Survey
* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project
Sno JAVA IEEE 2016 IEEE Abstract Base Paper CLOUD COMPUTING 1 A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data 2016 Download Download 2 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud 2016 Download Download 3 An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing 2016 Download Download 4 An Efficient Privacy-Preserving Ranked Keyword Search Method 2016 Download Download 5 A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing 2016 Download Download 7 Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing 2016 Download Download 8 Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email 2016 Download Download 10 DeyPoS: Deduplicatable Dynamic Proof of Storage for MultiUser Environments 2016 Download Download 13 Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage 2016 Download Download 14 Dynamic and Public Auditing with Fair Arbitration for Cloud Data 2016 Download Download 15 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates 2016 Download Download 16 Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing 2016 Download Download 17 Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services 2016 Download Download 19 Identity-Based Encryption with Cloud Revocation Authority and Its Applications 2016 Download Download 20 Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud 2016 Download Download 21 Protecting Your Right: Verifiable Attribute-Based Keyword 2016 Download Download Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud 23 SecRBAC: Secure data in the Clouds 2016 Download Download 24 Secure Data Sharing in Cloud Computing Using RevocableStorage Identity-Based Encryption 2016 Download Download 25 Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming 2016 Download Download 26 TMACS: A Robust and Verifiable Threshold MultiAuthority Access Control System in Public Cloud Storage 2016 Download Download DATA MINING 1 A Novel Recommendation Model Regularized with User Trust and Item Ratings 2016 Download Download 2 Automatically Mining Facets for Queries from Their Search Results 2016 Download Download 3 Booster in High Dimensional Data Classification 2016 Download Download 4 Building an intrusion detection system using a filter-based feature selection algorithm 2016 Download Download 5 Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information 2016 Download Download 6 Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings 2016 Download Download 9 Efficient Algorithms for Mining Top-K High Utility Itemsets 2016 Download Download 11 Mining User-Aware Rare Sequential Topic Patterns in Document Streams 2016 Download Download 12 Nearest Keyword Set Search in Multi-Dimensional Datasets 2016 Download Download 13 Rating Prediction based on Social Sentiment from Textual Reviews 2016 Download Download 2016 Download Download NETWORKING 1 A Stable Approach for Routing Queries in Unstructured P2P Networks 2 iPath: Path Inference in Wireless Sensor Networks 2016 Download Download 3 Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks 2016 Download Download 4 Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks 2016 Download Download 4 STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users 2016 Download Download MOBILE COMPUTING 1 Energy and Memory Efficient Clone Detection in Wireless Sensor Networks 2016 Download Download 2 EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data 2016 Download Download 3 Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach 2016 Download Download 4 Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach 2016 Download Download IMAGE PROCESSING 1 A Locality Sensitive Low-Rank Model for Image Tag Completion 2016 Download Download 2 A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks 2016 Download Download 3 Learning of Multimodal Representations with Random Walks on the Click Graph 2016 Download Download 4 Online Multi-Modal Distance Metric Learning with Application to Image Retrieval 2016 Download Download 5 Tag Based Image Search by Social Re-ranking 2016 Download Download SECURE COMPUTING 1 Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts 2016 Download Download 2 Data Lineage in Malicious Environments 2016 Download Download 3 Detecting Malicious Facebook Applications 2016 Download Download 4 FRoDO: Fraud Resilient Device for Off-Line MicroPayments 2016 Download Download 5 Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata 2016 Download Download 6 Resolving Multi-party Privacy Conflicts in Social Media 2016 Download Download 1 Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions 2016 Download Download 2 Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data 2016 Download Download 3 Privacy-Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms 2016 Download Download PARALLEL AND DISTRIBUTED SYSTEMS 1 A Hop-by-Hop Routing Mechanism for Green Internet 2016 Download Download 2 Continuous Answering Holistic Queries over Sensor Networks 2016 Download Download 3 Dictionary Based Secure Provenance Compression for Wireless Sensor Networks 2016 Download Download 4 The Server Provisioning Problem for Continuous Distributed Interactive Applications 2016 Download Download SOFTWARE ENGINEERING 1 Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine-Grained Benchmark, and Feature Evaluation 2016 Download Download 2 Metamorphic Testing for Software Quality Assessment: A Study of Search Engines 2016 Download Download 3 SITAR: GUI Test Script Repair 2016 Download Download NS2 & NS3 PROJECTS Sno IEEE Abstract Base Paper Mobile Ad-hoc Network 1 A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks 2016 Download Download 2 Detecting Colluding Blackhole and Greyhole Attacks in Delay Tolerant Networks 2016 Download Download 3 Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes 2016 Download Download 4 Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks 2016 Download Download 5 Top-k Query Processing and Malicious Node Identification Based on Node Grouping in MANETs 2016 Download Download VANET 1 A Pseudonym Management System to Achieve Anonymity in Vehicular Ad Hoc Networks 2016 Download Download 2 ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks 2016 Download Download 3 Contact-Aware Data Replication in Roadside Unit Aided Vehicular Delay Tolerant Networks 2016 Download Download 4 DIVERT: A Distributed Vehicular Traffic Re-routing System for Congestion Avoidance 2016 Download Download 5 Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks 2016 Download Download 6 Secure and Robust Multi-Constrained QoS Aware Routing Algorithm for VANETs 2016 Download Download Wireless Sensor Network 1 A Hop-by-Hop Routing Mechanism for Green Internet 2016 Download Download 2 Achieving Optimal Traffic Engineering Using a Generalized Routing Framework 2016 Download Download 3 Assessing Performance Gains Through Global Resource Control of Heterogeneous Wireless Networks 2016 Download Download 4 CANS: Towards Congestion-Adaptive and Small Stretch Emergency Navigation with Wireless Sensor Networks 2016 Download Download 5 Cluster-Based Routing for the Mobile Sink in Wireless Sensor Networks With Obstacles 2016 Download Download 6 Code-Based Neighbor Discovery Protocols in Mobile Wireless Networks 2016 Download Download 7 Duplicate Detectable Opportunistic Forwarding in Duty-Cycled Wireless Sensor Networks 2016 Download Download 8 Fair Routing for Overlapped Cooperative Heterogeneous Wireless Sensor Networks 2016 Download Download 9 Geographic and Opportunistic Routing for Underwater Sensor Networks 2016 Download Download 10 iPath: Path Inference in Wireless Sensor Networks 2016 Download Download 11 Joint Optimization of Lifetime and Transport Delay under Reliability Constraint Wireless Sensor Networks 2016 Download Download 12 Location aware sensor routing protocol for mobile wireless sensor networks 2016 Download Download 13 Maximizing Data Collection Throughput on a Path in Energy Harvesting Sensor Networks Using a Mobile Sink 2016 Download Download 15 Privacy-Preserving Data Aggregation in Mobile Phone Sensing 2016 Download Download 16 RSSI-based Localization through Uncertain Data Mapping for Wireless Sensor Networks 2016 Download Download 17 Towards Distributed Optimal Movement Strategy for Data Gathering in Wireless Sensor Networks 2016 Download Download Network Security 1 A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks 2016 Download Download 2 ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks 2016 Download Download 3 Adaptive and Channel-Aware Detection of Selective Forwarding Attacks in Wireless Sensor Networks 2016 Download Download 4 Dynamic Network Control for Confidential Multi-Hop Communications 2016 Download Download 5 Embedding IP Unique Shortest Path Topology on a Wavelength-Routed Network: Normal and Survivable Design 2016 Download Download 6 Energy and Memory Efficient Clone Detection in Wireless Sensor Networks 2016 Download Download 7 Ghost-in-ZigBee: Energy Depletion Attack on ZigBee based Wireless Networks 2016 Download Download 8 LAAEM: A Method to Enhance LDoS Attack 2016 Download Download 9 Mimicry Attacks Against Wireless Link Signature and New Defense Using Time-Synched Link Signature 2016 Download Download 10 PKC-Based DoS Attacks-Resistant Scheme in Wireless Sensor Networks 2016 Download Download 11 PROVEST: Provenance-based Trust Model for Delay Tolerant Networks 2016 Download Download 12 Reliable and Efficient Data Acquisition in Wireless Sensor Networks in the Presence of Transfaulty Nodes 2016 Download Download 13 Secure Transmission Against Pilot Spoofing Attack: A TwoWay Training-Based Scheme 2016 Download Download 14 Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding 2016 Download Download 15 Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs 2016 Download Download Sno .NET PROJECTS IEEE Abstract Base Paper CLOUD COMPUTING 1 A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data 2016 Download Download 2 Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing 2016 Download Download 3 Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing 2016 Download Download 4 Dynamic and Public Auditing with Fair Arbitration for Cloud Data 2016 Download Download 5 Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage 2016 Download Download 6 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates 2016 Download Download 7 Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services 2016 Download Download 8 Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud 2016 Download Download 9 MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection 2016 Download Download 10 Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-Mining-As-a-Service Paradigm 2016 Download Download DATA MINING 1 Personalized Travel Sequence Recommendation on MultiSource Big Social Media 2016 Download Download 2 Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy 2016 Download Download 3 Text Mining the Contributors to Rail Accidents 2016 Download Download 4 User-Service Rating Prediction by Exploring Social Users’ Rating Behaviors 2016 Download Download SECURE COMPUTING 1 Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining 2016 Download Download 2 ID2S Password-Authenticated Key Exchange Protocols 2016 Download Download 3 Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases 2016 Download Download MOBILE COMPUTING 1 A Joint Time Synchronization and Localization Design for Mobile Underwater Sensor Networks 2016 Download Download 2 DaGCM: A Concurrent Data Uploading Framework for Mobile Data Gathering in Wireless Sensor Networks 2016 Download Download 3 Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps 2016 Download Download 4 Traffic Decorrelation Techniques for Countering a Global 2016 Download Download Eavesdropper in WSNs 5 WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices 2016 Download Download NETWORKING 1 Efficient Certificateless Access Control for Wireless Body Area Networks 2016 Download Download 2 Finding Nonequivalent Classifiers in Boolean Space to Reduce TCAM Usage 2016 Download Download 3 Geographic and Opportunistic Routing for Underwater Sensor Networks 2016 Download Download 4 Optimizing Cost for Online Social Networks on GeoDistributed Clouds 2016 Download Download 5 Secure and Efficient data communication protocol for Wireless Body Area Networks 2016 Download Download PARALLEL AND DISTRIBUTED SYSTEMS 1 Authenticated Key Exchange Protocols for Parallel Network File Systems 2016 Download Download 2 Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems 2016 Download Download Sno HADOOP BIGDATA IEEE Abstract Base Paper Big Data Projects 1 A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn 2016 Download Download 2 A Parallel Patient Treatment Time Prediction Algorithm and Its Applications in Hospital Queuing-Recommendation in a Big Data Environment 2016 Download Download 3 Adaptive Replication Management in HDFS based on Supervised Learning 2016 Download Download 4 Clustering of Electricity Consumption Behavior Dynamics toward Big Data Applications 2016 Download Download 5 Distributed In-Memory Processing of All k Nearest Neighbor Queries 2016 Download Download 6 Dynamic Job Ordering and Slot Configurations for MapReduce Workloads 2016 Download Download 7 Dynamic Resource Allocation for MapReduce with Partitioning Skew 2016 Download Download 8 FiDoop-DP: Data Partitioning in Frequent Itemset Mining on Hadoop Clusters 2016 Download Download 9 Novel Scheduling Algorithms for Efficient Deployment of MapReduce Applications in Heterogeneous Computing Environments 2016 Download Download 10 On Traffic-Aware Partition and Aggregation in MapReduce for Big Data Applications 2016 Download Download 11 Optimization for Speculative Execution in Big Data Processing Clusters 2016 Download Download 12 Service Rating Prediction by Exploring Social Mobile Users’ Geographical Locations 2016 Download Download 13 Wide Area Analytics for Geographically Distributed Datacenters 2016 Download Download Sno ANDROID PROJECTS IEEE Abstract Base Paper Android Projects 1 A Shoulder Surfing Resistant Graphical Authentication System 2016 Download Download 2 Authentication of Smartphone Users Using Behavioral Biometrics 2016 Download Download 9 Context Awareness Location-based Android Application for Tracking Purposes in Assisted Living 2016 Download Download 3 Context Awareness Location-based Android Application for Tracking Purposes in Assisted Living 2016 Download Download 4 Design of Secure Location and Message Sharing System for Android Platform 2016 Download Download 5 Designing a Secure Exam Management System (SEMS) for M-Learning Environments 2016 Download Download 6 Developing Apps for Visually Impaired People: Lessons Learned from Practice 2016 Download Download 7 Design and Analysis of an Efficient Friend-to-Friend Content Dissemination System 2016 Download Download 8 FoodForCare: An Android Application for Self-Care with Healthy Food 2016 Download Download 9 Intelligent Hands Free Speech based SMS System on Android 2016 Download Download 10 Mobile Cloud Support for Semantic-enriched Speech Recognition in Social Care 2016 Download Download 11 One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications 2016 Download Download 12 Optimizing User Experience in Choosing Android Applications 2016 Download Download 13 PassBYOP: Bring Your Own Picture for Securing Graphical Passwords 2016 Download Download 14 Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication 2016 Download Download 15 Privacy-Preserving Location Sharing Services for Social Networks 2016 Download Download 16 Personalized Travel Sequence Recommendation on MultiSource Big Social Media 2016 Download Download 17 Safeguard: User Reauthentication on Smartphones via Behavioral Biometrics 2016 Download Download