Jingyuan Li

Orcid: 0009-0008-9384-9455

Affiliations:
  • Beijing Technology and Business University, School of Computer and Artificial Intelligence, China
  • University of Science and Technology of China, Department of Computer Science, Hefei, China (PhD 2009)
  • City University of Hong Kong, Department of Computer Science, Hong Kong (2006-2008)


According to our database1, Jingyuan Li authored at least 18 papers between 2006 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Retriever-generator-verification: A novel approach to enhancing factual coherence in open-domain question answering.
Inf. Process. Manag., 2025

RLG-RAG: Guiding the Knowledge Retrieval and Evaluation in Retrieval-Augmented Generation Framework by Reasoning Logic.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2025, 2025

2024
A novel feature integration method for named entity recognition model in product titles.
Comput. Intell., June, 2024

2023
MKGS: Maintains the Original Structure of Knowledge Graph.
Proceedings of the IEEE International Conference on Web Intelligence and Intelligent Agent Technology, 2023

Social Robot Detection on Short Video Platform Based on Random Forest and LDA Model.
Proceedings of the IEEE International Conference on Web Intelligence and Intelligent Agent Technology, 2023

2022
NCG-LS: Named Entity Recognition Model Specializing for Analyzing Product Titles.
Proceedings of the IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, 2022

MTPL-G2T: Graph-to-Text Generation Task Based on Mixed Template Prompt Learning.
Proceedings of the IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, 2022

2019
A Unified Malicious Documents Detection Model Based on Two Layers of Abstraction.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

2015
Prediction of purchase behaviors across heterogeneous social networks.
J. Supercomput., 2015

Privacy Petri Net and Privacy Leak Software.
J. Comput. Sci. Technol., 2015

2014
Account matching across heterogeneous networks.
Proceedings of the 2014 5th International Conference on Game Theory for Networks, 2014

2013
Modeling and security analysis of enterprise network using attack-defense stochastic game Petri nets.
Secur. Commun. Networks, 2013

2012
Stochastic game net and applications in security analysis for enterprise network.
Int. J. Inf. Sec., 2012

Training Opinion Leaders in Microblog: A Game Theory Approach.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

2010
Identifying vulgar content in eMule network through text classification.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2010

2008
Interface assignment and bandwidth allocation for multi-channel wireless mesh networks.
Comput. Commun., 2008

2007
An Efficient Source Peer Selection Algorithm in Hybrid P2P File Sharing Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2007

2006
An Efficient Implementation of File Sharing Systems on the Basis of WiMAX and Wi-Fi.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006


  Loading...