Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (7243)
- Databases and Information Systems (2966)
- Software Engineering (1896)
- Artificial Intelligence and Robotics (1091)
- Numerical Analysis and Scientific Computing (965)
-
- Information Security (939)
- Engineering (795)
- Social and Behavioral Sciences (777)
- Graphics and Human Computer Interfaces (677)
- Business (672)
- Theory and Algorithms (454)
- Computer Engineering (410)
- Operations Research, Systems Engineering and Industrial Engineering (366)
- Programming Languages and Compilers (312)
- Communication (301)
- OS and Networks (300)
- Social Media (244)
- Public Affairs, Public Policy and Public Administration (204)
- Environmental Sciences (169)
- Data Storage Systems (164)
- Transportation (164)
- Medicine and Health Sciences (163)
- International and Area Studies (154)
- Management Information Systems (153)
- Asian Studies (152)
- Education (146)
- Technology and Innovation (127)
- E-Commerce (120)
- Finance and Financial Management (98)
- Keyword
-
- Deep learning (109)
- Machine learning (106)
- Artificial intelligence (79)
- Singapore (77)
- Social media (73)
-
- Data mining (62)
- Cloud computing (57)
- Reinforcement learning (54)
- Optimization (51)
- Security (51)
- Privacy (50)
- Twitter (49)
- Online learning (48)
- Software engineering (48)
- Visualization (46)
- Deep Learning (45)
- Empirical study (45)
- Neural networks (45)
- Task analysis (44)
- Access control (41)
- Feature extraction (41)
- Algorithms (40)
- Blockchain (39)
- Semantics (39)
- Sustainability (39)
- Classification (38)
- Android (35)
- Anomaly detection (35)
- Clustering (35)
- Collaboration (35)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (6903)
- Dissertations and Theses Collection (Open Access) (128)
- Research Collection Lee Kong Chian School Of Business (94)
- Research Collection School of Social Sciences (49)
- Research Collection College of Integrative Studies (44)
-
- Perspectives@SMU (38)
- Asian Management Insights (35)
- Research Collection Yong Pung How School Of Law (35)
- Research Collection School Of Accountancy (23)
- Research Collection School Of Economics (22)
- Dissertations and Theses Collection (15)
- SMU Press Releases (12)
- MITB Thought Leadership Series (11)
- Research@SMU: Connecting the Dots (10)
- Research Collection School of Computing and Information Systems (9)
- LARC Research Publications (7)
- Research Collection Library (6)
- Social Space (5)
- SMU Research Data (4)
- Sim Kee Boon Institute for Financial Economics (4)
- 2024 AI for Research Week (3)
- Centre for Computational Law (3)
- CMP Research (2)
- Centre for AI & Data Governance (2)
- Research Collection Office of Research (2)
- Library Events (1)
- Oral History Collection (1)
- ROSA Journal Articles and Publications (1)
- Research Collection School of Accountancy (1)
- Research@SMU Infographics (1)
- Publication Type
- File Type
Articles 2761 - 2790 of 7471
Full-Text Articles in Physical Sciences and Mathematics
Semantic Patches For Java Program Transformation, Hong Jin Kang, Ferdian Thung, Julia Lawall, Gilles Muller, Lingxiao Jiang, David Lo
Semantic Patches For Java Program Transformation, Hong Jin Kang, Ferdian Thung, Julia Lawall, Gilles Muller, Lingxiao Jiang, David Lo
Research Collection School Of Computing and Information Systems
Developing software often requires code changes that are widespread and applied to multiple locations.There are tools for Java that allow developers to specify patterns for program matching and source-to-source transformation. However, to our knowledge, none allows for transforming code based on its control-flow context. We prototype Coccinelle4J, an extension to Coccinelle, which is a program transformation tool designed for widespread changes in C code, in order to work on Java source code. We adapt Coccinelle to be able to apply scripts written in the Semantic Patch Language (SmPL), a language provided by Coccinelle, to Java source files. As a case …
Securing Messaging Services Through Efficient Signcryption With Designated Equality Test, Yujue Wang, Hwee Hwa Pang, Robert H. Deng, Yong Ding, Qianhong Wu, Bo Qin
Securing Messaging Services Through Efficient Signcryption With Designated Equality Test, Yujue Wang, Hwee Hwa Pang, Robert H. Deng, Yong Ding, Qianhong Wu, Bo Qin
Research Collection School Of Computing and Information Systems
To address security and privacy issues in messaging services, we present a public key signcryption scheme with designated equality test on ciphertexts (PKS-DET) in this paper. The scheme enables a sender to simultaneously encrypt and sign (signcrypt) messages, and to designate a tester to perform equality test on ciphertexts, i.e., to determine whether two ciphertexts signcrypt the same underlying plaintext message. We introduce the PKS-DET framework, present a concrete construction and formally prove its security against three types of adversaries, representing two security requirements on message confidentiality against outsiders and the designated tester, respectively, and a requirement on message unforgeability …
Sensitive Behavior Analysis Of Android Applications On Unrooted Devices In The Wild, Xiaoxiao Tang
Sensitive Behavior Analysis Of Android Applications On Unrooted Devices In The Wild, Xiaoxiao Tang
Dissertations and Theses Collection (Open Access)
Dynamic analysis is widely used in malware detection, taint analysis, vulnerability detection, and other areas for enhancing the security of Android. Compared to static analysis, dynamic analysis is immune to common code obfuscation techniques and dynamic code loading. Existing dynamic analysis techniques rely on in-lab running environment (e.g., modified systems, rooted devices, or emulators) and require automatic input generators to execute the target app. However, these techniques could be bypassed by anti-analysis techniques that allow apps to hide sensitive behavior when an in-lab environment is detected through predefined heuristics (e.g., IMEI number of the device is invalid). Meanwhile, current input …
Making Sense Of Crowd-Generated Content In Domain-Specific Settings, Agus Sulistya
Making Sense Of Crowd-Generated Content In Domain-Specific Settings, Agus Sulistya
Dissertations and Theses Collection (Open Access)
The rapid advances of the Web have changed the ways information is distributed and exchanged among individuals and organizations. Various content from different domains are generated daily and contributed by users' daily activities, such as posting messages in a microblog platform, or collaborating in a question and answer site. To deal with such tremendous volume of user generated content, there is a need for approaches that are able to handle the mass amount of available data and to extract knowledge hidden in the user generated content. This dissertation attempts to make sense of the generated content to help in three …
Exploiting Mobility For Predictive Urban Analytics & Operations, Kasthuri Jayarajah
Exploiting Mobility For Predictive Urban Analytics & Operations, Kasthuri Jayarajah
Dissertations and Theses Collection (Open Access)
As cities worldwide invest heavily in smart city infrastructure, it invites opportunities for a next wave of urban analytics. Unlike its predecessors, urban analytics applications and services can now be real-time and proactive -- they can (a) leverage situational data from large deployments of connected sensors, (b) capture attributes of a variety of entities that make up the urban fabric (e.g., people and their social relationships, transport nodes, utilities, etc.), and (c) use predictive insights to both proactively optimize urban operations (e.g., HVAC systems in smart buildings, buses in the transportation network, crowd-workers, etc.) and promote smarter policy decisions (e.g., …
Stressmon: Large Scale Detection Of Stress And Depression In Campus Environment Using Passive Coarse-Grained Location Data, Camellia Zakaria
Stressmon: Large Scale Detection Of Stress And Depression In Campus Environment Using Passive Coarse-Grained Location Data, Camellia Zakaria
Dissertations and Theses Collection (Open Access)
The rising mental health illnesses of severe stress and depression is of increasing concern worldwide. Often associated by similarities in symptoms, severe stress can take a toll on a person’s productivity and result in depression if the stress is left unmanaged. Unfortunately, depression can occur without any feelings of stress. With depression growing as a leading cause of disability in economic productivity, there has been a sharp rise in mental health initiatives to improve stress and depression management. To offer such services conveniently and discreetly, recent efforts have focused on using mobile technologies. However, these initiatives usually require users to …
Unsupervised Deep Structured Semantic Models For Commonsense Reasoning, Shuohang Wang, Sheng Zhang, Yelong Shen, Xiaodong Liu, Jingjing Liu, Jianfeng Gao, Jing Jiang
Unsupervised Deep Structured Semantic Models For Commonsense Reasoning, Shuohang Wang, Sheng Zhang, Yelong Shen, Xiaodong Liu, Jingjing Liu, Jianfeng Gao, Jing Jiang
Research Collection School Of Computing and Information Systems
Commonsense reasoning is fundamental to natural language understanding. While traditional methods rely heavily on human-crafted features and knowledge bases, we explore learning commonsense knowledge from a large amount of raw text via unsupervised learning. We propose two neural network models based on the Deep Structured Semantic Models (DSSM) framework to tackle two classic commonsense reasoning tasks, Winograd Schema challenges (WSC) and Pronoun Disambiguation (PDP). Evaluation shows that the proposed models effectively capture contextual information in the sentence and co-reference information between pronouns and nouns, and achieve significant improvement over previous state-of-the-art approaches.
Decentralise Me, Paul Robert Griffin
Decentralise Me, Paul Robert Griffin
MITB Thought Leadership Series
If you are in need of a reminder of the levels of hype surrounding blockchain, then look no further than Japan’s J-Pop sensation Kasotsuka Shojo, otherwise known as the Virtual Currency Girls who, with their debut track “The Moon and Cryptocurrencies and Me”, aim to educate fans about cryptocurrencies in an entertaining way.
Coordinating Supply And Demand On An On-Demand Service Platform With Impatient Customers, Jiaru Bai, Kut C. So, Christopher S. Tang, Xiqun Chen, Hai Wang
Coordinating Supply And Demand On An On-Demand Service Platform With Impatient Customers, Jiaru Bai, Kut C. So, Christopher S. Tang, Xiqun Chen, Hai Wang
Research Collection School Of Computing and Information Systems
We consider an on-demand service platform using earning sensitive independent providers with heterogeneous reservation price (for work participation) to serve its time and price sensitive customers with heterogeneous valuation of the service. As such, both the supply and demand are "endogenously'' dependent on the price the platform charges its customers and the wage the platform pays its independent providers. We present an analytical model with endogenous supply (number of participating agents) and endogenous demand (customer request rate) to study this on-demand service platform. To coordinate endogenous demand with endogenous supply, we include the steady-state waiting time performance based on a …
Salient Object Detection With Pyramid Attention And Salient Edges, Wenguan Wang, Shuyang Zhao, Jianbing Shen, Steven C. H. Hoi, Ali Borji
Salient Object Detection With Pyramid Attention And Salient Edges, Wenguan Wang, Shuyang Zhao, Jianbing Shen, Steven C. H. Hoi, Ali Borji
Research Collection Yong Pung How School Of Law
This paper presents a new method for detecting salient objects in images using convolutional neural networks (CNNs). The proposed network, named PAGE-Net, offers two key contributions. The first is the exploitation of an essential pyramid attention structure for salient object detection. This enables the network to concentrate more on salient regions while considering multi-scale saliency information. Such a stacked attention design provides a powerful tool to efficiently improve the representation ability of the corresponding network layer with an enlarged receptive field. The second contribution lies in the emphasis on the importance of salient edges. Salient edge information offers a strong …
Why Is My Code Change Abandoned?, Qingye Wang, Xin Xia, David Lo, Shanping Li
Why Is My Code Change Abandoned?, Qingye Wang, Xin Xia, David Lo, Shanping Li
Research Collection School Of Computing and Information Systems
Software developers contribute numerous changes every day to the code review systems. However, not all submitted changes are merged into a codebase because they might not pass the code review process. Some changes would be abandoned or be asked for resubmission after improvement, which results in more workload for developers and reviewers, and more delays to deliverables. To understand the underlying reasons why changes are abandoned, we conduct an empirical study on the code review of four open source projects (Eclipse, LibreOffice, OpenStack, and Qt).First, we manually analyzed 1459 abandoned changes. Second, we leveraged the open card sorting method to …
Lightweight Privacy-Preserving Ensemble Classification For Face Recognition, Zhuo Ma, Yang Liu, Ximeng Liu, Jianfeng Ma, Kui Ren
Lightweight Privacy-Preserving Ensemble Classification For Face Recognition, Zhuo Ma, Yang Liu, Ximeng Liu, Jianfeng Ma, Kui Ren
Research Collection School Of Computing and Information Systems
The development of machine learning technology and visual sensors is promoting the wider applications of face recognition into our daily life. However, if the face features in the servers are abused by the adversary, our privacy and wealth can be faced with great threat. Many security experts have pointed out that, by 3-D-printing technology, the adversary can utilize the leaked face feature data to masquerade others and break the E-bank accounts. Therefore, in this paper, we propose a lightweight privacy-preserving adaptive boosting (AdaBoost) classification framework for face recognition (POR) based on the additive secret sharing and edge computing. First, we …
Learning Cross-Modal Embeddings With Adversarial Networks For Cooking Recipes And Food Images, Hao Wang, Doyen Sahoo, Chenghao Liu, Ee-Peng Lim, Steven C. H. Hoi
Learning Cross-Modal Embeddings With Adversarial Networks For Cooking Recipes And Food Images, Hao Wang, Doyen Sahoo, Chenghao Liu, Ee-Peng Lim, Steven C. H. Hoi
Research Collection School Of Computing and Information Systems
Food computing is playing an increasingly important role in human daily life, and has found tremendous applications in guiding human behavior towards smart food consumption and healthy lifestyle. An important task under the food-computing umbrella is retrieval, which is particularly helpful for health related applications, where we are interested in retrieving important information about food (e.g., ingredients, nutrition, etc.). In this paper, we investigate an open research task of cross-modal retrieval between cooking recipes and food images, and propose a novel framework Adversarial Cross-Modal Embedding (ACME) to resolve the cross-modal retrieval task in food domains. Specifically, the goal is to …
Crowdbc: A Blockchain-Based Decentralized Framework For Crowdsourcing, Ming Li, Jian Weng, Anjia Yang, Wei Lu, Yue Zhang, Lin Hou, Jiannan Liu, Yang Xiang, Robert H. Deng
Crowdbc: A Blockchain-Based Decentralized Framework For Crowdsourcing, Ming Li, Jian Weng, Anjia Yang, Wei Lu, Yue Zhang, Lin Hou, Jiannan Liu, Yang Xiang, Robert H. Deng
Research Collection School Of Computing and Information Systems
Crowdsourcing systems which utilize the human intelligence to solve complex tasks have gained considerable interest and adoption in recent years. However, the majority of existing crowdsourcing systems rely on central servers, which are subject to the weaknesses of traditional trust-based model, such as single point of failure. They are also vulnerable to distributed denial of service (DDoS) and Sybil attacks due to malicious users involvement. In addition, high service fees from the crowdsourcing platform may hinder the development of crowdsourcing. How to address these potential issues has both research and substantial value. In this paper, we conceptualize a blockchain-based decentralized …
Corrn: Cooperative Reflection Removal Network, Renjie Wen, Boxin Shi, Haoliang Li, Ling-Yu Duan, Ah-Hwee Tan, Alex C. Kot
Corrn: Cooperative Reflection Removal Network, Renjie Wen, Boxin Shi, Haoliang Li, Ling-Yu Duan, Ah-Hwee Tan, Alex C. Kot
Research Collection School Of Computing and Information Systems
Removing the undesired reflections from images taken through the glass is of broad application to various computer vision tasks. Non-learning based methods utilize different handcrafted priors such as the separable sparse gradients caused by different levels of blurs, which often fail due to their limited description capability to the properties of real-world reflections. In this paper, we propose a network with the feature-sharing strategy to tackle this problem in a cooperative and unified framework, by integrating image context information and the multi-scale gradient information. To remove the strong reflections existed in some local regions, we propose a statistic loss by …
Learning Spatio-Temporal Representation With Local And Global Diffusion, Zhaofan Qiu, Ting Yao, Chong-Wah Ngo, Xinmei Tian, Tao Mei
Learning Spatio-Temporal Representation With Local And Global Diffusion, Zhaofan Qiu, Ting Yao, Chong-Wah Ngo, Xinmei Tian, Tao Mei
Research Collection School Of Computing and Information Systems
Convolutional Neural Networks (CNN) have been regarded as a powerful class of models for visual recognition problems. Nevertheless, the convolutional filters in these networks are local operations while ignoring the large-range dependency. Such drawback becomes even worse particularly for video recognition, since video is an information-intensive media with complex temporal variations. In this paper, we present a novel framework to boost the spatio-temporal representation learning by Local and Global Diffusion (LGD). Specifically, we construct a novel neural network architecture that learns the local and global representations in parallel. The architecture is composed of LGD blocks, where each block updates local …
Entrans: Leveraging Kinetic Energy Harvesting Signal For Transportation Mode Detection, Guohao Lan, Weitao Xu, Dong Ma, Sara Khalifa, Mahbub Hassan, Wen Hu
Entrans: Leveraging Kinetic Energy Harvesting Signal For Transportation Mode Detection, Guohao Lan, Weitao Xu, Dong Ma, Sara Khalifa, Mahbub Hassan, Wen Hu
Research Collection School Of Computing and Information Systems
Monitoring the daily transportation modes of an individual provides useful information in many application domains, such as urban design, real-time journey recommendation, as well as providing location-based services. In existing systems, accelerometer and GPS are the dominantly used signal sources for transportation context monitoring which drain out the limited battery life of the wearable devices very quickly. To resolve the high energy consumption issue, in this paper, we present EnTrans, which enables transportation mode detection by using only the kinetic energy harvester as an energy-efficient signal source. The proposed idea is based on the intuition that the vibrations experienced by …
Self-Supervised Spatio-Temporal Representation Learning For Videos By Predicting Motion And Appearance Statistics, Jiangliu Wang, Jianbo Jiao, Linchao Bao, Shengfeng He, Yunhui Liu, Wei Liu
Self-Supervised Spatio-Temporal Representation Learning For Videos By Predicting Motion And Appearance Statistics, Jiangliu Wang, Jianbo Jiao, Linchao Bao, Shengfeng He, Yunhui Liu, Wei Liu
Research Collection School Of Computing and Information Systems
We address the problem of video representation learning without human-annotated labels. While previous efforts address the problem by designing novel self-supervised tasks using video data, the learned features are merely on a frame-by-frame basis, which are not applicable to many video analytic tasks where spatio-temporal features are prevailing. In this paper we propose a novel self-supervised approach to learn spatio-temporal features for video representation. Inspired by the success of two-stream approaches in video classification, we propose to learn visual features by regressing both motion and appearance statistics along spatial and temporal dimensions, given only the input video data. Specifically, we …
Context-Aware Spatio-Recurrent Curvilinear Structure Segmentation, Feigege Wang, Yue Gu, Wenxi Liu, Shengfeng He, Shengfeng He, Jia Pan
Context-Aware Spatio-Recurrent Curvilinear Structure Segmentation, Feigege Wang, Yue Gu, Wenxi Liu, Shengfeng He, Shengfeng He, Jia Pan
Research Collection School Of Computing and Information Systems
Curvilinear structures are frequently observed in various images in different forms, such as blood vessels or neuronal boundaries in biomedical images. In this paper, we propose a novel curvilinear structure segmentation approach using context-aware spatio-recurrent networks. Instead of directly segmenting the whole image or densely segmenting fixed-sized local patches, our method recurrently samples patches with varied scales from the target image with learned policy and processes them locally, which is similar to the behavior of changing retinal fixations in the human visual system and it is beneficial for capturing the multi-scale or hierarchical modality of the complex curvilinear structures. In …
R2gan: Cross-Modal Recipe Retrieval With Generative Adversarial Network, Bin Zhu, Chong-Wah Ngo, Jingjing Chen, Yanbin Hao
R2gan: Cross-Modal Recipe Retrieval With Generative Adversarial Network, Bin Zhu, Chong-Wah Ngo, Jingjing Chen, Yanbin Hao
Research Collection School Of Computing and Information Systems
Representing procedure text such as recipe for crossmodal retrieval is inherently a difficult problem, not mentioning to generate image from recipe for visualization. This paper studies a new version of GAN, named Recipe Retrieval Generative Adversarial Network (R2GAN), to explore the feasibility of generating image from procedure text for retrieval problem. The motivation of using GAN is twofold: learning compatible cross-modal features in an adversarial way, and explanation of search results by showing the images generated from recipes. The novelty of R2GAN comes from architecture design, specifically a GAN with one generator and dual discriminators is used, which makes the …
Dietlens-Eout: Large Scale Restaurant Food Photo Recognition, Zhipeng Wei, Jingjing Chen, Zhaoyan Ming, Chong-Wah Ngo, Tat-Seng Chua, Fengfeng Zhou
Dietlens-Eout: Large Scale Restaurant Food Photo Recognition, Zhipeng Wei, Jingjing Chen, Zhaoyan Ming, Chong-Wah Ngo, Tat-Seng Chua, Fengfeng Zhou
Research Collection School Of Computing and Information Systems
Restaurant dishes represent a significant portion of food that people consume in their daily life. While people are becoming healthconscious in their food intake, convenient restaurant food tracking becomes an essential task in wellness and fitness applications. Given the huge number of dishes (food categories) involved, it becomes extremely challenging for traditional food photo classification to be feasible in both algorithm design and training data availability. In this work, we present a demo that runs on restaurant dish images in a city of millions of residents and tens of thousand restaurants. We propose a rank-loss based convolutional neural network to …
Mixed Dish Recognition Through Multi-Label Learning, Yunan Wang, Jing-Jing Chen, Chong-Wah Ngo, Tat-Seng Chua, Wanli Zuo, Zhaoyan Ming
Mixed Dish Recognition Through Multi-Label Learning, Yunan Wang, Jing-Jing Chen, Chong-Wah Ngo, Tat-Seng Chua, Wanli Zuo, Zhaoyan Ming
Research Collection School Of Computing and Information Systems
Mix dish recognition, whose goal is to identify each of the dish type presented on one plate, is generally regarded as a difficult problem. The major challenge of this problem is that different dishes presented in one plate may overlap with each other and there may be no clear boundaries among them. Therefore, labeling the bounding box of each dish type is difficult and not necessarily leading to good results. This paper studies the problem from the perspective of multi-label learning. Specially, we propose to perform dish recognition on region level with multiple granularities. For experimental purpose, we collect two …
Matching Passengers And Drivers With Multiple Objectives In Ride Sharing Markets, Guodong Lyu, Chung Piaw Teo, Wangchi Cheung, Hai Wang
Matching Passengers And Drivers With Multiple Objectives In Ride Sharing Markets, Guodong Lyu, Chung Piaw Teo, Wangchi Cheung, Hai Wang
Research Collection School Of Computing and Information Systems
In many cities in the world, ride sharing companies, such as Uber, Didi, Grab and Lyft, have been able to leverage on Internet-based platforms to conduct online decision making to connect passengers and drivers. These online platforms facilitate the integration of passengers and drivers’ mobility data on smart phones in real-time, which enables a convenient matching between demand and supply in real time. These clear operational advantages have motivated many similar shared service business models in the public transportation arena, and have been a disruptive force to the traditional taxi industry.
Importance Sampling Of Interval Markov Chains, Cyrille Jegourel, Jingyi Wang, Jun Sun
Importance Sampling Of Interval Markov Chains, Cyrille Jegourel, Jingyi Wang, Jun Sun
Research Collection School Of Computing and Information Systems
In real-world systems, rare events often characterize critical situations like the probability that a system fails within some time bound and they are used to model some potentially harmful scenarios in dependability of safety-critical systems. Probabilistic Model Checking has been used to verify dependability properties in various types of systems but is limited by the state space explosion problem. An alternative is the recourse to Statistical Model Checking (SMC) that relies on Monte Carlo simulations and provides estimates within predefined error and confidence bounds. However, rare properties require a large number of simulations before occurring at least once. To tackle …
A Tribute To Robert U. Ayres For A Lifetime Of Work In Technological Forecasting And Related Areas, Steven M. Miller
A Tribute To Robert U. Ayres For A Lifetime Of Work In Technological Forecasting And Related Areas, Steven M. Miller
Research Collection School Of Computing and Information Systems
Bob Ayres was born in the UnitedStates in 1932. For his university studies at the bachelors, masters and PhD levels, he concentrated in physics and mathematics. When we think of Bob today, we think of his pioneering work across the areas of technological forecasting, industrial metabolism and industrial ecology, and the role of energy and thermodynamics in economic growth. How did a person with a strong fundamental education as a physicist end up as a pioneering thinker and thought leader at the intersection of energy, environment and economics?
Meta-Transfer Learning For Few-Shot Learning, Qianru Sun, Yaoyao Liu, Tat-Seng Chua, Bernt Schiele
Meta-Transfer Learning For Few-Shot Learning, Qianru Sun, Yaoyao Liu, Tat-Seng Chua, Bernt Schiele
Research Collection School Of Computing and Information Systems
Meta-learning has been proposed as a framework to address the challenging few-shot learning setting. The key idea is to leverage a large number of similar few-shot tasks in order to learn how to adapt a base-learner to a new task for which only a few labeled samples are available. As deep neural networks (DNNs) tend to overfit using a few samples only, meta-learning typically uses shallow neural networks (SNNs), thus limiting its effectiveness. In this paper we propose a novel few-shot learning method called meta-transfer learning (MTL) which learns to adapt a deep NN for few shot learning tasks. Specifically, …
Collusion Attacks And Fair Time-Locked Deposits For Fast-Payment Transactions In Bitcoin, Xingjie Yu, Shiwen Michael Thang, Yingjiu Li, Robert H. Deng
Collusion Attacks And Fair Time-Locked Deposits For Fast-Payment Transactions In Bitcoin, Xingjie Yu, Shiwen Michael Thang, Yingjiu Li, Robert H. Deng
Research Collection School Of Computing and Information Systems
In Bitcoin network, the distributed storage of multiple copies of the block chain opens up possibilities for doublespending, i.e., a payer issues two separate transactions to two different payees transferring the same coins. While Bitcoin has inherent security mechanism to prevent double-spending attacks, it requires a certain amount of time to detect the doublespending attacks after the transaction has been initiated. Therefore, it is impractical to protect the payees from suffering in double-spending attacks in fast payment scenarios where the time between the exchange of currency and goods or services is shorten to few seconds. Although we cannot prevent double-spending …
Buscope: Fusing Individual & Aggregated Mobility Behavior For “Live” Smart City Services, Lakmal Buddika Meegahapola, Thivya Kandappu, Kasthuri Jayarajah, Leman Akoglu, Shili Xiang, Archan Misra
Buscope: Fusing Individual & Aggregated Mobility Behavior For “Live” Smart City Services, Lakmal Buddika Meegahapola, Thivya Kandappu, Kasthuri Jayarajah, Leman Akoglu, Shili Xiang, Archan Misra
Research Collection School Of Computing and Information Systems
While analysis of urban commuting data has a long and demonstrated history of providing useful insights into human mobility behavior, such analysis has been performed largely in offline fashion and to aid medium-to-long term urban planning. In this work, we demonstrate the power of applying predictive analytics on real-time mobility data, specifically the smart-card generated trip data of millions of public bus commuters in Singapore, to create two novel and "live" smart city services. The key analytical novelty in our work lies in combining two aspects of urban mobility: (a) conformity: which reflects the predictability in the aggregated flow of …
An Empirical Study Of Mobile Network Behavior And Application Performance In The Wild, Shiwei Zhang, Weichao Li, Daoyuan Wu, Bo Jin, Rocky K. C. Chang, Debin Gao, Yi Wang, Ricky K. P. Mok
An Empirical Study Of Mobile Network Behavior And Application Performance In The Wild, Shiwei Zhang, Weichao Li, Daoyuan Wu, Bo Jin, Rocky K. C. Chang, Debin Gao, Yi Wang, Ricky K. P. Mok
Research Collection School Of Computing and Information Systems
Monitoring mobile network performance is critical for optimizing the QoE of mobile apps. Until now, few studies have considered the actual network performance that mobile apps experience in a per-app or per-server granularity. In this paper, we analyze a two-year-long dataset collected by a crowdsourcing per-app measurement tool to gain new insights into mobile network behavior and application performance. We observe that only a small portion of WiFi networks can work in high-speed mode, and more than one-third of the observed ISPs still have not deployed 4G networks. For cellular networks, the DNS settings on smartphones can have a significant …
Metagraph-Based Learning On Heterogeneous Graphs, Yuan Fang, Wenqing Lin, Vincent W. Zheng, Min Wu, Jiaqi Shi, Kevin Chang, Xiao-Li Li
Metagraph-Based Learning On Heterogeneous Graphs, Yuan Fang, Wenqing Lin, Vincent W. Zheng, Min Wu, Jiaqi Shi, Kevin Chang, Xiao-Li Li
Research Collection School Of Computing and Information Systems
Data in the form of graphs are prevalent, ranging from biological and social networks to citation graphs and the Web. Inparticular, most real-world graphs are heterogeneous, containing objects of multiple types, which present new opportunities for manyproblems on graphs. Consider a typical proximity search problem on graphs, which boils down to measuring the proximity between twogiven nodes. Most earlier studies on homogeneous or bipartite graphs only measure a generic form of proximity, without accounting fordifferent “semantic classes”—for instance, on a social network two users can be close for different reasons, such as being classmates orfamily members, which represent two distinct …