Submissions from 2017
Vulnerabilities, attacks, and countermeasures in Balise-based train control systems, Yongdong WU, Jian WENG, Zhe TANG, Xin LI, and Robert H. DENG Journal Article
What you see is not what you get: Leakage-resilient password entry schemes for smart glasses, Yan LI, Yao CHENG, Yingjiu LI, and Robert H. DENG Conference Proceeding Article
Are the trade-offs for reducing cross-border cybercrime manageable?, Steven Mark MILLER, Qiu-Hong WANG, and Robert John KAUFFMAN Blog Post
Are the trade-offs for reducing cross-border cybercrime manageable?, Steven Mark MILLER, Qiu-Hong WANG, and Robert John KAUFFMAN Magazine Article
Collaboration trumps homophily in urban mobile crowdsourcing, Thivya KANDAPPU, Archan MISRA, and Randy TANDRIANSYAH Conference Proceeding Article
Dark hazard: Large-scale discovery of unknown hidden sensitive operations in Android apps, Xiaorui PAN, Xueqiang WANG, Yue DUAN, Xiaofeng WANG, and Heng YIN Conference Proceeding Article
Effective K-Vertex connected component detection in large-scale networks, Yuan LI, Yuha ZHAO, Guoren WANG, Feida ZHU, Yubao WU, and Shenglei SHI Conference Proceeding Article
Efficient motif discovery in spatial trajectories using discrete Fréchet distance, Bo TANG, Man Lung YIU, Kyriakos MOURATIDIS, and Kai WANG Conference Proceeding Article
Feature learning via partial differential equation with applications to face recognition, Cong FANG, Zhenyu ZHAO, Pan ZHOU, and Zhouchen LIN Journal Article
Follow the herd or be myself? An analysis of consistency in behavior of reviewers and helpfulness of their reviews, Baojun GAO, Nan HU, and Indranil BOSE Journal Article
Improving automated bug triaging with specialized topic model, Xin XIA, David LO, Ying DING, Jafar M. AL-KOFAHI, Tien N. NGUYEN, and Xinyu WANG Journal Article
Inferring user consumption preferences from social media, Yang LI, Jing JIANG, and Ting LIU Journal Article
Location matters: Geospatial policy analytics over time for household hazardous waste collection in California, Kustini LIM-WAVDE, Robert John KAUFFMAN, Tin Seong KAM, and Gregory S. DAWSON Conference Proceeding Article
Metric similarity joins using MapReduce, Yunjun GAO, Keyu YANG, Lu CHEN, Baihua ZHENG, Gang CHEN, and Chun CHEN Journal Article
Mining sandboxes for Linux containers, Zhiyuan WAN, David LO, Xin XIA, Liang CAI, and Shanping LI Conference Proceeding Article
Privacy in context-aware mobile crowdsourcing systems, Thivya KANDAPPU, Archan MISRA, Shih-Fen CHENG, and Hoong Chuin LAU Conference Proceeding Article
Probabilistic public key encryption for controlled equijoin in relational databases, Yujue WANG and Hwee Hwa PANG Journal Article
Scalable image retrieval by sparse product quantization, Qingqun NING, Jianke ZHU, Zhiyuan ZHONG, Steven C. H. HOI, and Chun CHEN Journal Article
Security issues of in-store mobile payment, Xingjie YU, Su Mon KYWE, and Yingjiu LI Book Chapter
Social tag relevance learning via ranking-oriented neighbor voting, Chaoran CUI, Jialie SHEN, Jun MA, and Tao LIAN Journal Article
The wonders of the spreadsheet tool for data management and insights, Michelle L. F. CHEONG Book Chapter
UI X-Ray: Interactive mobile UI testing based on computer vision, Chun-Fu Richard CHEN, Marco PISTOIA, Conglei SHI, Paolo GIROLAMI, Joseph W. LIGMAN, and Yong WANG Conference Proceeding Article
Version-sensitive mobile app recommendation, Da CAO, Liqiang NIE, Xiangnan HE, Xiaochi WEI, Jialie SHEN, Shunxiang WU, and Tat-Seng CHUA Journal Article
Whole-system analysis for understanding publicly accessible functions in Android, Huu Hoang NGUYEN, Lingxiao JIANG, and Thanh Tho QUAN Conference Proceeding Article
Cross-language mining and retrieval, Wei GAO and Cheng NIU Book Chapter
Social media content analysis: Natural language processing and beyond, Kam-Fai WONG, Wei GAO, Ruifeng XU, and Wenjie LI Book Chapter
Routing multiple vehicles cooperatively: Minimizing road network breakdown probability, GUO Hongliang, Zhiguang CAO, SESHADRI Madhavan, ZHANG Jie, NIYATO Dusit, and FASTENRATH Ulrich Journal Article
Active video summarization: Customized summaries via on-line interaction with the user, Ana Garcia DEL MOLINO, Xavier BOIX, Joo-Hwee LIM, and Ah-hwee TAN Conference Proceeding Article
An efficient approach to model-based hierarchical reinforcement learning, Zhuoru LI, Akshay NARAYAN, and Tze-Yun LEONG Conference Proceeding Article
A Riemannian network for SPD matrix learning, Zhiwu HUANG and Gool L. VAN Conference Proceeding Article
Attribute-based secure messaging in the public cloud, Zhi Yuan POH, Hui CUI, Robert H. DENG, and Yingjiu LI Conference Proceeding Article
Bike route choice modeling using GPS data without choice sets of paths, Maëlle ZIMMERMANN, Tien MAI, and Emma FREJINGER Journal Article
CLCMiner: Detecting cross-language clones without intermediates, Xiao CHENG, Zhiming PENG, Lingxiao JIANG, Hao ZHONG, Haibo YU, and Jianjun ZHAO Journal Article
Collaboration trumps homophily in urban mobile crowd-sourcing, Thivya KANDAPPU, Archan MISRA, and Randy Tandriansyah DARATAN Conference Proceeding Article
Collective multiagent sequential decision making under uncertainty, Duc Thien NGUYEN, Akshat KUMAR, and Hoong Chuin LAU Conference Proceeding Article
Credit derivatives and stock return synchronicity, Xuelian BAI, Nan HU, Ling LIU, and Lu ZHU Journal Article
Crowdsensing and analyzing micro-event tweets for public transportation insights, Thoong HOANG, Pei Hua (XU Peihua) CHER, Philips Kokoh PRASETYO, and Ee-Peng LIM Conference Proceeding Article
Decentralized planning in stochastic environments with submodular rewards, Rajiv Ranjan KUMAR, Pradeep VARAKANTHAM, and Akshat KUMAR Conference Proceeding Article
Detecting similar repositories on GitHub, Yun ZHANG, David LO, PAVNEET SINGH KOCHHAR, Xin XIA, Quanlai LI, and Jianling SUN Conference Proceeding Article
Discovering burst patterns of burst topic in Twitter, Guozhong DONG, Wu YANG, Feida ZHU, and Wei WANG Journal Article
Dynamic repositioning to reduce lost demand in Bike Sharing Systems, Supriyo GHOSH, Pradeep VARAKANTHAM, Yossiri ADULYASAK, and Patrick JAILLET Journal Article
Empath-D: Empathetic design for accessibility, Kenny Tsu Wei CHOO, Rajesh Krishna BALAN, Kiat Wee TAN, Archan MISRA, and Youngki LEE Conference Proceeding Article
Harnessing Twitter to support serendipitous learning of developers, Abhabhisheksh SHARMA, Yuan TIAN, Agus SULISTYA, David LO, and Aiko YAMASHITA Conference Proceeding Article
Maximizing the probability of arriving on time: A practical q-learning method, Zhiguang CAO, Hongliang GUO, Jie ZHANG, Frans OLIEHOEK, and Ulrich FASTENRATH Conference Proceeding Article
Optimizing expectation with guarantees in POMDPs, Krishnendu CHATTERJEE, Guillermo A. PEREZ, Jean-François RASKIN, and Dorde ZIKELIC Conference Proceeding Article
Recurrent neural networks with auxiliary labels for cross-domain opinion target extraction, Ying DING, Jianfei YU, and Jing JIANG Conference Proceeding Article
Robust optimization for tree-structured stochastic network design, Xiaojian WU, Akshat KUMAR, and Daniel SHELDON Conference Proceeding Article
SEAPoT-RL: Selective exploration algorithm for policy transfer in RL, Akshay NARAYAN, Zhuoru LI, and Tze-Yun LEONG Conference Proceeding Article
Security slicing for auditing common injection vulnerabilities, Julian THOME, Lwin Khin SHAR, Domenico BIANCULLI, and Lionel BRIAND Journal Article
SOAL: Second-order Online Active Learning, Shuji HAO, Peilin ZHAO, Jing LU, Steven C. H. HOI, Chunyan MIAO, and Chi ZHANG Conference Proceeding Article
Stereo object proposals, Shao HUANG, Weiqiang WANG, Shengfeng HE, and Rynson W. H. LAU Journal Article
Streaming classification with emerging new class by class matrix sketching, Xin MU, Feida ZHU, Juan DU, Ee-peng LIM, and Zhi-Hua ZHOU Conference Proceeding Article
Toward a collaborative AI framework for assistive dementia care, Tze-Yun LEONG Conference Proceeding Article
Unsupervised visual hashing with semantic assistant for content-based image retrieval, Lei ZHU, Jialie SHEN, Liang XIE, and Zhiyong CHENG Journal Article
Why and how developers fork what from whom in GitHub, Jing JIANG, David LO, Jiahuan HE, Xin XIA, Pavneet Singh KOCHHAR, and Li ZHANG Journal Article
A new public remote integrity checking scheme with user and data privacy, Yiteng FENG, Yi MU, Guomin YANG, and Joseph LIU Journal Article
Attribute-based storage supporting secure deduplication of encrypted data in cloud, Hui CUI, Robert H. DENG, Yingjiu LI, and Guowei WU Journal Article
A two-sided collaborative transparent display supporting workspace awareness, Jiannan LI, Saul GREENBERG, and Ehud SHARLIN Journal Article
Concept-based interactive search system, Yi-Jie LU, Phuong Anh NGUYEN, Hao ZHANG, and Chong-wah NGO Conference Proceeding Article
Cross-modal recipe retrieval: How to cook this dish?, Jingjing CHEN, Lei PANG, and Chong-wah NGO Conference Proceeding Article
Discovering historic traffic-tolerant paths in road networks, Pui Hang LI, Man Lung YIU, and Kyriakos MOURATIDIS Journal Article
Easing Cross-Border Communication: Mobile-mediated Communication and Its Framework, Kyungsub CHOI and Young Soo KIM Conference Proceeding Article
Enabling sustainable bulk transfer in environmentally-powered wireless sensor networks, Alvin C. VALERA, Wee-Seng SOH, and Hwee-Pink TAN Journal Article
Examining the effectiveness of gamification in human computation, Xiaohui WANG, Dion Hoe-Lian GOH, Ee peng LIM, Adrian Wei Liang VU, and Alton Yeow Kuan CHUA Journal Article
Exploring representativeness and informativeness for active learning, Bo DU, Zengmao WANG, Lefei ZHANG, Liangpei ZHANG, Wei LIU, Jialie SHEN, and Dacheng TAO Journal Article
Fine-grained sentiment analysis of social media with emotion sensing, Zhaoxia WANG, Chee Seng CHONG, Landy LAN, Yinping YANG, Beng-Seng HO, and Joo Chuan TONG Conference Proceeding Article
Funding challenges of voluntary welfare organizations in Singapore's disability sector, Joo Lay Isabel SIM, Lye Chye Alfred LOH, and Siu Loon HOE Journal Article
H-Binder: A hardened binder framework on Android systems, Dong SHEN, Zhangkai ZHANG, Xuhua DING, Zhoujun LI, and Robert H. DENG Conference Proceeding Article
High impact bug report identification with imbalanced learning strategies, Xinli YANG, David LO, Xin XIA, Qiao HUANG, and Jianling SUN Journal Article
Internet health information seeking and the patient-physician relationship: A systematic review, Sharon Swee-Lin TAN and Nadee GOONAWARDENE Journal Article
Online hacker forum censorship: Would banning the bad guys attract good guys?, Qiu-Hong WANG, Le-Ting ZHANG, and Meng-Ke QIAO Conference Proceeding Article
On the effectiveness of code-reuse-based Android application obfuscation, Xiaoxiao TANG, Yu LIANG, Xinjie MA, Yan LIN, and Debin GAO Conference Proceeding Article
Research strategies for biomedical and health informatics: Some thought-provoking and critical proposals to encourage scientific debate on the nature of good research in medical informatics, Reinhold HAUX and et al. Journal Article
RFID ownership transfer with positive secrecy capacity channels, Jorge MUNILLA, Mike BURMESTER, Alberto PEINADO, Guomin YANG, and Willy SUSILO Journal Article
SafeStack+: Enhanced dual stack to combat data-flow hijacking, Yan LIN, Xiaoxiao TANG, and Debin GAO Conference Proceeding Article
Sensor-driven detection of social isolation in community-dwelling elderly, W K P Neranjana Nadee Rodrigo GOONAWARDENE, Xiaoping TOH, and Hwee-Pink TAN Conference Proceeding Article
Stochastic invariants for probabilistic termination, Krishnendu CHATTERJEE, Petr NOVOTNÝ, and Dorde ZIKELIC Conference Proceeding Article
Technology mergers and acquisitions in the presence of an installed base: A strategic analysis, Qiu-Hong WANG and Kai-Lung HUI Journal Article
The habits of highly effective researchers: An empirical study, Subhajit DATTA, Partha BASUCHOWDHURI, Surajit ACHARYA, and Subhashis MAJUMDER Journal Article
The making of a successful analytics master degree program: Experiences and lessons drawn for a young and small Asian university, Michelle L. F. CHEONG Journal Article
They all seem good, but which one fits me? Reducing fit uncertainty for digital entertainment goods, Ai Phuong HOANG Conference Proceeding Article
Universally composable RFID mutual authentication, Chunhua SU, Bagus SANTOSO, Yingjiu LI, Robert H. DENG, and Xinyi HUANG Journal Article
Viewed by too many or viewed too little: Using information dissemination for audience segmentation, Bernard J. JANSEN, Soon-Gyu JUNG, Joni SALMINEN, Jisun AN, and Haewoon KWAK Conference Proceeding Article
Submissions from 2016
Timed dataflow: Reducing communication overhead for distributed machine learning systems, Peng SUN, Yonggang WEN, Nguyen Binh Duong TA, and Shengen YAN Conference Proceeding Article
Designing a data warehousing and business analytics course using experiential learning pedagogy, GOTTIPATI Swapna and SHANKARARAMAN, Venky Conference Proceeding Article
An agent-based approach to human migration movement, Larry LIN, Kathleen M. CARLEY, and Shih-Fen CHENG Conference Proceeding Article
Answering why-not and why questions on reverse top-k queries, Qing LIU, Yunjun GAO, Gang CHEN, Baihua ZHENG, and Linlin ZHOU Journal Article
A privacy-preserving outsourced functional computation framework across large-scale multiple encrypted domains, Ximeng LIU, Baodong QIN, Robert H. DENG, Rongxing LU, and Jianfeng MA Journal Article
Attacking Android smartphone systems without permissions, Mon Kywe SU, Yingjiu LI, Kunal PETAL, and Michael GRACE Conference Proceeding Article
CareerMapper: An automated resume evaluation tool, Vivian LAI, Kyong Jin SHIM, Richard J. OENTARYO, Philips K. PRASETYO, Casey VU, Ee-peng LIM, and David LO Conference Proceeding Article
Cast2Face: Assigning character names onto faces in movie with actor-character correspondence, Guangyu GAO, Mengdi XU, Jialie SHEN, Huangdong MA, and Shuicheng YAN Journal Article
Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment, Lixian LIU, Junzuo LAI, Robert H. DENG, and Yingjiu LI Journal Article
Collective personalized change classification with multiobjective search, Xin XIA, David LO, Xinyu WANG, and Xiaohu YANG Journal Article
Cryptographic reverse firewall via malleable smooth projective hash functions, Rongmao CHEN, Guomin YANG, Guomin YANG, Willy SUSILO, Fuchun GUO, and Mingwu ZHANG Conference Proceeding Article
Demystifying and puncturing the inflated delay in smartphone-based WiFi network measurement, Weichao LI, Daoyuan WU, Rocky K. C. CHANG, and Ricky K. P. MOK Conference Proceeding Article
Designing a datawarehousing and business analytics course using experiential learning pedagogy, GOTTIPATI Swapna and Venky SHANKARARAMAN Conference Proceeding Article
Domain identification for intention posts on online social media, Thai Le Luong, Quoc Tuan TRUONG, Hai-Trieu Dang, and Xuan Hieu Phan Conference Proceeding Article
D-watch: Embracing "bad" multipaths for device-free localization with COTS RFID devices, Ju WANG, Jie XIONG, Hongbo JIANG, Xiaojiang CHEN, and Dingyi FANG Conference Proceeding Article
Efficient online summarization of large-scale dynamic networks, Qiang QU, Siyuan LIU, Feida ZHU, and Christian S. JENSEN Journal Article
From footprint to evidence: An exploratory study of mining social data for credit scoring, Guangming GUO, Feida ZHU, Enhong CHEN, Qi LIU, Le WU, and Chu GUAN Journal Article