Skip to content
2024
- Wang Jian, Sun Yuqing, Liang Yanjie, Li xin, Gong Bin. Iteratively Calibrating Prompts for Unsupervised Diverse Opinion Summarization. Proceedings of the 27th European Conference on Artificial Intelligence.Santiago de Compostela, Spain, October 19-24,2024. pp. 3939-3946.
- Yang Leiwen, Zheng Wei, Yuan Feng, and Sun Yuqing. An Inference Method for Professional Texts with Computational Expressions under Few-shot Scenarios.CCF Conference on Computer Supported Cooperative Work and Social Computing.Hohhot, Inner Mongolia, China, July 12-14, 2024.
- Zheng Luyang, Jiang Hailan, Wang Jian, Sun Yuqing. Integrating Prior Scenario Knowledge for Composition Review Generation.International Conference on Knowledge Science, Engineering and Management. Singapore: Springer Nature Singapore,2024.pp. 298-309.
- Han Yuchen, Liu Tianyuan, Sun Yuqing, Huang Tian Wu Huiqian Wu Shengjun. Exploring Word Composition Knowledge in Language Usages. International Conference on Knowledge Science, Engineering and Management. Singapore: Springer Nature Singapore,2024. pp.61-72.
- Li Cheng, WuJiaqi,Yuan Feng, Sun Yuqing. Promoting Named Entity Recognition with External Discriminator. 2024 IEEE 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE, 2024. pp. 2626-2631.
- Zheng Wei, Sun Yuqing, Zhang Yexin, Gong Bin. Integrating User Rules into Neural Text Inference. 2024 IEEE 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE, 2024, pp. 2846-2851
- 王舰,孙宇清. 可控文本生成技术研究综述.中文信息学报,2024.pp.38(10):1-23.
2023
- Liu Tianyuan, Sun Yuqing, Wu Jiaqi, Xu Xi,Han Yuchen,Li Cheng,Gong Bin. Unsupervised Paraphrasing under Syntax Knowledge. The 37th AAAI Conference on Artificial Intelligence.WASHINGTON,DC,USA,AAAI,February,7-14,2023.pp.13273-13281
- Liu Tianyuan, Sun Yuqing. End-to-end Adversarial Sample Generation for Data Augmentation[A]. In: Findings of the Association for Computational Linguistics: EMNLP 2023. Singapore, December 6-10, 2023. pp.11359-11368
- Li Wen, Xie Yi, Jiang Hailan, Sun Yuqing, Differentiable Topics Guided New Paper Recommendation, In: 2023 International Conference on Neural Information Processing (ICONIP), Changsha, China, November 20-23, 2023.pp.44-56
- Xia Tianyu, Wang Jian, Liu Tianyuan, Jiang Hailong, Sun Yuqing. Extracting Structural Knowledge for Professional Text Inference.The CCF Conference on Computer Supported Cooperative Work and Social Computing. Harbin,Heilongjiang,China, August 18-20, 2023.pp.334-347.
- Yang Leiwen, Yang Tao, Yuan Feng, Sun Yuqing. Professional Text Review Under Limited Sampling Constraints. In: The CCF Conference on Computer Supported Cooperative Work and Social Computing. Harbin,Heilongjiang,China, August 18-20, 2023.pp.287-295
2022
- Ning Xiangdong, Wu Huiqian, Wan Lin, Sun Yuqing. Collaborative Analysis on Code Structure and Semantics. In:The CCF Conference on Computer Supported Cooperative Work and Social Computing.Taiyuan,Shanxi,China, November 25-27, 2022.pp. 77-85.
- Ning Xiangdong, Gong Bin, Wan Lin, Sun Yuqing. 专业技术文本关键词抽取方法 (Keyword Extraction on Professional Technical Text).In:Proceedings of the 21st Chinese National Conference on Computational Linguistics.Nanchang, China, October 14-16,2022. pp. 143-154.
- Xie Yi, Li Wen, Sun Yuqing, Bertino E,Gong Bin. Subspace Embedding Based New Paper Recommendation. In: Proceedings of the 38th International Conference on Data Engineering (ICDE). Kuala Lumpur, Malaysia,IEEE,May 9-12, 2022. pp. 1767-1780.
2021
- Xie Yi, Sun Yuqing, Bertino E. Learning domain semantics and cross-domain correlations for paper recommendation. In: The 44th International ACM SIGIR Conference on Research and Development in Information Retrieval.Virtual Event,Canada ,ACM, July 11-15,2021. pp. 706-715.
- Pan W, Liu T, Sun Y, et al. 融合自编码器和对抗训练的中文新词发现方法 (Finding Chinese New Word By Combining Self-encoder and Adversarial Training)[A]In:Proceedings of the 20th Chinese National Conference on Computational Linguistics[C].Huhhot, China,August 13-15,2021:pp.736-746.
- 胡宇,王舰,孙宇清. 一种基于参考规范的专业文本生成方法[J].中文信息学报,2021.pp.152-163.
- Pan W, Liu T, Zhang W, et al. Learning New Word Semantics with Conceptual Text[A]. In: Proceedings of the 2021 International Joint Conference on Neural Networks (IJCNN)[C]. Shenzhen, China,IEEE, 18-22 July, 2021:pp. 1-8.
- Liu X, Xie Y, Yang T, et al. Understanding Expert Knowledge for Chinese Essay Grading[A]. In: Proceedings of the CCF Conference on Computer Supported Cooperative Work and Social Computing[C]. Xiangtan,Hunan,China,Springer,November 26-28,2021.pp.488-501.
- Li W, Xie Y, Sun Y. Joint Embedding Multiple Feature and Rule for Paper Recommendation[A]. In: Proceedings of the CCF Conference on Computer Supported Cooperative Work and Social Computing[C]. Xiangtan,Hunan,China,Springer,November 26-28, 2021:pp. 52-65.
2020
- Xie Y, Wang S, Pan W, et al. Embedding based personalized new paper recommendation[A]. In: Proceedings of the CCF Conference on Computer Supported Cooperative Work and Social Computing[C]. Shenzhen Guangdong, Springer, November 7-9, 2020.pp. 558-570.
- Wu J, Liu T, Sun Y, et al. A Light Transfer Model for Chinese Named Entity Recognition for Specialty Domain[A]. In: Proceedings of the CCF Conference on Computer Supported Cooperative Work and Social Computing[C]. Shenzhen Guangdong, Springer, November 7-9, 2020.pp.530-541.
- Li X, Dou Z, Sun Y, et al. A sequence embedding method for enzyme optimal condition analysis[J]. BMC bioinformatics,10 November, 2020,pp. 21(1):1-19.
- Huang H, Zhong F, Sun Y, et al. An Occlusion‐aware Edge‐Based Method for Monocular 3D Object Tracking using Edge Confidence[J]. Computer Graphics Forum..November 24, 2020, pp. 399-409.
2019
- Yang H, Liu T, Sun Y, et al. Exploring the interaction effects for temporal spatial behavior prediction[A]. In: Proceedings of the 28th ACM international conference on information and knowledge management[C].Beijing China, ACM, November 3-7, 2019: 2013-2022.
- Li D, Liu T, Pan W, et al. Grading Chinese Answers on Specialty Subjective Questions[A]. In: Proceedings of the CCF Conference on Computer Supported Cooperative Work and Social Computing. Springer[C], Singapore, 2019: 670-682.
- Guan Y, Xie Y, Liu X, et al. Understanding lexical features for Chinese essay grading[A]. In: Proceedings of the CCF Conference on Computer Supported Cooperative Work and Social Computing[C]. Kunming, Yunnan, Springer, August 16-18, 2019: 645-657.
- Li M, Chen L, Liu T, et al. Short Text based Cooperative Classification for Multiple Platforms[A]. In: Proceedings of the 2019 IEEE 23rd International Conference on Computer Supported Cooperative Work in Design (CSCWD) [C].Porto, Portugal, IEEE, May 6-8, 2019: 87-92.
2018
- Yu X, Sun Y, Bertino E, et al. Modeling User Intrinsic Characteristic on Social Media for Identity Linkage[A].In: Proceedings of the 2018 ACM Conference on Supporting Groupwork[C].Sanibel Island,Florida,US,January 7 - 10,2018: 39-50.
- Yu X, Sun Y, Bertino E, et al. Modeling user intrinsic characteristic on social media for identity linkage[J]. ACM Transactions on Social Computing, 2018, 1(3): 1-25.(扩充版)
- Shen L, Sun Y, Li X. Collaboratively Learning Latent Factors and Correlations for New Paper Influence Predication[A]. In: Proceedings of the 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design ((CSCWD)) [C].Nanjing, China, IEEE,May 9-11, 2018: 4-9.
2017
2016
- 谢翌, 孙宇清, 沈雷. 复杂社会网络中主题驱动的社团演化[J]. 小型微型计算机系统, 2016, 37(11): 2402-2408.
- Xie Y, Sun Y, Shen L. Predicating paper influence in academic network[A]. In: Proceedings of the 2016 IEEE 20th International Conference on Computer Supported Cooperative Work in Design (CSCWD) [C]. IEEE, 2016: 539-544.
- Cao L, Sun Y, Wang S, et al. Detecting Malicious Behavior and Collusion for Online Rating System[A]. In: Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA [C]. IEEE, 2016: 1046-1053.
- Sun Y, Xu H, Bertino E, et al. User preference based link inference for social network[A]. In: Proceedings of the 2016 IEEE International Conference on Web Services (ICWS) [C]. IEEE, 2016: 188-195.
- Zhu X, Sun Y. Differential privacy for collaborative filtering recommender algorithm[A]. In: Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics [C]. 2016: 9-16.
- Sun Y, Xu H, Bertino E, et al. A data-driven evaluation for insider threats[J]. Data Science and Engineering, 2016, 1(2): 73-85.
- Sun Y, Sun H, Cheng R. Fast and Semantic Measurements on Collaborative Tagging Quality[A]. In: Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining[C]. Springer, Cham, 2016: 363-375.
2015
- Xu H, Zhou D, Sun Y, et al. Quality based dynamic incentive tagging[J]. Distributed and Parallel Databases, 2015, 33(1): 69-93.
- Xu H, Sun Y. User Preference Mining and Privacy Policy Recommendation for Social Networks[J]. Journal of Internet Technology, 2015, 16(6): 1145-1155.
- Xu H, Sun Y. Identify user variants based on user behavior on social media[A]. In: Proceedings of the 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC) [C]. IEEE, 2015: 1-8.
2014
- Ji D, Sun Y, Li D. An improved random walk based community detection algorithm[J]. International Journal of Multimedia and Ubiquitous Engineering, 2014, 9(5): 131-142.
- 周丹丹, 李威伟, 孙宇清. 博弈论隐私保护方法研究综述[J]. 小型微型计算机系统, 2015, 36(12): 2696-2700.
- Li W, Sun Y. Privacy Perceptive Wireless Service Game Model[A]. In: Proceedings of the 11th IEEE International Conference on Ubiquitous Intelligence and Computing (UIC 2014)[C]. IEEE, 2014: 366-371.
- Liu Cao, Yuqing Sun, Haoran Xu. Historical Trajectories Based Location Privacy Protection Query[A]. In: Proceedings of the 11th IEEE International Conference on Ubiquitous Intelligence and Computing (UIC 2014) [C]. IEEE,2014:228-235.
2013
- Han Z, Sun Y, Wang Y. Audit recommendation for privacy protection in personal health record systems[A]. In: Proceedings of the 2013 IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD)[C]. IEEE, 2013: 533-538.
- 刘诗海, 孙宇清, 刘古月. 面向业务特征的自适应虚拟机迁移带宽分配算法[J]. 计算机学报, 2013, 36(9): 1816-1825.
- Xu H, Sun Y. Toward Collective Privacy Using Coordinative Path Planning[A]. In: Proceedings of the Pervasive Computing and the Networked World-Joint International Conference (ICPCA/SWS 2013)[C]. Springer, 2014: 698-710.
- Sun Y, Xu H, Cheng R. Reynold Cheng. Privacy Preserving Path Recommendation for Moving User on Location Based Service[A]. In: Proceedings of the10th IEEE International Conference on Ubiquitous Intelligence and Computing(UIC 2013)[C], IEEE, 2013: 33-40.
2012
- 王媛, 孙宇清, 高荣瑞. 支持动态协作的委托授权意愿协商[J]. 系统工程理论与实践, 2012, 32(12): 2781-2788.
- Yu H, Sun Y, Hu J. An ontology based privacy protection model for third-party platform[A]. In: Proceedings of the International Conference on Active Media Technology[C]. Springer, Berlin, Heidelberg, 2012: 369-376.
- 王媛,孙宇清,马乐乐.面向社会网络的个性化隐私策略定义与实施[J].通讯学报,2012年9月,第33卷第Z1期,pp:239-249.
- Wang Z, Yao Q, Sun Y. The research of process mining assessment used in business intelligence[A]. In: Proceedings of the 2012 IEEE/ACIS 11th International Conference on Computer and Information Science[C]. IEEE, 2012: 179-183.
- Yao Q, Sun Y. Applying Case-Based Reasoning Technique for Customized Management[A]. In: Proceedings of the 2012 Second International Conference on Intelligent System Design and Engineering Application[C]. IEEE, 2012: 783-786.
- Sun Y, Farwick M, et al. Context-Aware Task Allocation for Quick Collaborative Responses[J]. Chinese Journal of Electronics Chinese Journal of Electronics, 21(3): 395-402.
- 姜文广, 孙宇清. 面向第三方服务平台的隐私保护[J]. 兰州大学学报: 自然科学版, 2012, 48(4): 85-90.
- Sun Y, Chiu D K W, Gong B, et al. Scheduling mobile collaborating workforce for multiple urgent events[J]. Journal of network and computer applications, 2012, 35(1): 156-163.
2010
- Sun Y, Wang Q, Li N, et al. On the complexity of authorization in RBAC under qualification and security constraints[J]. IEEE Transactions on Dependable and Secure Computing, 2010, 8(6): 883-897.
- Zhao L, Yao Q. The use of ADM for SOA design[A].In: Proceedings of 2010 International Conference on Educational and Information Technology[C]. IEEE, 2010, 2: V2-302-V2-306.
- Sun Y, Ji G. Privacy preserving in personalized mobile marketing[A].In:Proceedings of International Conference on Active Media Technology[C]. Springer, Berlin, Heidelberg, 2010: 538-545.
- Sun Y, Chiu D K W. Context-aware scheduling of workforce for multiple urgent events[A].In:Proceedings of The 2010 14th International Conference on Computer Supported Cooperative Work in Design[C]. IEEE, 2010: 629-634.
- 杨勇,孙宇清,周丽. FSP: 一种基于风险的安全策略[J].计算机工程与应用(ISSN 1002-8331),2010年5月,46(13):82-86.
2009
- 姚青,洪余柯,王海洋.基于过程代数的可变业务流程建模方法的研究[J].计算机集成制造系统,2009年9月,15(9):1721-1730.
- Sun Y, Gong B, Meng X, et al. Specification and enforcement of flexible security policy for active cooperation[J]. Information Sciences, 2009, 179(15): 2629-2642.
- Zhang Y, Liu S, Jiao Y, et al. A Case Study on Service Oriented Enterprise Interoperability in Automobile Supply Chain[M].Service Intelligence and Service Science: Evolutionary Technologies and Challenges. IGI Global, 2011: 201-215.
- Pan P, Sun Y Q, Li Q, et al. The top-k skyline query in pervasive computing environments[A].In:Proceedings of 2009 Joint Conferences on Pervasive Computing (JCPC)[C]. IEEE, 2009: 335-338.
- Zhou L, Sun Y. Web service provider selection under QoS and security constraints[A].In:Proceedings of 2009 Joint Conferences on Pervasive Computing (JCPC)[C]. IEEE, 2009: 273-278.
- Yao Q, Sun Y, Wang H. A New Business Process Model in Web Service Environment[J]. Journal of Computational Information Systems, February 2009, Vol.5(1):379-386.
- Sun Y, Farwick M, Chiu D K W. Constraint-based Authorization Management for Mobile Collaboration[A].In:Proceedings of The Fourth IEEE Congress on Services (SERVICES 2009)[C], July 6-10, 2009, Los Angeles, CA, USA, pp:22-29.
- Sun Y, Huang J Z, Meng X. Integrating constraints to support legally flexible business processes[J]. Information Systems Frontiers, 2011, 13(2): 171-189.
- 高荣瑞,孙宇清. 基于双边意愿的委托授权协商模型[CJ].计算机科学,2009年8月,36(9):171-175.
2008
- Sun Y, Gong B, Meng X, et al. Active Authorization Management for Multi-domain Cooperation[A].In:Proceedings of 2007 11th International Conference on Computer Supported Cooperative Work in Design[C]. IEEE, 2007: 162-167.
- Sun Y, Pan P, Leung H, et al. Ontology based hybrid access control for automatic interoperation[A].In:Proceedings of International Conference on Autonomic and Trusted Computing[C]. Springer, Berlin, Heidelberg, 2007: 323-332.
- 刘波,孙宇清.一种基于规则的委托约束授权模型[A].中国通信学会第五届学术年会[C],2008年2月,南京,中国,pp:358-363.
- Pan P, Li Q, Sun Y Q. Rank queries in probabilistic data integration systems for digital library federation[A].In:Proceedings of 2008 IEEE International Symposium on IT in Medicine and Education[C]. IEEE, 2008: 336-342.
- Pan P, Li Q, Sun Y Q, et al. Top-K Query Answering for Probabilistic Data Integration Systems in Pervasive Computing Environment[A].In:Proceedings of 2008 Third International Conference on Pervasive Computing and Applications[C]. IEEE, 2008, 1: 274-279.
- Chen C, Sun Y, Pan P. Similarity analysis on heterogeneous security policy[A].In:Proceedings of The Third International Conference on Pervasive Computing and Applications (ICPCA 2008)[C], Alexandria, Egypt. 2008: 680-685.
- Paci F, Ferrini R, Sun Y, et al. Authorization and User Failure Resiliency for WS-BPEL business processes[A].In:Proceedings of International Conference on Service-Oriented Computing[C]. Springer, Berlin, Heidelberg, 2008: 116-131.