Submissions from 2016
An efficient and expressive ciphertext-policy attribute-based-encryption scheme with partially hidden access structures, Hui CUI; DENG, Robert H.; Guowei WU; and Junzuo LAI Conference Proceeding Article
An efficient privacy-preserving outsourced calculation toolkit with multiple keys, Ximeng LIU, Robert H. DENG, Kim-Kwang Raymond CHOO, and Jian WENG Journal Article
A novel covert channel detection method in cloud based on XSRM and improved event association algorithm, Lina WANG, Weijie LIU, Neeraj KUMAR, Debiao HE, Cheng TAN, and Debin GAO Journal Article
A provably secure aggregate signature scheme for healthcare wireless sensor networks, Limin SHEN, Jianfeng MA, Ximeng LIU, and Meixia MIAO Journal Article
Aspect-based helpfulness prediction for online product reviews, Yinfei YANG, Cen CHEN, and Forrest Sheng BAO Conference Proceeding Article
A study on a feasible no-root approach on Android, Yao CHENG; Yingjiu LI; DENG, Robert H.; Lingyun YING; and Wei HE Journal Article
A survey on wireless indoor localization from the device perspective, Jiang XIAO, Zimu ZHOU, Youwen YI, and Lionel M. NI Journal Article
Blind late fusion in multimedia event retrieval, Maaike H. T. DE BOER, Klamer SCHUTTE, Hao ZHANG, Yi-Jie LU, Chong-wah NGO, and Wessel KRAAIJ Journal Article
Content sampling, household informedness, and the consumption of digital information goods, Ai Phuong HOANG and Robert J. KAUFFMAN Journal Article
Cost sensitive online multiple kernel classification, Doyen SAHOO, Peilin ZHAO, and Steven C. H. HOI Conference Proceeding Article
Designing and evaluating business process models: An experimental approach, Yuecheng Martin YU, Alexander PELAEZ, and Karl R. LANG Journal Article
Designing minimal effective normative systems with the help of lightweight formal methods, Jianye HAO, Eunsuk KANG, Jun SUN, and Daniel JACKSON Conference Proceeding Article
Editorial: Trust management for multimedia big data, Zheng YAN; Jun LIU; DENG, Robert H.; and Francisco HERRERA Editorial
Efficient Tag Path Authentication Protocol with Less Tag Memory, Hongbing WANG, Yingjiu LI, Zongyang ZHANG, and Yunlei ZHAO Conference Proceeding Article
Escrow free attribute-based signature with self-revealability, Hui CUI; Guilin WANG; DENG, Robert H.; and Baodong QIN Journal Article
Finding causality and responsibility for probabilistic reverse skyline query non-answers, Yunjun GAO, Qing LIU, Gang CHENG, Linlin ZHOU, and Baihua ZHENG Journal Article
Grab Taxi: Navigating new frontiers, Mei LIN and Christopher DULA Magazine Article
Hierarchical visualization of video search results for topic-based browsing, Yu-Gang JIANG, Jiajun WANG, Qiang WANG, Wei LIU, and Chong-wah NGO Journal Article
How to break an API: Cost negotiation and community values in three software ecosystems, Christopher Bogart, Christian K\303\244stner, James Herbsleb, and FERDIAN THUNG Conference Proceeding Article
Landmark reranking for smart travel guide systems by combining and analyzing diverse media, Junge SHEN, Jialie SHEN, Tao MEI, and Xinbo GAO Journal Article
Learning sentence embeddings with auxiliary tasks for cross-domain sentiment classification, Jianfei YU and Jing JIANG Conference Proceeding Article
m(2)-ABKS: Attribute-based multi-keyword search over encrypted personal health records in multi-owner setting, Yinbin MIAO, Jianfeng MA, Ximeng LIU, Fushan WEI, Zhiquan LIU, and Xu An WANG Journal Article
Message from the chairs, Andrew BEGEL, Fabio CALEFATO, and Christoph TREUDE Conference Proceeding Article
One-round attribute-based key exchange in the multi-party setting, Yangguang TIAN, Guomin YANG, Yi MU, Kaitai LIANG, and Yong YU Conference Proceeding Article
On profiling bots in social media, Richard J. OENTARYO, Arinto MURDOPO, Philips K. PRASETYO, and Ee Peng LIM Conference Proceeding Article
On the security of two identity-based conditional proxy re-encryption schemes, Kai HE, Jian WENG, Robert H. DENG, and Joseph K. LIU Journal Article
Ownership-hidden group-oriented proofs of storage from pre-homomorphic signatures, Yujue WANG, Qianhong WU, Bo QIN, Xiaofeng CHEN, Xinyi HUANG, and Jungang LOU Journal Article
Partitioning uncertain workloads, Freddy CHUA and Bernardo A. HUBERMAN Journal Article
Privacy-preserving outsourced calculation on floating point numbers, Ximeng LIU, Robert H. DENG, Wenxiu DING, and Rongxing LU Journal Article
Proteus: Computing disjunctive loop summary via path dependency analysis, Xiaofei XIE, Bihuan CHEN, Yang LIU, Wei LE, and Xiaohong LI Conference Proceeding Article
Reducing adaptation latency for multi-concept visual perception in outdoor environments, Maggie WIGNESS, John G. ROGERS, Luis Ernesto NAVARRO-SERMENT, Arne SUPPE, and Bruce A. DRAPER Conference Proceeding Article
Scaling BDD-based timed verification with simulation reduction, Truong Khanh NGUYEN, Tian Huat TAN, Jun SUN, Jiaying LI, Yang LIU, Manman CHEN, and Jin Song DONG Conference Proceeding Article
Service adaptation with probabilistic partial models, Manman CHEN, Tian Huat TAN, Jun SUN, Jingyi WANG, Yang LIU, Jing SUN, and Jin Song DONG Conference Proceeding Article
Spiteful, one-off, and kind: Predicting customer feedback behavior on Twitter, Agus SULISTYA, Abhishek SHARMA, and David LO Conference Proceeding Article
Static loop analysis and Its applications, Xiaofei XIE Conference Proceeding Article
Summarization of egocentric videos: A comprehensive survey, Ana GARCIA DEL MOLINO, Cheston TAN, Joo-Hwee LIM, and Ah-hwee TAN Journal Article
VIREO @ TRECVID 2016: Multimedia event detection, ad-hoc video search, video-to-text description, Hao ZHANG, Yi-Jie LU, and Chong-wah NGO Conference Proceeding Article
VIREO@TRECVID 2016: Multimedia event detection, ad-hoc video search, video to text description, Hao ZHANG, Lei PANG, Yi-Jie LU, and Chong-wah NGO Conference Paper
What permissions should this Android app request?, Lingfeng BAO, David LO, Xin XIA, and Shanping LI Conference Proceeding Article
ORPLocator: Identifying read points of configuration options via static analysis, Zhen DONG, Artur ANDRZEJAK, David LO, and Diego COSTA Conference Proceeding Article
Security and privacy in communication networks: 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, Proceedings, Robert H. DENG, Jian WENG, Kui REN, and Vinod YEGNESWARAN Edited Conference Proceeding
Achieving economic and environmental sustainabilities in urban consolidation center with bicriteria auction, Stephanus Daniel HANDOKO, Hoong Chuin LAU, and Shih-Fen CHENG Journal Article
AmaLgam+: Composing rich information sources for accurate bug localization, Shaowei WANG and David LO Journal Article
An ECRA 15th anniversary virtual special issue on ‘Payments, cards and services in the Fintech revolution’, Robert John KAUFFMAN, Dan MA, and Byungjoon YOO Editorial
An ECRA 15th anniversary virtual special issue on ‘Social Networks and Social Commerce’, Robert J. KAUFFMAN, Bin WANG, and Lina ZHOU Editorial
An ECRA 15th anniversary virtual special issue on ‘Technological and Machine Approaches in E-commerce’, Robert J. KAUFFMAN, Chris YANG, and Jie ZHANG Editorial
An ECRA 15th Anniversary Virtual Special Issue on "The Behavioral Dimensions of E-commerce", Robert J. KAUFFMAN, Hsiangchu LAI, and Yinping YANG Editorial
A novel CSI pre-processing scheme for device-free localization indoors, Ju WANG, Lichao ZHANG, Xuan WANG, Jie XIONG, Xiaojiang CHEN, and Dingyi FANG Conference Proceeding Article
ARISE-PIE: A People Information Integration Engine over the Web, Vincent W. ZHENG, Tao HOANG, Penghe CHEN, Yuan FANG, and Xiaoyan YANG Conference Proceeding Article
Attractiveness versus competition: Towards an unified model for user visitation, Thanh-Nam DOAN and Ee-Peng LIM Conference Proceeding Article
Attribute-based encryption with granular revocation, Hui CUI; DENG, Robert H.; Xuhua DING; and Yingjiu LI Conference Proceeding Article
"Automated debugging considered harmful" considered harmful: A user study revisiting the usefulness of spectra-based fault localization techniques with professionals using real bugs from large systems, Xin XIA, Lingfeng BAO, David LO, and Shanping LI Conference Proceeding Article
Behavior analysis in social networks: Challenges, technologies, and trends, Meng WANG, Ee-peng LIM, Lei LI, and Mehmet ORGUN Editorial
Bilevel model-based discriminative dictionary learning for recognition, Pan ZHOU, Chao ZHANG, and LIN Zhouchen Journal Article
Combining word embedding with information retrieval to recommend similar bug reports, Xinli YANG, David LO, Xin XIA, Lingfeng BAO, and Jianling SUN Conference Proceeding Article
Deep-based ingredient recognition for cooking recipe retrieval, Jingjing CHEN and Chong-wah NGO Conference Proceeding Article
Determining quality- and energy-aware multiple contexts in pervasive computing environments, Nirmalya ROY, Archan MISRA, Sajal K. DAS, and Christine JULIEN Journal Article
Dissecting developer policy violating apps: Characterization and detection, Su Mon KYWE, Yingjiu LI, Jason HONG, and Yao CHENG Conference Proceeding Article
Empirical study on synthesis engines for semantics-based program repair, Le Dinh Xuan BACH, David LO, and Claire Le GOUES Conference Proceeding Article
Enhancing automated program repair with deductive verification, Xuan-Bach D. LE, Quang Loc LE, David LO, and Claire Le GOUES Conference Proceeding Article
HYDRA: Massively compositional model for cross-project defect prediction, Xin XIA, David LO, Sinno Jialin PAN, Nachiappan NAGAPPAN, and Xinyu WANG Journal Article
Inferring links between concerns and methods with multi-abstraction vector space model, Yun ZHANG, David LO, Xin XIA, Tien-Duy B. LE, Giuseppe SCANNIELLO, and Jianling SUN Conference Proceeding Article
Integrated software fingerprinting via neural-network-based control flow obfuscation, Haoyu MA, Ruiqi LI, Xiaoxu YU, Chunfu JIA, and Debin GAO Journal Article
LiFS: Low human-effort, device-free localization with fine-grained subcarrier information, Ju WANG, Hongbo JIANG, Jie XIONG, Kyle JAMIESON, Xiaojiang CHEN, Dingyi FANG, and Binbin XIE Conference Proceeding Article
Online adaptive passive-aggressive methods for non-negative matrix factorization and its applications, Chenghao LIU; HOI, Steven C. H.; Peilin ZHAO; Jianling SUN; and Ee-Peng LIM Conference Proceeding Article
Plackett-Luce Regression Mixture model for heterogeneous rankings, Maksim TKACHENKO and Hady W. LAUW Conference Proceeding Article
Recommending code changes for automatic backporting of Linux device drivers, Ferdian THUNG, Xuan Bach D. LE, and David LO Conference Proceeding Article
Repmatch: Robust feature matching and pose for reconstructing modern cities, Wen-yan LIN, Siying LIU, Minh N. DO, Ping TAN, and Jiangbo LU Conference Proceeding Article
SATT: Tailoring code metric thresholds for different software architectures, Maurício ANICHE, Christoph TREUDE, Andy ZAIDMAN, Arie VAN DEURSEN, and Marco Aurélio GEROSA Conference Proceeding Article
Technology-mediated synchronous virtual education: An empirical study, Xiaofeng CHEN and Keng SIAU Journal Article
Tracking virality and susceptibility in social media, Tuan Anh HOANG and Ee-Peng LIM Conference Proceeding Article
When machine meets society: Social impacts of information and information economics, Eric K. CLEMONS, Rajiv M. DEWAN, Robert John KAUFFMAN, and Thomas A. WEBER Editorial
Who is who in the mailing list? Comparing six disambiguation heuristics to identify multiple addresses of a participant, Igor Scaliante WIESE, José Teodoro DA SILVA, Igor STEINMACHER, Christoph TREUDE, and Marco Aurélio GEROSA Conference Proceeding Article
xD-track: Leveraging multi-dimensional information for passive wi-fi tracking, Yaxiong XIE, Jie XIONG, Mo LI, and Kyle JAMIESON Conference Proceeding Article
CrowdService: Serving the individuals through mobile crowdsourcing and service composition, Xin PENG, Jingxiao GU, Tian Huat TAN, Jun SUN, Yijun YU, Bashar NUSEIBEH, and Wenyun Zhao ZHAO Conference Proceeding Article
Get me to my GATE on time: Efficiently solving general-sum bayesian threat screening games, Aaron SCHLENKER, Matthew BROWN, Arunesh SINHA, Milind TAMBE, and Ruta MEHTA Conference Proceeding Article
A campus-scale mobile crowd-tasking platform, Nikita JAIMAN, Archan MISRA, Randy Tandriansyah DARATAN, and Thivya KANDAPPU Conference Proceeding Article
A campus-scale mobile crowd-tasking platform, Nikita JAIMAN, Archan MISRA, Randy Tandriansyah DARATAN, and Thivya KANDAPPU Conference Proceeding Article
An intelligent system for personalized conference event recommendation and scheduling, Aldy GUNAWAN, Hoong Chuin LAU, Pradeep VARAKANTHAM, and Wenjie WANG Conference Proceeding Article
A reinforcement learning framework for trajectory prediction under uncertainty and budget constraint, Truc Viet LE, Siyuan LIU, and Hoong Chuin LAU Conference Proceeding Article
ASE '16: Proceedings of the 31st ACM/IEEE International Conference on Automated Software Engineering: Singapore, September 3 -7, 2016, David LO, Sven Apel APEL, and Sarfraz KHURSHID Edited Conference Proceeding
Automated bug report field reassignment and refinement prediction, Xin XIA, David LO, Emad SHIHAB, and Xinyu WANG Journal Article
AutoQuery: Automatic Construction of Dependency Queries for Code Search, Shaowei WANG, David LO, and Lingxiao JIANG Journal Article
Control flow integrity enforcement with dynamic code optimization, Yan LIN, Xiaoxiao TANG, Debin GAO, and Jianming FU Conference Proceeding Article
Cross-cultural user perceptions of website design and security: Introduction to a commentary and response on Cyr (2013), Robert John KAUFFMAN Editorial
Detecting community pacemakers of burst topic in Twitter, Guozhong DONG, Wu YANG, Feida ZHU, and Wei WANG Conference Proceeding Article
Developers’ perceptions on object-oriented design and architectural roles, Maurício ANICHE, Marco Aurélio GEROSA, and Christoph TREUDE Conference Proceeding Article
Dynamic-MUSIC: Accurate device-free indoor localization, Xiang LI, Shengjie LI, Daqing ZHANG, Jie XIONG, Yasha WANG, and Hong MEI Conference Proceeding Article
Efficient community maintenance for dynamic social networks, Hongchao QIN, Ye YUAN, Feida ZHU, and Guoren WANG Conference Proceeding Article
Extracting Food Substitutes From Food Diary via Distributional Similarity, Palakorn ACHANANUPARP and Ingmar WEBER Conference Paper
Fast covariant VLAD for image search, Wan-Lei ZHAO, Chong-wah NGO, and Hanzi WANG Journal Article
High correlation of Middle East respiratory syndrome spread with Google search and Twitter trends in Korea, Soo-Yong SHIN, Dong-Woo SEO, Jisun AN, Haewoon KWAK, Sung-Han KIM, Jin GWACK, and Min-Woo JO Journal Article
How practitioners perceive the relevance of ESEM research, Jeffrey C. CARVER, Oscar DIESTE, Nicholas A. KRAFT, David LO, and Thomas ZIMMERMANN Conference Proceeding Article
Human-centred design for silver assistants, Zhiwei ZHENG, Di WANG, Ailiya BORJIGIN, Chunyan MIAO, Ah-hwee TAN, and Cyril LEUNG Conference Proceeding Article
Hyperlink-aware object retrieval, Wei ZHANG, Chong-wah NGO, and Xiaochun CAO Journal Article
Improving Carbon Efficiency through Container Size Optimization and Shipment Consolidation, Nang Laik MA, Kar Way TAN, and Edwin Lik Ming CHONG Conference Proceeding Article
Incentive mechanism design for heterogeneous crowdsourcing using all-pay contests, Tie LUO, Salil S. KANHERE, Sajal K. DAS, and Hwee-Pink TAN Journal Article
Indoor localization via multi-modal sensing on smartphones, Han XU, Zheng YANG, Zimu ZHOU, Longfei SHANGGUAN, Ke YI, and Yunhao LIU Conference Proceeding Article
Is Only One GPS Point Position Sufficient to Locate You to The Road Network Accurately?, Hao WU, Weiwei SUN, and Baihua ZHENG Conference Proceeding Article
Is only one GPS position sufficient to locate you to the road network accurately?, Hao WU, Weiwei SUN, and Baihua ZHENG Conference Proceeding Article