*Students' names are highlighted in blue
Topic Sketch: Real-time Bursty Topic Detection from Twitter (click to view paper)
Wei XIE, Feida ZHU, Jing JIANG, Ee-Peng LIM, and Ke WANG
Paper presented at the IEEE 13th International Conference on Data Mining, 7-10 December 2013, Dallas (TX), USA.
HyperGraph Index: An Index for Context-aware Nearest Neighbour Query on Social Networks
Yazhe WANG and Baihua ZHENG
Article published in Social Network Analysis and Mining, Vol. 3(4), pp.813-828.
An Agent-based Simulation Approach to Experience Management in Theme Parks
Larry Junjie LIN, Jiali DU, Shih-Fen CHENG, Hoong Chuin LAU, and Pradeep VARAKANTHAM
Paper presented at the Winter Simulation Conference (WSC) 2013, 8-11 December 2013, Washington D.C., USA.
Utility of Potential Misdiagnoses in Predicting Foodborne Outbreaks
Lucia, Arthur DUBRAWSKI, and Lujie CHEN
Paper presented at the International Society of Disease Surveillance Conference (ISDS) 2013, 12-13 December 2013, New Orleans (LA), USA.
Predicting User's Political Party Using Ideological Stances
Minghui QIU, Swapna GOTTIPATI, Liu YANG, Feida ZHU, and Jing JIANG
Paper presented at the 5th International Conference on Social Informatics (SocInfo) 2013, 17-25 November 2013, Kyoto, Japan.
Information vs Interaction: An Alternative User Ranking Model for Social Networks
Wei XIE, Ai Phuong HOANG, Feida ZHU, and Ee-Peng LIM
Paper presented at the 5th International Conference on Social Informatics (SocInfo) 2013, 17-25 November 2013, Kyoto, Japan.
Automatic Recommendation of API Methods from Feature Requests
Ferdian THUNG, Shaowei WANG, David LO, and Julia LAWALL
Paper presented at the 28th IEEE/ACM International Conference on Automated Software Engineering, 11-15 November 2013, Palo Alto (CA), USA.
What You Want is Not What You Get: Predicting Sharing Policies for Text-based Content on Facebook
Yan LI, Arunesh SINHA, and Lujo BAUER
Paper presented at the 6th ACM Workshop on Artificial Intelligence and Security (AISec) 2013, 4-8 November 2013, Berlin, Germany.
Using Micro-reviews to Select an Efficient Set of Reviews
Thanh Son NGUYEN, Hady Wirawan LAUW, and Panayiotis TSAPARAS
Paper presented at the 22nd ACM International Conference on Information and Knowledge Management (CIKM), 27 October-1 November 2013, San Francisco (CA), USA.
A Unified Model for Topics, Events and Users on Twitter
Qiming DIAO and Jing JIANG
Paper presented at the Conference on Empirical Methods in Natural Language Processing (EMNLP) 2013, 18-21 October 2013, Seattle (WA), USA
Learning Topics and Positions from Debatepedia
Minghui QIU, Swapna GOTTIPATI, Yanchuan SIM, Jing JIANG, and Noah A.SMITH
Paper presented at the Conference on Empirical Methods in Natural Language Processing (EMNLP) 2013, 18-21 October 2013, Seattle (WA), USA.
Innovations in Financial Information Systems and Technology Ecosystems
Jun LIU, Robert J. KAUFFMAN, and Dan MA
Paper presented at the Conference on Innovation for Financial Services (IFS) 2013, 24-25 October 2013, Singapore.
CQARank: Jointly Model Topics and Expertise in Community Question Answering (click to view paper)
Minghui QIU, Liu YANG, Swapna GOTTIPATI, Feida ZHU, Jing JIANG, Huiping SUN, and Chen ZHONG
Paper presented at the 22nd ACM International Conference on Information and Knowledge Management (CIKMO), 27 October-1 November 2013, San Francisco (CA), USA.
Multi-abstraction Concern Localisation (click to view paper)
Bui Tien Duy LE, Shaowei WANG, and David LO
Paper presented at the 29th IEEE International Conference on Software Maintenance (ICSM) 2013, 22-28 September 2013, Eindhoven, The Netherlands.
Theory and Practice, Do They Match? A Case with Spectrum-based Fault Localisation
Bui Tien Duy LE, Ferdian THUNG, and David LO
Paper presented at the 29th IEEE International Conference on Software Maintenance (ICSM) 2013, 22-28 September 2013, Eindhoven, The Netherlands.
Will Fault Localisation Work For These Failures? An Automated Approach to Predict Effectiveness of Fault Localisation Tools (click to view paper)
Bui Tien Duy LE and David LO
Paper presented at the 29th IEEE International Conference on Software Maintenance (ICSM), 22-28 September 2013, Eindhoven, The Netherlands.
DRONE: Predicting Priority of Reported Bugs by Multi-factor Analysis
Yuan TIAN, David LO, and Chengnian SUN
Paper presented at the 29th IEEE International Conference on Software Maintenance (ICSM) 2013, 22-28 September 2013, Eindhoven, The Netherlands.
Attack and Defence Mechanisms of Malicious EPC Event Injection in EPC Discovery Service
Mon Kywe SU, Yingjiu LI, and Jie SHI
Paper presented at the IEEE International Conference on RFID Technologies and Applications (IEEE RFID TA) 2013, 4-5 September 2013, Malaysia.
The Multi-agent Orienteering Problem
Cen CHEN, Shih-Fen CHENG, and Hoong Chuin LAU
Paper presented at the 10th Metaheuristics International Conference (MIC) 2013, 5-8 August 2013, Singapore.
Politics, Sharing and Emotion in Microblogs
Tuan Anh HOANG, William W. COHEN, Ee-Peng LIM, Douglas PIERCE, and David P. REDLAWSK
Paper presented at the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) 2013, 25-28 August 2013, Niagara Falls (ON), Canada.
DelayFlow Centrality for Identifying Critical Nodes in Transportation Networks
Ka Wei Roy LEE, Yew-Yih CHENG, Ee-Peng LIM, and Feida ZHU
Paper presented at the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) 2013, 25-28 August 2013, Niagara Falls (ON), Canada.
High Utility k-Anonymisation for Social Network Publishing
Yazhe WANG, Long XIE, Baihua ZHENG, and Ken C.K. LEE
Article published in Knowledge and Information Systems, 07/2013, DOI: 10.1007/s10115-013-0674.
Technique for Authenticating H.264/SVC Streams in Surveillance Applications
Swee Won LO, Zhuo WEI, Robert DENG, Jialie SHEN, Yongdong WU, and Xuhua DING
Paper presented at the IEEE International Conference on Multimedia and Expo Workshops (ICME) 2013, 15-19 July 2013, San Jose (CA), USA.
The Case for Mobile Forensics of Private Data Leaks: Towards Large-Scale User-Oriented Privacy Protection (click to view paper)
Joseph Joo Keng CHIAN, Kiat Wee TAN, Lingxiao JIANG, and Rajesh Krishna BALAN
Paper presented at the 4th ACM SIGOPS Asia-Pacific Workshop on Systems (APSys) 2013, 29-30 July 2013, Singapore.
Technology Investment Decision-making Under Uncertainty in Mobile Payment Systems
Jun LIU, Robert J. KAUFFMAN, and Dan MA
Paper presented at 7th China Summer Workshop on Information Management (CSWIM) 2013, 29-30 June 2013, Tianjin, China; and
46th Hawaii International Conference on Systems Science (HICSS) 2013, 7-10 January 2013, Wailea (HI), USA.
Launching Generic Attacks on iOS with Approved Third-party Applications
Jin HAN, Mon Kywe SU, Qiang YAN, Feng BAO, Robert H. DENG, Debin GAO, Yingjiu LI, and Jianying ZHOU
Paper presented at the 11th International Conference on Applied Cryptography and Network Security (ACNS) 2013, 25-28 June 2013, Banff (AB), Canada.
Mining User Relations from Online Discussions Using Sentiment Analysis and Probabilistic Matrix Factorisation
Minghui QIU, Liu YANG, and Jing JIANG
Paper presented at the Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL HLT) 2013, 9-15 June 2013, Atlanta (GA), USA.
A Latent Variable Model for Viewpoint Discovery from Threaded Forum Posts
Minghui QIU and Jing JIANG
Paper presented at the Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL HLT) 2013, 9-15 June 2013, Atlanta (GA), USA.
Think Twice Before You Share: Analysing Privacy Leakage Under Privacy Control in Online Social Networks
Yan LI, Yan QIANG, Yingjiu LI, and Robert DENG
Paper presented at the 7th International Conference on Network and System Security (NSS) 2013, 3-4 June 2013, Madrid, Spain.
It Is Not Just What We Say, But How We Say Them: LDA-based Behaviour-Topic Model
Minghui QIU, Feida ZHU, and Jing JIANG
Paper presented at the SIAM International Conference on Data Mining (SDM) 2013, 2-4 May 2013, Austin (TX), USA.
Retweeting: An Act of Viral Users, Susceptible Users or Viral Topics
Tuan Anh HOANG and Ee-Peng LIM
Paper presented at the SIAM International Conference on Data Mining (SDM) 2013, 2-4 May 2013, Austin (TX), USA.
Understanding Widespread Changes: A Taxonomic Study (click to view paper)
Shaowei WANG, David LO, and Lingxiao JIANG
Paper presented at the 17th European Conference on Software Maintenance and Reengineering (CSMR), 5-8 March 2013, Genova, Italy.
Empirical Evaluation of Bug Linking
Shaowei WANG, Ferdian THUNG, Tegawende F.BISSYANDE, David LO, Lingxiao JIANG, and Laurent REVEILLERE
Paper presented at the 17th European Conference on Software Maintenance and Reengineering (CSMR), 5-8 March 2013, Genova, Italy.
Predicting Project Outcome Leveraging Socio-technical Network Patterns
Yuan TIAN, Didi Surian, David LO, Hong CHENG, and Ee-Peng LIM
Paper presented at the 17th European Conference on Software Maintenance and Reengineering (CSMR), 5-8 March 2013, Genova, Italy.
I Can Be You: Questioning the Use of Keystroke as Biometrics (click to view paper)
Chee Meng TEY, Payas GUPTA, and Debin GAO
Paper presented at the Network & Distributed System Security (NDSS) Symposium 2013, 24-27 February 2013, San Diego (CA), USA.
Building a Large Scale Test Collection for Effective Benchmarking of Mobile Landmark Search
Zhiyong CHENG, Jing REN, Jialie SHEN, and Haiyan MIAO
Paper presented at the 19th International Conference on Multimedia Modelling (MMM) 2013, 7-9 January 2013, Huangshan, China.
On Effects of Visual Query Complexity
Zhiyong CHENG and Jialie SHEN
Chapter published in The Era of Interactive Media, pp.531-541 (2013), Springer: New York.