The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2026

PDF

A comprehensive survey on relation extraction: Recent advances and new frontiers, Xiaoyan ZHAO, Yang DENG, Min YANG, Lingzhi WANG, Rui ZHANG, Hong CHENG, Wai LAM, Ying SHEN, and Ruifeng XU Journal Article

PDF

Quantitative bounds on resource usage of probabilistic programs, Krishnendu CHATTERJEE, Amir Kafshdar GOHARSHADY, Tobias MEGGENDORFER, and Dorde ZIKELIC Journal Article

Submissions from 2025

PDF

Equivalence and similarity refutation for probabilistic programs, Krishnendu CHATTERJEE, Ehsan Kafshdar GOHARSHADY, Petr NOVOTNÝ, and Dorde ZIKELIC Journal Article

PDF

On lexicographic proof rules for probabilistic termination, Krishnendu CHATTERJEE, Ehsan Kafshdar GOHARSHADY, Petr NOVOTNÝ, Jiří ZÁREVUCKÝ, and Dorde ZIKELIC Journal Article

Submissions from 2024

PDF

Efficient multiplicative-to-additive function from Joye-Libert cryptosystem and its application to threshold ECDSA, Haiyang XUE, Ho Man AU, Mengling LIU, Yin Kwan CHAN, Handong CUI, Xiang XIE, Hon Tsz YUEN, and Chengru ZHANG Conference Proceeding Article

PDF

Does CEO agreeableness personality mitigate real earnings management?, Shan LIU, Xingying WU, and Nan HU Journal Article

PDF

Generative AI in software engineering must be human-centered: The Copenhagen Manifesto, D. Russo, S. van Berkel Baltes, and Christoph TREUDE Journal Article

PDF

HiSOMA: A hierarchical multi-agent model integrating self-organizing neural networks with multi-agent deep reinforcement learning, Minghong GENG, Shubham PATERIA, Budhitama SUBAGDJA, and Ah-hwee TAN Journal Article

PDF

OcAPO: Fine-grained occupancy-aware, empirically-driven PDC control in open-plan, shared workspaces, Ravi ANURADHA, Dulaj Sanjaya WEERAKOON, and Archan MISRA Journal Article

PDF

On the lossiness of 2k-th power and the instantiability of Rabin-OAEP, Haiyang XUE, Bao LI, Xianhui LU, Kunpeng WANG, and Yamin LIU Conference Proceeding Article

PDF

Certified continual learning for neural network regression, Hong Long PHAM and Jun SUN Conference Proceeding Article

PDF

Granular3D: Delving into multi-granularity 3D scene graph prediction, Kaixiang HUANG, Jingru YANG, Jin WANG, Shengfeng HE, Zhan WANG, Haiyan HE, Qifeng ZHANG, and Guodong LU Journal Article

PDF

Solving fractional differential equations on a quantum computer: A variational approach, Fong Yew LEONG, Dax Enshan KOH, Jian Feng KONG, Siong Thye GOH, Jun Yong KHOO, Wei Bin EWE, Hongying LI, Jayne THOMPSON, and Dario POLETTI Journal Article

PDF

An LLM-assisted easy-to-trigger poisoning attack on code completion models: Injecting disguised vulnerabilities against strong detection, Shenao YAN, Shen WANG, Yue DUAN, Hanbin HONG, Kiho LEE, Doowon KIM, and Yuan HONG Conference Proceeding Article

PDF

AnoPas: Practical anonymous transit pass from group signatures with time-bound keys, Rui SHI, Yang YANG, Yingjiu LI, Huamin FENG, Hwee Hwa PANG, and Robert H. DENG Journal Article

PDF

CausVSR: Causality inspired visual sentiment recognition, Xinyue ZHANG, Zhaoxia WANG, Hailing WANG, Jing XIANG, Chunwei WU, and Guitao CAO Conference Proceeding Article

PDF

Path-choice-constrained bus bridging design under urban rail transit disruptions, Yiyang ZHU, Jian Gang JIN, and Hai WANG Journal Article

PDF

Adan: Adaptive Nesterov Momentum Algorithm for faster optimizing deep models, Xingyu XIE, Pan ZHOU, Huan LI, Zhouchen LIN, and Shuicheng YAN Journal Article

PDF

A deep learning method to predict bacterial ADP-ribosyltransferase toxins, Dandan ZHENG, Siyu ZHOU, Lihong CHEN, Guansong PANG, and Jian YANG Journal Article

PDF

Broadening the view: Demonstration-augmented prompt learning for conversational recommendation, Quang Huy DAO, Yang DENG, Dung D. LE, and Lizi LIAO Conference Proceeding Article

PDF

Certified robust accuracy of neural networks are bounded due to Bayes errors, Ruihan ZHANG and Jun SUN Conference Proceeding Article

PDF

Comparative analysis of hate speech detection: Traditional vs. deep learning approaches, Haibo PEN, Nicole TEO, and Zhaoxia WANG Conference Proceeding Article

PDF

Generative AI for pull request descriptions: Adoption, impact, and developer interventions, Tao XIAO, Hideaki HATA, Christoph TREUDE, and Kenichi MATSUMOTO Journal Article

PDF

Hierarchical damage correlations for old photo restoration, Weiwei CAI, Xuemiao XU, Jiajia XU, Huaidong ZHANG, Haoxin YANG, Kun ZHANG, and Shengfeng HE Journal Article

PDF

How people prompt to create interactive VR scenes, Setareh AGHEL MANESH, Tianyi ZHANG, Yuki ONISHI, Kotaro HARA, Scott BATEMAN, Jiannan LI, and Anthony TANG Conference Proceeding Article

PDF

Large language model powered agents for information retrieval, An ZHANG, Yang DENG, Yankai LIN, Xu CHEN, Ji-Rong WEN, and Tat-Seng CHUA Conference Proceeding Article

PDF

MicroKarta: Visualising microservice architectures, Oscar Manglaras, Alex Farkas, Peter Fule, Christoph TREUDE, and Markus Wagner Conference Proceeding Article

PDF

Partial solution based constraint solving cache in symbolic execution, Ziqi SHUAI, Zhenbang CHEN, Kelin MA, Kunlin LIU, Yufeng ZHANG, Jun SUN, and Ji WANG Journal Article

PDF

Performance analysis of Llama 2 among other LLMs, Donghao HUANG, Zhenda HU, and Zhaoxia WANG Conference Proceeding Article

PDF

Toward effective secure code reviews: An empirical study of security-related coding weaknesses, Wachiraphan CHAROENWET, Patanamon THONGTANUNAM, Thuan PHAM, and Christoph TREUDE Journal Article

PDF

Towards automated slide augmentation to discover credible and relevant links, Dilan Dinushka SENARATH ARACHCHIGE, Christopher M. POSKITT, Kwan Chin (XU Guangjin) KOH, Heng Ngee MOK, and Hady Wirawan LAUW Conference Proceeding Article

PDF

Towards human-centered proactive conversational agents, Yang DENG, Lizi LIAO, Zhonghua ZHENG, Grace Hui YANG, and Tat-Seng CHUA Conference Proceeding Article

PDF

Unveiling the dynamics of crisis events: Sentiment and emotion analysis via multi-task learning with attention mechanism and subject-based intent prediction, Phyo Yi WIN MYINT, Siaw Ling LO, and Yuhao ZHANG Journal Article

An adaptive secure and practical data sharing system with verifiable outsourced decryption, Shengmin XU, Xingshuo HAN, Guowen XU, Jianting NING, Xinyi HUANG, and Robert H. DENG Journal Article

Multi-type attention for solving multi-depot vehicle routing problems, Jinqi LI, Bing Tian DAI, Yunyun NIU, Jianhua XIAO, and Yaoxin WU Journal Article

PDF

Applicability and challenges of indoor localization using one-sided round trip time measurements, Quang Hai TRUONG, Xi Kai Justin LAM, Guru Anand ANISH, and Rajesh Krishna BALAN Conference Proceeding Article

PDF

Closest pairs search over data stream, Rui Zhu ZHU, Bin WANG, Xiaochun YANG, and Baihua ZHENG Conference Proceeding Article

PDF

Consistent3D: Towards consistent high-fidelity text-to-3D generation with deterministic sampling prior, Zike WU, Pan ZHOU, Xuanyu YI, Xiaoding YUAN, and Hanwang ZHANG Conference Proceeding Article

PDF

DAppSCAN: Building large-scale datasets for smart contract weaknesses in DApp Projects, Zibin ZHENG, Jianzhong SU, Jiachi CHEN, David LO, Zhijie ZHONG, and Mingxi YE Journal Article

PDF

Detecting foot strikes during running with earbuds, Changshuo HU, Thivya KANDAPPU, Jake STUCHBURY-WASS, Yang LIU, Anthony TANG, Cecelia MASCOLO, and Dong MA Conference Proceeding Article

PDF

Diffusion time-step curriculum for one image to 3D generation, Xuanyu YI, Zike WU, Qingshan XU, Pan ZHOU, Joo Hwee LIM, and Hanwang ZHANG Conference Proceeding Article

PDF

Efficient cross-modal video retrieval with meta-optimized frames, Ning HAN, Xun YANG, Ee-peng LIM, Hao CHEN, and Qianru SUN Journal Article

PDF

Enhancing code vulnerability detection via vulnerability-preserving data augmentation, Shangqing LIU, Wei MA, Jian WANG, Xiaofei XIE, Ruitao FENG, and Yang LIU Conference Proceeding Article

PDF

Ethical considerations toward protestware, Marc CHEONG, Raula KULA, and Christoph TREUDE Magazine Article

PDF

Few-shot learner parameterization by diffusion time-steps, Zhongqi YUE, Pan ZHOU, Richang HONG, Hanwang ZHANG, and SUN Qianru Conference Proceeding Article

PDF

Friendly sharpness-aware minimization, Tao LI, Pan ZHOU, Zhengbao HE, Xinwen CHENG, and Xiaolin HUANG Conference Proceeding Article

PDF

Fully automated selfish mining analysis in efficient proof systems blockchains, Krishnendu CHATTERJEE, Amirali EBRAHIMZADEH, Mehrdad KARRABI, Krzysztof PIETRZAK, Michelle YEO, and Dorde ZIKELIC Conference Proceeding Article

PDF

GTS: GPU-based Tree Index for Fast Similarity Search, Yifan ZHU, Ruiyao MA, Baihua ZHENG, Xiangyu KE, Lu CHEN, and Yunjun GAO Journal Article

PDF

InceptionNeXt: When Inception meets ConvNeXt, Weihao YU, Pan ZHOU, Shuicheng YAN, and Xinchao WANG Conference Proceeding Article

PDF

JollyGesture: Exploring dual-purpose gestures in VR presentations, Gun Woo Warren PARK, Anthony TANG, and Fanny CHEVALIER Conference Proceeding Article

PDF

Let’s think outside the box: Exploring leap-of-thought in large language models with multimodal humor generation, Shanshan ZHONG, Zhongzhan HUANG, Shanghua GAO, Wushao WEN, Liang LIN, Marinka ZITNIK, and Pan ZHOU Conference Proceeding Article

PDF

Network-based representations and dynamic discrete choice models for multiple discrete choice analysis, Huy Hung TRAN and Tien MAI Journal Article

PDF

Neuron sensitivity guided test case selection, Dong HUANG, Qingwen BU, Yichao FU, Yuhao QING, Xiaofei XIE, Junjie CHEN, and Heming CUI Journal Article

Privacy-preserving user recruitment with sensing quality evaluation in mobile crowdsensing, Jieying AN; Yanbing REN; Xinghua LI; Man ZHANG; Bin LUO; Yinbin MIAO; Ximeng LIU; and DENG, Robert H. Journal Article

PDF

Smart HPA: A resource-efficient horizontal pod auto-scaler for microservice architectures, Hussain AHMAD, Christoph TREUDE, Markus WAGNER, and Claudia SZABO Conference Proceeding Article

PDF

To protect or to hide: An investigation on corporate redacted disclosure motives under new FAST act regulation, Yan MA, Qian MAO, and Nan HU Journal Article

PDF

Unmasking the lurking: Malicious behavior detection for IoT malware with multi-label classification, Ruitao FENG, Sen LI, Sen CHEN, Mengmeng GE, Xuewei LI, and Xiaohong LI Conference Proceeding Article

PDF

VIOLET: Visual Analytics for Explainable Quantum Neural Networks, Shaolun RUAN, Zhiding LIANG, Qiang GUAN, Paul Robert GRIFFIN, Xiaolin WEN, Yanna LIN, and Yong WANG Journal Article

PDF

An adaptive large neighborhood search for the multi-vehicle profitable tour problem with flexible compartments and mandatory customers, Vincent F. YU, Nabila Yuraisyah SALSABILA, Aldy GUNAWAN, and Anggun Nurfitriani HANDOKO Journal Article

PDF

An evaluation of heart rate monitoring with in-ear microphones under motion, Kayla-Jade BUTKOW, Ting DANG, Andrea FERLINI, Dong MA, Yang LIU, and Cecilia MASCOLO Journal Article

A self-supervised dual-channel self-attention acoustic encoder for underwater acoustic target recognition, Xingmei WANG, Peiran WU, Boquan LI, Ge ZHAN, Jinghan LIU, and Zijian LIU Journal Article

PDF

Attribute-hiding fuzzy encryption for privacy-preserving data evaluation, Zhenhua CHEN, Luqi HUANG, Guomin YANG, Willy SUSILO, Xingbing FU, and Xingxing JIA Journal Article

PDF

BreathPro: Monitoring breathing mode during running with earables, Changshuo HU, Thivya KANDAPPU, Yang LIU, Cecilia MASCOLO, and Dong MA Journal Article

PDF

CMD: Co-analyzed IoT malware detection and forensics via network and hardware domains, Ziming ZHAO, Zhaoxuan LI, Jiongchi YU, Fan ZHANG, Xiaofei XIE, Haitao XU, and Binbin CHEN Journal Article

PDF

Compositional policy learning in stochastic control systems with formal guarantees, Dorde ZIKELIC, Mathias LECHNER, Abhinav Verma, Krishnendu CHATTERJEE, and Thomas A. HENZINGER Conference Proceeding Article

PDF

Diffusion-based negative sampling on graphs for link prediction, Yuan FANG and Yuan FANG Conference Proceeding Article

PDF

DLVS4Audio2Sheet: Deep learning-based vocal separation for audio into music sheet conversion, Nicole TEO, Zhaoxia WANG, Ezekiel GHE, Yee Sen TAN, Kevan OKTAVIO, Alexander Vincent LEWI, Allyne ZHANG, and Seng-Beng HO Conference Proceeding Article

PDF

Enhancing visual grounding in vision-language pre-training with position-guided text prompts, Alex Jinpeng WANG, Pan ZHOU, Mike Zheng SHOU, and Shuicheng YAN Journal Article

PDF

Evaluation of Orca 2 against other LLMs for Retrieval Augmented Generation, Donghao HUANG and Zhaoxia WANG Conference Proceeding Article

PDF

Flipped classroom for linear algebra at undergraduate level, M. THULASIDAS Conference Proceeding Article

PDF

From Tweets to token sales: Assessing ICO success through social media sentiments, Donghao HUANG, S. SAMUEL, Quoc Toan HUYNH, and Zhaoxia WANG Conference Proceeding Article

PDF

Grasper: A generalist pursuer for pursuit-evasion problems, Pengdeng LI, Shuxin LI, Xinrun WANG, Jakub CERNY, Youzhi ZHANG, Stephen McAleer, Hau CHAN, and Bo AN Conference Proceeding Article

PDF

Knowledge enhanced multi-intent transformer network for recommendation, Ding ZOU, Wei WEI, Feida ZHU, Chuanyu XU, Tao ZHANG, and Chengfu HUO Conference Proceeding Article

PDF

Large language model powered agents in the web, Yang DENG, An ZHANG, Yankai LIN, Xu CHEN, Ji-Rong WEN, and Tat-Seng CHUA Conference Proceeding Article

PDF

Large language models for qualitative research in software engineering: exploring opportunities and challenges, Muneera BANO, Rashina HODA, Didar ZOWGHI, and Christoph TREUDE Journal Article

PDF

Learning adversarial semantic embeddings for zero-shot recognition in open worlds, Tianqi LI, Guansong PANG, Xiao BAI, Jin ZHENG, Lei ZHOU, and Xin NING Journal Article

PDF

MultiGPrompt for multi-task pre-training and prompting on graphs, Xingtong YU, Chang ZHOU, Yuan FANG, and Xinming ZHAN Conference Proceeding Article

PDF

On the feasibility of Simple Transformer for dynamic graph modeling, Yuxia WU, Yuan FANG, and Lizi LIAO Conference Proceeding Article

PDF

Plug-and-play policy planner for large language model powered dialogue agents, Yang DENG, Wenxuan ZHANG, Wai LAM, See-Kiong NG, and Tat-Seng CHUA Conference Proceeding Article

PDF

Quantum machine learning for credit scoring, Nikolaos SCHETAKIS, Davit AGHAMALYAN, Micheael BOGUSLAVSKY, Agnieszka REES, Marc RAKOTOMALALA, and Paul Robert GRIFFIN Journal Article

PDF

Reinforcement learning with maskable stock representation for portfolio management in customizable stock pools, Wentao ZHANG, Yilei ZHAO, Shuo SUN, Jie YING, Yonggang XIE, Zitao SONG, Xinrun WANG, and Bo AN Conference Proceeding Article

PDF

Reinforcement Nash Equilibrium Solver, Xinrun WANG, Chang YANG, Shuxin LI, Pengdeng LI, Xiao HUANG, Hau CHAN, and Bo AN Conference Proceeding Article

PDF

Social balance on networks: Local minima and best-edge dynamics, Krishnendu CHATTERJEE, Jakub SVOBODA, Dorde ZIKELIC, Andreas PAVLOGIANNIS, and Josef TKADLEC Journal Article

PDF

SwapVid: Integrating video viewing and document exploration with direct manipulation, Taichi MURAKAMI, Kazuyuki FUJITA, Kotaro HARA, Kazuki TAKASHIMA, and Yoshifumi KITAMURA Conference Proceeding Article

PDF

The Grader: A grading assistant for lab tests and a teaching tool, M. THULASIDAS and David LO Conference Proceeding Article

PDF

The impact of avatar completeness on embodiment and the detectability of hand redirection in virtual reality, Martin FEICK, Andre ZENNER, Simon SEIBERT, Anthony TANG, and Antonio Krüger Conference Proceeding Article

Time-controllable keyword search scheme with efficient revocation in mobile e-health cloud, Yinbin MIAO; Feng LI; Xinghua LI; Zhiquan LIU; Jianting NING; Hongwei LI; Kim-Kwang Raymond CHOO; and DENG, Robert H. Journal Article

PDF

Unveiling code pre-trained models: Investigating syntax and semantics capacities, Wei MA, Shangqing LIU, Mengjie ZHAO, Xiaofei XIE, Wenhang WANG, Qiang HU, Jie ZHANG, and Liu YANG Journal Article

PDF

VAID: Indexing view designs in visual analytics system, Lu YING, Aoyu WU, Haotian LI, Zikun DENG, Ji LAN, Jiang WU, Yong WANG, Huamin QU, Dazhen DENG, and Yingcai WU Conference Proceeding Article

Modeling route representation with mixed-scale hierarchical transformer, Hanyuan ZHANG, Yuqi CHEN, Xinyu ZHANG, Qize JIANG, Liang LI, Baihua ZHENG, and Weiwei SUN Conference Proceeding Article

Trajectory set empowered hypergraph transformer for mobile sensor based traffic prediction, Hanyuan ZHANG, Xinyu \ZHANG, Qize JIANG, Liang LI, Baihua ZHENG, and Weiwei SUN Conference Proceeding Article

Impact of government outsourcing contracts on high-tech vendors: An empirical study, Yi DONG, Nan HU, Yonghua JI, Chenkai NI, and Jing XIE Journal Article

PDF

ACAV: A framework for automatic causality analysis in autonomous vehicle accident recordings, Huijia SUN, Christopher M. POSKITT, Yang SUN, Jun SUN, and Yuqi CHEN Conference Proceeding Article

PDF

Beyond a joke: Dead Code Elimination can delete live code, Haoxin TU, Lingxiao JIANG, Debin GAO, and He JIANG Conference Proceeding Article

PDF

Bidirectional paper-repository tracing in software engineering, Daniel GARIJO, Miguel ARROYO, Esteban GONZÁLEZ GUARDIA, Christoph TREUDE, and Nicola TAROCCO Conference Proceeding Article

PDF

Classifying source code: How far can compressor-based classifiers go?, Zhou YANG Conference Proceeding Article

PDF

Creative and correct: Requesting diverse code solutions from AI, Scott BLYTH, Markus WAGNER, and Christoph TREUDE Conference Proceeding Article

PDF

DronLomaly: Runtime log-based anomaly detector for DJI drones, Wei MINN, Naing Tun YAN, Lwin Khin SHAR, and Lingxiao JIANG Conference Proceeding Article

PDF

Editorial: Emerging on-demand passenger and logistics systems: Modelling, optimization, and data analytics, Jintao KE, Hai WANG, Neda MASOUD, Maximilian SCHIFFER, and Goncalo H. A. CORREIA Editorial

PDF

Encoding version history context for better code representation, Huy NGUYEN, Christoph TREUDE, and Patanamon THONGTANUNAM Conference Proceeding Article