Follow

Submissions from 2017

PDF

Version-sensitive mobile app recommendation, Da CAO, Liqiang NIE, and Xiangnan HE

PDF

CLCMiner: Detecting cross-language clones without intermediates, Xiao CHENG, Zhiming PENG, Lingxiao JIANG, Hao ZHONG, Haibo YU, and Jianjun ZHAO

PDF

Easing Cross-Border Communication: Mobile-mediated Communication and Its Framework, Kyungsub CHOI and Young Soo KIM

PDF

Empath-D: Empathetic design for accessibility, CHOO TSU WEI, KENNY; Rajesh Krishna BALAN; Kiat Wee Tan; Archan MISRA; and Youngki LEE

PDF

Recurrent neural networks with auxiliary labels for cross-domain opinion target extraction, DING YING; YU, JIANFEI; and Jing JIANG

PDF

Exploring representativeness and informativeness for active learning, Bo DU, Zengmao WANG, and Lefei ZHANG

PDF

Metric similarity joins using MapReduce, Yunjun GAO, Keyu YANG, Lu CHEN, Baihua ZHENG, Gang CHEN, and Chun CHEN

PDF

SOAL: Second-order Online Active Learning, Shuji HAO; Peilin ZHAO; LU JING; HOI, Steven C. H.; Chunyan MIAO; and Chi ZHANG

PDF

Cybercrime deterrence and international legislation: Evidence from distributed denial of service attacks, Kai-Lung HUI, Seung Hyun KIM, and QIU-HONG WANG

PDF

Privacy in context-aware mobile crowdsourcing systems, Thivya KANDAPPU, Archan MISRA, Shih-Fen CHENG, and Hoong Chuin LAU

PDF

Collaboration trumps homophily in urban mobile crowd-sourcing, Thivya KANDAPPU, Archan MISRA, and Randy Tandriansyah DARATAN

PDF

Decentralized planning in stochastic environments with submodular rewards, Rajiv Ranjan KUMAR, Pradeep VARAKANTHAM, and Akshat KUMAR

PDF

Discovering Historic Traffic-tolerant Paths in Road Networks, Pui Hang LI, Man Lung YIU, and Kyriakos MOURATIDIS

Effective K-Vertex connected component detection in large-scale networks, Yuan LI, Yuha ZHAO, Wang WANG, Feida ZHU, Yubao WU, and Shenglei SHI

PDF

Streaming classification with emerging new class by class matrix sketching, Xin MU, Feida ZHU, Juan Du, Ee-peng LIM, and Zhi-Hua ZHOU

PDF

Collective multiagent sequential decision making under uncertainty, NGUYEN DUC THIEN, Akshat KUMAR, and Hoong Chuin LAU

PDF

Whole-system analysis for understanding publicly accessible functions in Android, Huu Hoang NGUYEN, Lingxiao JIANG, and Thanh Tho QUAN

Micro-review synthesis for multi-entity summarization,   NGUYEN THANH SON, Hady Wirawan LAUW, and Panayiotis TSAPARAS

Technology mergers and acquisitions in the presence of an installed base: A strategic analysis, QIU-HONG WANG and Kai-Lung HUI

PDF

Online hacker forum censorship: Would banning the bad guys attract good guys?, QIU-HONG WANG, Le-Ting ZHANG, and Meng-Ke QIAO

PDF

Inferring smartphone keypress via smartwatch inertial sensing, SOUGATA SEN, Karan GROVER, Vigneshwaran SUBBARAJU, and Archan MISRA

PDF

Efficient motif discovery in spatial trajectories using discrete fréchet distance, Bo TANG, Man Lung YIU, Kyriakos MOURATIDIS, and Kai WANG

PDF

On the effectiveness of code-reuse-based Android application obfuscation, Xiaoxiao TANG, Yu LIANG, Xinjie MA, Yan LIN, and Debin GAO

PDF

Continuous Top-k monitoring on document streams, Leong Hou U, Junjie ZHANG, Kyriakos MOURATIDIS, and Ye LI

PDF

Enabling sustainable bulk transfer in environmentally-powered wireless sensor networks, Alvin Cerdena VALERA, Wee-Seng SOH, and Hwee-Pink TAN

PDF

Identity-based data outsourcing with comprehensive auditing in clouds, Yujue WANG; Qianhong WU; Bo QIN; Wenchang SHI; DENG, Robert H.; and Jiankun HU

PDF

Robust optimization for tree-structured stochastic network design, Xiaojian WU, Akshat KUMAR, and Daniel SHELDON

PDF

Detecting similar repositories on GitHub, Yun ZHANG, David LO, PAVNEET SINGH KOCHHAR, Xin XIA, Quanlai LI, and Jianling SUN

Submissions from 2016

PDF

Extracting Food Substitutes From Food Diary via Distributional Similarity, Palakorn ACHANANUPARP and Ingmar WEBER

PDF

Scalable greedy algorithms for task/resource constrained multi-agent stochastic planning, AGRAWAL PRITEE, Pradeep VARAKANTHAM, and William YEOH

PDF

Achieving stable and fair profit allocation with minimum subsidy in collaborative logistics, Lucas AGUSSURJA, Hoong Chuin LAU, and Shih-Fen CHENG

PDF

Shortest Path Based Decision Making Using Probabilistic Inference, Akshat KUMAR

PDF

Dual formulations for optimizing Dec-POMDP controllers, Akshat KUMAR, Hala MOSTAFA, and Shlomo ZILBERSTEIN

PDF

Robust decision making for stochastic network design, Akshat KUMAR, Arambam James SINGH, Pradeep VARAKANTHAM, and Daniel SHELDON

PDF

CACE: Exploiting behavioral interactions for improved activity recognition in multi-inhabitant smart homes, Mohammad Arif Ul Alam, Nirmalya ROY, Archan MISRA, and Joseph TAYLOR

PDF

Rate Distortion Balanced Data Compression in Wireless Sensor Networks, Mohammad Abu ALSHEIKH, Shaowei LIN, Dusit NIYATO, and Hwee-Pink TAN

PDF

Mobile big data analytics using deep learning and apache spark, Mohammad Abu ALSHEIKH, Dusit NIYATO, Shaowei LIN, Hwee-Pink TAN, and Zhu HAN

PDF

Detecting communities using coordination games: A short paper, Radhika ARAVA and Pradeep VARAKANTHAM

PDF

MobiPot: Understanding Mobile Telephony Threats with Honeycards, Marco BALDUZZI, Payas GUPTA, Lion GU, Debin GAO, and Mustaque AHAMAD

MobiPot: Understanding Mobile Telephony Threats with Honeycards, Marco BALDUZZI, Payas GUPTA, Lion GU, Debin GAO, and Mustaque AHAMAD

Information security practice and experience, Feng BAO; Liqun CHEN; DENG, Robert H.; and Guojun WANG

PDF

How Android app developers manage power consumption? An empirical study by mining power management commits, Lingfeng BAO, David LO, Xin XIA, Xinyu WANG, and Cong TIAN

What permissions should this android app request?, Lingfeng BAO, David LO, Xin XIA, and Shanping LI

PDF

How to break an API: Cost negotiation and community values in three software ecosystems, Christopher Bogart, Christian K\303\244stner, James Herbsleb, and FERDIAN THUNG

PDF

How practitioners perceive the relevance of ESEM research, Jeffrey C. CARVER, Oscar DIESTE, Nicholas A. KRAFT, David LO, and Thomas ZIMMERMANN

PDF

Information source detection via maximum a posteriori estimation, Biao CHANG, Feida ZHU, Enhong CHEN, and Qi. LIU

PDF

TafLoc: Time-adaptive and fine-grained device-free localization with little cost, Liqiong CHANG, Jie XIONG, Xiaojiang CHEN, Ju WANG, Junhao HU, and Wei WANG

PDF

Poster: Sonicnect: Accurate hands-free gesture input system with smart acoustic sensing, Maotian CHANG, Ping LI, Panlong YANG, Jie XIONG, and Chang TIAN

PDF

Demo: Profiling power utilization behaviours of smartwatch applications, CHAN JOO KENG JOSEPH, Lingxiao JIANG, Rajesh Krishna BALAN, Youngki LEE, and Archan MISRA

PDF

Graph-aided directed testing of Android applications for checking runtime privacy behaviours, CHAN JOO KENG JOSEPH, Lingxiao JIANG, Kiat Wee Tan, and Rajesh Krishna BALAN

PDF

Leveraging automated privacy checking for design of mobile privacy protection mechanisms, CHAN JOO KENG JOSEPH, Lingxiao JIANG, Kiat Wee Tan, and Rajesh Krishna BALAN

PDF

An Experimental Investigation of Product Competition and Marketing in Social Networks, Cen CHEN, Zhiling GUO, Shih-Fen CHENG, and Hoong Chuin LAU

PDF

Mining and clustering mobility evolution patterns from social media for urban informatics, Chien-Cheng CHEN, Meng-Fen CHIANG, and Wen-Chih PENG

PDF

A Feasible No-Root Approach on Android, Yao CHENG; Yingjiu LI; and DENG, Robert H.

PDF

A study on a feasible no-root approach on Android, Yao CHENG; Yingjiu LI; DENG, Robert H.; Lingyun YING; and Wei HE

SuperCall: A Secure Interface For Isolated Execution Environment to Dynamically Use External Services, Yueqiang CHENG, Qing LI, Miao YU, Xuhua DING, and Qingni SHEN

PDF

Which information sources are more effective and reliable in video search, CHENG ZHIYONG, Xuanchong LI, Jialie SHEN, and Alexander G. Hauptmann

PDF

On very large scale test collection for landmark image search benchmarking, CHENG ZHIYONG and Jialie SHEN

PDF

On Effective Location-Aware Music Recommendation, Zhiyong CHENG and Jialie SHEN

PDF

On effective personalized music retrieval via exploring online user behaviors, Zhiyong CHENG; Jialie SHEN; and HOI, Steven C. H.

PDF

The Effects of Multiple Query Evidences on Social Image Retrieval, Zhiyong CHENG, Jialie SHEN, and Haiyan MIAO

Learning robust multi-label hashing for efficient image retrieval, Haibao CHEN, Yuyan ZHAO, Lei ZHU, Guilin CHEN, and Kaichuan SUN

PDF

Mobile app tagging, Ning CHEN, Steven C. H. HOI, Shaohua LI, and Xiaokui XIAO

PDF

When Peculiarity Makes a Difference: Object Characterisation in Heterogeneous Information Networks, Wei CHEN, Feida ZHU, Lei ZHAO, and Xiaofang ZHOU

PDF

Scenario-based simulation game for hospital beds capacity planning in Singapore, CHEONG, Michelle L. F. and Li Siong LIM

PDF

Passively testing routing protocols in wireless sensor networks, Xiaoping CHE, Stephane MAAG, Hwee-Xian TAN, and Hwee-Pink TAN

PDF

Poster: Improving communication and communicability with smarter use of text-based messages on mobile and wearable devices, CHOO TSU WEI, KENNY

PDF

Collective rumor correction on the death hoax of a political figure in social media, Alton Y. K CHUA, Sin-Mei CHEAH, Dion Hoe-Lian GOH, and Ee-peng LIM

When machine meets society: Social impacts of information and information economics, Eric K. CLEMONS, Rajiv M. DEWAN, Robert John KAUFFMAN, and Thomas A. WEBER

PDF

Social tag relevance learning via ranking-oriented neighbor voting, Chaoran CUI, Jialie SHEN, Jun MA, and Tao LIAN

Revocable and decentralized attribute-based encryption, Hui CUI and DENG, Robert H.

PDF

Attribute-based encryption with granular revocation, Hui CUI; DENG, Robert H.; Xuhua DING; and Yingjiu LI

An efficient and expressive ciphertext-policy attribute-based-encryption scheme with partially hidden access structures, Hui CUI; DENG, Robert H.; Guowei WU; and Junzuo LAI

Server-aided revocable attribute-based encryption, Hui CUI; DENG, Robert H.; Yingjiu LI; and Baodong QIN

Escrow free attribute-based signature with self-revealability, Hui CUI; Guilin WANG; DENG, Robert H.; and Baodong QIN

PDF

Efficient and Expressive Keyword Search Over Encrypted Data in the Cloud, Hui CUI; Zhiguo WAN; DENG, Robert H.; Guilin WANG; and Yingjiu LI

ICT-TrAVEl: Mobile Public Transport Companion for the Visually Impaired, Linting CUI; YIZHI, KENNY NGO; and Benjamin GAN

PDF

A survey on future internet security architectures, Wenxiu DING; Zheng YAN; and DENG, Robert H.

PDF

Attractiveness versus competition: Towards an unified model for user visitation, Thanh-Nam DOAN and Ee-Peng LIM

PDF

Probabilistic models for contextual agreement in preferences, DO HA LOC and Hady Wirawan LAUW

PDF

Detecting community pacemakers of burst topic in Twitter, Guozhong DONG, Wu YANG, Feida ZHU, and Wei WANG

PDF

Discovering burst patterns of burst topic in twitter, Guozhong DONG, Wu YANG, Feida ZHU, and Wei WANG

DPBT: A System for Detecting Pacemakers in Burst Topics, Guozhong DONG, Wu YANG, Feida ZHU, and Wei WANG

ORPLocator: Identifying read points of configuration options via static analysis, Zhen DONG, Artur ANDRZEJAK, David LO, and Diego COSTA

PDF

Demo: Drumming application using commodity wearable devices, Bharat DWIVEDI, Archan MISRA, and Youngki LEE

A Comparison of Fundamental Network Formation Principles Between Offline and Online Friends on Twitter, FELICIA NATALI and Feida ZHU

PDF

API recommendation system for software development, FERDIAN THUNG

Recommending code changes for automatic backporting of Linux device drivers,   FERDIAN THUNG,   LE DINH XUAN BACH, and David LO

PDF

Robust Partial Order Schedules for RCPSP/max with Durational Uncertainty, Na FU, Pradeep VARAKANTHAM, and Pradeep VARAKANTHAM

PDF

Cast2Face: Assigning character names onto faces in movie with actor-character correspondence, Guangyu GAO, Mengdi XU, Jialie SHEN, Huangdong MA, and Shuicheng YAN

PDF

On detecting maximal quasi antagonistic communities in signed graphs, Ming GAO, Ee-Peng LIM, David LO, and Philips Kokoh PRASETYO

Efficient Collective Spatial Keyword Query Processing on Road Networks, Yunjun GAO, Jingwen ZHAO, Baihua ZHENG, and Gang CHEN

PDF

Intermediaries vs Peer-to-Peer: A Study of Lenders’ Incentive on a Donation-based Crowdfunding Platform, Ling GE, Zhiling GUO, and Xuechen LUO

PDF

Data analytics on consumer behavior in omni-channel retail banking, card and payment services, GENG DAN

Analytics for Card-Based Partnerships between Banks and Retailers,   GENG DAN and Robert John KAUFFMAN

PDF

On Unravelling Opinions of Issue Specific-Silent Users in Social Media, Wei GONG, Ee-peng LIM, Feida ZHU, and Pei Hua (XU Peihua) CHER

PDF

Posting Topics ≠ Reading Topics: On Discovering Posting and Reading Topics in Social Media, Wei GONG, Ee-peng LIM, and Feida ZHU

Designing a data warehousing and business analytics course using experiential learning pedagogy, GOTTIPATI Swapna and SHANKARARAMAN, Venky

PDF

MyCompetencies: Competency tracking mobile application for IS students, GOTTIPATI Swapna and SHANKARARAMAN, Venky

PDF

A fast algorithm for personalized travel planning recommendation, Aldy GUNAWAN and Hoong Chuin LAU