Submissions from 2020
A generalized formal semantic framework for smart contracts, Jiao JIAO, Shang-Wei LIN, and Jun SUN Conference Proceeding Article
A new construction for linkable secret handshake, Yangguang TIAN, Yingjiu LI, Robert H. DENG, Nan LI, Guomin YANG, and Zheng YANG Journal Article
Are these comments triggering? Predicting triggers of toxicity in online discussions, Hind Almerekhi, Haewoon KWAK, Joni SALMINEN, and Bernard J. JANSEN Conference Proceeding Article
Artificial intelligence (AI) ethics: Ethics of AI and ethical AI, Keng SIAU and Weiyu WANG Journal Article
Attribute-based cloud data integrity auditing for secure outsourced storage, Yong YU, Yannan LI, Bo YANG, Willy SUSILO, Guomin YANG, and Jian BAI Journal Article
Designing a smart Internet of Things solution for point of use water filtration management system in residential, commercial and public settings, Tristan LIM, Hwee-Pink TAN, Chin Sin ONG, Rahul BELANI, and Siddhant S. K. AGRAWAL Journal Article
DFSeer: A visual analytics approach to facilitate model selection for demand forecasting, Dong SUN, Zezheng FENG, Yuanzhe CHEN, Yong WANG, Jia ZENG, Mingxuan YUAN, Ting-Chuen PONG, and Huamin QU Conference Proceeding Article
Differentially private online task assignment in spatial crowdsourcing: A tree-based approach, Qian TAO, Yongxin TONG, Zimu ZHOU, Yexuan SHI, Lei CHEN, and Ke XU Conference Proceeding Article
Energy-efficient distance-bounding with residual charge computation, Yunhui ZHUANG, Anjia YANG, Gerhard HANCKE, Duncan S. WONG, and Guomin YANG Journal Article
Google summer of code: Student motivations and contributions, Jefferson O. SILVA, Igor Scaliante WIESE, Daniel M. GERMÁN, Christoph TREUDE, Marco Aurélio GEROSA, and Igor STEINMACHER Journal Article
How to and how much? Teaching ethics in an interaction design course, Bimlesh WADHWA, Eng Lieh OUH, and Benjamin GAN Conference Paper
Identity-based encryption transformation for flexible sharing of encrypted data in public cloud, Robert H. DENG, Zheng QIN, Qianhong WU, Zhenyu GUAN, Robert H. DENG, Yujue WANG, and Yunya ZHOU Journal Article
Improving neural relation extraction with implicit mutual relations, Jun KUANG, Yixin CAO, Jianbing ZHENG, Xiangnan HE, Ming GAO, and Aoying ZHOU Conference Proceeding Article
Incorporating a reverse logistics scheme in a vehicle routing problem with cross-docking network: A modelling approach, Audrey Tedja WIDJAJA, Aldy GUNAWAN, Panca JODIAWAN, and Vincent F. YU Conference Proceeding Article
Leakage-resilient biometric-based remote user authentication with fuzzy extractors, Yangguang TIAN, Yingjiu LI, Binanda SENGUPTA, Nan LI, and Chunhua SU Journal Article
MapTransfer: Urban air quality map generation for downscaled sensor deployments, Yun CHENG, Xiaoxi HE, Zimu ZHOU, and Lothar THIELE Conference Proceeding Article
On the Robustness of Cascade Diffusion under Node Attacks, Alvis LOGINS, Yuchen LI, and Panagiotis KARRAS Conference Proceeding Article
On the security of LWE cryptosystem against subversion attacks, Zhichao YANG, Rongmao CHEN, Chao LI, Longjiang QU, and Guomin YANG Journal Article
Poster abstract: Data communication using switchable privacy glass, Changshuo HU, Dong MA, Mahbub HASSAN, and Wen HU Conference Proceeding Article
Predictive task assignment in spatial crowdsourcing: A data-driven approach, Yan ZHAO, Kai ZHENG, Yue CUI, Han SU, Feida ZHU, and Xiaofang ZHOU Conference Proceeding Article
Privacy-preserving outsourced support vector machine design for secure drug discovery, Ximeng LIU, Robert H. DENG, Kim-Kwang Raymond CHOO, and Yang YANG Journal Article
RecipeGPT: Generative pre-training based cooking recipe generation and evaluation system, Helena Huey Chong LEE, Ke SHU, Palakorn ACHANANUPARP, Philips Kokoh PRASETYO, Yue LIU, Ee-peng LIM, and Lav R. VARSHNEY Conference Proceeding Article
Reinforced negative sampling over knowledge graph for recommendation, Xiang WANG, Yaokun XU, Xiangnan HE, Yixin CAO, Meng WANG, and Tat-Seng CHUA Conference Proceeding Article
Review-guided helpful answer identification in e-commerce, Wenxuan ZHANG, Wai LAM, Yang DENG, and Jing MA Conference Proceeding Article
Statistical modeling of harassment against Reddit moderators, Hamad Bin Khalifa University and Haewoon KWAK Conference Proceeding Article
Techniques to visualize occluded graph elements for 2.5D map editing, Kazuyuki FUJITA, Daigo HAYASHI, Kotaro HARA, Kazuki TAKASHIMA, and Yoshifumi KITAMURA Conference Proceeding Article
Two can play that game: An adversarial evaluation of a cyber-alert inspection system, Ankit SHAH, Arunesh SINHA, Rajesh GANESAN, Sushil JAJODIA, and Hasan CAM Journal Article
Understanding the relation between repeat developer interactions and bug resolution times in large open source ecosystems: A multisystem study, Subhajit DATTA, Reshma ROYCHOUDHURI, and Subhashis MAJUMDER Journal Article
VoiceCoach: Interactive evidence-based training for voice modulation skills in public speaking, Xingbo WANG, Haipeng ZENG, Yong WANG, Aoyu WU, Zhida SUN, Xiaojuan MA, and QU Huamin Conference Proceeding Article
Decision theory for network security: Active sensing for detection and prevention of data exfiltration, Sara MC CARTHY, Arunesh SINHA, Milind TAMBE, and Pratyusa K. MANADHATA Book Chapter
An empirical study on correlation between coverage and robustness for deep neural networks, Yizhen DONG, Peixin ZHANG, Jingyi WANG, Shuang LIU, Jun SUN, Jianye HAO, Xinyu WANG, Li WANG, Jinsong DONG, and Ting DAI Conference Proceeding Article
Automated synthesis of local time requirement for service composition, Étienne ANDRÉ, Tian Huat TAN, Manman CHEN, Shuang LIU, Jun SUN, Yang LIU, and Jin Song DONG Journal Article
Automatic verification of multi-threaded programs by inference of rely-guarantee specifications, Xuan-Bach LE, David SANAN, Jun SUN, and Shang-Wei LIN Conference Proceeding Article
Capacitor-based activity sensing for kinetic-powered wearable IoTs, Guohao LAN, Dong MA, Weitao XU, Mahbub HASSAN, and Wen HU Journal Article
Deep pixel-level matching via attention for video co-segmentation, Junliang LI, Hon-Cheng WONG, Shengfeng HE, Sio-Long LO, Guifang ZHANG, and Wenxiao WANG Journal Article
Detecting fake news in social media: An Asia-Pacific perspective, Meeyoung CHA, Wei GAO, and Cheng-Te LI Journal Article
Feature agglomeration networks for single stage face detection, Jialiang ZHANG, Xiongwei WU, Steven C. H. HOI, and Jianke ZHU Journal Article
HeartQuake: Accurate low-cost non-invasive ECG monitoring using bed-mounted geophones, Jaeyeon PARK, Hyeon CHO, Rajesh Krishna BALAN, and JeongGil KO Journal Article
IFIX: Fixing concurrency bugs while they are introduced, Zan WANG, Haichi WANG, Shuang LIU, Jun SUN, Haoyu WANG, and Junjie CHEN Conference Proceeding Article
Learning fault models of cyber physical systems, Teck Ping KHOO, Jun SUN, and Sudipta CHATTOPADHYAY Conference Proceeding Article
Light structure from pin motion: Geometric point light source calibration, Hiroaki SANTO, Michael WAECHTER, Wen-yan LIN, Yusuke SUGANO, and Yasuyuki MATSUSHITA Journal Article
PokeME: Applying context-driven notifications to increase worker engagement in mobile crowd-sourcing, Thivya KANDAPPU, Abhinav MEHROTRA, Archan MISRA, Mirco MUSOLESI, Shih-Fen CHENG, and Lakmal Buddika MEEGAHAPOLA Conference Proceeding Article
Predicting student performance in interactive online question pools using mouse interaction features, Huan WEI, Haotian LI, Meng XIA, Yong WANG, and Huamin QU Conference Proceeding Article
Privacy-preserving data processing with flexible access control, Wenxiu DING, Zheng YAN, and Robert H. DENG Journal Article
S2N2: An interpretive semantic structure attention neural network for trajectory classification, Canghong JIN, Ting TAO, Xianzhe LUO, Zemin LIU, and Minghui WU Journal Article
Securing bring-your-own-device (BYOD) programming exams, Oka KURNIAWAN, Norman LEE, and Christopher M. POSKITT Conference Proceeding Article
Space efficient revocable IBE for mobile devices in cloud computing, Baodong QIN, Ximeng LIU, Zhuo WEI, and Dong ZHENG Journal Article
The search for optimal oxygen saturation targets in critically ill: Patients observational data from large ICU databases, Willem VAN DEN BOOM, Michael HOY, Jagadish SANKARAN, Mengru LIU, Haroun CHAHED, Mengling FENG, and Kay Choong SEE Journal Article
The spatial optimization and evaluation of the economic, ecological, and social value of urban green space in Shenzhen, Yuhan YU, Wenting ZHANG, Peihong FU, Wei HUANG, Keke LI, and Kai CAO Journal Article
Towards k-vertex connected component discovery from large networks, Li YUAN, Guoren WANG, Yuhai ZHAO, and Feida ZHU Journal Article
Understanding Wikipedia as a resource for opportunistic learning of computing concepts, Martin P. ROBILLARD and Christoph TREUDE Conference Proceeding Article
Using reinforcement learning to minimize the probability of delay occurrence in transportation, Zhiguang CAO, Hongliang Guo, Wen Song, Kaizhou Gao, Zhengghua Chen, Le Zhang, and Xuexi Zhang Journal Article
Vehicle routing problem for multi-product cross-docking, Aldy GUNAWAN, Audrey Tedja WIDJAJA, Benjamin GAN, Vincent F. YU, and Panca JODIAWAN Conference Proceeding Article
W8-Scope: Fine-grained, practical monitoring of weight stack-based exercises, Meeralakshmi RADHAKRISHNAN, Archan MISRA, and Rajesh Krishna BALAN Conference Proceeding Article
When the bank comes to you: Branch network and customer omnichannel banking behavior, Mi ZHOU, Dan GENG, Vibhanshu ABHISHEK, and Beibei LI Journal Article
Analysis of blockchain protocol against static adversarial miners corrupted by long delay attackers, Quan YUAN, Puwen WEI, Keting JIA, and Haiyang XUE Journal Article
Are the code snippets what we are searching for? A benchmark and an empirical study on code search with natural-language queries, Shuhan YAN, Hang YU, Yuting CHEN, and Beijun SHEN Edited Conference Proceeding
AUSearch: Accurate API usage search in Github repositories with type resolution, Muhammad Hilmi ASYROFI, Ferdian THUNG, David LO, and Lingxiao JIANG Conference Proceeding Article
Automated deprecated-API usage update for Android apps: How far are we?, Ferdian THUNG, Stefanus AGUS HARYONO, Lucas SERRANO, Gilles MULLER, Julia LAWALL, David LO, and Lingxiao JIANG Conference Proceeding Article
Bounding regret in empirical games, Steven JECMEN, Arunesh SINHA, Zun LI, and Long TRAN-THANH Conference Proceeding Article
Deepbindiff: Learning program-wide code representations for binary diffing, Yue DUAN, Xuezixiang LI, Jinghan WANG, Wang, and Heng YIN Conference Proceeding Article
Deepdualmapper: A gated fusion network for automatic map extraction using aerial images and trajectories, Hao WU, Hanyuan ZHANG, Xinyu ZHANG, Weiwei SUN, Baihua ZHENG, and Yuning JIANG Conference Proceeding Article
Distinguishing similar design pattern instances through temporal behavior analysis, Renhao XIONG, David LO, and Bixin LI Conference Proceeding Article
Does reputational sanctions deter negligence in information security management? A field quasi-experiment, Qian TANG and Andrew B. WHINSTON Journal Article
Essential sentences for navigating Stack Overflow answers, Sarah NADI and Christoph TREUDE Conference Proceeding Article
Example-based colourization via dense encoding pyramids, Chufeng XIAO, Chu HAN, Zhuming ZHANG, Jing QIN, Tien-Tsin WONG, Guoqiang HAN, and Shengfeng HE Journal Article
Example-based colourization via dense encoding pyramids, Chufeng XIAO, Chu HAN, Zhuming ZHANG, Jing QIN, Tien-Tsin WONG, Guoqiang HAN, and Shengfeng HE Journal Article
Five challenges in cloud-enabled intelligence and control, Tarek ABDELZAHER, Yifan HAO, Kasthuri JAYARAJAH, Archan MISRA, Per SKARIN, Shuochao YAO, Dulanga Kaveesha Weerakoon WEERAKOON MUDIYANSELAGE, and Karl-Erik ARZEN Journal Article
GDFace: Gated deformation for multi-view face image synthesis, Xuemiao XU, Keke LI, Cheng XU, and Shengfeng HE Conference Proceeding Article
Generating realistic stock market order streams, Junyi LI, Xintong WANG, Yaoyang LIN, Arunesh SINHA, and Michael P. WELLMAN Conference Proceeding Article
Image enhanced event detection in news articles, Meihan TONG, Shuai WANG, Yixin CAO, Bin XU, Juaizi LI, Lei HOU, and Tat-Seng CHUA Conference Proceeding Article
Interpretable rumor detection in microblogs by attending to user interactions, Ling Min Serena KHOO, Hai Leong CHIEU, Zhong QIAN, and Jing JIANG Conference Proceeding Article
Joint learning of answer selection and answer summary generation in community question answering, Yang DENG, Wai LAM, Yuexiang XIE, Daoyuan CHEN, Yaliang LI, Min YANG, and Ying SHEN Conference Proceeding Article
McDPC: Multi‐center density peak clustering, Yizhang WANG, Di WANG, Xiaofeng ZHANG, Wei PANG, Chunyan MIAO, Ah-hwee TAN, and You ZHOU Journal Article
Multi-level fine-scaled sentiment sensing with ambivalence handling, Zhaoxia WANG, Seng-Beng HO, and Erik CAMBRIA Journal Article
Multi-level head-wise match and aggregation in transformer for textual sequence matching, Shuohang WANG, Yunshi LAN, Yi TAY, Jing JIANG, and Jingjing LIU Conference Proceeding Article
Neural approximate dynamic programming for on-demand ride-pooling, Sanket SHAH, Meghna LOWALEKAR, and Pradeep VARAKANTHAM Conference Proceeding Article
Privacy-preserving network path validation, Binanda SENGUPTA, Yingjiu LI, Kai BU, and Robert H. DENG Journal Article
SAGA: Efficient and large-scale detection of near-miss clones with GPU acceleration, Guanhua LI, Yijian WU, Chanchal K. ROY, Jun SUN, Xin PENG, Nanjie ZHAN, Bin HU, and Jingyi MA Conference Proceeding Article
Social influence does matter: User action prediction for in-feed advertising., Hongyang WANG, Qingfei MENG, Ju FAN, Yuchen LI, Laizhong CUI, Xiaoman ZHAO, Chong PENG, Gong Chen CHEN, and Xiaoyong DU Conference Proceeding Article
Solving online threat screening games using constrained action space reinforcement learning, Sanket SHAH, Arunesh SINHA, Pradeep VARAKANTHAM, Andrew PERRAULT, and Millind TAMBE Conference Proceeding Article
Stealthy and efficient adversarial attacks against deep reinforcement learning, Jianwen SUN, Tianwei ZHANG, Xiaofei XIE, Lei MA, Yan ZHENG, Kangjie CHEN, and Yang LIU Conference Proceeding Article
Stochastically robust personalized ranking for LSH recommendation retrieval, Dung D. LE and Hady W. LAUW Conference Proceeding Article
Topic modeling on document networks with adjacent-encoder, Ce ZHANG and Hady W. LAUW Conference Proceeding Article
Zero-shot ingredient recognition by multi-relational graph convolutional network, Jingjing CHEN, Liangming PAN, Zhipeng WEI, Xiang WANG, Chong-wah NGO, and Tat-Seng CHUA Conference Proceeding Article
Relative emphasis on Non-GAAP earnings in conference calls: Determinants and market reaction, Elaine HENRY, Nan HU, and Xi JIANG Journal Article
Learning-guided network fuzzing for testing cyber-physical system defences, Yuqi CHEN, Christopher M. POSKITT, Jun SUN, Sridhar ADEPU, and Fan ZHANG Conference Proceeding Article
Key regeneration-free ciphertext-policy attribute-based encryption and its application, Hui CUI, Robert H. DENG, Baodong QIN, and Jian WENG Journal Article
Game theoretical study on client-controlled cloud data deduplication, Xueqin LIANG, Zheng YAN, and Robert H. DENG Journal Article
Migrating from monoliths to cloud-based microservices: A banking industry example, Alan MEGARGEL, Venky SHANKARARAMAN, and David K. WALKER Book Chapter
The future of work now: Medical coding with AI, Thomas H. DAVENPORT and Steven M. MILLER Magazine Article
AATEAM: Achieving the ad hoc teamwork by employing the attention mechanism, Shuo CHEN, Ewa ANDREJCZUK, Zhiguang CAO, and Jie ZHANG Conference Proceeding Article
An exact single-agent task selection algorithm for the crowdsourced logistics, Chung-kyun HAN and Shih-Fen CHENG Conference Proceeding Article
A review of emotion sensing: Categorization models and algorithms, Zhaoxia WANG, Seng-Beng HO, and Erik CAMBRIA Journal Article
A survey of spatial crowdsourcing, Yongxin TONG, Zimu ZHOU, Yuxiang ZENG, Lei CHEN, and Cyrus SHAHABI Journal Article
Automatically categorizing software technologies, Mathieu NASSIF, Christoph TREUDE, and Martin P. ROBILLARD Journal Article
Boundary-aware RGBD salient object detection with cross-modal feature sampling, Yuzhen NIU, Guanchao LONG, Wenxi LIU, Wenzhong GUO, and Shengfeng HE Journal Article
Business analytics/business intelligence and IT infrastructure : Impact on organizational agility, Xiaofeng CHEN and Keng SIAU Journal Article
Coupled Rain Streak and Background Estimation via Separable Element-wise Attention, Yinjie TAN, Qiang WEN, Jing QIN, Jianbo JIAO, Guoqiang HAN, and Shengfeng HE Journal Article
Crowd counting via cross-stage refinement networks, Yongtuo LIU, Qiang WEN, Haoxin CHEN, Wenxi LIU, Jing QIN, Guoqiang HAN, and Shengfeng HE Journal Article