Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (7226)
- Databases and Information Systems (2961)
- Software Engineering (1895)
- Artificial Intelligence and Robotics (1081)
- Numerical Analysis and Scientific Computing (963)
-
- Information Security (937)
- Engineering (795)
- Social and Behavioral Sciences (773)
- Graphics and Human Computer Interfaces (676)
- Business (671)
- Theory and Algorithms (454)
- Computer Engineering (410)
- Operations Research, Systems Engineering and Industrial Engineering (366)
- Programming Languages and Compilers (310)
- Communication (301)
- OS and Networks (300)
- Social Media (244)
- Public Affairs, Public Policy and Public Administration (203)
- Environmental Sciences (168)
- Data Storage Systems (164)
- Medicine and Health Sciences (163)
- Transportation (163)
- International and Area Studies (153)
- Management Information Systems (153)
- Asian Studies (151)
- Education (145)
- Technology and Innovation (126)
- E-Commerce (120)
- Finance and Financial Management (98)
- Keyword
-
- Deep learning (109)
- Machine learning (105)
- Artificial intelligence (77)
- Singapore (76)
- Social media (73)
-
- Data mining (62)
- Cloud computing (57)
- Reinforcement learning (54)
- Optimization (51)
- Security (51)
- Privacy (50)
- Twitter (49)
- Online learning (48)
- Software engineering (47)
- Visualization (46)
- Deep Learning (45)
- Empirical study (45)
- Neural networks (45)
- Task analysis (44)
- Access control (41)
- Feature extraction (41)
- Algorithms (40)
- Blockchain (39)
- Semantics (39)
- Sustainability (39)
- Classification (38)
- Android (35)
- Anomaly detection (35)
- Clustering (35)
- Collaboration (35)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (6891)
- Dissertations and Theses Collection (Open Access) (128)
- Research Collection Lee Kong Chian School Of Business (94)
- Research Collection School of Social Sciences (48)
- Research Collection College of Integrative Studies (44)
-
- Perspectives@SMU (38)
- Asian Management Insights (35)
- Research Collection Yong Pung How School Of Law (30)
- Research Collection School Of Accountancy (23)
- Research Collection School Of Economics (22)
- Dissertations and Theses Collection (15)
- SMU Press Releases (12)
- MITB Thought Leadership Series (11)
- Research@SMU: Connecting the Dots (10)
- Research Collection School of Computing and Information Systems (9)
- LARC Research Publications (7)
- Research Collection Library (6)
- Social Space (5)
- SMU Research Data (4)
- Sim Kee Boon Institute for Financial Economics (4)
- 2024 AI for Research Week (3)
- Centre for Computational Law (3)
- CMP Research (2)
- Centre for AI & Data Governance (2)
- Research Collection Office of Research (2)
- Library Events (1)
- Oral History Collection (1)
- ROSA Journal Articles and Publications (1)
- Research Collection School of Accountancy (1)
- Research@SMU Infographics (1)
- Publication Type
- File Type
Articles 1291 - 1320 of 7453
Full-Text Articles in Physical Sciences and Mathematics
Verifiable Searchable Encryption Framework Against Insider Keyword-Guessing Attack In Cloud Storage, Yinbin Miao, Robert H. Deng, Kim-Kwang Raymond Choo, Ximeng Liu, Hongwei Li
Verifiable Searchable Encryption Framework Against Insider Keyword-Guessing Attack In Cloud Storage, Yinbin Miao, Robert H. Deng, Kim-Kwang Raymond Choo, Ximeng Liu, Hongwei Li
Research Collection School Of Computing and Information Systems
Searchable encryption (SE) allows cloud tenants to retrieve encrypted data while preserving data confidentiality securely. Many SE solutions have been designed to improve efficiency and security, but most of them are still susceptible to insider Keyword-Guessing Attacks (KGA), which implies that the internal attackers can guess the candidate keywords successfully in an off-line manner. Also in existing SE solutions, a semi-honest-but-curious cloud server may deliver incorrect search results by performing only a fraction of retrieval operations honestly (e.g., to save storage space). To address these two challenging issues, we first construct the basic Verifiable SE Framework (VSEF), which can withstand …
Chosen-Instruction Attack Against Commercial Code Virtualization Obfuscators, Shijia Li, Chunfu Jia, Pengda Qiu, Qiyuan Chen, Jiang Ming, Debin Gao
Chosen-Instruction Attack Against Commercial Code Virtualization Obfuscators, Shijia Li, Chunfu Jia, Pengda Qiu, Qiyuan Chen, Jiang Ming, Debin Gao
Research Collection School Of Computing and Information Systems
—Code virtualization is a well-known sophisticated obfuscation technique that uses custom virtual machines (VM) to emulate the semantics of original native instructions. Commercial VM-based obfuscators (e.g., Themida and VMProtect) are often abused by malware developers to conceal malicious behaviors. Since the internal mechanism of commercial obfuscators is a black box, it is a daunting challenge for the analyst to understand the behavior of virtualized programs. To figure out the code virtualization mechanism and design deobfuscation techniques, the analyst has to perform reverse-engineering on large-scale highly obfuscated programs. This knowledge learning process suffers from painful cost and imprecision. In this project, …
On Size-Oriented Long-Tailed Graph Classification Of Graph Neural Networks, Zemin Liu, Qiheng Mao, Chenghao Liu, Yuan Fang, Jianling Sun
On Size-Oriented Long-Tailed Graph Classification Of Graph Neural Networks, Zemin Liu, Qiheng Mao, Chenghao Liu, Yuan Fang, Jianling Sun
Research Collection School Of Computing and Information Systems
The prevalence of graph structures attracts a surge of investigation on graph data, enabling several downstream tasks such as multigraph classification. However, in the multi-graph setting, graphs usually follow a long-tailed distribution in terms of their sizes, i.e., the number of nodes. In particular, a large fraction of tail graphs usually have small sizes. Though recent graph neural networks (GNNs) can learn powerful graph-level representations, they treat the graphs uniformly and marginalize the tail graphs which suffer from the lack of distinguishable structures, resulting in inferior performance on tail graphs. To alleviate this concern, in this paper we propose a …
Chatbot4qr: Interactive Query Refinement For Technical Question Retrieval, Neng Zhang, Qiao Huang, Xin Xia, Ying Zou, David Lo, Zhenchang Xing
Chatbot4qr: Interactive Query Refinement For Technical Question Retrieval, Neng Zhang, Qiao Huang, Xin Xia, Ying Zou, David Lo, Zhenchang Xing
Research Collection School Of Computing and Information Systems
Technical Q&A sites (e.g., Stack Overflow(SO)) are important resources for developers to search for knowledge about technical problems. Search engines provided in Q&A sites and information retrieval approaches have limited capabilities to retrieve relevant questions when queries are imprecisely specified, such as missing important technical details (e.g., the user's preferred programming languages). Although many automatic query expansion approaches have been proposed to improve the quality of queries by expanding queries with relevant terms, the information missed is not identified. Moreover, without user involvement, the existing query expansion approaches may introduce unexpected terms and lead to undesired results. In this paper, …
Securead: A Secure Video Anomaly Detection Framework On Convolutional Neural Network In Edge Computing Environment, Hang Cheng, Ximeng Liu, Huaxiong Wang, Yan Fang, Meiqing Wang, Xiaopeng Zhao
Securead: A Secure Video Anomaly Detection Framework On Convolutional Neural Network In Edge Computing Environment, Hang Cheng, Ximeng Liu, Huaxiong Wang, Yan Fang, Meiqing Wang, Xiaopeng Zhao
Research Collection School Of Computing and Information Systems
Anomaly detection offers a powerful approach to identifying unusual activities and uncommon behaviors in real-world video scenes. At present, convolutional neural networks (CNN) have been widely used to tackle anomalous events detection, which mainly rely on its stronger ability of feature representation than traditional hand-crafted features. However, massive video data and high cost of CNN model training are a challenge to achieve satisfactory detection results for resource-limited users. In this paper, we propose a secure video anomaly detection framework (SecureAD) based on CNN. Specifically, we introduce additive secret sharing to design several calculation protocols for achieving safe CNN training and …
Downscaling Of Physical Risks For Climate Scenario Design, Enrico Biffis, Shuai Wang
Downscaling Of Physical Risks For Climate Scenario Design, Enrico Biffis, Shuai Wang
Sim Kee Boon Institute for Financial Economics
Southeast Asia is arguably one of the areas most vulnerable to natural disasters due to its dense population, coastal urbanization, and rainfall variability driven by the local monsoon systems. In this report, we focus on the impact of global warming in the region along four climate dimensions: temperature, precipitation, wind speed and coastal surge. The latter represents the surge of water from the ocean in excess of astronomical tides. Our objective is to downscale the outputs of global climate models to temporal and spatial resolutions of interest to market participants wishing to quantify climate risk vulnerability via climate stress testing …
Improving Feature Generalizability With Multitask Learning In Class Incremental Learning, Dong Ma, Chi Ian Tang, Cecilia Mascolo
Improving Feature Generalizability With Multitask Learning In Class Incremental Learning, Dong Ma, Chi Ian Tang, Cecilia Mascolo
Research Collection School Of Computing and Information Systems
Many deep learning applications, like keyword spotting [1], [2], require the incorporation of new concepts (classes) over time, referred to as Class Incremental Learning (CIL). The major challenge in CIL is catastrophic forgetting, i.e., preserving as much of the old knowledge as possible while learning new tasks. Various techniques, such as regularization, knowledge distillation, and the use of exemplars, have been proposed to resolve this issue. However, prior works primarily focus on the incremental learning step, while ignoring the optimization during the base model training. We hypothesise that a more transferable and generalizable feature representation from the base model would …
Immersivepov: Filming How-To Videos With A Head-Mounted 360° Action Camera, Kevin Huang, Jiannan Li, Maurício Sousa, Tovi Grossman
Immersivepov: Filming How-To Videos With A Head-Mounted 360° Action Camera, Kevin Huang, Jiannan Li, Maurício Sousa, Tovi Grossman
Research Collection School Of Computing and Information Systems
How-to videos are often shot using camera angles that may not be optimal for learning motor tasks, with a prevalent use of third-person perspective. We present immersivePOV, an approach to film how-to videos from an immersive first-person perspective using a head-mounted 360° action camera. immersivePOV how-to videos can be viewed in a Virtual Reality headset, giving the viewer an eye-level viewpoint with three Degrees of Freedom. We evaluated our approach with two everyday motor tasks against a baseline first-person perspective and a third-person perspective. In a between-subjects study, participants were assigned to watch the task videos and then replicate the …
Metaheuristics For Time-Dependent Vehicle Routing Problem With Time Windows, Yun-C Liang, Vanny Minanda, Aldy Gunawan, Hsiang-L. Chen
Metaheuristics For Time-Dependent Vehicle Routing Problem With Time Windows, Yun-C Liang, Vanny Minanda, Aldy Gunawan, Hsiang-L. Chen
Research Collection School Of Computing and Information Systems
Vehicle routing problem (VRP), a combinatorial problem, deals with the vehicle’s capacity visiting a particular set of nodes while its variants attempt to fit real-world scenarios. Our study aims to minimise total travelling time, total distance, and the number of vehicles under time-dependent and time windows constraints (TDVRPTW). The harmony search algorithm (HSA) focuses on the harmony memory and pitch adjustment mechanism for new solution construction. Several local search operators and a roulette wheel for the performance improvement were verified via 56 Solomon’s VRP instances by adding a speed matrix. The performance comparison with a genetic algorithm (GA) was completed …
Trend: Temporal Event And Node Dynamics For Graph Representation Learning, Zhihao Wen, Yuan Fang
Trend: Temporal Event And Node Dynamics For Graph Representation Learning, Zhihao Wen, Yuan Fang
Research Collection School Of Computing and Information Systems
Temporal graph representation learning has drawn significant attention for the prevalence of temporal graphs in the real world. However, most existing works resort to taking discrete snapshots of the temporal graph, or are not inductive to deal with new nodes, or do not model the exciting effects which is the ability of events to influence the occurrence of another event. In this work, We propose TREND, a novel framework for temporal graph representation learning, driven by TempoRal Event and Node Dynamics and built upon a Hawkes process-based graph neural network (GNN). TREND presents a few major advantages: (1) it is …
Gesturelens: Visual Analysis Of Gestures In Presentation Videos, Haipeng Zeng, Xingbo Wang, Yong Wang, Aoyu Wu, Ting Chuen Pong, Huamin Qu
Gesturelens: Visual Analysis Of Gestures In Presentation Videos, Haipeng Zeng, Xingbo Wang, Yong Wang, Aoyu Wu, Ting Chuen Pong, Huamin Qu
Research Collection School Of Computing and Information Systems
Appropriate gestures can enhance message delivery and audience engagement in both daily communication and public presentations. In this paper, we contribute a visual analytic approach that assists professional public speaking coaches in improving their practice of gesture training through analyzing presentation videos. Manually checking and exploring gesture usage in the presentation videos is often tedious and time-consuming. There lacks an efficient method to help users conduct gesture exploration, which is challenging due to the intrinsically temporal evolution of gestures and their complex correlation to speech content. In this paper, we propose GestureLens, a visual analytics system to facilitate gesture-based and …
Computableviz: Mathematical Operators As A Formalism For Visualization Processing And Analysis, Aoyu Wu, Wai Tong, Haotian Li, Dominik Moritz, Yong Wang, Huamin. Qu
Computableviz: Mathematical Operators As A Formalism For Visualization Processing And Analysis, Aoyu Wu, Wai Tong, Haotian Li, Dominik Moritz, Yong Wang, Huamin. Qu
Research Collection School Of Computing and Information Systems
Data visualizations are created and shared on the web at an unprecedented speed, raising new needs and questions for processing and analyzing visualizations after they have been generated and digitized. However, existing formalisms focus on operating on a single visualization instead of multiple visualizations, making it challenging to perform analysis tasks such as sorting and clustering visualizations. Through a systematic analysis of previous work, we abstract visualization-related tasks into mathematical operators such as union and propose a design space of visualization operations. We realize the design by developing ComputableViz, a library that supports operations on multiple visualization specifications. To demonstrate …
Victor: An Implicit Approach To Mitigate Misinformation Via Continuous Verification Reading, Kuan-Chieh Lo, Shih-Chieh Dai, Aiping Xiong, Jing Jiang, Lun-Wei Ku
Victor: An Implicit Approach To Mitigate Misinformation Via Continuous Verification Reading, Kuan-Chieh Lo, Shih-Chieh Dai, Aiping Xiong, Jing Jiang, Lun-Wei Ku
Research Collection School Of Computing and Information Systems
We design and evaluate VICTOR, an easy-to-apply module on top of a recommender system to mitigate misinformation. VICTOR takes an elegant, implicit approach to deliver fake-news verifications, such that readers of fake news can continuously access more verified news articles about fake-news events without explicit correction. We frame fake-news intervention within VICTOR as a graph-based question-answering (QA) task, with Q as a fake-news article and A as the corresponding verified articles. Specifically, VICTOR adopts reinforcement learning: it first considers fake-news readers’ preferences supported by underlying news recommender systems and then directs their reading sequence towards the verified news articles. To …
Surveying Structural Complexity In Quantum Many-Body Systems, Whei Yeap Suen, Thomas J. Elliott, Jayne Thompson, Andrew J. P. Garner, John R. Mahoney, Vlatko Vedral, Mile Gu
Surveying Structural Complexity In Quantum Many-Body Systems, Whei Yeap Suen, Thomas J. Elliott, Jayne Thompson, Andrew J. P. Garner, John R. Mahoney, Vlatko Vedral, Mile Gu
Research Collection School Of Computing and Information Systems
Quantum many-body systems exhibit a rich and diverse range of exotic behaviours, owing to their underlying non-classical structure. These systems present a deep structure beyond those that can be captured by measures of correlation and entanglement alone. Using tools from complexity science, we characterise such structure. We investigate the structural complexities that can be found within the patterns that manifest from the observational data of these systems. In particular, using two prototypical quantum many-body systems as test cases-the one-dimensional quantum Ising and Bose-Hubbard models-we explore how different information-theoretic measures of complexity are able to identify different features of such patterns. …
Sibnet: Food Instance Counting And Segmentation, Huu-Thanh. Nguyen, Chong-Wah Ngo, Wing-Kwong Chan
Sibnet: Food Instance Counting And Segmentation, Huu-Thanh. Nguyen, Chong-Wah Ngo, Wing-Kwong Chan
Research Collection School Of Computing and Information Systems
Food computing has recently attracted considerable research attention due to its significance for health risk analysis. In the literature, the majority of research efforts are dedicated to food recognition. Relatively few works are conducted for food counting and segmentation, which are essential for portion size estimation. This paper presents a deep neural network, named SibNet, for simultaneous counting and extraction of food instances from an image. The problem is challenging due to varying size and shape of food as well as arbitrary viewing angle of camera, not to mention that food instances often occlude each other. SibNet is novel for …
Comai: Enabling Lightweight, Collaborative Intelligence By Retrofitting Vision Dnns, Kasthuri Jayarajah, Dhanuja Wanniarachchige, Tarek Abdelzaher, Archan Misra
Comai: Enabling Lightweight, Collaborative Intelligence By Retrofitting Vision Dnns, Kasthuri Jayarajah, Dhanuja Wanniarachchige, Tarek Abdelzaher, Archan Misra
Research Collection School Of Computing and Information Systems
While Deep Neural Network (DNN) models have transformed machine vision capabilities, their extremely high computational complexity and model sizes present a formidable deployment roadblock for AIoT applications. We show that the complexity-vs-accuracy-vs-communication tradeoffs for such DNN models can be significantly addressed via a novel, lightweight form of “collaborative machine intelligence” that requires only runtime changes to the inference process. In our proposed approach, called ComAI, the DNN pipelines of different vision sensors share intermediate processing state with one another, effectively providing hints about objects located within their mutually-overlapping Field-of-Views (FoVs). CoMAI uses two novel techniques: (a) a secondary shallow ML …
Resil: Revivifying Function Signature Inference Using Deep Learning With Domain-Specific Knowledge, Yan Lin, Debin Gao, David Lo
Resil: Revivifying Function Signature Inference Using Deep Learning With Domain-Specific Knowledge, Yan Lin, Debin Gao, David Lo
Research Collection School Of Computing and Information Systems
Function signature recovery is important for binary analysis and security enhancement, such as bug finding and control-flow integrity enforcement. However, binary executables typically have crucial information vital for function signature recovery stripped off during compilation. To make things worse, recent studies show that many compiler optimization strategies further complicate the recovery of function signatures with intended violations to function calling conventions.In this paper, we first perform a systematic study to quantify the extent to which compiler optimizations (negatively) impact the accuracy of existing deep learning techniques for function signature recovery. Our experiments show that a state-of-the-art deep learning technique has …
User Satisfaction Estimation With Sequential Dialogue Act Modeling In Goal-Oriented Conversational Systems, Yang Deng, Wenxuan Zhang, Wai Lam, Hong Cheng, Helen Meng
User Satisfaction Estimation With Sequential Dialogue Act Modeling In Goal-Oriented Conversational Systems, Yang Deng, Wenxuan Zhang, Wai Lam, Hong Cheng, Helen Meng
Research Collection School Of Computing and Information Systems
User Satisfaction Estimation (USE) is an important yet challenging task in goal-oriented conversational systems. Whether the user is satisfied with the system largely depends on the fulfillment of the user’s needs, which can be implicitly reflected by users’ dialogue acts. However, existing studies often neglect the sequential transitions of dialogue act or rely heavily on annotated dialogue act labels when utilizing dialogue acts to facilitate USE. In this paper, we propose a novel framework, namely USDA, to incorporate the sequential dynamics of dialogue acts for predicting user satisfaction, by jointly learning User Satisfaction Estimation and Dialogue Act Recognition tasks. In …
Trust In Robotics: A Multi-Staged Decision-Making Approach To Robots In Community, Wenxi Zhang, Willow Wong, Mark Findlay
Trust In Robotics: A Multi-Staged Decision-Making Approach To Robots In Community, Wenxi Zhang, Willow Wong, Mark Findlay
Centre for AI & Data Governance
Pivoting on the desired outcome of social good within the wider robotics ecosystem, trust is identified as the central adhesive of the HRI interface. However, building trust between humans and robots involves more than improving the machine’s technical reliability or trustworthiness in function. This paper presents a holistic, community-based approach to trust-building, where trust is understood as a multifaceted and multi-staged looped relation that depends heavily on context and human perceptions. Building on past literature that identifies dispositional and learned stages of trust, our proposed Decision to Trust model considers more extensively the human and situational factors influencing how trust …
Learning Program Semantics With Code Representations: An Empirical Study, Jing Kai Siow, Shangqing Liu, Xiaofei Xie, Guozhu Meng, Yang Liu
Learning Program Semantics With Code Representations: An Empirical Study, Jing Kai Siow, Shangqing Liu, Xiaofei Xie, Guozhu Meng, Yang Liu
Research Collection School Of Computing and Information Systems
Program semantics learning is the core and fundamental for various code intelligent tasks e.g., vulnerability detection, clone detection. A considerable amount of existing works propose diverse approaches to learn the program semantics for different tasks and these works have achieved state-of-the-art performance. However, currently, a comprehensive and systematic study on evaluating different program representation techniques across diverse tasks is still missed. From this starting point, in this paper, we conduct an empirical study to evaluate different program representation techniques. Specifically, we categorize current mainstream code representation techniques into four categories i.e., Feature-based, Sequence-based, Tree-based, and Graph-based program representation technique and …
State Graph Reasoning For Multimodal Conversational Recommendation, Yuxia Wu, Lizi Liao, Gangyi Zhang, Wenqiang Lei, Guoshuai Zhao, Xueming Qian, Tat-Seng Chua
State Graph Reasoning For Multimodal Conversational Recommendation, Yuxia Wu, Lizi Liao, Gangyi Zhang, Wenqiang Lei, Guoshuai Zhao, Xueming Qian, Tat-Seng Chua
Research Collection School Of Computing and Information Systems
Conversational recommendation system (CRS) attracts increasing attention in various application domains such as retail and travel. It offers an effective way to capture users’ dynamic preferences with multi-turn conversations. However, most current studies center on the recommendation aspect while over-simplifying the conversation process. The negligence of complexity in data structure and conversation flow hinders their practicality and utility. In reality, there exist various relationships among slots and values, while users’ requirements may dynamically adjust or change. Moreover, the conversation often involves visual modality to facilitate the conversation. These actually call for a more advanced internal state representation of the dialogue …
Revisiting Neuron Coverage Metrics And Quality Of Deep Neural Networks, Zhou Yang, Jieke Shi, Muhammad Hilmi Asyrofi, David Lo
Revisiting Neuron Coverage Metrics And Quality Of Deep Neural Networks, Zhou Yang, Jieke Shi, Muhammad Hilmi Asyrofi, David Lo
Research Collection School Of Computing and Information Systems
Deep neural networks (DNN) have been widely applied in modern life, including critical domains like autonomous driving, making it essential to ensure the reliability and robustness of DNN-powered systems. As an analogy to code coverage metrics for testing conventional software, researchers have proposed neuron coverage metrics and coverage-driven methods to generate DNN test cases. However, Yan et al. doubt the usefulness of existing coverage criteria in DNN testing. They show that a coverage-driven method is less effective than a gradient-based method in terms of both uncovering defects and improving model robustness. In this paper, we conduct a replication study of …
On The Influence Of Biases In Bug Localization: Evaluation And Benchmark, Ratnadira Widyasari, Stefanus Agus Haryono, Ferdian Thung, Jieke Shi, Constance Tan, Fiona Wee, Jack Phan, David Lo
On The Influence Of Biases In Bug Localization: Evaluation And Benchmark, Ratnadira Widyasari, Stefanus Agus Haryono, Ferdian Thung, Jieke Shi, Constance Tan, Fiona Wee, Jack Phan, David Lo
Research Collection School Of Computing and Information Systems
Bug localization is the task of identifying parts of thesource code that needs to be changed to resolve a bug report.As this task is difficult, automatic bug localization tools havebeen proposed. The development and evaluation of these toolsrely on the availability of high-quality bug report datasets. In2014, Kochhar et al. identified three biases in datasets used toevaluate bug localization techniques: (1) misclassified bug report,(2) already localized bug report, and (3) incorrect ground truthfile in a bug report. They reported that already localized bugreports statistically significantly and substantially impact buglocalization results, and thus should be removed. However, theirevaluation is still limited, …
Interpretable Knowledge Tracing: Simple And Efficient Student Modeling With Causal Relations, Sein Minn, Jill-Jênn Vie, Koh Takeuchi, Feida Zhu
Interpretable Knowledge Tracing: Simple And Efficient Student Modeling With Causal Relations, Sein Minn, Jill-Jênn Vie, Koh Takeuchi, Feida Zhu
Research Collection School Of Computing and Information Systems
Intelligent Tutoring Systems have become critically important in future learning environments. Knowledge Tracing (KT) is a crucial part of that system. It is about inferring the skill mastery of students and predicting their performance to adjust the curriculum accordingly. Deep Learning based models like Deep Knowledge Tracing (DKT) and Dynamic Key-Value Memory Network (DKVMN) have shown significant predictive performance compared with traditional models like Bayesian Knowledge Tracing (BKT) and Performance Factors Analysis (PFA). However, it is difficult to extract psychologically meaningful explanations from the tens of thousands of parameters in neural networks, that would relate to cognitive theory. There are …
Heterogeneous Attentions For Solving Pickup And Delivery Problem Via Deep Reinforcement Learning, Jingwen Li, Liang Xin, Zhiguang Cao, Andrew Lim, Wen Song, Jie Zhang
Heterogeneous Attentions For Solving Pickup And Delivery Problem Via Deep Reinforcement Learning, Jingwen Li, Liang Xin, Zhiguang Cao, Andrew Lim, Wen Song, Jie Zhang
Research Collection School Of Computing and Information Systems
Recently, there is an emerging trend to apply deep reinforcement learning to solve the vehicle routing problem (VRP), where a learnt policy governs the selection of next node for visiting. However, existing methods could not handle well the pairing and precedence relationships in the pickup and delivery problem (PDP), which is a representative variant of VRP. To address this challenging issue, we leverage a novel neural network integrated with a heterogeneous attention mechanism to empower the policy in deep reinforcement learning to automatically select the nodes. In particular, the heterogeneous attention mechanism specifically prescribes attentions for each role of the …
Estimating Financial Information Asymmetry In Real Estate Transactions In China: An Application Of Two-Tier Frontier Model, Ganlin Pu, Ying Zhang, Li-Chen Chou
Estimating Financial Information Asymmetry In Real Estate Transactions In China: An Application Of Two-Tier Frontier Model, Ganlin Pu, Ying Zhang, Li-Chen Chou
Research Collection School Of Computing and Information Systems
This study applies the two-tier stochastic frontier model to estimate the distribution of housing transaction information in Hangzhou, Wenzhou, Ningbo, and Jinhua (four cities in Zhejiang Province, China) during the year 2018, to analyze the difference in the price information acquired by the buyers and sellers in the transaction, and the effect of information asymmetry on the transaction price. The empirical results show that in each city, during the housing transaction process, the supplier has more complete information about house prices than consumers, and can therefore implement price discrimination strategies in setting service prices. Due to the disadvantage in acquired …
The Impact Of Ride-Hail Surge Factors On Taxi Bookings, Sumit Agarwal, Ben Charoenwong, Shih-Fen Cheng, Jussi Keppo
The Impact Of Ride-Hail Surge Factors On Taxi Bookings, Sumit Agarwal, Ben Charoenwong, Shih-Fen Cheng, Jussi Keppo
Research Collection School Of Computing and Information Systems
We study the role of ride-hailing surge factors on the allocative efficiency of taxis by combining a reduced-form estimation with structural analyses using machine-learning-based demand predictions. Where other research study the effect of entry on incumbent taxis, we use higher frequency granular data to study how location-time-specific surge factors affect taxi bookings to bound the effect of customer decisions while accounting for various confounding variables. We find that even in a unique market like Singapore, where incumbent taxi companies have app-based booking systems similar to those from ride-hailing companies like Uber, the estimated upper bound on the cross-platform substitution between …
Deep Learning For Anomaly Detection: A Review, Guansong Pang, Chunhua Shen, Longbing Cao, Anton Van Den Hengel
Deep Learning For Anomaly Detection: A Review, Guansong Pang, Chunhua Shen, Longbing Cao, Anton Van Den Hengel
Research Collection School Of Computing and Information Systems
Anomaly detection, a.k.a. outlier detection or novelty detection, has been a lasting yet active research area in various research communities for several decades. There are still some unique problem complexities and challenges that require advanced approaches. In recent years, deep learning enabled anomaly detection, i.e., deep anomaly detection, has emerged as a critical direction. This article surveys the research of deep anomaly detection with a comprehensive taxonomy, covering advancements in 3 high-level categories and 11 fine-grained categories of the methods. We review their key intuitions, objective functions, underlying assumptions, advantages, and disadvantages and discuss how they address the aforementioned challenges. …
Androevolve: Automated Android Api Update With Data Flow Analysis And Variable Denormalization, Stefanus A. Haryono, Ferdian Thung, David Lo, Lingxiao Jiang, Julia Lawall, Hong Jin Kang, Lucas Serrano, Gilles Muller
Androevolve: Automated Android Api Update With Data Flow Analysis And Variable Denormalization, Stefanus A. Haryono, Ferdian Thung, David Lo, Lingxiao Jiang, Julia Lawall, Hong Jin Kang, Lucas Serrano, Gilles Muller
Research Collection School Of Computing and Information Systems
The Android operating system is frequently updated, with each version bringing a new set of APIs. New versions may involve API deprecation; Android apps using deprecated APIs need to be updated to ensure the apps’ compatibility with old and new Android versions. Updating deprecated APIs is a time-consuming endeavor. Hence, automating the updates of Android APIs can be beneficial for developers. CocciEvolve is the state-of-the-art approach for this automation. However, it has several limitations, including its inability to resolve out-of-method variables and the low code readability of its updates due to the addition of temporary variables. In an attempt to …
Analyzing The Impact Of Digital Payment On Efficiency And Productivity Of Commercial Banks: A Case Study In China, Haopeng Wang, Aldy Gunawan
Analyzing The Impact Of Digital Payment On Efficiency And Productivity Of Commercial Banks: A Case Study In China, Haopeng Wang, Aldy Gunawan
Research Collection School Of Computing and Information Systems
Digital payment has become one of the most popular payment methods all around the world, especially in countries that witnessed the rapid development of internet. As a traditional financial institution, commercial banks have been impacted by newly developed payment technology since third payment platforms have attracted customers to use the digital payment for daily consumption, transferring, and even investment. This paper focuses on analyzing whether and how the commercial banks in China have been affected by digital payment by using empirical methods. Systematic Generalized Method of Moments (SYS-GMM) is used to test the relationship between the productivity of commercial banks …