IEEE Java Projects IEEE Dotnet Projects IEEE Python Projectst IEEE Android Projects IEEE NS2 Projects IEEE MATLAB Projects

Java IEEE Projects

Click on the following list to download the titles for corresponding year

JAVA PROJECTS LIST


2018 and 2019 IEEE Projects || 2017 and 2018 IEEE Projects || 2016 and 2017 IEEE Projects || 2015 and 2016 IEEE Projects||2014 and 2015 IEEE Projects||

2013 and 2014 IEEE Projects ||

Live 2020 and 2021 JAVA IEEE Projects List --- Download

Live Demo is available on youtube.You can click on demo link and can download the video for further reference and send your title name to the following email id to get base paper and Abstract.Please mention your degree and other requirements also..
Cloud Computing
Sl.No
Project Title Name
Domain
Year
Demo
1
A Verifiable Semantic Searching Scheme by Optimal Matching over Encrypted Data in Public Cloud
Cloud Computing
2020
Click Here
2
Achieving Practical Symmetric Searchable Encryption with Search Pattern Privacy over Cloud
Cloud Computing
2020
Click Here
3
Achieving Searchable Encryption Scheme with Search Pattern Hidden
Cloud Computing
2020
Click Here
4
Authentication and Key Agreement Based on Anonymous Identity for Peer-to-Peer Cloud
Cloud Computing
2020
Click Here
5
CloudRaid Detecting Distributed Concurrency Bugs via Log-Mining and Enhancement
Cloud Computing
2020
Click Here
6
Designing Secure and Efficient Biometric-Based Secure Access Mechanism for Cloud Services
Cloud Computing
2020
Click Here
7
Lightweight Privacy-preserving Medical Diagnosis in Edge Computing
Cloud Computing
2020
Click Here
8
Personality and Value-aware Scheduling of User Requests in Cloud for Profit Maximization
Cloud Computing
2020
Click Here
9
Privacy-preserving Efficient Verifiable Deep Packet Inspection for Cloud-assisted Middlebox
Cloud Computing
2020
Click Here
10
Privacy-preserving Medical Treatment System through Nondeterministic Finite Automata
Cloud Computing
2020
Click Here
11
Privacy-Preserving Outsourced Inner Product Computation on Encrypted Database
Cloud Computing
2020
Click Here
12
Proactive Fault-Tolerance Technique to Enhance Reliability of Cloud Service in Cloud Federation Environment
Cloud Computing
2020
Click Here
13
Publicly Verifiable Shared Dynamic Electronic Health Record Databases
Cloud Computing
2020
Click Here
14
Revocable Attribute-based Data Storage in Mobile Clouds
Cloud Computing
2020
Click Here
15
Scalable Discovery of Hybrid Process Models in a Cloud Computing Environment
Cloud Computing
2020
Click Here
16
Secure Cloud Storage with Data Dynamics Using Secure Network Coding Techniques
Cloud Computing
2020
Click Here
17
Secure Keyword Search and Data Sharing Mechanism for Cloud Computing
Cloud Computing
2020
Click Here
18
Secure Similarity Search over Encrypted Non-Uniform Datasets
Cloud Computing
2020
Click Here
19
Secure Storage Auditing with Efficient Key Updates for Cognitive Industrial IoT Environment
Cloud Computing
2020
Click Here
20
Semantics of Data Mining Services in Cloud Computing
Cloud Computing
2020
Click Here
21
Similarity Search for Encrypted Images in Secure Cloud Computing
Cloud Computing
2020
Click Here
22
Tag-based Verifiable Delegated Set Intersection over Outsourced Private Datasets
Cloud Computing
2020
Click Here
23
Threshold Multi-keyword Search for Cloud-Based Group Data Sharing
Cloud Computing
2020
Click Here
24
Towards Secure and Efficient Equality Conjunction Search over Outsourced Databases
Cloud Computing
2020
Click Here
25
Verifiable Searchable Encryption Framework against Insider Keyword-Guessing Attack in Cloud Storage
Cloud Computing
2020
Click Here
26
A Secure Enhanced Key-Policy Attribute-Based Temporary Keyword Search Scheme in the Cloud
Cloud Computing
2020
Click Here
27
Development and Examination of Fog Computing-Based Encrypted Control System.
Cloud Computing
2020
Click Here
28
A Novel Feature Matching Ranked Search Mechanism Over Encrypted Cloud Data
Cloud Computing
2020
Click Here
29
A Secure and Efficient Cloud-Centric Internet of Medical Things-Enabled Smart Healthcare System with Public Verifiability
Cloud Computing
2020
Click Here
30
Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography
Cloud Computing
2020
Click Here
31
Key Policy Attribute-Based Encryption with Keyword Search in Virtualized Environments
Cloud Computing
2020
Click Here
32
Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud.
Cloud Computing
2020
Click Here
33
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud Computing.
Cloud Computing
2020
Click Here
34
Key-Escrow Free Attribute-Based Multi-Keyword Search with Dynamic Policy Update in Cloud Computing.
Cloud Computing
2020
Click Here
35
Fast Secure and Anonymous Key Agreement Against Bad Randomness for Cloud Computing.
Cloud Computing
2020
Click Here

 

DATA MINING

 

1
A Hidden Markov Contour Tree Model for Spatial Structured Prediction
Data Mining
2020
Click Here
2
Achieving Practical Symmetric Searchable Encryption with Search Pattern Privacy over Cloud
Data Mining
2020
Click Here
3
Achieving Secure and Dynamic Range Queries Over Encrypted Cloud Data
Data Mining
2020
Click Here
4
Adaptive Diffusion of Sensitive Information In Online Social Networks
Data Mining
2020
Click Here
5
Adaptive Similarity Embedding For Unsupervised Multi-View Feature Selection
Data Mining
2020
Click Here
6
Adaptively Secure and Fast Processing of Conjunctive Queries over Encrypted Data
Data Mining
2020
Click Here
7
BATCH A Scalable Asymmetric Discrete Cross-Modal Hashing
Data Mining
2020
Click Here
8
Cashless Society Managing Privacy and Security in the Technological Age
Data Mining
2020
Click Here
9
DGDFS Dependence Guided Discriminative Feature Selection for Predicting Adverse Drug-Drug Interaction
Data Mining
2020
Click Here
10
Discovering Temporal Patterns for Event Sequence Clustering via Policy Mixture Model
Data Mining
2020
Click Here
11
Effective Keyword Search over Weighted Graphs
Data Mining
2020
Click Here
12
Efficient Match-Based Candidate Network Generation for Keyword Queries over Relational Databases
Data Mining
2020
Click Here
13
Efficient Processing of Group Planning Queries Over Spatial-Social Networks
Data Mining
2020
Click Here
14
Efficiently Processing Spatial and Keyword Queries in Indoor Venues
Data Mining
2020
Click Here
15
Evaluating Public Anxiety for Topic-based Communities in Social Networks
Data Mining
2020
Click Here
16
Fast Multi-view Semi-supervised Learning with Learned Graph
Data Mining
2020
Click Here
17
Fuzzy K-Means Clustering With Discriminative Embedding
Data Mining
2020
Click Here
18
Guarantee the Quality-of-Service of Control Transactions in Real-Time Database Systems
Data Mining
2020
Click Here
19
Hierarchical Prediction and Adversarial Learning For Conditional Response Generation
Data Mining
2020
Click Here
20
Land Use Classification with Point of Interests and Structural Patterns
Data Mining
2020
Click Here
21
Modeling Relation Paths for Knowledge Graph Completion
Data Mining
2020
Click Here
22
Multi-view Clustering with the Cooperation of Visible and Hidden Views
Data Mining
2020
Click Here
23
Online Pricing with Reserve Price Constraint for Personal Data Markets
Data Mining
2020
Click Here
24
Personalized Long and Short term Preference Learning for Next POI Recommendation
Data Mining
2020
Click Here
25
Predicting Hot Events in the Early Period through Bayesian Model for Social Networks
Data Mining
2020
Click Here
26
Predicting Student Performance in an Educational Game Using a Hidden Markov Model
Data Mining
2020
Click Here
27
Privacy Preserving Location Data Publishing A Machine Learning Approach
Data Mining
2020
Click Here
28
Product Quantized Collaborative Filtering
Data Mining
2020
Click Here
29
Publicly Verifiable Databases with All Efficient Updating Operations
Data Mining
2020
Click Here
30
Scalable and Adaptive Data Replica Placement for Geo-Distributed Cloud Storages
Data Mining
2020
Click Here
31
Social Boosted Recommendation with Folded Bipartite Network Embedding
Data Mining
2020
Click Here
32
Emotion Correlation Mining Through Deep Learning Models on Natural Language Textg
Data Mining
2020
Click Here
         

SECURE COMPUTING

 

1
A hybrid fault-tolerant scheduling for deadline-constrained tasks in Cloud systems
Secure Computing
2020
Click Here
2
CloudRaid Detecting Distributed Concurrency Bugs via Log-Mining and Enhancement
Secure Computing
2020
Click Here
3
Dynamic Resource Allocation and Computation Offloading for IoT Fog Computing System
Secure Computing
2020
Click Here
4
ECOGreen Electricity Cost Optimization for Green Datacenters in Emerging Power Markets
Secure Computing
2020
Click Here
5
Efficient Encrypted Data Search with Expressive Queries and Flexible Update
Secure Computing
2020
Click Here
6
Energy-aware cloud workflow applications scheduling with geo-distributed data
Secure Computing
2020
Click Here
7
KeySea Keyword-based Search with Receiver Anonymity in Attribute-based Searchable Encryption
Secure Computing
2020
Click Here
8
Lightweight Privacy-preserving Raw Data Publishing Scheme
Secure Computing
2020
Click Here
9
Location-Aware Service Recommendations With Privacy-Preservation in the Internet of Things
Secure Computing
2020
Click Here
10
Lucid A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection
Secure Computing
2020
Click Here
11
Minimizing Financial Cost of DDoS Attack Defense in Clouds with Fine-Grained Resource Management
Secure Computing
2020
Click Here
12
Personalized Recommendation System based on Collaborative Filtering for IoT Scenarios
Secure Computing
2020
Click Here
13
Privacy Preserving QoS Forecasting in Mobile Edge Environments
Secure Computing
2020
Click Here
14
Provably Efficient Resource Allocation for Edge Service Entities Using Hermes
Secure Computing
2020
Click Here
15
Reverse Nearest Neighbor Search in Semantic Trajectories for Location based Services
Secure Computing
2020
Click Here
16
Revocable Attribute-based Data Storage in Mobile Clouds
Secure Computing
2020
Click Here
17
Scalable Discovery of Hybrid Process Models in a Cloud Computing Environment
Secure Computing
2020
Click Here
18
Semantics of Data Mining Services in Cloud Computing
Secure Computing
2020
Click Here
19
Shed+ Optimal Dynamic Speculation to Meet Application Deadlines in Cloud
Secure Computing
2020
Click Here
     
INTERNET OF THINGS(IOT)
1
A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems
IOT
2020
Click Here
2
An Efficient IoT-Based Platform for Remote Real-Time Cardiac Activity Monitoring
IOT
2020
Click Here
3
An Efficient Privacy Preserving Message Authentication Scheme for Internet-of-Things
IOT
2020
Click Here
4
An Efficient Spam Detection Technique for IoT Devices using Machine Learning
IOT
2020
Click Here
5
Efficient IoT Management with Resilience to Unauthorized Access to Cloud Storage
IOT
2020
Click Here
6
Efficient Privacy Preserving Data Collection and Computation Offloading for Fog-Assisted IoT
IOT
2020
Click Here
7
Secure Storage Auditing with Efficient Key Updates for Cognitive Industrial IoT Environment
IOT
2020
Click Here

 

INFORMATION FORENSICS and SECURITY

 

1
Sparse Mobile Crowdsensing With Differential and Distortion Location Privacy
Information Forensics and Secuirty
2020
Click Here
2
A Verifiable Semantic Searching Scheme by Optimal Matching over Encrypted Data in Public Cloud
Information Forensics and Secuirty
2020
Click Here
3
Pay as You Decrypt Decryption Outsourcing for Functional Encryption Using Blockchain
Information Forensics and Secuirty
2020
Click Here
4
Securing Resources in Decentralized Cloud Storage
Information Forensics and Secuirty
2020
Click Here
5
Fake News, Disinformation,and Deepfakes: Leveraging Distributed Ledger Technologies and Blockchain to Combat Digital Deception and Counterfeit Reality
Information Forensics and Secuirty
2020
Click Here
6
 
Information Forensics and Secuirty
2020
Click Here
7
 
Information Forensics and Secuirty
2020
Click Here

MOBILE COMPUTING

1
AdSherlock Efficient and Deployable Click Fraud Detection for Mobile Applications
Mobile Computing
2020
Click Here
2
Distributed Time-Sensitive Task Selection in Mobile Crowdsensing
Mobile Computing
2020
Click Here
3
Eclipse Preserving Differential Location Privacy Against Long-Term Observation Attacks
Mobile Computing
2020
Click Here
4
Exploiting Multi-Dimensional Task Diversity in Distributed Auctions for Mobile Crowd Sensing
Mobile Computing
2020
Click Here
5
Fine Grained User Profiling for Personalized Task Matching in Mobile Crowd Sensing
Mobile Computing
2020
Click Here
6
KOLLECTOR Detecting Fraudulent Activities on Mobile Devices Using Deep Learning
Mobile Computing
2020
Click Here
7
PACE Privacy-Preserving and Quality-Aware Incentive Mechanism for Mobile Crowd Sensing
Mobile Computing
2020
Click Here
8
Predictability and Prediction of Human Mobility Based on Application-collected Location Data
Mobile Computing
2020
Click Here
9
Privacy-Preserving Media Sharing with Scalable Access Control and Secure De duplication in Mobile Cloud Computing
Mobile Computing
2020
Click Here
10
Protecting Your Shopping Preference with Differential Privacy
Mobile Computing
2020
Click Here
11
Proximity-Aware Location Based Collaborative Sensing for Energy-Efficient Mobile Devices
Mobile Computing
2020
Click Here
12
Social Recruiter Dynamic Incentive Mechanism for Mobile Crowd Sourcing Worker Recruitment with Social Networks
Mobile Computing
2020
Click Here
13
Towards Fine-Grained Access Control in Enterprise-Scale Internet-of-Things
Mobile Computing
2020
Click Here
14
Towards Personalized Privacy-Preserving Incentive for Truth Discovery in Mobile Crowd Sensing Systems
Mobile Computing
2020
Click Here
       

 

SOCIAL NETWORK

 

 

1
Activity Minimization of Misinformation Influence in Online Social Networks
Social Network
2020
Click Here
2
An Efficient Feedback Control Mechanism for Positive or  Negative Information Spread in Online Social Networks
Social Network
2020
Click Here
3
ArvaNet Deep Recurrent Architecture for PPG-Based Negative Mental-State Monitoring
Social Network
2020
Click Here
4
Characterizing the Propagation of Situational Information in Social Media During COVID-19 Epidemic A Case Study on Weibo
Social Network
2020
Click Here
5
Continuous Activity Maximization in Online Social Networks
Social Network
2020
Click Here
6
Detecting and Characterizing Extremist Reviewer Groups in Online Product Reviews
Social Network
2020
Click Here
7
Detection of Malicious Social Bots Using Learning Automata With URL Features in Twitter Network
Social Network
2020
Click Here
8
Information Dissemination From Social Network for Extreme Weather Scenario
Social Network
2020
Click Here
9
Location-Aware Service Recommendations With Privacy-Preservation in the Internet of Things
Social Network
2020
Click Here
10
Movie Recommendation System Using Sentiment Analysis From Micro blogging Data
Social Network
2020
Click Here
11
On Utilizing Communities Detected From Social Networks in Hashtag Recommendation
Social Network
2020
Click Here
12
Understanding the User Behavior of Foursquare A Data-Driven Study on a Global Scale
Social Network
2020
Click Here
13
User Behavior Prediction of Social Hotspots Based on Multi message Interaction and Neural Network
Social Network
2020
Click Here
14
Popular Matching for Security-Enhanced Resource Allocation in Social Internet of Flying Things
Social Network
2020
Click Here
15
SciChallenge A Social Media Aware Platform for Contest-Based STEM Education and Motivation of Young Students
Social Network
2020
Click Here
     
SOFTWARE ENGINEERING,SERVICE COMPUTING
1
Crisis-Critical Intellectual Property Findings From the COVID-19 Pandemic
Software Engineering
2020
Click Here
     

 

VEHICULAR TECHNOLOGY AND INDUSTRIAL INFORMATICS

 

1
A Secure and Verifiable Data Sharing Scheme Based on Blockchain in Vehicular Social Networks
Vehicular Technology
2020
Click Here
2
Collaborative Content Delivery in Software-Defined Heterogeneous Vehicular Networks
Vehicular Technology
2020
Click Here
3
Dynamic Network Slicing and Resource Allocation in Mobile Edge Computing Systems
Vehicular Technology
2020
Click Here
4
Security Enhanced Content Sharing in Social IoT A Directed Hypergraph-Based Learning Scheme
Vehicular Technology
2020
Click Here
5
An Efficient Privacy Preserving Message Authentication Scheme for Internet-of-Things
Industrial Informatics
2020
Click Here
6
Detection and Mitigation of Cyber Attacks on Voltage Stability Monitoring of Smart Grids
Industrial Informatics
2020
Click Here
7
Enabling Privacy-assured Fog-based Data Aggregation in E-healthcare Systems
Industrial Informatics
2020
Click Here
8
Hidden Electricity Theft by Exploiting Multiple-Pricing Scheme in Smart Grids
Industrial Informatics
2020
Click Here
9
Social Image Sentiment Analysis by Exploiting Multimodal Content and Heterogeneous Relations
Industrial Informatics
2020
Click Here
         
BIG DATA
1
Credit Card Transactions Data Adversarial Augmentation in the Frequency Domain
Bigdata
2020
Click Here
2
Building and Querying an Enterprise Knowledge Graph
Bigdata
2020
Click Here
3
Delegated Authorization Framework for EHR Services using Attribute Based Encryption
Bigdata
2020
Click Here
4
Secure Channel Free Certificate-Based Searchable Encryption Withstanding Outside and Inside Keyword Guessing Attacks
Bigdata
2020
Click Here
         
EMERGING TOPICS IN COMPUTING
1
FarSight Long-Term Disease Prediction Using Unstructured Clinical Nursing Notes
Emerging Topics
2020
Click Here
2
Human-in-the-Loop-Aided Privacy-Preserving Scheme for Smart Healthcare
Emerging Topics
2020
Click Here
3
Recommending Activities for Mental Health and Well-being Insights from Two User Studies
Emerging Topics
2020
Click Here
4
Semantic Access Control for Privacy Management of Personal Sensing in Smart Cities
Emerging Topics
2020
Click Here
         
SERVICE COMPUTING
1
A hybrid fault-tolerant scheduling for deadline-constrained tasks in Cloud systems
Service Computing
2020
Click Here
2
CloudRaid Detecting Distributed Concurrency Bugs via Log-Mining and Enhancement
Service Computing
2020
Click Here
3
Dynamic Resource Allocation and Computation Offloading for IoT Fog Computing System
Service Computing
2020
Click Here
4
ECOGreen Electricity Cost Optimization for Green Datacenters in Emerging Power Markets
Service Computing
2020
Click Here
5
Efficient Encrypted Data Search with Expressive Queries and Flexible Update
Service Computing
2020
Click Here
6
Energy-aware cloud workflow applications scheduling with geo-distributed data
Service Computing
2020
Click Here
7
KeySea Keyword-based Search with Receiver Anonymity in Attribute-based Searchable Encryption
Service Computing
2020
Click Here
8
Lightweight Privacy-preserving Raw Data Publishing Scheme
Service Computing
2020
Click Here
9
Location-Aware Service Recommendations With Privacy-Preservation in the Internet of Things
Service Computing
2020
Click Here
10
Lucid A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection
Service Computing
2020
Click Here
11
Minimizing Financial Cost of DDoS Attack Defense in Clouds with Fine-Grained Resource Management
Service Computing
2020
Click Here
12
Personalized Recommendation System based on Collaborative Filtering for IoT Scenarios
Service Computing
2020
Click Here
13
Privacy Preserving QoS Forecasting in Mobile Edge Environments
Service Computing
2020
Click Here
14
Provably Efficient Resource Allocation for Edge Service Entities Using Hermes
Service Computing
2020
Click Here
15
Reverse Nearest Neighbor Search in Semantic Trajectories for Location based Services
Service Computing
2020
Click Here
16
Revocable Attribute-based Data Storage in Mobile Clouds
Service Computing
2020
Click Here
17
Scalable Discovery of Hybrid Process Models in a Cloud Computing Environment
Service Computing
2020
Click Here
18
Semantics of Data Mining Services in Cloud Computing
Service Computing
2020
Click Here
19
Shed+ Optimal Dynamic Speculation to Meet Application Deadlines in Cloud
Service Computing
2020
Click Here
         
DEPENDABLE AND SECURE COMPUTING
1
Shielding Collaborative Learning  Mitigating Poisoning Attacks through Client Side Detection
Dependable and Secure Computing
2020
Click Here
2
Scaling Camouflage Content Disguising Attack Against Computer Vision Applications
Dependable and Secure Computing
2020
Click Here
3
Representing Fine-Grained Co-Occurrences for Behavior-Based Fraud Detection in Online Payment Services
Dependable and Secure Computing
2020
Click Here
4
Privacy-Preserving Federated Deep Learning with Irregular Users
Dependable and Secure Computing
2020
Click Here
5
Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack
Dependable and Secure Computing
2020
Click Here
6
On-the-fly Privacy for Location Histograms
Dependable and Secure Computing
2020
Click Here
7
Multi-client Sub-Linear Boolean Keyword Searching for Encrypted Cloud Storage with Owner-enforced Authorization
Dependable and Secure Computing
2020
Click Here
8
Match in My Way Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing
Dependable and Secure Computing
2020
Click Here
9
Geometric range search on encrypted data with Forward or Backward security
Dependable and Secure Computing
2020
Click Here
10
Efficient Server-Aided Secure Two-Party Computation in Heterogeneous Mobile Cloud Computing
Dependable and Secure Computing
2020
Click Here
11
Efficient and Secure Attribute-based Access Control with Identical Sub-Policies Frequently Used in Cloud Storage
Dependable and Secure Computing
2020
Click Here
12
Detection and Defense of Cache Pollution Based on Popularity Prediction in Named Data Networking
Dependable and Secure Computing
2020
Click Here
13
Adaptive Secure Nearest Neighbor Query Processing over Encrypted Data
Dependable and Secure Computing
2020
Click Here
14
Achieving Efficient Secure Deduplication with User-Defined Access Control in Cloud
Dependable and Secure Computing
2020
Click Here
15
Achieving Efficient and Privacy-Preserving Exact Set Similarity Search over Encrypted Data
Dependable and Secure Computing
2020
Click Here
16
A Traceable and Revocable Ciphertext-policy Attribute-based Encryption Scheme Based on Privacy Protection
Dependable and Secure Computing
2020
Click Here
         
IMAGE PROCESSING AND MULTIMEDIA
1
Benchmarking Image Retrieval Diversification Techniques for Social Media
Image Processing
2020
Click Here
2
Online Hashing with Bit Selection for Image Retrieval
Image Processing
2020
Click Here
3
Trust-Based Video Management Framework for Social Multimedia Networks
Image Processing
2020
Click Here
         
         
PARALLEL AND DISTRIBUTED SYTSTEMS
1
An Integrated Indexing and Search Service for Distributed File Systems
Distributed Systems
2020
Click Here
2
ESetStore An Erasure-Coded Storage System With Fast Data Recovery
Distributed Systems
2020
Click Here
3
Scalable and Adaptive Data Replica Placement for Geo-Distributed Cloud Storages
Distributed Systems
2020
Click Here
         
ADHOC NETWORKS
1
Efficient Conditional Anonymity With Message Integrity and Authentication in a Vehicular Ad-Hoc Network
Adhoc Networks
2019
Click Here
2
Kalman Prediction based Neighbor Discovery and its Effect on Routing Protocol in Vehicular Ad Hoc Networks
Adhoc Networks
2019
Click Here
3
New Multi-Hop Clustering Algorithm for Vehicular Ad Hoc Networks
Adhoc Networks
2019
Click Here
4
Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks
Adhoc Networks
2019
Click Here
5
V2V Routing in a VANET Based on the Autoregressive Integrated Moving Average Model
Adhoc Networks
2019
Click Here
6
An Evolutionary Self-Cooperative Trust Scheme Against Routing Disruptions in MANETs
Adhoc Networks
2019
Click Here
7
An Attack-resistant Trust Inference Model for Securing Routing in Vehicular Ad-hoc Networks
Adhoc Networks
2019
Click Here
8
An Efficient Message-Authentication Scheme Based on Edge Computing for Vehicular Ad Hoc Networks
Adhoc Networks
2019
Click Here
9
DeQoS Attack: Degrading Quality of Service in VANETs and its Mitigation
Adhoc Networks
2019
Click Here
10
Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks
Adhoc Networks
2019
Click Here
         

     

Live 2019 and 2020 JAVA IEEE Projects List --- Download

 

Live Demo is available on youtube.You can click on demo link and can download the video for further reference and send your title name to the following email id to get base paper and Abstract.Please mention your degree and other requirements also..
Cloud Computing
Sl.No
Project Title Name
Domain
Year
Demo
1
A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing
Cloud Computing
2019
Click Here
2
A Trust-Based Agent Learning Model for Service Composition in Mobile Cloud Computing Environments
Cloud Computing
2019
Click Here
3
Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data
Cloud Computing
2019
Click Here
4
Reliability and Availability Evaluation for Cloud Data Center Networks Using Hierarchical Models
Cloud Computing
2019
Click Here
5
Verifiable and Multi-keyword Searchable Attribute-based Encryption Scheme for Cloud Storage
Cloud Computing
2019
Click Here
6
Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud
Cloud Computing
2019
Click Here
7
CHARON: A Secure Cloud-of-Clouds System for Storing and Sharing Big Data
Cloud Computing
2019
Click Here
8
An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud Storage
Cloud Computing
2019
Click Here
9
Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data
Cloud Computing
2019
Click Here
10
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing
Cloud Computing
2019
Click Here
11
Hidden Ciphertext Policy Attribute-Based Encryption with Fast Decryption for Personal Health Record System
Cloud Computing
2019
Click Here
12
A Lightweight Secure Auditing Scheme for Shared Data in Cloud Storage
Cloud Computing
2019
Click Here
13
Novel Multi-Keyword Search on Encrypted Data in the Cloud
Cloud Computing
2019
Click Here
14
Privacy-aware Personal Data Storage (P-PDS) Learning how to Protect User Privacy from External Applications
Cloud Computing
2019
Click Here
15
Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting
Cloud Computing
2019
Click Here
16
Fast Boolean Queries With Minimized Leakage for Encrypted Databases in Cloud Computing 
Cloud Computing
2019
Click Here
17
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing
Cloud Computing
2019
Click Here
18
Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments
Cloud Computing
2019
Click Here
19
A Fog-centric Secure Cloud Storage Scheme
Cloud Computing
2019
Click Here
20
Enabling Verifiable and Dynamic Ranked Search Over Outsourced Data
Cloud Computing
2019
Click Here
21
A Data Sharing Protocol to Minimize Security and Privacy Risks of Cloud Storage in Big Data Era
Cloud Computing
2019
Click Here
22
A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage Services
Cloud Computing
2019
Click Here
23
Achieve Privacy-Preserving Priority Classification on Patient Health Data in Remote eHealthcare System
Cloud Computing
2019
Click Here
24
Data Integrity Auditing without Private Key Storage for Secure Cloud Storage
Cloud Computing
2019
Click Here
25
Enabling Authorized Encrypted Search for Multi-Authority Medical Databases
Cloud Computing
2019
Click Here
26
Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
Cloud Computing
2019
Click Here
27
P-MOD: Secure Privilege-Based Multilevel Organizational Data-Sharing in Cloud Computing
Cloud Computing
2019
Click Here
28
Practical Privacy-Preserving MapReduce Based K-means Clustering over Large-scale Dataset
Cloud Computing
2019
Click Here
29
Profit Maximization for Cloud Brokers in Cloud Computing
Cloud Computing
2019
Click Here
30
Provable Data Possession with Outsourced Data Transfer
Cloud Computing
2019
Click Here
31
Provably Secure Fine-Grained Data Access Control over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications
Cloud Computing
2019
Click Here
32
Revocable Identity-Based Broadcast Proxy Re-encryption for Data Sharing in Clouds
Cloud Computing
2019
Click Here
33
Searchable Symmetric Encryption with Forward Search Privacy
Cloud Computing
2019
Click Here
34
Privacy Preserving Searchable Encryption with Fine-grained Access Control
Cloud Computing
2019
Click Here
35
A Secure G-Cloud-Based Framework for Government Healthcare Services
Cloud Computing
2019
Click Here

 

DATA MINING

 

1
Clustering-Based Collaborative Filtering Using an Incentivized/Penalized User Model
Data Mining
2019
Click Here
2
A Hierarchical Attention Model for Social Contextual Image Recommendation
Data Mining
2019
Click Here
3
Mining Users Trust From E-Commerce Reviews Based on Sentiment Similarity Analysis
Data Mining
2019
Click Here
4
Old and Young Users’ White Space Preferences for Online News Web Pages
Data Mining
2019
Click Here
5
Analysis and Accurate Prediction of User’s Response Behavior in Incentive-Based Demand Response
Data Mining
2019
Click Here
6
DCCR: Deep Collaborative Conjunctive Recommender for Rating Prediction
Data Mining
2019
Click Here
7
Network Representation Learning Enhanced Recommendation Algorithm
Data Mining
2019
Click Here
8
Trust Relationship Prediction in Alibaba E-Commerce Platform
Data Mining
2019
Click Here
9
Composition Context-Based Web Services Similarity Measure
Data Mining
2019
Click Here
10
NASM: Nonlinearly Attentive Similarity Model for Recommendation System via Locally Attentive Embedding
Data Mining
2019
Click Here
11
A Novel Load Image Profile-Based Electricity Load Clustering Methodology
Data Mining
2019
Click Here
12
An Efficient Method for High Quality and Cohesive Topical Phrase Mining
Data Mining
2019
Click Here
13
Credibility Evaluation of Twitter-Based Event Detection by a Mixing Analysis of Heterogeneous Data
Data Mining
2019
Click Here
14
Filtering Instagram hashtags through crowd tagging and the HITS algorithm
Data Mining
2019
Click Here
15
A Hybrid E-learning Recommendation Approach Based on Learners’ Influence Propagation
Data Mining
2019
Click Here
16
Active Online Learning for Social Media Analysis to Support Crisis Management
Data Mining
2019
Click Here
17
Applying Simulated Annealing and Parallel Computing to the Mobile Sequential Recommendation
Data Mining
2019
Click Here
18
Collaboratively Tracking Interests for User Clustering in Streams of Short Texts
Data Mining
2019
Click Here
19
Detecting Pickpocket Suspects from Large-Scale Public Transit Records
Data Mining
2019
Click Here
20
Finding Optimal Skyline Product Combinations under Price Promotion
Data Mining
2019
Click Here
21
Heterogeneous Information Network Embedding for Recommendation
Data Mining
2019
Click Here
22
Hierarchical Multi-Clue Modelling for POI Popularity Prediction with Heterogeneous Tourist Information
Data Mining
2019
Click Here
23
K-nearest Neighbor Search by Random Projection Forests
Data Mining
2019
Click Here
24
Learning Customer Behaviors for Effective Load Forecasting
Data Mining
2019
Click Here
25
Normalization of Duplicate Records from Multiple Sources
Data Mining
2019
Click Here
26
On Scalable and Robust Truth Discovery in Big Data Social Media Sensing Applications
Data Mining
2019
Click Here
27
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Based Recommendation
Data Mining
2019
Click Here
28
Secure and Efficient Skyline Queries on Encrypted Data
Data Mining
2019
Click Here
29
Predicting Consumption Patterns with Repeated and Novel Events
Data Mining
2019
Click Here
30
Multi-Party High-Dimensional Data Publishing under Differential Privacy
Data Mining
2019
Click Here
31
Minimizing Influence of Rumors by Blockers on Social Networks: Algorithms and Analysis
Data Mining
2019
Click Here
32
Detection of fake online reviews using semi-supervised and supervised learning
Data Mining
2019
Click Here
33
Collaborative Filtering-based Electricity Plan Recommender System               
Data Mining
2019
Click Here

SECURE COMPUTING

 

1
A Novel Load Image Profile-Based Electricity Load Clustering Methodology
Secure Computing
2019
Click Here
2
Coverless Information Hiding Method Based on Web Text
Secure Computing
2019
Click Here
3
SEPTIC Detecting Injection Attacks and Vulnerabilities Inside the DBMS
Secure Computing
2019
Click Here
4
LBOA: Location-Based Secure Outsourced Aggregation in IoT
Secure Computing
2019
Click Here
5
Towards Thwarting Template Side-channel Attacks in Secure Cloud Deduplications
Secure Computing
2019
Click Here
6
Automated Decision Making in Airport Checkpoints: Bias Detection Toward Smarter Security and Fairness
Secure Computing
2019
Click Here
7
Detecting Malicious Social Bots Based on Click stream Sequences
Secure Computing
2019
Click Here
8
Authenticated Medical Documents Releasing with Privacy Protection and Release Control
Secure Computing
2019
Click Here
9
Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe Systems
Secure Computing
2019
Click Here
10
Privacy-Preserving Aggregate Queries for Optimal Location Selection
Secure Computing
2019
Click Here
11
Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting
Secure Computing
2019
Click Here
12
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Secure Computing
2019
Click Here
13
Sensitive Label Privacy Preservation with Anatomization for Data Publishing
Secure Computing
2019
Click Here
14
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification
Secure Computing
2019
Click Here
15
Who You Should Not Follow: Extracting Word Embeddings from Tweets to Identify Groups of Interest and Hijackers in Demonstrations
Secure Computing
2019
Click Here
     
BLOCKCHAIN TECHNOLOGY
1
PBCert: Privacy-Preserving Blockchain-Based Certificate Status Validation Toward Mass Storage Management
Blockchain Technology
2019
Click Here
2
Blockchain for AI: Review and Open Research Challenges
Blockchain Technology
2019
Click Here
3
Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors
Blockchain Technology
2019
Click Here

 

INFORMATION FORENSICS and SECURITY

 

1
Authentication by Encrypted Negative Password
Information Forensics and Secuirty
2019
Click Here
2
Retrieving Hidden Friends: A Collusion Privacy Attack Against Online Friend Search Engine
Information Forensics and Secuirty
2019
Click Here
3
Account Trade Accountability Against Dishonest Big Data Buyers and Sellers
Information Forensics and Secuirty
2019
Click Here
4
Enabling Efficient and Geometric Range Query with Access Control over Encrypted Spatial Data
Information Forensics and Secuirty
2019
Click Here
5
Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage
Information Forensics and Secuirty
2019
Click Here
6
Peer Prediction Based Trustworthiness Evaluation and Trustworthy Service Rating in Social Networks
Information Forensics and Secuirty
2019
Click Here
7
Secure Key Agreement and Key Protection for Mobile Device User Authentication
Information Forensics and Secuirty
2019
Click Here

MOBILE COMPUTING

1
An Indoor Position-Estimation Algorithm Using Smartphone IMU Sensor Data
Mobile Computing
2019
Click Here
2
FooDNet: Toward an Optimized Food Delivery Network based on Spatial Crowdsourcing
Mobile Computing
2019
Click Here
3
Privacy-preserving Crowd-sourced Statistical Data Publishing with An Untrusted Server
Mobile Computing
2019
Click Here
4
 
Mobile Computing
2019
Click Here
5
 
Mobile Computing
2019
Click Here
6
 
Mobile Computing
2019
Click Here

 

SOCIAL NETWORK

 

 

1
A Hybrid Approach to Service Recommendation Based on Network Representation Learning
Social Network
2019
Click Here
2
Social Network Rumor Diffusion Predication Based on Equal Responsibility Game Model
Social Network
2019
Click Here
3
Online Public Shaming on Twitter: Detection, Analysis and Mitigation
Social Network
2019
Click Here
4
PersoNet: Friend Recommendation System Based on Big-Five Personality Traits and Hybrid Filtering
Social Network
2019
Click Here
5
A Fuzzy Approach to Text Classification with Two Stage Training for Ambiguous Instances
Social Network
2019
Click Here
6
Conversational Networks For Automatic Online Moderation
Social Network
2019
Click Here
     
SOFTWARE ENGINEERING,SERVICE COMPUTING
1
Platform-Independent Dynamic Taint Analysis for JavaScript
Software Engineering
2019
Click Here
2
Scheduling Real Time Security Aware tasks in Fog Networks
Software Engineering
2019
Click Here

 

WIRELESS SENSOR NETWOKS

 

1
V-Matrix-Based Scalable Data Aggregation Scheme in WSN
WSN
2019
Click Here
2
A Probabilistic Source Location Privacy Protection Scheme in Wireless Sensor Networks
WSN
2019
Click Here
3
Memory Leakage-Resilient Dynamic and Verifiable Multi-keyword Ranked Search on Encrypted Smart Body Sensor Network Data
WSN
2019
Click Here
4
Primary User-aware Optimal Discovery Routing for Cognitive Radio Networks
WSN
2019
Click Here
         
ANDROID
1
RescueMe: Smartphone-Based Self Rescue System for Disaster Rescue
Android
2019
Click Here
2
FallDroid: An Automated Smart Phone based Fall Detection System using Multiple Kernel Learning
Android
2019
Click Here
3
Dating with Scambots: Understanding the Ecosystem of Fraudulent Dating Applications
Android
2019
Click Here
4
Applying Simulated Annealing and Parallel Computing to the Mobile Sequential Recommendation
Android
2019
Click Here
5
An Indoor Position-Estimation Algorithm Using Smartphone IMU Sensor Data
Android
2019
Click Here
6
Achieve Privacy-Preserving Priority Classification on Patient Health Data in Remote eHealthcare System
Android
2019
Click Here
         
         
         
CYBER SECURITY
1
Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Learning Algorithms: Review of Literature and Open Challenges
Cyber Secuirty
2019
Click Here
2
Spammer Detection and Fake User Identification on Social Networks
Cyber Secuirty
2019
Click Here
3
Ant Colony Stream Clustering: A Fast Density Clustering Algorithm for Dynamic Data Streams
Cyber Secuirty
2019
Click Here
         
SERVICE COMPUTING
1
Transactional Behavior Verification in Business Process as a Service Configuration
Service Computing
2019
Click Here
2
Building and Querying an Enterprise Knowledge Graph
Service Computing
2019
Click Here
3
Delegated Authorization Framework for EHR Services using Attribute Based Encryption
Service Computing
2019
Click Here
4
Secure Channel Free Certificate-Based Searchable Encryption Withstanding Outside and Inside Keyword Guessing Attacks
Service Computing
2019
Click Here
         
INTERNET OF THINGS(IOT)
1
Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT
IOT
2019
Click Here
2
Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques
IOT
2019
Click Here
3
Trustworthy Delegation toward Securing Mobile Healthcare Cyber-Physical Systems
IOT
2019
Click Here
4
Hybrid Keyword-Field Search with Efficient Key Management for Industrial Internet of Things
IOT
2019
Click Here
5
Trustworthy Delegation toward Securing Mobile Healthcare Cyber-Physical Systems
IOT
2019
Click Here
6
Securing Data in Internet of Things (IoT) Using Cryptography and Stegano graphy Techniques
IOT
2019
Click Here
IMAGE PROCESSING and MULTIMEDIA
1
Fundamental Visual Concept Learning from Correlated Images and Text
Image Processing
2019
Click Here
2
Trust-based Privacy-Preserving Photo Sharing in Online Social Networks
Image Processing
2019
Click Here
3
Towards Robust Image Steganography
Image Processing
2019
Click Here
         
         
PARALLEL and DISTRIBUTED SYTSTEMS
1
A Distributed Trust Evaluation Protocol with Privacy Protection for Inter cloud
Distributed Systems
2019
Click Here
2
Deadline-aware MapReduce Job Scheduling with Dynamic Resource Availability
Distributed Systems
2019
Click Here
         
ADHOC NETWORKS
1
Efficient Conditional Anonymity With Message Integrity and Authentication in a Vehicular Ad-Hoc Network
Adhoc Networks
2019
Click Here
2
Kalman Prediction based Neighbor Discovery and its Effect on Routing Protocol in Vehicular Ad Hoc Networks
Adhoc Networks
2019
Click Here
3
New Multi-Hop Clustering Algorithm for Vehicular Ad Hoc Networks
Adhoc Networks
2019
Click Here
4
Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks
Adhoc Networks
2019
Click Here
5
V2V Routing in a VANET Based on the Autoregressive Integrated Moving Average Model
Adhoc Networks
2019
Click Here
6
An Evolutionary Self-Cooperative Trust Scheme Against Routing Disruptions in MANETs
Adhoc Networks
2019
Click Here
7
An Attack-resistant Trust Inference Model for Securing Routing in Vehicular Ad-hoc Networks
Adhoc Networks
2019
Click Here
8
An Efficient Message-Authentication Scheme Based on Edge Computing for Vehicular Ad Hoc Networks
Adhoc Networks
2019
Click Here
9
DeQoS Attack: Degrading Quality of Service in VANETs and its Mitigation
Adhoc Networks
2019
Click Here
10
Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks
Adhoc Networks
2019
Click Here