Submissions from 2016
Hashtag recommendation with topical attention-based LSTM, Yang LI, Ting LIU, Jing JIANG, and Liang ZHANG Conference Proceeding Article
Is your waste a waste?, Kar Way TAN, Marcus Jiong Kai ONG, Sijie HO, and Michelle KAN Magazine Article
Iterated random oracle: A universal approach for finding loss in security reduction, Fuchun GUO, Willy SUSILO, Yi MU, Rongmao CHEN, Jianchang LAI, and Guomin YANG Conference Proceeding Article
Lexicon knowledge extraction with sentiment polarity computation, Zhaoxia WANG, Vincent Joo Chuan TONG, Pingcheng RUAN, and Fang LI Conference Proceeding Article
Lossy key encapsulation mechanism and its applications, Yamin LIU, Xianhui LU, Bao LI, and Haiyang XUE Conference Proceeding Article
Managing egress of crowd during infrastructure disruption, Teck Hou TENG, Shih-Fen CHENG, Trong-Nghia TRUONG, and Hoong Chuin LAU Conference Proceeding Article
MetroEye: Smart tracking your metro rips underground, Weixi GU, Ming JIN, Zimu ZHOU, Costas J. SPANOS, and Lin ZHANG Conference Proceeding Article
Online detection of behavioral change using unobtrusive eldercare monitoring system, Thanh Tam LA, Alvin Cerdena VALERA, Hwee-Pink TAN, and Cheryl Li Fang KOH Conference Proceeding Article
Orienteering Problem: A survey of recent variants, solution approaches and applications, Aldy GUNAWAN, Hoong Chuin LAU, and Pieter VANSTEENWEGEN Journal Article
Orienteering Problem: A survey of recent variants, solution approaches and applications, Aldy GUNAWAN, Hoong Chuin LAU, and Pieter VANSTEENWEGEN Journal Article
Pairwise relation classification with mirror instances and a combined convolutional neural network, Jianfei YU and Jing JIANG Conference Proceeding Article
Processing Incomplete k Nearest Neighbor Search, Xiaoye MIAO, Yunjun GAO, Gang CHEN, Baihua ZHENG, and Huiyong CUI Journal Article
Semi-automated tool for providing effective feedback on programming assignments, Min Yan BEH, Swapna GOTTIPATI, David LO, and Venky SHANKARARAMAN Conference Proceeding Article
Server-aided public key encryption with keyword search, Rongman CHEN, Yi MU, Guomin YANG, Fuchun GUO, Xinyi HUANG, Xiaofen WANG, and Yongjun WANG Journal Article
Traffic Simulation Model for Port Planning and Congestion Prevention, Baoxiang LI, Kar Way TAN, and Trong Khiem TRAN Conference Proceeding Article
‘TweetBoard’ – a case study of developing a micro-blogging platform for higher education, Shao Cheh Joyce HSU; GAN, Benjamin; Jin LEE; Shu Hui Sheryl LIM; Xie Yan Jeremy LIM; Thomas MENKHOFF; Si Xian Sherman TAN; Charles Jason WOODARD; and Qiu Cheng YAP Journal Article
Unsupervised feature selection for outlier detection by modelling hierarchical value-feature couplings, Guansong PANG, Longbing CAO, Ling CHEN, and Huan LIU Conference Proceeding Article
Validating social media data for automatic persona generation, Jisun AN, Haewoon KWAK, and Bernard J JANSEN Conference Proceeding Article
When seeing is not believing: Defeating MFF-based attacks by liveness detection for face authentication on mobile platform, Yan LI, Qiang YAN, Yingjiu LI, and Robert H. DENG Book Chapter
ZERO++: Harnessing the power of zero appearances to detect anomalies in large-scale data sets, Guansong PANG, Kai Ming TING, David ALBRECHT, and Huidong JIN Journal Article
Exploratory studies on fundraising practices based on Singapore’s institutions of a public character in the health, social and welfare sectors, J L SIM, U MENON, A L C LOH, and Siu Loon HOE Report
Mitigating large errors in WiFi-based indoor localization for smartphones, Chenshu WU, Zheng YANG, Zimu ZHOU, Yunhao LIU, and Mingyan LIU Journal Article
Help me help you: Shared reflection for personal data, Lisa GRAHAM, Anthony TANG, and Carman NEUSTAEDTER Conference Proceeding Article
Information security practice and experience, Feng BAO; Liqun CHEN; DENG, Robert H.; and Guojun WANG Edited Conference Proceeding
Analysis of education and job trends in data science, V. LAI, Kyong Jin SHIM, and M. PRITHIVIRAJAN Conference Proceeding Article
Analysis of student performance and student participation in online discussions, Kyong Jin SHIM, V. LAI, and M. PRITHIVIRAJAN Conference Proceeding Article
Automated verification of timed security protocols with clock drift, Li LI and Jun SUN Conference Proceeding Article
Towards concolic testing for hybrid systems, Pingfan KONG, Yi LI, Xiaohong CHEN, Jun SUN, Meng SUN, and Jingyi WANG Conference Proceeding Article
Towards learning and verifying invariants of cyber-physical systems by code mutation, Yuqi CHEN, Christopher M. POSKITT, and Jun SUN Conference Proceeding Article
Towards learning and verifying invariants of cyber-physical systems by code mutation, Yuqi CHEN, Christopher M. POSKITT, and Jun SUN Conference Proceeding Article
Rapid deployment indoor localization without prior human participation, Han XU, Zimu ZHOU, and Longfei SHANGGUAN Conference Proceeding Article
Improving quality of use case documents through learning and user interaction, Shuang LIU, Jun SUN, Hao XIAO, Bimlesh WADHWA, Jin Song DONG, and Xinyu WANG Conference Proceeding Article
Towards using concurrent Java API correctly, Shuang LIU, Guangdong BAI, Jun SUN, and Jin Song DONG Conference Proceeding Article
Data exfiltration detection and prevention: Virtually distributed POMDPs for practically safer networks, Sara Marie MC CARTHY, Arunesh SINHA, Milind TAMBE, and Pratyusa MANADHATA Conference Proceeding Article
Achieving IND-CCA security for functional encryption for inner products, Shiwei ZHANG, Yi MU, and Guomin YANG Conference Proceeding Article
A decomposition method for estimating recursive logit based route choice models, Tien MAI, Fabian BASTIN, and Emma FREJINGER Journal Article
A method of integrating correlation structures for a generalized recursive route choice model, Tien MAI Journal Article
An efficient and expressive ciphertext-policy attribute-based-encryption scheme with partially hidden access structures, Hui CUI; DENG, Robert H.; Guowei WU; and Junzuo LAI Conference Proceeding Article
An efficient privacy-preserving outsourced calculation toolkit with multiple keys, Ximeng LIU, Robert H. DENG, Kim-Kwang Raymond CHOO, and Jian WENG Journal Article
A novel covert channel detection method in cloud based on XSRM and improved event association algorithm, Lina WANG, Weijie LIU, Neeraj KUMAR, Debiao HE, Cheng TAN, and Debin GAO Journal Article
A provably secure aggregate signature scheme for healthcare wireless sensor networks, Limin SHEN, Jianfeng MA, Ximeng LIU, and Meixia MIAO Journal Article
Aspect-based helpfulness prediction for online product reviews, Yinfei YANG, Cen CHEN, and Forrest Sheng BAO Conference Proceeding Article
A study on a feasible no-root approach on Android, Yao CHENG; Yingjiu LI; DENG, Robert H.; Lingyun YING; and Wei HE Journal Article
A survey on wireless indoor localization from the device perspective, Jiang XIAO, Zimu ZHOU, Youwen YI, and Lionel M. NI Journal Article
Blind late fusion in multimedia event retrieval, Maaike H. T. DE BOER, Klamer SCHUTTE, Hao ZHANG, Yi-Jie LU, Chong-wah NGO, and Wessel KRAAIJ Journal Article
Content sampling, household informedness, and the consumption of digital information goods, Ai Phuong HOANG and Robert J. KAUFFMAN Journal Article
Cost sensitive online multiple kernel classification, Doyen SAHOO, Peilin ZHAO, and Steven C. H. HOI Conference Proceeding Article
Designing and evaluating business process models: An experimental approach, Yuecheng Martin YU, Alexander PELAEZ, and Karl R. LANG Journal Article
Designing minimal effective normative systems with the help of lightweight formal methods, Jianye HAO, Eunsuk KANG, Jun SUN, and Daniel JACKSON Conference Proceeding Article
Editorial: Trust management for multimedia big data, Zheng YAN; Jun LIU; DENG, Robert H.; and Francisco HERRERA Editorial
Efficient Tag Path Authentication Protocol with Less Tag Memory, Hongbing WANG, Yingjiu LI, Zongyang ZHANG, and Yunlei ZHAO Conference Proceeding Article
Escrow free attribute-based signature with self-revealability, Hui CUI; Guilin WANG; DENG, Robert H.; and Baodong QIN Journal Article
Finding causality and responsibility for probabilistic reverse skyline query non-answers, Yunjun GAO, Qing LIU, Gang CHENG, Linlin ZHOU, and Baihua ZHENG Journal Article
Grab Taxi: Navigating new frontiers, Mei LIN and Christopher DULA Magazine Article
Hierarchical visualization of video search results for topic-based browsing, Yu-Gang JIANG, Jiajun WANG, Qiang WANG, Wei LIU, and Chong-wah NGO Journal Article
How to break an API: Cost negotiation and community values in three software ecosystems, Christopher Bogart, Christian K\303\244stner, James Herbsleb, and FERDIAN THUNG Conference Proceeding Article
Landmark reranking for smart travel guide systems by combining and analyzing diverse media, Junge SHEN, Jialie SHEN, Tao MEI, and Xinbo GAO Journal Article
Learning sentence embeddings with auxiliary tasks for cross-domain sentiment classification, Jianfei YU and Jing JIANG Conference Proceeding Article
m(2)-ABKS: Attribute-based multi-keyword search over encrypted personal health records in multi-owner setting, Yinbin MIAO, Jianfeng MA, Ximeng LIU, Fushan WEI, Zhiquan LIU, and Xu An WANG Journal Article
Message from the chairs, Andrew BEGEL, Fabio CALEFATO, and Christoph TREUDE Conference Proceeding Article
One-round attribute-based key exchange in the multi-party setting, Yangguang TIAN, Guomin YANG, Yi MU, Kaitai LIANG, and Yong YU Conference Proceeding Article
On profiling bots in social media, Richard J. OENTARYO, Arinto MURDOPO, Philips K. PRASETYO, and Ee Peng LIM Conference Proceeding Article
On the security of two identity-based conditional proxy re-encryption schemes, Kai HE, Jian WENG, Robert H. DENG, and Joseph K. LIU Journal Article
Ownership-hidden group-oriented proofs of storage from pre-homomorphic signatures, Yujue WANG, Qianhong WU, Bo QIN, Xiaofeng CHEN, Xinyi HUANG, and Jungang LOU Journal Article
Partitioning uncertain workloads, Freddy CHUA and Bernardo A. HUBERMAN Journal Article
Privacy-preserving outsourced calculation on floating point numbers, Ximeng LIU, Robert H. DENG, Wenxiu DING, and Rongxing LU Journal Article
Proteus: Computing disjunctive loop summary via path dependency analysis, Xiaofei XIE, Bihuan CHEN, Yang LIU, Wei LE, and Xiaohong LI Conference Proceeding Article
Reducing adaptation latency for multi-concept visual perception in outdoor environments, Maggie WIGNESS, John G. ROGERS, Luis Ernesto NAVARRO-SERMENT, Arne SUPPE, and Bruce A. DRAPER Conference Proceeding Article
Scaling BDD-based timed verification with simulation reduction, Truong Khanh NGUYEN, Tian Huat TAN, Jun SUN, Jiaying LI, Yang LIU, Manman CHEN, and Jin Song DONG Conference Proceeding Article
Service adaptation with probabilistic partial models, Manman CHEN, Tian Huat TAN, Jun SUN, Jingyi WANG, Yang LIU, Jing SUN, and Jin Song DONG Conference Proceeding Article
Spiteful, one-off, and kind: Predicting customer feedback behavior on Twitter, Agus SULISTYA, Abhishek SHARMA, and David LO Conference Proceeding Article
Static loop analysis and Its applications, Xiaofei XIE Conference Proceeding Article
Summarization of egocentric videos: A comprehensive survey, Ana GARCIA DEL MOLINO, Cheston TAN, Joo-Hwee LIM, and Ah-hwee TAN Journal Article
VIREO @ TRECVID 2016: Multimedia event detection, ad-hoc video search, video-to-text description, Hao ZHANG, Yi-Jie LU, and Chong-wah NGO Conference Proceeding Article
VIREO@TRECVID 2016: Multimedia event detection, ad-hoc video search, video to text description, Hao ZHANG, Lei PANG, Yi-Jie LU, and Chong-wah NGO Conference Paper
What permissions should this Android app request?, Lingfeng BAO, David LO, Xin XIA, and Shanping LI Conference Proceeding Article
ORPLocator: Identifying read points of configuration options via static analysis, Zhen DONG, Artur ANDRZEJAK, David LO, and Diego COSTA Conference Proceeding Article
Security and privacy in communication networks: 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, Proceedings, Robert H. DENG, Jian WENG, Kui REN, and Vinod YEGNESWARAN Edited Conference Proceeding
Achieving economic and environmental sustainabilities in urban consolidation center with bicriteria auction, Stephanus Daniel HANDOKO, Hoong Chuin LAU, and Shih-Fen CHENG Journal Article
AmaLgam+: Composing rich information sources for accurate bug localization, Shaowei WANG and David LO Journal Article
An ECRA 15th anniversary virtual special issue on ‘Payments, cards and services in the Fintech revolution’, Robert John KAUFFMAN, Dan MA, and Byungjoon YOO Editorial
An ECRA 15th anniversary virtual special issue on ‘Social Networks and Social Commerce’, Robert J. KAUFFMAN, Bin WANG, and Lina ZHOU Editorial
An ECRA 15th anniversary virtual special issue on ‘Technological and Machine Approaches in E-commerce’, Robert J. KAUFFMAN, Chris YANG, and Jie ZHANG Editorial
An ECRA 15th Anniversary Virtual Special Issue on "The Behavioral Dimensions of E-commerce", Robert J. KAUFFMAN, Hsiangchu LAI, and Yinping YANG Editorial
A novel CSI pre-processing scheme for device-free localization indoors, Ju WANG, Lichao ZHANG, Xuan WANG, Jie XIONG, Xiaojiang CHEN, and Dingyi FANG Conference Proceeding Article
ARISE-PIE: A People Information Integration Engine over the Web, Vincent W. ZHENG, Tao HOANG, Penghe CHEN, Yuan FANG, and Xiaoyan YANG Conference Proceeding Article
Attractiveness versus competition: Towards an unified model for user visitation, Thanh-Nam DOAN and Ee-Peng LIM Conference Proceeding Article
Attribute-based encryption with granular revocation, Hui CUI; DENG, Robert H.; Xuhua DING; and Yingjiu LI Conference Proceeding Article
"Automated debugging considered harmful" considered harmful: A user study revisiting the usefulness of spectra-based fault localization techniques with professionals using real bugs from large systems, Xin XIA, Lingfeng BAO, David LO, and Shanping LI Conference Proceeding Article
Behavior analysis in social networks: Challenges, technologies, and trends, Meng WANG, Ee-peng LIM, Lei LI, and Mehmet ORGUN Editorial
Bilevel model-based discriminative dictionary learning for recognition, Pan ZHOU, Chao ZHANG, and LIN Zhouchen Journal Article
Combining word embedding with information retrieval to recommend similar bug reports, Xinli YANG, David LO, Xin XIA, Lingfeng BAO, and Jianling SUN Conference Proceeding Article
Deep-based ingredient recognition for cooking recipe retrieval, Jingjing CHEN and Chong-wah NGO Conference Proceeding Article
Determining quality- and energy-aware multiple contexts in pervasive computing environments, Nirmalya ROY, Archan MISRA, Sajal K. DAS, and Christine JULIEN Journal Article
Dissecting developer policy violating apps: Characterization and detection, Su Mon KYWE, Yingjiu LI, Jason HONG, and Yao CHENG Conference Proceeding Article
Empirical study on synthesis engines for semantics-based program repair, Le Dinh Xuan BACH, David LO, and Claire Le GOUES Conference Proceeding Article
Enhancing automated program repair with deductive verification, Xuan-Bach D. LE, Quang Loc LE, David LO, and Claire Le GOUES Conference Proceeding Article
HYDRA: Massively compositional model for cross-project defect prediction, Xin XIA, David LO, Sinno Jialin PAN, Nachiappan NAGAPPAN, and Xinyu WANG Journal Article
Inferring links between concerns and methods with multi-abstraction vector space model, Yun ZHANG, David LO, Xin XIA, Tien-Duy B. LE, Giuseppe SCANNIELLO, and Jianling SUN Conference Proceeding Article
Integrated software fingerprinting via neural-network-based control flow obfuscation, Haoyu MA, Ruiqi LI, Xiaoxu YU, Chunfu JIA, and Debin GAO Journal Article