The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2020

PDF

Capitalising product associations in a supermarket retail environment, Michelle L. F. CHEONG and Yong Qing CHIA Conference Proceeding Article

PDF

CoinWatch: A clone-based approach for detecting vulnerabilities in cryptocurrencies, Qingze HUM, Wei Jin TAN, Shi Ying TEY, Latasha LENUS, Ivan HOMOLIAK, Yun LIN, and Jun SUN Conference Proceeding Article

PDF

Cost-sensitive deep forest for price prediction, Chao MA, Zhenbing LIU, Zhiguang CAO, Wen SONG, Jie ZHANG, and Weiliang ZENG Journal Article

PDF

Coupled hierarchical transformer for stance-aware rumor verification in social media conversations, Jianfei YU, Jing JIANG, Ling Min Serena KHOO, Hai Leong CHIEU, and Rui XIA Conference Proceeding Article

PDF

COVID-19 pandemic – Online education in the new normal and the next normal, X. XIE, Keng SIAU, and Fiona Fui-hoon NAH Journal Article

PDF

Cross-thought for sentence encoder pre-training, Shuohang WANG, Yuwei FANG, Siqi SUN, Zhe GAN, Yu CHENG, Jingjing LIU, and Jing JIANG Conference Proceeding Article

PDF

DeepCommenter: A deep code comment generation tool with hybrid lexical and syntactical information, Boao LI, Meng YAN, Xin XIA, Xing HU, Ge LI, and David LO Conference Proceeding Article

PDF

Deep-learning-based app sensitive behavior surveillance for Android powered cyber-physical systems, Haoyu MA, Jianwen TIAN, Kefan QIU, David LO, Debin GAO, Daoyuan WU, Chunfu JIA, and Thar BAKER Journal Article

PDF

Efficient and fair data valuation for horizontal federated learning, Shuyue WEI, Yongxin TONG, Zimu ZHOU, and Tianshu SONG Book Chapter

PDF

Effort-aware just-in-time defect identification in practice: A case study at Alibaba, Meng YAN, Xin XIA, Yuanrui FAN, David LO, Ahmed E. HASSAN, and Xindong ZHANG Conference Proceeding Article

PDF

Empowering Singapore’s SMEs: FinTech P2P lending — A lifeline for SMEs’ survival?, Grace LEE and Alan MEGARGEL Journal Article

PDF

Enhancing developer interactions with programming screencasts through accurate code extraction, Lingfeng BAO, Shengyi PAN, Zhenchang XING, Xin XIA, David LO, and Xiaohu YANG Conference Proceeding Article

PDF

ERICA: Enabling real-time mistake detection and corrective feedback for free-weights exercises, Meeralakshmi RADHAKRISHNAN, Darshana RATHNAYAKE, Koon Han ONG, Inseok HWANG, and Archan MISRA Conference Proceeding Article

PDF

Exploring and evaluating attributes, values, and structures for entity alignment, Zhiyuan LIU, Yixin CAO, Liangming PAN, Juanzi LI, Zhiyuan LIU, and Tat-Seng CHUA Conference Proceeding Article

PDF

Exploring the impact of COVID-19 on aviation industry: A text mining approach, GOTTIPATI Swapna, Kyong Jin SHIM, Weiling Angeline JIANG, and Sheng Wei Andre Justin LEE Conference Proceeding Article

PDF

Global context aware convolutions for 3D point cloud understanding, Zhiyuan ZHANG, Binh-Son HUA, Wei CHEN, Yibin TIAN, and Sai-Kit YEUNG Conference Proceeding Article

PDF

Highly efficient and scalable multi-hop ride-sharing, Yixin XU, Lars KULIK, Renata BOROVICA‐GAJIC, Abdullah ALDWYISH, and Jianzhong QI Conference Proceeding Article

PDF

How should we understand the digital economy in Asia? Critical assessment and research agenda, Kai LI, Dan J. KIM, Karl R. LANG, Robert J. KAUFFMAN, and Maurizio NALDI Journal Article

PDF

JITO: A tool for just-in-time defect identification and localization, Fangcheng QIU, Meng YAN, Xin XIA, Xinyu WANG, Yuanrui FAN, Ahmed E. HASSAN, and David LO Conference Proceeding Article

PDF

Learning personal conscientiousness from footprints in e-learning systems, Lo Pang-Yun TING, Shan Yun TENG, Kun Ta CHUANG, and Ee-Peng LIM Conference Proceeding Article

PDF

Leveraging profanity for insincere content detection: A neural network approach, Swapna GOTTIPATI, Annabel TAN, David Jing Shan CHOW, and Joel Wee Kiat LIM Conference Proceeding Article

PDF

Machine learning integrated design for additive manufacturing, Jingchao JIANG, Yi XIONG, Zhiyuan ZHANG, and David W. ROSEN Journal Article

PDF

Multi-hop inference for question-driven summarization, Yang DENG, Wenxuan ZHANG, and Wai LAM Conference Proceeding Article

PDF

Multi-user verifiable searchable symmetric encryption for cloud storage, Xueqiao LIU, Guomin YANG, and Guomin YANG Journal Article

PDF

Perceptions, expectations, and challenges in defect prediction, Zhiyuan WAN, Xin XIA, Ahmed E. HASSAN, David LO, Jianwei YIN, and Xiaohu YANG Journal Article

PDF

Reducing estimation bias via triplet-average deep deterministic policy gradient, Dongming WU, Xingping DONG, Jianbing SHEN, and Steven C. H. HOI Journal Article

PDF

Security analysis of permission re-delegation vulnerabilities in Android apps, Biniam Fisseha DEMISSIE, Mariano CECCATO, and Lwin Khin SHAR Journal Article

PDF

Selecting third-party libraries: The practitioners' perspective, Enrique Larios VARGAS, Maurício ANICHE, Christoph TREUDE, Magiel BRUNTINK, and Georgios GOUSIOS Conference Proceeding Article

PDF

Semi-analytical model for design and analysis of on-orbit servicing architecture, Koki HO, Hai WANG, Paul A. DE TREMPE, Tristan Sarton DU JONCHAY, and Kento TOMITA Journal Article

PDF

sFuzz: An efficient adaptive fuzzer for solidity smart contracts, Tai D. NGUYEN, Long H. PHAM, Jun SUN, Yun LIN, and Minh Quang TRAN Conference Proceeding Article

PDF

Tangi: Tangible proxies for embodied object exploration and manipulation in virtual reality, Martin FEICK, Scott BATEMAN, Anthony TANG, and Anthony TANG Conference Proceeding Article

PDF

UniConv: A unified conversational neural architecture for multi-domain task-oriented dialogues, Hung LE, Doyen SAHOO, Chenghao LIU, Nancy F. CHEN, and Steven C. H. HOI Conference Proceeding Article

PDF

Using data analytics to predict students score, Nang Laik MA and Gim Hong CHUA Working Paper

PDF

Activity river: Visualizing planned and logged personal activities for reflection, Bon Adriel ASENIERO, Charles PERIN, Wesley WILLETT, Anthony TANG, and Sheelagh CARPENDALE Conference Proceeding Article

PDF

Amora: Black-box adversarial morphing attack, Run WANG, Felix JUEFEI-XU, Qing GUO, Yihao HUANG, Xiaofei XIE, Lei MA, and Yang LIU Conference Proceeding Article

PDF

Annapurna: An automated smartwatch-based eating detection and food journaling system, Sougata SEN, Vigneshwaran SUBBARAJU, Archan MISRA, Rajesh Krishna BALAN, and Youngki LEE Journal Article

PDF

Attribute-based fine-grained access control for outscored private set intersection computation, Mohammad ALI, MOHAJERI Javad, Mohammad-Reza SADEGHI, and Ximeng LIU Journal Article

PDF

Automated discussion analysis - Framework for knowledge analysis from class discussions, Swapna GOTTIPATI, Venky SHANKARARAMAN, and Mallikan GOKARN NITIN Conference Proceeding Article

PDF

Catch you if you deceive me: Verifiable and privacy-aware truth discovery in crowdsensing systems, Guowen XU, Hongwei LI, Shengmin XU, Hao REN, Yonghui ZHANG, Jianfei SUN, and Robert H. DENG Conference Proceeding Article

PDF

CO2Vec: Embeddings of co-ordered networks based on mutual reinforcement, Meng-Fen CHIANG, Ee-Peng LIM, Wang-Chien LEE, and Philips Kokoh PRASETYO Conference Proceeding Article

PDF

Co-design and evaluation of an intelligent decision support system for stroke rehabilitation assessment, Min Hun LEE, Daniel P. SIEWIOREK, Asim SMAILAGIC, Alexandre BERNARDINO, and Sergi BADIA Journal Article

PDF

Compact bilinear augmented query structured attention for sport highlights classification, Yanbin HAO, Hao ZHANG, Chong-wah NGO, Qing LIU, and Xiaojun HU Conference Proceeding Article

PDF

CrossASR: Efficient differential testing of automatic speech recognition via text-to-speech, Muhammad Hilmi ASYROFI, Thung Ferdian, David LO, and Lingxiao JIANG Conference Proceeding Article

PDF

Cross-domain cross-modal food transfer, Bin ZHU, Chong-wah NGO, and Jingjing CHEN Conference Proceeding Article

PDF

Deep reinforcement learning approach to solve dynamic vehicle routing problem with stochastic customers, Waldy JOE and Hoong Chuin LAU Conference Proceeding Article

PDF

DeepRhythm: Exposing deepfakes with attentional visual heartbeat rhythms, Hua QI, Qing GUO, Felix JUEFEI-XU, Xiaofei XIE, Lei MA, Wei FENG, Yang LIU, and Jianjun ZHAO Conference Proceeding Article

PDF

DeepSonar: Towards effective and robust detection of AI-synthesized fake voices, Run WANG, Felix JUEFEI-XU, Yihao HUANG, Qing GUO, Xiaofei XIE, Lei MA, and Yang LIU Conference Proceeding Article

PDF

Did our course design on software architecture meet our student’s learning expectations?, Eng Lieh OUH, Benjamin GAN, and Yunghans IRAWAN Conference Proceeding Article

PDF

Dual-SLAM: A framework for robust single camera navigation, Huajian HUANG, Wen-yan LIN, Siying LIU, Dong ZHANG, and Sai-Kit YEUNG Conference Proceeding Article

PDF

Efficient ciphertext-policy attribute-based encryption with blackbox traceability, Shengmin XU, Jiaming YUAN, Guowen XU, Yingjiu Li, Ximeng LIU, Yinghui ZHANG, and Zuobin YANG Journal Article

PDF

Efficient sampling algorithms for approximate temporal motif counting, Jingjing WANG, Yanhao WANG, Wenjun JIANG, Yuchen LI, and Kian-Lee TAN Conference Proceeding Article

PDF

European floating strike lookback options: Alpha prediction and generation using unsupervised learning, Tristan LIM, Aldy GUNAWAN, and Chin Sin ONG Journal Article

PDF

Evaluating methods for students to identify and clarify doubts in computing design courses, Eng Lieh OUH and Benjamin GAN Conference Proceeding Article

PDF

Experience report on the use of technology to manage capstone course projects, Benjamin GAN and Eng Lieh OUH Conference Proceeding Article

PDF

Experimental comparison of features and classifiers for Android malware detection, Lwin Khin SHAR, Biniam Fisseha DEMISSIE, Mariano CECCATO, and Wei MINN Conference Proceeding Article

PDF

FakePolisher: Making deepfakes more detection-evasive by shallow reconstruction, Yihao HUANG, Felix JUEFEI-XU, Run WANG, Qing GUO, Lei MA, Xiaofei XIE, Jianwen LI, Weikai MIAO, Yang LIU, and Geguang PU Conference Proceeding Article

Faster authenticated key agreement with perfect forward secrecy for Industrial Internet-of-Things, Zheng YANG, Jun HE, Yangguang TIAN, and Jianying ZHOU Journal Article

PDF

Federated topic discovery: A semantic consistent approach, Yexuan SHI, Yongxin TONG, Zhiyang SU, Di JIANG, Zimu ZHOU, and Wenbin ZHANG Journal Article

PDF

Foodbot: A goal-oriented just-in-time healthy eating interventions chatbot, Philips Kokoh PRASETYO, Palakorn ACHANANUPARP, and Ee-peng LIM Conference Proceeding Article

PDF

Generating question titles for Stack Overflow from mined code snippets, Zhipeng GAO, Xin XIA, John GRUNDY, David LO, and Yuan-Fang LI Journal Article

PDF

Gesture enhanced comprehension of ambiguous human-to-robot instructions, WEERAKOON MUDIYANSELAGE DULANGA KAVEESHA WEERAKOON, Vigneshwaran SUBBARAJU, Nipuni KARUMPULLI, Minh Anh Tuan TRAN, Qianli XU, U-Xuan TAN, Joo Hwee LIM, and Archan MISRA Conference Proceeding Article

PDF

Gym usage behavior & desired digital interventions: An empirical study, Meeralakshmi RADHAKRISHNAN, Archan MISRA, Rajesh Krishna BALAN, and Youngki LEE Conference Proceeding Article

PDF

Hierarchical identity-based signature in polynomial rings, Zhichao YANG, Dung H. DUONG, Willy SUSILO, Guomin YANG, Chao LI, and Rongmao CHEN Journal Article

PDF

Hysia: Serving DNN-based video-to-retail applications in cloud, Huaizheng ZHANG, Yuanming LI, Qiming AI, Yong LUO, Yonggang WEN, Yichao JIN, and Nguyen Binh Duong TA Conference Proceeding Article

PDF

Interpretable embedding for ad-hoc video search, Jiaxin WU and Chong-wah NGO Conference Proceeding Article

PDF

IoT-enabled community care for ageing-in-place: The Singapore experience, Hwee-Pink TAN Conference Proceeding Article

PDF

Knowledge enhanced neural fashion trend forecasting, Yunshan MA, Yujuan DING, Xun YANG, Lizi LIAO, Wai Keung WONG, and Tat-Seng CHUA Conference Proceeding Article

PDF

LiS: Lightweight Signature Schemes for continuous message authentication in cyber-physical systems, Zheng YANG, Chenglu JIN, Yangguang TIAN, Junyu LAI, and Jianying ZHOU Conference Proceeding Article

PDF

LiveSnippets: Voice-based live authoring of multimedia articles about experiences, Hyeongcheol KIM, Shengdong ZHAO, Can LIU, and Kotaro HARA Conference Proceeding Article

PDF

Message from the general co-chairs and the program co-chairs, Christoph TREUDE, Hongyu ZHANG, Kelly BLINCOE, and Zhenchang XING Conference Proceeding Article

PDF

Meta-RCNN: Meta learning for few-shot object detection, Xiongwei WU, Doyen SAHOO, and Steven HOI Conference Proceeding Article

PDF

Multi-modal cooking workflow construction for food recipes, Liangming PAN, Jingjing CHEN, Jianlong WU, Shaoteng LIU, Chong-wah NGO, Min-Yen KAN, Yugang JIANG, and Tat-Seng CHUA Conference Proceeding Article

PDF

Online traffic signal control through sample-based constrained optimization, Srishti DHAMIJA, Alolika GON, Pradeep VARAKANTHAM, and William YEOH Conference Proceeding Article

PDF

Opinion-aware answer generation for review-driven question answering in e-commerce, Yang DENG, Wenxuan ZHANG, and Wai LAM Conference Proceeding Article

PDF

Peer-inspired student performance prediction in interactive online question pools with graph neural network, Haotian LI, Huan WEI, Yong WANG, Yangqiu SONG, and Huamin. QU Conference Proceeding Article

PDF

Person-level action recognition in complex events via TSD-TSM networks, Yanbin HAO, Zi-Niu LIU, Hao ZHANG, Bin ZHU, Jingjing CHEN, Yu-Gang JIANG, and Chong-wah NGO Conference Proceeding Article

PDF

Presentation of computer security risk information: Impact of framing and base size, Xinhui ZHAN, Fiona Fui-hoon NAH, Keng SIAU, Richard HALL, and Maggie CHENG Conference Proceeding Article

PDF

Regression testing of massively multiplayer online role-playing games, Yuechen WU, Yingfeng CHEN, Xiaofei XIE, Bing YU, Changjie FAN, and Lei MA Conference Proceeding Article

PDF

Reinforcement learning for zone based multiagent pathfinding under uncertainty, Jiajing LING, Tarun GUPTA, and Akshat KUMAR Conference Proceeding Article

PDF

Revocable and certificateless public auditing for cloud storage, Yinghui ZHANG, Tiantian ZHANG, Shengmin XU, Guowen XU, and Dong ZHENG Journal Article

PDF

Sentiment analysis for software engineering: How far can pre-trained transformer models go?, Ting ZHANG, Bowen XU, Thung Ferdian, Stefanus AGUS HARYONO, David LO, and Lingxiao JIANG Conference Proceeding Article

PDF

The future of work now: AI-driven transaction surveillance at DBS Bank, Thomas H. DAVENPORT and Steven M. MILLER Magazine Article

PDF

The future of work now: AutoML at 84.51°and Kroger, Thomas H. DAVENPORT and Steven M. MILLER Magazine Article

PDF

The impact of dynamics of collaborative software engineering on introverts: A study protocol, Ingrid NUNES, Christoph TREUDE, and Fabio CALEFATO Conference Proceeding Article

PDF

The virtual reality questionnaire toolkit, Martin FEICK, Niko KLEER, Anthony TANG, and Anthonio KRUGER Conference Proceeding Article

PDF

Towards locality-aware meta-learning of tail node embeddings on networks, Zemin LIU, Wentao ZHANG, Yuan FANG, Xinming ZHANG, and Steven C. H. HOI Conference Proceeding Article

PDF

Towards systematically deriving defence mechanisms from functional requirements of cyber-physical systems, Cheah Huei YOONG, Venkata Reddy PALLETI, Arlindo SILVA, and Christopher M. POSKITT Conference Proceeding Article

PDF

TPR: Text-aware Preference Ranking for recommender systems, Yu-Neng CHUANG, Chih-Ming CHEN, Chuan-Ju WANG, Ming-Feng TSAI, Yuan FANG, and Ee-peng LIM Conference Proceeding Article

PDF

Two-stage photograph cartoonization via line tracing, Simin LI, Qiang WEN, Shuang ZHAO, Zixun SUN, and Shengfeng HE Journal Article

PDF

Using student perceptions to design smart class participation tools: A technology framework, Swapna GOTTIPATI; SHANKARARAMAN, Venky; and Mark Wei Jie NG Conference Proceeding Article

PDF

ViScene: A collaborative authoring tool for scene descriptions in videos, Rosiana NATALIE, Ebrima JARJUE, Hernisa KACORRI, and Kotaro HARA Conference Proceeding Article

PDF

Visual sentiment analysis for review images with item-oriented and user-oriented CNN: Reproducibility companion paper, Quoc Tuan TRUONG, Hady W. LAUW, Martin AUMULLER, and Naoko NITTA Conference Proceeding Article

PDF

We mind your well-being: Preventing depression in uncertain social networks by sequential interventions, Aye Phye Phye AUNG, Xinrun WANG, Bo AN, and Xiaoli LI Conference Proceeding Article

PDF

What is the vocabulary of flaky tests?, Gustavo PINTO, Breno MIRANDA, Supun DISSANAYAKE, Marcelo D'AMORIM, Christoph TREUDE, and Antonia BERTOLINO Conference Proceeding Article

PDF

White-box fairness testing through adversarial sampling, Peixin ZHANG, Jingyi WANG, Jun SUN, Guoliang DONG, Xinyu WANG, Xingen WANG, Jin Song DONG, and Dai TING Conference Proceeding Article

PDF

ZoomWalls: Dynamic walls that simulate haptic infrastructure for room-scale VR world, Yan YIXIAN, Kazuki TAKASHIMA, Anthony TANG, Takayuki TANNO, Kazuyuki FUJITA, and Yoshifumi KITAMURA Conference Proceeding Article

Potential early identification of a large Campylobacter outbreak using alternative surveillance data sources: Autoregressive modelling and spatiotemporal clustering, Mehnaz ADNAN, Xiaoying GAO, Xiaohan BAI, Elizabeth NEWBERN, Jill SHERWOOD, Nicholas JONES, Michael BAKER, Tim WOOD, and Wei GAO Journal Article

Automatic identification and inpainting of cracks in mural images based on improved SOM, Ting YANG, Shuangshuan WANG, Haibo PEN, and Zhaoxia WANG Journal Article

User detection of threats with different security measures, Yoav Ben YAAKOV, Joachim MEYER, Xinrun WANG, and Bo AN Conference Proceeding Article

PDF

Accelerating All-SAT computation with short blocking clauses, Yueling ZHANG, Geguang PU, and Jun SUN Conference Proceeding Article