The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2017

PDF

On the effectiveness of virtualization based memory isolation on multicore platforms, Siqi ZHAO and Xuhua DING Conference Proceeding Article

PDF

Predicting the impact of software engineering topics: An empirical study, Santonu SARKAR, Rumana LAKDAWALA, and Subhajit DATTA Conference Proceeding Article

PDF

Related-key secure key encapsulation from extended computational bilinear Diffie–Hellman, Brandon QIN, Shengli LIU, Shifeng SUN, Robert H. DENG, and Dawu GU Journal Article

PDF

Should we learn probabilistic models for model checking? A new approach and an empirical study, Jingyi WANG, Jun SUN, Qixia YUAN, and Jun PANG Conference Proceeding Article

PDF

The crowd work accessibility problem, Saiganesh SWAMINATHAN, Kotaro HARA, and Jeffrey P. BIGHAM Conference Proceeding Article

PDF

Understanding the information-based transformation of strategy and society, Eric K. CLEMONS, Rajiv M. DEWAN, Robert J. KAUFFMAN, and Thomas A. WEBER Journal Article

PDF

Vulnerabilities, attacks, and countermeasures in Balise-based train control systems, Yongdong WU, Jian WENG, Zhe TANG, Xin LI, and Robert H. DENG Journal Article

PDF

What you see is not what you get: Leakage-resilient password entry schemes for smart glasses, Yan LI, Yao CHENG, Yingjiu LI, and Robert H. DENG Conference Proceeding Article

PDF

Are the trade-offs for reducing cross-border cybercrime manageable?, Steven Mark MILLER, Qiu-Hong WANG, and Robert John KAUFFMAN Magazine Article

PDF

Are the trade-offs for reducing cross-border cybercrime manageable?, Steven Mark MILLER, Qiu-Hong WANG, and Robert John KAUFFMAN Blog Post

PDF

Collaboration trumps homophily in urban mobile crowdsourcing, Thivya KANDAPPU, Archan MISRA, and Randy TANDRIANSYAH Conference Proceeding Article

PDF

Dark hazard: Large-scale discovery of unknown hidden sensitive operations in Android apps, Xiaorui PAN, Xueqiang WANG, Yue DUAN, Xiaofeng WANG, and Heng YIN Conference Proceeding Article

PDF

Effective K-Vertex connected component detection in large-scale networks, Yuan LI, Yuha ZHAO, Guoren WANG, Feida ZHU, Yubao WU, and Shenglei SHI Conference Proceeding Article

PDF

Efficient motif discovery in spatial trajectories using discrete Fréchet distance, Bo TANG, Man Lung YIU, Kyriakos MOURATIDIS, and Kai WANG Conference Proceeding Article

Follow the herd or be myself? An analysis of consistency in behavior of reviewers and helpfulness of their reviews, Baojun GAO, Nan HU, and Indranil BOSE Journal Article

PDF

Improving automated bug triaging with specialized topic model, Xin XIA, David LO, Ying DING, Jafar M. AL-KOFAHI, Tien N. NGUYEN, and Xinyu WANG Journal Article

PDF

Inferring user consumption preferences from social media, Yang LI, Jing JIANG, and Ting LIU Journal Article

PDF

Location matters: Geospatial policy analytics over time for household hazardous waste collection in California, Kustini LIM-WAVDE, Robert John KAUFFMAN, Tin Seong KAM, and Gregory S. DAWSON Conference Proceeding Article

PDF

Metric similarity joins using MapReduce, Yunjun GAO, Keyu YANG, Lu CHEN, Baihua ZHENG, Gang CHEN, and Chun CHEN Journal Article

PDF

Mining sandboxes for Linux containers, Zhiyuan WAN, David LO, Xin XIA, Liang CAI, and Shanping LI Conference Proceeding Article

PDF

Privacy in context-aware mobile crowdsourcing systems, Thivya KANDAPPU, Archan MISRA, Shih-Fen CHENG, and Hoong Chuin LAU Conference Proceeding Article

PDF

Probabilistic public key encryption for controlled equijoin in relational databases, Yujue WANG and Hwee Hwa PANG Journal Article

PDF

Scalable image retrieval by sparse product quantization, Qingqun NING, Jianke ZHU, Zhiyuan ZHONG, Steven C. H. HOI, and Chun CHEN Journal Article

Link

Security issues of in-store mobile payment, Xingjie YU, Su Mon KYWE, and Yingjiu LI Book Chapter

PDF

Social tag relevance learning via ranking-oriented neighbor voting, Chaoran CUI, Jialie SHEN, Jun MA, and Tao LIAN Journal Article

PDF

The wonders of the spreadsheet tool for data management and insights, Michelle L. F. CHEONG Book Chapter

PDF

UI X-Ray: Interactive mobile UI testing based on computer vision, Chun-Fu Richard CHEN, Marco PISTOIA, Conglei SHI, Paolo GIROLAMI, Joseph W. LIGMAN, and Yong WANG Conference Proceeding Article

PDF

Version-sensitive mobile app recommendation, Da CAO, Liqiang NIE, Xiangnan HE, Xiaochi WEI, Jialie SHEN, Shunxiang WU, and Tat-Seng CHUA Journal Article

PDF

Whole-system analysis for understanding publicly accessible functions in Android, Huu Hoang NGUYEN, Lingxiao JIANG, and Thanh Tho QUAN Conference Proceeding Article

Cross-language mining and retrieval, Wei GAO and Cheng NIU Book Chapter

Social media content analysis: Natural language processing and beyond, Kam-Fai WONG, Wei GAO, Ruifeng XU, and Wenjie LI Book Chapter

Routing multiple vehicles cooperatively: Minimizing road network breakdown probability, GUO Hongliang, Zhiguang CAO, SESHADRI Madhavan, ZHANG Jie, NIYATO Dusit, and FASTENRATH Ulrich Journal Article

PDF

Active video summarization: Customized summaries via on-line interaction with the user, Ana Garcia DEL MOLINO, Xavier BOIX, Joo-Hwee LIM, and Ah-hwee TAN Conference Proceeding Article

PDF

An efficient approach to model-based hierarchical reinforcement learning, Zhuoru LI, Akshay NARAYAN, and Tze-Yun LEONG Conference Proceeding Article

PDF

A Riemannian network for SPD matrix learning, Zhiwu HUANG and Gool L. VAN Conference Proceeding Article

PDF

Attribute-based secure messaging in the public cloud, Zhi Yuan POH, Hui CUI, Robert H. DENG, and Yingjiu LI Conference Proceeding Article

PDF

Bike route choice modeling using GPS data without choice sets of paths, Maëlle ZIMMERMANN, Tien MAI, and Emma FREJINGER Journal Article

PDF

CLCMiner: Detecting cross-language clones without intermediates, Xiao CHENG, Zhiming PENG, Lingxiao JIANG, Hao ZHONG, Haibo YU, and Jianjun ZHAO Journal Article

PDF

Collaboration trumps homophily in urban mobile crowd-sourcing, Thivya KANDAPPU, Archan MISRA, and Randy Tandriansyah DARATAN Conference Proceeding Article

PDF

Collective multiagent sequential decision making under uncertainty, Duc Thien NGUYEN, Akshat KUMAR, and Hoong Chuin LAU Conference Proceeding Article

Credit derivatives and stock return synchronicity, Xuelian BAI, Nan HU, Ling LIU, and Lu ZHU Journal Article

PDF

Crowdsensing and analyzing micro-event tweets for public transportation insights, Thoong HOANG, Pei Hua (XU Peihua) CHER, Philips Kokoh PRASETYO, and Ee-Peng LIM Conference Proceeding Article

PDF

Decentralized planning in stochastic environments with submodular rewards, Rajiv Ranjan KUMAR, Pradeep VARAKANTHAM, and Akshat KUMAR Conference Proceeding Article

PDF

Detecting similar repositories on GitHub, Yun ZHANG, David LO, PAVNEET SINGH KOCHHAR, Xin XIA, Quanlai LI, and Jianling SUN Conference Proceeding Article

PDF

Discovering burst patterns of burst topic in Twitter, Guozhong DONG, Wu YANG, Feida ZHU, and Wei WANG Journal Article

PDF

Dynamic repositioning to reduce lost demand in Bike Sharing Systems, Supriyo GHOSH, Pradeep VARAKANTHAM, Yossiri ADULYASAK, and Patrick JAILLET Journal Article

PDF

Empath-D: Empathetic design for accessibility, Kenny Tsu Wei CHOO, Rajesh Krishna BALAN, Kiat Wee TAN, Archan MISRA, and Youngki LEE Conference Proceeding Article

PDF

Harnessing Twitter to support serendipitous learning of developers, Abhabhisheksh SHARMA, Yuan TIAN, Agus SULISTYA, David LO, and Aiko YAMASHITA Conference Proceeding Article

PDF

Maximizing the probability of arriving on time: A practical q-learning method, Zhiguang CAO, Hongliang GUO, Jie ZHANG, Frans OLIEHOEK, and Ulrich FASTENRATH Conference Proceeding Article

PDF

Recurrent neural networks with auxiliary labels for cross-domain opinion target extraction, Ying DING, Jianfei YU, and Jing JIANG Conference Proceeding Article

PDF

Robust optimization for tree-structured stochastic network design, Xiaojian WU, Akshat KUMAR, and Daniel SHELDON Conference Proceeding Article

PDF

SEAPoT-RL: Selective exploration algorithm for policy transfer in RL, Akshay NARAYAN, Zhuoru LI, and Tze-Yun LEONG Conference Proceeding Article

PDF

Security slicing for auditing common injection vulnerabilities, Julian THOME, Lwin Khin SHAR, Domenico BIANCULLI, and Lionel BRIAND Journal Article

PDF

SOAL: Second-order Online Active Learning, Shuji HAO, Peilin ZHAO, Jing LU, Steven C. H. HOI, Chunyan MIAO, and Chi ZHANG Conference Proceeding Article

Stereo object proposals, Shao HUANG, Weiqiang WANG, Shengfeng HE, and Rynson W. H. LAU Journal Article

PDF

Streaming classification with emerging new class by class matrix sketching, Xin MU, Feida ZHU, Juan DU, Ee-peng LIM, and Zhi-Hua ZHOU Conference Proceeding Article

PDF

Toward a collaborative AI framework for assistive dementia care, Tze-Yun LEONG Conference Proceeding Article

PDF

Unsupervised visual hashing with semantic assistant for content-based image retrieval, Lei ZHU, Jialie SHEN, Liang XIE, and Zhiyong CHENG Journal Article

PDF

Why and how developers fork what from whom in GitHub, Jing JIANG, David LO, Jiahuan HE, Xin XIA, Pavneet Singh KOCHHAR, and Li ZHANG Journal Article

A new public remote integrity checking scheme with user and data privacy, Yiteng FENG, Yi MU, Guomin YANG, and Joseph LIU Journal Article

PDF

Attribute-based storage supporting secure deduplication of encrypted data in cloud, Hui CUI, Robert H. DENG, Yingjiu LI, and Guowei WU Journal Article

PDF

A two-sided collaborative transparent display supporting workspace awareness, Jiannan LI, Saul GREENBERG, and Ehud SHARLIN Journal Article

PDF

Concept-based interactive search system, Yi-Jie LU, Phuong Anh NGUYEN, Hao ZHANG, and Chong-wah NGO Conference Proceeding Article

PDF

Cross-modal recipe retrieval: How to cook this dish?, Jingjing CHEN, Lei PANG, and Chong-wah NGO Conference Proceeding Article

PDF

Discovering historic traffic-tolerant paths in road networks, Pui Hang LI, Man Lung YIU, and Kyriakos MOURATIDIS Journal Article

PDF

Easing Cross-Border Communication: Mobile-mediated Communication and Its Framework, Kyungsub CHOI and Young Soo KIM Conference Proceeding Article

PDF

Enabling sustainable bulk transfer in environmentally-powered wireless sensor networks, Alvin C. VALERA, Wee-Seng SOH, and Hwee-Pink TAN Journal Article

Examining the effectiveness of gamification in human computation, Xiaohui WANG, Dion Hoe-Lian GOH, Ee peng LIM, Adrian Wei Liang VU, and Alton Yeow Kuan CHUA Journal Article

PDF

Exploring representativeness and informativeness for active learning, Bo DU, Zengmao WANG, Lefei ZHANG, Liangpei ZHANG, Wei LIU, Jialie SHEN, and Dacheng TAO Journal Article

PDF

Fine-grained sentiment analysis of social media with emotion sensing, Zhaoxia WANG, Chee Seng CHONG, Landy LAN, Yinping YANG, Beng-Seng HO, and Joo Chuan TONG Conference Proceeding Article

PDF

Funding challenges of voluntary welfare organizations in Singapore's disability sector, Joo Lay Isabel SIM, Lye Chye Alfred LOH, and Siu Loon HOE Journal Article

PDF

H-Binder: A hardened binder framework on Android systems, Dong SHEN, Zhangkai ZHANG, Xuhua DING, Zhoujun LI, and Robert H. DENG Conference Proceeding Article

PDF

High impact bug report identification with imbalanced learning strategies, Xinli YANG, David LO, Xin XIA, Qiao HUANG, and Jianling SUN Journal Article

PDF

Internet health information seeking and the patient-physician relationship: A systematic review, Sharon Swee-Lin TAN and Nadee GOONAWARDENE Journal Article

PDF

Online hacker forum censorship: Would banning the bad guys attract good guys?, Qiu-Hong WANG, Le-Ting ZHANG, and Meng-Ke QIAO Conference Proceeding Article

PDF

On the effectiveness of code-reuse-based Android application obfuscation, Xiaoxiao TANG, Yu LIANG, Xinjie MA, Yan LIN, and Debin GAO Conference Proceeding Article

PDF

Research strategies for biomedical and health informatics: Some thought-provoking and critical proposals to encourage scientific debate on the nature of good research in medical informatics, Reinhold HAUX and et al. Journal Article

PDF

RFID ownership transfer with positive secrecy capacity channels, Jorge MUNILLA, Mike BURMESTER, Alberto PEINADO, Guomin YANG, and Willy SUSILO Journal Article

PDF

SafeStack+: Enhanced dual stack to combat data-flow hijacking, Yan LIN, Xiaoxiao TANG, and Debin GAO Conference Proceeding Article

PDF

Sensor-driven detection of social isolation in community-dwelling elderly, W K P Neranjana Nadee Rodrigo GOONAWARDENE, Xiaoping TOH, and Hwee-Pink TAN Conference Proceeding Article

PDF

Technology mergers and acquisitions in the presence of an installed base: A strategic analysis, Qiu-Hong WANG and Kai-Lung HUI Journal Article

PDF

The habits of highly effective researchers: An empirical study, Subhajit DATTA, Partha BASUCHOWDHURI, Surajit ACHARYA, and Subhashis MAJUMDER Journal Article

PDF

The making of a successful analytics master degree program: Experiences and lessons drawn for a young and small Asian university, Michelle L. F. CHEONG Journal Article

PDF

They all seem good, but which one fits me? Reducing fit uncertainty for digital entertainment goods, Ai Phuong HOANG Conference Proceeding Article

PDF

Universally composable RFID mutual authentication, Chunhua SU, Bagus SANTOSO, Yingjiu LI, Robert H. DENG, and Xinyi HUANG Journal Article

PDF

Viewed by too many or viewed too little: Using information dissemination for audience segmentation, Bernard J. JANSEN, Soon-Gyu JUNG, Joni SALMINEN, Jisun AN, and Haewoon KWAK Conference Proceeding Article

Submissions from 2016

Timed dataflow: Reducing communication overhead for distributed machine learning systems, Peng SUN, Yonggang WEN, Nguyen Binh Duong TA, and Shengen YAN Conference Proceeding Article

Designing a data warehousing and business analytics course using experiential learning pedagogy, GOTTIPATI Swapna and SHANKARARAMAN, Venky Conference Proceeding Article

PDF

An agent-based approach to human migration movement, Larry LIN, Kathleen M. CARLEY, and Shih-Fen CHENG Conference Proceeding Article

PDF

Answering why-not and why questions on reverse top-k queries, Qing LIU, Yunjun GAO, Gang CHEN, Baihua ZHENG, and Linlin ZHOU Journal Article

PDF

A privacy-preserving outsourced functional computation framework across large-scale multiple encrypted domains, Ximeng LIU, Baodong QIN, Robert H. DENG, Rongxing LU, and Jianfeng MA Journal Article

PDF

Attacking Android smartphone systems without permissions, Mon Kywe SU, Yingjiu LI, Kunal PETAL, and Michael GRACE Conference Proceeding Article

PDF

CareerMapper: An automated resume evaluation tool, Vivian LAI, Kyong Jin SHIM, Richard J. OENTARYO, Philips K. PRASETYO, Casey VU, Ee-peng LIM, and David LO Conference Proceeding Article

PDF

Cast2Face: Assigning character names onto faces in movie with actor-character correspondence, Guangyu GAO, Mengdi XU, Jialie SHEN, Huangdong MA, and Shuicheng YAN Journal Article

PDF

Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment, Lixian LIU, Junzuo LAI, Robert H. DENG, and Yingjiu LI Journal Article

PDF

Collective personalized change classification with multiobjective search, Xin XIA, David LO, Xinyu WANG, and Xiaohu YANG Journal Article

PDF

Cryptographic reverse firewall via malleable smooth projective hash functions, Rongmao CHEN, Guomin YANG, Guomin YANG, Willy SUSILO, Fuchun GUO, and Mingwu ZHANG Conference Proceeding Article

PDF

Demystifying and puncturing the inflated delay in smartphone-based WiFi network measurement, Weichao LI, Daoyuan WU, Rocky K. C. CHANG, and Ricky K. P. MOK Conference Proceeding Article

PDF

Designing a datawarehousing and business analytics course using experiential learning pedagogy, GOTTIPATI Swapna and Venky SHANKARARAMAN Conference Proceeding Article

PDF

Domain identification for intention posts on online social media, Thai Le Luong, Quoc Tuan TRUONG, Hai-Trieu Dang, and Xuan Hieu Phan Conference Proceeding Article