Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Singapore Management University

2023

Discipline
Keyword
Publication
Publication Type

Articles 31 - 60 of 485

Full-Text Articles in Physical Sciences and Mathematics

Designing Large-Scale Intelligent Collaborative Platform For Freight Forwarders, Pang Jin Tan, Shih-Fen Cheng, Richard Chen Dec 2023

Designing Large-Scale Intelligent Collaborative Platform For Freight Forwarders, Pang Jin Tan, Shih-Fen Cheng, Richard Chen

Research Collection School Of Computing and Information Systems

In this paper, we propose to design a large-scale intelligent collaborative platform for freight forwarders. This platform is based on a mathematical programming formulation and an efficient solution approach. Forwarders are middlemen who procure container capacities from carriers and sell them to shippers to serve their transport requests. However, due to demand uncertainty, they often either over-procure or under-procure capacities. We address this with our proposed platform where forwarders can collaborate and share capacities, allowing one's transport requests to be potentially shipped on another forwarder's container. The result is lower total costs for all participating forwarders. The collaboration can be …


Development Of An Explainable Artificial Intelligence Model For Asian Vascular Wound Images, Zhiwen Joseph Lo, Malcolm Han Wen Mak, Shanying Liang, Yam Meng Chan, Cheng Cheng Goh, Tina Peiting Lai, Audrey Hui Min Tan, Patrick Thng, Patrick Thng, Tillman Weyde, Sylvia Smit Dec 2023

Development Of An Explainable Artificial Intelligence Model For Asian Vascular Wound Images, Zhiwen Joseph Lo, Malcolm Han Wen Mak, Shanying Liang, Yam Meng Chan, Cheng Cheng Goh, Tina Peiting Lai, Audrey Hui Min Tan, Patrick Thng, Patrick Thng, Tillman Weyde, Sylvia Smit

Research Collection School Of Computing and Information Systems

Chronic wounds contribute to significant healthcare and economic burden worldwide. Wound assessment remains challenging given its complex and dynamic nature. The use of artificial intelligence (AI) and machine learning methods in wound analysis is promising. Explainable modelling can help its integration and acceptance in healthcare systems. We aim to develop an explainable AI model for analysing vascular wound images among an Asian population. Two thousand nine hundred and fifty-seven wound images from a vascular wound image registry from a tertiary institution in Singapore were utilized. The dataset was split into training, validation and test sets. Wound images were classified into …


Software Architecture In Practice: Challenges And Opportunities, Zhiyuan Wan, Yun Zhang, Xin Xia, Yi Jiang, David Lo Dec 2023

Software Architecture In Practice: Challenges And Opportunities, Zhiyuan Wan, Yun Zhang, Xin Xia, Yi Jiang, David Lo

Research Collection School Of Computing and Information Systems

Software architecture has been an active research field for nearly four decades, in which previous studies make significant progress such as creating methods and techniques and building tools to support software architecture practice. Despite past efforts, we have little understanding of how practitioners perform software architecture related activities, and what challenges they face. Through interviews with 32 practitioners from 21 organizations across three continents, we identified challenges that practitioners face in software architecture practice during software development and maintenance. We reported on common software architecture activities at software requirements, design, construction and testing, and maintenance stages, as well as corresponding …


Learning Program Semantics For Vulnerability Detection Via Vulnerability-Specific Inter-Procedural Slicing, Bozhi Wu, Shangqing Liu, Xiao Yang, Zhiming Li, Jun Sun, Shang-Wei Lin Dec 2023

Learning Program Semantics For Vulnerability Detection Via Vulnerability-Specific Inter-Procedural Slicing, Bozhi Wu, Shangqing Liu, Xiao Yang, Zhiming Li, Jun Sun, Shang-Wei Lin

Research Collection School Of Computing and Information Systems

Learning-based approaches that learn code representations for software vulnerability detection have been proven to produce inspiring results. However, they still fail to capture complete and precise vulnerability semantics for code representations. To address the limitations, in this work, we propose a learning-based approach namely SnapVuln, which first utilizes multiple vulnerability-specific inter-procedural slicing algorithms to capture vulnerability semantics of various types and then employs a Gated Graph Neural Network (GGNN) with an attention mechanism to learn vulnerability semantics. We compare SnapVuln with state-of-the-art learning-based approaches on two public datasets, and confirm that SnapVuln outperforms them. We further perform an ablation study …


End-To-End Task-Oriented Dialogue: A Survey Of Tasks, Methods, And Future Directions, Libo Qin, Wenbo Pan, Qiguang Chen, Lizi Liao, Zhou Yu, Yue Zhang, Wanxiang Che, Min Li Dec 2023

End-To-End Task-Oriented Dialogue: A Survey Of Tasks, Methods, And Future Directions, Libo Qin, Wenbo Pan, Qiguang Chen, Lizi Liao, Zhou Yu, Yue Zhang, Wanxiang Che, Min Li

Research Collection School Of Computing and Information Systems

End-to-end task-oriented dialogue (EToD) can directly generate responses in an end-to-end fashion without modular training, which attracts escalating popularity. The advancement of deep neural networks, especially the successful use of large pre-trained models, has further led to significant progress in EToD research in recent years. In this paper, we present a thorough review and provide a unified perspective to summarize existing approaches as well as recent trends to advance the development of EToD research. The contributions of this paper can be summarized: (1) First survey: to our knowledge, we take the first step to present a thorough survey of this …


Clusterprompt: Cluster Semantic Enhanced Prompt Learning For New Intent Discovery, Jinggui Liang, Lizi Liao Dec 2023

Clusterprompt: Cluster Semantic Enhanced Prompt Learning For New Intent Discovery, Jinggui Liang, Lizi Liao

Research Collection School Of Computing and Information Systems

The discovery of new intent categories from user utterances is a crucial task in expanding agent skills. The key lies in how to efficiently solicit semantic evidence from utterances and properly transfer knowledge from existing intents to new intents. However, previous methods laid too much emphasis on relations among utterances or clusters for transfer learning, while paying less attention to the usage of semantics. As a result, these methods suffer from in-domain over-fitting and often generate meaningless new intent clusters due to data distortion. In this paper, we present a novel approach called Cluster Semantic Enhanced Prompt Learning (CsePL) for …


A Black-Box Attack On Code Models Via Representation Nearest Neighbor Search, Jie Zhang, Wei Ma, Qiang Hu, Shangqing Liu, Xiaofei Xie, Yves Le Traon, Yang Liu Dec 2023

A Black-Box Attack On Code Models Via Representation Nearest Neighbor Search, Jie Zhang, Wei Ma, Qiang Hu, Shangqing Liu, Xiaofei Xie, Yves Le Traon, Yang Liu

Research Collection School Of Computing and Information Systems

Existing methods for generating adversarial code examples face several challenges: limted availability of substitute variables, high verification costs for these substitutes, and the creation of adversarial samples with noticeable perturbations. To address these concerns, our proposed approach, RNNS, uses a search seed based on historical attacks to find potential adversarial substitutes. Rather than directly using the discrete substitutes, they are mapped to a continuous vector space using a pre-trained variable name encoder. Based on the vector representation, RNNS predicts and selects better substitutes for attacks. We evaluated the performance of RNNS across six coding tasks encompassing three programming languages: Java, …


Generative Modelling Of Stochastic Actions With Arbitrary Constraints In Reinforcement Learning, Changyu Chen, Ramesha Karunasena, Thanh Hong Nguyen, Arunesh Sinha, Pradeep Varakantham Dec 2023

Generative Modelling Of Stochastic Actions With Arbitrary Constraints In Reinforcement Learning, Changyu Chen, Ramesha Karunasena, Thanh Hong Nguyen, Arunesh Sinha, Pradeep Varakantham

Research Collection School Of Computing and Information Systems

Many problems in Reinforcement Learning (RL) seek an optimal policy with large discrete multidimensional yet unordered action spaces; these include problems in randomized allocation of resources such as placements of multiple security resources and emergency response units, etc. A challenge in this setting is that the underlying action space is categorical (discrete and unordered) and large, for which existing RL methods do not perform well. Moreover, these problems require validity of the realized action (allocation); this validity constraint is often difficult to express compactly in a closed mathematical form. The allocation nature of the problem also prefers stochastic optimal policies, …


From Asset Flow To Status, Action And Intention Discovery: Early Malice Detection In Cryptocurrency, Ling Cheng, Feida Zhu, Yong Wang, Ruicheng Liang, Huiwen Liu Dec 2023

From Asset Flow To Status, Action And Intention Discovery: Early Malice Detection In Cryptocurrency, Ling Cheng, Feida Zhu, Yong Wang, Ruicheng Liang, Huiwen Liu

Research Collection School Of Computing and Information Systems

Cryptocurrency has been subject to illicit activities probably more often than traditional financial assets due to the pseudo-anonymous nature of its transacting entities. An ideal detection model is expected to achieve all three critical properties of early detection, good interpretability, and versatility for various illicit activities. However, existing solutions cannot meet all these requirements, as most of them heavily rely on deep learning without interpretability and are only available for retrospective analysis of a specific illicit type. To tackle all these challenges, we propose Intention Monitor for early malice detection in Bitcoin, where the on-chain record data for a certain …


Mitigating Membership Inference Attacks Via Weighted Smoothing, Minghan Tan, Xiaofei Xie, Jun Sun, Tianhao Wang Dec 2023

Mitigating Membership Inference Attacks Via Weighted Smoothing, Minghan Tan, Xiaofei Xie, Jun Sun, Tianhao Wang

Research Collection School Of Computing and Information Systems

Recent advancements in deep learning have spotlighted a crucial privacy vulnerability to membership inference attack (MIA), where adversaries can determine if specific data was present in a training set, thus potentially revealing sensitive information. In this paper, we introduce a technique, weighted smoothing (WS), to mitigate MIA risks. Our approach is anchored on the observation that training samples differ in their vulnerability to MIA, primarily based on their distance to clusters of similar samples. The intuition is clusters will make model predictions more confident and increase MIA risks. Thus WS strategically introduces noise to training samples, depending on whether they …


A Reliable And Secure Mobile Cyber-Physical Digital Microfluidic Biochip For Intelligent Healthcare, Yinan Yao, Decheng Qiu, Huangda Liu, Zhongliao Yang, Ximeng Liu, Yang Yang, Chen Dong Dec 2023

A Reliable And Secure Mobile Cyber-Physical Digital Microfluidic Biochip For Intelligent Healthcare, Yinan Yao, Decheng Qiu, Huangda Liu, Zhongliao Yang, Ximeng Liu, Yang Yang, Chen Dong

Research Collection School Of Computing and Information Systems

Digital microfluidic, as an emerging and potential technology, diversifies the biochemical applications platform, such as protein dilution sewage detection. At present, a vast majority of universal cyberphysical digital microfluidic biochips (DMFBs) transmit data through wires via personal computers and microcontrollers (like Arduino), consequently, susceptible to various security threats and with the popularity of wireless devices, losing competitiveness gradually. On the premise that security be ensured first and foremost, calls for wireless portable, safe, and economical DMFBs are imperative to expand their application fields, engage more users, and cater to the trend of future wireless communication. To this end, a new …


A Big Data Approach To Augmenting The Huff Model With Road Network And Mobility Data For Store Footfall Prediction, Ming Hui Tan, Kar Way Tan, Hoong Chuin Lau Dec 2023

A Big Data Approach To Augmenting The Huff Model With Road Network And Mobility Data For Store Footfall Prediction, Ming Hui Tan, Kar Way Tan, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

Conventional methodologies for new retail store catchment area and footfall estimation rely on ground surveys which are costly and time-consuming. This study augments existing research in footfall estimation through the innovative integration of mobility data and road network to create population-weighted centroids and delineate residential neighbourhoods via a community detection algorithm. Our findings are then used to enhance Huff Model which is commonly used in site selection and footfall estimation. Our approach demonstrated the vast potential residing within big data where we harness the power of mobility data and road network information, offering a cost-effective and scalable alternative. It obviates …


Combat Covid-19 At National Level Using Risk Stratification With Appropriate Intervention, Xuan Jin, Kar Way Tan Dec 2023

Combat Covid-19 At National Level Using Risk Stratification With Appropriate Intervention, Xuan Jin, Kar Way Tan

Research Collection School Of Computing and Information Systems

In the national battle against COVID-19, harnessing population-level big data is imperative, enabling authorities to devise effective care policies, allocate healthcare resources efficiently, and enact targeted interventions. Singapore adopted the Home Recovery Programme (HRP) in September 2021, diverting low-risk COVID-19 patients to home care to ease hospital burdens amid high vaccination rates and mild symptoms. While a patient's suitability for HRP could be assessed using broad-based criteria, integrating machine learning (ML) model becomes invaluable for identifying high-risk patients prone to severe illness, facilitating early medical assessment. Most prior studies have traditionally depended on clinical and laboratory data, necessitating initial clinic …


How Helpful Do Novice Programmers Find The Feedback Of An Automated Repair Tool?, Oka Kurniawan, Christopher M. Poskitt, Ismam Al Hoque, Norman Tiong Seng Lee, Cyrille Jégourel, Nachamma Sockalingam Dec 2023

How Helpful Do Novice Programmers Find The Feedback Of An Automated Repair Tool?, Oka Kurniawan, Christopher M. Poskitt, Ismam Al Hoque, Norman Tiong Seng Lee, Cyrille Jégourel, Nachamma Sockalingam

Research Collection School Of Computing and Information Systems

Immediate feedback has been shown to improve student learning. In programming courses, immediate, automated feedback is typically provided in the form of pre-defined test cases run by a submission platform. While these are excellent for highlighting the presence of logical errors, they do not provide novice programmers enough scaffolding to help them identify where an error is or how to fix it. To address this, several tools have been developed that provide richer feedback in the form of program repairs. Studies of such tools, however, tend to focus more on whether correct repairs can be generated, rather than how novices …


A Closer Look At The Security Risks In The Rust Ecosystem, Xiaoye Zheng, Zhiyuan Wan, Yun Zhang, Rui Chang, David Lo Dec 2023

A Closer Look At The Security Risks In The Rust Ecosystem, Xiaoye Zheng, Zhiyuan Wan, Yun Zhang, Rui Chang, David Lo

Research Collection School Of Computing and Information Systems

Rust is an emerging programming language designed for the development of systems software. To facilitate the reuse of Rust code, crates.io, as a central package registry of the Rust ecosystem, hosts thousands of third-party Rust packages. The openness of crates.io enables the growth of the Rust ecosystem but comes with security risks by severe security advisories. Although Rust guarantees a software program to be safe via programming language features and strict compile-time checking, the unsafe keyword in Rust allows developers to bypass compiler safety checks for certain regions of code. Prior studies empirically investigate the memory safety and concurrency bugs …


Vision Paper: Advancing Of Ai Explainability For The Use Of Chatgpt In Government Agencies: Proposal Of A 4-Step Framework, Hui Shan Lee, Shankararaman, Venky, Eng Lieh Ouh Dec 2023

Vision Paper: Advancing Of Ai Explainability For The Use Of Chatgpt In Government Agencies: Proposal Of A 4-Step Framework, Hui Shan Lee, Shankararaman, Venky, Eng Lieh Ouh

Research Collection School Of Computing and Information Systems

This paper explores ChatGPT’s potential in aiding government agencies, drawing from a case study based on a government agency in Singapore. While ChatGPT’s text generation abilities offer promise, it brings inherent challenges, including data opacity, potential misinformation, and occasional errors. These issues are especially critical in government decision-making.Public administration’s core values of transparency and accountability magnify these concerns. Ensuring AI alignment with these principles is imperative, given the potential repercussions on policy outcomes and citizen trust.AI explainability plays a central role in ChatGPT’s adoption within government agencies. To address these concerns, we propose strategies like prompt engineering, data governance, and …


Class Participation: Using Technology To Enhance Efficiency And Fairness, Benjamin Gan, Eng Lieh Ouh Dec 2023

Class Participation: Using Technology To Enhance Efficiency And Fairness, Benjamin Gan, Eng Lieh Ouh

Research Collection School Of Computing and Information Systems

Class participation can be considered as contribution to discussion, attendance, presentations, unsolicited responses, questions, comments, etc. What counts may vary across individual teachers. The more students participate, the less memorization they do, and the more they engage in higher levels of thinking, including interpretation, analysis, and synthesis. However, only a handful of students in many classrooms participate regularly, a phenomenon dubbed as "consolidation of responsibility". This study provides a literature review of inclass participation, as well as pedagogies and technologies that enhance participation. Pedagogies such as active learning, group learning, project-based learning and flipped classroom. Technologies to automate attendance taking, …


Sustainability Projects With A Community Partner: A Social Norm Nudging Effort, Benjamin Gan, Thomas Menkhoff, Eng Lieh Ouh Dec 2023

Sustainability Projects With A Community Partner: A Social Norm Nudging Effort, Benjamin Gan, Thomas Menkhoff, Eng Lieh Ouh

Research Collection School Of Computing and Information Systems

Singapore students from two inter-disciplinary courses worked with stakeholders of a local business association community partner on a series of sustainability topics to learn about climate change, its effects, and actions to mitigate them. They empathized with the association stakeholders, proposed a digital technology solution, tested their prototypes, and presented the final action plans. After the projects were completed, we found climate proficient (83%), motivated (83%), engaged (97%), and satisfied (70%) students; and two influencing predictors: interest/enjoyment and emotional engagement. The study results suggest that getting students interested and emotionally engaged in sustainability projects is an important first step towards …


Vision Paper: Advancing Of Ai Explainability For The Use Of Chatgpt In Government Agencies: Proposal Of A 4-Step Framework, Hui Shan Lee, Shankararaman, Venky, Eng Lieh Ouh Dec 2023

Vision Paper: Advancing Of Ai Explainability For The Use Of Chatgpt In Government Agencies: Proposal Of A 4-Step Framework, Hui Shan Lee, Shankararaman, Venky, Eng Lieh Ouh

Research Collection School Of Computing and Information Systems

This paper explores ChatGPT’s potential in aiding government agencies, drawing from a case study based on a government agency in Singapore. While ChatGPT’s text generation abilities offer promise, it brings inherent challenges, including data opacity, potential misinformation, and occasional errors. These issues are especially critical in government decision-making.Public administration’s core values of transparency and accountability magnify these concerns. Ensuring AI alignment with these principles is imperative, given the potential repercussions on policy outcomes and citizen trust.AI explainability plays a central role in ChatGPT’s adoption within government agencies. To address these concerns, we propose strategies like prompt engineering, data governance, and …


Just Adjust One Prompt: Enhancing In-Context Dialogue Scoring Via Constructing The Optimal Subgraph Of Demonstrations And Prompts, Jiashu Pu, Ling Cheng, Lu Fan, Tangjie Lv, Rongsheng Zhang Dec 2023

Just Adjust One Prompt: Enhancing In-Context Dialogue Scoring Via Constructing The Optimal Subgraph Of Demonstrations And Prompts, Jiashu Pu, Ling Cheng, Lu Fan, Tangjie Lv, Rongsheng Zhang

Research Collection School Of Computing and Information Systems

The use of modern Large Language Models (LLMs) as chatbots still has some problems such as hallucinations and lack of empathy. Identifying these issues can help improve chatbot performance. The community has been continually iterating on reference-free dialogue evaluation methods based on large language models (LLMs) that can be readily applied. However, many of these LLM-based metrics require selecting specific datasets and developing specialized training tasks for different evaluation dimensions (e.g., coherence, informative). The developing step can be time-consuming and may need to be repeated for new evaluation dimensions. To enable efficient and flexible adaptation to diverse needs of dialogue …


Refinement-Based Specification And Analysis Of Multi-Core Arinc 653 Using Event-B, Feng Zhang, Leping Zhang, Yongwang Zhao, Yang Liu, Jun Sun Dec 2023

Refinement-Based Specification And Analysis Of Multi-Core Arinc 653 Using Event-B, Feng Zhang, Leping Zhang, Yongwang Zhao, Yang Liu, Jun Sun

Research Collection School Of Computing and Information Systems

ARINC 653 as the de facto standard of partitioning operating systems has been applied in many safety-critical domains. The multi-core version of ARINC 653, ARINC 653 Part 1-4 (Version 4), provides support for services to be utilized with a module that contains multiple processor cores. Formal specification and analysis of this standard document could provide a rigorous specification and uncover concealed errors in the textual description of service requirements. This article proposes a specification method for concurrency on a multi-core platform using Event-B, and a refinement structure for the complicated ARINC 653 Part 1-4 provides a comprehensive, stepwise refinement-based Event-B …


Last Digit Tendency: Lucky Number And Psychological Rounding In Mobile Transactions, Hai Wang, Tian Lu, Yingjie Zhang, Yue Wu, Yiheng Sun, Jingran Dong, Wen Huang Dec 2023

Last Digit Tendency: Lucky Number And Psychological Rounding In Mobile Transactions, Hai Wang, Tian Lu, Yingjie Zhang, Yue Wu, Yiheng Sun, Jingran Dong, Wen Huang

Research Collection School Of Computing and Information Systems

The distribution of digits in numbers obtained from different sources reveals interesting patterns. The well-known Benford’s law states that the first digits in many real-life numerical data sets have an asymmetric, logarithmic distribution in which small digits are more common; this asymmetry diminishes for subsequent digits, and the last digit tends to be uniformly distributed. In this paper, we investigate the digit distribution of numbers in a large mobile transaction data set with 835 million mobile transactions and payments made by approximately 460,000 users in more than 300 cities. Although the first digits of the numbers in these mobile transactions …


The Value Of Official Website Information In The Credit Risk Evaluation Of Smes, Cuiqing Jiang, Chang Yin, Qian Tang, Zhao Wang Dec 2023

The Value Of Official Website Information In The Credit Risk Evaluation Of Smes, Cuiqing Jiang, Chang Yin, Qian Tang, Zhao Wang

Research Collection School Of Computing and Information Systems

The official websites of small and medium-sized enterprises (SMEs) not only reflect the willingness of an enterprise to disclose information voluntarily, but also can provide information related to the enterprises’ historical operations and performance. This research investigates the value of official website information in the credit risk evaluation of SMEs. To study the effect of different kinds of website information on credit risk evaluation, we propose a framework to mine effective features from two kinds of information disclosed on the official website of a SME—design-based information and content-based information—in predicting its credit risk. We select the SMEs in the software …


Benchmarking Foundation Models With Language-Model-As-An-Examiner, Yushi Bai, Jiahao Ying, Yixin Cao, Xin Lv, Yuze He, Xiaozhi Wang, Jifan Yu, Kaisheng Zeng, Yijia Xiao, Haozhe Lyu, Jiayin Zhang, Juanzi Li, Lei Hou Dec 2023

Benchmarking Foundation Models With Language-Model-As-An-Examiner, Yushi Bai, Jiahao Ying, Yixin Cao, Xin Lv, Yuze He, Xiaozhi Wang, Jifan Yu, Kaisheng Zeng, Yijia Xiao, Haozhe Lyu, Jiayin Zhang, Juanzi Li, Lei Hou

Research Collection School Of Computing and Information Systems

Numerous benchmarks have been established to assess the performance of foundation models on open-ended question answering, which serves as a comprehensive test of a model’s ability to understand and generate language in a manner similar to humans. Most of these works focus on proposing new datasets, however, we see two main issues within previous benchmarking pipelines, namely testing leakage and evaluation automation. In this paper, we propose a novel benchmarking framework, Language-Model-as-an-Examiner, where the LM serves as a knowledgeable examiner that formulates questions based on its knowledge and evaluates responses in a reference-free manner. Our framework allows for effortless extensibility …


Exgen: Ready-To-Use Exercise Generation In Introductory Programming Courses, Nguyen Binh Duong Ta, Hua Gia Phuc Nguyen, Gottipati Swapna Dec 2023

Exgen: Ready-To-Use Exercise Generation In Introductory Programming Courses, Nguyen Binh Duong Ta, Hua Gia Phuc Nguyen, Gottipati Swapna

Research Collection School Of Computing and Information Systems

In introductory programming courses, students as novice programmers would benefit from doing frequent practices set at a difficulty level and concept suitable for their skills and knowledge. However, setting many good programming exercises for individual learners is very time-consuming for instructors. In this work, we propose an automated exercise generation system, named ExGen, which leverages recent advances in pre-trained large language models (LLMs) to automatically create customized and ready-to-use programming exercises for individual students ondemand. The system integrates seamlessly with Visual Studio Code, a popular development environment for computing students and software engineers. ExGen effectively does the following: 1) maintaining …


Truncated Affinity Maximization: One-Class Homophily Modeling For Graph Anomaly Detection, Hezhe Qiao, Guansong Pang Dec 2023

Truncated Affinity Maximization: One-Class Homophily Modeling For Graph Anomaly Detection, Hezhe Qiao, Guansong Pang

Research Collection School Of Computing and Information Systems

We reveal a one-class homophily phenomenon, which is one prevalent property we find empirically in real-world graph anomaly detection (GAD) datasets, i.e., normal nodes tend to have strong connection/affinity with each other, while the homophily in abnormal nodes is significantly weaker than normal nodes. However, this anomaly-discriminative property is ignored by existing GAD methods that are typically built using a conventional anomaly detection objective, such as data reconstruction. In this work, we explore this property to introduce a novel unsupervised anomaly scoring measure for GAD – local node affinity – that assigns a larger anomaly score to nodes that are …


Neural Airport Ground Handling, Yaoxin Wu, Jianan Zhou, Yunwen Xia, Xianli Zhang, Zhiguang Cao, Jie Zhang Dec 2023

Neural Airport Ground Handling, Yaoxin Wu, Jianan Zhou, Yunwen Xia, Xianli Zhang, Zhiguang Cao, Jie Zhang

Research Collection School Of Computing and Information Systems

Airport ground handling (AGH) offers necessary operations to flights during their turnarounds and is of great importance to the efficiency of airport management and the economics of aviation. Such a problem involves the interplay among the operations that leads to NP-hard problems with complex constraints. Hence, existing methods for AGH are usually designed with massive domain knowledge but still fail to yield high-quality solutions efficiently. In this paper, we aim to enhance the solution quality and computation efficiency for solving AGH. Particularly, we first model AGH as a multiple-fleet vehicle routing problem (VRP) with miscellaneous constraints including precedence, time windows, …


Through The Lens Of A Naturalist: How Learning About Nature Promotes Nature Connectedness Via Awe, Shu Tian Ng, Angela K. Y. Leung, Sarah Hian May Chan Dec 2023

Through The Lens Of A Naturalist: How Learning About Nature Promotes Nature Connectedness Via Awe, Shu Tian Ng, Angela K. Y. Leung, Sarah Hian May Chan

Research Collection School of Social Sciences

Environmental educators stress the importance of engaging with the wonders of the Earth in promoting nature connectedness. However, it remains unclear if learning about nature has an incremental effect beyond mere exposure to nature and what psychological mechanism can explain such a learning effect if it exists. To fill this gap, we propose a mediation model in which learning about nature promotes a sense of awe—a self-transcendent emotion associated with the recognition of vastness in nature. A sense of awe, in turn, promotes nature connectedness. Study 1 employed a cross-sectional survey and offered preliminary support for the proposed model, with …


The Use Of Deception In Dementia-Care Robots: Should Robots Tell "White Lies" To Limit Emotional Distress?, Samuel R. Cox, Grace Cheong, Wei Tsang Ooi Dec 2023

The Use Of Deception In Dementia-Care Robots: Should Robots Tell "White Lies" To Limit Emotional Distress?, Samuel R. Cox, Grace Cheong, Wei Tsang Ooi

ROSA Journal Articles and Publications

With projections of ageing populations and increasing rates of dementia, there is need for professional caregivers. Assistive robots have been proposed as a solution to this, as they can assist people both physically and socially. However, caregivers often need to use acts of deception (such as misdirection or white lies) in order to ensure necessary care is provided while limiting negative impacts on the cared-for such as emotional distress or loss of dignity. We discuss such use of deception, and contextualise their use within robotics.


Transformer-Based Multi-Task Learning For Crisis Actionability Extraction, Yuhao Zhang, Siaw Ling Lo, Phyo Yi Win Myint Dec 2023

Transformer-Based Multi-Task Learning For Crisis Actionability Extraction, Yuhao Zhang, Siaw Ling Lo, Phyo Yi Win Myint

Research Collection School Of Computing and Information Systems

Social media has become a valuable information source for crisis informatics. While various methods were proposed to extract relevant information during a crisis, their adoption by field practitioners remains low. In recent fieldwork, actionable information was identified as the primary information need for crisis responders and a key component in bridging the significant gap in existing crisis management tools. In this paper, we proposed a Crisis Actionability Extraction System for filtering, classification, phrase extraction, severity estimation, localization, and aggregation of actionable information altogether. We examined the effectiveness of transformer-based LSTM-CRF architecture in Twitter-related sequence tagging tasks and simultaneously extracted actionable …