The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2021

PDF

InferCode: Self-supervised learning of code representations by predicting subtrees, Duy Quoc Nghi BUI, Yijun YU, and Lingxiao JIANG Conference Proceeding Article

PDF

Interactive search vs. automatic search: An extensive study on video retrieval, Phuong-Anh NGUYEN and Chong-wah NGO Journal Article

PDF

Learning index policies for restless bandits with application to maternal healthcare, Arpita BISWAS, Gaurav AGGARWAL, Pradeep VARAKANTHAM, and Milind TAMBE Conference Proceeding Article

PDF

Leveraging multiple relations for fashion trend forecasting based on social media, Yujuan DING, Yunshan MA, Lizi LIAO, Wai Keung WONG, and Tat-Seng CHUA Journal Article

PDF

Low-power downlink for the Internet of Things using IEEE 802.11-compliant wake-up receivers, Johannes BLOBEL, Vu Huy TRAN, Archan MISRA, and Falko DRESSLER Conference Proceeding Article

PDF

More Kawaii than a real-person live streamer: Understanding how the Otaku Community engages with and perceives virtual YouTubers, Zhicong LU, Chenxinran SHEN, Jiannan LI, Hong SHEN, and Daniel WIGDOR Conference Proceeding Article

Link

OIDPR: Optimized insulin dosage via privacy‐preserving reinforcement learning, Zuobin YING, Yun ZHANG, Shuanglong CAO, Shengmin XU, and Maode MA Journal Article

PDF

On decentralization of bitcoin: An asset perspective, Ling CHENG, Feida ZHU, Huiwen LIU, and Chunyan MIAO Working Paper

PDF

On the root of trust identification problem, Ivan De Oliveira NUNES, Xuhua DING, and Gene TSUDIK Conference Proceeding Article

PDF

Prototypical contrastive learning of unsupervised representations, Junnan LI, Pan ZHOU, Caiming XIONG, and Steven C. H. HOI Conference Proceeding Article

PDF

Research artifact: The potential of meta-maintenance on GitHub, Hideaki HATA, Raula KULA, Takashi ISHIO, and Christoph TREUDE Conference Proceeding Article

PDF

Retrieval-augmented generation for code summarization via hybrid GNN, Shangqing LIU, Yu CHEN, Xiaofei XIE, Jingkai SIOW, and Yang LIU Conference Proceeding Article

PDF

RobOT: Robustness-oriented testing for deep learning systems, Jingyi WANG, Jialuo CHEN, Youcheng SUN, Xingjun MA, Dongxia WANG, Jun SUN, and Peng CHENG Conference Proceeding Article

PDF

Same file, different changes: The potential of meta-maintenance on GitHub, Hideaki HATA, Raula KULA, Takashi ISHIO, and Christoph TREUDE Conference Proceeding Article

PDF

SGUARD: Towards fixing vulnerable smart contracts automatically, Tai D. NGUYEN, Long H. PHAM, and Jun SUN Conference Proceeding Article

PDF

Ship-GAN: Generative modeling based maritime traffic simulator, Chaithanya Shankaramurthy BASRUR, ARAMBAM JAMES SINGH, Arunesh SINHA, and Akshat KUMAR Conference Proceeding Article

PDF

Ship-GAN: Generative modeling based maritime traffic simulator, Chaithanya BASRUR, Arambam James SINGH, Arunesh SINHA, and Akshat KUMAR Conference Proceeding Article

PDF

Smart contract security: A practitioners' perspective, Zhiyuan WAN, Xin XIA, David LO, Jiachi CHEN, Xiapu LUO, and Xiaohu YANG Conference Proceeding Article

PDF

Solving 3D bin packing problem via multimodal deep reinforcement learning, Yuan JIANG, Zhiguang CAO, and Jie ZHANG Conference Proceeding Article

PDF

Tensor low-rank representation for data recovery and clustering, Pan ZHOU, Canyi LU, Jiashi FENG, Zhouchen LIN, and Shuicheng YAN Journal Article

PDF

The shifting sands of motivation: Revisiting what drives contributors in open source, Marco GEROSA, Igor WIESE, Bianca TRINKENREICH, Georg LINK, Gregorio ROBLES, Christoph TREUDE, Igor STEINMACHER, and Anita SARMA Conference Proceeding Article

PDF

TRIPDECODER: Study travel time attributes and route preferences of metro systems from smart card data, Xiancai TIAN, Baihua ZHENG, Yazhe WANG, Hsao-Ting HUANG, and Chih-Cheng HUNG Journal Article

PDF

Unveiling the mystery of API evolution in deep learning frameworks: A case study of Tensorflow 2, Zejun ZHANG, Yanming YANG, Xin XIA, David LO, Xiaoxue REN, and John C. GRUNDY Conference Proceeding Article

PDF

Visuo-haptic Illusions for Linear Translation and Stretching using Physical Proxies in Virtual Reality, Martin FEICK, Niko KLEER, André ZENNER, Anthony TANG, and Antonio KRUGER Conference Proceeding Article

PDF

When function signature recovery meets compiler optimization, Yan LIN and Debin GAO Conference Proceeding Article

PDF

Working with smart machines: Insights on the future of work, Thomas H. DAVENPORT and Steven M. MILLER Magazine Article

Integration of professional certifications with information systems business analytics track curriculum, Kyong Jin SHIM, GOTTIPATI Swapna, and Yi Meng LAU Conference Proceeding Article

Mask-shadownet: Toward shadow removal via masked adaptive instance normalization, Shengfeng HE, Bing PENG, Junyu DONG, and Yong DU Journal Article

PDF

A fully dynamic algorithm for k-regret minimizing sets, Yanhao WANG, Yuchen LI, Raymond CHI-WING WONG, and Kian-Lee TAN Conference Proceeding Article

PDF

Boundary precedence image inpainting method based on self-organizing maps, Haibo PEN, Quan WANG, and Zhaoxia WANG Journal Article

PDF

Breaking neural reasoning architectures with metamorphic relation-based adversarial examples, Alvin CHAN, Lei MA, Felix JUEFEI-XU, Yew-Soon ONG, Xiaofei XIE, Minhui XUE, and Yang LIU Journal Article

PDF

Cross-topic rumor detection using topic-mixtures, Weijieying REN, Jing JIANG, Ling Min Serena KHOO, and Hai Leong CHIEU Conference Proceeding Article

PDF

DBL: Efficient reachability queries on dynamic graphs, Qiuyi LYU, Yuchen LI, Bingsheng HE, and Bin GONG Conference Proceeding Article

PDF

Detection of social identification in workgroups from a passively-sensed WiFi infrastructure, Camelia ZAKARIA, Youngki LEE, and Rajesh Krishna BALAN Journal Article

PDF

DisMASTD: An efficient distributed multi-aspect streaming tensor decomposition, Keyu YANG, Yunjun GAO, Yifeng SHEN, Baihua ZHENG, and Lu CHEN Conference Proceeding Article

PDF

Do users care about ad's performance costs? Exploring the effects of the performance costs of in-app ads on user experience, Cuiyun GAO, Jichuan ZENG, Federica SARRO, David LO, Irwin KING, and Michael R. LYU Journal Article

PDF

DRAM failure prediction in AIOps: Empirical evaluation, challenges and opportunities, Zhiyue WU, Hongzuo XU, Guansong PANG, Fengyuan YU, Yijie WANG, Songlei JIAN, and Yongjun WANG Working Paper

PDF

DyCuckoo: Dynamic hash tables on GPUs, Yuchen LI, Qiwei ZHU, Zheng LYU, Zhongdong HUANG, and Jianling SUN Conference Proceeding Article

PDF

Efficient retrieval of matrix factorization-based top-k recommendations: A survey of recent approaches, Duy Dung LE and Hady W. LAUW Journal Article

PDF

ENCONTER: Entity constrained progressive sequence generation via insertion-based transformer, Lee Hsun HSIEH, Yang Yin LEE, and Ee-Peng LIM Conference Proceeding Article

PDF

Escape from an echo chamber, Kuan-Chieh LO, Shih-Chieh DAI, Aiping XIONG, Jing JIANG, and Lun-Wei KU Conference Proceeding Article

Link

Glassdoor job description analytics: Analyzing data science professional roles and skills, Swapna GOTTIPATI, Kyong Jin SHIM, and Sarthak SAHOO Conference Proceeding Article

PDF

Homophily outlier detection in non-IID categorical data, Guansong PANG, Longbing CAO, and Ling CHEN Journal Article

PDF

How successful are open source contributions from countries with different levels of human development?, Leonardo FURTADO, Bruno CARTAXO, Christoph TREUDE, and Gustavo PINTO Magazine Article

Intangible asset value of employee satisfaction in high-contact services, Ruirui FANG, Baojun GAO, and Nan HU Journal Article

PDF

IoTBox: Sandbox Mining to Prevent Interaction Threats in IoT Systems, Hong Jin KANG, Sheng Qin SIM, and David LO Conference Proceeding Article

PDF

Learning network-based multi-modal mobile user interface embeddings, Gary ANG and Ee-Peng LIM Conference Proceeding Article

PDF

Looking back! Using early versions of Android apps as attack vectors, Yue ZHANG; Jian WENG; Jia-Si WNEG; Lin HOU; Anjia YANG; Ming LI; Yang XIANG; and DENG, Robert H. Journal Article

PDF

Mixed dish recognition with contextual relation and domain alignment, Lixi DENG, Jingjing CHEN, Chong-wah NGO, Qianru SUN, Sheng TANG, Yongdong ZHANG, and Tat-Seng CHUA Journal Article

PDF

Multi-domain dialogue state tracking with recursive inference, Lizi LIAO, Tongyao ZHU, Le Hong LONG, and Tat-Seng CHUA Conference Proceeding Article

PDF

NewsLink: Empowering intuitive news search with knowledge graphs, Yueji YANG, Yuchen LI, and Anthony TUNG Conference Proceeding Article

PDF

Out of sight, out of mind? How vulnerable dependencies affect open-source projects, Gede Artha Azriadi PRANA, Abhishek SHARMA, Lwin Khin SHAR, Darius FOO, Andrew E. SANTOSA, Asankhaya SHARMA, and David LO Journal Article

PDF

Practical server-side WiFi-based indoor localization: Addressing cardinality & outlier challenges for improved occupancy estimation, Anuradha RAVI and Archan MISRA Journal Article

PDF

PrivacyPrimer: Towards privacy-preserving Episodic memory support for older adults, Thivya KANDAPPU, Vigneshwaran SUBBARAJU, and Qianli XU Journal Article

PDF

Research commentary on IS/IT role in emergency and pandemic management: current and future research, W. L. SHIAU, Keng SIAU, Y. YU, and J. GUO Journal Article

PDF

Robust and universal seamless handover authentication in 5G HetNets, Yinghui ZHANG, Robert H. DENG, Elisa BERTINO, and Dong ZHENG Journal Article

Secure collaborative deep learning against GAN attacks in the internet of things, Zhenzhu CHEN, Anmin FU, Yinghui ZHANG, Zhe LIU, Fanjian ZENG, and Robert H. DENG Journal Article

PDF

Sentiment-oriented metric learning for text-to-image retrieval, Quoc Tuan TRUONG and Hady W. LAUW Conference Proceeding Article

PDF

SpecTest: Specification-based compiler testing, Richard SCHUMI and Jun SUN Conference Proceeding Article

PDF

Spectral tensor train parameterization of deep learning layers, A. OBUKHOV, M. RAKHUBA, A. LINIGER, Zhiwu HUANG, S. GEORGOULIS, D. DAI, and VAN Gool L. Conference Proceeding Article

PDF

Time period-based top-k semantic trajectory pattern query, Munkh-Erdene YADAMJAV, Farhana Murtaza CHOUDHURY, Zhifeng BAO, and Baihua ZHENG Conference Proceeding Article

PDF

TOUR: Dynamic topic and sentiment analysis of user reviews for assisting app release, Tianyi YANG, Cuiyun GAO, Jingya ZANG, David LO, and Michael R. LYU Conference Proceeding Article

PDF

Towards efficient motif-based graph partitioning: An adaptive sampling approach, Shixun HUANG, Yuchen LI, Zhifeng BAO, and Zhao LI Conference Proceeding Article

PDF

Urban perception: Sensing cities via a deep interactive multi-task learning framework, Weili GUAN, Zhaozheng CHEN, Fuli FENG, Weifeng LIU, and Liqiang NIE Journal Article

PDF

Weakly supervised segmentation via instance-aware propagation, Huang XIN, Qianshu ZHU, Yongtuo LIU, and Shengfeng HE Journal Article

Interactional motifs: Leveraging risks in large and distributed software development teams, Subhajit DATTA, Amrita BHATTACHARJEE, and Subhashis MAJUMDER Book Chapter

PDF

Adaptive simultaneous pervasive visible light communication and sensing, Ila Nitin GOKARN and Archan MISRA Conference Proceeding Article

PDF

All the wiser: Fake news intervention using user reading preferences, Kuan Chieh LO, Shih Chieh DAI, Aiping XIONG, Jing JIANG, and Lun Wei KU Conference Proceeding Article

Link

Assessing code clone harmfulness: Indicators, factors, and counter measures, Bin HU, Yijian WU, Xin PENG, Jun SUN, Nanjie ZHAN, and Jun WU Conference Proceeding Article

PDF

Bilateral variational autoencoder for collaborative filtering, Quoc Tuan TRUONG, Aghiles SALAH, and Hady W. LAUW Conference Proceeding Article

PDF

Call for papers—Special issue of service Science: Innovation in transportation-enabled urban services, Niels AGATZ, Soo-Haeng CHO, Hai WANG, and Saif BENJAAFAR Journal Article

PDF

Can we classify cashless payment solution implementations at the country level?, Dennis NG, Robert J. KAUFFMAN, and Paul Robert GRIFFIN Journal Article

PDF

Combining query reduction and expansion for text-retrieval-based bug localization, Juan Manuel FLOREZ, Oscar CHAPARRO, Christoph TREUDE, and Andrian MARCUS Conference Proceeding Article

PDF

DeepIS: Susceptibility estimation on social networks, Wenwen XIA, Yuchen LI, Jun WU, and Shenghong LI Conference Proceeding Article

PDF

Deep learning for anomaly detection: Challenges, methods, and opportunities, Guansong PANG, Longbing CAO, and Charu AGGARWAL Conference Proceeding Article

PDF

Enhancing healthcare professional and caregiving staff informedness with data analytics for chronic disease management, Na Liu and Robert John KAUFFMAN Journal Article

PDF

Explainable recommendation with comparative constraints on product aspects, Trung-Hoang LE and Hady W. LAUW Conference Proceeding Article

PDF

Fast scene labeling via structural inference, Huaidong ZHANG, Chu HAN, Xiaodan ZHANG, Yong DU, Xuemiao XU, Guoqiang HAN, Jing QIN, and Shengfeng HE Journal Article

PDF

How do monetary incentives influence giving? An empirical investigation of matching subsidies on kiva, Zhiyuan GAO, Zhiling GUO, and Qian TANG Journal Article

PDF

How do users answer MATLAB questions on Q&A sites? A case study on stack overflow and MathWorks, Mahshid NAGHASHZADEH, Amir HAGSHENAS, Ashkan SAMI, and David LO Conference Proceeding Article

PDF

Improving multi-hop knowledge base question answering by learning intermediate supervision signals, Gaole HE, Yunshi LAN, Jing JIANG, Wayne Xin ZHAO, and Ji Rong WEN Conference Proceeding Article

PDF

Improving neural network verification through spurious region guided refinement, Pengfei YANG, Renjue LI, Jianlin LI, Cheng Chao HUANG, Jingyi WANG, Jun SUN, Bai XUE, and Lijun ZHANG Conference Proceeding Article

PDF

Investigating the adoption of hybrid encrypted cloud data deduplication with game theory, Xueqin LIANG, Zheng YAN, Robert H. DENG, and Qinghu ZHENG Journal Article

PDF

Is the ground truth really accurate? Dataset purification for automated program repair, Deheng YANG, Yan LEI, Xiaoguang MAO, David LO, Huan XIE, and Meng YAN Conference Proceeding Article

PDF

Learning to assess the quality of stroke rehabilitation exercises, Min Hun LEE, Daniel P. SIEWIOREK, Asim SMAILAGIC, Alexandre BERNARDINO, and Sergi Bermúdez i BADIA Conference Proceeding Article

PDF

Outsourcing life cycle model for financial services in the FinTech era, Tristan LIM and Patrick THNG Conference Proceeding Article

PDF

Populist supporters on Reddit: A comparison of content and behavioral patterns within publics of supporters of Donald Trump and Hillary Clinton, Andreas JUNGHERR, Oliver POSEGGA, and Jisun AN Journal Article

PDF

Privacy-preserving federated deep learning with irregular users, Guowen XU, Hongwei LI, Yun ZHANG, Shengmin XU, Jianting NING, and Robert H. DENG Journal Article

PDF

Privacy-preserving multi-keyword searchable encryption for distributed systems, Xueqiao LIU, Guomin YANG, Willy SUSILO, Joseph TONIEN, and Jian SHEN Journal Article

PDF

Recent advances on intelligent mobility and edge computing, Xun Shao, Zhi Liu, Xianfu Chen, Seng W. Loke, and Hwee-pink TAN Transcript

PDF

Singapore Airlines: Profit recovery and aircraft allocation models during the COVID-19 pandemic, Michelle L. F. CHEONG, Ulysses M. Z. CHONG, Anne N. T. A. NGUYEN, Su Yiin ANG, Gabriella P. DJOJOSAPUTRO, Gordy ADIPRASETYO, and Kendra L. B. GADONG Conference Proceeding Article

PDF

Structurally enriched entity mention embedding from semi-structured textual content, Lee Hsun HSIEH, Yang Yin LEE, and Ee-Peng LIM Conference Proceeding Article

PDF

Traceable Monero: Anonymous cryptocurrency with enhanced accountability, Yannan LI, Guomin YANG, Wily SUSILO, Yong YU, Man Ho AU, and Dongxi LIU Journal Article

PDF

Waste collection routing problem: A mini-review of recent heuristic approaches and applications, Yun-Chia LIANG, Vanny MINANDA, and Aldy GUNAWAN Journal Article

PDF

Accelerating large-scale heterogeneous interaction graph embedding learning via importance sampling, Yugang JI, Mingyang YIN, Hongxia YANG, Jingren ZHOU, Vincent W. ZHENG, Chuan SHI, and Yuan FANG Journal Article

PDF

Adversarial meta sampling for multilingual low-resource speech recognition, Yubei XIAO, Ke GONG, Pan ZHOU, Guolin ZHENG, Xiaodan LIANG, and Liang LIN Conference Proceeding Article

PDF

An exploratory study on the introduction and removal of different types of technical debt in deep learning frameworks, Jiakun LIU, Qiao HUANG, Xin XIA, Emad SHIHAB, David LO, and Shanping LI Journal Article

PDF

A qualitative evaluation of SMU’s peer helpers programme, Loon Beng Angela KOH and Michelle LF CHEONG Journal Article

PDF

Decision-guided weighted automata extraction from recurrent neural networks, Xiyue ZHANG, Xiaoning DU, Xiaofei XIE, Lei MA, Yang LIU, and Meng SUN Conference Proceeding Article

PDF

Differential training: A generic framework to reduce label noises for Android malware detection, Jiayun XU, Yingjiu LI, and Robert H. DENG Conference Proceeding Article