The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2016

PDF

Demo: Drumming application using commodity wearable devices, Bharat DWIVEDI, Archan MISRA, and Youngki LEE Conference Proceeding Article

PDF

Demo: GPU-based image recognition and object detection on commodity mobile devices, Loc Nguyen HUYNH, Rajesh Krishna BALAN, and Youngki LEE Conference Proceeding Article

PDF

Demo: Multi-device gestural interfaces, TRAN HUY VU, Youngki LEE, and Archan MISRA Conference Proceeding Article

PDF

Demo: Smartwatch based shopping gesture recognition, Meeralakshmi RADHAKRISHNAN, Sharanya ESWARAN, Sougata SEN, Vigneshwaran SUBBARAJU, Archan MISRA, and Rajesh Krishna BALAN Conference Proceeding Article

PDF

Demo: TA$Ker: Campus-scale mobile crowd-tasking platform, Nikita JAIMAN, Thivya KANDAPPU, Randy TANDRIANSYAH, and Archan MISRA Conference Proceeding Article

PDF

Demo: Wearable application to manage problem behavior in children with neurodevelopmental disorders, Camellia ZAKARIA and Richard C. DAVIS Conference Proceeding Article

PDF

Designing and comparing multiple portfolios of parameter configurations for online algorithm selection, Aldy GUNAWAN, Hoong Chuin LAU, and Mustafa MISIR Conference Proceeding Article

PDF

(Deterministic) hierarchical identity-based encryption from learning with rounding over small modulus, Fuyang FANG, Bao LI, Xianhui LU, Yamin LIU, Dingding JIA, and Haiyang XUE Conference Proceeding Article

DPBT: A System for Detecting Pacemakers in Burst Topics, Guozhong DONG, Wu YANG, Feida ZHU, and Wei WANG Conference Proceeding Article

PDF

Dual formulations for optimizing Dec-POMDP controllers, Akshat KUMAR, Hala MOSTAFA, and Shlomo ZILBERSTEIN Conference Proceeding Article

PDF

Efficient multi-class selective sampling on graphs, Peng YANG; Peilin ZHAO; Zhen HAI; Wei LIU; HOI, Steven C. H.; and Xiao-Li LI Conference Proceeding Article

PDF

Event detection with zero example: Select the right and suppress the wrong concepts, Yi-Jie LU, Hao ZHANG, Maaike DE BOER, and Chong-wah NGO Conference Proceeding Article

PDF

Exemplar-driven top-down saliency detection via deep association, Shengfeng HE, Rynson W. H. LAU, and Qingxiong YANG Conference Proceeding Article

PDF

Finding the shortest path in stochastic vehicle routing: A cardinality minimization approach, Zhiguang CAO, Hongliang GUO, Jie ZHANG, Dusit NIYATO, and Ulrich Fastenrath FASTENRATH Journal Article

PDF

Fusing WiFi and video sensing for accurate group detection in indoor spaces, Kasthuri JAYARAJAH, Zaman LANTRA, and Archan MISRA Conference Proceeding Article

PDF

Geometric Aspects and Auxiliary Features to Top-k Processing [Advanced Seminar], Kyriakos MOURATIDIS Conference Proceeding Article

PDF

How long will this live? Discovering the lifespans of software engineering ideas, Subhajit DATTA, Santonu SARKAR, and A. S. M Sajeev Journal Article

PDF

ICCDetector: ICC-based malware detection on Android, Xu KE, Yingjiu LI, and Robert H. DENG Journal Article

PDF

Indoor location error-detection via crowdsourced multi-dimensional mobile data, Savina SINGLA and Archan MISRA Conference Proceeding Article

PDF

Jasper: Sensing gamers' emotions using physiological sensors, Sinh HUYNH, Youngki LEE, Taiwoo PARK, and Rajesh Krishna BALAN Conference Proceeding Article

PDF

Learning natural language inference with LSTM, Shuohang WANG and Jing JIANG Conference Proceeding Article

PDF

LiveLabs: Building in-situ mobile sensing and behavioural experimentation testbeds, Kasthuri JAYARAJAH, Rajesh Krishna BALAN, Meera RADHAKRISHNAN, Archan MISRA, and Youngki LEE Conference Proceeding Article

PDF

MobiPot: Understanding Mobile Telephony Threats with Honeycards, Marco BALDUZZI, Payas GUPTA, Lion GU, Debin GAO, and Mustaque AHAMAD Conference Proceeding Article

MobiPot: Understanding Mobile Telephony Threats with Honeycards, Marco BALDUZZI, Payas GUPTA, Lion GU, Debin GAO, and Mustaque AHAMAD Conference Proceeding Article

On the use of commonsense ontology for multimedia event recounting, Chun-Chet TAN and Chong-wah NGO Journal Article

PDF

Poster: A device-free evaluation system for gymnastics using passive RFID tags, Binbin XIE, Jie XIONG, Dingyi FANG, Xiaojiang CHEN, Anwen WANG, and Zhanyong TANG Conference Proceeding Article

PDF

Poster: Air quality friendly route recommendation system, Savina SINGLA, Divya BANSAL, and Archan MISRA Conference Proceeding Article

PDF

Poster: Android whole-system control flow analysis for accurate application behavior modeling, Huu Hoang NGUYEN Conference Proceeding Article

PDF

Poster: Improving communication and communicability with smarter use of text-based messages on mobile and wearable devices, Kenny T. W. CHOO Conference Proceeding Article

PDF

Poster: Sonicnect: Accurate hands-free gesture input system with smart acoustic sensing, Maotian CHANG, Ping LI, Panlong YANG, Jie XIONG, and Chang TIAN Conference Proceeding Article

PDF

Protecting the NECTAR of the Ganga River through game-theoretic factory inspections, Benjamin FORD, Matthew BROWN, Amulya YADAV, Amandeep SINGH, Arunesh SINHA, Biplav SRIVASTAVA, Christopher KIEKINTVELD, and TAMBE MILLIND Conference Proceeding Article

PDF

QCRI at SemEval-2016 Task 4: Probabilistic Methods for Binary and Ordinal Quantification, Giovanni Da San MARTINO, Wei GAO, and Fabrizio SEBASTIANI Conference Proceeding Article

PDF

Recipient revocable identity-based broadcast encryption: How to revoke some recipients in IBBE without knowledge of the plaintext, Willy SUSILO, Guomin YANG, Rongmao CHEN, Yi MU, Fuchun GUO, and Yang-Wai CHOW Conference Proceeding Article

PDF

Robust Partial Order Schedules for RCPSP/max with Durational Uncertainty, Na FU, Pradeep VARAKANTHAM, and Hoong Chuin LAU Conference Proceeding Article

PDF

Seeking independent management of problem behavior: A proof-of-concept study with children and their teachers, Camellia ZAKARIA, Richard C. DAVIS, and Zachary WALKER Conference Proceeding Article

PDF

Self-organizing neural network for adaptive operator selection in evolutionary search, Teck Hou TENG, Stephanus Daniel HANDOKO, and Hoong Chuin LAU Conference Proceeding Article

PDF

Serendipity-driven celebrity video hyperlinking, Shujun YANG, Lei PANG, Chong-wah NGO, and Benoit HUET Conference Proceeding Article

PDF

Small scale deployment of seat occupancy detectors, Nguyen Huy Hoang HUY, Gihan HETTIARACHCHI, Youngki LEE, and Rajesh Krishna BALAN Conference Proceeding Article

PDF

Strategic Planning for Setting up Base Stations In Emergency Medical Systems, Supriyo GHOSH and Pradeep VARAKANTHAM Conference Proceeding Article

PDF

The frustrations and benefits of mobile device usage in the home when co-present with family members, Erick ODUOR, Carman NEUSTAEDTER, William ODOM, Anthony TANG, Niala MOALLEM, Melanie TORY, and Pourang IRANI Conference Proceeding Article

PDF

Value-inspired elderly care service design for aging-in-place, Na LIU, Sandeep PURAO, and Hwee-Pink TAN Conference Proceeding Article

PDF

Video modeling and learning on Riemannian manifold for emotion recognition in the wild, Mengyi LIU, Ruiping WANG, Shaoxin LI, Zhiwu HUANG, Shiguang SHAN, and Xilin CHEN Journal Article

Analytics for Card-Based Partnerships between Banks and Retailers,   GENG DAN and Robert John KAUFFMAN Conference Paper

SLR: A scalable latent role model for attribute completion and tie prediction in social networks, Lizi LIAO, Qirong HO, Jing JIANG, and Ee-peng LIM Conference Proceeding Article

PDF

A core task abstraction approach to hierarchical reinforcement learning [Extended abstract], Zhuoru LI, Akshay NARAYAN, and Tze-Yun LEONG Conference Proceeding Article

PDF

A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud, Hanshu HONG, Zhixin SUN, and Ximeng LIU Journal Article

PDF

An autonomous agent for learning spatiotemporal models of human daily activities, Shan GAO and Ah-Hwee TAN Conference Proceeding Article

PDF

Anonymous identity-based broadcast encryption with chosen-ciphertext security, Kai HE; Jian WENG; Jia-Nan LIU; Joseph K. LIU; Wei LIU; and DENG, Robert H. Conference Proceeding Article

PDF

Approximate inference using DC programming for collective graphical models, Duc Thien NGUYEN, Akshat KUMAR, Hoong Chuin LAU, and Daniel SHELDON Conference Proceeding Article

PDF

Approximating the Performance of a "Last Mile" Transportation System, Hai WANG and Amedeo ODONI Journal Article

PDF

Are you Charlie or Ahmed? Cultural pluralism in Charlie Hebdo response on Twitter, Jisun AN, Haewoon KWAK, Yelena MEJOVA, Sonia Alonso Saenz DE OGER, and Braulio Gomez FORTES Conference Proceeding Article

PDF

Attacks and defence on android free floating windows, Lingyun YING, Yao CHENG, Yemian LU, Yacong GU, Purui SU, and Dengguo FENG Conference Proceeding Article

PDF

Augmenting API documentation with insights from stack overflow, Christoph TREUDE and Martin P. ROBILLARD Conference Proceeding Article

PDF

CAPTURE: A new predictive anti-poaching tool for wildlife protection, Thanh H. NGUYEN, Arunesh SINHA, Shahrzad GHOLAMI, Andrew PLUMPTRE, Lucas JOPPA, Milind TAMBE, Margaret DRICIRU, Fred WANYAMA, Aggrey RWETSIBA, and Rob CRITCHLOW Conference Proceeding Article

PDF

Context-aware advertisement recommendation for high-speed social news feeding, Yuchen LI, Dongxiang ZHANG, Ziquan LAN, and Kian-Lee TAN Conference Proceeding Article

PDF

Deeper look into bug fixes: Patterns, replacements, deletions, and additions, Mauricio SOTO, Ferdian THUNG, Chu-Pan WONG, Claire LE GOUES, and David LO Conference Proceeding Article

PDF

Domain-specific cross-language relevant question retrieval, Bowen XU, Zhenchang XING, Xin XIA, David LO, Qingye WANG, and Shanping LI Conference Proceeding Article

PDF

Efficient 3D dental identification via signed feature histogram and learning keypoint detection, Zhiyuan ZHANG, Sim Heng ONG, Xin ZHONG, and Kelvin W. C. FOONG Journal Article

PDF

Efficient verifiable computation of linear and quadratic functions over encrypted data, Ngoc Hieu TRAN, Hwee Hwa PANG, and Robert H. DENG Conference Proceeding Article

PDF

EFSPredictor: Predicting configuration bugs with ensemble feature selection, Bowen XU, David LO, Xin XIA, Ashish SUREKA, and Shanping LI Conference Proceeding Article

PDF

Euclidean co-embedding of ordinal data for multi-type visualization, Dung D. LE and Hady W. LAUW Conference Proceeding Article

PDF

Fast Weighted Histograms for Bilateral Filtering and Nearest Neighbor Searching, Shengfeng HE, Qingxiong YANG, Rynson W. H. LAU, and Ming-Hsuan YANG Journal Article

PDF

Graph-aided directed testing of Android applications for checking runtime privacy behaviours, Joseph Joo Keng CHAN, Lingxiao JIANG, Kiat Wee TAN, and Rajesh Krishna BALAN Conference Proceeding Article

PDF

#greysanatomy vs. #yankees: Demographics and hashtag use on Twitter, Jisun AN and Ingmar WEBER Conference Proceeding Article

PDF

HDIdx: High-dimensional indexing for efficient approximate nearest neighbor search, Ji WAN, Sheng TANG, Yongdong ZHANG, Jintao LI, Pengcheng WU, and Steven C. H. HOI Journal Article

PDF

How Android app developers manage power consumption? An empirical study by mining power management commits, Lingfeng BAO, David LO, Xin XIA, Xinyu WANG, and Cong TIAN Conference Proceeding Article

PDF

Joint Search by Social and Spatial Proximity [Extended Abstract], Kyriakos MOURATIDIS, Jing LI, Yu TANG, and Nikos MAMOULIS Conference Proceeding Article

PDF

Learning adversary behavior in security games: A PAC model perspective, Arunesh SINHA, Debarun KAR, and Milind TAMBE Conference Proceeding Article

PDF

Learning to query: Focused web page harvesting for entity aspects, Yuan FANG, Vincent W. ZHENG, and Kevin Chen-Chuan CHANG Conference Proceeding Article

PDF

Learning to rank for bug report assignee recommendation, Yuan TIAN, Withthige Dinusha Ruchira WIJEDASA, David LO, and Claire LE GOUES Conference Proceeding Article

PDF

Leveraging automated privacy checking for design of mobile privacy protection mechanisms, Joseph Joo Keng CHAN, Lingxiao JIANG, Kiat Wee TAN, and Rajesh BALAN Conference Proceeding Article

PDF

Mining and clustering mobility evolution patterns from social media for urban informatics, Chien-Cheng CHEN, Meng-Fen CHIANG, and Wen-Chih PENG Journal Article

PDF

Mining social ties beyond homophily, Hongwei LIANG, Ke WANG, and Feida ZHU Conference Proceeding Article

PDF

Mobile big data analytics using deep learning and apache spark, Mohammad Abu ALSHEIKH, Dusit NIYATO, Shaowei LIN, Hwee-Pink TAN, and Zhu HAN Journal Article

PDF

Modeling autobiographical memory in human-like autonomous agents, Di WANG, Ah-hwee TAN, and Chunyan MIAO Conference Proceeding Article

PDF

Modeling human-like non-rationality for social agents, Jaroslaw KOCHANOWICZ, Ah-hwee TAN, and Daniel THALMANN Conference Proceeding Article

PDF

Online Passive-Aggressive Active Learning, Jing LU, Peilin ZHAO, and Steven C. H. HOI Journal Article

PDF

Online sparse passive aggressive learning with kernels, Jing LU; Peilin ZHAO; and HOI, Steven C. H. Conference Proceeding Article

PDF

On Unravelling Opinions of Issue Specific-Silent Users in Social Media, Wei GONG, Ee-Peng LIM, Feida ZHU, and Pei Hua CHER Conference Proceeding Article

PDF

Optimizing selection of competing services with probabilistic hierarchical refinement, Tian Huat TAN, Manman CHEN, Jun SUN, Yang LIU, Étienne ANDRÉ, Yinxing XUE, and Jin Song DONG Conference Proceeding Article

PDF

Overcoming open source project entry barriers with a portal for newcomers, Igor STEINMACHER, Tayana U. CONTE, Christoph TREUDE, and Marco Aurélio GEROSA Conference Proceeding Article

PDF

Reinforcement learning framework for modeling spatial sequential decisions under uncertainty: (Extended abstract), Truc Viet LE, Siyuan LIU, and Hoong Chuin LAU Conference Proceeding Article

PDF

Robust influence maximization, Meghna LOWALEKAR, Pradeep VARAKANTHAM, and Akshat KUMAR Conference Proceeding Article

PDF

Semantic proximity search on graphs with metagraph-based learning, Yuan FANG, Wenqing LIN, Vincent W. ZHENG, Min WU, Kevin Chen-Chuan CHANG, and Xiao-Li LI Conference Proceeding Article

PDF

Simultaneous optimization and sampling of agent trajectories over a network, Hala MOSTAFA, Akshat KUMAR, and Hoong Chuin LAU Conference Proceeding Article

SLR: A scalable latent role model for attribute completion and tie prediction in social networks, Lizi LIAO, Qirong HO, Jing JIANG, and Ee-peng LIM Conference Proceeding Article

Social context cognition crowd-sourcing and semi-automatic parametrization, Jaroslaw KOCHANOWICZ, Ah-hwee TAN, and Daniel THALMANN Journal Article

PDF

Stabilized annotations for mobile remote assistance, Omid FAKOURFAR, Kevin TA, Richard TANG, Scott BATEMAN, and Anthony TANG Conference Proceeding Article

PDF

Temporal kernel descriptors for learning with time-sensitive patterns, Doyen SAHOO; Abhishek SHARMA; HOI, Steven C. H.; and Peilin ZHAO Conference Proceeding Article

PDF

The design of assistive location-based technologies for people with ambulatory disabilities: A formative study, Kotaro HARA, Christine CHEN, and Jon E. FROEHLICH Conference Proceeding Article

PDF

The social side of software platform ecosystems, Cleidson R. B. DA SOUZA, Fernando FIGUEIRA FILHO, Müller MIRANDA, Renato Pina FERREIRA, Christoph TREUDE, and Leif SINGER Conference Proceeding Article

PDF

Using abstractions to solve opportunistic crime security games at scale, Chao ZHANG, Victor BUCAREY, Ayan MUKHOPADHYAY, Arunesh SINHA, QIAN. Yundi, Yevgeniy VOROBEYCHIK, and Milind TAMBE Conference Proceeding Article

PDF

You are being watched: Bystanders' perspective on the use of camera devices in public spaces, Samarth SINGHAL, Carman NEUSTAEDTER, Thecla SCHIPHORST, Anthony TANG, Abhisekh PATRA, and Rui PAN Conference Paper

PDF

A graph-based semantics workbench for concurrent Asynchronous programs, Claudio CORRODI, Alexander HEUßNER, and Christopher M. POSKITT Conference Proceeding Article

PDF

A Framework for Evaluating Energy Sustainability Efforts in Maritime Terminal Operations, Kar Way TAN and Members of Green Transformation Lab Conference Poster

PDF

Anonymous proxy signature with hierarchical traceability, Jiannan WEI, Guomin YANG, Yi MU, and Kaitai LIANG Journal Article

Case studies of WSN-CPS applications, Fang-Jing WU, Tie LUO, and Hwee-Pink TAN Book Chapter

PDF

Crowdsourcing: A building block for smart cities, Archan MISRA Conference Proceeding Article

PDF

Dual-server public-key encryption with keyword Search for secure cloud storage, Rongmao CHEN, Yi MU, Guomin YANG, Fuchun GUO, and Xiaofen WANG Journal Article

PDF

Foreword to special section on graphics interface 2015, Hao ZHANG and Anthony TANG Editorial