Submissions from 2019
Entropy based independent learning in anonymous multi-agent settings, Tanvi VERMA, Pradeep VARAKANTHAM, and Hoong Chuin Lau Conference Proceeding Article
Eugene: Towards deep intelligence as a service, Shuochao YAO, Yifan HAO, Yiran ZHAO, Ailing PIAO, Huajie SHAO, Dongxin LIU, Shengzhong LIU, Shaohan HU, Dulanga WEERAKOON, Kasthuri JAYARAJAH, Archan MISRA, and Tarek ABDELZAHER Conference Proceeding Article
Evaluating the readability of force directed graph layouts: A deep learning approach, Hammad HALEEM, Yong WANG, Abishek PURI, Sahil WADHWA, and Huamin QU Journal Article
Location based encryption, Tran Viet Xuan PHUONG, Willy SUSILO, Guomin YANG, Jun YAN, and Dongxi LIU Conference Proceeding Article
Model and analysis of labor supply for ride-sharing platforms in the presence of sample self-selection and endogeneity, Hao SUN, Hai WANG, and Zhixi WAN Journal Article
Modeling intra-relation in math word problems with different functional multi-head attentions, Jierui LI, Lei WANG, Jipeng ZHANG, Yan WANG, Bing Tian DAI, and Dongxiang ZHANG Conference Proceeding Article
Multi-channel graph neural network for entity alignment, Yixin CAO, Zhiyuan LIU, Chengjiang LI, Zhiyuan LIU, Juanzi LI, and Tat-Seng CHUA Conference Proceeding Article
ObliDC: An SGX-based oblivious distributed computing framework with formal proof, Pengfei WU, Qingni SHEN, Robert H. DENG, Ximeng LIU, Yinghui ZHANG, and Zhonghai WU Conference Proceeding Article
One-class order embedding for dependency relation prediction, Meng-Fen CHIANG, Ee-peng LIM, Wang-Chien LEE, Xavier Jayaraj Siddarth ASHOK, and Philips Kokoh PRASETYO Conference Proceeding Article
On true language understanding, Seng-Beng HO and Zhaoxia WANG Conference Proceeding Article
Personalized fashion recommendation with visual explanations based on multimodal attention network: Towards visually explainable recommendation, Xu CHEN, Hanxiong CHEN, Hongteng XU, Yongfeng ZHANG, Yixin CAO, Zheng QIN, and Hongyuan ZHA Conference Proceeding Article
Pruneable sharding-based blockchain protocol, Xiaoqin FENG, Jianfeng MA, Yinbin MIAO, Qian MENG, Ximeng LIU, Qi JIANG, and Hui LI Journal Article
REDPC: A residual error-based density peak clustering algorithm, Milan PARMAR, Di WANG, Xiaofeng ZHANG, Ah-hwee TAN, Chunyan MIAO, and You ZHOU Journal Article
Resilient Collaborative Intelligence for Adversarial IoT Environments, Dulanga WEERAKOON, Kasthuri JAYARAJAH, Randy TANDRIANSYAH, and Archan MISRA Conference Proceeding Article
Resource constrained deep reinforcement learning, Abhinav BHATIA, Pradeep VARAKANTHAM, and Akshat KUMAR Conference Proceeding Article
Securing messaging services through efficient signcryption with designated equality test, Yujue WANG, Hwee Hwa PANG, Robert H. DENG, Yong DING, Qianhong WU, and Bo QIN Journal Article
Semantic patches for Java program transformation, Hong Jin KANG, Ferdian THUNG, Julia LAWALL, Gilles MULLER, Lingxiao JIANG, and David LO Conference Proceeding Article
Semantic patches for Java program transformation (artifact), Hong Jin KANG, Thung Ferdian, Julia LAWALL, Gilles MULLER, Lingxiao JIANG, and David LO Conference Proceeding Article
Seven HCI grand challenges, C. STEPHANIDIS, G. SALVENDY, M. ANTONA, J. CHEN, J. DONG, V. DUFFY, X. FANG, C. FIDOPIASTIS, G. FRAGOMENI, L. FU, Y. GUO, D. HARRIS, A. IOANNOU, K. JEONG, Keng SIAU, H. KRÖMKER, M. KUROSU, J.R. LEWIS, A. MARCUS, and G. MEISELWITZ Journal Article
Simulated annealing for the single-vehicle cyclic inventory routing problem, Aldy GUNAWAN, Vincent F. YU, Audrey T. WIDJAJA, and Pieter. VANSTEENWEGEN Conference Proceeding Article
SplitSecond: Flexible privilege separation of Android apps, Jehyun LEE, Akshaya Venkateswara VENKATESWARA RAJA, and Debin GAO Conference Proceeding Article
Stochastic gradient Hamiltonian Monte Carlo with variance reduction for Bayesian inference, Zhize LI, Tianyi ZHANG, Shuyu CHENG, Jun ZHU, and Jian LI Journal Article
The chilling effect of enforcement of computer misuse: Evidences from online hacker forums, Qiu-hong WANG, Rui-Bin GENG, and Seung Hyun KIM Presentation
The impact of changes mislabeled by SZZ on just-in-time defect prediction, Yuanrui FAN, Xin XIA, Daniel A. COSTA, David LO, Ahmed E. HASSAN, and Shanping LI Journal Article
The Wiener attack on RSA revisited: A quest for the exact bound, Willy SUSILO, Joseph TONIEN, and Guomin YANG Conference Proceeding Article
Toward human-like summaries generated from heterogeneous software artefacts, Mahfouth ALGHAMDI, Christoph TREUDE, and Markus WAGNER Conference Proceeding Article
Towards understanding Android system vulnerabilities: Techniques and insights, Daoyuan WU, Debin GAO, Eric K. T. CHENG, Yichen CAO, Jintao JIANG, and Robert H. DENG Conference Proceeding Article
Use of mental models and cognitive maps to understand students’ learning challenges, Zixing SHEN, Songxin TAN, and Keng SIAU Journal Article
Volumetric optimization of freight cargo loading: Case study of a SMU forwarder, Tristan LIM, Michael Ser Chong PING, Mark GOH, and Shi Ying Jacelyn TAN Conference Proceeding Article
ZAC: A Zone pAth Construction approach for effective real-time ridesharing, Meghna LOWALEKAR, Pradeep VARAKANTHAM, and Patrick JAILLET Conference Proceeding Article
Mannequette: Understanding and enabling collaboration and creativity on avant-garde fashion-tech runways, Teddy SEYED and Anthony TANG Conference Proceeding Article
DroidEvolver: Self-evolving Android malware detection system, Ke XU, Yingjiu LI, Robert H. DENG, Kai CHEN, and Jiayun XU Conference Proceeding Article
Unsupervised deep structured semantic models for commonsense reasoning, Shuohang WANG, Sheng ZHANG, Yelong SHEN, Xiaodong LIU, Jingjing LIU, Jianfeng GAO, and Jing JIANG Conference Proceeding Article
A decision framework for decentralised control of distributed processes: Is blockchain the only solution?, Paul Robert GRIFFIN, Alan MEGARGEL, and Venky SHANKARARAMAN Book Chapter
Adversarial contract design for private data commercialization, Parinaz NAGHIZADEH and Arunesh SINHA Conference Proceeding Article
A fine ganularity object-level representation for event detection and recounting, Hao ZHANG and Chong-wah NGO Journal Article
An empirical study of mobile network behavior and application performance in the wild, Shiwei ZHANG, Weichao LI, Daoyuan WU, Bo JIN, Rocky K. C. CHANG, Debin GAO, Yi WANG, and Ricky K. P. MOK Conference Proceeding Article
Applied Cryptography and Network Security Workshops: ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5-7: Proceedings, Jianying ZHOU, Robert H. DENG, ZHOU LI, Suryadipta MAJUMDAR, Weizhi MENG, and Lingyu WANG Edited Conference Proceeding
A tribute to Robert U. Ayres for a lifetime of work in technological forecasting and related areas, Steven M. MILLER Editorial
Automatic loop summarization via path dependency analysis, Xiaofei XIE, Bihuan CHEN, Liang ZOU, Yang LIU, Wei LE, and Xiaohong LI Journal Article
BuSCOPE: Fusing individual & aggregated mobility behavior for “Live” smart city services, Lakmal Buddika MEEGAHAPOLA, Thivya KANDAPPU, KASTHURI JAYARAJAH, Leman AKOGLU, Shili XIANG, and Archan MISRA Conference Paper
Buscope: Fusing individual & aggregated mobility behavior for" live" smart city services, Lakmal MEEGAHAPOLA, Thivya KANDAPPU, Kasthuri JAYARAJAH, Leman AKOGLU, Shili XIANG, and Archan MISRA Conference Proceeding Article
Collusion attacks and fair time-locked deposits for fast-payment transactions in Bitcoin, Xingjie YU, Shiwen Michael THANG, Yingjiu LI, and Robert H. DENG Journal Article
Context-aware spatio-recurrent curvilinear structure segmentation, Feigege WANG, Yue GU, Wenxi LIU, Shengfeng HE, Shengfeng HE, and Jia PAN Conference Proceeding Article
Coordinating supply and demand on an on-demand service platform with impatient customers, Jiaru BAI, Kut C. SO, Christopher S. TANG, Xiqun CHEN, and Hai WANG Journal Article
CoRRN: Cooperative Reflection Removal Network, Renjie WEN, Boxin SHI, Haoliang LI, Ling-Yu DUAN, Ah-hwee TAN, and Alex C. KOT Journal Article
CrowdBC: A blockchain-based decentralized framework for crowdsourcing, Ming LI, Jian WENG, Anjia YANG, Wei LU, Yue ZHANG, Lin HOU, Jiannan LIU, Yang XIANG, and Robert H. DENG Journal Article
Deep binocular tone mapping, Zhuming ZHANG, Chu HAN, Shengfeng HE, Xueting LIU, Haichao ZHU, Xinghong HU, and Tien-Tsin WONG Journal Article
DietLens-eout: Large scale restaurant food photo recognition, Zhipeng WEI, Jingjing CHEN, Zhaoyan MING, Chong-wah NGO, Tat-Seng CHUA, and Fengfeng ZHOU Conference Proceeding Article
Distributed similarity queries in metric spaces, Keyu YANG, Xin DING, Yuanliang ZHANG, Lu CHEN, Baihua ZHENG, and Yunjun GAO Journal Article
Dynamic fusion with intra-and inter-modality attention flow for visual question answering, Peng GAO, Zhengkai JIANG, Haoxuan YOU, Pan LU, Steven C. H. HOI, Xiaogang WANG, and Hongsheng LI Conference Proceeding Article
EnTrans: Leveraging kinetic energy harvesting signal for transportation mode detection, Guohao LAN, Weitao XU, Dong MA, Sara KHALIFA, Mahbub HASSAN, and Wen HU Journal Article
Exploratory analysis of individuals' mobility patterns and experienced conflicts in workgroup, NUR CAMELLIA BINTE ZAKARIA, Kenneth T. GOH, Youngki LEE, and Rajesh Krishna BALAN Conference Proceeding Article
Exploring object relation in mean teacher for cross-domain detection, Qi CAI, Yingwei PAN, Chong-wah NGO, Xinmei TIAN, Lingyu DUAN, and Ting YAO Conference Proceeding Article
Geometric top-K processing: Updates since MDM'16 [Advanced Seminar], Kyriakos MOURATIDIS Conference Proceeding Article
Hybrid keyword-field search with efficient key management for industrial Internet of Things, Yinbin MIAO, Ximeng LIU, Robert H. DENG, Hongjun WU, Hongwei LI, Jiguo LI, and WU. Dapeng Journal Article
Importance sampling of Interval Markov Chains, Cyrille JEGOUREL, Jingyi WANG, and Jun SUN Conference Proceeding Article
Joint face hallucination and deblurring via structure generation and detail enhancement, Yibing SONG, Jiawei ZHANG, Lijun GONG, Shengfeng HE, Linchao BAO, Jinshan PAN, Qingxiong YANG, and Ming-Hsuan YANG Journal Article
Key-insulated and privacy-preserving signature scheme with publicly derived public key, Zhen LIU, Guomin YANG, Duncan S. WONG, Khoa NGUYEN, and Huaxiong WANG Conference Proceeding Article
Learning cross-modal embeddings with adversarial networks for cooking recipes and food images, Hao WANG, Doyen SAHOO, Chenghao LIU, Ee-Peng LIM, and Steven C. H. HOI Conference Proceeding Article
Learning spatio-temporal representation with local and global diffusion, Zhaofan QIU, Ting YAO, Chong-wah NGO, Xinmei TIAN, and Tao MEI Conference Proceeding Article
Lightweight privacy-preserving ensemble classification for face recognition, Zhuo MA, Yang LIU, Ximeng LIU, Jianfeng MA, and Kui REN Journal Article
LPGL: Low-power graphics library for mobile AR headsets, CHOI Jaewon, Hyeonjung PARK, Jeongyeup PAEK, Rajesh Krishna BALAN, and JeongGil KO Conference Proceeding Article
Matching passengers and drivers with multiple objectives in ride sharing markets, Guodong LYU, Chung Piaw TEO, Wangchi CHEUNG, and Hai WANG Conference Proceeding Article
Metagraph-based learning on heterogeneous graphs, Yuan FANG, Wenqing LIN, Vincent W. ZHENG, Min WU, Jiaqi SHI, Kevin CHANG, and Xiao-Li LI Journal Article
Meta-transfer learning for few-shot learning, Qianru SUN, Yaoyao LIU, Tat-Seng CHUA, and Bernt SCHIELE Conference Proceeding Article
Mixed dish recognition through multi-label learning, Yunan WANG, Jing-Jing CHEN, Chong-wah NGO, Tat-Seng CHUA, Wanli ZUO, and Zhaoyan MING Conference Proceeding Article
Political discussions in homogeneous and cross-cutting communication spaces, Qatar Computing Research Institute, Haewoon KWAK, and Universität Bamberg Conference Proceeding Article
R2GAN: Cross-modal recipe retrieval with generative adversarial network, Bin ZHU, Chong-wah NGO, Jingjing CHEN, and Yanbin HAO Conference Proceeding Article
Secure online/offline data sharing framework for cloud-assisted industrial internet of things, Yinbin MIAO, Qiuyun TONG, Kim-Kwang Raymond CHOO, Ximeng LIU, Robert H. DENG, and Hongwei LI Journal Article
Self-supervised spatio-temporal representation learning for videos by predicting motion and appearance statistics, Jiangliu WANG, Jianbo JIAO, Linchao BAO, Shengfeng HE, Yunhui LIU, and Wei LIU Conference Proceeding Article
Single image reflection removal beyond linearity, Qiang WEN, Yinjie TAN, Jing QIN, Wenxi LIU, Guoqiang HAN, and Shengfeng HE Conference Proceeding Article
Sliced Wasserstein generative models, Jiqing WU, Zhiwu HUANG, Dinesh ACHARYA, Wen LI, Janine THOMA, Danda Pani PAUDEL, and Luc VAN GOOL Conference Proceeding Article
Stabilized SVRG: Simple Variance Reduction for Nonconvex Optimization, Rong GE, Zhize LI, Weiyao WANG, and Xiang WANG Conference Proceeding Article
Time-based payout ratio for coordinating supply and demand on an on-demand service platform, Jiaru BAI, Kut C. SO, Christopher S. TANG, Xiqun CHEN, and Hai WANG Book Chapter
Transferrable prototypical networks for unsupervised domain adaptation, Yingwei PAN, Ting YAO, Yehao LI, Yu WANG, Chong-wah NGO, and Tao MEI Conference Proceeding Article
View, Like, Comment, Post: Analyzing user engagement by topic at 4 levels across 5 social media platforms for 53 news organizations, Kholoud K. ALDOUS, Jisun AN, and Bernard J. JANSEN Conference Proceeding Article
What do hotel customers complain about? Text analysis using structural topic model, Nan HU, Ting ZHANG, Baojun GAO, and Indranil BOSE Journal Article
Why is my code change abandoned?, Qingye WANG, Xin XIA, David LO, and Shanping LI Journal Article
Examining augmented virtuality impairment simulation for mobile app accessibility design, Tsu Wei, Kenny (ZHU Shuwei, Kenny) CHOO; Rajesh Krishna BALAN; and Rajesh Krishna BALAN Conference Proceeding Article
Worker demographics and earnings on amazon mechanical turk: An exploratory analysis, Kotaro HARA, Kristy MILLAND, Benjamin V. HANRAHAN, Chris CALLISON-BURCH, Abigail ADAMS, Saiph SAVAGE, and Jeffrey P. BIGHAM Conference Proceeding Article
CellTradeMap: Delineating trade areas for urban commercial districts with cellular networks, Yi ZHAO, Zimu ZHOU, Xu WANG, Tongtong LIU, Yunhao LIU, and Zheng YANG Conference Proceeding Article
Search in my way: Practical outsourced image retrieval framework supporting unshared key, Xiangyu WANG, Jianfeng MA, Ximeng LIU, and Yinbin MIAO Conference Proceeding Article
9.6 million links in source code comments: Purpose, evolution, and decay, Hideaki HATA, Christoph TREUDE, Raula Gaikovina KULA, and Takashi ISHIO Conference Proceeding Article
A blockchain-based location privacy-preserving crowdsensing system, Mengmeng YANG, Tianqing ZHU, Kaitai LIANG, Wanlei ZHOU, and Robert H. DENG Journal Article
Adaptive Resonance Theory (ART) for social media analytics, Lei MENG, Ah-Hwee TAN, and Donald C. II WUNSCH Book Chapter
Adversarial sample detection for deep neural network through model mutation testing, Jingyi WANG, Guoliang DONG, Jun SUN, Xinyu WANG, and Zhang PEIXIN Conference Paper
A homophily-free community detection framework for trajectories with delayed responses, Chung-kyun HAN, Shih-Fen CHENG, and Pradeep VARAKANTHAM Conference Proceeding Article
Automatically generating documentation for lambda expressions in Java, Anwar ALQAIMI, Patanamon THONGTANUNAM, and Christoph TREUDE Conference Proceeding Article
Beyond autonomy: The self and life of social agents, Budhitama SUBAGDJA and Ah-hwee TAN Conference Proceeding Article
Bilateral liability-based contracts in information security outsourcing, Kai-Lung HUI, Ping Fan KE, Yuxi YAO, and Wei Thoo YUE Journal Article
Clustering and its extensions in the social media domain, Lei MENG, Ah-hwee TAN, and Donald C. WUNSCH Book Chapter
Community discovery in heterogeneous social networks, Lei MENG, Ah-hwee TAN, and Donald C. WUNSCH Book Chapter
Concluding remarks, Lei MENG, Ah-hwee TAN, and Donald C. WUNSCH Book Chapter
CURE: Flexible categorical data representation by hierarchical coupling learning, Songlei JIAN, Guansong PANG, Longbing CAO, Kai LU, and Hang GAO Journal Article
DeepJIT: an end-to-end deep learning framework for just-in-time defect prediction, Thong HOANG, Hoa Khanh DAM, Yasutaka KAMEI, David LO, and Naoyasu UBAYASHI Conference Proceeding Article
Designated-server identity-based authenticated encryption with keyword search for encrypted emails, Hongbo LI, Qiong HUANG, Jian SHEN, Guomin YANG, and Willy SUSILO Journal Article
Detect rumors on Twitter by promoting information campaigns with generative adversarial learning, Jing MA, Wei GAO, and Kam-Fai WONG Conference Proceeding Article
Emerging app issue identification from user feedback: Experience on WeChat, Cuiyun GAO, Wujie ZHENG, Yuetang DENG, David LO, Jichuan ZENG, Michael R. LYU, and Irwin KING Conference Proceeding Article
Graph based optimization for multiagent cooperation, Arambam James SINGH and Akshat KUMAR Conference Proceeding Article