Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (7226)
- Databases and Information Systems (2961)
- Software Engineering (1895)
- Artificial Intelligence and Robotics (1081)
- Numerical Analysis and Scientific Computing (963)
-
- Information Security (937)
- Engineering (795)
- Social and Behavioral Sciences (773)
- Graphics and Human Computer Interfaces (676)
- Business (671)
- Theory and Algorithms (454)
- Computer Engineering (410)
- Operations Research, Systems Engineering and Industrial Engineering (366)
- Programming Languages and Compilers (310)
- Communication (301)
- OS and Networks (300)
- Social Media (244)
- Public Affairs, Public Policy and Public Administration (203)
- Environmental Sciences (168)
- Data Storage Systems (164)
- Medicine and Health Sciences (163)
- Transportation (163)
- International and Area Studies (153)
- Management Information Systems (153)
- Asian Studies (151)
- Education (145)
- Technology and Innovation (126)
- E-Commerce (120)
- Finance and Financial Management (98)
- Keyword
-
- Deep learning (109)
- Machine learning (105)
- Artificial intelligence (77)
- Singapore (76)
- Social media (73)
-
- Data mining (62)
- Cloud computing (57)
- Reinforcement learning (54)
- Optimization (51)
- Security (51)
- Privacy (50)
- Twitter (49)
- Online learning (48)
- Software engineering (47)
- Visualization (46)
- Deep Learning (45)
- Empirical study (45)
- Neural networks (45)
- Task analysis (44)
- Access control (41)
- Feature extraction (41)
- Algorithms (40)
- Blockchain (39)
- Semantics (39)
- Sustainability (39)
- Classification (38)
- Android (35)
- Anomaly detection (35)
- Clustering (35)
- Collaboration (35)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (6891)
- Dissertations and Theses Collection (Open Access) (128)
- Research Collection Lee Kong Chian School Of Business (94)
- Research Collection School of Social Sciences (48)
- Research Collection College of Integrative Studies (44)
-
- Perspectives@SMU (38)
- Asian Management Insights (35)
- Research Collection Yong Pung How School Of Law (30)
- Research Collection School Of Accountancy (23)
- Research Collection School Of Economics (22)
- Dissertations and Theses Collection (15)
- SMU Press Releases (12)
- MITB Thought Leadership Series (11)
- Research@SMU: Connecting the Dots (10)
- Research Collection School of Computing and Information Systems (9)
- LARC Research Publications (7)
- Research Collection Library (6)
- Social Space (5)
- SMU Research Data (4)
- Sim Kee Boon Institute for Financial Economics (4)
- 2024 AI for Research Week (3)
- Centre for Computational Law (3)
- CMP Research (2)
- Centre for AI & Data Governance (2)
- Research Collection Office of Research (2)
- Library Events (1)
- Oral History Collection (1)
- ROSA Journal Articles and Publications (1)
- Research Collection School of Accountancy (1)
- Research@SMU Infographics (1)
- Publication Type
- File Type
Articles 1231 - 1260 of 7453
Full-Text Articles in Physical Sciences and Mathematics
Watch Your Flavors: Augmenting People's Flavor Perceptions And Associated Emotions Based On Videos Watched While Eating, Meetha Nesam James, Nimesha Ranasinghe, Anthony Tang, Lora Oehlberg
Watch Your Flavors: Augmenting People's Flavor Perceptions And Associated Emotions Based On Videos Watched While Eating, Meetha Nesam James, Nimesha Ranasinghe, Anthony Tang, Lora Oehlberg
Research Collection School Of Computing and Information Systems
People engage in different activities while eating alone, such as watching television or scrolling through social media on their phones. However, the impacts of these visual contents on human cognitive processes, particularly related to flavor perception and its attributes, are still not thoroughly explored. This paper presents a user study to evaluate the influence of six different types of video content (including nature, cooking, and a new food video genre known as mukbang) on people’s flavor perceptions in terms of taste sensations, liking, and emotions while eating plain white rice. Our findings revealed that the participants’ flavor perceptions are augmented …
Probabilistic Path Prioritization For Hybrid Fuzzing, Lei Zhao, Pengcheng Cao, Yue Duan, Heng Yin, Jifeng Xuan
Probabilistic Path Prioritization For Hybrid Fuzzing, Lei Zhao, Pengcheng Cao, Yue Duan, Heng Yin, Jifeng Xuan
Research Collection School Of Computing and Information Systems
Hybrid fuzzing that combines fuzzing and concolic execution has become an advanced technique for software vulnerability detection. Based on the observation that fuzzing and concolic execution are complementary in nature, state-of-the-art hybrid fuzzing systems deploy “optimal concolic testing” and “demand launch” strategies. Although these ideas sound intriguing, we point out several fundamental limitations in them, due to unrealistic or oversimplified assumptions. Further, we propose a novel “discriminative dispatch” strategy and design a probabilistic hybrid fuzzing system to better utilize the capability of concolic execution. Specifically, we design a Monte Carlo-based probabilistic path prioritization model to quantify each path’s difficulty, and …
Active Warden Attack: On The (In)Effectiveness Of Android App Repackage-Proofing, Haoyu Ma, Shijia Li, Debin Gao, Daoyuan Wu, Qiaowen Jia, Chunfu Jia
Active Warden Attack: On The (In)Effectiveness Of Android App Repackage-Proofing, Haoyu Ma, Shijia Li, Debin Gao, Daoyuan Wu, Qiaowen Jia, Chunfu Jia
Research Collection School Of Computing and Information Systems
App repackaging has raised serious concerns to the Android ecosystem with the repackage-proofing technology attracting attention in the Android research community. In this paper, we first show that existing repackage-proofing schemes rely on a flawed security assumption, and then propose a new class of active warden attack that intercepts and falsifies the metrics used by repackage-proofing for detecting the integrity violations during repackaging. We develop a proof-of-concept toolkit to demonstrate that all the existing repackage-proofing schemes can be bypassed by our attack toolkit. On the positive side, our analysis further identifies a new integrity metric in the Android ART runtime …
Undiscounted Recursive Path Choice Models: Convergence Properties And Algorithms, Tien Mai, Emma Frejinger
Undiscounted Recursive Path Choice Models: Convergence Properties And Algorithms, Tien Mai, Emma Frejinger
Research Collection School Of Computing and Information Systems
Traffic flow predictions are central to a wealth of problems in transportation. Path choice models can be used for this purpose, and in state-of-the-art models—so-called recursive path choice (RPC) models—the choice of a path is formulated as a sequential arc choice process using undiscounted Markov decision process (MDP) with an absorbing state. The MDP has a utility maximization objective with unknown parameters that are estimated based on data. The estimation and prediction using RPC models require repeatedly solving value functions that are solutions to the Bellman equation. Although there are several examples of successful applications of RPC models in the …
Unified Route Planning For Shared Mobility: An Insertion-Based Framework, Yongxin Tong, Yuxiang Zeng, Zimu Zhou, Lei Chen, Ke. Xu
Unified Route Planning For Shared Mobility: An Insertion-Based Framework, Yongxin Tong, Yuxiang Zeng, Zimu Zhou, Lei Chen, Ke. Xu
Research Collection School Of Computing and Information Systems
There has been a dramatic growth of shared mobility applications such as ride-sharing, food delivery, and crowdsourced parcel delivery. Shared mobility refers to transportation services that are shared among users, where a central issue is route planning. Given a set of workers and requests, route planning finds for each worker a route, i.e., a sequence of locations to pick up and drop off passengers/parcels that arrive from time to time, with different optimization objectives. Previous studies lack practicability due to their conflicted objectives and inefficiency in inserting a new request into a route, a basic operation called insertion. In addition, …
Guided Attention Multimodal Multitask Financial Forecasting With Inter-Company Relationships And Global And Local News, Meng Kiat Gary Ang, Ee-Peng Lim
Guided Attention Multimodal Multitask Financial Forecasting With Inter-Company Relationships And Global And Local News, Meng Kiat Gary Ang, Ee-Peng Lim
Research Collection School Of Computing and Information Systems
Most works on financial forecasting use information directly associated with individual companies (e.g., stock prices, news on the company) to predict stock returns for trading. We refer to such company-specific information as local information. Stock returns may also be influenced by global information (e.g., news on the economy in general), and inter-company relationships. Capturing such diverse information is challenging due to the low signal-to-noise ratios, different time-scales, sparsity and distributions of global and local information from different modalities. In this paper, we propose a model that captures both global and local multimodal information for investment and risk management-related forecasting tasks. …
Message-Locked Searchable Encryption: A New Versatile Tool For Secure Cloud Storage, Xueqiao Liu, Guomin Yang, Willy Susilo, Joseph Tonien, Rongmao Chen, Xixiang Lv
Message-Locked Searchable Encryption: A New Versatile Tool For Secure Cloud Storage, Xueqiao Liu, Guomin Yang, Willy Susilo, Joseph Tonien, Rongmao Chen, Xixiang Lv
Research Collection School Of Computing and Information Systems
Message-Locked Encryption (MLE) is a useful tool to enable deduplication over encrypted data in cloud storage. It can significantly improve the cloud service quality by eliminating redundancy to save storage resources, and hence user cost, and also providing defense against different types of attacks, such as duplicate faking attack and brute-force attack. A typical MLE scheme only focuses on deduplication. On the other hand, supporting search operations on stored content is another essential requirement for cloud storage. In this article, we present a message-locked searchable encryption (MLSE) scheme in a dual-server setting, which achieves simultaneously the desirable features of supporting …
Uipdroid: Unrooted Dynamic Monitor Of Android App Uis For Fine-Grained Permission Control, Mulin Duan, Lingxiao Jiang, Lwin Khin Shar, Debin Gao
Uipdroid: Unrooted Dynamic Monitor Of Android App Uis For Fine-Grained Permission Control, Mulin Duan, Lingxiao Jiang, Lwin Khin Shar, Debin Gao
Research Collection School Of Computing and Information Systems
Proper permission controls in Android systems are important for protecting users' private data when running applications installed on the devices. Currently Android systems require apps to obtain authorization from users at the first time when they try to access users' sensitive data, but every permission is only managed at the application level, allowing apps to (mis)use permissions granted by users at the beginning for different purposes subsequently without informing users. Based on privacy-by-design principles, this paper develops a new permission manager, named UIPDroid, that (1) enforces the users' basic right-to-know through user interfaces whenever an app uses permissions, and (2) …
Feasibility Studies In Indoor Localization Through Intelligent Conversation, Sheshadri Smitha, Linus Cheng, Kotaro Hara
Feasibility Studies In Indoor Localization Through Intelligent Conversation, Sheshadri Smitha, Linus Cheng, Kotaro Hara
Research Collection School Of Computing and Information Systems
We propose a model to achieve human localization in indoor environments through intelligent conversation between users and an agent. We investigated the feasibility of conversational localization by conducting two studies. First, we conducted a Wizard-of-Oz study with N = 7 participants and studied the feasibility of localizing users through conversation. We identified challenges posed by users’ language and behavior. Second, we collected N = 800 user descriptions of virtual indoor locations from N = 80 Amazon Mechanical Turk participants to analyze user language. We explored the effects of conversational agent behavior and observed that people describe indoor locations differently based …
Transboundary Air Pollution And Cross-Border Cooperation: Insights From Marine Vessel Emissions Regulations In Hong Kong And Shenzhen, Seung Kyum Kim, Terry Van Gevelt, Paul Joosse, Mia M. Bennett
Transboundary Air Pollution And Cross-Border Cooperation: Insights From Marine Vessel Emissions Regulations In Hong Kong And Shenzhen, Seung Kyum Kim, Terry Van Gevelt, Paul Joosse, Mia M. Bennett
Research Collection College of Integrative Studies
Many coastal cities regulate shipping emissions within their jurisdictions. However, the transboundary nature of air pollution makes such efforts largely ineffective unless they are accompanied by reciprocal, legally-binding regulatory agreements with neighbouring cities. Due to various technical, economic, and institutional barriers, it has thus far been difficult to isolate the effects of legally-binding cross-border cooperation on vessel emissions at the city-level. We exploit the unique administrative characteristics of Hong Kong and its relationship with neighbouring cities in China's Pearl River Delta to isolate the effect of legally-binding cross-border cooperation. Using a regression discontinuity design, we find that Hong Kong's unilateral …
Do Pre-Trained Models Benefit Knowledge Graph Completion? A Reliable Evaluation And A Reasonable Approach, Xin Lv, Yankai Lin, Yixin Cao, Lei Hou, Juanzi Li, Zhiyuan Liu, Peng Li, Jie Zhou
Do Pre-Trained Models Benefit Knowledge Graph Completion? A Reliable Evaluation And A Reasonable Approach, Xin Lv, Yankai Lin, Yixin Cao, Lei Hou, Juanzi Li, Zhiyuan Liu, Peng Li, Jie Zhou
Research Collection School Of Computing and Information Systems
In recent years, pre-trained language models (PLMs) have been shown to capture factual knowledge from massive texts, which encourages the proposal of PLM-based knowledge graph completion (KGC) models. However, these models are still quite behind the SOTA KGC models in terms of performance. In this work, we find two main reasons for the weak performance: (1) Inaccurate evaluation setting. The evaluation setting under the closed-world assumption (CWA) may underestimate the PLM-based KGC models since they introduce more external knowledge; (2) Inappropriate utilization of PLMs. Most PLM-based KGC models simply splice the labels of entities and relations as inputs, leading to …
Translate-Train Embracing Translationese Artifacts, Sicheng Yu, Qianru Sun, Hao Zhang, Jing Jiang
Translate-Train Embracing Translationese Artifacts, Sicheng Yu, Qianru Sun, Hao Zhang, Jing Jiang
Research Collection School Of Computing and Information Systems
Translate-train is a general training approach to multilingual tasks. The key idea is to use the translator of the target language to generate training data to mitigate the gap between the source and target languages. However, its performance is often hampered by the artifacts in the translated texts (translationese). We discover that such artifacts have common patterns in different languages and can be modeled by deep learning, and subsequently propose an approach to conduct translate-train using Translationese Embracing the effect of Artifacts (TEA). TEA learns to mitigate such effect on the training data of a source language (whose original and …
Graphcode2vec: Generic Code Embedding Via Lexical And Program Dependence Analyses, Wei Ma, Mengjie Zhao, Ezekiel Soremekun, Qiang Hu, Jie M. Zhang, Mike Papadakis, Maxime Cordy, Xiaofei Xie, Yves Le Traon
Graphcode2vec: Generic Code Embedding Via Lexical And Program Dependence Analyses, Wei Ma, Mengjie Zhao, Ezekiel Soremekun, Qiang Hu, Jie M. Zhang, Mike Papadakis, Maxime Cordy, Xiaofei Xie, Yves Le Traon
Research Collection School Of Computing and Information Systems
Code embedding is a keystone in the application of machine learning on several Software Engineering (SE) tasks. To effectively support a plethora of SE tasks, the embedding needs to capture program syntax and semantics in a way that is generic. To this end, we propose the first self-supervised pre-training approach (called Graphcode2vec) which produces task-agnostic embedding of lexical and program dependence features. Graphcode2vec achieves this via a synergistic combination of code analysis and Graph Neural Networks. Graphcode2vec is generic, it allows pre-training, and it is applicable to several SE downstream tasks. We evaluate the effectiveness of Graphcode2vec on four (4) …
Optimal In‐Place Suffix Sorting, Zhize Li, Jian Li, Hongwei Huo
Optimal In‐Place Suffix Sorting, Zhize Li, Jian Li, Hongwei Huo
Research Collection School Of Computing and Information Systems
The suffix array is a fundamental data structure for many applications that involve string searching and data compression. Designing time/space-efficient suffix array construction algorithms has attracted significant attention and considerable advances have been made for the past 20 years. We obtain the \emph{first} in-place suffix array construction algorithms that are optimal both in time and space for (read-only) integer alphabets. Concretely, we make the following contributions: 1. For integer alphabets, we obtain the first suffix sorting algorithm which takes linear time and uses only $O(1)$ workspace (the workspace is the total space needed beyond the input string and the output …
Mmekg: Multi-Modal Event Knowledge Graph Towards Universal Representation Across Modalities, Yubo Ma, Zehao Wang, Mukai Li, Yixin Cao, Meiqi Chen, Xinze Li, Wenqi Sun, Kunquan Deng, Kun Wang, Aixin Sun, Jing Shao
Mmekg: Multi-Modal Event Knowledge Graph Towards Universal Representation Across Modalities, Yubo Ma, Zehao Wang, Mukai Li, Yixin Cao, Meiqi Chen, Xinze Li, Wenqi Sun, Kunquan Deng, Kun Wang, Aixin Sun, Jing Shao
Research Collection School Of Computing and Information Systems
Events are fundamental building blocks of realworld happenings. In this paper, we present a large-scale, multi-modal event knowledge graph named MMEKG. MMEKG unifies different modalities of knowledge via events, which complement and disambiguate each other. Specifically, MMEKG incorporates (i) over 990 thousand concept events with 644 relation types to cover most types of happenings, and (ii) over 863 million instance events connected through 934 million relations, which provide rich contextual information in texts and/or images. To collect billion-scale instance events and relations among them, we additionally develop an efficient yet effective pipeline for textual/visual knowledge extraction system. We also develop …
Github Sponsors: Exploring A New Way To Contribute To Open Source, Naomichi Shimada, Tao Xiao, Hideaki Hata, Christoph Treude, Kenichi Matsumoto
Github Sponsors: Exploring A New Way To Contribute To Open Source, Naomichi Shimada, Tao Xiao, Hideaki Hata, Christoph Treude, Kenichi Matsumoto
Research Collection School Of Computing and Information Systems
GitHub Sponsors, launched in 2019, enables donations to individual open source software (OSS) developers. Financial support for OSS maintainers and developers is a major issue in terms of sustaining OSS projects, and the ability to donate to individuals is expected to support the sustainability of developers, projects, and community. In this work, we conducted a mixed-methods study of GitHub Sponsors, including quantitative and qualitative analyses, to understand the characteristics of developers who are likely to receive donations and what developers think about donations to individuals. We found that: (1) sponsored developers are more active than non-sponsored developers, (2) the possibility …
Hierarchical Value Decomposition For Effective On-Demand Ride Pooling, Hao Jiang, Pradeep Varakantham
Hierarchical Value Decomposition For Effective On-Demand Ride Pooling, Hao Jiang, Pradeep Varakantham
Research Collection School Of Computing and Information Systems
On-demand ride-pooling (e.g., UberPool, GrabShare) services focus on serving multiple different customer requests using each vehicle, i.e., an empty or partially filled vehicle can be assigned requests from different passengers with different origins and destinations. On the other hand, in Taxi on Demand (ToD) services (e.g., UberX), one vehicle is assigned to only one request at a time. On-demand ride pooling is not only beneficial to customers (lower cost), drivers (higher revenue per trip) and aggregation companies (higher revenue), but is also of crucial importance to the environment as it reduces the number of vehicles required on the roads. Since …
Deep Depression Prediction On Longitudinal Data Via Joint Anomaly Ranking And Classification, Guansong Pang, Ngoc Thien Anh Pham, Emma Baker, Rebecca Bentley, Anton Van Den Hengel
Deep Depression Prediction On Longitudinal Data Via Joint Anomaly Ranking And Classification, Guansong Pang, Ngoc Thien Anh Pham, Emma Baker, Rebecca Bentley, Anton Van Den Hengel
Research Collection School Of Computing and Information Systems
A wide variety of methods have been developed for identifying depression, but they focus primarily on measuring the degree to which individuals are suffering from depression currently. In this work we explore the possibility of predicting future depression using machine learning applied to longitudinal socio-demographic data. In doing so we show that data such as housing status, and the details of the family environment, can provide cues for predicting future psychiatric disorders. To this end, we introduce a novel deep multi-task recurrent neural network to learn time-dependent depression cues. The depression prediction task is jointly optimized with two auxiliary anomaly …
Who Are The 'Silent Spreaders'?: Contact Tracing In Spatio-Temporal Memory Models, Yue Hu, Budhitama Subagdja, Ah-Hwee Tan, Chai Quek, Quanjun Yin
Who Are The 'Silent Spreaders'?: Contact Tracing In Spatio-Temporal Memory Models, Yue Hu, Budhitama Subagdja, Ah-Hwee Tan, Chai Quek, Quanjun Yin
Research Collection School Of Computing and Information Systems
The COVID-19 epidemic has swept the world for over two years. However, a large number of infectious asymptomatic COVID-19 cases (ACCs) are still making the breaking up of the transmission chains very difficult. Efforts by epidemiological researchers in many countries have thrown light on the clinical features of ACCs, but there is still a lack of practical approaches to detect ACCs so as to help contain the pandemic. To address the issue of ACCs, this paper presents a neural network model called Spatio-Temporal Episodic Memory for COVID-19 (STEM-COVID) to identify ACCs from contact tracing data. Based on the fusion Adaptive …
Tatl: Task Agnostic Transfer Learning For Skin Attributes Detection, Duy M.H. Nguyen, Thu T. Nguyen, Huong Vu, Hong Quang Pham, Manh-Duy Nguyen, Binh T. Nguyen, Daniel Sonntag
Tatl: Task Agnostic Transfer Learning For Skin Attributes Detection, Duy M.H. Nguyen, Thu T. Nguyen, Huong Vu, Hong Quang Pham, Manh-Duy Nguyen, Binh T. Nguyen, Daniel Sonntag
Research Collection School Of Computing and Information Systems
Existing skin attributes detection methods usually initialize with a pre-trained Imagenet network and then fine-tune on a medical target task. However, we argue that such approaches are suboptimal because medical datasets are largely different from ImageNet and often contain limited training samples. In this work, we propose Task Agnostic Transfer Learning (TATL), a novel framework motivated by dermatologists’ behaviors in the skincare context. TATL learns an attribute-agnostic segmenter that detects lesion skin regions and then transfers this knowledge to a set of attribute-specific classifiers to detect each particular attribute. Since TATL’s attribute-agnostic segmenter only detects skin attribute regions, it enjoys …
Tourgether360: Exploring 360° Tour Videos With Others, Kartikaeya Kumar, Lev Poretski, Jiannan Li, Anthony Tang
Tourgether360: Exploring 360° Tour Videos With Others, Kartikaeya Kumar, Lev Poretski, Jiannan Li, Anthony Tang
Research Collection School Of Computing and Information Systems
Contemporary 360° video players do not provide ways to let people explore the videos together. Tourgether360 addresses this problem for 360° tour videos using a pseudo-spatial navigation technique that provides both an overhead “context” view of the environment as a minimap, as well as a shared pseudo-3D environment for exploring the video. Collaborators appear as avatars along a track depending on their position in the video timeline and can point and synchronize their playback. In this work, we describe the intellectual precedents for this work, our design goals, and our implementation approach of Tourgether360. Finally, we discuss future work based …
Learning Transferable Perturbations For Image Captioning, Hanjie Wu, Yongtuo Liu, Hongmin Cai, Shengfeng He
Learning Transferable Perturbations For Image Captioning, Hanjie Wu, Yongtuo Liu, Hongmin Cai, Shengfeng He
Research Collection School Of Computing and Information Systems
Present studies have discovered that state-of-the-art deep learning models can be attacked by small but well-designed perturbations. Existing attack algorithms for the image captioning task is time-consuming, and their generated adversarial examples cannot transfer well to other models. To generate adversarial examples faster and stronger, we propose to learn the perturbations by a generative model that is governed by three novel loss functions. Image feature distortion loss is designed to maximize the encoded image feature distance between original images and the corresponding adversarial examples at the image domain, and local-global mismatching loss is introduced to separate the mapping encoding representation …
Sanitizable Access Control System For Secure Cloud Storage Against Malicious Data Publishers, Willy Susilo, Peng Jiang, Jianchang Lai, Fuchun Guo, Guomin Yang, Robert H. Deng
Sanitizable Access Control System For Secure Cloud Storage Against Malicious Data Publishers, Willy Susilo, Peng Jiang, Jianchang Lai, Fuchun Guo, Guomin Yang, Robert H. Deng
Research Collection School Of Computing and Information Systems
Cloud computing is considered as one of the most prominent paradigms in the information technology industry, since it can significantly reduce the costs of hardware and software resources in computing infrastructure. This convenience has enabled corporations to efficiently use the cloud storage as a mechanism to share data among their employees. At the first sight, by merely storing the shared data as plaintext in the cloud storage and protect them using an appropriate access control would be a nice solution. This is assuming that the cloud is fully trusted for not leaking any information, which is impractical as the cloud …
Storm The Capitol: Linking Offline Political Speech And Online Twitter Extra-Representational Participation On Qanon And The January 6 Insurrection, Claire Seungeun Lee, Juan Merizalde, John D. Colautti, Jisun An, Haewoon Kwak
Storm The Capitol: Linking Offline Political Speech And Online Twitter Extra-Representational Participation On Qanon And The January 6 Insurrection, Claire Seungeun Lee, Juan Merizalde, John D. Colautti, Jisun An, Haewoon Kwak
Research Collection School Of Computing and Information Systems
The transfer of power stemming from the 2020 presidential election occurred during an unprecedented period in United States history. Uncertainty from the COVID-19 pandemic, ongoing societal tensions, and a fragile economy increased societal polarization, exacerbated by the outgoing president's offline rhetoric. As a result, online groups such as QAnon engaged in extra political participation beyond the traditional platforms. This research explores the link between offline political speech and online extra-representational participation by examining Twitter within the context of the January 6 insurrection. Using a mixed-methods approach of quantitative and qualitative thematic analyses, the study combines offline speech information with Twitter …
Unified And Incremental Simrank: Index-Free Approximation With Scheduled Principle (Extended Abstract), Fanwei Zhu, Yuan Fang, Kai Zhang, Kevin Chen-Chuan Chang, Hongtai Cao, Zhen Jiang, Minghui Wu
Unified And Incremental Simrank: Index-Free Approximation With Scheduled Principle (Extended Abstract), Fanwei Zhu, Yuan Fang, Kai Zhang, Kevin Chen-Chuan Chang, Hongtai Cao, Zhen Jiang, Minghui Wu
Research Collection School Of Computing and Information Systems
SimRank is a popular link-based similarity measure on graphs. It enables a variety of applications with different modes of querying. In this paper, we propose UISim, a unified and incremental framework for all SimRank modes based on a scheduled approximation principle. UISim processes queries with incremental and prioritized exploration of the entire computation space, and thus allows flexible tradeoff of time and accuracy. On the other hand, it creates and shares common “building blocks” for online computation without relying on indexes, and thus is efficient to handle both static and dynamic graphs. Our experiments on various real-world graphs show that …
Xai4fl: Enhancing Spectrum-Based Fault Localization With Explainable Artificial Intelligence, Ratnadira Widyasari, Gede Artha Azriadi Prana, Stefanus Agus Haryono, Yuan Tian, Hafil Noer Zachiary, David Lo
Xai4fl: Enhancing Spectrum-Based Fault Localization With Explainable Artificial Intelligence, Ratnadira Widyasari, Gede Artha Azriadi Prana, Stefanus Agus Haryono, Yuan Tian, Hafil Noer Zachiary, David Lo
Research Collection School Of Computing and Information Systems
Manually finding the program unit (e.g., class, method, or statement) responsible for a fault is tedious and time-consuming. To mitigate this problem, many fault localization techniques have been proposed. A popular family of such techniques is spectrum-based fault localization (SBFL), which takes program execution traces (spectra) of failed and passed test cases as input and applies a ranking formula to compute a suspiciousness score for each program unit. However, most existing SBFL techniques fail to consider two facts: 1) not all failed test cases contribute equally to a considered fault(s), and 2) program units collaboratively contribute to the failure/pass of …
Detecting False Alarms From Automatic Static Analysis Tools: How Far Are We?, Hong Jin Kang, Khai Loong Aw, David Lo
Detecting False Alarms From Automatic Static Analysis Tools: How Far Are We?, Hong Jin Kang, Khai Loong Aw, David Lo
Research Collection School Of Computing and Information Systems
Automatic static analysis tools (ASATs), such as Findbugs, have a high false alarm rate. The large number of false alarms produced poses a barrier to adoption. Researchers have proposed the use of machine learning to prune false alarms and present only actionable warnings to developers. The state-of-the-art study has identified a set of “Golden Features” based on metrics computed over the characteristics and history of the file, code, and warning. Recent studies show that machine learning using these features is extremely effective and that they achieve almost perfect performance. We perform a detailed analysis to better understand the strong performance …
An Exploratory Study On Code Attention In Bert, Rishab Sharma, Fuxiang Chen, Fatemeh H. Fard, David Lo
An Exploratory Study On Code Attention In Bert, Rishab Sharma, Fuxiang Chen, Fatemeh H. Fard, David Lo
Research Collection School Of Computing and Information Systems
Many recent models in software engineering introduced deep neural models based on the Transformer architecture or use transformerbased Pre-trained Language Models (PLM) trained on code. Although these models achieve the state of the arts results in many downstream tasks such as code summarization and bug detection, they are based on Transformer and PLM, which are mainly studied in the Natural Language Processing (NLP) field. The current studies rely on the reasoning and practices from NLP for these models in code, despite the differences between natural languages and programming languages. There is also limited literature on explaining how code is modeled. …
Learning Semantically Rich Network-Based Multi-Modal Mobile User Interface Embeddings, Meng Kiat Gary Ang, Ee-Peng Lim
Learning Semantically Rich Network-Based Multi-Modal Mobile User Interface Embeddings, Meng Kiat Gary Ang, Ee-Peng Lim
Research Collection School Of Computing and Information Systems
Semantically rich information from multiple modalities - text, code, images, categorical and numerical data - co-exist in the user interface (UI) design of mobile applications. Moreover, each UI design is composed of inter-linked UI entities which support different functions of an application, e.g., a UI screen comprising a UI taskbar, a menu and multiple button elements. Existing UI representation learning methods unfortunately are not designed to capture multi-modal and linkage structure between UI entities. To support effective search and recommendation applications over mobile UIs, we need UI representations that integrate latent semantics present in both multi-modal information and linkages between …
Indoor Localization Using Solar Cells, Hamada Rizk, Dong Ma, Mahbub Hassan, Moustafa Youssef
Indoor Localization Using Solar Cells, Hamada Rizk, Dong Ma, Mahbub Hassan, Moustafa Youssef
Research Collection School Of Computing and Information Systems
The development of the Internet of Things (IoT) opens the doors for innovative solutions in indoor positioning systems. Recently, light-based positioning has attracted much attention due to the dense and pervasive nature of light sources (e.g., Light-emitting Diode lighting) in indoor environments. Nevertheless, most existing solutions necessitate carrying a high-end phone at hand in a specific orientation to detect the light intensity with the phone's light sensing capability (i.e., light sensor or camera). This limits the ease of deployment of these solutions and leads to drainage of the phone battery. We propose PVDeepLoc, a device-free light-based indoor localization system that …