Follow

Submissions from 2018

PDF

A model of competition between perpetual software and software as a service, Zhiling GUO and Dan MA

PDF

A model of competition between perpetual software and software as a service, Zhiling GUO and Dan MA

Submissions from 2017

PDF

Coordinating supply and demand on an on-demand platform: Price, wage, and payout ratio, Jiaru BAI, Kut C SO, Christopher TANG, Xiqun CHEN, and Hai WANG

PDF

Automated Android application permission recommendation, Lingfeng BAO, David LO, and Xin XIA

PDF

Who will leave the company?: A large-scale industry study of developer turnover by mining monthly work report, Lingfeng BAO, Zhenchang XING, Xin XIA, David LO, and Shanping LI

PDF

Inference of development activities from interaction with uninstrumented applications, Lingfeng BAO, Zhenchang XING, Xin XIA, LO, and Ahmed E. HASSAN

PDF

Version-sensitive mobile app recommendation, Da CAO, Liqiang NIE, and Xiangnan HE

PDF

Employing smartwatch for enhanced password authentication, Bing CHANG, Ximing LIU, Yingjiu LI, Pingjian WANG, Wen-Tao ZHU, and Zhan WANG

Link

iUpdater: Low cost RSS fingerprints updating for device-free localization, Liqiong CHANG, Jie XIONG, Yu WANG, Xiaojiang CHEN, Junhao HU, and Dingyi FANG

PDF

BreathPrint: Breathing acoustics-based user authentication, Jagmohan CHAUHAN, Yining HU, Suranga SEREVIRATNE, Archan MISRA, Aruna SEREVIRATNE, and Youngki LEE

PDF

Now you see it, now you don't! A study of content modification behavior in Facebook, Fuxiang CHEN and Ee-peng LIM

PDF

CLCMiner: Detecting cross-language clones without intermediates, Xiao CHENG, Zhiming PENG, Lingxiao JIANG, Hao ZHONG, Haibo YU, and Jianjun ZHAO

PDF

Exploiting android system services through bypassing service helpers, Yao CHENG, Yao CHENG, Lingyun YING, Yemian LU, Qi LI, and Purui SU

PDF

Pivot-based Metric Indexing, Lu CHEN, Yunjun GAO, Baihua ZHENG, Christian S. JENSEN, Hanyu YANG, and Keyu YANG

PDF

Indexing metric uncertain data for range queries and range joins, Lu CHEN, Yunjun GAO, Aoxiao ZHONG, Christian S. JENSEN, Gang CHEN, and Baihua ZHENG

PDF

Easing Cross-Border Communication: Mobile-mediated Communication and Its Framework, Kyungsub CHOI and Young Soo KIM

PDF

Exploiting contextual information for fine-grained tweet geolocation, Wen Haw CHONG and Ee-peng LIM

PDF

Collective entity linking in tweets over space and time, Wen Haw CHONG and Ee-peng LIM

PDF

Predicting potential Alzheimer medical condition in elderly using IOT sensors - Case study, Zhi Hao Kevin CHONG, Yu Xuan TEE, Ling Jing TOH, Shi Jia PHANG, Jie Ying LIEW, Bertran QUECK, and Swapna GOTTIPATI

PDF

Empath-D: Empathetic design for accessibility, Kenny Tsu Wei CHOO, Rajesh Krishna BALAN, Kiat Wee TAN, Archan MISRA, and Youngki LEE

PDF

Special section: Technological innovations for communication and collaboration in social spaces, Eric K. CLEMONS, Rajiv M. DEWAN, Robert John KAUFFMAN, and Thomas A. WEBER

PDF

Understanding the information-based transformation of strategy and society, Eric K. CLEMONS, Rajiv M. DEWAN, Robert John KAUFFMAN, and Thomas A. WEBER

PDF

Empirical study of usage and performance of java collections, Diego COSTA, Artur ANDRZEJAK, Janos SEBOEK, and David LO

PDF

Social tag relevance learning via ranking-oriented neighbor voting, Chaoran CUI, Jialie SHEN, Jun MA, and Tao LIAN

PDF

Attribute-based encryption with expressive and authorized keyword search, Hui CUI, Robert H. DENG, Joseph K. LIU, and Yingjiu LI

PDF

Cryptography and data security in cloud computing, Robert H. DENG, Robert H. DENG, and Vijay VARADHARAJAN

PDF

Encrypted data processing with Homomorphic Re-Encryption, Wenxiu DING, Zheng YAN, and Robert H. DENG

PDF

Secure encrypted data deduplication with ownership proof and user revocation, Wenxiu DING, Zheng YAN, and Robert H. DENG

PDF

A neural network model for semi-supervised review aspect identification, Ying DING, Changlong YU, and Jing JIANG

PDF

Recurrent neural networks with auxiliary labels for cross-domain opinion target extraction, DING YING; YU, JIANFEI; and Jing JIANG

PDF

Exploring representativeness and informativeness for active learning, Bo DU, Zengmao WANG, and Lefei ZHANG

PDF

Sparse online learning of image similarity, Xingyu GAO, Steven C. H. HOI, Yongdong ZHANG, Jianshe ZHOU, Ji WAN, Zhenyu CHEN, Jintao LI, and Jianke ZHU

PDF

On efficiently finding reverse K-nearest neighbors over uncertain graphs, Yunjun GAO, Xiaoye MIAO, Gang CHEN, Baihua ZHENG, Deng CAI, and Huiyong CUI

PDF

Metric similarity joins using MapReduce, Yunjun GAO, Keyu YANG, Lu CHEN, Baihua ZHENG, Gang CHEN, and Chun CHEN

PDF

Dynamic repositioning to reduce lost demand in Bike Sharing Systems, Supriyo GHOSH, Pradeep VARAKANTHAM, Yossiri ADULYASAK, and Patrick JAILLET

PDF

Sensor-driven detection of social isolation in community-dwelling elderly, W K P Neranjana Nadee Rodrigo GOONAWARDENE, Xiaoping TOH, and Hwee-Pink TAN

PDF

Competency analytics tool: Analyzing curriculum using course competencies, Swapna GOTTIPATI and Venky SHANKARARAMAN

Mining capstone project wikis for knowledge discovery, Swapna GOTTIPATI, Venky SHANKARARAMAN, and Melvrivk Aik Chun GOH

PDF

Interactive visual analytics application for spatiotemporal movement data, Yifei GUAN and Tin Seong KAM

PDF

Well-tuned algorithms for the Team Orienteering Problem with Time Windows, Aldy GUNAWAN, Hoong Chuin LAU, Pieter VANSTEENWEGEN, and Kun LU

Factored similarity models with social trust for top-N item recommendation, Guibing GUO, Jie ZHANG, Feida ZHU, and Xingwei WANG

PDF

Multi-generation product diffusion in the presence of strategic consumers, Zhiling GUO and Jianqing CHEN

PDF

COMPRESS: A comprehensive framework of trajectory compression in road networks, Yunheng HAN, Weiwei SUN, and Baihua ZHENG

PDF

SOAL: Second-order Online Active Learning, Shuji HAO; Peilin ZHAO; LU JING; HOI, Steven C. H.; Chunyan MIAO; and Chi ZHANG

PDF

Research strategies for biomedical and health informatics: Some thought-provoking and critical proposals to encourage scientific debate on the nature of good research in medical informatics, Reinhold HAUX and et al.

PDF

Crowdsensing and analyzing micro-event tweets for public transportation insights, Thoong HOANG, Pei Hua (XU Peihua) CHER, Ee-peng LIM, and Ee--Peng LIM

PDF

Modeling topics and behavior of microbloggers: An integrated approach, Tuan Anh HOANG and Ee-peng LIM

PDF

Identifying self-admitted technical debt in open source projects using text mining, Qiao HUANG, Emad SHIHAB, Xin XIA, David LO, and Shanping LI

PDF

Cybercrime deterrence and international legislation: Evidence from distributed denial of service attacks, Kai-Lung HUI, Seung Hyun KIM, and QIU-HONG WANG

PDF

DEMO: DeepMon - Building mobile GPU Deep learning models for continuous vision applications, Nguyen Loc HUYNH, Rajesh Krishna BALAN, and Youngki LEE

PDF

DeepMon: Mobile GPU-based deep learning framework for continuous vision applications, Nguyen Loc HUYNH, Youngki LEE, and Rajesh Krishna BALAN

PDF

Towards unobtrusive mental well-being monitoring for independent-living elderly, Nguyen Phan Sinh HUYNH, Hwee-Pink TAN, and Youngki LEE

PDF

Discovering anomalous events from urban informatics data, Kasthuri JAYARAJAH, Vigneshwaran SUBBARAJU, Dulanga KAVEESHA WEERAKOON MUDIYANSELAGE, Archan MISRA, La Thanh TAM, and Noel ATHAIDE

PDF

Understanding inactive yet available assignees in GitHub, Jing JIANG, David LO, Xinyu MA, Fuli FENG, and Li ZHANG

PDF

Why and how developers fork what from whom in GitHub, Jing JIANG, David LO, Jiahuan HE, Xin XIA, Pavneet Singh KOCHHAR, and Li ZHANG

PDF

Time-aware conversion prediction, Wendi JI, Xiao Ling WANG, and Feida ZHU

PDF

Virtualization in wireless sensor networks: Fault tolerant embedding for internet of things, Omprakash KAIWARTYA, Abdul Hanan ABDULLAH, Yue CAO, Jaime LLORET, Sushil KUMAR, Rajiv Ratn SHAH, Mukesh PRASAD, and Shiv PRAKASH

PDF

Privacy in context-aware mobile crowdsourcing systems, Thivya KANDAPPU, Archan MISRA, Shih-Fen CHENG, and Hoong Chuin LAU

PDF

Collaboration trumps homophily in urban mobile crowd-sourcing, Thivya KANDAPPU, Archan MISRA, and Randy Tandriansyah DARATAN

PDF

Combining machine-based and econometrics methods for policy analytics insights, Robert John KAUFFMAN, Kwansoo KIM, Sang-Yong Tom LEE, Ai Phuong HOANG, and Jing REN

A critical evaluation of spectrum-based fault localization techniques on a large-scale software system, Fabian KELLER, Lars GRUNSKE, Simon HEIDEN, Antonio FILIERI, Andre Van HOORN, and David LO

PDF

Unobtrusive monitoring to detect depression for elderly with chronic illnesses, Jung-Yoon KIM, Na LIU, Hwee-Xian TAN, and Chao-Hsien Chu

PDF

Spatiotemporal identification of anomalies in a wildlife preserve, Bharadwaj KISHAN, Jason Guan Jie ONG, Yanrong ZHANG, and Tin Seong KAM

PDF

Revisiting assert use in GitHub projects, Pavneet Singh KOCHHAR and David LO

PDF

Decentralized planning in stochastic environments with submodular rewards, Rajiv Ranjan KUMAR, Pradeep VARAKANTHAM, and Akshat KUMAR

PDF

ADVISER+: Toward a usable web-based algorithm portfolio deviser, Hoong Chuin LAU, Mustafa MISIR, Xiang LI LI, and Lingxiao JIANG

PDF

Basket-sensitive personalized item recommendation, Duc Trong LE, Hady Wirawan LAUW, and Yuan FANG

PDF

On analyzing user topic-specific platform preferences across multiple social media sites, Roy Ka Wei LEE, Tuan Anh HOANG, and Ee-peng LIM

PDF

A data-driven approach for benchmarking energy efficiency of warehouse buildings, Wee Leong LEE, Kar Way TAN, and Zui Young LIM

PDF

Toward a collaborative AI framework for assistive dementia care, Tze-Yun LEONG

PDF

Will this localization tool be effective for this bug? Mitigating the impact of unreliability of information retrieval based bug localization tools, Tien-Duy B. LE, Ferdian THUNG, and David LO

PDF

Semantic visualization for short texts with word embeddings, Van Minh Tuan LE and Hady Wirawan LAUW

PDF

JFIX: Semantics-based repair of Java programs via symbolic PathFinder, Xuan Bach D. LE, Duc-Hiep CHU, David LO, GOUES LE, and Willem VISSER

PDF

Transaction cost optimization for online portfolio selection, Bin LI, Jialei WANG, Dingjiang HUANG, and Steven C. H. HOI

PDF

Transaction cost optimization for online portfolio selection, Bin LI, Jialei WANG, Dingjiang HUANG, and Steven C. H. HOI

PDF

Understanding Android app piggybacking: A systematic study of malicious code grafting, Li LI, Daoyuan LI, Tegawende F. BISSYANDE, Jacques KLEIN, Yves Le TRAON, David LO, and Lorenzo CAVALLARO

PDF

Automatically locating malicious packages in piggybacked Android apps, Li LI, Daoyuan LI, Tegawende BISSYANDE, Jacques KLEIN, Haipeng CAI, David LO, and Yves LE TRAON

PDF

Location matters: Geospatial policy analytics over time for household hazardous waste collection in California, Kustini LIM-WAVDE, Robert John KAUFFMAN, Tin Seong KAM, and Gregory S. DAWSON

PDF

SafeStack+: Enhanced dual stack to combat data-flow hijacking, Yan LIN, Xiaoxiao TANG, and Debin GAO

PDF

Discovering Historic Traffic-tolerant Paths in Road Networks, Pui Hang LI, Man Lung YIU, and Kyriakos MOURATIDIS

PDF

Collaborative topic regression for online recommender systems: an online and Bayesian approach, Chenghao LIU, Tao JIN, Steven C. H. HOI, Peilin ZHAO, and Jianling SUN

PDF

Efficient Privacy-Preserving Outsourced Computation over Public Data, Ximeng LIU, Baodong QIN, Robert H. DENG, and Yingjiu LI

PDF

Provably secure attribute based signcryption with delegated computation and efficient key updating, Ximeng LIU, Yunhao XIA, Zhixin SUN, and Ximeng LIU

PDF

Toward accurate network delay measurement on android phones, Weichao LI, Daoyuan WU, Rocky K. C. CHANG, and Ricky K. P. MOK

PDF

What you see is not what you get: Leakage-resilient password entry schemes for smart glasses, Yan LI, Yao CHENG, Yingjiu LI, and Robert H. DENG

PDF

Inferring user consumption preferences from social media, Yang LI, Jing JIANG, and Ting LIU

PDF

Personalized microtopic recommendation on microblogs, Yang LI, Jing JIANG, Ting LIU, Minghui QIU, and Xiaofei SUN

Effective K-Vertex connected component detection in large-scale networks, Yuan LI, Yuha ZHAO, Wang WANG, Feida ZHU, Yubao WU, and Shenglei SHI

PDF

Using data analytics for discovering library resource insights – Case from Singapore Management University, Ning LU, Rui SONG, Dina HENG, Swapna GOTTIPATI, Chee Hsien Aaron (ZHENG Zhixian) TAY, and Aaron TAY

PDF

Core Determining Class: Construction, Approximation and Inference, Ye LUO and Hai WANG

PDF

Do your friends make you buy this brand?: Modeling social recommendation with topics and brands, Minh Duc LUU and Ee-peng LIM

PDF

Smartphone sensing meets transport data: A collaborative framework for transportation service analytics, Yu LU, Archan MISRA, Wen SUN, and Huayu WU

PDF

VCKSM: Verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings, Yinbin MIAO, Jianfeng MA, and Ximeng LIU

PDF

VKSE-MO: Verifiable keyword search over encrypted data in multi-owner settings, Yinbin MIAO, Jianfeng MA, Ximeng LIU, Junwei ZHANG, and Zhiquan LIU

PDF

Are the trade-offs for reducing cross-border cybercrime manageable?, Steven Mark MILLER, Qiu-Hong WANG, and Robert John KAUFFMAN

PDF

Multi-authority ABS supporting dendritic access structure, Ruo MO, Jian-feng MA, Ximeng LIU, and Qi LI

PDF

Geometric approaches for Top-k Queries [Tutorial], Kyriakos MOURATIDIS

PDF

Streaming classification with emerging new class by class matrix sketching, Xin MU, Feida ZHU, Juan Du, Ee-peng LIM, and Zhi-Hua ZHOU

PDF

SEAPoT-RL: Selective exploration algorithm for policy transfer in reinforcement learning (Abstract), Akshay NARAYAN, Zhuoru LI, and Tze-Yun LEONG

PDF

Collective multiagent sequential decision making under uncertainty, NGUYEN DUC THIEN, Akshat KUMAR, and Hoong Chuin LAU