Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Singapore Management University

Discipline
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 2191 - 2220 of 7454

Full-Text Articles in Physical Sciences and Mathematics

Smart Contract Repair, Xiao Liang Yu, Omar Al-Bataineh, David Lo, Abhik Roychoudhury Sep 2020

Smart Contract Repair, Xiao Liang Yu, Omar Al-Bataineh, David Lo, Abhik Roychoudhury

Research Collection School Of Computing and Information Systems

Smart contracts are automated or self-enforcing contracts that can be used to exchange assets without having to place trust in third parties. Many commercial transactions use smart contracts due to their potential benefits in terms of secure peer-to-peer transactions independent of external parties. Experience shows that many commonly used smart contracts are vulnerable to serious malicious attacks, which may enable attackers to steal valuable assets of involving parties. There is, therefore, a need to apply analysis and automated repair techniques to detect and repair bugs in smart contracts before being deployed. In this work, we present the first general-purpose automated …


How (Not) To Find Bugs: The Interplay Between Merge Conflicts, Co-Changes, And Bugs, Luis Amaral, Marcos C. Oliveira, Welder Luz, José Fortes, Rodrigo Bonifacio, Daniel Alencar, Eduardo Monteiro, Gustavo Pinto, David Lo Sep 2020

How (Not) To Find Bugs: The Interplay Between Merge Conflicts, Co-Changes, And Bugs, Luis Amaral, Marcos C. Oliveira, Welder Luz, José Fortes, Rodrigo Bonifacio, Daniel Alencar, Eduardo Monteiro, Gustavo Pinto, David Lo

Research Collection School Of Computing and Information Systems

Context: In a seminal work, Ball et al. [1] investigate if the information available in version control systems could be used to predict defect density, arguing that practitioners and researchers could better understand errors "if [our] version control system could talk". In the meanwhile, several research works have reported that conflict merge resolution is a time consuming and error-prone task, while other contributions diverge about the correlation between co-change dependencies and defect density. Problem: The correlation between conflicting merge scenarios and bugs has not been addressed before, whilst the correlation between co-change dependencies and bug density has been only investigated …


The Impact Of Automated Feature Selection Techniques On The Interpretation Of Defect Models, Jirayus Jiarpakdee, Chakkrit Tantithamthavorn, Christoph Treude Sep 2020

The Impact Of Automated Feature Selection Techniques On The Interpretation Of Defect Models, Jirayus Jiarpakdee, Chakkrit Tantithamthavorn, Christoph Treude

Research Collection School Of Computing and Information Systems

The interpretation of defect models heavily relies on software metrics that are used to construct them. Prior work often uses feature selection techniques to remove metrics that are correlated and irrelevant in order to improve model performance. Yet, conclusions that are derived from defect models may be inconsistent if the selected metrics are inconsistent and correlated. In this paper, we systematically investigate 12 automated feature selection techniques with respect to the consistency, correlation, performance, computational cost, and the impact on the interpretation dimensions. Through an empirical investigation of 14 publicly-available defect datasets, we find that (1) 94–100% of the selected …


Wait For It: Identifying 'On-Hold' Self-Admitted Technical Debt, Rungroj Maipradit, Christoph Treude, Hideaki Hata, Kenichi Matsumoto Sep 2020

Wait For It: Identifying 'On-Hold' Self-Admitted Technical Debt, Rungroj Maipradit, Christoph Treude, Hideaki Hata, Kenichi Matsumoto

Research Collection School Of Computing and Information Systems

Self-admitted technical debt refers to situations where a software developer knows that their current implementation is not optimal and indicates this using a source code comment. In this work, we hypothesize that it is possible to develop automated techniques to understand a subset of these comments in more detail, and to propose tool support that can help developers manage self-admitted technical debt more effectively. Based on a qualitative study of 333 comments indicating self-admitted technical debt, we first identify one particular class of debt amenable to automated management: on-hold self-admitted technical debt (on-hold SATD), i.e., debt which contains a condition …


Human-Like Summaries From Heterogeneous And Time-Windowed Software Development Artefacts, Mahfouth Alghamdi, Christoph Treude, Markus Wagner Sep 2020

Human-Like Summaries From Heterogeneous And Time-Windowed Software Development Artefacts, Mahfouth Alghamdi, Christoph Treude, Markus Wagner

Research Collection School Of Computing and Information Systems

Automatic text summarisation has drawn considerable interest in the area of software engineering. It is challenging to summarise the activities related to a software project, (1) because of the volume and heterogeneity of involved software artefacts, and (2) because it is unclear what information a developer seeks in such a multi-document summary. We present the first framework for summarising multi-document software artefacts containing heterogeneous data within a given time frame. To produce human-like summaries, we employ a range of iterative heuristics to minimise the cosine-similarity between texts and high-dimensional feature vectors. A first study shows that users find the automatically …


Deepstyle: User Style Embedding For Authorship Attribution Of Short Texts, Zhiqiang Hu, Roy Ka-Wei Lee, Lei Wang, Ee-Peng Lim Sep 2020

Deepstyle: User Style Embedding For Authorship Attribution Of Short Texts, Zhiqiang Hu, Roy Ka-Wei Lee, Lei Wang, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

Authorship attribution (AA), which is the task of finding the owner of a given text, is an important and widely studied research topic with many applications. Recent works have shown that deep learning methods could achieve significant accuracy improvement for the AA task. Nevertheless, most of these proposed methods represent user posts using a single type of features (e.g., word bi-grams) and adopt a text classification approach to address the task. Furthermore, these methods offer very limited explainability of the AA results. In this paper, we address these limitations by proposing DeepStyle, a novel embedding-based framework that learns the representations …


Cats Are Not Fish: Deep Learning Testing Calls For Out-Of-Distribution Awareness, David Berend, Xiaofei Xie, Lei Ma, Lingjun Zhou, Yang Liu, Chi Xu, Jianjun Zhao Sep 2020

Cats Are Not Fish: Deep Learning Testing Calls For Out-Of-Distribution Awareness, David Berend, Xiaofei Xie, Lei Ma, Lingjun Zhou, Yang Liu, Chi Xu, Jianjun Zhao

Research Collection School Of Computing and Information Systems

As Deep Learning (DL) is continuously adopted in many industrial applications, its quality and reliability start to raise concerns. Similar to the traditional software development process, testing the DL software to uncover its defects at an early stage is an effective way to reduce risks after deployment. According to the fundamental assumption of deep learning, the DL software does not provide statistical guarantee and has limited capability in handling data that falls outside of its learned distribution, i.e., out-of-distribution (OOD) data. Although recent progress has been made in designing novel testing techniques for DL software, which can detect thousands of …


Dct: An Scalable Multi-Objective Module Clustering Tool, Ana Paula M. Tarchetti, Luis Henrique Vieira Amaral, Marcos C. Oliveira, Rodrigo Bonifacio, Gustavo Pinto, David Lo Sep 2020

Dct: An Scalable Multi-Objective Module Clustering Tool, Ana Paula M. Tarchetti, Luis Henrique Vieira Amaral, Marcos C. Oliveira, Rodrigo Bonifacio, Gustavo Pinto, David Lo

Research Collection School Of Computing and Information Systems

Maintaining complex software systems is a timeconsuming and challenging task. Practitioners must have a general understanding of the system’s decomposition and how the system’s developers have implemented the software features (probably cutting across different modules). Re-engineering practices are imperative to tackle these challenges. Previous research has shown the benefits of using software module clustering (SMC) to aid developers during re-engineering tasks (e.g., revealing the architecture of the systems, identifying how the concerns are spread among the modules of the systems, recommending refactorings, and so on). Nonetheless, although the literature on software module clustering has substantially evolved in the last 20 …


Weakly Paired Multi-Domain Image Translation, M.Y. Zhang, Zhiwu Huang, D.P. Paudel, J. Thoma, Gool L. Van Sep 2020

Weakly Paired Multi-Domain Image Translation, M.Y. Zhang, Zhiwu Huang, D.P. Paudel, J. Thoma, Gool L. Van

Research Collection School Of Computing and Information Systems

In this paper, we aim at studying the new problem of weakly paired multi-domain image translation. To this end, we collect a dataset that contains weakly paired images from multiple domains. Two images are considered to be weakly paired if they are captured from nearby locations and share an overlapping field of view. These images are possibly captured by two asynchronous cameras—often resulting in images from separate domains, e.g. summer and winter. Major motivations for using weakly paired images are: (i) performance improvement towards that of paired data; (ii) cheap labels and abundant data availability. For the first time in …


A Performance-Sensitive Malware Detection System Using Deep Learning On Mobile Devices, Ruitao Feng, Sen Chen, Xiaofei Xie, Guozhu Meng, Shang-Wei Lin, Yang Liu Sep 2020

A Performance-Sensitive Malware Detection System Using Deep Learning On Mobile Devices, Ruitao Feng, Sen Chen, Xiaofei Xie, Guozhu Meng, Shang-Wei Lin, Yang Liu

Research Collection School Of Computing and Information Systems

Currently, Android malware detection is mostly performed on server side against the increasing number of malware. Powerful computing resource provides more exhaustive protection for app markets than maintaining detection by a single user. However, apart from the applications (apps) provided by the official market (i.e., Google Play Store), apps from unofficial markets and third-party resources are always causing serious security threats to end-users. Meanwhile, it is a time-consuming task if the app is downloaded first and then uploaded to the server side for detection, because the network transmission has a lot of overhead. In addition, the uploading process also suffers …


A Lattice-Based Key-Insulated And Privacy-Preserving Signature Scheme With Publicly Derived Public Key, Wenling Liu, Zhen Liu, Khoa Nguyen, Guomin Yang, Yu Yu Sep 2020

A Lattice-Based Key-Insulated And Privacy-Preserving Signature Scheme With Publicly Derived Public Key, Wenling Liu, Zhen Liu, Khoa Nguyen, Guomin Yang, Yu Yu

Research Collection School Of Computing and Information Systems

As a widely used privacy-preserving technique for cryptocurrencies, Stealth Address constitutes a key component of Ring Confidential Transaction (RingCT) protocol and it was adopted by Monero, one of the most popular privacy-centric cryptocurrencies. Recently, Liu et al. [EuroS&P 2019] pointed out a flaw in the current widely used stealth address algorithm that once a derived secret key is compromised, the damage will spread to the corresponding master secret key, and all the derived secret keys thereof. To address this issue, Liu et al. introduced Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key (PDPKS scheme), which captures the functionality, …


Visualization Research Lab At Hkust, Yong Wang Sep 2020

Visualization Research Lab At Hkust, Yong Wang

Research Collection School Of Computing and Information Systems

HKUST VisLab (http://vis.cse.ust.hk/) is one of the leading research labs in the field of data visualization and human-computer interaction worldwide. The lab is dedicated to conducting cutting-edge research on data visualization and human-computer interaction to facilitate data exploration and analytics in various application domains, including E-learning, urban computing, social media and industry 4.0. Starting from its foundation by Prof. Huamin Qu in August 2004, the mission of HKUST VisLab is to build an excellent visualization research center and foster data visualization research and talent cultivation in Asia, as there were very few visualization researchers in Asia around 2004.


Research Directions For Sharing Economy Issues, Robert J. Kauffman, Maurizio Naldi Sep 2020

Research Directions For Sharing Economy Issues, Robert J. Kauffman, Maurizio Naldi

Research Collection School Of Computing and Information Systems

The sharing economy proposes a new approach to designing and delivering products and services, that aims at avoiding waste, improving efficiency, and favoring bottom-up change. In this research commentary, we survey the current state of things and propose some directions for research. We first describe the industries, products, and services currently representing the sharing paradigm, the technology platforms enabling it, the business models driving it, and the regulatory issues. We envisage that promising areas of research should include: (1) devising more efficient algorithms; (2) considering ecological and prosocial objective functions; (3) dealing with regulatory issues; (4) expanding the span of …


London Heathrow Airport Uses Real-Time Analytics For Improving Operations, Xiaojia Guo, Yael Grushka-Cockayne, Bert De Reyck Sep 2020

London Heathrow Airport Uses Real-Time Analytics For Improving Operations, Xiaojia Guo, Yael Grushka-Cockayne, Bert De Reyck

Research Collection Lee Kong Chian School Of Business

Improving airport collaborative decision making is at the heart of airport operations centers (APOCs) recently established in several major European airports. In this paper, we describe a project commissioned by Eurocontrol, the organization in charge of the safety and seamless flow of European air traffic. The project’s goal was to examine the opportunities offered by the colocation and real-time data sharing in the APOC at London’s Heathrow airport, arguably the most advanced of its type in Europe. We developed and implemented a pilot study of a real-time data-sharing and collaborative decision-making process, selected to improve the efficiency of Heathrow’s operations. …


Rethinking Mistake In The Age Of Algorithms: Quoine Pte Ltd V B2c2 Ltd, Vincent Ooi, Kian Peng Soh Sep 2020

Rethinking Mistake In The Age Of Algorithms: Quoine Pte Ltd V B2c2 Ltd, Vincent Ooi, Kian Peng Soh

Research Collection Yong Pung How School Of Law

Good traders remove emotion from the decision-making process. Automated trading algorithms have enabled this, allowing one to trade round the clock, and without the constant need to monitor one’s investments. But software has gremlins. Given the vast amounts of money involved in such trades, it was only a matter of time before disputes involving automated trading software came before the courts. The decision in Quoine v B2C2 (“Quoine”) represents the first time an apex court in the Commonwealth has ruled on the applicability of contractual principles to situations involving automated trading software.


Coronavirus: Pandemics, Artificial Intelligence And Personal Data: How To Manage Pandemics Using Ai And What That Means For Personal Data Protection, Warren B. Chik Sep 2020

Coronavirus: Pandemics, Artificial Intelligence And Personal Data: How To Manage Pandemics Using Ai And What That Means For Personal Data Protection, Warren B. Chik

Research Collection Yong Pung How School Of Law

This chapter discusses the hearing of essential and urgent court matters in the Singapore courts during the COVID-19 pandemic. On 27 march 2020, the Singapore judiciary notified courst users that remote hearings were to be implemented for certain types of hearings by means of video and telephone conferencing facilities. Court users were also provided with indicative lists of matters which might be considered essential and urgent.


An Ecosystem Approach To Ethical Ai And Data Use: Experimental Reflections, Mark Findlay, Josephine Seah Sep 2020

An Ecosystem Approach To Ethical Ai And Data Use: Experimental Reflections, Mark Findlay, Josephine Seah

Research Collection Yong Pung How School Of Law

While we have witnessed a rapid growth of ethics documents meant to guide artificial intelligence (AI) development, the promotion of AI ethics has nonetheless proceeded with little input from AI practitioners themselves. Given the proliferation of AI for Social Good initiatives, this is an emerging gap that needs to be addressed in order to develop more meaningful ethical approaches to AI use and development. This paper offers a methodology-a 'shared fairness' approach-aimed at identifying AI practitioners' needs when it comes to confronting and resolving ethical challenges and to find a third space where their operational language can be married with …


Temporal Heterogeneous Interaction Graph Embedding For Next-Item Recommendation, Yugang Ji, Mingyang Yin, Yuan Fang, Hongxia Yang, Xiangwei Wang, Tianrui Jia, Chuan Shi Sep 2020

Temporal Heterogeneous Interaction Graph Embedding For Next-Item Recommendation, Yugang Ji, Mingyang Yin, Yuan Fang, Hongxia Yang, Xiangwei Wang, Tianrui Jia, Chuan Shi

Research Collection School Of Computing and Information Systems

In the scenario of next-item recommendation, previous methods attempt to model user preferences by capturing the evolution of sequential interactions. However, their sequential expression is often limited, without modeling complex dynamics that short-term demands can often be influenced by long-term habits. Moreover, few of them take into account the heterogeneous types of interaction between users and items. In this paper, we model such complex data as a Temporal Heterogeneous Interaction Graph (THIG) and learn both user and item embeddings on THIGs to address next-item recommendation. The main challenges involve two aspects: the complex dynamics and rich heterogeneity of interactions. We …


Hierarchical Multimodal Attention For End-To-End Audio-Visual Scene-Aware Dialogue Response Generation, Hung Le, Doyen Sahoo, Nancy F. Chen, Steven C. H. Hoi Sep 2020

Hierarchical Multimodal Attention For End-To-End Audio-Visual Scene-Aware Dialogue Response Generation, Hung Le, Doyen Sahoo, Nancy F. Chen, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

This work is extended from our participation in the Dialogue System Technology Challenge (DSTC7), where we participated in the Audio Visual Scene-aware Dialogue System (AVSD) track. The AVSD track evaluates how dialogue systems understand video scenes and responds to users about the video visual and audio content. We propose a hierarchical attention approach on user queries, video caption, audio and visual features that contribute to improved evaluation results. We also apply a nonlinear feature fusion approach to combine the visual and audio features for better knowledge representation. Our proposed model shows superior performance in terms of both objective evaluation and …


Bus Frequency Optimization: When Waiting Time Matters In User Satisfaction, Songsong Mo, Zhifeng Bao, Baihua Zheng, Zhiyong Peng Sep 2020

Bus Frequency Optimization: When Waiting Time Matters In User Satisfaction, Songsong Mo, Zhifeng Bao, Baihua Zheng, Zhiyong Peng

Research Collection School Of Computing and Information Systems

Reorganizing bus frequency to cater for the actual travel demand can save the cost of the public transport system significantly. Many, if not all, existing studies formulate this as a bus frequency optimization problem which tries to minimize passengers’ average waiting time. However, many investigations have confirmed that the user satisfaction drops faster as the waiting time increases. Consequently, this paper studies the bus frequency optimization problem considering the user satisfaction. Specifically, for the first time to our best knowledge, we study how to schedule the buses such that the total number of passengers who could receive their bus services …


On Modeling Labor Markets For Fine-Grained Insights, Hendrik Santoso Sugiarto, Ee-Peng Lim Sep 2020

On Modeling Labor Markets For Fine-Grained Insights, Hendrik Santoso Sugiarto, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

The labor market consists of job seekers looking for jobs, and job openings waiting for applications. Classical labor market models assume that salary is the primary factor explaining why job-seekers select certain jobs. In practice, job seeker behavior is much more complex and there are other factors that should be considered. In this paper, we therefore propose the Probabilistic Labor Model (PLM) which considers salary satisfaction, topic preference matching, and accessibility as important criteria for job seekers to decide when they apply for jobs. We also determine the user and job latent variables for each criterion and define a graphical …


Pricing And Equilibrium In On-Demand Ride-Pooling Markets, Jintao Ke, Hai Yang, Xinwei Li, Hai Wang, Jieping Ye Sep 2020

Pricing And Equilibrium In On-Demand Ride-Pooling Markets, Jintao Ke, Hai Yang, Xinwei Li, Hai Wang, Jieping Ye

Research Collection School Of Computing and Information Systems

With the recent rapid growth of technology-enabled mobility services, ride-sourcing platforms, such as Uber and DiDi, have launched commercial on-demand ride-pooling programs that allow drivers to serve more than one passenger request in each ride. Without requiring the prearrangement of trip schedules, these programs match on-demand passenger requests with vehicles that have vacant seats. Ride-pooling programs are expected to offer benefits for both individual passengers in the form of cost savings and for society in the form of traffic alleviation and emission reduction. In addition to some exogenous variables and environments for ride-sourcing market, such as city size and population …


A Genetic Algorithm To Minimise Number Of Vehicles In An Electric Vehicle Routing Problem, Kiian Leong Bertran Queck, Hoong Chuin Lau Sep 2020

A Genetic Algorithm To Minimise Number Of Vehicles In An Electric Vehicle Routing Problem, Kiian Leong Bertran Queck, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

Electric Vehicles (EVs) and charging infrastructure are starting to become commonplace in major cities around the world. For logistics providers to adopt an EV fleet, there are many factors up for consideration, such as route planning for EVs with limited travel range as well as long-term planning of fleet size. In this paper, we present a genetic algorithm to perform route planning that minimises the number of vehicles required. Specifically, we discuss the challenges on the violations of constraints in the EV routing problem (EVRP) arising from applying genetic algorithm operators. To overcome the challenges, techniques specific to addressing the …


An Empirical Study Of The Dependency Networks Of Deep Learning Libraries, Junxiao Han, Shuiguang Deng, David Lo, Chen Zhi, Jianwei Yin, Xin Xia Sep 2020

An Empirical Study Of The Dependency Networks Of Deep Learning Libraries, Junxiao Han, Shuiguang Deng, David Lo, Chen Zhi, Jianwei Yin, Xin Xia

Research Collection School Of Computing and Information Systems

Deep Learning techniques have been prevalent in various domains, and more and more open source projects in GitHub rely on deep learning libraries to implement their algorithms. To that end, they should always keep pace with the latest versions of deep learning libraries to make the best use of deep learning libraries. Aptly managing the versions of deep learning libraries can help projects avoid crashes or security issues caused by deep learning libraries. Unfortunately, very few studies have been done on the dependency networks of deep learning libraries. In this paper, we take the first step to perform an exploratory …


Relationship Between Humidity And Physiology In Warm And Humid Conditions: A Literature Review, Yuliya Dzyuban Sep 2020

Relationship Between Humidity And Physiology In Warm And Humid Conditions: A Literature Review, Yuliya Dzyuban

Research Collection School of Social Sciences

Change in precipitation patterns caused by global warming will likely increase humidity in some areas of the world. Moreover, populations in tropical climates with already high humidity levels can experience an added stress on their health and thermal comfort due to an amplifying effect of heat and moisture. Humidity is a generic term commonly used to describe moisture in the air. However, there are numerous variables that describe different properties of humid air that can be used in scientific studies. While relative humidity remains the most used, it has several shortcomings associated with its high correlation with air temperature. Thus, …


Intersentiment: Combining Deep Neural Models On Interaction And Sentiment For Review Rating Prediction, Shi Feng, Kaisong Song, Daling Wang, Wei Gao, Yifei Zhang Aug 2020

Intersentiment: Combining Deep Neural Models On Interaction And Sentiment For Review Rating Prediction, Shi Feng, Kaisong Song, Daling Wang, Wei Gao, Yifei Zhang

Research Collection School Of Computing and Information Systems

Review rating prediction is commonly approached from the perspective of either Collaborative Filtering (CF) or Sentiment Classification (SC). CF-based approach usually resorts to matrix factorization based on user–item interaction, and does not fully utilize the valuable review text features. In contrast, SC-based approach is focused on mining review content, but can just incorporate some user- and product-level features, and fails to capture sufficient interactions between them represented typically in a sparse matrix as CF can do. In this paper, we propose a novel, extensible review rating prediction model called InterSentiment by bridging the user-product interaction model and the sentiment model …


Rethinking Pruning For Accelerating Deep Inference At The Edge, Dawei Gao, Xiaoxi He, Zimu Zhou, Yongxin Tong, Ke Xu, Lothar Thiele Aug 2020

Rethinking Pruning For Accelerating Deep Inference At The Edge, Dawei Gao, Xiaoxi He, Zimu Zhou, Yongxin Tong, Ke Xu, Lothar Thiele

Research Collection School Of Computing and Information Systems

There is a growing trend to deploy deep neural networks at the edge for high-accuracy, real-time data mining and user interaction. Applications such as speech recognition and language understanding often apply a deep neural network to encode an input sequence and then use a decoder to generate the output sequence. A promising technique to accelerate these applications on resource-constrained devices is network pruning, which compresses the size of the deep neural network without severe drop in inference accuracy. However, we observe that although existing network pruning algorithms prove effective to speed up the prior deep neural network, they lead to …


Feature Pyramid Transformer, Dong Zhang, Hanwang Zhang, Jinhui Tang, Meng Wang, Xian-Sheng Hua, Qianru Sun Aug 2020

Feature Pyramid Transformer, Dong Zhang, Hanwang Zhang, Jinhui Tang, Meng Wang, Xian-Sheng Hua, Qianru Sun

Research Collection School Of Computing and Information Systems

Feature interactions across space and scales underpin modern visual recognition systems because they introduce beneficial visual contexts. Conventionally, spatial contexts are passively hidden in the CNN’s increasing receptive fields or actively encoded by non-local convolution. Yet, the non-local spatial interactions are not across scales, and thus they fail to capture the non-local contexts of objects (or parts) residing in different scales. To this end, we propose a fully active feature interaction across both space and scales, called Feature Pyramid Transformer (FPT). It transforms any feature pyramid into another feature pyramid of the same size but with richer contexts, by using …


Privacy Preserving Search Services Against Online Attack, Yi Zhao, Jianting Nian, Kaitai Liang, Yanqi Zhao, Liqun Chen, Bo Yang Aug 2020

Privacy Preserving Search Services Against Online Attack, Yi Zhao, Jianting Nian, Kaitai Liang, Yanqi Zhao, Liqun Chen, Bo Yang

Research Collection School Of Computing and Information Systems

Searchable functionality is provided in many online services such as mail services or outsourced data storage. To protect users privacy, data in these services is usually stored after being encrypted using searchable encryption. This enables the data user to securely search encrypted data from a remote server without leaking data and query information. Public key encryption with keyword search is one of the research branches of searchable encryption; this provides privacy-preserving searchable functionality for applications such as encrypted email systems. However, it has an inherent vulnerability in that the information of a query may be leaked using a keyword guessing …


Imagining Transformative Biodiversity Futures, Carina Wyborn, Federico Davila, Laura Pereira, Michelle Mei Ling Lim, Et Al. Aug 2020

Imagining Transformative Biodiversity Futures, Carina Wyborn, Federico Davila, Laura Pereira, Michelle Mei Ling Lim, Et Al.

Research Collection Yong Pung How School Of Law

Biodiversity research is replete with scientific studies depicting future trajectories of decline that have failed to mobilize transformative change. Imagination and creativity can foster new ways to address longstanding problems to create better futures for people and the planet.