Wang H, et al. MobiGoal: flexible achievement of personal goals for mobile users[J]. IEEE Transactions on Services Computing, 2016, PP(99):1-1.CCF B

70.Sun X, Wang H, Xiao Y, et al. Syntactic Parsing of Web Queries[C]. Conference on Empirical Methods in Natural Language Processing (EMNLP). 2016:1787-1796.CCF B

71.Tang Y, Ma P, Kong B, et al. ESAP: A novel approach for Cross-Platform event dissemination trend analysis between social network and search engine[C]. International Conference on Web Information Systems Engineering (WISE), 2016:489-504.CCF C

72.Wang T, Zhao Y. Secure Dynamic SSE via access indistinguishable storage[C]. ACM on Asia Conference on Computer and Communications Security (AsiaCCS), 2016:535-546.CCF A

73.Wang X, Ji X, Lu Y, et al. Understanding the architectural characteristics of EDA algorithms[C]. International Conference on Parallel Processing (ICPP), 2016:139-148.CCF B

74.Wei H, Dai Z, Zuo Q. A ganglion-cell-based primary image representation method and its contribution to object recognition[J]. Connection Science, 2016, 28:311-331.CCF C

75.Wei H, Yu Q, Yang C. Shape-based object recognition via evidence accumulation inference[J]. Pattern Recognition Letters, 2016, 77:42-49.CCF C

76.Wu H, Mao J, Sun W, et al. Probabilistic robust route recovery with spatio-temporal dynamics[C]. ACM Knowledge Discovery and Data Mining (SIGKDD), 2016:1915-1924.CCF A

77.Wu H, Sun W, Zheng B. Is only one gps position sufficient to locate you to the road network accurately?[C]. ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp), 2016:740-751.CCF A

78.Xu B, Zhang Y, Liang J, et al. Cross-Lingual type inference[C]. International Conference on Database Systems for Advanced Applications (DASFAA), 2016:447-462.CCF B

79.Yan Y, Tan Z, Gao X, et al. STH-Bass: A spatial-temporal heterogeneous bass model to predict single-tweet popularity[C]. Database Systems for Advanced Applications (DASFAA), 2016:18-22.CCF B

80.Yao C, Yung M, Zhao Y. Concurrent knowledge extraction in Public-Key models[J]. Journal of Cryptology, 2016, 29(1):156-219.CCF A

81.Zhang Q, Gong Y, Wu J, et al. Retweet prediction with attention-based deep neural network[C]. ACM International on Conference on Information and Knowledge Management (CIKM), 2016:75-84.CCF B

82.Zhang Q, Qian J, Guo Y, et al. Generating abbreviations for Chinese named entities using recurrent neural network with dynamic dictionary[C]. Conference on Empirical Methods in Natural Language Processing (EMNLP). 2016:721-730.CCF B

83.Zhang Q, Wang Y, Gong Y, et al. Keyphrase extraction using deep recurrent neural networks on twitter[C]. Conference on Empirical Methods in Natural Language Processing (EMNLP), 2016:836-845.CCF B

84.Zhang W, Wang H, Lu Y, et al. A loosely-coupled full-system multicore simulation framework[J]. IEEE Transactions on Parallel & Distributed Systems, 2016, 27(6):1566-1578.CCF A

85.Zhang W, Yu S, Wang H, et al. Hardware support for concurrent detection of multiple concurrency bugs on fused CPU-GPU architectures[J]. IEEE Transactions on Computers, 2016, 65(10):3083-3095.CCF A

86.Zhang Y, Cao J, Gao X, et al. FR-Index: A Multi-dimensional indexing framework for Switch-Centric data centers[C]. Database and Expert Systems Applications (DEXA). 2016:326-334.CCF C

87.Zhang Y, Xiong Y, Kong X, et al. NetCycle: Collective evolution inference in heterogeneous information networks[C]. ACM Knowledge Discovery and Data Mining (SIGKDD), 2016:1365-1374.CCF A

88.Zhao W, Liu H, Dai W, et al. An entropy-based clustering ensemble method to support resource allocation in business process management[J]. Knowledge & Information Systems, 2016, 48(2):305-330.CCF B

89.Zhao W, Wu R, Liu H. Paper recommendation based on the knowledge gap between a researcher's background knowledge and research target[J]. Information Processing & Management, 2016, 52(5):976-988.CCF B

90.Zhao Y. Identity-Concealed authenticated encryption and key exchange[C]. ACM Sigsac Conference on Computer and Communications Security (CCS), 2016:1464-1479.CCF A

Year 2015

91.Chen H, Li Y, Shen J, et al. Online service search based on multi-dimensional semantic service model[C]. International Conference on Computer Supported Cooperative Work in Design (CSCWD), 2015: 171-175.CCF C

92.Chen Q, Tan Z, He C, et al. Repairing functional dependency violations in distributed data[C]. Database Systems for Advanced Applications (DASFAA), 2015:441-457.CCF B

93.Gong Y, Zhang Q, Huang X. Hashtag recommendation using dirichlet process mixture models incorporating types of hashtags[C]. Conference on Empirical Methods in Natural Language Processing (EMNLP). 2015:401-410. CCF B

94.Gong Y, Zhang Q, Sun X, et al. Who Will You @? [J]. ACM International on Conference on Information and Knowledge Management (CIKM), 2015:533-542.CCF B

95.Guo Z, Han W, Liu L, et al. SPA: Inviting your friends to help set android apps[C]. ACM Symposium on Access Control MODELS and Technologies (SACMAT), 2015:221-231.CCF C

96.Han W, Zhang Y, Guo Z, et al. Fine-grained business data confidentiality control in cross-organizational tracking[C]. ACM Symposium on Access Control MODELS and Technologies (SACMAT), 2015:135-145.CCF C

97.Jiang Q, Peng X, Wang H, et al. Summarizing evolutionary trajectory by grouping and aggregating relevant code changes[C]. IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), 2015:361-370.CCF B

98.Jiang S, Shen L, Peng X, et al. Understanding developers' natural language queries with interactive clarification[C]. IEEE, International Conference on Software Analysis, Evolution and Reengineering (SANER), 2015:13-22.CCF B

99.Li H, Zhao X, Xing Z, et al. amAssist: In-IDE ambient search of online programming resources[C]. IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), 2015:390-398.CCF B

100.Li Y, Yang W, Dan W, et al. Keyword-Aware dominant route search for various user preferences[C]. Database Systems for Advanced Applications (DASFAA), 2015: 207-222.CCF B

101.Lin Y, Peng X, Xing Z, et al. Clone-based and interactive recommendation for modifying pasted code[C]. Joint Meeting on Foundations of Software Engineering (FSE), 2015:520-531.CCF A

102.Liu P, Qiu X, Huang X. Learning context-sensitive word embeddings with neural tensor skip-gram model[C]. International Conference on Artificial Intelligence (IJCAI), 2015:1284-1290.CCF A

103.Liu P, Sun W, Zhang J, et al. An automaton-based index scheme supporting twig queries for on-demand XML data broadcast[J]. Journal of Parallel & Distributed Computing, 2015, 86(C):82-97.CCF B

104.Lu Y, Wang X, Zhang W, et al. Characterizing multi-media retrieval applications[C]. International Conference on Parallel Processing (ICPP), 2015:270-279.CCF B

105.Nan Y, Yang M, Yang Z, et al. UIPicker: User-Input privacy identification in mobile applications[C]. USENIX Security Symposium (USENIX Security), 2015:993-1008.CCF A

106.Qian W, Peng X, Chen B, et al. Rationalism with a dose of empiricism: combining goal reasoning and case-based reasoning for self-adaptive software systems[J]. Requirements Engineering, 2015, 20(3):233-252.CCF B

107.Qiu X, Huang X. Convolutional neural tensor network architecture for community-based question answering[C]. International Conference on Artificial Intelligence (IJCAI), 2015:1305-1311.CCF A

108.Shan Z, Wu H, Sun W, et al. COBWEB: a robust map update system using GPS trajectories[C]. ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp), 2015:927-937.CCF A

109.Sun J, Xiong Y, Zhu Y, et al. Multi-source information fusion for personalized restaurant recommendation[C]. International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR), 2015:983-986.CCF A

110.Sun W, Chen C, Zheng B, et al. Fast optimal aggregate point search for a merged set on road networks[J]. Information Sciences, 2015, 310(C):52-68.CCF B

111.Sun W, Chen C, Zhu L. On efficient aggregate nearest neighbor query processing in road networks[J]. Journal of Computer Science and Technology, 2015, 30(4):2243-2248.CCF B

112.Sun X, Xiao Y, Wang H, et al. On conceptual labeling of a bag of words[C]. International Conference on Artificial Intelligence (IJCAI), 2015:1326-1332.CCF A

113.Wei H. A bio-inspired method for object representation[C]. International Joint Conference on Neural Networks (IJCNN), 2015:1-8.CCF C

114.Wei H, Cheng W. A shape recognition method based on syntax-automaton[C]. IEEE, International Conference on TOOLS with Artificial Intelligence (ICTAI), 2015:784-790.CCF C

115.Wei H, Tang X, Liu H. A genetic algorithm(GA)-based method for the combinatorial optimization in contour formation[J]. Appllied Intelligence, 2015, 43:112-131.CCF C

116.Wei H, Zuo Q. A biologically inspired neurocomputing circuit for image representation[J]. Neurocomputing, 2015, 164:96-111.CCF C

117.Weng D, Wang Y, Gong M, et al. DERF: Distinctive efficient robust features from the biological modeling of the P ganglion cells[J]. IEEE Transactions on image processing, 2015, 24(8):2287-2302.CCF A

118.Weng J, Zhao Y, Deng R H, et al. A note on the security of KHL scheme[J]. Theoretical Computer Science, 2015, 602:1-6.CCF B

119.Xie Z, Jiang L, Ye T, et al. A synthetic minority oversampling method based on local densities in Low-Dimensional space for imbalanced learning[C]. Database Systems for Advanced Applications (DASFAA), 2015:3-18.CCF B

120.Wu Q, Yang W, Chen Z, et al. Research of semantic understanding on target region of interest for fuzzy image[J]. Engineering Applications of Artificial Intelligence, 2015, 37:135-114.CCF C

121.Wu H, Tu C, Sun W, et al. GLUE: a Parameter-Tuning-Free map updating system[C]. ACM International on Conference on Information and Knowledge Management (CIKM), 2015:683-692.CCF B

122.Xie Z, Jiang L, Ye T, et al. MPTM: A topic model for multi-part documents[C]. Database Systems for Advanced Applications (DASFAA), 2015:154-168.CCF B

123.Xiong Y, Zhu Y, Yu P. Top-k similarity join in heterogeneous information networks[J]. IEEE Transactions on Knowledge & Data Engineering, 2015, 27(6):1710-1723.CCF A

124.Yang D, He J, Qin H, et al. A graph-based recommendation across heterogeneous Domains[J]. ACM International on Conference on Information and Knowledge Management (CIKM), 2015:463-472.CCF B

125.Yang D, Xiao Y, Song Y, et al. Semantic-based recommendation across heterogeneous domains[C]. IEEE International Conference on Data Mining (ICDM), 2015:1075-1080.CCF B

126.Yang D, Xiao Y, Tong H, et al. An integrated tag recommendation algorithm towards weibo user profiling[C]. Database Systems for Advanced Applications (DASFAA), 2015:353-373.CCF B

127.Yao W, He J, Wang H, et al. Collaborative topic ranking: leveraging item meta-data for sparsity reduction[C]. AAAI Conference on Artificial Intelligence (AAAI), 2015:374-380.CCF A

128.Ye L, Qian K, Zhang L. S-PDH: A CPS service contract framework for composition[C]. International Conference on Service-Oriented Computing (ICSOC), 2015:79-90.CCF B

129.Zhang W, Li J, Li Y, et al. Multilevel phase analysis[J]. ACM Transactions on Embedded Computing Systems, 2015, 14(2):1-29.CCF B

130.Zhou J, Zhu S, Huang X, et al. Enhancing time series clustering by incorporating multiple distance measures with semi-supervised learning[J]. Journal of Computer Science and Technology, 2015, 30(4):859-873.CCF B

131.佘玉轩,熊赟.Medas:一个基于Medline的生物医学文献分析系统[J].计算机研究与发展,2015(1):102-106.(国内核心)

132.熊赟,朱扬勇.特异群组挖掘:框架与应用[J].大数据,2015(2):66-77.

133.杨丽琴,康国胜,郭立鹏,等.一种适用于多样性环境的业务流程挖掘方法[J].软件学报,201526(3):550-561.(国内核心)

134.朱扬勇,熊赟.大数据是数据、技术,还是应用[J].大数据,20151(1):71-81.

135.张一舟,曾剑平,孙婧,等.OMisy:一个面向股吧数据的观点挖掘系统[J].计算机研究与发展,2015(1):123-128.(国内核心)

Year 2014

136.Chen B, Peng X, Yu Y, et al. Requirements-Driven Self-Optimization of Composite Services using Feedback Control[J]. IEEE Transactions on Services Computing, 2014, 2298866:1-14.CCF B

137.Chan W, Du J, Yang W, et al. Term selection and result reranking for question retrieval by exploiting hierarchical classification[C]. ACM International Conference on Conference on Information and Knowledge Management (CIKM), 2014:141-150.CCF B

138.Chen B, Peng X, Yu Y, et al. Self-adaptation through incremental generative model transformations at runtime[C]. International Conference on Software Engineering (ICSE), 2014:676-687.CCF A

139.Chen B, Peng X, Yu Y, et al. Uncertainty handling in goal-driven self-optimization - Limiting the negative effect on adaptation[J]. Journal of Systems & Software, 2014, 90(1):114-127.CCF B

140.Cui W, Xiao Y, Wang H, et al. Local search of communities in large graphs[C]. ACM Conference on Management of Data (SIGMOD), 2014: 991-1002.CCF A

141.Dai Z, Wang H, Zhang W, et al. Hydra: efficient detection of multiple concurrency bugs on fused CPU-GPU architecture[C]. International Conference on Parallel Processing (ICPP), 2014:331-340.CCF B

142.Du J, Chan W, Zhou X. A product aspects identification method by using translation-based language model[C]. International Conference on Pattern Recognition (ICPR), 2014:2790-2795.CCF C

143.Fang Z, Han W, Li Y. Permission based Android security: Issues and countermeasures[J]. Computers & Security, 2014, 43(6):205-218.CCF B

144.Han W, Fang Z, Chen W, et al. Collaborative Policy Administration[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(2): 498-507.CCF A

145.He C, Tan Z, Chen Q, et al. Repair diversification for functional dependency violations[C]. Database Systems for Advanced Applications (DASFAA), 2014:468-482.CCF B

146.Hu H, Zhang M, He Z, et al. Topical presentation of search results on database[C]. Database Systems for Advanced Applications (DASFAA), 2014:343-360.CCF B

147.Li C, Sun J, Xiong Y, et al. An efficient Drug-Target interaction mining algorithm in heterogeneous biological networks[C]. Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD), 2014:65-76.CCF C

148.Li Q, Wang P, Wang W, et al. An efficient K-means clustering algorithm on mapReduce[C]. Database Systems for Advanced Applications (DASFAA), 2014:357-371.CCF B

149.Li Z, Han W, Xu W. A large-scale empirical analysis of Chinese web passwords[C]. Usenix Security Symposium (USENIX Security), 2014:559-574.CCF A

150.Lin Y, Xing Z, Peng X, et al. Clonepedia: summarizing code clones by common syntactic context for software maintenance[C]. IEEE International Conference on Software Maintenance and Evolution (ICSME), 2014:341-350.CCF B

151.Lin Y, Xing Z, Xue Y, et al. Detecting differences across multiple instances of code clones[C]. International Conference on Software Engineering (ICSE), 2014:164-174.CCF A

152.Peng X, Xie Y, Yu Y, et al. Evolving commitments for self-adaptive socio-technical systems[C]. IEEE International Conference on Engineering of Complex Computer Systems (ICECCS), 2014:98-107.CCF C

153.Qian W, Peng X, Chen B, et al. Rationalism with a dose of empiricism: Case-based reasoning for requirements-driven self-adaptation[C]. IEEE International Requirements Engineering Conference (RE), 2014:113-122.CCF B

154.Sun W, Qin Y, Wu J, et al. Air Indexing for On-Demand XML Data Broadcast[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(6):1371-1381.CCF A

155.Sun Y, Ding X, Lindtner S, et al. Being senior and ICT:a study of seniors using ICT in China[C]. Sigchi Conference on Human Factors in Computing Systems (CHI), 2014:3933-3942.CCF A

156.Wang L, Xiao Y, Shao B, et al. How to partition a billion-node graph[C]. IEEE International Conference on Data Engineering (ICDE), 2014:568-579.CCF A

157.Wei H, Dong Z. Local image descriptor inspired by visual cortex[J]. European Conference on Artificial Intelligence (ECAI), 2014, 263:1125-1126.CCF B

158.Wei H, Dong Z. V4 neural network model for visual saliency and discriminative local representation of shapes[C]. International Joint Conference on Neural Networks (IJCNN), 2014:3420-3427.CCF C

159.Wei H, Lang B, Zuo Q S. An image representation of infrastructure based on non-classical receptive field[J]. Soft Computing, 2014, 18(1):109-123.CCF C

160.Wei H, Tang X. A genetic-algorithm-based explicit description of object contour and its ability to facilitate recognition[J]. IEEE Transactions on Cybernetics, 2014, 45(11):2558-2571.CCF B

161.Wei H, Zuo Q. A bio-inspired early-level image representation and its contribution to object recognition[C]. International Conference on Pattern Recognition (ICPR), 2014:4263-4268.CCF C

162.Xiao J, Wei H. Scale-invariant contour segment context in object detection[J]. Image and Vision Computing, 2014, 32:1055-1066.CCF C

163.Yang D, Xiao Y, Song Y, et al. Tag propagation based recommendation across diverse social media[C]. International Conference on World Wide Web (WWW), 2014:407-408.CCF A

164.Zhang K, Xiao Y, Tong H, et al. WiiCluster: a platform for wikipedia infobox generation[C]. ACM International Conference on Conference on Information and Knowledge Management (CIKM), 2014:2033-2035.CCF B

165.Zhang Y, Yang M, Yang Z, et al. Permission use analysis for vettingundesirable behaviors in Android Apps[J]. IEEE Transactions on Information Forensics & Security, 2014, 9(11):1828-1842.CCF A

166.董瑞志,彭鑫,赵文耘.一种基于问题框架的软件密集型系统增量需求问题求解方法[J].计算机学报,201437(03):551-567.国内核心

167.林日昶,陈碧欢,彭鑫,等.支持风险偏好的Web服务动态组合方法[J].中国科学:信息科学,2014441:130-141.国内核心

Year 2010

168.汤春蕾,董家麒,戴东波,等.一种序列模式的相似性查询算法[J].计算机研究与发展,2011(z2):510-517.国内核心

169.戴东波,熊赟,朱扬勇.基于参考集索引的高效序列相似性查找算法[J].软件学报,2010,(4:718-731.国内核心

170.朱扬勇,戴东波,熊赟.序列数据相似性查询技术研究综述[J].计算机研究与发展,2010,(2:264-276.国内核心

171.戴东波,汤春蕾,邱伯仁,等.一种优化多重过滤的序列查询算法[J].计算机研究与发展,2010,(10:1785-1796.国内核心

172.戴东波,汤春蕾,熊赟.基于整体和局部相似性的序列聚类算法[J].软件学报,2010,(4:702-717.国内核心

Year 2009

173.孙圣力,李金玖,朱扬勇.高效处理分布式数据流上skyline持续查询算法[J].软件学报,2009,(7:1839-1853.国内核心

友情链接
联系我们
地址: 中国 上海市浦东新区张衡路825号复旦大学张江校区计算机楼
邮编: 201203
电话: +86-21-51355518 / +86-21-51355100
传真: +86-21-51355100
E-mail: dataology@fudan.edu.cn