The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2023

PDF

Understanding the effect of counterfactual explanations on trust and reliance on AI for human-AI collaborative clinical decision making, Min Hun LEE and Chong Jun CHEW Journal Article

PDF

Underwater Image Translation via Multi-Scale Generative Adversarial Network, Dongmei YANG, Tianzi ZHANG, Boquan LI, Menghao LI, Weijing CHEN, Xiaoqing LI, and Xingmei WANG Journal Article

PDF

Unsupervised anomaly detection in medical images with a memory-augmented multi-level cross-attentional masked autoencoder, Yu TIAN, Guansong PANG, Yuyuan LIU, Chong WANG, Yuanhong CHEN, Fengbei LIU, Rajvinder SINGH, Johan W. VERJANS, Mengyu WANG, and Gustavo CARNEIRO Conference Proceeding Article

PDF

Using the TypeScript compiler to fix erroneous Node.js snippets, Brittany REID, Christoph TREUDE, and Markus WAGNER Conference Proceeding Article

PDF

Visilience: An interactive visualization framework for resilience analysis using control-flow graph, Hailong JIANG, Shaolun RUAN, Bo FANG, Yong WANG, and Qiang GUAN Conference Proceeding Article

PDF

Visually analyzing company-wide software service dependencies: An industrial case study, Sebastian BALTES, Brian PFITZMANN, Thomas KOWARK, Christoph TREUDE, and Fabian BECK Conference Proceeding Article

PDF

Voucher abuse detection with prompt-based fine-tuning on graph neural networks, Zhihao WEN, Yuan FANG, Yihan LIU, Yang GUO, and Shuji HAO Conference Proceeding Article

PDF

Wait, wasn't that code here before? Detecting outdated software documentation, Wen Siang TAN, Markus WAGNER, and Christoph TREUDE Conference Proceeding Article

PDF

Your cursor reveals: On analyzing workers’ browsing behavior and annotation quality In crowdsourcing tasks, Pei-chi LO and Ee-peng LIM Journal Article

Collective prompt tuning with relation inference for document-level relation extraction, Changsen YUAN, Yixin CAO, and Heyan HUANG Journal Article

DScope: To reliably and securely acquire live data from Kernel-Compromised ARM devices, Zhe CHEN, Haiqing QIU, and Xuhua DING Conference Proceeding Article

Distributed representation learning with skip-gram model for trained random forests, Chao MA, Tianjun WANG, Le ZHANG, Zhiguang CAO, Yue HUANG, and Xinghao DING Journal Article

Skeleton tracking solutions for a low-cost stroke rehabilitation support system, Ana R. COIAS, Min Hun LEE, Alexandre BERNARDINO, and Asim SMAILAGIC Conference Proceeding Article

A Causality-Aligned Structure Rationalization Scheme Against Adversarial Biased Perturbations for Graph Neural Networks, Ju JIA, Siqi MA, Yang LIU, Lina WANG, and Robert H. DENG Journal Article

PDF

AdaVis: Adaptive and explainable visualization recommendation for tabular data, Songheng ZHANG, Yong WANG, Haotian LI, and Huamin QU Journal Article

PDF

ArduinoProg: Towards automating Arduino programming, IMAM NUR BANI YUSUF, DIYANAH BINTE ABDUL JAMAL, and Lingxiao JIANG Conference Proceeding Article

PDF

Are we ready to embrace generative AI for software Q&A?, Bowen XU, Thanh-Dat NGUYEN, Thanh Le CONG, Thong HOANG, Jiakun LIU, Kisub KIM, Chen GONG, Changan NIU, Chenyu WANG, Xuan-Bach Dinh LE, and David LO Conference Proceeding Article

PDF

Are we ready to embrace generative AI for software Q&A?, Bowen XU, Thanh-Dat NGUYEN, Thanh LE-CONG, Thong HOANG, Jiakun LIU, Kisub KIM, Chen GONG, Changan NIU, Chenyu WANG, David LO, and David LO Conference Proceeding Article

PDF

AutoConf: Automated configuration of unsupervised learning systems using metamorphic testing and Bayesian optimization, Lwin Khin SHAR, GOKNIL Arda, Erik Johannes HUSOM, Sagar Sen SEN, Naing Tun YAN, and Kisub KIM Conference Proceeding Article

PDF

AutoDebloater: Automated android app debloating, Jiakun LIU, Xing HU, Thung Ferdian, Shahar MAOZ, Eran TOCH, Debin GAO, and David LO Conference Proceeding Article

PDF

Automated question title reformulation by mining modifcation logs from Stack Overflow, Ke LIU, Xiang CHEN, Chunyang CHEN, Xiaofei XIE, and Zhanqi CUI Journal Article

PDF

Carbon-aware mine planning with a novel multi-objective framework, NURUL ASYIKEEN BINTE AZHAR, Aldy GUNAWAN, Shih-Fen CHENG, and Erwin LEONARDI Conference Proceeding Article

PDF

Constrained multiagent reinforcement learning for large agent population, Jiajing LING, Arambam James SINGH, Duc Thien NGUYEN, and Akshat KUMAR Conference Proceeding Article

PDF

Continual collaborative filtering through gradient alignment, Dinh Hieu DO and Hady Wirawan LAUW Conference Proceeding Article

PDF

Edge Distraction-aware Salient Object Detection, Sucheng REN, Wenxi LIU, Jianbo JIAO, Guoqiang HAN, and Shengfeng HE Journal Article

PDF

EndWatch: A practical method for detecting non-termination in real-world software, Yao ZHANG, Xiaofei XIE, Yi LI, Sen CHEN, Cen ZHANG, and Xiaohong LI Conference Proceeding Article

PDF

Experimental comparison of features, analyses, and classifiers for Android malware detection, Lwin Khin SHAR, Biniam Fisseha DEMISSIE, Mariano CECCATO, Naing Tun YAN, David LO, Lingxiao JIANG, and Christoph BIENERT Journal Article

Link

Fair cloud auditing based on blockchain for resource-constrained IoT devices, Lei ZHOU, Anmin FU, Guomin YANG, Yansong GAO, Shui YU, and Robert H. DENG Journal Article

PDF

Fine-grained in-context permission classification for Android apps using control-flow graph embedding, Vikas Kumar MALVIYA, Naing Tun YAN, Chee Wei LEOW, Ailys Xynyn TEE, Lwin Khin SHAR, and Lingxiao JIANG Conference Proceeding Article

PDF

Generative model-based testing on decision-making policies, Zhuo LI, Xiongfei WU, Derui ZHU, Mingfei CHENG, Siyuan CHEN, Fuyuan ZHANG, Xiaofei XIE, Lei MA, and Jianjun ZHAO Conference Proceeding Article

PDF

Graph-level anomaly detection via hierarchical memory networks, Chaoxi NIU, Guansong PANG, and Ling CHEN Conference Proceeding Article

PDF

GRASP solution approach for the e-waste collection problem, Aldy GUNAWAN, Dang Viet Anh NGUYEN, Pham Kien Minh NGUYEN, and Pieter VANSTEENWEGEN Conference Proceeding Article

PDF

Hercules: Boosting the performance of privacy-preserving federated learning, Guowen XU, Xingshuo HAN, Shengmin XU, Tianwei ZHANG, Hongwei LI, Xinyi HUANG, and Robert H. DENG Journal Article

PDF

K-ST: A formal executable semantics of the structured text language for PLCs, Kun WANG, Jingyi WANG, Christopher M. POSKITT, Xiangxiang CHEN, Jun SUN, and Peng CHENG Journal Article

PDF

On predicting ESG ratings using dynamic company networks, Gary ANG, Zhiling GUO, and Ee-peng LIM Journal Article

PDF

Quantifying taxi drivers' behaviors with behavioral game theory, Mengyu JI, Yuhong XU, and Shih-Fen CHENG Conference Proceeding Article

PDF

Real: A representative error-driven approach for active learning, Cheng CHEN, Yong WANG, Lizi LIAO, Yueguo CHEN, and Xiaoyong DU Conference Proceeding Article

PDF

Revisiting the identification of the co-evolution of production and test code, Weifeng SUN, Meng YAN, Zhongxin LIU, Xin XIA, Yan LEI, and David LO Journal Article

PDF

RoSAS: Deep semi-supervised anomaly detection with contamination-resilient continuous supervision, Hongzuo XU, Yijie WANG, Guansong PANG, Songlei JIAN, Ning LIU, and Yongjun WANG Journal Article

PDF

TESTSGD: Interpretable testing of neural networks against subtle group discrimination, Mengdi ZHANG, Jun SUN, Jingyi WANG, and Bing SUN Journal Article

PDF

The devil is in the tails: How long-tailed code distributions impact large language models, Xin ZHOU, Kisub KIM, Bowen XU, Jiakun LIU, DongGyun HAN, and David LO Conference Proceeding Article

PDF

Threshold attribute-based credentials with redactable signature, Rui SHI, Huamin FENG, Yang YANG, Feng YUAN, Yingjiu LI, Hwee Hwa PANG, and Robert H. DENG Journal Article

PDF

Uncertainty-adjusted inductive matrix completion with Graph Neural Networks, Petr KASALICKY, Antoine LEDENT, and Rodrigo ALVES Conference Proceeding Article

PDF

Understanding multi-homing and switching by platform drivers, Xiaotong GUO, Andreas HAUPT, Hai WANG, Rida QADRI, and Jinhua ZHAO Journal Article

PDF

When routing meets recommendation: Solving dynamic order recommendations problem in peer-to-peer logistics platforms, Zhiqin ZHANG, Waldy JOE, Yuyang ER, and Hoong Chuin LAU Conference Proceeding Article

Efficient Privacy-Preserving Federated Learning With Improved Compressed Sensing, Yifan. ZHANG, Yinbin. MIAO, Xinghua. LI, Linfeng. WEI, Zhiquan LIU, Kim-Kwang R. CHOO, and Robert H. DENG Journal Article

AI for connectivism learning - Undergraduate students’ experiences of ChatGPT in advanced programming courses, GOTTIPATI Swapna; Kyong Jin SHIM; and SHANKARARAMAN, Venky Conference Proceeding Article

Machine learning based financial aid management process, GOTTIPATI Swapna; SHANKARARAMAN, Venky; Komirisetti C. RAO; and Vennila VETRIVILLALAN Conference Proceeding Article

Automata-guided control-flow-sensitive fuzz driver generation, Cen ZHANG, Yuekang LI, Hao ZHOU, Xiaohan ZHANG, Yaowen ZHENG, Xian ZHAN, Xiaofei XIE, Xiapu LUO, Xinghua LI, Yang Liu LIU, and Sheikh M. HABIB Conference Proceeding Article

Privacy-preserving multi-user outsourced computation for boolean circuits, Xueqiao. LIU, Guomin YANG, Willy. SUSILO, Kai. HE, Robert H. DENG, and Jian. WENG Journal Article

PDF

A certificateless designated verifier sanitizable signature, Yonghua ZHAN, Bixia YI, Yang YANG, Renjie HE, and Rui SHI Conference Proceeding Article

PDF

An adaptive large neighborhood search for heterogeneous vehicle routing problem with time windows, Minh Pham Kien NGUYEN, Aldy GUNAWAN, Vincent F. YU, and Mustafa MISIR Conference Proceeding Article

PDF

Balancing utility and fairness in submodular maximization, Yanhao WANG, Yuchen LI, Francesco BONCHI, and Ying WANG Conference Proceeding Article

PDF

CampER: An effective framework for privacy-aware deep entity resolution, Yuxiang GUO, Lu CHEN, Zhengjie ZHOU, Baihua ZHENG, Ziquan FANG, Zhikun ZHANG, Yuren MAO, and Yunjun GAO Conference Proceeding Article

PDF

Context-aware event forecasting via graph disentanglement, Yunshan MA, Chenchen YE, Zijian WU, Xiang WANG, Yixin CAO, and Tat-Seng CHUA Conference Proceeding Article

CROWDFL: Privacy-preserving mobile crowdsensing system via federated learning, Bowen ZHAO, Ximeng LIU, Wei-Neng CHEN, and Robert H. DENG Journal Article

PDF

Decoding the underlying meaning of multimodal hateful memes, Ming Shan HEE, Wen Haw CHONG, and Roy Ka-Wei LEE Conference Proceeding Article

PDF

Decompiling x86 Deep Neural Network executables, Zhibo LIU, Yuanyuan YUAN, Shuai WANG, Xiaofei XIE, and Lei MA Conference Proceeding Article

PDF

Deep weakly-supervised anomaly detection, Guansong PANG, Chunhua SHEN, Huidong JIN, and Anton VAN DEN HENGEL Conference Proceeding Article

PDF

Document-level relation extraction via separate relation representation and logical reasoning, Heyan HUANG, Changsen YUAN, Qian LIU, and Yixin CAO Journal Article

PDF

Evolve path tracer: Early detection of malicious addresses in cryptocurrency, Ling CHENG, Feida ZHU, Yong WANG, Ruicheng LIANG, and Huiwen LIU Conference Proceeding Article

PDF

Evolve Path Tracer: Early detection of malicious addresses in cryptocurrency, Ling CHENG, Feida ZHU, Yong WANG, Ruicheng LIANG, and Huiwen LIU Conference Proceeding Article

PDF

Fintech data infrastructure for ESG disclosure compliance, Randall E. DURAN and Peter TIERNEY Journal Article

PDF

Generalization through diversity: Improving unsupervised environment design, Wenjun LI, Pradeep VARAKANTHAM, and Dexun LI Conference Proceeding Article

PDF

GRASP based metaheuristic to solve the mixed fleet e-waste collection route planning problem, Aldy GUNAWAN, Dang V.A. NGUYEN, Pham K.M. NGUYEN, and Pieter. VANSTEENWEGEN Conference Proceeding Article

PDF

Hyperbolic graph topic modeling network with continuously updated topic tree, Ce ZHANG, Rex YING, and Hady Wirawan LAUW Conference Proceeding Article

PDF

Knowledge representation for conceptual, motivational, and affective processes in natural language communication, Seng Beng HO, Zhaoxia WANG, Boon-Kiat QUEK, and Erik CAMBRIA Conference Proceeding Article

PDF

Lean manufacturing approach to increase packaging efficiency, Lina GOZALI, Irsandy KURNIAWAN, Aldo SALIM, Iveline Anne MARIE, Benny TJAHJONO, Yun Chia LIANG, Aldy GUNAWAN, Nnovia Hardjo SIE, and Yuliani SUSENO Conference Proceeding Article

PDF

Learning to send reinforcements: Coordinating multi-agent dynamic police patrol dispatching and rescheduling via reinforcement learning, Waldy JOE and Hoong Chuin LAU Conference Proceeding Article

PDF

Multi-Granularity Detector for Vulnerability Fixes, Truong Giang NGUYEN, CONG, Thanh Le, Hong Jin KANG, Ratnadira WIDYASARI, Chengran YANG, Zhipeng ZHAO, Bowen XU, Jiayuan ZHOU, Xin XIA, Ahmed E. HASSAN, David LO, and David LO Journal Article

PDF

Multi-view graph contrastive learning for solving vehicle routing problems, Yuan JIANG, Zhiguang CAO, Yaoxin WU, and Jie ZHANG Conference Proceeding Article

PDF

NumGPT: Improving numeracy ability of generative pre-trained models, Zhihua JIN, Xin JIANG, Xiangbo WANG, Qun LIU, Yong WANG, Xiaozhe REN, and Huamin QU Conference Paper

Privacy-preserving asynchronous federated learning framework in distributed IoT, Xinru YAN, Yinbin MIAO, Xinghua LI, Kim-Kwang Raymond CHOO, Xiangdong MENG, and Robert H. DENG Journal Article

PDF

Proxy hunting: Understanding and characterizing proxy-based upgradeable smart contracts in blockchains, William E III BODELL, Sajad MEISAMI, and Yue DUAN Conference Proceeding Article

PDF

Semantically constitutive entities in knowledge graphs, Chong Cher CHIA, Maksim TKACHENKO, and Hady Wirawan LAUW Conference Proceeding Article

PDF

Single-View View Synthesis with Self-rectified Pseudo-Stereo, Yang ZHOU, Hanjie WU, Wenxi LIU, Zheng XIONG, Jing QIN, and Shengfeng HE Journal Article

Slot allocation for a multiple-airport system considering airspace capacity and flying time uncertainty, Yanjun WANG, Chang LIU, Hai WANG, and Vu DUONG Journal Article

PDF

Sparsity brings vulnerabilities: Exploring new metrics in backdoor attacks, Jianwen TIAN, Kefan QIU, Debin GAO, Zhi WANG, Xiaohui KUANG, and Gang ZHAO Conference Proceeding Article

PDF

The 4th International Workshop on Talent and Management Computing (TMC'2023): Editorial, Hengshu ZHU, Hui XIONG, Yong GE, and Ee-peng LIM Conference Proceeding Article

PDF

The analysis of extended producer responsibility (EPR) for e-waste management Policy Drivers and Challenges in Singapore, Aldy GUNAWAN, Tasaporn VISAWAMETEEKUL, Aidan Marc WONG, and Linh C. TRAN Conference Proceeding Article

PDF

The future of cryptocurrency and blockchain technology in finance, Wanyi WONG and Alan @ Ali MADJELISI MEGARGEL Journal Article

PDF

The heterogeneous vehicle routing problem with multiple time windows for the e-waste collection problem, Aldy GUNAWAN, Minh P.K NGUYEN, Vincent F. YU, and Dang Viet Anh NGUYEN Conference Proceeding Article

PDF

Transferable curricula through difficulty conditioned generators, Sidney TIO and Pradeep VARAKANTHAM Conference Proceeding Article

PDF

Vehicle routing problem with parcel locker and public transportation: Goods delivery using mass-rapid-transit system, Pham K.M. NGUYEN, Vincent F. YU, and Aldy GUNAWAN Conference Proceeding Article

Comprehensive survey on privacy-preserving spatial data query in transportation systems, Yinbin MIAO, Yutao YANG, Xinghua LI, Xiangdong MENG, Robert H. DENG, and Robert H. DENG Journal Article

BehAVExplor: Behavior diversity guided testing for autonomous driving systems, Mingfei CHENG, Yuan ZHOU, and Xiaofei XIE Conference Proceeding Article

Efficient and secure Spatial Range Query over large-scale encrypted data, Yinbin MIAO, Chao XU, Yifeng ZHENG, Ximeng LIU, Xiangdong MENG, and Robert H. DENG Conference Proceeding Article

A transformer framework for generating context-aware knowledge graph paths, Pei-Chi LO and Ee-peng LIM Journal Article

Is Web3 better than Web2 for investors? Evidence from domain name auctions, Ping Fan KE, Yi Meng LAU, and Daniel Varghese HANLEY Conference Proceeding Article

The effect of online follow-up services on offline and online physician demand: Evidence from chronic disease physicians, Anqi ZHAO, Qian TANG, and Yang GAO Conference Proceeding Article

The use of bug bounty programs for software reliability improvement, Tianlu ZHOU, Dan MA, and Nan FENG Conference Proceeding Article

Uncertainty-adjusted recommendation via matrix factorization with weighted losses, Rodrigo ALVES, Antoine LEDENT, and Marius KLOFT Journal Article

A tightly secure ID-based signature scheme under DL assumption in AGM, Jia-Chng LOH, Fuchun GUO, Willy SUSILO, and Guomin YANG Conference Proceeding Article

Privacy-Aware and Security-Enhanced Efficient Matchmaking Encryption, Jianfei SUN, Guowen XU, Tianwei ZHANG, Xuehuan YANG, Mamoun ALAZAB, and Robert H. DENG Journal Article

PDF

18 million links in commit messages: purpose, evolution, and decay, Tao XIAO, Sebastian BALTES, Hideaki HATA, Christoph TREUDE, Raula KULA, Takashi ISHIO, and Kenichi MATSUMOTO Journal Article

PDF

Adaptive split-fusion transformer, Zixuan SU, Jingjing CHEN, Lei PANG, Chong-wah NGO, and Yu-Gang JIANG Conference Proceeding Article

PDF

A data-driven approach for scheduling bus services subject to demand constraints, BRAHMANAGE JANAKA CHATHURANGA THILAKARATHNA, Thivya KANDAPPU, and Baihua ZHENG Journal Article

PDF

A hierarchical optimization approach for dynamic pickup and delivery problem with LIFO constraints, Jianhui DU, Zhiqin ZHANG, Xu WANG, and Hoong Chuin LAU Journal Article

PDF

A Lightweight Privacy-preserving Path Selection Scheme in VANETs, Guojun WANG and Huijie YANG Journal Article

PDF

An efficient hybrid genetic algorithm for the quadratic traveling salesman problem, Quang Anh PHAM, Hoong Chuin LAU, Minh Hoang HA, and Lam VU Conference Proceeding Article