Major Project List

Download as xlsx, pdf, or txt
Download as xlsx, pdf, or txt
You are on page 1of 11

A Computational Dynamic Trust Model For User Authorization

A Computational dynamic trust model for user authorization

A Distortion-Resistant Routing Framework For Video Traffic In Wireless Multihop Networks

A Distributed Three-Hop Routing Protocol To Increase The Capacity Of Hybrid Wireless Networks

A Framework For Secure Computations With Two Non-Colluding Servers And Multiple Clients, Applied To Recomm

A Hop-by-Hop Routing Mechanism for Green Internet

A Locality Sensitive Low-Rank Model for Image Tag Completion

A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing

A Profit Maximization Scheme With Guaranteed Quality Of Service In Cloud Computing

A Proximity-Aware Interest-Clustered P2p File Sharing System


A Proximity-Aware Interest-Clustered P2P FileSharing System

A Scalable And Reliable Matching Service For Content-Based Publish/Subscribe Systems

A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud

A Shoulder Surfing Resistant Graphical Authentication System

A Stable Approach for Routing Queries in Unstructured P2P Networks

A Time Efficient Approach For Detecting Errors In Big Sensor Data On Cloud

Agent-Based Interactions And Economic Encounters In An Intelligent Intercloud


Agent-based Interactions and EconomicEncounters in an Intelligent InterCloud

An Attribute Assisted Reranking Model For Web Image Search1

An Authenticated Trust And Reputation Calculation And Management System For Cloud And Sensor Networks Integ

An Efficient Privacy-Preserving Ranked Keyword Search Method

Anonymizing Collections Of Tree-Structured Data

Answering Approximate Queries Over XML Data

Asymmetric Social Proximity Based Private Matching Protocols For Online Social Networks

Attribute-Based Data Sharing Scheme Revisited in Cloud Computing


Audit-Free Cloud Storage Via Deniable Attribute-Based Encryption

Authenticated Key Exchange Protocols For Parallel Network File Systems

Automatically Mining Facets for Queries from Their Search Results

Best Keyword Cover Search

Booster in High Dimensional Data Classification

Building an intrusion detection system using a filter-based feature selection algorithm

CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System

Charm: A Cost-Efficient Multi-Cloud Data Hosting Scheme With High Availability


CHARM: A Cost-Efficient Multi-Cloud DataHosting Scheme with High Availability

Circuit Ciphertext-policy Attribute-based

Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing

Cloud Armor Supporting Reputation-Based Trust Management For Cloud Services

Co-Extracting Opinion Targets And Opinion Words From Online Reviews Based On The Word Alignment Model

Conditional Identity-Based Broadcast Proxy

Configurations for Map Reduce Workloads

Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds

Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information

Context-Based Diversification For Keyword Queries Over Xml Data

Continuous And Transparent User Identity Verification For Secure Internet Services

Continuous Answering Holistic Queries over

Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts

Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute Based Encryption

Cost-Aware Secure Routing (Caser) Protocol Design For Wireless Sensor Networks

Cost-Effective Resource Allocation Of Overlay Routing Networks

Crowdsourcing for Top-K Query Processing over Uncertain Data

Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder

Data Lineage in Malicious Environments


Data Visualization of the echo query system

Ddsga A Data Driven Semi Global Alignment Approach For Detecting Masquerade Attacks

Designing High Performance Web-Based Computing Services To Promote Telemedicine Database Management Syste

Detecting Malicious Facebook Applications

Detecting Node Failures in Mobile Wireless Networks A Probabilistic Approach

Development of Integrated Mobile Money System Using Near Field Communication (NFC)

DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments

DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud

Discovery Of Ranking Fraud For Mobile Apps

Domain-Sensitive Recommendation with User-Item Subgroup Analysis

Dual-Server Public-Key Encryption With Keyword

Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage

Dynamic and Public Auditing with Fair Arbitration for Cloud Data

Dynamic Job Ordering and Slot

Dynamic Routing For Data Integrity And Delay Differentiated Services In Wireless Sensor Networks

Dynamic Routing For Data Integrity And Delay Differentiated Services In Wireless Sensor Networks

Effective Key Management In Dynamic Wireless Sensor Networks

Efficient Algorithms for Mining Top-K High Utility Itemsets

Efficient And Privacy-Aware Data Aggregation In Mobile Sensing

Efficient Cache-Supported Path Planning on Roads

Emr A Scalable Graph-Based Ranking Model For Content-Based Image Retrieval

Emr: A Scalable Graph-Based Ranking Model For Content-Based Image Retrieval

Enabling Cloud Storage Auditing With Key-Exposure Resistance

Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates

Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries Over Encrypted Cloud Data

Energy and Memory Efficient Clone Detection in Wireless Sensor Networks

Entity linking with knowledge database issues, techniques, solutions


EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data

Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services

Focs: fast over lapped community clustering

FRoDO: Fraud Resilient Device for Off-Line Micro-Payments

Geometric Range Search on Encrypted Spatial Data

Identity-Based Encryption with Cloud Revocation Authority and Its Applications

Identity-Based Encryption With Outsourced Revocation In Cloud Computing

Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud

Inference Attack on Browsing History

iPath Path Inference in Wireless Sensor Networks

Key Updating for Leakage Resiliency With

Key Updating for Leakage Resiliency With Application to AES Modes of Operation

Key-Aggregate Searchable Encryption (Kase) For Group Data Sharing Via Cloud Storage
Key-Aggregate Searchable Encryption (KASE)for Group Data Sharing via Cloud Storage

Keylogging-resistant Visual Authentication protocol

kNNVWC An Efficient k Nearest Neighbours Approach based

Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud

Lightweight Secure Scheme For Detecting Provenance Forgery And Packet Drop Attacks

Location Aware Keyword Query Suggestion Based on Document Proximity

Location-Aware And Personalid Collaborative Filtering For Web Service Recommendation

Location-Aware And Personalized Collaborative Filtering For Web Service Recommendation

Making Digital Artifacts

Malware Detection in Cloud Computing Infrastructures

Malware Propagation

Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine-Grained Benchmark, and Feature Evaluation

Maximizing P2p File Access Availability In Mobile Ad Hoc Networks Though Replication For Efficient File Sharing

Merlin: Exploratory Analysiswith Imprecise Queries


Mining User Aware Rare Sequential Topic Patterns in Document Streams

Multi-Modal Event Topic Model for Social Event Analysis

My Privacy My Decision Control Of Photo Sharing On Online Social Networks

Nearest Keyword Set Search in Multi-Dimensional Datasets

On Summarization And Timeline Generation For Evaluationary Tweet Streams

On Summarization And Timeline Generation For Evolutionary Tweet Streams

Online Multi-Modal Distance Metric Learning with Application to Image Retrieval

Opportunistic Routing Algorithm For Relay Node Selection In Wireless Sensor Networks

Opportunistic Routing With Congestion Diversity in

Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks

OPTIMIZATION OF DENSITY BASED HIERARCHICAL clustering algorithm


Passive IP Traceback: Disclosing The Locations Of IP Spoofers From Path Backscatter

Passive IpTraceback: Disclosing The Locations Of IpSpoofers From Path Backscatter

Prediction of Movies Box Office Performance Using Social Media

Privacy Policy Inference Of User Uploaded Images On Content Sharing Sites

Privacy Preserving And Truthful Detection Of Packet Dropping Attacks

Privacy Preserving And Truthful Detection Of Packet Dropping Attacks(2)

Privacy Preserving Public Audit For Cloud Storage

Privacy Preserving Ranked Multi-Keyword Search For Multiple Data Owners In Cloud Computing

Privacy-Enhanced Web Service Composition

Privacy-Preserving And Truthful Detection Of Packet Dropping Attacks In Wireless Ad Hoc Networks

Progressive Duplicate Detection

Provable Multicopy Dynamic Data Possession

Public Integrity Auditing For Shared Dynamic Cloud Data With Group User Revocation

Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databasescode

Quantifying Political Leaning from Tweets

Quantifying Political Leaning from Tweets, Retweets, and Retweeters


Rating Prediction based on Social Sentiment from Textual Reviews

Real Time Traffic Detection From Twitter Streaming Analysis

Real Time Traffic Detection From Twitter Streaming Analysis

Real-Time Semantic Search Using Approximate

Relevance Feedback Algorithms Inspired By Quantum Detection

Removing of Unwanted Messages From Online Social Networks

RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA

Reverse Nearest Neighbors In Unsupervised Distance-Based Outlier Detection

Route-Saver-Leveraging-Route-Apis-For-Accurate-And-Efficient-Query-Processing-At-Location-Based-Services_Co

Rule-Based Method For Entity Resolution

Scalable Constrained Spectral Clustering

SecRBAC:Secure Data in Clouds

Secure Data Aggregation Technique For Wireless Sensor Networks In The Presence Of Collusion Attacks

Secure Data Retrieval For Decentralized Disruption-Tolerant Military Networks

Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption

Secure Distributed Deduplication Systems

Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming

Secure Spatial Top-K Query Processing Via Untrusted Location-Based Service Providers

Securing Network Processors with High Performance Hardware Monitors

Sentiment Embeddings with Applications to Sentiment Analysis

Service Operator-Aware Trust Scheme For Resource Matchmaking Across Multiple Clouds

Smart Crawler

Software Puzzle A Countermeasure To Resource Inflated Denial Of Service Attacks

Sparsity Learning Formulations for Mining

Sparsity Learning Formulations For Mining Time-Varying Data

Spatial Reusability-Aware Routing

Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks


SR-TOWARDS ONLINE SHORTEST PATH Computation

STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users

Structured Learning from Heterogeneous Behavior

Tag Based Image Search by Social Re-ranking

T-Closeness Through Micro Aggregation Strict Privacy With Enhanced Utility Preservation
T-Closeness Through MicroAggregation Strict Privacy With Enhanced Utility Preservation

The impact of you storage on edit recommendations

Time-Varying Data

TmacsA robust and verifiable threshold multi- authority access control

Top k Dominating Queries on Incomplete Data_Code

Topic Detection by Clustering Keywords


TopicSketch Real-time Bursty Topic Detection

Top-k Dominating Queries on Incomplete Data

Towards Effective Bug Triage with Software Data Reduction Techniques

Towards Optimized Fine-Grained Pricing Of Iaas Cloud Platform Iaas Cloud Platform

Towards Secure And Dependable Storage Service In Cloud Storage


Towards Secure and Dependable Storage servioce in cloud storage

Tracking Temporal Community Strength In Dynamic Networks

Traffic Pattern-Based Content Leakage

Tweet Segmentation And Its Application To Named Entity Recognition

Two-Factor Data Security Protection Mechanism for Cloud Storage System

User Authentication by Typing Pattern forComputer and Computer based devices

User-Defined Privacy Grid System For Continuous Location-Based Services

Using Hashtag Graph-based Topic Model to Connect Semantically-related Words without Co-occurrence in Microblogs

Wireless Ad Hoc Networks


Data mining
Cloud Computing
Image Processing
Mobile Computing
Networking
Secure Computing

You might also like