The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2017

PDF

Tweet Geolocation: Leveraging location, user and peer signals, Wen-Haw CHONG and Ee Peng LIM Conference Proceeding Article

PDF

Understanding inactive yet available assignees in GitHub, Jing JIANG, David LO, Xinyu MA, Fuli FENG, and Li ZHANG Journal Article

PDF

Unsupervised topic hypergraph hashing for efficient mobile image retrieval, Lei ZHU, Jialie SHEN, Liang XIE, and Zhiyong CHENG Journal Article

PDF

Vireo @ TRecViD 2017: Video-to-text, ad-hoc video search and video hyperlinking, Phuong Anh NGUYEN, Qing LI, Zhi-Qi CHENG, Yi-Jie LU, Hao ZHANG, Xiao WU, and Chong-wah NGO Conference Paper

Escaping together: The design and evaluation of a distributed real-life escape room, Hanieh SHAKERI, Samarth SINGHAL, Rui PAN, Carman NEUSTAEDTER, and Anthony TANG Conference Proceeding Article

Thinking about how to think: Cognitive skills to stay relevant in a digital economy, Siu Loon HOE Journal Article

Visualizing chemicals detection VAST 2017 Mini Challenge 2, Jiaqi ZHANG, Ximeng LIU, Hongjun QIAN, and Tin Seong KAM Conference Proceeding Article

PDF

Design and implementation of a CSI-based ubiquitous smoking detection system, Xiaolong ZHENG, Jilian WANG, Longfei SHANGGUAN, Zimu ZHOU, and Yunhao LIU Journal Article

PDF

A conceptual framework for analyzing students' feedback, Venky SHANKARARAMAN, Swapna GOTTIPATI, and Sandy GAN Conference Proceeding Article

PDF

A validated set of smells in model-view-controller architectures, Maurício ANICHE, Gabriele BAVOTA, Christoph TREUDE, Arie VAN DEURSEN, and Marco Aurélio GEROSA Conference Proceeding Article

PDF

Benchmarking single-image reflection removal algorithms, Renjie WAN, Boxin SHI, Ling-Yu DUAN, Ah-hwee TAN, and Alex C. KOT Conference Proceeding Article

PDF

Combinatorial auction for transportation matching service: Formulation and adaptive large neighborhood search heuristic, Baoxiang LI and Hoong Chuin LAU Conference Proceeding Article

PDF

Cross-modal recipe retrieval with rich food attributes, Jingjing CHEN, Chong-wah NGO, and Tat-Seng CHUA Conference Proceeding Article

PDF

Delving into salient object subitizing and detection, Shengfeng HE, Jianbo JIAO, Xiaodan ZHANG, Guoqiang HAN, and Rynson W.H LAU Conference Proceeding Article

PDF

Design and implementation of an enterprise integrated project environment: Experience from an information systems program, Swapna GOTTIPATI and Venky SHANKARARAMAN Conference Proceeding Article

PDF

Efficient and robust emergence of norms through heuristic collective learning, Jianye HAO, Jun SUN, Guangyong CHEN, Zan WANG, Chao YU, and Zhong MING Journal Article

PDF

Every step you take, I’ll be watching you: Practical StepAuth-entication of RFID paths, Kai BU and Yingjiu LI Journal Article

PDF

Every step you take, I’ll be watching you: Practical StepAuth-entication of RFID paths, Kai BU and Yingjiu LI Journal Article

PDF

FastShrinkage: Perceptually-aware retargeting toward mobile platforms, Zhenguang LIU, Zepeng WANG, Luming ZHANG, Rajiv Ratn SHAH, Yingjie XIA, Yi YANG, and Wei LIU Conference Proceeding Article

PDF

Interactive Visual Analytics Application for Spatiotemporal Movement Data VAST Challenge 2017 Mini-Challenge 1: Award for Actionable and Detailed Analysis, Yifei GUAN and Tin Seong KAM Conference Proceeding Article

PDF

JSForce: A forced execution engine for malicious javascript detection, Xunchao HU, Yao CHENG, Yue DUAN, Andrew HENDERSON, and Heng YIN Conference Proceeding Article

PDF

New framework of password-based authenticated key exchange from only-one lossy encryption, Haiyang XUE, Bao LI, and Jingnan HE Conference Proceeding Article

PDF

O2O service composition with social collaboration, Wenyi QIAN, Xin PENG, Jun SUN, Yijun YU, Bashar NUSEIBEH, and Wenyun ZHAO Conference Proceeding Article

PDF

On negative results when using sentiment analysis tools for software engineering research, Robbert JONGELING, Proshanta SARKAR, Subhajit DATTA, and Alexander SEREBRENIK Journal Article

PDF

PIC2DISH: A customized cooking assistant system, Yongsheng AN, Yu CAO, Jingjing CHEN, Chong-wah NGO, Jia JIA, Huanbo LUAN, and Tat-Seng CHUA Conference Proceeding Article

PDF

Semantic reasoning in zero example video event retrieval, M. H. T. DE BOER, Yi-Jie LU, Hao ZHANG, Klamer SCHUTTE, Chong-wah NGO, and Wessel KRAAIJ Journal Article

PDF

SOL: A library for scalable online learning algorithms, Yue WU, Steven C. H. HOI, Chenghao LIU, Jing LU, Doyen SAHOO, and Nenghai YU Journal Article

PDF

Spatio-temporal analysis and prediction of cellular traffic in metropolis, Xu WANG, Zimu ZHOU, Zheng YANG, Yunhao LIU, and Chunyi PENG Conference Proceeding Article

PDF

Spatiotemporal identification of anomalies in a wildlife preserve, Bharadwaj KISHAN, Jason Guan Jie ONG, Yanrong ZHANG, and Tin Seong KAM Conference Proceeding Article

PDF

Strong authenticated key exchange with auxiliary inputs, Rongmao CHEN, Yi MU, Guomin YANG, Willy SUSILO, and Fuchun GUO Journal Article

PDF

TagScan: Simultaneous target imaging and material identification with commodity RFID devices, Ju WANG, Jie XIONG, Xiaojiang CHEN, Hongbo JIANG, Rajesh Krishna BALAN, and Dingyi FANG Conference Proceeding Article

PDF

Target material identification with commodity RFID devices, Xinyi LI, Chao FENG, Nana DING, Ju WANG, Jie XIONG, Yuhui REN, Xiaojiang CHEN, and Dingyi FANG Conference Proceeding Article

PDF

Tensor factorization for low-rank tensor completion, Pan ZHOU, Canyi LU, Zhouchen LIN, and Chao ZHANG Journal Article

PDF

Visual sentiment analysis for review images with item-oriented and user-oriented CNN, Quoc Tuan TRUONG and Hady W. LAUW Conference Proceeding Article

PDF

Which packages would be affected by this bug report?, Qiao HUANG, David LO, Xin XIA, Qingye WANG, and Shanping LI Conference Proceeding Article

PDF

GraphH: High performance big graph analytics in small clusters, Peng SUN, Yonggang WEN, Nguyen Binh Duong TA, and Xiaokui XIAO Conference Proceeding Article

PDF

JoanAudit: A tool for auditing common injection vulnerabilities, Julian THOME, Lwin Khin SHAR, Domenico BIANCULLI, and Lionel BRIAND Conference Proceeding Article

Expert as a service: Software expert recommendation via knowledge domain embeddings in stack overflow, Chaoran HUANG, Lina YAO, Xianzhi WANG, Boualem BENATALLAH, and Quan Z. SHENG Conference Proceeding Article

Expert as a service: Software expert recommendation via knowledge domain embeddings in stack overflow, Chaoran HUANG, Lina YAO, Xianzhi WANG, Boualem BENATALLAH, and Quan Z. SHENG Conference Proceeding Article

PDF

Sequential schemes for frequentist estimation of properties in statistical model checking, Cyrille JEGOUREL, Jun SUN, and Jin Song DONG Conference Proceeding Article

PDF

An efficient privacy-preserving outsourced computation over public data, Ximeng LIU, Baodong QIN, Robert H. DENG, and Yingjiu LI Journal Article

PDF

An unsupervised multilingual approach for online social media topic identification, Siaw Ling LO, Raymond CHIONG, and David CORNFORTH Journal Article

PDF

AudioSense: Sound-based shopper behavior analysis system, Amit SHARMA and Youngki LEE Conference Proceeding Article

PDF

Automated Android application permission recommendation, Lingfeng BAO, David LO, Xin XIA, and Shanping LI Journal Article

PDF

CLSTERS: A general system for reducing errors of trajectories under challenging localization situations, Hao WU, Weiwei SUN, Baihua ZHENG, Li YANG, and Wei ZHOU Journal Article

PDF

Code coverage and postrelease defects: A large-scale study on open source projects, Pavneet Singh KOCHHAR, David LO, Julia LAWALL, and Nachiappan NAGAPPAN Journal Article

PDF

Combining machine-based and econometrics methods for policy analytics insights, Robert J. KAUFFMAN, Kwansoo KIM, Sang-Yong Tom LEE, Ai Phuong HOANG, and Jing REN Journal Article

PDF

Convergence of media attention across 129 countries, Jisun AN, Hassan ALDARBESTI, and Haewoon KWAK Conference Proceeding Article

PDF

EvoPass: Evolvable graphical password against shoulder-surfing attacks, Xingjie YU, Zhan WANG, Yingjiu LI, Liang LI, Wen Tao ZHU, and Li SONG Journal Article

PDF

Genomic security (Lest we forget), Tatiana BRADLEY, Xuhua DING, and Gene TSUDIK Journal Article

PDF

GitHub and Stack Overflow: Analyzing developer interests across multiple social collaborative platforms, Ka Wei Roy LEE and David LO Conference Proceeding Article

PDF

IND-PCA secure KEM is enough for password-based authenticated key exchange (short paper), Haiyang XUE, Bao LI, and Xianhui LU Conference Proceeding Article

PDF

Inferring spread of readers’ emotion affected by online news, Agus SULISTYA, Ferdian THUNG, and David LO Conference Proceeding Article

Joint image denoising and disparity estimation via stereo structure PCA and noise-tolerant cost, Jianbo JIAO, Qingxiong YANG, Shengfeng HE, Shuhang GU, Lei ZHANG, and Rynson W. H. LAU Journal Article

PDF

Loopster: Static loop termination analysis, Xiaofei XIE, Bihuan CHEN, Liang ZOU, Shang-Wei LIN, Yang LIU, and Xiaohong LI Conference Proceeding Article

PDF

Micro-review synthesis for multi-entity summarization, Thanh-Son NGUYEN, Hady W. LAUW, and Panayiotis TSAPARAS Journal Article

PDF

Multidimensional analysis of the news consumption of different demographic groups on a nationwide scale, Jisun. AN and Haewoon KWAK Conference Proceeding Article

PDF

NLP2Code: Code snippet content assist via natural language tasks, Brock A. CAMPBELL and Christoph TREUDE Conference Proceeding Article

PDF

On-demand developer documentation, Martin P. ROBILLARD, Andrian MARCUS, Christoph TREUDE, Gabriele BAVOTA, Oscar CHAPARRO, Neil ERNST, Marco Aurélio GEROSA, Michael GODFREY, Michele LANZA, Mario LINARES-VASQUEZ, Gail C. MURPHY, Laura MORENO, David SHEPHERD, and Edmund WONG Conference Proceeding Article

PDF

On-demand time blurring to support side-channel defense, Weijie LIU, Debin GAO, and Michael K. REITER Conference Proceeding Article

PDF

Parallel personalized pagerank on dynamic graphs, Wentian GUO, Yuchen LI, Yuchen LI, and Kian-Lee TAN Conference Proceeding Article

PDF

Personality and project success: Insights from a large-scale study with professionals, Xin XIA, David LO, Lingfeng BAO, Abhishek SHARMA, and Shanping LI Conference Proceeding Article

PDF

Personalized microtopic recommendation on microblogs, Yang LI, Jing JIANG, Ting LIU, Minghui QIU, and Xiaofei SUN Journal Article

PDF

S3: Syntax- and semantic-guided repair synthesis via programming by examples, Xuan-Bach D. LE, Duc-Hiep CHU, David LO, Claire LE GOUES, and Willem VISSER Conference Proceeding Article

PDF

Stylizing face images via multiple exemplars, Yibing SONG, Linchao BAO, Shengfeng HE, Qingxiong YANG, and Ming-Hsuan YANG Journal Article

PDF

SugarMate: Non-intrusive blood glucose monitoring with smartphones, Weixi GU, Yuxun ZHOU, Zimu ZHOU, Xi LIU, Han ZOU, Pei ZHANG, Costas J. SPANOS, and Lin ZHANG Journal Article

Supervised vs unsupervised models: A holistic look at effort-aware just-in-time defect prediction, Qiao HUANG, Xin XIA, and David LO Conference Proceeding Article

PDF

Understanding stack overflow code fragments, Christoph TREUDE and Martin P. ROBILLARD Conference Proceeding Article

PDF

Unobtrusive monitoring to detect depression for elderly with chronic illnesses, Jung-Yoon KIM, Na LIU, Hwee Xian TAN, and Chao-Hsien CHU Journal Article

PDF

VCKSM: Verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings, Yinbin MIAO, Jianfeng MA, Ximeng LIU, Qi JIANG, Junwei ZHANG, Limin SHEN, and Zhiquan LIU Journal Article

PDF

VuRLE: Automatic vulnerability detection and repair by learning from examples, MA SIQI, Ferdian THUNG, David LO, Cong SUN, and Robert H. DENG Conference Proceeding Article

PDF

What makes a competent change manager? The importance of developing the “right” attitudes, Siu Loon HOE Journal Article

PDF

XSearch: A domain-specific cross-language relevant question retrieval tool, Bowen XU, Zhenchang XING, Xin XIA, David LO, and Xuan-Bach D. LE Conference Proceeding Article

An approach for self-training audio event detectors using web data, Benjamin ELIZALDE, Ankit SHAH, Siddharth DALMIA, Min Hun LEE, Rohan BADLANI, Anurag KUMAR, Bhiksha RAJ, and Ian LANE Conference Proceeding Article

Region average pooling for context-aware object detection, Kingsley KUAN, Gaurav MANEK, Jie LIN, Yuan FANG, and Vijay CHANDRASEKHAR Conference Proceeding Article

An experimental comparison of two machine learning approaches for emotion classification, Wangchuchu ZHAO and Keng SIAU Conference Proceeding Article

A critical evaluation of spectrum-based fault localization techniques on a large-scale software system, Fabian KELLER, Lars GRUNSKE, Simon HEIDEN, Antonio FILIERI, Andre Van HOORN, and David LO Conference Proceeding Article

PDF

Detect rumors in microblog posts using propagation structure via kernel learning, Jing MA, Wei GAO, and Kam-Fai WONG Conference Proceeding Article

Trust management in mobile platforms, Zheng YAN, Yanxiao CHENG, Ping YAN, and Robert H. DENG Book Chapter

PDF

From retweet to believability: Utilizing trust to identify rumor spreaders on Twitter, Bhavtosh RATH, Wei GAO, Jing MA, and Jaideep SRIVASTAVA Conference Proceeding Article

PDF

Accelerating dynamic graph analytics on GPUs, Mo SHAN, Yuchen LI, Bingsheng HE, and Kian-Lee TAN Conference Proceeding Article

PDF

Basket-sensitive personalized item recommendation, Duc Trong LE, Hady W. LAUW, and Yuan FANG Conference Proceeding Article

PDF

Bridge text and knowledge by learning multi-prototype entity mention embedding, Yixin CAO, Lifu HUANG, Heng JI, Xu CHEN, and Juanzi LI Conference Proceeding Article

PDF

Can syntax help? Improving an LSTM-based Sentence Compression Model for New Domains, Liangguo WANG, Jing JIANG, Hai Leong CHIEU, Chen Hui ONG, Dandan SONG, and Lejian LIAO Conference Proceeding Article

PDF

Deepfacade: A deep learning approach to facade parsing, Hantang LIU, Jialiang ZHANG, Jianke ZHU, and Steven C. H. HOI Conference Proceeding Article

PDF

Don’t bury your head in warnings: A game-theoretic approach for intelligent allocation of cyber-security alerts, Aaron SCHLENKER, Haifeng XU, Mina GUIRGUIS, Christopher KIEKINTVELD, Arunesh SINHA, Milind TAMBE, Solomon SONYA, Darryl BALDERAS, and Noah DUNSTATTER Conference Proceeding Article

PDF

Embedding-based representation of categorical data by hierarchical value coupling learning, Songlei JIAN, Longbing CAO, Guansong PANG, Kai LU, and Hang GAO Conference Proceeding Article

PDF

Encoding and recall of spatio-temporal episodic memory in real time, Poo-Hee CHANG and Ah-hwee TAN Conference Proceeding Article

PDF

Fair deposits against double-spending for Bitcoin transactions, Xingjie YU, Shiwen M. THANG, Yingjiu LI, and Robert H. DENG Conference Proceeding Article

PDF

Flexible online task assignment in real-time spatial data, Yongxin TONG, Libin WANG, Zimu ZHOU, Bolin DING, Lei CHEN, Jieping YE, and Ke XU Journal Article

PDF

FormResNet: Formatted residual learning for image restoration, Jianbo JIAO, Wei-chih TU, and Shengfeng HE Conference Proceeding Article

PDF

Generating cultural personas from social data: A perspective of Middle Eastern users, Salminen Joni, Sercan Sengün, Haewoon KWAK, Bernard Jansen, Jisun AN, Soon-Gyo Jung, Sarah Vieweg, and D. Fox Harrell Conference Proceeding Article

PDF

Geometric approaches for Top-k Queries [Tutorial], Kyriakos MOURATIDIS Conference Proceeding Article

PDF

HIBS-KSharing: Hierarchical identity-based signature key sharing for automotive, Zhuo WEI, Yanjiang YANG, Yongdong WU, Jian WENG, and Robert H. DENG Journal Article

PDF

Impact of artificial intelligence, robotics, and automation on higher education, Keng SIAU Conference Proceeding Article

PDF

Indexing metric uncertain data for range queries and range joins, Lu CHEN, Yunjun GAO, Aoxiao ZHONG, Christian S. JENSEN, Gang CHEN, and Baihua ZHENG Journal Article

PDF

Integrating apache spark and R for big data analytics on solving geographic problems, Mengqi ZHANG and Tin Seong KAM Conference Paper

PDF

Large-scale online feature selection for ultra-high dimensional sparse data, Yue WU, Steven C. H. HOI, Tao MEI, and Nenghai YU Journal Article

PDF

Learning homophily couplings from non-iid data for joint feature selection and noise-resilient outlier detection, Guansong PANG, Longbing CAO, Ling CHEN, and Huan LIU Conference Proceeding Article

PDF

Learning to hallucinate face images via component generation and enhancement, Yibing SONG, Jiawei ZHANG, Shengfeng HE, Linchao BAO, and Qingxiong YANG Conference Proceeding Article