The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2016

PDF

Hashtag recommendation with topical attention-based LSTM, Yang LI, Ting LIU, Jing JIANG, and Liang ZHANG Conference Proceeding Article

PDF

Is your waste a waste?, Kar Way TAN, Marcus Jiong Kai ONG, Sijie HO, and Michelle KAN Magazine Article

PDF

Iterated random oracle: A universal approach for finding loss in security reduction, Fuchun GUO, Willy SUSILO, Yi MU, Rongmao CHEN, Jianchang LAI, and Guomin YANG Conference Proceeding Article

PDF

Lexicon knowledge extraction with sentiment polarity computation, Zhaoxia WANG, Vincent Joo Chuan TONG, Pingcheng RUAN, and Fang LI Conference Proceeding Article

PDF

Lossy key encapsulation mechanism and its applications, Yamin LIU, Xianhui LU, Bao LI, and Haiyang XUE Conference Proceeding Article

PDF

Managing egress of crowd during infrastructure disruption, Teck Hou TENG, Shih-Fen CHENG, Trong-Nghia TRUONG, and Hoong Chuin LAU Conference Proceeding Article

PDF

MetroEye: Smart tracking your metro rips underground, Weixi GU, Ming JIN, Zimu ZHOU, Costas J. SPANOS, and Lin ZHANG Conference Proceeding Article

PDF

Online detection of behavioral change using unobtrusive eldercare monitoring system, Thanh Tam LA, Alvin Cerdena VALERA, Hwee-Pink TAN, and Cheryl Li Fang KOH Conference Proceeding Article

PDF

Orienteering Problem: A survey of recent variants, solution approaches and applications, Aldy GUNAWAN, Hoong Chuin LAU, and Pieter VANSTEENWEGEN Journal Article

PDF

Orienteering Problem: A survey of recent variants, solution approaches and applications, Aldy GUNAWAN, Hoong Chuin LAU, and Pieter VANSTEENWEGEN Journal Article

PDF

Pairwise relation classification with mirror instances and a combined convolutional neural network, Jianfei YU and Jing JIANG Conference Proceeding Article

PDF

Processing Incomplete k Nearest Neighbor Search, Xiaoye MIAO, Yunjun GAO, Gang CHEN, Baihua ZHENG, and Huiyong CUI Journal Article

PDF

Semi-automated tool for providing effective feedback on programming assignments, Min Yan BEH, Swapna GOTTIPATI, David LO, and Venky SHANKARARAMAN Conference Proceeding Article

PDF

Server-aided public key encryption with keyword search, Rongman CHEN, Yi MU, Guomin YANG, Fuchun GUO, Xinyi HUANG, Xiaofen WANG, and Yongjun WANG Journal Article

PDF

Traffic Simulation Model for Port Planning and Congestion Prevention, Baoxiang LI, Kar Way TAN, and Trong Khiem TRAN Conference Proceeding Article

PDF

‘TweetBoard’ – a case study of developing a micro-blogging platform for higher education, Shao Cheh Joyce HSU; GAN, Benjamin; Jin LEE; Shu Hui Sheryl LIM; Xie Yan Jeremy LIM; Thomas MENKHOFF; Si Xian Sherman TAN; Charles Jason WOODARD; and Qiu Cheng YAP Journal Article

PDF

Unsupervised feature selection for outlier detection by modelling hierarchical value-feature couplings, Guansong PANG, Longbing CAO, Ling CHEN, and Huan LIU Conference Proceeding Article

PDF

Validating social media data for automatic persona generation, Jisun AN, Haewoon KWAK, and Bernard J JANSEN Conference Proceeding Article

When seeing is not believing: Defeating MFF-based attacks by liveness detection for face authentication on mobile platform, Yan LI, Qiang YAN, Yingjiu LI, and Robert H. DENG Book Chapter

PDF

ZERO++: Harnessing the power of zero appearances to detect anomalies in large-scale data sets, Guansong PANG, Kai Ming TING, David ALBRECHT, and Huidong JIN Journal Article

Exploratory studies on fundraising practices based on Singapore’s institutions of a public character in the health, social and welfare sectors, J L SIM, U MENON, A L C LOH, and Siu Loon HOE Report

Mitigating large errors in WiFi-based indoor localization for smartphones, Chenshu WU, Zheng YANG, Zimu ZHOU, Yunhao LIU, and Mingyan LIU Journal Article

Help me help you: Shared reflection for personal data, Lisa GRAHAM, Anthony TANG, and Carman NEUSTAEDTER Conference Proceeding Article

Information security practice and experience, Feng BAO; Liqun CHEN; DENG, Robert H.; and Guojun WANG Edited Conference Proceeding

Analysis of education and job trends in data science, V. LAI, Kyong Jin SHIM, and M. PRITHIVIRAJAN Conference Proceeding Article

Analysis of student performance and student participation in online discussions, Kyong Jin SHIM, V. LAI, and M. PRITHIVIRAJAN Conference Proceeding Article

PDF

Automated verification of timed security protocols with clock drift, Li LI and Jun SUN Conference Proceeding Article

PDF

Towards concolic testing for hybrid systems, Pingfan KONG, Yi LI, Xiaohong CHEN, Jun SUN, Meng SUN, and Jingyi WANG Conference Proceeding Article

PDF

Towards learning and verifying invariants of cyber-physical systems by code mutation, Yuqi CHEN, Christopher M. POSKITT, and Jun SUN Conference Proceeding Article

PDF

Towards learning and verifying invariants of cyber-physical systems by code mutation, Yuqi CHEN, Christopher M. POSKITT, and Jun SUN Conference Proceeding Article

PDF

Rapid deployment indoor localization without prior human participation, Han XU, Zimu ZHOU, and Longfei SHANGGUAN Conference Proceeding Article

PDF

Improving quality of use case documents through learning and user interaction, Shuang LIU, Jun SUN, Hao XIAO, Bimlesh WADHWA, Jin Song DONG, and Xinyu WANG Conference Proceeding Article

PDF

Towards using concurrent Java API correctly, Shuang LIU, Guangdong BAI, Jun SUN, and Jin Song DONG Conference Proceeding Article

PDF

Data exfiltration detection and prevention: Virtually distributed POMDPs for practically safer networks, Sara Marie MC CARTHY, Arunesh SINHA, Milind TAMBE, and Pratyusa MANADHATA Conference Proceeding Article

PDF

Achieving IND-CCA security for functional encryption for inner products, Shiwei ZHANG, Yi MU, and Guomin YANG Conference Proceeding Article

PDF

A decomposition method for estimating recursive logit based route choice models, Tien MAI, Fabian BASTIN, and Emma FREJINGER Journal Article

PDF

A method of integrating correlation structures for a generalized recursive route choice model, Tien MAI Journal Article

PDF

An efficient and expressive ciphertext-policy attribute-based-encryption scheme with partially hidden access structures, Hui CUI; DENG, Robert H.; Guowei WU; and Junzuo LAI Conference Proceeding Article

PDF

An efficient privacy-preserving outsourced calculation toolkit with multiple keys, Ximeng LIU, Robert H. DENG, Kim-Kwang Raymond CHOO, and Jian WENG Journal Article

PDF

A novel covert channel detection method in cloud based on XSRM and improved event association algorithm, Lina WANG, Weijie LIU, Neeraj KUMAR, Debiao HE, Cheng TAN, and Debin GAO Journal Article

PDF

A provably secure aggregate signature scheme for healthcare wireless sensor networks, Limin SHEN, Jianfeng MA, Ximeng LIU, and Meixia MIAO Journal Article

PDF

Aspect-based helpfulness prediction for online product reviews, Yinfei YANG, Cen CHEN, and Forrest Sheng BAO Conference Proceeding Article

PDF

A study on a feasible no-root approach on Android, Yao CHENG; Yingjiu LI; DENG, Robert H.; Lingyun YING; and Wei HE Journal Article

PDF

A survey on wireless indoor localization from the device perspective, Jiang XIAO, Zimu ZHOU, Youwen YI, and Lionel M. NI Journal Article

Blind late fusion in multimedia event retrieval, Maaike H. T. DE BOER, Klamer SCHUTTE, Hao ZHANG, Yi-Jie LU, Chong-wah NGO, and Wessel KRAAIJ Journal Article

PDF

Content sampling, household informedness, and the consumption of digital information goods, Ai Phuong HOANG and Robert J. KAUFFMAN Journal Article

PDF

Cost sensitive online multiple kernel classification, Doyen SAHOO, Peilin ZHAO, and Steven C. H. HOI Conference Proceeding Article

PDF

Designing and evaluating business process models: An experimental approach, Yuecheng Martin YU, Alexander PELAEZ, and Karl R. LANG Journal Article

PDF

Designing minimal effective normative systems with the help of lightweight formal methods, Jianye HAO, Eunsuk KANG, Jun SUN, and Daniel JACKSON Conference Proceeding Article

PDF

Editorial: Trust management for multimedia big data, Zheng YAN; Jun LIU; DENG, Robert H.; and Francisco HERRERA Editorial

PDF

Efficient Tag Path Authentication Protocol with Less Tag Memory, Hongbing WANG, Yingjiu LI, Zongyang ZHANG, and Yunlei ZHAO Conference Proceeding Article

Escrow free attribute-based signature with self-revealability, Hui CUI; Guilin WANG; DENG, Robert H.; and Baodong QIN Journal Article

PDF

Finding causality and responsibility for probabilistic reverse skyline query non-answers, Yunjun GAO, Qing LIU, Gang CHENG, Linlin ZHOU, and Baihua ZHENG Journal Article

PDF

Grab Taxi: Navigating new frontiers, Mei LIN and Christopher DULA Magazine Article

PDF

Hierarchical visualization of video search results for topic-based browsing, Yu-Gang JIANG, Jiajun WANG, Qiang WANG, Wei LIU, and Chong-wah NGO Journal Article

PDF

How to break an API: Cost negotiation and community values in three software ecosystems, Christopher Bogart, Christian K\303\244stner, James Herbsleb, and FERDIAN THUNG Conference Proceeding Article

PDF

Landmark reranking for smart travel guide systems by combining and analyzing diverse media, Junge SHEN, Jialie SHEN, Tao MEI, and Xinbo GAO Journal Article

PDF

Learning sentence embeddings with auxiliary tasks for cross-domain sentiment classification, Jianfei YU and Jing JIANG Conference Proceeding Article

PDF

m(2)-ABKS: Attribute-based multi-keyword search over encrypted personal health records in multi-owner setting, Yinbin MIAO, Jianfeng MA, Ximeng LIU, Fushan WEI, Zhiquan LIU, and Xu An WANG Journal Article

PDF

Message from the chairs, Andrew BEGEL, Fabio CALEFATO, and Christoph TREUDE Conference Proceeding Article

PDF

One-round attribute-based key exchange in the multi-party setting, Yangguang TIAN, Guomin YANG, Yi MU, Kaitai LIANG, and Yong YU Conference Proceeding Article

PDF

On profiling bots in social media, Richard J. OENTARYO, Arinto MURDOPO, Philips K. PRASETYO, and Ee Peng LIM Conference Proceeding Article

PDF

On the security of two identity-based conditional proxy re-encryption schemes, Kai HE, Jian WENG, Robert H. DENG, and Joseph K. LIU Journal Article

PDF

Ownership-hidden group-oriented proofs of storage from pre-homomorphic signatures, Yujue WANG, Qianhong WU, Bo QIN, Xiaofeng CHEN, Xinyi HUANG, and Jungang LOU Journal Article

PDF

Partitioning uncertain workloads, Freddy CHUA and Bernardo A. HUBERMAN Journal Article

PDF

Privacy-preserving outsourced calculation on floating point numbers, Ximeng LIU, Robert H. DENG, Wenxiu DING, and Rongxing LU Journal Article

PDF

Proteus: Computing disjunctive loop summary via path dependency analysis, Xiaofei XIE, Bihuan CHEN, Yang LIU, Wei LE, and Xiaohong LI Conference Proceeding Article

PDF

Reducing adaptation latency for multi-concept visual perception in outdoor environments, Maggie WIGNESS, John G. ROGERS, Luis Ernesto NAVARRO-SERMENT, Arne SUPPE, and Bruce A. DRAPER Conference Proceeding Article

PDF

Scaling BDD-based timed verification with simulation reduction, Truong Khanh NGUYEN, Tian Huat TAN, Jun SUN, Jiaying LI, Yang LIU, Manman CHEN, and Jin Song DONG Conference Proceeding Article

PDF

Service adaptation with probabilistic partial models, Manman CHEN, Tian Huat TAN, Jun SUN, Jingyi WANG, Yang LIU, Jing SUN, and Jin Song DONG Conference Proceeding Article

PDF

Spiteful, one-off, and kind: Predicting customer feedback behavior on Twitter, Agus SULISTYA, Abhishek SHARMA, and David LO Conference Proceeding Article

PDF

Static loop analysis and Its applications, Xiaofei XIE Conference Proceeding Article

PDF

Summarization of egocentric videos: A comprehensive survey, Ana GARCIA DEL MOLINO, Cheston TAN, Joo-Hwee LIM, and Ah-hwee TAN Journal Article

PDF

VIREO @ TRECVID 2016: Multimedia event detection, ad-hoc video search, video-to-text description, Hao ZHANG, Yi-Jie LU, and Chong-wah NGO Conference Proceeding Article

PDF

VIREO@TRECVID 2016: Multimedia event detection, ad-hoc video search, video to text description, Hao ZHANG, Lei PANG, Yi-Jie LU, and Chong-wah NGO Conference Paper

PDF

What permissions should this Android app request?, Lingfeng BAO, David LO, Xin XIA, and Shanping LI Conference Proceeding Article

ORPLocator: Identifying read points of configuration options via static analysis, Zhen DONG, Artur ANDRZEJAK, David LO, and Diego COSTA Conference Proceeding Article

Security and privacy in communication networks: 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, Proceedings, Robert H. DENG, Jian WENG, Kui REN, and Vinod YEGNESWARAN Edited Conference Proceeding

PDF

Achieving economic and environmental sustainabilities in urban consolidation center with bicriteria auction, Stephanus Daniel HANDOKO, Hoong Chuin LAU, and Shih-Fen CHENG Journal Article

PDF

AmaLgam+: Composing rich information sources for accurate bug localization, Shaowei WANG and David LO Journal Article

Link

An ECRA 15th anniversary virtual special issue on ‘Payments, cards and services in the Fintech revolution’, Robert John KAUFFMAN, Dan MA, and Byungjoon YOO Editorial

Link

An ECRA 15th anniversary virtual special issue on ‘Social Networks and Social Commerce’, Robert J. KAUFFMAN, Bin WANG, and Lina ZHOU Editorial

Link

An ECRA 15th anniversary virtual special issue on ‘Technological and Machine Approaches in E-commerce’, Robert J. KAUFFMAN, Chris YANG, and Jie ZHANG Editorial

Link

An ECRA 15th Anniversary Virtual Special Issue on "The Behavioral Dimensions of E-commerce", Robert J. KAUFFMAN, Hsiangchu LAI, and Yinping YANG Editorial

PDF

A novel CSI pre-processing scheme for device-free localization indoors, Ju WANG, Lichao ZHANG, Xuan WANG, Jie XIONG, Xiaojiang CHEN, and Dingyi FANG Conference Proceeding Article

PDF

ARISE-PIE: A People Information Integration Engine over the Web, Vincent W. ZHENG, Tao HOANG, Penghe CHEN, Yuan FANG, and Xiaoyan YANG Conference Proceeding Article

PDF

Attractiveness versus competition: Towards an unified model for user visitation, Thanh-Nam DOAN and Ee-Peng LIM Conference Proceeding Article

PDF

Attribute-based encryption with granular revocation, Hui CUI; DENG, Robert H.; Xuhua DING; and Yingjiu LI Conference Proceeding Article

PDF

"Automated debugging considered harmful" considered harmful: A user study revisiting the usefulness of spectra-based fault localization techniques with professionals using real bugs from large systems, Xin XIA, Lingfeng BAO, David LO, and Shanping LI Conference Proceeding Article

PDF

Behavior analysis in social networks: Challenges, technologies, and trends, Meng WANG, Ee-peng LIM, Lei LI, and Mehmet ORGUN Editorial

PDF

Bilevel model-based discriminative dictionary learning for recognition, Pan ZHOU, Chao ZHANG, and LIN Zhouchen Journal Article

PDF

Combining word embedding with information retrieval to recommend similar bug reports, Xinli YANG, David LO, Xin XIA, Lingfeng BAO, and Jianling SUN Conference Proceeding Article

PDF

Deep-based ingredient recognition for cooking recipe retrieval, Jingjing CHEN and Chong-wah NGO Conference Proceeding Article

PDF

Determining quality- and energy-aware multiple contexts in pervasive computing environments, Nirmalya ROY, Archan MISRA, Sajal K. DAS, and Christine JULIEN Journal Article

PDF

Dissecting developer policy violating apps: Characterization and detection, Su Mon KYWE, Yingjiu LI, Jason HONG, and Yao CHENG Conference Proceeding Article

PDF

Empirical study on synthesis engines for semantics-based program repair, Le Dinh Xuan BACH, David LO, and Claire Le GOUES Conference Proceeding Article

PDF

Enhancing automated program repair with deductive verification, Xuan-Bach D. LE, Quang Loc LE, David LO, and Claire Le GOUES Conference Proceeding Article

PDF

HYDRA: Massively compositional model for cross-project defect prediction, Xin XIA, David LO, Sinno Jialin PAN, Nachiappan NAGAPPAN, and Xinyu WANG Journal Article

PDF

Inferring links between concerns and methods with multi-abstraction vector space model, Yun ZHANG, David LO, Xin XIA, Tien-Duy B. LE, Giuseppe SCANNIELLO, and Jianling SUN Conference Proceeding Article

PDF

Integrated software fingerprinting via neural-network-based control flow obfuscation, Haoyu MA, Ruiqi LI, Xiaoxu YU, Chunfu JIA, and Debin GAO Journal Article