Submissions from 2020
An accurate solution to the cardinality-based punctuality problem, Zhiguang CAO, Yaoxin WU, Akshay RAO, Felix KLANNER, Stefan ERSCHEN, Wei CHEN, Le ZHANG, and Hongliang GUO Journal Article
Analysis of online posts to discover student learning challenges and inform targeted curriculum improvement actions, Michelle L. F. CHEONG, Jean Y. C. CHEN, and Bingtian DAI Conference Proceeding Article
A near-optimal change-detection based algorithm for piecewise-stationary combinatorial semi-bandits, Huozhi ZHOU, Lingda WANG, Lav N. VARSHNEY, and Ee-Peng LIM Conference Proceeding Article
Artificial intelligence for social impact: Learning and planning in the data-to-deployment pipeline, Andrew Perrault, Fei FANG, Arunesh SINHA, and Milind TAMBE Journal Article
A social network analysis of jobs and skills, Derrick Ming Yang LEE, Dion Wei Xuan ANG, Grace Mei Ching PUA, Lee Ning NG, Sharon PURBOWO, Eugene Wen Jia CHOY, and Kyong Jin SHIM Conference Proceeding Article
A study of multi-task and region-wise deep learning for food ingredient recognition, Jingjing CHEN, Bin ZHU, Chong-wah NGO, Tat-Seng CHUA, and Yu-Gang JIANG Journal Article
Audee: Automated testing for deep learning frameworks, Qianyu GUO, Xiaofei XIE, Yi LI, Xiaoyu ZHANG, Yang LIU, Xiaohong LI, and Chao SHEN Conference Proceeding Article
Blockchain-based public auditing and secure deduplication with fair arbitration, Haoran YUAN, Xiaofeng CHEN, Jianfeng WANG, Jiaming YUAN, Hongyang YAN, and Willy SUSILO Journal Article
Business practice of social media - Platform and customer service adoption, Shujing SUN, Yang GAO, and Huaxia RUI Conference Proceeding Article
Causal intervention for weakly-supervised semantic segmentation, ZHANG Dong, Hanwang ZHANG, Jinhui TANG, Xian-Sheng HUA, and Qianru SUN Conference Proceeding Article
Co-embedding attributed networks with external knowledge, Pei-Chi LO and Ee peng LIM Conference Proceeding Article
Co-embedding attributed networks with external knowledge, Pei-chi LO and Ee-peng LIM Conference Proceeding Article
Debunking rumors on Twitter with tree transformer, Jing MA and Wei GAO Conference Proceeding Article
DeepFacade: A deep learning approach to facade parsing with symmetric loss, Hantang LIU, Yinghao XU, Jialiang ZHANG, Jianke ZHU, Yang LI, and Steven C. H. HOI Journal Article
Deep multi-task learning for depression detection and prediction in longitudinal data, Guansong PANG, Ngoc Thien Anh PHAM, Emma BAKER, Rebecca BENTLEY, and Anton Van Den HENGEL Working Paper
Design of a two-echelon freight distribution system in an urban area considering third-party logistics and loading-unloading zones, Vincent F. YU, WINARNO, Shih-Wei LIN, and Aldy GUNAWAN Journal Article
Differential privacy protection over deep learning: An investigation of its impacted factors, Ying LIN, Ling-Yan BAO, Ze-Minghui LI, Shu-Sheng SI, and Chao-Hsien CHU Journal Article
Digital social listening on conversations about sexual harassment, Xuesi SIM, Ern Rae CHANG, Yu Xiang ONG, Jie Ying YEO, Christine Bai Shuang YAN, Eugene Wen Jia CHOY, and Kyong Jin SHIM Conference Proceeding Article
Driving cybersecurity policy insights from information on the Internet, Qiu-hong WANG, Steven Mark MILLER, and Robert H. DENG Journal Article
Enabling collaborative video sensing at the edge through convolutional sharing, KASTHURI JAYARAJAH, WANNIARACHCHIGE DHANUJA THARITH WANNIARACHCHI, and Archan MISRA Working Paper
FHPT: Fine-grained EHR Sharing in e-healthcare cloud with hidden policy and traceability, Zuobin YING, Yuanping SI, MA Jianfeng, LIU Ximeng, and Shengmin XU Conference Proceeding Article
Generating concept based API element comparison using a knowledge graph, Yang LIU, Mingwei LIU, Xin PENG, Christoph TREUDE, Zhenchang XING, and Xiaoxin ZHANG Conference Proceeding Article
GraphMP: I/O-Efficient big graph analytics on a single commodity machine, Peng SUN, Yonggang WEN, Nguyen Binh Duong TA, and Xiaokui XIAO Journal Article
Heterogeneous univariate outlier ensembles in multidimensional data, Guansong PANG and Longbing CAO Journal Article
Identifying and characterizing alternative news media on Facebook, Samuel S. Guimaraes, Julia C. S. Reis, Lucas Lima, Filipe N. Ribeiro, Marisa Vasconcelos, Jisun AN, Haewoon KWAK, and Fabricio Benevenuto Conference Proceeding Article
Improving GAN training with probability ratio clipping and sample reweighting, Yue WU, Pan ZHOU, Andrew Wilson GORDON, Eric XING, and Zhiting HU Conference Proceeding Article
Interventional few-shot learning, Zhongqi YUE, ZHANG Hanwang, Qianru SUN, and Xian-Sheng HUA Conference Proceeding Article
Jointly optimizing sensing pipelines for multimodal mixed reality interaction, Ramesh Darshana Rathnayake KANATTA GAMAGE, Ashen DE SILVA, Dasun PUWAKDANDAWA, Lakmal MEEGAHAPOLA, Archan MISRA, and Indika PERERA Conference Proceeding Article
Jointly optimizing sensing pipelines for multimodal mixed reality interaction, Darshana RATHNAYAKE, Ashen DE SILVA, Dasun PUWAKDANDAWA, Lakmal MEEGAHAPOLA, Archan MISRA, and Indika PERERA Conference Proceeding Article
Learning to dispatch for job shop scheduling via deep reinforcement learning, Cong ZHANG, Wen SONG, Zhiguang CAO, Jie ZHANG, Puay Siew TAN, and Xu CHI Conference Proceeding Article
Lightning-fast and privacy-preserving outsourced computation in the cloud, Ximeng LIU, Robert H. DENG, Pengfei WU, and Yang YANG Journal Article
Nearest Centroid: A bridge between statistics and machine learning, Manoj THULASIDAS Conference Proceeding Article
Optimal collaborative path planning for unmanned surface vehicles carried by a parent boat along a planned route, Ari Carisza Graha PRASETIA, I-Lin WANG, and Aldy GUNAWAN Journal Article
Prediction of nocturia in live alone elderly using unobtrusive in-home sensors, Barry NUQOBA and Hwee-Pink TAN Conference Proceeding Article
Renewal of an information systems curriculum to support career based tracks: A case study, Swapna GOTTIPATI, Venky SHANKARARAMAN, and Kyong Jin SHIM Conference Proceeding Article
Robust, fine-grained occupancy estimation via combined camera & WiFi indoor localization, Anuradha RAVI and Archan MISRA Conference Proceeding Article
SADT: Syntax-aware differential testing of certificate validation in SSL/TLS Implementations, Lili QUAN, Qianyu GUO, Hongxu CHEN, Xiaofei XIE, Xiaohong LI, Yang LIU, and Jing HU Conference Proceeding Article
Secure and verifiable inference in deep neural networks, Guowen XU, Hongwei LI, Hao REN, Jianfei SUN, Shengmin XU, Jianting NING, Haoming YANG, Kan YANG, and Robert H. DENG Conference Proceeding Article
Secure answer book and automatic grading, Manoj THULASIDAS Conference Proceeding Article
Security analysis of permission re-delegation vulnerabilities in Android apps, Biniam Fisseha DEMISSIE, Mariano CECCATO, and Lwin Khin SHAR Journal Article
Sharper generalisation bounds for pairwise learning, Yunwen LEI, Antoine LEDENT, and Marius KLOFT Conference Proceeding Article
SmartFuzz: An automated smart fuzzing approach for testing SmartThings apps, Lwin Khin SHAR, Nguyen Binh Duong TA, Lingxiao JIANG, David LO, Wei MINN, Kiah Yong Glenn YEO, and Eugene KIM Conference Proceeding Article
Social media analytics: A case study of Singapore General Election 2020, Sebastian Zhi Tao KHOO, Leong Hock HO, Ee Hong LEE, Danston Kheng Boon GOH, Zehao ZHANG, Swee Hong NG, Haodi QI, and Kyong Jin SHIM Conference Proceeding Article
Supply chain hierarchical position and firms' information quality, Xuelian BAI, Ruirui FANG, Elaine HENRY, and Nan HU Journal Article
Theory-inspired path-regularized differential network architecture search, Pan ZHOU, Caiming XIONG, Richard SOCHER, and Steven C. H. HOI Conference Proceeding Article
The spatial and temporal impact of agricultural crop residual burning on local land surface temperature in three provinces across China from 2015 to 2017, Wenting ZHANG, Mengmeng YU, Qingqing HE, Tianwei WANG, Lu LIN, Kai CAO, Wei HUANG, Peihong FU, and Jiaxin CHEN Journal Article
Towards theoretically understanding why SGD generalizes better than ADAM in deep learning, Pan ZHOU, Jiashi FENG, Chao MA, Caiming XIONG, Steven C. H. HOI, and Weinan E Conference Proceeding Article
Understanding continuance intention toward crowdsourcing games: A longitudinal investigation, Xiaohui WANG, Dion Hoe-Lian GOH, and Ee-peng LIM Journal Article
Unsupervised domain adaptation via importance sampling, Xuemiao XU, Hai HE, Huaidong ZHANG, Yangyang XU, and Shengfeng HE Journal Article
Walls have ears: Eavesdropping user behaviors via graphics-interrupt-based side channel, Haoyu MA, Jianwen TIAN, Debin GAO, and JIA Chunfu Conference Proceeding Article
Watch out! Motion is blurring the vision of your deep neural networks, Qing GUO, Felix JUEFEI-XU, Xiaofei XIE, Lei MA, Jian WANG, Bing YU, Wei FENG, and Yang LIU Conference Proceeding Article
Super payment channel for decentralized cryptocurrencies, Shengmin XU, Jiaming YUAN, Yingjiu LI, Ximeng LIU, and Yinghui ZHANG Conference Proceeding Article
A geospatial analytics approach to delineate trade areas for Quick Service Restaurants (QSR) in Singapore, Hui Ting LIM Conference Proceeding Article
An empirical study of release note production and usage in practice, Tingting BI, Xin XIA, David LO, John GRUNDY, and Thomas ZIMMERMANN Journal Article
AnswerFact: Fact checking in product question answering, Wenxuan ZHANG, Yang DENG, Jing MA, and Wai LAM Conference Proceeding Article
API method recommendation via explicit matching of functionality verb phrases, Wenkai XIE, Xin PENG, Mingwei LIU, Christoph TREUDE, Zhenchang XING, Xiaoxin ZHANG, and Wenyun ZHAO Conference Proceeding Article
A secure flexible and tampering-resistant data sharing system for vehicular social networks, Jianfei SUN, Hu XIONG, Shufan ZHANG, Ximeng LIU, Jiaming YUAN, and Robert H. DENG Journal Article
A survey of typical attributed graph queries, Yanhao WANG, Yuchen LI, Ju FAN, Chang YE, and Mingke CHAI Journal Article
A theory of the engagement in open source projects via summer of code programs, Jefferson SILVA, Igor WIESE, Daniel M. GERMAN, Christoph TREUDE, Marco A. GEROSA, and Igor STEINMACHER Conference Proceeding Article
Attribute-based keyword search over hierarchical data in cloud computing, Yinbin MIAO, Jianfeng MA, Ximeng LIU, Xinghua LI, Qi JIANG, and Junwei ZHANG Journal Article
Base-package recommendation framework based on consumer behaviours in IPTV platform, Kuruparan SHANMUGALINGAM, Ruwinda RANGANAYANKE, Chanka GUNAWARDHAHA, and Rajitha NAVARATHNA Conference Proceeding Article
Beyond accuracy: Assessing software documentation quality, Christoph TREUDE, Justin MIDDLETON, and Thushari ATAPATTU Conference Proceeding Article
Boosting privately: Federated extreme gradient boosting for mobile crowdsensing, Yang LIU, Zhuo MA, Ximeng LIU, Siqi MA, Surya NEPAL, Robert H. DENG, and Kui REN Conference Proceeding Article
BugsInPy: A database of existing bugs in Python programs to enable controlled testing and debugging studies, Ratnadira WIDYASARI, Sheng Qin SIM, Camellia LOK, Haodi QI, Jack PHAN, Qijin TAY, Constance TAN, Fiona WEE, Jodie Ethelda TAN, Yuheng YIEH, Brian GOH, Ferdian THUNG, Hong Jin KANG, Thong HOANG, David LO, and Eng Lieh OUH Conference Proceeding Article
Capitalising product associations in a supermarket retail environment, Michelle L. F. CHEONG and Yong Qing CHIA Conference Proceeding Article
CoinWatch: A clone-based approach for detecting vulnerabilities in cryptocurrencies, Qingze HUM, Wei Jin TAN, Shi Ying TEY, Latasha LENUS, Ivan HOMOLIAK, Yun LIN, and Jun SUN Conference Proceeding Article
Cost-sensitive deep forest for price prediction, Chao MA, Zhenbing LIU, Zhiguang CAO, Wen SONG, Jie ZHANG, and Weiliang ZENG Journal Article
Coupled hierarchical transformer for stance-aware rumor verification in social media conversations, Jianfei YU, Jing JIANG, Ling Min Serena KHOO, Hai Leong CHIEU, and Rui XIA Conference Proceeding Article
Cross-thought for sentence encoder pre-training, Shuohang WANG, Yuwei FANG, Siqi SUN, Zhe GAN, Yu CHENG, Jingjing LIU, and Jing JIANG Conference Proceeding Article
DeepCommenter: A deep code comment generation tool with hybrid lexical and syntactical information, Boao LI, Meng YAN, Xin XIA, Xing HU, Ge LI, and David LO Conference Proceeding Article
Deep-learning-based app sensitive behavior surveillance for Android powered cyber-physical systems, Haoyu MA, Jianwen TIAN, Kefan QIU, David LO, Debin GAO, Daoyuan WU, Chunfu JIA, and Thar BAKER Journal Article
Effort-aware just-in-time defect identification in practice: A case study at Alibaba, Meng YAN, Xin XIA, Yuanrui FAN, David LO, Ahmed E. HASSAN, and Xindong ZHANG Conference Proceeding Article
Empowering Singapore’s SMEs: FinTech P2P lending — A lifeline for SMEs’ survival?, Grace LEE and Alan MEGARGEL Journal Article
Enhancing developer interactions with programming screencasts through accurate code extraction, Lingfeng BAO, Shengyi PAN, Zhenchang XING, Xin XIA, David LO, and Xiaohu YANG Conference Proceeding Article
ERICA: Enabling real-time mistake detection and corrective feedback for free-weights exercises, Meeralakshmi RADHAKRISHNAN, Darshana RATHNAYAKE, Koon Han ONG, Inseok HWANG, and Archan MISRA Conference Proceeding Article
Exploring and evaluating attributes, values, and structures for entity alignment, Zhiyuan LIU, Yixin CAO, Liangming PAN, Juanzi LI, Zhiyuan LIU, and Tat-Seng CHUA Conference Proceeding Article
Exploring the impact of COVID-19 on aviation industry: A text mining approach, GOTTIPATI Swapna, Kyong Jin SHIM, Weiling Angeline JIANG, and Sheng Wei Andre Justin LEE Conference Proceeding Article
Global context aware convolutions for 3D point cloud understanding, Zhiyuan ZHANG, Binh-Son HUA, Wei CHEN, Yibin TIAN, and Sai-Kit YEUNG Conference Proceeding Article
Highly efficient and scalable multi-hop ride-sharing, Yixin XU, Lars KULIK, Renata BOROVICA‐GAJIC, Abdullah ALDWYISH, and Jianzhong QI Conference Proceeding Article
How should we understand the digital economy in Asia? Critical assessment and research agenda, Kai LI, Dan J. KIM, Karl R. LANG, Robert J. KAUFFMAN, and Maurizio NALDI Journal Article
JITO: A tool for just-in-time defect identification and localization, Fangcheng QIU, Meng YAN, Xin XIA, Xinyu WANG, Yuanrui FAN, Ahmed E. HASSAN, and David LO Conference Proceeding Article
Learning personal conscientiousness from footprints in e-learning systems, Lo Pang-Yun TING, Shan Yun TENG, Kun Ta CHUANG, and Ee-Peng LIM Conference Proceeding Article
Leveraging profanity for insincere content detection: A neural network approach, Swapna GOTTIPATI, Annabel TAN, David Jing Shan CHOW, and Joel Wee Kiat LIM Conference Proceeding Article
Machine learning integrated design for additive manufacturing, Jingchao JIANG, Yi XIONG, Zhiyuan ZHANG, and David W. ROSEN Journal Article
Multi-hop inference for question-driven summarization, Yang DENG, Wenxuan ZHANG, and Wai LAM Conference Proceeding Article
Multi-user verifiable searchable symmetric encryption for cloud storage, Xueqiao LIU, Guomin YANG, and Guomin YANG Journal Article
Perceptions, expectations, and challenges in defect prediction, Zhiyuan WAN, Xin XIA, Ahmed E. HASSAN, David LO, Jianwei YIN, and Xiaohu YANG Journal Article
Reducing estimation bias via triplet-average deep deterministic policy gradient, Dongming WU, Xingping DONG, Jianbing SHEN, and Steven C. H. HOI Journal Article
Security analysis of permission re-delegation vulnerabilities in Android apps, Biniam Fisseha DEMISSIE, Mariano CECCATO, and Lwin Khin SHAR Journal Article
Selecting third-party libraries: The practitioners' perspective, Enrique Larios VARGAS, Maurício ANICHE, Christoph TREUDE, Magiel BRUNTINK, and Georgios GOUSIOS Conference Proceeding Article
Semi-analytical model for design and analysis of on-orbit servicing architecture, Koki HO, Hai WANG, Paul A. DE TREMPE, Tristan Sarton DU JONCHAY, and Kento TOMITA Journal Article
sFuzz: An efficient adaptive fuzzer for solidity smart contracts, Tai D. NGUYEN, Long H. PHAM, Jun SUN, Yun LIN, and Minh Quang TRAN Conference Proceeding Article
Tangi: Tangible proxies for embodied object exploration and manipulation in virtual reality, Martin FEICK, Scott BATEMAN, Anthony TANG, and Anthony TANG Conference Proceeding Article
Using data analytics to predict students score, Nang Laik MA and Gim Hong CHUA Working Paper
Activity river: Visualizing planned and logged personal activities for reflection, Bon Adriel ASENIERO, Charles PERIN, Wesley WILLETT, Anthony TANG, and Sheelagh CARPENDALE Conference Proceeding Article
Amora: Black-box adversarial morphing attack, Run WANG, Felix JUEFEI-XU, Qing GUO, Yihao HUANG, Xiaofei XIE, Lei MA, and Yang LIU Conference Proceeding Article
Annapurna: An automated smartwatch-based eating detection and food journaling system, Sougata SEN, Vigneshwaran SUBBARAJU, Archan MISRA, Rajesh Krishna BALAN, and Youngki LEE Journal Article
Attribute-based fine-grained access control for outscored private set intersection computation, Mohammad ALI, MOHAJERI Javad, Mohammad-Reza SADEGHI, and Ximeng LIU Journal Article
Automated discussion analysis - Framework for knowledge analysis from class discussions, Swapna GOTTIPATI, Venky SHANKARARAMAN, and Mallikan GOKARN NITIN Conference Proceeding Article
Catch you if you deceive me: Verifiable and privacy-aware truth discovery in crowdsensing systems, Guowen XU, Hongwei LI, Shengmin XU, Hao REN, Yonghui ZHANG, Jianfei SUN, and Robert H. DENG Conference Proceeding Article