The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2018

PDF

Trusting artificial intelligence in healthcare, W. WANG and Keng SIAU Conference Proceeding Article

PDF

Unusual events in GitHub repositories, Christoph TREUDE, Larissa LEITE, and Maurício ANICHE Journal Article

PDF

Use of artificial intelligence, machine learning, and autonomous technologies in the mining industry, Z. HYDER, Keng SIAU, and Fiona Fui-hoon NAH Conference Proceeding Article

Characterizing common and domain-specific package bugs: A case study on Ubuntu, Xiaoxue REN, Qiao HUANG, Xin XIA, Zhenchang XING, Lingfeng BAO, and David LO Conference Proceeding Article

PDF

A Bayesian latent variable model of user preferences with item context, Aghiles SALAH and Hady W. LAUW Conference Proceeding Article

PDF

A co-matching model for multi-choice reading comprehension, Shuohang WANG, Mo YU, Shiyu CHANG, and Jing JIANG Conference Proceeding Article

PDF

ADOPT: Combining parameter tuning and adaptive operator ordering for solving a class of orienteering problems, Aldy GUNAWAN, Hoong Chuin LAU, and Kun LU Journal Article

PDF

A driver guidance system for taxis in Singapore, Shashi Shekhar JHA, Shih-Fen CHENG, Meghna LOWALEKAR, Nicholas WONG, Rishikeshan RAJENDRAM, Pradeep VARAKANTHAM, Nghia Troung TROUNG, and Firmansyah BIN ABD RAHMAN Conference Proceeding Article

PDF

Analysis of public transportation patterns in a densely populated city with station-based shared bikes, Di WANG, Evan WU, and Ah-hwee TAN Conference Proceeding Article

PDF

A survey on sensor calibration in air pollution monitoring deployments, Balz MAAH, Zimu ZHOU, and Lothar THIELE Journal Article

PDF

A unified approach to route planning for shared mobility, Yongxin TONG, Yuxiang ZENG, Zimu ZHOU, Lei CHEN, Jieping YE, and Ke XU Journal Article

PDF

Autonomous agents in snake game via deep reinforcement learning, Zhepei WEI, Di WANG, Ming ZHANG, Ah-hwee TAN, Chunyan MIAO, and You ZHOU Conference Proceeding Article

PDF

Compositional reasoning for shared-variable concurrent programs, Fuyuan ZHANG, Yongwang ZHAO, David SANAN, Yang LIU, Alwen TIU, Shang-Wei LIN, and Jun SUN Conference Proceeding Article

PDF

Deep specification mining, Tien-Duy B. LE and David LO Conference Proceeding Article

PDF

DEEPTRAVEL: A neural network based travel time estimation model with auxiliary supervision, Hanyuan ZHANG, Hao WU, Weiwei SUN, and Baihua ZHENG Conference Proceeding Article

PDF

Detecting personal intake of medicine from Twitter, Debanjan MAHATA, Jasper FRIEDRICHS, Rajiv Ratn SHAH, and Jing JIANG Journal Article

PDF

Disease gene classification with metagraph representations, Sezin KIRCALI ATA, Yuan FANG, Min WU, Xiao-Li LI, and Xiaokui XIAO Book Chapter

PDF

Distributed k-nearest neighbor queries in metric spaces, Xin DING, Yuanliang ZHANG, Lu CHEN, Yunjun GAO, and Baihua ZHENG Conference Proceeding Article

PDF

Efficient representative subset selection over sliding windows, Yanhao WANG, Yuchen LI, and Kian-Lee TAN Journal Article

PDF

Experiences & challenges with server-side WiFi indoor localization using existing infrastructure, Dheryta JAISINGHANI, Rajesh Krishna BALAN, Vinayak NAIK, Archan MISRA, and Youngki LEE Conference Proceeding Article

PDF

Face detection using deep learning: An improved faster RCNN approach, Xudong SUN, Pengcheng WU, and Steven C. H. HOI Journal Article

PDF

Identifying elderlies at risk of becoming more depressed with Internet-of-Things, Jiajue OU, Huiguang LIANG, and Hwee Xian TAN Conference Proceeding Article

PDF

Knowledge-aware attentive neural network for ranking question answer pairs, Ying SHEN, Yang DENG, Min YANG, Yaliang LI, Nan DU, Wei FAN, and Kai LEI Conference Proceeding Article

PDF

Lattice-based dual receiver encryption and more, Daode ZHANG, Kai ZHANG, Bao LI, Xianhui LU, Haiyang XUE, and Jie LI Conference Proceeding Article

PDF

Modeling contemporaneous basket sequences with twin networks for next-item recommendation, Duc Trong LE, Hady W. LAUW, and Yuan FANG Conference Proceeding Article

PDF

Moved by conflict: Exploring the relationship between experienced conflict and individual mobility patterns, Nur Camellia Binte ZAKARIA, Kenneth T. GOH, Youngki LEE, and Rajesh Krishna BALAN Conference Paper

PDF

Online active learning with expert advice, Shuji HAO, Peiying HU, Peilin ZHAO, Steven C. H. HOI, and Chunyan MIAO Journal Article

PDF

Online deep learning: Learning deep neural networks on the fly, Doyen SAHOO, Hong Quang PHAM, Jing LU, and Steven C. H. HOI Conference Proceeding Article

PDF

PACELA: A neural framework for user visitation in location-based social networks, Thanh Nam DOAN and Ee-peng LIM Conference Proceeding Article

PDF

Privacy-preserving mining of association rule on outsourced cloud data from multiple parties, Lin LIU, Jinshu SU, Rongmao CHEN, Ximeng LIU, Xiaofeng WANG, Shuhui CHEN, and Ho-fung Fung LEUNG Conference Proceeding Article

PDF

Probabilistic guided exploration for reinforcement learning in self-organizing neural networks, Peng WANG, Weigui Jair ZHOU, Di WANG, and Ah-hwee TAN Conference Proceeding Article

PDF

Rumor detection on Twitter with tree-structured recursive neural networks, Jing MA, Wei GAO, and Kam-Fai WONG Conference Proceeding Article

PDF

Searching for the X-Factor: Exploring corpus subjectivity for word embeddings, Maksim TKACHENKO, Chong Cher CHIA, and Hady W. LAUW Conference Proceeding Article

PDF

Situation-aware authenticated video broadcasting over train-trackside WiFi networks, Yongdong WU, Dengpan YE, Zhuo WEI, Qian WANG, William TAN, and Robert H. DENG Journal Article

PDF

SOA maturity influence on digital banking transformation, Alan MEGARGEL, Venky SHANKARARAMAN, and Terence P. C. FAN Journal Article

PDF

Stackelberg security games: Looking beyond a decade of success, Arunesh SINHA, Fei FANG, Bo AN, Christopher KIEKINTVELD, and Milind TAMBE Conference Proceeding Article

PDF

Striving to earn more: A survey of work strategies and tool use among crowd workers, Toni KAPLAN, Susumu SAITO, Kotaro HARA, and Jeffrey P. BIGHAM Conference Proceeding Article

PDF

Summarizing source code with transferred API knowledge, Xing HU, Ge LI, Xin XIA, David LO, Shuai LU, and Zhi JIN Conference Proceeding Article

PDF

Taxis strike back: A field trial of the driver guidance system, Shih-Fen CHENG, Shashi Shekhar JHA, and Rishikeshan RAJENDRAM Conference Proceeding Article

PDF

Technology-enabled medication adherence for seniors living in the community: Experiences, lessons, and the road ahead, Hwee Xian TAN, Hwee-Pink TAN, and Huiguang LIANG Conference Proceeding Article

PDF

The price of usability: Designing operationalizable strategies for security games, Sara Marie McCARTHY, Corine M. LAAN, Kai WANG, Phebe VAYANOS, Arunesh SINHA, and Milind TAMBE Conference Proceeding Article

PDF

Towards 'verifying' a water treatment system, Jingyi WANG, Jun SUN, Yifan JIA, Shengchao QIN, and Zhiwu XU Conference Proceeding Article

PDF

Understanding generalization and optimization performance of deep CNNs, Pan ZHOU and Jiashi FENG Conference Proceeding Article

PDF

Unobtrusive detection of frailty in older adults, Nadee GOONAWARDENE, Hwee-Pink TAN, and Lee Buay TAN Conference Proceeding Article

Streaming music diffusion in a semi-closed social environment, Jing REN and Robert John KAUFFMAN Conference Proceeding Article

H-securebox: A hardened memory data protection framework on ARM devices, Zhangkai ZHANG, Zhoujun LI, Chunhe XIA, Jinhua CUI, and Jinxin MA Conference Paper

PDF

An integrated approach for effective injection vulnerability analysis of web applications through security slicing and hybrid constraint solving, Julian THOME, Lwin Khin SHAR, Domenico BIANCULLI, and Lionel BRIAND Journal Article

PDF

TKSE: Trustworthy keyword search over encrypted data with two-side verifiability via blockchain, Yinghui ZHANG, Robert H. DENG, Jiangang SHU, Kan YANG, and Dong ZHENG Journal Article

How modern news aggregators help development communities shape and share knowledge, Maurício ANICHE, Christoph TREUDE, Igor STEINMACHER, Igor Scaliante WIESE, Gustavo PINTO, Margaret-Anne STOREY, and Marco Aurélio GEROSA Conference Proceeding Article

PDF

Static analysis of context leaks in android applications, Flavio TOFFALINI, Jun SUN, and Martín COHOA Conference Proceeding Article

PDF

Towards optimal concolic testing, Xinyu WANG, Jun SUN, Zhenbang CHEN, Peixin ZHANG, Jingyi WANG, and Yun LIN Conference Proceeding Article

PDF

Analysing multi-point multi-frequency machine vibrations using optical sampling, Dibyendu ROY, Avik GHOSE, Tapas CHAKRAVARTY, Sushovan MUKHERJEE, Arpan PAL, and Archan MISRA Conference Proceeding Article

PDF

An economic analysis of disintermediation on crowdfunding platforms, Jianqing CHEN, Ling GE, and Zhiling GUO Conference Proceeding Article

PDF

Annapurna: Building a real-world smartwatch-based automated food journal, Sougata SEN, Vigneshwaran SUBBARAJU, Archan MISRA, Rajesh Krishna BALAN, and Youngki LEE Conference Proceeding Article

PDF

Applying spatial database techniques to other domains: A case study on top-k and computational geometric operators, Kyriakos MOURATIDIS Conference Proceeding Article

PDF

A proposal for a decentralized liquidity savings mechanism with side payments, Adam FUGAL, Rodney GARRATT, Zhiling GUO, and Dave HUDSON Report

PDF

Assessing the accuracy of four popular face recognition tools for inferring gender, age, and race, Soon-Gyu JUNG, Jisun AN, Haewoon KWAK, Joni SALMINEN, and Bernard J. JANSEN Conference Proceeding Article

PDF

Automatically conceptualizing social media analytics data via personas, Jung S.G., Salminen J., An J., Kwak H., and Jansen B.J. Conference Proceeding Article

PDF

Bounded rank optimization for effective and efficient emergency response, Pallavi Madhusudan MANOHAR, Pradeep VARAKANTHAM, and Hoong Chuin LAU Conference Proceeding Article

PDF

Column generation approach for feeder vessel routing and synchronization at a congested transshipment port, Jian G. JIN, Qiang MENG, and Hai WANG Conference Proceeding Article

PDF

Covariance pooling for facial expression recognition, D. ACHARYA, Zhiwu HUANG, D. PAUDEL, and Gool L. VAN Conference Proceeding Article

PDF

CRRN: Multi-scale guided concurrent reflection removal network, Renjie WAN, Boxin SHI, Ling-Yu DUAN, Ah-hwee TAN, and Alex C. KOT Conference Proceeding Article

PDF

Deep adversarial subspace clustering, Pan ZHOU, Yunqing HOU, and Jiashi FENG Conference Proceeding Article

PDF

Dimensionality's blessing: Clustering images by underlying distribution, Wen-yan LIN, Jian-Huang LAI, Siying LIU, and Yasuyuki MATSUSHITA Conference Proceeding Article

PDF

Disentangled person image generation, Liqian MA, Qianru SUN, Stamatios GEORGOULIS, Luc VAN GOOL, Bernt SCHIELE, and Mario FRITZ Conference Proceeding Article

PDF

D-pruner: Filter-based pruning method for deep convolutional neural network, Nguyen Loc HUYNH, Youngki LEE, and Rajesh Krishna BALAN Conference Proceeding Article

PDF

D-pruner: Filter-based pruning method for deep convolutional neural network, Nguyen Loc HUYNH, Youngki LEE, and Rajesh Krishna BALAN Conference Proceeding Article

PDF

Dynamic pricing in spatial crowdsourcing: A matching-based approach, Yongxin TONG, Libin WANG, Zimu ZHOU, Lei CHEN, Bowen DU, and Jieping YE Conference Proceeding Article

PDF

Effectiveness of bite-sized lecture on student learning outcomes, Noi Sian KOH, Swapna GOTTIPATI, and Venky SHANKARARAMAN Conference Proceeding Article

Efficient image super-resolution integration, Ke XU, Xin WANG, Xin YANG, Shengfeng HE, Qiang ZHANG, Baocai YIN, Xiaopeng WEI, and Rynson W. H. LAU Journal Article

PDF

Empath-D: VR-based empathetic app design for accessibility, Wonjung KIM, Kenny Tsu Wei CHOO, Youngki LEE, Archan MISRA, and Rajesh Krishna BALAN Conference Proceeding Article

PDF

FIMCE: A fully isolated micro-computing environment for multicore systems, Siqi ZHAO and Xuhua DING Journal Article

PDF

FIMCE: A fully isolated micro-computing environment for multicore systems, Siqi ZHAO and Xuhua DING Journal Article

PDF

From 2,772 segments to five personas: Summarizing a diverse online audience by generating culturally adapted personas, Joni SALMINEN, Sercan SENGUN, Haewoon KWAK, Bernard J. JANSEN, Jisun AN, Soon-gyu JUNG, Sarah VIEWEG, and D. Fox HARRELL Journal Article

PDF

How does developer interaction relate to software quality? an examination of product development data, Subhajit DATTA Journal Article

PDF

Inference of development activities from interaction with uninstrumented applications, Lingfeng BAO, Zhenchang XING, Xin XIA, David LO, and Ahmed E. HASSAN Journal Article

PDF

Instance-specific selection of AOS methods for solving combinatorial optimisation problems via neural networks, Teck Hou (DENG Dehao) TENG, Hoong Chuin LAU, and Aldy GUNAWAN Conference Proceeding Article

PDF

LibraryGuru: API recommendation for Android developers, Weizhao YUAN, Hoang H. NGUYEN, Lingxiao JIANG, and Yuting CHEN Conference Proceeding Article

PDF

MobiCeal: Towards secure and practical plausibly deniable encryption on mobile devices, Bing CHANG, Fengwei ZHANG, Bo CHEN, Yingjiu LI, Wen Tao ZHU, Yangguang TIAN, Zhan WANG, and Albert CHING Conference Proceeding Article

PDF

Natural and effective obfuscation by head inpainting, Qianru SUN, Liqian MA, Seong Joon OH, Luc VAN GOOL, Bernt SCHIELE, and Mario FRITZ Conference Proceeding Article

PDF

On-demand deep model compression for mobile devices: A usage-driven model selection framework, Sicong LIU, Yingyan LIN, Zimu ZHOU, Kaiming NAN, Hui LIU, and Junzhao DU Conference Proceeding Article

PDF

On the Fintech revolution: Interpreting the forces of innovation, disruption and transformation in financial services, Peter GOMBER, Robert J. KAUFFMAN, Chris PARKER, and Bruce W. WEBER Journal Article

PDF

Optimization of a cyclic express subway service, Hai WANG, Jiangang JIN, and Jingfeng YANG Conference Proceeding Article

PDF

Position manipulation attacks to balise-based train automatic stop control, Yongdong WU, Zhuo WEI, Jian WENG, and Robert H. DENG Journal Article

PDF

Poster: Understanding the role of reporting in work item tracking systems for software development: An industrial case study, Kochhar PAVNEET SINGH, Stanislaw SWIERC, Trevor CARNAHAN, Hitesh S. SAJNANI, and Meiyappan NAGAPPAN Conference Proceeding Article

PDF

Region-aware reflection removal with unified content and gradient priors, Renjie WAN, Boxin SHI, Ling-Yu DUAN, Ah-hwee TAN, Wen GAO, and Alex C. KOT Journal Article

PDF

Reserved optimization: Handling incident priorities in emergency response systems, Muralidhar Konda KONDA, Supriyo GHOSH, and Pradeep VARAKANTHAM Conference Proceeding Article

PDF

SATD detector: A text-mining-based self-admitted technical debt detection tool, Zhongxin LIU, Qiao HUANG, Xin XIA, Emad SHIHAB, David LO, and Shanping LI Conference Proceeding Article

PDF

Scale impacts elicited gestures for manipulating holograms: Implications for AR gesture design, Tran PHAM, Jo VERMEULEN, Anthony TANG, and Lindsay MACDONALD Conference Proceeding Article

PDF

Security and privacy in smart health: Efficient policy-hiding attribute-based access control, Yinghui ZHANG, Dong ZHENG, and Robert H. DENG Journal Article

PDF

Social stream classification with emerging new labels, Xin MU, Feida ZHU, Yue LIU, Ee-peng LIM, and Zhi-Hua ZHOU Conference Proceeding Article

PDF

Survey of randomization defenses on cloud computing, Jianming FU, Yan LIN, Xiuwen LIU, and Xu ZHANG Journal Article

The effect of ultimate ownership on the disclosure of environmental information, Peng WANG, Fangjun WANG, and Nan HU Journal Article

PDF

The wider impact of a national cryptocurrency, Dennis NG and Paul GRIFFIN Journal Article

PDF

To detect stack buffer overflow with polymorphic canaries, Zhilong WANG, Xuhua DING, Chengbin PANG, Jian GUO, Jun ZHU, and Bing MAO Conference Proceeding Article

PDF

Towards dynamically monitoring Android applications on non-rooted devices in the wild, Xiaoxiao TANG, Daoyuan WU, Yan LIN, and Debin GAO Conference Proceeding Article

PDF

Towards easy comparison of local businesses using online reviews, Yong WANG, Hammad HALEEM, Conglei SHI, Yanhong WU, Xun ZHAO, Siwei FU, and Huamin QU Journal Article

PDF

Towards model checking Android applications, Guangdong BAI, Quanqi YE, Yongzheng WU, Heila BOTHA, Jun SUN, Yang LIU, Jin Song DONG, and Willem VISSER Journal Article

PDF

Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management, Yujue WANG, Hwee Hwa PANG, and Robert H. DENG Journal Article

PDF

Where does Google find API documentation?, Christoph TREUDE and Maurício ANICHE Conference Proceeding Article