Follow

Submissions from 2018

PDF

User-friendly deniable storage for mobile devices, Bing CHANG, Yao CHENG, Bo CHEN, Fengwei ZHANG, Wen-Tao ZHU, Yingjiu LI, and Zhan. WANG

PDF

User-friendly deniable storage for mobile devices, Bing CHANG, Yao CHENG, Fengwei ZHANG, Wen-Tao ZHU, Yingjiu LI, and Zhan WANG

PDF

An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited, Hui CUI, Robert H. DENG, Junzuo LAI, Xun YIA, and Surya NEPALD

An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited, Hui CUI, Robert H. DENG, Junzuo LAI, Xun YIA, and Surya NEPALD

PDF

Attribute-based cloud storage with secure provenance over encrypted data, Hui CUI, Robert H. DENG, and Yingjiu LI

PDF

Competency analytics tool: Analyzing curriculum using course competencies, Swapna GOTTIPATI and Venky SHANKARARAMAN

PDF

Multi-generation product diffusion in the presence of strategic consumers, Zhiling GUO and Jianqing CHEN

PDF

A model of competition between perpetual software and software as a service, Zhiling GUO and Dan MA

PDF

A model of competition between perpetual software and software as a service, Zhiling GUO and Dan MA

PDF

Pricing for a last-mile transportation system, Hai WANG and Yiwei CHEN

PDF

Upping the game of taxi driving in the age of Uber, Shashi Shekhar JHA, Shih-Fen CHENG, Meghna LOWALEKAR, Wai Hin WONG, Rajendram Rishikeshan RAJENDRAM, Trong Khiem TRAN, Pradeep VARAKANTHAM, Nghia TRUONG TRONG, and Firmansyah ABD RAHMAN

PDF

Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing, Thivya KANDAPPU, Archan MISRA, Shih Fen CHENG, Randy TANDRIANSYAH, and Hoong Chuin LAU

PDF

Scaling human activity recognition via deep learning-based domain adaptation, Md Abdullah Hafiz KHAN, Nirmalya ROY, and Archan MISRA

PDF

Understanding the effects of taxi ride-sharing: A case study of Singapore, Yazhe WANG, Baihua ZHENG, and Ee-peng LIM

PDF

Expressive query over outsourced encrypted data, Yang YANG, Ximeng LIU, and Robert H. DENG

PDF

Modelling domain relationships for transfer learning on retrieval-based question answering systems in e-commerce, Jianfei YU, Minghui QIU, Jing JIANG, Jun HUANG, Shuangyong SONG, Wei CHU, and Haiqing CHEN

Submissions from 2017

PDF

Proactive and reactive coordination of non-dedicated agent teams operating in uncertain environments, Pritee AGRAWAL and Pradeep VARAKANTHAM

PDF

Sampling based approaches for minimizing regret in uncertain Markov Decision Problems (MDPs), Asrar AHMED, Pradeep VARAKANTHAM, Meghna LOWALEKAR, Yossiri ADULYASAK, and Patrick JAILLET

PDF

Fast adaptation of activity sensing policies in mobile devices, Mohammad Abu ALSHEIKH, Dusit NIYATO, Shaowei LIN, Hwee-Pink TAN, and Dong In KIM

PDF

Fast adaptation of activity sensing policies in mobile devices, Mohammad Abu ALSHEIKH, Dusit NIYATO, Shaowei LIN, Hwee-Pink TAN, and Dong In KIM

PDF

The impact of coverage on bug density in a large industrial software project, Thomas BACH, Artur ANDRZEJAK, Ralf PANNEMANS, and David LO

PDF

Coordinating supply and demand on an on-demand service platform with impatient customers, Jiaru BAI, Kut C. SO, Christopher TANG, Xiqun CHEN, and Hai WANG

PDF

Cyber foraging: Fifteen years later, Rajesh Krishna BALAN and Jason FLINN

PDF

Automated Android application permission recommendation, Lingfeng BAO, David LO, and Xin XIA

PDF

Who will leave the company?: A large-scale industry study of developer turnover by mining monthly work report, Lingfeng BAO, Zhenchang XING, Xin XIA, David LO, and Shanping LI

PDF

Inference of development activities from interaction with uninstrumented applications, Lingfeng BAO, Zhenchang XING, Xin XIA, LO, and Ahmed E. HASSAN

PDF

Genomic security (Lest we forget), Tatiana BRADLEY, Xuhua DING, and Gene TSUDIK

PDF

Every step you take, I’ll be watching you: Practical StepAuth-entication of RFID paths, Kai BU and Yingjiu LI

PDF

Every step you take, I’ll be watching you: Practical StepAuth-entication of RFID paths, Kai BU and Yingjiu LI

PDF

Version-sensitive mobile app recommendation, Da CAO, Liqiang NIE, and Xiangnan HE

PDF

Employing smartwatch for enhanced password authentication, Bing CHANG, Ximing LIU, Yingjiu LI, Pingjian WANG, Wen-Tao ZHU, and Zhan WANG

Link

iUpdater: Low cost RSS fingerprints updating for device-free localization, Liqiong CHANG, Jie XIONG, Yu WANG, Xiaojiang CHEN, Junhao HU, and Dingyi FANG

PDF

BreathPrint: Breathing acoustics-based user authentication, Jagmohan CHAUHAN, Yining HU, Suranga SEREVIRATNE, Archan MISRA, Aruna SEREVIRATNE, and Youngki LEE

PDF

Tackling large-scale home health care delivery problem with uncertainty, Cen CHEN, Zachary RUBINSTEIN, Stephen SMITH, and Hoong Chuin LAU

PDF

Now you see it, now you don't! A study of content modification behavior in Facebook, Fuxiang CHEN and Ee-peng LIM

PDF

Scalable urban mobile crowdsourcing: Handling uncertainty in worker movement, Shih-Fen CHENG; CHEN CEN; Thivya KANDAPPU; Hoong Chuin LAU; Archan MISRA; Nikita JAIMAN; Randy Tandriansyah DARATAN; and Ming Hui, Desmond (XU Minghui) KOH

PDF

CLCMiner: Detecting cross-language clones without intermediates, Xiao CHENG, Zhiming PENG, Lingxiao JIANG, Hao ZHONG, Haibo YU, and Jianjun ZHAO

PDF

Pivot-based Metric Indexing, Lu CHEN, Yunjun GAO, Baihua ZHENG, Christian S. JENSEN, Hanyu YANG, and Keyu YANG

PDF

Indexing metric uncertain data for range queries and range joins, Lu CHEN, Yunjun GAO, Aoxiao ZHONG, Christian S. JENSEN, Gang CHEN, and Baihua ZHENG

BUSH: Empowering large-scale MU-MIMO in WLANs with hybrid beamforming, Zhe CHEN, Xu ZHANG, Sulei WANG, Yuedong XU, Jie XIONG, and Xin WANG

BUSH: Empowering large-scale MU-MIMO in WLANs with hybrid beamforming, Zhe CHEN, Xu ZHANG, Sulei WANG, Yuedong XU, Jie XIONG, and Xin WANG

PDF

The wonders of the spreadsheet tool for data management and insights, Michelle L. F. CHEONG

PDF

BTCI: A new framework for identifying congestion cascades using bus trajectory data, Meng-Fen CHIANG, Ee-peng LIM, Wang-Chien LEE, and Agus Trisnajaya KWEE

PDF

Easing Cross-Border Communication: Mobile-mediated Communication and Its Framework, Kyungsub CHOI and Young Soo KIM

PDF

Exploiting contextual information for fine-grained tweet geolocation, Wen Haw CHONG and Ee-peng LIM

PDF

Tweet Geolocation: Leveraging location, user and peer signals, Wen-Haw CHONG and Ee-Peng LIM

PDF

Collective entity linking in tweets over space and time, Wen Haw CHONG, Ee-peng LIM, and William COHEN

PDF

Predicting potential Alzheimer medical condition in elderly using IOT sensors - Case study, Zhi Hao Kevin CHONG, Yu Xuan TEE, Ling Jing TOH, Shi Jia PHANG, Jie Ying LIEW, Bertran QUECK, and Swapna GOTTIPATI

PDF

Empath-D: Empathetic design for accessibility, Kenny Tsu Wei CHOO, Rajesh Krishna BALAN, Kiat Wee TAN, Archan MISRA, and Youngki LEE

PDF

Special section: Technological innovations for communication and collaboration in social spaces, Eric K. CLEMONS, Rajiv M. DEWAN, Robert John KAUFFMAN, and Thomas A. WEBER

PDF

Understanding the information-based transformation of strategy and society, Eric K. CLEMONS, Rajiv M. DEWAN, Robert John KAUFFMAN, and Thomas A. WEBER

PDF

Empirical study of usage and performance of java collections, Diego COSTA, Artur ANDRZEJAK, Janos SEBOEK, and David LO

PDF

Social tag relevance learning via ranking-oriented neighbor voting, Chaoran CUI, Jialie SHEN, Jun MA, and Tao LIAN

PDF

Attribute-based encryption with expressive and authorized keyword search, Hui CUI, Robert H. DENG, Joseph K. LIU, and Yingjiu LI

PDF

Attribute-based storage supporting secure deduplication of encrypted data in cloud, Hui CUI, Robert H. DENG, Yingjiu LI, and Guowei WU

PDF

Encrypted data processing with Homomorphic Re-Encryption, Wenxiu DING, Zheng YAN, and Robert H. DENG

PDF

Secure encrypted data deduplication with ownership proof and user revocation, Wenxiu DING, Zheng YAN, and Robert H. DENG

PDF

Large scale kernel methods for online AUC maximization, Yi DING, Chenghao LIU, Peilin ZHAO, and Steven C. H. HOI

PDF

A neural network model for semi-supervised review aspect identification, Ying DING, Changlong YU, and Jing JIANG

PDF

Recurrent neural networks with auxiliary labels for cross-domain opinion target extraction, DING YING; YU, JIANFEI; and Jing JIANG

PDF

Modeling check-in behavior with geographical neighborhood influence of venues, Thanh Nam DOAN and Ee-Peng LIM

PDF

Exploring representativeness and informativeness for active learning, Bo DU, Zengmao WANG, and Lefei ZHANG

PDF

Improving student learning in an introductory programming course using flipped classroom and competency framework, Joelle ELMALEH and Venky SHANKARARAMAN

PDF

SourceVote: Fusing multi-valued data via inter-source agreements, Xiu Susie FANG, Quan Z. SHENG, Xianzhi WANG, Mahmoud BARHAMGI, Lina YAO, and Anne H.H. NGU

PDF

SourceVote: Fusing multi-valued data via inter-source agreements, Xiu Susie FANG, Quan Z. SHENG, Xianzhi WANG, Mahmoud BARHAMGI, Lina YAO, and Anne H.H. NGU

PDF

Sparse online learning of image similarity, Xingyu GAO, Steven C. H. HOI, Yongdong ZHANG, Jianshe ZHOU, Ji WAN, Zhenyu CHEN, Jintao LI, and Jianke ZHU

PDF

On efficiently finding reverse K-nearest neighbors over uncertain graphs, Yunjun GAO, Xiaoye MIAO, Gang CHEN, Baihua ZHENG, Deng CAI, and Huiyong CUI

PDF

Metric similarity joins using MapReduce, Yunjun GAO, Keyu YANG, Lu CHEN, Baihua ZHENG, Gang CHEN, and Chun CHEN

PDF

Incentivizing the use of bike trailers for dynamic repositioning in bike sharing systems, Supriyo GHOSH and Pradeep VARAKANTHAM

PDF

Dynamic repositioning to reduce lost demand in Bike Sharing Systems, Supriyo GHOSH, Pradeep VARAKANTHAM, Yossiri ADULYASAK, and Patrick JAILLET

PDF

An analysis of rumor and counter-rumor messages in social media, Dion Hoe-Lian GOH, Alton Y. K. CHUA, Hanyu SHI, Wenju WEI, Haiyan WANG, and Ee-peng LIM

PDF

Sensor-driven detection of social isolation in community-dwelling elderly, W K P Neranjana Nadee Rodrigo GOONAWARDENE, Xiaoping TOH, and Hwee-Pink TAN

Mining capstone project wikis for knowledge discovery, Swapna GOTTIPATI, Venky SHANKARARAMAN, and Melvrivk Aik Chun GOH

PDF

Interactive visual analytics application for spatio-temporal movement data, Yifei GUAN and Tin Seong KAM

PDF

Interactive visual analytics application for spatiotemporal movement data, Yifei GUAN and Tin Seong KAM

Home health care delivery problem, Aldy GUNAWAN, Hoong Chuin LAU, and Kun LU

PDF

Well-tuned algorithms for the Team Orienteering Problem with Time Windows, Aldy GUNAWAN, Hoong Chuin LAU, Pieter VANSTEENWEGEN, and Kun LU

A selective-discrete particle swarm optimization algorithm for solving a class of orienteering problems, Aldy GUNAWAN, Vincent YU, Perwira REDI, Parida JEWPANYA, and Hoong Chuin LAU

PDF

Factored similarity models with social trust for top-N item recommendation, Guibing GUO, Jie ZHANG, Feida ZHU, and Xingwei WANG

PDF

Parallel personalized pagerank on dynamic graphs, Wentian GUO, Yuchen LI, Yuchen LI, and Kian-Lee TAN

PDF

How to enable future faster payments? An evaluation of a hybrid payments settlement mechanism, Zhiling GUO and Yuanzhi HUANG

PDF

Exploiting android system services through bypassing service helpers, Yachong GU, Yao CHENG, Lingyun YING, Yemian LU, Qi LI, and Purui SU

PDF

COMPRESS: A comprehensive framework of trajectory compression in road networks, Yunheng HAN, Weiwei SUN, and Baihua ZHENG

PDF

Online multitask relative similarity learning, Shuji HAO; Peilin ZHAO; Yong LIU; HOI, Steven C. H.; and Chunyan MIAO

PDF

SOAL: Second-order Online Active Learning, Shuji HAO; Peilin ZHAO; LU JING; HOI, Steven C. H.; Chunyan MIAO; and Chi ZHANG

PDF

Research strategies for biomedical and health informatics: Some thought-provoking and critical proposals to encourage scientific debate on the nature of good research in medical informatics, Reinhold HAUX and et al.

PDF

They all seem good, but which one fits me? Reducing fit uncertainty for digital entertainment goods, Ai Phuong HOANG

PDF

Crowdsensing and analyzing micro-event tweets for public transportation insights, Thoong HOANG, Pei Hua (XU Peihua) CHER, Ee-peng LIM, and Ee--Peng LIM

PDF

Modeling topics and behavior of microbloggers: An integrated approach, Tuan Anh HOANG and Ee-peng LIM

Expert as a service: Software expert recommendation via knowledge domain embeddings in stack overflow, Chaoran HUANG, Lina YAO, Xianzhi WANG, Boualem BENATALLAH, and Quan Z. SHENG

Which packages would be affected by this bug report?, Qiao HUANG, David LO, Xin XIA, Qingye WANG, and Shanping LI

PDF

Identifying self-admitted technical debt in open source projects using text mining, Qiao HUANG, Emad SHIHAB, Xin XIA, David LO, and Shanping LI

Supervised vs unsupervised models: A holistic look at effort-aware just-in-time defect prediction, Qiao HUANG, Xin XIA, and David LO

PDF

Cybercrime deterrence and international legislation: Evidence from distributed denial of service attacks, Kai-Lung HUI, Seung Hyun KIM, and Qiu-Hong WANG

PDF

DEMO: DeepMon - Building mobile GPU Deep learning models for continuous vision applications, Nguyen Loc HUYNH, Rajesh Krishna BALAN, and Youngki LEE

PDF

DeepMon: Mobile GPU-based deep learning framework for continuous vision applications, Nguyen Loc HUYNH, Youngki LEE, and Rajesh Krishna BALAN

PDF

Towards unobtrusive mental well-being monitoring for independent-living elderly, Nguyen Phan Sinh HUYNH, Hwee-Pink TAN, and Youngki LEE

PDF

Discovering anomalous events from urban informatics data, Kasthuri JAYARAJAH, Vigneshwaran SUBBARAJU, Dulanga KAVEESHA WEERAKOON MUDIYANSELAGE, Archan MISRA, La Thanh TAM, and Noel ATHAIDE

PDF

Understanding inactive yet available assignees in GitHub, Jing JIANG, David LO, Xinyu MA, Fuli FENG, and Li ZHANG

PDF

Why and how developers fork what from whom in GitHub, Jing JIANG, David LO, Jiahuan HE, Xin XIA, Pavneet Singh KOCHHAR, and Li ZHANG