The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2017

PDF

Exploiting anonymity and homogeneity in factored Dec-MDPs through pre-computed binomial distributions, Rajiv RANJAN KUMAR and Pradeep VARAKANTHAM Conference Proceeding Article

PDF

Exploiting contextual information for fine-grained tweet geolocation, Wen Haw CHONG and Ee Peng LIM Conference Proceeding Article

PDF

Feedback-based debugging, Yun LIN, Jun SUN, Yinxing XUE, Yang LIU, and Jin Song DONG Conference Proceeding Article

PDF

Follow-my-lead: Intuitive indoor path creation and navigation using see-through interactive videos, Quentin ROY, Simon T. PERRAULT, Shengdong ZHAO, Richard DAVIS, Anuroop PATTENA VANIYAR, Velko VECHEV, Youngki LEE, and Archan MISRA Conference Proceeding Article

PDF

Fusing social media and mobile analytics for urban sense-making, Archan MISRA Report

PDF

Household informedness and policy analytics for the collection and recycling of household hazardous waste in California, Kustini LIM-WAVDE, Robert J. KAUFFMAN, and Gregory S. DAWSON Journal Article

PDF

Impact of artificial intelligence, robotics, and machine learning on sales and marketing, Keng SIAU and Y. YANG Conference Proceeding Article

PDF

Joint optimization of resource provisioning in cloud computing, Jonathan David CHASE and Dusit NIYATO Journal Article

PDF

Lexicons in sentiment analytics, B. YUAN and Keng SIAU Conference Proceeding Article

PDF

Machine learning approaches to sentiment analytics, W. ZHAO and Keng SIAU Conference Proceeding Article

PDF

Online/offline provable data possession, Yujue WANG, Qianhong WU, Bo QIN, Shaohua TANG, and Willy SUSILO Journal Article

PDF

Parametric model checking timed automata under non-Zenoness assumption, Étienne ANDRE, Hoang Gia NGUYEN, Laure PETRUCCI, and Jun SUN Conference Proceeding Article

PDF

Persona generation from aggregated social media data, Soon-Gyo Jung, Jisun AN, Haewoon KWAK, Moeed Ahmad, Lene Nielsen, and Bernard J. Jansen Conference Proceeding Article

PDF

Provably secure attribute based signcryption with delegated computation and efficient key updating, Hanshu HONG, Yunhao XIA, Zhixin SUN, and Ximeng LIU Journal Article

PDF

Real-time prediction of length of stay using passive Wi-Fi sensing, Truc Viet LE, Baoyang SONG, and Laura WYNTER Conference Proceeding Article

PDF

Real-time prediction of length of stay using passive Wi-Fi sensing, Truc Viet LE, Baoyang SONG, and Laura WYNTER Conference Proceeding Article

RGBD salient object detection via deep fusion, Liangqiong QU, Shengfeng HE, Jiawei ZHANG, Jiandong TIAN, Yandong TANG, and Qingxiong YANG Journal Article

PDF

Robust Object Tracking via Locality Sensitive Histograms, Shengfeng HE, Rynson W.H LAU, Qingxiong YANG, Jiang WANG, and Ming-Hsuan YANG Journal Article

PDF

Search-driven string constraint solving for vulnerability detection, Julian THOME, Lwin Khin SHAR, Domenico BIANCULLI, and Lionel BRIAND Conference Proceeding Article

PDF

Stop nuclear smuggling through efficient container inspection, Xinrun WANG, Qingyu GUO, and Bo AN Conference Proceeding Article

PDF

Towards distributed machine learning in shared clusters: A dynamically-partitioned approach, Peng SUN, Yonggang WEN, Nguyen Binh Duong TA, and Shengen YAN Conference Proceeding Article

PDF

Watching 360° videos together, Anthony TANG and Omid FAKOURFAR Conference Proceeding Article

PDF

What gets media attention and how media attention evolves over time: Large-scale empirical evidence from 196 countries, Jisun AN and Haewoon KWAK Conference Proceeding Article

PDF

Who will leave the company?: A large-scale industry study of developer turnover by mining monthly work report, Lingfeng BAO, Zhenchang XING, Xin XIA, David LO, and Shanping LI Conference Proceeding Article

Identifying outlier opinions in an online intelligent argumentation system, R. ARVAPALLY, X. LIU, Fiona Fui-hoon NAH, and W. JIANG Journal Article

Using deep learning to bridge the gap between perception and intelligence, Arne SUPPE and Martial HERBERT Conference Proceeding Article

PDF

Design and implementation of an RFID-based customer shopping behavior mining system, Zimu ZHOU, Longfei SHANGGUAN, Xiaolong ZHENG, Lei YANG, and Yunhao LIU Journal Article

A platform for free-weight exercise monitoring with passive tags, Han DING, Jinsong HAN, Longfei SHANGGUAN, Wei XI, Zhiping JIANG, Zheng YANG, Zimu ZHOU, Panlong YANG, and Jizhong ZHAO Journal Article

PDF

Achievement and friends: Key factors of player retention vary across player levels in online multiplayer games, Korea Advanced Institute of Science & Technology, Qatar Computing Research Institute, and Haewoon KWAK Conference Proceeding Article

PDF

A compare-aggregate model for matching text sequences, Shuohang WANG and Jing JIANG Conference Proceeding Article

PDF

A dynamic programming approach for quickly estimating large network-based MEV models, Tien MAI, Emma FREJINGER, Mogens FOSGEREAU, and Fabian BASTIN Journal Article

PDF

A secure and efficient ID-based aggregate signature scheme for wireless sensor networks, Limin SHEN, Jianfeng MA, Ximeng LIU, Fushan WEI, and Meixia MIAO Journal Article

PDF

Aspect extraction from product reviews using category hierarchy information, Yifeng YANG, CHEN CEN, Minghui QIU, and Forrest Sheng BAO Conference Proceeding Article

PDF

Assessing the language of chat for teamwork dialogue, Antonette SHIBANI, Elizabeth KOH, Vivian LAI, and Kyong Jin SHIM Journal Article

PDF

Characterizing malicious Android apps by mining topic-specific data flow signatures, Xinli YANG, David LO, Li LI, Xin XIA, Tegawendé F. BISSYANDE, and Jacques KLEIN Journal Article

PDF

Clustering classes in packages for program comprehension, Xiaobing SUN, Xiangyue LIU, Bin LI, Bixin LI, David LO, and Lingzhi LIAO Journal Article

PDF

Collective entity linking in tweets over space and time, Wen Haw CHONG, Ee-peng LIM, and William COHEN Conference Proceeding Article

PDF

Comparative relation generative model, Maksim TKACHENKO and Hady W. LAUW Journal Article

PDF

Discovering anomalous events from urban informatics data, Kasthuri JAYARAJAH, Vigneshwaran SUBBARAJU, Dulanga KAVEESHA WEERAKOON MUDIYANSELAGE, Archan MISRA, La Thanh TAM, and Noel ATHAIDE Conference Proceeding Article

PDF

Empirical study of usage and performance of java collections, Diego COSTA, Artur ANDRZEJAK, Janos SEBOEK, and David LO Conference Proceeding Article

PDF

Factored similarity models with social trust for top-N item recommendation, Guibing GUO, Jie ZHANG, Feida ZHU, and Xingwei WANG

PDF

Finding causality and responsibility for probabilistic reverse skyline query non-answers [Extended Abstract], Yunjun GAO, Qing LIU, Gang CHEN, Linlin ZHOU, and Baihua ZHENG Conference Proceeding Article

PDF

Identity-based data outsourcing with comprehensive auditing in clouds, Yujue WANG, Qianhong WU, Bo QIN, Wenchang SHI, Robert H. DENG, and Jiankun HU Journal Article

PDF

Inferring smartphone keypress via smartwatch inertial sensing, Sougata SEN, Karan GROVER, Vigneshwaran SUBBARAJU, and Archan MISRA Conference Proceeding Article

PDF

Innovation and productivity in the maritime industry, Kar Way TAN

PDF

I would not plant apple trees if the world will be wiped: Analyzing hundreds of millions of behavioral records of players during an MMORPG beta test, Qatar Computing Research Institute, The State University of New York University at Buffalo, Haewoon KWAK, and Korea University Conference Proceeding Article

PDF

Learning personalized preference of strong and weak ties for social recommendation, Xin WANG, Steven C. H. HOI, Martin ESTER, Jiajun BU, and Chun CHEN Conference Proceeding Article

PDF

Machine comprehension using match-LSTM and answer pointer, Shuohang WANG and Jing JIANG Conference Proceeding Article

PDF

Modeling topics and behavior of microbloggers: An integrated approach, Tuan Anh HOANG and Ee-Peng LIM Journal Article

PDF

Neural collaborative filtering, Xiangnan HE, Lizi LIAO, Hanwang ZHANG, Liqiang NIE, Xia HU, and Tat-Seng CHUA Conference Proceeding Article

PDF

Neural collaborative filtering, Xiangnan HE, Lizi LIAO, Hanwang ZHANG, Liqiang NIE, Xia HU, and Tat-Seng CHUA Conference Proceeding Article

PDF

Now you see it, now you don't! A study of content modification behavior in Facebook, Fuxiang CHEN and Ee-peng LIM Conference Proceeding Article

PDF

On analyzing user topic-specific platform preferences across multiple social media sites, Roy Ka Wei LEE, Tuan Anh HOANG, and Ee Peng LIM Conference Proceeding Article

PDF

Online growing neural gas for anomaly detection in changing surveillance scenes, Qianru SUN, Hong LIU, and Tatsuya HARADA Journal Article

PDF

On the effectiveness of virtualization based memory isolation on multicore platforms, Siqi ZHAO and Xuhua DING Conference Proceeding Article

PDF

Predicting the impact of software engineering topics: An empirical study, Santonu SARKAR, Rumana LAKDAWALA, and Subhajit DATTA Conference Proceeding Article

PDF

Related-key secure key encapsulation from extended computational bilinear Diffie–Hellman, Brandon QIN, Shengli LIU, Shifeng SUN, Robert H. DENG, and Dawu GU Journal Article

PDF

Should we learn probabilistic models for model checking? A new approach and an empirical study, Jingyi WANG, Jun SUN, Qixia YUAN, and Jun PANG Conference Proceeding Article

PDF

The crowd work accessibility problem, Saiganesh SWAMINATHAN, Kotaro HARA, and Jeffrey P. BIGHAM Conference Proceeding Article

PDF

Understanding the information-based transformation of strategy and society, Eric K. CLEMONS, Rajiv M. DEWAN, Robert J. KAUFFMAN, and Thomas A. WEBER Journal Article

PDF

Vulnerabilities, attacks, and countermeasures in Balise-based train control systems, Yongdong WU, Jian WENG, Zhe TANG, Xin LI, and Robert H. DENG Journal Article

PDF

What you see is not what you get: Leakage-resilient password entry schemes for smart glasses, Yan LI, Yao CHENG, Yingjiu LI, and Robert H. DENG Conference Proceeding Article

PDF

Are the trade-offs for reducing cross-border cybercrime manageable?, Steven Mark MILLER, Qiu-Hong WANG, and Robert John KAUFFMAN Magazine Article

PDF

Are the trade-offs for reducing cross-border cybercrime manageable?, Steven Mark MILLER, Qiu-Hong WANG, and Robert John KAUFFMAN Blog Post

PDF

Collaboration trumps homophily in urban mobile crowdsourcing, Thivya KANDAPPU, Archan MISRA, and Randy TANDRIANSYAH Conference Proceeding Article

PDF

Dark hazard: Large-scale discovery of unknown hidden sensitive operations in Android apps, Xiaorui PAN, Xueqiang WANG, Yue DUAN, Xiaofeng WANG, and Heng YIN Conference Proceeding Article

PDF

Effective K-Vertex connected component detection in large-scale networks, Yuan LI, Yuha ZHAO, Guoren WANG, Feida ZHU, Yubao WU, and Shenglei SHI Conference Proceeding Article

PDF

Efficient motif discovery in spatial trajectories using discrete Fréchet distance, Bo TANG, Man Lung YIU, Kyriakos MOURATIDIS, and Kai WANG Conference Proceeding Article

PDF

Feature learning via partial differential equation with applications to face recognition, Cong FANG, Zhenyu ZHAO, Pan ZHOU, and Zhouchen LIN Journal Article

Follow the herd or be myself? An analysis of consistency in behavior of reviewers and helpfulness of their reviews, Baojun GAO, Nan HU, and Indranil BOSE Journal Article

PDF

Improving automated bug triaging with specialized topic model, Xin XIA, David LO, Ying DING, Jafar M. AL-KOFAHI, Tien N. NGUYEN, and Xinyu WANG Journal Article

PDF

Inferring user consumption preferences from social media, Yang LI, Jing JIANG, and Ting LIU Journal Article

PDF

Location matters: Geospatial policy analytics over time for household hazardous waste collection in California, Kustini LIM-WAVDE, Robert John KAUFFMAN, Tin Seong KAM, and Gregory S. DAWSON Conference Proceeding Article

PDF

Metric similarity joins using MapReduce, Yunjun GAO, Keyu YANG, Lu CHEN, Baihua ZHENG, Gang CHEN, and Chun CHEN Journal Article

PDF

Mining sandboxes for Linux containers, Zhiyuan WAN, David LO, Xin XIA, Liang CAI, and Shanping LI Conference Proceeding Article

PDF

Privacy in context-aware mobile crowdsourcing systems, Thivya KANDAPPU, Archan MISRA, Shih-Fen CHENG, and Hoong Chuin LAU Conference Proceeding Article

PDF

Probabilistic public key encryption for controlled equijoin in relational databases, Yujue WANG and Hwee Hwa PANG Journal Article

PDF

Scalable image retrieval by sparse product quantization, Qingqun NING, Jianke ZHU, Zhiyuan ZHONG, Steven C. H. HOI, and Chun CHEN Journal Article

Link

Security issues of in-store mobile payment, Xingjie YU, Su Mon KYWE, and Yingjiu LI Book Chapter

PDF

Social tag relevance learning via ranking-oriented neighbor voting, Chaoran CUI, Jialie SHEN, Jun MA, and Tao LIAN Journal Article

PDF

The wonders of the spreadsheet tool for data management and insights, Michelle L. F. CHEONG Book Chapter

PDF

UI X-Ray: Interactive mobile UI testing based on computer vision, Chun-Fu Richard CHEN, Marco PISTOIA, Conglei SHI, Paolo GIROLAMI, Joseph W. LIGMAN, and Yong WANG Conference Proceeding Article

PDF

Version-sensitive mobile app recommendation, Da CAO, Liqiang NIE, Xiangnan HE, Xiaochi WEI, Jialie SHEN, Shunxiang WU, and Tat-Seng CHUA Journal Article

PDF

Whole-system analysis for understanding publicly accessible functions in Android, Huu Hoang NGUYEN, Lingxiao JIANG, and Thanh Tho QUAN Conference Proceeding Article

Cross-language mining and retrieval, Wei GAO and Cheng NIU Book Chapter

Social media content analysis: Natural language processing and beyond, Kam-Fai WONG, Wei GAO, Ruifeng XU, and Wenjie LI Book Chapter

Routing multiple vehicles cooperatively: Minimizing road network breakdown probability, GUO Hongliang, Zhiguang CAO, SESHADRI Madhavan, ZHANG Jie, NIYATO Dusit, and FASTENRATH Ulrich Journal Article

PDF

Active video summarization: Customized summaries via on-line interaction with the user, Ana Garcia DEL MOLINO, Xavier BOIX, Joo-Hwee LIM, and Ah-hwee TAN Conference Proceeding Article

PDF

An efficient approach to model-based hierarchical reinforcement learning, Zhuoru LI, Akshay NARAYAN, and Tze-Yun LEONG Conference Proceeding Article

PDF

A Riemannian network for SPD matrix learning, Zhiwu HUANG and Gool L. VAN Conference Proceeding Article

PDF

Attribute-based secure messaging in the public cloud, Zhi Yuan POH, Hui CUI, Robert H. DENG, and Yingjiu LI Conference Proceeding Article

PDF

Bike route choice modeling using GPS data without choice sets of paths, Maëlle ZIMMERMANN, Tien MAI, and Emma FREJINGER Journal Article

PDF

CLCMiner: Detecting cross-language clones without intermediates, Xiao CHENG, Zhiming PENG, Lingxiao JIANG, Hao ZHONG, Haibo YU, and Jianjun ZHAO Journal Article

PDF

Collaboration trumps homophily in urban mobile crowd-sourcing, Thivya KANDAPPU, Archan MISRA, and Randy Tandriansyah DARATAN Conference Proceeding Article

PDF

Collective multiagent sequential decision making under uncertainty, Duc Thien NGUYEN, Akshat KUMAR, and Hoong Chuin LAU Conference Proceeding Article

Credit derivatives and stock return synchronicity, Xuelian BAI, Nan HU, Ling LIU, and Lu ZHU Journal Article

PDF

Crowdsensing and analyzing micro-event tweets for public transportation insights, Thoong HOANG, Pei Hua (XU Peihua) CHER, Philips Kokoh PRASETYO, and Ee-Peng LIM Conference Proceeding Article

PDF

Decentralized planning in stochastic environments with submodular rewards, Rajiv Ranjan KUMAR, Pradeep VARAKANTHAM, and Akshat KUMAR Conference Proceeding Article

PDF

Detecting similar repositories on GitHub, Yun ZHANG, David LO, PAVNEET SINGH KOCHHAR, Xin XIA, Quanlai LI, and Jianling SUN Conference Proceeding Article

PDF

Discovering burst patterns of burst topic in Twitter, Guozhong DONG, Wu YANG, Feida ZHU, and Wei WANG Journal Article