The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2016

PDF

Outlier detection in complex categorical data by modeling the feature value couplings, Guansong PANG, Longbing CAO, and Ling CHEN Conference Proceeding Article

PDF

Outlier-robust tensor PCA, Pan ZHOU and Jiashi FENG Conference Proceeding Article

PDF

Passively testing routing protocols in wireless sensor networks, Xiaoping CHE, Stephane MAAG, Hwee-Xian TAN, and Hwee-Pink TAN Conference Proceeding Article

PDF

Patient engagement in the medical facility waiting room using gamified healthcare information delivery, Raheel HASSAN, Nathan W. TWYMAN, Fiona F. NAH, and Keng SIAU Conference Proceeding Article

PDF

Practitioners' expectations on automated fault localization, Pavneet Singh KOCHHAR, Xin XIA, David LO, and Shanping LI Conference Proceeding Article

PDF

Proxy signature with revocation, Shengmin XU, Guomin YANG, Yi MU, and Shu MA Conference Proceeding Article

PDF

Real-time salient object detection with a minimum spanning tree, Wei-Chih TU, Shengfeng HE, Qingxiong YANG, and Shao-Yi CHIEN Conference Proceeding Article

PDF

Response to SBP-BRiMS Data Challenge: Agent-based approach to human migration movement, LIN JUNJIE, LARRY and Kathleen M. CARLEY Conference Paper

PDF

Robust median reversion strategy for online portfolio selection, Dingjiang HUANG; Junlong ZHOU; Bin LI; HOI, Steven C. H.; and Shuigeng ZHOU Journal Article

PDF

Robust Repositioning to Counter Unpredictable Demand in Bike Sharing Systems, Supriyo GHOSH, Michael TRICK, and Pradeep VARAKANTHAM Conference Proceeding Article

PDF

Satisfiability modulo heap-based programs, Quang Loc LE, Jun SUN, and Wei-Ngan CHIN Conference Proceeding Article

PDF

Scalable greedy algorithms for task/resource constrained multi-agent stochastic planning, Pritee AGRAWAL, Pradeep VARAKANTHAM, and William YEOH Conference Proceeding Article

PDF

Self-regulated incremental clustering with focused preferences, Di WANG and Ah-hwee TAN Conference Proceeding Article

PDF

Sequential decision making for improving efficiency in urban environments, Pradeep VARAKANTHAM Conference Proceeding Article

PDF

STPP: Spatial-Temporal Phase Profiling based method for relative RFID tag localization, Longfei SHANGGUAN, Zheng YANG, Alex X. LIU, Zimu ZHOU, and Yunhao LIU Journal Article

PDF

The Effects of Multiple Query Evidences on Social Image Retrieval, Zhiyong CHENG, Jialie SHEN, and Haiyan MIAO Journal Article

PDF

The impact of NASD Rule 2711 and NYSE Rule 472 on analyst behavior: The strategic timing of recommendations issued on weekends, Yi DONG and Nan HU Journal Article

PDF

Three strategies to success: Learning adversary models in security games, Nika HAGHTALAB, Fei FANG, Thanh Hong NGUYEN, Arunesh SINHA, Ariel D. PROCACCIA, and Milind TAMBE Conference Proceeding Article

Understanding gender differences in media perceptions of hedonic systems: A comparison of 2D versus 3D media, Fiona Fui-hoon NAH and Brenda ESCHENBRENNER Journal Article

PDF

Where is the goldmine? Finding promising business locations through Facebook data analytics, Jovian LIN, Richard OENTARYO, Ee-peng LIM, Casey VU, Adrian VU, and Agus Kwee Conference Proceeding Article

PDF

Which information sources are more effective and reliable in video search, CHENG ZHIYONG, Xuanchong LI, Jialie SHEN, and Alexander G. Hauptmann Conference Proceeding Article

PDF

Word clouds with latent variable analysis for visual comparison of documents, Tuan M. V. LE and Hady W. LAUW Conference Proceeding Article

It takes two to tango: Deleted Stack Overflow question prediction with text and meta features, Xin XIA, David LO, Denzil CORREA, Ashish SUREKA, and Emad SHIHAB Conference Proceeding Article

PDF

An interference-free programming model for network objects, Mischael SCHILL, Christopher M. POSKITT, and Bertrand MEYER Conference Proceeding Article

Elevating communication, collaboration, and shared experiences in mobile video through drones, Brennan JONES, Kody DILLMAN, Richard TANG, Anthony TANG, Ehud SHARLIN, Lora OEHLBERG, Carman NEUSTAEDTER, and Scott BATEMAN Conference Proceeding Article

PDF

Adaptable key-policy attribute-based encryption with time interval, Siqi MA; Junzuo LAI; DENG, Robert H.; and Xuhua DING Journal Article

PDF

An Economic Analysis of Consumer Learning for Online Entertainment Shopping, Jin LI, Zhiling GUO, and Geoffrey K.F. TSO Conference Proceeding Article

PDF

An Experimental Investigation of Product Competition and Marketing in Social Networks, Cen CHEN, Zhiling GUO, Shih-Fen CHENG, and Hoong Chuin LAU Conference Proceeding Article

PDF

Automated identification of high impact bug reports leveraging imbalanced learning strategies, Xinli YANG, David LO, Qiao HUANG, Xin XIA, and Jianling SUN Conference Proceeding Article

PDF

CACE: Exploiting behavioral interactions for improved activity recognition in multi-inhabitant smart homes, Mohammad Arif Ul Alam, Nirmalya ROY, Archan MISRA, and Joseph TAYLOR Conference Proceeding Article

PDF

CDRep: Automatic repair of cryptographic-misuses in Android applications, Siqi MA, David LO, Teng LI, and Robert H. DENG Conference Proceeding Article

PDF

Collective rumor correction on the death hoax of a political figure in social media, Alton Y. K. CHUA, Sin-Mei CHEAH, Dion Hoe-Lian GOH, and Ee-peng LIM Conference Proceeding Article

PDF

Condensing class diagrams with minimal manual labeling cost, Xinli YANG, David LO, Xin XIA, and Jianling SUN Conference Proceeding Article

PDF

Deduplication on encrypted big data in cloud, Zheng YAN; Wenxiu DING; Xixun YU; Haiqi ZHU; and DENG, Robert H. Journal Article

PDF

DeepSense: A GPU-based deep convolutional neural network framework on commodity mobile devices, HUYNH NGUYEN LOC, Rajesh Krishna BALAN, and Youngki LEE Conference Proceeding Article

PDF

Demo: Drumming application using commodity wearable devices, Bharat DWIVEDI, Archan MISRA, and Youngki LEE Conference Proceeding Article

PDF

Demo: GPU-based image recognition and object detection on commodity mobile devices, Loc Nguyen HUYNH, Rajesh Krishna BALAN, and Youngki LEE Conference Proceeding Article

PDF

Demo: Multi-device gestural interfaces, TRAN HUY VU, Youngki LEE, and Archan MISRA Conference Proceeding Article

PDF

Demo: Smartwatch based shopping gesture recognition, Meeralakshmi RADHAKRISHNAN, Sharanya ESWARAN, Sougata SEN, Vigneshwaran SUBBARAJU, Archan MISRA, and Rajesh Krishna BALAN Conference Proceeding Article

PDF

Demo: TA$Ker: Campus-scale mobile crowd-tasking platform, Nikita JAIMAN, Thivya KANDAPPU, Randy TANDRIANSYAH, and Archan MISRA Conference Proceeding Article

PDF

Demo: Wearable application to manage problem behavior in children with neurodevelopmental disorders, Camellia ZAKARIA and Richard C. DAVIS Conference Proceeding Article

PDF

Designing and comparing multiple portfolios of parameter configurations for online algorithm selection, Aldy GUNAWAN, Hoong Chuin LAU, and Mustafa MISIR Conference Proceeding Article

PDF

(Deterministic) hierarchical identity-based encryption from learning with rounding over small modulus, Fuyang FANG, Bao LI, Xianhui LU, Yamin LIU, Dingding JIA, and Haiyang XUE Conference Proceeding Article

DPBT: A System for Detecting Pacemakers in Burst Topics, Guozhong DONG, Wu YANG, Feida ZHU, and Wei WANG Conference Proceeding Article

PDF

Dual formulations for optimizing Dec-POMDP controllers, Akshat KUMAR, Hala MOSTAFA, and Shlomo ZILBERSTEIN Conference Proceeding Article

PDF

Efficient multi-class selective sampling on graphs, Peng YANG; Peilin ZHAO; Zhen HAI; Wei LIU; HOI, Steven C. H.; and Xiao-Li LI Conference Proceeding Article

PDF

Event detection with zero example: Select the right and suppress the wrong concepts, Yi-Jie LU, Hao ZHANG, Maaike DE BOER, and Chong-wah NGO Conference Proceeding Article

PDF

Exemplar-driven top-down saliency detection via deep association, Shengfeng HE, Rynson W. H. LAU, and Qingxiong YANG Conference Proceeding Article

PDF

Finding the shortest path in stochastic vehicle routing: A cardinality minimization approach, Zhiguang CAO, Hongliang GUO, Jie ZHANG, Dusit NIYATO, and Ulrich Fastenrath FASTENRATH Journal Article

PDF

Fusing WiFi and video sensing for accurate group detection in indoor spaces, Kasthuri JAYARAJAH, Zaman LANTRA, and Archan MISRA Conference Proceeding Article

PDF

Geometric Aspects and Auxiliary Features to Top-k Processing [Advanced Seminar], Kyriakos MOURATIDIS Conference Proceeding Article

PDF

How long will this live? Discovering the lifespans of software engineering ideas, Subhajit DATTA, Santonu SARKAR, and A. S. M Sajeev Journal Article

PDF

ICCDetector: ICC-based malware detection on Android, Xu KE, Yingjiu LI, and Robert H. DENG Journal Article

PDF

Indoor location error-detection via crowdsourced multi-dimensional mobile data, Savina SINGLA and Archan MISRA Conference Proceeding Article

PDF

Jasper: Sensing gamers' emotions using physiological sensors, Sinh HUYNH, Youngki LEE, Taiwoo PARK, and Rajesh Krishna BALAN Conference Proceeding Article

PDF

Learning natural language inference with LSTM, Shuohang WANG and Jing JIANG Conference Proceeding Article

PDF

LiveLabs: Building in-situ mobile sensing and behavioural experimentation testbeds, Kasthuri JAYARAJAH, Rajesh Krishna BALAN, Meera RADHAKRISHNAN, Archan MISRA, and Youngki LEE Conference Proceeding Article

MobiPot: Understanding Mobile Telephony Threats with Honeycards, Marco BALDUZZI, Payas GUPTA, Lion GU, Debin GAO, and Mustaque AHAMAD Conference Proceeding Article

PDF

MobiPot: Understanding Mobile Telephony Threats with Honeycards, Marco BALDUZZI, Payas GUPTA, Lion GU, Debin GAO, and Mustaque AHAMAD Conference Proceeding Article

On the use of commonsense ontology for multimedia event recounting, Chun-Chet TAN and Chong-wah NGO Journal Article

PDF

Poster: A device-free evaluation system for gymnastics using passive RFID tags, Binbin XIE, Jie XIONG, Dingyi FANG, Xiaojiang CHEN, Anwen WANG, and Zhanyong TANG Conference Proceeding Article

PDF

Poster: Air quality friendly route recommendation system, Savina SINGLA, Divya BANSAL, and Archan MISRA Conference Proceeding Article

PDF

Poster: Android whole-system control flow analysis for accurate application behavior modeling, Huu Hoang NGUYEN Conference Proceeding Article

PDF

Poster: Improving communication and communicability with smarter use of text-based messages on mobile and wearable devices, Kenny T. W. CHOO Conference Proceeding Article

PDF

Poster: Sonicnect: Accurate hands-free gesture input system with smart acoustic sensing, Maotian CHANG, Ping LI, Panlong YANG, Jie XIONG, and Chang TIAN Conference Proceeding Article

PDF

Protecting the NECTAR of the Ganga River through game-theoretic factory inspections, Benjamin FORD, Matthew BROWN, Amulya YADAV, Amandeep SINGH, Arunesh SINHA, Biplav SRIVASTAVA, Christopher KIEKINTVELD, and TAMBE MILLIND Conference Proceeding Article

PDF

QCRI at SemEval-2016 Task 4: Probabilistic Methods for Binary and Ordinal Quantification, Giovanni Da San MARTINO, Wei GAO, and Fabrizio SEBASTIANI Conference Proceeding Article

PDF

Recipient revocable identity-based broadcast encryption: How to revoke some recipients in IBBE without knowledge of the plaintext, Willy SUSILO, Guomin YANG, Rongmao CHEN, Yi MU, Fuchun GUO, and Yang-Wai CHOW Conference Proceeding Article

PDF

Robust Partial Order Schedules for RCPSP/max with Durational Uncertainty, Na FU, Pradeep VARAKANTHAM, and Hoong Chuin LAU Conference Proceeding Article

PDF

Seeking independent management of problem behavior: A proof-of-concept study with children and their teachers, Camellia ZAKARIA, Richard C. DAVIS, and Zachary WALKER Conference Proceeding Article

PDF

Self-organizing neural network for adaptive operator selection in evolutionary search, Teck Hou TENG, Stephanus Daniel HANDOKO, and Hoong Chuin LAU Conference Proceeding Article

PDF

Serendipity-driven celebrity video hyperlinking, Shujun YANG, Lei PANG, Chong-wah NGO, and Benoit HUET Conference Proceeding Article

PDF

Small scale deployment of seat occupancy detectors, Nguyen Huy Hoang HUY, Gihan HETTIARACHCHI, Youngki LEE, and Rajesh Krishna BALAN Conference Proceeding Article

PDF

Strategic Planning for Setting up Base Stations In Emergency Medical Systems, Supriyo GHOSH and Pradeep VARAKANTHAM Conference Proceeding Article

PDF

The frustrations and benefits of mobile device usage in the home when co-present with family members, Erick ODUOR, Carman NEUSTAEDTER, William ODOM, Anthony TANG, Niala MOALLEM, Melanie TORY, and Pourang IRANI Conference Proceeding Article

PDF

Value-inspired elderly care service design for aging-in-place, Na LIU, Sandeep PURAO, and Hwee-Pink TAN Conference Proceeding Article

PDF

Video modeling and learning on Riemannian manifold for emotion recognition in the wild, Mengyi LIU, Ruiping WANG, Shaoxin LI, Zhiwu HUANG, Shiguang SHAN, and Xilin CHEN Journal Article

Analytics for Card-Based Partnerships between Banks and Retailers,   GENG DAN and Robert John KAUFFMAN Conference Paper

SLR: A scalable latent role model for attribute completion and tie prediction in social networks, Lizi LIAO, Qirong HO, Jing JIANG, and Ee-peng LIM Conference Proceeding Article

PDF

A core task abstraction approach to hierarchical reinforcement learning [Extended abstract], Zhuoru LI, Akshay NARAYAN, and Tze-Yun LEONG Conference Proceeding Article

PDF

A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud, Hanshu HONG, Zhixin SUN, and Ximeng LIU Journal Article

PDF

An autonomous agent for learning spatiotemporal models of human daily activities, Shan GAO and Ah-Hwee TAN Conference Proceeding Article

PDF

Anonymous identity-based broadcast encryption with chosen-ciphertext security, Kai HE; Jian WENG; Jia-Nan LIU; Joseph K. LIU; Wei LIU; and DENG, Robert H. Conference Proceeding Article

PDF

Approximate inference using DC programming for collective graphical models, Duc Thien NGUYEN, Akshat KUMAR, Hoong Chuin LAU, and Daniel SHELDON Conference Proceeding Article

PDF

Approximating the Performance of a "Last Mile" Transportation System, Hai WANG and Amedeo ODONI Journal Article

PDF

Are you Charlie or Ahmed? Cultural pluralism in Charlie Hebdo response on Twitter, Jisun AN, Haewoon KWAK, Yelena MEJOVA, Sonia Alonso Saenz DE OGER, and Braulio Gomez FORTES Conference Proceeding Article

PDF

Attacks and defence on android free floating windows, Lingyun YING, Yao CHENG, Yemian LU, Yacong GU, Purui SU, and Dengguo FENG Conference Proceeding Article

PDF

Augmenting API documentation with insights from stack overflow, Christoph TREUDE and Martin P. ROBILLARD Conference Proceeding Article

PDF

CAPTURE: A new predictive anti-poaching tool for wildlife protection, Thanh H. NGUYEN, Arunesh SINHA, Shahrzad GHOLAMI, Andrew PLUMPTRE, Lucas JOPPA, Milind TAMBE, Margaret DRICIRU, Fred WANYAMA, Aggrey RWETSIBA, and Rob CRITCHLOW Conference Proceeding Article

PDF

Context-aware advertisement recommendation for high-speed social news feeding, Yuchen LI, Dongxiang ZHANG, Ziquan LAN, and Kian-Lee TAN Conference Proceeding Article

PDF

Deeper look into bug fixes: Patterns, replacements, deletions, and additions, Mauricio SOTO, Ferdian THUNG, Chu-Pan WONG, Claire LE GOUES, and David LO Conference Proceeding Article

PDF

Domain-specific cross-language relevant question retrieval, Bowen XU, Zhenchang XING, Xin XIA, David LO, Qingye WANG, and Shanping LI Conference Proceeding Article

PDF

Efficient 3D dental identification via signed feature histogram and learning keypoint detection, Zhiyuan ZHANG, Sim Heng ONG, Xin ZHONG, and Kelvin W. C. FOONG Journal Article

PDF

Efficient verifiable computation of linear and quadratic functions over encrypted data, Ngoc Hieu TRAN, Hwee Hwa PANG, and Robert H. DENG Conference Proceeding Article

PDF

EFSPredictor: Predicting configuration bugs with ensemble feature selection, Bowen XU, David LO, Xin XIA, Ashish SUREKA, and Shanping LI Conference Proceeding Article

PDF

Euclidean co-embedding of ordinal data for multi-type visualization, Dung D. LE and Hady W. LAUW Conference Proceeding Article

PDF

Fast Weighted Histograms for Bilateral Filtering and Nearest Neighbor Searching, Shengfeng HE, Qingxiong YANG, Rynson W. H. LAU, and Ming-Hsuan YANG Journal Article

PDF

Graph-aided directed testing of Android applications for checking runtime privacy behaviours, Joseph Joo Keng CHAN, Lingxiao JIANG, Kiat Wee TAN, and Rajesh Krishna BALAN Conference Proceeding Article

PDF

#greysanatomy vs. #yankees: Demographics and hashtag use on Twitter, Jisun AN and Ingmar WEBER Conference Proceeding Article

PDF

HDIdx: High-dimensional indexing for efficient approximate nearest neighbor search, Ji WAN, Sheng TANG, Yongdong ZHANG, Jintao LI, Pengcheng WU, and Steven C. H. HOI Journal Article