The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2024

PDF

Escaping saddle points in heterogeneous federated learning via distributed SGD with communication compression, Sijin CHEN, Zhize LI, and Yuejie CHI Conference Proceeding Article

PDF

Evaluation of Orca 2 against other LLMs for Retrieval Augmented Generation, Donghao HUANG and Zhaoxia WANG Conference Proceeding Article

PDF

Explaining sequences of actions in multi-agent deep reinforcement learning models, Phyo Wai KHAING, Minghong GENG, Shubham PATERIA, Budhitama SUBAGDJA, and Ah-hwee TAN Conference Proceeding Article

PDF

Exploring diffusion time-steps for unsupervised representation learning, Zhongqi YUE, Jiankun WANG, Qianru SUN, Lei JI, Eric I-Chao CHANG, and Hanwang ZHANG Conference Proceeding Article

PDF

Flipped classroom for linear algebra at undergraduate level, M. THULASIDAS Conference Proceeding Article

PDF

From Tweets to token sales: Assessing ICO success through social media sentiments, Donghao HUANG, S. SAMUEL, Quoc Toan HUYNH, and Zhaoxia WANG Conference Proceeding Article

PDF

Grasper: A generalist pursuer for pursuit-evasion problems, Pengdeng LI, Shuxin LI, Xinrun WANG, Jakub CERNY, Youzhi ZHANG, Stephen McAleer, Hau CHAN, and Bo AN Conference Proceeding Article

PDF

Intriguing properties of data attribution on diffusion models, Xiaosen ZHENG, Tianyu PANG, Chao DU, Jing JIANG, and Min LIN Conference Proceeding Article

PDF

Knowledge enhanced multi-intent transformer network for recommendation, Ding ZOU, Wei WEI, Feida ZHU, Chuanyu XU, Tao ZHANG, and Chengfu HUO Conference Proceeding Article

PDF

Large language model powered agents in the web, Yang DENG, An ZHANG, Yankai LIN, Xu CHEN, Ji-Rong WEN, and Tat-Seng CHUA Conference Proceeding Article

PDF

Large language models for qualitative research in software engineering: exploring opportunities and challenges, Muneera BANO, Rashina HODA, Didar ZOWGHI, and Christoph TREUDE Journal Article

PDF

Learning adversarial semantic embeddings for zero-shot recognition in open worlds, Tianqi LI, Guansong PANG, Xiao BAI, Jin ZHENG, Lei ZHOU, and Xin NING Journal Article

PDF

Learning multi-faceted prototypical user interests, Nhu Thuat TRAN and Hady W. LAUW Conference Proceeding Article

PDF

Learning nighttime semantic segmentation the hard way, Wenxi LIU, Jiaxin CAI, Qi LI, Chenyang LIAO, Jingjing CAO, Shengfeng HE, and Yuanlong YU Journal Article

PDF

Make revocation cheaper: Hardware-based revocable attribute-based encryption, Xiaoguo LI, Guomin YANG, Tao XIANG, Shengmin XU, Bowen ZHAO, Robert H. DENG, and Hwee Hwa PANG Conference Proceeding Article

PDF

MultiGPrompt for multi-task pre-training and prompting on graphs, Xingtong YU, Chang ZHOU, Yuan FANG, and Xinming ZHAN Conference Proceeding Article

PDF

Navigating real-world challenges: A quadruped robot guiding system for visually impaired people in diverse environments, Shaojun CAI, Ashwin RAM, Zhengtai GOU, Mohd Alqama Wasim SHAIKH, Yu-An CHEN, Yingjia WAN, Kotaro HARA, Shengdong ZHAO, and David HSU Conference Proceeding Article

PDF

Non-vacuous generalization bounds for adversarial risk in stochastic neural networks, Mustafa WALEED, Liznerski PHILIPP, Antoine LEDENT, Wagner DENNIS, Wang PUYU, and Kloft MARIUS Conference Proceeding Article

PDF

On the feasibility of Simple Transformer for dynamic graph modeling, Yuxia WU, Yuan FANG, and Lizi LIAO Conference Proceeding Article

PDF

Plug-and-play policy planner for large language model powered dialogue agents, Yang DENG, Wenxuan ZHANG, Wai LAM, See-Kiong NG, and Tat-Seng CHUA Conference Proceeding Article

PDF

Q-Learning based framework for solving the stochastic E-waste collection problem, Dang Viet Anh NGUYEN, Aldy GUNAWAN, Mustafa MISIR, and Pieter VANSTEENWEGEN Conference Proceeding Article

PDF

Quantum machine learning for credit scoring, Nikolaos SCHETAKIS, Davit AGHAMALYAN, Micheael BOGUSLAVSKY, Agnieszka REES, Marc RAKOTOMALALA, and Paul Robert GRIFFIN Journal Article

PDF

Regret-based defense in adversarial reinforcement learning, Roman BELAIRE, Pradeep VARAKANTHAM, Thanh Hong NGUYEN, and David LO Conference Proceeding Article

PDF

Reinforcement learning with maskable stock representation for portfolio management in customizable stock pools, Wentao ZHANG, Yilei ZHAO, Shuo SUN, Jie YING, Yonggang XIE, Zitao SONG, Xinrun WANG, and Bo AN Conference Proceeding Article

PDF

Reinforcement Nash Equilibrium Solver, Xinrun WANG, Chang YANG, Shuxin LI, Pengdeng LI, Xiao HUANG, Hau CHAN, and Bo AN Conference Proceeding Article

PDF

Scaling up cooperative multi-agent reinforcement learning systems, Minghong GENG Conference Proceeding Article

PDF

Social balance on networks: Local minima and best-edge dynamics, Krishnendu CHATTERJEE, Jakub SVOBODA, Dorde ZIKELIC, Andreas PAVLOGIANNIS, and Josef TKADLEC Journal Article

PDF

SwapVid: Integrating video viewing and document exploration with direct manipulation, Taichi MURAKAMI, Kazuyuki FUJITA, Kotaro HARA, Kazuki TAKASHIMA, and Yoshifumi KITAMURA Conference Proceeding Article

PDF

The Grader: A grading assistant for lab tests and a teaching tool, M. THULASIDAS and David LO Conference Proceeding Article

PDF

The impact of avatar completeness on embodiment and the detectability of hand redirection in virtual reality, Martin FEICK, Andre ZENNER, Simon SEIBERT, Anthony TANG, and Antonio Krüger Conference Proceeding Article

Time-controllable keyword search scheme with efficient revocation in mobile e-health cloud, Yinbin MIAO; Feng LI; Xinghua LI; Zhiquan LIU; Jianting NING; Hongwei LI; Kim-Kwang Raymond CHOO; and DENG, Robert H. Journal Article

PDF

uBlade: efficient batch processing for uncertainty graph queries, Siyuan YAO, Yuchen LI, Shixuan SUN, Jiaxin JIANG, and Bingsheng HE Conference Proceeding Article

PDF

Unraveling the ‘anomaly’ in time series anomaly detection: A self-supervised tri-domain solution, Yuting SUN, Guansong PANG, Guanhua YE, Tong CHEN, Xia HU, and Hongzhi YIN Conference Proceeding Article

PDF

Unveiling code pre-trained models: Investigating syntax and semantics capacities, Wei MA, Shangqing LIU, Mengjie ZHAO, Xiaofei XIE, Wenhang WANG, Qiang HU, Jie ZHANG, and Liu YANG Journal Article

PDF

VAID: Indexing view designs in visual analytics system, Lu YING, Aoyu WU, Haotian LI, Zikun DENG, Ji LAN, Jiang WU, Yong WANG, Huamin QU, Dazhen DENG, and Yingcai WU Conference Proceeding Article

FAIR: Flow type-aware pre-training of compiler intermediate representations, Changan NIU, Chuanyi LI, Vincent NG, David LO, and Bin LUO Conference Proceeding Article

Towards benchmarking the coverage of automated testing tools in Android against manual testing, Ferdian THUNG, Ivana Clairine IRSAN, Jiakun LIU, and David LO Conference Proceeding Article

Modeling route representation with mixed-scale hierarchical transformer, Hanyuan ZHANG, Yuqi CHEN, Xinyu ZHANG, Qize JIANG, Liang LI, Baihua ZHENG, and Weiwei SUN Conference Proceeding Article

Trajectory set empowered hypergraph transformer for mobile sensor based traffic prediction, Hanyuan ZHANG, Xinyu \ZHANG, Qize JIANG, Liang LI, Baihua ZHENG, and Weiwei SUN Conference Proceeding Article

FlGan: GAN-based unbiased federated learning under non-IID settings, Zhuoran MA, Yang LIU, Yinbin MIAO, Guowen XU, Ximeng LIU, Jianfeng MA, and Robert H. DENG Journal Article

PDF

ACAV: A framework for automatic causality analysis in autonomous vehicle accident recordings, Huijia SUN, Christopher M. POSKITT, Yang SUN, Jun SUN, and Yuqi CHEN Conference Proceeding Article

PDF

Assessing AI detectors in identifying AI-generated code: Implications for education, Wei Hung PAN, Ming Jie CHOK, Jonathan Leong Shan WONG, Yung Xin SHIN, Yeong Shian POON, Zhou YANG, Chun Yong CHONG, David LO, and Mei Kuan LIM Conference Proceeding Article

PDF

Beyond a joke: Dead Code Elimination can delete live code, Haoxin TU, Lingxiao JIANG, Debin GAO, and He JIANG Conference Proceeding Article

PDF

Bidirectional paper-repository tracing in software engineering, Daniel GARIJO, Miguel ARROYO, Esteban GONZÁLEZ GUARDIA, Christoph TREUDE, and Nicola TAROCCO Conference Proceeding Article

PDF

Classifying source code: How far can compressor-based classifiers go?, Zhou YANG Conference Proceeding Article

PDF

Coca: Improving and explaining graph neural network-based vulnerability detection systems, Sicong CAO, Xiaobing SUN, Xiaoxue WU, David LO, Lili BO, Bin LI, and Wei LIU Conference Proceeding Article

PDF

Code search is all you need? Improving code suggestions with code search, Junkai CHEN, Xing HU, Zhenhao LI, Cuiyun GAO, Xin XIA, and David LO Conference Proceeding Article

PDF

Context-Aware REpresentation: Jointly learning item features and selection from triplets, Rodrigo ALVES and Antoine LEDENT Journal Article

PDF

Creative and correct: Requesting diverse code solutions from AI, Scott BLYTH, Markus WAGNER, and Christoph TREUDE Conference Proceeding Article

PDF

Curiosity-driven testing for sequential decision-making process, Junda HE, Zhou YANG, Jieke SHI, Chengran YANG, Kisub KIM, Bowen XU, Xin ZHOU, and David LO Conference Proceeding Article

PDF

Deep reinforcement learning for dynamic algorithm selection: A proof-of-principle study on differential evolution, Hongshu GUO, Yining MA, Zeyuan MA, Jiacheng CHEN, Xinglin ZHANG, Zhiguang CAO, Jun ZHANG, and Yue-Jiao GONG Journal Article

PDF

DronLomaly: Runtime log-based anomaly detector for DJI drones, Wei MINN, Naing Tun YAN, Lwin Khin SHAR, and Lingxiao JIANG Conference Proceeding Article

PDF

Editorial: Emerging on-demand passenger and logistics systems: Modelling, optimization, and data analytics, Jintao KE, Hai WANG, Neda MASOUD, Maximilian SCHIFFER, and Goncalo H. A. CORREIA Editorial

PDF

Encoding version history context for better code representation, Huy NGUYEN, Christoph TREUDE, and Patanamon THONGTANUNAM Conference Proceeding Article

PDF

Enhancing source code representations for deep learning with static analysis, Xueting GUAN and Christoph TREUDE Conference Proceeding Article

PDF

Environmental, social, and governance (ESG) and artificial intelligence in finance: State-of-the-art and research takeaways, Tristan LIM Journal Article

PDF

Experience Report: Identifying common misconceptions and errors of novice programmers with ChatGPT, Hua Leong FWA Conference Proceeding Article

PDF

Exploiting library vulnerability via migration-based automated test generation, Zirui CHEN, Xing HU, Xin XIA, Yi GAO, Tongtong XU, David LO, and Xiaohu YANG Conference Proceeding Article

PDF

Exploring the potential of ChatGPT in automated code refinement: An empirical study, Qi GUO, Shangqing LIU, Junming CAO, Xiaohong LI, Xin PENG, Xiaofei XIE, and Bihuan CHEN Conference Proceeding Article

PDF

Exploring the potential of ChatGPT in automated code refinement: An empirical study, Guo QI, Junming CAO, Xiaofei XIE, Shangqing LIU, Xiaohong LI, Bihuan CHEN, and Xin PENG Conference Proceeding Article

PDF

Extracting relevant test inputs from bug reports for automatic test case generation, Wendkuuni C. Ouédraogo, Laura Plein, Kader Kaboré, Andrew Habib, Jacques Klein, David LO, and Tegawende F. Bissyandé Conference Proceeding Article

PDF

FlGan: GAN-based unbiased federated learning under non-IID settings, Zhuoran MA, Yang LIU, Yinbin MIAO, Guowen XU, Ximeng LIU, Jianfeng MA, and Robert H. DENG Journal Article

PDF

GitHubInclusifier: Finding and fixing non-inclusive language in GitHub repositories, Liam TODD, John GRUNDY, and Christoph TREUDE Conference Proceeding Article

PDF

Going viral: Case studies on the impact of protestware, Youmei FAN, Dong WANG, Supastsara WATTANAKRIENGKRAI, Hathaichanok DAMRONGSIRI, Christoph TREUDE, Hideaki HATA, and Raula Gaikovina KULA Conference Proceeding Article

PDF

Greening large language models of code, Jieke SHI, Zhou YANG, Hong Jin KANG, Bowen XU, Junda HE, and David LO Conference Proceeding Article

PDF

Impact of government outsourcing contracts on high-tech vendors: An empirical study, Yi DONG, Nan HU, Yonghua JI, Chenkai NI, and Jing XIE Journal Article

PDF

Improving automated code reviews: Learning from experience, Hong Yi LIN, Patanamon THONGTANUNAM, Christoph TREUDE, and Wachiraphan CHAROENWET Conference Proceeding Article

PDF

Large language model for vulnerability detection: Emerging results and future directions, Xin ZHOU, Ting ZHANG, and David LO Conference Proceeding Article

PDF

Marco: A stochastic asynchronous concolic explorer, Jie HU, Yue DUAN, and Heng YIN Conference Proceeding Article

PDF

MiniMon: Minimizing Android applications with intelligent monitoring-based debloating, Jiakun LIU, Zicheng ZHANG, Xing HU, Thung Ferdian, Shahar MAOZ, Debin GAO, Eran TOCH, Zhipeng ZHAO, and David LO Conference Proceeding Article

PDF

MUT: Human-in-the-loop unit test migration, Yi GAO, Xing HU, Tongtong XU, Xin XIA, David LO, and Xiaohu YANG Conference Proceeding Article

PDF

My GitHub Sponsors profile is live!": Investigating the impact of Twitter/X mentions on GitHub Sponsors, Youmei FAN, Tao XIAO, Hideaki HATA, Christoph TREUDE, and Kenichi MATSUMOTO Conference Proceeding Article

PDF

Out of sight, out of mind: Better automatic vulnerability repair by broadening input ranges and sources, Xin ZHOU, Kisub KIM, Bowen XU, DongGyun HAN, and David LO Conference Proceeding Article

PDF

PPT4J: Patch presence test for Java binaries, Zhiyuan PAN, Xing HU, Xin XIA, Xian ZHAN, David LO, and Xiaohu YANG Conference Proceeding Article

PDF

PS3: Precise patch presence test based on semantic symbolic signature, Qi ZHAN, Xing HU, Zhiyang LI, Xin XIA, David LO, and Shanping LI Conference Proceeding Article

PDF

REDriver: Runtime enforcement for autonomous vehicles, Yang SUN, Christopher M. POSKITT, Xiaodong ZHANG, and Jun SUN Conference Proceeding Article

sFuzz2.0: Storage-access pattern guided smart contract fuzzing, Haoyu WANG, Zan WANG, Shuang LIU, Jun SUN, Yingquan ZHAO, Yan WAN, and Duy Tai NGUYEN Journal Article

PDF

Streamlining Java programming: uncovering well-formed idioms with IdioMine, Yanming YANG, Xing HU, Xin XIA, David LO, and Xiaohu YANG Conference Proceeding Article

PDF

Teaching software development for real-world problems using a microservice-based collaborative problem-solving approach, Yi Meng LAU, Christian Michael KOH, and Lingxiao JIANG Conference Proceeding Article

PDF

Test optimization in DNN testing: A survey, Qiang HU, Yuejun GUO, Xiaofei XIE, Maxime CORDY, Lei MA, Mike PAPADAKIS, and Yves LE TRAON Journal Article

PDF

The impact of bug localization based on crash report mining: A developers' perspective, Marcos MEDEIROS, Uirá KULESZA, Roberta COELHO, Rodrigo BONIFACIO, Christoph TREUDE, and Eiji Adachi BARBOSA Conference Proceeding Article

PDF

The important role of system dynamics investigation on business model, industry and performance management, Lina GOZALI, Teuku Yuri M. ZAGLOEL, Togar Mangihut SIMATUPANG, Wahyudi SUTOPO, Aldy GUNAWAN, Yun-Chia LIANG, Bernardo Nugroho YAHYA, Jose Arturo GARZA-REYES, Agustinus Purna IRAWAN, and Yuliani SUSENO Journal Article

PDF

Towards low-resource rumor detection: Unified contrastive transfer with propagation structure, Hongzhan LIN, Jing MA, Ruichao YANG, Zhiwei YANG, and Mingfei CHENG Journal Article

PDF

Towards speedy permission-based debloating for Android apps, Thung Ferdian, Jiakun LIU, Pattarakrit RATTANUKUL, Shahar MAOZ, Eran TOCH, Debin GAO, and David LO Conference Proceeding Article

PDF

Unleashing the power of Clippy in real-world Rust projects, Chunmiao LI, Yijun YU, Haitao WU, Luca CARLIG, Shijie NIE, and Lingxiao JIANG Conference Proceeding Article

PDF

Unveiling memorization in code models, Zhou YANG, Zhipeng ZHAO, Chenyu WANG, Jieke SHI, Dongsun KIM, DongGyun HAN, and David LO Conference Proceeding Article

PDF

W4-Groups: Modeling the who, what, when and where of group behavior via mobility sensing, Akansha ATREY, Camellia ZAKARIA, Rajesh Krishna BALAN, and Prashant SHENOY Journal Article

Range specification bug detection in flight control systems through fuzzing, Ruidong HAN, Siqi MA, Juanru LI, Surya NEPAL, David LO, Zhuo MA, and Jianfeng MA Journal Article

Deep reinforcement learning for solving vehicle routing problems with backhauls, Conghui WANG, Zhiguang CAO, Yaoxin WU, Long TENG, and Guohua WU Journal Article

Publicly verifiable and secure SVM classification for cloud-based health monitoring services, Dian LEI, Jinwen LIANG, Chuan ZHANG, Ximeng LIU, Daojing HE, Liehuang ZHU, and Song GUO Journal Article

Self-admitted technical debts identification: How far are we?, Hao GU, Shichao ZHANG, Qiao HUANG, Zhifang LIAO, Jiakun LIU, and David LO Conference Proceeding Article

Sustainability forecasting for deep learning packages, Junxiao HAN, Yunkun WANG, Zhongxin LIU, Lingfeng BAO, Jiakun LIU, David LO, and Shuiguang DENG Conference Proceeding Article

Efficient verifiably encrypted ECDSA schemes from Castagnos-Laguillaumie and Joye-Libert encryptions, Xiao YANG, Chengru ZHANG, Haiyang XUE, and Ho Man AU Journal Article

Adversarial learning for coordinate regression through k-layer penetrating representation, Mengxi JIANG, Yulei SUI, Yunqi. LEI, Xiaofei XIE, Cuihua LI, Yang LIU, and Ivor W. TSANG Journal Article

PDF

Application of collaborative learning paradigms within software engineering education: A systematic mapping study, Rita GARCIA, Christoph TREUDE, and Andrew VALENTINE Conference Proceeding Article

A simulated annealing with variable neighborhood descent approach for the heterogeneous fleet vehicle routing problem with multiple forward/reverse cross-docks, Vincent F. YU, Pham Tuan ANH, Aldy GUNAWAN, and Hsun HAN Journal Article

PDF

Attack as detection: Using adversarial attack methods to detect abnormal examples, Zhe ZHAO, Guangke CHEN, Tong LIU, Taishan LI, Fu SONG, Jingyi WANG, and Jun SUN Journal Article

PDF

Community similarity based on user profile joins, Konstantinos THEOCHARIDIS and Hady Wirawan LAUW Conference Proceeding Article

PDF

Conditional neural heuristic for multiobjective vehicle routing problems, Mingfeng FAN, Yaoxin WU, Zhiguang CAO, Wen SONG, Guillaume SARTORETTI, Huan LIU, and Guohua WU Journal Article

PDF

DDoS family: A novel perspective for massive types of DDoS attacks, Ziming ZHAO, Zhaoxuan LI, Zhihao ZHOU, Jiongchi YU, Zhuoxue SONG, Xiaofei XIE, Fan ZHANG, and Rui ZHANG Journal Article