The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2017

PDF

Maximizing the probability of arriving on time: A practical q-learning method, Zhiguang CAO, Hongliang GUO, Jie ZHANG, Frans OLIEHOEK, and Ulrich FASTENRATH Conference Proceeding Article

PDF

Optimizing expectation with guarantees in POMDPs, Krishnendu CHATTERJEE, Guillermo A. PEREZ, Jean-François RASKIN, and Dorde ZIKELIC Conference Proceeding Article

PDF

Recurrent neural networks with auxiliary labels for cross-domain opinion target extraction, Ying DING, Jianfei YU, and Jing JIANG Conference Proceeding Article

PDF

Robust optimization for tree-structured stochastic network design, Xiaojian WU, Akshat KUMAR, and Daniel SHELDON Conference Proceeding Article

PDF

SEAPoT-RL: Selective exploration algorithm for policy transfer in RL, Akshay NARAYAN, Zhuoru LI, and Tze-Yun LEONG Conference Proceeding Article

PDF

Security slicing for auditing common injection vulnerabilities, Julian THOME, Lwin Khin SHAR, Domenico BIANCULLI, and Lionel BRIAND Journal Article

PDF

SOAL: Second-order Online Active Learning, Shuji HAO, Peilin ZHAO, Jing LU, Steven C. H. HOI, Chunyan MIAO, and Chi ZHANG Conference Proceeding Article

Stereo object proposals, Shao HUANG, Weiqiang WANG, Shengfeng HE, and Rynson W. H. LAU Journal Article

PDF

Streaming classification with emerging new class by class matrix sketching, Xin MU, Feida ZHU, Juan DU, Ee-peng LIM, and Zhi-Hua ZHOU Conference Proceeding Article

PDF

Toward a collaborative AI framework for assistive dementia care, Tze-Yun LEONG Conference Proceeding Article

PDF

Unsupervised visual hashing with semantic assistant for content-based image retrieval, Lei ZHU, Jialie SHEN, Liang XIE, and Zhiyong CHENG Journal Article

PDF

Why and how developers fork what from whom in GitHub, Jing JIANG, David LO, Jiahuan HE, Xin XIA, Pavneet Singh KOCHHAR, and Li ZHANG Journal Article

A new public remote integrity checking scheme with user and data privacy, Yiteng FENG, Yi MU, Guomin YANG, and Joseph LIU Journal Article

PDF

Attribute-based storage supporting secure deduplication of encrypted data in cloud, Hui CUI, Robert H. DENG, Yingjiu LI, and Guowei WU Journal Article

PDF

A two-sided collaborative transparent display supporting workspace awareness, Jiannan LI, Saul GREENBERG, and Ehud SHARLIN Journal Article

PDF

Concept-based interactive search system, Yi-Jie LU, Phuong Anh NGUYEN, Hao ZHANG, and Chong-wah NGO Conference Proceeding Article

PDF

Cross-modal recipe retrieval: How to cook this dish?, Jingjing CHEN, Lei PANG, and Chong-wah NGO Conference Proceeding Article

PDF

Discovering historic traffic-tolerant paths in road networks, Pui Hang LI, Man Lung YIU, and Kyriakos MOURATIDIS Journal Article

PDF

Easing Cross-Border Communication: Mobile-mediated Communication and Its Framework, Kyungsub CHOI and Young Soo KIM Conference Proceeding Article

PDF

Enabling sustainable bulk transfer in environmentally-powered wireless sensor networks, Alvin C. VALERA, Wee-Seng SOH, and Hwee-Pink TAN Journal Article

Examining the effectiveness of gamification in human computation, Xiaohui WANG, Dion Hoe-Lian GOH, Ee peng LIM, Adrian Wei Liang VU, and Alton Yeow Kuan CHUA Journal Article

PDF

Exploring representativeness and informativeness for active learning, Bo DU, Zengmao WANG, Lefei ZHANG, Liangpei ZHANG, Wei LIU, Jialie SHEN, and Dacheng TAO Journal Article

PDF

Fine-grained sentiment analysis of social media with emotion sensing, Zhaoxia WANG, Chee Seng CHONG, Landy LAN, Yinping YANG, Beng-Seng HO, and Joo Chuan TONG Conference Proceeding Article

PDF

Funding challenges of voluntary welfare organizations in Singapore's disability sector, Joo Lay Isabel SIM, Lye Chye Alfred LOH, and Siu Loon HOE Journal Article

PDF

H-Binder: A hardened binder framework on Android systems, Dong SHEN, Zhangkai ZHANG, Xuhua DING, Zhoujun LI, and Robert H. DENG Conference Proceeding Article

PDF

High impact bug report identification with imbalanced learning strategies, Xinli YANG, David LO, Xin XIA, Qiao HUANG, and Jianling SUN Journal Article

PDF

Internet health information seeking and the patient-physician relationship: A systematic review, Sharon Swee-Lin TAN and Nadee GOONAWARDENE Journal Article

PDF

Online hacker forum censorship: Would banning the bad guys attract good guys?, Qiu-Hong WANG, Le-Ting ZHANG, and Meng-Ke QIAO Conference Proceeding Article

PDF

On the effectiveness of code-reuse-based Android application obfuscation, Xiaoxiao TANG, Yu LIANG, Xinjie MA, Yan LIN, and Debin GAO Conference Proceeding Article

PDF

Research strategies for biomedical and health informatics: Some thought-provoking and critical proposals to encourage scientific debate on the nature of good research in medical informatics, Reinhold HAUX and et al. Journal Article

PDF

RFID ownership transfer with positive secrecy capacity channels, Jorge MUNILLA, Mike BURMESTER, Alberto PEINADO, Guomin YANG, and Willy SUSILO Journal Article

PDF

SafeStack+: Enhanced dual stack to combat data-flow hijacking, Yan LIN, Xiaoxiao TANG, and Debin GAO Conference Proceeding Article

PDF

Sensor-driven detection of social isolation in community-dwelling elderly, W K P Neranjana Nadee Rodrigo GOONAWARDENE, Xiaoping TOH, and Hwee-Pink TAN Conference Proceeding Article

PDF

Stochastic invariants for probabilistic termination, Krishnendu CHATTERJEE, Petr NOVOTNÝ, and Dorde ZIKELIC Conference Proceeding Article

PDF

Technology mergers and acquisitions in the presence of an installed base: A strategic analysis, Qiu-Hong WANG and Kai-Lung HUI Journal Article

PDF

The habits of highly effective researchers: An empirical study, Subhajit DATTA, Partha BASUCHOWDHURI, Surajit ACHARYA, and Subhashis MAJUMDER Journal Article

PDF

The making of a successful analytics master degree program: Experiences and lessons drawn for a young and small Asian university, Michelle L. F. CHEONG Journal Article

PDF

They all seem good, but which one fits me? Reducing fit uncertainty for digital entertainment goods, Ai Phuong HOANG Conference Proceeding Article

PDF

Universally composable RFID mutual authentication, Chunhua SU, Bagus SANTOSO, Yingjiu LI, Robert H. DENG, and Xinyi HUANG Journal Article

PDF

Viewed by too many or viewed too little: Using information dissemination for audience segmentation, Bernard J. JANSEN, Soon-Gyu JUNG, Joni SALMINEN, Jisun AN, and Haewoon KWAK Conference Proceeding Article

Submissions from 2016

Timed dataflow: Reducing communication overhead for distributed machine learning systems, Peng SUN, Yonggang WEN, Nguyen Binh Duong TA, and Shengen YAN Conference Proceeding Article

Designing a data warehousing and business analytics course using experiential learning pedagogy, GOTTIPATI Swapna and SHANKARARAMAN, Venky Conference Proceeding Article

PDF

An agent-based approach to human migration movement, Larry LIN, Kathleen M. CARLEY, and Shih-Fen CHENG Conference Proceeding Article

PDF

Answering why-not and why questions on reverse top-k queries, Qing LIU, Yunjun GAO, Gang CHEN, Baihua ZHENG, and Linlin ZHOU Journal Article

PDF

A privacy-preserving outsourced functional computation framework across large-scale multiple encrypted domains, Ximeng LIU, Baodong QIN, Robert H. DENG, Rongxing LU, and Jianfeng MA Journal Article

PDF

Attacking Android smartphone systems without permissions, Mon Kywe SU, Yingjiu LI, Kunal PETAL, and Michael GRACE Conference Proceeding Article

PDF

CareerMapper: An automated resume evaluation tool, Vivian LAI, Kyong Jin SHIM, Richard J. OENTARYO, Philips K. PRASETYO, Casey VU, Ee-peng LIM, and David LO Conference Proceeding Article

PDF

Cast2Face: Assigning character names onto faces in movie with actor-character correspondence, Guangyu GAO, Mengdi XU, Jialie SHEN, Huangdong MA, and Shuicheng YAN Journal Article

PDF

Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment, Lixian LIU, Junzuo LAI, Robert H. DENG, and Yingjiu LI Journal Article

PDF

Collective personalized change classification with multiobjective search, Xin XIA, David LO, Xinyu WANG, and Xiaohu YANG Journal Article

PDF

Cryptographic reverse firewall via malleable smooth projective hash functions, Rongmao CHEN, Guomin YANG, Guomin YANG, Willy SUSILO, Fuchun GUO, and Mingwu ZHANG Conference Proceeding Article

PDF

Demystifying and puncturing the inflated delay in smartphone-based WiFi network measurement, Weichao LI, Daoyuan WU, Rocky K. C. CHANG, and Ricky K. P. MOK Conference Proceeding Article

PDF

Designing a datawarehousing and business analytics course using experiential learning pedagogy, GOTTIPATI Swapna and Venky SHANKARARAMAN Conference Proceeding Article

PDF

Domain identification for intention posts on online social media, Thai Le Luong, Quoc Tuan TRUONG, Hai-Trieu Dang, and Xuan Hieu Phan Conference Proceeding Article

PDF

D-watch: Embracing "bad" multipaths for device-free localization with COTS RFID devices, Ju WANG, Jie XIONG, Hongbo JIANG, Xiaojiang CHEN, and Dingyi FANG Conference Proceeding Article

PDF

Efficient online summarization of large-scale dynamic networks, Qiang QU, Siyuan LIU, Feida ZHU, and Christian S. JENSEN Journal Article

PDF

From footprint to evidence: An exploratory study of mining social data for credit scoring, Guangming GUO, Feida ZHU, Enhong CHEN, Qi LIU, Le WU, and Chu GUAN Journal Article

PDF

Hashtag recommendation with topical attention-based LSTM, Yang LI, Ting LIU, Jing JIANG, and Liang ZHANG Conference Proceeding Article

PDF

Impact of ISP, BPR, and customization on ERP performance in manufacturing SMEs of Korea, Soon-Goo HONG, Keng SIAU, and Jong-Weon KIM Journal Article

PDF

Is your waste a waste?, Kar Way TAN, Marcus Jiong Kai ONG, Sijie HO, and Michelle KAN Magazine Article

PDF

Iterated random oracle: A universal approach for finding loss in security reduction, Fuchun GUO, Willy SUSILO, Yi MU, Rongmao CHEN, Jianchang LAI, and Guomin YANG Conference Proceeding Article

PDF

Lexicon knowledge extraction with sentiment polarity computation, Zhaoxia WANG, Vincent Joo Chuan TONG, Pingcheng RUAN, and Fang LI Conference Proceeding Article

PDF

Lossy key encapsulation mechanism and its applications, Yamin LIU, Xianhui LU, Bao LI, and Haiyang XUE Conference Proceeding Article

PDF

Managing egress of crowd during infrastructure disruption, Teck Hou TENG, Shih-Fen CHENG, Trong-Nghia TRUONG, and Hoong Chuin LAU Conference Proceeding Article

PDF

MetroEye: Smart tracking your metro rips underground, Weixi GU, Ming JIN, Zimu ZHOU, Costas J. SPANOS, and Lin ZHANG Conference Proceeding Article

PDF

Online detection of behavioral change using unobtrusive eldercare monitoring system, Thanh Tam LA, Alvin Cerdena VALERA, Hwee-Pink TAN, and Cheryl Li Fang KOH Conference Proceeding Article

PDF

Orienteering Problem: A survey of recent variants, solution approaches and applications, Aldy GUNAWAN, Hoong Chuin LAU, and Pieter VANSTEENWEGEN Journal Article

PDF

Orienteering Problem: A survey of recent variants, solution approaches and applications, Aldy GUNAWAN, Hoong Chuin LAU, and Pieter VANSTEENWEGEN Journal Article

PDF

Pairwise relation classification with mirror instances and a combined convolutional neural network, Jianfei YU and Jing JIANG Conference Proceeding Article

PDF

Processing Incomplete k Nearest Neighbor Search, Xiaoye MIAO, Yunjun GAO, Gang CHEN, Baihua ZHENG, and Huiyong CUI Journal Article

PDF

Semi-automated tool for providing effective feedback on programming assignments, Min Yan BEH, Swapna GOTTIPATI, David LO, and Venky SHANKARARAMAN Conference Proceeding Article

PDF

Server-aided public key encryption with keyword search, Rongman CHEN, Yi MU, Guomin YANG, Fuchun GUO, Xinyi HUANG, Xiaofen WANG, and Yongjun WANG Journal Article

PDF

Traffic Simulation Model for Port Planning and Congestion Prevention, Baoxiang LI, Kar Way TAN, and Trong Khiem TRAN Conference Proceeding Article

PDF

‘TweetBoard’ – a case study of developing a micro-blogging platform for higher education, Shao Cheh Joyce HSU; GAN, Benjamin; Jin LEE; Shu Hui Sheryl LIM; Xie Yan Jeremy LIM; Thomas MENKHOFF; Si Xian Sherman TAN; Charles Jason WOODARD; and Qiu Cheng YAP Journal Article

PDF

Unsupervised feature selection for outlier detection by modelling hierarchical value-feature couplings, Guansong PANG, Longbing CAO, Ling CHEN, and Huan LIU Conference Proceeding Article

PDF

Validating social media data for automatic persona generation, Jisun AN, Haewoon KWAK, and Bernard J JANSEN Conference Proceeding Article

When seeing is not believing: Defeating MFF-based attacks by liveness detection for face authentication on mobile platform, Yan LI, Qiang YAN, Yingjiu LI, and Robert H. DENG Book Chapter

PDF

ZERO++: Harnessing the power of zero appearances to detect anomalies in large-scale data sets, Guansong PANG, Kai Ming TING, David ALBRECHT, and Huidong JIN Journal Article

Exploratory studies on fundraising practices based on Singapore’s institutions of a public character in the health, social and welfare sectors, J L SIM, U MENON, A L C LOH, and Siu Loon HOE Report

Mitigating large errors in WiFi-based indoor localization for smartphones, Chenshu WU, Zheng YANG, Zimu ZHOU, Yunhao LIU, and Mingyan LIU Journal Article

Help me help you: Shared reflection for personal data, Lisa GRAHAM, Anthony TANG, and Carman NEUSTAEDTER Conference Proceeding Article

Information security practice and experience, Feng BAO; Liqun CHEN; DENG, Robert H.; and Guojun WANG Edited Conference Proceeding

Analysis of education and job trends in data science, V. LAI, Kyong Jin SHIM, and M. PRITHIVIRAJAN Conference Proceeding Article

Analysis of student performance and student participation in online discussions, Kyong Jin SHIM, V. LAI, and M. PRITHIVIRAJAN Conference Proceeding Article

PDF

Automated verification of timed security protocols with clock drift, Li LI and Jun SUN Conference Proceeding Article

PDF

Towards concolic testing for hybrid systems, Pingfan KONG, Yi LI, Xiaohong CHEN, Jun SUN, Meng SUN, and Jingyi WANG Conference Proceeding Article

PDF

Towards learning and verifying invariants of cyber-physical systems by code mutation, Yuqi CHEN, Christopher M. POSKITT, and Jun SUN Conference Proceeding Article

PDF

Towards learning and verifying invariants of cyber-physical systems by code mutation, Yuqi CHEN, Christopher M. POSKITT, and Jun SUN Conference Proceeding Article

PDF

Rapid deployment indoor localization without prior human participation, Han XU, Zimu ZHOU, and Longfei SHANGGUAN Conference Proceeding Article

PDF

Improving quality of use case documents through learning and user interaction, Shuang LIU, Jun SUN, Hao XIAO, Bimlesh WADHWA, Jin Song DONG, and Xinyu WANG Conference Proceeding Article

PDF

Towards using concurrent Java API correctly, Shuang LIU, Guangdong BAI, Jun SUN, and Jin Song DONG Conference Proceeding Article

PDF

Data exfiltration detection and prevention: Virtually distributed POMDPs for practically safer networks, Sara Marie MC CARTHY, Arunesh SINHA, Milind TAMBE, and Pratyusa MANADHATA Conference Proceeding Article

PDF

Achieving IND-CCA security for functional encryption for inner products, Shiwei ZHANG, Yi MU, and Guomin YANG Conference Proceeding Article

PDF

A decomposition method for estimating recursive logit based route choice models, Tien MAI, Fabian BASTIN, and Emma FREJINGER Journal Article

PDF

A method of integrating correlation structures for a generalized recursive route choice model, Tien MAI Journal Article

PDF

An efficient and expressive ciphertext-policy attribute-based-encryption scheme with partially hidden access structures, Hui CUI; DENG, Robert H.; Guowei WU; and Junzuo LAI Conference Proceeding Article

PDF

An efficient privacy-preserving outsourced calculation toolkit with multiple keys, Ximeng LIU, Robert H. DENG, Kim-Kwang Raymond CHOO, and Jian WENG Journal Article

PDF

A novel covert channel detection method in cloud based on XSRM and improved event association algorithm, Lina WANG, Weijie LIU, Neeraj KUMAR, Debiao HE, Cheng TAN, and Debin GAO Journal Article

PDF

A provably secure aggregate signature scheme for healthcare wireless sensor networks, Limin SHEN, Jianfeng MA, Ximeng LIU, and Meixia MIAO Journal Article

PDF

Aspect-based helpfulness prediction for online product reviews, Yinfei YANG, Cen CHEN, and Forrest Sheng BAO Conference Proceeding Article