The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2017

PDF

Deep learning on lie groups for skeleton-based action recognition, Zhiwu HUANG, C. WAN, T. PROBST, and Gool L. VAN Conference Proceeding Article

PDF

Demographics of news sharing in the U.S. twittersphere, Julio C.S. REIS, Haewoon KWAK, Jisun AN, Johnnatan MESSIAS, and BENEVENUTO Fabrıcio. Conference Proceeding Article

PDF

DeshadowNet: A multi-context embedding deep network for shadow removal, Liangqiong QU, Jiandong TIAN, Shengfeng HE, Yandong TANG, and Rynson W. H. LAU Conference Proceeding Article

PDF

Discovering newsworthy themes from sequenced data: A step towards computational journalism, Qi FAN, Yuchen LI, Dongxiang ZHANG, and Kian-Lee Tan TAN Journal Article

PDF

Does director interlock impact the diffusion of accounting method choice?, Jie HAN, Nan HU, Ling LIU, and Gaoliang TIAN Journal Article

PDF

EHealthPortal: A social support hub for the active living of the elderly, Di WANG and Ah-hwee TAN Conference Proceeding Article

PDF

Elderly friendliness evaluation of mobile assistants, Di WANG, Xinjia YU, Simon FAUVEL, Ah-hwee TAN, and Chunyan MIAO Conference Proceeding Article

PDF

Fast adaptation of activity sensing policies in mobile devices, Mohammad Abu ALSHEIKH, Dusit NIYATO, Shaowei LIN, Hwee-Pink TAN, and Dong In KIM Journal Article

PDF

Fast adaptation of activity sensing policies in mobile devices, Mohammad Abu ALSHEIKH, Dusit NIYATO, Shaowei LIN, Hwee-Pink TAN, and Dong In KIM Journal Article

PDF

GMS: Grid-based motion statistics for fast, ultra-robust feature correspondence, Jiawang BIAN, Wen-yan LIN, Matsushita YASUYUKI, Sai-Kit YEUNG, Tan-Dat NGUYEN, and Ming-Ming CHENG Conference Proceeding Article

PDF

Hierarchical functional encryption for linear transformations, Shiwei ZHANG, Yi MU, Guomin YANG, and Xiaofen WANG Conference Proceeding Article

PDF

How artificial intelligence is impacting manufacturing industry, Deepak SRINIVASAN, Maitreyi Ramesh SWAROOP, Balaji RAJARAM, and Sri Krishan IYER Journal Article

PDF

How to enable future faster payments? An evaluation of a hybrid payments settlement mechanism, Zhiling GUO and Yuanzhi HUANG Conference Proceeding Article

PDF

Incentivizing the use of bike trailers for dynamic repositioning in bike sharing systems, Supriyo GHOSH and Pradeep VARAKANTHAM Conference Proceeding Article

PDF

iUpdater: Low cost RSS fingerprints updating for device-free localization, Liqiong CHANG, Jie XIONG, Yu WANG, Xiaojiang CHEN, Junhao HU, and Dingyi FANG Conference Proceeding Article

PDF

JFIX: Semantics-based repair of Java programs via symbolic PathFinder, Xuan Bach D. LE, Duc-Hiep CHU, David LO, GOUES LE, and Willem VISSER Conference Proceeding Article

PDF

Mergeable and revocable identity-based encryption, Shengmin XU, Guomin YANG, Yi MU, and Willy SUSILO Conference Proceeding Article

PDF

Mining capstone project wikis for knowledge discovery, Swapna GOTTIPATI, Venky SHANKARARAMAN, and Melvrivk GOH Conference Proceeding Article

PDF

MopEye: Opportunistic monitoring of per-app mobile network performance, Daoyuan WU, Rocky K. C. CHANG, Weichao LI, Eric K. T. CHENG, and Debin GAO Conference Proceeding Article

PDF

Multi-authority ABS supporting dendritic access structure, Ruo MO, Jian-feng MA, Ximeng LIU, and Qi LI Journal Article

PDF

Perception and reality: Measuring digital skills in Singapore, Swapna GOTTIPATI Report

PDF

Poster: Unobtrusive user verification using piezoelectric energy harvesting, Dong MA, Guohao LAN, Weitao XU, Mahbub HASSAN, and Wen HU Conference Proceeding Article

PDF

Privacy-preserving k-time authenticated secret handshakes, Yangguang TIAN, Shiwei ZHANG, Guomin YANG, Yi MU, and Yong YU Conference Proceeding Article

PDF

Sparsity based reflection removal using external patch search, Renjie WAN, Boxin SHI, Ah-hwee TAN, and Alex C. KOT Conference Proceeding Article

PDF

The making of a successful analytics master degree program: Experiences and lessons drawn for a young and small Asian university, Michelle L. F. CHEONG Journal Article

PDF

The role of different tie strength in disseminating different topics on a microblog, Felicia NATALI, Kathleen M. CARLEY, Feida ZHU, and Binxuan HUANG Conference Proceeding Article

PDF

TLEL: A two-layer ensemble learning approach for just-in-time defect prediction, Xinli YANG, David LO, Xin XIA, and Jianling SUN Journal Article

PDF

Truly multi-modal YouTube-8M video classification with video, audio, and text, Zhe WANG, Kingsley KUAN, Mathieu RAVANT, Gaurav MANEK, Sibo SONG, Yuan FANG, and et al Conference Proceeding Article

PDF

An effective change recommendation approach for supplementary bug fixes, Xin XIA and David LO Journal Article

PDF

An exploratory study of functionality and learning resources of web APIs on Programmableweb, Yuan TIAN, Pavneet Singh KOCHHAR, and David LO Conference Proceeding Article

PDF

Augmenting decisions of taxi drivers through reinforcement learning for improving revenues, Tanvi VERMA, Pradeep VARAKANTHAM, Sarit KRAUS, and Hoong Chuin LAU Conference Proceeding Article

PDF

Battery-aware mobile data service, Liang HE, Guozhu MENG, Yu GU, Cong LIU, Jun SUN, Ting ZHU, Yang LIU, and Kang G. SHIN Journal Article

PDF

BreathPrint: Breathing acoustics-based user authentication, Jagmohan CHAUHAN, Yining HU, Suranga SEREVIRATNE, Archan MISRA, Aruna SEREVIRATNE, and Youngki LEE Conference Proceeding Article

PDF

Bug characteristics in blockchain systems: A large-scale empirical study, Zhiyuan WAN, David LO, Xin XIA, and Liang CAI Conference Proceeding Article

PDF

Cataloging GitHub repositories, Abhishek SHARMA, Ferdian THUNG, Pavneet Singh KOCHHAR, Agus SULISTYA, and David LO Conference Proceeding Article

PDF

CCA Secure encryption supporting authorized equality test on ciphertexts in standard model and its applications, Yujue WANG, Hwee Hwa PANG, Ngoc Hieu TRAN, and Robert H. DENG Journal Article

PDF

Charitable fundraising: Gaining donors' trust on online platforms, Deserinas SULAEMAN Conference Proceeding Article

PDF

Collaboration in 360° videochat: Challenges and opportunities, Anthony TANG, Omid FAKOURFAR, Carman NEUSTAEDTER, and Scott BATEMAN Conference Proceeding Article

PDF

COMPRESS: A comprehensive framework of trajectory compression in road networks, Yunheng HAN, Weiwei SUN, and Baihua ZHENG Journal Article

PDF

Culturally-grounded analysis of everyday creativity in social media: A case study in qatari context, D. Fox HARRELL, Sarah VIEWEG, Haewoon KWAK, Chong-U LIM, Sercan SENGUN, Ali JAHANIAN, and Pablo. ORTIZ Conference Proceeding Article

PDF

Cybercrime deterrence and international legislation: Evidence from distributed denial of service attacks, Kai-Lung HUI, Seung Hyun KIM, and Qiu-Hong WANG Journal Article

PDF

DeepMon: Mobile GPU-based deep learning framework for continuous vision applications, Nguyen Loc HUYNH, Youngki LEE, and Rajesh Krishna BALAN Conference Proceeding Article

PDF

DEMO: DeepMon - Building mobile GPU Deep learning models for continuous vision applications, Loc Nguyen HUYNH, Rajesh Krishna BALAN, and Youngki LEE Conference Proceeding Article

PDF

Employing smartwatch for enhanced password authentication, Bing CHANG, Ximing LIU, Yingjiu LI, Pingjian WANG, Wen-Tao ZHU, and Zhan WANG Conference Proceeding Article

PDF

Enabling gesture-based interactions with objects, Longfei SHANGGUAN, Zimu ZHOU, and Kyle JAMIESON Conference Proceeding Article

PDF

Exception handling bug hazards in Android: Results from a mining study and an exploratory survey, Roberta COELHO, Lucas ALMEIDA, Georgios GOUSIOS, Arie VAN DEURSEN, and Christoph TREUDE Journal Article

PDF

Experiences in building a real-world eating recogniser, Sougata SEN, Vigneshwaran SUBBARAJU, Archan MISRA, Rajesh Krishna BALAN, and Youngki LEE Conference Proceeding Article

PDF

Exploiting android system services through bypassing service helpers, Yachong GU, Yao CHENG, Lingyun YING, Yemian LU, Qi LI, and Purui SU Conference Proceeding Article

PDF

Flexible wildcard searchable encryption system, Yang YANG, Ximeng LIU, Robert H. DENG, and Jian WENG Journal Article

PDF

Improving student learning in an introductory programming course using flipped classroom and competency framework, Joelle ELMALEH and Venky SHANKARARAMAN Conference Proceeding Article

PDF

Is the whole greater than the sum of its parts?, Liangyue LI, Hanghang TONG, Yong WANG, Conglei SHI, Nan CAO, and Norbou BUCHLER Conference Proceeding Article

PDF

Local Gaussian processes for efficient fine-grained traffic speed prediction, Truc Viet LE, Richard OENTARYO, Siyuan LIU, and Hoong Chuin LAU Journal Article

PDF

Measuring the declared SDK versions and their consistency with API calls in android apps, Daoyuan WU, Ximing LIU, Jiayun XU, David LO, and Debin GAO Conference Proceeding Article

Link

Multi label text classification for un-trained data through supervised learning, Mayank BUDHIRAJA Conference Proceeding Article

PDF

Online advertising, retail platform openness, and long tail sellers, Jianqing CHEN and Zhiling GUO Conference Proceeding Article

PDF

Online repositioning in bike sharing systems, Meghna LOWALEKAR, Pradeep VARAKANTHAM, Supriyo GHOSH, Sanjay Dominic JENA, and Patrick JAILLET Conference Proceeding Article

PDF

On self-selection biases in online product reviews, Nan HU, Paul A. PAVLOU, and Jie ZHANG Journal Article

PDF

On the selection of anchors and targets for video hyperlinking, Zhi-Qi CHENG, Hao ZHANG, Xiao WU, and Chong-wah NGO Conference Proceeding Article

PDF

On the similarities between random regret minimization and mother logit: The case of recursive route choice models, Tien MAI, Fabian BASTIN, and Emma FREJINGER Journal Article

PDF

Processing long queries against short text: Top-k advertisement matching in news stream applications, Dongxiang ZHANG, Yuchen LI, Ju FAN, Lianli GAO, Fumin SHEN, and Heng Tao SHEN Journal Article

PDF

RACK: Code Search in the IDE Using Crowdsourced Knowledge, Mohammad Masudur RAHMAN, Chanchal K. ROY, and David LO Conference Proceeding Article

PDF

Revisiting assert use in GitHub projects, Pavneet Singh KOCHHAR and David LO Conference Proceeding Article

PDF

Sampling based approaches for minimizing regret in uncertain Markov Decision Problems (MDPs), Asrar AHMED, Pradeep VARAKANTHAM, Meghna LOWALEKAR, Yossiri ADULYASAK, and Patrick JAILLET Journal Article

PDF

SAP: Improving continuous top-K queries over streaming data, Rui ZHU, Bin WANG, Xiaochun YANG, Baihua ZHENG, and Guoren WANG Journal Article

PDF

Scalable transfer learning in heterogeneous, dynamic environments, Trung Thanh Nguyen, Tomi Silander, Zhuoru LI, and Tze-Yun LEONG Journal Article

PDF

SCAN: Multi-hop calibration for mobile sensor arrays, Balz MAAG, Zimu ZHOU, Olga SAUKH, and Lothar THIELE Journal Article

PDF

Tackling large-scale home health care delivery problem with uncertainty, Cen CHEN, Zachary RUBINSTEIN, Stephen SMITH, and Hoong Chuin LAU Conference Proceeding Article

PDF

The dark side of banning hacking technique discussion, Qiu-Hong WANG and Ting Zhang LE Conference Paper

PDF

Towards unobtrusive mental well-being monitoring for independent-living elderly, Sinh HUYNH, Hwee-Pink TAN, and Youngki LEE Conference Proceeding Article

PDF

UbiEar: Bringing location-independent sound awareness to the hard-of-hearing people with smartphones, Sicong LIU, Zimu ZHOU, Junzhao DU, Longfei SHANGGUAN, Jun HAN, and Xin WANG Journal Article

PDF

Understanding Android app piggybacking: A systematic study of malicious code grafting, Li LI, Daoyuan LI, Tegawende F. BISSYANDE, Jacques KLEIN, Yves Le TRAON, David LO, and Lorenzo CAVALLARO Journal Article

PDF

Understanding music track popularity in a social network, Jing REN and Robert J. KAUFFMAN Conference Proceeding Article

PDF

Using contextual information to predict co-changes, Igor Scaliante WIESE, Reginaldo RÉ, Igor STEINMACHER, Rodrigo Takashi KURODA, Gustavo A. OLIVA, Christoph TREUDE, and Marco Aurélio GEROSA Journal Article

PDF

WebAPIRec: Recommending web APIs to software projects via personalized ranking, Ferdian THUNG, Richard J. OENTARYO, David LO, and Yuan TIAN Journal Article

PDF

Well-tuned algorithms for the team orienteering problem with time windows, Aldy GUNAWAN, Hoong Chuin LAU, Kun LU, and Lu KUN Journal Article

PDF

Inferring motion direction using commodity Wi-Fi for interactive exergames, Kun QIAN, Chenshu WU, Zimu ZHOU, Yue ZHENG, Yang ZHENG, and Yunhao LIU Conference Proceeding Article

Why players use pings and annotations in Dota 2, Jason WUERTZ, Scott BATEMAN, and Anthony TANG Conference Proceeding Article

BUSH: Empowering large-scale MU-MIMO in WLANs with hybrid beamforming, Zhe CHEN, Xu ZHANG, Sulei WANG, Yuedong XU, Jie XIONG, and Xin WANG Conference Proceeding Article

BUSH: Empowering large-scale MU-MIMO in WLANs with hybrid beamforming, Zhe CHEN, Xu ZHANG, Sulei WANG, Yuedong XU, Jie XIONG, and Xin WANG Conference Proceeding Article

PDF

TUM: Towards ubiquitous multi-device localization for cross-device interaction, Han XU, Zheng YANG, Zimu ZHOU, Ke YI, and Chunyi PENG Conference Proceeding Article

PDF

A data-driven approach for benchmarking energy efficiency of warehouse buildings, Wee Leong LEE, Kar Way TAN, and Zui Young LIM Conference Paper

PDF

A multi-agent system for coordinating vessel traffic, Teck-Hou TENG, Hoong Chuin LAU, and Akshat KUMAR Conference Proceeding Article

PDF

Android repository mining for detecting publicly accessible functions missing permission checks, Huu Hoang NGUYEN, Lingxiao JIANG, and Thanh Tho QUAN Conference Proceeding Article

PDF

A neural network model for semi-supervised review aspect identification, Ying DING, Changlong YU, and Jing JIANG Conference Proceeding Article

PDF

A preliminary evaluation of a gamification framework to jump start collaboration behavior change, Flavio STEFFENS, Sabrina MARCZAK, Fernando FIGUEIRA FILHO, Christoph TREUDE, and Cleidson R. B. DA SOUZA Conference Proceeding Article

PDF

Assertion generation through active learning, Long H. PHAM, Jun SUN, and Jun SUN Conference Proceeding Article

PDF

Choosing an NLP library for analyzing software documentation: A systematic literature review and a series of experiments, Fouad N. A. AL OMRAN and Christoph TREUDE Conference Proceeding Article

PDF

Collaborative topic regression for online recommender systems: An online and Bayesian approach, Chenghao LIU, Tao JIN, Steven C. H. HOI, Peilin ZHAO, and Jianling SUN Journal Article

PDF

Continuous Top-k monitoring on document streams, Leong Hou U, Junjie ZHANG, Kyriakos MOURATIDIS, and Ye LI Journal Article

PDF

Coordinating vessel traffic to improve safety and efficiency, Teck Hou (DENG Dehao) TENG, Hoong Chuin LAU, and Akshat KUMAR Conference Proceeding Article

PDF

Core determining class and inequality selection, Ye LUO and Hai WANG Journal Article

PDF

Cryptography and data security in cloud computing, Zheng YAN, Robert H. DENG, and Vijay VARADHARAJAN Editorial

PDF

Data-driven approach to measuring the level of press freedom using media attention diversity from unfiltered news, Jisun AN and Haewoon KWAK Conference Proceeding Article

PDF

Determining the impact regions of competing options in preference space, Bo TANG, Kyriakos MOURATIDIS, and Man Lung. YIU Conference Proceeding Article

PDF

Discovering your selling points: Personalized social influential tags exploration, Yuchen LI, Kian-Lee TAN, Ju FAN, and Dongxiang ZHANG Conference Proceeding Article

PDF

Dynamic Nearest Neighbor Queries in Euclidean Space, Sarana NUTANONG, Mohammed Eunus ALI, Egemen TANIN, and Kyriakos MOURATIDIS Encyclopaedia

PDF

Encrypted data processing with Homomorphic Re-Encryption, Wenxiu DING, Zheng YAN, and Robert H. DENG Journal Article

PDF

Exploiting anonymity and homogeneity in factored Dec-MDPs through pre-computed binomial distributions, Rajiv RANJAN KUMAR and Pradeep VARAKANTHAM Conference Proceeding Article

PDF

Exploiting contextual information for fine-grained tweet geolocation, Wen Haw CHONG and Ee Peng LIM Conference Proceeding Article

PDF

Feedback-based debugging, Yun LIN, Jun SUN, Yinxing XUE, Yang LIU, and Jin Song DONG Conference Proceeding Article