Follow

Submissions from 2018

PDF

A model of competition between perpetual software and software as a service, Zhiling GUO and Dan MA

PDF

A model of competition between perpetual software and software as a service, Zhiling GUO and Dan MA

Submissions from 2017

PDF

Coordinating supply and demand on an on-demand platform: Price, wage, and payout ratio, Jiaru BAI, Kut C SO, Christopher TANG, Xiqun CHEN, and Hai WANG

PDF

Automated Android application permission recommendation, Lingfeng BAO, David LO, and Xin XIA

PDF

Who will leave the company?: A large-scale industry study of developer turnover by mining monthly work report, Lingfeng BAO, Zhenchang XING, Xin XIA, David LO, and Shanping LI

PDF

Version-sensitive mobile app recommendation, Da CAO, Liqiang NIE, and Xiangnan HE

iUpdater: Low cost RSS fingerprints updating for device-free localization, Liqiong CHANG, Jie XIONG, Yu WANG, Xiaojiang CHEN, Junhao HU, and Dingyi FANG

PDF

Now you see it, now you don't! A study of content modification behavior in Facebook, Fuxiang CHEN and Ee-peng LIM

PDF

CLCMiner: Detecting cross-language clones without intermediates, Xiao CHENG, Zhiming PENG, Lingxiao JIANG, Hao ZHONG, Haibo YU, and Jianjun ZHAO

PDF

Pivot-based Metric Indexing, Lu CHEN, Yunjun GAO, Baihua ZHENG, Christian S. JENSEN, Hanyu YANG, and Keyu YANG

PDF

Indexing metric uncertain data for range queries and range joins, Lu CHEN, Yunjun GAO, Aoxiao ZHONG, Christian S. JENSEN, Gang CHEN, and Baihua ZHENG

PDF

Easing Cross-Border Communication: Mobile-mediated Communication and Its Framework, Kyungsub CHOI and Young Soo KIM

PDF

Exploiting contextual information for fine-grained tweet geolocation, Wen Haw CHONG and Ee-peng LIM

PDF

Collective entity linking in tweets over space and time, Wen Haw CHONG and Ee-peng LIM

PDF

Empath-D: Empathetic design for accessibility, CHOO TSU WEI, KENNY; Rajesh Krishna BALAN; Kiat Wee Tan; Archan MISRA; and Youngki LEE

PDF

Empirical study of usage and performance of java collections, Diego COSTA, Artur ANDRZEJAK, Janos SEBOEK, and David LO

PDF

Social tag relevance learning via ranking-oriented neighbor voting, Chaoran CUI, Jialie SHEN, Jun MA, and Tao LIAN

PDF

Encrypted data processing with Homomorphic Re-Encryption, Wenxiu DING, Zheng YAN, and Robert H. DENG

PDF

A neural network model for semi-supervised review aspect identification, Ying DING, Changlong YU, and Jing JIANG

PDF

Recurrent neural networks with auxiliary labels for cross-domain opinion target extraction, DING YING; YU, JIANFEI; and Jing JIANG

PDF

Exploring representativeness and informativeness for active learning, Bo DU, Zengmao WANG, and Lefei ZHANG

PDF

On efficiently finding reverse K-nearest neighbors over uncertain graphs, Yunjun GAO, Xiaoye MIAO, Gang CHEN, Baihua ZHENG, Deng CAI, and Huiyong CUI

PDF

Metric similarity joins using MapReduce, Yunjun GAO, Keyu YANG, Lu CHEN, Baihua ZHENG, Gang CHEN, and Chun CHEN

PDF

Dynamic repositioning to reduce lost demand in Bike Sharing Systems, Supriyo GHOSH, Pradeep VARAKANTHAM, Yossiri ADULYASAK, and Patrick JAILLET

PDF

Sensor-driven detection of social isolation in community-dwelling elderly, W K P Neranjana Nadee Rodrigo GOONAWARDENE, Xiaoping TOH, and Hwee-Pink TAN

PDF

Competency analytics tool: Analyzing curriculum using course competencies, Swapna GOTTIPATI and Venky SHANKARARAMAN

PDF

Well-tuned algorithms for the Team Orienteering Problem with Time Windows, Aldy GUNAWAN, Hoong Chuin LAU, Pieter VANSTEENWEGEN, and Kun LU

PDF

Multi-generation product diffusion in the presence of strategic consumers, Zhiling GUO and Jianqing CHEN

PDF

COMPRESS: A comprehensive framework of trajectory compression in road networks, Yunheng HAN, Weiwei SUN, and Baihua ZHENG

PDF

SOAL: Second-order Online Active Learning, Shuji HAO; Peilin ZHAO; LU JING; HOI, Steven C. H.; Chunyan MIAO; and Chi ZHANG

PDF

Research strategies for biomedical and health informatics: Some thought-provoking and critical proposals to encourage scientific debate on the nature of good research in medical informatics, Reinhold HAUX and et al.

PDF

Crowdsensing and analyzing micro-event tweets for public transportation insights, Thoong HOANG, Pei Hua (XU Peihua) CHER, Ee-peng LIM, and Ee--Peng LIM

PDF

Modeling topics and behavior of microbloggers: An integrated approach, Tuan Anh HOANG and Ee-peng LIM

PDF

Cybercrime deterrence and international legislation: Evidence from distributed denial of service attacks, Kai-Lung HUI, Seung Hyun KIM, and QIU-HONG WANG

PDF

DEMO: DeepMon - Building mobile GPU Deep learning models for continuous vision applications, Nguyen Loc HUYNH, Rajesh Krishna BALAN, and Youngki LEE

PDF

DeepMon: Mobile GPU-based deep learning framework for continuous vision applications, Nguyen Loc HUYNH, Youngki LEE, and Rajesh Krishna BALAN

PDF

Towards unobtrusive mental well-being monitoring for independent-living elderly, Nguyen Phan Sinh HUYNH, Hwee-Pink TAN, and Youngki LEE

PDF

Why and how developers fork what from whom in GitHub, Jing JIANG, David LO, Jiahuan HE, Xin XIA, Pavneet Singh KOCHHAR, and Li ZHANG

PDF

Time-aware conversion prediction, Wendi JI, Xiao Ling WANG, and Feida ZHU

PDF

Privacy in context-aware mobile crowdsourcing systems, Thivya KANDAPPU, Archan MISRA, Shih-Fen CHENG, and Hoong Chuin LAU

PDF

Collaboration trumps homophily in urban mobile crowd-sourcing, Thivya KANDAPPU, Archan MISRA, and Randy Tandriansyah DARATAN

PDF

Combining machine-based and econometrics methods for policy analytics insights, Robert John KAUFFMAN, Kwansoo KIM, Sang-Yong Tom LEE, Ai Phuong HOANG, and Jing REN

PDF

Revisiting assert use in GitHub projects, Pavneet Singh KOCHHAR and David LO

PDF

Decentralized planning in stochastic environments with submodular rewards, Rajiv Ranjan KUMAR, Pradeep VARAKANTHAM, and Akshat KUMAR

PDF

Basket-sensitive personalized item recommendation, Duc Trong LE, Hady Wirawan LAUW, and Yuan FANG

PDF

On analyzing user topic-specific platform preferences across multiple social media sites, Roy Ka Wei LEE, Tuan Anh HOANG, and Ee-peng LIM

PDF

A data-driven approach for benchmarking energy efficiency of warehouse buildings, Wee Leong LEE, Kar Way TAN, and Zui Young LIM

PDF

Toward a collaborative AI framework for assistive dementia care, Tze-Yun LEONG

PDF

Will this localization tool be effective for this bug? Mitigating the impact of unreliability of information retrieval based bug localization tools, Tien-Duy B. LE, Ferdian THUNG, and David LO

PDF

Semantic visualization for short texts with word embeddings, Van Minh Tuan LE and Hady Wirawan LAUW

PDF

JFIX: Semantics-based repair of Java programs via symbolic PathFinder, Xuan Bach D. LE, Duc-Hiep CHU, David LO, GOUES LE, and Willem VISSER

PDF

Transaction cost optimization for online portfolio selection, Bin LI, Jialei WANG, Dingjiang HUANG, and Steven C. H. HOI

PDF

Understanding Android app piggybacking: A systematic study of malicious code grafting, Li LI, Daoyuan LI, Tegawende F. BISSYANDE, Jacques KLEIN, Yves Le TRAON, David LO, and Lorenzo CAVALLARO

PDF

Automatically locating malicious packages in piggybacked Android apps, Li LI, Daoyuan LI, Tegawende BISSYANDE, Jacques KLEIN, Haipeng CAI, David LO, and Yves LE TRAON

PDF

Location matters: Geospatial policy analytics over time for household hazardous waste collection in California, Kustini LIM-WAVDE, Robert John KAUFFMAN, Tin Seong KAM, and Gregory S. DAWSON

PDF

SafeStack+: Enhanced dual stack to combat data-flow hijacking, Yan LIN, Xiaoxiao TANG, and Debin GAO

PDF

Discovering Historic Traffic-tolerant Paths in Road Networks, Pui Hang LI, Man Lung YIU, and Kyriakos MOURATIDIS

PDF

Collaborative topic regression for online recommender systems: an online and Bayesian approach, Chenghao LIU, Tao JIN, Steven C. H. HOI, Peilin ZHAO, and Jianling SUN

PDF

VKSE-MO: Verifiable keyword search over encrypted data in multi-owner settings, Ximeng LIU

Effective K-Vertex connected component detection in large-scale networks, Yuan LI, Yuha ZHAO, Wang WANG, Feida ZHU, Yubao WU, and Shenglei SHI

PDF

Core Determining Class: Construction, Approximation and Inference, Ye LUO and Hai WANG

PDF

VCKSM: Verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings, Yinbin MIAO, Jianfeng MA, and Ximeng LIU

PDF

Geometric approaches for Top-k Queries [Tutorial], Kyriakos MOURATIDIS

PDF

Streaming classification with emerging new class by class matrix sketching, Xin MU, Feida ZHU, Juan Du, Ee-peng LIM, and Zhi-Hua ZHOU

PDF

SEAPoT-RL: Selective exploration algorithm for policy transfer in reinforcement learning (Abstract), Akshay NARAYAN, Zhuoru LI, and Tze-Yun LEONG

PDF

Collective multiagent sequential decision making under uncertainty, NGUYEN DUC THIEN, Akshat KUMAR, and Hoong Chuin LAU

PDF

Android repository mining for detecting publicly accessible functions missing permission checks, Huu Hoang NGUYEN, Lingxiao JIANG, and Thanh Tho QUAN

PDF

Whole-system analysis for understanding publicly accessible functions in Android, Huu Hoang NGUYEN, Lingxiao JIANG, and Thanh Tho QUAN

Micro-review synthesis for multi-entity summarization, NGUYEN THANH SON, Hady Wirawan LAUW, and Panayiotis TSAPARAS

PDF

Scalable transfer learning in heterogeneous, dynamic environments, Trung Thanh Nguyen, Tomi Silander, Zhuoru LI, and Tze-Yun LEONG

PDF

Scalable image retrieval by sparse product quantization, Qingqun NING, Jianke ZHU, Zhiyuan ZHONG, Steven C. H. HOI, and Chun CHEN

PDF

Attribute-based secure messaging in the public cloud, Zhi Yuan POH, Hui CUI, Robert H. DENG, and Yingjiu LI

PDF

Related-key secure key encapsulation from extended computational bilinear Diffie–Hellman, Brandon QIN, Shengli LIU, Shifeng SUN, Robert H. DENG, and Dawu GU

Technology mergers and acquisitions in the presence of an installed base: A strategic analysis, QIU-HONG WANG and Kai-Lung HUI

PDF

Online hacker forum censorship: Would banning the bad guys attract good guys?, QIU-HONG WANG, Le-Ting ZHANG, and Meng-Ke QIAO

PDF

RACK: Code Search in the IDE Using Crowdsourced Knowledge, Mohammad Masudur RAHMAN, Chanchal K. ROY, and David LO

PDF

Follow-my-lead: Intuitive indoor path creation and navigation using see-through interactive videos, Quentin Xavier Louis ROY, Simon T. PERRAULT, Shengdong ZHAO, Richard DAVIS, Anuroop PATTENA VANIYAR, Velko VECHEV, Youngki LEE, and Archan MISRA

PDF

Experiences in building a real-world eating recogniser, Sougata SEN, Vigneshwaran SUBBARAJU, Archan MISRA, Rajesh Krishna BALAN, and Youngki LEE

PDF

Cataloging GitHub repositories, Abhishek SHARMA, Ferdian THUNG, Pavneet Singh KOCHHAR, Agus SULISTYA, and David LO

PDF

Harnessing Twitter to support serendipitous learning of developers, ABHISHEK SHARMA, YUAN TIAN, AGUS SULISTYA, David LO, and Aiko YAMASHITA

PDF

H-Binder: A hardened binder framework on Android systems, Dong SHEN, Zhangkai ZHANG, Xuhua DING, Zhoujun LI, and Robert H. DENG

PDF

Inferring smartphone keypress via smartwatch inertial sensing, SOUGATA SEN, Karan GROVER, Vigneshwaran SUBBARAJU, and Archan MISRA

PDF

Universally composable RFID mutual authentication, Chunhua SU, Bagus SANTOSO, Yingjiu LI, Robert H. DENG, and Xinyi HUANG

PDF

Determining the impact regions of competing options in preference space, Bo TANG, Kyriakos MOURATIDIS, and Man Lung. YIU

PDF

Efficient motif discovery in spatial trajectories using discrete fréchet distance, Bo TANG, Man Lung YIU, Kyriakos MOURATIDIS, and Kai WANG

PDF

On the effectiveness of code-reuse-based Android application obfuscation, Xiaoxiao TANG, Yu LIANG, Xinjie MA, Yan LIN, and Debin GAO

PDF

Coordinating vessel traffic to improve safety and efficiency, Teck Hou (DENG Dehao) TENG, Hoong Chuin LAU, and Akshat KUMAR

PDF

An exploratory study of functionality and learning resources of web APIS on programmableweb, Yuan TIAN, Pavneet Singh KOCHHAR, and David LO

Comparative relation generative model, Maksim TKACHENKO and Hady Wirawan LAUW

PDF

Continuous Top-k monitoring on document streams, Leong Hou U, Junjie ZHANG, Kyriakos MOURATIDIS, and Ye LI

PDF

Enabling sustainable bulk transfer in environmentally-powered wireless sensor networks, Alvin Cerdena VALERA, Wee-Seng SOH, and Hwee-Pink TAN

PDF

A secure, usable, and transparent middleware for permission managers on Android, Daibin WANG, Haixia YAO, Yingjiu LI, Hai JIN, Deqing ZOU, and Robert H. DENG

PDF

Routing and scheduling for a last-mile transportation system, Hai WANG

PDF

The dark side of banning hacking technique discussion, Qiu-Hong WANG and Ting Zhang LE

PDF

EnTagRec: An enhanced tag recommendation system for software information sites, Shaowei Wang, David LO, Bogdan Vasilescu, and Alexander Serebrenik

PDF

A compare-aggregate model for matching text sequences, Shuohang WANG and Jing JIANG

PDF

Machine comprehension using match-LSTM and answer pointer, Shuohang WANG and Jing JIANG

PDF

Learning personalized preference of strong and weak ties for social recommendation, Xin WANG; HOI, Steven C. H.; Martin ESTER; Jiajun BU; and Chun CHEN

PDF

Probabilistic public key encryption for controlled equijoin in relational databases, Yujue WANG and Hwee Hwa PANG

PDF

CCA Secure encryption supporting authorized equality test on ciphertexts in standard model and its applications, Yujue WANG, Hwee Hwa PANG, Ngoc Hieu TRAN, and Robert H. DENG