Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Research Collection School Of Computing and Information Systems

Discipline
Keyword
Publication Year
File Type

Articles 1171 - 1200 of 6891

Full-Text Articles in Physical Sciences and Mathematics

On The Influence Of Biases In Bug Localization: Evaluation And Benchmark, Ratnadira Widyasari, Stefanus Agus Haryono, Ferdian Thung, Jieke Shi, Constance Tan, Fiona Wee, Jack Phan, David Lo Mar 2022

On The Influence Of Biases In Bug Localization: Evaluation And Benchmark, Ratnadira Widyasari, Stefanus Agus Haryono, Ferdian Thung, Jieke Shi, Constance Tan, Fiona Wee, Jack Phan, David Lo

Research Collection School Of Computing and Information Systems

Bug localization is the task of identifying parts of thesource code that needs to be changed to resolve a bug report.As this task is difficult, automatic bug localization tools havebeen proposed. The development and evaluation of these toolsrely on the availability of high-quality bug report datasets. In2014, Kochhar et al. identified three biases in datasets used toevaluate bug localization techniques: (1) misclassified bug report,(2) already localized bug report, and (3) incorrect ground truthfile in a bug report. They reported that already localized bugreports statistically significantly and substantially impact buglocalization results, and thus should be removed. However, theirevaluation is still limited, …


Interpretable Knowledge Tracing: Simple And Efficient Student Modeling With Causal Relations, Sein Minn, Jill-Jênn Vie, Koh Takeuchi, Feida Zhu Mar 2022

Interpretable Knowledge Tracing: Simple And Efficient Student Modeling With Causal Relations, Sein Minn, Jill-Jênn Vie, Koh Takeuchi, Feida Zhu

Research Collection School Of Computing and Information Systems

Intelligent Tutoring Systems have become critically important in future learning environments. Knowledge Tracing (KT) is a crucial part of that system. It is about inferring the skill mastery of students and predicting their performance to adjust the curriculum accordingly. Deep Learning based models like Deep Knowledge Tracing (DKT) and Dynamic Key-Value Memory Network (DKVMN) have shown significant predictive performance compared with traditional models like Bayesian Knowledge Tracing (BKT) and Performance Factors Analysis (PFA). However, it is difficult to extract psychologically meaningful explanations from the tens of thousands of parameters in neural networks, that would relate to cognitive theory. There are …


Heterogeneous Attentions For Solving Pickup And Delivery Problem Via Deep Reinforcement Learning, Jingwen Li, Liang Xin, Zhiguang Cao, Andrew Lim, Wen Song, Jie Zhang Mar 2022

Heterogeneous Attentions For Solving Pickup And Delivery Problem Via Deep Reinforcement Learning, Jingwen Li, Liang Xin, Zhiguang Cao, Andrew Lim, Wen Song, Jie Zhang

Research Collection School Of Computing and Information Systems

Recently, there is an emerging trend to apply deep reinforcement learning to solve the vehicle routing problem (VRP), where a learnt policy governs the selection of next node for visiting. However, existing methods could not handle well the pairing and precedence relationships in the pickup and delivery problem (PDP), which is a representative variant of VRP. To address this challenging issue, we leverage a novel neural network integrated with a heterogeneous attention mechanism to empower the policy in deep reinforcement learning to automatically select the nodes. In particular, the heterogeneous attention mechanism specifically prescribes attentions for each role of the …


Estimating Financial Information Asymmetry In Real Estate Transactions In China: An Application Of Two-Tier Frontier Model, Ganlin Pu, Ying Zhang, Li-Chen Chou Mar 2022

Estimating Financial Information Asymmetry In Real Estate Transactions In China: An Application Of Two-Tier Frontier Model, Ganlin Pu, Ying Zhang, Li-Chen Chou

Research Collection School Of Computing and Information Systems

This study applies the two-tier stochastic frontier model to estimate the distribution of housing transaction information in Hangzhou, Wenzhou, Ningbo, and Jinhua (four cities in Zhejiang Province, China) during the year 2018, to analyze the difference in the price information acquired by the buyers and sellers in the transaction, and the effect of information asymmetry on the transaction price. The empirical results show that in each city, during the housing transaction process, the supplier has more complete information about house prices than consumers, and can therefore implement price discrimination strategies in setting service prices. Due to the disadvantage in acquired …


The Impact Of Ride-Hail Surge Factors On Taxi Bookings, Sumit Agarwal, Ben Charoenwong, Shih-Fen Cheng, Jussi Keppo Mar 2022

The Impact Of Ride-Hail Surge Factors On Taxi Bookings, Sumit Agarwal, Ben Charoenwong, Shih-Fen Cheng, Jussi Keppo

Research Collection School Of Computing and Information Systems

We study the role of ride-hailing surge factors on the allocative efficiency of taxis by combining a reduced-form estimation with structural analyses using machine-learning-based demand predictions. Where other research study the effect of entry on incumbent taxis, we use higher frequency granular data to study how location-time-specific surge factors affect taxi bookings to bound the effect of customer decisions while accounting for various confounding variables. We find that even in a unique market like Singapore, where incumbent taxi companies have app-based booking systems similar to those from ride-hailing companies like Uber, the estimated upper bound on the cross-platform substitution between …


Deep Learning For Anomaly Detection: A Review, Guansong Pang, Chunhua Shen, Longbing Cao, Anton Van Den Hengel Mar 2022

Deep Learning For Anomaly Detection: A Review, Guansong Pang, Chunhua Shen, Longbing Cao, Anton Van Den Hengel

Research Collection School Of Computing and Information Systems

Anomaly detection, a.k.a. outlier detection or novelty detection, has been a lasting yet active research area in various research communities for several decades. There are still some unique problem complexities and challenges that require advanced approaches. In recent years, deep learning enabled anomaly detection, i.e., deep anomaly detection, has emerged as a critical direction. This article surveys the research of deep anomaly detection with a comprehensive taxonomy, covering advancements in 3 high-level categories and 11 fine-grained categories of the methods. We review their key intuitions, objective functions, underlying assumptions, advantages, and disadvantages and discuss how they address the aforementioned challenges. …


Androevolve: Automated Android Api Update With Data Flow Analysis And Variable Denormalization, Stefanus A. Haryono, Ferdian Thung, David Lo, Lingxiao Jiang, Julia Lawall, Hong Jin Kang, Lucas Serrano, Gilles Muller Mar 2022

Androevolve: Automated Android Api Update With Data Flow Analysis And Variable Denormalization, Stefanus A. Haryono, Ferdian Thung, David Lo, Lingxiao Jiang, Julia Lawall, Hong Jin Kang, Lucas Serrano, Gilles Muller

Research Collection School Of Computing and Information Systems

The Android operating system is frequently updated, with each version bringing a new set of APIs. New versions may involve API deprecation; Android apps using deprecated APIs need to be updated to ensure the apps’ compatibility with old and new Android versions. Updating deprecated APIs is a time-consuming endeavor. Hence, automating the updates of Android APIs can be beneficial for developers. CocciEvolve is the state-of-the-art approach for this automation. However, it has several limitations, including its inability to resolve out-of-method variables and the low code readability of its updates due to the addition of temporary variables. In an attempt to …


Analyzing The Impact Of Digital Payment On Efficiency And Productivity Of Commercial Banks: A Case Study In China, Haopeng Wang, Aldy Gunawan Mar 2022

Analyzing The Impact Of Digital Payment On Efficiency And Productivity Of Commercial Banks: A Case Study In China, Haopeng Wang, Aldy Gunawan

Research Collection School Of Computing and Information Systems

Digital payment has become one of the most popular payment methods all around the world, especially in countries that witnessed the rapid development of internet. As a traditional financial institution, commercial banks have been impacted by newly developed payment technology since third payment platforms have attracted customers to use the digital payment for daily consumption, transferring, and even investment. This paper focuses on analyzing whether and how the commercial banks in China have been affected by digital payment by using empirical methods. Systematic Generalized Method of Moments (SYS-GMM) is used to test the relationship between the productivity of commercial banks …


Ispray: Reducing Urban Air Pollution With Intelligent Water Spraying, Yun Cheng, Zimu Zhou, Lothar Thiele Mar 2022

Ispray: Reducing Urban Air Pollution With Intelligent Water Spraying, Yun Cheng, Zimu Zhou, Lothar Thiele

Research Collection School Of Computing and Information Systems

Despite regulations and policies to improve city-level air quality in the long run, there lack precise control measures to protect critical urban spots from heavy air pollution. In this work, we propose iSpray, the first-of-its-kind data analytics engine for fine-grained PM2.5 and PM10 control at key urban areas via cost-effective water spraying. iSpray combines domain knowledge with machine learning to profile and model how water spraying affects PM25 and PM10 concentrations in time and space. It also utilizes predictions of pollution propagation paths to schedule a minimal number of sprayers to keep the pollution concentrations at key spots under control. …


Neuron Coverage-Guided Domain Generalization, Chris Xing Tian, Haoliang Li, Xiaofei Xie, Yang Liu, Shiqi Wang Mar 2022

Neuron Coverage-Guided Domain Generalization, Chris Xing Tian, Haoliang Li, Xiaofei Xie, Yang Liu, Shiqi Wang

Research Collection School Of Computing and Information Systems

This paper focuses on the domain generalization task where domain knowledge is unavailable, and even worse, only samples from a single domain can be utilized during training. Our motivation originates from the recent progresses in deep neural network (DNN) testing, which has shown that maximizing neuron coverage of DNN can help to explore possible defects of DNN (i.e.,misclassification). More specifically, by treating the DNN as a program and each neuron as a functional point of the code, during the network training we aim to improve the generalization capability by maximizing the neuron coverage of DNN with the gradient similarity regularization …


Sdac: A Slow-Aging Solution For Android Malware Detection Using Semantic Distance Based Api Clustering, Jiayun Xu, Yingjiu Li, Robert H. Deng, Xu Ke Mar 2022

Sdac: A Slow-Aging Solution For Android Malware Detection Using Semantic Distance Based Api Clustering, Jiayun Xu, Yingjiu Li, Robert H. Deng, Xu Ke

Research Collection School Of Computing and Information Systems

A novel slow-aging solution named SDAC is proposed to address the model aging problem in Android malware detection, which is due to the lack of adapting to the changes in Android specifications during malware detection. Different from periodic retraining of detection models in existing solutions, SDAC evolves effectively by evaluating new APIs' contributions to malware detection according to existing API's contributions. In SDAC, the contributions of APIs are evaluated by their contexts in the API call sequences extracted from Android apps. A neural network is applied on the sequences to assign APIs to vectors, among which the differences of API …


Update Recovery Attacks On Encrypted Database Within Two Updates Using Range Queries Leakage, Jianting Ning, Geong Sen Poh, Xinyi Huang, Robert H. Deng, Shuwei Cao, Ee-Chien Chang Mar 2022

Update Recovery Attacks On Encrypted Database Within Two Updates Using Range Queries Leakage, Jianting Ning, Geong Sen Poh, Xinyi Huang, Robert H. Deng, Shuwei Cao, Ee-Chien Chang

Research Collection School Of Computing and Information Systems

Recently, reconstruction attacks on static encrypted database supporting range queries have been proposed. However, attacks on encrypted database within two updates in the similar setting have not been studied extensively. As far as we know, the only work is the update recovery attack presented by Grubbs et al. (CCS 2018). Following their seminal work, we present new update recovery attacks for dense dataset (i.e. at least one record corresponding to each value in the range), which enable a deeper understanding of the impact caused by leakages due to updates on dynamic encrypted database. Our first attack aims at recovering the …


Mg2vec: Learning Relationship-Preserving Heterogeneous Graph Representations Via Metagraph Embedding, Wentao Zhang, Yuan Fang, Zemin Liu, Min Wu, Xinming Zhang Mar 2022

Mg2vec: Learning Relationship-Preserving Heterogeneous Graph Representations Via Metagraph Embedding, Wentao Zhang, Yuan Fang, Zemin Liu, Min Wu, Xinming Zhang

Research Collection School Of Computing and Information Systems

Given that heterogeneous information networks (HIN) encompass nodes and edges belonging to different semantic types, they can model complex data in real-world scenarios. Thus, HIN embedding has received increasing attention, which aims to learn node representations in a low-dimensional space, in order to preserve the structural and semantic information on the HIN. In this regard, metagraphs, which model common and recurring patterns on HINs, emerge as a powerful tool to capture semantic-rich and often latent relationships on HINs. Although metagraphs have been employed to address several specific data mining tasks, they have not been thoroughly explored for the more general …


Match In My Way: Fine-Grained Bilateral Access Control For Secure Cloud-Fog Computing, Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang, Guowen Xu, Xinyi Huang, Robert H. Deng Mar 2022

Match In My Way: Fine-Grained Bilateral Access Control For Secure Cloud-Fog Computing, Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang, Guowen Xu, Xinyi Huang, Robert H. Deng

Research Collection School Of Computing and Information Systems

Cloud-fog computing is a novel paradigm to extend the functionality of cloud computing to provide a variety of on demand data services via the edge network. Many cryptographic tools have been introduced to preserve data confidentiality against the untrustworthy network and cloud servers. However, how to efficiently identify and retrieve useful data from a large number of ciphertexts without a costly decryption mechanism remains a challenging problem. In this paper, we introduce a cloud fog-device data sharing system (CFDS) with data confidentiality and data source identification simultaneously based on a new cryptographic primitive named matchmaking attribute-based encryption (MABE) by extending …


Gender Influence On Communication Initiated Within Student Teams, Rita Garcia, Chieh-Ju Trinity Liao, Ariane Pearce, Christoph Treude Mar 2022

Gender Influence On Communication Initiated Within Student Teams, Rita Garcia, Chieh-Ju Trinity Liao, Ariane Pearce, Christoph Treude

Research Collection School Of Computing and Information Systems

Collaboration is important during software development, but related work has found gender differences can influence the collaboration process, creating inequality in the team’s dynamics. In this paper, we present a gender analysis study that involved 39 students, examining their teams’ online collaborations while contributing to a large open-source software project. Eight teams of 4-6 Software Engineering (SE) students communicated over an online messaging platform, Slack, to complete an eight-week project. The goal of this study is to identify gender differences emerging from team collaboration. A mixed-methods approach was used to collect students’ teamwork experiences and analyse their collaboration. Our research …


Strangan: Adversarially-Learnt Spatial Transformer For Scalable Human Activity Recognition, Abu Zaher Md Faridee, Avijoy Chakma, Archan Misra, Nirmalya Roy Mar 2022

Strangan: Adversarially-Learnt Spatial Transformer For Scalable Human Activity Recognition, Abu Zaher Md Faridee, Avijoy Chakma, Archan Misra, Nirmalya Roy

Research Collection School Of Computing and Information Systems

We tackle the problem of domain adaptation for inertial sensing-based human activity recognition (HAR) applications -i.e., in developing mechanisms that allow a classifier trained on sensor samples collected under a certain narrow context to continue to achieve high activity recognition accuracy even when applied to other contexts. This is a problem of high practical importance as the current requirement of labeled training data for adapting such classifiers to every new individual, device, or on-body location is a major roadblock to community-scale adoption of HAR-based applications. We particularly investigate the possibility of ensuring robust classifier operation, without requiring any new labeled …


Viral Pneumonia Screening On Chest X-Rays Using Confidence-Aware Anomaly Detection, Jianpeng Zhang, Yutong Xie, Guansong Pang, Zhibin Liao, Johan Verjans, Wenxing Li, Zongji Sun, Jian He, Yi Li, Chunhua Shen, Yong Xia Mar 2022

Viral Pneumonia Screening On Chest X-Rays Using Confidence-Aware Anomaly Detection, Jianpeng Zhang, Yutong Xie, Guansong Pang, Zhibin Liao, Johan Verjans, Wenxing Li, Zongji Sun, Jian He, Yi Li, Chunhua Shen, Yong Xia

Research Collection School Of Computing and Information Systems

Clusters of viral pneumonia occurrences over a short period may be a harbinger of an outbreak or pandemic. Rapid and accurate detection of viral pneumonia using chest X-rays can be of significant value for large-scale screening and epidemic prevention, particularly when other more sophisticated imaging modalities are not readily accessible. However, the emergence of novel mutated viruses causes a substantial dataset shift, which can greatly limit the performance of classification-based approaches. In this paper, we formulate the task of differentiating viral pneumonia from non-viral pneumonia and healthy controls into a one-class classification-based anomaly detection problem. We therefore propose the confidence-aware …


Jscsp: A Novel Policy-Based Xss Defense Mechanism For Browsers, Guangquan Xu, Xiaofei Xie, Shuhan Huang, Jun Zhang, Lei Pan, Wei Lou, Kaitai Liang Mar 2022

Jscsp: A Novel Policy-Based Xss Defense Mechanism For Browsers, Guangquan Xu, Xiaofei Xie, Shuhan Huang, Jun Zhang, Lei Pan, Wei Lou, Kaitai Liang

Research Collection School Of Computing and Information Systems

To mitigate cross-site scripting attacks (XSS), the W3C group recommends web service providers to employ a computer security standard called Content Security Policy (CSP). However, less than 3.7 percent of real-world websites are equipped with CSP according to Google’s survey. The low scalability of CSP is incurred by the difficulty of deployment and non-compatibility for state-of-art browsers. To explore the scalability of CSP, in this article, we propose JavaScript based CSP (JSCSP), which is able to support most of real-world browsers but also to generate security policies automatically. Specifically, JSCSP offers a novel self-defined security policy which enforces essential confinements …


Sample-Efficient Iterative Lower Bound Optimization Of Deep Reactive Policies For Planning In Continuous Mdps, Siow Meng Low, Akshat Kumar, Scott Sanner Mar 2022

Sample-Efficient Iterative Lower Bound Optimization Of Deep Reactive Policies For Planning In Continuous Mdps, Siow Meng Low, Akshat Kumar, Scott Sanner

Research Collection School Of Computing and Information Systems

Recent advances in deep learning have enabled optimization of deep reactive policies (DRPs) for continuous MDP planning by encoding a parametric policy as a deep neural network and exploiting automatic differentiation in an end-toend model-based gradient descent framework. This approach has proven effective for optimizing DRPs in nonlinear continuous MDPs, but it requires a large number of sampled trajectories to learn effectively and can suffer from high variance in solution quality. In this work, we revisit the overall model-based DRP objective and instead take a minorizationmaximization perspective to iteratively optimize the DRP w.r.t. a locally tight lower-bounded objective. This novel …


Meta-Transfer Learning Through Hard Tasks, Qianru Sun, Yaoyao Liu, Zhaozheng Chen, Chua Tat-Seng, Schiele Bernt Mar 2022

Meta-Transfer Learning Through Hard Tasks, Qianru Sun, Yaoyao Liu, Zhaozheng Chen, Chua Tat-Seng, Schiele Bernt

Research Collection School Of Computing and Information Systems

Meta-learning has been proposed as a framework to address the challenging few-shot learning setting. The key idea is to leverage a large number of similar few-shot tasks in order to learn how to adapt a base-learner to a new task for which only a few labeled samples are available. As deep neural networks (DNNs) tend to overfit using a few samples only, typical meta-learning models use shallow neural networks, thus limiting its effectiveness. In order to achieve top performance, some recent works tried to use the DNNs pre-trained on large-scale datasets but mostly in straight-forward manners, e.g., (1) taking their …


Exploring And Evaluating The Impact Of Covid-19 On Mobility Changes In Singapore, Aldy Gunawan, Linh Chi Tran, Kar Way Tan, I-Lin Wang Mar 2022

Exploring And Evaluating The Impact Of Covid-19 On Mobility Changes In Singapore, Aldy Gunawan, Linh Chi Tran, Kar Way Tan, I-Lin Wang

Research Collection School Of Computing and Information Systems

This paper analyzes the changes in mobility trends due to the impact of the COVID-19 pandemic in Singapore in the six different sectors: Retail and Recreation, Grocery and Pharmacy, Parks, Transit Stations, Workplaces and Residential. The period of observation is from 15 February 2020 to 18 August 2021. The observed patterns obtained from the descriptive data analysis sheds light on the effectiveness of social distancing measures in Singapore as well as the level of compliance among the country’s residents. Correlation analysis is used to explore the relationship between different sectors during the pandemic period. The results reveal a strong sense …


Aspect-Based Api Review Classification: How Far Can Pre-Trained Transformer Model Go?, Chengran Yang, Bowen Xu, Junaed Younus Khan, Gias Uddin, Donggyun Han, Zhou Yang, David Lo Mar 2022

Aspect-Based Api Review Classification: How Far Can Pre-Trained Transformer Model Go?, Chengran Yang, Bowen Xu, Junaed Younus Khan, Gias Uddin, Donggyun Han, Zhou Yang, David Lo

Research Collection School Of Computing and Information Systems

APIs (Application Programming Interfaces) are reusable software libraries and are building blocks for modern rapid software development. Previous research shows that programmers frequently share and search for reviews of APIs on the mainstream software question and answer (Q&A) platforms like Stack Overflow, which motivates researchers to design tasks and approaches related to process API reviews automatically. Among these tasks, classifying API reviews into different aspects (e.g., performance or security), which is called the aspect-based API review classification, is of great importance. The current state-of-the-art (SOTA) solution to this task is based on the traditional machine learning algorithm. Inspired by the …


Can Identifier Splitting Improve Open-Vocabulary Language Model Of Code?, Jieke Shi, Zhou Yang, Junda He, Bowen Xu, David Lo Mar 2022

Can Identifier Splitting Improve Open-Vocabulary Language Model Of Code?, Jieke Shi, Zhou Yang, Junda He, Bowen Xu, David Lo

Research Collection School Of Computing and Information Systems

Statistical language models on source code have successfully assisted software engineering tasks. However, developers can create or pick arbitrary identifiers when writing source code. Freely chosen identifiers lead to the notorious out-of-vocabulary (OOV) problem that negatively affects model performance. Recently, Karampatsis et al. showed that using the Byte Pair Encoding (BPE) algorithm to address the OOV problem can improve the language models’ predictive performance on source code. However, a drawback of BPE is that it cannot split the identifiers in a way that preserves the meaningful semantics. Prior researchers also show that splitting compound identifiers into sub-words that reflect the …


Riconv++: Effective Rotation Invariant Convolutions For 3d Point Clouds Deep Learning, Zhiyuan Zhang, Binh-Son Hua, Sai-Kit Yeung Mar 2022

Riconv++: Effective Rotation Invariant Convolutions For 3d Point Clouds Deep Learning, Zhiyuan Zhang, Binh-Son Hua, Sai-Kit Yeung

Research Collection School Of Computing and Information Systems

3D point clouds deep learning is a promising field of research that allows a neural network to learn features of point clouds directly, making it a robust tool for solving 3D scene understanding tasks. While recent works show that point cloud convolutions can be invariant to translation and point permutation, investigations of the rotation invariance property for point cloud convolution has been so far scarce. Some existing methods perform point cloud convolutions with rotation-invariant features, existing methods generally do not perform as well as translation-invariant only counterpart. In this work, we argue that a key reason is that compared to …


Mrim: Enabling Mixed-Resolution Imaging For Low-Power Pervasive Vision Tasks, Jiyan Wu, Vithurson Subasharan, Tuan Tran, Archan Misra Mar 2022

Mrim: Enabling Mixed-Resolution Imaging For Low-Power Pervasive Vision Tasks, Jiyan Wu, Vithurson Subasharan, Tuan Tran, Archan Misra

Research Collection School Of Computing and Information Systems

While many pervasive computing applications increasingly utilize real-time context extracted from a vision sensing infrastructure, the high energy overhead of DNN-based vision sensing pipelines remains a challenge for sustainable in-the-wild deployment. One common approach to reducing such energy overheads is the capture and transmission of lower-resolution images to an edge node (where the DNN inferencing task is executed), but this results in an accuracy-vs-energy tradeoff, as the DNN inference accuracy typically degrades with a drop in resolution. In this work, we introduce MRIM, a simple but effective framework to tackle this tradeoff. Under MRIM, the vision sensor platform first executes …


Towards Efficient Annotations For A Human-Ai Collaborative, Clinical Decision Support System: A Case Study On Physical Stroke Rehabilitation Assessment, Min Hun Lee, Daniel P. Siewiorek, Asim Smailagic, Alexandre Bernardino, Sergi Bermúdez I Badia Mar 2022

Towards Efficient Annotations For A Human-Ai Collaborative, Clinical Decision Support System: A Case Study On Physical Stroke Rehabilitation Assessment, Min Hun Lee, Daniel P. Siewiorek, Asim Smailagic, Alexandre Bernardino, Sergi Bermúdez I Badia

Research Collection School Of Computing and Information Systems

Artificial intelligence (AI) and machine learning (ML) algorithms are increasingly being explored to support various decision-making tasks in health (e.g. rehabilitation assessment). However, the development of such AI/ML-based decision support systems is challenging due to the expensive process to collect an annotated dataset. In this paper, we describe the development process of a human-AI collaborative, clinical decision support system that augments an ML model with a rule-based (RB) model from domain experts. We conducted its empirical evaluation in the context of assessing physical stroke rehabilitation with the dataset of three exercises from 15 post-stroke survivors and therapists. Our results bring …


Hermes: Using Commit-Issue Linking To Detect Vulnerability-Fixing Commits, Truong Giang Nguyen, Hong Jin Kang, David Lo, Abhishek Sharma, Andrew E. Santosa, Asankhaya Sharma, Ming Yi Ang Mar 2022

Hermes: Using Commit-Issue Linking To Detect Vulnerability-Fixing Commits, Truong Giang Nguyen, Hong Jin Kang, David Lo, Abhishek Sharma, Andrew E. Santosa, Asankhaya Sharma, Ming Yi Ang

Research Collection School Of Computing and Information Systems

Software projects today rely on many third-party libraries, and therefore, are exposed to vulnerabilities in these libraries. When a library vulnerability is fixed, users are notified and advised to upgrade to a new version of the library. However, not all vulnerabilities are publicly disclosed, and users may not be aware of vulnerabilities that may affect their applications. Due to the above challenges, there is a need for techniques which can identify and alert users to silent fixes in libraries; commits that fix bugs with security implications that are not officially disclosed. We propose a machine learning approach to automatically identify …


Wifitrace: Network-Based Contact Tracing For Infectious Diseases Using Passive Wifi Sensing, Amee Trivedi, Camellia Zakaria, Rajesh Krishna Balan, Ann Becker, George Corey, Prashant Shenoy Mar 2022

Wifitrace: Network-Based Contact Tracing For Infectious Diseases Using Passive Wifi Sensing, Amee Trivedi, Camellia Zakaria, Rajesh Krishna Balan, Ann Becker, George Corey, Prashant Shenoy

Research Collection School Of Computing and Information Systems

Contact tracing is a well-established and effective approach for the containment of the spread of infectious diseases. While Bluetooth-based contact tracing method using phones has become popular recently, these approaches suffer from the need for a critical mass adoption to be effective. In this paper, we present WiFiTrace, a network-centric approach for contact tracing that relies on passive WiFi sensing with no client-side involvement. Our approach exploits WiFi network logs gathered by enterprise networks for performance and security monitoring, and utilizes them for reconstructing device trajectories for contact tracing. Our approach is specifically designed to enhance the efficacy of traditional …


Learning User Interface Semantics From Heterogeneous Networks With Multi-Modal And Positional Attributes, Gary Ang, Ee-Peng Lim Mar 2022

Learning User Interface Semantics From Heterogeneous Networks With Multi-Modal And Positional Attributes, Gary Ang, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

User interfaces (UI) of desktop, web, and mobile applications involve a hierarchy of objects (e.g. applications, screens, view class, and other types of design objects) with multimodal (e.g. textual, visual) and positional (e.g. spatial location, sequence order and hierarchy level) attributes. We can therefore represent a set of application UIs as a heterogeneous network with multimodal and positional attributes. Such a network not only represents how users understand the visual layout of UIs, but also influences how users would interact with applications through these UIs. To model the UI semantics well for different UI annotation, search, and evaluation tasks, this …


Hybrid Tabu Search Algorithm For Unrelated Parallel Machine Scheduling In Semiconductor Fabs With Setup Times, Job Release, And Expired Times, Changyu Chen, Madhi Fathi, Marzieh Khakifirooz, Kan Wu Mar 2022

Hybrid Tabu Search Algorithm For Unrelated Parallel Machine Scheduling In Semiconductor Fabs With Setup Times, Job Release, And Expired Times, Changyu Chen, Madhi Fathi, Marzieh Khakifirooz, Kan Wu

Research Collection School Of Computing and Information Systems

This research is motivated by a scheduling problem arising in the ion implantation process of wafer fabrication. The ion implementation scheduling problem is modeled as an unrelated parallel machine scheduling (UPMS) problem with sequence-dependent setup times that are subject to job release time and expiration time of allowing a job to be processed on a specific machine, defined as: R|rj,eij,STsd|Cmax. The objective is first to maximize the number of processed jobs, then minimize the maximum completion time (makespan), and finally minimize the maximum completion times of the non-bottleneck machines. A mixed-integer programming (MIP) model is proposed as a solution approach …