The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2016

PDF

Demo: Smartwatch based food diary and eating analytics, Sougata SEN, Vigneshwaran SUBBARAJU, Archan MISRA, Youngki LEE, and Rajesh Krishna BALAN Conference Proceeding Article

PDF

Demo: Sound localization using smartphone, Amit SHARMA and Youngki LEE Conference Proceeding Article

PDF

Demo: Towards immersive and interactive gym exercises, Fazlay RABBI, Taiwoo PARK, Biyi FANG, Mi ZHANG, Youngki LEE, and Rajiv RANGANATHAN Conference Proceeding Article

PDF

Elderly medication adherence with the internet of things, Xiaoping TOH, Hwee Xian TAN, Hwee-Pink TAN, and Hwee-Pink TAN Conference Paper

PDF

Enabling carrier collaboration via order sharing double auction: A Singapore urban logistics perspective, Handoko Stephanus Daniel and Hoong Chuin LAU Conference Proceeding Article

PDF

Experience Me! The Impact of Content Sampling Strategies on the Marketing of Digital Entertainment Goods, Ai Phuong HOANG and Robert J. KAUFFMAN Conference Proceeding Article

PDF

Friendship maintenance and prediction in multiple social networks, Roy Ka-Wei LEE and Ee-Peng LIM Conference Proceeding Article

PDF

Hidden ciphertext policy attribute-based encryption under standard assumptions, Tran Viet Xuan PHUONG, Guomin YANG, and Willy SUSILO Journal Article

PDF

Information source detection via maximum a posteriori estimation, Biao CHANG, Feida ZHU, Enhong CHEN, and Qi. LIU Conference Proceeding Article

PDF

Insights from machine-learned diet success prediction, Ingmar WEBER and Palakorn ACHANANUPARP Conference Proceeding Article

PDF

Investigating the influence of offline friendship on Twitter networking behaviors, Young Soo KIM, Felicia NATALI, Feida ZHU, and Ee-Peng LIM Conference Proceeding Article

PDF

IoT+Small Data: Transforming In-Store Shopping Analytics and Services, Meera RADHAKRISHNAN, Sougata SEN, Vigneshwaran SUBBARAJU, Archan MISRA, and Rajesh BALAN Conference Proceeding Article

Learning robust multi-label hashing for efficient image retrieval, Haibao CHEN, Yuyan ZHAO, Lei ZHU, Guilin CHEN, and Kaichuan SUN Conference Proceeding Article

PDF

Object pooling for multimedia event detection and evidence localization, Ho ZHANG, Chong-Wah NGO, and Chong-wah NGO Journal Article

PDF

On analyzing geotagged tweets for location-based patterns, Philips Kokoh PRASETYO, Palakorn ACHANANUPARP, and Ee Peng LIM Conference Proceeding Article

PDF

On detecting maximal quasi antagonistic communities in signed graphs, Ming GAO, Ee-Peng LIM, David LO, and Philips Kokoh PRASETYO Journal Article

PDF

Online ARIMA algorithms for time series prediction, Chenghao LIU; HOI, Steven C. H.; Peilin ZHAO; and Jianling SUN Conference Proceeding Article

Link

Pervasive physical analytics using multi-modal sensing, Sougata SEN Conference Proceeding Article

PDF

Posting Topics ≠ Reading Topics: On Discovering Posting and Reading Topics in Social Media, Wei GONG, Ee-peng LIM, and Feida ZHU Conference Proceeding Article

PDF

PowerForecaster: Predicting power impact of mobile sensing applications at pre-installation time, Chulhong MIN, Youngki LEE, Chungkuk YOO, Seungwoo KANG, Inseok HWANG, and Junehwa SONG Magazine Article

PDF

PRESS: Personalized event scheduling recommender system (demonstration), Hoong Chuin LAU, Aldy GUNAWAN, Pradeep VARAKANTHAM, and Wenjie WANG Conference Proceeding Article

PDF

Privacy-preserving and verifiable data aggregation, Ngoc Hieu TRAN, Robert H. DENG, and Hwee Hwa PANG Conference Proceeding Article

PDF

Regular symmetry patterns, Anthony W. LIN, Truong Khanh NGUYEN, Philipp RÜMMER, and Jun SUN Conference Proceeding Article

PDF

Salient pairwise spatio-temporal interest points for real-time activity recognition, Mengyuan LIU, Hong LIU, Qianru SUN, Tianwei ZHANG, and Runwei DING Journal Article

PDF

Smart ambient sound analysis via structured statistical modeling, Jialie SHEN, Liqiang NIE, and Tat Seng CHUA Conference Proceeding Article

PDF

Synergizing specification miners through model fissions and fusions, LE BUI TIEN DUY, LE DINH XUAN BACH, David LO, and Ivan BESCHASTNIKH Conference Proceeding Article

PDF

Top-k Dominating Queries on Incomplete Data, Xiaoye MIAO, Yunjun GAO, Baihua ZHENG, Gang CHEN, and Huiyong CUI Journal Article

PDF

Towards a science of security games, Thanh Hong NGUYEN, Debarun KAR, Matthew BROWN, Arunesh SINHA, Albert XIN JIANG, and Milind TAMBE Book Chapter

PDF

Using online controlled experiments to examine authority effects on user behavior in email campaigns, LIM Kwan Hui, Ee-peng LIM, Binyan JIANG, and ACHANANUPARP Palakorn Conference Proceeding Article

PDF

We can hear you with Wi-Fi!, Guanhua WANG, Yongpan ZOU, Zimu ZHOU, Kaishun WU, and Lionel M. NI Journal Article

Submissions from 2015

PDF

All your sessions are belong to us: Investigating authenticator leakage through backup channels on Android, Guangdong BAI, Jun SUN, Jianliang WU, Quanqi YE, Li LI, Jin Song DONG, and Shanqing GUO Conference Paper

PDF

GPU accelerated on-the-fly reachability checking, Zhimin WU, Yang LIU, Jun SUN, Jianqi SHI, and Shengchao QIN Conference Paper

Combining Software Metrics and Text Features for Vulnerable File Prediction, Yun ZHANG, David LO, Xin XIA, Bowen XU, Jianling Sun SUN, and Shanping LI Conference Proceeding Article

Business Model Planner: Towards Integrating Risk into Business Model Canvas, Arcot Desai NARASIMHALU Conference Proceeding Article

Towards a Business Model Validation Framework: A System Engineering Perspective, Uros SIKIMIC and Arcot Desai NARASIMHALU Conference Proceeding Article

Open designettes, flowcharts, and pseudocodes in Python programming with the aid of Finch, Cheah Huei YOONG, Hyowon LEE, Ngai-Man CHEUNG, Geok See NG, Yue ZHANG, and Subhajit DATTA Conference Proceeding Article

PDF

A Bayesian recommender model for user rating and review profiling, Mingming JIANG, Dandan SONG, Lejian LIAO, and Feida ZHU Journal Article

PDF

A benchmark and comparative study of video-based face recognition on cox face database, Zhiwu HUANG, S. SHAN, R. WANG, H. ZHANG, S. LAO, A. KUERBAN, and X. CHEN Journal Article

PDF

A Cooperative Coevolution Framework for Parallel Learning to Rank, Shuaiqiang WANG, Yun WU, Byron J. GAO, Ke WANG, Hady W. LAUW, and Jun MA Journal Article

PDF

Active crowdsourcing for annotation, Shuji HAO, Chunyan MIAO, Steven C. H. HOI, and Peilin ZHAO Conference Proceeding Article

PDF

Adaptive duty cycling in sensor networks with energy harvesting using continuous-time markov chain and fluid models, Ronald Wai Hong Chan, Pengfei Zhang, Ido Nevat, Sai Ganesh Nagarajan, Alvin Cerdena VALERA, and Hwee Xian TAN Journal Article

PDF

Adaptive scaling of cluster boundaries for large-scale social media data clustering, Lei MENG, Ah-hwee TAN, and Donald C. WUNSCH Journal Article

PDF

Aesthetic Experience and Acceptance of Human Computation Games, Xiaohui WANG, Dion Hoe-Lian GOH, Ee-Peng LIM, and Adrian Wei Liang VU Conference Proceeding Article

PDF

A Layered Hidden Markov Model for predicting human trajectories in a multi-floor building, Qian LI and Hoong Chuin LAU Conference Proceeding Article

PDF

A misspecification test for logit based route choice models, Tien MAI, Emma FREJINGER, and Fabian BASTIN Journal Article

An Automaton-based Index Scheme supporting Twig Queries for On-demand XML Data Broadcast, Peng LIU, Weiwei SUN, Jian ZHANG, and Baihua ZHENG Journal Article

PDF

BEP: Bit error pattern measurement and analysis in IEEE 802.11, Jiayue LI, Zimu ZHOU, Chen ZHANG, Liang YIN, and Lionel M. NI Conference Proceeding Article

PDF

BL-MLE: Block-level message-locked encryption for secure large file deduplication, Rongmao CHEN, Yi MU, Guomin YANG, and Fuchun GUO Journal Article

PDF

Bring-your-own-application (BYOA): Optimal stochastic application migration in mobile cloud computing, Jonathan David CHASE, Dusit NIYATO, and Sivadon CHAISIRI Conference Proceeding Article

PDF

Building Crowd Movement Model Using Sample-Based Mobility Survey, Larry J. J. LIN, Shih-Fen CHENG, and Hoong Chuin LAU Conference Proceeding Article

PDF

Capstone Projects Mining System for Insights and Recommendations, Melvrivk Aik Chun GOH, Swapna GOTTIPATI, and Venky SHANKARARAMAN Conference Proceeding Article

PDF

Content-Based Visual Landmark Search via Multimodal Hypergraph Learning, Lei ZHU, Jialie SHEN, Hai JIN, Ran ZHENG, and Liang XIE Journal Article

PDF

Coordinated persuasion with dynamic group formation for collaborative elderly care, Budhitama SUBAGDJA and Ah-hwee TAN Conference Proceeding Article

PDF

Coordinated persuasion with dynamic group formation for collaborative elderly care, Budhitama SUBAGDJA and Ah-hwee TAN Conference Proceeding Article

PDF

Differentially Private Subspace Clustering, Yining WANG, Yu-Xiang WANG, and Aarti SINGH Conference Proceeding Article

PDF

Fast reinforcement learning under uncertainties with self-organizing neural networks, Teck-Hou TENG and Ah-hwee TAN Conference Proceeding Article

PDF

Incorporating Analytics into a Business Process Modelling Course, GOTTIPATI Swapna and SHANKARARAMAN, Venky Conference Proceeding Article

PDF

Incremental DCOP Search Algorithms for Solving Dynamic DCOP Problems, William YEOH, Pradeep VARAKANTHAM, Xiaoxun SUN, and Sven KOENIG Conference Proceeding Article

PDF

Learning and Controlling Network Diffusion in Dependent Cascade Models, Jiali DU, Pradeep VARAKANTHAM, Akshat KUMAR, and Shih-Fen CHENG Conference Proceeding Article

PDF

Learning query and image similarities with ranking canonical correlation analysis, Ting YAO, Tao MEI, and Chong-wah NGO Conference Proceeding Article

PDF

Lossy projective hashing and its applications, Haiyang XUE, Yamin LIU, Xianhui LU, and Bao LI Conference Proceeding Article

PDF

Modeling Social Media Content with Word Vectors for Recommendation, Ying DING and Jing JIANG Conference Proceeding Article

PDF

MopEye: Monitoring Per-app Network Performance with Zero Measurement Traffic, Daoyuan WU, Weichao LI, Rocky K. C. CHANG, and Debin GAO Conference Proceeding Article

PDF

MyLife: An online personal memory album, Di WANG and Ah-hwee TAN Conference Proceeding Article

PDF

Non-intrusive robust human activity recognition for diverse age groups, Di WANG, Ah-Hwee TAN, and Daqing ZHANG Conference Proceeding Article

PDF

On neighborhood effects in location-based social networks, Thanh-Nam DOAN, Freddy Chong-Tat CHUA, and Ee-Peng LIM Conference Proceeding Article

PDF

On the unreliability of bug severity data, Yuan TIAN, Nasir ALI, David LO, and Ahmed E. HASSAN Journal Article

PDF

On top-k selection in multi-armed bandits and hidden bipartite graphs, Wei CAO, Jian LI, Yufei TAO, and Zhize LI Conference Proceeding Article

PDF

Oriented object proposals, Shengfeng HE and Rynson W. H. LAU Conference Proceeding Article

PDF

Preface IAT 2015, Ah-hwee TAN, Yuefeng LI, Ee-Peng LIM, An BO, Anita RAJA, and Sarvapali RAMCHURN Conference Proceeding Article

PDF

Preface to WI-IAT 2015 workshops and demo/posters, Ah-hwee TAN and Yuefeng LI Conference Proceeding Article

PDF

Preface: WI 2015, Ah-Hwee TAN, Yuefeng LI, Ee-peng LIM, Jie ZHANG, Dell ZHANG, and Julita VASSILEVA Conference Proceeding Article

PDF

Progressive sequence matching for ADL plan recommendation, Shan GAO, Di WANG, Ah-hwee TAN, and Chunyan MIAO Conference Proceeding Article

PDF

Robust execution strategies for project scheduling with unreliable resources and stochastic durations, Na FU, Hoong Chuin LAU, and Pradeep VARAKANTHAM Journal Article

PDF

Silver assistants for aging-in-place, Di WANG, Budhitama SUBAGDJA, Yilin KANG, and Ah-hwee TAN Conference Proceeding Article

PDF

SuperCNN: A superpixelwise convolutional neural network for salient object detection, Shengfeng HE, Rynson W.H. LAU, Wenxi LIU, Zhe HUANG, and Qingxiong YANG Journal Article

R2FP: Rich and robust feature pooling for mining visual data, Wei XIONG, Bo DU, Lefei ZHANG, Ruimin HU, Wei BIAN, Jialie SHEN, and Dacheng TAO Conference Proceeding Article

PDF

An adaptive Markov strategy for effective network intrusion detection, Jianye HAO, Yinxing XUE, Mahinthan CHANDRAMOHAN, Yang LIU, and Jun SUN Conference Proceeding Article

Link

Online Portfolio Selection: Principles and Algorithms, Bin LI and Steven C. H. HOI Book

PDF

Security slicing for auditing XML, XPath, and SQL injection vulnerabilities, Julian THOME, Lwin Khin SHAR, and Lionel BRIAND Conference Proceeding Article

Hardware-Assisted Fine-Grained Code-Reuse Attack Detection, Pinghai YUAN, Qingkai ZENG, and Xuhua DING Conference Proceeding Article

Online Activities in Virtual World and Money Spending in Real World, Young Soo KIM and Gwangjae JUNG Presentation

PDF

ShopMiner: Mining customer shopping behavior in physical clothing stores with passive RFIDs, Longfei SHANGGUAN, Zimu ZHOU, Xiaolong ZHENG, Lei YANG, Yunhao LIU, and Jinsong HAN Conference Proceeding Article

PDF

Analysis of Aspects and Star Ratings in Consumer Reviews, Maruthi PRITHIVIRAJAN, Vivian LAI, and Kyong Jin SHIM Conference Proceeding Article

PDF

A Passive Testing Approach for Protocols in Wireless Sensor Networks, Xiaoping CHE, Stephane MAAG, Hwee Xian TAN, Hwee-Pink TAN, and Zhangbing ZHOU Journal Article

PDF

Automating the performance deviation analysis for multiple system releases: An evolutionary study, Felipe PINTO, Uirá KULESZA, and Christoph TREUDE Conference Proceeding Article

PDF

Challenges in analyzing software documentation in Portuguese, Christoph TREUDE, Carlos A. PROLO, and Fernando FIGUEIRA FILHO Conference Proceeding Article

PDF

CNL: Collective Network Linkage across heterogeneous social platforms, Ming GAO, Ee-peng LIM, David LO, Feida ZHU, Philips Kokoh PRASETYO, and Aoying ZHOU Conference Proceeding Article

PDF

CodeHow: Effective Code Search Based on API Understanding and Extended Boolean Model (E), Fei LV, Jian-guang LOU, Shaowei WANG, Dongmei ZHANG, and Jainjun ZHAO Conference Proceeding Article

PDF

Cost-sensitive online classification with adaptive regularization and its applications, Peilin ZHAO; Furen ZHUANG; Min WU; Xiao-Li LI; and HOI, Steven C. H. Conference Proceeding Article

PDF

Deep multimodal learning for affective analysis and retrieval, Lei PANG, Shiai ZHU, and Chong-wah NGO Journal Article

PDF

Dictionary Pair Learning on Grassmann Manifolds for Image Denoising, Xianhua ZENG, Wei BIAN, Wei LIU, Jialie SHEN, and Dacheng TAO Journal Article

PDF

Direct or indirect match? Selecting right concepts for zero-example case, Yi-Jie LU, Maaike DE BOER, Hao ZHANG, Klamer SCHUTTE, Wessel KRAAIJ, and Chong-wah NGO Conference Paper

PDF

Event detection in wireless sensor networks in random spatial sensors deployments, Pengfei ZHANG, Ido NEVAT, Gareth W. PETERS, Gaoxi XIAO, and Hwee-Pink TAN Journal Article

PDF

Experience report: An industrial experience report on test outsourcing practices, Xin XIA, David LO, Pavneet Singh KOCHHAR, Zhenchang XING, Xinyu WANG, and Shanping LI Conference Proceeding Article

PDF

Human action recognition in unconstrained videos by explicit motion modeling, Yu-Gang JIANG, Qi DAI, Wei LIU, Xiangyang XUE, and Chong-wah NGO Journal Article

PDF

IntelligShop: Enabling intelligent shopping in malls through location-based augmented reality, Aditi ADHIKARI, Vincent W. ZHENG, Hong CAO, Miao LIN, Yuan FANG, and Kevin Chen-Chuan CHANG Conference Proceeding Article

PDF

Interpolation guided compositional verification, Shang-Wei LIN, Jun SUN, Truong Khanh NGUYEN, Yang LIU, and Jin Song DONG Conference Proceeding Article

PDF

LeSiNN: Detecting anomalies by Identifying least similar nearest neighbours, Guansong PANG, Kai Ming TING, and David ALBRECHT Conference Proceeding Article

PDF

Modelling cascades over time in microblogs, Xie WEI, Feida ZHU, Siyuan LIU, and Ke WANG Conference Proceeding Article