Submissions from 2019
DeepReview: Automatic code review using deep multi-instance learning, Hengyi LI, Shuting SHI, Ferdian THUNG, Xuan HUO, Bowen XU, Ming LI, and David LO Conference Proceeding Article
Dependable machine intelligence at the tactical edge, Archan MISRA, Kasthuri JAYARAJAH, Dulanga Kaveesha Weerakoon WEERAKOON MUDIYANSELAGE, Randy Tandriansyah DARATAN, Shuochao YAO, and Tarek ABDELZAHER Conference Proceeding Article
Discursive power in contemporary media systems: A comparative framework, Andreas JUNGHERR, Oliver POSEGGA, and Jisun AN Journal Article
Dynamic student classification on memory networks for knowledge tracing, Sein MINN, Michel C. DESMARAIS, Feida ZHU, Jing XIAO, and Jianzong WANG Conference Proceeding Article
Efficient algorithms for solving aggregate keyword routing problems, Qize JIANG, Weiwei SUN, Baihua ZHENG, and Kunjie CHEN Conference Proceeding Article
Exploring and visualizing household electricity consumption patterns in Singapore: A geospatial analytics approach, Yong Ying TAN and Tin Seong KAM Conference Proceeding Article
Fair and dynamic data sharing framework in cloud-assisted Internet of Everything, Yinbin MIAO, Ximeng LIU, Kim-Kwang Raymond CHOO, Robert H. DENG, Hongjun WU, and Hongwei LI Journal Article
Faster first-order methods for stochastic non-convex optimization on Riemannian manifolds, Pan ZHOU, Xiao-Tong YUAN, and Jiashi FENG Conference Proceeding Article
Maximizing multifaceted network influence, Yuchen LI, Ju FAN, George V. OVCHINNIKOV, and Panagiotis KARRAS Conference Proceeding Article
Online collaborative filtering with implicit feedback, Jianwen YIN, Chenghao LIU, Jundong LI, Bing Tian DAI, Yun-Chen CHEN, Min WU, and Jianling SUN Conference Proceeding Article
Perception coordination network: A neuro framework for multimodal concept acquisition and binding, You-Lu XING, Xiao-Feng SHI, Fu-Rao SHEN, Jin-Xi ZHAO, Jing-Xin PAN, and Ah-hwee TAN Journal Article
Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation, Shengmin XU, Guomin YANG, and Yi MU Journal Article
Route planning for a fleet of electric vehicles with waiting times at charging stations, Baoxiang LI, Shashi Shekhar JHA, and Hoong Chuin LAU Conference Proceeding Article
Text analytics approach to examining corporate social responsibility, Nurul Asyikeen Binte AZHAR, Gary PAN, Poh Sun SEOW, Andrew KOH, and Wan Ying TAY Journal Article
The capacitated team orienteering problem, Aldy GUNAWAN, Kien Ming NG, Vincent F. YU, Gordy ADIPRASETYO, and Hoong Chuin LAU Conference Proceeding Article
To the attention of mobile software developers: Guess what, test your app!, Luis C. CRUZ, Rui ABREU, and David LO Journal Article
WindyWall: Exploring creative wind simulations, David TOLLEY, Thi Ngoc Tram NGUYEN, Anthony TANG, Nimesha RANASINGHE, Kensaku KAWAUCHI, and Ching-Chiuan YEN Conference Proceeding Article
WiWear: Wearable sensing via directional wifi energy harvesting, Huy Vu TRAN, Archan MISRA, Jie XIONG, and Rajesh Krishna BALAN Conference Paper
An artificial bee colony-based hybrid approach for waste collection problem with midway disposal pattern, Qu WEI, Zhaoxia GUO, Hoong Chuin LAU, and Zhenggang HE Journal Article
API recommendation for event-driven Android application development, Weizhao YUAN, Huu Hoang NGUYEN, Lingxiao JIANG, Yuting CHEN, Jianjun ZHAO, and Haibo YU Journal Article
Automatic, highly accurate app permission recommendation, Zhongxin LIU, Xin XIA, David LO, and John GRUNDY Journal Article
BING: Binarized normed gradients for objectness estimation at 300fps, Ming-Ming CHENG, Yun LIU, Wen-yan LIN, Ziming ZHANG, Paul L. ROSIN, and Philip H. S. TORR Journal Article
BING: Binarized normed gradients for objectness estimation at 300fps, Ming-Ming CHENG, Yun LIU, Wen-yan LIN, Ziming ZHANG, Paul L. ROSIN, and Philip H. S. TORR Journal Article
Careful-Packing: A practical and scalable anti-tampering software protection enforced by trusted computing, Flavio TOFFALINI, Martín OCHOA, Jun SUN, and Jianying ZHOU Conference Proceeding Article
Characterizing and identifying reverted commits, Meng YAN, Xin XIA, David LO, Ahmed E. HASSAN, and Shanping LI Journal Article
Confusion prediction from eye-tracking data: Experiments with machine learning, Joni SALMINEN, Mridul NAGPAL, Haewoon KWAK, Jisun AN, Soon-gyo JUNG, and Bernard J. JANSEN Conference Proceeding Article
Design and assessment of myoelectric games for prosthesis training of upper limb amputees, MEERALAKSHMI RADHAKRISHNAN, Asim SMAILAGIC, Brian FRENCH, Daniel P. SIEWIOREK, and Rajesh Krishna BALAN Conference Proceeding Article
Distributed Gibbs: A linear-space sampling-based DCOP algorithm, Duc Thien NGUYEN, William YEOH, Hoong Chuin LAU, and Roie ZIVAN Journal Article
Fine-grained geolocation of tweets in temporal proximity, Wen Haw CHONG and Ee Peng LIM Journal Article
ICT: In-field calibration transfer for air quality sensor deployments, Yun CHENG, Xiaoxi HE, Zimu ZHOU, and Lothar THIELE Journal Article
Making wearable sensing less obtrusive, Huy Vu TRAN and Archan MISRA Conference Proceeding Article
MicroBTC: Efficient, flexible and fair micropayment for Bitcoin using hash chains, Zhiguo WAN, Robert H. DENG, David Kuo Chuen LEE, and Ying LI Journal Article
Neural network based detection of self-admitted technical debt: From performance to explainability, Xiaoxue REN, Zhenchang XING, Xin XIA, David LO, Xinyu WANG, and John GRUNDY Journal Article
Picking flowers in an ICO garden, Fam Guo TENG, Paul R. GRIFFIN, and Andrew KOH Working Paper
See no evil, hear no evil? Dissecting the impact of online hacker forums, Wei T. YUE, Qiu-Hong WANG, and Kai‐Lung HUI Journal Article
Semantic and influence aware k-representative queries over social streams, Yanhao WANG, Yuchen LI, and Kianlee TAN Conference Proceeding Article
SINet: A scale-insensitive convolutional neural network for fast vehicle detection, Xiaowei HU, Xuemiao XU, Yongjie XIAO, Hao CHEN, Shengfeng HE, Jing QIN, and Pheng-Ann HENG Journal Article
SUAA: A Secure User Authentication Scheme with Anonymity for the single & multi-server environments, Nassoro M. R. LWAMO, Liehuang ZHU, Chang XU, Kashif SHARIF, Ximeng LIU, and Chuan ZHANG Journal Article
Welcome message from the General Chairs, Nabil I. ALSHURAFA, Archan MISRA, and Abhishek MUKHERJI Conference Proceeding Article
FC2: Cloud-based cluster provisioning for distributed machine learning, Nguyen Binh Duong TA Journal Article
A coordination framework for multi-agent persuasion and adviser systems, Budhitama SUBAGDJA, Ah-hwee TAN, and Yilin KANG Journal Article
Adaptive cost-sensitive online classification, Peilin ZHAO, Yifan ZHANG, Min WU, Steven C. H. HOI, Mingkui TAN, and Junzhou HUANG Journal Article
An attribute-based framework for secure communications in vehicular ad hoc networks, Hui CUI, Robert H. DENG, and Guilin WANG Journal Article
A sampling approach for proactive project scheduling under generalized time-dependent workability uncertainty, Wen SONG, Donghun KANG, Jie ZHANG, Zhiguang CAO, and Hui XI Journal Article
Automatic code review by learning the revision of source code, Shu-Ting SHI, Ming LI, David LO, Ferdian THUNG, and Xuan HUO Conference Proceeding Article
Bilateral dependency neural networks for cross-language algorithm classification, Duy Quoc Nghi BUI, Yijun YU, and Lingxiao JIANG Conference Proceeding Article
CompareLDA: A topic model for document comparison, Maksim TKACHENKO and Hady Wirawan LAUW Conference Proceeding Article
CryptoCurrency mining on mobile as an alternative monetization approach, Nguyen Phan Sinh HUYNH, Kenny CHOO, Rajesh Krishna BALAN, and Youngki LEE Conference Proceeding Article
Deception in finitely repeated security games, Thanh H. NGUYEN, Yongzhao WANG, Arunesh SINHA, and Michael P. WELLMAN Conference Proceeding Article
Discrete social recommendation, Chenghao LIU, Xin WANG, Tao LU, Wenwu ZHU, Jianling SUN, and Steven C. H. HOI Conference Proceeding Article
Evolutionary trends in the collaborative review process of a large software system, Subhajit DATTA and Poulami SARKAR Conference Proceeding Article
Explainable reasoning over knowledge graphs for recommendation, Xiang WANG, Dingxian WANG, Canran XU, Xiangnan HE, Yixin CAO, and Tat-Seng CHUA Conference Proceeding Article
Grand challenges in accessible maps, Jon E. FROEHLICH, Anke M. BROCK, Anat CASPI, Joao GUERREIRO, Kotaro HARA, Reuben KIRKHAM, Johannes SCHONING, and Benjamin TANNERT Magazine Article
Manifold-valued image generation with Wasserstein generative adversarial nets, Zhiwu HUANG, WU J., and G. L. VAN Conference Proceeding Article
Multiagent decision making for maritime traffic management, ARAMBAM JAMES SINGH, Duc Thien NGUYEN, Akshat KUMAR, and Hoong Chuin LAU Conference Proceeding Article
Multiagent decision making for maritime traffic management, Arambam James SINGH, Duc Thien NGUYEN, Akshat KUMAR, and Hoong Chuin LAU Conference Proceeding Article
Multi-task learning with multi-view attention for answer selection and knowledge base question answering, Yang DENG, Yuexiang XIE, Yaliang LI, Min YANG, Nan DU, Wei FAN, Kai LEI, and Ying SHEN Conference Proceeding Article
Partially observable multi-sensor sequential change detection: A combinatorial multi-armed bandit approach, Chen ZHANG and Steven C. H. HOI Conference Proceeding Article
Preference-aware task assignment in on-demand taxi dispatching: An online stable matching approach, Boming ZHAO, Pan XU, Yexuan SHI, Yongxin TONG, Zimu ZHOU, and Yuxiang ZENG Conference Proceeding Article
Recommending new features from mobile app descriptions, He JIANG, Jingxuan ZHANG, Xiaochen LI, Zhilei REN, David LO, Xindong WU, and Zhongxuan LUO Journal Article
Risk pooling, supply chain hierarchy, and analysts' forecasts, Nan HU, Jian-Yu KE, Ling LIU, and Yue ZHANG Journal Article
Robust estimation of similarity transformation for visual object tracking, Yang LI, Jianke ZHU, Steven C. H. HOI, Wenjie SONG, Zhefeng WANG, and Hantang LIU Conference Proceeding Article
Security analysis of a large-scale concurrent data anonymous batch verification scheme for mobile healthcare crowd sensing, Yinghui ZHANG, Jiangang SHU, Ximeng LIU, Jin LI, and Dong ZHENG Journal Article
Send hardest problems my way: Probabilistic path prioritization for hybrid fuzzing, Lei ZHAO, Yue DUAN, and Jifeng XUAN Conference Proceeding Article
Social media mining for journalism, Arkaitz ZUBIAGA, Bahareh HERAVI, Jisun AN, and Haewoon KWAK Journal Article
Stock market prediction analysis by incorporating social and news opinion and sentiment, Zhaoxia WANG, Seng-Beng HO, and Zhiping LIN Conference Proceeding Article
SybSub: Privacy-preserving expressive task subscription with sybil detection in crowdsourcing, Jiangang SHU, Ximeng LIU, Kan YANG, Yinghui ZHANG, Xiaohua JIA, and Robert H. DENG Journal Article
Topical co-attention networks for hashtag recommendation on microblogs, Yang LI, Ting LIU, Jingwen HU, and Jing JIANG Journal Article
TransNFCM: translation-based neural fashion compatibility modeling, Xun YANG, Yunshan MA, Lizi LIAO, Meng WANG, and Tat-Seng CHUA Conference Proceeding Article
Understanding open ports in Android applications: Discovery, diagnosis, and security assessment, Daoyuan WU, Debin GAO, Rocky K. C. CHANG, En HE, Eric K. T. CHENG, and Robert H. DENG Conference Proceeding Article
Unveiling exception handling guidelines adopted by Java developers, Hugo MELO, Roberta COELHO, and Christoph TREUDE Conference Proceeding Article
Verifiable computation using re-randomizable garbled circuits, Qingsong ZHAO, Qingkai ZENG, Ximeng LIU, and Huanliang XU Journal Article
VistaNet: Visual Aspect Attention Network for multimodal sentiment analysis, Quoc Tuan TRUONG and Hady Wirawan LAUW Conference Proceeding Article
Financial report readability and stock return synchronicity, Xuelian BAI, Yi DONG, and Nan HU Journal Article
Who should be invited to my party: A size-constrained k-core problem in social networks, Yu-Liang MA, Ye YUAN, Feida ZHU, Guo-Ren WANG, Jing XIAO, and Jian-Zong WANG Journal Article
BLE-Enabled Medication Events Monitoring System (MEMS) for community dwelling seniors, Avinash SUBRAMANIAM, Hwee Xian TAN, and Hwee-pink TAN Conference Proceeding Article
Random delay attack and its applications on load frequency control of power systems, Yongdong WU, Jian WENG, Bo QIU, Zhuo WEI, Fan QIAN, and Robert H. DENG Conference Proceeding Article
Renegotiation of Software Outsourcing Contracts, H. HUANG, X. HU, Robert John KAUFFMAN, and H. XU Conference Proceeding Article
Two-sided value-based music artist recommendation in streaming music services, J. REN, Robert John KAUFFMAN, and D. KING Conference Proceeding Article
Multi-authority attribute-based keyword search over encrypted cloud data, Yibin MIAO, Robert H. DENG, Ximeng LIU, Kim-Kwang Raymond. CHOO, Hongjun WU, and Hongwei LI Journal Article
Successor features based multi-agent RL for event-based decentralized MDPs, Tarun GUPTA, Akshat KUMAR, and Praveen PARUCHURI Conference Proceeding Article
Adaptive resonance theory in social media data clustering: Roles, methodologies, and applications, Lei MENG, Ah-Hwee TAN, and Donald C. II WUNSCH Book
A first look at unfollowing behavior on GitHub, Jing JIANG, David LO, Yun YANG, Jianfeng LI, and Li ZHANG Journal Article
Analysis of bus ride comfort using smartphone sensor data, Hoong-Chor CHIN, Xingting PANG, and Zhaoxia WANG Journal Article
An economic analysis of consumer learning on entertainment shopping websites, Jin LI, Zhiling GUO, and Geoffrey K.F. TSO Journal Article
Artificial intelligence, machine learning, and autonomous technologies in mining industry, Zoya HYDER, Keng SIAU, and Fiona NAH Journal Article
A state aggregation approach for stochastic multiperiod last-mile ride-sharing problems, Lucas AGUSSURJA, Shih-Fen CHENG, and Hoong Chuin LAU Journal Article
Automatic query reformulation for code search using crowdsourced knowledge, Mohammad M. RAHMAN, Chanchal K. ROY, and David LO Journal Article
Automatic query reformulation for code search using crowdsourced knowledge, Mohammad M. RAHMAN, Chanchal K. ROY, and David LO Journal Article
DABKE: Secure deniable attribute-based key exchange framework, Yangguang TIAN, Yingjiu LI, Guomin YANG, Willy SUSILO, Yi MU, Hui CUI, and Yinghui ZHANG Journal Article
Deep code comment generation with hybrid lexical and syntactical information, Xing HU, Ge LI, Xin XIA, David LO, and Zhi JIN Journal Article
Global Inference for aspect and opinion terms co-extraction based on multi-task neural networks, Jianfei YU, Jing JIANG, and Rui XIA Journal Article
How team awareness influences perceptions of developer productivity, Christoph TREUDE and Fernando FIGUEIRA FILHO Book Chapter
Large scale online multiple kernel regression with application to time-series prediction, Doyen SAHOO, Steven C. H. HOI, and Bin LIN Journal Article
Modeling location-based social network data with area attraction and neighborhood competition, Thanh Nam DOAN and Ee-peng LIM Journal Article
Network data mining and analysis, Ming GAO, Ee-peng LIM, and David LO Book
Optimized verifiable fine-grained keyword search in dynamic multi-owner settings, Yibin MIAO, Robert H. DENG, DENG CHOO, Ximeng LIU, Jianting NING, and Hongwei LI Journal Article
Person re-identification over encrypted outsourced surveillance videos, Hang CHENG, Huaxiong WANG, Ximeng LIU, Yan FANG, Meiqing WANG, and Xiaojun ZHANG Journal Article
Preface to the special issue on program comprehension, David LO and Alexander SEREBRENIK Transcript
Privacy-preserving reinforcement learning design for patient-centric dynamic treatment regimes, Ximeng LIU, Robert H. DENG, Kim-Kwang Raymond CHOO, and Yang YANG Journal Article