Submissions from 2020
Sensing, computing, and communications for energy harvesting IoTs: A survey, Dong MA, Guohao LAN, Mahbub HASSAN, Wen HU, and Sajal K. DAS Journal Article
Talk like somebody is watching: Understanding and supporting novice live streamers, Terrance MOK, Colin Matthew AU YUENG, Anthony TANG, and Lora OEHLBERG Conference Poster
Towards distributed node similarity search on graphs, Tianming ZHANG, Yunjun GAO, Baihua ZHENG, Lu CHEN, Shiting WEN, and Wei GUO Journal Article
Transferring and regularizing prediction for semantic segmentation, Yiheng ZHANG, Zhaofan QIU, Ting YAO, Chong-wah NGO, Dong LIU, and Tao MEI Conference Proceeding Article
Understanding Android VoIP security: A system-level vulnerability assessment, En HE, Daoyuan WU, and Robert H. DENG Conference Proceeding Article
Visual Commonsense R-CNN, Tan WANG, Jianqiang HUANG, Hanwang ZHANG, and Qianru SUN Conference Proceeding Article
Visual commonsense representation learning via causal inference, Tan WANG, Jianqiang HUANG, Hanwang ZHANG, and Qianru SUN Conference Proceeding Article
A 2020 perspective on "Client risk informedness in brokered cloud services: An experimental pricing study", Di SHANG and Robert J. KAUFFMAN Journal Article
A 2020 perspective on "How to derive causal insights for digital commerce in China? A research commentary on computational social science methods", David C. W. PHANG Journal Article
A fully distributed hierarchical attribute-based encryption scheme, Ali Mohammad, Javad MOHAJERI, Ximeng LIU, and Ximeng LIU Journal Article
A lightweight privacy-preserving CNN feature extraction framework for mobile sensing, Kai HUANG, Ximeng LIU, Shaojing FU, Deke GUO, and Ming XU Journal Article
A matheuristic algorithm for solving the vehicle routing problem with cross-docking, Aldy GUNAWAN, Audrey Tedja WIDJAJA, Pieter VANSTEENWEGEN, and Vincent F. YU Conference Proceeding Article
Assistance for target selection in mobile augmented reality, Vinod ASOKAN, Scott BATEMAN, and Anthony TANG Conference Proceeding Article
Automated identification of libraries from vulnerability data, Chen YANG, Andrew SANTOSA, Asankhaya SHARMA, and David LO Conference Proceeding Article
Beyond physical entrainment: Competitive and cooperative mental stances during identical joint-action tasks differently affect inter-subjective neural synchrony and judgments of agency, Philip S. CHO, Nicolas Escoffier, Yinan MAO, Christopher Green, and Richard C. DAVIS Journal Article
Chaff from the wheat: Characterizing and determining valid bug reports, Yuanrui FAN, Xin XIA, David LO, and Ahmed E. HASSAN Journal Article
Code duplication on stack overflow, Sebastian BALTES and Christoph TREUDE Conference Proceeding Article
Competitive ratios for online multi-capacity ridesharing, Meghna LOWALEKAR, Pradeep VARAKANTHAM, and Patrick JAILLET Conference Proceeding Article
Cornac: A comparative framework for multimodal recommender systems, Aghiles SALAH, Quoc Tuan TRUONG, and Hady W. LAUW Journal Article
Early detection of mild cognitive impairment with in-home sensors to monitor behavior patterns in community-dwelling senior citizens in Singapore: Cross-sectional feasibility study, Iris Rawtaer, Rathi Mahendran, Ee Heok Kua, Hwee-pink TAN, Hwee Xian TAN, Tih-Shih Lee, and Tze Pin Ng Journal Article
Enhancing cellular communications for UAVs via intelligent reflective surface, Dong MA, Ming DING, and Mahbub HASSAN Conference Proceeding Article
Hierarchical multiagent reinforcement learning for maritime traffic management, Arambam James SINGH, Akshat KUMAR, and Hoong Chuin LAU Conference Proceeding Article
Hierarchical reinforcement learning with integrated discovery of salient subgoals, Shubham PATERIA, Budhitama SUBAGDJA, and Ah-hwee TAN Conference Proceeding Article
JPLink: On linking jobs to vocational interest types, Amila SILVA, Pei Chi LO, and Ee-peng LIM Conference Proceeding Article
Learning discriminative neural sentiment units for semi-supervised target-level sentiment classification, Jingjing ZHAO, Yao YANG, Guansong PANG, Lei LV, Hong SHANG, Zhongqian SUN, and Wei YANG Conference Proceeding Article
Learning expensive coordination: An event-based deep RL approach, Runsheng YU, Xinrun WANG, Rundong WANG, Youzhi ZHANG, Bo AN, Zhen Yu SHI, and Hanjiang LAI Conference Proceeding Article
MemLock: Memory usage guided fuzzing, Cheng WEN, Haijun WANG, Yuekang LI, Shengchao QIN, Yang LIU, Zhiwu XU, Hongxu CHEN, Xiaofei XIE, Geguang PU, and Ting LIU Conference Proceeding Article
Multiplex memory network for collaborative filtering, Xunqiang JIANG, Binbin HU, Yuan FANG, and Chuan SHI Conference Proceeding Article
Platform pricing with strategic buyers: The impact of future production cost, Mei LIN, Xiajun Amy PAN, and Quan ZHENG Journal Article
PMKT: Privacy-preserving Multi-party Knowledge Transfer for financial market forecasting, Zhuoran MA, Jianfeng MA, Yinbin MIAO, Kim-Kwang Raymond CHOO, Ximeng LIU, Xiangyu WANG, and Tengfei YANG Journal Article
POSIT: Simultaneously tagging natural and programming languages, Profir-Petru PÂRȚACHI, Santanu DASH, Christoph TREUDE, and Earl T. BARR Conference Proceeding Article
RankBooster: Visual analysis of ranking predictions, Abishek PURI, Bon Kyung KU, Yong WANG, and Huamin QU Conference Paper
Retrofitting embeddings for unsupervised user identity linkage, Tao ZHOU, Ee-peng LIM, Roy Ka-Wei LEE, Feida ZHU, and Jiuxin CAO Conference Proceeding Article
Robust graph learning from noisy data, Zhao KANG, Haiqi PAN, Steven C. H. HOI, and Zenglin XU Journal Article
Route choice behaviour and travel information in a congested network: Static and dynamic recursive models, Giselle de Moraes RAMOS, Tien MAI, Winnie DAAMEN, and Emma FREJINGER Journal Article
Semantic understanding of smart contracts: Executable operational semantics of solidity, Jiao JIAO, Shuanglong KAN, Shang Wei LIN, David SANAN, Yang LIU, and Jun SUN Conference Proceeding Article
Short-term repositioning for empty vehicles on ride-sourcing platforms, Hai WANG and Zhengli WANG Conference Proceeding Article
StarHopper: A touch interface for remote object-centric drone navigation, Jiannan LI, Ravin BALAKRISHNAN, and Tovi GROSSMAN Conference Proceeding Article
Symbolic verification of message passing interface programs, Hengbiao YU, Zhenbang CHEN, Xianjin FU, Ji WANG, Zhendong SU, Jun SUN, Chun HUANG, and Wei DONG Conference Proceeding Article
The future of work now: Cyber threat attribution at FireEye, Thomas H. DAVENPORT and Steven M. MILLER Magazine Article
Towards characterizing adversarial defects of deep learning software from the lens of uncertainty, Xiyue ZHANG, Xiaofei XIE, Lei MA, Xiaoning DU, Qiang HU, Yang LIU, Jianjun ZHAO, and Meng SUN Conference Proceeding Article
“Trust Me, I Have a Ph.D.”: A propensity score analysis on the halo effect of disclosing one's offline social status in online communities, Kunwoo PARK, Haewoon KWAK, Hyunho SONG, and Meeyoung. CHA Conference Proceeding Article
Typestate-guided fuzzer for discovering use-after-free vulnerabilities, Haijun WANG, Xiaofei XIE, Yi LI, Cheng WEN, Yuekang LI, Yang LIU, Shengchao QIN, Hongxu CHEN, and Yulei SUI Conference Proceeding Article
Values of artificial intelligence in marketing, Yingrui XI and Keng SIAU Conference Proceeding Article
Who and when to screen: Multi-round active screening for network recurrent infectious diseases under uncertainty, Han-Ching OU, Arunesh SINHA, Sze-Chuan SUEN, Andrew PERRAULT, Alpan RAVAL, and Milind TAMBE Conference Proceeding Article
Why do people watch others eat food? An empirical study on the motivations and practices of mukbang viewers, Laurensia ANJANI, Terrance MOK, Anthony TANG, Lora OEHLBERG, and Wooi Boon GOH Conference Proceeding Article
WiFi-based indoor robot positioning using deep fuzzy forests, Le ZHANG, CHEN Zhenghua, CUI Wei, LI Bing, CHEN Cen, Zhiguang CAO, and GAO Kaizhou Journal Article
A cue adaptive decoder for controllable neural response generation, Weichao WANG, Shi FENG, Wei GAO, Daling WANG, and Yifei ZHANG Conference Proceeding Article
A generalized formal semantic framework for smart contracts, Jiao JIAO, Shang-Wei LIN, and Jun SUN Conference Proceeding Article
A new construction for linkable secret handshake, Yangguang TIAN, Yingjiu LI, Robert H. DENG, Nan LI, Guomin YANG, and Zheng YANG Journal Article
Are these comments triggering? Predicting triggers of toxicity in online discussions, Hind Almerekhi, Haewoon KWAK, Joni SALMINEN, and Bernard J. JANSEN Conference Proceeding Article
Attribute-based cloud data integrity auditing for secure outsourced storage, Yong YU, Yannan LI, Bo YANG, Willy SUSILO, Guomin YANG, and Jian BAI Journal Article
Designing a smart Internet of Things solution for point of use water filtration management system in residential, commercial and public settings, Tristan LIM, Hwee-Pink TAN, Chin Sin ONG, Rahul BELANI, and Siddhant S. K. AGRAWAL Journal Article
DFSeer: A visual analytics approach to facilitate model selection for demand forecasting, Dong SUN, Zezheng FENG, Yuanzhe CHEN, Yong WANG, Jia ZENG, Mingxuan YUAN, Ting-Chuen PONG, and Huamin QU Conference Proceeding Article
Differentially private online task assignment in spatial crowdsourcing: A tree-based approach, Qian TAO, Yongxin TONG, Zimu ZHOU, Yexuan SHI, Lei CHEN, and Ke XU Conference Proceeding Article
Energy-efficient distance-bounding with residual charge computation, Yunhui ZHUANG, Anjia YANG, Gerhard HANCKE, Duncan S. WONG, and Guomin YANG Journal Article
Google summer of code: Student motivations and contributions, Jefferson O. SILVA, Igor Scaliante WIESE, Daniel M. GERMÁN, Christoph TREUDE, Marco Aurélio GEROSA, and Igor STEINMACHER Journal Article
How to and how much? Teaching ethics in an interaction design course, Bimlesh WADHWA, Eng Lieh OUH, and Benjamin GAN Conference Paper
Identity-based encryption transformation for flexible sharing of encrypted data in public cloud, Robert H. DENG, Zheng QIN, Qianhong WU, Zhenyu GUAN, Robert H. DENG, Yujue WANG, and Yunya ZHOU Journal Article
Improving neural relation extraction with implicit mutual relations, Jun KUANG, Yixin CAO, Jianbing ZHENG, Xiangnan HE, Ming GAO, and Aoying ZHOU Conference Proceeding Article
Incorporating a reverse logistics scheme in a vehicle routing problem with cross-docking network: A modelling approach, Audrey Tedja WIDJAJA, Aldy GUNAWAN, Panca JODIAWAN, and Vincent F. YU Conference Proceeding Article
Leakage-resilient biometric-based remote user authentication with fuzzy extractors, Yangguang TIAN, Yingjiu LI, Binanda SENGUPTA, Nan LI, and Chunhua SU Journal Article
MapTransfer: Urban air quality map generation for downscaled sensor deployments, Yun CHENG, Xiaoxi HE, Zimu ZHOU, and Lothar THIELE Conference Proceeding Article
On the Robustness of Cascade Diffusion under Node Attacks, Alvis LOGINS, Yuchen LI, and Panagiotis KARRAS Conference Proceeding Article
On the security of LWE cryptosystem against subversion attacks, Zhichao YANG, Rongmao CHEN, Chao LI, Longjiang QU, and Guomin YANG Journal Article
Poster abstract: Data communication using switchable privacy glass, Changshuo HU, Dong MA, Mahbub HASSAN, and Wen HU Conference Proceeding Article
Predictive task assignment in spatial crowdsourcing: A data-driven approach, Yan ZHAO, Kai ZHENG, Yue CUI, Han SU, Feida ZHU, and Xiaofang ZHOU Conference Proceeding Article
Privacy-preserving outsourced support vector machine design for secure drug discovery, Ximeng LIU, Robert H. DENG, Kim-Kwang Raymond CHOO, and Yang YANG Journal Article
RecipeGPT: Generative pre-training based cooking recipe generation and evaluation system, Helena Huey Chong LEE, Ke SHU, Palakorn ACHANANUPARP, Philips Kokoh PRASETYO, Yue LIU, Ee-peng LIM, and Lav R. VARSHNEY Conference Proceeding Article
Reinforced negative sampling over knowledge graph for recommendation, Xiang WANG, Yaokun XU, Xiangnan HE, Yixin CAO, Meng WANG, and Tat-Seng CHUA Conference Proceeding Article
Review-guided helpful answer identification in e-commerce, Wenxuan ZHANG, Wai LAM, Yang DENG, and Jing MA Conference Proceeding Article
Statistical modeling of harassment against Reddit moderators, Hamad Bin Khalifa University and Haewoon KWAK Conference Proceeding Article
Techniques to visualize occluded graph elements for 2.5D map editing, Kazuyuki FUJITA, Daigo HAYASHI, Kotaro HARA, Kazuki TAKASHIMA, and Yoshifumi KITAMURA Conference Proceeding Article
Two can play that game: An adversarial evaluation of a cyber-alert inspection system, Ankit SHAH, Arunesh SINHA, Rajesh GANESAN, Sushil JAJODIA, and Hasan CAM Journal Article
Understanding the relation between repeat developer interactions and bug resolution times in large open source ecosystems: A multisystem study, Subhajit DATTA, Reshma ROYCHOUDHURI, and Subhashis MAJUMDER Journal Article
VoiceCoach: Interactive evidence-based training for voice modulation skills in public speaking, Xingbo WANG, Haipeng ZENG, Yong WANG, Aoyu WU, Zhida SUN, Xiaojuan MA, and QU Huamin Conference Proceeding Article
Decision theory for network security: Active sensing for detection and prevention of data exfiltration, Sara MC CARTHY, Arunesh SINHA, Milind TAMBE, and Pratyusa K. MANADHATA Book Chapter
An empirical study on correlation between coverage and robustness for deep neural networks, Yizhen DONG, Peixin ZHANG, Jingyi WANG, Shuang LIU, Jun SUN, Jianye HAO, Xinyu WANG, Li WANG, Jinsong DONG, and Ting DAI Conference Proceeding Article
Automated synthesis of local time requirement for service composition, Étienne ANDRÉ, Tian Huat TAN, Manman CHEN, Shuang LIU, Jun SUN, Yang LIU, and Jin Song DONG Journal Article
Automatic verification of multi-threaded programs by inference of rely-guarantee specifications, Xuan-Bach LE, David SANAN, Jun SUN, and Shang-Wei LIN Conference Proceeding Article
Capacitor-based activity sensing for kinetic-powered wearable IoTs, Guohao LAN, Dong MA, Weitao XU, Mahbub HASSAN, and Wen HU Journal Article
Deep pixel-level matching via attention for video co-segmentation, Junliang LI, Hon-Cheng WONG, Shengfeng HE, Sio-Long LO, Guifang ZHANG, and Wenxiao WANG Journal Article
Detecting fake news in social media: An Asia-Pacific perspective, Meeyoung CHA, Wei GAO, and Cheng-Te LI Journal Article
Feature agglomeration networks for single stage face detection, Jialiang ZHANG, Xiongwei WU, Steven C. H. HOI, and Jianke ZHU Journal Article
HeartQuake: Accurate low-cost non-invasive ECG monitoring using bed-mounted geophones, Jaeyeon PARK, Hyeon CHO, Rajesh Krishna BALAN, and JeongGil KO Journal Article
IFIX: Fixing concurrency bugs while they are introduced, Zan WANG, Haichi WANG, Shuang LIU, Jun SUN, Haoyu WANG, and Junjie CHEN Conference Proceeding Article
Learning fault models of cyber physical systems, Teck Ping KHOO, Jun SUN, and Sudipta CHATTOPADHYAY Conference Proceeding Article
Light structure from pin motion: Geometric point light source calibration, Hiroaki SANTO, Michael WAECHTER, Wen-yan LIN, Yusuke SUGANO, and Yasuyuki MATSUSHITA Journal Article
PokeME: Applying context-driven notifications to increase worker engagement in mobile crowd-sourcing, Thivya KANDAPPU, Abhinav MEHROTRA, Archan MISRA, Mirco MUSOLESI, Shih-Fen CHENG, and Lakmal Buddika MEEGAHAPOLA Conference Proceeding Article
Predicting student performance in interactive online question pools using mouse interaction features, Huan WEI, Haotian LI, Meng XIA, Yong WANG, and Huamin QU Conference Proceeding Article
Privacy-preserving data processing with flexible access control, Wenxiu DING, Zheng YAN, and Robert H. DENG Journal Article
S2N2: An interpretive semantic structure attention neural network for trajectory classification, Canghong JIN, Ting TAO, Xianzhe LUO, Zemin LIU, and Minghui WU Journal Article
Securing Bring-Your-Own-Device (BYOD) programming exams, Oka KURNIAWAN, Norman Tiong Seng LEE, and Christopher M. POSKITT Conference Proceeding Article
Space efficient revocable IBE for mobile devices in cloud computing, Baodong QIN, Ximeng LIU, Zhuo WEI, and Dong ZHENG Journal Article
The search for optimal oxygen saturation targets in critically ill: Patients observational data from large ICU databases, Willem VAN DEN BOOM, Michael HOY, Jagadish SANKARAN, Mengru LIU, Haroun CHAHED, Mengling FENG, and Kay Choong SEE Journal Article
The spatial optimization and evaluation of the economic, ecological, and social value of urban green space in Shenzhen, Yuhan YU, Wenting ZHANG, Peihong FU, Wei HUANG, Keke LI, and Kai CAO Journal Article
Towards k-vertex connected component discovery from large networks, Li YUAN, Guoren WANG, Yuhai ZHAO, and Feida ZHU Journal Article
Understanding Wikipedia as a resource for opportunistic learning of computing concepts, Martin P. ROBILLARD and Christoph TREUDE Conference Proceeding Article
Using reinforcement learning to minimize the probability of delay occurrence in transportation, Zhiguang CAO, Hongliang Guo, Wen Song, Kaizhou Gao, Zhengghua Chen, Le Zhang, and Xuexi Zhang Journal Article
Vehicle routing problem for multi-product cross-docking, Aldy GUNAWAN, Audrey Tedja WIDJAJA, Benjamin GAN, Vincent F. YU, and Panca JODIAWAN Conference Proceeding Article