[1] Li Jiajing, Yang Ze, Wang Bin, etc A Method and Implementation of Code Quality Inspection for CMA Numerical Forecasting Model [J]. Journal of Applied Meteorology, 2025, 36 (02): 155-163
[2] Li Jiajing, Dong Zexin, Li Sheng, etc Financial Announcement Event Extraction Method Integrating Paragraph and Document Features [J]. Journal of Jilin University (Information Science Edition), 2025, 43 (04): 736-746. DOI: 10.19292/j.cnki. jdxxp.2025.01
[3] Li Jiajing, Li Sheng, Dai Yuanyuan, etc Aspect level sentiment analysis that integrates location information and interactive attention [J/OL]. Computer Engineering and Applications, 1-10 [2022-11-26] http://kns.cnki.net/kcms/detai/11.2127.TP.20240122.1411.006.html
[4]Jiajing Li, Yuanyuan Dai, Zhicheng Mu, etc. Choice of refractive surgery types for myopia assisted by machine learning based on doctors’ surgical selection data BMC Medical Informatics and Decision Making,2024,2,VL(24),doi:10.1186/s12911-024-02451-0
[5] Luo Xiaoqing, Jia Wang, Li Jiajing, etc A Table Classification Method for Long Securities Information Disclosure Documents [J]. Chinese Journal of Information Science, 2023, 37 (05): 70-79
[6]Jiajing Li, Wang Jia,Fuhui Nie, Hongyan You, Yaxin Hao "An Approach for Buyer Name Normalization in Pharmacy Sales Data [J]. IEEE Access,2021(9):93990-93997.
[7] Li Jiajing, Yan Hongfei, Yu Longxue, Meng Tao TML Cognitive Computing Platform [J]. Intelligence Engineering, 2018,4 (5): 028-037
[8] Li Jiajing, Li Xiaoming, Meng Tao TML: A General and Efficient Text Mining Language [J]. Computer Research and Development, March 2015;
[9] Li Jiajing, Liang Zhiyin, Wei Tao, etc A method for detecting Trojan spyware with implicit flow sensitivity [J]. Journal of Software, 2010, 21 (06): 1426-1437
[10] Li Jiajing, Wang Tielei, Wei Tao, etc A polynomial time path sensitive taint analysis method [J]. Chinese Journal of Computer Science, 2009,32 (09): 1845-1855
Patents:
[1] A method and system for extracting employment relationships based on personal business cards. ZL202111544385.4
[2] A table classification method for long documents of securities information disclosure. ZL202310569275.6
[3] A method for extracting information from PDF business documents. ZL202211562314.1
[4] A class recommendation method based on semantic similarity, ZL2021101917.7
[5] A user comment effectiveness analysis method based on attention mechanism, ZL202210668460.6
[6] A universal text mining method and system, ZL201510135053.9
[7] A method for detecting malicious code, ZL200810089576.4