Submissions from 2018
DSH: Deniable secret handshake framework, Yangguang TIAN, Yingjiu LI, Yinghui ZHANG, Nan LI, Guomin YANG, and Yong YU Conference Proceeding Article
Efficient traceable oblivious transfer and its applications, Weiwei LIU, Yinghui ZHANG, Yi MU, Guomin YANG, and Yangguang TIAN Conference Proceeding Article
FocusVR: Effective and usable VR display power management, Kiat Wee Tan, Eduardo CUERVO, and Rajesh Krishna BALAN Journal Article
Implicit linking of food entities in social media, Wen Haw CHONG and Ee Peng LIM Conference Proceeding Article
JobComposer: Career path optimization via multicriteria utility learning, Richard J. OENTARYO, Xavier Jayaraj Siddarth ASHOK, Ee-peng LIM, and Philips Kokoh PRASETYO Conference Proceeding Article
Neural-machine-translation-based commit message generation: how far are we?, Zhongxin LIU, Xin XIA, Ahmed E. HASSAN, David LO, Zhenchang XING, and Xinyu WANG Conference Proceeding Article
Question-guided hybrid convolution for visual question answering, Peng GAO, Pan LU, Hongsheng LI, Shuang LI, Yikang LI, Steven C. H. HOI, and Xiaogang WANG Conference Proceeding Article
Resonance attacks on load frequency control of smart grids, Yongdong WU, Zhuo WEI, Jian WENG, Xin LI, and Robert H. DENG Journal Article
Rule-based specification mining leveraging learning to rank, Zherui CAO, Yuan TIAN, Bui Tien Duy LE, and David LO Journal Article
Secondary frequency stochastic optimal control in independent microgrids with virtual synchronous generator-controlled energy storage systems, Ting YANG, Yajian ZHANG, Zhaoxia WANG, and Haibo PEN Journal Article
Self-supervised feature learning for semantic segmentation of overhead imagery, Suriya SINGH, Anil BATRA, Guansong PANG, Lorenzo TORRESANI, Saikat BASU, Manohar PALURI, and C. V. JAWAHAR Conference Proceeding Article
Talent flow analytics in online professional network, Richard J. OENTARYO, Ee-peng LIM, Xavier Jayaraj Siddarth ASHOK, and Philips Kokoh PRASETYO Journal Article
Teaching basic programming to pre-university students through blended learning pedagogy: A descriptive study, Vandana RAMACHANDRA RAO and Ngee Mok HENG Conference Proceeding Article
Transferring time-series discrete choice to link-based route choice in space: Estimating vehicle type preference using recursive logit model, Fabian BASTIN, Yan LIU, Cinzia CIRILLO, and Tien MAI Journal Article
Wasserstein divergence for GANs, J. WU, Zhiwu HUANG, J. THOMA, D. ACHARYA, and Gool L. VAN Conference Proceeding Article
Welcome message from the DysDoc3 2018 chairs, Martin P. ROBILLARD, Andrian MARCUS, Christoph TREUDE, and Michele LANZA Conference Proceeding Article
PUSC: Privacy-preserving user-centric skyline computation over multiple encrypted domains, Ximeng LIU, Kim-Kwang Raymond CHOO, Robert H. DENG, and Yang YANG Conference Proceeding Article
A formal specification and verification framework for timed security protocols, Li LI, Jun SUN, Yang LIU, Meng SUN, and Jin Song DONG Journal Article
An empirical study of security issues posted in open source projects, Mansooreh ZAHEDI, M. Ali BABAR, and Christoph TREUDE Conference Proceeding Article
Anonymous privacy-preserving task matching in crowdsourcing, Jiangang SHU, Ximeng LIU, Xiaohua JIA, Kan YANG, and Robert H. DENG Journal Article
Code smells for Model-View-Controller architectures, Maurício ANICHE, Gabriele BAVOTA, Christoph TREUDE, Marco Aurélio GEROSA, and Arie VAN DEURSEN Journal Article
Customer level predictive modeling for accounts receivable to reduce intervention actions, Michelle L. F. Cheong and Wen SHI Conference Proceeding Article
Customer segmentation using online platforms: Isolating behavioral and demographic segments for persona creation via aggregated user data, Jisun AN, Haewoon KWAK, Soon‑gyo JUNG, Joni SALMINEN, and Bernard J. JANSEN Journal Article
Deep learning for practical image recognition: Case study on kaggle competitions, Xulei YANG, Zeng ZENG, Sin G. TEO, Li WANG, Vijay CHANDRASEKAR, and Steven C. H. HOI Conference Proceeding Article
Demand-aware charger planning for electric vehicle sharing, Bowen DU, Yongxin TONG, Zimu ZHOU, Qian TAO, and Wenjun ZHOU Conference Proceeding Article
Embedding WordNet knowledge for textual entailment, Yunshi LAN and Jing JIANG Conference Proceeding Article
ESG and corporate financial performance: Empirical evidence from China's listed power generation companies, Changhong ZHAO, Yu GUO, Jiahai YUAN, Mengya WU, Daiyu LI, Yiou ZHOU, and Jiangang KANG Journal Article
Ethical and moral issues with AI, Weiyu WANG and Keng SIAU Conference Proceeding Article
Exact processing of uncertain top-k queries in multi-criteria settings, Kyriakos MOURATIDIS and Bo TANG Conference Proceeding Article
Fusing multi-abstraction vector space models for concern localization, Yun ZHANG, David LO, Xin XIA, Giuseppe SCANNIELLO, Tien-Duy B. LE, and Jianling SUN Journal Article
Iterated local search algorithm for the capacitated team orienteering problem, Aldy GUNAWAN, Kien Ming NG, Vincent F. YU, Gordy ADIPRASETYO, and Hoong Chuin LAU Conference Proceeding Article
Knowledge as a bridge: Improving cross-domain answer selection with external knowledge, Yang DENG, Ying SHEN, Min YANG, Yaliang LI, Nan DU, Wei FAN, and Kai LEI Conference Proceeding Article
Learning representations of ultrahigh-dimensional data for random distance-based outlier detection, Guansong PANG, Longbing CAO, Ling CHEN, Defu LIAN, and Huan LIU Conference Proceeding Article
Lightweight break-glass access control system for healthcare Internet-of-Things, Yang YANG, Ximeng LIU, and Robert H. DENG Journal Article
Neural collective entity linking, Yixin CAO, Lei HOU, Juanzi LI, and Zhiyuan LIU Conference Proceeding Article
Offline versus online: A meaningful categorization of ties for retweets, Felicia NATALI and Feida ZHU Conference Proceeding Article
Online spatio-temporal matching in stochastic and dynamic domains, Meghna LOWALEKAR, Pradeep VARAKANTHAM, and Patrick JAILLET Journal Article
Privacy-preserving biometric-based remote user authentication with leakage resilience, Yangguang TIAN, Yingjiu LI, Rongmao CHEN, Ximeng LIU, Bing CHANG, and Xingjie YU Conference Proceeding Article
Probabilistic collaborative representation learning for personalized item recommendation, Aghiles SALAH and Hady W. LAUW Conference Proceeding Article
Regular lossy functions and their applications in leakage-resilient cryptography, Yu CHEN, Baodong QIN, and Haiyang XUE Journal Article
Server-aided attribute-based signature with revocation for resource-constrained Industrial-Internet-of-Things devices, Hui CUI, Robert H. DENG, Joseph K. LIU, Xun YI, and Yingjiu LI Journal Article
Trajectory-driven influential billboard placement, Ping ZHANG, Zhifeng BAO, Yuchen LI, Guoliang LI, Yipeng ZHANG, and Zhiyong PENG Conference Proceeding Article
Transaction cost optimization for online portfolio selection, Bin LI, Jialei WANG, Dingjiang HUANG, and Steven C. H. HOI Journal Article
Trusting artificial intelligence in healthcare, W. WANG and Keng SIAU Conference Proceeding Article
Unusual events in GitHub repositories, Christoph TREUDE, Larissa LEITE, and Maurício ANICHE Journal Article
Use of artificial intelligence, machine learning, and autonomous technologies in the mining industry, Z. HYDER, Keng SIAU, and Fiona Fui-hoon NAH Conference Proceeding Article
Characterizing common and domain-specific package bugs: A case study on Ubuntu, Xiaoxue REN, Qiao HUANG, Xin XIA, Zhenchang XING, Lingfeng BAO, and David LO Conference Proceeding Article
A Bayesian latent variable model of user preferences with item context, Aghiles SALAH and Hady W. LAUW Conference Proceeding Article
A co-matching model for multi-choice reading comprehension, Shuohang WANG, Mo YU, Shiyu CHANG, and Jing JIANG Conference Proceeding Article
ADOPT: Combining parameter tuning and adaptive operator ordering for solving a class of orienteering problems, Aldy GUNAWAN, Hoong Chuin LAU, and Kun LU Journal Article
A driver guidance system for taxis in Singapore, Shashi Shekhar JHA, Shih-Fen CHENG, Meghna LOWALEKAR, Nicholas WONG, Rishikeshan RAJENDRAM, Pradeep VARAKANTHAM, Nghia Troung TROUNG, and Firmansyah BIN ABD RAHMAN Conference Proceeding Article
Analysis of public transportation patterns in a densely populated city with station-based shared bikes, Di WANG, Evan WU, and Ah-hwee TAN Conference Proceeding Article
A survey on sensor calibration in air pollution monitoring deployments, Balz MAAH, Zimu ZHOU, and Lothar THIELE Journal Article
A unified approach to route planning for shared mobility, Yongxin TONG, Yuxiang ZENG, Zimu ZHOU, Lei CHEN, Jieping YE, and Ke XU Journal Article
Autonomous agents in snake game via deep reinforcement learning, Zhepei WEI, Di WANG, Ming ZHANG, Ah-hwee TAN, Chunyan MIAO, and You ZHOU Conference Proceeding Article
Compositional reasoning for shared-variable concurrent programs, Fuyuan ZHANG, Yongwang ZHAO, David SANAN, Yang LIU, Alwen TIU, Shang-Wei LIN, and Jun SUN Conference Proceeding Article
Deep specification mining, Tien-Duy B. LE and David LO Conference Proceeding Article
DEEPTRAVEL: A neural network based travel time estimation model with auxiliary supervision, Hanyuan ZHANG, Hao WU, Weiwei SUN, and Baihua ZHENG Conference Proceeding Article
Detecting personal intake of medicine from Twitter, Debanjan MAHATA, Jasper FRIEDRICHS, Rajiv Ratn SHAH, and Jing JIANG Journal Article
Disease gene classification with metagraph representations, Sezin KIRCALI ATA, Yuan FANG, Min WU, Xiao-Li LI, and Xiaokui XIAO Book Chapter
Distributed k-nearest neighbor queries in metric spaces, Xin DING, Yuanliang ZHANG, Lu CHEN, Yunjun GAO, and Baihua ZHENG Conference Proceeding Article
Efficient representative subset selection over sliding windows, Yanhao WANG, Yuchen LI, and Kian-Lee TAN Journal Article
Experiences & challenges with server-side WiFi indoor localization using existing infrastructure, Dheryta JAISINGHANI, Rajesh Krishna BALAN, Vinayak NAIK, Archan MISRA, and Youngki LEE Conference Proceeding Article
Face detection using deep learning: An improved faster RCNN approach, Xudong SUN, Pengcheng WU, and Steven C. H. HOI Journal Article
Identifying elderlies at risk of becoming more depressed with Internet-of-Things, Jiajue OU, Huiguang LIANG, and Hwee Xian TAN Conference Proceeding Article
Knowledge-aware attentive neural network for ranking question answer pairs, Ying SHEN, Yang DENG, Min YANG, Yaliang LI, Nan DU, Wei FAN, and Kai LEI Conference Proceeding Article
Lattice-based dual receiver encryption and more, Daode ZHANG, Kai ZHANG, Bao LI, Xianhui LU, Haiyang XUE, and Jie LI Conference Proceeding Article
Modeling contemporaneous basket sequences with twin networks for next-item recommendation, Duc Trong LE, Hady W. LAUW, and Yuan FANG Conference Proceeding Article
Moved by conflict: Exploring the relationship between experienced conflict and individual mobility patterns, Nur Camellia Binte ZAKARIA, Kenneth T. GOH, Youngki LEE, and Rajesh Krishna BALAN Conference Paper
Online active learning with expert advice, Shuji HAO, Peiying HU, Peilin ZHAO, Steven C. H. HOI, and Chunyan MIAO Journal Article
Online deep learning: Learning deep neural networks on the fly, Doyen SAHOO, Hong Quang PHAM, Jing LU, and Steven C. H. HOI Conference Proceeding Article
PACELA: A neural framework for user visitation in location-based social networks, Thanh Nam DOAN and Ee-peng LIM Conference Proceeding Article
Privacy-preserving mining of association rule on outsourced cloud data from multiple parties, Lin LIU, Jinshu SU, Rongmao CHEN, Ximeng LIU, Xiaofeng WANG, Shuhui CHEN, and Ho-fung Fung LEUNG Conference Proceeding Article
Probabilistic guided exploration for reinforcement learning in self-organizing neural networks, Peng WANG, Weigui Jair ZHOU, Di WANG, and Ah-hwee TAN Conference Proceeding Article
Rumor detection on Twitter with tree-structured recursive neural networks, Jing MA, Wei GAO, and Kam-Fai WONG Conference Proceeding Article
Searching for the X-Factor: Exploring corpus subjectivity for word embeddings, Maksim TKACHENKO, Chong Cher CHIA, and Hady W. LAUW Conference Proceeding Article
Situation-aware authenticated video broadcasting over train-trackside WiFi networks, Yongdong WU, Dengpan YE, Zhuo WEI, Qian WANG, William TAN, and Robert H. DENG Journal Article
SOA maturity influence on digital banking transformation, Alan MEGARGEL, Venky SHANKARARAMAN, and Terence P. C. FAN Journal Article
Stackelberg security games: Looking beyond a decade of success, Arunesh SINHA, Fei FANG, Bo AN, Christopher KIEKINTVELD, and Milind TAMBE Conference Proceeding Article
Striving to earn more: A survey of work strategies and tool use among crowd workers, Toni KAPLAN, Susumu SAITO, Kotaro HARA, and Jeffrey P. BIGHAM Conference Proceeding Article
Summarizing source code with transferred API knowledge, Xing HU, Ge LI, Xin XIA, David LO, Shuai LU, and Zhi JIN Conference Proceeding Article
Taxis strike back: A field trial of the driver guidance system, Shih-Fen CHENG, Shashi Shekhar JHA, and Rishikeshan RAJENDRAM Conference Proceeding Article
Technology-enabled medication adherence for seniors living in the community: Experiences, lessons, and the road ahead, Hwee Xian TAN, Hwee-Pink TAN, and Huiguang LIANG Conference Proceeding Article
The price of usability: Designing operationalizable strategies for security games, Sara Marie McCARTHY, Corine M. LAAN, Kai WANG, Phebe VAYANOS, Arunesh SINHA, and Milind TAMBE Conference Proceeding Article
Towards 'verifying' a water treatment system, Jingyi WANG, Jun SUN, Yifan JIA, Shengchao QIN, and Zhiwu XU Conference Proceeding Article
Understanding generalization and optimization performance of deep CNNs, Pan ZHOU and Jiashi FENG Conference Proceeding Article
Unobtrusive detection of frailty in older adults, Nadee GOONAWARDENE, Hwee-Pink TAN, and Lee Buay TAN Conference Proceeding Article
Streaming music diffusion in a semi-closed social environment, Jing REN and Robert John KAUFFMAN Conference Proceeding Article
H-securebox: A hardened memory data protection framework on ARM devices, Zhangkai ZHANG, Zhoujun LI, Chunhe XIA, Jinhua CUI, and Jinxin MA Conference Paper
An integrated approach for effective injection vulnerability analysis of web applications through security slicing and hybrid constraint solving, Julian THOME, Lwin Khin SHAR, Domenico BIANCULLI, and Lionel BRIAND Journal Article
TKSE: Trustworthy keyword search over encrypted data with two-side verifiability via blockchain, Yinghui ZHANG, Robert H. DENG, Jiangang SHU, Kan YANG, and Dong ZHENG Journal Article
How modern news aggregators help development communities shape and share knowledge, Maurício ANICHE, Christoph TREUDE, Igor STEINMACHER, Igor Scaliante WIESE, Gustavo PINTO, Margaret-Anne STOREY, and Marco Aurélio GEROSA Conference Proceeding Article
Static analysis of context leaks in android applications, Flavio TOFFALINI, Jun SUN, and Martín COHOA Conference Proceeding Article
Towards optimal concolic testing, Xinyu WANG, Jun SUN, Zhenbang CHEN, Peixin ZHANG, Jingyi WANG, and Yun LIN Conference Proceeding Article
Analysing multi-point multi-frequency machine vibrations using optical sampling, Dibyendu ROY, Avik GHOSE, Tapas CHAKRAVARTY, Sushovan MUKHERJEE, Arpan PAL, and Archan MISRA Conference Proceeding Article
An economic analysis of disintermediation on crowdfunding platforms, Jianqing CHEN, Ling GE, and Zhiling GUO Conference Proceeding Article
Annapurna: Building a real-world smartwatch-based automated food journal, Sougata SEN, Vigneshwaran SUBBARAJU, Archan MISRA, Rajesh Krishna BALAN, and Youngki LEE Conference Proceeding Article
Applying spatial database techniques to other domains: A case study on top-k and computational geometric operators, Kyriakos MOURATIDIS Conference Proceeding Article
A proposal for a decentralized liquidity savings mechanism with side payments, Adam FUGAL, Rodney GARRATT, Zhiling GUO, and Dave HUDSON Report
Assessing the accuracy of four popular face recognition tools for inferring gender, age, and race, Soon-Gyu JUNG, Jisun AN, Haewoon KWAK, Joni SALMINEN, and Bernard J. JANSEN Conference Proceeding Article