Submissions from 2019
Estimating glycemic impact of cooking recipes via online crowdsourcing and machine learning, Helena LEE, Palakorn ACHANANUPARP, Yue LIU, Ee-Peng LIM, and Lav R. VARSHNEY Conference Proceeding Article
EURECOM at TRECVID AVS 2019, Danny FRANCIS, Phuong Anh NGUYEN, Benoit HUET, and Chong-wah NGO Conference Paper
Gender and racial diversity in commercial brands' advertising images on social media, Jisun AN and Haewoon KWAK Conference Proceeding Article
Gender and racial diversity in commercial brands’ advertising images on social media, Jisun AN and Haewoon KWAK Conference Proceeding Article
Learning-guided network fuzzing for testing cyber-physical system defences, Yuqi CHEN, Chris POSKITT, Jun SUN, Sridhar ADEPU, and Fan ZHANG Conference Proceeding Article
Low-resource name tagging learned with weakly labeled data, Yixin CAO, Zikun HU, Tat-Seng CHUA, Zhiyuan LIU, and Heng JI Conference Proceeding Article
MAP-Coverage: A novel coverage criterion for testing thread-safe classes, Zan WANG, Yingquan ZHAO, Shuang LIU, Jun SUN, Xiang CHEN, and Huarui LIN Conference Proceeding Article
MedTruth: A semi-supervised approach to discovering knowledge condition information from multi-source medical data, Yang DENG, Yaliang LI, Ying SHEN, Nan DU, Wei FAN, Min YANG, and Kai LEI Conference Proceeding Article
MobiDroid: A performance-sensitive malware detection system on mobile platform, Ruitao FENG, Sen CHEN, Xiaofei XIE, Lei MA, Guozhu MENG, Yang LIU, and Shang-Wei LIN Conference Proceeding Article
Predicting audience engagement across social media platforms in the news domain, Kholoud Khalil ALDOUS, Jisun AN, and Bernard J. JANSEN Conference Proceeding Article
Revisiting collaboration through mixed reality: The evolution of groupware, Barrett ENS, Joel LANIR, Anthony TANG, Scott BATEMAN, Gun LEE, Thammathip PIUMSOMBOON, and Mark BILLINGHURST Journal Article
Ridesourcing systems: A framework and review, Hai WANG and Hai YANG Journal Article
Safe inputs approximation for black-box systems, Bai XUE, Yang LIU, Lei MA, Xiyue ZHANG, Meng SUN, and Xiaofei XIE Conference Proceeding Article
SAFFRON: Adaptive grammar-based fuzzing for worst-case analysis, Xuan Bach D. LE, Corina PASAREANU, Rohan PADHYE, David LO, Willem VISSER, and Koushik SEN Conference Proceeding Article
Secure virtual machine placement in cloud data centers, Amit AGARWAL and Nguyen Binh Duong TA Journal Article
Semi-supervised entity alignment via joint knowledge embedding model and cross-graph model, Chengjiang LI, Yixin CAO, Lei HOU, Jiaxin SHI, Juanzi LI, and Tat-Seng CHUA Conference Proceeding Article
ShellNet: Efficient point cloud convolutional neural networks using concentric shells statistics, Zhiyuan ZHANG, Binh-Son HUA, and Sai-Kit YEUNG Conference Proceeding Article
SmrtFridge: IoT-based, user interaction-driven food item & quantity sensing, Amit SHARMA, Archan MISRA, Vengateswaran SUBRAMANIAM, and Youngki LEE Conference Proceeding Article
Special issue on multimedia recommendation and multi-modal data analysis, Xiangnan HE, Zhenguang LIU, Hanwang ZHANG, Chong-wah NGO, Svebor KARAMAN, and Yongfeng ZHANG Editorial
Statistical log differencing, Lingfeng BAO, Nimrod BUSANY, David LO, and Shahar MAOZ Conference Proceeding Article
StressMon: Scalable detection of perceived stress and depression using passive sensing of changes in work routines and group interactions, Nur Camellia Binte ZAKARIA, Rajesh BALAN, and Youngki LEE Journal Article
Stylistic features usage: Similarities and differences using multiple social networks, Kholoud Khalil ALDOUS, Jisun AN, and Bernard J. JANSEN Conference Proceeding Article
Sustainable technology-enabled innovations for ageing-in-place: The Singapore example, Hwee-pink TAN and Hwee Xian TAN Book Chapter
Toward highly secure yet efficient KNN classification scheme on outsourced cloud data, Lin LIU, Jinshu SU, Ximeng LIU, Rongmao CHEN, Kai HUANG, Robert H. DENG, and Xiaofeng WANG Journal Article
Traceable dynamic public auditing with identity privacy preserving for cloud storage, Yinghui ZHANG, Tiantian ZHANG, Rui GUO, Shengmin XU, and Dong ZHENG Journal Article
Vireo-EuReCOM @ TRECVID 2019: Ad-hoc video search (AVS), Phuong Anh NGUYEN, Jiaxin WU, Chong-wah NGO, Francis DANNY, and Benoit HUET Conference Proceeding Article
VireoJD-MM @ TRECVID 2019: Activities in extended video (ACTEV), Zhijian HOU, Ying-Wei PAN, Ting YAO, and Chong-wah NGO Conference Paper
Visualizing the invisible: Occluded vehicle segmentation and recovery, Xiaosheng YAN, Feigege WANG, Wenxi LIU, Yuanlong YU, Shengfeng HE, and Jia PAN Conference Proceeding Article
VitaMon: Measuring heart rate variability using smartphone front camera, Sinh HUYNH, Rajesh Krishna BALAN, JeongGil KO, and Youngki LEE Conference Proceeding Article
When players affect target values: Modeling and solving dynamic partially observable security games, Xinrun WANG, Milind TAMBE, Branislav BOSANKY, and Bo AN Conference Proceeding Article
Wuji: Automatic online combat game testing using evolutionary deep reinforcement learning, Yan ZHENG, Xiaofei XIE, Ting SU, Lei MA, Jianye HAO, Zhaopeng MENG, Yang LIU, Ruimin SHEN, Yingfeng CHEN, and Changjie FAN Conference Proceeding Article
Concolic testing heap-manipulating programs, Long H. PHAM, Quang LOC LE, Quoc-Sang PHAN, and Jun SUN Conference Paper
Automatic fashion knowledge extraction from social media, Yunshan MA, Lizi LIAO, and Tat-Seng CHUA Conference Proceeding Article
Automatic fashion knowledge extraction from social media, Yunshan MA, Lizi LIAO, and Tat-Seng CHUA Conference Proceeding Article
Cognitive and social interaction analysis in graduate discussion forums, Mallika GOKARN NITIN, Swapna GOTTIPATI, and Venky SHANKARARAMAN Conference Proceeding Article
Collaborative online ranking algorithms for multitask learning, Guangxia LI, Peilin ZHAO, Tao MEI, Peng YANG, Yulong SHEN, Julian K. Y. CHANG, and Steven C. H. HOI Journal Article
Comprehending test code: An empirical study, Chak Shun YU, Christoph TREUDE, and Maurício ANICHE Conference Proceeding Article
Deep hashing by discriminating hard examples, Cheng YAN, Guansong PANG, Xiao BAI, Chunhua SHEN, Jun ZHOU, and Edwin HANCOCK Conference Proceeding Article
Detecting cyberattacks in industrial control systems using online learning algorithms, Guangxia LI, Yulong SHEN, Peilin ZHAO, Xiao LU, Jia LIU, Yangyang LIU, and Steven C. H. HOI Journal Article
End-to-end deep reinforcement learning for multi-agent collaborative exploration, Zichen CHEN, Budhitama SUBAGDJA, and Ah-hwee TAN Conference Proceeding Article
Enhancing symbolic execution of heap-based programs with separation logic for test input generation, Long H. PHAM, Quang LOC LE, Quoc-Sang PHAN, Jun SUN, and Shengchao QIN Conference Paper
ESDRA: An efficient and secure distributed remote attestation scheme for IoT swarms, Boyu KUANG, Anmin FU, Shui YU, Guomin YANG, Mang SU, and Yuqing ZHANG Journal Article
Evaluation of Sigfox LPWAN for sensor-enabled homes to identify at risk community dwelling seniors, Crys TAN and Hwee-pink TAN Conference Proceeding Article
Explaining regressions via alignment slicing and mending, Haijun WANG, Yun LIN, Zijiang YANG, Jun SUN, Yang LIU, Jinsong DONG, Qinghua ZHENG, and Ting LIU Journal Article
Fusion of multimodal embeddings for ad-hoc video search, Danny FRANCIS, Phuong Anh NGUYEN, Benoit HUET, and Chong-wah NGO Conference Proceeding Article
Generic construction of ElGamal-type attribute-based encryption schemes with revocability and dual-policy, Shengmin XU, Yinghui ZHANG, Yingjiu LI, Ximeng LIU, and Guomin YANG Conference Proceeding Article
Inferring accurate bus trajectories from noisy estimated arrival time records, Lakmal MEEGAHAPOLA, Noel ATHAIDE, Kasthuri JAYARAJAH, Shili XIANG, and Archan MISRA Conference Proceeding Article
Knowledge base question answering with a matching-aggregation model and question-specific contextual relations, Yunshi LAN, Shuohang WANG, and Jing JIANG Journal Article
LiveForen: Ensuring live forensic integrity in the cloud, Anyi LIU, Huirong FU, Yuan HONG, Jigang LIU, and Yingjiu LI Journal Article
Mixed-dish recognition with contextual relation networks, Lixi DENG, Jingjing CHEN, Qianru SUN, Xiangnan HE, Sheng TANG, Zhaoyan MING, Yongdong ZHANG, and Tat-Seng CHUA Conference Proceeding Article
Multi-agent collaborative exploration through graph-based deep reinforcement learning, Tianze LUO, Budhitama SUBAGDJA, Ah-hwee TAN, and Ah-Hwee TAN Conference Proceeding Article
New challenges in display-saturated environments, Mateusz Andrzej MIKUSZ, Tsu Wei Kenny CHOO, Rajesh Krishna BALAN, Nigel DAVIES, and Youngki LEE Journal Article
Nonuniform timeslicing of dynamic graphs based on visual complexity, Yong WANG, Daniel ARCHAMBAULT, Hammad HALEEM, Torsten MOELLER, Yanhong WU, and Huamin QU Conference Proceeding Article
On analysing supply and demand in labor markets: Framework, model and system, Hendrik Santoso SUGIARTO, Ee-peng LIM, and Ngak Leng SIM Conference Proceeding Article
Parametric timed model checking for guaranteeing timed opacity, Étienne ANDRÉ and Jun SUN Conference Proceeding Article
SIEVE: Helping developers sift wheat from chaff via cross-platform analysis, Agus SULISTYA, Gede A. A. P. PRANA, David LO, and Christoph TREUDE Journal Article
SmartBFA: A passive crowdsourcing system for point-to-point barrier-free access, Mohammed Nazir KAMALDIN, Susan KEE, Songwei KONG, Chengkai LEE, Huiguang LIANG, Alisha SAINI, Hwee-pink TAN, and Hwee Xian TAN Conference Proceeding Article
SmartEmbed: A tool for clone and bug detection in smart contracts through structural code embedding, Zhipeng GAO, Magalle Hewa Vinoj Yasanga JAYASUNDARA, Lingxiao JIANG, Xin XIA, David LO, and John C. GRUNDY Conference Proceeding Article
SolarGest: Ubiquitous and battery-free gesture recognition using solar cells, Dong MA, Guohao LAN, Mahbub HASSAN, Wen HU, B. Mushfika UPAMA, Ashraf UDDIN, YOUSEEF, and Moustafa Conference Proceeding Article
Supporting software architecture maintenance by providing task-specific recommendations, Matthias GALSTER, Christoph TREUDE, and Kelly BLINCOE Conference Proceeding Article
The Vid3oC and IntVID datasets for video super resolution and quality mapping, S. KIM, G. LI, D. FUOLI, M. DANELLJAN, Zhiwu HUANG, S. GU, and R. TIMOFTE Conference Proceeding Article
Tighter security proofs for post-quantum key encapsulation mechanism in the multi-challenge setting, Zhengyu ZHANG, Puwen WEI, and Haiyang XUE Conference Proceeding Article
TopicSummary: A tool for analyzing class discussion forums using topic based summarizations, Swapna GOTTIPATI, Venky SHANKARARAMAN, and Renjini RAMESH Conference Proceeding Article
Towards generating transformation rules without examples for Android API replacement, Ferdian THUNG, Kang Hong JIN, Lingxiao JIANG, and David LO Conference Proceeding Article
Towards generating transformation rules without examples for android API replacement, Ferdian THUNG, Hong Jin KANG, Lingxiao JIANG, and David LO Conference Proceeding Article
Tracy: A business-driven technical debt prioritization framework, Rodrigo REBOUÇAS DE ALMEIDA, Christoph TREUDE, and Uirá KULESZA Conference Proceeding Article
Weakly-supervised deep anomaly detection with pairwise relation learning, Guansong PANG, Anton Van Den HENGEL, and Chuanhua SHEN Working Paper
Who, where, and what to wear?: extracting fashion knowledge from social media, Yunshan MA, Xun YANG, Lizi LIAO, Yixin CAO, and Tat-Seng CHUA Conference Proceeding Article
Who, where, and what to wear?: extracting fashion knowledge from social media, Yunshan MA, Xun YANG, Lizi LIAO, Yixin CAO, and Tat-Seng CHUA Conference Proceeding Article
Who, where, and what to wear?: Extracting fashion knowledge from social media, Yunshan MA, Xun YANG, Lizi LIAO, Yixin CAO, and Tat-Seng CHUA Conference Proceeding Article
Orienteering problems: Models and algorithms for vehicle routing problems with profits, Pieter VANSTEENWEGEN and Aldy GUNAWAN Book
Supervised generative adversarial cross-modal hashing by transferring pairwise similarities for venue discovery, Himanshu AGGARWAL, Rajiv Ratn SHAH, Suhua TANG, and Feida ZHU Conference Proceeding Article
Why reinventing the wheels? An empirical study on library reuse and re-implementation, Bowen XU, Le AN, Ferdian THUNG, Foutse KHOMH, and David LO Journal Article
A case study on automated fuzz target generation for large codebases, Matthew KELLY, Christoph TREUDE, and Alex MURRAY Conference Proceeding Article
A common approach for consumer and provider fairness in recommendations, Dimitris Sacharidis, Kyriakos MOURATIDIS, and Dimitrios Kleftogiannis Conference Proceeding Article
A lattice-based linkable ring signature supporting stealth addresses, Zhen LIU, Khoa NGUYEN, Guomin YANG, Huaxiong WANG, and Duncan S. WONG Conference Proceeding Article
Automatic generation of non-intrusive updates for third-party libraries in android applications, Yue DUAN, Lian GAO, Jie HU, and Heng YIN Conference Proceeding Article
Be sensitive and collaborative: Analyzing impact of coverage metrics in Greybox fuzzing, Jinghan WANG, Yue DUAN, Wei SONG, Heng YIN, and Chengyu SONG Conference Proceeding Article
Can earables support effective user engagement during weight-based gym exercises?, Meeralakshmi RADHAKRISHNAN and Archan MISRA Conference Proceeding Article
Confusion and information triggered by photos in persona profiles, Joni SALMINEN, Soon-gyo JUNG, Jisun AN, Haewoon KWAK, Lene NIELSEN, and Bernard J. JANSEN Journal Article
Detecting toxicity triggers in online discussions, Hamad Bin Khalifa University and Haewoon KWAK Conference Proceeding Article
Efficient and robust certificateless signature for data crowdsensing in cloud-assisted industrial IoT, Yinghui ZHANG, Robert H. DENG, Dong ZHENG, Jin LI, Pengfei WU, and Jin CAO Journal Article
Efficient distributed reachability querying of massive temporal graphs, Tianming ZHANG, Yunjun GAO, Chen LU, Wei GUO, Shiliang PU, Baihua ZHENG, and CHRISTIAN S. Jensen Journal Article
Efficient oblivious transfer with membership verification, Weiwei LIU, Dazhi SUN, and Yangguang TIAN Journal Article
Enhancing Python compiler error messages via Stack Overflow, Emillie THISELTON and Christoph TREUDE Conference Proceeding Article
Finding flaws from password authentication code in Android apps, Siqi MA, Elisa BERTINO, Surya NEPAL, Jianru LI, Ostry DIETHELM, Robert H. DENG, and Sanjay JHA Conference Proceeding Article
Generating expensive relationship features from cheap objects, Xiaogang WANG, Qianru SUN, Tat-Seng CHUA, and Marcelo ANG Conference Proceeding Article
Interactive hierarchical object proposals, Mingliang CHEN, Jiawei ZHANG, Shengfeng HE, Qingxiong YANG, Qing LI, and Ming-Hsuan YANG Journal Article
Lightweight fine-grained search over encrypted data in fog computing, Yinbin MIAO, Jianfeng MA, Ximeng LIU, Jian WENG, Hongwei LI, and Hui Li Journal Article
Puncturable proxy re-encryption supporting to group messaging service, Tran Viet Xuan PHUONG, Willy SUSILO, Jongkil KIM, Guomin YANG, and Dongxi LIU Conference Proceeding Article
Rotation invariant convolutions for 3D point clouds deep learning, Zhiyuan ZHANG, Binh-Son HUA, David W. ROSEN, and Sai-Kit YEUNG Conference Proceeding Article
Self-refining deep symmetry enhanced network for rain removal, Hong LIU, Hanrong YE, Xia LI, Wei SHI, Mengyuan LIU, and Qianru SUN Conference Proceeding Article
Spatio-temporal analysis and prediction of cellular traffic in metropolis, Xu WANG, Zimu ZHOU, Fu XIAO, Kai XING, Zheng YANG, Yunhao LIU, and Chunyi PENG Journal Article
Triadic closure, homophily, and reciprocation: An empirical investigation of social ties between content providers, tingting SONG, Qian TANG, and Jinghua HUANG Journal Article
Adapting BERT for target-oriented multimodal sentiment classification, Jianfei YU and Jing JIANG Conference Proceeding Article
Knowledge base question answering with topic units, Yunshi LAN, Shuohang WANG, and Jing JIANG Conference Proceeding Article
Coresets for minimum enclosing balls over sliding windows, Yanhao WANG, Yuchen LI, and Kian-Lee TAN Conference Proceeding Article
FoodAI: Food image recognition via deep learning for smart food logging, Doyen SAHOO; Hao WANG; Ke SHU; Xiongwei WU; Hung LE; Palakorn ACHANANUPARP; Ee-peng LIM; and HOI, Steven C. H. Conference Proceeding Article
Optimizing impression counts for outdoor advertising, Yipeng ZHANG, Yuchen LI, Zhifeng BAO, Songsong MO, and Ping ZHANG Conference Proceeding Article
Sentence-level evidence embedding for claim verification with hierarchical attention networks, Jing MA, Wei GAO, Shafiq JOTY, and Kam-Fai WONG Conference Proceeding Article