1.S.-T. Xia, F.-W. Fu, Y. Jiang, and S. Ling, On the probability of undetected error for binary constant weight codes. IEEE Transactions on Information Theory, vol. 51, no. 9, pp. 3364-3373, Sep. 2005.2.S.-T. Xia, F.-W. Fu, and Y. Jiang, On the minimum average distance of binary constant weight codes, Discrete Mathematics, vol. 308, pp. 3847-3859, 2008.3.Hai-Tao Zheng, Charles Borchert and Yong Jiang . A knowledge-driven approach to biomedical document conceptualization, Artificial Intelligence in Medicine, 49 , 67–78, 2010.4.Yong Jiang, Jianping Wu, Proportional differentiated services for end-to-end traffic control, Lecture Notes in Computer Science (LNCS) 3619, pp. 672-681, Aug. 2005.5.江勇, 胡松华, 丁晓乐. IP编码网络及其优化算法, 清华大学学报, vol. 48, no. 10, pp. 1679-1683, Oct. 2008.6.Yong Jiang, The OAM system in component router, ChinaCom ‘06, p. 4149981, Oct. 2006.7.Yong Jiang, Yanling Li, Implementation of the DiffServ-based multicast gateway. ChinaCom ‘06, p. 4149980, Oct. 20068.夏树涛, 江勇. 关于等重码不可检错误概率的界. 电子学报, vol. 34, no. 5, pp.944-946, May 2006.9.闫巧, 江勇, 吴建平. 基于免疫机理的网络入侵检测系统的抗体生成与检测组件, 计算机学报, vol. 28, no.10, Oct. 2005.10.闫巧, 吴建平, 江勇. 网络攻击源追踪技术的分类和展望, 清华大学学报, vol. 45, no. 4, pp. 497-500, 2005.