Submissions from 2018
A unified approach to route planning for shared mobility, Yongxin TONG, Yuxiang ZENG, Zimu ZHOU, Lei CHEN, Jieping YE, and Ke XU Journal Article
Autonomous agents in snake game via deep reinforcement learning, Zhepei WEI, Di WANG, Ming ZHANG, Ah-hwee TAN, Chunyan MIAO, and You ZHOU Conference Proceeding Article
Compositional reasoning for shared-variable concurrent programs, Fuyuan ZHANG, Yongwang ZHAO, David SANAN, Yang LIU, Alwen TIU, Shang-Wei LIN, and Jun SUN Conference Proceeding Article
Deep specification mining, Tien-Duy B. LE and David LO Conference Proceeding Article
DEEPTRAVEL: A neural network based travel time estimation model with auxiliary supervision, Hanyuan ZHANG, Hao WU, Weiwei SUN, and Baihua ZHENG Conference Proceeding Article
Detecting personal intake of medicine from Twitter, Debanjan MAHATA, Jasper FRIEDRICHS, Rajiv Ratn SHAH, and Jing JIANG Journal Article
Disease gene classification with metagraph representations, Sezin KIRCALI ATA, Yuan FANG, Min WU, Xiao-Li LI, and Xiaokui XIAO Book Chapter
Distributed k-nearest neighbor queries in metric spaces, Xin DING, Yuanliang ZHANG, Lu CHEN, Yunjun GAO, and Baihua ZHENG Conference Proceeding Article
Efficient representative subset selection over sliding windows, Yanhao WANG, Yuchen LI, and Kian-Lee TAN Journal Article
Experiences & challenges with server-side WiFi indoor localization using existing infrastructure, Dheryta JAISINGHANI, Rajesh Krishna BALAN, Vinayak NAIK, Archan MISRA, and Youngki LEE Conference Proceeding Article
Face detection using deep learning: An improved faster RCNN approach, Xudong SUN, Pengcheng WU, and Steven C. H. HOI Journal Article
Identifying elderlies at risk of becoming more depressed with Internet-of-Things, Jiajue OU, Huiguang LIANG, and Hwee Xian TAN Conference Proceeding Article
Knowledge-aware attentive neural network for ranking question answer pairs, Ying SHEN, Yang DENG, Min YANG, Yaliang LI, Nan DU, Wei FAN, and Kai LEI Conference Proceeding Article
Lattice-based dual receiver encryption and more, Daode ZHANG, Kai ZHANG, Bao LI, Xianhui LU, Haiyang XUE, and Jie LI Conference Proceeding Article
Modeling contemporaneous basket sequences with twin networks for next-item recommendation, Duc Trong LE, Hady W. LAUW, and Yuan FANG Conference Proceeding Article
Moved by conflict: Exploring the relationship between experienced conflict and individual mobility patterns, Nur Camellia Binte ZAKARIA, Kenneth T. GOH, Youngki LEE, and Rajesh Krishna BALAN Conference Paper
Online active learning with expert advice, Shuji HAO, Peiying HU, Peilin ZHAO, Steven C. H. HOI, and Chunyan MIAO Journal Article
Online deep learning: Learning deep neural networks on the fly, Doyen SAHOO, Hong Quang PHAM, Jing LU, and Steven C. H. HOI Conference Proceeding Article
PACELA: A neural framework for user visitation in location-based social networks, Thanh Nam DOAN and Ee-peng LIM Conference Proceeding Article
Privacy-preserving mining of association rule on outsourced cloud data from multiple parties, Lin LIU, Jinshu SU, Rongmao CHEN, Ximeng LIU, Xiaofeng WANG, Shuhui CHEN, and Ho-fung Fung LEUNG Conference Proceeding Article
Probabilistic guided exploration for reinforcement learning in self-organizing neural networks, Peng WANG, Weigui Jair ZHOU, Di WANG, and Ah-hwee TAN Conference Proceeding Article
Rumor detection on Twitter with tree-structured recursive neural networks, Jing MA, Wei GAO, and Kam-Fai WONG Conference Proceeding Article
Searching for the X-Factor: Exploring corpus subjectivity for word embeddings, Maksim TKACHENKO, Chong Cher CHIA, and Hady W. LAUW Conference Proceeding Article
Situation-aware authenticated video broadcasting over train-trackside WiFi networks, Yongdong WU, Dengpan YE, Zhuo WEI, Qian WANG, William TAN, and Robert H. DENG Journal Article
SOA maturity influence on digital banking transformation, Alan MEGARGEL, Venky SHANKARARAMAN, and Terence P. C. FAN Journal Article
Stackelberg security games: Looking beyond a decade of success, Arunesh SINHA, Fei FANG, Bo AN, Christopher KIEKINTVELD, and Milind TAMBE Conference Proceeding Article
Striving to earn more: A survey of work strategies and tool use among crowd workers, Toni KAPLAN, Susumu SAITO, Kotaro HARA, and Jeffrey P. BIGHAM Conference Proceeding Article
Summarizing source code with transferred API knowledge, Xing HU, Ge LI, Xin XIA, David LO, Shuai LU, and Zhi JIN Conference Proceeding Article
Taxis strike back: A field trial of the driver guidance system, Shih-Fen CHENG, Shashi Shekhar JHA, and Rishikeshan RAJENDRAM Conference Proceeding Article
Technology-enabled medication adherence for seniors living in the community: Experiences, lessons, and the road ahead, Hwee Xian TAN, Hwee-Pink TAN, and Huiguang LIANG Conference Proceeding Article
The price of usability: Designing operationalizable strategies for security games, Sara Marie McCARTHY, Corine M. LAAN, Kai WANG, Phebe VAYANOS, Arunesh SINHA, and Milind TAMBE Conference Proceeding Article
Towards 'verifying' a water treatment system, Jingyi WANG, Jun SUN, Yifan JIA, Shengchao QIN, and Zhiwu XU Conference Proceeding Article
Understanding generalization and optimization performance of deep CNNs, Pan ZHOU and Jiashi FENG Conference Proceeding Article
Unobtrusive detection of frailty in older adults, Nadee GOONAWARDENE, Hwee-Pink TAN, and Lee Buay TAN Conference Proceeding Article
Streaming music diffusion in a semi-closed social environment, Jing REN and Robert John KAUFFMAN Conference Proceeding Article
H-securebox: A hardened memory data protection framework on ARM devices, Zhangkai ZHANG, Zhoujun LI, Chunhe XIA, Jinhua CUI, and Jinxin MA Conference Paper
An integrated approach for effective injection vulnerability analysis of web applications through security slicing and hybrid constraint solving, Julian THOME, Lwin Khin SHAR, Domenico BIANCULLI, and Lionel BRIAND Journal Article
TKSE: Trustworthy keyword search over encrypted data with two-side verifiability via blockchain, Yinghui ZHANG, Robert H. DENG, Jiangang SHU, Kan YANG, and Dong ZHENG Journal Article
How modern news aggregators help development communities shape and share knowledge, Maurício ANICHE, Christoph TREUDE, Igor STEINMACHER, Igor Scaliante WIESE, Gustavo PINTO, Margaret-Anne STOREY, and Marco Aurélio GEROSA Conference Proceeding Article
Static analysis of context leaks in android applications, Flavio TOFFALINI, Jun SUN, and Martín COHOA Conference Proceeding Article
Towards optimal concolic testing, Xinyu WANG, Jun SUN, Zhenbang CHEN, Peixin ZHANG, Jingyi WANG, and Yun LIN Conference Proceeding Article
Analysing multi-point multi-frequency machine vibrations using optical sampling, Dibyendu ROY, Avik GHOSE, Tapas CHAKRAVARTY, Sushovan MUKHERJEE, Arpan PAL, and Archan MISRA Conference Proceeding Article
An economic analysis of disintermediation on crowdfunding platforms, Jianqing CHEN, Ling GE, and Zhiling GUO Conference Proceeding Article
Annapurna: Building a real-world smartwatch-based automated food journal, Sougata SEN, Vigneshwaran SUBBARAJU, Archan MISRA, Rajesh Krishna BALAN, and Youngki LEE Conference Proceeding Article
Applying spatial database techniques to other domains: A case study on top-k and computational geometric operators, Kyriakos MOURATIDIS Conference Proceeding Article
A proposal for a decentralized liquidity savings mechanism with side payments, Adam FUGAL, Rodney GARRATT, Zhiling GUO, and Dave HUDSON Report
Assessing the accuracy of four popular face recognition tools for inferring gender, age, and race, Soon-Gyu JUNG, Jisun AN, Haewoon KWAK, Joni SALMINEN, and Bernard J. JANSEN Conference Proceeding Article
Automatically conceptualizing social media analytics data via personas, Jung S.G., Salminen J., An J., Kwak H., and Jansen B.J. Conference Proceeding Article
Bounded rank optimization for effective and efficient emergency response, Pallavi Madhusudan MANOHAR, Pradeep VARAKANTHAM, and Hoong Chuin LAU Conference Proceeding Article
Column generation approach for feeder vessel routing and synchronization at a congested transshipment port, Jian G. JIN, Qiang MENG, and Hai WANG Conference Proceeding Article
Covariance pooling for facial expression recognition, D. ACHARYA, Zhiwu HUANG, D. PAUDEL, and Gool L. VAN Conference Proceeding Article
CRRN: Multi-scale guided concurrent reflection removal network, Renjie WAN, Boxin SHI, Ling-Yu DUAN, Ah-hwee TAN, and Alex C. KOT Conference Proceeding Article
Deep adversarial subspace clustering, Pan ZHOU, Yunqing HOU, and Jiashi FENG Conference Proceeding Article
Dimensionality's blessing: Clustering images by underlying distribution, Wen-yan LIN, Jian-Huang LAI, Siying LIU, and Yasuyuki MATSUSHITA Conference Proceeding Article
Disentangled person image generation, Liqian MA, Qianru SUN, Stamatios GEORGOULIS, Luc VAN GOOL, Bernt SCHIELE, and Mario FRITZ Conference Proceeding Article
D-pruner: Filter-based pruning method for deep convolutional neural network, Nguyen Loc HUYNH, Youngki LEE, and Rajesh Krishna BALAN Conference Proceeding Article
D-pruner: Filter-based pruning method for deep convolutional neural network, Nguyen Loc HUYNH, Youngki LEE, and Rajesh Krishna BALAN Conference Proceeding Article
Dynamic pricing in spatial crowdsourcing: A matching-based approach, Yongxin TONG, Libin WANG, Zimu ZHOU, Lei CHEN, Bowen DU, and Jieping YE Conference Proceeding Article
Effectiveness of bite-sized lecture on student learning outcomes, Noi Sian KOH, Swapna GOTTIPATI, and Venky SHANKARARAMAN Conference Proceeding Article
Efficient image super-resolution integration, Ke XU, Xin WANG, Xin YANG, Shengfeng HE, Qiang ZHANG, Baocai YIN, Xiaopeng WEI, and Rynson W. H. LAU Journal Article
Empath-D: VR-based empathetic app design for accessibility, Wonjung KIM, Kenny Tsu Wei CHOO, Youngki LEE, Archan MISRA, and Rajesh Krishna BALAN Conference Proceeding Article
FIMCE: A fully isolated micro-computing environment for multicore systems, Siqi ZHAO and Xuhua DING Journal Article
FIMCE: A fully isolated micro-computing environment for multicore systems, Siqi ZHAO and Xuhua DING Journal Article
From 2,772 segments to five personas: Summarizing a diverse online audience by generating culturally adapted personas, Joni SALMINEN, Sercan SENGUN, Haewoon KWAK, Bernard J. JANSEN, Jisun AN, Soon-gyu JUNG, Sarah VIEWEG, and D. Fox HARRELL Journal Article
How does developer interaction relate to software quality? an examination of product development data, Subhajit DATTA Journal Article
Inference of development activities from interaction with uninstrumented applications, Lingfeng BAO, Zhenchang XING, Xin XIA, David LO, and Ahmed E. HASSAN Journal Article
Instance-specific selection of AOS methods for solving combinatorial optimisation problems via neural networks, Teck Hou (DENG Dehao) TENG, Hoong Chuin LAU, and Aldy GUNAWAN Conference Proceeding Article
LibraryGuru: API recommendation for Android developers, Weizhao YUAN, Hoang H. NGUYEN, Lingxiao JIANG, and Yuting CHEN Conference Proceeding Article
MobiCeal: Towards secure and practical plausibly deniable encryption on mobile devices, Bing CHANG, Fengwei ZHANG, Bo CHEN, Yingjiu LI, Wen Tao ZHU, Yangguang TIAN, Zhan WANG, and Albert CHING Conference Proceeding Article
Natural and effective obfuscation by head inpainting, Qianru SUN, Liqian MA, Seong Joon OH, Luc VAN GOOL, Bernt SCHIELE, and Mario FRITZ Conference Proceeding Article
On-demand deep model compression for mobile devices: A usage-driven model selection framework, Sicong LIU, Yingyan LIN, Zimu ZHOU, Kaiming NAN, Hui LIU, and Junzhao DU Conference Proceeding Article
On the Fintech revolution: Interpreting the forces of innovation, disruption and transformation in financial services, Peter GOMBER, Robert J. KAUFFMAN, Chris PARKER, and Bruce W. WEBER Journal Article
Optimization of a cyclic express subway service, Hai WANG, Jiangang JIN, and Jingfeng YANG Conference Proceeding Article
Position manipulation attacks to balise-based train automatic stop control, Yongdong WU, Zhuo WEI, Jian WENG, and Robert H. DENG Journal Article
Poster: Understanding the role of reporting in work item tracking systems for software development: An industrial case study, Kochhar PAVNEET SINGH, Stanislaw SWIERC, Trevor CARNAHAN, Hitesh S. SAJNANI, and Meiyappan NAGAPPAN Conference Proceeding Article
Region-aware reflection removal with unified content and gradient priors, Renjie WAN, Boxin SHI, Ling-Yu DUAN, Ah-hwee TAN, Wen GAO, and Alex C. KOT Journal Article
Reserved optimization: Handling incident priorities in emergency response systems, Muralidhar Konda KONDA, Supriyo GHOSH, and Pradeep VARAKANTHAM Conference Proceeding Article
SATD detector: A text-mining-based self-admitted technical debt detection tool, Zhongxin LIU, Qiao HUANG, Xin XIA, Emad SHIHAB, David LO, and Shanping LI Conference Proceeding Article
Scale impacts elicited gestures for manipulating holograms: Implications for AR gesture design, Tran PHAM, Jo VERMEULEN, Anthony TANG, and Lindsay MACDONALD Conference Proceeding Article
Security and privacy in smart health: Efficient policy-hiding attribute-based access control, Yinghui ZHANG, Dong ZHENG, and Robert H. DENG Journal Article
Social stream classification with emerging new labels, Xin MU, Feida ZHU, Yue LIU, Ee-peng LIM, and Zhi-Hua ZHOU Conference Proceeding Article
Survey of randomization defenses on cloud computing, Jianming FU, Yan LIN, Xiuwen LIU, and Xu ZHANG Journal Article
The effect of ultimate ownership on the disclosure of environmental information, Peng WANG, Fangjun WANG, and Nan HU Journal Article
To detect stack buffer overflow with polymorphic canaries, Zhilong WANG, Xuhua DING, Chengbin PANG, Jian GUO, Jun ZHU, and Bing MAO Conference Proceeding Article
Towards dynamically monitoring Android applications on non-rooted devices in the wild, Xiaoxiao TANG, Daoyuan WU, Yan LIN, and Debin GAO Conference Proceeding Article
Towards easy comparison of local businesses using online reviews, Yong WANG, Hammad HALEEM, Conglei SHI, Yanhong WU, Xun ZHAO, Siwei FU, and Huamin QU Journal Article
Towards model checking Android applications, Guangdong BAI, Quanqi YE, Yongzheng WU, Heila BOTHA, Jun SUN, Yang LIU, Jin Song DONG, and Willem VISSER Journal Article
Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management, Yujue WANG, Hwee Hwa PANG, and Robert H. DENG Journal Article
Where does Google find API documentation?, Christoph TREUDE and Maurício ANICHE Conference Proceeding Article
Multi-worker-aware task planning in real-time spatial crowdsourcing, Qian TAO, Yuxiang ZENG, Zimu ZHOU, Yongxin TONG, Lei CHEN, and Ke XU Conference Proceeding Article
Analyzing requirements and traceability information to improve bug localization, Michael RATH, David LO, and Patrick MADER Conference Proceeding Article
AnFlo: Detecting anomalous sensitive information flows in Android apps, Biniam Fisseha DEMISSIE, Mariano CECCATO, and Lwin Khin SHAR Conference Proceeding Article
A qualitative research on marketing and sales in the artificial intelligence age, Yin YANG and Keng SIAU Conference Proceeding Article
Artificial intelligence: A study on governance, policies, and regulations, Weiyu WANG and Keng SIAU Conference Proceeding Article
Big data for climate change actions and the paradox of citizen informedness, Kustini LIM-WAVDE and Robert J. KAUFFMAN Magazine Article
Breathing-based authentication on resource-constrained IoT devices using recurrent neural networks, Jagmohan CHAUHAN, Suranga SENEVIRATNE, Yining HU, Archan MISRA, Aruna SENEVIRATNE, and Youngki LEE Journal Article
Building a smart nation: Singapore’s digital journey, Siu Loon HOE Journal Article
Deep code comment generation, Xing HU, Ge LI, Xin XIA, David LO, and Zhi JIN Conference Proceeding Article
Discovering hidden topical hubs and authorities in online social networks, Roy Ka-Wei LEE, Tuan-Anh HOANG, and Ee-Peng LIM Conference Proceeding Article
DOAS: Efficient data owner authorized search over encrypted cloud data, Yibin MIAO, Jianfeng MA, Ximeng LIU, Zhiquan LIU, Junwei ZHANG, and Fushan WEI Journal Article