A person wearing a hat

Description automatically generated with medium confidence

Dr. Jie “Jed” Wang

Professor of Computer Science

R. Miner School of Computer and Information Sciences

University of Massachusetts Lowell

Lowell, MA 01854





Dandeneau 333, UML North
















Brief Bio  中文简历  Publications  Grants  Professional Service   Students  Average-Case Complexity Forum  Teaching

My current research interests include text mining, document engineering, data modeling, and optimization algorithms. My previous interests included network dynamics, cloud computing and search over encryption, network security, wireless networks, and computational complexity theory. I am particularly interested in algorithmic problems and mathematical modeling arising from practical applications. I studied computational complexity theory from late 1980's to early 2000's, including structural complexity, average-case complexity and average NP-completeness.

The Path to Greatness -- by Bill Hybels

In each heart is a built-in mechanism that craves self-promotion and advancement, the climb of ego. Our role models and heroes reinforce the theme: Ascend and flex the muscles of your self-will. Do whatever it takes to conquer gravity. Whether you do it blatantly or wear the disguise of humility, make yourself upwardly mobile. Why? Because that is the direction of greatness.

Philippians 2 said: If you want to be truly great, then the direction you must go is down. You must descend into greatness. At the heart of this paradox is still another paradox: Greatness is not a measure of self-will, but rather self-abandonment. The more you lose, the more you gain.

Publications for the General Public

·       Limits to Computing, The Conversation, Jan. 30, 2023; also in Fortune, Jan. 31, 2023.

·       ChatGPT and Large Language Models 1 and ChatGPT and Large Language Models 2 (in Chinese), interviews by the National Business Daily, Feb. 4 and 20, 2023.

·       Why do I support the open letter on AI experiments? (in Chinese), an interview by the National Business Daily, April 2, 2023.

·       Should LLMs be open-source or closed-source? (in Chinese), an interview by the National Business Daily, March 9, 2024.

Selected Research Papers (from 200+ publications)


·      Write Right for ICAE – key elements of writing a research paper, an editorial for celebrating ICAE’s 30th anniversary.

Text Mining and Document Engineering

1.       You Zhou (PhD student), Jie Wang. Content significance distributions of sub-text blocks in articles and its application to article-organization assessment. In Proceedings of the 15th Knowledge Discovery and Information Retrieval (KDIR 2023), Rome, Italy. November 3 – 5, 2023.

2.       Yicheng Sun (PhD student), Jie Wang. Generate cloze questions generatively. In Proceedings of the International Joint Conference on Neural Networks (IJCNN 2023), IEEE and the International Neural Network Society, Queensland, Australia. June 18 – 23, 2023.

3.       Cheng Zhang (PhD student), Hao Zhang (PhD student), Yicheng Sun (PhD student), Jie Wang. Downstream transformer generation of question-answer pairs with preprocessing and postprocessing pipelines. In DocEng’22: The 22nd ACM Symposium on Document Engineering, San Jose, USA. September 20–23, 2022. (Best student paper award)

4.       Hao Zhang (PhD student), You Zhou (PhD student), Jie Wang. Contextual networks and unsupervised ranking of sentences. In Proceedings of the 33rd IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2021), November 1-3, 2021.

5.       Hao Zhang (PhD student), Jie Wang. Boilerplate detection via semantic classification of textblocks. In Proceedings of the International Joint Conference on Neural Networks (IJCNN 2021), IEEE and the International Neural Network Society, July 18-22, 2021.

6.       Changfeng Yu (PhD student), Cheng Zhang (PhD student), Jie Wang. Extracting body text from academic PDF documents for text mining. In Proceedings of the 12th International Conference on Knowledge Discovery and Information Retrieval (KDIR 2020), November 2-4, 2020.

7.       Jingwen Wang (PhD student), Hao Zhang (PhD student), Cheng Zhang (PhD student), Wenjing Yang (PhD student), Liqun Shao (PhD student), Jie Wang. An effective scheme for generating an overview report over a very large corpus of documents. In Proceedings of the 19th ACM Symposium on Document Engineering (DocEng 2019), Berlin, September 23–26, 2019. (Best Paper Runner-up)

8.       Zheng Fang (PhD student), Jie Wang, Benyuan Liu, Weibo Gong. Double Pareto lognormal distributions in complex networks. In My T. Thai and Panos M. Pardalos (eds.), Handbook of Optimization in Complex Networks: Theory and Its Applications. Springer, 2012, pages 55-80.

9.       Zheng Fang (PhD student), Jie Wang, Benyuan Liu, Weibo Gong. Wikipedia as domain knowledge networks: Domain extraction and statistical measurement. In Proceedings of the 3rd International Conference on Knowledge Discovery and Information Retrieval (KDIR 2011), Paris, France. October 26-29, 2011.

Algorithms and Applications

10.    Ming-Yang Kao, Jie Wang. Minimizing roundoff errors of prefix sums via dynamic construction of Huffman trees.  Theoretical Computer Science, 262:101-115, 2001.

11.    Ming-Yank Kao, Jie Wang. Linear-time approximation algorithms for computing numerical summation with provably small errors. SIAM Journal on Computing, 29(5):1568-1576, 2000.

12.    Jie Wang. Packing of unequal spheres and automated radiosurgery treatment planning.  Journal of Combinatorial Optimization, 3:453-464, 1999.

13.    Yaorong Ge, David Stelts, Jie Wang, David Vining. Computing the central path of a colon: a fast and robust method based on 3D skeletons.  Journal of Computer Assisted Tomography. 23(5):786-794, 1999.

14.    Ming-Yang Kao, Jie Wang. Efficient minimization of numerical summation errors. In Proceedings of the 25th International Colloquium on Automata, Languages, and Programming (ICALP'98), Lecture Notes in Computer Science, vol. 1443, pages 375-386, Springer, July 1998. Aalborg, Denmark.

Computational Complexity Theory

15.    Jie Wang. Average-case computational complexity theory. In Hemaspaandra and Selmen (eds.), Complexity Theory Retrospective II, Springer, 1997, pages 295-328.

16.    Jie Wang. Average-case intractable NP problems. In D. Du and K-I Ko (eds.), Advances in Languages, Algorithms, and Complexity, Kluwer Academic Publishers, 1997, pages 313-378.

17.    Jie Wang. Average-case completeness of a word problem for groups. In Proceedings of the 27th ACM Symposium on Theory of Computing (STOC’95), Las Vegas, May 29-June 1, 1995.

18.    Jie Wang. Random instances of bounded string rewriting are hard.   Journal of Computing and Information, 1(1):11-23, 1995.

19.    Steve Homer, Jie Wang. Immunity of complete problems. Information and Computation, 110:119-129, 1994.

20.    Jie Wang. Polynomial time productivity, approximations, and levelabilitySIAM Journal on Computing, 21:1100-1111, 1992.

21.    Jie Wang. On p-creative sets and p-completely creative sets. Theoretical Computer Science, 85:1-31, 1991.

22.    Jie Wang, Jay Belanger. On average P vs. average NP. In Proceedings of the 7th IEEE Annual Conference on Structure in Complexity Theory (Complexity’92), Boston, June 22-25, 1992.

23.    Steve Homer, Jie Wang. Absolute results concerning one-way functions and their applications.  Mathematical Systems Theory, 22:21-35, 1989.

Data Modeling

24.    Hao Zhang (PhD student), Shan Lu (PhD student), Jie Wang. Effective models for predicting Gaokao scores and selecting universities for college admissions in mainland China. International Journal of Humanitarian Technology. 1(2): 144-171, 2020.

25.    Jie Wang, Jian Lu, Zheng Fang, Cindy Chen, Tingjian Ge. PL-Tree: an efficient access method for high-dimensional data. In the Proceedings of the 13th International Annual Symposium on Spatial and Temporal databases (SSTD’13), Munich, August 21-23, 2013.

26.    Tian Xia, Donghui Zhang, Cindy Chen, Zheng Fang, Jie Wang. Subspace skyline query processing with efficient update support. ACM Transactions on Database Systems. 37(2): May 2012.

Network Communications

27.    Xiang Cheng, Sen Su, Zhongbao Zhang, Hanchi Wang, Fangchun Yang, Yan Luo, Jie Wang. Virtual network embedding through topology-aware node ranking. ACM/SIGCOMM Computer Communication Review, 41(2):39-47, 2011.

28.    Jie Yang (PhD student), Jie Wang, Benyuan Liu. An intersection collision warning system using Wi-Fi smartphones in VANET. In Proceedings of the IEEE Global Communications Conference (GLOBECOM 2011), Houston, TX, December, 2011.

29.    Stanley Barr (PhD student), Jie Wang, Benyuan Liu. An efficient method for constructing underwater sensor barriers. Journal of Communications, 6(5):370-383, 2011.

30.    Anwar Saipulla (PhD student), Benyuan Liu, Guoliang Xing, Xinwen Fu, Jie Wang. Coverage with sensors of limited mobility. In Proceedings of the 11th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’10). Chicago, September 20-24, 2010.

31.    Anwar Saipulla (PhD student), Cedric Westphal, Benyuan Liu, Jie Wang. Barrier coverage of line-based deployed wireless sensor networks. In Proceedings of the 28th IEEE Conference on Computer Communications (INFOCOM’09), Rio de Janeiro, April 19-25, 2009.

32.    Benyuan Liu, Olivier Dousse, Jie Wang, Anwar Saipulla (PhD student). Strong Barrier Coverage of Wireless Sensor Networks. In Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’08), Hong Kong, May 27-30, 2008.

33.    Krishna Sivalingam, Jie Wang. Performance of a MAC protocol for WDM networks with on-line scheduling. In Proceedings of the 15th IEEE Conference on Network Communication (INFOCOM'96), San Francisco, March 24-28, 1996.

Network and Cloud Security

34.    Yuling Liu, Cuiping Wang, Jie Wang. Generative steganography via live comments on streaming video frames. IEEE Transactions on Computational Social Systems. 2024. https://ieeexplore.ieee.org/document/10462497.

35.    Zachary Kissel (PhD student), Jie Wang. Generic adaptively secure searchable phrase encryption. In Proceedings of the 16th Privacy Enhancing Technologies Symposium (PETS’17). Minneapolis, July 18 – 21, 2017. 

36.    Zachary Kissel (PhD student), Jie Wang Access control for untrusted content distribution clouds using unidirectional re-encryption. In Proceedings of the 2nd International Symposium on Cloud Computing and Services for High Performance Computing Systems (InterCloud-HPC’13), Helsinki, July 1-5, 2013.

37.    Guanling Chen, Jie Wang, Bo Yan, Hongda Yin. Robust detection of unauthorized access points. Journal of Mobile Networks and Communications. 14(4):508-522, 2009.

38.    Jared Karro (MS student), Jie Wang. Towards a practical, secure, and very large-scale online election. In Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC'99), Phoenix, December 9-13,1999.


39.    Tefen Lin (PhD student), Jie Wang. Producing automated mosaic art images of high quality with restricted and limited color palettes. In Proceedings of the 3rd International Conference on Imaging Theory and Applications (IMAGAPP’11), Algarve, March 5-7, 2011.