The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2017

MuVi: Multiview video aware transmission over MIMO wireless systems, Zhe CHEN, Xu ZHANG, Yuedong XU, Jie XIONG, Yu ZHU, and Xin WANG Journal Article

PDF

On modeling sense relatedness in multi-prototype word embedding, Yixin CAO, Juanzi LI, Jiaxin SHI, Zhiyuan LIU, and Chengjiang LI Conference Proceeding Article

PDF

Policy gradient with value function approximation for collective multiagent planning, Duc Thien NGUYEN, Akshat KUMAR, and Hoong Chuin LAU Conference Proceeding Article

PDF

Pose guided person image generation, Liqian MA, Xu JIA, Qianru SUN, Bernt SCHIELE, Tinne TUYTELAARS, and Luc VAN GOOL Conference Proceeding Article

PDF

Robust human activity recognition using lesser number of wearable sensors, Di WANG, Edwin CANDINEGARA, Junhui HOU, Ah-hwee TAN, and Chunyan MIAO Conference Proceeding Article

PDF

Secure server-aided top-k monitoring, Yujue WANG, Hwee Hwa PANG, Yanjiang YANG, and Xuhua DING Journal Article

PDF

Towards tightly secure deterministic public key encryption, Daode ZHANG, Bao LI, Yamin LIU, Haiyang XUE, Xianhui LU, and Dingding JIA Conference Proceeding Article

PDF

Using data analytics for discovering library resource insights: Case from Singapore Management University, Ning LU, Rui SONG, Dina Li Gwek HENG, Swapna GOTTIPATI, and Aaron TAY Conference Proceeding Article

PDF

Using teaching cases for achieving bloom’s high-order cognitive levels: An application in technically-oriented information systems course, Kar Way TAN Conference Proceeding Article

PDF

VKSE-MO: Verifiable keyword search over encrypted data in multi-owner settings, Yinbin MIAO, Jianfeng MA, Ximeng LIU, Junwei ZHANG, and Zhiquan LIU Journal Article

PDF

What do developers search for on the web?, Xin XIA, Lingfeng BAO, David LO, Pavneet Singh KOCHHAR, Ahmed E. HASSAN, and Zhenchang XING Journal Article

PDF

Who are your users? comparing media professionals' preconception of users to data-driven personas, Lene NIELSEN, Soon-Gyu JUNG, Jisun AN, Joni SALMINEN, Haewoon KWAK, and Bernard J. JANSEN Conference Proceeding Article

Secure virtual machine placement in infrastructure cloud services, Varun NATU and Nguyen Binh Duong TA Conference Proceeding Article

An overview of charity governance in Singapore, I J SIM, A L C LOH, L TAY, and Siu Loon HOE Report

Disclosure of board and management matters: An exploratory study on charity governance in Singapore based on institutions of a public character from health and, social and welfare sectors, I J SIM and Siu Loon HOE Report

Egocentric temporal action proposals, Shao HUANG, Weiqiang WANG, Shengfeng HE, and Rynson W. H. LAU Journal Article

PDF

BikeMate: Bike riding behavior monitoring with smartphones, Weixi GU, Zimu ZHOU, Yuxun ZHOU, Han ZOU, Yunxin LIU, Costas J. SPANOS, and Lin ZHANG Conference Proceeding Article

PDF

Learning likely invariants to explain why a program fails, Long H. PHAM, Jun SUN, Lyly Tran THI, Jingyi WANG, and Xin PENG Conference Proceeding Article

PDF

Automatic loop-invariant generation and refinement through selective sampling, Jiaying LI, Jun SUN, Li LI, Quang Loc LE, and Shang-Wei LIN Conference Proceeding Article

PDF

FiB: Squeezing loop invariants by interpolation between forward/backward predicate transformers, Shang-Wei LIN, Jun SUN, Hao XIAO, Yang LIU, David SANA, and Henri HANSEN Conference Proceeding Article

PDF

Mining implicit design templates for actionable code reuse, Yun LIN, Guozhu MENG, Yinxing YUE, Zhenchang XING, Jun SUN, Xin PENG, Yang LIU, Wenyun ZHAO, and Jin Song DONG Conference Proceeding Article

PDF

A fast trajectory outlier detection approach via driving behavior modeling, Hao WU, Weiwei SUN, and Baihua ZHENG Conference Proceeding Article

PDF

An analysis of rumor and counter-rumor messages in social media, Dion Hoe-Lian GOH, Alton Y. K. CHUA, Hanyu SHI, Wenju WEI, Haiyan WANG, and Ee-peng LIM Conference Proceeding Article

PDF

Anomaly detection for a water treatment system using unsupervised machine learning, Jun INOUE, Yoriyuki YAMAGATA, Yuqi CHEN, Christopher M. POSKITT, and Jun SUN Conference Proceeding Article

PDF

AnswerBot: Automated generation of answer summary to developers’ technical questions, Bowen XU, Zhenchang XING, Xin XIA, and David LO Conference Proceeding Article

PDF

APIBot: Question answering bot for API documentation, Yuan TIAN, Ferdian THUNG, Abhishek SHARMA, and David LO Conference Proceeding Article

PDF

A semantics comparison workbench for a concurrent, asynchronous, distributed programming language, Claudio CORRODI, Alexander HEUßNER, and Christopher M. POSKITT Journal Article

PDF

A verification framework for stateful security protocols, Li LI, Naipeng DONG, Jun PANG, Jun SUN, Guangdong BAI, Yang LIU, and Jin Song DONG Conference Proceeding Article

PDF

CapSense: Capacitor-based activity sensing for kinetic energy harvesting powered wearable devices, Guohao LAN, Dong MA, Weitao XU, Mahbub HASSAN, and Wen HU Conference Proceeding Article

PDF

Classification-based parameter synthesis for parametric timed automata, Jiaying LI, Jun SUN, Bo GAO, and Étienne ANDRE Conference Proceeding Article

PDF

Collaborative topic regression with denoising AutoEncoder for content and community co-representation, Trong T. NGUYEN and Hady W. LAUW Conference Proceeding Article

PDF

Color-sketch simulator: A guide for color-based visual known-item search, Jakub LOKOČ, Anh Nguyen PHUONG, Marta VOMLELOVÁ, and Chong-wah NGO Conference Proceeding Article

PDF

Detecting semantic uncertainty by learning hedge cues in sentences using an HMM, Xiujun LI, Wei GAO, and Jude SHAVLIK Book Chapter

PDF

EEG-based emotion recognition via fast and robust feature smoothing, Cheng TANG, Di WANG, Ah-hwee TAN, and Chunyan MIAO Conference Proceeding Article

PDF

Enabling phased array signal processing for mobile WiFi devices, Kun QIAN, Chenshu WU, Zheng YANG, Zimu ZHOU, Xu WANG, and Yunhao LIU Journal Article

PDF

File-level defect prediction: Unsupervised vs. supervised models, Meng YAN, Yicheng FANG, David LO, Xin XIA, and Xiaohong ZHANG Conference Proceeding Article

PDF

Guest editor's introduction to the special issue on source code analysis and manipulation (SCAM 2015), Foutse KHOMH, David LO, and Michael W. GODFREY Transcript

PDF

Highly efficient mining of overlapping clusters in signed weighted networks, Tuan-Anh HOANG and Ee-peng LIM Conference Proceeding Article

PDF

Improving probability estimation through active probabilistic model learning, Jingyi WANG, Xiaohong CHEN, Jun SUN, and Shengchao QIN Conference Proceeding Article

PDF

Indexable Bayesian personalized ranking for efficient top-k recommendation, Dung D. LE and Hady W. LAUW Conference Proceeding Article

PDF

Intent recognition in smart living through deep recurrent neural networks, Xiang ZHANG, Lina YAO, Chaoran HUANG, Quan Z. SHENG, and Xianzhi WANG Conference Proceeding Article

PDF

Interactive social recommendation, Xin WANG, Steven C. H. HOI, Chenghao LIU, and Martin ESTER Conference Proceeding Article

PDF

Introducing people with ASD to crowd work, Kotaro HARA and Jeffrey P. BIGHAM Conference Proceeding Article

PDF

Language inclusion checking of timed automata with non-Zenoness, Xinyu WANG, Jun SUN, Ting WANG, and Shengchao QIN Journal Article

PDF

Large scale kernel methods for online AUC maximization, Yi DING, Chenghao LIU, Peilin ZHAO, and Steven C. H. HOI Conference Proceeding Article

PDF

Leveraging social analytics data for identifying customer segments for online news media, JANSEN, Bernard J, Soon-Gyo JUNG, Jisun AN, Haewoon KWAK, and HAEWOON KWAK Conference Proceeding Article

PDF

Modeling check-in behavior with geographical neighborhood influence of venues, Thanh Nam DOAN and Ee Peng LIM Conference Proceeding Article

PDF

On analyzing job hop behavior and talent flow networks, Richard J. OENTARYO, Xavier Jayaraj Siddarth ASHOK, Ee-peng LIM, and Philips Kokoh PRASETYO Conference Proceeding Article

PDF

On locating malicious code in piggybacked Android apps, Li LI, Daoyuan LI, Tegawende F. BISSYANDE, Jacques KLEIN, Haipeng CAI, David LO, and Yves LE TRAON Journal Article

PDF

Predicting indoor crowd density using column-structured deep neural network, Akihito SUDO, Teck Hou (DENG Dehao) TENG, Hoong Chuin LAU, and Yoshihide SEKIMOTO Conference Proceeding Article

PDF

Presence attestation: The missing link in dynamic trust bootstrapping, Zhangkai ZHANG, Xuhua DING, Gene TSUDIK, Jinhua CUI, and Zhoujun LI Conference Proceeding Article

PDF

Second-order online active learning and its applications, Shuji HAO, Jing LU, Peilin ZHAO, Chi ZHANG, Steven C. H. HOI, and Chunyan MIAO Journal Article

PDF

Selective value coupling learning for detecting outliers in high-dimensional categorical data, Guansong PANG, Hongzuo XU, CAO Longbing, and Wentao ZHAO Conference Proceeding Article

PDF

SemVis: Semantic visualization for interactive topical analysis, LE VAN MINH TUAN and Hady Wirawan LAUW Conference Proceeding Article

PDF

SourceVote: Fusing multi-valued data via inter-source agreements, Xiu Susie FANG, Quan Z. SHENG, Xianzhi WANG, Mahmoud BARHAMGI, Lina YAO, and Anne H.H. NGU Conference Proceeding Article

PDF

SourceVote: Fusing multi-valued data via inter-source agreements, Xiu Susie FANG, Quan Z. SHENG, Xianzhi WANG, Mahmoud BARHAMGI, Lina YAO, and Anne H.H. NGU Conference Paper

PDF

Temporal understanding of human mobility: A multi-time scale analysis, Tongtong LIU, Zheng YANG, Yi ZHAO, Chenshu WU, Zimu ZHOU, and Yunhao LIU Journal Article

PDF

The impact of coverage on bug density in a large industrial software project, Thomas BACH, Artur ANDRZEJAK, Ralf PANNEMANS, and David LO Conference Proceeding Article

PDF

Tweet Geolocation: Leveraging location, user and peer signals, Wen-Haw CHONG and Ee Peng LIM Conference Proceeding Article

PDF

Understanding inactive yet available assignees in GitHub, Jing JIANG, David LO, Xinyu MA, Fuli FENG, and Li ZHANG Journal Article

PDF

Unsupervised topic hypergraph hashing for efficient mobile image retrieval, Lei ZHU, Jialie SHEN, Liang XIE, and Zhiyong CHENG Journal Article

PDF

Vireo @ TRecViD 2017: Video-to-text, ad-hoc video search and video hyperlinking, Phuong Anh NGUYEN, Qing LI, Zhi-Qi CHENG, Yi-Jie LU, Hao ZHANG, Xiao WU, and Chong-wah NGO Conference Paper

Escaping together: The design and evaluation of a distributed real-life escape room, Hanieh SHAKERI, Samarth SINGHAL, Rui PAN, Carman NEUSTAEDTER, and Anthony TANG Conference Proceeding Article

Thinking about how to think: Cognitive skills to stay relevant in a digital economy, Siu Loon HOE Journal Article

Visualizing chemicals detection VAST 2017 Mini Challenge 2, Jiaqi ZHANG, Ximeng LIU, Hongjun QIAN, and Tin Seong KAM Conference Proceeding Article

PDF

Design and implementation of a CSI-based ubiquitous smoking detection system, Xiaolong ZHENG, Jilian WANG, Longfei SHANGGUAN, Zimu ZHOU, and Yunhao LIU Journal Article

PDF

A conceptual framework for analyzing students' feedback, Venky SHANKARARAMAN, Swapna GOTTIPATI, and Sandy GAN Conference Proceeding Article

PDF

A validated set of smells in model-view-controller architectures, Maurício ANICHE, Gabriele BAVOTA, Christoph TREUDE, Arie VAN DEURSEN, and Marco Aurélio GEROSA Conference Proceeding Article

PDF

Benchmarking single-image reflection removal algorithms, Renjie WAN, Boxin SHI, Ling-Yu DUAN, Ah-hwee TAN, and Alex C. KOT Conference Proceeding Article

PDF

Combinatorial auction for transportation matching service: Formulation and adaptive large neighborhood search heuristic, Baoxiang LI and Hoong Chuin LAU Conference Proceeding Article

PDF

Cross-modal recipe retrieval with rich food attributes, Jingjing CHEN, Chong-wah NGO, and Tat-Seng CHUA Conference Proceeding Article

PDF

Delving into salient object subitizing and detection, Shengfeng HE, Jianbo JIAO, Xiaodan ZHANG, Guoqiang HAN, and Rynson W.H LAU Conference Proceeding Article

PDF

Design and implementation of an enterprise integrated project environment: Experience from an information systems program, Swapna GOTTIPATI and Venky SHANKARARAMAN Conference Proceeding Article

PDF

Efficient and robust emergence of norms through heuristic collective learning, Jianye HAO, Jun SUN, Guangyong CHEN, Zan WANG, Chao YU, and Zhong MING Journal Article

PDF

Every step you take, I’ll be watching you: Practical StepAuth-entication of RFID paths, Kai BU and Yingjiu LI Journal Article

PDF

Every step you take, I’ll be watching you: Practical StepAuth-entication of RFID paths, Kai BU and Yingjiu LI Journal Article

PDF

FastShrinkage: Perceptually-aware retargeting toward mobile platforms, Zhenguang LIU, Zepeng WANG, Luming ZHANG, Rajiv Ratn SHAH, Yingjie XIA, Yi YANG, and Wei LIU Conference Proceeding Article

PDF

Interactive Visual Analytics Application for Spatiotemporal Movement Data VAST Challenge 2017 Mini-Challenge 1: Award for Actionable and Detailed Analysis, Yifei GUAN and Tin Seong KAM Conference Proceeding Article

PDF

JSForce: A forced execution engine for malicious javascript detection, Xunchao HU, Yao CHENG, Yue DUAN, Andrew HENDERSON, and Heng YIN Conference Proceeding Article

PDF

New framework of password-based authenticated key exchange from only-one lossy encryption, Haiyang XUE, Bao LI, and Jingnan HE Conference Proceeding Article

PDF

O2O service composition with social collaboration, Wenyi QIAN, Xin PENG, Jun SUN, Yijun YU, Bashar NUSEIBEH, and Wenyun ZHAO Conference Proceeding Article

PDF

On negative results when using sentiment analysis tools for software engineering research, Robbert JONGELING, Proshanta SARKAR, Subhajit DATTA, and Alexander SEREBRENIK Journal Article

PDF

PIC2DISH: A customized cooking assistant system, Yongsheng AN, Yu CAO, Jingjing CHEN, Chong-wah NGO, Jia JIA, Huanbo LUAN, and Tat-Seng CHUA Conference Proceeding Article

Prescriptive analytics: A game changer for business, S. RAVINDRAN and Fiona Fui-hoon NAH Journal Article

PDF

Semantic reasoning in zero example video event retrieval, M. H. T. DE BOER, Yi-Jie LU, Hao ZHANG, Klamer SCHUTTE, Chong-wah NGO, and Wessel KRAAIJ Journal Article

PDF

SOL: A library for scalable online learning algorithms, Yue WU, Steven C. H. HOI, Chenghao LIU, Jing LU, Doyen SAHOO, and Nenghai YU Journal Article

PDF

Spatio-temporal analysis and prediction of cellular traffic in metropolis, Xu WANG, Zimu ZHOU, Zheng YANG, Yunhao LIU, and Chunyi PENG Conference Proceeding Article

PDF

Spatiotemporal identification of anomalies in a wildlife preserve, Bharadwaj KISHAN, Jason Guan Jie ONG, Yanrong ZHANG, and Tin Seong KAM Conference Proceeding Article

PDF

Strong authenticated key exchange with auxiliary inputs, Rongmao CHEN, Yi MU, Guomin YANG, Willy SUSILO, and Fuchun GUO Journal Article

PDF

TagScan: Simultaneous target imaging and material identification with commodity RFID devices, Ju WANG, Jie XIONG, Xiaojiang CHEN, Hongbo JIANG, Rajesh Krishna BALAN, and Dingyi FANG Conference Proceeding Article

PDF

Target material identification with commodity RFID devices, Xinyi LI, Chao FENG, Nana DING, Ju WANG, Jie XIONG, Yuhui REN, Xiaojiang CHEN, and Dingyi FANG Conference Proceeding Article

PDF

Tensor factorization for low-rank tensor completion, Pan ZHOU, Canyi LU, Zhouchen LIN, and Chao ZHANG Journal Article

PDF

Visual sentiment analysis for review images with item-oriented and user-oriented CNN, Quoc Tuan TRUONG and Hady W. LAUW Conference Proceeding Article

PDF

Which packages would be affected by this bug report?, Qiao HUANG, David LO, Xin XIA, Qingye WANG, and Shanping LI Conference Proceeding Article

PDF

GraphH: High performance big graph analytics in small clusters, Peng SUN, Yonggang WEN, Nguyen Binh Duong TA, and Xiaokui XIAO Conference Proceeding Article

PDF

JoanAudit: A tool for auditing common injection vulnerabilities, Julian THOME, Lwin Khin SHAR, Domenico BIANCULLI, and Lionel BRIAND Conference Proceeding Article

Expert as a service: Software expert recommendation via knowledge domain embeddings in stack overflow, Chaoran HUANG, Lina YAO, Xianzhi WANG, Boualem BENATALLAH, and Quan Z. SHENG Conference Proceeding Article

Expert as a service: Software expert recommendation via knowledge domain embeddings in stack overflow, Chaoran HUANG, Lina YAO, Xianzhi WANG, Boualem BENATALLAH, and Quan Z. SHENG Conference Proceeding Article

PDF

Sequential schemes for frequentist estimation of properties in statistical model checking, Cyrille JEGOUREL, Jun SUN, and Jin Song DONG Conference Proceeding Article

PDF

An efficient privacy-preserving outsourced computation over public data, Ximeng LIU, Baodong QIN, Robert H. DENG, and Yingjiu LI Journal Article