Submissions from 2019
Parametric timed model checking for guaranteeing timed opacity, Étienne ANDRÉ and Jun SUN Conference Proceeding Article
SIEVE: Helping developers sift wheat from chaff via cross-platform analysis, Agus SULISTYA, Gede A. A. P. PRANA, David LO, and Christoph TREUDE Journal Article
SmartBFA: A passive crowdsourcing system for point-to-point barrier-free access, Mohammed Nazir KAMALDIN, Susan KEE, Songwei KONG, Chengkai LEE, Huiguang LIANG, Alisha SAINI, Hwee-pink TAN, and Hwee Xian TAN Conference Proceeding Article
SmartEmbed: A tool for clone and bug detection in smart contracts through structural code embedding, Zhipeng GAO, Magalle Hewa Vinoj Yasanga JAYASUNDARA, Lingxiao JIANG, Xin XIA, David LO, and John C. GRUNDY Conference Proceeding Article
SolarGest: Ubiquitous and battery-free gesture recognition using solar cells, Dong MA, Guohao LAN, Mahbub HASSAN, Wen HU, B. Mushfika UPAMA, Ashraf UDDIN, YOUSEEF, and Moustafa Conference Proceeding Article
Supporting software architecture maintenance by providing task-specific recommendations, Matthias GALSTER, Christoph TREUDE, and Kelly BLINCOE Conference Proceeding Article
The Vid3oC and IntVID datasets for video super resolution and quality mapping, S. KIM, G. LI, D. FUOLI, M. DANELLJAN, Zhiwu HUANG, S. GU, and R. TIMOFTE Conference Proceeding Article
Tighter security proofs for post-quantum key encapsulation mechanism in the multi-challenge setting, Zhengyu ZHANG, Puwen WEI, and Haiyang XUE Conference Proceeding Article
TopicSummary: A tool for analyzing class discussion forums using topic based summarizations, Swapna GOTTIPATI, Venky SHANKARARAMAN, and Renjini RAMESH Conference Proceeding Article
Towards generating transformation rules without examples for Android API replacement, Ferdian THUNG, Kang Hong JIN, Lingxiao JIANG, and David LO Conference Proceeding Article
Towards generating transformation rules without examples for android API replacement, Ferdian THUNG, Hong Jin KANG, Lingxiao JIANG, and David LO Conference Proceeding Article
Tracy: A business-driven technical debt prioritization framework, Rodrigo REBOUÇAS DE ALMEIDA, Christoph TREUDE, and Uirá KULESZA Conference Proceeding Article
Weakly-supervised deep anomaly detection with pairwise relation learning, Guansong PANG, Anton Van Den HENGEL, and Chuanhua SHEN Working Paper
Who, where, and what to wear?: Extracting fashion knowledge from social media, Yunshan MA, Xun YANG, Lizi LIAO, Yixin CAO, and Tat-Seng CHUA Conference Proceeding Article
Who, where, and what to wear?: extracting fashion knowledge from social media, Yunshan MA, Xun YANG, Lizi LIAO, Yixin CAO, and Tat-Seng CHUA Conference Proceeding Article
Who, where, and what to wear?: extracting fashion knowledge from social media, Yunshan MA, Xun YANG, Lizi LIAO, Yixin CAO, and Tat-Seng CHUA Conference Proceeding Article
Orienteering problems: Models and algorithms for vehicle routing problems with profits, Pieter VANSTEENWEGEN and Aldy GUNAWAN Book
Supervised generative adversarial cross-modal hashing by transferring pairwise similarities for venue discovery, Himanshu AGGARWAL, Rajiv Ratn SHAH, Suhua TANG, and Feida ZHU Conference Proceeding Article
Why reinventing the wheels? An empirical study on library reuse and re-implementation, Bowen XU, Le AN, Ferdian THUNG, Foutse KHOMH, and David LO Journal Article
A case study on automated fuzz target generation for large codebases, Matthew KELLY, Christoph TREUDE, and Alex MURRAY Conference Proceeding Article
A common approach for consumer and provider fairness in recommendations, Dimitris Sacharidis, Kyriakos MOURATIDIS, and Dimitrios Kleftogiannis Conference Proceeding Article
A lattice-based linkable ring signature supporting stealth addresses, Zhen LIU, Khoa NGUYEN, Guomin YANG, Huaxiong WANG, and Duncan S. WONG Conference Proceeding Article
Automatic generation of non-intrusive updates for third-party libraries in android applications, Yue DUAN, Lian GAO, Jie HU, and Heng YIN Conference Proceeding Article
Be sensitive and collaborative: Analyzing impact of coverage metrics in Greybox fuzzing, Jinghan WANG, Yue DUAN, Wei SONG, Heng YIN, and Chengyu SONG Conference Proceeding Article
Can earables support effective user engagement during weight-based gym exercises?, Meeralakshmi RADHAKRISHNAN and Archan MISRA Conference Proceeding Article
Confusion and information triggered by photos in persona profiles, Joni SALMINEN, Soon-gyo JUNG, Jisun AN, Haewoon KWAK, Lene NIELSEN, and Bernard J. JANSEN Journal Article
Detecting toxicity triggers in online discussions, Hamad Bin Khalifa University and Haewoon KWAK Conference Proceeding Article
Efficient and robust certificateless signature for data crowdsensing in cloud-assisted industrial IoT, Yinghui ZHANG, Robert H. DENG, Dong ZHENG, Jin LI, Pengfei WU, and Jin CAO Journal Article
Efficient distributed reachability querying of massive temporal graphs, Tianming ZHANG, Yunjun GAO, Chen LU, Wei GUO, Shiliang PU, Baihua ZHENG, and CHRISTIAN S. Jensen Journal Article
Efficient oblivious transfer with membership verification, Weiwei LIU, Dazhi SUN, and Yangguang TIAN Journal Article
Enhancing Python compiler error messages via Stack Overflow, Emillie THISELTON and Christoph TREUDE Conference Proceeding Article
Finding flaws from password authentication code in Android apps, Siqi MA, Elisa BERTINO, Surya NEPAL, Jianru LI, Ostry DIETHELM, Robert H. DENG, and Sanjay JHA Conference Proceeding Article
Generating expensive relationship features from cheap objects, Xiaogang WANG, Qianru SUN, Tat-Seng CHUA, and Marcelo ANG Conference Proceeding Article
Interactive hierarchical object proposals, Mingliang CHEN, Jiawei ZHANG, Shengfeng HE, Qingxiong YANG, Qing LI, and Ming-Hsuan YANG Journal Article
Lightweight fine-grained search over encrypted data in fog computing, Yinbin MIAO, Jianfeng MA, Ximeng LIU, Jian WENG, Hongwei LI, and Hui Li Journal Article
Puncturable proxy re-encryption supporting to group messaging service, Tran Viet Xuan PHUONG, Willy SUSILO, Jongkil KIM, Guomin YANG, and Dongxi LIU Conference Proceeding Article
Rotation invariant convolutions for 3D point clouds deep learning, Zhiyuan ZHANG, Binh-Son HUA, David W. ROSEN, and Sai-Kit YEUNG Conference Proceeding Article
Self-refining deep symmetry enhanced network for rain removal, Hong LIU, Hanrong YE, Xia LI, Wei SHI, Mengyuan LIU, and Qianru SUN Conference Proceeding Article
Spatio-temporal analysis and prediction of cellular traffic in metropolis, Xu WANG, Zimu ZHOU, Fu XIAO, Kai XING, Zheng YANG, Yunhao LIU, and Chunyi PENG Journal Article
Triadic closure, homophily, and reciprocation: An empirical investigation of social ties between content providers, tingting SONG, Qian TANG, and Jinghua HUANG Journal Article
Adapting BERT for target-oriented multimodal sentiment classification, Jianfei YU and Jing JIANG Conference Proceeding Article
Knowledge base question answering with topic units, Yunshi LAN, Shuohang WANG, and Jing JIANG Conference Proceeding Article
Coresets for minimum enclosing balls over sliding windows, Yanhao WANG, Yuchen LI, and Kian-Lee TAN Conference Proceeding Article
FoodAI: Food image recognition via deep learning for smart food logging, Doyen SAHOO; Hao WANG; Ke SHU; Xiongwei WU; Hung LE; Palakorn ACHANANUPARP; Ee-peng LIM; and HOI, Steven C. H. Conference Proceeding Article
Optimizing impression counts for outdoor advertising, Yipeng ZHANG, Yuchen LI, Zhifeng BAO, Songsong MO, and Ping ZHANG Conference Proceeding Article
Sentence-level evidence embedding for claim verification with hierarchical attention networks, Jing MA, Wei GAO, Shafiq JOTY, and Kam-Fai WONG Conference Proceeding Article
Adapting BERT for target-oriented multimodal sentiment classification, Jianfei YU and Jing JIANG Conference Proceeding Article
Adversarial learning on heterogeneous information networks, Binbin HU, Yuan FANG, and Chuan SHI Conference Proceeding Article
An evaluation of pure spectrum-based fault localization techniques for large-scale software systems, Simon HEIDEN, Lars GRUNSKE, Timo KEHRER, Fabian KELLER, Andre VAN HOORN, Antonio FILIERI, and David LO Journal Article
AnswerBot: An answer summary generation tool based on stack overflow, Liang CAI, Haoye WANG, Bowen XU, Qiao HUANG, Xin XIA, David LO, and Zhenchang XING Conference Proceeding Article
A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance, Shengmin XU, Guomin YANG, Yi MU, and Ximeng LIU Journal Article
A survey on bluetooth 5.0 and mesh: New milestones of IoT, Juenjie YIN, Zheng YANG, Hao CAO, Tongtong LIU, Zimu ZHOU, and Chenshu WU Journal Article
Bidding mechanisms in graph games, Guy AVNI, Thomas A. HENZINGER, and Dorde ZIKELIC Conference Proceeding Article
BIKER: A tool for Bi-information source based API method recommendation, Liang CAI, Haoye WANG, Qiao HUANG, Xin XIA, Zhenchang XING, and David LO Conference Proceeding Article
Cerebro: Context-aware adaptive fuzzing for effective vulnerability detection, Yuekang LI, Yinxing XUE, Hongxu CHEN, Xiuheng WU, Cen ZHANG, Xiaofei XIE, Haijun WANG, and Yang LIU Conference Proceeding Article
Cold-start aware deep memory networks for multi-entity aspect-based sentiment analysis, Kaisong SONG, Wei GAO, Lujun ZHAO, Changlong SUN, and Xiaozhong LIU Conference Proceeding Article
Constructing strong designated verifier signatures from key encapsulation mechanisms, Borui GONG, Ho Man AU, and Haiyang XUE Conference Proceeding Article
Correlation-sensitive next-basket recommendation, Duc Trong LE, Hady Wirawan LAUW, and Yuan FANG Conference Proceeding Article
Creating top ranking options in the continuous option and preference space, Bo TANG, Kyriakos MOURATIDIS, Man Lung YIU, and Zhenyu CHEN Conference Proceeding Article
Data-driven decision-support for process improvement through predictions of bed occupancy rates, Kar Way TAN, Qi You NG, Francis Ngoc Hoang Long NGUYEN, and Sean Shao Wei LAM Conference Proceeding Article
Data-driven surgical duration prediction model for surgery scheduling: A case-study for a practice-feasible model in a public hospital, Kar Way TAN, Francis Ngoc Hoang Long NGUYEN, Boon Yew ANG, Jerald GAN, and Sean Shao Wei LAM Conference Proceeding Article
Decision making for improving maritime traffic safety using constraint programming, Saumya BHATNAGAR, Akshat KUMAR, and Hoong Chuin LAU Conference Proceeding Article
Deep anomaly detection with deviation networks, Guansong PANG, Chunhua SHEN, and Anton van den HENGEL Conference Proceeding Article
DeepStellar: Model-based quantitative analysis of stateful deep learning systems, Xiaoning DU, Xiaofei XIE, Yi LI, Lei MA, Yang LIU, and Jianjun ZHAO Conference Proceeding Article
Deformable object tracking with gated fusion, Wenxi LIU, Yibing SONG, Dengsheng CHEN, Shengfeng HE, Yuanlong YU, Tao YAN, Gerhard P. HANCKE, and Rynson W.H. LAU Journal Article
DiffChaser: Detecting disagreements for deep neural networks, Xiaofei XIE, Lei MA, Haijun WANG, Yuekang LI, Yang LIU, and Xiaohong LI Conference Proceeding Article
Enhancing multi-hop sensor calibration with uncertainty estimates, Balz MAAG, Zimu ZHOU, and Lothar THIELE Conference Proceeding Article
Evaluating vulnerability to fake news in social networks: A community health assessment model, Bhavtosh RATH, Wei GAO, and Jaideep SRIVASTAVA Conference Proceeding Article
EzLog: Data visualization for logistics, Aldy GUNAWAN, Benjamin GAN, Jin An TAN, Sheena L.S.L VILLANUEVA, and Timothy K.J. WEN Conference Paper
Faster first-order methods for stochastic non-convex optimization on Riemannian manifolds, Pan ZHOU, Xiao-Tong YUAN, Shuicheng YAN, and Jiashi FENG Journal Article
Generalized majorization-minimization for non-convex optimization, Hu ZHANG, Pan ZHOU, Yi YANG, and Jiashi FENG Conference Proceeding Article
Gradient boosting with piece-wise linear regression trees, Yu SHI, Jian LI, and Zhize LI Conference Proceeding Article
Higher education in the AI age, Yizhi MA and Keng SIAU Conference Proceeding Article
How can AI help to enhance diversity and inclusion?, Keng SIAU Conference Proceeding Article
How does machine learning change software development practices?, Zhiyuan WAN, Xin XIA, David LO, and Gail C. MURPHY Journal Article
Improving law enforcement daily deployment through machine learning-informed optimization under uncertainty, Jonathan David CHASE, Duc Thien NGUYEN, Haiyang SUN, and Hoong Chuin LAU Conference Proceeding Article
Improving urban crowd flow prediction on flexible region partition, Xu WANG, Zimu ZHOU, Yi ZHAO, Xinglin ZHANG, Kai XING, Fu XIAO, Zheng YANG, and Yunhao LIU Journal Article
Industry 4.0: Challenges and opportunities in different countries, Keng SIAU, Yingrui XI, and Cui ZOU Journal Article
Industry 4.0: Ethical and moral predicaments, W. WANG and Keng SIAU Journal Article
InSPeCT: Iterated local search for solving path conditions, Fuxiang CHEN, Aldy GUNAWAN, David LO, and Sunghun KIM Conference Proceeding Article
Integrated assignment and routing with mixed service mode cross-dock, Vincent YU, Aldy GUNAWAN, Eric I. JUNAIDI, and Audrey T. WIDJAJA Conference Paper
KGAT: Knowledge graph attention network for recommendation, Xiang WANG, Xiangnan HE, Yixin CAO, Meng LIU, and Tat-Seng CHUA Conference Proceeding Article
Knowledge base question answering with topic units, Yunshi LAN, Shuohang WANG, and Jing JIANG Conference Proceeding Article
Language and robotics: Complex sentence understanding, Seng-Beng HO and Zhaoxia WANG Conference Proceeding Article
Latent error prediction and fault localization for microservice applications by learning from system trace logs, Xiang ZHOU, Xin PENG, Tao XIE, Jun SUN, Chao JI, Dewei LIU, Qilin XIANG, and Chuan HE Conference Paper
Learning multiple maps from conditional ordinal triplets, Duy Dung LE and Hady Wirawan LAUW Conference Proceeding Article
Let me in: Guidelines for the successful onboarding of newcomers to open source projects, Igor STEINMACHER, Christoph TREUDE, and Marco Aurélio GEROSA Magazine Article
Locating vulnerabilities in binaries via memory layout recovering, Haijun WANG, Xiaofei XIE, Shang-Wei LIN, Yun LIN, Yuekang LI, Shengchao QIN, Yang LIU, and Ting LIU Conference Proceeding Article
Low-rank sparse subspace for spectral clustering, Xiaofeng ZHU, Shichao ZHANG, Yonggang LI, Jilian ZHANG, Lifeng YANG, and Yue FANG Journal Article
Multiagent decision making and learning in urban environments, Akshat KUMAR Conference Proceeding Article
Multimodal transformer networks for end-to-end video-grounded dialogue systems, Hung LE, Doyen SAHOO, Nancy F. CHEN, and Steven C. H. HOI Conference Proceeding Article
Proposal-driven segmentation for videos, Junliang LI, Shengfeng HE, Hon-Cheng WONG, and Sio-Long LO Journal Article
SAR: Learning cross-language API mappings with little knowledge, Duy Quoc Nghi BUI, Yijun YU, and Lingxiao JIANG Conference Proceeding Article
SHOAL: Large-scale hierarchical taxonomy via graph-based query coalition in E-commerce, Zhao LI, Xia CHEN, Xuming PAN, Pengcheng ZOU, Yuchen LI, and Guoxian YU Conference Proceeding Article
Simulated annealing for the multi-vehicle cyclic inventory routing problem, Aldy GUNAWAN, Vincent F. YU, Audrey Tedja WIDJAJA, and Pieter VANSTEENWEGEN Conference Proceeding Article
Trust architecture and reputation evaluation for internet of things, Juan CHEN, Zhihong TIAN, Xiang CUI, Lihua YIN, and Xianzhi WANG Journal Article
Who should make decision on this pull request? Analyzing time-decaying relationships and file similarities for integrator prediction, Jing JIANG, David LO, Jiateng ZHENG, Xin XIA, Yun YANG, and Li ZHANG Journal Article
Who should pay the cost: A game-theoretic model for government subsidized investments to improve national cybersecurity, Xinrun WANG, Bo AN, and Hau CHAN Conference Proceeding Article
Cross-project defect prediction via ASTToken2Vec and BLSTM-based neural network, Hao LI, Xiaohong LI, Xiang CHEN, Xiaofei XIE, Yanzhou MU, and Zhiyong FENG Conference Proceeding Article
Control-flow carrying code, Yan LIN and Debin GAO Conference Proceeding Article