Submissions from 2017
Follow-my-lead: Intuitive indoor path creation and navigation using see-through interactive videos, Quentin ROY, Simon T. PERRAULT, Shengdong ZHAO, Richard DAVIS, Anuroop PATTENA VANIYAR, Velko VECHEV, Youngki LEE, and Archan MISRA Conference Proceeding Article
Fusing social media and mobile analytics for urban sense-making, Archan MISRA Report
Household informedness and policy analytics for the collection and recycling of household hazardous waste in California, Kustini LIM-WAVDE, Robert J. KAUFFMAN, and Gregory S. DAWSON Journal Article
Impact of artificial intelligence, robotics, and machine learning on sales and marketing, Keng SIAU and Y. YANG Conference Proceeding Article
Joint optimization of resource provisioning in cloud computing, Jonathan David CHASE and Dusit NIYATO Journal Article
Lexicons in sentiment analytics, B. YUAN and Keng SIAU Conference Proceeding Article
Machine learning approaches to sentiment analytics, W. ZHAO and Keng SIAU Conference Proceeding Article
Neural correlates of user experience in gaming, Y. TEJASWINI, F. NAH, Keng SIAU, and L. CHEN Conference Proceeding Article
Online/offline provable data possession, Yujue WANG, Qianhong WU, Bo QIN, Shaohua TANG, and Willy SUSILO Journal Article
Parametric model checking timed automata under non-Zenoness assumption, Étienne ANDRE, Hoang Gia NGUYEN, Laure PETRUCCI, and Jun SUN Conference Proceeding Article
Persona generation from aggregated social media data, Soon-Gyo Jung, Jisun AN, Haewoon KWAK, Moeed Ahmad, Lene Nielsen, and Bernard J. Jansen Conference Proceeding Article
Provably secure attribute based signcryption with delegated computation and efficient key updating, Hanshu HONG, Yunhao XIA, Zhixin SUN, and Ximeng LIU Journal Article
Real-time prediction of length of stay using passive Wi-Fi sensing, Truc Viet LE, Baoyang SONG, and Laura WYNTER Conference Proceeding Article
Real-time prediction of length of stay using passive Wi-Fi sensing, Truc Viet LE, Baoyang SONG, and Laura WYNTER Conference Proceeding Article
RGBD salient object detection via deep fusion, Liangqiong QU, Shengfeng HE, Jiawei ZHANG, Jiandong TIAN, Yandong TANG, and Qingxiong YANG Journal Article
Robust Object Tracking via Locality Sensitive Histograms, Shengfeng HE, Rynson W.H LAU, Qingxiong YANG, Jiang WANG, and Ming-Hsuan YANG Journal Article
Search-driven string constraint solving for vulnerability detection, Julian THOME, Lwin Khin SHAR, Domenico BIANCULLI, and Lionel BRIAND Conference Proceeding Article
Stop nuclear smuggling through efficient container inspection, Xinrun WANG, Qingyu GUO, and Bo AN Conference Proceeding Article
Towards distributed machine learning in shared clusters: A dynamically-partitioned approach, Peng SUN, Yonggang WEN, Nguyen Binh Duong TA, and Shengen YAN Conference Proceeding Article
Watching 360° videos together, Anthony TANG and Omid FAKOURFAR Conference Proceeding Article
What gets media attention and how media attention evolves over time: Large-scale empirical evidence from 196 countries, Jisun AN and Haewoon KWAK Conference Proceeding Article
Who will leave the company?: A large-scale industry study of developer turnover by mining monthly work report, Lingfeng BAO, Zhenchang XING, Xin XIA, David LO, and Shanping LI Conference Proceeding Article
Identifying outlier opinions in an online intelligent argumentation system, R. ARVAPALLY, X. LIU, Fiona Fui-hoon NAH, and W. JIANG Journal Article
Using deep learning to bridge the gap between perception and intelligence, Arne SUPPE and Martial HERBERT Conference Proceeding Article
Design and implementation of an RFID-based customer shopping behavior mining system, Zimu ZHOU, Longfei SHANGGUAN, Xiaolong ZHENG, Lei YANG, and Yunhao LIU Journal Article
A platform for free-weight exercise monitoring with passive tags, Han DING, Jinsong HAN, Longfei SHANGGUAN, Wei XI, Zhiping JIANG, Zheng YANG, Zimu ZHOU, Panlong YANG, and Jizhong ZHAO Journal Article
Achievement and friends: Key factors of player retention vary across player levels in online multiplayer games, Korea Advanced Institute of Science & Technology, Qatar Computing Research Institute, and Haewoon KWAK Conference Proceeding Article
A compare-aggregate model for matching text sequences, Shuohang WANG and Jing JIANG Conference Proceeding Article
A dynamic programming approach for quickly estimating large network-based MEV models, Tien MAI, Emma FREJINGER, Mogens FOSGEREAU, and Fabian BASTIN Journal Article
A secure and efficient ID-based aggregate signature scheme for wireless sensor networks, Limin SHEN, Jianfeng MA, Ximeng LIU, Fushan WEI, and Meixia MIAO Journal Article
Aspect extraction from product reviews using category hierarchy information, Yifeng YANG, CHEN CEN, Minghui QIU, and Forrest Sheng BAO Conference Proceeding Article
Assessing the language of chat for teamwork dialogue, Antonette SHIBANI, Elizabeth KOH, Vivian LAI, and Kyong Jin SHIM Journal Article
Characterizing malicious Android apps by mining topic-specific data flow signatures, Xinli YANG, David LO, Li LI, Xin XIA, Tegawendé F. BISSYANDE, and Jacques KLEIN Journal Article
Clustering classes in packages for program comprehension, Xiaobing SUN, Xiangyue LIU, Bin LI, Bixin LI, David LO, and Lingzhi LIAO Journal Article
Collective entity linking in tweets over space and time, Wen Haw CHONG, Ee-peng LIM, and William COHEN Conference Proceeding Article
Comparative relation generative model, Maksim TKACHENKO and Hady W. LAUW Journal Article
Discovering anomalous events from urban informatics data, Kasthuri JAYARAJAH, Vigneshwaran SUBBARAJU, Dulanga KAVEESHA WEERAKOON MUDIYANSELAGE, Archan MISRA, La Thanh TAM, and Noel ATHAIDE Conference Proceeding Article
Empirical study of usage and performance of java collections, Diego COSTA, Artur ANDRZEJAK, Janos SEBOEK, and David LO Conference Proceeding Article
Finding causality and responsibility for probabilistic reverse skyline query non-answers [Extended Abstract], Yunjun GAO, Qing LIU, Gang CHEN, Linlin ZHOU, and Baihua ZHENG Conference Proceeding Article
Identity-based data outsourcing with comprehensive auditing in clouds, Yujue WANG, Qianhong WU, Bo QIN, Wenchang SHI, Robert H. DENG, and Jiankun HU Journal Article
Inferring smartphone keypress via smartwatch inertial sensing, Sougata SEN, Karan GROVER, Vigneshwaran SUBBARAJU, and Archan MISRA Conference Proceeding Article
I would not plant apple trees if the world will be wiped: Analyzing hundreds of millions of behavioral records of players during an MMORPG beta test, Qatar Computing Research Institute, The State University of New York University at Buffalo, Haewoon KWAK, and Korea University Conference Proceeding Article
Learning personalized preference of strong and weak ties for social recommendation, Xin WANG, Steven C. H. HOI, Martin ESTER, Jiajun BU, and Chun CHEN Conference Proceeding Article
Machine comprehension using match-LSTM and answer pointer, Shuohang WANG and Jing JIANG Conference Proceeding Article
Modeling topics and behavior of microbloggers: An integrated approach, Tuan Anh HOANG and Ee-Peng LIM Journal Article
Neural collaborative filtering, Xiangnan HE, Lizi LIAO, Hanwang ZHANG, Liqiang NIE, Xia HU, and Tat-Seng CHUA Conference Proceeding Article
Neural collaborative filtering, Xiangnan HE, Lizi LIAO, Hanwang ZHANG, Liqiang NIE, Xia HU, and Tat-Seng CHUA Conference Proceeding Article
Now you see it, now you don't! A study of content modification behavior in Facebook, Fuxiang CHEN and Ee-peng LIM Conference Proceeding Article
On analyzing user topic-specific platform preferences across multiple social media sites, Roy Ka Wei LEE, Tuan Anh HOANG, and Ee Peng LIM Conference Proceeding Article
Online growing neural gas for anomaly detection in changing surveillance scenes, Qianru SUN, Hong LIU, and Tatsuya HARADA Journal Article
On the effectiveness of virtualization based memory isolation on multicore platforms, Siqi ZHAO and Xuhua DING Conference Proceeding Article
Predicting the impact of software engineering topics: An empirical study, Santonu SARKAR, Rumana LAKDAWALA, and Subhajit DATTA Conference Proceeding Article
Related-key secure key encapsulation from extended computational bilinear Diffie–Hellman, Brandon QIN, Shengli LIU, Shifeng SUN, Robert H. DENG, and Dawu GU Journal Article
Should we learn probabilistic models for model checking? A new approach and an empirical study, Jingyi WANG, Jun SUN, Qixia YUAN, and Jun PANG Conference Proceeding Article
The crowd work accessibility problem, Saiganesh SWAMINATHAN, Kotaro HARA, and Jeffrey P. BIGHAM Conference Proceeding Article
Understanding the information-based transformation of strategy and society, Eric K. CLEMONS, Rajiv M. DEWAN, Robert J. KAUFFMAN, and Thomas A. WEBER Journal Article
Vulnerabilities, attacks, and countermeasures in Balise-based train control systems, Yongdong WU, Jian WENG, Zhe TANG, Xin LI, and Robert H. DENG Journal Article
What you see is not what you get: Leakage-resilient password entry schemes for smart glasses, Yan LI, Yao CHENG, Yingjiu LI, and Robert H. DENG Conference Proceeding Article
Are the trade-offs for reducing cross-border cybercrime manageable?, Steven Mark MILLER, Qiu-Hong WANG, and Robert John KAUFFMAN Magazine Article
Are the trade-offs for reducing cross-border cybercrime manageable?, Steven Mark MILLER, Qiu-Hong WANG, and Robert John KAUFFMAN Blog Post
Collaboration trumps homophily in urban mobile crowdsourcing, Thivya KANDAPPU, Archan MISRA, and Randy TANDRIANSYAH Conference Proceeding Article
Dark hazard: Large-scale discovery of unknown hidden sensitive operations in Android apps, Xiaorui PAN, Xueqiang WANG, Yue DUAN, Xiaofeng WANG, and Heng YIN Conference Proceeding Article
Effective K-Vertex connected component detection in large-scale networks, Yuan LI, Yuha ZHAO, Guoren WANG, Feida ZHU, Yubao WU, and Shenglei SHI Conference Proceeding Article
Efficient motif discovery in spatial trajectories using discrete Fréchet distance, Bo TANG, Man Lung YIU, Kyriakos MOURATIDIS, and Kai WANG Conference Proceeding Article
Feature learning via partial differential equation with applications to face recognition, Cong FANG, Zhenyu ZHAO, Pan ZHOU, and Zhouchen LIN Journal Article
Follow the herd or be myself? An analysis of consistency in behavior of reviewers and helpfulness of their reviews, Baojun GAO, Nan HU, and Indranil BOSE Journal Article
Improving automated bug triaging with specialized topic model, Xin XIA, David LO, Ying DING, Jafar M. AL-KOFAHI, Tien N. NGUYEN, and Xinyu WANG Journal Article
Inferring user consumption preferences from social media, Yang LI, Jing JIANG, and Ting LIU Journal Article
Location matters: Geospatial policy analytics over time for household hazardous waste collection in California, Kustini LIM-WAVDE, Robert John KAUFFMAN, Tin Seong KAM, and Gregory S. DAWSON Conference Proceeding Article
Metric similarity joins using MapReduce, Yunjun GAO, Keyu YANG, Lu CHEN, Baihua ZHENG, Gang CHEN, and Chun CHEN Journal Article
Mining sandboxes for Linux containers, Zhiyuan WAN, David LO, Xin XIA, Liang CAI, and Shanping LI Conference Proceeding Article
Privacy in context-aware mobile crowdsourcing systems, Thivya KANDAPPU, Archan MISRA, Shih-Fen CHENG, and Hoong Chuin LAU Conference Proceeding Article
Probabilistic public key encryption for controlled equijoin in relational databases, Yujue WANG and Hwee Hwa PANG Journal Article
Scalable image retrieval by sparse product quantization, Qingqun NING, Jianke ZHU, Zhiyuan ZHONG, Steven C. H. HOI, and Chun CHEN Journal Article
Security issues of in-store mobile payment, Xingjie YU, Su Mon KYWE, and Yingjiu LI Book Chapter
Social tag relevance learning via ranking-oriented neighbor voting, Chaoran CUI, Jialie SHEN, Jun MA, and Tao LIAN Journal Article
The wonders of the spreadsheet tool for data management and insights, Michelle L. F. CHEONG Book Chapter
UI X-Ray: Interactive mobile UI testing based on computer vision, Chun-Fu Richard CHEN, Marco PISTOIA, Conglei SHI, Paolo GIROLAMI, Joseph W. LIGMAN, and Yong WANG Conference Proceeding Article
Version-sensitive mobile app recommendation, Da CAO, Liqiang NIE, Xiangnan HE, Xiaochi WEI, Jialie SHEN, Shunxiang WU, and Tat-Seng CHUA Journal Article
Whole-system analysis for understanding publicly accessible functions in Android, Huu Hoang NGUYEN, Lingxiao JIANG, and Thanh Tho QUAN Conference Proceeding Article
Cross-language mining and retrieval, Wei GAO and Cheng NIU Book Chapter
Social media content analysis: Natural language processing and beyond, Kam-Fai WONG, Wei GAO, Ruifeng XU, and Wenjie LI Book Chapter
Routing multiple vehicles cooperatively: Minimizing road network breakdown probability, GUO Hongliang, Zhiguang CAO, SESHADRI Madhavan, ZHANG Jie, NIYATO Dusit, and FASTENRATH Ulrich Journal Article
Active video summarization: Customized summaries via on-line interaction with the user, Ana Garcia DEL MOLINO, Xavier BOIX, Joo-Hwee LIM, and Ah-hwee TAN Conference Proceeding Article
An efficient approach to model-based hierarchical reinforcement learning, Zhuoru LI, Akshay NARAYAN, and Tze-Yun LEONG Conference Proceeding Article
A Riemannian network for SPD matrix learning, Zhiwu HUANG and Gool L. VAN Conference Proceeding Article
Attribute-based secure messaging in the public cloud, Zhi Yuan POH, Hui CUI, Robert H. DENG, and Yingjiu LI Conference Proceeding Article
Bike route choice modeling using GPS data without choice sets of paths, Maëlle ZIMMERMANN, Tien MAI, and Emma FREJINGER Journal Article
CLCMiner: Detecting cross-language clones without intermediates, Xiao CHENG, Zhiming PENG, Lingxiao JIANG, Hao ZHONG, Haibo YU, and Jianjun ZHAO Journal Article
Collaboration trumps homophily in urban mobile crowd-sourcing, Thivya KANDAPPU, Archan MISRA, and Randy Tandriansyah DARATAN Conference Proceeding Article
Collective multiagent sequential decision making under uncertainty, Duc Thien NGUYEN, Akshat KUMAR, and Hoong Chuin LAU Conference Proceeding Article
Credit derivatives and stock return synchronicity, Xuelian BAI, Nan HU, Ling LIU, and Lu ZHU Journal Article
Crowdsensing and analyzing micro-event tweets for public transportation insights, Thoong HOANG, Pei Hua (XU Peihua) CHER, Philips Kokoh PRASETYO, and Ee-Peng LIM Conference Proceeding Article
Decentralized planning in stochastic environments with submodular rewards, Rajiv Ranjan KUMAR, Pradeep VARAKANTHAM, and Akshat KUMAR Conference Proceeding Article
Detecting similar repositories on GitHub, Yun ZHANG, David LO, PAVNEET SINGH KOCHHAR, Xin XIA, Quanlai LI, and Jianling SUN Conference Proceeding Article
Discovering burst patterns of burst topic in Twitter, Guozhong DONG, Wu YANG, Feida ZHU, and Wei WANG Journal Article
Dynamic repositioning to reduce lost demand in Bike Sharing Systems, Supriyo GHOSH, Pradeep VARAKANTHAM, Yossiri ADULYASAK, and Patrick JAILLET Journal Article
Empath-D: Empathetic design for accessibility, Kenny Tsu Wei CHOO, Rajesh Krishna BALAN, Kiat Wee TAN, Archan MISRA, and Youngki LEE Conference Proceeding Article
Harnessing Twitter to support serendipitous learning of developers, Abhabhisheksh SHARMA, Yuan TIAN, Agus SULISTYA, David LO, and Aiko YAMASHITA Conference Proceeding Article
Maximizing the probability of arriving on time: A practical q-learning method, Zhiguang CAO, Hongliang GUO, Jie ZHANG, Frans OLIEHOEK, and Ulrich FASTENRATH Conference Proceeding Article