The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2018

PDF

Two birds with one stone: Classifying positive and unlabeled examples on uncertain data streams, Donghong HAN, Shuoru LI, Fulin WEI, Yuying TANG, Feida ZHU, and Guoren WANG Journal Article

PDF

Unified locally linear classifiers with diversity-promoting anchor points, Chenghao LIU, Teng ZHANG, Peilin ZHAO, Jianling SUN, and Steven C. H. HOI Conference Proceeding Article

PDF

Upping the game of taxi driving in the age of Uber, Shashi Shekhar JHA, Shih-Fen CHENG, Meghna LOWALEKAR, Wai Hin WONG, Rajendram Rishikeshan RAJENDRAM, Trong Khiem TRAN, Pradeep VARAKANTHAM, Nghia TRUONG TRONG, and Firmansyah ABD RAHMAN Conference Proceeding Article

PDF

VT-Revolution: Interactive programming video tutorial authoring and watching system, Lingfeng BAO, Zhenchang XING, Xin XIA, and David LO Journal Article

PDF

Word co-occurrence regularized non-negative matrix tri-factorization for text data co-clustering, Aghiles SALAH, Melissa AILEM, and Mohamed NADIF Conference Proceeding Article

Multi-target deep neural networks: Theoretical analysis and implementation, Zeng ZENG, Nanying LIANG, Xulei YANG, and Steven C. H. HOI Journal Article

PDF

A distributed intrusion detection model via nondestructive partitioning and balanced allocation for big data, Xiaonian WU, Chuyun ZHANG, Runlian ZHANG, Yujue WANG, and Jinhua CUI Journal Article

PDF

A lightweight policy preserving EHR sharing scheme in the cloud, Zuobin YING, Lu WEI, Qi LI, Ximeng LIU, and Jie CUI Journal Article

PDF

Anatomy of online hate: Developing a taxonomy and machine learning models for identifying and classifying hate in online news media, Joni SALMINEN, Hind ALMEREKHI, Milica MILENKOVIC, Soon-Gyu JUNG, Haewoon KWAK, Haewoon KWAK, and Bernard J. JANSEN Conference Proceeding Article

PDF

An iterated local search algorithm for the team orienteering problem with variable profits, Aldy GUNAWAN, Kien Ming NG, Graham KENDALL, and Junhan LAI Journal Article

Catching Captain Jack: Efficient time and space dependent patrols to combat oil-siphoning in international waters, Xinrun WANG, Bo AN, Martin STROBEL, and Fookwai KONG Conference Proceeding Article

PDF

CODE: Coherence based decision boundaries for feature correspondence, Wen-yan LIN, Fan WANG, Ming-Ming CHENG, Sai-Kit YEUNG, Philip H. S. TORR, and Jiangbo LU Journal Article

PDF

Collaboration patterns in software developer network, Didi SURIAN, Ee-peng LIM, and David LO Encyclopaedia

PDF

Collaborative fall detection using smartphone and Kinect, Xue LI, Lanshun NIE, Hanchuan XU, and Xianzhi WANG Journal Article

PDF

Competency analytics tool: Analyzing curriculum using course competencies, Swapna GOTTIPATI and Venky SHANKARARAMAN Journal Article

PDF

Consortium blockchain-based SIFT: Outsourcing encrypted feature extraction in the D2D network, Xiaoqin FENG, Jianfeng MA, Tao FENG, Yinbin MIAO, and Ximeng LIU Journal Article

PDF

Dictionary learning with structured noise, Pan ZHOU, Cong FANG, Zhouchen LIN, Chao ZHANG, and Y. Edward CHANG Journal Article

PDF

Discriminant analysis on Riemannian manifold of Gaussian distributions for face recognition with image sets, W. WANG, R. WANG, Zhiwu HUANG, S. SHAN, and X. CHEN Journal Article

PDF

Efficient and privacy-preserving outsourced calculation of rational numbers, Ximeng LIU, Kim-Kwang Raymond CHOO, Robert H. DENG, Rongxing LU, and Jian WENG Journal Article

Egocentric hand detection via dynamic region growing, Shao HUANG, Weiqiang WANG, Shengfeng HE, and Rynson W. H. LAU Journal Article

PDF

Exact and heuristic approaches for the multi-agent orienteering problem with capacity constraints, Wenjie WANG, Hoong Chuin LAU, and Shih-Fen CHENG Conference Proceeding Article

Handbook of blockchain, digital finance, and inclusion: Cryptocurrency, FinTech, InsurTech, and regulation, David LEE and Robert H. DENG Edited Book

PDF

Hybrid privacy-preserving clinical decision support system in fog-cloud computing, Ximeng LIU, Robert H. DENG, Yang YANG, Ngoc Hieu TRAN, and Shangping ZHONG Journal Article

PDF

Identifying and computing the exact core-determining class, Ye LUO and Hai WANG Working Paper

PDF

Improved construction for inner product functional encryption, Qingsong ZHAO, Qingkai ZENG, and Ximeng LIU Journal Article

PDF

Integrated reward scheme and surge pricing in a ride sourcing market, Hai YANG, Chaoyi SHAO, Hai WANG, and Jieping YE Working Paper

PDF

Modeling engagement of programming students using unsupervised machine learning technique, Hua Leong FWA and Lindsay MARSHALL Journal Article

PDF

Multi-target deep neural networks: Theoretical analysis and implementation, Zeng ZENG, Nanying LIANG, Xulei YANG, and Steven C. H. HOI Journal Article

PDF

Online/Offline traceable attribute-based encryption [in Chinese], Kai ZHANG, Jianfeng MA, Junwei ZHANG, Zuobin YING, Tao ZHANG, and Ximeng LIU Journal Article

PDF

PageSense: Toward stylewise contextual advertising via visual analysis of web pages, Tao MEI, Lusong LI, Xinmei TIAN, Dacheng TAO, and Chong-wah NGO Journal Article

PDF

Pricing for a last-mile transportation system, Yiwei CHEN and Hai WANG Journal Article

PDF

Real-time inbound marketing: A use case for digital banking, Alan MEGARGEL, Venky SHANKARARAMAN, and Srinivas K. REDDY Book Chapter

PDF

Real-world large-scale IoT systems for community eldercare: A comparative study on system dependability, Hwee-Pink TAN and Austin ZHANG Conference Proceeding Article

PDF

Secure smart metering based on LoRa technology, Yao CHENG, Hendra SAPUTRA, Leng Meng GOH, and Yongdong WU Conference Proceeding Article

PDF

Securing display path for security-sensitive applications on mobile devices, Jinhua CUI, Yuanyuan ZHANG, Zhiping CAI, Anfeng LIU, and Yangyang LI Journal Article

PDF

Simulation-based security of function-hiding inner product encryption, Qingsong ZHAO, Qingkai ZENG, Ximeng LIU, and Huanliang XU Journal Article

PDF

SkyLens: Visual analysis of skyline on multi-dimensional data, Xun ZHAO, Yanhong WU, Weiwei CUI, Xinnan DU, Yuan CHEN, Yong WANG, Dik Lun LEE, and Huamin QU Journal Article

PDF

SLADE: A smart large-scale task decomposer in crowdsourcing, Yongxin TONG, Lei CHEN, Zimu ZHOU, H. V. JAGADISH, and Lidan SHOU Journal Article

PDF

Smart monitoring via participatory BLE relaying, Meeralakshmi RADHAKRISHNAN, Sougata SEN, Archan MISRA, Youngki LEE, and Rajesh Krishna BALAN Conference Proceeding Article

PDF

Smartwatch-based early gesture detection & trajectory tracking for interactive gesture-driven applications, Tran Huy VU, Archan MISRA, Quentin ROY, Kenny Tsu Wei CHOO, and Youngki LEE Journal Article

Social collaborative media in software development, Didi SURIAN and David LO Encyclopaedia

PDF

Social collaborative media in software development, Didi SURIAN and David LO Encyclopaedia

PDF

Strong identity-based proxy signature schemes, revisited, Weiwei LIU, Yi MU, Guomin YANG, and Yangguang TIAN Journal Article

PDF

TinyVisor: An extensible secure framework on Android platforms, Dong SHEN; Zhoujun LI; Xiaojing SU; Jinxin MA; and DENG, Robert H. Journal Article

PDF

User-friendly deniable storage for mobile devices, Bing CHANG, Yao CHENG, Bo CHEN, Fengwei ZHANG, Wen-Tao ZHU, Yanju LIU, and Zhan WANG Journal Article

PDF

User-friendly deniable storage for mobile devices, Bing CHANG, Yao CHENG, Bo CHEN, Fengwei ZHANG, Wen-Tao ZHU, Yingjiu LI, and Zhan. WANG Journal Article

PDF

Utilizing hypervisor to enhance TrustZone’s introspection capabilities on non-secure world, Zhang-Kai ZHANG, Zhou-Jun LI, Chun-He XIA, Jin-Xin MA, and Jinhua CUI Journal Article

Submissions from 2017

Financial Services Technology: Processes, Architecture, and Solutions, Randall E. DURAN Book

BARTON: Low power tongue movement sensing with in-ear barometers, Balz MAAG, Zimu ZHOU, Olga SAUKH, and Lothar THIELE Conference Proceeding Article

PDF

A compact representation of human actions by sliding coordinate coding, Runwei DING, Qianru SUN, Mengyuan LIU, and Hong LIU Journal Article

PDF

A multiagent-based approach for vehicle routing by considering both arriving on time and total travel time, Zhiguang CAO, Hongliang GUO, and Jie ZHANG Journal Article

Analyst firm coverage and forecast accuracy: The effect of regulation fair disclosure, Yi DONG, Nan HU, Xu LI, and Ling LIU Journal Article

PDF

Analyzing the e-learning video environment requirements of Generation Z students using Echo360 platform, Swapna GOTTIPATI and Venky SHANKARARAMAN Conference Proceeding Article

PDF

A novel density peak clustering algorithm based on squared residual error, Milan PARMAR, Di WANG, Ah-hwee TAN, Chunyan MIAO, Jianhua JIANG, and You ZHOU Conference Paper

PDF

A selective-discrete particle swarm optimization algorithm for solving a class of orienteering problems, Aldy GUNAWAN, Vincent F. YU, Perwira REDI, Parida JEWPANYA, and Hoong Chuin LAU Conference Proceeding Article

PDF

BTCI: A new framework for identifying congestion cascades using bus trajectory data, Meng-Fen CHIANG, Ee Peng LIM, Wang-Chien LEE, and Agus Trisnajaya KWEE Conference Proceeding Article

PDF

Compact hierarchical IBE from lattices in the standard model, Daode ZHANG, Fuyang FANG, Bao LI, Haiyang XUE, and Bei LIANG Conference Proceeding Article

PDF

Disease gene classification with metagraph representations, Sezin KIRCALI ATA, Yuan FANG, Min WU, Xiao-Li LI, and Xiaokui XIAO Journal Article

PDF

D-Watch: Embracing “bad” multipaths for device-free localization with COTS RFID devices, Ju WANG, Jie XIONG, Hongbo JIANG, Xiaojiang CHEN, and Dingyi FANG Journal Article

PDF

EACSIP: Extendable Access Control System with Integrity Protection for enhancing collaboration in the cloud, Willy SUSILO, Peng JIANG, Fuchun GUO, Guomin YANG, Yong YU, and Yi MU Journal Article

PDF

Efficient gate system operations for a multipurpose port using simulation optimization, Ketki KULKARNI, Trong Khiem TRAN, Hai WANG, and Hoong Chuin LAU Conference Proceeding Article

PDF

Enterprise social media use and impact on performance: The role of workplace integration and positive emotions, Murad MOQBEL and Fiona Fui-hoon NAH Journal Article

PDF

Extracting implicit suggestions from students’ comments: A text analytics approach, Venky SHANKARARAMAN, Swapna GOTTIPATI, Jeff Rongsheng LIN, and Sandy GAN Conference Proceeding Article

PDF

Finding the 'faster' path in vehicle routing, Jing GUO, Yaoxin WU, Xuexi ZHANG, Le ZHANG, Wei CHEN, Zhiguang CAO, and Hongliang GUO Journal Article

PDF

GraphMP: an efficient semi-external-memory big graph processing system on a single machine, Peng SUN, Yonggang WEN, Nguyen Binh Duong TA, and Xiaokui XIAO Conference Proceeding Article

PDF

Home health care delivery problem, Aldy GUNAWAN, Hoong Chuin LAU, and Kun LU Conference Proceeding Article

PDF

Inferring social media users’ demographics from profile pictures: A Face++ analysis on Twitter users, Soon-Gyo JUNG, Jisun AN, Haewoon KWAK, Joni SALMINEN, and Bernard J. JANSEN Conference Proceeding Article

PDF

Law enforcement resource optimization with response time guarantees, Jonathan CHASE, Jiali DU, Na FU, Truc Viet LE, and Hoong Chuin LAU Conference Proceeding Article

PDF

Leveraging auxiliary tasks for document-level cross-domain sentiment classification, Jianfei YU and Jing JIANG Conference Proceeding Article

PDF

Leveraging the trade-off between accuracy and interpretability in a hybrid intelligent system, Di WANG, Chai QUEK, Ah-hwee TAN, Chunyan MIAO, Geok See NG, and You ZHOU Conference Proceeding Article

PDF

Multilingual sentiment analysis : From formal to informal and scarce resource languages, Siaw Ling LO, Erik CAMBRIA, Raymond CHIONG, and David CORNFORTH Journal Article

PDF

Multi-user multi-keyword rank search over encrypted data in arbitrary language, Yang YANG, Ximeng LIU, and Robert H. DENG Journal Article

MuVi: Multiview video aware transmission over MIMO wireless systems, Zhe CHEN, Xu ZHANG, Yuedong XU, Jie XIONG, Yu ZHU, and Xin WANG Journal Article

PDF

On modeling sense relatedness in multi-prototype word embedding, Yixin CAO, Juanzi LI, Jiaxin SHI, Zhiyuan LIU, and Chengjiang LI Conference Proceeding Article

PDF

Policy gradient with value function approximation for collective multiagent planning, Duc Thien NGUYEN, Akshat KUMAR, and Hoong Chuin LAU Conference Proceeding Article

PDF

Pose guided person image generation, Liqian MA, Xu JIA, Qianru SUN, Bernt SCHIELE, Tinne TUYTELAARS, and Luc VAN GOOL Conference Proceeding Article

PDF

Robust human activity recognition using lesser number of wearable sensors, Di WANG, Edwin CANDINEGARA, Junhui HOU, Ah-hwee TAN, and Chunyan MIAO Conference Proceeding Article

PDF

Secure server-aided top-k monitoring, Yujue WANG, Hwee Hwa PANG, Yanjiang YANG, and Xuhua DING Journal Article

PDF

Towards tightly secure deterministic public key encryption, Daode ZHANG, Bao LI, Yamin LIU, Haiyang XUE, Xianhui LU, and Dingding JIA Conference Proceeding Article

PDF

Using data analytics for discovering library resource insights: Case from Singapore Management University, Ning LU, Rui SONG, Dina Li Gwek HENG, Swapna GOTTIPATI, and Aaron TAY Conference Proceeding Article

PDF

Using teaching cases for achieving bloom’s high-order cognitive levels: An application in technically-oriented information systems course, Kar Way TAN Conference Proceeding Article

PDF

VKSE-MO: Verifiable keyword search over encrypted data in multi-owner settings, Yinbin MIAO, Jianfeng MA, Ximeng LIU, Junwei ZHANG, and Zhiquan LIU Journal Article

PDF

What do developers search for on the web?, Xin XIA, Lingfeng BAO, David LO, Pavneet Singh KOCHHAR, Ahmed E. HASSAN, and Zhenchang XING Journal Article

PDF

Who are your users? comparing media professionals' preconception of users to data-driven personas, Lene NIELSEN, Soon-Gyu JUNG, Jisun AN, Joni SALMINEN, Haewoon KWAK, and Bernard J. JANSEN Conference Proceeding Article

Efficient real-time mobile traffic information acquisition, Shiau Hong LIM, Yeow Khiang CHIA, and Laura WYNTER Conference Proceeding Article

Secure virtual machine placement in infrastructure cloud services, Varun NATU and Nguyen Binh Duong TA Conference Proceeding Article

An overview of charity governance in Singapore, I J SIM, A L C LOH, L TAY, and Siu Loon HOE Report

Disclosure of board and management matters: An exploratory study on charity governance in Singapore based on institutions of a public character from health and, social and welfare sectors, I J SIM and Siu Loon HOE Report

Egocentric temporal action proposals, Shao HUANG, Weiqiang WANG, Shengfeng HE, and Rynson W. H. LAU Journal Article

PDF

BikeMate: Bike riding behavior monitoring with smartphones, Weixi GU, Zimu ZHOU, Yuxun ZHOU, Han ZOU, Yunxin LIU, Costas J. SPANOS, and Lin ZHANG Conference Proceeding Article

PDF

Learning likely invariants to explain why a program fails, Long H. PHAM, Jun SUN, Lyly Tran THI, Jingyi WANG, and Xin PENG Conference Proceeding Article

PDF

Automatic loop-invariant generation and refinement through selective sampling, Jiaying LI, Jun SUN, Li LI, Quang Loc LE, and Shang-Wei LIN Conference Proceeding Article

PDF

FiB: Squeezing loop invariants by interpolation between forward/backward predicate transformers, Shang-Wei LIN, Jun SUN, Hao XIAO, Yang LIU, David SANA, and Henri HANSEN Conference Proceeding Article

PDF

Mining implicit design templates for actionable code reuse, Yun LIN, Guozhu MENG, Yinxing YUE, Zhenchang XING, Jun SUN, Xin PENG, Yang LIU, Wenyun ZHAO, and Jin Song DONG Conference Proceeding Article

PDF

A fast trajectory outlier detection approach via driving behavior modeling, Hao WU, Weiwei SUN, and Baihua ZHENG Conference Proceeding Article

PDF

An analysis of rumor and counter-rumor messages in social media, Dion Hoe-Lian GOH, Alton Y. K. CHUA, Hanyu SHI, Wenju WEI, Haiyan WANG, and Ee-peng LIM Conference Proceeding Article

PDF

Anomaly detection for a water treatment system using unsupervised machine learning, Jun INOUE, Yoriyuki YAMAGATA, Yuqi CHEN, Christopher M. POSKITT, and Jun SUN Conference Proceeding Article

PDF

AnswerBot: Automated generation of answer summary to developers’ technical questions, Bowen XU, Zhenchang XING, Xin XIA, and David LO Conference Proceeding Article

PDF

APIBot: Question answering bot for API documentation, Yuan TIAN, Ferdian THUNG, Abhishek SHARMA, and David LO Conference Proceeding Article

PDF

A semantics comparison workbench for a concurrent, asynchronous, distributed programming language, Claudio CORRODI, Alexander HEUßNER, and Christopher M. POSKITT Journal Article