Jianling Sun

Orcid: 0000-0001-8799-6020

According to our database1, Jianling Sun authored at least 86 papers between 1997 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
PEMT: Multi-Task Correlation Guided Mixture-of-Experts Enables Parameter-Efficient Transfer Learning.
CoRR, 2024

Advancing Graph Representation Learning with Large Language Models: A Comprehensive Survey of Techniques.
CoRR, 2024

JumpCoder: Go Beyond Autoregressive Coder via Online Modification.
CoRR, 2024

2023
CatSQL: Towards Real World Natural Language to SQL Applications.
Proc. VLDB Endow., 2023

PolarDB-IMCI: A Cloud-Native HTAP Database System at Alibaba.
Proc. ACM Manag. Data, 2023

ULTRA-DP: Unifying Graph Pre-training with Multi-task Graph Dual Prompt.
CoRR, 2023

Calibration of Time-Series Forecasting Transformers: Detecting and Adapting Context-Driven Distribution Shift.
CoRR, 2023

Identifiability Matters: Revealing the Hidden Recoverable Condition in Unbiased Learning to Rank.
CoRR, 2023

HINormer: Representation Learning On Heterogeneous Information Networks with Graph Transformer.
Proceedings of the ACM Web Conference 2023, 2023

ConvMHSA-SCVD: Enhancing Smart Contract Vulnerability Detection through a Knowledge-Driven and Data-Driven Framework.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, 2023

Enhancing Online Index Tuning with a Learned Tuning Diagnostic.
Proceedings of the Database and Expert Systems Applications, 2023

2022
SA-LSM : Optimize Data Layout for LSM-tree Based Storage using Survival Analysis.
Proc. VLDB Endow., 2022

On Size-Oriented Long-Tailed Graph Classification of Graph Neural Networks.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

Noncontact Respiration Detection of Multiple Closely Positioned Subjects with Difference Beamforming.
Proceedings of the 2022 IEEE Radio and Wireless Symposium, 2022

LBD: Decouple Relevance and Observation for Individual-Level Unbiased Learning to Rank.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Scalar is Not Enough: Vectorization-based Unbiased Learning to Rank.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022

2021
A deep multi-task representation learning method for time series classification and retrieval.
Inf. Sci., 2021

KGAMD: an API-misuse detector driven by fine-grained API-constraint knowledge graph.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

GPU-Accelerated Graph Label Propagation for Real-Time Fraud Detection.
Proceedings of the SIGMOD '21: International Conference on Management of Data, 2021

Adapting Interactional Observation Embedding for Counterfactual Learning to Rank.
Proceedings of the SIGIR '21: The 44th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2021

Discrete Listwise Collaborative Filtering for Fast Recommendation.
Proceedings of the 2021 SIAM International Conference on Data Mining, 2021

DyCuckoo: Dynamic Hash Tables on GPUs.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021

2020
A Machine Learning Framework for Data Ingestion in Document Images.
CoRR, 2020

Learning Transferrable Parameters for Long-tailed Sequential User Behavior Modeling.
Proceedings of the KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2020

API-Misuse Detection Driven by Fine-Grained API-Constraint Knowledge Graph.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Demystify official API usage directives with crowdsourced API misuse scenarios, erroneous code examples and patches.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

FPGA-Accelerated Compactions for LSM-based Key-Value Store.
Proceedings of the 18th USENIX Conference on File and Storage Technologies, 2020

MCEN: Bridging Cross-Modal Gap between Cooking Recipes and Dish Images with Latent Variable Model.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

2019
基于NVM的无日志哈希表 (Logless Hash Table Based on NVM).
计算机科学, 2019

Compositional Coding for Collaborative Filtering.
Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval, 2019

Robust Factorization Machine: A Doubly Capped Norms Minimization.
Proceedings of the 2019 SIAM International Conference on Data Mining, 2019

Discovering, Explaining and Summarizing Controversial Discussions in Community Q&A Sites.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Online Collaborative Filtering with Implicit Feedback.
Proceedings of the Database Systems for Advanced Applications, 2019

Reference Network for Neural Machine Translation.
Proceedings of the 57th Conference of the Association for Computational Linguistics, 2019

Discrete Social Recommendation.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Combined classifier for cross-project defect prediction: an extended empirical study.
Frontiers Comput. Sci., 2018

Fusing multi-abstraction vector space models for concern localization.
Empir. Softw. Eng., 2018

Recommending frequently encountered bugs.
Proceedings of the 26th Conference on Program Comprehension, 2018

Unified Locally Linear Classifiers With Diversity-Promoting Anchor Points.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Collaborative topic regression for online recommender systems: an online and Bayesian approach.
Mach. Learn., 2017

High-Impact Bug Report Identification with Imbalanced Learning Strategies.
J. Comput. Sci. Technol., 2017

TLEL: A two-layer ensemble learning approach for just-in-time defect prediction.
Inf. Softw. Technol., 2017

Detecting similar repositories on GitHub.
Proceedings of the IEEE 24th International Conference on Software Analysis, 2017

Locally Linear Factorization Machines.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

2016
What Security Questions Do Developers Ask? A Large-Scale Study of Stack Overflow Posts.
J. Comput. Sci. Technol., 2016

D-Ocean: an unstructured data management system for data ocean environment.
Frontiers Comput. Sci., 2016

Online Bayesian Collaborative Topic Regression.
CoRR, 2016

Combining Word Embedding with Information Retrieval to Recommend Similar Bug Reports.
Proceedings of the 27th IEEE International Symposium on Software Reliability Engineering, 2016

Inferring Links between Concerns and Methods with Multi-abstraction Vector Space Model.
Proceedings of the 2016 IEEE International Conference on Software Maintenance and Evolution, 2016

Condensing Class Diagrams With Minimal Manual Labeling Cost.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Automated Identification of High Impact Bug Reports Leveraging Imbalanced Learning Strategies.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Online Adaptive Passive-Aggressive Methods for Non-Negative Matrix Factorization and Its Applications.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

Online ARIMA Algorithms for Time Series Prediction.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
Piecewise statistic approximation based similarity measure for time series.
Knowl. Based Syst., 2015

Multi-Factor Duplicate Question Detection in Stack Overflow.
J. Comput. Sci. Technol., 2015

Deep Learning for Just-in-Time Defect Prediction.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015

Combining Software Metrics and Text Features for Vulnerable File Prediction.
Proceedings of the 20th International Conference on Engineering of Complex Computer Systems, 2015

Piecewise Factorization for Time Series Classification.
Proceedings of the Knowledge Discovery, Knowledge Engineering and Knowledge Management, 2015

Piecewise Chebyshev Factorization based Nearest Neighbour Classification for Time Series.
Proceedings of the KDIR 2015, 2015

An Empirical Study of Classifier Combination for Cross-Project Defect Prediction.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Personalized Trip Recommendation with POI Availability and Uncertain Traveling Time.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

RAISE: A Whole Process Modeling Method for Unstructured Data Management.
Proceedings of the 2015 IEEE International Conference on Multimedia Big Data, BigMM 2015, 2015

Are Features Equally Representative? A Feature-Centric Recommendation.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
Latent Tunnel Based Information Propagation in Microblog Networks.
Proceedings of the Social Network Analysis - Community Detection and Evolution, 2014

Latent Factor Transition for Dynamic Collaborative Filtering.
Proceedings of the 2014 SIAM International Conference on Data Mining, 2014

BOAT: an experimental platform for researchers to comparatively and reproducibly evaluate bug localization techniques.
Proceedings of the 36th International Conference on Software Engineering, 2014

Content + Attributes: A Latent Factor Model for Recommending Scientific Papers in Heterogeneous Academic Networks.
Proceedings of the Advances in Information Retrieval, 2014

2013
A Comparative Study of Supervised Learning Algorithms for Re-opened Bug Prediction.
Proceedings of the 17th European Conference on Software Maintenance and Reengineering, 2013

Information propagation in microblog networks.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Large scale microblog mining using distributed MB-LDA.
Proceedings of the 21st World Wide Web Conference, 2012

2011
An analytical performance model of MapReduce.
Proceedings of the 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, 2011

2010
Minimal role mining method for Web service composition.
J. Zhejiang Univ. Sci. C, 2010

Inconsistency Resolution Method for RBAC Based Interoperation.
IEICE Trans. Inf. Syst., 2010

Towards a Quality-Oriented Real-Time Web Crawler.
Proceedings of the Web Information Systems and Mining - International Conference, 2010

Performance Optimization for Composite Services in Multiple Networks Environment.
Proceedings of the 6th World Congress on Services, 2010

2009
A Field-Oriented Approach to Web Form Validation for Database-Isolated Rule.
Proceedings of the IEEE International Conference on Systems, 2009

Selective Regression Test for Access Control System Employing RBAC.
Proceedings of the Advances in Information Security and Assurance, 2009

Preprocessing the noise in legacy user permission assignment data for role mining - An industrial practice.
Proceedings of the 25th IEEE International Conference on Software Maintenance (ICSM 2009), 2009

2008
Security Violation Detection for RBAC Based Interoperation in Distributed Environment.
IEICE Trans. Inf. Syst., 2008

2007
Experience Report: Reengineering Standalone System into the Service-Partition Distributed Environment.
Proceedings of the 23rd IEEE International Conference on Software Maintenance (ICSM 2007), 2007

2006
Reengineering standalone C++ legacy systems into the J2EE partition distributed environment.
Proceedings of the 28th International Conference on Software Engineering (ICSE 2006), 2006

2004
Human factors in extracting business rules from legacy systems.
Proceedings of the IEEE International Conference on Systems, 2004

Automatically identifying domain variables based on data dependence graph.
Proceedings of the IEEE International Conference on Systems, 2004

Business Rules Extraction from Large Legacy Systems.
Proceedings of the 8th European Conference on Software Maintenance and Reengineering (CSMR 2004), 2004

2003
Non-stop Internet model based on Circle Quorum System.
Proceedings of the IEEE International Conference on Systems, 2003

1997
Transparent Access to Persistent Objects in Object-Oriented Databases.
Proceedings of the TOOLS 1997: 24th International Conference on Technology of Object-Oriented Languages and Systems, 1997


  Loading...