Submissions from 2019
Adapting BERT for target-oriented multimodal sentiment classification, Jianfei YU and Jing JIANG Conference Proceeding Article
Adversarial learning on heterogeneous information networks, Binbin HU, Yuan FANG, and Chuan SHI Conference Proceeding Article
An evaluation of pure spectrum-based fault localization techniques for large-scale software systems, Simon HEIDEN, Lars GRUNSKE, Timo KEHRER, Fabian KELLER, Andre VAN HOORN, Antonio FILIERI, and David LO Journal Article
AnswerBot: An answer summary generation tool based on stack overflow, Liang CAI, Haoye WANG, Bowen XU, Qiao HUANG, Xin XIA, David LO, and Zhenchang XING Conference Proceeding Article
A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance, Shengmin XU, Guomin YANG, Yi MU, and Ximeng LIU Journal Article
A survey on bluetooth 5.0 and mesh: New milestones of IoT, Juenjie YIN, Zheng YANG, Hao CAO, Tongtong LIU, Zimu ZHOU, and Chenshu WU Journal Article
Bidding mechanisms in graph games, Guy AVNI, Thomas A. HENZINGER, and Dorde ZIKELIC Conference Proceeding Article
BIKER: A tool for Bi-information source based API method recommendation, Liang CAI, Haoye WANG, Qiao HUANG, Xin XIA, Zhenchang XING, and David LO Conference Proceeding Article
Cerebro: Context-aware adaptive fuzzing for effective vulnerability detection, Yuekang LI, Yinxing XUE, Hongxu CHEN, Xiuheng WU, Cen ZHANG, Xiaofei XIE, Haijun WANG, and Yang LIU Conference Proceeding Article
Cold-start aware deep memory networks for multi-entity aspect-based sentiment analysis, Kaisong SONG, Wei GAO, Lujun ZHAO, Changlong SUN, and Xiaozhong LIU Conference Proceeding Article
Constructing strong designated verifier signatures from key encapsulation mechanisms, Borui GONG, Ho Man AU, and Haiyang XUE Conference Proceeding Article
Correlation-sensitive next-basket recommendation, Duc Trong LE, Hady Wirawan LAUW, and Yuan FANG Conference Proceeding Article
Creating top ranking options in the continuous option and preference space, Bo TANG, Kyriakos MOURATIDIS, Man Lung YIU, and Zhenyu CHEN Conference Proceeding Article
Data-driven decision-support for process improvement through predictions of bed occupancy rates, Kar Way TAN, Qi You NG, Francis Ngoc Hoang Long NGUYEN, and Sean Shao Wei LAM Conference Proceeding Article
Data-driven surgical duration prediction model for surgery scheduling: A case-study for a practice-feasible model in a public hospital, Kar Way TAN, Francis Ngoc Hoang Long NGUYEN, Boon Yew ANG, Jerald GAN, and Sean Shao Wei LAM Conference Proceeding Article
Decision making for improving maritime traffic safety using constraint programming, Saumya BHATNAGAR, Akshat KUMAR, and Hoong Chuin LAU Conference Proceeding Article
Deep anomaly detection with deviation networks, Guansong PANG, Chunhua SHEN, and Anton van den HENGEL Conference Proceeding Article
DeepStellar: Model-based quantitative analysis of stateful deep learning systems, Xiaoning DU, Xiaofei XIE, Yi LI, Lei MA, Yang LIU, and Jianjun ZHAO Conference Proceeding Article
Deformable object tracking with gated fusion, Wenxi LIU, Yibing SONG, Dengsheng CHEN, Shengfeng HE, Yuanlong YU, Tao YAN, Gerhard P. HANCKE, and Rynson W.H. LAU Journal Article
DiffChaser: Detecting disagreements for deep neural networks, Xiaofei XIE, Lei MA, Haijun WANG, Yuekang LI, Yang LIU, and Xiaohong LI Conference Proceeding Article
Enhancing multi-hop sensor calibration with uncertainty estimates, Balz MAAG, Zimu ZHOU, and Lothar THIELE Conference Proceeding Article
Evaluating vulnerability to fake news in social networks: A community health assessment model, Bhavtosh RATH, Wei GAO, and Jaideep SRIVASTAVA Conference Proceeding Article
EzLog: Data visualization for logistics, Aldy GUNAWAN, Benjamin GAN, Jin An TAN, Sheena L.S.L VILLANUEVA, and Timothy K.J. WEN Conference Paper
Faster first-order methods for stochastic non-convex optimization on Riemannian manifolds, Pan ZHOU, Xiao-Tong YUAN, Shuicheng YAN, and Jiashi FENG Journal Article
Generalized majorization-minimization for non-convex optimization, Hu ZHANG, Pan ZHOU, Yi YANG, and Jiashi FENG Conference Proceeding Article
Gradient boosting with piece-wise linear regression trees, Yu SHI, Jian LI, and Zhize LI Conference Proceeding Article
Higher education in the AI age, Yizhi MA and Keng SIAU Conference Proceeding Article
How can AI help to enhance diversity and inclusion?, Keng SIAU Conference Proceeding Article
How does machine learning change software development practices?, Zhiyuan WAN, Xin XIA, David LO, and Gail C. MURPHY Journal Article
Improving law enforcement daily deployment through machine learning-informed optimization under uncertainty, Jonathan David CHASE, Duc Thien NGUYEN, Haiyang SUN, and Hoong Chuin LAU Conference Proceeding Article
Improving urban crowd flow prediction on flexible region partition, Xu WANG, Zimu ZHOU, Yi ZHAO, Xinglin ZHANG, Kai XING, Fu XIAO, Zheng YANG, and Yunhao LIU Journal Article
Industry 4.0: Challenges and opportunities in different countries, Keng SIAU, Yingrui XI, and Cui ZOU Journal Article
Industry 4.0: Ethical and moral predicaments, W. WANG and Keng SIAU Journal Article
InSPeCT: Iterated local search for solving path conditions, Fuxiang CHEN, Aldy GUNAWAN, David LO, and Sunghun KIM Conference Proceeding Article
Integrated assignment and routing with mixed service mode cross-dock, Vincent YU, Aldy GUNAWAN, Eric I. JUNAIDI, and Audrey T. WIDJAJA Conference Paper
KGAT: Knowledge graph attention network for recommendation, Xiang WANG, Xiangnan HE, Yixin CAO, Meng LIU, and Tat-Seng CHUA Conference Proceeding Article
Knowledge base question answering with topic units, Yunshi LAN, Shuohang WANG, and Jing JIANG Conference Proceeding Article
Language and robotics: Complex sentence understanding, Seng-Beng HO and Zhaoxia WANG Conference Proceeding Article
Latent error prediction and fault localization for microservice applications by learning from system trace logs, Xiang ZHOU, Xin PENG, Tao XIE, Jun SUN, Chao JI, Dewei LIU, Qilin XIANG, and Chuan HE Conference Paper
Learning multiple maps from conditional ordinal triplets, Duy Dung LE and Hady Wirawan LAUW Conference Proceeding Article
Let me in: Guidelines for the successful onboarding of newcomers to open source projects, Igor STEINMACHER, Christoph TREUDE, and Marco Aurélio GEROSA Magazine Article
Locating vulnerabilities in binaries via memory layout recovering, Haijun WANG, Xiaofei XIE, Shang-Wei LIN, Yun LIN, Yuekang LI, Shengchao QIN, Yang LIU, and Ting LIU Conference Proceeding Article
Low-rank sparse subspace for spectral clustering, Xiaofeng ZHU, Shichao ZHANG, Yonggang LI, Jilian ZHANG, Lifeng YANG, and Yue FANG Journal Article
Multiagent decision making and learning in urban environments, Akshat KUMAR Conference Proceeding Article
Multimodal transformer networks for end-to-end video-grounded dialogue systems, Hung LE, Doyen SAHOO, Nancy F. CHEN, and Steven C. H. HOI Conference Proceeding Article
Proposal-driven segmentation for videos, Junliang LI, Shengfeng HE, Hon-Cheng WONG, and Sio-Long LO Journal Article
SAR: Learning cross-language API mappings with little knowledge, Duy Quoc Nghi BUI, Yijun YU, and Lingxiao JIANG Conference Proceeding Article
SHOAL: Large-scale hierarchical taxonomy via graph-based query coalition in E-commerce, Zhao LI, Xia CHEN, Xuming PAN, Pengcheng ZOU, Yuchen LI, and Guoxian YU Conference Proceeding Article
Simulated annealing for the multi-vehicle cyclic inventory routing problem, Aldy GUNAWAN, Vincent F. YU, Audrey Tedja WIDJAJA, and Pieter VANSTEENWEGEN Conference Proceeding Article
Trust architecture and reputation evaluation for internet of things, Juan CHEN, Zhihong TIAN, Xiang CUI, Lihua YIN, and Xianzhi WANG Journal Article
Who should make decision on this pull request? Analyzing time-decaying relationships and file similarities for integrator prediction, Jing JIANG, David LO, Jiateng ZHENG, Xin XIA, Yun YANG, and Li ZHANG Journal Article
Who should pay the cost: A game-theoretic model for government subsidized investments to improve national cybersecurity, Xinrun WANG, Bo AN, and Hau CHAN Conference Proceeding Article
Cross-project defect prediction via ASTToken2Vec and BLSTM-based neural network, Hao LI, Xiaohong LI, Xiang CHEN, Xiaofei XIE, Yanzhou MU, and Zhiyong FENG Conference Proceeding Article
Control-flow carrying code, Yan LIN and Debin GAO Conference Proceeding Article
Do grant funding and pro-environmental spillovers influence household hazardous waste collection?, Kustini LIM-WAVDE, Robert J KAUFFMAN, Tin Seong KAM, and Gregory S. DAWSOND Journal Article
DynOpVm: VM-based software obfuscation with dynamic opcode mapping, Xiaoyang CHENG, Yan LIN, and Debin GAO Conference Proceeding Article
GPU-based graph traversal on compressed graphs, Mo SHA, Yuchen LI, and Kian-Lee TAN Conference Proceeding Article
Practical and effective sandboxing for Linux containers, Zhiyuan WAN, David LO, Xin XIA, and Liang CAI Journal Article
Predicting non-completion of programming exercises using action logs and keystrokes, Hua Leong FWA Conference Proceeding Article
Network-clustered multi-modal bug localization, Thong HOANG, Richard J. OENTARYO, Tien-Duy B. LE, and David LO Journal Article
A closer look tells more: A facial distortion based liveness detection for face authentication, Yan LI, Zilong WANG, Yingjiu LI, Robert H. DENG, Binbin CHEN, Weizhi MENG, and Hui LI Conference Proceeding Article
An intelligent platform with automatic assessment and engagement features for active online discussions, Michelle L. F. CHEONG, Yun-Chen CHEN, and Bing Tian DAI Conference Proceeding Article
Applying case-based learning for a postgraduate software architecture course, Eng Lieh OUH and Yunghans IRAWAN Conference Proceeding Article
A review on swarm intelligence and evolutionary algorithms for solving flexible job shop scheduling problems, Kaizhou GAO, Zhiguang CAO, Le ZHANG, Zhenghua CHEN, Yuyan HAN, and Quanke PAN Book Review
A scalable approach to joint cyber insurance and Security-as-a-Service provisioning in cloud computing, Jonathan David CHASE, Dusit NIYATO, Ping WANG, Sivadon CHAISIRI, and Ryan K. L. KO Journal Article
Compositional coding for collaborative filtering, Chenghao LIU, Tao LU, Xin WANG, Zhiyong CHENG, Jianling SUN, and Steven C. H. HOI Conference Proceeding Article
Correlated learning for aggregation systems, Tanvi VERMA and Pradeep VARAKANTHAM Conference Proceeding Article
Decentralizing air traffic flow management with blockchain based reinforcement learning, Nguyen Binh Duong TA, Umang CHAUDHARY, and Hong-Linh TRUONG Conference Proceeding Article
DeepHunter: A coverage-guided fuzz testing framework for deep neural networks, Xiaofei XIE, Lei MA, Felix JUEFEI-XU, Minhui XUE, Hongxu CHEN, Yang LIU, Jianjun ZHAO, Bo LI, Jianxiong YIN, and Simon SEE Conference Proceeding Article
Entropy based independent learning in anonymous multi-agent settings, Tanvi VERMA, Pradeep VARAKANTHAM, and Hoong Chuin Lau Conference Proceeding Article
Eugene: Towards deep intelligence as a service, Shuochao YAO, Yifan HAO, Yiran ZHAO, Ailing PIAO, Huajie SHAO, Dongxin LIU, Shengzhong LIU, Shaohan HU, Dulanga WEERAKOON, Kasthuri JAYARAJAH, Archan MISRA, and Tarek ABDELZAHER Conference Proceeding Article
Evaluating the readability of force directed graph layouts: A deep learning approach, Hammad HALEEM, Yong WANG, Abishek PURI, Sahil WADHWA, and Huamin QU Journal Article
Location based encryption, Tran Viet Xuan PHUONG, Willy SUSILO, Guomin YANG, Jun YAN, and Dongxi LIU Conference Proceeding Article
Model and analysis of labor supply for ride-sharing platforms in the presence of sample self-selection and endogeneity, Hao SUN, Hai WANG, and Zhixi WAN Journal Article
Modeling intra-relation in math word problems with different functional multi-head attentions, Jierui LI, Lei WANG, Jipeng ZHANG, Yan WANG, Bing Tian DAI, and Dongxiang ZHANG Conference Proceeding Article
Multi-channel graph neural network for entity alignment, Yixin CAO, Zhiyuan LIU, Chengjiang LI, Zhiyuan LIU, Juanzi LI, and Tat-Seng CHUA Conference Proceeding Article
ObliDC: An SGX-based oblivious distributed computing framework with formal proof, Pengfei WU, Qingni SHEN, Robert H. DENG, Ximeng LIU, Yinghui ZHANG, and Zhonghai WU Conference Proceeding Article
One-class order embedding for dependency relation prediction, Meng-Fen CHIANG, Ee-peng LIM, Wang-Chien LEE, Xavier Jayaraj Siddarth ASHOK, and Philips Kokoh PRASETYO Conference Proceeding Article
On true language understanding, Seng-Beng HO and Zhaoxia WANG Conference Proceeding Article
Personalized fashion recommendation with visual explanations based on multimodal attention network: Towards visually explainable recommendation, Xu CHEN, Hanxiong CHEN, Hongteng XU, Yongfeng ZHANG, Yixin CAO, Zheng QIN, and Hongyuan ZHA Conference Proceeding Article
Pruneable sharding-based blockchain protocol, Xiaoqin FENG, Jianfeng MA, Yinbin MIAO, Qian MENG, Ximeng LIU, Qi JIANG, and Hui LI Journal Article
REDPC: A residual error-based density peak clustering algorithm, Milan PARMAR, Di WANG, Xiaofeng ZHANG, Ah-hwee TAN, Chunyan MIAO, and You ZHOU Journal Article
Resilient Collaborative Intelligence for Adversarial IoT Environments, Dulanga WEERAKOON, Kasthuri JAYARAJAH, Randy TANDRIANSYAH, and Archan MISRA Conference Proceeding Article
Resource constrained deep reinforcement learning, Abhinav BHATIA, Pradeep VARAKANTHAM, and Akshat KUMAR Conference Proceeding Article
Securing messaging services through efficient signcryption with designated equality test, Yujue WANG, Hwee Hwa PANG, Robert H. DENG, Yong DING, Qianhong WU, and Bo QIN Journal Article
Semantic patches for Java program transformation, Hong Jin KANG, Ferdian THUNG, Julia LAWALL, Gilles MULLER, Lingxiao JIANG, and David LO Conference Proceeding Article
Semantic patches for Java program transformation (artifact), Hong Jin KANG, Thung Ferdian, Julia LAWALL, Gilles MULLER, Lingxiao JIANG, and David LO Conference Proceeding Article
Seven HCI grand challenges, C. STEPHANIDIS, G. SALVENDY, M. ANTONA, J. CHEN, J. DONG, V. DUFFY, X. FANG, C. FIDOPIASTIS, G. FRAGOMENI, L. FU, Y. GUO, D. HARRIS, A. IOANNOU, K. JEONG, Keng SIAU, H. KRÖMKER, M. KUROSU, J.R. LEWIS, A. MARCUS, and G. MEISELWITZ Journal Article
Simulated annealing for the single-vehicle cyclic inventory routing problem, Aldy GUNAWAN, Vincent F. YU, Audrey T. WIDJAJA, and Pieter. VANSTEENWEGEN Conference Proceeding Article
SplitSecond: Flexible privilege separation of Android apps, Jehyun LEE, Akshaya Venkateswara VENKATESWARA RAJA, and Debin GAO Conference Proceeding Article
Stochastic gradient Hamiltonian Monte Carlo with variance reduction for Bayesian inference, Zhize LI, Tianyi ZHANG, Shuyu CHENG, Jun ZHU, and Jian LI Journal Article
The chilling effect of enforcement of computer misuse: Evidences from online hacker forums, Qiu-hong WANG, Rui-Bin GENG, and Seung Hyun KIM Presentation
The impact of changes mislabeled by SZZ on just-in-time defect prediction, Yuanrui FAN, Xin XIA, Daniel A. COSTA, David LO, Ahmed E. HASSAN, and Shanping LI Journal Article
The Wiener attack on RSA revisited: A quest for the exact bound, Willy SUSILO, Joseph TONIEN, and Guomin YANG Conference Proceeding Article
Toward human-like summaries generated from heterogeneous software artefacts, Mahfouth ALGHAMDI, Christoph TREUDE, and Markus WAGNER Conference Proceeding Article
Towards understanding Android system vulnerabilities: Techniques and insights, Daoyuan WU, Debin GAO, Eric K. T. CHENG, Yichen CAO, Jintao JIANG, and Robert H. DENG Conference Proceeding Article
Volumetric optimization of freight cargo loading: Case study of a SMU forwarder, Tristan LIM, Michael Ser Chong PING, Mark GOH, and Shi Ying Jacelyn TAN Conference Proceeding Article
ZAC: A Zone pAth Construction approach for effective real-time ridesharing, Meghna LOWALEKAR, Pradeep VARAKANTHAM, and Patrick JAILLET Conference Proceeding Article
Mannequette: Understanding and enabling collaboration and creativity on avant-garde fashion-tech runways, Teddy SEYED and Anthony TANG Conference Proceeding Article
DroidEvolver: Self-evolving Android malware detection system, Ke XU, Yingjiu LI, Robert H. DENG, Kai CHEN, and Jiayun XU Conference Proceeding Article