Follow

Submissions from 2017

PDF

Coordinating supply and demand on an on-demand platform: Price, wage, and payout ratio, Jiaru BAI, Kut C SO, Christopher TANG, Xiqun CHEN, and Hai WANG

PDF

Version-sensitive mobile app recommendation, Da CAO, Liqiang NIE, and Xiangnan HE

PDF

Now you see it, now you don't! A study of content modification behavior in Facebook, Fuxiang CHEN and Ee-peng LIM

PDF

CLCMiner: Detecting cross-language clones without intermediates, Xiao CHENG, Zhiming PENG, Lingxiao JIANG, Hao ZHONG, Haibo YU, and Jianjun ZHAO

PDF

Easing Cross-Border Communication: Mobile-mediated Communication and Its Framework, Kyungsub CHOI and Young Soo KIM

PDF

Exploiting contextual information for fine-grained tweet geolocation, Wen Haw CHONG and Ee-peng LIM

PDF

Empath-D: Empathetic design for accessibility, CHOO TSU WEI, KENNY; Rajesh Krishna BALAN; Kiat Wee Tan; Archan MISRA; and Youngki LEE

PDF

Recurrent neural networks with auxiliary labels for cross-domain opinion target extraction, DING YING; YU, JIANFEI; and Jing JIANG

PDF

Exploring representativeness and informativeness for active learning, Bo DU, Zengmao WANG, and Lefei ZHANG

PDF

Metric similarity joins using MapReduce, Yunjun GAO, Keyu YANG, Lu CHEN, Baihua ZHENG, Gang CHEN, and Chun CHEN

Factored similarity models with social trust for top-N item recommendation, Guibing GUO, Jie ZHANG, Feida ZHU, and Xingwei WANG

PDF

COMPRESS: A comprehensive framework of trajectory compression in road networks, Yunheng HAN, Weiwei SUN, and Baihua ZHENG

PDF

SOAL: Second-order Online Active Learning, Shuji HAO; Peilin ZHAO; LU JING; HOI, Steven C. H.; Chunyan MIAO; and Chi ZHANG

PDF

Crowdsensing and analyzing micro-event tweets for public transportation insights, Thoong HOANG, Pei Hua (XU Peihua) CHER, Ee-peng LIM, and Ee--Peng LIM

PDF

Cybercrime deterrence and international legislation: Evidence from distributed denial of service attacks, Kai-Lung HUI, Seung Hyun KIM, and QIU-HONG WANG

PDF

Privacy in context-aware mobile crowdsourcing systems, Thivya KANDAPPU, Archan MISRA, Shih-Fen CHENG, and Hoong Chuin LAU

PDF

Collaboration trumps homophily in urban mobile crowd-sourcing, Thivya KANDAPPU, Archan MISRA, and Randy Tandriansyah DARATAN

PDF

Decentralized planning in stochastic environments with submodular rewards, Rajiv Ranjan KUMAR, Pradeep VARAKANTHAM, and Akshat KUMAR

PDF

On analyzing user topic-specific platform preferences across multiple social media sites, Roy Ka Wei LEE, Tuan Anh HOANG, and Ee-peng LIM

PDF

A data-driven approach for benchmarking energy efficiency of warehouse buildings, Wee Leong LEE, Kar Way TAN, and Zui Young LIM

PDF

Discovering Historic Traffic-tolerant Paths in Road Networks, Pui Hang LI, Man Lung YIU, and Kyriakos MOURATIDIS

Effective K-Vertex connected component detection in large-scale networks, Yuan LI, Yuha ZHAO, Wang WANG, Feida ZHU, Yubao WU, and Shenglei SHI

PDF

Streaming classification with emerging new class by class matrix sketching, Xin MU, Feida ZHU, Juan Du, Ee-peng LIM, and Zhi-Hua ZHOU

PDF

Collective multiagent sequential decision making under uncertainty, NGUYEN DUC THIEN, Akshat KUMAR, and Hoong Chuin LAU

PDF

Whole-system analysis for understanding publicly accessible functions in Android, Huu Hoang NGUYEN, Lingxiao JIANG, and Thanh Tho QUAN

Micro-review synthesis for multi-entity summarization,   NGUYEN THANH SON, Hady Wirawan LAUW, and Panayiotis TSAPARAS

Technology mergers and acquisitions in the presence of an installed base: A strategic analysis, QIU-HONG WANG and Kai-Lung HUI

PDF

Online hacker forum censorship: Would banning the bad guys attract good guys?, QIU-HONG WANG, Le-Ting ZHANG, and Meng-Ke QIAO

PDF

Harnessing Twitter to support serendipitous learning of developers, ABHISHEK SHARMA, YUAN TIAN, AGUS SULISTYA, David LO, and Aiko YAMASHITA

PDF

Inferring smartphone keypress via smartwatch inertial sensing, SOUGATA SEN, Karan GROVER, Vigneshwaran SUBBARAJU, and Archan MISRA

PDF

Efficient motif discovery in spatial trajectories using discrete fréchet distance, Bo TANG, Man Lung YIU, Kyriakos MOURATIDIS, and Kai WANG

PDF

On the effectiveness of code-reuse-based Android application obfuscation, Xiaoxiao TANG, Yu LIANG, Xinjie MA, Yan LIN, and Debin GAO

PDF

Innovation and productivity in the maritime industry, Kar Way TAN

PDF

Continuous Top-k monitoring on document streams, Leong Hou U, Junjie ZHANG, Kyriakos MOURATIDIS, and Ye LI

PDF

Enabling sustainable bulk transfer in environmentally-powered wireless sensor networks, Alvin Cerdena VALERA, Wee-Seng SOH, and Hwee-Pink TAN

PDF

A compare-aggregate model for matching text sequences, Shuohang WANG and Jing JIANG

PDF

Machine comprehension using match-LSTM and answer pointer, Shuohang WANG and Jing JIANG

PDF

Learning personalized preference of strong and weak ties for social recommendation, Xin WANG; HOI, Steven C. H.; Martin ESTER; Jiajun BU; and Chun CHEN

PDF

Probabilistic public key encryption for controlled equijoin in relational databases, Yujue WANG and Hwee Hwa PANG

PDF

Identity-based data outsourcing with comprehensive auditing in clouds, Yujue WANG; Qianhong WU; Bo QIN; Wenchang SHI; DENG, Robert H.; and Jiankun HU

PDF

Robust optimization for tree-structured stochastic network design, Xiaojian WU, Akshat KUMAR, and Daniel SHELDON

PDF

Detecting similar repositories on GitHub, Yun ZHANG, David LO, PAVNEET SINGH KOCHHAR, Xin XIA, Quanlai LI, and Jianling SUN

PDF

SAP: Improving continuous top-K queries over streaming data, Rui ZHU, Bin WANG, Xiaochun YANG, Baihua ZHENG, and Guoren WANG

Submissions from 2016

PDF

Extracting Food Substitutes From Food Diary via Distributional Similarity, Palakorn ACHANANUPARP and Ingmar WEBER

PDF

Scalable greedy algorithms for task/resource constrained multi-agent stochastic planning, AGRAWAL PRITEE, Pradeep VARAKANTHAM, and William YEOH

PDF

Achieving stable and fair profit allocation with minimum subsidy in collaborative logistics, Lucas AGUSSURJA, Hoong Chuin LAU, and Shih-Fen CHENG

PDF

Shortest Path Based Decision Making Using Probabilistic Inference, Akshat KUMAR

PDF

Dual formulations for optimizing Dec-POMDP controllers, Akshat KUMAR, Hala MOSTAFA, and Shlomo ZILBERSTEIN

PDF

Robust decision making for stochastic network design, Akshat KUMAR, Arambam James SINGH, Pradeep VARAKANTHAM, and Daniel SHELDON

PDF

CACE: Exploiting behavioral interactions for improved activity recognition in multi-inhabitant smart homes, Mohammad Arif Ul Alam, Nirmalya ROY, Archan MISRA, and Joseph TAYLOR

PDF

Rate Distortion Balanced Data Compression in Wireless Sensor Networks, Mohammad Abu ALSHEIKH, Shaowei LIN, Dusit NIYATO, and Hwee-Pink TAN

PDF

Mobile big data analytics using deep learning and apache spark, Mohammad Abu ALSHEIKH, Dusit NIYATO, Shaowei LIN, Hwee-Pink TAN, and Zhu HAN

PDF

Detecting communities using coordination games: A short paper, Radhika ARAVA and Pradeep VARAKANTHAM

PDF

MobiPot: Understanding Mobile Telephony Threats with Honeycards, Marco BALDUZZI, Payas GUPTA, Lion GU, Debin GAO, and Mustaque AHAMAD

MobiPot: Understanding Mobile Telephony Threats with Honeycards, Marco BALDUZZI, Payas GUPTA, Lion GU, Debin GAO, and Mustaque AHAMAD

Information security practice and experience, Feng BAO; Liqun CHEN; DENG, Robert H.; and Guojun WANG

PDF

How Android app developers manage power consumption? An empirical study by mining power management commits, Lingfeng BAO, David LO, Xin XIA, Xinyu WANG, and Cong TIAN

What permissions should this android app request?, Lingfeng BAO, David LO, Xin XIA, and Shanping LI

PDF

How to break an API: Cost negotiation and community values in three software ecosystems, Christopher Bogart, Christian K\303\244stner, James Herbsleb, and FERDIAN THUNG

PDF

How practitioners perceive the relevance of ESEM research, Jeffrey C. CARVER, Oscar DIESTE, Nicholas A. KRAFT, David LO, and Thomas ZIMMERMANN

PDF

Information source detection via maximum a posteriori estimation, Biao CHANG, Feida ZHU, Enhong CHEN, and Qi. LIU

PDF

TafLoc: Time-adaptive and fine-grained device-free localization with little cost, Liqiong CHANG, Jie XIONG, Xiaojiang CHEN, Ju WANG, Junhao HU, and Wei WANG

PDF

Poster: Sonicnect: Accurate hands-free gesture input system with smart acoustic sensing, Maotian CHANG, Ping LI, Panlong YANG, Jie XIONG, and Chang TIAN

PDF

Demo: Profiling power utilization behaviours of smartwatch applications, CHAN JOO KENG JOSEPH, Lingxiao JIANG, Rajesh Krishna BALAN, Youngki LEE, and Archan MISRA

PDF

Graph-aided directed testing of Android applications for checking runtime privacy behaviours, CHAN JOO KENG JOSEPH, Lingxiao JIANG, Kiat Wee Tan, and Rajesh Krishna BALAN

PDF

Leveraging automated privacy checking for design of mobile privacy protection mechanisms, CHAN JOO KENG JOSEPH, Lingxiao JIANG, Kiat Wee Tan, and Rajesh Krishna BALAN

PDF

An Experimental Investigation of Product Competition and Marketing in Social Networks, Cen CHEN, Zhiling GUO, Shih-Fen CHENG, and Hoong Chuin LAU

PDF

Mining and clustering mobility evolution patterns from social media for urban informatics, Chien-Cheng CHEN, Meng-Fen CHIANG, and Wen-Chih PENG

PDF

A Feasible No-Root Approach on Android, Yao CHENG, Yingjiu LI, and Robert H. DENG

PDF

A study on a feasible no-root approach on Android, Yao CHENG; Yingjiu LI; DENG, Robert H.; Lingyun YING; and Wei HE

SuperCall: A Secure Interface For Isolated Execution Environment to Dynamically Use External Services, Yueqiang CHENG, Qing LI, Miao YU, Xuhua DING, and Qingni SHEN

PDF

Which information sources are more effective and reliable in video search, CHENG ZHIYONG, Xuanchong LI, Jialie SHEN, and Alexander G. Hauptmann

PDF

On very large scale test collection for landmark image search benchmarking, CHENG ZHIYONG and Jialie SHEN

PDF

On Effective Location-Aware Music Recommendation, Zhiyong CHENG and Jialie SHEN

PDF

On effective personalized music retrieval via exploring online user behaviors, Zhiyong CHENG; Jialie SHEN; and HOI, Steven C. H.

PDF

The Effects of Multiple Query Evidences on Social Image Retrieval, Zhiyong CHENG, Jialie SHEN, and Haiyan MIAO

Learning robust multi-label hashing for efficient image retrieval, Haibao CHEN, Yuyan ZHAO, Lei ZHU, Guilin CHEN, and Kaichuan SUN

PDF

Mobile app tagging, Ning CHEN, Steven C. H. HOI, Shaohua LI, and Xiaokui XIAO

PDF

When Peculiarity Makes a Difference: Object Characterisation in Heterogeneous Information Networks, Wei CHEN, Feida ZHU, Lei ZHAO, and Xiaofang ZHOU

PDF

Scenario-based simulation game for hospital beds capacity planning in Singapore, CHEONG, Michelle L. F. and Li Siong LIM

PDF

Passively testing routing protocols in wireless sensor networks, Xiaoping CHE, Stephane MAAG, Hwee-Xian TAN, and Hwee-Pink TAN

PDF

Poster: Improving communication and communicability with smarter use of text-based messages on mobile and wearable devices, CHOO TSU WEI, KENNY

PDF

Collective rumor correction on the death hoax of a political figure in social media, Alton Y. K CHUA, Sin-Mei CHEAH, Dion Hoe-Lian GOH, and Ee-peng LIM

When machine meets society: Social impacts of information and information economics, Eric K. CLEMONS, Rajiv M. DEWAN, Robert John KAUFFMAN, and Thomas A. WEBER

PDF

Social tag relevance learning via ranking-oriented neighbor voting, Chaoran CUI, Jialie SHEN, Jun MA, and Tao LIAN

Revocable and decentralized attribute-based encryption, Hui CUI and DENG, Robert H.

PDF

Attribute-based encryption with granular revocation, Hui CUI; DENG, Robert H.; Xuhua DING; and Yingjiu LI

An efficient and expressive ciphertext-policy attribute-based-encryption scheme with partially hidden access structures, Hui CUI; DENG, Robert H.; Guowei WU; and Junzuo LAI

Server-aided revocable attribute-based encryption, Hui CUI; DENG, Robert H.; Yingjiu LI; and Baodong QIN

Escrow free attribute-based signature with self-revealability, Hui CUI; Guilin WANG; DENG, Robert H.; and Baodong QIN

PDF

Efficient and Expressive Keyword Search Over Encrypted Data in the Cloud, Hui CUI; Zhiguo WAN; DENG, Robert H.; Guilin WANG; and Yingjiu LI

ICT-TrAVEl: Mobile Public Transport Companion for the Visually Impaired, Linting CUI; YIZHI, KENNY NGO; and Benjamin GAN

PDF

A survey on future internet security architectures, Wenxiu DING; Zheng YAN; and DENG, Robert H.

PDF

Attractiveness versus competition: Towards an unified model for user visitation, Thanh-Nam DOAN and Ee-Peng LIM

PDF

Probabilistic models for contextual agreement in preferences, DO HA LOC and Hady Wirawan LAUW

PDF

Detecting community pacemakers of burst topic in Twitter, Guozhong DONG, Wu YANG, Feida ZHU, and Wei WANG

PDF

Discovering burst patterns of burst topic in twitter, Guozhong DONG, Wu YANG, Feida ZHU, and Wei WANG

DPBT: A System for Detecting Pacemakers in Burst Topics, Guozhong DONG, Wu YANG, Feida ZHU, and Wei WANG

ORPLocator: Identifying read points of configuration options via static analysis, Zhen DONG, Artur ANDRZEJAK, David LO, and Diego COSTA

PDF

Demo: Drumming application using commodity wearable devices, Bharat DWIVEDI, Archan MISRA, and Youngki LEE