The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2016

PDF

Mining revision histories to detect cross-language clones without intermediates, Lingxiao JIANG, Zhiming PENG, Lingxiao JIANG, Hao ZHONG, Haibo YU, and Jianjun ZHAO Conference Proceeding Article

PDF

Modeling sequential preferences with dynamic user and context factors, Duc Trong LE, Yuan FANG, and Hady W. LAUW Conference Proceeding Article

PDF

On the feasibility of detecting cross-platform code clones via identifier similarity, Xiao CHENG, Lingxiao JIANG, Hao ZHONG, Haibo YU, and Jianjun ZHAO Conference Proceeding Article

PDF

PADA: Power-aware development assistant for mobile sensing applications, Chulhong MIN, Seungchul LEE, Changhun LEE, Youngki LEE, Seungwoo KANG, Seungpyo CHOI, Wonjung KIM, and Junehwa SONG Conference Proceeding Article

PDF

Predicting crashing releases of mobile applications, Xin XIA, Emad SHIHAB, Yasutaka KAMEI, David LO, and Xinyu WANG Conference Proceeding Article

PDF

Probabilistic models for contextual agreement in preferences, Loc DO and Hady W. LAUW Journal Article

PDF

Provably secure robust optimistic fair exchange of distributed signatures, Yujue WANG, Qianhong WU, Duncan S. WONG, Bo QIN, Jian MAO, and Yong DING Journal Article

PDF

Ra2: Predicting simulation execution time for cloud-based design space explorations, Nguyen Binh Duong TA, Wentong CAI, Zengxiang LI, and Suiping ZHOU Conference Proceeding Article

PDF

Representation learning for homophilic preferences, Trong T. NGUYEN and Hady W. LAUW Conference Proceeding Article

PDF

Server-aided revocable attribute-based encryption, Hui CUI; DENG, Robert H.; Yingjiu LI; and Baodong QIN Conference Proceeding Article

PDF

Soft confidence-weighted learning, Jialei WANG; Peilin ZHAO; and HOI, Steven C. H. Journal Article

PDF

TASKer: Behavioral insights via campus-based experimental mobile crowd-sourcing, Thivya KANDAPPU, Nikita JAIMAN, Randy Tandriansyah DARATAN, Archan MISRA, Shih-Fen CHENG, Cen CHEN, Hoong Chuin LAU, Deepthi CHANDER, and Koustuv DASGUPTA Conference Proceeding Article

PDF

TASKer: behavioral insights via campus-based experimental mobile crowd-sourcing, Thivya KANDAPPU, JAIMAN, TANDRIANSYAH, Archan MISRA, Shih-Fen CHENG, CHEN, Hoong Chuin LAU, Deepthi CHANDER, and Koustuv DASGUPTA Conference Proceeding Article

PDF

Towards autonomous behavior learning of non-player characters in games, Shu FENG and Ah-hwee TAN Journal Article

PDF

Trustworthy authentication on scalable surveillance video with background model support, Zhuo WEI, Zheng YAN, Yongdong WU, and Robert H. DENG Journal Article

PDF

What security questions do developers ask? A large-scale study of stack overflow posts, Xinli YANG, David LO, Xin XIA, Zhi-Yuan WAN, and Jian-Ling SUN Journal Article

PDF

When a friend online is more than a friend in life: Intimate relationship prediction in microblogs, Yunshi LAN, Mengqi ZHANG, Feida ZHU, Jing JIANG, and Ee-Peng LIM Conference Proceeding Article

Collaborative opportunities: IMIA working groups and personalized medicine & digital health literacy, Tze-Yun LEONG Conference Paper

Towards automatic persona generation using social media, Jisun AN, Hoyoun CHO, Haewoon KWAK, Mohammed Ziyaad HASSEN, and Bernard J JANSEN Conference Proceeding Article

PDF

Topic extraction from microblog posts using conversation structures, Jing LI, Ming LIAO, Wei GAO, Yulan HE, and Kam-Fai WONG Conference Proceeding Article

PDF

A fast algorithm for personalized travel planning recommendation, Aldy GUNAWAN, Hoong Chuin LAU, and Kun LU Conference Proceeding Article

PDF

A multilingual semi-supervised approach in deriving Singlish sentic patterns for polarity detection, Siaw Ling LO, Erik CAMBRIA, Raymond CHIONG, and David CORNFORTH Journal Article

PDF

A novel digital image classification algorithm via low-rank sparse bag-of-features model, Xiu-Ming ZOU, Huai-Jiang SUN, Sai YANG, and Yan ZHU

PDF

API recommendation system for software development, FERDIAN THUNG Conference Proceeding Article

Code comment quality analysis and improvement recommendation: An automated approach, Xiaobing SUN, Qiang GENG, David LO, Yucong DUAN, Xiangyue LIU, and LI Bin Journal Article

PDF

CoMon+: A Cooperative Context Monitoring System for Multi-Device Personal Sensing Environments, Youngki LEE, Seungwoo KANG, Chulhong MIN, Younghyun JU, Inseok HWANG, and Junehwa SONG Journal Article

PDF

Design and evaluation of advanced collusion attacks on collaborative intrusion detection networks in practice, Weizhi MENG, Xiapu LUO, Wenjuan LI, and Yan LI Conference Proceeding Article

PDF

Detecting communities using coordination games: A short paper, Radhika ARAVA and Pradeep VARAKANTHAM Conference Proceeding Article

PDF

Enhancing local search with adaptive operator ordering and its application to the time dependent orienteering problem, Aldy GUNAWAN, Hoong Chuin LAU, and Kun LU Conference Proceeding Article

PDF

Extending the network: The influence of offline friendship on Twitter network, Young Soo KIM, Kyungsub Stephen CHOI, and FELICIA NATALI Conference Proceeding Article

PDF

Fine-grained appliance usage and energy monitoring through mobile and power-line sensing, Nirmalya ROY, Nilavra PATHAK, and Archan MISRA Journal Article

PDF

Intermediaries vs Peer-to-Peer: A Study of Lenders’ Incentive on a Donation-based Crowdfunding Platform, Ling GE, Zhiling GUO, and Xuechen LUO Conference Proceeding Article

PDF

New developments in metaheuristics and their applications: Selected extended contributions from the 10th Metaheuristics International Conference (MIC 2013), Hoong Chuin LAU, Günther R. Raidl, and Pascal Van Hentenryck Editorial

PDF

Probabilistic Robust Route Recovery with Spatio-Temporal Dynamics, Hao WU, Jiangyun MAO, Weiwei SUN, Baihua ZHENG, Hanyuan ZHANG, Ziyang CHEN, and Wei WANG Conference Proceeding Article

PDF

Revocable and decentralized attribute-based encryption, Hui CUI and DENG, Robert H. Journal Article

PDF

SafeGPU: Contract- and library-based GPGPU for object-oriented languages, Alexey KOLESNICHENKO, Christopher M. POSKITT, and Sebastian NANZ Journal Article

PDF

Social sentiment and stock trading via mobile phones, Kwansoo KIM, Sang Yong LEE, and Robert John KAUFFMAN Conference Proceeding Article

PDF

TafLoc: Time-adaptive and fine-grained device-free localization with little cost, Liqiong CHANG, Jie XIONG, Xiaojiang CHEN, Ju WANG, Junhao HU, and Wei WANG Conference Proceeding Article

TopicSketch: Real-time Bursty Topic Detection from Twitter, Wei XIE, Feida ZHU, Jing JIANG, Ee-Peng LIM, and Ke WANG Journal Article

PDF

Unsupervised multi-graph cross-modal hashing for large-scale multimedia retrieval, Liang XIE, Lei ZHU, and Guoqi CHEN Journal Article

PDF

User Identity Linkage by Latent User Space Modelling, Xin MU, Feida ZHU, Ee-Peng LIM, Jing XIAO, Jianzong WANG, and Zhi-Hua ZHOU Conference Proceeding Article

Landscape synergy in evolutionary multitasking, Abhishek GUPTA, Yew Soon ONG, B. DA, Handoko Stephanus Daniel, and Stephanus D. HANDOKO Conference Proceeding Article

The retransmission of rumor-related tweets: Characteristics of source and message, Alton Y. K. CHUA, Cheng-Ying TEE, A. PANG, and Ee-peng LIM Conference Proceeding Article

The retransmission of rumor-related tweets: Characteristics of source and message, CHUA, Cheng-Ying TEE, A. PANG, and Ee-peng LIM Conference Proceeding Article

Targeted gamification to encourage and measure intrinsically motivated game-based learning, Chris BOESCH Conference Proceeding Article

PDF

A Feasible No-Root Approach on Android, Yao CHENG, Yingjiu LI, and Robert H. DENG Conference Proceeding Article

PDF

A Learning-to-Rank Based Fault Localization Approach using Likely Invariants, Tien-Duy B. LE, David LO, Claire LE GOUES, and Lars GRUNSKE Conference Proceeding Article

PDF

An adaptability-driven model and tool for analysis of service profitability, Eng Lieh OUH and Jarzabek STAN Conference Proceeding Article

PDF

A survey on future internet security architectures, Wenxiu DING, Zheng YAN, and Robert H. DENG Journal Article

PDF

Automatic hookworm detection in wireless capsule endoscopy images, Xiao WU, Honghan CHEN, Tao GAN, Junzhou CHEN, Chong-wah NGO, and Qiang PENG Journal Article

PDF

Build emotion lexicon from the mood of crowd via topic-assisted joint non-negative matrix factorization, Kaisong SONG, Wei GAO, Ling CHEN, Shi FENG, Daling WANG, and Chengqi ZHANG Conference Proceeding Article

PDF

Can Instagram posts help characterize urban micro-events?, Kasthuri JAYARAJAH and Archan MISRA Conference Proceeding Article

PDF

Cross-Modal Self-Taught Hashing for large-scale image retrieval, Liang XIE, Lei ZHU, Peng PAN, and Yansheng LU Journal Article

PDF

Detecting rumors from microblogs with recurrent neural networks, Jing MA, Wei GAO, Prasenjit MITRA, Sejeong KWON, Bernard J. JANSEN, Kam-Fai WONG, and Meeyoung CHA Conference Proceeding Article

PDF

Edit distance based encryption and its application, Tran Viet Xuan PHUONG, Guomin YANG, Willy SUSILO, and Kaitai LIANG Conference Proceeding Article

PDF

Fine-grained detection of programming students’ frustration using keystrokes, mouse clicks and interaction logs, Hua Leong FWA Journal Article

PDF

From offline to online: How health insurance policies drive the demand for online healthcare service?, Yue YU, Qiu-Yan MEI, and QIU-HONG WANG Conference Proceeding Article

PDF

Generic anonymous identity-based broadcast encryption with chosen-ciphertext security, Kai HE; Jian WENG; Man Ho AU; Yijun MAO; and DENG, Robert H. Conference Proceeding Article

PDF

Learning compact visual representation with canonical views for robust mobile landmark search, Lei ZHU, Jialie SHEN, Xiaobai LIU, Liang XIE, and Liqiang NIE Conference Proceeding Article

PDF

Linear encryption with keyword search, Shiwei ZHANG, Guomin YANG, and Yi MU Conference Proceeding Article

PDF

On effective personalized music retrieval by exploring online user behaviors, Zhiyong CHENG, Jialie SHEN, and Steven C. H. HOI Conference Proceeding Article

PDF

On effective personalized music retrieval via exploring online user behaviors, Zhiyong CHENG, Jialie SHEN, and Steven C. H. HOI Conference Proceeding Article

PDF

One-round strong oblivious signature-based envelope, Rongmao CHEN, Yi MU, Willy SUSILO, Guomin YANG, Fuchun GUO, and Mingwu ZHANG Conference Proceeding Article

PDF

On very large scale test collection for landmark image search benchmarking, Zhiyong CHENG and Jialie SHEN Journal Article

PDF

Ordinal text quantification, Giovanni Da San MARTINO, Wei GAO, and Fabrizio SEBASTIANI Conference Proceeding Article

PDF

Outlier detection in complex categorical data by modeling the feature value couplings, Guansong PANG, Longbing CAO, and Ling CHEN Conference Proceeding Article

PDF

Outlier-robust tensor PCA, Pan ZHOU and Jiashi FENG Conference Proceeding Article

PDF

Passively testing routing protocols in wireless sensor networks, Xiaoping CHE, Stephane MAAG, Hwee-Xian TAN, and Hwee-Pink TAN Conference Proceeding Article

PDF

Patient engagement in the medical facility waiting room using gamified healthcare information delivery, Raheel HASSAN, Nathan W. TWYMAN, Fiona F. NAH, and Keng SIAU Conference Proceeding Article

PDF

Practitioners' expectations on automated fault localization, Pavneet Singh KOCHHAR, Xin XIA, David LO, and Shanping LI Conference Proceeding Article

PDF

Proxy signature with revocation, Shengmin XU, Guomin YANG, Yi MU, and Shu MA Conference Proceeding Article

PDF

Real-time salient object detection with a minimum spanning tree, Wei-Chih TU, Shengfeng HE, Qingxiong YANG, and Shao-Yi CHIEN Conference Proceeding Article

PDF

Response to SBP-BRiMS Data Challenge: Agent-based approach to human migration movement, LIN JUNJIE, LARRY and Kathleen M. CARLEY Conference Paper

PDF

Robust median reversion strategy for online portfolio selection, Dingjiang HUANG; Junlong ZHOU; Bin LI; HOI, Steven C. H.; and Shuigeng ZHOU Journal Article

PDF

Robust Repositioning to Counter Unpredictable Demand in Bike Sharing Systems, Supriyo GHOSH, Michael TRICK, and Pradeep VARAKANTHAM Conference Proceeding Article

PDF

Satisfiability modulo heap-based programs, Quang Loc LE, Jun SUN, and Wei-Ngan CHIN Conference Proceeding Article

PDF

Scalable greedy algorithms for task/resource constrained multi-agent stochastic planning, Pritee AGRAWAL, Pradeep VARAKANTHAM, and William YEOH Conference Proceeding Article

PDF

Self-regulated incremental clustering with focused preferences, Di WANG and Ah-hwee TAN Conference Proceeding Article

PDF

Sequential decision making for improving efficiency in urban environments, Pradeep VARAKANTHAM Conference Proceeding Article

PDF

STPP: Spatial-Temporal Phase Profiling based method for relative RFID tag localization, Longfei SHANGGUAN, Zheng YANG, Alex X. LIU, Zimu ZHOU, and Yunhao LIU Journal Article

PDF

The Effects of Multiple Query Evidences on Social Image Retrieval, Zhiyong CHENG, Jialie SHEN, and Haiyan MIAO Journal Article

PDF

The impact of NASD Rule 2711 and NYSE Rule 472 on analyst behavior: The strategic timing of recommendations issued on weekends, Yi DONG and Nan HU Journal Article

PDF

Three strategies to success: Learning adversary models in security games, Nika HAGHTALAB, Fei FANG, Thanh Hong NGUYEN, Arunesh SINHA, Ariel D. PROCACCIA, and Milind TAMBE Conference Proceeding Article

Understanding gender differences in media perceptions of hedonic systems: A comparison of 2D versus 3D media, Fiona Fui-hoon NAH and Brenda ESCHENBRENNER Journal Article

PDF

Where is the goldmine? Finding promising business locations through Facebook data analytics, Jovian LIN, Richard OENTARYO, Ee-peng LIM, Casey VU, Adrian VU, and Agus Kwee Conference Proceeding Article

PDF

Which information sources are more effective and reliable in video search, CHENG ZHIYONG, Xuanchong LI, Jialie SHEN, and Alexander G. Hauptmann Conference Proceeding Article

PDF

Word clouds with latent variable analysis for visual comparison of documents, Tuan M. V. LE and Hady W. LAUW Conference Proceeding Article

It takes two to tango: Deleted Stack Overflow question prediction with text and meta features, Xin XIA, David LO, Denzil CORREA, Ashish SUREKA, and Emad SHIHAB Conference Proceeding Article

PDF

An interference-free programming model for network objects, Mischael SCHILL, Christopher M. POSKITT, and Bertrand MEYER Conference Proceeding Article

Elevating communication, collaboration, and shared experiences in mobile video through drones, Brennan JONES, Kody DILLMAN, Richard TANG, Anthony TANG, Ehud SHARLIN, Lora OEHLBERG, Carman NEUSTAEDTER, and Scott BATEMAN Conference Proceeding Article

PDF

Adaptable key-policy attribute-based encryption with time interval, Siqi MA; Junzuo LAI; DENG, Robert H.; and Xuhua DING Journal Article

PDF

An Economic Analysis of Consumer Learning for Online Entertainment Shopping, Jin LI, Zhiling GUO, and Geoffrey K.F. TSO Conference Proceeding Article

PDF

An Experimental Investigation of Product Competition and Marketing in Social Networks, Cen CHEN, Zhiling GUO, Shih-Fen CHENG, and Hoong Chuin LAU Conference Proceeding Article

PDF

Automated identification of high impact bug reports leveraging imbalanced learning strategies, Xinli YANG, David LO, Qiao HUANG, Xin XIA, and Jianling SUN Conference Proceeding Article

PDF

CACE: Exploiting behavioral interactions for improved activity recognition in multi-inhabitant smart homes, Mohammad Arif Ul Alam, Nirmalya ROY, Archan MISRA, and Joseph TAYLOR Conference Proceeding Article

PDF

CDRep: Automatic repair of cryptographic-misuses in Android applications, Siqi MA, David LO, Teng LI, and Robert H. DENG Conference Proceeding Article

PDF

Collective rumor correction on the death hoax of a political figure in social media, Alton Y. K. CHUA, Sin-Mei CHEAH, Dion Hoe-Lian GOH, and Ee-peng LIM Conference Proceeding Article

PDF

Condensing class diagrams with minimal manual labeling cost, Xinli YANG, David LO, Xin XIA, and Jianling SUN Conference Proceeding Article

PDF

Deduplication on encrypted big data in cloud, Zheng YAN; Wenxiu DING; Xixun YU; Haiqi ZHU; and DENG, Robert H. Journal Article

PDF

DeepSense: A GPU-based deep convolutional neural network framework on commodity mobile devices, HUYNH NGUYEN LOC, Rajesh Krishna BALAN, and Youngki LEE Conference Proceeding Article