Survey
* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project
JAVA Projects CLOUD COMPUTING 1 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud 2016 2 Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud 2016 3 Two-Factor Data Security Protection Mechanism for Cloud Storage System 2016 4 5 CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing 2016 2016 6 CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services 2016 7 Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email 2016 8 TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage 2016 9 Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services 2016 10 An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing 2016 11 A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data 2016 12 Attribute-Based Data Sharing Scheme Revisited in Cloud Computing 2016 13 Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud 2016 14 Privacy-Preserving Data Aggregation in Mobile Phone Sensing 2016 15 An Efficient Privacy-Preserving Ranked Keyword Search Method 2016 16 Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy ReEncryption Function for E-Health Clouds 2016 17 Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage 2016 18 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates 2016 19 20 Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained OwnerEnforced Search Authorization in the Cloud 2016 2016 21 Secure Cloud Storage Meets with Secure Network Coding 2016 22 A Hybrid Cloud Approach for Secure Authorized Deduplication 2015 23 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data 2015 24 Supporting multi data stores applications in cloud environments 2015 25 BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value Store 2015 26 Secure Distributed Deduplication Systems with Improved Reliability 2015 27 28 Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributed m-Healthcare Cloud Computing System 2015 2015 29 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security 2015 30 Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform 2015 31 Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data 2014 32 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage 2014 33 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud 2014 34 Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds 2014 35 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System 36 Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation 2014 37 Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases 2014 38 Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage 2014 39 A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud 2013 2014 2013 40 CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring 41 QoS Ranking Prediction for Cloud Services 42 Winds of Change: From Vendor Lock-In to the Meta Cloud 43 A Load Balancing Model Based on Cloud Partitioning for the Public Cloud 2013 44 Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attributebased Encryption 2013 45 Efficient similarity search over encrypted data 2012 46 Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data 2012 2013 2013 DATA MINING 1 A Simple Message-Optimal Algorithm for Random Sampling from a Distributed Stream 2 Clustering Data Streams Based on Shared Density between Micro-Clusters 3 Booster in High Dimensional Data Classification 4 Efficient Algorithms for Mining Top-K High Utility Itemsets 5 Automatically Mining Facets for Queries from Their Search Results 6 Domain-Sensitive Recommendation with User-Item Subgroup Analysis 7 A Novel Recommendation Model Regularized with User Trust and Item Ratings 8 DARE: A Deduplication-Aware Resemblance Detection and Elimination Scheme for Data Reduction with Low Overheads 9 A Mixed Generative-Discriminative Based Hashing Method 10 DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud 11 Exploit Every Bit: Effective Caching for High-Dimensional Nearest Neighbor Search 12 Location Aware Keyword Query Suggestion Based on Document Proximity 13 Nearest Keyword Set Search in Multi-Dimensional Datasets 2016 2016 2016 2016 2016 2016 2016 2016 2016 2016 2016 2016 2016 14 Probabilistic Static Load-Balancing of Parallel Mining of Frequent Sequences 15 Top-Down XML Keyword Query Processing 16 Top-k Spatio-Textual Similarity Join 17 Making Digital Artifacts on the Web Verifiable and Reliable 18 Structured Learning from Heterogeneous Behavior for Social Identity Linkage 19 k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data 20 Rank-Based Similarity Search: Reducing the Dimensional Dependence 21 Best Keyword Cover Search 22 Context-Based Diversification for Keyword Queries Over XML Data 23 Progressive Duplicate Detection 24 Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services 25 A Cocktail Approach for Travel Package Recommendation 2015 2014 26 Fast Nearest Neighbor Search with Keywords 2014 27 Privacy-Preserving and Content-Protecting Location Based Queries 2014 28 Motif-Based Hyponym Relation Extraction from Wikipedia Hyperlinks 2014 29 Spatial Approximate String Search 30 A Survey of XML Tree Patterns 2013 31 A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data 2013 32 Privacy Preserving Delegated Access Control in Public Clouds 2013 33 Dynamic Query Forms for Database Queries 2013 NET WORKING & NETWORK SECURITY 2016 2016 2016 2015 2015 2015 2015 2015 2015 2015 2013 1 2 Multi-Grained Block Management to Enhance the Space Utilization of File Systems on PCM Storages Resource-Saving File Management Scheme for Online Video Provisioning on Content Delivery Networks 2016 2016 3 Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks 2016 4 PASER: Secure and Efficient Routing Approach for Airborne Mesh Networks 2016 5 Active Trust : Secure and Trustable Routing in Wireless Sensor Networks 2016 6 Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks 2016 7 Fair Routing for Overlapped Cooperative Heterogeneous Wireless Sensor Networks 2016 8 Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing 2015 9 Cost-Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks 2015 10 Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks 2015 11 Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design 2015 12 Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks 2015 13 Automatic Test Packet Generation 2014 14 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks 2014 15 Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices 2014 16 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes 2014 17 A Two-stage Deanonymization Attack Against Anonymized Social Networks 2014 18 Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality 19 Detection and Localization of Multiple Spoofing Attackers in Wireless Networks 2013 20 Fast Transmission to Remote Cooperative Groups A New Key Management Paradigm 2013 21 Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks 2013 2013 22 DRINA A Lightweight And Reliable Routing 2012 23 AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies 2012 24 FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks 2012 25 The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks 2012 BIG DATA 1 Dynamic Job Ordering and Slot Configurations for MapReduce Workloads 2016 2 On Traffic-Aware Partition and Aggregation in MapReduce for Big Data Applications 2016 3 Hybrid Job-Driven Scheduling for Virtual MapReduce Clusters 2016 4 Operational-Log Analysis for Big Data Systems 2016 5 A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud 2015 6 BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value Store 2015 7 Two Steps Genetic Programming for Big Data 2015 8 Data Mining with Big Data 2014 9 A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud 2014 MOBILE COMPUTING 1 Providing Privacy-Aware Incentives in Mobile Sensing Systems 2016 2 Energy and Memory Efficient Clone Detection in Wireless Sensor Networks 2016 3 Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach 2016 4 Privacy-Aware High-Quality Map Generation with Participatory Sensing 2016 5 Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks 2015 6 Wormhole Attack Detection Algorithms in Wireless Network Coding Systems 2015 7 Preserving Location Privacy in Geo-Social Applications 2014 8 Efficient Authentication for Mobile and Pervasive Computing 2014 9 IP-Geo location Mapping for Moderately Connected Internet Regions 10 11 12 13 Delay-Optimal Broadcast for Multi hop Wireless Networks Using Self-Interference Cancellation Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks Search Me If You Can Privacy-preserving Location Query Service Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions 2013 2013 2013 2013 2012 SECURE COMPUTING 1 Inference Attack on Browsing History of Twitter Users Using Public Click Analytics and Twitter Metadata 2016 2 Privacy Protection for Wireless Medical Sensor Data 2016 3 Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data 2016 4 Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts 2016 5 Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers 2015 6 Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks 2015 7 A Computational Dynamic Trust Model for User Authorization 2015 8 Enabling Cloud Storage Auditing With Key-Exposure Resistance 2015 PARALLEL & DISTRIBUTED SYSTEMS 1 Hybrid Job-Driven Scheduling for Virtual MapReduce Clusters 2016 2 Resource Allocation in Cloud Computing Using the Uncertainty Principle of Game Theory 2016 3 A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data 2016 4 Game Theoretic Resource Allocation in Media Cloud with Mobile Social Users 2016 5 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security 2015 6 Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design 2015 7 Secure Distributed Deduplication Systems with Improved Reliability 2015 8 Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing 2015 9 Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption 2014 10 A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis 2013 11 Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment 2013 12 IP-Geo location Mapping for Moderately Connected Internet Regions 2013