Live 2024 and 2025 Java IEEE Projects List --- Download 
 Live Demo is available on youtube.You can click on demo link and can download the video for further reference and send your title name to the following email id to get base paper and Abstract.Please mention your degree and other requirements also..  | 
    ||||
Cloud Computing   | 
      ||||
Sl.No  | 
      Project Title Name   | 
      Domain  | 
      Year  | 
      Demo  | 
    
1  | 
      Toward a Conflict Resolution Protocol for Cloud Forensics Investigation  | 
      Cloud Computing   | 
      2024  | 
      Click Here   | 
    
2  | 
      Improving Digital Forensic Security: A Secure Storage Model With Authentication and Optimal Key Generation Based Encryption  | 
      Cloud Computing   | 
      2024  | 
      Click Here   | 
    
3  | 
      Attribute-Based Management of Secure Kubernetes Cloud Bursting  | 
      Cloud Computing   | 
      2024  | 
      Click Here   | 
    
4  | 
      Blockchain-Based Decentralized Storage Design for Data Confidence Over Cloud-Native Edge Infrastructure  | 
      Cloud Computing   | 
      2024  | 
      Click Here   | 
    
5  | 
      DEDUCT: A Secure Deduplication of Textual Data in Cloud Environments  | 
      Cloud Computing   | 
      2024  | 
      Click Here   | 
    
6  | 
      EAKE-WC: Efficient and Anonymous Authenticated Key Exchange Scheme for Wearable Computing  | 
      Cloud Computing   | 
      2024  | 
      Click Here   | 
    
7  | 
      Enabling Parity Authenticator based Public Auditing with Protection of a Valid User Revocation in Cloud  | 
      Cloud Computing   | 
      2024  | 
      Click Here   | 
    
8  | 
      Secure Federated Cloud Storage Protection Strategy Using Hybrid Heuristic Attribute-Based Encryption With Permissioned Blockchain  | 
      Cloud Computing   | 
      2024  | 
      Click Here   | 
    
9  | 
      Privacy-Preserving and Lightweight Verification of Deep Packet Inspection in Clouds  | 
      Cloud Computing   | 
      2024  | 
      Click Here   | 
    
10  | 
      QPause: Quantum-Resistant Password-Protected Data Outsourcing for Cloud Storage  | 
      Cloud Computing   | 
      2024  | 
      Click Here   | 
    
11  | 
      Revocable and Efficient Blockchain-based Fine-grained Access Control against EDoS Attacks in Cloud Storage  | 
      Cloud Computing   | 
      2024  | 
      Click Here   | 
    
12  | 
      Efficient Privacy-Friendly and Flexible Wearable Data Processing With User-Centric Access Control  | 
      Cloud Computing   | 
      2024  | 
      Click Here   | 
    
13  | 
      Efficacious Novel Intrusion Detection System for Cloud Computing Environment  | 
      Cloud Computing   | 
      2024  | 
      Click Here   | 
    
14  | 
      Blockchain-Based Logging to Defeat Malicious Insiders: The Case of Remote Health Monitoring Systems  | 
      Cloud Computing   | 
      2024  | 
      Click Here   | 
    
15  | 
      Blockchain Based Data Integrity Verification for Large-Scale IoT Data  | 
      Cloud Computing   | 
      2024  | 
      Click Here   | 
    
16  | 
      Enabling Parity Authenticator based Public Auditing with Protection of a Valid User Revocation in Cloud  | 
      Cloud Computing   | 
      2024  | 
      Click Here   | 
    
17  | 
      Attribute-Based Searchable Encryption With Forward Security for Cloud-Assisted IoT  | 
      Cloud Computing   | 
      2024  | 
      Click Here   | 
    
18  | 
      A Hierarchical Key Assignment Scheme: A Unified Approach for Scalability and Efficiency  | 
      Cloud Computing   | 
      2024  | 
      Click Here   | 
    
19  | 
      A Comprehensive Taxonomy of Social Engineering Attacks and Defense Mechanisms: Toward Effective Mitigation Strategies  | 
      Cloud Computing   | 
      2024  | 
      Click Here   | 
    
20  | 
      E-Learning-Based Cloud Computing Environment: A Systematic Review, Challenges, and Opportunities  | 
      Cloud Computing   | 
      2024  | 
      Click Here   | 
    
21  | 
      Blockchain-based Decentralized Storage Design for Data Confidence over Cloudnative Edge Infrastructure  | 
      Cloud Computing   | 
      2024  | 
      Click Here   | 
    
BLOCKCHAIN 
        
  | 
      ||||
1  | 
      A Proposed Model for Improving the Reliability of Online Exam Results Using Blockchain  | 
      Block Chain   | 
      2024  | 
      Click Here   | 
    
2  | 
      Blockchain-Based Privacy-Preserving Shop Floor Auditing Architecture  | 
           Block Chain   | 
      2024  | 
      Click Here   | 
    
3  | 
      BBAD: Blockchain-backed Assault Detection for Cyber Physical Systems  | 
            Block Chain   | 
      2024  | 
      Click Here   | 
    
4  | 
      Blockchain-Based Authorization Mechanism for Educational Social Internet of Things  | 
            Block Chain   | 
      2024  | 
      Click Here   | 
    
5  | 
      Blockchain-Based Framework for Traffic Event Verification in Smart Vehicles  | 
            Block Chain   | 
      2024  | 
      Click Here   | 
    
6  | 
      Blockchain-Based KYC Model for Credit Allocation in Banking  | 
           Block Chain   | 
      2024  | 
      Click Here   | 
    
7  | 
      Blockchain-Based Logging to Defeat Malicious Insiders: The Case of Remote Health Monitoring Systems  | 
      Block Chain   | 
      2024  | 
      Click Here   | 
    
8  | 
      Blockchain-Based REC System for Improving the Aspects of Procedural Complexity and Cyber Security  | 
           Block Chain   | 
      2024  | 
      Click Here   | 
    
9  | 
      Blockchain-Enabled Framework for Transparent Land Lease and Mortgage Management  | 
      Block Chain  | 
      2024  | 
      Click Here  | 
    
10  | 
      Certifying Greenness: Blockchain’s Impact on Eco-Friendly Products in a Competitive Market  | 
      Block Chain  | 
      2024  | 
      Click Here  | 
    
11  | 
      Decentralized Funding of Public Goods in Blockchain System: Leveraging Expert Advice  | 
      Block Chain  | 
      2024  | 
      Click Here  | 
    
12  | 
      Energy Demand Forecasting for Electric Vehicles Using Blockchain-Based Federated Learning  | 
      Block Chain  | 
      2024  | 
      Click Here  | 
    
13  | 
      Optimized Data Fusion With Scheduled Rest Periods for Enhanced Smart Agriculture via Blockchain Integration  | 
      Block Chain  | 
      2024  | 
      Click Here  | 
    
14  | 
      PublicEduChain: A Framework for Sharing Student-Owned Educational Data on Public Blockchain Network  | 
      Block Chain  | 
      2024  | 
      Click Here  | 
    
15  | 
      Safeguarding Patient Data-Sharing: Blockchain-Enabled Federated Learning in Medical Diagnostics  | 
      Block Chain  | 
      2024  | 
      Click Here  | 
    
16  | 
      Secure Decentralized Aggregation to Prevent Membership Privacy Leakage in Edge-Based Federated Learning  | 
      Block Chain  | 
      2024  | 
      Click Here  | 
    
17  | 
      Securing EHRs With a Novel Token-Based and PPoS Blockchain Methodology  | 
      Block Chain  | 
      2024  | 
      Click Here  | 
    
18  | 
      Developing Intelligent and Immutable Vaccine Supply and Operation Platform Using Blockchain and Artificial Intelligence Technologies  | 
      Block Chain  | 
      2024  | 
      Click Here  | 
    
19  | 
      Blockchain based an efficient and secure privacy preserved framework for smart cities  | 
      Block Chain  | 
      2024  | 
      Click Here  | 
    
20  | 
      Blockchain-Based Authorization Mechanism for Educational Social Internet of Things  | 
      Block Chain  | 
      2024  | 
      Click Here  | 
    
21  | 
      Blockchain-Based Trust and Authentication Model for Detecting and Isolating Malicious Nodes in Flying Ad Hoc Networks  | 
      Block Chain  | 
      2024  | 
      Click Here  | 
    
DATA  MINING   | 
      ||||
1  | 
      A Distributed Knowledge Distillation Framework for Financial Fraud Detection Based on Transformer  | 
      Data Mining   | 
      2024  | 
      Click Here   | 
    
2  | 
      AgriResponse: A Real-Time Agricultural Query-Response Generation System for Assisting Nationwide Farmers  | 
      Data Mining   | 
      2024  | 
      Click Here   | 
    
3  | 
      Analyzing Big Data Professionals: Cultivating Holistic Skills Through University Education and Market Demands  | 
      Data Mining   | 
      2024  | 
      Click Here   | 
    
4  | 
      Automated Knowledge-Based Cybersecurity Risk Assessment of Cyber-Physical Systems  | 
      Data Mining   | 
      2024  | 
      Click Here   | 
    
5  | 
      Cybersecurity Education in Universities: A Comprehensive Guide to Curriculum Development  | 
      Data Mining   | 
      2024  | 
      Click Here   | 
    
6  | 
      Extracting Mediterranean Hidden Fishing Hotspots Through Big Data Mining  | 
      Data Mining   | 
      2024  | 
      Click Here   | 
    
7  | 
      Optimization of Emergency Supply and Distribution of Fresh Agricultural Products Under Public Health Emergencies  | 
      Data Mining   | 
      2024  | 
      Click Here   | 
    
8  | 
      Intelligent Recognition of Multimodal Human Activities for Personal Healthcare  | 
      Data Mining   | 
      2024  | 
      Click Here   | 
    
9  | 
      IoT-Enabled Advanced Water Quality Monitoring System for Pond Management and Environmental Conservation  | 
      Data Mining   | 
      2024  | 
      Click Here   | 
    
10  | 
      Extracting Mediterranean Hidden Fishing Hotspots Through Big Data Mining  | 
      Data Mining   | 
      2024  | 
      Click Here   | 
    
11  | 
      Toward Cleaner Industries: Smart Cities’ Impact on Predictive Air Quality Management  | 
      Data Mining   | 
      2024  | 
      Click Here   | 
    
INFORMATION FORENSICS & SECURE COMPUTING  | 
      ||||
1  | 
      CryptojackingTrap: An Evasion Resilient Nature-Inspired Algorithm to Detect Cryptojacking Malware  | 
      Secure Computing  | 
      2024  | 
      Click Here   | 
    
2  | 
      Fishing for Fraudsters: Uncovering Ethereum Phishing Gangs With Blockchain Data  | 
      Secure Computing  | 
      2024  | 
      Click Here   | 
    
2  | 
      Unveiling Vulnerabilities of Web Attacks Considering Man in the Middle Attack and Session Hijacking  | 
      Secure Computing  | 
      2024  | 
      Click Here   | 
    
2  | 
      eKYC-DF: A Large-Scale Deepfake Dataset for Developing and Evaluating eKYC Systems  | 
      Secure Computing  | 
      2024  | 
      Click Here   | 
    
2  | 
      PROGESI: A PROxy Grammar to Enhance Web Application Firewall for SQL Injection Prevention  | 
      Secure Computing  | 
      2024  | 
      Click Here   | 
    
2  | 
      Improving Digital Forensic Security: A Secure Storage Model With Authentication and Optimal Key Generation Based Encryption  | 
      Secure Computing  | 
      2024  | 
      Click Here   | 
    
2  | 
      Leakage of Authorization-Data in IoT Device Sharing: New Attacks and Countermeasure  | 
      Secure Computing  | 
      2024  | 
      Click Here   | 
    
2  | 
      Defending Against Poisoning Attacks in Federated Learning with Blockchain  | 
      Secure Computing  | 
      2024  | 
      Click Here   | 
    
2  | 
      VD-Net: An Edge Vision-Based Surveillance System for Violence Detection  | 
      Secure Computing  | 
      2024  | 
      Click Here   | 
    
SOCIAL  NETWORKS & NETWORKS  | 
      ||||
1  | 
      City Hotspot Identification Using Smart Cyber-Physical Social System  | 
      Social Networks   | 
      2024  | 
      Click Here   | 
    
2  | 
      OntoDSumm : Ontology based Tweet Summarization for Disaster Events   | 
      Social Networks   | 
      2024  | 
      Click Here   | 
    
3  | 
      TEGDetector: A Phishing Detector that Knows Evolving Transaction Behaviors  | 
      Social Networks   | 
      2024  | 
      Click Here   | 
    
4  | 
      A Hybrid Feature and Trust-Aggregation Recommender System in the Social Internet of Things  | 
      Social Networks   | 
      2024  | 
      Click Here   | 
    
5  | 
      AN EMOTION-AWARE MULTI-TASK APPROACH TO FAKE NEWS AND RUMOUR DETECTION USING TRANSFER LEARNING  | 
      Social Networks   | 
      2024  | 
      Click Here   | 
    
6  | 
      Efficient Multi-Cloud Storage Using Online Dynamic Replication and Placement Algorithms for Online Social Networks  | 
      Social Networks   | 
      2024  | 
      Click Here   | 
    
7  | 
      Friendship Inference Based on Interest Trajectory Similarity and Co-occurrence  | 
      Social Networks   | 
      2024  | 
      Click Here   | 
    
8  | 
      Interest-Based E-Commerce and Users’ Purchase Intention on Social Network Platforms  | 
      Social Networks   | 
      2024  | 
      Click Here   | 
    
9  | 
      PersoNet: A Novel Framework for Personality Classification-Based Apt Customer Service Agent Selection  | 
      Social Networks   | 
      2024  | 
      Click Here   | 
    
10  | 
      Predicting Voting Outcomes for Multi-Alternative Elections in Social Networks  | 
      Social Networks   | 
      2024  | 
      Click Here   | 
    
11  | 
      Social Media Forensics: An Adaptive Cyberbullying-Related Hate Speech Detection Approach Based on Neural Networks With Uncertainty  | 
      Social Networks   | 
      2024  | 
      Click Here   | 
    
12  | 
      TEGDetector: A Phishing Detector that Knows Evolving Transaction Behaviors  | 
      Social Networks   | 
      2024  | 
      Click Here   | 
    
13  | 
      Toward Multi-Modal Approach for Identification and Detection of Cyberbullying in Social Networks  | 
      Social Networks   | 
      2024  | 
      Click Here   | 
    
14  | 
      TranSentGAT:A Sentiment-Based Lexical Psycholinguistic Graph Attention Network for Personality Prediction  | 
      Social Networks   | 
      2024  | 
      Click Here   | 
    
15  | 
      TruthSeeker: The Largest Social Media Ground-Truth Dataset for Real/Fake Content  | 
      Social Networks   | 
      2024  | 
      Click Here   | 
    
16  | 
      Fine-Tuned Understanding: Enhancing Social Bot Detection With Transformer-Based Classification  | 
      Social Networks   | 
      2024  | 
      Click Here   | 
    
17  | 
      Semi-Automatic Dataset Annotation Applied to Automatic Violent Message Detection  | 
      Social Networks   | 
      2024  | 
      Click Here   | 
    
CYBERNETICS  | 
      ||||
1  | 
      Collaborative Learning for Cyberattack Detection in Blockchain Networks  | 
      Cybernetics   | 
      2024  | 
      Click Here   | 
    
2  | 
      Spam Text Detection Over Social Media Usage: A Supervised Sampling Approach for the Social Web of Things  | 
      Cybernetics   | 
      2024  | 
      Click Here   | 
    
MOBILE  COMPUTING 
        
        
  | 
      ||||
1  | 
      LPDB: Lightweight Policy-Driven Blockchain with Batch Verification for Rail Transit Systems  | 
      Mobile Computing   | 
      2024  | 
      Click Here   | 
    
2  | 
      Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation  | 
      Mobile Computing  | 
      2024  | 
      Click Here   | 
    
3  | 
      Multi-Agent Deep Reinforcement Learning based Scheduling Approach for Mobile Charging in Internet of Electric Vehicles  | 
      Mobile Computing  | 
      2024  | 
      Click Here   | 
    
4  | 
      Trust System- and Multiple Verification Technique-Based Method for Detecting Wormhole Attacks in MANETs  | 
      Mobile Computing  | 
      2024  | 
      Click Here   | 
    
IMAGE  PROCESSING  | 
      ||||
1  | 
      ChaSAM: An Architecture Based on Perceptual Hashing for Image Detection in Computer Forensics  | 
      Image Processing   | 
      2024  | 
      Click Here   | 
    
2  | 
      Robust Hashing with Local Tangent Space Alignment for Image Copy Detection  | 
      Image Processing   | 
      2024  | 
      Click Here   | 
    
3  | 
      Sherlock in OSS: A Novel Approach of Content-Based Searching in Object Storage System  | 
      Image Processing   | 
      2024  | 
      Click Here   | 
    
4  | 
      IoMT Privacy Preservation: A Hash-Based DCIWT Approach for Detecting Tampering in Medical Data  | 
      Image Processing   | 
      2024  | 
      Click Here   | 
    
Live 2023 and 2024 Java IEEE Projects List --- Download 
 Live Demo is available on youtube.You can click on demo link and can download the video for further reference and send your title name to the following email id to get base paper and Abstract.Please mention your degree and other requirements also..  | 
    ||||
Cloud Computing   | 
      ||||
Sl.No  | 
      Project Title Name   | 
      Domain  | 
      Year  | 
      Demo  | 
    
1  | 
      An  Effective Privacy-Preserving Blockchain-Assisted Security Protocol for  Cloud-Based Digital Twin Environment  | 
      Cloud Computing   | 
      2023  | 
      Click Here   | 
    
2  | 
      Authenticated  Key Agreement Scheme for Fog Computing in a Health-Care Environment  | 
      Cloud Computing   | 
      2023  | 
      Click Here   | 
    
3  | 
      Data  Integrity Audit Scheme Based on Quad Merkle Tree and Blockchain  | 
      Cloud Computing   | 
      2023  | 
      Click Here   | 
    
4  | 
      Data  Secure De-Duplication and Recovery Based on Public Key Encryption With Keyword Search  | 
      Cloud Computing   | 
      2023  | 
      Click Here   | 
    
5  | 
      Delegate  and Verify the Update Keys of Revocable Identity-Based Encryption  | 
      Cloud Computing   | 
      2023  | 
      Click Here   | 
    
6  | 
      Dynamic  Secure Access Control and Data Sharing Through Trusted Delegation and  Revocation in a Blockchain-Enabled Cloud-IoT Environment  | 
      Cloud Computing   | 
      2023  | 
      Click Here   | 
    
7  | 
      Efficient,  Traceable and Privacy-Aware Data Access Control in Distributed Cloud-Based IoD  Systems  | 
      Cloud Computing   | 
      2023  | 
      Click Here   | 
    
8  | 
      EFPB:  Efficient Fair Payment Based on Blockchain for Outsourcing Services in Cloud  Computing  | 
      Cloud Computing   | 
      2023  | 
      Click Here   | 
    
9  | 
      Enabling Simultaneous Content Regulation and Privacy Protection  for Cloud Storage Image  | 
      Cloud Computing   | 
      2023  | 
      Click Here   | 
    
10  | 
      FAST  DATA: A Fair, Secure and Trusted Decentralized IIoT Data Marketplace enabled by  Blockchain  | 
      Cloud Computing   | 
      2023  | 
      Click Here   | 
    
11  | 
      Mitigating  Software Integrity Attacks With Trusted Computing in a Time Distribution  Network  | 
      Cloud Computing   | 
      2023  | 
      Click Here   | 
    
12  | 
      Optimized  Proactive Recovery in Erasure-Coded Cloud Storage Systems  | 
      Cloud Computing   | 
      2023  | 
      Click Here   | 
    
13  | 
      PackCache:  An Online Cost-driven Data Caching Algorithm in the Cloud  | 
      Cloud Computing   | 
      2023  | 
      Click Here   | 
    
14  | 
      Privacy  Preservation in Multi-Cloud Secure Data Fusion for Infectious-Disease Analysis  | 
      Cloud Computing   | 
      2023  | 
      Click Here   | 
    
15  | 
      RRFT: A Rank-Based Resource Aware Fault Tolerant  Strategy for Cloud Platforms  | 
      Cloud Computing   | 
      2023  | 
      Click Here   | 
    
16  | 
      Secure  and Efficient Data Deduplication in JointCloud Storage  | 
      Cloud Computing   | 
      2023  | 
      Click Here   | 
    
17  | 
      Secure  and Lightweight Blockchain-Enabled Access Control for Fog-Assisted IoT Cloud  Based Electronic Medical Records Sharing  | 
      Cloud Computing   | 
      2023  | 
      Click Here   | 
    
18  | 
      Securing Organization’s Data: A Role-Based Authorized  Keyword Search Scheme with Efficient Decryption  | 
      Cloud Computing   | 
      2023  | 
      Click Here   | 
    
19  | 
      CloudNet: A LiDAR-Based Face Anti-Spoofing Model That  Is Robust Against Light Variation  | 
      Cloud Computing   | 
      2023  | 
      Click Here   | 
    
20  | 
      A Data Deduplication Scheme Based on DBSCAN With  Tolerable Clustering Deviation  | 
      Cloud Computing   | 
      2023  | 
      Click Here   | 
    
21  | 
      A  Personal Privacy Data Protection Scheme for Encryption and Revocation of  High-Dimensional Attribute Domains  | 
      Cloud Computing   | 
      2023  | 
      Click Here   | 
    
22  | 
      An  Effective Privacy-Preserving Blockchain-Assisted Security Protocol for  Cloud-Based Digital Twin Environment  | 
      Cloud Computing   | 
      2023  | 
      Click Here   | 
    
23  | 
      An  Efficient Post-Quantum Attribute-Based Encryption Scheme Based on Rank Metric  Codes for Cloud Computing  | 
      Cloud Computing   | 
      2023  | 
      Click Here   | 
    
24  | 
      CACPA: Credible Alliance-Chain-Based Public Auditing  Scheme for Cloud Storage  | 
      Cloud Computing   | 
      2023  | 
      Click Here   | 
    
25  | 
      Enabling  Balanced Data Deduplication in Mobile Edge Computing  | 
      Cloud Computing   | 
      2023  | 
      Click Here   | 
    
26  | 
      Efficient  Large-Capacity Caching in Cloud Storage Using Skip-Gram-Based File Correlation  Analysis  | 
      Cloud Computing   | 
      2023  | 
      Click Here   | 
    
27  | 
      Multi-Task Learning for Electricity Price Forecasting  and Resource Management in Cloud Based Industrial IoT Systems  | 
      Cloud Computing   | 
      2023  | 
      Click Here   | 
    
28  | 
      Secure  and Efficient Data Deduplication in JointCloud Storage  | 
      Cloud Computing   | 
      2023  | 
      Click Here   | 
    
29  | 
      Nimbus: Towards Latency-Energy Efficient Task  Offloading for AR Services  | 
      Cloud Computing   | 
      2023  | 
      Click Here   | 
    
30  | 
      VeriDedup:  A Verifiable Cloud Data Deduplication Scheme With Integrity and Duplication  Proof  | 
      Cloud Computing   | 
      2023  | 
      Click Here   | 
    
31  | 
    
      CryptoArcade: A Cloud Gaming System With  Blockchain-Based Token Economy  | 
      Cloud Computing   | 
      2023  | 
      Click Here   | 
    
BLOCKCHAIN 
        
  | 
      ||||
1  | 
      A  Blockchain-based Decentralized, Fair and Authenticated Information Sharing  Scheme in Zero Trust Internet-of-Things  | 
      Block Chain   | 
      2023  | 
      Click Here   | 
    
2  | 
      A  Blockchain-based E-Commerce Reputation System Built with Verifiable Credentials  | 
           Block Chain   | 
      2023  | 
      Click Here   | 
    
3  | 
      A  Blockchain-Based Mutual Authentication Method to Secure the Electric Vehicles’  TPMS  | 
            Block Chain   | 
      2023  | 
      Click Here   | 
    
4  | 
      A  Secure and Intelligent Data Sharing Scheme for UAV-Assisted Disaster Rescue  | 
            Block Chain   | 
      2023  | 
      Click Here   | 
    
5  | 
      A  Secure Decentralized E-Voting with Blockchain & Smart Contracts  | 
            Block Chain   | 
      2023  | 
      Click Here   | 
    
6  | 
      A Tractable Probabilistic Approach to Analyze Sybil  Attacks in Sharding-Based Blockchain Protocols  | 
           Block Chain   | 
      2023  | 
      Click Here   | 
    
7  | 
      A Blockchain-Based Crowdsourcing Loan Platform for  Funding Higher Education in Developing Countries  | 
      Block Chain   | 
      2023  | 
      Click Here   | 
    
8  | 
      A  Privacy-preserving Medical Data Sharing Scheme Based on Blockchain  | 
           Block Chain   | 
      2023  | 
      Click Here   | 
    
9  | 
      A  Secure and Privacy-Preserving E-Government Framework Using Blockchain and  Artificial Immunity  | 
      Block Chain  | 
      2023  | 
      Click Here  | 
    
10  | 
      Aegis: Privacy-Preserving Market for Non-Fungible  Tokens  | 
      Block Chain  | 
      2023  | 
      Click Here  | 
    
11  | 
      Bank  record storage using blockchain  | 
      Block Chain  | 
      2023  | 
      Click Here  | 
    
12  | 
      BCGeo:  Blockchain-Assisted Geospatial Web Service for Smart Healthcare System  | 
      Block Chain  | 
      2023  | 
      Click Here  | 
    
13  | 
      BitAnalysis: A Visualization System for Bitcoin Wallet  Investigation  | 
      Block Chain  | 
      2023  | 
      Click Here  | 
    
14  | 
      Blockchain  Enabled Decentralized Local Electricity Markets with Flexibility from Heating  Sources  | 
      Block Chain  | 
      2023  | 
      Click Here  | 
    
15  | 
      Blockchain  Adoption in Food Supply Chains: A Systematic Literature Review on Enablers,  Benefits, and Barriers  | 
      Block Chain  | 
      2023  | 
      Click Here  | 
    
16  | 
      Blockchain  for Healthcare Management Systems: A Survey on Interoperability and Security  | 
      Block Chain  | 
      2023  | 
      Click Here  | 
    
17  | 
      Blockchain-based  Federated Learning with SMPC Model Verification Against Poisoning Attack for  Healthcare Systems  | 
      Block Chain  | 
      2023  | 
      Click Here  | 
    
18  | 
      Blockchain-Enabled  Authenticated Key Agreement Scheme for Mobile Vehicles-Assisted Precision  Agricultural IoT Networks  | 
      Block Chain  | 
      2023  | 
      Click Here  | 
    
19  | 
      Blockchain-Enabled  Technique for Privacy- Preserved Medical Recommender System  | 
      Block Chain  | 
      2023  | 
      Click Here  | 
    
20  | 
      Cryptocurrency Transaction Network Embedding From  Static and Dynamic Perspectives: An Overview  | 
      Block Chain  | 
      2023  | 
      Click Here  | 
    
21  | 
      Cyber-Physical  Customer Management for Internet of Robotic Things-Enabled Banking  | 
      Block Chain  | 
      2023  | 
      Click Here  | 
    
22  | 
      Federated  Learning and Blockchain-enabled Fog-IoT Platform for Wearables in Predictive  Healthcare  | 
      Block Chain  | 
      2023  | 
      Click Here  | 
    
23  | 
      FLAME:  Trusted Fire Brigade Service and Insurance Claim System using Blockchain for  Enterprises  | 
      Block Chain  | 
      2023  | 
      Click Here  | 
    
24  | 
      Privacy-Preserving  Electricity Theft Detection based on Blockchain  | 
      Block Chain  | 
      2023  | 
      Click Here  | 
    
25  | 
      Sec-Health:  A Blockchain-Based Protocol for Securing Health Records  | 
      Block Chain  | 
      2023  | 
      Click Here  | 
    
26  | 
      UCoin: An Efficient Privacy Preserving Scheme for  Cryptocurrencies  | 
      Block Chain  | 
      2023  | 
      Click Here  | 
    
27  | 
      User  Interface of Blockchain-based Agri-Food Traceability Applications: A Review  | 
      Block Chain  | 
      2023  | 
      Click Here  | 
    
28  | 
      Using Blockchain for Enabling Transparent, Traceable,  and Trusted University Ranking Systems  | 
      Block Chain  | 
      2023  | 
      Click Here  | 
    
29  | 
      Using  Composable NFTs for Trading and Managing Expensive Packaged Products in the  Food Industry  | 
      Block Chain  | 
      2023  | 
      Click Here  | 
    
DATA  MINING   | 
      ||||
1  | 
      A Comparative Analysis of Sampling Techniques for  Click-Through Rate Prediction in Native Advertising  | 
      Data Mining   | 
      2023  | 
      Click Here   | 
    
2  | 
      CrowdSPaFE:  A Crowd-Sourced Multimodal Recommendation System for Urban Route Safety  | 
      Data Mining   | 
      2023  | 
      Click Here   | 
    
3  | 
      Exploiting Category-Level Multiple Characteristics for  POI Recommendation  | 
      Data Mining   | 
      2023  | 
      Click Here   | 
    
4  | 
      Finding  Critical Users in Social Communities via Graph Convolutions  | 
      Data Mining   | 
      2023  | 
      Click Here   | 
    
5  | 
      Fine-Grained  Relation Extraction for Drug Instructions Using Contrastive Entity Enhancement  | 
      Data Mining   | 
      2023  | 
      Click Here   | 
    
6  | 
      Modeling  Health Stage Development of Patients with Dynamic Attributed Graphs in Online  Health Communities  | 
      Data Mining   | 
      2023  | 
      Click Here   | 
    
7  | 
      Modeling Human Driving Behavior through Generative  Adversarial Imitation Learning  | 
      Data Mining   | 
      2023  | 
      Click Here   | 
    
8  | 
      Multi-Objective Dynamic Software Project Scheduling: A  Novel Approach to Handle Employee’s Addition  | 
      Data Mining   | 
      2023  | 
      Click Here   | 
    
9  | 
      NetFense:  Adversarial Defenses against Privacy Attacks on Neural Networks for Graph Data  | 
      Data Mining   | 
      2023  | 
      Click Here   | 
    
10  | 
      Optimal  Drug Dosage Control Strategy of Immune Systems Using Reinforcement Learning  | 
      Data Mining   | 
      2023  | 
      Click Here   | 
    
11  | 
      Remaining  Shelf-Life Estimation of Fresh Fruits and Vegetables During Transportation  | 
      Data Mining   | 
      2023  | 
      Click Here   | 
    
12  | 
      Two  Stage Job Title Identification System for Online Job Advertisements  | 
      Data Mining   | 
      2023  | 
      Click Here   | 
    
13  | 
      Shopping Hard or Hardly Shopping: Revealing Consumer  Segments Using Clickstream Data  | 
      Data Mining   | 
      2023  | 
      Click Here   | 
    
CYBERNETICS  | 
      ||||
1  | 
      A Dynamic Data Slice Approach to the Vulnerability  Analysis of E-Commerce Systems  | 
      Cybernetics  | 
      2023  | 
      Click Here   | 
    
2  | 
      Data Trust Framework Using Blockchain Technology and  Adaptive Transaction Validation  | 
      Cybernetics  | 
      2023  | 
      Click Here   | 
    
SOCIAL  NETWORKS & NETWORKS  | 
      ||||
1  | 
      Friendship  Inference in Mobile Social Networks: Exploiting Multi-Source Information With  Two-Stage Deep Learning Framework  | 
      Social Networks   | 
      2023  | 
      Click Here   | 
    
2  | 
      Socio-Technical  Ecosystem Considerations: An Emergent Research Agenda for AI in Cybersecurity   | 
      Social Networks   | 
      2023  | 
      Click Here   | 
    
3  | 
      Complaint  and Severity Identification from Online Financial Content  | 
      Social Networks   | 
      2023  | 
      Click Here   | 
    
4  | 
      Behavioral  Model for Live Detection of Apps Based Attack  | 
      Social Networks   | 
      2023  | 
      Click Here   | 
    
5  | 
      Explainable Misinformation Detection Across Multiple  Social Media Platforms  | 
      Social Networks   | 
      2023  | 
      Click Here   | 
    
6  | 
      Online  POI Recommendation: Learning Dynamic Geo-Human Interactions in Streams  | 
      Social Networks   | 
      2023  | 
      Click Here   | 
    
7  | 
      Target-Oriented Investigation of Online Abusive  Attacks: A Dataset and Analysis  | 
      Social Networks   | 
      2023  | 
      Click Here   | 
    
8  | 
      Textual Pre-Trained Models for Gender Identification  Across Community Question-Answering Members  | 
      Social Networks   | 
      2023  | 
      Click Here   | 
    
9  | 
      Travel  Direction Recommendation Model Based on Photos of User Social Network Profile  | 
      Social Networks   | 
      2023  | 
      Click Here   | 
    
10  | 
      Mitigating  Influence of Disinformation Propagation Using Uncertainty-Based Opinion  Interactions  | 
      Social Networks   | 
      2023  | 
      Click Here   | 
    
11  | 
      Limited-Trust in Diffusion of Competing Alternatives  over Social Networks  | 
      Social Networks   | 
      2023  | 
      Click Here   | 
    
12  | 
      Detecting  Fraudulent Student Communication in a Multiple Choice Online Test Environment  | 
      Social Networks   | 
      2023  | 
      Click Here   | 
    
13  | 
      Consumer  Behavior Analysis on Sales Process Model Using Process Discovery Algorithm for  the Omnichannel Distribution System  | 
      Social Networks   | 
      2023  | 
      Click Here   | 
    
14  | 
      Credible Expert Rank: Leveraging Social Network  Analysis and Opinion Mining to Facilitate Reliable Information Retrieval on  Knowledge-Sharing Sites  | 
      Social Networks   | 
      2023  | 
      Click Here   | 
    
15  | 
      Exploring the  Contextual Factors Affecting Multimodal Emotion Recognition in Videos  | 
      Social Networks   | 
      2023  | 
      Click Here   | 
    
16  | 
      Multi-Objective  Optimization of Evacuation Route for Heterogeneous Passengers in the Metro  Station Considering Node Efficiency  | 
      Social Networks   | 
      2023  | 
      Click Here   | 
    
17  | 
      Assessing the Impact of Contextual Information in Hate  Speech Detection  | 
      Social Networks   | 
      2023  | 
      Click Here   | 
    
DEPENDABLE AND SECURE  COMPUTING  | 
      ||||
1  | 
      PhiKitA:  Phishing Kit Attacks Dataset for Phishing Websites Identification  | 
      Secure Computing   | 
      2023  | 
      Click Here   | 
    
2  | 
      On  Detecting Route Hijacking Attack in Opportunistic Mobile Networks  | 
      Secure Computing   | 
      2023  | 
      Click Here   | 
    
3  | 
      Sanare:  Pluggable Intrusion Recovery for Web Applications  | 
      Secure Computing   | 
      2023  | 
      Click Here   | 
    
4  | 
      A  URL-Based Social Semantic Attacks Detection With Character-Aware Language Model  | 
      Secure Computing   | 
      2023  | 
      Click Here   | 
    
5  | 
      Achieving  Online and Scalable Information Integrity by Harnessing Social Spam  Correlations  | 
      Secure Computing   | 
      2023  | 
      Click Here   | 
    
6  | 
      Secure, ID Privacy and Inference Threat Prevention  Mechanisms for Distributed Systems  | 
      Secure Computing   | 
      2023  | 
      Click Here   | 
    
7  | 
      Vulnerability  Evaluation Method for E-Commerce Transaction Systems With Unobservable  Transitions  | 
      Secure Computing   | 
      2023  | 
      Click Here   | 
    
8  | 
      SpADe:  Multi-Stage Spam Account Detection for Online Social Networks  | 
      Secure Computing   | 
      2023  | 
      Click Here   | 
    
MOBILE  COMPUTING 
        
        
  | 
      ||||
1  | 
      CrowdPatrol:  A Mobile Crowdsensing Framework for Traffic Violation Hotspot Patrolling  | 
      Mobile Computing   | 
      2023  | 
      Click Here   | 
    
2  | 
      A Sensing, Communication and Computing Approach for  Vulnerable Road Users Safety  | 
      Mobile Computing  | 
      2023  | 
      Click Here   | 
    
3  | 
      Characterizing  Mobile Money Phishing Using Reinforcement Learning  | 
      Mobile Computing  | 
      2023  | 
      Click Here   | 
    
4  | 
      Enabling  Balanced Data Deduplication in Mobile Edge Computing  | 
      Mobile Computing  | 
      2023  | 
      Click Here   | 
    
5  | 
      Hiring  a Team from Social Network: Incentive Mechanism Design for Two-tiered Social  Mobile Crowdsourcing  | 
      Mobile Computing  | 
      2023  | 
      Click Here   | 
    
6  | 
      RedPacketBike: A Graph-Based  Demand Modeling and Crowd-Driven Station Rebalancing Framework for Bike Sharing  Systems  | 
      Mobile Computing  | 
      2023  | 
      Click Here   | 
    
7  | 
      Smart  Edge-Based Driver Drowsiness Detection in Mobile Crowd sourcing  | 
      Mobile Computing  | 
      2023  | 
      Click Here   | 
    
8  | 
      Urban Wellbeing: A  Portable Sensing Approach to unravel the link between Environment and Mental  Wellbeing  | 
      Mobile Computing  | 
      2023  | 
      Click Here   | 
    
IMAGE  PROCESSING  | 
      ||||
1  | 
      PhotoHelper: Portrait Photographing Guidance Via Deep  Feature Retrieval and Fusion  | 
      Image Processing   | 
      2023  | 
      Click Here   | 
    
2  | 
      ReLoc:  A Restoration-Assisted Framework for Robust Image Tampering Localization  | 
      Image Processing   | 
      2023  | 
      Click Here   | 
    
3  | 
      HoVer-Trans: Anatomy-Aware HoVer-Transformer for  ROI-Free Breast Cancer Diagnosis in Ultrasound Images  | 
      Image Processing   | 
      2023  | 
      Click Here   | 
    
4  | 
      Hercules: Deep Hierarchical Attentive Multilevel  Fusion Model With Uncertainty Quantification for Medical Image Classification  | 
      Image Processing   | 
      2023  | 
      Click Here   | 
    
5  | 
      HybrUR: A Hybrid Physical-Neural Solution for  Unsupervised Underwater Image Restoration  | 
      Image Processing   | 
      2023  | 
      Click Here   | 
    
| Live Demo is available on youtube.You can click on demo link and can download the video for further reference and send your title name to the following email id to get base paper and Abstract.Please mention your degree and other requirements also.. | ||||
Cloud Computing   | 
                      ||||
Sl.No  | 
                        Project Title Name   | 
                        Domain  | 
                        Year  | 
                        Demo  | 
                      
1  | 
                        Privacy-Preserving Public Auditing for Shared Cloud  Data With Secure Group Management  | 
                        Cloud Computing   | 
                        2022  | 
                        Click Here   | 
                      
2  | 
                        BOEW: A Content-based Image Retrieval Scheme using  Bag-of-Encrypted-Words in Cloud Computing  | 
                        Cloud Computing   | 
                        2022  | 
                        Click Here   | 
                      
3  | 
                        Cloud Raid: Detecting Distributed Concurrency Bugs via  Log Mining and Enhancement  | 
                        Cloud Computing   | 
                        2022  | 
                        Click Here   | 
                      
4  | 
                        Data Integrity Audit Scheme Based on Blockchain  Expansion Technology  | 
                        Cloud Computing   | 
                        2022  | 
                        Click Here   | 
                      
5  | 
                        Data Integrity Audit Based on Data Blinding for Cloud  and Fog Environment  | 
                        Cloud Computing   | 
                        2022  | 
                        Click Here   | 
                      
6  | 
                        Achieving Efficient Secure Deduplication with  User-Defined Access Control in Cloud  | 
                        Cloud Computing   | 
                        2022  | 
                        Click Here   | 
                      
7  | 
                        Efficient CP-ABE Scheme with Shared Decryption in  Cloud Storage  | 
                        Cloud Computing   | 
                        2022  | 
                        Click Here   | 
                      
8  | 
                        VeriDedup: A Verifiable Cloud Data Deduplication  Scheme with Integrity and Duplication Proof  | 
                        Cloud Computing   | 
                        2022  | 
                        Click Here   | 
                      
9  | 
                        Identity-Based Privacy Preserving Remote Data Integrity Checking With a Designated Verifier  | 
                        Cloud Computing   | 
                        2022  | 
                        Click Here   | 
                      
10  | 
                        Efficient Identity-based Provable Multi-Copy Data Possession in Multi-Cloud Storage  | 
                        Cloud Computing   | 
                        2022  | 
                        Click Here   | 
                      
11  | 
                        Secure and Lightweight Fine-grained Searchable Data Sharing for IoT-oriented and Cloud-assisted Smart Healthcare System  | 
                        Cloud Computing   | 
                        2022  | 
                        Click Here   | 
                      
12  | 
                        PMRSS: Privacy-preserving Medical Record Searching Scheme for Intelligent Diagnosis in IoT Healthcare  | 
                        Cloud Computing   | 
                        2022  | 
                        Click Here   | 
                      
13  | 
                        DSAS: A Secure Data Sharing and Authorized Searchable Framework for e-Healthcare System  | 
                        Cloud Computing   | 
                        2022  | 
                        Click Here   | 
                      
14  | 
                        Enabling Efficient, Secure and Privacy-preserving Mobile Cloud Storage  | 
                        Cloud Computing   | 
                        2022  | 
                        Click Here   | 
                      
15  | 
                        Enabling Verifiable and Dynamic Ranked Search Over Outsourced Data  | 
                        Cloud Computing   | 
                        2022  | 
                        Click Here   | 
                      
16  | 
                        Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage  | 
                        Cloud Computing   | 
                        2022  | 
                        Click Here   | 
                      
17  | 
                        Lightweight and Expressive Fine-grained Access Control for Healthcare Internet-of-Things  | 
                        Cloud Computing   | 
                        2022  | 
                        Click Here   | 
                      
18  | 
                        Web Cloud: Web-Based Cloud Storage for Secure Data Sharing across Platforms  | 
                        Cloud Computing   | 
                        2022  | 
                        Click Here   | 
                      
19  | 
                        Verifiable Searchable Encryption Framework against Insider Keyword-Guessing Attack in Cloud Storage  | 
                        Cloud Computing   | 
                        2022  | 
                        Click Here   | 
                      
20  | 
                        Revocable Identity-Based Access Control for Big Data with Verifiable Outsourced Computing  | 
                        Cloud Computing   | 
                        2022  | 
                        Click Here   | 
                      
21  | 
                        Server-Aided Fine-Grained Access Control Mechanism with Robust Revocation in Cloud Computing  | 
                        Cloud Computing   | 
                        2022  | 
                        Click Here   | 
                      
22  | 
                        Secure Cloud Data Deduplication with Efficient Re-encryption  | 
                        Cloud Computing   | 
                        2022  | 
                        Click Here   | 
                      
23  | 
                        A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain  | 
                        Cloud Computing   | 
                        2022  | 
                        Click Here   | 
                      
24  | 
                        A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds  | 
                        Cloud Computing   | 
                        2022  | 
                        Click Here   | 
                      
25  | 
                        Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT  | 
                        Cloud Computing   | 
                        2022  | 
                        Click Here   | 
                      
26  | 
                        Authorized Keyword Search over Outsourced Encrypted Data in Cloud Environment  | 
                        Cloud Computing   | 
                        2022  | 
                        Click Here   | 
                      
27  | 
                        Dual Access Control for Cloud-Based Data Storage and Sharing  | 
                        Cloud Computing   | 
                        2022  | 
                        Click Here   | 
                      
28  | 
                        Dual-Server Public-Key Authenticated Encryption with Keyword Search  | 
                        Cloud Computing   | 
                        2022  | 
                        Click Here   | 
                      
29  | 
                        Enabling Fast Public Auditing and Data Dynamics in Cloud Services  | 
                        Cloud Computing   | 
                        2022  | 
                        Click Here   | 
                      
30  | 
                        Fast Secure and Anonymous Key Agreement Against Bad Randomness for Cloud Computing  | 
                        Cloud Computing   | 
                        2022  | 
                        Click Here   | 
                      
31  | 
                        Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers  | 
                        Cloud Computing   | 
                        2022  | 
                        Click Here   | 
                      
32  | 
                        Practical Multi-Keyword Ranked Search With Access Control Over Encrypted Cloud Data  | 
                        Cloud Computing   | 
                        2022  | 
                        Click Here   | 
                      
33  | 
                        Publicly Verifiable Shared Dynamic Electronic Health Record Databases With Functional Commitment Supporting Privacy-Preserving Integrity Auditing  | 
                        Cloud Computing   | 
                        2022  | 
                        Click Here   | 
                      
34  | 
                        Similarity Search for Encrypted Images in Secure Cloud Computing  | 
                        Cloud Computing   | 
                        2022  | 
                        Click Here   | 
                      
35  | 
                        Auction based Resource Allocation Mechanism in Federated Cloud Environment: TARA  | 
                        Cloud Computing   | 
                        2022  | 
                        Click Here   | 
                      
36  | 
                        Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data | Cloud Computing   | 
                        2022  | 
                        Click Here   | 
                      
BLOCKCHAIN 
                            
  | 
                      ||||
1  | 
                        A Secure E-Coupon Service Based on Blockchain Systems  | 
                        Block Chain   | 
                        2022  | 
                        Click Here   | 
                      
2  | 
                        A Block chain Based System for Healthcare Digital Twin  | 
                        Block Chain   | 
                        2022  | 
                        Click Here   | 
                      
3  | 
                        Block chain technology for protecting the banking transaction without using tokens  | 
                        Block Chain   | 
                        2022  | 
                        Click Here   | 
                      
4  | 
                        Privacy-Preserving Framework for Blockchain-Based Stock Exchange Platform  | 
                        Block Chain   | 
                        2022  | 
                        Click Here   | 
                      
5  | 
                        Blockchain-Based Electronic Health Records Management: A Comprehensive Review and Future Research Direction  | 
                        Block Chain   | 
                        2022  | 
                        Click Here   | 
                      
6  | 
                        Blockchain-Based Management for Organ Donation and Transplantation  | 
                        Block Chain   | 
                        2022  | 
                        Click Here   | 
                      
7  | 
                        Blockchain-based Management of Blood Donation  | 
                        Block Chain   | 
                        2022  | 
                        Click Here   | 
                      
8  | 
                        Blockchain Technology for Secure Supply Chain Management A Comprehensive Review  | 
                        Block Chain   | 
                        2022  | 
                        Click Here   | 
                      
9  | 
                        Enabling Trust and Privacy-Preserving e-KYC System Using Blockchain  | 
                        Block Chain  | 
                        2022  | 
                        Click Here  | 
                      
10  | 
                        Decentralized Blockchain-Based Trust Management  Protocol for the Internet of Things  | 
                        Block Chain  | 
                        2022  | 
                        Click Here  | 
                      
11  | 
                        Protecting Vaccine Safety: An Improved, Blockchain-Based, Storage-Efficient Scheme  | 
                        Block Chain  | 
                        2022  | 
                        Click Here  | 
                      
12  | 
                        Blockchain as a Cyber Defense: Opportunities,  Applications, and Challenges  | 
                        Block Chain  | 
                        2022  | 
                        Click Here  | 
                      
13  | 
                        Automatic Generation of Ethereum-Based Smart Contracts for Agri-Food Traceability System  | 
                        Block Chain  | 
                        2022  | 
                        Click Here  | 
                      
14  | 
                        Towards Blockchain Based Secure Storage and Trusted Data Sharing Scheme for IoT Environment  | 
                        Block Chain  | 
                        2022  | 
                        Click Here  | 
                      
15  | 
                        Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-based IIoT Networks  | 
                        Block Chain  | 
                        2022  | 
                        Click Here  | 
                      
16  | 
                        VFChain: Enabling Verifiable and Auditable Federated Learning via Blockchain Systems  | 
                        Block Chain  | 
                        2022  | 
                        Click Here  | 
                      
17  | 
                        A Blockchain Approach to Ensuring Provenance to Outsourced Cloud Data in a Sharing Ecosystem  | 
                        Block Chain  | 
                        2022  | 
                        Click Here  | 
                      
18  | 
                        PROTECTING PERSONAL HEALTHCARE RECORD USING BLOCK CHAIN  | 
                        Block Chain  | 
                        2022  | 
                        Click Here  | 
                      
DATA  MINING   | 
                      ||||
1  | 
                        Social Media Driven Big Data Analysis for Disaster Situation Awareness: A Tutorial  | 
                        Data Mining   | 
                        2022  | 
                        Click Here   | 
                      
2  | 
                        Activity Organization for Friend-Making Optimization in Online Social Networks  | 
                        Data Mining   | 
                        2022  | 
                        Click Here   | 
                      
3  | 
                        Predicting Hot Events in the Early Period through Bayesian Model for Social Networks  | 
                        Data Mining   | 
                        2022  | 
                        Click Here   | 
                      
4  | 
                        Modeling Health Stage Development of Patients with  Dynamic Attributed Graphs in Online Health Communities  | 
                        Data Mining   | 
                        2022  | 
                        Click Here   | 
                      
5  | 
                        Principle-Based Approach for the De-Identification of Code-Mixed Electronic Health Records  | 
                        Data Mining   | 
                        2022  | 
                        Click Here   | 
                      
6  | 
                        Evaluating Public Anxiety for Topic-based Communities in Social Networks  | 
                        Data Mining   | 
                        2022  | 
                        Click Here   | 
                      
7  | 
                        Feature Selection Algorithms For Predicting Students Academic Performance Using Data Mining Techniques  | 
                        Data Mining   | 
                        2022  | 
                        Click Here   | 
                      
8  | 
                        HinCTI: A Cyber Threat Intelligence Modeling and Identification System Based on Heterogeneous Information Network  | 
                        Data Mining   | 
                        2022  | 
                        Click Here   | 
                      
9  | 
                        Item Recommendation for Word-of-Mouth Scenario in Social ECommerce  | 
                        Data Mining   | 
                        2022  | 
                        Click Here   | 
                      
10  | 
                        Modeling Product’s Visual and Functional Characteristics for Recommender Systems  | 
                        Data Mining   | 
                        2022  | 
                        Click Here   | 
                      
11  | 
                        Racism Detection by Analyzing Differential Opinions Through Sentiment Analysis of Tweets Using Stacked Ensemble GCR-NN Model  | 
                        Data Mining   | 
                        2022  | 
                        Click Here   | 
                      
12  | 
                        Rating Prediction With Review Network Feedback: A New Direction in Recommendation  | 
                        Data Mining   | 
                        2022  | 
                        Click Here   | 
                      
13  | 
                        Exploring E-Commerce Product Experience Based on Fusion Sentiment Analysis Method  | 
                        Data Mining   | 
                        2022  | 
                        Click Here   | 
                      
14  | 
                        User Identity Linkage via Co-Attentive Neural Network from Heterogeneous Mobility Data  | 
                        Data Mining   | 
                        2022  | 
                        Click Here   | 
                      
 CYBERNETICS  | 
                      ||||
1  | 
                        Trustworthiness Assessment of Users in Social Reviewing Systems  | 
                        Cybernetics  | 
                        2022  | 
                        Click Here   | 
                      
2  | 
                        A Learning-Based POI Recommendation With Spatiotemporal  Context Awareness  | 
                        Cybernetics  | 
                        2022  | 
                        Click Here   | 
                      
3  | 
                        False-Data-Injection Attacks on Remote Distributed  Consensus Estimation  | 
                        Cybernetics  | 
                        2022  | 
                        Click Here   | 
                      
 SOCIAL  NETWORKS & NETWORKS 
                           | 
                      ||||
1  | 
                        The Effect of Social Media User Behaviors on Security and Privacy Threats  | 
                        Social Networks   | 
                        2022  | 
                        Click Here   | 
                      
2  | 
                        A Taxonomy of Fake News Classification Techniques: Survey and Implementation Aspects  | 
                        Social Networks   | 
                        2022  | 
                        Click Here   | 
                      
3  | 
                        The Social Media Break-Up: Psycho-Behavioral Measures  and Implications  | 
                        Social Networks   | 
                        2022  | 
                        Click Here   | 
                      
4  | 
                        Composite Behavioral Modeling for Identity Theft  Detection in Online Social Networks  | 
                        Social Networks   | 
                        2022  | 
                        Click Here   | 
                      
5  | 
                        Social Spammer Detection via Convex Nonnegative Matrix  Factorization  | 
                        Social Networks   | 
                        2022  | 
                        Click Here   | 
                      
6  | 
                        Social Engineering Attacks Prevention: A Systematic  Literature Review  | 
                        Social Networks   | 
                        2022  | 
                        Click Here   | 
                      
7  | 
                        Cross-Platform Reputation Generation System Based on  Aspect-Based Sentiment Analysis  | 
                        Social Networks   | 
                        2022  | 
                        Click Here   | 
                      
8  | 
                        PredicTour: Predicting Mobility Patterns of Tourists  Based on Social Media User's Profiles  | 
                        Social Networks   | 
                        2022  | 
                        Click Here   | 
                      
9  | 
                        DEA-RNN: A Hybrid Deep Learning Approach for  Cyberbullying Detection in Twitter Social Media Platform  | 
                        Social Networks   | 
                        2022  | 
                        Click Here   | 
                      
10  | 
                        FADOHS: Framework for Detection and Integration of  Unstructured Data of Hate Speech on Facebook Using Sentiment and Emotion  Analysis  | 
                        Social Networks   | 
                        2022  | 
                        Click Here   | 
                      
11  | 
                        Toward Data Justice Understanding Police Shooting Data  Systems and Narratives  | 
                        Social Networks   | 
                        2022  | 
                        Click Here   | 
                      
12  | 
                        Intelligent Distribution of Fresh Agricultural  Products in Smart City  | 
                        Social Networks   | 
                        2022  | 
                        Click Here   | 
                      
13  | 
                        Influence Based Defense Against Data Poisoning Attacks  in Online Learning  | 
                        Social Networks   | 
                        2022  | 
                        Click Here   | 
                      
14  | 
                        DetectDUI: An In-Car Detection System for Drink  Driving and BACs  | 
                        Social Networks   | 
                        2022  | 
                        Click Here   | 
                      
 DEPENDABLE AND SECURE  COMPUTING  | 
                      ||||
1  | 
                        Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack  | 
                        Secure Computing   | 
                        2022  | 
                        Click Here   | 
                      
2  | 
                        One Parameter Defense - Defending against Data Inference Attacks via Differential Privacy   | 
                        Secure Computing   | 
                        2022  | 
                        Click Here   | 
                      
3  | 
                        An Explainable Multi-Modal Hierarchical Attention Model for Developing Phishing Threat Intelligence  | 
                        Secure Computing   | 
                        2022  | 
                        Click Here   | 
                      
4  | 
                        Blockchain-based Certificate Transparency and Revocation Transparency  | 
                        Secure Computing   | 
                        2022  | 
                        Click Here   | 
                      
5  | 
                        CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments  | 
                        Secure Computing   | 
                        2022  | 
                        Click Here   | 
                      
6  | 
                        Cyber security Awareness in Online Education: A Case Study Analysis  | 
                        Secure Computing   | 
                        2022  | 
                        Click Here   | 
                      
7  | 
                        Detecting Sybil Attacks using Proofs of Work and Location in VANETs  | 
                        Secure Computing   | 
                        2022  | 
                        Click Here   | 
                      
8  | 
                        Representing Fine-Grained Co-Occurrences for Behavior-Based Fraud Detection in Online Payment Services  | 
                        Secure Computing   | 
                        2022  | 
                        Click Here   | 
                      
9  | 
                        Efficient Certificateless Multi-Copy Integrity Auditing Scheme Supporting Data Dynamics   | 
                        Secure Computing   | 
                        2022  | 
                        Click Here   | 
                      
10  | 
                        Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme with Enhanced Security Provision  | 
                        Secure Computing   | 
                        2022  | 
                        Click Here   | 
                      
11  | 
                        EntrapNet: a Blockchain-Based Verification Protocol for Trustless Computing  | 
                        Secure Computing   | 
                        2022  | 
                        Click Here   | 
                      
12  | 
                        Trust But Verify: a framework for the trustworthiness of distributed systems  | 
                        Secure Computing   | 
                        2022  | 
                        Click Here   | 
                      
13  | 
                        Lightweight and Certificateless Multi-Receiver Secure  Data Transmission Protocol for Wireless Body Area Networks  | 
                        Secure Computing   | 
                        2022  | 
                        Click Here   | 
                      
14  | 
                        Achieve Efficient and Privacy-preserving Disease Risk  Assessment over Multi-outsourced Vertical Datasets  | 
                        Secure Computing   | 
                        2022  | 
                        Click Here   | 
                      
15  | 
                        Quantum-Safe Round-Optimal Password Authentication for  Mobile Devices  | 
                        Secure Computing   | 
                        2022  | 
                        Click Here   | 
                      
16  | 
                        A Real Time Firewall Policy Rule Set Anomaly Free  Mechanism  | 
                        Secure Computing   | 
                        2022  | 
                        Click Here   | 
                      
17  | 
                        SC-TRUST: A Dynamic Model for Trustworthy Service  Composition in the Internet of Things  | 
                        Secure Computing   | 
                        2022  | 
                        Click Here   | 
                      
18  | 
                        SCA: Sybil-based Collusion Attacks of IIoT Data  Poisoning in Federated Learning  | 
                        Secure Computing   | 
                        2022  | 
                        Click Here   | 
                      
 MOBILE  COMPUTING 
                          
                          
  | 
                      ||||
1  | 
                        Trust Based Incentive Scheme to Allocate Big Data  Tasks with Mobile Social Cloud  | 
                        Mobile Computing   | 
                        2022  | 
                        Click Here   | 
                      
2  | 
                        Eclipse: Preserving Differential Location Privacy  Against Long-Term Observation Attacks  | 
                        Mobile Computing  | 
                        2022  | 
                        Click Here   | 
                      
3  | 
                        Towards Personalized Privacy-Preserving Incentive for  Truth Discovery in Mobile Crowd sensing Systems  | 
                        Mobile Computing  | 
                        2022  | 
                        Click Here   | 
                      
4  | 
                        Secure Mobile Edge Computing Networks in the Presence  of Multiple Eavesdroppers  | 
                        Mobile Computing  | 
                        2022  | 
                        Click Here   | 
                      
5  | 
                        Membership Inference Attack and Defense for Wireless  Signal Classifiers with Deep Learning  | 
                        Mobile Computing  | 
                        2022  | 
                        Click Here   | 
                      
IMAGE  PROCESSING  | 
                      ||||
1  | 
                        Show, Price and Negotiate A Negotiator With Online  Value Look-Ahead  | 
                        Image Processing   | 
                        2022  | 
                        Click Here   | 
                      
2  | 
                        Multi-modal Meta Multi-Task Learning for Social Media  Rumor Detection  | 
                        Image Processing   | 
                        2022  | 
                        Click Here   | 
                      
3  | 
                        Asymmetric Hash Code Learning for Remote Sensing Image  Retrieval  | 
                        Image Processing   | 
                        2022  | 
                        Click Here   | 
                      
4  | 
                        Scalable Distributed Hashing for Approximate Nearest  Neighbor Search  | 
                        Image Processing   | 
                        2022  | 
                        Click Here   | 
                      
5  | 
                        SAC: Semantic Attention Composition for Text-Conditioned  Image Retrieval  | 
                        Image Processing   | 
                        2022  | 
                        Click Here   | 
                      
6  | 
                        Global-Aware Ranking Deep Metric Learning for Remote  Sensing Image Retrieval  | 
                        Image Processing   | 
                        2022  | 
                        Click Here   | 
                      
7  | 
                        Hash Learning with Variable Quantization for  Large-scale Retrieval  | 
                        Image Processing   | 
                        2022  | 
                        Click Here   | 
                      
Live 2021 and 2022 JAVA IEEE Projects List --- Download
| Live Demo is available on youtube.You can click on demo link and can download the video for further reference and send your title name to the following email id to get base paper and Abstract.Please mention your degree and other requirements also.. | ||||
Cloud Computing   | 
                      ||||
Sl.No  | 
                        Project Title Name   | 
                        Domain  | 
                        Year  | 
                        Demo  | 
                      
1  | 
                        Pocket Diagnosis: Secure Federated Learning against  Poisoning Attack in the Cloud  | 
                        Cloud Computing   | 
                        2021  | 
                        Click Here   | 
                      
2  | 
                        Detecting Suspicious File Migration or Replication in  the Cloud  | 
                        Cloud Computing   | 
                        2021  | 
                        Click Here   | 
                      
3  | 
                        CryptCloud+: Secure and Expressive Data Access Control  for Cloud Storage  | 
                        Cloud Computing   | 
                        2021  | 
                        Click Here   | 
                      
4  | 
                        Attacking and Protecting Data Privacy in Edge-Cloud  Collaborative Inference Systems  | 
                        Cloud Computing   | 
                        2021  | 
                        Click Here   | 
                      
5  | 
                        A Verifiable Semantic Searching Scheme by Optimal Matching  over Encrypted Data in Public Cloud  | 
                        Cloud Computing   | 
                        2021  | 
                        Click Here   | 
                      
6  | 
                        An Efficient Ciphertext Index Retrieval Scheme based  on Edge Computing Framework  | 
                        Cloud Computing   | 
                        2021  | 
                        Click Here   | 
                      
7  | 
                        Efficient Revocable Multi-Authority Attribute-Based  Encryption for Cloud Storage  | 
                        Cloud Computing   | 
                        2021  | 
                        Click Here   | 
                      
8  | 
                        Enabling Reliable Keyword Search in Encrypted  Decentralized Storage with Fairness  | 
                        Cloud Computing   | 
                        2021  | 
                        Click Here   | 
                      
9  | 
                        A Fast Nearest Neighbor Search Scheme over Outsourced  Encrypted Medical Images  | 
                        Cloud Computing   | 
                        2021  | 
                        Click Here   | 
                      
10  | 
                        A Proxy Re-Encryption Approach to Secure Data Sharing  in the Internet of Things Based on Blockchain  | 
                        Cloud Computing   | 
                        2020  | 
                        Click Here   | 
                      
11  | 
                        Certificateless public integrity checking of group  shared data on cloud storage  | 
                        Cloud Computing   | 
                        2021  | 
                        Click Here   | 
                      
12  | 
                        Efficient Identity-Based Distributed Decryption Scheme  for Electronic Personal Health Record Sharing System  | 
                        Cloud Computing   | 
                        2021  | 
                        Click Here   | 
                      
13  | 
                        Multi authority Attribute Based Keyword Search over  Encrypted Cloud Data  | 
                        Cloud Computing   | 
                        2021  | 
                        Click Here   | 
                      
14  | 
                        PPCSA A Privacy Preserving Cloud Storage Auditing  Scheme for Data Sharing  | 
                        Cloud Computing   | 
                        2021  | 
                        Click Here   | 
                      
15  | 
                        RACE Resource Aware Cost-Efficient Scheduler for Cloud  Fog Environment  | 
                        Cloud Computing   | 
                        2021  | 
                        Click Here   | 
                      
16  | 
                        Enabling Secure and Space-Efficient Metadata Management  in Encrypted Deduplication  | 
                        Cloud Computing   | 
                        2021  | 
                        Click Here   | 
                      
17  | 
                        Privacy-Preserving Media Sharing with Scalable Access  Control and Secure Deduplication in Mobile Cloud Computing  | 
                        Cloud Computing   | 
                        2021  | 
                        Click Here   | 
                      
18  | 
                        Efficient Auditing Scheme for Secure Data Storage in  Fog-to-Cloud Computing  | 
                        Cloud Computing   | 
                        2021  | 
                        Click Here   | 
                      
19  | 
                        A Statistical Inference Attack on Privacy-Preserving  Biometric Identification Scheme  | 
                        Cloud Computing   | 
                        2021  | 
                        Click Here   | 
                      
20  | 
                        A New Service Mechanism for Profit Optimizations of a  Cloud Provider and Its Users  | 
                        Cloud Computing   | 
                        2021  | 
                        Click Here   | 
                      
21  | 
                        Accountable Proxy Re-Encryption for Secure Data  Sharing  | 
                        Cloud Computing   | 
                        2021  | 
                        Click Here   | 
                      
22  | 
                        Achieving secure, universal, and fine-grained query  results verification for secure search scheme over encrypted cloud data  | 
                        Cloud Computing   | 
                        2021  | 
                        Click Here   | 
                      
23  | 
                        Crypt-DAC: Cryptographically Enforced Dynamic Access  Control in the Cloud  | 
                        Cloud Computing   | 
                        2021  | 
                        Click Here   | 
                      
24  | 
                        Design of Secure Authenticated Key Management Protocol  for Cloud Computing Environments  | 
                        Cloud Computing   | 
                        2021  | 
                        Click Here   | 
                      
25  | 
                        Dual Access Control for Cloud-Based Data Storage and  Sharing  | 
                        Cloud Computing   | 
                        2021  | 
                        Click Here   | 
                      
26  | 
                        Inference Attack-Resistant E-Healthcare Cloud System  with Fine-Grained Access Control  | 
                        Cloud Computing   | 
                        2021  | 
                        Click Here   | 
                      
27  | 
                        Multi-Authority Attribute-Based Keyword Search over  Encrypted Cloud Data           Cloud  Computing  | 
                        Cloud Computing   | 
                        2021  | 
                        Click Here   | 
                      
28  | 
                        Practical Multi keyword Ranked Search with Access  Control over Encrypted Cloud Data  | 
                        Cloud Computing   | 
                        2021  | 
                        Click Here   | 
                      
29  | 
                        Privacy Preserving Searchable Encryption with  Fine-grained Access Control  | 
                        Cloud Computing   | 
                        2021  | 
                        Click Here   | 
                      
30  | 
                        Dynamic Group-Oriented Provable Data Possession in the  Cloud  | 
                        Cloud Computing   | 
                        2021  | 
                        Click Here   | 
                      
31  | 
                        Publicly Verifiable Shared Dynamic Electronic Health  Record Databases with Functional Commitment Supporting Privacy-Preserving  Integrity Auditing  | 
                        Cloud Computing   | 
                        2021  | 
                        Click Here   | 
                      
32  | 
                        Secure Fine-Grained Encrypted Keyword Search for  E-Healthcare Cloud  | 
                        Cloud Computing   | 
                        2021  | 
                        Click Here   | 
                      
33  | 
                        SEPDP: Secure and Efficient Privacy Preserving  Provable Data Possession in Cloud Storage  | 
                        Cloud Computing   | 
                        2021  | 
                        Click Here   | 
                      
34  | 
                        SeSPHR: A Methodology for Secure Sharing of Personal  Health Records in the Cloud  | 
                        Cloud Computing   | 
                        2021  | 
                        Click Here   | 
                      
35  | 
                        Towards Achieving Keyword Search over Dynamic  Encrypted Cloud Data with Symmetric-Key Based Verification  | 
                        Cloud Computing   | 
                        2021  | 
                        Click Here   | 
                      
| 36 | A Fine-Grained and Lightweight Data Access Control Model for Mobile Cloud Computing | Cloud Computing   | 
                        2021  | 
                        Click Here   | 
                      
BLOCKCHAIN 
                            
  | 
                      ||||
1  | 
                        A Blockchain based Autonomous Decentralized Online  Social Network  | 
                        Block Chain   | 
                        2021  | 
                        Click Here   | 
                      
2  | 
                        A Blockchain-based Approach for Drug Traceability in  Healthcare Supply Chain  | 
                        Block Chain   | 
                        2021  | 
                        Click Here   | 
                      
3  | 
                        A Trusted Blockchain-Based Traceability System for  Fruit and Vegetable Agricultural Products  | 
                        Block Chain   | 
                        2021  | 
                        Click Here   | 
                      
4  | 
                        Blockchain Assisted Collaborative Service  Recommendation Scheme With Data Sharing  | 
                        Block Chain   | 
                        2021  | 
                        Click Here   | 
                      
5  | 
                        Blockchain Based Accounts Payable Platform for Goods  Trade  | 
                        Block Chain   | 
                        2021  | 
                        Click Here   | 
                      
6  | 
                        Blockchain-based Decentralized Authentication Modeling  Scheme in Edge and IoT Environment  | 
                        Block Chain   | 
                        2021  | 
                        Click Here   | 
                      
8  | 
                        Fortified Chain A Blockchain Based Framework for  Security and Privacy Assured Internet of Medical Things  | 
                        Block Chain   | 
                        2021  | 
                        Click Here   | 
                      
INTERNET  OF THINGS(IOT)  | 
                      ||||
1  | 
                        Fast Containment of Infectious Diseases with  E-healthcare Mobile Social Internet of Things  | 
                        IOT   | 
                        2021  | 
                        Click Here   | 
                      
2  | 
                        SBBS A Secure Blockchain-Based Scheme for IoT Data  Credibility in Fog Environment  | 
                        IOT   | 
                        2021  | 
                        Click Here   | 
                      
3  | 
                        Social Interaction and Information Diffusion in Social  Internet of Things Dynamics Cloud Edge Traceability  | 
                        IOT   | 
                        2021  | 
                        Click Here   | 
                      
4  | 
                        Trustworthy Digital Twins in the Industrial Internet  of Things with Blockchain  | 
                        IOT   | 
                        2021  | 
                        Click Here   | 
                      
5  | 
                        A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Block chain  | 
                        IOT   | 
                        2021  | 
                        Click Here   | 
                      
6  | 
                        Dynamic Resource Allocation and Computation Offloading  for IoT Fog Computing System  | 
                        IOT   | 
                        2021  | 
                        Click Here   | 
                      
7  | 
                        Secure ABE Scheme for Access Management in  Blockchain-Based IoT  | 
                        IOT   | 
                        2021  | 
                        Click Here   | 
                      
8  | 
                        Timely Detection and Mitigation of Stealthy DDoS  Attacks via IoT Networks  | 
                        IOT   | 
                        2021  | 
                        Click Here   | 
                      
9  | 
                        Towards Fine-Grained Access Control in  Enterprise-Scale Internet-of-Things  | 
                        IOT   | 
                        2021  | 
                        Click Here   | 
                      
10  | 
                        Toward Detection and Attribution of Cyber-Attacks in  IoT-enabled Cyber-physical Systems  | 
                        IOT   | 
                        2021  | 
                        Click Here   | 
                      
DATA  MINING   | 
                      ||||
1  | 
                        Mining Fraudsters and Fraudulent Strategies in  Large-Scale Mobile Social  | 
                        Data Mining   | 
                        2021  | 
                        Click Here   | 
                      
2  | 
                        Method for Ranking the Helpfulness of Online Reviews  Based on SO-ILES TODIM  | 
                        Data Mining   | 
                        2021  | 
                        Click Here   | 
                      
3  | 
                        Leveraging Affective Hashtags for Ranking Music  Recommendations  | 
                        Data Mining   | 
                        2021  | 
                        Click Here   | 
                      
4  | 
                        Personality aware Product Recommendation System based  on User Interests Mining and Meta path Discovery  | 
                        Data Mining   | 
                        2021  | 
                        Click Here   | 
                      
5  | 
                        Suicidal Ideation Detection: A Review of Machine Learning Methods and Applications  | 
                        Data Mining   | 
                        2021  | 
                        Click Here   | 
                      
6  | 
                        “What Do Your Friends Think” Efficient Polling Methods for Networks Using Friendship Paradox  | 
                        Data Mining   | 
                        2021  | 
                        Click Here   | 
                      
7  | 
                        Discovering Hidden Topical Hubs and Authorities Across Multiple Online Social Networks  | 
                        Data Mining   | 
                        2021  | 
                        Click Here   | 
                      
8  | 
                        Improvising Personalized Travel Recommendation System  with Recency Effects  | 
                        Data Mining   | 
                        2021  | 
                        Click Here   | 
                      
9  | 
                        Modeling Influence Diffusion over Signed Social  Networks  | 
                        Data Mining   | 
                        2021  | 
                        Click Here   | 
                      
10  | 
                        Popularity Prediction for Single Tweet based on Heterogeneous Bass Model  | 
                        Data Mining   | 
                        2021  | 
                        Click Here   | 
                      
11  | 
                        Query Expansion with Local Conceptual Word Embeddings  in Microblog Retrieval  | 
                        Data Mining   | 
                        2021  | 
                        Click Here   | 
                      
12  | 
                        Sentiment Polarity Classification at EVALITA: Lessons  Learned and Open Challenges  | 
                        Data Mining   | 
                        2021  | 
                        Click Here   | 
                      
13  | 
                        Robust Detection of  Link Communities With Summary Description in Social Networks  | 
                        Data Mining   | 
                        2021  | 
                        Click Here   | 
                      
14  | 
                        Rumor Source  Detection With Multiple Observations Under Adaptive Diffusions  | 
                        Data Mining   | 
                        2021  | 
                        Click Here   | 
                      
15  | 
                        User-Driven  Geolocated Event Detection in Social Media  | 
                        Data Mining   | 
                        2021  | 
                        Click Here   | 
                      
 BIG  DATA  | 
                      ||||
1  | 
                        Hybrid Recommender System for Tourism Based on Big  Data and AI A Conceptual Framework  | 
                        Bigdata   | 
                        2021  | 
                        Click Here   | 
                      
2  | 
                        A Searchable and Verifiable Data Protection Scheme for  Scholarly Big Data  | 
                        Bigdata   | 
                        2021  | 
                        Click Here   | 
                      
 SOCIAL  NETWORKS & NETWORKS 
                           | 
                      ||||
1  | 
                        Sentiment Analysis of Lockdown in India During COVID19  A Case Study  | 
                        Social Networks   | 
                        2021  | 
                        Click Here   | 
                      
2  | 
                        Detecting Mental Disorders in Social Media Through  Emotional Patterns The case of Anorexia and Depression  | 
                        Social Networks   | 
                        2021  | 
                        Click Here   | 
                      
3  | 
                        Dynamic Control of Fraud Information Spreading in  Mobile Social Networks  | 
                        Social Networks   | 
                        2021  | 
                        Click Here   | 
                      
4  | 
                        Load Photo A Novel Analysis Method for Load Data | Social Networks   | 
                        2021  | 
                        Click Here   | 
                      
5  | 
                        Public Opinion Analysis on Novel Coronavirus Pneumonia and Interaction With Event Evolution in Real World  | 
                        Social Networks   | 
                        2021  | 
                        Click Here   | 
                      
6  | 
                        Trust Assessment in Online  Social Networks  | 
                        Social Networks   | 
                        2021  | 
                        Click Here   | 
                      
7  | 
                        Trace Me If You Can  An Unlinkability Approach for Privacy-Preserving in Social Networks  | 
                        Social Networks   | 
                        2021  | 
                        Click Here   | 
                      
8  | 
                        Leveraging Social Network Analysis for Characterizing Cohesion of Human-Managed Animals  | 
                        Social Networks   | 
                        2021  | 
                        Click Here   | 
                      
9  | 
                        Privacy-Preserving  Media Sharing with Scalable Access Control and Secure De duplication in Mobile  Cloud Computing  | 
                        Social Networks   | 
                        2021  | 
                        Click Here   | 
                      
10  | 
                        Social Recommendation  With Learning Personal and Social Latent Factors  | 
                        Social Networks   | 
                        2021  | 
                        Click Here   | 
                      
 SECURE  COMPUTING  | 
                      ||||
1  | 
                        oGBAC A Group Based Access Control Framework for Information Sharing in Online Social Networks  | 
                        Secure Computing   | 
                        2021  | 
                        Click Here   | 
                      
2  | 
                        Privacy Preserving Electronic Ticket Scheme with  Attribute based Credentials  | 
                        Secure Computing   | 
                        2021  | 
                        Click Here   | 
                      
3  | 
                        Fraud Detection in Online Product Review Systems via  Heterogeneous Graph Transformer  | 
                        Secure Computing   | 
                        2021  | 
                        Click Here   | 
                      
4  | 
                        Protecting Your Shopping Preference with Differential  Privacy  | 
                        Secure Computing   | 
                        2021  | 
                        Click Here   | 
                      
5  | 
                        Sensitive Label Privacy Preservation with  Anatomization for Data Publishing  | 
                        Secure Computing   | 
                        2021  | 
                        Click Here   | 
                      
6  | 
                        BullyNet: Unmasking Cyberbullies on Social Networks  | 
                        Secure Computing   | 
                        2021  | 
                        Click Here   | 
                      
7  | 
                        Quantifying Membership Privacy via Information Leakage  | 
                        Secure Computing   | 
                        2021  | 
                        Click Here   | 
                      
8  | 
                        Privacy Preserving Location-Aware Personalized Web  Service Recommendations  | 
                        Secure Computing   | 
                        2021  | 
                        Click Here   | 
                      
SOFTWARE ENGINEERING,SERVICE COMPUTING  | 
                      ||||
1  | 
                        Crisis-Critical  Intellectual Property Findings From the COVID-19 Pandemic  | 
                        Software Engineering   | 
                        2021  | 
                        Click Here   | 
                      
 MOBILE  COMPUTING 
                          
                          
  | 
                      ||||
1  | 
                        Privacy Preserving Media Sharing with Scalable Access  Control and Secure Deduplication in Mobile Cloud Computing  | 
                        Mobile Computing   | 
                        2021  | 
                        Click Here   | 
                      
2  | 
                        PROTECT Efficient Password-Based Threshold  Single-Sign-On Authentication for Mobile Users against Perpetual Leakage  | 
                        Vehicular Technology  | 
                        2021  | 
                        Click Here   | 
                      
IMAGE  PROCESSING  | 
                      ||||
1  | 
                        Load Photo A Novel Analysis Method for Load Data  | 
                        Image Processing   | 
                        2021  | 
                        Click Here   | 
                      
Live 2020 and 2021 JAVA IEEE Projects List --- Download
| Live Demo is available on youtube.You can click on demo link and can download the video for further reference and send your title name to the following email id to get base paper and Abstract.Please mention your degree and other requirements also.. | ||||
Cloud Computing   | 
                        ||||
Sl.No  | 
                          Project Title Name   | 
                          Domain  | 
                          Year  | 
                          Demo  | 
                        
1  | 
                          A Verifiable Semantic  Searching Scheme by Optimal Matching over Encrypted Data in Public Cloud  | 
                          Cloud Computing   | 
                          2020  | 
                          Click Here   | 
                        
2  | 
                          Achieving Practical Symmetric  Searchable Encryption with Search Pattern Privacy over Cloud  | 
                          Cloud Computing   | 
                          2020  | 
                          Click Here   | 
                        
3  | 
                          Achieving Searchable  Encryption Scheme with Search Pattern Hidden  | 
                          Cloud Computing   | 
                          2020  | 
                          Click Here   | 
                        
4  | 
                          Authentication and  Key Agreement Based on Anonymous Identity for Peer-to-Peer Cloud  | 
                          Cloud Computing   | 
                          2020  | 
                          Click Here   | 
                        
5  | 
                          CloudRaid Detecting  Distributed Concurrency Bugs via Log-Mining and Enhancement  | 
                          Cloud Computing   | 
                          2020  | 
                          Click Here   | 
                        
6  | 
                          Designing Secure and  Efficient Biometric-Based Secure Access Mechanism for Cloud Services  | 
                          Cloud Computing   | 
                          2020  | 
                          Click Here   | 
                        
7  | 
                          Lightweight  Privacy-preserving Medical Diagnosis in Edge Computing  | 
                          Cloud Computing   | 
                          2020  | 
                          Click Here   | 
                        
8  | 
                          Personality and  Value-aware Scheduling of User Requests in Cloud for Profit Maximization  | 
                          Cloud Computing   | 
                          2020  | 
                          Click Here   | 
                        
9  | 
                          Privacy-preserving  Efficient Verifiable Deep Packet Inspection for Cloud-assisted Middlebox  | 
                          Cloud Computing   | 
                          2020  | 
                          Click Here   | 
                        
10  | 
                          Privacy-preserving  Medical Treatment System through Nondeterministic Finite Automata  | 
                          Cloud Computing   | 
                          2020  | 
                          Click Here   | 
                        
11  | 
                          Privacy-Preserving  Outsourced Inner Product Computation on Encrypted Database  | 
                          Cloud Computing   | 
                          2020  | 
                          Click Here   | 
                        
12  | 
                          Proactive  Fault-Tolerance Technique to Enhance Reliability of Cloud Service in Cloud  Federation Environment  | 
                          Cloud Computing   | 
                          2020  | 
                          Click Here   | 
                        
13  | 
                          Publicly Verifiable  Shared Dynamic Electronic Health Record Databases  | 
                          Cloud Computing   | 
                          2020  | 
                          Click Here   | 
                        
14  | 
                          Revocable  Attribute-based Data Storage in Mobile Clouds  | 
                          Cloud Computing   | 
                          2020  | 
                          Click Here   | 
                        
15  | 
                          Scalable Discovery of  Hybrid Process Models in a Cloud Computing Environment  | 
                          Cloud Computing   | 
                          2020  | 
                          Click Here   | 
                        
16  | 
                          Secure Cloud Storage  with Data Dynamics Using Secure Network Coding Techniques  | 
                          Cloud Computing   | 
                          2020  | 
                          Click Here   | 
                        
17  | 
                          Secure Keyword Search  and Data Sharing Mechanism for Cloud Computing  | 
                          Cloud Computing   | 
                          2020  | 
                          Click Here   | 
                        
18  | 
                          Secure Similarity  Search over Encrypted Non-Uniform Datasets  | 
                          Cloud Computing   | 
                          2020  | 
                          Click Here   | 
                        
19  | 
                          Secure Storage  Auditing with Efficient Key Updates for Cognitive Industrial IoT Environment  | 
                          Cloud Computing   | 
                          2020  | 
                          Click Here   | 
                        
20  | 
                          Semantics of Data  Mining Services in Cloud Computing  | 
                          Cloud Computing   | 
                          2020  | 
                          Click Here   | 
                        
21  | 
                          Similarity Search for  Encrypted Images in Secure Cloud Computing  | 
                          Cloud Computing   | 
                          2020  | 
                          Click Here   | 
                        
22  | 
                          Tag-based Verifiable  Delegated Set Intersection over Outsourced Private Datasets  | 
                          Cloud Computing   | 
                          2020  | 
                          Click Here   | 
                        
23  | 
                          Threshold Multi-keyword Search for Cloud-Based Group Data Sharing  | 
                          Cloud Computing   | 
                          2020  | 
                          Click Here   | 
                        
24  | 
                          Towards Secure and  Efficient Equality Conjunction Search over Outsourced Databases  | 
                          Cloud Computing   | 
                          2020  | 
                          Click Here   | 
                        
25  | 
                          Verifiable Searchable  Encryption Framework against Insider Keyword-Guessing Attack in Cloud Storage  | 
                          Cloud Computing   | 
                          2020  | 
                          Click Here   | 
                        
26  | 
                          A Secure Enhanced Key-Policy Attribute-Based Temporary Keyword Search Scheme in the Cloud  | 
                          Cloud Computing   | 
                          2020  | 
                          Click Here   | 
                        
27  | 
                          Development and Examination of Fog Computing-Based Encrypted Control System.  | 
                          Cloud Computing   | 
                          2020  | 
                          Click Here   | 
                        
28  | 
                          A Novel Feature Matching Ranked Search Mechanism Over Encrypted Cloud Data  | 
                          Cloud Computing   | 
                          2020  | 
                          Click Here   | 
                        
29  | 
                          A Secure and Efficient Cloud-Centric Internet of Medical Things-Enabled Smart Healthcare System with Public Verifiability  | 
                          Cloud Computing   | 
                          2020  | 
                          Click Here   | 
                        
30  | 
                          Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography  | 
                          Cloud Computing   | 
                          2020  | 
                          Click Here   | 
                        
31  | 
                          Key Policy Attribute-Based Encryption with Keyword Search in Virtualized Environments  | 
                          Cloud Computing   | 
                          2020  | 
                          Click Here   | 
                        
32  | 
                          Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud.  | 
                          Cloud Computing   | 
                          2020  | 
                          Click Here   | 
                        
33  | 
                          Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud Computing.  | 
                          Cloud Computing   | 
                          2020  | 
                          Click Here   | 
                        
34  | 
                          Key-Escrow Free Attribute-Based Multi-Keyword Search with Dynamic Policy Update in Cloud Computing.  | 
                          Cloud Computing   | 
                          2020  | 
                          Click Here   | 
                        
35  | 
                          Fast Secure and Anonymous Key Agreement Against Bad Randomness for Cloud Computing.  | 
                          Cloud Computing   | 
                          2020  | 
                          Click Here   | 
                        
 DATA MINING 
                            
  | 
                        ||||
1  | 
                          A Hidden Markov  Contour Tree Model for Spatial Structured Prediction  | 
                          Data Mining   | 
                          2020  | 
                          Click Here   | 
                        
2  | 
                          Achieving Practical  Symmetric Searchable Encryption with Search Pattern Privacy over Cloud  | 
                          Data Mining  | 
                          2020  | 
                          Click Here  | 
                        
3  | 
                          Achieving Secure and  Dynamic Range Queries Over Encrypted Cloud Data  | 
                          Data Mining  | 
                          2020  | 
                          Click Here  | 
                        
4  | 
                          Adaptive Diffusion of  Sensitive Information In Online Social Networks  | 
                          Data Mining  | 
                          2020  | 
                          Click Here  | 
                        
5  | 
                          Adaptive Similarity Embedding For Unsupervised Multi-View Feature Selection  | 
                          Data Mining  | 
                          2020  | 
                          Click Here  | 
                        
6  | 
                          Adaptively Secure and  Fast Processing of Conjunctive Queries over Encrypted Data  | 
                          Data Mining  | 
                          2020  | 
                          Click Here  | 
                        
7  | 
                          BATCH A Scalable  Asymmetric Discrete Cross-Modal Hashing  | 
                          Data Mining  | 
                          2020  | 
                          Click Here  | 
                        
8  | 
                          Cashless Society  Managing Privacy and Security in the Technological Age  | 
                          Data Mining  | 
                          2020  | 
                          Click Here  | 
                        
9  | 
                          DGDFS Dependence  Guided Discriminative Feature Selection for Predicting Adverse Drug-Drug  Interaction  | 
                          Data Mining  | 
                          2020  | 
                          Click Here  | 
                        
10  | 
                          Discovering Temporal  Patterns for Event Sequence Clustering via Policy Mixture Model  | 
                          Data Mining  | 
                          2020  | 
                          Click Here  | 
                        
11  | 
                          Effective Keyword  Search over Weighted Graphs  | 
                          Data Mining  | 
                          2020  | 
                          Click Here  | 
                        
12  | 
                          Efficient Match-Based  Candidate Network Generation for Keyword Queries over Relational Databases  | 
                          Data Mining  | 
                          2020  | 
                          Click Here  | 
                        
13  | 
                          Efficient Processing  of Group Planning Queries Over Spatial-Social Networks  | 
                          Data Mining  | 
                          2020  | 
                          Click Here  | 
                        
14  | 
                          Efficiently  Processing Spatial and Keyword Queries in Indoor Venues  | 
                          Data Mining  | 
                          2020  | 
                          Click Here  | 
                        
15  | 
                          Evaluating Public  Anxiety for Topic-based Communities in Social Networks  | 
                          Data Mining  | 
                          2020  | 
                          Click Here  | 
                        
16  | 
                          Fast Multi-view  Semi-supervised Learning with Learned Graph  | 
                          Data Mining  | 
                          2020  | 
                          Click Here  | 
                        
17  | 
                          Fuzzy K-Means  Clustering With Discriminative Embedding  | 
                          Data Mining  | 
                          2020  | 
                          Click Here  | 
                        
18  | 
                          Guarantee the  Quality-of-Service of Control Transactions in Real-Time Database Systems  | 
                          Data Mining  | 
                          2020  | 
                          Click Here  | 
                        
19  | 
                          Hierarchical  Prediction and Adversarial Learning For Conditional Response Generation  | 
                          Data Mining  | 
                          2020  | 
                          Click Here  | 
                        
20  | 
                          Land Use  Classification with Point of Interests and Structural Patterns  | 
                          Data Mining  | 
                          2020  | 
                          Click Here  | 
                        
21  | 
                          Modeling Relation  Paths for Knowledge Graph Completion  | 
                          Data Mining  | 
                          2020  | 
                          Click Here  | 
                        
22  | 
                          Multi-view Clustering  with the Cooperation of Visible and Hidden Views  | 
                          Data Mining  | 
                          2020  | 
                          Click Here  | 
                        
23  | 
                          Online Pricing with Reserve  Price Constraint for Personal Data Markets  | 
                          Data Mining  | 
                          2020  | 
                          Click Here  | 
                        
24  | 
                          Personalized Long and  Short term Preference Learning for Next POI Recommendation  | 
                          Data Mining  | 
                          2020  | 
                          Click Here  | 
                        
25  | 
                          Predicting Hot Events  in the Early Period through Bayesian Model for Social Networks  | 
                          Data Mining  | 
                          2020  | 
                          Click Here  | 
                        
26  | 
                          Predicting Student  Performance in an Educational Game Using a Hidden Markov Model  | 
                          Data Mining  | 
                          2020  | 
                          Click Here  | 
                        
27  | 
                          Privacy Preserving  Location Data Publishing A Machine Learning Approach  | 
                          Data Mining  | 
                          2020  | 
                          Click Here  | 
                        
28  | 
                          Product Quantized  Collaborative Filtering  | 
                          Data Mining  | 
                          2020  | 
                          Click Here  | 
                        
29  | 
                          Publicly Verifiable  Databases with All Efficient Updating Operations  | 
                          Data Mining  | 
                          2020  | 
                          Click Here  | 
                        
30  | 
                          Scalable and Adaptive  Data Replica Placement for Geo-Distributed Cloud Storages  | 
                          Data Mining  | 
                          2020  | 
                          Click Here  | 
                        
31  | 
                          Social Boosted  Recommendation with Folded Bipartite Network Embedding  | 
                          Data Mining  | 
                          2020  | 
                          Click Here  | 
                        
32  | 
                          Emotion Correlation  Mining Through Deep Learning Models on Natural Language Textg  | 
                          Data Mining  | 
                          2020  | 
                          Click Here  | 
                        
 SECURE COMPUTING 
                            
                            
  | 
                        ||||
1  | 
                          A hybrid fault-tolerant scheduling for deadline-constrained tasks in Cloud systems  | 
                          Secure Computing   | 
                          2020  | 
                          Click Here   | 
                        
2  | 
                          CloudRaid Detecting  Distributed Concurrency Bugs via Log-Mining and Enhancement  | 
                          Secure Computing  | 
                          2020  | 
                          Click Here   | 
                        
3  | 
                          Dynamic Resource  Allocation and Computation Offloading for IoT Fog Computing System  | 
                          Secure Computing  | 
                          2020  | 
                          Click Here   | 
                        
4  | 
                          ECOGreen Electricity  Cost Optimization for Green Datacenters in Emerging Power Markets  | 
                          Secure Computing  | 
                          2020  | 
                          Click Here   | 
                        
5  | 
                          Efficient Encrypted  Data Search with Expressive Queries and Flexible Update  | 
                          Secure Computing  | 
                          2020  | 
                          Click Here   | 
                        
6  | 
                          Energy-aware cloud  workflow applications scheduling with geo-distributed data  | 
                          Secure Computing  | 
                          2020  | 
                          Click Here   | 
                        
7  | 
                          KeySea Keyword-based  Search with Receiver Anonymity in Attribute-based Searchable Encryption  | 
                          Secure Computing  | 
                          2020  | 
                          Click Here   | 
                        
8  | 
                          Lightweight  Privacy-preserving Raw Data Publishing Scheme  | 
                          Secure Computing  | 
                          2020  | 
                          Click Here   | 
                        
9  | 
                          Location-Aware  Service Recommendations With Privacy-Preservation in the Internet of Things  | 
                          Secure Computing  | 
                          2020  | 
                          Click Here   | 
                        
10  | 
                          Lucid A Practical,  Lightweight Deep Learning Solution for DDoS Attack Detection  | 
                          Secure Computing  | 
                          2020  | 
                          Click Here   | 
                        
11  | 
                          Minimizing Financial  Cost of DDoS Attack Defense in Clouds with Fine-Grained Resource Management  | 
                          Secure Computing  | 
                          2020  | 
                          Click Here   | 
                        
12  | 
                          Personalized  Recommendation System based on Collaborative Filtering for IoT Scenarios  | 
                          Secure Computing  | 
                          2020  | 
                          Click Here   | 
                        
13  | 
                          Privacy Preserving  QoS Forecasting in Mobile Edge Environments  | 
                          Secure Computing  | 
                          2020  | 
                          Click Here   | 
                        
14  | 
                          Provably Efficient  Resource Allocation for Edge Service Entities Using Hermes  | 
                          Secure Computing  | 
                          2020  | 
                          Click Here   | 
                        
15  | 
                          Reverse Nearest  Neighbor Search in Semantic Trajectories for Location based Services  | 
                          Secure Computing  | 
                          2020  | 
                          Click Here   | 
                        
16  | 
                          Revocable Attribute-based  Data Storage in Mobile Clouds  | 
                          Secure Computing  | 
                          2020  | 
                          Click Here   | 
                        
17  | 
                          Scalable Discovery of  Hybrid Process Models in a Cloud Computing Environment  | 
                          Secure Computing  | 
                          2020  | 
                          Click Here   | 
                        
18  | 
                          Semantics of Data  Mining Services in Cloud Computing  | 
                          Secure Computing  | 
                          2020  | 
                          Click Here   | 
                        
19  | 
                          Shed+ Optimal Dynamic  Speculation to Meet Application Deadlines in Cloud  | 
                          Secure Computing  | 
                          2020  | 
                          Click Here   | 
                        
INTERNET OF THINGS(IOT)   | 
                        ||||
1  | 
                          A Trustworthy Privacy  Preserving Framework for Machine Learning in Industrial IoT Systems  | 
                          IOT   | 
                          2020  | 
                          Click Here   | 
                        
2  | 
                          An Efficient  IoT-Based Platform for Remote Real-Time Cardiac Activity Monitoring  | 
                          IOT  | 
                          2020  | 
                          Click Here   | 
                        
3  | 
                          An Efficient Privacy  Preserving Message Authentication Scheme for Internet-of-Things  | 
                          IOT  | 
                          2020  | 
                          Click Here   | 
                        
4  | 
                          An Efficient Spam  Detection Technique for IoT Devices using Machine Learning  | 
                          IOT  | 
                          2020  | 
                          Click Here   | 
                        
5  | 
                          Efficient IoT  Management with Resilience to Unauthorized Access to Cloud Storage  | 
                          IOT  | 
                          2020  | 
                          Click Here   | 
                        
6  | 
                          Efficient Privacy  Preserving Data Collection and Computation Offloading for Fog-Assisted IoT  | 
                          IOT  | 
                          2020  | 
                          Click Here   | 
                        
7  | 
                          Secure Storage  Auditing with Efficient Key Updates for Cognitive Industrial IoT Environment  | 
                          IOT  | 
                          2020  | 
                          Click Here   | 
                        
 
 INFORMATION FORENSICS and SECURITY 
                            
                            
  | 
                        ||||
1  | 
                          Sparse Mobile  Crowdsensing With Differential and Distortion Location Privacy  | 
                          Information Forensics and Secuirty   | 
                          2020  | 
                          Click Here   | 
                        
2  | 
                          A Verifiable Semantic  Searching Scheme by Optimal Matching over Encrypted Data in Public Cloud  | 
                          Information Forensics and Secuirty   | 
                          2020  | 
                          Click Here   | 
                        
3  | 
                          Pay as You Decrypt  Decryption Outsourcing for Functional Encryption Using Blockchain  | 
                          Information Forensics and Secuirty  | 
                          2020  | 
                          Click Here   | 
                        
4  | 
                          Securing Resources in  Decentralized Cloud Storage  | 
                          Information Forensics and Secuirty  | 
                          2020  | 
                          Click Here   | 
                        
5  | 
                          Fake News,  Disinformation,and Deepfakes: Leveraging Distributed Ledger Technologies and  Blockchain to Combat Digital Deception and Counterfeit Reality  | 
                          Information Forensics and Secuirty  | 
                          2020  | 
                          Click Here   | 
                        
6  | 
                          Information Forensics and Secuirty  | 
                          2020  | 
                          Click Here   | 
                        |
7  | 
                          Information Forensics and Secuirty  | 
                          2020  | 
                          Click Here   | 
                        |
 MOBILE COMPUTING  
                             | 
                        ||||
1  | 
                          AdSherlock Efficient  and Deployable Click Fraud Detection for Mobile Applications  | 
                          Mobile Computing   | 
                          2020  | 
                          Click Here   | 
                        
2  | 
                          Distributed  Time-Sensitive Task Selection in Mobile Crowdsensing  | 
                          Mobile Computing  | 
                          2020  | 
                          Click Here   | 
                        
3  | 
                          Eclipse Preserving Differential  Location Privacy Against Long-Term Observation Attacks  | 
                          Mobile Computing  | 
                          2020  | 
                          Click Here   | 
                        
4  | 
                          Exploiting Multi-Dimensional Task Diversity in Distributed Auctions for Mobile Crowd Sensing | Mobile Computing  | 
                          2020  | 
                          Click Here   | 
                        
5  | 
                          Fine Grained User Profiling for Personalized Task Matching in Mobile Crowd Sensing | Mobile Computing  | 
                          2020  | 
                          Click Here   | 
                        
6  | 
                          KOLLECTOR Detecting  Fraudulent Activities on Mobile Devices Using Deep Learning  | 
                          Mobile Computing  | 
                          2020  | 
                          Click Here   | 
                        
7  | 
                          PACE  Privacy-Preserving and Quality-Aware Incentive Mechanism for Mobile Crowd Sensing  | 
                          Mobile Computing  | 
                          2020  | 
                          Click Here   | 
                        
8  | 
                          Predictability and  Prediction of Human Mobility Based on Application-collected Location Data  | 
                          Mobile Computing  | 
                          2020  | 
                          Click Here   | 
                        
9  | 
                          Privacy-Preserving  Media Sharing with Scalable Access Control and Secure De duplication in Mobile  Cloud Computing  | 
                          Mobile Computing  | 
                          2020  | 
                          Click Here   | 
                        
10  | 
                          Protecting Your  Shopping Preference with Differential Privacy  | 
                          Mobile Computing  | 
                          2020  | 
                          Click Here   | 
                        
11  | 
                          Proximity-Aware Location  Based Collaborative Sensing for Energy-Efficient Mobile Devices  | 
                          Mobile Computing  | 
                          2020  | 
                          Click Here   | 
                        
12  | 
                          Social Recruiter  Dynamic Incentive Mechanism for Mobile Crowd Sourcing Worker Recruitment with  Social Networks  | 
                          Mobile Computing  | 
                          2020  | 
                          Click Here   | 
                        
13  | 
                          Towards Fine-Grained  Access Control in Enterprise-Scale Internet-of-Things  | 
                          Mobile Computing  | 
                          2020  | 
                          Click Here   | 
                        
14  | 
                          Towards Personalized  Privacy-Preserving Incentive for Truth Discovery in Mobile Crowd Sensing  Systems  | 
                          Mobile Computing  | 
                          2020  | 
                          Click Here   | 
                        
 
 SOCIAL NETWORK 
                            
                            
 
  | 
                        ||||
1  | 
                          Activity Minimization  of Misinformation Influence in Online Social Networks  | 
                          Social Network   | 
                          2020  | 
                          Click Here   | 
                        
2  | 
                          An Efficient Feedback  Control Mechanism for Positive or   Negative Information Spread in Online Social Networks  | 
                          Social Network   | 
                          2020  | 
                          Click Here   | 
                        
3  | 
                          ArvaNet Deep  Recurrent Architecture for PPG-Based Negative Mental-State Monitoring  | 
                          Social Network   | 
                          2020  | 
                          Click Here   | 
                        
4  | 
                          Characterizing the  Propagation of Situational Information in Social Media During COVID-19 Epidemic  A Case Study on Weibo  | 
                          Social Network   | 
                          2020  | 
                          Click Here   | 
                        
5  | 
                          Continuous Activity  Maximization in Online Social Networks  | 
                          Social Network   | 
                          2020  | 
                          Click Here   | 
                        
6  | 
                          Detecting and  Characterizing Extremist Reviewer Groups in Online Product Reviews  | 
                          Social Network   | 
                          2020  | 
                          Click Here   | 
                        
7  | 
                          Detection of  Malicious Social Bots Using Learning Automata With URL Features in Twitter  Network  | 
                          Social Network   | 
                          2020  | 
                          Click Here   | 
                        
8  | 
                          Information  Dissemination From Social Network for Extreme Weather Scenario  | 
                          Social Network   | 
                          2020  | 
                          Click Here   | 
                        
9  | 
                          Location-Aware Service  Recommendations With Privacy-Preservation in the Internet of Things  | 
                          Social Network   | 
                          2020  | 
                          Click Here   | 
                        
10  | 
                          Movie Recommendation  System Using Sentiment Analysis From Micro blogging Data  | 
                          Social Network   | 
                          2020  | 
                          Click Here   | 
                        
11  | 
                          On Utilizing  Communities Detected From Social Networks in Hashtag Recommendation  | 
                          Social Network   | 
                          2020  | 
                          Click Here   | 
                        
12  | 
                          Understanding the  User Behavior of Foursquare A Data-Driven Study on a Global Scale  | 
                          Social Network   | 
                          2020  | 
                          Click Here   | 
                        
13  | 
                          User Behavior  Prediction of Social Hotspots Based on Multi message Interaction and Neural  Network  | 
                          Social Network   | 
                          2020  | 
                          Click Here   | 
                        
14  | 
                          Popular Matching for  Security-Enhanced Resource Allocation in Social Internet of Flying Things  | 
                          Social Network   | 
                          2020  | 
                          Click Here   | 
                        
15  | 
                          SciChallenge A Social  Media Aware Platform for Contest-Based STEM Education and Motivation of Young  Students  | 
                          Social Network   | 
                          2020  | 
                          Click Here   | 
                        
SOFTWARE ENGINEERING,SERVICE COMPUTING  | 
                        ||||
1  | 
                          Crisis-Critical  Intellectual Property Findings From the COVID-19 Pandemic  | 
                          Software Engineering   | 
                          2020  | 
                          Click Here   | 
                        
 
 VEHICULAR TECHNOLOGY AND INDUSTRIAL INFORMATICS 
                            
                            
  | 
                        ||||
1  | 
                          A Secure and  Verifiable Data Sharing Scheme Based on Blockchain in Vehicular Social Networks  | 
                          Vehicular Technology   | 
                          2020  | 
                          Click Here   | 
                        
2  | 
                          Collaborative Content  Delivery in Software-Defined Heterogeneous Vehicular Networks  | 
                          Vehicular Technology  | 
                          2020  | 
                          Click Here   | 
                        
3  | 
                          Dynamic Network  Slicing and Resource Allocation in Mobile Edge Computing Systems  | 
                          Vehicular Technology  | 
                          2020  | 
                          Click Here   | 
                        
4  | 
                          Security Enhanced  Content Sharing in Social IoT A Directed Hypergraph-Based Learning Scheme  | 
                          Vehicular Technology  | 
                          2020  | 
                          Click Here   | 
                        
5  | 
                          An Efficient Privacy  Preserving Message Authentication Scheme for Internet-of-Things  | 
                          Industrial Informatics   | 
                          2020  | 
                          Click Here   | 
                        
6  | 
                          Detection and Mitigation  of Cyber Attacks on Voltage Stability Monitoring of Smart Grids  | 
                          Industrial Informatics   | 
                          2020  | 
                          Click Here   | 
                        
7  | 
                          Enabling  Privacy-assured Fog-based Data Aggregation in E-healthcare Systems  | 
                          Industrial Informatics   | 
                          2020  | 
                          Click Here   | 
                        
8  | 
                          Hidden Electricity  Theft by Exploiting Multiple-Pricing Scheme in Smart Grids  | 
                          Industrial Informatics   | 
                          2020  | 
                          Click Here   | 
                        
9  | 
                          Social Image  Sentiment Analysis by Exploiting Multimodal Content and Heterogeneous Relations  | 
                          Industrial Informatics   | 
                          2020  | 
                          Click Here   | 
                        
BIG DATA   | 
                        ||||
1  | 
                          Credit Card  Transactions Data Adversarial Augmentation in the Frequency Domain  | 
                          Bigdata  | 
                          2020  | 
                          Click Here   | 
                        
2  | 
                          Building and Querying  an Enterprise Knowledge Graph  | 
                          Bigdata  | 
                          2020  | 
                          Click Here   | 
                        
3  | 
                          Delegated  Authorization Framework for EHR Services using Attribute Based Encryption  | 
                          Bigdata  | 
                          2020  | 
                          Click Here   | 
                        
4  | 
                          Secure Channel Free  Certificate-Based Searchable Encryption Withstanding Outside and Inside Keyword  Guessing Attacks  | 
                          Bigdata  | 
                          2020  | 
                          Click Here   | 
                        
EMERGING TOPICS IN COMPUTING  | 
                        ||||
1  | 
                          FarSight Long-Term  Disease Prediction Using Unstructured Clinical Nursing Notes  | 
                          Emerging Topics   | 
                          2020  | 
                          Click Here   | 
                        
2  | 
                          Human-in-the-Loop-Aided  Privacy-Preserving Scheme for Smart Healthcare  | 
                          Emerging Topics  | 
                          2020  | 
                          Click Here   | 
                        
3  | 
                          Recommending  Activities for Mental Health and Well-being Insights from Two User Studies  | 
                          Emerging Topics  | 
                          2020  | 
                          Click Here   | 
                        
4  | 
                          Semantic Access  Control for Privacy Management of Personal Sensing in Smart Cities  | 
                          Emerging Topics  | 
                          2020  | 
                          Click Here   | 
                        
SERVICE COMPUTING   | 
                        ||||
1  | 
                          A hybrid  fault-tolerant scheduling for deadline-constrained tasks in Cloud systems  | 
                          Service Computing  | 
                          2020  | 
                          Click Here   | 
                        
2  | 
                          CloudRaid Detecting  Distributed Concurrency Bugs via Log-Mining and Enhancement  | 
                          Service Computing  | 
                          2020  | 
                          Click Here   | 
                        
3  | 
                          Dynamic Resource  Allocation and Computation Offloading for IoT Fog Computing System  | 
                          Service Computing  | 
                          2020  | 
                          Click Here   | 
                        
4  | 
                          ECOGreen Electricity  Cost Optimization for Green Datacenters in Emerging Power Markets  | 
                          Service Computing  | 
                          2020  | 
                          Click Here   | 
                        
5  | 
                          Efficient Encrypted  Data Search with Expressive Queries and Flexible Update  | 
                          Service Computing  | 
                          2020  | 
                          Click Here   | 
                        
6  | 
                          Energy-aware cloud  workflow applications scheduling with geo-distributed data  | 
                          Service Computing  | 
                          2020  | 
                          Click Here   | 
                        
7  | 
                          KeySea Keyword-based  Search with Receiver Anonymity in Attribute-based Searchable Encryption  | 
                          Service Computing  | 
                          2020  | 
                          Click Here   | 
                        
8  | 
                          Lightweight  Privacy-preserving Raw Data Publishing Scheme  | 
                          Service Computing  | 
                          2020  | 
                          Click Here   | 
                        
9  | 
                          Location-Aware  Service Recommendations With Privacy-Preservation in the Internet of Things  | 
                          Service Computing  | 
                          2020  | 
                          Click Here   | 
                        
10  | 
                          Lucid A Practical,  Lightweight Deep Learning Solution for DDoS Attack Detection  | 
                          Service Computing  | 
                          2020  | 
                          Click Here   | 
                        
11  | 
                          Minimizing Financial  Cost of DDoS Attack Defense in Clouds with Fine-Grained Resource Management  | 
                          Service Computing  | 
                          2020  | 
                          Click Here   | 
                        
12  | 
                          Personalized  Recommendation System based on Collaborative Filtering for IoT Scenarios  | 
                          Service Computing  | 
                          2020  | 
                          Click Here   | 
                        
13  | 
                          Privacy Preserving  QoS Forecasting in Mobile Edge Environments  | 
                          Service Computing  | 
                          2020  | 
                          Click Here   | 
                        
14  | 
                          Provably Efficient  Resource Allocation for Edge Service Entities Using Hermes  | 
                          Service Computing  | 
                          2020  | 
                          Click Here   | 
                        
15  | 
                          Reverse Nearest  Neighbor Search in Semantic Trajectories for Location based Services  | 
                          Service Computing  | 
                          2020  | 
                          Click Here   | 
                        
16  | 
                          Revocable  Attribute-based Data Storage in Mobile Clouds  | 
                          Service Computing  | 
                          2020  | 
                          Click Here   | 
                        
17  | 
                          Scalable Discovery of  Hybrid Process Models in a Cloud Computing Environment  | 
                          Service Computing  | 
                          2020  | 
                          Click Here   | 
                        
18  | 
                          Semantics of Data  Mining Services in Cloud Computing  | 
                          Service Computing  | 
                          2020  | 
                          Click Here   | 
                        
19  | 
                          Shed+ Optimal Dynamic  Speculation to Meet Application Deadlines in Cloud  | 
                          Service Computing  | 
                          2020  | 
                          Click Here   | 
                        
DEPENDABLE AND SECURE COMPUTING  | 
                        ||||
1  | 
                          Shielding  Collaborative Learning  Mitigating  Poisoning Attacks through Client Side Detection  | 
                          Dependable and Secure Computing   | 
                          2020  | 
                          Click Here   | 
                        
2  | 
                          Scaling Camouflage  Content Disguising Attack Against Computer Vision Applications  | 
                          Dependable and Secure Computing  | 
                          2020  | 
                          Click Here   | 
                        
3  | 
                          Representing  Fine-Grained Co-Occurrences for Behavior-Based Fraud Detection in Online  Payment Services  | 
                          Dependable and Secure Computing  | 
                          2020  | 
                          Click Here   | 
                        
4  | 
                          Privacy-Preserving  Federated Deep Learning with Irregular Users  | 
                          Dependable and Secure Computing  | 
                          2020  | 
                          Click Here   | 
                        
5  | 
                          Optimal Filter Assignment  Policy Against Distributed Denial-of-Service Attack  | 
                          Dependable and Secure Computing  | 
                          2020  | 
                          Click Here   | 
                        
6  | 
                          On-the-fly Privacy for Location Histograms  | 
                          Dependable and Secure Computing  | 
                          2020  | 
                          Click Here   | 
                        
7  | 
                          Multi-client  Sub-Linear Boolean Keyword Searching for Encrypted Cloud Storage with  Owner-enforced Authorization  | 
                          Dependable and Secure Computing  | 
                          2020  | 
                          Click Here   | 
                        
8  | 
                          Match in My Way  Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing  | 
                          Dependable and Secure Computing  | 
                          2020  | 
                          Click Here   | 
                        
9  | 
                          Geometric range  search on encrypted data with Forward or Backward security  | 
                          Dependable and Secure Computing  | 
                          2020  | 
                          Click Here   | 
                        
10  | 
                          Efficient Server-Aided Secure Two-Party Computation in  Heterogeneous Mobile Cloud Computing  | 
                          Dependable and Secure Computing  | 
                          2020  | 
                          Click Here   | 
                        
11  | 
                          Efficient and Secure Attribute-based Access Control  with Identical Sub-Policies Frequently Used in Cloud Storage  | 
                          Dependable and Secure Computing  | 
                          2020  | 
                          Click Here   | 
                        
12  | 
                          Detection and Defense of Cache Pollution Based on  Popularity Prediction in Named Data Networking  | 
                          Dependable and Secure Computing  | 
                          2020  | 
                          Click Here   | 
                        
13  | 
                          Adaptive Secure Nearest Neighbor Query Processing over  Encrypted Data  | 
                          Dependable and Secure Computing  | 
                          2020  | 
                          Click Here   | 
                        
14  | 
                          Achieving Efficient Secure Deduplication with  User-Defined Access Control in Cloud  | 
                          Dependable and Secure Computing  | 
                          2020  | 
                          Click Here   | 
                        
15  | 
                          Achieving Efficient and Privacy-Preserving Exact Set  Similarity Search over Encrypted Data  | 
                          Dependable and Secure Computing  | 
                          2020  | 
                          Click Here   | 
                        
16  | 
                          A Traceable and Revocable Ciphertext-policy  Attribute-based Encryption Scheme Based on Privacy Protection  | 
                          Dependable and Secure Computing  | 
                          2020  | 
                          Click Here   | 
                        
IMAGE PROCESSING AND MULTIMEDIA   | 
                        ||||
1  | 
                          Benchmarking Image  Retrieval Diversification Techniques for Social Media  | 
                          Image Processing   | 
                          2020  | 
                          Click Here   | 
                        
2  | 
                          Online Hashing with  Bit Selection for Image Retrieval  | 
                          Image Processing   | 
                          2020  | 
                          Click Here   | 
                        
3  | 
                          Trust-Based Video  Management Framework for Social Multimedia Networks  | 
                          Image Processing   | 
                          2020  | 
                          Click Here   | 
                        
PARALLEL AND DISTRIBUTED SYTSTEMS   | 
                        ||||
1  | 
                          An Integrated Indexing  and Search Service for Distributed File Systems  | 
                          Distributed Systems   | 
                          2020  | 
                          Click Here   | 
                        
2  | 
                          ESetStore An  Erasure-Coded Storage System With Fast Data Recovery  | 
                          Distributed Systems   | 
                          2020  | 
                          Click Here   | 
                        
3  | 
                          Scalable and Adaptive  Data Replica Placement for Geo-Distributed Cloud Storages  | 
                          Distributed Systems   | 
                          2020  | 
                          Click Here   | 
                        
ADHOC NETWORKS   | 
                        ||||
1  | 
                          Efficient Conditional Anonymity With Message Integrity  and Authentication in a Vehicular Ad-Hoc Network  | 
                          Adhoc Networks   | 
                          2019  | 
                          Click Here   | 
                        
2  | 
                          Kalman Prediction based Neighbor Discovery and its  Effect on Routing Protocol in Vehicular Ad Hoc Networks  | 
                          Adhoc Networks   | 
                          2019  | 
                          Click Here   | 
                        
3  | 
                          New Multi-Hop Clustering Algorithm for Vehicular Ad  Hoc Networks  | 
                          Adhoc Networks   | 
                          2019  | 
                          Click Here   | 
                        
4  | 
                          Robust Defense Scheme Against Selective Drop Attack in  Wireless Ad Hoc Networks  | 
                          Adhoc Networks   | 
                          2019  | 
                          Click Here   | 
                        
5  | 
                          V2V Routing in a VANET Based on the Autoregressive  Integrated Moving Average Model  | 
                          Adhoc Networks   | 
                          2019  | 
                          Click Here   | 
                        
6  | 
                          An Evolutionary Self-Cooperative Trust Scheme Against  Routing Disruptions in MANETs  | 
                          Adhoc Networks   | 
                          2019  | 
                          Click Here   | 
                        
7  | 
                          An Attack-resistant Trust Inference Model for Securing  Routing in Vehicular Ad-hoc Networks  | 
                          Adhoc Networks   | 
                          2019  | 
                          Click Here   | 
                        
8  | 
                          An Efficient Message-Authentication Scheme Based on  Edge Computing for Vehicular Ad Hoc Networks  | 
                          Adhoc Networks   | 
                          2019  | 
                          Click Here   | 
                        
9  | 
                          DeQoS Attack: Degrading Quality of Service in VANETs  and its Mitigation  | 
                          Adhoc Networks   | 
                          2019  | 
                          Click Here   | 
                        
10  | 
                          Robust Defense Scheme Against Selective Drop Attack in  Wireless Ad Hoc Networks  | 
                          Adhoc Networks   | 
                          2019  | 
                          Click Here   | 
                        
| Live Demo is available on youtube.You can click on demo link and can download the video for further reference and send your title name to the following email id to get base paper and Abstract.Please mention your degree and other requirements also.. | ||||
Cloud Computing   | 
                        ||||
Sl.No  | 
                          Project Title Name   | 
                          Domain  | 
                          Year  | 
                          Demo  | 
                        
1  | 
                          A Practical Attribute-Based Document Collection  Hierarchical Encryption Scheme in Cloud Computing  | 
                          Cloud Computing   | 
                          2019  | 
                          Click Here   | 
                        
2  | 
                          A Trust-Based Agent Learning  Model for Service Composition in Mobile Cloud Computing Environments  | 
                          Cloud Computing   | 
                          2019  | 
                          Click Here   | 
                        
3  | 
                          Dynamic Multi-Keyword  Ranked Search Based on Bloom Filter Over Encrypted Cloud Data  | 
                          Cloud Computing   | 
                          2019  | 
                          Click Here   | 
                        
4  | 
                          Reliability and Availability Evaluation for Cloud Data  Center Networks Using Hierarchical Models  | 
                          Cloud Computing   | 
                          2019  | 
                          Click Here   | 
                        
5  | 
                          Verifiable and Multi-keyword Searchable  Attribute-based Encryption Scheme for Cloud Storage  | 
                          Cloud Computing   | 
                          2019  | 
                          Click Here   | 
                        
6  | 
                          Crypt-DAC: Cryptographically Enforced Dynamic Access  Control in the Cloud  | 
                          Cloud Computing   | 
                          2019  | 
                          Click Here   | 
                        
7  | 
                          CHARON: A Secure  Cloud-of-Clouds System for Storing and Sharing Big Data  | 
                          Cloud Computing   | 
                          2019  | 
                          Click Here   | 
                        
8  | 
                          An Attribute-Based  Controlled Collaborative Access Control Scheme for Public Cloud Storage  | 
                          Cloud Computing   | 
                          2019  | 
                          Click Here   | 
                        
9  | 
                          Dynamic Multi-Keyword Ranked Search Based on Bloom  Filter Over Encrypted Cloud Data  | 
                          Cloud Computing   | 
                          2019  | 
                          Click Here   | 
                        
10  | 
                          Secure Data Group Sharing and Conditional  Dissemination with Multi-Owner in Cloud Computing  | 
                          Cloud Computing   | 
                          2019  | 
                          Click Here   | 
                        
11  | 
                          Hidden Ciphertext  Policy Attribute-Based Encryption with Fast Decryption for Personal Health  Record System  | 
                          Cloud Computing   | 
                          2019  | 
                          Click Here   | 
                        
12  | 
                          A Lightweight Secure  Auditing Scheme for Shared Data in Cloud Storage  | 
                          Cloud Computing   | 
                          2019  | 
                          Click Here   | 
                        
13  | 
                          Novel Multi-Keyword  Search on Encrypted Data in the Cloud  | 
                          Cloud Computing   | 
                          2019  | 
                          Click Here   | 
                        
14  | 
                          Privacy-aware  Personal Data Storage (P-PDS) Learning how to Protect User Privacy from  External Applications  | 
                          Cloud Computing   | 
                          2019  | 
                          Click Here   | 
                        
15  | 
                          Privacy-Preserving  Attribute-Based Keyword Search in Shared Multi-owner Setting  | 
                          Cloud Computing   | 
                          2019  | 
                          Click Here   | 
                        
16  | 
                          Fast Boolean Queries  With Minimized Leakage for Encrypted Databases in Cloud Computing    | 
                          Cloud Computing   | 
                          2019  | 
                          Click Here   | 
                        
17  | 
                          Secure Data Group  Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing  | 
                          Cloud Computing   | 
                          2019  | 
                          Click Here   | 
                        
18  | 
                          Design of Secure Authenticated  Key Management Protocol for Cloud Computing Environments  | 
                          Cloud Computing   | 
                          2019  | 
                          Click Here   | 
                        
19  | 
                          A Fog-centric Secure  Cloud Storage Scheme  | 
                          Cloud Computing   | 
                          2019  | 
                          Click Here   | 
                        
20  | 
                          Enabling Verifiable  and Dynamic Ranked Search Over Outsourced Data  | 
                          Cloud Computing   | 
                          2019  | 
                          Click Here   | 
                        
21  | 
                          A Data Sharing  Protocol to Minimize Security and Privacy Risks of Cloud Storage in Big Data  Era  | 
                          Cloud Computing   | 
                          2019  | 
                          Click Here   | 
                        
22  | 
                          A Secure Searchable Encryption Framework for  Privacy-Critical Cloud Storage Services  | 
                          Cloud Computing   | 
                          2019  | 
                          Click Here   | 
                        
23  | 
                          Achieve  Privacy-Preserving Priority Classification on Patient Health Data in Remote  eHealthcare System  | 
                          Cloud Computing   | 
                          2019  | 
                          Click Here   | 
                        
24  | 
                          Data Integrity  Auditing without Private Key Storage for Secure Cloud Storage  | 
                          Cloud Computing   | 
                          2019  | 
                          Click Here   | 
                        
25  | 
                          Enabling Authorized  Encrypted Search for Multi-Authority Medical Databases  | 
                          Cloud Computing   | 
                          2019  | 
                          Click Here   | 
                        
26  | 
                          Fuzzy Identity-Based  Data Integrity Auditing for Reliable Cloud Storage Systems  | 
                          Cloud Computing   | 
                          2019  | 
                          Click Here  | 
                        
27  | 
                          P-MOD: Secure  Privilege-Based Multilevel Organizational Data-Sharing in Cloud Computing  | 
                          Cloud Computing   | 
                          2019  | 
                          Click Here  | 
                        
28  | 
                          Practical  Privacy-Preserving MapReduce Based K-means Clustering over Large-scale Dataset  | 
                          Cloud Computing   | 
                          2019  | 
                          Click Here  | 
                        
29  | 
                          Profit Maximization  for Cloud Brokers in Cloud Computing  | 
                          Cloud Computing   | 
                          2019  | 
                          Click Here  | 
                        
30  | 
                          Provable Data Possession with Outsourced Data Transfer  | 
                          Cloud Computing   | 
                          2019  | 
                          Click Here  | 
                        
31  | 
                          Provably Secure Fine-Grained Data Access Control over  Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications  | 
                          Cloud Computing   | 
                          2019  | 
                          Click Here  | 
                        
32  | 
                          Revocable Identity-Based Broadcast Proxy Re-encryption  for Data Sharing in Clouds  | 
                          Cloud Computing   | 
                          2019  | 
                          Click Here  | 
                        
33  | 
                          Searchable Symmetric Encryption with Forward Search  Privacy  | 
                          Cloud Computing   | 
                          2019  | 
                          Click Here  | 
                        
34  | 
                          Privacy Preserving Searchable Encryption with  Fine-grained Access Control  | 
                          Cloud Computing   | 
                          2019  | 
                          Click Here  | 
                        
35  | 
                          A Secure G-Cloud-Based Framework for Government  Healthcare Services  | 
                          Cloud Computing   | 
                          2019  | 
                          Click Here  | 
                        
 DATA MINING 
                            
  | 
                        ||||
1  | 
                          Clustering-Based  Collaborative Filtering Using an Incentivized/Penalized User Model  | 
                          Data Mining   | 
                          2019  | 
                          Click Here   | 
                        
2  | 
                          A Hierarchical Attention Model for Social Contextual  Image Recommendation  | 
                          Data Mining  | 
                          2019  | 
                          Click Here  | 
                        
3  | 
                          Mining Users Trust From E-Commerce Reviews Based on  Sentiment Similarity Analysis  | 
                          Data Mining  | 
                          2019  | 
                          Click Here  | 
                        
4  | 
                          Old and Young Users’ White Space Preferences for  Online News Web Pages  | 
                          Data Mining  | 
                          2019  | 
                          Click Here  | 
                        
5  | 
                          Analysis and Accurate Prediction of User’s Response  Behavior in Incentive-Based Demand Response  | 
                          Data Mining  | 
                          2019  | 
                          Click Here  | 
                        
6  | 
                          DCCR: Deep Collaborative Conjunctive Recommender for  Rating Prediction  | 
                          Data Mining  | 
                          2019  | 
                          Click Here  | 
                        
7  | 
                          Network Representation Learning Enhanced  Recommendation Algorithm  | 
                          Data Mining  | 
                          2019  | 
                          Click Here  | 
                        
8  | 
                          Trust Relationship Prediction in Alibaba E-Commerce  Platform  | 
                          Data Mining  | 
                          2019  | 
                          Click Here  | 
                        
9  | 
                          Composition Context-Based Web Services Similarity  Measure  | 
                          Data Mining  | 
                          2019  | 
                          Click Here  | 
                        
10  | 
                          NASM: Nonlinearly Attentive Similarity Model for  Recommendation System via Locally Attentive Embedding  | 
                          Data Mining  | 
                          2019  | 
                          Click Here  | 
                        
11  | 
                          A Novel Load Image Profile-Based Electricity Load  Clustering Methodology  | 
                          Data Mining  | 
                          2019  | 
                          Click Here  | 
                        
12  | 
                          An Efficient Method for High Quality and Cohesive  Topical Phrase Mining  | 
                          Data Mining  | 
                          2019  | 
                          Click Here  | 
                        
13  | 
                          Credibility Evaluation of Twitter-Based Event Detection by a Mixing Analysis of Heterogeneous Data  | 
                          Data Mining  | 
                          2019  | 
                          Click Here  | 
                        
14  | 
                          Filtering Instagram hashtags through crowd tagging and  the HITS algorithm  | 
                          Data Mining  | 
                          2019  | 
                          Click Here  | 
                        
15  | 
                          A Hybrid E-learning Recommendation Approach Based on  Learners’ Influence Propagation  | 
                          Data Mining  | 
                          2019  | 
                          Click Here  | 
                        
16  | 
                          Active Online Learning for Social Media Analysis to  Support Crisis Management  | 
                          Data Mining  | 
                          2019  | 
                          Click Here  | 
                        
17  | 
                          Applying Simulated Annealing and Parallel Computing to  the Mobile Sequential Recommendation  | 
                          Data Mining  | 
                          2019  | 
                          Click Here  | 
                        
18  | 
                          Collaboratively Tracking Interests for User Clustering  in Streams of Short Texts  | 
                          Data Mining  | 
                          2019  | 
                          Click Here  | 
                        
19  | 
                          Detecting Pickpocket Suspects from Large-Scale Public  Transit Records  | 
                          Data Mining  | 
                          2019  | 
                          Click Here  | 
                        
20  | 
                          Finding Optimal Skyline Product Combinations under  Price Promotion  | 
                          Data Mining  | 
                          2019  | 
                          Click Here  | 
                        
21  | 
                          Heterogeneous Information Network Embedding for  Recommendation  | 
                          Data Mining  | 
                          2019  | 
                          Click Here  | 
                        
22  | 
                          Hierarchical Multi-Clue Modelling for POI Popularity  Prediction with Heterogeneous Tourist Information  | 
                          Data Mining  | 
                          2019  | 
                          Click Here  | 
                        
23  | 
                          K-nearest Neighbor Search by Random Projection Forests  | 
                          Data Mining  | 
                          2019  | 
                          Click Here  | 
                        
24  | 
                          Learning Customer Behaviors for Effective Load  Forecasting  | 
                          Data Mining  | 
                          2019  | 
                          Click Here  | 
                        
25  | 
                          Normalization of Duplicate Records from Multiple  Sources  | 
                          Data Mining  | 
                          2019  | 
                          Click Here  | 
                        
26  | 
                          On Scalable and Robust Truth Discovery in Big Data  Social Media Sensing Applications  | 
                          Data Mining  | 
                          2019  | 
                          Click Here  | 
                        
27  | 
                          Privacy-Preserving Social Media Data Publishing for  Personalized Ranking-Based Recommendation  | 
                          Data Mining  | 
                          2019  | 
                          Click Here  | 
                        
28  | 
                          Secure and Efficient Skyline Queries on Encrypted Data  | 
                          Data Mining  | 
                          2019  | 
                          Click Here  | 
                        
29  | 
                          Predicting Consumption Patterns with Repeated and  Novel Events  | 
                          Data Mining  | 
                          2019  | 
                          Click Here  | 
                        
30  | 
                          Multi-Party High-Dimensional Data Publishing under  Differential Privacy  | 
                          Data Mining  | 
                          2019  | 
                          Click Here  | 
                        
31  | 
                          Minimizing Influence of Rumors by Blockers on Social Networks: Algorithms and Analysis  | 
                          Data Mining  | 
                          2019  | 
                          Click Here  | 
                        
32  | 
                          Detection of fake online reviews using semi-supervised  and supervised learning  | 
                          Data Mining  | 
                          2019  | 
                          Click Here  | 
                        
33  | 
                          Collaborative Filtering-based Electricity Plan  Recommender System                 | 
                          Data Mining  | 
                          2019  | 
                          Click Here  | 
                        
 SECURE COMPUTING 
                            
                            
  | 
                        ||||
1  | 
                          A Novel Load Image  Profile-Based Electricity Load Clustering Methodology  | 
                          Secure Computing   | 
                          2019  | 
                          Click Here   | 
                        
2  | 
                          Coverless Information  Hiding Method Based on Web Text  | 
                          Secure Computing  | 
                          2019  | 
                          Click Here   | 
                        
3  | 
                          SEPTIC Detecting Injection Attacks and Vulnerabilities  Inside the DBMS  | 
                          Secure Computing  | 
                          2019  | 
                          Click Here   | 
                        
4  | 
                          LBOA: Location-Based  Secure Outsourced Aggregation in IoT  | 
                          Secure Computing  | 
                          2019  | 
                          Click Here   | 
                        
5  | 
                          Towards Thwarting  Template Side-channel Attacks in Secure Cloud Deduplications  | 
                          Secure Computing  | 
                          2019  | 
                          Click Here   | 
                        
6  | 
                          Automated Decision Making in Airport Checkpoints: Bias  Detection Toward Smarter Security and Fairness  | 
                          Secure Computing  | 
                          2019  | 
                          Click Here   | 
                        
7  | 
                          Detecting Malicious Social Bots Based on Click stream  Sequences  | 
                          Secure Computing  | 
                          2019  | 
                          Click Here   | 
                        
8  | 
                          Authenticated Medical Documents Releasing with Privacy  Protection and Release Control  | 
                          Secure Computing  | 
                          2019  | 
                          Click Here   | 
                        
9  | 
                          Collusion Defender: Preserving Subscribers’ Privacy in  Publish and Subscribe Systems  | 
                          Secure Computing  | 
                          2019  | 
                          Click Here   | 
                        
10  | 
                          Privacy-Preserving Aggregate Queries for Optimal  Location Selection  | 
                          Secure Computing  | 
                          2019  | 
                          Click Here   | 
                        
11  | 
                          Privacy-Preserving Attribute-Based Keyword Search in  Shared Multi-owner Setting  | 
                          Secure Computing  | 
                          2019  | 
                          Click Here   | 
                        
12  | 
                          Privacy-Preserving Multi-keyword Top-k Similarity  Search Over Encrypted Data  | 
                          Secure Computing  | 
                          2019  | 
                          Click Here   | 
                        
13  | 
                          Sensitive Label Privacy Preservation with  Anatomization for Data Publishing  | 
                          Secure Computing  | 
                          2019  | 
                          Click Here   | 
                        
14  | 
                          Towards Achieving Keyword Search over Dynamic  Encrypted Cloud Data with Symmetric-Key Based Verification  | 
                          Secure Computing  | 
                          2019  | 
                          Click Here   | 
                        
15  | 
                          Who You Should Not Follow: Extracting Word Embeddings  from Tweets to Identify Groups of Interest and Hijackers in Demonstrations  | 
                          Secure Computing  | 
                          2019  | 
                          Click Here   | 
                        
BLOCKCHAIN TECHNOLOGY  | 
                        ||||
1  | 
                          PBCert: Privacy-Preserving Blockchain-Based Certificate Status Validation Toward Mass Storage Management  | 
                          Blockchain Technology   | 
                          2019  | 
                          Click Here   | 
                        
2  | 
                          Blockchain for AI: Review and Open Research Challenges  | 
                          Blockchain Technology   | 
                          2019  | 
                          Click Here   | 
                        
3  | 
                          Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors  | 
                          Blockchain Technology   | 
                          2019  | 
                          Click Here   | 
                        
 
 INFORMATION FORENSICS and SECURITY 
                            
                            
  | 
                        ||||
1  | 
                          Authentication by Encrypted Negative Password  | 
                          Information Forensics and Secuirty   | 
                          2019  | 
                          Click Here   | 
                        
2  | 
                          Retrieving Hidden Friends: A Collusion Privacy Attack  Against Online Friend Search Engine  | 
                          Information Forensics and Secuirty   | 
                          2019  | 
                          Click Here   | 
                        
3  | 
                          Account Trade Accountability Against Dishonest Big  Data Buyers and Sellers  | 
                          Information Forensics and Secuirty  | 
                          2019  | 
                          Click Here   | 
                        
4  | 
                          Enabling Efficient and Geometric Range Query with  Access Control over Encrypted Spatial Data  | 
                          Information Forensics and Secuirty  | 
                          2019  | 
                          Click Here   | 
                        
5  | 
                          Enabling Identity-Based Integrity Auditing and Data  Sharing With Sensitive Information Hiding for Secure Cloud Storage  | 
                          Information Forensics and Secuirty  | 
                          2019  | 
                          Click Here   | 
                        
6  | 
                          Peer Prediction Based Trustworthiness Evaluation and  Trustworthy Service Rating in Social Networks  | 
                          Information Forensics and Secuirty  | 
                          2019  | 
                          Click Here   | 
                        
7  | 
                          Secure Key Agreement and Key Protection for Mobile  Device User Authentication  | 
                          Information Forensics and Secuirty  | 
                          2019  | 
                          Click Here   | 
                        
 MOBILE COMPUTING  
                             | 
                        ||||
1  | 
                          An Indoor Position-Estimation Algorithm Using  Smartphone IMU Sensor Data  | 
                          Mobile Computing   | 
                          2019  | 
                          Click Here   | 
                        
2  | 
                          FooDNet: Toward an Optimized Food Delivery Network  based on Spatial Crowdsourcing  | 
                          Mobile Computing  | 
                          2019  | 
                          Click Here   | 
                        
3  | 
                          Privacy-preserving Crowd-sourced Statistical Data  Publishing with An Untrusted Server  | 
                          Mobile Computing  | 
                          2019  | 
                          Click Here   | 
                        
4  | 
                          Mobile Computing  | 
                          2019  | 
                          Click Here   | 
                        |
5  | 
                          Mobile Computing  | 
                          2019  | 
                          Click Here   | 
                        |
6  | 
                          Mobile Computing  | 
                          2019  | 
                          Click Here   | 
                        |
 
 SOCIAL NETWORK 
                            
                            
 
  | 
                        ||||
1  | 
                          A Hybrid Approach to Service Recommendation Based on  Network Representation Learning  | 
                          Social Network   | 
                          2019  | 
                          Click Here   | 
                        
2  | 
                          Social Network Rumor Diffusion Predication Based on  Equal Responsibility Game Model  | 
                          Social Network   | 
                          2019  | 
                          Click Here   | 
                        
3  | 
                          Online Public Shaming on Twitter: Detection, Analysis  and Mitigation  | 
                          Social Network   | 
                          2019  | 
                          Click Here   | 
                        
4  | 
                          PersoNet: Friend Recommendation System Based on  Big-Five Personality Traits and Hybrid Filtering  | 
                          Social Network   | 
                          2019  | 
                          Click Here   | 
                        
5  | 
                          A Fuzzy Approach to  Text Classification with Two Stage Training for Ambiguous Instances  | 
                          Social Network   | 
                          2019  | 
                          Click Here   | 
                        
6  | 
                          Conversational  Networks For Automatic Online Moderation  | 
                          Social Network   | 
                          2019  | 
                          Click Here   | 
                        
SOFTWARE ENGINEERING,SERVICE COMPUTING  | 
                        ||||
1  | 
                          Platform-Independent Dynamic Taint Analysis for JavaScript  | 
                          Software Engineering   | 
                          2019  | 
                          Click Here   | 
                        
2  | 
                          Scheduling Real Time Security Aware tasks in Fog Networks  | 
                          Software Engineering   | 
                          2019  | 
                          Click Here   | 
                        
 
 WIRELESS SENSOR NETWOKS  
                            
                            
  | 
                        ||||
1  | 
                          V-Matrix-Based  Scalable Data Aggregation Scheme in WSN  | 
                          WSN  | 
                          2019  | 
                          Click Here   | 
                        
2  | 
                          A Probabilistic Source Location Privacy Protection  Scheme in Wireless Sensor Networks  | 
                          WSN  | 
                          2019  | 
                          Click Here   | 
                        
3  | 
                          Memory Leakage-Resilient Dynamic and Verifiable  Multi-keyword Ranked Search on Encrypted Smart Body Sensor Network Data  | 
                          WSN  | 
                          2019  | 
                          Click Here   | 
                        
4  | 
                          Primary User-aware Optimal Discovery Routing for  Cognitive Radio Networks  | 
                          WSN  | 
                          2019  | 
                          Click Here   | 
                        
ANDROID   | 
                        ||||
1  | 
                          RescueMe:  Smartphone-Based Self Rescue System for Disaster Rescue  | 
                          Android  | 
                          2019  | 
                          Click Here   | 
                        
2  | 
                          FallDroid: An Automated Smart Phone based Fall  Detection System using Multiple Kernel Learning  | 
                          Android  | 
                          2019  | 
                          Click Here   | 
                        
3  | 
                          Dating with Scambots:  Understanding the Ecosystem of Fraudulent Dating Applications  | 
                          Android  | 
                          2019  | 
                          Click Here   | 
                        
4  | 
                          Applying Simulated Annealing and Parallel Computing to  the Mobile Sequential Recommendation  | 
                          Android  | 
                          2019  | 
                          Click Here   | 
                        
5  | 
                          An Indoor Position-Estimation Algorithm Using  Smartphone IMU Sensor Data  | 
                          Android  | 
                          2019  | 
                          Click Here   | 
                        
6  | 
                          Achieve Privacy-Preserving Priority Classification on  Patient Health Data in Remote eHealthcare System  | 
                          Android  | 
                          2019  | 
                          Click Here   | 
                        
CYBER SECURITY   | 
                        ||||
1  | 
                          Predicting  Cyberbullying on Social Media in the Big Data Era Using Machine Learning  Algorithms: Review of Literature and Open Challenges  | 
                          Cyber Secuirty   | 
                          2019  | 
                          Click Here   | 
                        
2  | 
                          Spammer Detection and  Fake User Identification on Social Networks  | 
                          Cyber Secuirty   | 
                          2019  | 
                          Click Here   | 
                        
3  | 
                          Ant Colony Stream  Clustering: A Fast Density Clustering Algorithm for Dynamic Data Streams  | 
                          Cyber Secuirty   | 
                          2019  | 
                          Click Here   | 
                        
SERVICE COMPUTING   | 
                        ||||
1  | 
                          Transactional  Behavior Verification in Business Process as a Service Configuration  | 
                          Service Computing  | 
                          2019  | 
                          Click Here   | 
                        
2  | 
                          Building and Querying  an Enterprise Knowledge Graph  | 
                          Service Computing  | 
                          2019  | 
                          Click Here   | 
                        
3  | 
                          Delegated  Authorization Framework for EHR Services using Attribute Based Encryption  | 
                          Service Computing  | 
                          2019  | 
                          Click Here   | 
                        
4  | 
                          Secure Channel Free  Certificate-Based Searchable Encryption Withstanding Outside and Inside Keyword  Guessing Attacks  | 
                          Service Computing  | 
                          2019  | 
                          Click Here   | 
                        
INTERNET OF THINGS(IOT)   | 
                        ||||
1  | 
                          Secure Phrase Search  for Intelligent Processing of Encrypted Data in Cloud-Based IoT  | 
                          IOT  | 
                          2019  | 
                          Click Here   | 
                        
2  | 
                          Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques  | 
                          IOT  | 
                          2019  | 
                          Click Here   | 
                        
3  | 
                          Trustworthy  Delegation toward Securing Mobile Healthcare Cyber-Physical Systems  | 
                          IOT  | 
                          2019  | 
                          Click Here   | 
                        
4  | 
                          Hybrid Keyword-Field Search with Efficient Key  Management for Industrial Internet of Things  | 
                          IOT  | 
                          2019  | 
                          Click Here   | 
                        
5  | 
                          Trustworthy Delegation toward Securing Mobile  Healthcare Cyber-Physical Systems  | 
                          IOT  | 
                          2019  | 
                          Click Here   | 
                        
6  | 
                          Securing Data in Internet of Things (IoT) Using  Cryptography and Stegano graphy Techniques  | 
                          IOT  | 
                          2019  | 
                          Click Here   | 
                        
IMAGE PROCESSING and MULTIMEDIA   | 
                        ||||
1  | 
                          Fundamental Visual  Concept Learning from Correlated Images and Text  | 
                          Image Processing   | 
                          2019  | 
                          Click Here   | 
                        
2  | 
                          Trust-based  Privacy-Preserving Photo Sharing in Online Social Networks  | 
                          Image Processing   | 
                          2019  | 
                          Click Here   | 
                        
3  | 
                          Towards Robust Image  Steganography  | 
                          Image Processing   | 
                          2019  | 
                          Click Here   | 
                        
PARALLEL and DISTRIBUTED SYTSTEMS   | 
                        ||||
1  | 
                          A Distributed Trust Evaluation Protocol with Privacy  Protection for Inter cloud  | 
                          Distributed Systems   | 
                          2019  | 
                          Click Here   | 
                        
2  | 
                          Deadline-aware MapReduce Job Scheduling with Dynamic  Resource Availability  | 
                          Distributed Systems   | 
                          2019  | 
                          Click Here   | 
                        
ADHOC NETWORKS   | 
                        ||||
1  | 
                          Efficient Conditional Anonymity With Message Integrity  and Authentication in a Vehicular Ad-Hoc Network  | 
                          Adhoc Networks   | 
                          2019  | 
                          Click Here   | 
                        
2  | 
                          Kalman Prediction based Neighbor Discovery and its  Effect on Routing Protocol in Vehicular Ad Hoc Networks  | 
                          Adhoc Networks   | 
                          2019  | 
                          Click Here   | 
                        
3  | 
                          New Multi-Hop Clustering Algorithm for Vehicular Ad  Hoc Networks  | 
                          Adhoc Networks   | 
                          2019  | 
                          Click Here   | 
                        
4  | 
                          Robust Defense Scheme Against Selective Drop Attack in  Wireless Ad Hoc Networks  | 
                          Adhoc Networks   | 
                          2019  | 
                          Click Here   | 
                        
5  | 
                          V2V Routing in a VANET Based on the Autoregressive  Integrated Moving Average Model  | 
                          Adhoc Networks   | 
                          2019  | 
                          Click Here   | 
                        
6  | 
                          An Evolutionary Self-Cooperative Trust Scheme Against  Routing Disruptions in MANETs  | 
                          Adhoc Networks   | 
                          2019  | 
                          Click Here   | 
                        
7  | 
                          An Attack-resistant Trust Inference Model for Securing  Routing in Vehicular Ad-hoc Networks  | 
                          Adhoc Networks   | 
                          2019  | 
                          Click Here   | 
                        
8  | 
                          An Efficient Message-Authentication Scheme Based on  Edge Computing for Vehicular Ad Hoc Networks  | 
                          Adhoc Networks   | 
                          2019  | 
                          Click Here   | 
                        
9  | 
                          DeQoS Attack: Degrading Quality of Service in VANETs  and its Mitigation  | 
                          Adhoc Networks   | 
                          2019  | 
                          Click Here   | 
                        
10  | 
                          Robust Defense Scheme Against Selective Drop Attack in  Wireless Ad Hoc Networks  | 
                          Adhoc Networks   | 
                          2019  | 
                          Click Here   |