Submissions from 2019
Route planning for a fleet of electric vehicles with waiting times at charging stations, Baoxiang LI, Shashi Shekhar JHA, and Hoong Chuin LAU Conference Proceeding Article
Text analytics approach to examining corporate social responsibility, Nurul Asyikeen Binte AZHAR, Gary PAN, Poh Sun SEOW, Andrew KOH, and Wan Ying TAY Journal Article
The capacitated team orienteering problem, Aldy GUNAWAN, Kien Ming NG, Vincent F. YU, Gordy ADIPRASETYO, and Hoong Chuin LAU Conference Proceeding Article
To the attention of mobile software developers: Guess what, test your app!, Luis C. CRUZ, Rui ABREU, and David LO Journal Article
WindyWall: Exploring creative wind simulations, David TOLLEY, Thi Ngoc Tram NGUYEN, Anthony TANG, Nimesha RANASINGHE, Kensaku KAWAUCHI, and Ching-Chiuan YEN Conference Proceeding Article
WiWear: Wearable sensing via directional wifi energy harvesting, Huy Vu TRAN, Archan MISRA, Jie XIONG, and Rajesh Krishna BALAN Conference Paper
An artificial bee colony-based hybrid approach for waste collection problem with midway disposal pattern, Qu WEI, Zhaoxia GUO, Hoong Chuin LAU, and Zhenggang HE Journal Article
API recommendation for event-driven Android application development, Weizhao YUAN, Huu Hoang NGUYEN, Lingxiao JIANG, Yuting CHEN, Jianjun ZHAO, and Haibo YU Journal Article
Automatic, highly accurate app permission recommendation, Zhongxin LIU, Xin XIA, David LO, and John GRUNDY Journal Article
BING: Binarized normed gradients for objectness estimation at 300fps, Ming-Ming CHENG, Yun LIU, Wen-yan LIN, Ziming ZHANG, Paul L. ROSIN, and Philip H. S. TORR Journal Article
BING: Binarized normed gradients for objectness estimation at 300fps, Ming-Ming CHENG, Yun LIU, Wen-yan LIN, Ziming ZHANG, Paul L. ROSIN, and Philip H. S. TORR Journal Article
Careful-Packing: A practical and scalable anti-tampering software protection enforced by trusted computing, Flavio TOFFALINI, Martín OCHOA, Jun SUN, and Jianying ZHOU Conference Proceeding Article
Characterizing and identifying reverted commits, Meng YAN, Xin XIA, David LO, Ahmed E. HASSAN, and Shanping LI Journal Article
Confusion prediction from eye-tracking data: Experiments with machine learning, Joni SALMINEN, Mridul NAGPAL, Haewoon KWAK, Jisun AN, Soon-gyo JUNG, and Bernard J. JANSEN Conference Proceeding Article
Design and assessment of myoelectric games for prosthesis training of upper limb amputees, MEERALAKSHMI RADHAKRISHNAN, Asim SMAILAGIC, Brian FRENCH, Daniel P. SIEWIOREK, and Rajesh Krishna BALAN Conference Proceeding Article
Distributed Gibbs: A linear-space sampling-based DCOP algorithm, Duc Thien NGUYEN, William YEOH, Hoong Chuin LAU, and Roie ZIVAN Journal Article
Fine-grained geolocation of tweets in temporal proximity, Wen Haw CHONG and Ee Peng LIM Journal Article
ICT: In-field calibration transfer for air quality sensor deployments, Yun CHENG, Xiaoxi HE, Zimu ZHOU, and Lothar THIELE Journal Article
Making wearable sensing less obtrusive, Huy Vu TRAN and Archan MISRA Conference Proceeding Article
MicroBTC: Efficient, flexible and fair micropayment for Bitcoin using hash chains, Zhiguo WAN, Robert H. DENG, David Kuo Chuen LEE, and Ying LI Journal Article
Neural network based detection of self-admitted technical debt: From performance to explainability, Xiaoxue REN, Zhenchang XING, Xin XIA, David LO, Xinyu WANG, and John GRUNDY Journal Article
Picking flowers in an ICO garden, Fam Guo TENG, Paul R. GRIFFIN, and Andrew KOH Working Paper
See no evil, hear no evil? Dissecting the impact of online hacker forums, Wei T. YUE, Qiu-Hong WANG, and Kai‐Lung HUI Journal Article
Semantic and influence aware k-representative queries over social streams, Yanhao WANG, Yuchen LI, and Kianlee TAN Conference Proceeding Article
SINet: A scale-insensitive convolutional neural network for fast vehicle detection, Xiaowei HU, Xuemiao XU, Yongjie XIAO, Hao CHEN, Shengfeng HE, Jing QIN, and Pheng-Ann HENG Journal Article
SUAA: A Secure User Authentication Scheme with Anonymity for the single & multi-server environments, Nassoro M. R. LWAMO, Liehuang ZHU, Chang XU, Kashif SHARIF, Ximeng LIU, and Chuan ZHANG Journal Article
Welcome message from the General Chairs, Nabil I. ALSHURAFA, Archan MISRA, and Abhishek MUKHERJI Conference Proceeding Article
FC2: Cloud-based cluster provisioning for distributed machine learning, Nguyen Binh Duong TA Journal Article
A coordination framework for multi-agent persuasion and adviser systems, Budhitama SUBAGDJA, Ah-hwee TAN, and Yilin KANG Journal Article
Adaptive cost-sensitive online classification, Peilin ZHAO, Yifan ZHANG, Min WU, Steven C. H. HOI, Mingkui TAN, and Junzhou HUANG Journal Article
An attribute-based framework for secure communications in vehicular ad hoc networks, Hui CUI, Robert H. DENG, and Guilin WANG Journal Article
A sampling approach for proactive project scheduling under generalized time-dependent workability uncertainty, Wen SONG, Donghun KANG, Jie ZHANG, Zhiguang CAO, and Hui XI Journal Article
Automatic code review by learning the revision of source code, Shu-Ting SHI, Ming LI, David LO, Ferdian THUNG, and Xuan HUO Conference Proceeding Article
Bilateral dependency neural networks for cross-language algorithm classification, Duy Quoc Nghi BUI, Yijun YU, and Lingxiao JIANG Conference Proceeding Article
CompareLDA: A topic model for document comparison, Maksim TKACHENKO and Hady Wirawan LAUW Conference Proceeding Article
CryptoCurrency mining on mobile as an alternative monetization approach, Nguyen Phan Sinh HUYNH, Kenny CHOO, Rajesh Krishna BALAN, and Youngki LEE Conference Proceeding Article
Deception in finitely repeated security games, Thanh H. NGUYEN, Yongzhao WANG, Arunesh SINHA, and Michael P. WELLMAN Conference Proceeding Article
Discrete social recommendation, Chenghao LIU, Xin WANG, Tao LU, Wenwu ZHU, Jianling SUN, and Steven C. H. HOI Conference Proceeding Article
Evolutionary trends in the collaborative review process of a large software system, Subhajit DATTA and Poulami SARKAR Conference Proceeding Article
Explainable reasoning over knowledge graphs for recommendation, Xiang WANG, Dingxian WANG, Canran XU, Xiangnan HE, Yixin CAO, and Tat-Seng CHUA Conference Proceeding Article
Grand challenges in accessible maps, Jon E. FROEHLICH, Anke M. BROCK, Anat CASPI, Joao GUERREIRO, Kotaro HARA, Reuben KIRKHAM, Johannes SCHONING, and Benjamin TANNERT Magazine Article
Manifold-valued image generation with Wasserstein generative adversarial nets, Zhiwu HUANG, WU J., and G. L. VAN Conference Proceeding Article
Multiagent decision making for maritime traffic management, ARAMBAM JAMES SINGH, Duc Thien NGUYEN, Akshat KUMAR, and Hoong Chuin LAU Conference Proceeding Article
Multiagent decision making for maritime traffic management, Arambam James SINGH, Duc Thien NGUYEN, Akshat KUMAR, and Hoong Chuin LAU Conference Proceeding Article
Multi-task learning with multi-view attention for answer selection and knowledge base question answering, Yang DENG, Yuexiang XIE, Yaliang LI, Min YANG, Nan DU, Wei FAN, Kai LEI, and Ying SHEN Conference Proceeding Article
Partially observable multi-sensor sequential change detection: A combinatorial multi-armed bandit approach, Chen ZHANG and Steven C. H. HOI Conference Proceeding Article
Preference-aware task assignment in on-demand taxi dispatching: An online stable matching approach, Boming ZHAO, Pan XU, Yexuan SHI, Yongxin TONG, Zimu ZHOU, and Yuxiang ZENG Conference Proceeding Article
Recommending new features from mobile app descriptions, He JIANG, Jingxuan ZHANG, Xiaochen LI, Zhilei REN, David LO, Xindong WU, and Zhongxuan LUO Journal Article
Risk pooling, supply chain hierarchy, and analysts' forecasts, Nan HU, Jian-Yu KE, Ling LIU, and Yue ZHANG Journal Article
Robust estimation of similarity transformation for visual object tracking, Yang LI, Jianke ZHU, Steven C. H. HOI, Wenjie SONG, Zhefeng WANG, and Hantang LIU Conference Proceeding Article
Security analysis of a large-scale concurrent data anonymous batch verification scheme for mobile healthcare crowd sensing, Yinghui ZHANG, Jiangang SHU, Ximeng LIU, Jin LI, and Dong ZHENG Journal Article
Send hardest problems my way: Probabilistic path prioritization for hybrid fuzzing, Lei ZHAO, Yue DUAN, and Jifeng XUAN Conference Proceeding Article
Social media mining for journalism, Arkaitz ZUBIAGA, Bahareh HERAVI, Jisun AN, and Haewoon KWAK Journal Article
Stock market prediction analysis by incorporating social and news opinion and sentiment, Zhaoxia WANG, Seng-Beng HO, and Zhiping LIN Conference Proceeding Article
SybSub: Privacy-preserving expressive task subscription with sybil detection in crowdsourcing, Jiangang SHU, Ximeng LIU, Kan YANG, Yinghui ZHANG, Xiaohua JIA, and Robert H. DENG Journal Article
Topical co-attention networks for hashtag recommendation on microblogs, Yang LI, Ting LIU, Jingwen HU, and Jing JIANG Journal Article
TransNFCM: translation-based neural fashion compatibility modeling, Xun YANG, Yunshan MA, Lizi LIAO, Meng WANG, and Tat-Seng CHUA Conference Proceeding Article
Understanding open ports in Android applications: Discovery, diagnosis, and security assessment, Daoyuan WU, Debin GAO, Rocky K. C. CHANG, En HE, Eric K. T. CHENG, and Robert H. DENG Conference Proceeding Article
Unveiling exception handling guidelines adopted by Java developers, Hugo MELO, Roberta COELHO, and Christoph TREUDE Conference Proceeding Article
Verifiable computation using re-randomizable garbled circuits, Qingsong ZHAO, Qingkai ZENG, Ximeng LIU, and Huanliang XU Journal Article
VistaNet: Visual Aspect Attention Network for multimodal sentiment analysis, Quoc Tuan TRUONG and Hady Wirawan LAUW Conference Proceeding Article
Financial report readability and stock return synchronicity, Xuelian BAI, Yi DONG, and Nan HU Journal Article
Who should be invited to my party: A size-constrained k-core problem in social networks, Yu-Liang MA, Ye YUAN, Feida ZHU, Guo-Ren WANG, Jing XIAO, and Jian-Zong WANG Journal Article
BLE-Enabled Medication Events Monitoring System (MEMS) for community dwelling seniors, Avinash SUBRAMANIAM, Hwee Xian TAN, and Hwee-pink TAN Conference Proceeding Article
Random delay attack and its applications on load frequency control of power systems, Yongdong WU, Jian WENG, Bo QIU, Zhuo WEI, Fan QIAN, and Robert H. DENG Conference Proceeding Article
Renegotiation of Software Outsourcing Contracts, H. HUANG, X. HU, Robert John KAUFFMAN, and H. XU Conference Proceeding Article
Two-sided value-based music artist recommendation in streaming music services, J. REN, Robert John KAUFFMAN, and D. KING Conference Proceeding Article
Multi-authority attribute-based keyword search over encrypted cloud data, Yibin MIAO, Robert H. DENG, Ximeng LIU, Kim-Kwang Raymond. CHOO, Hongjun WU, and Hongwei LI Journal Article
Successor features based multi-agent RL for event-based decentralized MDPs, Tarun GUPTA, Akshat KUMAR, and Praveen PARUCHURI Conference Proceeding Article
Adaptive resonance theory in social media data clustering: Roles, methodologies, and applications, Lei MENG, Ah-Hwee TAN, and Donald C. II WUNSCH Book
A first look at unfollowing behavior on GitHub, Jing JIANG, David LO, Yun YANG, Jianfeng LI, and Li ZHANG Journal Article
Analysis of bus ride comfort using smartphone sensor data, Hoong-Chor CHIN, Xingting PANG, and Zhaoxia WANG Journal Article
An economic analysis of consumer learning on entertainment shopping websites, Jin LI, Zhiling GUO, and Geoffrey K.F. TSO Journal Article
Artificial intelligence, machine learning, and autonomous technologies in mining industry, Zeshan HYDER, Keng SIAU, and Fiona NAH Journal Article
A state aggregation approach for stochastic multiperiod last-mile ride-sharing problems, Lucas AGUSSURJA, Shih-Fen CHENG, and Hoong Chuin LAU Journal Article
Automatic query reformulation for code search using crowdsourced knowledge, Mohammad M. RAHMAN, Chanchal K. ROY, and David LO Journal Article
Automatic query reformulation for code search using crowdsourced knowledge, Mohammad M. RAHMAN, Chanchal K. ROY, and David LO Journal Article
DABKE: Secure deniable attribute-based key exchange framework, Yangguang TIAN, Yingjiu LI, Guomin YANG, Willy SUSILO, Yi MU, Hui CUI, and Yinghui ZHANG Journal Article
Deep code comment generation with hybrid lexical and syntactical information, Xing HU, Ge LI, Xin XIA, David LO, and Zhi JIN Journal Article
Global Inference for aspect and opinion terms co-extraction based on multi-task neural networks, Jianfei YU, Jing JIANG, and Rui XIA Journal Article
How team awareness influences perceptions of developer productivity, Christoph TREUDE and Fernando FIGUEIRA FILHO Book Chapter
Large scale online multiple kernel regression with application to time-series prediction, Doyen SAHOO, Steven C. H. HOI, and Bin LIN Journal Article
Modeling location-based social network data with area attraction and neighborhood competition, Thanh Nam DOAN and Ee-peng LIM Journal Article
Network data mining and analysis, Ming GAO, Ee-peng LIM, and David LO Book
Optimized verifiable fine-grained keyword search in dynamic multi-owner settings, Yibin MIAO, Robert H. DENG, DENG CHOO, Ximeng LIU, Jianting NING, and Hongwei LI Journal Article
Person re-identification over encrypted outsourced surveillance videos, Hang CHENG, Huaxiong WANG, Ximeng LIU, Yan FANG, Meiqing WANG, and Xiaojun ZHANG Journal Article
Preface to the special issue on program comprehension, David LO and Alexander SEREBRENIK Transcript
Privacy-preserving reinforcement learning design for patient-centric dynamic treatment regimes, Ximeng LIU, Robert H. DENG, Kim-Kwang Raymond CHOO, and Yang YANG Journal Article
Quantifying activity levels of community-dwelling seniors through beacon monitoring, Jin Qiang GOH, Hwee-Pink TAN, and Hwee Xian TAN Conference Proceeding Article
Reliable and privacy-preserving truth discovery for mobile crowdsensing systems, Chuan ZHANG, Liehuang ZHU, Chang XU, Ximeng LIU, and Kashif SHARIF Journal Article
Routing and scheduling for a last-mile transportation system, Hai WANG Journal Article
Semi-supervised deep embedded clustering, Yazhou REN, Kangrong HU, Xinyi DAI, Lili PAN, Steven C. H. HOI, and Zenglin XU Journal Article
Software engineering dashboards: Types, risks, and future, Margaret-Anne STOREY and Christoph TREUDE Book Chapter
Task relation networks, Jianshu LI, Pan ZHOU, Yunpeng CHEN, Jian ZHAO, Sujoy ROY, Shuicheng YAN, Jiashi FENG, and Terence SIM Conference Proceeding Article
Template-based math word problem solvers with recursive neural networks, Lei WANG, Dongxiang ZHANG, Jipeng ZHANG, Xing XU, Lianli GAO, Bing Tian DAI, and Heng Tao SHEN Conference Proceeding Article
Vireo @ video browser showdown 2019, Phuong Anh NGUYEN, Chong-wah NGO, Danny FRANCIS, and Benoit HUET Conference Proceeding Article
When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks, Ximing LIU, Yingjiu LI, Robert H. DENG, Bing CHANG, and Shujun LI Journal Article
Submissions from 2018
Tutorial: SMU Teaching Bank: Enhancing classroom learning for digital banking and IT architecture related courses, Alan @ Ali MADJELISI MEGARGEL Conference Proceeding Article
Multi-task zipping via layer-wise neuron sharing, Xiaoxi HE, Zimu ZHOU, and Lothar THIELE Conference Proceeding Article
Integrated telegram and web-based forum with automatic assessment of questions and answers for collaborative learning, Michelle L. F. CHEONG, Yun-Chen CHEN, and Bing Tian DAI Conference Proceeding Article