The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2023

Policy-Based Remote User Authentication From Multi-Biometrics, Yangguang TIAN, Yingjiu LI, Robert H. DENG, Guomin YANG, and Nan LI Journal Article

Surgical activity triplet recognition via triplet disentanglement, Yiliang CHEN, Shengfeng HE, Yueming JIN, and Jing QIN Conference Proceeding Article

PDF

Anomaly detection under distribution shift, Tri CAO, Jiawen ZHU, and Guansong PANG Conference Proceeding Article

PDF

Boosting adversarial training in safety-critical systems through boundary data selection, Yifan JIA, Christopher M. POSKITT, Peixin ZHANG, Jingyi WANG, Jun SUN, and Sudipta CHATTOPADHYAY Journal Article

PDF

CIRI: Curricular inactivation for residue-aware one-shot video inpainting, Weiying ZHENG, Cheng XU, Xuemiao XU, Wenxi LIU, and Shengfeng HE Conference Proceeding Article

PDF

Configuring timing parameters to ensure execution-time opacity in timed automata, Étienne André, Engel Lefaucheux, Didier Lime, Dylan Marinho, and Jun SUN Conference Proceeding Article

PDF

Constructing cyber-physical system testing suites using active sensor fuzzing, Fan. ZHANG, Qianmei. WU, Bohan. XUAN, Yuqi. CHEN, Wei. LIN, Christopher M. POSKITT, Jun SUN, and Binbin. CHEN Journal Article

PDF

Decentralized multimedia data sharing in IoV: A learning-based equilibrium of supply and demand, Jiani FAN, Minrui XU, Jiale GUO, Lwin Khin SHAR, Jiawen KANG, Dusit NIYATO, and Kwok-Yan LAM Journal Article

PDF

Deep Reinforcement Learning With Explicit Context Representation, Francisco Munguia-Galeano, Ah-hwee TAN, and Ze JI Journal Article

PDF

Deep video demoireing via compact invertible dyadic decomposition, Yuhui QUAN, Haoran HUANG, Shengfeng HE, and Ruotao XU Conference Proceeding Article

PDF

Designing a human-centered intelligent system to monitor & explain abnormal patterns of older adults, Min Hun LEE, Daniel P. Siewiorek, and Alexandre Bernardino Conference Proceeding Article

PDF

DexBERT: Effective, task-agnostic and fine-grained representation learning of Android bytecode, Tiezhu SUN, Kevin ALLIX, Kisub KIM, Xin ZHOU, Dongsun KIM, David LO, Tegawendé F. BISSYANDE, and Jacques KLEIN Journal Article

PDF

Diffuse3D: Wide-angle 3D photography via bilateral diffusion, Yutao JIANG, Yang ZHOU, Yuan LIANG, Wenxi LIU, Jianbo JIAO, Yuhui QUAN, and Shengfeng HE Conference Proceeding Article

Economic policy uncertainty and imitation behaviors of corporate social responsibility practices: Evidence from China, Xingnan XUE and Nan HU Journal Article

PDF

Experiences of autistic Twitch livestreamers: “I have made easily the most meaningful and impactful relationships”, Terrance MOK, Anthony TANG, Adam MCCRIMMON, and Lora OEHLBERG Conference Proceeding Article

PDF

Feature prediction diffusion model for video anomaly detection, Cheng YAN, Shiyu ZHANG, Yang LIU, Guansong PANG, and Wenjun WANG Conference Proceeding Article

PDF

FlaCGEC: A Chinese grammatical error correction dataset with fine-grained linguistic annotation, Hanyue DU, Yike ZHAO, Qingyuan TIAN, Jiani WANG, Lei WANG, Yunshi LAN, and Xuesong LU Conference Proceeding Article

PDF

Hallucination detection: Robustly discerning reliable answers in Large Language Models, Yuyuan CHEN, Qiang FU, Yichen YUAN, Zhihao WEN, Ge FAN, Dayiheng LIU, Dongmei ZHANG, Zhixu LI, and Yanghua XIAO Conference Proceeding Article

PDF

HRGCN: Heterogeneous graph-level anomaly detection with hierarchical relation-augmented graph neural networks, Jiaxi LI, Guansong PANG, Ling CHEN, and Mohammad-Reza NAMAZI-RAD Conference Proceeding Article

PDF

ICL-D3IE: In-Context Learning with Diverse Demonstrations Updating for Document Information Extraction, Jiabang HE, Lei WANG, Yi HU, Ning LIU, Hui LIU, Xing XU, and Heng Tao SHEN Conference Proceeding Article

PDF

Instance-specific algorithm configuration via unsupervised deep graph clustering, Wen SONG, Yi LIU, Zhiguang CAO, Yaoxin WU, and Qiqiang LI Journal Article

PDF

Invariant training 2D-3D joint hard samples for few-shot point cloud recognition, Xuanyu YI, Jiajun DENG, Qianru SUN, Xian-Sheng HUA, Joo-Hwee LIM, and Hanwang ZHANG Conference Proceeding Article

PDF

Learning provably stabilizing neural controllers for discrete-time stochastic systems, Matin ANSARIPOUR, Krishnendu CHATTERJEE, A. Thomas HENZINGER, Mathias LECHNER, and Dorde ZIKELIC Conference Proceeding Article

PDF

Masked diffusion transformer is a strong image synthesizer, Shanghua GAO, Pan ZHOU, Ming-Ming CHENG, and Shuicheng YAN Conference Proceeding Article

PDF

Multi-representation Variational Autoencoder via iterative latent attention and implicit differentiation, Nhu Thuat TRAN and Hady Wirawan LAUW Conference Proceeding Article

PDF

ObjectFusion: Multi-modal 3D object detection with object-centric fusion, Q. CAI, Y. PAN, T. YAO, Chong-wah NGO, and T. MEI Conference Proceeding Article

PDF

Owner-free Distributed Symmetric Searchable Encryption supporting Conjunctive queries, Qiuyun TONG, Xinghua LI, Yinbin MIAO, Yunwei WANG, Ximeng LIU, and Robert H. DENG Journal Article

PDF

PosMLP-Video: Spatial and temporal relative position encoding for efficient video recognition, Yanbin HAO, Diansong ZHOU, Zhicai WANG, Chong-wah NGO, Xiangnan HE, and Meng WANG Working Paper

PRI: PCH-based privacy-preserving with reusability and interoperability for enhancing blockchain scalability, Yuxian LI; Jian WENG; Wei WU; Ming LI; Yingjiu LI; Haoxin TU; Yongdong WU; and DENG, Robert H. Journal Article

PDF

PriRPT: Practical blockchain-based privacy-preserving reporting system with rewards, Rui. SHI, Yang YANG, Huamin. FENG, Feng. YUAN, Huiqin. XIE, and Jianyi. ZHANG Journal Article

PDF

Problems in microservice development: supporting visualisation, Oscar MANGLARAS, Alex FARKAS, Peter FULE, Christoph TREUDE, and Markus WAGNER Conference Proceeding Article

PDF

Reachability Poorman discrete-bidding games, Guy AVNI, Tobias MEGGENDORFER, Suman SADHUKHAN, Josef TKADLEC, and Dorde ZIKELIC Conference Proceeding Article

PDF

Reinforcement retrieval leveraging fine-grained feedback for fact checking news claims with Black-Box LLM, Xuan ZHANG and Wei GAO Conference Proceeding Article

PDF

Residual pattern learning for pixel-wise out-of-distribution detection in semantic segmentation, Y LIU, Choubo DING, Yu TIAN, Guansong PANG, Vasileios BELAGIANNIS, Ian REID, and Gustavo CARNEIRO Conference Proceeding Article

PDF

RIGID: Recurrent GAN inversion and editing of real face videos, Yangyang XU, Shengfeng HE, Kwan-Yee K. WONG, and Pingluo LUO Conference Proceeding Article

PDF

Robust Bidirectional Poly-Matching, Ween Jiann LEE, Maksim TKACHENKO, and Hady Wirawan LAUW Journal Article

PDF

STPrivacy: Spatio-temporal privacy-preserving action recognition, Ming LI, Xiangyu XU, Hehe FAN, Pan ZHOU, Jun LIU, Jia-Wei LIU, Jiahe LI, Jussi KEPPO, Mike Zheng SHOU, and Shuicheng YAN Conference Proceeding Article

PDF

Supporting artefact awareness in partially-replicated workspaces, Emran POH, Anthony TANG, Jenanie S. LEE, and Zhao SHENGDONG Conference Proceeding Article

PDF

The future can't help fix the past: Assessing program repair in the wild, Vinay KABADI, Dezhen KONG, Siyu XIE, Lingfeng BAO, Gede Artha Azriadi PRANA, Tien Duy B. LE, Xuan Bach D. LE, and David LO Conference Proceeding Article

PDF

Toward intention discovery for early malice detection in cryptocurrency, Ling CHENG, Feida ZHU, Yong WANG, Ruicheng LIANG, and Huiwen LIU Conference Proceeding Article

PDF

Towards an effective and interpretable refinement approach for DNN verification, Jiaying LI, Guangdong BAI, Long H. PHAM, and Jun SUN Conference Proceeding Article

PDF

Towards explainable harmful meme detection through multimodal debate between Large Language Models, Hongzhan LIN, Ziyang LUO, Wei GAO, Jing MA, Bo WANG, and Ruichao YANG Conference Proceeding Article

PDF

UbiSurface: A robotic touch surface for supporting mid-air planar interactions in room-scale VR, Ryota GOMI, Kazuki TAKASHIMA, Yuki ONISHI, Kazuyuki FUJITA, and Yoshifumi KITAMURA Journal Article

PDF

Understanding the effect of counterfactual explanations on trust and reliance on AI for human-AI collaborative clinical decision making, Min Hun LEE and Chong Jun CHEW Journal Article

PDF

Underwater Image Translation via Multi-Scale Generative Adversarial Network, Dongmei YANG, Tianzi ZHANG, Boquan LI, Menghao LI, Weijing CHEN, Xiaoqing LI, and Xingmei WANG Journal Article

PDF

Unsupervised anomaly detection in medical images with a memory-augmented multi-level cross-attentional masked autoencoder, Yu TIAN, Guansong PANG, Yuyuan LIU, Chong WANG, Yuanhong CHEN, Fengbei LIU, Rajvinder SINGH, Johan W. VERJANS, Mengyu WANG, and Gustavo CARNEIRO Conference Proceeding Article

PDF

Using the TypeScript compiler to fix erroneous Node.js snippets, Brittany REID, Christoph TREUDE, and Markus WAGNER Conference Proceeding Article

PDF

Visilience: An interactive visualization framework for resilience analysis using control-flow graph, Hailong JIANG, Shaolun RUAN, Bo FANG, Yong WANG, and Qiang GUAN Conference Proceeding Article

PDF

Visually analyzing company-wide software service dependencies: An industrial case study, Sebastian BALTES, Brian PFITZMANN, Thomas KOWARK, Christoph TREUDE, and Fabian BECK Conference Proceeding Article

PDF

Voucher abuse detection with prompt-based fine-tuning on graph neural networks, Zhihao WEN, Yuan FANG, Yihan LIU, Yang GUO, and Shuji HAO Conference Proceeding Article

PDF

Wait, wasn't that code here before? Detecting outdated software documentation, Wen Siang TAN, Markus WAGNER, and Christoph TREUDE Conference Proceeding Article

PDF

Your cursor reveals: On analyzing workers’ browsing behavior and annotation quality In crowdsourcing tasks, Pei-chi LO and Ee-peng LIM Journal Article

Collective prompt tuning with relation inference for document-level relation extraction, Changsen YUAN, Yixin CAO, and Heyan HUANG Journal Article

DScope: To reliably and securely acquire live data from Kernel-Compromised ARM devices, Zhe CHEN, Haiqing QIU, and Xuhua DING Conference Proceeding Article

Distributed representation learning with skip-gram model for trained random forests, Chao MA, Tianjun WANG, Le ZHANG, Zhiguang CAO, Yue HUANG, and Xinghao DING Journal Article

Skeleton tracking solutions for a low-cost stroke rehabilitation support system, Ana R. COIAS, Min Hun LEE, Alexandre BERNARDINO, and Asim SMAILAGIC Conference Proceeding Article

A Causality-Aligned Structure Rationalization Scheme Against Adversarial Biased Perturbations for Graph Neural Networks, Ju JIA, Siqi MA, Yang LIU, Lina WANG, and Robert H. DENG Journal Article

PDF

AdaVis: Adaptive and explainable visualization recommendation for tabular data, Songheng ZHANG, Yong WANG, Haotian LI, and Huamin QU Journal Article

PDF

ArduinoProg: Towards automating Arduino programming, IMAM NUR BANI YUSUF, DIYANAH BINTE ABDUL JAMAL, and Lingxiao JIANG Conference Proceeding Article

PDF

Are we ready to embrace generative AI for software Q&A?, Bowen XU, Thanh-Dat NGUYEN, Thanh Le CONG, Thong HOANG, Jiakun LIU, Kisub KIM, Chen GONG, Changan NIU, Chenyu WANG, Xuan-Bach Dinh LE, and David LO Conference Proceeding Article

PDF

Are we ready to embrace generative AI for software Q&A?, Bowen XU, Thanh-Dat NGUYEN, Thanh LE-CONG, Thong HOANG, Jiakun LIU, Kisub KIM, Chen GONG, Changan NIU, Chenyu WANG, David LO, and David LO Conference Proceeding Article

PDF

AutoConf: Automated configuration of unsupervised learning systems using metamorphic testing and Bayesian optimization, Lwin Khin SHAR, GOKNIL Arda, Erik Johannes HUSOM, Sagar Sen SEN, Naing Tun YAN, and Kisub KIM Conference Proceeding Article

PDF

AutoDebloater: Automated android app debloating, Jiakun LIU, Xing HU, Thung Ferdian, Shahar MAOZ, Eran TOCH, Debin GAO, and David LO Conference Proceeding Article

PDF

Automated question title reformulation by mining modifcation logs from Stack Overflow, Ke LIU, Xiang CHEN, Chunyang CHEN, Xiaofei XIE, and Zhanqi CUI Journal Article

PDF

Carbon-aware mine planning with a novel multi-objective framework, NURUL ASYIKEEN BINTE AZHAR, Aldy GUNAWAN, Shih-Fen CHENG, and Erwin LEONARDI Conference Proceeding Article

PDF

Constrained multiagent reinforcement learning for large agent population, Jiajing LING, Arambam James SINGH, Duc Thien NGUYEN, and Akshat KUMAR Conference Proceeding Article

PDF

Continual collaborative filtering through gradient alignment, Dinh Hieu DO and Hady Wirawan LAUW Conference Proceeding Article

PDF

Edge Distraction-aware Salient Object Detection, Sucheng REN, Wenxi LIU, Jianbo JIAO, Guoqiang HAN, and Shengfeng HE Journal Article

PDF

EndWatch: A practical method for detecting non-termination in real-world software, Yao ZHANG, Xiaofei XIE, Yi LI, Sen CHEN, Cen ZHANG, and Xiaohong LI Conference Proceeding Article

PDF

Experimental comparison of features, analyses, and classifiers for Android malware detection, Lwin Khin SHAR, Biniam Fisseha DEMISSIE, Mariano CECCATO, Naing Tun YAN, David LO, Lingxiao JIANG, and Christoph BIENERT Journal Article

Link

Fair cloud auditing based on blockchain for resource-constrained IoT devices, Lei ZHOU, Anmin FU, Guomin YANG, Yansong GAO, Shui YU, and Robert H. DENG Journal Article

PDF

Fine-grained in-context permission classification for Android apps using control-flow graph embedding, Vikas Kumar MALVIYA, Naing Tun YAN, Chee Wei LEOW, Ailys Xynyn TEE, Lwin Khin SHAR, and Lingxiao JIANG Conference Proceeding Article

PDF

Generative model-based testing on decision-making policies, Zhuo LI, Xiongfei WU, Derui ZHU, Mingfei CHENG, Siyuan CHEN, Fuyuan ZHANG, Xiaofei XIE, Lei MA, and Jianjun ZHAO Conference Proceeding Article

PDF

Graph-level anomaly detection via hierarchical memory networks, Chaoxi NIU, Guansong PANG, and Ling CHEN Conference Proceeding Article

PDF

GRASP solution approach for the e-waste collection problem, Aldy GUNAWAN, Dang Viet Anh NGUYEN, Pham Kien Minh NGUYEN, and Pieter VANSTEENWEGEN Conference Proceeding Article

PDF

Hercules: Boosting the performance of privacy-preserving federated learning, Guowen XU, Xingshuo HAN, Shengmin XU, Tianwei ZHANG, Hongwei LI, Xinyi HUANG, and Robert H. DENG Journal Article

PDF

K-ST: A formal executable semantics of the structured text language for PLCs, Kun WANG, Jingyi WANG, Christopher M. POSKITT, Xiangxiang CHEN, Jun SUN, and Peng CHENG Journal Article

PDF

On predicting ESG ratings using dynamic company networks, Gary ANG, Zhiling GUO, and Ee-peng LIM Journal Article

PDF

Quantifying taxi drivers' behaviors with behavioral game theory, Mengyu JI, Yuhong XU, and Shih-Fen CHENG Conference Proceeding Article

PDF

Real: A representative error-driven approach for active learning, Cheng CHEN, Yong WANG, Lizi LIAO, Yueguo CHEN, and Xiaoyong DU Conference Proceeding Article

PDF

Revisiting the identification of the co-evolution of production and test code, Weifeng SUN, Meng YAN, Zhongxin LIU, Xin XIA, Yan LEI, and David LO Journal Article

PDF

RoSAS: Deep semi-supervised anomaly detection with contamination-resilient continuous supervision, Hongzuo XU, Yijie WANG, Guansong PANG, Songlei JIAN, Ning LIU, and Yongjun WANG Journal Article

PDF

TESTSGD: Interpretable testing of neural networks against subtle group discrimination, Mengdi ZHANG, Jun SUN, Jingyi WANG, and Bing SUN Journal Article

PDF

The devil is in the tails: How long-tailed code distributions impact large language models, Xin ZHOU, Kisub KIM, Bowen XU, Jiakun LIU, DongGyun HAN, and David LO Conference Proceeding Article

PDF

The power of identity cues in text-based customer service: Evidence from Twitter, Yang GAO, Huaxia RUI, and Shujing SUN Journal Article

PDF

Threshold attribute-based credentials with redactable signature, Rui SHI, Huamin FENG, Yang YANG, Feng YUAN, Yingjiu LI, Hwee Hwa PANG, and Robert H. DENG Journal Article

PDF

Uncertainty-adjusted inductive matrix completion with Graph Neural Networks, Petr KASALICKY, Antoine LEDENT, and Rodrigo ALVES Conference Proceeding Article

PDF

Understanding multi-homing and switching by platform drivers, Xiaotong GUO, Andreas HAUPT, Hai WANG, Rida QADRI, and Jinhua ZHAO Journal Article

PDF

When routing meets recommendation: Solving dynamic order recommendations problem in peer-to-peer logistics platforms, Zhiqin ZHANG, Waldy JOE, Yuyang ER, and Hoong Chuin LAU Conference Proceeding Article

Efficient Privacy-Preserving Federated Learning With Improved Compressed Sensing, Yifan. ZHANG, Yinbin. MIAO, Xinghua. LI, Linfeng. WEI, Zhiquan LIU, Kim-Kwang R. CHOO, and Robert H. DENG Journal Article

PDF

AI for connectivism learning: Undergraduate students’ experiences of ChatGPT in advanced programming courses, Swapna GOTTIPATI, Kyong Jin SHIM, and Venky SHANKARARAMAN Conference Proceeding Article

Machine learning based financial aid management process, GOTTIPATI Swapna; SHANKARARAMAN, Venky; Komirisetti C. RAO; and Vennila VETRIVILLALAN Conference Proceeding Article

Automata-guided control-flow-sensitive fuzz driver generation, Cen ZHANG, Yuekang LI, Hao ZHOU, Xiaohan ZHANG, Yaowen ZHENG, Xian ZHAN, Xiaofei XIE, Xiapu LUO, Xinghua LI, Yang Liu LIU, and Sheikh M. HABIB Conference Proceeding Article

Privacy-preserving multi-user outsourced computation for boolean circuits, Xueqiao. LIU, Guomin YANG, Willy. SUSILO, Kai. HE, Robert H. DENG, and Jian. WENG Journal Article

PDF

A certificateless designated verifier sanitizable signature, Yonghua ZHAN, Bixia YI, Yang YANG, Renjie HE, and Rui SHI Conference Proceeding Article

PDF

An adaptive large neighborhood search for heterogeneous vehicle routing problem with time windows, Minh Pham Kien NGUYEN, Aldy GUNAWAN, Vincent F. YU, and Mustafa MISIR Conference Proceeding Article

PDF

A survey on proactive dialogue systems: Problems, methods, and prospects, Yang DENG, Wenqiang LEI, Wai LAM, and Tat-Seng CHUA Conference Proceeding Article

PDF

Balancing utility and fairness in submodular maximization, Yanhao WANG, Yuchen LI, Francesco BONCHI, and Ying WANG Conference Proceeding Article

PDF

CampER: An effective framework for privacy-aware deep entity resolution, Yuxiang GUO, Lu CHEN, Zhengjie ZHOU, Baihua ZHENG, Ziquan FANG, Zhikun ZHANG, Yuren MAO, and Yunjun GAO Conference Proceeding Article

PDF

Context-aware event forecasting via graph disentanglement, Yunshan MA, Chenchen YE, Zijian WU, Xiang WANG, Yixin CAO, and Tat-Seng CHUA Conference Proceeding Article