Yongji Wang

Orcid: 0000-0002-5479-7137

Affiliations:
  • Chinese Academy of Sciences, Institute of Software, State Key Laboratory of Computer Science, Beijing, China
  • University of Edinburgh, UK (PhD 1995)


According to our database1, Yongji Wang authored at least 76 papers between 1998 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Private-Library-Oriented Code Generation with Large Language Models.
CoRR, 2023

We Are Not So Similar: Alleviating User Representation Collapse in Social Recommendation.
Proceedings of the 2023 ACM International Conference on Multimedia Retrieval, 2023

Hierarchical and Contrastive Representation Learning for Knowledge-Aware Recommendation.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

Large Language Models Meet NL2Code: A Survey.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023

2022
When Neural Model Meets NL2Code: A Survey.
CoRR, 2022

S<sup>2</sup>QL: Retrieval Augmented Zero-Shot Question Answering over Knowledge Graph.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2022

Complex Question Answering over Incomplete Knowledge Graph as N-ary Link Prediction.
Proceedings of the International Joint Conference on Neural Networks, 2022

CERT: Continual Pre-training on Sketches for Library-oriented Code Generation.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Enhancing Sequential Recommendation via Decoupled Knowledge Graphs.
Proceedings of the Semantic Web - 19th International Conference, 2022

When Language Model Meets Private Library.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022

2021
Fed-EINI: An Efficient and Interpretable Inference Framework for Decision Tree Ensembles in Federated Learning.
CoRR, 2021

Fed-EINI: An Efficient and Interpretable Inference Framework for Decision Tree Ensembles in Vertical Federated Learning.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
Ant Collaborative Filtering Addressing Sparsity and Temporal Effects.
IEEE Access, 2020

2019
An Efficient Approach for Mitigating Covert Storage Channel Attacks in Virtual Machines by the Anti-Detection Criterion.
J. Comput. Sci. Technol., 2019

Research on Satellite Orbit Prediction Based on Neural Network Algorithm.
Proceedings of the 2019 3rd High Performance Computing and Cluster Technologies Conference (HPCCT 2019) and of the 2nd International Conference on Big Data and Artificial Intelligence (BDAI 2019), Guangzhou, China, June 22, 2019

2018
机器学习算法在中医诊疗中的研究综述 (Review of Machine Learning Algorithms in Traditional Chinese Medicine).
计算机科学, 2018

An interleaved depth-first search method for the linear optimization problem with disjunctive constraints.
J. Glob. Optim., 2018

A novel anti-detection criterion for covert storage channel threat estimation.
Sci. China Inf. Sci., 2018

MAD-API: Detection, Correction and Explanation of API Misuses in Distributed Android Applications.
Proceedings of the Artificial Intelligence and Mobile Services - AIMS 2018, 2018

A Hybrid Recommendation Method with Multilayer Perception Applied on Real World Data.
Proceedings of the 2018 International Conference on Algorithms, 2018

2017
Solving linear optimization over arithmetic constraint formula.
J. Glob. Optim., 2017

Exception beyond Exception: Crashing Android System by Trapping in "Uncaught Exception".
Proceedings of the 39th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice Track, 2017

2016
Designing and Modeling of Covert Channels in Operating Systems.
IEEE Trans. Computers, 2016

An Efficient Approach for Solving Optimization over Linear Arithmetic Constraints.
J. Comput. Sci. Technol., 2016

2015
C2Hunter: Detection and Mitigation of Covert Channels in Data Centers.
Proceedings of the Handbook on Data Centers, 2015

POSTER: biTheft: Stealing Your Secrets by Bidirectional Covert Channel Communication with Zero-Permission Android Application.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
CIVSched: A Communication-Aware Inter-VM Scheduling Technique for Decreased Network Latency between Co-Located VMs.
IEEE Trans. Cloud Comput., 2014

C<sup>2</sup>Detector: a covert channel detection framework in cloud computing.
Secur. Commun. Networks, 2014

Mobile robots' modular navigation controller using spiking neural networks.
Neurocomputing, 2014

2013
A survey on resource allocation in high performance distributed computing systems.
Parallel Comput., 2013

Hybrid algorithms for hardware/software partitioning and scheduling on reconfigurable devices.
Math. Comput. Model., 2013

Vulcloud: Scalable and Hybrid Vulnerability Detection in Cloud Computing.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

Robust and Efficient Covert Channel Communications in Operating Systems: Design, Implementation and Evaluation.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

Analysis of the Key Factors for Software Quality in Crowdsourcing Development: An Empirical Study on TopCoder.com.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

CIVSched: Communication-aware Inter-VM Scheduling in Virtual Machine Monitor Based on the Process.
Proceedings of the 13th IEEE/ACM International Symposium on Cluster, 2013

Vulnerability Detection of Android System in Fuzzing Cloud.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
Optimal task execution times for periodic tasks using nonlinear constrained optimization.
J. Supercomput., 2012

Improving performance of network covert timing channel through Huffman coding.
Math. Comput. Model., 2012

Incremental Collaborative Filtering Considering Temporal Effects
CoRR, 2012

A Novel Security Scheme for Online Banking Based on Virtual Machine.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

Integrated Heuristic for Hardware/Software Co-design on Reconfigurable Devices.
Proceedings of the 13th International Conference on Parallel and Distributed Computing, 2012

A Target-Reaching Controller for Mobile Robots Using Spiking Neural Networks.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

Improved Linear Analysis on Block Cipher MULTI2.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

XenPump: A New Method to Mitigate Timing Channel in Cloud Computing.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

2011
Extended Probabilistic Latent Semantic Analysis Model For Topics In Time-Stamped Images.
Intell. Autom. Soft Comput., 2011

A Practical Covert Channel Identification Approach in Source Code Based on Directed Information Flow Graph.
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011

Secure Machine Learning, a Brief Overview.
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011

Sliding Mode Control Algorithm Design for a Class of Unmatched Uncertain System.
Proceedings of the Fourth International Symposium on Parallel Architectures, 2011

Improved mobile robot's Corridor-Scene Classifier based on probabilistic Spiking Neuron Model.
Proceedings of the 10th IEEE International Conference on Cognitive Informatics and Cognitive Computing, 2011

Identification and Evaluation of Sharing Memory Covert Timing Channel in Xen Virtual Machines.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2010
Utilization bound for periodic task set with composite deadline.
Comput. Electr. Eng., 2010

Analysis of Telephone Call Detail Records Based on Fuzzy Decision Tree.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

2009
PP-HAS: A Task Priority Based Preemptive Human Resource Scheduling Method.
Proceedings of the 21st International Conference on Software Engineering & Knowledge Engineering (SEKE'2009), 2009

Incremental Learning of Triadic PLSA for Collaborative Filtering.
Proceedings of the Active Media Technology, 5th International Conference, 2009

2008
Incremental probabilistic latent semantic analysis for automatic question recommendation.
Proceedings of the 2008 ACM Conference on Recommender Systems, 2008

Capability Assessment of Individual Software Development Processes Using Software Repositories and DEA.
Proceedings of the Making Globally Distributed Software Development a Success Story, 2008

Corridor-Scene Classification for Mobile Robot Using Spiking Neurons.
Proceedings of the Fourth International Conference on Natural Computation, 2008

Mining Individual Performance Indicators in Collaborative Development Using Software Repositories.
Proceedings of the 15th Asia-Pacific Software Engineering Conference (APSEC 2008), 2008

2007
AttributeNets: An Incremental Learning Method for Interpretable Classification.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007

Empirical Study on Benchmarking Software Development Tasks.
Proceedings of the Software Process Dynamics and Agility, 2007

Revisiting Fixed Priority Techniques.
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2007

Mining Software Repositories to Understand the Performance of Individual Devel.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

2006
QSCM: Engineering QoS in Web-Based Software Configuration Management System.
Proceedings of the 2006 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2006), 2006

Evaluation of Project Quality: A DEA-Based Approach.
Proceedings of the Software Process Change, 2006

BSR: a statistic-based approach for establishing and refining software process performance baseline.
Proceedings of the 28th International Conference on Software Engineering (ICSE 2006), 2006

Difficulties in Estimating Available Bandwidth.
Proceedings of IEEE International Conference on Communications, 2006

ARIMAmmse: An Improved ARIMA-based.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006

2005
A Generalized Real-Time Obstacle Avoidance Method Without the Cspace Calculation.
J. Comput. Sci. Technol., 2005

Learning quantifiable associations via principal sparse non-negative matrix factorization.
Intell. Data Anal., 2005

Evaluation of the Capability of Personal Software Process Based on Data Envelopment Analysis.
Proceedings of the Unifying the Software Process Spectrum, 2005

Measuring Internet Bottlenecks: Location, Capacity, and Available Bandwidth.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Mining Quantitative Associations in Large Database.
Proceedings of the Web Technologies Research and Development - APWeb 2005, 7th Asia-Pacific Web Conference, Shanghai, China, March 29, 2005

2004
A real-time path planning approach without the computation of Cspace obstacles.
Robotica, 2004

VICOS: A Framework for Session Management in Network Computing Infrastructure.
Proceedings of the 2004 IEEE International Conference on Services Computing (SCC 2004), 2004

1998
Trajectory generation for a four wheel steering tractor-trailer system: a two-step method.
Robotica, 1998

Autonomous vehicle parallel parking design using function fitting approaches.
Robotica, 1998


  Loading...