Submissions from 2017
Secure server-aided top-k monitoring, Yujue WANG, Hwee Hwa PANG, Yanjiang YANG, and Xuhua DING Journal Article
Towards tightly secure deterministic public key encryption, Daode ZHANG, Bao LI, Yamin LIU, Haiyang XUE, Xianhui LU, and Dingding JIA Conference Proceeding Article
Using data analytics for discovering library resource insights: Case from Singapore Management University, Ning LU, Rui SONG, Dina Li Gwek HENG, Swapna GOTTIPATI, and Aaron TAY Conference Proceeding Article
Using teaching cases for achieving bloom’s high-order cognitive levels: An application in technically-oriented information systems course, Kar Way TAN Conference Proceeding Article
VKSE-MO: Verifiable keyword search over encrypted data in multi-owner settings, Yinbin MIAO, Jianfeng MA, Ximeng LIU, Junwei ZHANG, and Zhiquan LIU Journal Article
What do developers search for on the web?, Xin XIA, Lingfeng BAO, David LO, Pavneet Singh KOCHHAR, Ahmed E. HASSAN, and Zhenchang XING Journal Article
Who are your users? comparing media professionals' preconception of users to data-driven personas, Lene NIELSEN, Soon-Gyu JUNG, Jisun AN, Joni SALMINEN, Haewoon KWAK, and Bernard J. JANSEN Conference Proceeding Article
Secure virtual machine placement in infrastructure cloud services, Varun NATU and Nguyen Binh Duong TA Conference Proceeding Article
An overview of charity governance in Singapore, I J SIM, A L C LOH, L TAY, and Siu Loon HOE Report
Disclosure of board and management matters: An exploratory study on charity governance in Singapore based on institutions of a public character from health and, social and welfare sectors, I J SIM and Siu Loon HOE Report
Egocentric temporal action proposals, Shao HUANG, Weiqiang WANG, Shengfeng HE, and Rynson W. H. LAU Journal Article
BikeMate: Bike riding behavior monitoring with smartphones, Weixi GU, Zimu ZHOU, Yuxun ZHOU, Han ZOU, Yunxin LIU, Costas J. SPANOS, and Lin ZHANG Conference Proceeding Article
Learning likely invariants to explain why a program fails, Long H. PHAM, Jun SUN, Lyly Tran THI, Jingyi WANG, and Xin PENG Conference Proceeding Article
Automatic loop-invariant generation and refinement through selective sampling, Jiaying LI, Jun SUN, Li LI, Quang Loc LE, and Shang-Wei LIN Conference Proceeding Article
FiB: Squeezing loop invariants by interpolation between forward/backward predicate transformers, Shang-Wei LIN, Jun SUN, Hao XIAO, Yang LIU, David SANA, and Henri HANSEN Conference Proceeding Article
Mining implicit design templates for actionable code reuse, Yun LIN, Guozhu MENG, Yinxing YUE, Zhenchang XING, Jun SUN, Xin PENG, Yang LIU, Wenyun ZHAO, and Jin Song DONG Conference Proceeding Article
A fast trajectory outlier detection approach via driving behavior modeling, Hao WU, Weiwei SUN, and Baihua ZHENG Conference Proceeding Article
An analysis of rumor and counter-rumor messages in social media, Dion Hoe-Lian GOH, Alton Y. K. CHUA, Hanyu SHI, Wenju WEI, Haiyan WANG, and Ee-peng LIM Conference Proceeding Article
Anomaly detection for a water treatment system using unsupervised machine learning, Jun INOUE, Yoriyuki YAMAGATA, Yuqi CHEN, Christopher M. POSKITT, and Jun SUN Conference Proceeding Article
AnswerBot: Automated generation of answer summary to developers’ technical questions, Bowen XU, Zhenchang XING, Xin XIA, and David LO Conference Proceeding Article
APIBot: Question answering bot for API documentation, Yuan TIAN, Ferdian THUNG, Abhishek SHARMA, and David LO Conference Proceeding Article
A semantics comparison workbench for a concurrent, asynchronous, distributed programming language, Claudio CORRODI, Alexander HEUßNER, and Christopher M. POSKITT Journal Article
A verification framework for stateful security protocols, Li LI, Naipeng DONG, Jun PANG, Jun SUN, Guangdong BAI, Yang LIU, and Jin Song DONG Conference Proceeding Article
CapSense: Capacitor-based activity sensing for kinetic energy harvesting powered wearable devices, Guohao LAN, Dong MA, Weitao XU, Mahbub HASSAN, and Wen HU Conference Proceeding Article
Classification-based parameter synthesis for parametric timed automata, Jiaying LI, Jun SUN, Bo GAO, and Étienne ANDRE Conference Proceeding Article
Collaborative topic regression with denoising AutoEncoder for content and community co-representation, Trong T. NGUYEN and Hady W. LAUW Conference Proceeding Article
Color-sketch simulator: A guide for color-based visual known-item search, Jakub LOKOČ, Anh Nguyen PHUONG, Marta VOMLELOVÁ, and Chong-wah NGO Conference Proceeding Article
Detecting semantic uncertainty by learning hedge cues in sentences using an HMM, Xiujun LI, Wei GAO, and Jude SHAVLIK Book Chapter
EEG-based emotion recognition via fast and robust feature smoothing, Cheng TANG, Di WANG, Ah-hwee TAN, and Chunyan MIAO Conference Proceeding Article
Enabling phased array signal processing for mobile WiFi devices, Kun QIAN, Chenshu WU, Zheng YANG, Zimu ZHOU, Xu WANG, and Yunhao LIU Journal Article
File-level defect prediction: Unsupervised vs. supervised models, Meng YAN, Yicheng FANG, David LO, Xin XIA, and Xiaohong ZHANG Conference Proceeding Article
Guest editor's introduction to the special issue on source code analysis and manipulation (SCAM 2015), Foutse KHOMH, David LO, and Michael W. GODFREY Transcript
Highly efficient mining of overlapping clusters in signed weighted networks, Tuan-Anh HOANG and Ee-peng LIM Conference Proceeding Article
Improving probability estimation through active probabilistic model learning, Jingyi WANG, Xiaohong CHEN, Jun SUN, and Shengchao QIN Conference Proceeding Article
Indexable Bayesian personalized ranking for efficient top-k recommendation, Dung D. LE and Hady W. LAUW Conference Proceeding Article
Intent recognition in smart living through deep recurrent neural networks, Xiang ZHANG, Lina YAO, Chaoran HUANG, Quan Z. SHENG, and Xianzhi WANG Conference Proceeding Article
Interactive social recommendation, Xin WANG, Steven C. H. HOI, Chenghao LIU, and Martin ESTER Conference Proceeding Article
Introducing people with ASD to crowd work, Kotaro HARA and Jeffrey P. BIGHAM Conference Proceeding Article
Language inclusion checking of timed automata with non-Zenoness, Xinyu WANG, Jun SUN, Ting WANG, and Shengchao QIN Journal Article
Large scale kernel methods for online AUC maximization, Yi DING, Chenghao LIU, Peilin ZHAO, and Steven C. H. HOI Conference Proceeding Article
Leveraging social analytics data for identifying customer segments for online news media, JANSEN, Bernard J, Soon-Gyo JUNG, Jisun AN, Haewoon KWAK, and HAEWOON KWAK Conference Proceeding Article
Modeling check-in behavior with geographical neighborhood influence of venues, Thanh Nam DOAN and Ee Peng LIM Conference Proceeding Article
On analyzing job hop behavior and talent flow networks, Richard J. OENTARYO, Xavier Jayaraj Siddarth ASHOK, Ee-peng LIM, and Philips Kokoh PRASETYO Conference Proceeding Article
On locating malicious code in piggybacked Android apps, Li LI, Daoyuan LI, Tegawende F. BISSYANDE, Jacques KLEIN, Haipeng CAI, David LO, and Yves LE TRAON Journal Article
Predicting indoor crowd density using column-structured deep neural network, Akihito SUDO, Teck Hou (DENG Dehao) TENG, Hoong Chuin LAU, and Yoshihide SEKIMOTO Conference Proceeding Article
Presence attestation: The missing link in dynamic trust bootstrapping, Zhangkai ZHANG, Xuhua DING, Gene TSUDIK, Jinhua CUI, and Zhoujun LI Conference Proceeding Article
Second-order online active learning and its applications, Shuji HAO, Jing LU, Peilin ZHAO, Chi ZHANG, Steven C. H. HOI, and Chunyan MIAO Journal Article
Selective value coupling learning for detecting outliers in high-dimensional categorical data, Guansong PANG, Hongzuo XU, CAO Longbing, and Wentao ZHAO Conference Proceeding Article
SemVis: Semantic visualization for interactive topical analysis, LE VAN MINH TUAN and Hady Wirawan LAUW Conference Proceeding Article
SourceVote: Fusing multi-valued data via inter-source agreements, Xiu Susie FANG, Quan Z. SHENG, Xianzhi WANG, Mahmoud BARHAMGI, Lina YAO, and Anne H.H. NGU Conference Proceeding Article
SourceVote: Fusing multi-valued data via inter-source agreements, Xiu Susie FANG, Quan Z. SHENG, Xianzhi WANG, Mahmoud BARHAMGI, Lina YAO, and Anne H.H. NGU Conference Paper
Temporal understanding of human mobility: A multi-time scale analysis, Tongtong LIU, Zheng YANG, Yi ZHAO, Chenshu WU, Zimu ZHOU, and Yunhao LIU Journal Article
The impact of coverage on bug density in a large industrial software project, Thomas BACH, Artur ANDRZEJAK, Ralf PANNEMANS, and David LO Conference Proceeding Article
Tweet Geolocation: Leveraging location, user and peer signals, Wen-Haw CHONG and Ee Peng LIM Conference Proceeding Article
Understanding inactive yet available assignees in GitHub, Jing JIANG, David LO, Xinyu MA, Fuli FENG, and Li ZHANG Journal Article
Unsupervised topic hypergraph hashing for efficient mobile image retrieval, Lei ZHU, Jialie SHEN, Liang XIE, and Zhiyong CHENG Journal Article
Vireo @ TRecViD 2017: Video-to-text, ad-hoc video search and video hyperlinking, Phuong Anh NGUYEN, Qing LI, Zhi-Qi CHENG, Yi-Jie LU, Hao ZHANG, Xiao WU, and Chong-wah NGO Conference Paper
Escaping together: The design and evaluation of a distributed real-life escape room, Hanieh SHAKERI, Samarth SINGHAL, Rui PAN, Carman NEUSTAEDTER, and Anthony TANG Conference Proceeding Article
Thinking about how to think: Cognitive skills to stay relevant in a digital economy, Siu Loon HOE Journal Article
Visualizing chemicals detection VAST 2017 Mini Challenge 2, Jiaqi ZHANG, Ximeng LIU, Hongjun QIAN, and Tin Seong KAM Conference Proceeding Article
Design and implementation of a CSI-based ubiquitous smoking detection system, Xiaolong ZHENG, Jilian WANG, Longfei SHANGGUAN, Zimu ZHOU, and Yunhao LIU Journal Article
A conceptual framework for analyzing students' feedback, Venky SHANKARARAMAN, Swapna GOTTIPATI, and Sandy GAN Conference Proceeding Article
A validated set of smells in model-view-controller architectures, Maurício ANICHE, Gabriele BAVOTA, Christoph TREUDE, Arie VAN DEURSEN, and Marco Aurélio GEROSA Conference Proceeding Article
Benchmarking single-image reflection removal algorithms, Renjie WAN, Boxin SHI, Ling-Yu DUAN, Ah-hwee TAN, and Alex C. KOT Conference Proceeding Article
Combinatorial auction for transportation matching service: Formulation and adaptive large neighborhood search heuristic, Baoxiang LI and Hoong Chuin LAU Conference Proceeding Article
Cross-modal recipe retrieval with rich food attributes, Jingjing CHEN, Chong-wah NGO, and Tat-Seng CHUA Conference Proceeding Article
Delving into salient object subitizing and detection, Shengfeng HE, Jianbo JIAO, Xiaodan ZHANG, Guoqiang HAN, and Rynson W.H LAU Conference Proceeding Article
Design and implementation of an enterprise integrated project environment: Experience from an information systems program, Swapna GOTTIPATI and Venky SHANKARARAMAN Conference Proceeding Article
Efficient and robust emergence of norms through heuristic collective learning, Jianye HAO, Jun SUN, Guangyong CHEN, Zan WANG, Chao YU, and Zhong MING Journal Article
Every step you take, I’ll be watching you: Practical StepAuth-entication of RFID paths, Kai BU and Yingjiu LI Journal Article
Every step you take, I’ll be watching you: Practical StepAuth-entication of RFID paths, Kai BU and Yingjiu LI Journal Article
FastShrinkage: Perceptually-aware retargeting toward mobile platforms, Zhenguang LIU, Zepeng WANG, Luming ZHANG, Rajiv Ratn SHAH, Yingjie XIA, Yi YANG, and Wei LIU Conference Proceeding Article
Interactive Visual Analytics Application for Spatiotemporal Movement Data VAST Challenge 2017 Mini-Challenge 1: Award for Actionable and Detailed Analysis, Yifei GUAN and Tin Seong KAM Conference Proceeding Article
JSForce: A forced execution engine for malicious javascript detection, Xunchao HU, Yao CHENG, Yue DUAN, Andrew HENDERSON, and Heng YIN Conference Proceeding Article
New framework of password-based authenticated key exchange from only-one lossy encryption, Haiyang XUE, Bao LI, and Jingnan HE Conference Proceeding Article
O2O service composition with social collaboration, Wenyi QIAN, Xin PENG, Jun SUN, Yijun YU, Bashar NUSEIBEH, and Wenyun ZHAO Conference Proceeding Article
On negative results when using sentiment analysis tools for software engineering research, Robbert JONGELING, Proshanta SARKAR, Subhajit DATTA, and Alexander SEREBRENIK Journal Article
PIC2DISH: A customized cooking assistant system, Yongsheng AN, Yu CAO, Jingjing CHEN, Chong-wah NGO, Jia JIA, Huanbo LUAN, and Tat-Seng CHUA Conference Proceeding Article
Prescriptive analytics: A game changer for business, S. RAVINDRAN and Fiona Fui-hoon NAH Journal Article
Semantic reasoning in zero example video event retrieval, M. H. T. DE BOER, Yi-Jie LU, Hao ZHANG, Klamer SCHUTTE, Chong-wah NGO, and Wessel KRAAIJ Journal Article
SOL: A library for scalable online learning algorithms, Yue WU, Steven C. H. HOI, Chenghao LIU, Jing LU, Doyen SAHOO, and Nenghai YU Journal Article
Spatio-temporal analysis and prediction of cellular traffic in metropolis, Xu WANG, Zimu ZHOU, Zheng YANG, Yunhao LIU, and Chunyi PENG Conference Proceeding Article
Spatiotemporal identification of anomalies in a wildlife preserve, Bharadwaj KISHAN, Jason Guan Jie ONG, Yanrong ZHANG, and Tin Seong KAM Conference Proceeding Article
Strong authenticated key exchange with auxiliary inputs, Rongmao CHEN, Yi MU, Guomin YANG, Willy SUSILO, and Fuchun GUO Journal Article
TagScan: Simultaneous target imaging and material identification with commodity RFID devices, Ju WANG, Jie XIONG, Xiaojiang CHEN, Hongbo JIANG, Rajesh Krishna BALAN, and Dingyi FANG Conference Proceeding Article
Target material identification with commodity RFID devices, Xinyi LI, Chao FENG, Nana DING, Ju WANG, Jie XIONG, Yuhui REN, Xiaojiang CHEN, and Dingyi FANG Conference Proceeding Article
Tensor factorization for low-rank tensor completion, Pan ZHOU, Canyi LU, Zhouchen LIN, and Chao ZHANG Journal Article
Visual sentiment analysis for review images with item-oriented and user-oriented CNN, Quoc Tuan TRUONG and Hady W. LAUW Conference Proceeding Article
Which packages would be affected by this bug report?, Qiao HUANG, David LO, Xin XIA, Qingye WANG, and Shanping LI Conference Proceeding Article
GraphH: High performance big graph analytics in small clusters, Peng SUN, Yonggang WEN, Nguyen Binh Duong TA, and Xiaokui XIAO Conference Proceeding Article
JoanAudit: A tool for auditing common injection vulnerabilities, Julian THOME, Lwin Khin SHAR, Domenico BIANCULLI, and Lionel BRIAND Conference Proceeding Article
Expert as a service: Software expert recommendation via knowledge domain embeddings in stack overflow, Chaoran HUANG, Lina YAO, Xianzhi WANG, Boualem BENATALLAH, and Quan Z. SHENG Conference Proceeding Article
Expert as a service: Software expert recommendation via knowledge domain embeddings in stack overflow, Chaoran HUANG, Lina YAO, Xianzhi WANG, Boualem BENATALLAH, and Quan Z. SHENG Conference Proceeding Article
Sequential schemes for frequentist estimation of properties in statistical model checking, Cyrille JEGOUREL, Jun SUN, and Jin Song DONG Conference Proceeding Article
An efficient privacy-preserving outsourced computation over public data, Ximeng LIU, Baodong QIN, Robert H. DENG, and Yingjiu LI Journal Article
An unsupervised multilingual approach for online social media topic identification, Siaw Ling LO, Raymond CHIONG, and David CORNFORTH Journal Article
AudioSense: Sound-based shopper behavior analysis system, Amit SHARMA and Youngki LEE Conference Proceeding Article
Automated Android application permission recommendation, Lingfeng BAO, David LO, Xin XIA, and Shanping LI Journal Article
CLSTERS: A general system for reducing errors of trajectories under challenging localization situations, Hao WU, Weiwei SUN, Baihua ZHENG, Li YANG, and Wei ZHOU Journal Article
Code coverage and postrelease defects: A large-scale study on open source projects, Pavneet Singh KOCHHAR, David LO, Julia LAWALL, and Nachiappan NAGAPPAN Journal Article