The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2016

The retransmission of rumor-related tweets: Characteristics of source and message, CHUA, Cheng-Ying TEE, A. PANG, and Ee-peng LIM Conference Proceeding Article

Targeted gamification to encourage and measure intrinsically motivated game-based learning, Chris BOESCH Conference Proceeding Article

PDF

A Feasible No-Root Approach on Android, Yao CHENG, Yingjiu LI, and Robert H. DENG Conference Proceeding Article

PDF

A Learning-to-Rank Based Fault Localization Approach using Likely Invariants, Tien-Duy B. LE, David LO, Claire LE GOUES, and Lars GRUNSKE Conference Proceeding Article

PDF

An adaptability-driven model and tool for analysis of service profitability, Eng Lieh OUH and Jarzabek STAN Conference Proceeding Article

PDF

A survey on future internet security architectures, Wenxiu DING, Zheng YAN, and Robert H. DENG Journal Article

PDF

Automatic hookworm detection in wireless capsule endoscopy images, Xiao WU, Honghan CHEN, Tao GAN, Junzhou CHEN, Chong-wah NGO, and Qiang PENG Journal Article

PDF

Build emotion lexicon from the mood of crowd via topic-assisted joint non-negative matrix factorization, Kaisong SONG, Wei GAO, Ling CHEN, Shi FENG, Daling WANG, and Chengqi ZHANG Conference Proceeding Article

PDF

Can Instagram posts help characterize urban micro-events?, Kasthuri JAYARAJAH and Archan MISRA Conference Proceeding Article

PDF

Cross-Modal Self-Taught Hashing for large-scale image retrieval, Liang XIE, Lei ZHU, Peng PAN, and Yansheng LU Journal Article

PDF

Detecting rumors from microblogs with recurrent neural networks, Jing MA, Wei GAO, Prasenjit MITRA, Sejeong KWON, Bernard J. JANSEN, Kam-Fai WONG, and Meeyoung CHA Conference Proceeding Article

PDF

Edit distance based encryption and its application, Tran Viet Xuan PHUONG, Guomin YANG, Willy SUSILO, and Kaitai LIANG Conference Proceeding Article

PDF

Fine-grained detection of programming students’ frustration using keystrokes, mouse clicks and interaction logs, Hua Leong FWA Journal Article

PDF

From offline to online: How health insurance policies drive the demand for online healthcare service?, Yue YU, Qiu-Yan MEI, and QIU-HONG WANG Conference Proceeding Article

PDF

Generic anonymous identity-based broadcast encryption with chosen-ciphertext security, Kai HE; Jian WENG; Man Ho AU; Yijun MAO; and DENG, Robert H. Conference Proceeding Article

HCI in Business, Government, and Organizations: eCommerce and Innovation: Third International Conference, HCIBGO 2016, Toronto, Canada, July 17-22: Proceedings, Part I, Fiona Fui-hoon NAH and Chuan-Hoo TAN Edited Conference Proceeding

PDF

HCI testing in laboratory or field settings, Chuan-Hoo TAN, Austin SILVA, Rich LEE, Kanliang WANG, and Fiona Fui-hoon NAH Conference Proceeding Article

PDF

Learning compact visual representation with canonical views for robust mobile landmark search, Lei ZHU, Jialie SHEN, Xiaobai LIU, Liang XIE, and Liqiang NIE Conference Proceeding Article

PDF

Linear encryption with keyword search, Shiwei ZHANG, Guomin YANG, and Yi MU Conference Proceeding Article

PDF

On effective personalized music retrieval by exploring online user behaviors, Zhiyong CHENG, Jialie SHEN, and Steven C. H. HOI Conference Proceeding Article

PDF

On effective personalized music retrieval via exploring online user behaviors, Zhiyong CHENG, Jialie SHEN, and Steven C. H. HOI Conference Proceeding Article

PDF

One-round strong oblivious signature-based envelope, Rongmao CHEN, Yi MU, Willy SUSILO, Guomin YANG, Fuchun GUO, and Mingwu ZHANG Conference Proceeding Article

PDF

On very large scale test collection for landmark image search benchmarking, Zhiyong CHENG and Jialie SHEN Journal Article

PDF

Ordinal text quantification, Giovanni Da San MARTINO, Wei GAO, and Fabrizio SEBASTIANI Conference Proceeding Article

PDF

Outlier detection in complex categorical data by modeling the feature value couplings, Guansong PANG, Longbing CAO, and Ling CHEN Conference Proceeding Article

PDF

Outlier-robust tensor PCA, Pan ZHOU and Jiashi FENG Conference Proceeding Article

PDF

Passively testing routing protocols in wireless sensor networks, Xiaoping CHE, Stephane MAAG, Hwee-Xian TAN, and Hwee-Pink TAN Conference Proceeding Article

PDF

Patient engagement in the medical facility waiting room using gamified healthcare information delivery, Raheel HASSAN, Nathan W. TWYMAN, Fiona F. NAH, and Keng SIAU Conference Proceeding Article

PDF

Practitioners' expectations on automated fault localization, Pavneet Singh KOCHHAR, Xin XIA, David LO, and Shanping LI Conference Proceeding Article

PDF

Proxy signature with revocation, Shengmin XU, Guomin YANG, Yi MU, and Shu MA Conference Proceeding Article

PDF

Real-time salient object detection with a minimum spanning tree, Wei-Chih TU, Shengfeng HE, Qingxiong YANG, and Shao-Yi CHIEN Conference Proceeding Article

PDF

Response to SBP-BRiMS Data Challenge: Agent-based approach to human migration movement, LIN JUNJIE, LARRY and Kathleen M. CARLEY Conference Paper

PDF

Robust median reversion strategy for online portfolio selection, Dingjiang HUANG; Junlong ZHOU; Bin LI; HOI, Steven C. H.; and Shuigeng ZHOU Journal Article

PDF

Robust Repositioning to Counter Unpredictable Demand in Bike Sharing Systems, Supriyo GHOSH, Michael TRICK, and Pradeep VARAKANTHAM Conference Proceeding Article

PDF

Satisfiability modulo heap-based programs, Quang Loc LE, Jun SUN, and Wei-Ngan CHIN Conference Proceeding Article

PDF

Scalable greedy algorithms for task/resource constrained multi-agent stochastic planning, Pritee AGRAWAL, Pradeep VARAKANTHAM, and William YEOH Conference Proceeding Article

PDF

Self-regulated incremental clustering with focused preferences, Di WANG and Ah-hwee TAN Conference Proceeding Article

PDF

Sequential decision making for improving efficiency in urban environments, Pradeep VARAKANTHAM Conference Proceeding Article

PDF

STPP: Spatial-Temporal Phase Profiling based method for relative RFID tag localization, Longfei SHANGGUAN, Zheng YANG, Alex X. LIU, Zimu ZHOU, and Yunhao LIU Journal Article

PDF

The Effects of Multiple Query Evidences on Social Image Retrieval, Zhiyong CHENG, Jialie SHEN, and Haiyan MIAO Journal Article

PDF

The impact of NASD Rule 2711 and NYSE Rule 472 on analyst behavior: The strategic timing of recommendations issued on weekends, Yi DONG and Nan HU Journal Article

PDF

The impact of security cues on user perceived security in e-commerce, Samuel N. SMITH, Fiona Fui-hoon NAH, and Maggie X. CHENG Conference Proceeding Article

PDF

Three strategies to success: Learning adversary models in security games, Nika HAGHTALAB, Fei FANG, Thanh Hong NGUYEN, Arunesh SINHA, Ariel D. PROCACCIA, and Milind TAMBE Conference Proceeding Article

Understanding gender differences in media perceptions of hedonic systems: A comparison of 2D versus 3D media, Fiona Fui-hoon NAH and Brenda ESCHENBRENNER Journal Article

PDF

Where is the goldmine? Finding promising business locations through Facebook data analytics, Jovian LIN, Richard OENTARYO, Ee-peng LIM, Casey VU, Adrian VU, and Agus Kwee Conference Proceeding Article

PDF

Which information sources are more effective and reliable in video search, CHENG ZHIYONG, Xuanchong LI, Jialie SHEN, and Alexander G. Hauptmann Conference Proceeding Article

PDF

Word clouds with latent variable analysis for visual comparison of documents, Tuan M. V. LE and Hady W. LAUW Conference Proceeding Article

It takes two to tango: Deleted Stack Overflow question prediction with text and meta features, Xin XIA, David LO, Denzil CORREA, Ashish SUREKA, and Emad SHIHAB Conference Proceeding Article

PDF

An interference-free programming model for network objects, Mischael SCHILL, Christopher M. POSKITT, and Bertrand MEYER Conference Proceeding Article

Elevating communication, collaboration, and shared experiences in mobile video through drones, Brennan JONES, Kody DILLMAN, Richard TANG, Anthony TANG, Ehud SHARLIN, Lora OEHLBERG, Carman NEUSTAEDTER, and Scott BATEMAN Conference Proceeding Article

PDF

Adaptable key-policy attribute-based encryption with time interval, Siqi MA; Junzuo LAI; DENG, Robert H.; and Xuhua DING Journal Article

PDF

An Economic Analysis of Consumer Learning for Online Entertainment Shopping, Jin LI, Zhiling GUO, and Geoffrey K.F. TSO Conference Proceeding Article

PDF

An Experimental Investigation of Product Competition and Marketing in Social Networks, Cen CHEN, Zhiling GUO, Shih-Fen CHENG, and Hoong Chuin LAU Conference Proceeding Article

PDF

Automated identification of high impact bug reports leveraging imbalanced learning strategies, Xinli YANG, David LO, Qiao HUANG, Xin XIA, and Jianling SUN Conference Proceeding Article

PDF

CACE: Exploiting behavioral interactions for improved activity recognition in multi-inhabitant smart homes, Mohammad Arif Ul Alam, Nirmalya ROY, Archan MISRA, and Joseph TAYLOR Conference Proceeding Article

PDF

CDRep: Automatic repair of cryptographic-misuses in Android applications, Siqi MA, David LO, Teng LI, and Robert H. DENG Conference Proceeding Article

PDF

Collective rumor correction on the death hoax of a political figure in social media, Alton Y. K. CHUA, Sin-Mei CHEAH, Dion Hoe-Lian GOH, and Ee-peng LIM Conference Proceeding Article

PDF

Condensing class diagrams with minimal manual labeling cost, Xinli YANG, David LO, Xin XIA, and Jianling SUN Conference Proceeding Article

PDF

Deduplication on encrypted big data in cloud, Zheng YAN; Wenxiu DING; Xixun YU; Haiqi ZHU; and DENG, Robert H. Journal Article

PDF

DeepSense: A GPU-based deep convolutional neural network framework on commodity mobile devices, HUYNH NGUYEN LOC, Rajesh Krishna BALAN, and Youngki LEE Conference Proceeding Article

PDF

Demo: Drumming application using commodity wearable devices, Bharat DWIVEDI, Archan MISRA, and Youngki LEE Conference Proceeding Article

PDF

Demo: GPU-based image recognition and object detection on commodity mobile devices, Loc Nguyen HUYNH, Rajesh Krishna BALAN, and Youngki LEE Conference Proceeding Article

PDF

Demo: Multi-device gestural interfaces, TRAN HUY VU, Youngki LEE, and Archan MISRA Conference Proceeding Article

PDF

Demo: Smartwatch based shopping gesture recognition, Meeralakshmi RADHAKRISHNAN, Sharanya ESWARAN, Sougata SEN, Vigneshwaran SUBBARAJU, Archan MISRA, and Rajesh Krishna BALAN Conference Proceeding Article

PDF

Demo: TA$Ker: Campus-scale mobile crowd-tasking platform, Nikita JAIMAN, Thivya KANDAPPU, Randy TANDRIANSYAH, and Archan MISRA Conference Proceeding Article

PDF

Demo: Wearable application to manage problem behavior in children with neurodevelopmental disorders, Camellia ZAKARIA and Richard C. DAVIS Conference Proceeding Article

PDF

Designing and comparing multiple portfolios of parameter configurations for online algorithm selection, Aldy GUNAWAN, Hoong Chuin LAU, and Mustafa MISIR Conference Proceeding Article

PDF

(Deterministic) hierarchical identity-based encryption from learning with rounding over small modulus, Fuyang FANG, Bao LI, Xianhui LU, Yamin LIU, Dingding JIA, and Haiyang XUE Conference Proceeding Article

DPBT: A System for Detecting Pacemakers in Burst Topics, Guozhong DONG, Wu YANG, Feida ZHU, and Wei WANG Conference Proceeding Article

PDF

Dual formulations for optimizing Dec-POMDP controllers, Akshat KUMAR, Hala MOSTAFA, and Shlomo ZILBERSTEIN Conference Proceeding Article

PDF

Efficient multi-class selective sampling on graphs, Peng YANG; Peilin ZHAO; Zhen HAI; Wei LIU; HOI, Steven C. H.; and Xiao-Li LI Conference Proceeding Article

PDF

Event detection with zero example: Select the right and suppress the wrong concepts, Yi-Jie LU, Hao ZHANG, Maaike DE BOER, and Chong-wah NGO Conference Proceeding Article

PDF

Exemplar-driven top-down saliency detection via deep association, Shengfeng HE, Rynson W. H. LAU, and Qingxiong YANG Conference Proceeding Article

PDF

Finding the shortest path in stochastic vehicle routing: A cardinality minimization approach, Zhiguang CAO, Hongliang GUO, Jie ZHANG, Dusit NIYATO, and Ulrich Fastenrath FASTENRATH Journal Article

PDF

Fusing WiFi and video sensing for accurate group detection in indoor spaces, Kasthuri JAYARAJAH, Zaman LANTRA, and Archan MISRA Conference Proceeding Article

PDF

Geometric Aspects and Auxiliary Features to Top-k Processing [Advanced Seminar], Kyriakos MOURATIDIS Conference Proceeding Article

PDF

HCI testing in laboratory or field settings, Chuan-Hoo TAN, Austin SILVA, Rich LEE, Kanliang WANG, and Fiona Fui-hoon NAH Conference Proceeding Article

PDF

How long will this live? Discovering the lifespans of software engineering ideas, Subhajit DATTA, Santonu SARKAR, and A. S. M Sajeev Journal Article

PDF

ICCDetector: ICC-based malware detection on Android, Xu KE, Yingjiu LI, and Robert H. DENG Journal Article

PDF

Indoor location error-detection via crowdsourced multi-dimensional mobile data, Savina SINGLA and Archan MISRA Conference Proceeding Article

PDF

Jasper: Sensing gamers' emotions using physiological sensors, Sinh HUYNH, Youngki LEE, Taiwoo PARK, and Rajesh Krishna BALAN Conference Proceeding Article

PDF

Learning natural language inference with LSTM, Shuohang WANG and Jing JIANG Conference Proceeding Article

PDF

LiveLabs: Building in-situ mobile sensing and behavioural experimentation testbeds, Kasthuri JAYARAJAH, Rajesh Krishna BALAN, Meera RADHAKRISHNAN, Archan MISRA, and Youngki LEE Conference Proceeding Article

PDF

MobiPot: Understanding Mobile Telephony Threats with Honeycards, Marco BALDUZZI, Payas GUPTA, Lion GU, Debin GAO, and Mustaque AHAMAD Conference Proceeding Article

MobiPot: Understanding Mobile Telephony Threats with Honeycards, Marco BALDUZZI, Payas GUPTA, Lion GU, Debin GAO, and Mustaque AHAMAD Conference Proceeding Article

On the use of commonsense ontology for multimedia event recounting, Chun-Chet TAN and Chong-wah NGO Journal Article

PDF

Patient engagement in the medical facility waiting room using gamified healthcare information delivery, Raheel HASSAN, Nathan W. TWYMAN, Fiona Fui-hoon NAH, and Keng SIAU Conference Proceeding Article

PDF

Poster: A device-free evaluation system for gymnastics using passive RFID tags, Binbin XIE, Jie XIONG, Dingyi FANG, Xiaojiang CHEN, Anwen WANG, and Zhanyong TANG Conference Proceeding Article

PDF

Poster: Air quality friendly route recommendation system, Savina SINGLA, Divya BANSAL, and Archan MISRA Conference Proceeding Article

PDF

Poster: Android whole-system control flow analysis for accurate application behavior modeling, Huu Hoang NGUYEN Conference Proceeding Article

PDF

Poster: Improving communication and communicability with smarter use of text-based messages on mobile and wearable devices, Kenny T. W. CHOO Conference Proceeding Article

PDF

Poster: Sonicnect: Accurate hands-free gesture input system with smart acoustic sensing, Maotian CHANG, Ping LI, Panlong YANG, Jie XIONG, and Chang TIAN Conference Proceeding Article

PDF

Protecting the NECTAR of the Ganga River through game-theoretic factory inspections, Benjamin FORD, Matthew BROWN, Amulya YADAV, Amandeep SINGH, Arunesh SINHA, Biplav SRIVASTAVA, Christopher KIEKINTVELD, and TAMBE MILLIND Conference Proceeding Article

PDF

QCRI at SemEval-2016 Task 4: Probabilistic Methods for Binary and Ordinal Quantification, Giovanni Da San MARTINO, Wei GAO, and Fabrizio SEBASTIANI Conference Proceeding Article

PDF

Recipient revocable identity-based broadcast encryption: How to revoke some recipients in IBBE without knowledge of the plaintext, Willy SUSILO, Guomin YANG, Rongmao CHEN, Yi MU, Fuchun GUO, and Yang-Wai CHOW Conference Proceeding Article

PDF

Robust Partial Order Schedules for RCPSP/max with Durational Uncertainty, Na FU, Pradeep VARAKANTHAM, and Hoong Chuin LAU Conference Proceeding Article

PDF

Seeking independent management of problem behavior: A proof-of-concept study with children and their teachers, Camellia ZAKARIA, Richard C. DAVIS, and Zachary WALKER Conference Proceeding Article

PDF

Self-organizing neural network for adaptive operator selection in evolutionary search, Teck Hou TENG, Stephanus Daniel HANDOKO, and Hoong Chuin LAU Conference Proceeding Article

PDF

Serendipity-driven celebrity video hyperlinking, Shujun YANG, Lei PANG, Chong-wah NGO, and Benoit HUET Conference Proceeding Article

PDF

Small scale deployment of seat occupancy detectors, Nguyen Huy Hoang HUY, Gihan HETTIARACHCHI, Youngki LEE, and Rajesh Krishna BALAN Conference Proceeding Article