Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (7226)
- Databases and Information Systems (2961)
- Software Engineering (1895)
- Artificial Intelligence and Robotics (1081)
- Numerical Analysis and Scientific Computing (963)
-
- Information Security (937)
- Engineering (795)
- Social and Behavioral Sciences (774)
- Graphics and Human Computer Interfaces (676)
- Business (671)
- Theory and Algorithms (454)
- Computer Engineering (410)
- Operations Research, Systems Engineering and Industrial Engineering (366)
- Programming Languages and Compilers (310)
- Communication (301)
- OS and Networks (300)
- Social Media (244)
- Public Affairs, Public Policy and Public Administration (203)
- Environmental Sciences (169)
- Data Storage Systems (164)
- Medicine and Health Sciences (163)
- Transportation (163)
- International and Area Studies (153)
- Management Information Systems (153)
- Asian Studies (151)
- Education (145)
- Technology and Innovation (126)
- E-Commerce (120)
- Finance and Financial Management (98)
- Keyword
-
- Deep learning (109)
- Machine learning (105)
- Artificial intelligence (77)
- Singapore (77)
- Social media (73)
-
- Data mining (62)
- Cloud computing (57)
- Reinforcement learning (54)
- Optimization (51)
- Security (51)
- Privacy (50)
- Twitter (49)
- Online learning (48)
- Software engineering (47)
- Visualization (46)
- Deep Learning (45)
- Empirical study (45)
- Neural networks (45)
- Task analysis (44)
- Access control (41)
- Feature extraction (41)
- Algorithms (40)
- Blockchain (39)
- Semantics (39)
- Sustainability (39)
- Classification (38)
- Android (35)
- Anomaly detection (35)
- Clustering (35)
- Collaboration (35)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (6891)
- Dissertations and Theses Collection (Open Access) (128)
- Research Collection Lee Kong Chian School Of Business (94)
- Research Collection School of Social Sciences (49)
- Research Collection College of Integrative Studies (44)
-
- Perspectives@SMU (38)
- Asian Management Insights (35)
- Research Collection Yong Pung How School Of Law (30)
- Research Collection School Of Accountancy (23)
- Research Collection School Of Economics (22)
- Dissertations and Theses Collection (15)
- SMU Press Releases (12)
- MITB Thought Leadership Series (11)
- Research@SMU: Connecting the Dots (10)
- Research Collection School of Computing and Information Systems (9)
- LARC Research Publications (7)
- Research Collection Library (6)
- Social Space (5)
- SMU Research Data (4)
- Sim Kee Boon Institute for Financial Economics (4)
- 2024 AI for Research Week (3)
- Centre for Computational Law (3)
- CMP Research (2)
- Centre for AI & Data Governance (2)
- Research Collection Office of Research (2)
- Library Events (1)
- Oral History Collection (1)
- ROSA Journal Articles and Publications (1)
- Research Collection School of Accountancy (1)
- Research@SMU Infographics (1)
- Publication Type
- File Type
Articles 1951 - 1980 of 7454
Full-Text Articles in Physical Sciences and Mathematics
Adversarial Meta Sampling For Multilingual Low-Resource Speech Recognition, Yubei Xiao, Ke Gong, Pan Zhou, Guolin Zheng, Xiaodan Liang, Liang Lin
Adversarial Meta Sampling For Multilingual Low-Resource Speech Recognition, Yubei Xiao, Ke Gong, Pan Zhou, Guolin Zheng, Xiaodan Liang, Liang Lin
Research Collection School Of Computing and Information Systems
Human doctors with well-structured medical knowledge can diagnose a disease merely via a few conversations with patients about symptoms. In contrast, existing knowledgegrounded dialogue systems often require a large number of dialogue instances to learn as they fail to capture the correlations between different diseases and neglect the diagnostic experience shared among them. To address this issue, we propose a more natural and practical paradigm, i.e., low-resource medical dialogue generation, which can transfer the diagnostic experience from source diseases to target ones with a handful of data for adaptation. It is capitalized on a commonsense knowledge graph to characterize the …
Terrace-Based Food Counting And Segmentation, Huu-Thanh Nguyen, Chong-Wah Ngo
Terrace-Based Food Counting And Segmentation, Huu-Thanh Nguyen, Chong-Wah Ngo
Research Collection School Of Computing and Information Systems
This paper represents object instance as a terrace, where the height of terrace corresponds to object attention while the evolution of layers from peak to sea level represents the complexity in drawing the finer boundary of an object. A multitask neural network is presented to learn the terrace representation. The attention of terrace is leveraged for instance counting, and the layers provide prior for easy-to-hard pathway of progressive instance segmentation. We study the model for counting and segmentation for a variety of food instances, ranging from Chinese, Japanese to Western food. This paper presents how the terrace model deals with …
Norm-Based Generalisation Bounds For Deep Multi-Class Convolutional Neural Networks, Antoine Ledent, Waleed Mustafa, Yunwen Lei, Marius Kloft
Norm-Based Generalisation Bounds For Deep Multi-Class Convolutional Neural Networks, Antoine Ledent, Waleed Mustafa, Yunwen Lei, Marius Kloft
Research Collection School Of Computing and Information Systems
We show generalisation error bounds for deep learning with two main improvements over the state of the art. (1) Our bounds have no explicit dependence on the number of classes except for logarithmic factors. This holds even when formulating the bounds in terms of the Frobenius-norm of the weight matrices, where previous bounds exhibit at least a squareroot dependence on the number of classes. (2) We adapt the classic Rademacher analysis of DNNs to incorporate weight sharing—a task of fundamental theoretical importance which was previously attempted only under very restrictive assumptions. In our results, each convolutional filter contributes only once …
Divide And Capture: An Improved Cryptanalysis Of The Encryption Standard Algorithm Rsa, Willy Susilo, Joseph Tonien, Guomin Yang
Divide And Capture: An Improved Cryptanalysis Of The Encryption Standard Algorithm Rsa, Willy Susilo, Joseph Tonien, Guomin Yang
Research Collection School Of Computing and Information Systems
RSA is a well known standard algorithm used by modern computers to encrypt and decrypt messages. In some applications, to save the decryption time, it is desirable to have a short secret key d compared to the modulus N. The first significant attack that breaks RSA with short secret key given by Wiener in 1990 is based on the continued fraction technique and it works with d < 1/4 root 18 N-.(25). A decade later, in 2000, Boneh and Durfee presented an improved attack based on lattice technique which works with d < N-.(292). Until this day, Boneh-Durfee attack remain as the best attack on RSA with short secret key. In this paper, we revisit the continued fraction technique and propose a new attack on RSA. Our main result shows that when d < root t (2 root 2 + 8/3) N-.(75)/root e, where e is the public exponent and t is a chosen parameter, our attack can break the RSA with the running time of O(tlog (N)). Our attack is especially well suited for the case where e is much smaller than N. When e approximate to N, the Boneh-Durfee attack outperforms ours. As a result, we could simultaneously run both attacks, our new attack and the classical Boneh-Durfee attack as a backup.
Neural Architecture Search As Sparse Supernet, Y. Wu, A. Liu, Zhiwu Huang, S. Zhang, Gool L. Van
Neural Architecture Search As Sparse Supernet, Y. Wu, A. Liu, Zhiwu Huang, S. Zhang, Gool L. Van
Research Collection School Of Computing and Information Systems
This paper aims at enlarging the problem of Neural Architecture Search (NAS) from Single-Path and Multi-Path Search to automated Mixed-Path Search. In particular, we model the NAS problem as a sparse supernet using a new continuous architecture representation with a mixture of sparsity constraints. The sparse supernet enables us to automatically achieve sparsely-mixed paths upon a compact set of nodes. To optimize the proposed sparse supernet, we exploit a hierarchical accelerated proximal gradient algorithm within a bi-level optimization framework. Extensive experiments on Convolutional Neural Network and Recurrent Neural Network search demonstrate that the proposed method is capable of searching for …
Treecaps: Tree-Based Capsule Networks For Source Code Processing, Duy Quoc Nghi Bui, Yijun Yu, Lingxiao Jiang
Treecaps: Tree-Based Capsule Networks For Source Code Processing, Duy Quoc Nghi Bui, Yijun Yu, Lingxiao Jiang
Research Collection School Of Computing and Information Systems
Recently program learning techniques have been proposed to process source code based on syntactical structures (e.g., Abstract Syntax Trees) and/or semantic information (e.g., Dependency Graphs). While graphs may be better at capturing various viewpoints of code semantics than trees, constructing graph inputs from code need static code semantic analysis that may not be accurate and introduces noise during learning. On the other hand, syntax trees are precisely defined according to the language grammar and easier to construct and process than graphs. We propose a new tree-based learning technique, named TreeCaps, by fusing capsule networks with tree-based convolutional neural networks, to …
Mimoa: A Membrane-Inspired Multi-Objective Algorithm For Green Vehicle Routing Problem With Stochastic Demands, Yunyun Niu, Yongpeng Zhang, Zhiguang Cao, Kaizhou Gao, Jianhua Xiao, Wen Song, Fangwei Zhang
Mimoa: A Membrane-Inspired Multi-Objective Algorithm For Green Vehicle Routing Problem With Stochastic Demands, Yunyun Niu, Yongpeng Zhang, Zhiguang Cao, Kaizhou Gao, Jianhua Xiao, Wen Song, Fangwei Zhang
Research Collection School Of Computing and Information Systems
Nowadays, an increasing number of vehicle routing problem with stochastic demands (VRPSD) models have been studied to meet realistic needs in the field of logistics. In this paper, a bi-objective vehicle routing problem with stochastic demands (BO-VRPSD) was investigated, which aims to minimize total cost and customer dissatisfaction. Different from traditional vehicle routing problem (VRP) models, both the uncertainty in customer demands and the nature of multiple objectives make the problem more challenging. To cope with BO-VRPSD, a membrane-inspired multi-objective algorithm (MIMOA) was proposed, which is characterized by a parallel distributed framework with two operation subsystems and one control subsystem, …
Fine-Grained Generalization Analysis Of Vector-Valued Learning, Liang Wu, Antoine Ledent, Yunwen Lei, Marius Kloft
Fine-Grained Generalization Analysis Of Vector-Valued Learning, Liang Wu, Antoine Ledent, Yunwen Lei, Marius Kloft
Research Collection School Of Computing and Information Systems
Many fundamental machine learning tasks can be formulated as a problem of learning with vector-valued functions, where we learn multiple scalar-valued functions together. Although there is some generalization analysis on different specific algorithms under the empirical risk minimization principle, a unifying analysis of vector-valued learning under a regularization framework is still lacking. In this paper, we initiate the generalization analysis of regularized vector-valued learning algorithms by presenting bounds with a mild dependency on the output dimension and a fast rate on the sample size. Our discussions relax the existing assumptions on the restrictive constraint of hypothesis spaces, smoothness of loss …
Portfolio Diversification Using Shape-Based Clustering, Tristan Lim, Chin Sin Ong
Portfolio Diversification Using Shape-Based Clustering, Tristan Lim, Chin Sin Ong
Research Collection School Of Computing and Information Systems
Portfolio diversification involves lowering the correlation between portfolio assets to achieve improved risk–return exposure. It is reasonable to infer from the classic Anscombe quartet that relying on descriptive statistics, and specifically, correlation, to achieve portfolio diversification may not derive the most optimal multiperiod portfolio risk-adjusted return because stocks in a portfolio can exhibit different price trends over time, even with the same computed pairwise correlation. This research applied a shape-based time-series clustering technique of agglomerative hierarchical clustering using dynamic time-series warping as a distance measure to aggregate stocks into like-trending clusters across time as a portfolio diversification tool. Results support …
Relative And Absolute Location Embedding For Few-Shot Node Classification On Graph, Zemin Liu, Yuan Fang, Chenghao Liu, Steven C. H. Hoi
Relative And Absolute Location Embedding For Few-Shot Node Classification On Graph, Zemin Liu, Yuan Fang, Chenghao Liu, Steven C. H. Hoi
Research Collection School Of Computing and Information Systems
Node classification is an important problem on graphs. While recent advances in graph neural networks achieve promising performance, they require abundant labeled nodes for training. However, in many practical scenarios there often exist novel classes in which only one or a few labeled nodes are available as supervision, known as few-shot node classification. Although meta-learning has been widely used in vision and language domains to address few-shot learning, its adoption on graphs has been limited. In particular, graph nodes in a few-shot task are not independent and relate to each other. To deal with this, we propose a novel model …
Project Coolbit: Can Your Watch Predict Heat Stress And Thermal Comfort Sensation?, Negin Nazarian, Sijie Liu, Manon Kohler, Jason Lee, Clayton Miller, Winston T. L. Chow, S. B. B. Alhadad, Alberto Martilli, Matias Quintana, Lindsey Sunden, Lindsey Norford
Project Coolbit: Can Your Watch Predict Heat Stress And Thermal Comfort Sensation?, Negin Nazarian, Sijie Liu, Manon Kohler, Jason Lee, Clayton Miller, Winston T. L. Chow, S. B. B. Alhadad, Alberto Martilli, Matias Quintana, Lindsey Sunden, Lindsey Norford
Research Collection School of Social Sciences
Global climate is changing as a result of anthropogenic warming, leading to higher daily excursions of temperature in cities. Such elevated temperatures have great implications on human thermal comfort and heat stress, which should be closely monitored. Current methods for heat exposure assessments (surveys, microclimate measurements, and laboratory experiments), however, present several limitations: measurements are scattered in time and space and data gathered on outdoor thermal stress and comfort often does not include physiological and behavioral parameters. To address these shortcomings, Project Coolbit aims to introduce a human-centric approach to thermal comfort assessments. In this study, we propose and evaluate …
Public Transit Infrastructure And Heat Perceptions In Hot And Dry Climates, Yuliya Dzyuban, David M. Hondula, Paul J. Coseo, Charles L. Redman
Public Transit Infrastructure And Heat Perceptions In Hot And Dry Climates, Yuliya Dzyuban, David M. Hondula, Paul J. Coseo, Charles L. Redman
Research Collection College of Integrative Studies
Many cities aim to progress toward their sustainability and public health goals by increasing use of their public transit systems. However, without adequate protective infrastructure that provides thermally comfortable conditions for public transit riders, it can be challenging to reach these goals in hot climates. We took micrometeorological measurements and surveyed riders about their perceptions of heat and heat-coping behaviors at bus stops with a variety of design attributes in Phoenix, AZ, USA, during the summer of 2018. We identified the design attributes and coping behaviors that made riders feel cooler. We observed that current infrastructure standards and material choices …
Fireeye: Cybersecurity In Action, Singapore Management University
Fireeye: Cybersecurity In Action, Singapore Management University
Perspectives@SMU
FireEye built its success on its ‘Human + AI’ philosophy. But can a cybersecurity firm get ahead of the attackers and predict an attack…on itself?
Sociological Perspectives On Climate Change And Society: A Review, Md Saidul Islam, Edson Kieu
Sociological Perspectives On Climate Change And Society: A Review, Md Saidul Islam, Edson Kieu
Research Collection Lee Kong Chian School Of Business
Society is at an important intersection in dealing with the challenges of climate change, and this paper is presented at a critical juncture in light of growing recognition that the natural sciences are insufficient to deal with these challenges. Critical aspects of sociological perspectives related to climate change research are brought together in this review in the hope of fostering greater interdisciplinary collaboration between the natural and social sciences. We fervently argue for the need to inculcate interdisciplinary approaches that can provide innovative perspectives and solutions to the challenges we face from the impacts of climate change. As such, some …
Adversarial Specification Mining, Hong Jin Kang, David Lo
Adversarial Specification Mining, Hong Jin Kang, David Lo
Research Collection School Of Computing and Information Systems
There have been numerous studies on mining temporal specifications from execution traces. These approaches learn finite-state automata (FSA) from execution traces when running tests. To learn accurate specifications of a software system, many tests are required. Existing approaches generalize from a limited number of traces or use simple test generation strategies. Unfortunately, these strategies may not exercise uncommon usage patterns of a software system. To address this problem, we propose a new approach, adversarial specification mining, and develop a prototype, DICE (Diversity through Counter-Examples). DICE has two components: DICE-Tester and DICE-Miner. After mining Linear Temporal Logic specifications from an input …
Novel Techniques In Recovering, Embedding, And Enforcing Policies For Control-Flow Integrity, Yan Lin
Novel Techniques In Recovering, Embedding, And Enforcing Policies For Control-Flow Integrity, Yan Lin
Dissertations and Theses Collection (Open Access)
Control-Flow Integrity (CFI) is an attractive security property with which most injected and code-reuse attacks can be defeated, including advanced attacking techniques like Return-Oriented Programming (ROP). CFI extracts a control-flow graph (CFG) for a given program and instruments the program to respect the CFG. Specifically, checks are inserted before indirect branch instructions. Before these instructions are executed during runtime, the checks consult the CFG to ensure that the indirect branch is allowed to reach the intended target. Hence, any sort of controlflow hijacking would be prevented. There are three fundamental components in CFI enforcement. The first component is accurately recovering …
Smart Scribbles For Image Matting, Yang Xin, Yu Qiao, Shaozhe Chen, Shengfeng He, Baocai Yin, Qiang Zhang, Xiaopeng Wei, Rynson W. H. Lau
Smart Scribbles For Image Matting, Yang Xin, Yu Qiao, Shaozhe Chen, Shengfeng He, Baocai Yin, Qiang Zhang, Xiaopeng Wei, Rynson W. H. Lau
Research Collection School Of Computing and Information Systems
Image matting is an ill-posed problem that usually requires additional user input, such as trimaps or scribbles. Drawing a fine trimap requires a large amount of user effort, while using scribbles can hardly obtain satisfactory alpha mattes for non-professional users. Some recent deep learning-based matting networks rely on large-scale composite datasets for training to improve performance, resulting in the occasional appearance of obvious artifacts when processing natural images. In this article, we explore the intrinsic relationship between user input and alpha mattes and strike a balance between user effort and the quality of alpha mattes. In particular, we propose an …
Context-Aware Retrieval-Based Deep Commit Message Generation, Haoye Wang, Xin Xia, David Lo, Qiang He, Xinyu Wang, John Grundy
Context-Aware Retrieval-Based Deep Commit Message Generation, Haoye Wang, Xin Xia, David Lo, Qiang He, Xinyu Wang, John Grundy
Research Collection School Of Computing and Information Systems
Commit messages recorded in version control systems contain valuable information for software development, maintenance, and comprehension. Unfortunately, developers often commit code with empty or poor quality commit messages. To address this issue, several studies have proposed approaches to generate commit messages from commit diffs. Recent studies make use of neural machine translation algorithms to try and translate git diffs into commit messages and have achieved some promising results. However, these learning-based methods tend to generate high-frequency words but ignore low-frequency ones. In addition, they suffer from exposure bias issues, which leads to a gap between training phase and testing phase. …
Sustainability Of Rewards-Based Crowdfunding: A Quasi-Experimental Analysis Of Funding Targets And Backer Satisfaction, Michael Wessel, Rob Gleasure, Robert John Kauffman
Sustainability Of Rewards-Based Crowdfunding: A Quasi-Experimental Analysis Of Funding Targets And Backer Satisfaction, Michael Wessel, Rob Gleasure, Robert John Kauffman
Research Collection School Of Computing and Information Systems
Rewards-based crowdfunding presents an information asymmetry for participants due to the funding mechanism used. Campaign-backers trust creators to complete projects and deliver rewards as outlined prior to the fundraising process, but creators may discover better opportunities as they progress with a project. Despite this, the all-or-nothing (AON) mechanism on crowdfunding platforms incentivizes creators to set meager funding-targets that are easier to achieve but may offer limited slack when creators wish to simultaneously pursue emerging opportunities later in the project. We explore the related issues of how funding targets seem to be selected by the creators, and how dissatisfaction with the …
Peer-To-Peer Trade And The Economy Of Distributed Pv In China, Peiyun Song, Yiou Zhou, Jiahai Yuan
Peer-To-Peer Trade And The Economy Of Distributed Pv In China, Peiyun Song, Yiou Zhou, Jiahai Yuan
Research Collection School Of Computing and Information Systems
With the deepening of power market reform, distributed power generation is gaining momentum. This paper tests the distributed photovoltaic (DPV) economy under different business models by taking three provinces to stand for typical resource zones. The Internal return rate (IRR) is used to measure the economy, while the improved levelized cost of electricity (LCOE) is used to model the generation cost. Three business modes, namely pure producer (all generation sold to the grid), prosumer (self-use and the rest sold to the grid), and peer-to-peer trade (P2P, all generation traded via the grid) are studied. Results show that peer-to-peer trade is …
Fakespotter: A Simple Yet Robust Baseline For Spotting Ai-Synthesized Fake Faces, Run Wang, Felix Juefei-Xu, Lei Ma, Xiaofei Xie, Yihao Huang, Jian Wang, Yang Liu
Fakespotter: A Simple Yet Robust Baseline For Spotting Ai-Synthesized Fake Faces, Run Wang, Felix Juefei-Xu, Lei Ma, Xiaofei Xie, Yihao Huang, Jian Wang, Yang Liu
Research Collection School Of Computing and Information Systems
In recent years, generative adversarial networks (GANs) and its variants have achieved unprecedented success in image synthesis. They are widely adopted in synthesizing facial images which brings potential security concerns to humans as the fakes spread and fuel the misinformation. However, robust detectors of these AI-synthesized fake faces are still in their infancy and are not ready to fully tackle this emerging challenge. In this work, we propose a novel approach, named FakeSpotter, based on monitoring neuron behaviors to spot AIsynthesized fake faces. The studies on neuron coverage and interactions have successfully shown that they can be served as testing …
Performance-Based Iadl Evaluation Of Older Adults With Cognitive Impairment Within A Smart Home: A Feasibility Study, Iris Rawtaer, Khalid Abdul Jabbar, Xiao Liu, Thit Thit Htat Ying, Anh Thuy Giang, Philip Lin Kiat Yap, Rachel Chin Yee Cheong, Hwee-Pink Tan, Pius Lee Wei Qi, Shiou Liang Wee, Tze Pin Ng
Performance-Based Iadl Evaluation Of Older Adults With Cognitive Impairment Within A Smart Home: A Feasibility Study, Iris Rawtaer, Khalid Abdul Jabbar, Xiao Liu, Thit Thit Htat Ying, Anh Thuy Giang, Philip Lin Kiat Yap, Rachel Chin Yee Cheong, Hwee-Pink Tan, Pius Lee Wei Qi, Shiou Liang Wee, Tze Pin Ng
Research Collection School Of Computing and Information Systems
Introduction Mild cognitive impairment (MCI) is characterized by subtle deficits that functional assessment via informant-report measures may not detect. Sensors can potentially detect deficits in everyday functioning in MCI. This study aims to establish feasibility and acceptability of using sensors in a smart home for performance-based assessments of two instrumental activities of daily living (IADLs). Methods Thirty-five older adults (>65 years) performed two IADL tasks in a smart home laboratory equipped with sensors and a web camera. Participants' cognitive states were determined using published criteria including measures of global cognition and comprehensive neuropsychological test batteries. Selected subtasks of the …
Public Transit Infrastructure And Heat Perceptions In Hot And Dry Climates, Yuliya Dzyuban, David M. Hondula, Paul J. Coseo, Charles L. Redman
Public Transit Infrastructure And Heat Perceptions In Hot And Dry Climates, Yuliya Dzyuban, David M. Hondula, Paul J. Coseo, Charles L. Redman
Research Collection College of Integrative Studies
Many cities aim to progress toward their sustainability and public health goals by increasing use of their public transit systems. However, without adequate protective infrastructure that provides thermally comfortable conditions for public transit riders, it can be challenging to reach these goals in hot climates. We took micrometeorological measurements and surveyed riders about their perceptions of heat and heat-coping behaviors at bus stops with a variety of design attributes in Phoenix, AZ, USA, during the summer of 2018. We identified the design attributes and coping behaviors that made riders feel cooler. We observed that current infrastructure standards and material choices …
An Efficient Privacy Preserving Message Authentication Scheme For Internet-Of-Things, Jiannan Wei, Tran Viet Xuan Phuong, Guomin Yang
An Efficient Privacy Preserving Message Authentication Scheme For Internet-Of-Things, Jiannan Wei, Tran Viet Xuan Phuong, Guomin Yang
Research Collection School Of Computing and Information Systems
As an essential element of the next generation Internet, Internet of Things (IoT) has been undergoing an extensive development in recent years. In addition to the enhancement of peoples daily lives, IoT devices also generate/gather a massive amount of data that could be utilized by machine learning and big data analytics for different applications. Due to the machine-to-machine communication nature of IoT, data security and privacy are crucial issues that must be addressed to prevent different cyber attacks (e.g., impersonation and data pollution/poisoning attacks). Nevertheless, due to the constrained computation power and the diversity of IoT devices, it is a …
The (Digital) Medium Of Mobility Is The Message: Examining The Influence Of E-Scooter Mobile App Perceptions On E-Scooter Use Intent, Rabindra Ratan, Kelsey Earle, Sonny Rosenthal, Vivian Hsueh Hua Chen, Andrew Gambiro, Gerard Goggin, Hallam Stevens, Benjamin Li, Kwan Min Lee
The (Digital) Medium Of Mobility Is The Message: Examining The Influence Of E-Scooter Mobile App Perceptions On E-Scooter Use Intent, Rabindra Ratan, Kelsey Earle, Sonny Rosenthal, Vivian Hsueh Hua Chen, Andrew Gambiro, Gerard Goggin, Hallam Stevens, Benjamin Li, Kwan Min Lee
Research Collection College of Integrative Studies
The present research examines how perceptions of e-scooter mobile apps (i.e., a communication technology) influence intent to use e-scooters (i.e., a transportation technology) while considering other perceptions specific to e-scooters (ease of use, usefulness, safety, environmental impact, and enjoyment), context of use (geographic landscape), and demographic factors (age and sex). Results suggest mobile app perceived ease of use is associated with e-scooter use intent and this effect is mediated by e-scooter perceived usefulness, even when controlling for e-scooter perceived ease of use as well as other influential elements of e-scooter use. In addition to illustrating the importance of user experiences …
Scalable Online Vetting Of Android Apps For Measuring Declared Sdk Versions And Their Consistency With Api Calls, Daoyuan Wu, Debin Gao, David Lo
Scalable Online Vetting Of Android Apps For Measuring Declared Sdk Versions And Their Consistency With Api Calls, Daoyuan Wu, Debin Gao, David Lo
Research Collection School Of Computing and Information Systems
Android has been the most popular smartphone system with multiple platform versions active in the market. To manage the application’s compatibility with one or more platform versions, Android allows apps to declare the supported platform SDK versions in their manifest files. In this paper, we conduct a systematic study of this modern software mechanism. Our objective is to measure the current practice of declared SDK versions (which we term as DSDK versions afterwards) in real apps, and the (in)consistency between DSDK versions and their host apps’ API calls. To successfully analyze a modern dataset of 22,687 popular apps (with an …
Understanding The Inter-Domain Presence Of Research Topics In The Computing Discipline, Subhajit Datta, Rumana Lakdawala, Santonu Sarkar
Understanding The Inter-Domain Presence Of Research Topics In The Computing Discipline, Subhajit Datta, Rumana Lakdawala, Santonu Sarkar
Research Collection School Of Computing and Information Systems
The very nature of scientific inquiry encourages the flow of ideas across research domains in a discipline. Research topics with higher inter-domain presence tend to attract higher attention at individual and organizational levels. This is more pronounced in a discipline like computing, with its deeply intertwined ideas and strong connections with technology. In this paper, we study corpora of research publications across four domains of the computing discipline – covering more than 150,000 papers, involving more than 200,000 authors over 55 years and 175 publication venues – to examine the influences on inter-domain presence of research topics. We find statistically …
Deep Unsupervised Anomaly Detection, Tangqing Li, Zheng Wang, Siying Liu, Wen-Yan Lin
Deep Unsupervised Anomaly Detection, Tangqing Li, Zheng Wang, Siying Liu, Wen-Yan Lin
Research Collection School Of Computing and Information Systems
This paper proposes a novel method to detect anomalies in large datasets under a fully unsupervised setting. The key idea behind our algorithm is to learn the representation underlying normal data. To this end, we leverage the latest clustering technique suitable for handling high dimensional data. This hypothesis provides a reliable starting point for normal data selection. We train an autoencoder from the normal data subset, and iterate between hypothesizing normal candidate subset based on clustering and representation learning. The reconstruction error from the learned autoencoder serves as a scoring function to assess the normality of the data. Experimental results …
Who Am I?: Towards Social Self-Awareness For Intelligent Agents, Budhitama Subagdja, Han Yi Tay, Ah-Hwee Tan
Who Am I?: Towards Social Self-Awareness For Intelligent Agents, Budhitama Subagdja, Han Yi Tay, Ah-Hwee Tan
Research Collection School Of Computing and Information Systems
Most of today’s AI technologies are geared towards mastering specific tasks performance through learning from a huge volume of data. However, less attention has still been given to make the AI understand its own purposes or be responsible socially. In this paper, a new model of agent is presented with the capacity to represent itself as a distinct individual with identity, a mind of its own, unique experiences, and social lives. In this way, the agent can interact with its surroundings and other agents seamlessly and meaningfully. A practical framework for developing an agent architecture with this model of self …
The Value Of Humanization In Customer Service, Yang Gao, Huaxia Rui, Shujing Sun
The Value Of Humanization In Customer Service, Yang Gao, Huaxia Rui, Shujing Sun
Research Collection School Of Computing and Information Systems
As algorithm-based agents become increasingly capable of handling customer service queries, customers are often uncertain whether they are served by humans or algorithms, and managers are left to question the value of human agents once the technology matures. The current paper studies this question by quantifying the impact of customers' enhanced perception of being served by human agents on customer service interactions. Our identification strategy hinges on the abrupt implementation by Southwest Airlines of a signature policy, which requires the inclusion of an agent's first name in responses on Twitter, thereby making the agent more humanized in the eyes of …