The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2018

PDF

Introducing basic programming to pre-university students: A successful initiative in Singapore, Heng Ngee MOK and Vandana RAMACHANDRA RAO Conference Proceeding Article

PDF

'Is more better?': Impact of multiple photos on perception of persona profiles, Joni SALMINEN, Lene NIELSEN, Soon-Gyo JUNG, Jisun AN, Haewoon KWAK, and Bernard J. JANSEN Conference Proceeding Article

PDF

Latency-oriented task completion via spatial crowdsourcing, Yuxiang ZENG, Yongxin TONG, Lei CHEN, and Zimu ZHOU Conference Proceeding Article

PDF

Location-aware influence maximization over dynamic social streams, Yanhao WANG, Yuchen LI, Ju FAN, and Kianlee TAN Journal Article

PDF

Modeling security and privacy requirements: A use case-driven approach, Phu Xuan MAI, Arda GOKNIL, Lwin Khin SHAR, Fabrizio PASTORE, Lionel BRIAND, and Shaban SHAAME Journal Article

PDF

OCTOPUS: An online topic-aware influence analysis system for social networks, Ju FAN, Jiarong QIU, Yuchen LI, Qingfei MENG, Dongxiang ZHANG, Guoliang LI, Kian-Lee TAN, and Xiaoyong DU Conference Proceeding Article

PDF

PageFlip: Leveraging page-flipping gestures for efficient command and value selection on smartwatches, Teng HAN, Jiannan LI, Khalad HASAN, Keisuke NAKAMURA, Randy GOMEZ, Ravin BALAKRISHNAN, and Pourang IRANI Conference Proceeding Article

PDF

PCCF: Periodic and continual temporal co-factorization for recommender systems, Guibing GUO, Feida ZHU, Shilin QU, and Xingwei WANG Journal Article

PDF

Persona perception scale: Developing and validating an instrument for human-like representations of data, Salminen JONI, Haewoon KWAK, João SANTOS, Soon-Gyo JUNG, Jisun AN, and Bernard J. JANSEN Conference Proceeding Article

PDF

Perspective on and re-orientation of physical proxies in object-focused remote collaboration, Martin FEICK, Terrance MOK, Anthony TANG, Lora OEHLBERG, and Ehud SHARLIN Conference Proceeding Article

PDF

Predicting episodes of non-conformant mobility in indoor environments, Kasthuri JAYARAJAH and Archan MISRA Journal Article

PDF

Real world, large scale IoT systems for community eldercare: Experiences and lessons learned, Alvin Cerdena VALERA, Wei Qi LEE, Hwee-Pink TAN, Hwee Xian TAN, and Huiguang LIANG Book Chapter

PDF

Regularly lossy functions and applications, Yu CHEN, Baodong QIN, and Haiyang XUE Conference Proceeding Article

Link

Scalable hypergraph-based image retrieval and tagging system, Lu CHEN, Yunjun GAO, Yuanliang ZHANG, Sibo WANG, and Baihua ZHENG Conference Proceeding Article

PDF

SEHS: Simultaneous energy harvesting and sensing using piezoelectric energy harvester, Dong MA, Guohan LAN, Weitao XU, Mahbub HASSAN, and Wen HU Conference Proceeding Article

PDF

Social network monitoring for bursty cascade detection, Wei XIE, Feida ZHU, Jing XIAO, and Jianzong WANG Journal Article

PDF

SoK: Towards the Science of security and privacy in machine learning, Nicolas PAPERNOT, Patrick MCDANIEL, Arunesh SINHA, and Michael WELLMAN Conference Proceeding Article

PDF

The impact of rapid release cycles on the integration delay of fixed issues, Daniel Alencar DA COSTA, Shane MCINTOSH, Christoph TREUDE, Uirá KULESZA, and Ahmed E. HASSAN Journal Article

PDF

The role of urban mobility in retail business survival, Krittika D'SILVA, Kasthuri JAYARAJAH, Anastasios NOULAS, Cecilia MASCOLO, and Archan MISRA Journal Article

PDF

Virtualization in wireless sensor networks: Fault tolerant embedding for Internet of Things, Omprakash KAIWARTYA, Abdul Hanan ABDULLAH, Yue CAO, Jaime LLORET, Sushil KUMAR, Rajiv Ratn SHAH, Mukesh PRASAD, and Shiv PRAKASH Journal Article

PDF

Vocal programming for people with upper-body motor impairments, Lucas ROSENBLATT, Patrick CARRINGTON, Kotaro HARA, and Jeffrey P. BIGHAM Conference Proceeding Article

PDF

What is Gab: A bastion of free speech or an alt-right echo chamber, Savvas ZANNETTOU, Barry BRADLYN, Emiliano DE CRISTOFARO, Haewoon KWAK, Michael SIRIVIANOS, Gianluca STRINGHINI, and Jeremy BLACKBURN Conference Proceeding Article

Randomized online CP decomposition, Congbo MA, Xiaowei YANG, and Hu WANG Conference Proceeding Article

PDF

CrowdService: Optimizing mobile crowdsourcing and service composition, Xin PENG, Jingxiao GU, Tian Huat TAN, Jun SUN, Yijun YU, Bashar NUSEIBEH, and Wenyun Zhao ZHAO Journal Article

PDF

A model of competition between perpetual software and software as a service, Zhiling GUO and Dan MA Journal Article

PDF

A model of competition between perpetual software and software as a service, Zhiling GUO and Dan MA Journal Article

PDF

An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited, Hui CUI, Robert H. DENG, Junzuo LAI, Xun YI, and Surya NEPAL Journal Article

PDF

An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited, Hui CUI, Robert H. DENG, Junzuo LAI, Xun YI, and Surya NEPAL Journal Article

PDF

An efficient and privacy-preserving biometric identification scheme in cloud computing, Liehuang ZHU, Chuan ZHANG, Chang XU, Ximeng LIU, and Cheng HUANG Journal Article

PDF

A new revocable and re-delegable proxy signature and its application, Shengmin XU, Guomin YANG, and Yi MU Journal Article

PDF

An LSTM model for cloze-style machine comprehension, Shuohang WANG and Jing JIANG Conference Proceeding Article

A simulation environment for evaluation of routing algorithms for improvement of electromobility related services, Akshay RAO, Zhiguang CAO, and Felix KLANNER Journal Article

PDF

Attributed social network embedding, Lizi LIAO, Xiangnan HE, Hanwang ZHANG, and Tat-Seng CHUA Journal Article

PDF

Automatic persona generation (APG): A rationale and demonstration, Soon-Gyo JUNG, Joni SALMINEN, Haewoon KWAK, Jisun AN, and Bernard J JANSEN Conference Proceeding Article

PDF

Building trust in artificial intelligence, machine learning, and robotics, Keng SIAU and W. WANG Journal Article

PDF

Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes, Willy SUSILO, Guomin YANG, Fuchun GUO, and Qiong HUANG Journal Article

PDF

Do your friends make you buy this brand?: Modeling social recommendation with topics and brands, Minh Duc LUU and Ee Peng LIM Journal Article

PDF

Education in the age of artificial intelligence: How will technology shape learning?, Keng SIAU Journal Article

PDF

EngageMon: Multi-modal engagement sensing for mobile games, Sinh HUYNH, Seungmin KIM, JeongGil KO, Rajesh Krishna BALAN, and Youngki LEE Journal Article

PDF

Fixation and confusion: Investigating eye-tracking participants' exposure to information in personas, Joni SALMINEN, Bernard J. JANSEN, Jisun AN, Soon-Gyo JUNG, Lene NIELSEN, and Haewoon KWAK Conference Proceeding Article

PDF

HiddenCode: Hidden acoustic signal capture with vibration energy harvesting, Guohao LAN, Dong MA, Mahbub HASSAN, and Wen HU Conference Proceeding Article

L-0-Regularized image downscaling, Junjie LIU, Shengfeng HE, and Rynson W.H. LAU Journal Article

PDF

Mining sandboxes: Are we there yet?, Lingfeng BAO, Tien Duy B. LE, and David LO Conference Proceeding Article

PDF

Multigeneration product diffusion in the presence of strategic consumers, Zhiling GUO and Jianqing CHEN Journal Article

PDF

Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing, Thivya KANDAPPU, Archan MISRA, Shih-Fen CHENG, Randy TANDRIANSYAH, and Hoong Chuin LAU Journal Article

PDF

Scaling human activity recognition via deep learning-based domain adaptation, Md Abdullah Hafiz KHAN, Nirmalya ROY, and Archan MISRA Conference Proceeding Article

PDF

SCLib: A practical and lightweight defense against component hijacking in android applications, Daoyuan WU, Yao CHENG, Debin GAO, Yingjiu LI, and Robert H. DENG Conference Proceeding Article

PDF

The way you move: The effect of a robot surrogate movement in remote collaboration, Martin FEICK, Lora OEHLBERG, Anthony TANG, André MIEDE, and Ehud SHARLIN Conference Poster

PDF

URLNet: Learning a URL representation with deep learning for malicious URL detection, Hung LE, Hong Quang PHAM, Doyen SAHOO, and Steven C. H. HOI Working Paper

PDF

Visualizing research impact through citation data, Yong WANG, Conglei SHI, Liangyue LI, Hanghang TONG, and Huamin QU Journal Article

PDF

VMKDO: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner, Yibin MIAO, Jianfeng MA, Ximeng LIU, Zhiquan LIU, Limin SHEN, and Fushan WEI Journal Article

PDF

W-Air: Enabling personal air pollution monitoring on wearables, Balz MAAG, Zimu ZHOU, and Lothar THIELE Journal Article

PDF

A Metrics Suite of Cloud Computing Adoption Readiness, Robert J. KAUFFMAN, Dan MA, and Martin YU Journal Article

PDF

Attribute-based cloud storage with secure provenance over encrypted data, Hui CUI, Robert H. DENG, and Yingjiu LI Journal Article

PDF

Building deep networks on grassmann manifolds, Zhiwu HUANG, J. WU, and Gool L. VAN Conference Proceeding Article

PDF

Compressive representation for device-free activity recognition with passive RFID signal strength, Lina YAO, Quan Z. SHENG, Xue LI, Tao GU, Mingkui TAN, Xianzhi WANG, Sen WANG, and Wenjie RUAN Journal Article

Country 2.0: Upgrading cities with smart technologies, Steven Mark MILLER Book Chapter

Credit default swap spreads and annual report readability, Nan HU, Ling LIU, and Lu ZHU Journal Article

PDF

Cross-language learning for program classification using bilateral tree-based convolutional neural networks, Duy Quoc Nghi BUI, Lingxiao JIANG, and Yijun YU Conference Proceeding Article

PDF

Dispatch guided allocation optimization for effective emergency response, Supriyo GHOSH and Pradeep VARAKANTHAM Conference Proceeding Article

PDF

Early detection of mild cognitive impairment in elderly through IoT: Preliminary findings, Hwee-Xian TAN and Hwee-Pink TAN Conference Proceeding Article

PDF

Enhanced vireo KIS at VBS 2018, Phuong Anh NGUYEN, Yi-Jie LU, Hao ZHANG, and Chong-wah NGO Conference Proceeding Article

PDF

Food photo recognition for dietary tracking: System and experiment, Zhao-Yan MING, Jingjing CHEN, Yu CAO, Ciarán FORDE, Chong-wah NGO, and Tat Seng CHUA Conference Proceeding Article

PDF

Identifying self-admitted technical debt in open source projects using text mining, Qiao HUANG, Emad SHIHAB, Xin XIA, David LO, and Shanping LI Journal Article

PDF

Integrated cooperation and competition in multi-agent decision-making, Kyle Hollins WRAY, Akshat KUMAR, and Shlomo ZILBERSTEIN Conference Proceeding Article

PDF

Long term key management architecture for SCADA systems, Hendra SAPUTRA and Zhigang ZHAO Conference Proceeding Article

PDF

Modelling domain relationships for transfer learning on retrieval-based question answering systems in e-commerce, Jianfei YU, Minghui QIU, Jing JIANG, Jun HUANG, Shuangyong SONG, Wei CHU, and Haiqing CHEN Conference Proceeding Article

PDF

R3: Reinforced Ranker-Reader for open-domain Question Answering, Shuohang WANG, Mo YU, Xiaoxiao GUO, Zhiguo WANG, Tim KLINGER, Wei ZHANG, Shiyu CHANG, Gerald TESAURO, Bowen ZHOU, and Jing JIANG Conference Proceeding Article

PDF

Resource-constrained scheduling for maritime traffic management, Lucas AGUSSURJA, Akshat KUMAR, and Hoong Chuin LAU Conference Proceeding Article

PDF

Risk-sensitive stochastic orienteering problems for trip optimization in urban environments, Pradeep VARAKANTHAM, Akshat KUMAR, Hoong Chuin LAU, and William YEOH Journal Article

PDF

Scalable urban mobile crowdsourcing: Handling uncertainty in worker movement, Shih-Fen CHENG, Cen CHEN, Thivya KANDAPPU, Hoong Chuin LAU, Archan MISRA, Nikita JAIMAN, Randy Tandriansyah DARATAN, and Desmond KOH Journal Article

PDF

Secure fine-grained access control and data sharing for dynamic groups in the cloud, Shengmin XU, Guomin YANG, Yi MU, and Robert H. DENG Journal Article

PDF

Sequential recommendation with user memory networks, Xu CHEN, Hongteng XU, Yongfeng ZHANG, Jiaxi TANG, Yixin CAO, Zheng QIN, and Hongyuan ZHA Conference Proceeding Article

PDF

Sparse modeling-based sequential ensemble learning for effective outlier detection in high-dimensional numeric data, Guansong PANG, Longbing CAO, Ling CHEN, Defu LIAN, and Huan LIU Conference Proceeding Article

PDF

Sparse Passive-Aggressive learning for bounded online kernel methods, Jing LU, Doyen SAHOO, Peilin ZHAO, and Steven C. H. HOI Journal Article

PDF

Technologies for ageing-in-place: The Singapore context, Nadee GOONAWARDENE, Pius LEE, Hwee Xian TAN, Alvin C. VALERA, and Hwee-Pink TAN Book Chapter

PDF

Things you may not know about Android (un)packers: A systematic study based on whole-system emulation, Yue DUAN, Mu ZHANG, Abhishek Vasist BHASKAR, Heng YIN, Xiaorui PAN, Tongxin LI, Xueqiang WANG, and Xiaofeng WANG Conference Proceeding Article

PDF

Unified locally linear classifiers with diversity-promoting anchor points, Chenghao LIU, Teng ZHANG, Peilin ZHAO, Jianling SUN, and Steven C. H. HOI Conference Proceeding Article

PDF

Upping the game of taxi driving in the age of Uber, Shashi Shekhar JHA, Shih-Fen CHENG, Meghna LOWALEKAR, Wai Hin WONG, Rajendram Rishikeshan RAJENDRAM, Trong Khiem TRAN, Pradeep VARAKANTHAM, Nghia TRUONG TRONG, and Firmansyah ABD RAHMAN Conference Proceeding Article

PDF

VT-Revolution: Interactive programming video tutorial authoring and watching system, Lingfeng BAO, Zhenchang XING, Xin XIA, and David LO Journal Article

Multi-target deep neural networks: Theoretical analysis and implementation, Zeng ZENG, Nanying LIANG, Xulei YANG, and Steven C. H. HOI Journal Article

PDF

A lightweight policy preserving EHR sharing scheme in the cloud, Zuobin YING, Lu WEI, Qi LI, Ximeng LIU, and Jie CUI Journal Article

PDF

Anatomy of online hate: Developing a taxonomy and machine learning models for identifying and classifying hate in online news media, Joni SALMINEN, Hind ALMEREKHI, Milica MILENKOVIC, Soon-Gyu JUNG, Haewoon KWAK, Haewoon KWAK, and Bernard J. JANSEN Conference Proceeding Article

PDF

An iterated local search algorithm for the team orienteering problem with variable profits, Aldy GUNAWAN, Kien Ming NG, Graham KENDALL, and Junhan LAI Journal Article

Catching Captain Jack: Efficient time and space dependent patrols to combat oil-siphoning in international waters, Xinrun WANG, Bo AN, Martin STROBEL, and Fookwai KONG Conference Proceeding Article

PDF

CODE: Coherence based decision boundaries for feature correspondence, Wen-yan LIN, Fan WANG, Ming-Ming CHENG, Sai-Kit YEUNG, Philip H. S. TORR, and Jiangbo LU Journal Article

PDF

Collaboration patterns in software developer network, Didi SURIAN, Ee-peng LIM, and David LO Encyclopaedia

PDF

Competency analytics tool: Analyzing curriculum using course competencies, Swapna GOTTIPATI and Venky SHANKARARAMAN Journal Article

PDF

Consortium blockchain-based SIFT: Outsourcing encrypted feature extraction in the D2D network, Xiaoqin FENG, Jianfeng MA, Tao FENG, Yinbin MIAO, and Ximeng LIU Journal Article

PDF

Dictionary learning with structured noise, Pan ZHOU, Cong FANG, Zhouchen LIN, Chao ZHANG, and Y. Edward CHANG Journal Article

PDF

Discriminant analysis on Riemannian manifold of Gaussian distributions for face recognition with image sets, W. WANG, R. WANG, Zhiwu HUANG, S. SHAN, and X. CHEN Journal Article

PDF

Efficient and privacy-preserving outsourced calculation of rational numbers, Ximeng LIU, Kim-Kwang Raymond CHOO, Robert H. DENG, Rongxing LU, and Jian WENG Journal Article

Egocentric hand detection via dynamic region growing, Shao HUANG, Weiqiang WANG, Shengfeng HE, and Rynson W. H. LAU Journal Article

PDF

Exact and heuristic approaches for the multi-agent orienteering problem with capacity constraints, Wenjie WANG, Hoong Chuin LAU, and Shih-Fen CHENG Conference Proceeding Article

Handbook of blockchain, digital finance, and inclusion: Cryptocurrency, FinTech, InsurTech, and regulation, David LEE and Robert H. DENG Edited Book

PDF

Hybrid privacy-preserving clinical decision support system in fog-cloud computing, Ximeng LIU, Robert H. DENG, Yang YANG, Ngoc Hieu TRAN, and Shangping ZHONG Journal Article

PDF

Identifying and computing the exact core-determining class, Ye LUO and Hai WANG Working Paper

PDF

Integrated reward scheme and surge pricing in a ride sourcing market, Hai YANG, Chaoyi SHAO, Hai WANG, and Jieping YE Working Paper

PDF

Modeling engagement of programming students using unsupervised machine learning technique, Hua Leong FWA and Lindsay MARSHALL Journal Article

PDF

Multi-target deep neural networks: Theoretical analysis and implementation, Zeng ZENG, Nanying LIANG, Xulei YANG, and Steven C. H. HOI Journal Article