Skip to content
2023
- Liu T, Sun Y, Wu J, Xu X,Han Y,Li C,Gong B. Unsupervised Paraphrasing under Syntax Knowledge[A]. In: Proceedings of the 37th AAAI Conference on Artificial Intelligence[C].WASHINGTON,DC,USA,AAAI,February 7-14,2023.
- 王舰,孙宇清. 可控文本生成技术研究综述[J].中文信息学报,2023.
- Liu T, Sun Y. End-to-end Adversarial Sample Generation for Data Augmentation[A]. In: Findings of the Association for Computational Linguistics: EMNLP 2023[C]. Singapore, December 6-10, 2023.
- Li W, Xie Y, Jiang H, Sun Y, Differentiable Topics Guided New Paper Recommendation[A], In: Proceedings of 2023 International Conference on Neural Information Processing (ICONIP)[C], Changsha, China, November 20-23, 2023.
- Xia T, Wang J, Liu T, Jiang H, Sun Y. Extracting Structural Knowledge for Professional Text Inference[A]. In: Proceedings of the CCF Conference on Computer Supported Cooperative Work and Social Computing[C]. Harbin,Heilongjiang,China, August 18-20, 2023.
- Yang L, Yang T, Yuan F, Sun Y. Professional Text Review Under Limited Sampling Constraints[A]. In: Proceedings of the CCF Conference on Computer Supported Cooperative Work and Social Computing[C]. Harbin,Heilongjiang,China, August 18-20, 2023.
2022
- Ning X, Wu H, Wan L, Sun Y. Collaborative Analysis on Code Structure and Semantics[A]. In: Proceedings of the CCF Conference on Computer Supported Cooperative Work and Social Computing[C].Taiyuan,Shanxi,China, November 25-27, 2022.
- Ning X, Gong B, Wan L, Sun Y. 专业技术文本关键词抽取方法 (Keyword Extraction on Professional Technical Text)[A].In:Proceedings of the 21st Chinese National Conference on Computational Linguistics[C].Nanchang, China, October 14-16, 2022:143-154.
- Xie Y, Li W, Sun Y, Bertino E,Gong B. Subspace Embedding Based New Paper Recommendation[A]. In: Proceedings of the 38th International Conference on Data Engineering (ICDE) [C]. Kuala Lumpur, Malaysia,IEEE,May 9-12, 2022: 1767-1780.
2021
- Xie Y, Sun Y, Bertino E. Learning domain semantics and cross-domain correlations for paper recommendation[A]. In: Proceedings of the 44th International ACM SIGIR Conference on Research and Development in Information Retrieval[C].Virtual Event,Canada ,ACM, July 11-15,2021:706-715.
- Pan W, Liu T, Sun Y, et al. 融合自编码器和对抗训练的中文新词发现方法 (Finding Chinese New Word By Combining Self-encoder and Adversarial Training)[A]In:Proceedings of the 20th Chinese National Conference on Computational Linguistics[C].Huhhot, China,August 13-15,2021:736-746.
- 胡宇,王舰,孙宇清. 一种基于参考规范的专业文本生成方法[J].中文信息学报,2021.
- Pan W, Liu T, Zhang W, et al. Learning New Word Semantics with Conceptual Text[A]. In: Proceedings of the 2021 International Joint Conference on Neural Networks (IJCNN)[C]. Shenzhen, China,IEEE, 18-22 July, 2021: 1-8.
- Liu X, Xie Y, Yang T, et al. Understanding Expert Knowledge for Chinese Essay Grading[A]. In: Proceedings of the CCF Conference on Computer Supported Cooperative Work and Social Computing[C]. Xiangtan,Hunan,China,Springer,November 26-28,2021: 488-501.
- Li W, Xie Y, Sun Y. Joint Embedding Multiple Feature and Rule for Paper Recommendation[A]. In: Proceedings of the CCF Conference on Computer Supported Cooperative Work and Social Computing[C]. Xiangtan,Hunan,China,Springer,November 26-28, 2021: 52-65.
2020
- Xie Y, Wang S, Pan W, et al. Embedding based personalized new paper recommendation[A]. In: Proceedings of the CCF Conference on Computer Supported Cooperative Work and Social Computing[C]. Shenzhen Guangdong, Springer, November 7-9, 2020: 558-570.
- Wu J, Liu T, Sun Y, et al. A Light Transfer Model for Chinese Named Entity Recognition for Specialty Domain[A]. In: Proceedings of the CCF Conference on Computer Supported Cooperative Work and Social Computing[C]. Shenzhen Guangdong, Springer, November 7-9, 2020: 530-541.
- Li X, Dou Z, Sun Y, et al. A sequence embedding method for enzyme optimal condition analysis[J]. BMC bioinformatics,10 November, 2020,21(1):1-19.
- Huang H, Zhong F, Sun Y, et al. An Occlusion‐aware Edge‐Based Method for Monocular 3D Object Tracking using Edge Confidence[J]. Computer Graphics Forum..November 24, 2020, 39(7):399-409.
2019
- Yang H, Liu T, Sun Y, et al. Exploring the interaction effects for temporal spatial behavior prediction[A]. In: Proceedings of the 28th ACM international conference on information and knowledge management[C].Beijing China, ACM, November 3-7, 2019: 2013-2022.
- Li D, Liu T, Pan W, et al. Grading Chinese Answers on Specialty Subjective Questions[A]. In: Proceedings of the CCF Conference on Computer Supported Cooperative Work and Social Computing. Springer[C], Singapore, 2019: 670-682.
- Guan Y, Xie Y, Liu X, et al. Understanding lexical features for Chinese essay grading[A]. In: Proceedings of the CCF Conference on Computer Supported Cooperative Work and Social Computing[C]. Kunming, Yunnan, Springer, August 16-18, 2019: 645-657.
- Li M, Chen L, Liu T, et al. Short Text based Cooperative Classification for Multiple Platforms[A]. In: Proceedings of the 2019 IEEE 23rd International Conference on Computer Supported Cooperative Work in Design (CSCWD) [C].Porto, Portugal, IEEE, May 6-8, 2019: 87-92.
2018
- Yu X, Sun Y, Bertino E, et al. Modeling User Intrinsic Characteristic on Social Media for Identity Linkage[A].In: Proceedings of the 2018 ACM Conference on Supporting Groupwork[C].Sanibel Island,Florida,US,January 7 - 10,2018: 39-50.
- Yu X, Sun Y, Bertino E, et al. Modeling user intrinsic characteristic on social media for identity linkage[J]. ACM Transactions on Social Computing, 2018, 1(3): 1-25.(扩充版)
- Shen L, Sun Y, Li X. Collaboratively Learning Latent Factors and Correlations for New Paper Influence Predication[A]. In: Proceedings of the 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design ((CSCWD)) [C].Nanjing, China, IEEE,May 9-11, 2018: 4-9.
2017
2016
- 谢翌, 孙宇清, 沈雷. 复杂社会网络中主题驱动的社团演化[J]. 小型微型计算机系统, 2016, 37(11): 2402-2408.
- Xie Y, Sun Y, Shen L. Predicating paper influence in academic network[A]. In: Proceedings of the 2016 IEEE 20th International Conference on Computer Supported Cooperative Work in Design (CSCWD) [C]. IEEE, 2016: 539-544.
- Cao L, Sun Y, Wang S, et al. Detecting Malicious Behavior and Collusion for Online Rating System[A]. In: Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA [C]. IEEE, 2016: 1046-1053.
- Sun Y, Xu H, Bertino E, et al. User preference based link inference for social network[A]. In: Proceedings of the 2016 IEEE International Conference on Web Services (ICWS) [C]. IEEE, 2016: 188-195.
- Zhu X, Sun Y. Differential privacy for collaborative filtering recommender algorithm[A]. In: Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics [C]. 2016: 9-16.
- Sun Y, Xu H, Bertino E, et al. A data-driven evaluation for insider threats[J]. Data Science and Engineering, 2016, 1(2): 73-85.
- Sun Y, Sun H, Cheng R. Fast and Semantic Measurements on Collaborative Tagging Quality[A]. In: Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining[C]. Springer, Cham, 2016: 363-375.
2015
- Xu H, Zhou D, Sun Y, et al. Quality based dynamic incentive tagging[J]. Distributed and Parallel Databases, 2015, 33(1): 69-93.
- Xu H, Sun Y. User Preference Mining and Privacy Policy Recommendation for Social Networks[J]. Journal of Internet Technology, 2015, 16(6): 1145-1155.
- Xu H, Sun Y. Identify user variants based on user behavior on social media[A]. In: Proceedings of the 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC) [C]. IEEE, 2015: 1-8.
2014
- Ji D, Sun Y, Li D. An improved random walk based community detection algorithm[J]. International Journal of Multimedia and Ubiquitous Engineering, 2014, 9(5): 131-142.
- 周丹丹, 李威伟, 孙宇清. 博弈论隐私保护方法研究综述[J]. 小型微型计算机系统, 2015, 36(12): 2696-2700.
- Li W, Sun Y. Privacy Perceptive Wireless Service Game Model[A]. In: Proceedings of the 11th IEEE International Conference on Ubiquitous Intelligence and Computing (UIC 2014)[C]. IEEE, 2014: 366-371.
- Liu Cao, Yuqing Sun, Haoran Xu. Historical Trajectories Based Location Privacy Protection Query[A]. In: Proceedings of the 11th IEEE International Conference on Ubiquitous Intelligence and Computing (UIC 2014) [C]. IEEE,2014:228-235.
2013
- Han Z, Sun Y, Wang Y. Audit recommendation for privacy protection in personal health record systems[A]. In: Proceedings of the 2013 IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD)[C]. IEEE, 2013: 533-538.
- 刘诗海, 孙宇清, 刘古月. 面向业务特征的自适应虚拟机迁移带宽分配算法[J]. 计算机学报, 2013, 36(9): 1816-1825.
- Xu H, Sun Y. Toward Collective Privacy Using Coordinative Path Planning[A]. In: Proceedings of the Pervasive Computing and the Networked World-Joint International Conference (ICPCA/SWS 2013)[C]. Springer, 2014: 698-710.
- Sun Y, Xu H, Cheng R. Reynold Cheng. Privacy Preserving Path Recommendation for Moving User on Location Based Service[A]. In: Proceedings of the10th IEEE International Conference on Ubiquitous Intelligence and Computing(UIC 2013)[C], IEEE, 2013: 33-40.
2012
- 王媛, 孙宇清, 高荣瑞. 支持动态协作的委托授权意愿协商[J]. 系统工程理论与实践, 2012, 32(12): 2781-2788.
- Yu H, Sun Y, Hu J. An ontology based privacy protection model for third-party platform[A]. In: Proceedings of the International Conference on Active Media Technology[C]. Springer, Berlin, Heidelberg, 2012: 369-376.
- 王媛,孙宇清,马乐乐.面向社会网络的个性化隐私策略定义与实施[J].通讯学报,2012年9月,第33卷第Z1期,pp:239-249.
- Wang Z, Yao Q, Sun Y. The research of process mining assessment used in business intelligence[A]. In: Proceedings of the 2012 IEEE/ACIS 11th International Conference on Computer and Information Science[C]. IEEE, 2012: 179-183.
- Yao Q, Sun Y. Applying Case-Based Reasoning Technique for Customized Management[A]. In: Proceedings of the 2012 Second International Conference on Intelligent System Design and Engineering Application[C]. IEEE, 2012: 783-786.
- Sun Y, Farwick M, et al. Context-Aware Task Allocation for Quick Collaborative Responses[J]. Chinese Journal of Electronics Chinese Journal of Electronics, 21(3): 395-402.
- 姜文广, 孙宇清. 面向第三方服务平台的隐私保护[J]. 兰州大学学报: 自然科学版, 2012, 48(4): 85-90.
- Sun Y, Chiu D K W, Gong B, et al. Scheduling mobile collaborating workforce for multiple urgent events[J]. Journal of network and computer applications, 2012, 35(1): 156-163.
2010
- Sun Y, Wang Q, Li N, et al. On the complexity of authorization in RBAC under qualification and security constraints[J]. IEEE Transactions on Dependable and Secure Computing, 2010, 8(6): 883-897.
- Zhao L, Yao Q. The use of ADM for SOA design[A].In: Proceedings of 2010 International Conference on Educational and Information Technology[C]. IEEE, 2010, 2: V2-302-V2-306.
- Sun Y, Ji G. Privacy preserving in personalized mobile marketing[A].In:Proceedings of International Conference on Active Media Technology[C]. Springer, Berlin, Heidelberg, 2010: 538-545.
- Sun Y, Chiu D K W. Context-aware scheduling of workforce for multiple urgent events[A].In:Proceedings of The 2010 14th International Conference on Computer Supported Cooperative Work in Design[C]. IEEE, 2010: 629-634.
- 杨勇,孙宇清,周丽. FSP: 一种基于风险的安全策略[J].计算机工程与应用(ISSN 1002-8331),2010年5月,46(13):82-86.
2009
- 姚青,洪余柯,王海洋.基于过程代数的可变业务流程建模方法的研究[J].计算机集成制造系统,2009年9月,15(9):1721-1730.
- Sun Y, Gong B, Meng X, et al. Specification and enforcement of flexible security policy for active cooperation[J]. Information Sciences, 2009, 179(15): 2629-2642.
- Zhang Y, Liu S, Jiao Y, et al. A Case Study on Service Oriented Enterprise Interoperability in Automobile Supply Chain[M].Service Intelligence and Service Science: Evolutionary Technologies and Challenges. IGI Global, 2011: 201-215.
- Pan P, Sun Y Q, Li Q, et al. The top-k skyline query in pervasive computing environments[A].In:Proceedings of 2009 Joint Conferences on Pervasive Computing (JCPC)[C]. IEEE, 2009: 335-338.
- Zhou L, Sun Y. Web service provider selection under QoS and security constraints[A].In:Proceedings of 2009 Joint Conferences on Pervasive Computing (JCPC)[C]. IEEE, 2009: 273-278.
- Yao Q, Sun Y, Wang H. A New Business Process Model in Web Service Environment[J]. Journal of Computational Information Systems, February 2009, Vol.5(1):379-386.
- Sun Y, Farwick M, Chiu D K W. Constraint-based Authorization Management for Mobile Collaboration[A].In:Proceedings of The Fourth IEEE Congress on Services (SERVICES 2009)[C], July 6-10, 2009, Los Angeles, CA, USA, pp:22-29.
- Sun Y, Huang J Z, Meng X. Integrating constraints to support legally flexible business processes[J]. Information Systems Frontiers, 2011, 13(2): 171-189.
- 高荣瑞,孙宇清. 基于双边意愿的委托授权协商模型[CJ].计算机科学,2009年8月,36(9):171-175.
2008
- Sun Y, Gong B, Meng X, et al. Active Authorization Management for Multi-domain Cooperation[A].In:Proceedings of 2007 11th International Conference on Computer Supported Cooperative Work in Design[C]. IEEE, 2007: 162-167.
- Sun Y, Pan P, Leung H, et al. Ontology based hybrid access control for automatic interoperation[A].In:Proceedings of International Conference on Autonomic and Trusted Computing[C]. Springer, Berlin, Heidelberg, 2007: 323-332.
- 刘波,孙宇清.一种基于规则的委托约束授权模型[A].中国通信学会第五届学术年会[C],2008年2月,南京,中国,pp:358-363.
- Pan P, Li Q, Sun Y Q. Rank queries in probabilistic data integration systems for digital library federation[A].In:Proceedings of 2008 IEEE International Symposium on IT in Medicine and Education[C]. IEEE, 2008: 336-342.
- Pan P, Li Q, Sun Y Q, et al. Top-K Query Answering for Probabilistic Data Integration Systems in Pervasive Computing Environment[A].In:Proceedings of 2008 Third International Conference on Pervasive Computing and Applications[C]. IEEE, 2008, 1: 274-279.
- Chen C, Sun Y, Pan P. Similarity analysis on heterogeneous security policy[A].In:Proceedings of The Third International Conference on Pervasive Computing and Applications (ICPCA 2008)[C], Alexandria, Egypt. 2008: 680-685.
- Paci F, Ferrini R, Sun Y, et al. Authorization and User Failure Resiliency for WS-BPEL business processes[A].In:Proceedings of International Conference on Service-Oriented Computing[C]. Springer, Berlin, Heidelberg, 2008: 116-131.