1.S.-T. Xia, F.-W. Fu, Y. Jiang, and S. Ling, On the probability of undetected error for binary constant weight codes. IEEE Transactions on Information Theory, vol. 51, no. 9, pp. 3364-3373, Sep. 2005.
2.S.-T. Xia, F.-W. Fu, and Y. Jiang, On the minimum average distance of binary constant weight codes, Discrete Mathematics, vol. 308, pp. 3847-3859, 2008.
3.Hai-Tao Zheng, Charles Borchert and Yong Jiang . A knowledge-driven approach to biomedical document conceptualization, Artificial Intelligence in Medicine, 49 , 67–78, 2010.
4.Yong Jiang, Jianping Wu, Proportional differentiated services for end-to-end traffic control, Lecture Notes in Computer Science (LNCS) 3619, pp. 672-681, Aug. 2005.
5.江勇, 胡松華, 丁曉樂. IP編碼網絡及其優化算法, 清華大學學報, vol. 48, no. 10, pp. 1679-1683, Oct. 2008.
6.Yong Jiang, The OAM system in component router, ChinaCom ‘06, p. 4149981, Oct. 2006.
7.Yong Jiang, Yanling Li, Implementation of the DiffServ-based multicast gateway. ChinaCom ‘06, p. 4149980, Oct. 2006
8.夏樹濤, 江勇. 關於等重碼不可檢錯誤概率的界. 電子學報, vol. 34, no. 5, pp.944-946, May 2006.
9.閆巧, 江勇, 吳建平. 基於免疫機理的網絡入侵檢測系統的抗體生成與檢測組件, 計算機學報, vol. 28, no.10, Oct. 2005.
10.閆巧, 吳建平, 江勇. 網絡攻擊源追蹤技術的分類和展望, 清華大學學報, vol. 45, no. 4, pp. 497-500, 2005.