Download projectlist

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
Sno
JAVA IEEE 2016
IEEE
Abstract
Base
Paper
CLOUD COMPUTING
1
A Secure and Dynamic Multi-Keyword Ranked Search
Scheme over Encrypted Cloud Data
2016
Download
Download
2
A Secure Anti-Collusion Data Sharing Scheme for Dynamic
Groups in the Cloud
2016
Download
Download
3
An Efficient File Hierarchy Attribute-Based Encryption
Scheme in Cloud Computing
2016
Download
Download
4
An Efficient Privacy-Preserving Ranked Keyword Search
Method
2016
Download
Download
5
A Modified Hierarchical Attribute-Based Encryption Access
Control Method for Mobile Cloud Computing
2016
Download
Download
7
Circuit Ciphertext-policy Attribute-based Hybrid Encryption
with Verifiable Delegation in Cloud Computing
2016
Download
Download
8
Conditional Identity-Based Broadcast Proxy Re-Encryption
and Its Application to Cloud Email
2016
Download
Download
10
DeyPoS: Deduplicatable Dynamic Proof of Storage for MultiUser Environments
2016
Download
Download
13
Dual-Server Public-Key Encryption With Keyword Search
for Secure Cloud Storage
2016
Download
Download
14
Dynamic and Public Auditing with Fair Arbitration for
Cloud Data
2016
Download
Download
15
Enabling Cloud Storage Auditing With Verifiable
Outsourcing of Key Updates
2016
Download
Download
16
Flexible and Fine-Grained Attribute-Based Data Storage in
Cloud Computing
2016
Download
Download
17
Fine-Grained Two-Factor Access Control for Web-Based
Cloud Computing Services
2016
Download
Download
19
Identity-Based Encryption with Cloud Revocation Authority
and Its Applications
2016
Download
Download
20
Identity-Based Proxy-Oriented Data Uploading and Remote
Data Integrity Checking in Public Cloud
2016
Download
Download
21
Protecting Your Right: Verifiable Attribute-Based Keyword
2016
Download
Download
Search with Fine-Grained Owner-Enforced Search
Authorization in the Cloud
23
SecRBAC: Secure data in the Clouds
2016
Download
Download
24
Secure Data Sharing in Cloud Computing Using RevocableStorage Identity-Based Encryption
2016
Download
Download
25
Secure Optimization Computation Outsourcing in Cloud
Computing: A Case Study of Linear Programming
2016
Download
Download
26
TMACS: A Robust and Verifiable Threshold MultiAuthority Access Control System in Public Cloud Storage
2016
Download
Download
DATA MINING
1
A Novel Recommendation Model Regularized with User
Trust and Item Ratings
2016
Download
Download
2
Automatically Mining Facets for Queries from Their Search
Results
2016
Download
Download
3
Booster in High Dimensional Data Classification
2016
Download
Download
4
Building an intrusion detection system using a filter-based
feature selection algorithm
2016
Download
Download
5
Connecting Social Media to E-Commerce: Cold-Start
Product Recommendation Using Microblogging Information
2016
Download
Download
6
Cross-Domain Sentiment Classification Using Sentiment
Sensitive Embeddings
2016
Download
Download
9
Efficient Algorithms for Mining Top-K High Utility Itemsets
2016
Download
Download
11
Mining User-Aware Rare Sequential Topic Patterns in
Document Streams
2016
Download
Download
12
Nearest Keyword Set Search in Multi-Dimensional Datasets
2016
Download
Download
13
Rating Prediction based on Social Sentiment from Textual
Reviews
2016
Download
Download
2016
Download
Download
NETWORKING
1
A Stable Approach for Routing Queries in Unstructured P2P
Networks
2
iPath: Path Inference in Wireless Sensor Networks
2016
Download
Download
3
Opportunistic Routing With Congestion Diversity in Wireless
Ad Hoc Networks
2016
Download
Download
4
Spatial Reusability-Aware Routing in Multi-Hop Wireless
Networks
2016
Download
Download
4
STAMP: Enabling Privacy-Preserving Location Proofs for
Mobile Users
2016
Download
Download
MOBILE COMPUTING
1
Energy and Memory Efficient Clone Detection in Wireless
Sensor Networks
2016
Download
Download
2
EPLQ: Efficient Privacy-Preserving Location-Based Query
Over Outsourced Encrypted Data
2016
Download
Download
3
Secure Overlay Routing Using Key Pre-Distribution: A
Linear Distance Optimization Approach
2016
Download
Download
4
Detecting Node Failures in Mobile Wireless Networks: A
Probabilistic Approach
2016
Download
Download
IMAGE PROCESSING
1
A Locality Sensitive Low-Rank Model for Image Tag
Completion
2016
Download
Download
2
A Scalable Approach for Content-Based Image Retrieval in
Peer-to-Peer Networks
2016
Download
Download
3
Learning of Multimodal Representations with Random
Walks on the Click Graph
2016
Download
Download
4
Online Multi-Modal Distance Metric Learning with
Application to Image Retrieval
2016
Download
Download
5
Tag Based Image Search by Social Re-ranking
2016
Download
Download
SECURE COMPUTING
1
Contributory Broadcast Encryption with Efficient
Encryption and Short Ciphertexts
2016
Download
Download
2
Data Lineage in Malicious Environments
2016
Download
Download
3
Detecting Malicious Facebook Applications
2016
Download
Download
4
FRoDO: Fraud Resilient Device for Off-Line MicroPayments
2016
Download
Download
5
Inference Attack on Browsing History of Twitter Users using
Public Click Analytics and Twitter Metadata
2016
Download
Download
6
Resolving Multi-party Privacy Conflicts in Social Media
2016
Download
Download
1
Hidden Ciphertext Policy Attribute-Based Encryption Under
Standard Assumptions
2016
Download
Download
2
Optimized Search-and-Compute Circuits and Their
Application to Query Evaluation on Encrypted Data
2016
Download
Download
3
Privacy-Preserving Utility Verification of the Data Published
by Non-interactive Differentially Private Mechanisms
2016
Download
Download
PARALLEL AND DISTRIBUTED SYSTEMS
1
A Hop-by-Hop Routing Mechanism for Green Internet
2016
Download
Download
2
Continuous Answering Holistic Queries over Sensor
Networks
2016
Download
Download
3
Dictionary Based Secure Provenance Compression for
Wireless Sensor Networks
2016
Download
Download
4
The Server Provisioning Problem for Continuous Distributed
Interactive Applications
2016
Download
Download
SOFTWARE ENGINEERING
1
Mapping Bug Reports to Relevant Files: A Ranking Model, a
Fine-Grained Benchmark, and Feature Evaluation
2016
Download
Download
2
Metamorphic Testing for Software Quality Assessment: A
Study of Search Engines
2016
Download
Download
3
SITAR: GUI Test Script Repair
2016
Download
Download
NS2 & NS3 PROJECTS
Sno
IEEE
Abstract
Base
Paper
Mobile Ad-hoc Network
1
A Novel Approach for Efficient Usage of Intrusion Detection
System in Mobile Ad Hoc Networks
2016
Download
Download
2
Detecting Colluding Blackhole and Greyhole Attacks in Delay
Tolerant Networks
2016
Download
Download
3
Mitigating Denial of Service Attacks in OLSR Protocol Using
Fictitious Nodes
2016
Download
Download
4
Opportunistic Routing With Congestion Diversity in Wireless
Ad Hoc Networks
2016
Download
Download
5
Top-k Query Processing and Malicious Node Identification
Based on Node Grouping in MANETs
2016
Download
Download
VANET
1
A Pseudonym Management System to Achieve Anonymity in
Vehicular Ad Hoc Networks
2016
Download
Download
2
ART: An Attack-Resistant Trust Management Scheme for
Securing Vehicular Ad Hoc Networks
2016
Download
Download
3
Contact-Aware Data Replication in Roadside Unit Aided
Vehicular Delay Tolerant Networks
2016
Download
Download
4
DIVERT: A Distributed Vehicular Traffic Re-routing System
for Congestion Avoidance
2016
Download
Download
5
Dual Authentication and Key Management Techniques for
Secure Data Transmission in Vehicular Ad Hoc Networks
2016
Download
Download
6
Secure and Robust Multi-Constrained QoS Aware Routing
Algorithm for VANETs
2016
Download
Download
Wireless Sensor Network
1
A Hop-by-Hop Routing Mechanism for Green Internet
2016
Download
Download
2
Achieving Optimal Traffic Engineering Using a Generalized
Routing Framework
2016
Download
Download
3
Assessing Performance Gains Through Global Resource
Control of Heterogeneous Wireless Networks
2016
Download
Download
4
CANS: Towards Congestion-Adaptive and Small Stretch
Emergency Navigation with Wireless Sensor Networks
2016
Download
Download
5
Cluster-Based Routing for the Mobile Sink in Wireless Sensor
Networks With Obstacles
2016
Download
Download
6
Code-Based Neighbor Discovery Protocols in Mobile Wireless
Networks
2016
Download
Download
7
Duplicate Detectable Opportunistic Forwarding in Duty-Cycled
Wireless Sensor Networks
2016
Download
Download
8
Fair Routing for Overlapped Cooperative Heterogeneous
Wireless Sensor Networks
2016
Download
Download
9
Geographic and Opportunistic Routing for Underwater Sensor
Networks
2016
Download
Download
10
iPath: Path Inference in Wireless Sensor Networks
2016
Download
Download
11
Joint Optimization of Lifetime and Transport Delay under
Reliability Constraint Wireless Sensor Networks
2016
Download
Download
12
Location aware sensor routing protocol for mobile wireless
sensor networks
2016
Download
Download
13
Maximizing Data Collection Throughput on a Path in Energy
Harvesting Sensor Networks Using a Mobile Sink
2016
Download
Download
15
Privacy-Preserving Data Aggregation in Mobile Phone Sensing
2016
Download
Download
16
RSSI-based Localization through Uncertain Data Mapping for
Wireless Sensor Networks
2016
Download
Download
17
Towards Distributed Optimal Movement Strategy for Data
Gathering in Wireless Sensor Networks
2016
Download
Download
Network Security
1
A Secure and Efficient ID-Based Aggregate Signature Scheme
for Wireless Sensor Networks
2016
Download
Download
2
ActiveTrust: Secure and Trustable Routing in Wireless Sensor
Networks
2016
Download
Download
3
Adaptive and Channel-Aware Detection of Selective
Forwarding Attacks in Wireless Sensor Networks
2016
Download
Download
4
Dynamic Network Control for Confidential Multi-Hop
Communications
2016
Download
Download
5
Embedding IP Unique Shortest Path Topology on a
Wavelength-Routed Network: Normal and Survivable Design
2016
Download
Download
6
Energy and Memory Efficient Clone Detection in Wireless
Sensor Networks
2016
Download
Download
7
Ghost-in-ZigBee: Energy Depletion Attack on ZigBee based
Wireless Networks
2016
Download
Download
8
LAAEM: A Method to Enhance LDoS Attack
2016
Download
Download
9
Mimicry Attacks Against Wireless Link Signature and New
Defense Using Time-Synched Link Signature
2016
Download
Download
10
PKC-Based DoS Attacks-Resistant Scheme in Wireless Sensor
Networks
2016
Download
Download
11
PROVEST: Provenance-based Trust Model for Delay Tolerant
Networks
2016
Download
Download
12
Reliable and Efficient Data Acquisition in Wireless Sensor
Networks in the Presence of Transfaulty Nodes
2016
Download
Download
13
Secure Transmission Against Pilot Spoofing Attack: A TwoWay Training-Based Scheme
2016
Download
Download
14
Security Analysis and Improvements on Two Homomorphic
Authentication Schemes for Network Coding
2016
Download
Download
15
Traffic Decorrelation Techniques for Countering a Global
Eavesdropper in WSNs
2016
Download
Download
Sno
.NET PROJECTS
IEEE
Abstract
Base
Paper
CLOUD COMPUTING
1
A Secure and Dynamic Multi-Keyword Ranked Search Scheme
over Encrypted Cloud Data
2016
Download
Download
2
Catch You if You Misbehave: Ranked Keyword Search Results
Verification in Cloud Computing
2016
Download
Download
3
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption
with Verifiable Delegation in Cloud Computing
2016
Download
Download
4
Dynamic and Public Auditing with Fair Arbitration for Cloud
Data
2016
Download
Download
5
Dynamic-Hash-Table Based Public Auditing for Secure Cloud
Storage
2016
Download
Download
6
Enabling Cloud Storage Auditing With Verifiable Outsourcing
of Key Updates
2016
Download
Download
7
Fine-Grained Two-Factor Access Control for Web-Based
Cloud Computing Services
2016
Download
Download
8
Identity-Based Proxy-Oriented Data Uploading and Remote
Data Integrity Checking in Public Cloud
2016
Download
Download
9
MMBcloud-tree: Authenticated Index for Verifiable Cloud
Service Selection
2016
Download
Download
10
Trust-but-Verify: Verifying Result Correctness of Outsourced
Frequent Itemset Mining in Data-Mining-As-a-Service
Paradigm
2016
Download
Download
DATA MINING
1
Personalized Travel Sequence Recommendation on MultiSource Big Social Media
2016
Download
Download
2
Practical Approximate k Nearest Neighbor Queries with
Location and Query Privacy
2016
Download
Download
3
Text Mining the Contributors to Rail Accidents
2016
Download
Download
4
User-Service Rating Prediction by Exploring Social Users’
Rating Behaviors
2016
Download
Download
SECURE COMPUTING
1
Detecting and Removing Web Application Vulnerabilities with
Static Analysis and Data Mining
2016
Download
Download
2
ID2S Password-Authenticated Key Exchange Protocols
2016
Download
Download
3
Privacy-Preserving Outsourced Association Rule Mining on
Vertically Partitioned Databases
2016
Download
Download
MOBILE COMPUTING
1
A Joint Time Synchronization and Localization Design for
Mobile Underwater Sensor Networks
2016
Download
Download
2
DaGCM: A Concurrent Data Uploading Framework for
Mobile Data Gathering in Wireless Sensor Networks
2016
Download
Download
3
Service Usage Classification with Encrypted Internet Traffic in
Mobile Messaging Apps
2016
Download
Download
4
Traffic Decorrelation Techniques for Countering a Global
2016
Download
Download
Eavesdropper in WSNs
5
WORAL: A Witness Oriented Secure Location Provenance
Framework for Mobile Devices
2016
Download
Download
NETWORKING
1
Efficient Certificateless Access Control for Wireless Body Area
Networks
2016
Download
Download
2
Finding Nonequivalent Classifiers in Boolean Space to Reduce
TCAM Usage
2016
Download
Download
3
Geographic and Opportunistic Routing for Underwater Sensor
Networks
2016
Download
Download
4
Optimizing Cost for Online Social Networks on GeoDistributed Clouds
2016
Download
Download
5
Secure and Efficient data communication protocol for Wireless
Body Area Networks
2016
Download
Download
PARALLEL AND DISTRIBUTED SYSTEMS
1
Authenticated Key Exchange Protocols for Parallel Network
File Systems
2016
Download
Download
2
Real-Time Semantic Search Using Approximate Methodology
for Large-Scale Storage Systems
2016
Download
Download
Sno
HADOOP BIGDATA
IEEE
Abstract
Base
Paper
Big Data Projects
1
A Big Data Clustering Algorithm for Mitigating the Risk of
Customer Churn
2016
Download
Download
2
A Parallel Patient Treatment Time Prediction Algorithm and
Its Applications in Hospital Queuing-Recommendation in a Big
Data Environment
2016
Download
Download
3
Adaptive Replication Management in HDFS based on
Supervised Learning
2016
Download
Download
4
Clustering of Electricity Consumption Behavior Dynamics
toward Big Data Applications
2016
Download
Download
5
Distributed In-Memory Processing of All k Nearest Neighbor
Queries
2016
Download
Download
6
Dynamic Job Ordering and Slot Configurations for MapReduce
Workloads
2016
Download
Download
7
Dynamic Resource Allocation for MapReduce with Partitioning
Skew
2016
Download
Download
8
FiDoop-DP: Data Partitioning in Frequent Itemset Mining on
Hadoop Clusters
2016
Download
Download
9
Novel Scheduling Algorithms for Efficient Deployment of
MapReduce Applications in Heterogeneous Computing
Environments
2016
Download
Download
10
On Traffic-Aware Partition and Aggregation in MapReduce for
Big Data Applications
2016
Download
Download
11
Optimization for Speculative Execution in Big Data Processing
Clusters
2016
Download
Download
12
Service Rating Prediction by Exploring Social Mobile Users’
Geographical Locations
2016
Download
Download
13
Wide Area Analytics for Geographically Distributed
Datacenters
2016
Download
Download
Sno
ANDROID PROJECTS
IEEE
Abstract
Base
Paper
Android Projects
1
A Shoulder Surfing Resistant Graphical Authentication
System
2016
Download
Download
2
Authentication of Smartphone Users Using Behavioral
Biometrics
2016
Download
Download
9
Context Awareness Location-based Android Application for
Tracking Purposes in Assisted Living
2016
Download
Download
3
Context Awareness Location-based Android Application for
Tracking Purposes in Assisted Living
2016
Download
Download
4
Design of Secure Location and Message Sharing System for
Android Platform
2016
Download
Download
5
Designing a Secure Exam Management System (SEMS) for
M-Learning Environments
2016
Download
Download
6
Developing Apps for Visually Impaired People: Lessons
Learned from Practice
2016
Download
Download
7
Design and Analysis of an Efficient Friend-to-Friend
Content Dissemination System
2016
Download
Download
8
FoodForCare: An Android Application for Self-Care with
Healthy Food
2016
Download
Download
9
Intelligent Hands Free Speech based SMS System on
Android
2016
Download
Download
10
Mobile Cloud Support for Semantic-enriched Speech
Recognition in Social Care
2016
Download
Download
11
One-Round Privacy-Preserving Meeting Location
Determination for Smartphone Applications
2016
Download
Download
12
Optimizing User Experience in Choosing Android
Applications
2016
Download
Download
13
PassBYOP: Bring Your Own Picture for Securing
Graphical Passwords
2016
Download
Download
14
Performance Analysis of Touch-Interaction Behavior for
Active Smartphone Authentication
2016
Download
Download
15
Privacy-Preserving Location Sharing Services for Social
Networks
2016
Download
Download
16
Personalized Travel Sequence Recommendation on MultiSource Big Social Media
2016
Download
Download
17
Safeguard: User Reauthentication on Smartphones via
Behavioral Biometrics
2016
Download
Download
Related documents