Download Project List

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
JAVA Projects
CLOUD COMPUTING
1
A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
2016
2
Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the
Cloud
2016
3
Two-Factor Data Security Protection Mechanism for Cloud Storage System
2016
4
5
CDA Generation and Integration for Health Information Exchange Based on Cloud Computing
System
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in
Cloud Computing
2016
2016
6
CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services
2016
7
Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
2016
8
TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public
Cloud Storage
2016
9
Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services
2016
10
An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing
2016
11
A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
2016
12
Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
2016
13
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public
Cloud
2016
14
Privacy-Preserving Data Aggregation in Mobile Phone Sensing
2016
15
An Efficient Privacy-Preserving Ranked Keyword Search Method
2016
16
Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy ReEncryption Function for E-Health Clouds
2016
17
Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage
2016
18
Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
2016
19
20
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud
Computing
Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained OwnerEnforced Search Authorization in the Cloud
2016
2016
21
Secure Cloud Storage Meets with Secure Network Coding
2016
22
A Hybrid Cloud Approach for Secure Authorized Deduplication
2015
23
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
2015
24
Supporting multi data stores applications in cloud environments
2015
25
BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value Store
2015
26
Secure Distributed Deduplication Systems with Improved Reliability
2015
27
28
Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based
Encryption
PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative
Authentication in Distributed m-Healthcare Cloud Computing System
2015
2015
29
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
2015
30
Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform
2015
31
Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
2014
32
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
2014
33
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
2014
34
Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
2014
35
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
36
Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
2014
37
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
2014
38
Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
2014
39
A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy
Preserving of Intermediate Data Sets in Cloud
2013
2014
2013
40
CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
41
QoS Ranking Prediction for Cloud Services
42
Winds of Change: From Vendor Lock-In to the Meta Cloud
43
A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
2013
44
Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attributebased Encryption
2013
45
Efficient similarity search over encrypted data
2012
46
Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
2012
2013
2013
DATA MINING
1
A Simple Message-Optimal Algorithm for Random Sampling from a Distributed Stream
2
Clustering Data Streams Based on Shared Density between Micro-Clusters
3
Booster in High Dimensional Data Classification
4
Efficient Algorithms for Mining Top-K High Utility Itemsets
5
Automatically Mining Facets for Queries from Their Search Results
6
Domain-Sensitive Recommendation with User-Item Subgroup Analysis
7
A Novel Recommendation Model Regularized with User Trust and Item Ratings
8
DARE: A Deduplication-Aware Resemblance Detection and Elimination Scheme for Data
Reduction with Low Overheads
9
A Mixed Generative-Discriminative Based Hashing Method
10
DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud
11
Exploit Every Bit: Effective Caching for High-Dimensional Nearest Neighbor Search
12
Location Aware Keyword Query Suggestion Based on Document Proximity
13
Nearest Keyword Set Search in Multi-Dimensional Datasets
2016
2016
2016
2016
2016
2016
2016
2016
2016
2016
2016
2016
2016
14
Probabilistic Static Load-Balancing of Parallel Mining of Frequent Sequences
15
Top-Down XML Keyword Query Processing
16
Top-k Spatio-Textual Similarity Join
17
Making Digital Artifacts on the Web Verifiable and Reliable
18
Structured Learning from Heterogeneous Behavior for Social Identity Linkage
19
k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
20
Rank-Based Similarity Search: Reducing the Dimensional Dependence
21
Best Keyword Cover Search
22
Context-Based Diversification for Keyword Queries Over XML Data
23
Progressive Duplicate Detection
24
Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing
at Location-Based Services
25
A Cocktail Approach for Travel Package Recommendation
2015
2014
26
Fast Nearest Neighbor Search with Keywords
2014
27
Privacy-Preserving and Content-Protecting Location Based Queries
2014
28
Motif-Based Hyponym Relation Extraction from Wikipedia Hyperlinks
2014
29
Spatial Approximate String Search
30
A Survey of XML Tree Patterns
2013
31
A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
2013
32
Privacy Preserving Delegated Access Control in Public Clouds
2013
33
Dynamic Query Forms for Database Queries
2013
NET WORKING & NETWORK SECURITY
2016
2016
2016
2015
2015
2015
2015
2015
2015
2015
2013
1
2
Multi-Grained Block Management to Enhance the Space Utilization of File Systems on PCM
Storages
Resource-Saving File Management Scheme for Online Video Provisioning on Content
Delivery Networks
2016
2016
3
Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks
2016
4
PASER: Secure and Efficient Routing Approach for Airborne Mesh Networks
2016
5
Active Trust : Secure and Trustable Routing in Wireless Sensor Networks
2016
6
Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks
2016
7
Fair Routing for Overlapped Cooperative Heterogeneous Wireless Sensor Networks
2016
8
Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for
Efficient File Sharing
2015
9
Cost-Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks
2015
10
Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks
2015
11
Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design
2015
12
Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks
2015
13
Automatic Test Packet Generation
2014
14
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
2014
15
Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
2014
16
Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
2014
17
A Two-stage Deanonymization Attack Against Anonymized Social Networks
2014
18
Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality
19
Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
2013
20
Fast Transmission to Remote Cooperative Groups A New Key Management Paradigm
2013
21
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed
Networks
2013
2013
22
DRINA A Lightweight And Reliable Routing
2012
23
AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies
2012
24
FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks
2012
25
The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks
2012
BIG DATA
1
Dynamic Job Ordering and Slot Configurations for MapReduce Workloads
2016
2
On Traffic-Aware Partition and Aggregation in MapReduce for Big Data Applications
2016
3
Hybrid Job-Driven Scheduling for Virtual MapReduce Clusters
2016
4
Operational-Log Analysis for Big Data Systems
2016
5
A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
2015
6
BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value Store
2015
7
Two Steps Genetic Programming for Big Data
2015
8
Data Mining with Big Data
2014
9
A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using
MapReduce on Cloud
2014
MOBILE COMPUTING
1
Providing Privacy-Aware Incentives in Mobile Sensing Systems
2016
2
Energy and Memory Efficient Clone Detection in Wireless Sensor Networks
2016
3
Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach
2016
4
Privacy-Aware High-Quality Map Generation with Participatory Sensing
2016
5
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless
Ad Hoc Networks
2015
6
Wormhole Attack Detection Algorithms in Wireless Network Coding Systems
2015
7
Preserving Location Privacy in Geo-Social Applications
2014
8
Efficient Authentication for Mobile and Pervasive Computing
2014
9
IP-Geo location Mapping for Moderately Connected Internet Regions
10
11
12
13
Delay-Optimal Broadcast for Multi hop Wireless Networks Using Self-Interference
Cancellation
Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks
Search Me If You Can Privacy-preserving Location Query Service
Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of
Transmissions
2013
2013
2013
2013
2012
SECURE COMPUTING
1
Inference Attack on Browsing History of Twitter Users Using Public Click Analytics and
Twitter Metadata
2016
2
Privacy Protection for Wireless Medical Sensor Data
2016
3
Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over
Encrypted Cloud Data
2016
4
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
2016
5
Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers
2015
6
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion
Attacks
2015
7
A Computational Dynamic Trust Model for User Authorization
2015
8
Enabling Cloud Storage Auditing With Key-Exposure Resistance
2015
PARALLEL & DISTRIBUTED SYSTEMS
1
Hybrid Job-Driven Scheduling for Virtual MapReduce Clusters
2016
2
Resource Allocation in Cloud Computing Using the Uncertainty Principle of Game Theory
2016
3
A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
2016
4
Game Theoretic Resource Allocation in Media Cloud with Mobile Social Users
2016
5
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
2015
6
Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design
2015
7
Secure Distributed Deduplication Systems with Improved Reliability
2015
8
Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing
2015
9
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
2014
10
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
2013
11
Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
2013
12
IP-Geo location Mapping for Moderately Connected Internet Regions
2013
Related documents