Submissions from 2017
Optimizing expectation with guarantees in POMDPs, Krishnendu CHATTERJEE, Guillermo A. PEREZ, Jean-François RASKIN, and Dorde ZIKELIC Conference Proceeding Article
Recurrent neural networks with auxiliary labels for cross-domain opinion target extraction, Ying DING, Jianfei YU, and Jing JIANG Conference Proceeding Article
Robust optimization for tree-structured stochastic network design, Xiaojian WU, Akshat KUMAR, and Daniel SHELDON Conference Proceeding Article
SEAPoT-RL: Selective exploration algorithm for policy transfer in RL, Akshay NARAYAN, Zhuoru LI, and Tze-Yun LEONG Conference Proceeding Article
Security slicing for auditing common injection vulnerabilities, Julian THOME, Lwin Khin SHAR, Domenico BIANCULLI, and Lionel BRIAND Journal Article
SOAL: Second-order Online Active Learning, Shuji HAO, Peilin ZHAO, Jing LU, Steven C. H. HOI, Chunyan MIAO, and Chi ZHANG Conference Proceeding Article
Stereo object proposals, Shao HUANG, Weiqiang WANG, Shengfeng HE, and Rynson W. H. LAU Journal Article
Streaming classification with emerging new class by class matrix sketching, Xin MU, Feida ZHU, Juan DU, Ee-peng LIM, and Zhi-Hua ZHOU Conference Proceeding Article
Toward a collaborative AI framework for assistive dementia care, Tze-Yun LEONG Conference Proceeding Article
Unsupervised visual hashing with semantic assistant for content-based image retrieval, Lei ZHU, Jialie SHEN, Liang XIE, and Zhiyong CHENG Journal Article
Why and how developers fork what from whom in GitHub, Jing JIANG, David LO, Jiahuan HE, Xin XIA, Pavneet Singh KOCHHAR, and Li ZHANG Journal Article
A new public remote integrity checking scheme with user and data privacy, Yiteng FENG, Yi MU, Guomin YANG, and Joseph LIU Journal Article
Attribute-based storage supporting secure deduplication of encrypted data in cloud, Hui CUI, Robert H. DENG, Yingjiu LI, and Guowei WU Journal Article
A two-sided collaborative transparent display supporting workspace awareness, Jiannan LI, Saul GREENBERG, and Ehud SHARLIN Journal Article
Collaboration in virtual worlds: Impact of task complexity on team trust and satisfaction, Fiona Fui-hoon NAH, Shu SCHILLER, Brian E. MENNECKE, and Keng SIAU Journal Article
Concept-based interactive search system, Yi-Jie LU, Phuong Anh NGUYEN, Hao ZHANG, and Chong-wah NGO Conference Proceeding Article
Cross-modal recipe retrieval: How to cook this dish?, Jingjing CHEN, Lei PANG, and Chong-wah NGO Conference Proceeding Article
Discovering historic traffic-tolerant paths in road networks, Pui Hang LI, Man Lung YIU, and Kyriakos MOURATIDIS Journal Article
Easing Cross-Border Communication: Mobile-mediated Communication and Its Framework, Kyungsub CHOI and Young Soo KIM Conference Proceeding Article
Enabling sustainable bulk transfer in environmentally-powered wireless sensor networks, Alvin C. VALERA, Wee-Seng SOH, and Hwee-Pink TAN Journal Article
Examining the effectiveness of gamification in human computation, Xiaohui WANG, Dion Hoe-Lian GOH, Ee peng LIM, Adrian Wei Liang VU, and Alton Yeow Kuan CHUA Journal Article
Exploring representativeness and informativeness for active learning, Bo DU, Zengmao WANG, Lefei ZHANG, Liangpei ZHANG, Wei LIU, Jialie SHEN, and Dacheng TAO Journal Article
Fine-grained sentiment analysis of social media with emotion sensing, Zhaoxia WANG, Chee Seng CHONG, Landy LAN, Yinping YANG, Beng-Seng HO, and Joo Chuan TONG Conference Proceeding Article
Funding challenges of voluntary welfare organizations in Singapore's disability sector, Joo Lay Isabel SIM, Lye Chye Alfred LOH, and Siu Loon HOE Journal Article
H-Binder: A hardened binder framework on Android systems, Dong SHEN, Zhangkai ZHANG, Xuhua DING, Zhoujun LI, and Robert H. DENG Conference Proceeding Article
High impact bug report identification with imbalanced learning strategies, Xinli YANG, David LO, Xin XIA, Qiao HUANG, and Jianling SUN Journal Article
Internet health information seeking and the patient-physician relationship: A systematic review, Sharon Swee-Lin TAN and Nadee GOONAWARDENE Journal Article
Mobile collaboration support for virtual teams: The case of virtual information systems development teams, Keng SIAU and Min LING Journal Article
Online hacker forum censorship: Would banning the bad guys attract good guys?, Qiu-Hong WANG, Le-Ting ZHANG, and Meng-Ke QIAO Conference Proceeding Article
On the effectiveness of code-reuse-based Android application obfuscation, Xiaoxiao TANG, Yu LIANG, Xinjie MA, Yan LIN, and Debin GAO Conference Proceeding Article
Research strategies for biomedical and health informatics: Some thought-provoking and critical proposals to encourage scientific debate on the nature of good research in medical informatics, Reinhold HAUX and et al. Journal Article
RFID ownership transfer with positive secrecy capacity channels, Jorge MUNILLA, Mike BURMESTER, Alberto PEINADO, Guomin YANG, and Willy SUSILO Journal Article
SafeStack+: Enhanced dual stack to combat data-flow hijacking, Yan LIN, Xiaoxiao TANG, and Debin GAO Conference Proceeding Article
Sensor-driven detection of social isolation in community-dwelling elderly, W K P Neranjana Nadee Rodrigo GOONAWARDENE, Xiaoping TOH, and Hwee-Pink TAN Conference Proceeding Article
Stochastic invariants for probabilistic termination, Krishnendu CHATTERJEE, Petr NOVOTNÝ, and Dorde ZIKELIC Conference Proceeding Article
Technology mergers and acquisitions in the presence of an installed base: A strategic analysis, Qiu-Hong WANG and Kai-Lung HUI Journal Article
The habits of highly effective researchers: An empirical study, Subhajit DATTA, Partha BASUCHOWDHURI, Surajit ACHARYA, and Subhashis MAJUMDER Journal Article
The making of a successful analytics master degree program: Experiences and lessons drawn for a young and small Asian university, Michelle L. F. CHEONG Journal Article
They all seem good, but which one fits me? Reducing fit uncertainty for digital entertainment goods, Ai Phuong HOANG Conference Proceeding Article
Universally composable RFID mutual authentication, Chunhua SU, Bagus SANTOSO, Yingjiu LI, Robert H. DENG, and Xinyi HUANG Journal Article
Viewed by too many or viewed too little: Using information dissemination for audience segmentation, Bernard J. JANSEN, Soon-Gyu JUNG, Joni SALMINEN, Jisun AN, and Haewoon KWAK Conference Proceeding Article
Submissions from 2016
Timed dataflow: Reducing communication overhead for distributed machine learning systems, Peng SUN, Yonggang WEN, Nguyen Binh Duong TA, and Shengen YAN Conference Proceeding Article
Designing a data warehousing and business analytics course using experiential learning pedagogy, GOTTIPATI Swapna and SHANKARARAMAN, Venky Conference Proceeding Article
An agent-based approach to human migration movement, Larry LIN, Kathleen M. CARLEY, and Shih-Fen CHENG Conference Proceeding Article
Answering why-not and why questions on reverse top-k queries, Qing LIU, Yunjun GAO, Gang CHEN, Baihua ZHENG, and Linlin ZHOU Journal Article
A privacy-preserving outsourced functional computation framework across large-scale multiple encrypted domains, Ximeng LIU, Baodong QIN, Robert H. DENG, Rongxing LU, and Jianfeng MA Journal Article
Attacking Android smartphone systems without permissions, Mon Kywe SU, Yingjiu LI, Kunal PETAL, and Michael GRACE Conference Proceeding Article
CareerMapper: An automated resume evaluation tool, Vivian LAI, Kyong Jin SHIM, Richard J. OENTARYO, Philips K. PRASETYO, Casey VU, Ee-peng LIM, and David LO Conference Proceeding Article
Cast2Face: Assigning character names onto faces in movie with actor-character correspondence, Guangyu GAO, Mengdi XU, Jialie SHEN, Huangdong MA, and Shuicheng YAN Journal Article
Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment, Lixian LIU, Junzuo LAI, Robert H. DENG, and Yingjiu LI Journal Article
Coherence, richness and cognitive absorption in website design, L. VISINESCU and Fiona Fui-hoon NAH Conference Proceeding Article
Collective personalized change classification with multiobjective search, Xin XIA, David LO, Xinyu WANG, and Xiaohu YANG Journal Article
Cryptographic reverse firewall via malleable smooth projective hash functions, Rongmao CHEN, Guomin YANG, Guomin YANG, Willy SUSILO, Fuchun GUO, and Mingwu ZHANG Conference Proceeding Article
Demystifying and puncturing the inflated delay in smartphone-based WiFi network measurement, Weichao LI, Daoyuan WU, Rocky K. C. CHANG, and Ricky K. P. MOK Conference Proceeding Article
Designing a datawarehousing and business analytics course using experiential learning pedagogy, GOTTIPATI Swapna and Venky SHANKARARAMAN Conference Proceeding Article
Domain identification for intention posts on online social media, Thai Le Luong, Quoc Tuan TRUONG, Hai-Trieu Dang, and Xuan Hieu Phan Conference Proceeding Article
D-watch: Embracing "bad" multipaths for device-free localization with COTS RFID devices, Ju WANG, Jie XIONG, Hongbo JIANG, Xiaojiang CHEN, and Dingyi FANG Conference Proceeding Article
Efficient online summarization of large-scale dynamic networks, Qiang QU, Siyuan LIU, Feida ZHU, and Christian S. JENSEN Journal Article
From footprint to evidence: An exploratory study of mining social data for credit scoring, Guangming GUO, Feida ZHU, Enhong CHEN, Qi LIU, Le WU, and Chu GUAN Journal Article
Hashtag recommendation with topical attention-based LSTM, Yang LI, Ting LIU, Jing JIANG, and Liang ZHANG Conference Proceeding Article
Impact of ISP, BPR, and customization on ERP performance in manufacturing SMEs of Korea, Soon-Goo HONG, Keng SIAU, and Jong-Weon KIM Journal Article
Is your waste a waste?, Kar Way TAN, Marcus Jiong Kai ONG, Sijie HO, and Michelle KAN Magazine Article
Iterated random oracle: A universal approach for finding loss in security reduction, Fuchun GUO, Willy SUSILO, Yi MU, Rongmao CHEN, Jianchang LAI, and Guomin YANG Conference Proceeding Article
Lexicon knowledge extraction with sentiment polarity computation, Zhaoxia WANG, Vincent Joo Chuan TONG, Pingcheng RUAN, and Fang LI Conference Proceeding Article
Lossy key encapsulation mechanism and its applications, Yamin LIU, Xianhui LU, Bao LI, and Haiyang XUE Conference Proceeding Article
Managing egress of crowd during infrastructure disruption, Teck Hou TENG, Shih-Fen CHENG, Trong-Nghia TRUONG, and Hoong Chuin LAU Conference Proceeding Article
MetroEye: Smart tracking your metro rips underground, Weixi GU, Ming JIN, Zimu ZHOU, Costas J. SPANOS, and Lin ZHANG Conference Proceeding Article
Online detection of behavioral change using unobtrusive eldercare monitoring system, Thanh Tam LA, Alvin Cerdena VALERA, Hwee-Pink TAN, and Cheryl Li Fang KOH Conference Proceeding Article
Orienteering Problem: A survey of recent variants, solution approaches and applications, Aldy GUNAWAN, Hoong Chuin LAU, and Pieter VANSTEENWEGEN Journal Article
Orienteering Problem: A survey of recent variants, solution approaches and applications, Aldy GUNAWAN, Hoong Chuin LAU, and Pieter VANSTEENWEGEN Journal Article
Pairwise relation classification with mirror instances and a combined convolutional neural network, Jianfei YU and Jing JIANG Conference Proceeding Article
Processing Incomplete k Nearest Neighbor Search, Xiaoye MIAO, Yunjun GAO, Gang CHEN, Baihua ZHENG, and Huiyong CUI Journal Article
Semi-automated tool for providing effective feedback on programming assignments, Min Yan BEH, Swapna GOTTIPATI, David LO, and Venky SHANKARARAMAN Conference Proceeding Article
Server-aided public key encryption with keyword search, Rongman CHEN, Yi MU, Guomin YANG, Fuchun GUO, Xinyi HUANG, Xiaofen WANG, and Yongjun WANG Journal Article
Traffic Simulation Model for Port Planning and Congestion Prevention, Baoxiang LI, Kar Way TAN, and Trong Khiem TRAN Conference Proceeding Article
‘TweetBoard’ – a case study of developing a micro-blogging platform for higher education, Shao Cheh Joyce HSU; GAN, Benjamin; Jin LEE; Shu Hui Sheryl LIM; Xie Yan Jeremy LIM; Thomas MENKHOFF; Si Xian Sherman TAN; Charles Jason WOODARD; and Qiu Cheng YAP Journal Article
Unsupervised feature selection for outlier detection by modelling hierarchical value-feature couplings, Guansong PANG, Longbing CAO, Ling CHEN, and Huan LIU Conference Proceeding Article
Validating social media data for automatic persona generation, Jisun AN, Haewoon KWAK, and Bernard J JANSEN Conference Proceeding Article
When seeing is not believing: Defeating MFF-based attacks by liveness detection for face authentication on mobile platform, Yan LI, Qiang YAN, Yingjiu LI, and Robert H. DENG Book Chapter
ZERO++: Harnessing the power of zero appearances to detect anomalies in large-scale data sets, Guansong PANG, Kai Ming TING, David ALBRECHT, and Huidong JIN Journal Article
Exploratory studies on fundraising practices based on Singapore’s institutions of a public character in the health, social and welfare sectors, J L SIM, U MENON, A L C LOH, and Siu Loon HOE Report
Mitigating large errors in WiFi-based indoor localization for smartphones, Chenshu WU, Zheng YANG, Zimu ZHOU, Yunhao LIU, and Mingyan LIU Journal Article
Help me help you: Shared reflection for personal data, Lisa GRAHAM, Anthony TANG, and Carman NEUSTAEDTER Conference Proceeding Article
Information security practice and experience, Feng BAO; Liqun CHEN; DENG, Robert H.; and Guojun WANG Edited Conference Proceeding
Analysis of education and job trends in data science, V. LAI, Kyong Jin SHIM, and M. PRITHIVIRAJAN Conference Proceeding Article
Analysis of student performance and student participation in online discussions, Kyong Jin SHIM, V. LAI, and M. PRITHIVIRAJAN Conference Proceeding Article
Automated verification of timed security protocols with clock drift, Li LI and Jun SUN Conference Proceeding Article
Towards concolic testing for hybrid systems, Pingfan KONG, Yi LI, Xiaohong CHEN, Jun SUN, Meng SUN, and Jingyi WANG Conference Proceeding Article
Towards learning and verifying invariants of cyber-physical systems by code mutation, Yuqi CHEN, Christopher M. POSKITT, and Jun SUN Conference Proceeding Article
Towards learning and verifying invariants of cyber-physical systems by code mutation, Yuqi CHEN, Christopher M. POSKITT, and Jun SUN Conference Proceeding Article
Rapid deployment indoor localization without prior human participation, Han XU, Zimu ZHOU, and Longfei SHANGGUAN Conference Proceeding Article
Improving quality of use case documents through learning and user interaction, Shuang LIU, Jun SUN, Hao XIAO, Bimlesh WADHWA, Jin Song DONG, and Xinyu WANG Conference Proceeding Article
Towards using concurrent Java API correctly, Shuang LIU, Guangdong BAI, Jun SUN, and Jin Song DONG Conference Proceeding Article
Data exfiltration detection and prevention: Virtually distributed POMDPs for practically safer networks, Sara Marie MC CARTHY, Arunesh SINHA, Milind TAMBE, and Pratyusa MANADHATA Conference Proceeding Article
Achieving IND-CCA security for functional encryption for inner products, Shiwei ZHANG, Yi MU, and Guomin YANG Conference Proceeding Article
A decomposition method for estimating recursive logit based route choice models, Tien MAI, Fabian BASTIN, and Emma FREJINGER Journal Article
A method of integrating correlation structures for a generalized recursive route choice model, Tien MAI Journal Article
An efficient and expressive ciphertext-policy attribute-based-encryption scheme with partially hidden access structures, Hui CUI; DENG, Robert H.; Guowei WU; and Junzuo LAI Conference Proceeding Article
An efficient privacy-preserving outsourced calculation toolkit with multiple keys, Ximeng LIU, Robert H. DENG, Kim-Kwang Raymond CHOO, and Jian WENG Journal Article
A novel covert channel detection method in cloud based on XSRM and improved event association algorithm, Lina WANG, Weijie LIU, Neeraj KUMAR, Debiao HE, Cheng TAN, and Debin GAO Journal Article