Live 2023 and 2024 Java IEEE Projects List --- Download
Live Demo is available on youtube.You can click on demo link and can download the video for further reference and send your title name to the following email id to get base paper and Abstract.Please mention your degree and other requirements also.. |
||||
Cloud Computing |
||||
Sl.No |
Project Title Name |
Domain |
Year |
Demo |
1 |
An Effective Privacy-Preserving Blockchain-Assisted Security Protocol for Cloud-Based Digital Twin Environment |
Cloud Computing |
2023 |
Click Here |
2 |
Authenticated Key Agreement Scheme for Fog Computing in a Health-Care Environment |
Cloud Computing |
2023 |
Click Here |
3 |
Data Integrity Audit Scheme Based on Quad Merkle Tree and Blockchain |
Cloud Computing |
2023 |
Click Here |
4 |
Data Secure De-Duplication and Recovery Based on Public Key Encryption With Keyword Search |
Cloud Computing |
2023 |
Click Here |
5 |
Delegate and Verify the Update Keys of Revocable Identity-Based Encryption |
Cloud Computing |
2023 |
Click Here |
6 |
Dynamic Secure Access Control and Data Sharing Through Trusted Delegation and Revocation in a Blockchain-Enabled Cloud-IoT Environment |
Cloud Computing |
2023 |
Click Here |
7 |
Efficient, Traceable and Privacy-Aware Data Access Control in Distributed Cloud-Based IoD Systems |
Cloud Computing |
2023 |
Click Here |
8 |
EFPB: Efficient Fair Payment Based on Blockchain for Outsourcing Services in Cloud Computing |
Cloud Computing |
2023 |
Click Here |
9 |
Enabling Simultaneous Content Regulation and Privacy Protection for Cloud Storage Image |
Cloud Computing |
2023 |
Click Here |
10 |
FAST DATA: A Fair, Secure and Trusted Decentralized IIoT Data Marketplace enabled by Blockchain |
Cloud Computing |
2023 |
Click Here |
11 |
Mitigating Software Integrity Attacks With Trusted Computing in a Time Distribution Network |
Cloud Computing |
2023 |
Click Here |
12 |
Optimized Proactive Recovery in Erasure-Coded Cloud Storage Systems |
Cloud Computing |
2023 |
Click Here |
13 |
PackCache: An Online Cost-driven Data Caching Algorithm in the Cloud |
Cloud Computing |
2023 |
Click Here |
14 |
Privacy Preservation in Multi-Cloud Secure Data Fusion for Infectious-Disease Analysis |
Cloud Computing |
2023 |
Click Here |
15 |
RRFT: A Rank-Based Resource Aware Fault Tolerant Strategy for Cloud Platforms |
Cloud Computing |
2023 |
Click Here |
16 |
Secure and Efficient Data Deduplication in JointCloud Storage |
Cloud Computing |
2023 |
Click Here |
17 |
Secure and Lightweight Blockchain-Enabled Access Control for Fog-Assisted IoT Cloud Based Electronic Medical Records Sharing |
Cloud Computing |
2023 |
Click Here |
18 |
Securing Organization’s Data: A Role-Based Authorized Keyword Search Scheme with Efficient Decryption |
Cloud Computing |
2023 |
Click Here |
19 |
CloudNet: A LiDAR-Based Face Anti-Spoofing Model That Is Robust Against Light Variation |
Cloud Computing |
2023 |
Click Here |
20 |
A Data Deduplication Scheme Based on DBSCAN With Tolerable Clustering Deviation |
Cloud Computing |
2023 |
Click Here |
21 |
A Personal Privacy Data Protection Scheme for Encryption and Revocation of High-Dimensional Attribute Domains |
Cloud Computing |
2023 |
Click Here |
22 |
An Effective Privacy-Preserving Blockchain-Assisted Security Protocol for Cloud-Based Digital Twin Environment |
Cloud Computing |
2023 |
Click Here |
23 |
An Efficient Post-Quantum Attribute-Based Encryption Scheme Based on Rank Metric Codes for Cloud Computing |
Cloud Computing |
2023 |
Click Here |
24 |
CACPA: Credible Alliance-Chain-Based Public Auditing Scheme for Cloud Storage |
Cloud Computing |
2023 |
Click Here |
25 |
Enabling Balanced Data Deduplication in Mobile Edge Computing |
Cloud Computing |
2023 |
Click Here |
26 |
Efficient Large-Capacity Caching in Cloud Storage Using Skip-Gram-Based File Correlation Analysis |
Cloud Computing |
2023 |
Click Here |
27 |
Multi-Task Learning for Electricity Price Forecasting and Resource Management in Cloud Based Industrial IoT Systems |
Cloud Computing |
2023 |
Click Here |
28 |
Secure and Efficient Data Deduplication in JointCloud Storage |
Cloud Computing |
2023 |
Click Here |
29 |
Nimbus: Towards Latency-Energy Efficient Task Offloading for AR Services |
Cloud Computing |
2023 |
Click Here |
30 |
VeriDedup: A Verifiable Cloud Data Deduplication Scheme With Integrity and Duplication Proof |
Cloud Computing |
2023 |
Click Here |
31 |
CryptoArcade: A Cloud Gaming System With Blockchain-Based Token Economy |
Cloud Computing |
2023 |
Click Here |
BLOCKCHAIN
|
||||
1 |
A Blockchain-based Decentralized, Fair and Authenticated Information Sharing Scheme in Zero Trust Internet-of-Things |
Block Chain |
2023 |
Click Here |
2 |
A Blockchain-based E-Commerce Reputation System Built with Verifiable Credentials |
Block Chain |
2023 |
Click Here |
3 |
A Blockchain-Based Mutual Authentication Method to Secure the Electric Vehicles’ TPMS |
Block Chain |
2023 |
Click Here |
4 |
A Secure and Intelligent Data Sharing Scheme for UAV-Assisted Disaster Rescue |
Block Chain |
2023 |
Click Here |
5 |
A Secure Decentralized E-Voting with Blockchain & Smart Contracts |
Block Chain |
2023 |
Click Here |
6 |
A Tractable Probabilistic Approach to Analyze Sybil Attacks in Sharding-Based Blockchain Protocols |
Block Chain |
2023 |
Click Here |
7 |
A Blockchain-Based Crowdsourcing Loan Platform for Funding Higher Education in Developing Countries |
Block Chain |
2023 |
Click Here |
8 |
A Privacy-preserving Medical Data Sharing Scheme Based on Blockchain |
Block Chain |
2023 |
Click Here |
9 |
A Secure and Privacy-Preserving E-Government Framework Using Blockchain and Artificial Immunity |
Block Chain |
2023 |
Click Here |
10 |
Aegis: Privacy-Preserving Market for Non-Fungible Tokens |
Block Chain |
2023 |
Click Here |
11 |
Bank record storage using blockchain |
Block Chain |
2023 |
Click Here |
12 |
BCGeo: Blockchain-Assisted Geospatial Web Service for Smart Healthcare System |
Block Chain |
2023 |
Click Here |
13 |
BitAnalysis: A Visualization System for Bitcoin Wallet Investigation |
Block Chain |
2023 |
Click Here |
14 |
Blockchain Enabled Decentralized Local Electricity Markets with Flexibility from Heating Sources |
Block Chain |
2023 |
Click Here |
15 |
Blockchain Adoption in Food Supply Chains: A Systematic Literature Review on Enablers, Benefits, and Barriers |
Block Chain |
2023 |
Click Here |
16 |
Blockchain for Healthcare Management Systems: A Survey on Interoperability and Security |
Block Chain |
2023 |
Click Here |
17 |
Blockchain-based Federated Learning with SMPC Model Verification Against Poisoning Attack for Healthcare Systems |
Block Chain |
2023 |
Click Here |
18 |
Blockchain-Enabled Authenticated Key Agreement Scheme for Mobile Vehicles-Assisted Precision Agricultural IoT Networks |
Block Chain |
2023 |
Click Here |
19 |
Blockchain-Enabled Technique for Privacy- Preserved Medical Recommender System |
Block Chain |
2023 |
Click Here |
20 |
Cryptocurrency Transaction Network Embedding From Static and Dynamic Perspectives: An Overview |
Block Chain |
2023 |
Click Here |
21 |
Cyber-Physical Customer Management for Internet of Robotic Things-Enabled Banking |
Block Chain |
2023 |
Click Here |
22 |
Federated Learning and Blockchain-enabled Fog-IoT Platform for Wearables in Predictive Healthcare |
Block Chain |
2023 |
Click Here |
23 |
FLAME: Trusted Fire Brigade Service and Insurance Claim System using Blockchain for Enterprises |
Block Chain |
2023 |
Click Here |
24 |
Privacy-Preserving Electricity Theft Detection based on Blockchain |
Block Chain |
2023 |
Click Here |
25 |
Sec-Health: A Blockchain-Based Protocol for Securing Health Records |
Block Chain |
2023 |
Click Here |
26 |
UCoin: An Efficient Privacy Preserving Scheme for Cryptocurrencies |
Block Chain |
2023 |
Click Here |
27 |
User Interface of Blockchain-based Agri-Food Traceability Applications: A Review |
Block Chain |
2023 |
Click Here |
28 |
Using Blockchain for Enabling Transparent, Traceable, and Trusted University Ranking Systems |
Block Chain |
2023 |
Click Here |
29 |
Using Composable NFTs for Trading and Managing Expensive Packaged Products in the Food Industry |
Block Chain |
2023 |
Click Here |
DATA MINING |
||||
1 |
A Comparative Analysis of Sampling Techniques for Click-Through Rate Prediction in Native Advertising |
Data Mining |
2023 |
Click Here |
2 |
CrowdSPaFE: A Crowd-Sourced Multimodal Recommendation System for Urban Route Safety |
Data Mining |
2023 |
Click Here |
3 |
Exploiting Category-Level Multiple Characteristics for POI Recommendation |
Data Mining |
2023 |
Click Here |
4 |
Finding Critical Users in Social Communities via Graph Convolutions |
Data Mining |
2023 |
Click Here |
5 |
Fine-Grained Relation Extraction for Drug Instructions Using Contrastive Entity Enhancement |
Data Mining |
2023 |
Click Here |
6 |
Modeling Health Stage Development of Patients with Dynamic Attributed Graphs in Online Health Communities |
Data Mining |
2023 |
Click Here |
7 |
Modeling Human Driving Behavior through Generative Adversarial Imitation Learning |
Data Mining |
2023 |
Click Here |
8 |
Multi-Objective Dynamic Software Project Scheduling: A Novel Approach to Handle Employee’s Addition |
Data Mining |
2023 |
Click Here |
9 |
NetFense: Adversarial Defenses against Privacy Attacks on Neural Networks for Graph Data |
Data Mining |
2023 |
Click Here |
10 |
Optimal Drug Dosage Control Strategy of Immune Systems Using Reinforcement Learning |
Data Mining |
2023 |
Click Here |
11 |
Remaining Shelf-Life Estimation of Fresh Fruits and Vegetables During Transportation |
Data Mining |
2023 |
Click Here |
12 |
Two Stage Job Title Identification System for Online Job Advertisements |
Data Mining |
2023 |
Click Here |
13 |
Shopping Hard or Hardly Shopping: Revealing Consumer Segments Using Clickstream Data |
Data Mining |
2023 |
Click Here |
CYBERNETICS |
||||
1 |
A Dynamic Data Slice Approach to the Vulnerability Analysis of E-Commerce Systems |
Cybernetics |
2023 |
Click Here |
2 |
Data Trust Framework Using Blockchain Technology and Adaptive Transaction Validation |
Cybernetics |
2023 |
Click Here |
SOCIAL NETWORKS & NETWORKS |
||||
1 |
Friendship Inference in Mobile Social Networks: Exploiting Multi-Source Information With Two-Stage Deep Learning Framework |
Social Networks |
2023 |
Click Here |
2 |
Socio-Technical Ecosystem Considerations: An Emergent Research Agenda for AI in Cybersecurity |
Social Networks |
2023 |
Click Here |
3 |
Complaint and Severity Identification from Online Financial Content |
Social Networks |
2023 |
Click Here |
4 |
Behavioral Model for Live Detection of Apps Based Attack |
Social Networks |
2023 |
Click Here |
5 |
Explainable Misinformation Detection Across Multiple Social Media Platforms |
Social Networks |
2023 |
Click Here |
6 |
Online POI Recommendation: Learning Dynamic Geo-Human Interactions in Streams |
Social Networks |
2023 |
Click Here |
7 |
Target-Oriented Investigation of Online Abusive Attacks: A Dataset and Analysis |
Social Networks |
2023 |
Click Here |
8 |
Textual Pre-Trained Models for Gender Identification Across Community Question-Answering Members |
Social Networks |
2023 |
Click Here |
9 |
Travel Direction Recommendation Model Based on Photos of User Social Network Profile |
Social Networks |
2023 |
Click Here |
10 |
Mitigating Influence of Disinformation Propagation Using Uncertainty-Based Opinion Interactions |
Social Networks |
2023 |
Click Here |
11 |
Limited-Trust in Diffusion of Competing Alternatives over Social Networks |
Social Networks |
2023 |
Click Here |
12 |
Detecting Fraudulent Student Communication in a Multiple Choice Online Test Environment |
Social Networks |
2023 |
Click Here |
13 |
Consumer Behavior Analysis on Sales Process Model Using Process Discovery Algorithm for the Omnichannel Distribution System |
Social Networks |
2023 |
Click Here |
14 |
Credible Expert Rank: Leveraging Social Network Analysis and Opinion Mining to Facilitate Reliable Information Retrieval on Knowledge-Sharing Sites |
Social Networks |
2023 |
Click Here |
15 |
Exploring the Contextual Factors Affecting Multimodal Emotion Recognition in Videos |
Social Networks |
2023 |
Click Here |
16 |
Multi-Objective Optimization of Evacuation Route for Heterogeneous Passengers in the Metro Station Considering Node Efficiency |
Social Networks |
2023 |
Click Here |
17 |
Assessing the Impact of Contextual Information in Hate Speech Detection |
Social Networks |
2023 |
Click Here |
DEPENDABLE AND SECURE COMPUTING |
||||
1 |
PhiKitA: Phishing Kit Attacks Dataset for Phishing Websites Identification |
Secure Computing |
2023 |
Click Here |
2 |
On Detecting Route Hijacking Attack in Opportunistic Mobile Networks |
Secure Computing |
2023 |
Click Here |
3 |
Sanare: Pluggable Intrusion Recovery for Web Applications |
Secure Computing |
2023 |
Click Here |
4 |
A URL-Based Social Semantic Attacks Detection With Character-Aware Language Model |
Secure Computing |
2023 |
Click Here |
5 |
Achieving Online and Scalable Information Integrity by Harnessing Social Spam Correlations |
Secure Computing |
2023 |
Click Here |
6 |
Secure, ID Privacy and Inference Threat Prevention Mechanisms for Distributed Systems |
Secure Computing |
2023 |
Click Here |
7 |
Vulnerability Evaluation Method for E-Commerce Transaction Systems With Unobservable Transitions |
Secure Computing |
2023 |
Click Here |
8 |
SpADe: Multi-Stage Spam Account Detection for Online Social Networks |
Secure Computing |
2023 |
Click Here |
MOBILE COMPUTING
|
||||
1 |
CrowdPatrol: A Mobile Crowdsensing Framework for Traffic Violation Hotspot Patrolling |
Mobile Computing |
2023 |
Click Here |
2 |
A Sensing, Communication and Computing Approach for Vulnerable Road Users Safety |
Mobile Computing |
2023 |
Click Here |
3 |
Characterizing Mobile Money Phishing Using Reinforcement Learning |
Mobile Computing |
2023 |
Click Here |
4 |
Enabling Balanced Data Deduplication in Mobile Edge Computing |
Mobile Computing |
2023 |
Click Here |
5 |
Hiring a Team from Social Network: Incentive Mechanism Design for Two-tiered Social Mobile Crowdsourcing |
Mobile Computing |
2023 |
Click Here |
6 |
RedPacketBike: A Graph-Based Demand Modeling and Crowd-Driven Station Rebalancing Framework for Bike Sharing Systems |
Mobile Computing |
2023 |
Click Here |
7 |
Smart Edge-Based Driver Drowsiness Detection in Mobile Crowd sourcing |
Mobile Computing |
2023 |
Click Here |
8 |
Urban Wellbeing: A Portable Sensing Approach to unravel the link between Environment and Mental Wellbeing |
Mobile Computing |
2023 |
Click Here |
IMAGE PROCESSING |
||||
1 |
PhotoHelper: Portrait Photographing Guidance Via Deep Feature Retrieval and Fusion |
Image Processing |
2023 |
Click Here |
2 |
ReLoc: A Restoration-Assisted Framework for Robust Image Tampering Localization |
Image Processing |
2023 |
Click Here |
3 |
HoVer-Trans: Anatomy-Aware HoVer-Transformer for ROI-Free Breast Cancer Diagnosis in Ultrasound Images |
Image Processing |
2023 |
Click Here |
4 |
Hercules: Deep Hierarchical Attentive Multilevel Fusion Model With Uncertainty Quantification for Medical Image Classification |
Image Processing |
2023 |
Click Here |
5 |
HybrUR: A Hybrid Physical-Neural Solution for Unsupervised Underwater Image Restoration |
Image Processing |
2023 |
Click Here |
Live Demo is available on youtube.You can click on demo link and can download the video for further reference and send your title name to the following email id to get base paper and Abstract.Please mention your degree and other requirements also.. | ||||
Cloud Computing |
||||
Sl.No |
Project Title Name |
Domain |
Year |
Demo |
1 |
Privacy-Preserving Public Auditing for Shared Cloud Data With Secure Group Management |
Cloud Computing |
2022 |
Click Here |
2 |
BOEW: A Content-based Image Retrieval Scheme using Bag-of-Encrypted-Words in Cloud Computing |
Cloud Computing |
2022 |
Click Here |
3 |
Cloud Raid: Detecting Distributed Concurrency Bugs via Log Mining and Enhancement |
Cloud Computing |
2022 |
Click Here |
4 |
Data Integrity Audit Scheme Based on Blockchain Expansion Technology |
Cloud Computing |
2022 |
Click Here |
5 |
Data Integrity Audit Based on Data Blinding for Cloud and Fog Environment |
Cloud Computing |
2022 |
Click Here |
6 |
Achieving Efficient Secure Deduplication with User-Defined Access Control in Cloud |
Cloud Computing |
2022 |
Click Here |
7 |
Efficient CP-ABE Scheme with Shared Decryption in Cloud Storage |
Cloud Computing |
2022 |
Click Here |
8 |
VeriDedup: A Verifiable Cloud Data Deduplication Scheme with Integrity and Duplication Proof |
Cloud Computing |
2022 |
Click Here |
9 |
Identity-Based Privacy Preserving Remote Data Integrity Checking With a Designated Verifier |
Cloud Computing |
2022 |
Click Here |
10 |
Efficient Identity-based Provable Multi-Copy Data Possession in Multi-Cloud Storage |
Cloud Computing |
2022 |
Click Here |
11 |
Secure and Lightweight Fine-grained Searchable Data Sharing for IoT-oriented and Cloud-assisted Smart Healthcare System |
Cloud Computing |
2022 |
Click Here |
12 |
PMRSS: Privacy-preserving Medical Record Searching Scheme for Intelligent Diagnosis in IoT Healthcare |
Cloud Computing |
2022 |
Click Here |
13 |
DSAS: A Secure Data Sharing and Authorized Searchable Framework for e-Healthcare System |
Cloud Computing |
2022 |
Click Here |
14 |
Enabling Efficient, Secure and Privacy-preserving Mobile Cloud Storage |
Cloud Computing |
2022 |
Click Here |
15 |
Enabling Verifiable and Dynamic Ranked Search Over Outsourced Data |
Cloud Computing |
2022 |
Click Here |
16 |
Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage |
Cloud Computing |
2022 |
Click Here |
17 |
Lightweight and Expressive Fine-grained Access Control for Healthcare Internet-of-Things |
Cloud Computing |
2022 |
Click Here |
18 |
Web Cloud: Web-Based Cloud Storage for Secure Data Sharing across Platforms |
Cloud Computing |
2022 |
Click Here |
19 |
Verifiable Searchable Encryption Framework against Insider Keyword-Guessing Attack in Cloud Storage |
Cloud Computing |
2022 |
Click Here |
20 |
Revocable Identity-Based Access Control for Big Data with Verifiable Outsourced Computing |
Cloud Computing |
2022 |
Click Here |
21 |
Server-Aided Fine-Grained Access Control Mechanism with Robust Revocation in Cloud Computing |
Cloud Computing |
2022 |
Click Here |
22 |
Secure Cloud Data Deduplication with Efficient Re-encryption |
Cloud Computing |
2022 |
Click Here |
23 |
A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain |
Cloud Computing |
2022 |
Click Here |
24 |
A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds |
Cloud Computing |
2022 |
Click Here |
25 |
Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT |
Cloud Computing |
2022 |
Click Here |
26 |
Authorized Keyword Search over Outsourced Encrypted Data in Cloud Environment |
Cloud Computing |
2022 |
Click Here |
27 |
Dual Access Control for Cloud-Based Data Storage and Sharing |
Cloud Computing |
2022 |
Click Here |
28 |
Dual-Server Public-Key Authenticated Encryption with Keyword Search |
Cloud Computing |
2022 |
Click Here |
29 |
Enabling Fast Public Auditing and Data Dynamics in Cloud Services |
Cloud Computing |
2022 |
Click Here |
30 |
Fast Secure and Anonymous Key Agreement Against Bad Randomness for Cloud Computing |
Cloud Computing |
2022 |
Click Here |
31 |
Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers |
Cloud Computing |
2022 |
Click Here |
32 |
Practical Multi-Keyword Ranked Search With Access Control Over Encrypted Cloud Data |
Cloud Computing |
2022 |
Click Here |
33 |
Publicly Verifiable Shared Dynamic Electronic Health Record Databases With Functional Commitment Supporting Privacy-Preserving Integrity Auditing |
Cloud Computing |
2022 |
Click Here |
34 |
Similarity Search for Encrypted Images in Secure Cloud Computing |
Cloud Computing |
2022 |
Click Here |
35 |
Auction based Resource Allocation Mechanism in Federated Cloud Environment: TARA |
Cloud Computing |
2022 |
Click Here |
36 |
Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data | Cloud Computing |
2022 |
Click Here |
BLOCKCHAIN
|
||||
1 |
A Secure E-Coupon Service Based on Blockchain Systems |
Block Chain |
2022 |
Click Here |
2 |
A Block chain Based System for Healthcare Digital Twin |
Block Chain |
2022 |
Click Here |
3 |
Block chain technology for protecting the banking transaction without using tokens |
Block Chain |
2022 |
Click Here |
4 |
Privacy-Preserving Framework for Blockchain-Based Stock Exchange Platform |
Block Chain |
2022 |
Click Here |
5 |
Blockchain-Based Electronic Health Records Management: A Comprehensive Review and Future Research Direction |
Block Chain |
2022 |
Click Here |
6 |
Blockchain-Based Management for Organ Donation and Transplantation |
Block Chain |
2022 |
Click Here |
7 |
Blockchain-based Management of Blood Donation |
Block Chain |
2022 |
Click Here |
8 |
Blockchain Technology for Secure Supply Chain Management A Comprehensive Review |
Block Chain |
2022 |
Click Here |
9 |
Enabling Trust and Privacy-Preserving e-KYC System Using Blockchain |
Block Chain |
2022 |
Click Here |
10 |
Decentralized Blockchain-Based Trust Management Protocol for the Internet of Things |
Block Chain |
2022 |
Click Here |
11 |
Protecting Vaccine Safety: An Improved, Blockchain-Based, Storage-Efficient Scheme |
Block Chain |
2022 |
Click Here |
12 |
Blockchain as a Cyber Defense: Opportunities, Applications, and Challenges |
Block Chain |
2022 |
Click Here |
13 |
Automatic Generation of Ethereum-Based Smart Contracts for Agri-Food Traceability System |
Block Chain |
2022 |
Click Here |
14 |
Towards Blockchain Based Secure Storage and Trusted Data Sharing Scheme for IoT Environment |
Block Chain |
2022 |
Click Here |
15 |
Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-based IIoT Networks |
Block Chain |
2022 |
Click Here |
16 |
VFChain: Enabling Verifiable and Auditable Federated Learning via Blockchain Systems |
Block Chain |
2022 |
Click Here |
17 |
A Blockchain Approach to Ensuring Provenance to Outsourced Cloud Data in a Sharing Ecosystem |
Block Chain |
2022 |
Click Here |
18 |
PROTECTING PERSONAL HEALTHCARE RECORD USING BLOCK CHAIN |
Block Chain |
2022 |
Click Here |
DATA MINING |
||||
1 |
Social Media Driven Big Data Analysis for Disaster Situation Awareness: A Tutorial |
Data Mining |
2022 |
Click Here |
2 |
Activity Organization for Friend-Making Optimization in Online Social Networks |
Data Mining |
2022 |
Click Here |
3 |
Predicting Hot Events in the Early Period through Bayesian Model for Social Networks |
Data Mining |
2022 |
Click Here |
4 |
Modeling Health Stage Development of Patients with Dynamic Attributed Graphs in Online Health Communities |
Data Mining |
2022 |
Click Here |
5 |
Principle-Based Approach for the De-Identification of Code-Mixed Electronic Health Records |
Data Mining |
2022 |
Click Here |
6 |
Evaluating Public Anxiety for Topic-based Communities in Social Networks |
Data Mining |
2022 |
Click Here |
7 |
Feature Selection Algorithms For Predicting Students Academic Performance Using Data Mining Techniques |
Data Mining |
2022 |
Click Here |
8 |
HinCTI: A Cyber Threat Intelligence Modeling and Identification System Based on Heterogeneous Information Network |
Data Mining |
2022 |
Click Here |
9 |
Item Recommendation for Word-of-Mouth Scenario in Social ECommerce |
Data Mining |
2022 |
Click Here |
10 |
Modeling Product’s Visual and Functional Characteristics for Recommender Systems |
Data Mining |
2022 |
Click Here |
11 |
Racism Detection by Analyzing Differential Opinions Through Sentiment Analysis of Tweets Using Stacked Ensemble GCR-NN Model |
Data Mining |
2022 |
Click Here |
12 |
Rating Prediction With Review Network Feedback: A New Direction in Recommendation |
Data Mining |
2022 |
Click Here |
13 |
Exploring E-Commerce Product Experience Based on Fusion Sentiment Analysis Method |
Data Mining |
2022 |
Click Here |
14 |
User Identity Linkage via Co-Attentive Neural Network from Heterogeneous Mobility Data |
Data Mining |
2022 |
Click Here |
CYBERNETICS |
||||
1 |
Trustworthiness Assessment of Users in Social Reviewing Systems |
Cybernetics |
2022 |
Click Here |
2 |
A Learning-Based POI Recommendation With Spatiotemporal Context Awareness |
Cybernetics |
2022 |
Click Here |
3 |
False-Data-Injection Attacks on Remote Distributed Consensus Estimation |
Cybernetics |
2022 |
Click Here |
SOCIAL NETWORKS & NETWORKS
|
||||
1 |
The Effect of Social Media User Behaviors on Security and Privacy Threats |
Social Networks |
2022 |
Click Here |
2 |
A Taxonomy of Fake News Classification Techniques: Survey and Implementation Aspects |
Social Networks |
2022 |
Click Here |
3 |
The Social Media Break-Up: Psycho-Behavioral Measures and Implications |
Social Networks |
2022 |
Click Here |
4 |
Composite Behavioral Modeling for Identity Theft Detection in Online Social Networks |
Social Networks |
2022 |
Click Here |
5 |
Social Spammer Detection via Convex Nonnegative Matrix Factorization |
Social Networks |
2022 |
Click Here |
6 |
Social Engineering Attacks Prevention: A Systematic Literature Review |
Social Networks |
2022 |
Click Here |
7 |
Cross-Platform Reputation Generation System Based on Aspect-Based Sentiment Analysis |
Social Networks |
2022 |
Click Here |
8 |
PredicTour: Predicting Mobility Patterns of Tourists Based on Social Media User's Profiles |
Social Networks |
2022 |
Click Here |
9 |
DEA-RNN: A Hybrid Deep Learning Approach for Cyberbullying Detection in Twitter Social Media Platform |
Social Networks |
2022 |
Click Here |
10 |
FADOHS: Framework for Detection and Integration of Unstructured Data of Hate Speech on Facebook Using Sentiment and Emotion Analysis |
Social Networks |
2022 |
Click Here |
11 |
Toward Data Justice Understanding Police Shooting Data Systems and Narratives |
Social Networks |
2022 |
Click Here |
12 |
Intelligent Distribution of Fresh Agricultural Products in Smart City |
Social Networks |
2022 |
Click Here |
13 |
Influence Based Defense Against Data Poisoning Attacks in Online Learning |
Social Networks |
2022 |
Click Here |
14 |
DetectDUI: An In-Car Detection System for Drink Driving and BACs |
Social Networks |
2022 |
Click Here |
DEPENDABLE AND SECURE COMPUTING |
||||
1 |
Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack |
Secure Computing |
2022 |
Click Here |
2 |
One Parameter Defense - Defending against Data Inference Attacks via Differential Privacy |
Secure Computing |
2022 |
Click Here |
3 |
An Explainable Multi-Modal Hierarchical Attention Model for Developing Phishing Threat Intelligence |
Secure Computing |
2022 |
Click Here |
4 |
Blockchain-based Certificate Transparency and Revocation Transparency |
Secure Computing |
2022 |
Click Here |
5 |
CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments |
Secure Computing |
2022 |
Click Here |
6 |
Cyber security Awareness in Online Education: A Case Study Analysis |
Secure Computing |
2022 |
Click Here |
7 |
Detecting Sybil Attacks using Proofs of Work and Location in VANETs |
Secure Computing |
2022 |
Click Here |
8 |
Representing Fine-Grained Co-Occurrences for Behavior-Based Fraud Detection in Online Payment Services |
Secure Computing |
2022 |
Click Here |
9 |
Efficient Certificateless Multi-Copy Integrity Auditing Scheme Supporting Data Dynamics |
Secure Computing |
2022 |
Click Here |
10 |
Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme with Enhanced Security Provision |
Secure Computing |
2022 |
Click Here |
11 |
EntrapNet: a Blockchain-Based Verification Protocol for Trustless Computing |
Secure Computing |
2022 |
Click Here |
12 |
Trust But Verify: a framework for the trustworthiness of distributed systems |
Secure Computing |
2022 |
Click Here |
13 |
Lightweight and Certificateless Multi-Receiver Secure Data Transmission Protocol for Wireless Body Area Networks |
Secure Computing |
2022 |
Click Here |
14 |
Achieve Efficient and Privacy-preserving Disease Risk Assessment over Multi-outsourced Vertical Datasets |
Secure Computing |
2022 |
Click Here |
15 |
Quantum-Safe Round-Optimal Password Authentication for Mobile Devices |
Secure Computing |
2022 |
Click Here |
16 |
A Real Time Firewall Policy Rule Set Anomaly Free Mechanism |
Secure Computing |
2022 |
Click Here |
17 |
SC-TRUST: A Dynamic Model for Trustworthy Service Composition in the Internet of Things |
Secure Computing |
2022 |
Click Here |
18 |
SCA: Sybil-based Collusion Attacks of IIoT Data Poisoning in Federated Learning |
Secure Computing |
2022 |
Click Here |
MOBILE COMPUTING
|
||||
1 |
Trust Based Incentive Scheme to Allocate Big Data Tasks with Mobile Social Cloud |
Mobile Computing |
2022 |
Click Here |
2 |
Eclipse: Preserving Differential Location Privacy Against Long-Term Observation Attacks |
Mobile Computing |
2022 |
Click Here |
3 |
Towards Personalized Privacy-Preserving Incentive for Truth Discovery in Mobile Crowd sensing Systems |
Mobile Computing |
2022 |
Click Here |
4 |
Secure Mobile Edge Computing Networks in the Presence of Multiple Eavesdroppers |
Mobile Computing |
2022 |
Click Here |
5 |
Membership Inference Attack and Defense for Wireless Signal Classifiers with Deep Learning |
Mobile Computing |
2022 |
Click Here |
IMAGE PROCESSING |
||||
1 |
Show, Price and Negotiate A Negotiator With Online Value Look-Ahead |
Image Processing |
2022 |
Click Here |
2 |
Multi-modal Meta Multi-Task Learning for Social Media Rumor Detection |
Image Processing |
2022 |
Click Here |
3 |
Asymmetric Hash Code Learning for Remote Sensing Image Retrieval |
Image Processing |
2022 |
Click Here |
4 |
Scalable Distributed Hashing for Approximate Nearest Neighbor Search |
Image Processing |
2022 |
Click Here |
5 |
SAC: Semantic Attention Composition for Text-Conditioned Image Retrieval |
Image Processing |
2022 |
Click Here |
6 |
Global-Aware Ranking Deep Metric Learning for Remote Sensing Image Retrieval |
Image Processing |
2022 |
Click Here |
7 |
Hash Learning with Variable Quantization for Large-scale Retrieval |
Image Processing |
2022 |
Click Here |
Live 2021 and 2022 JAVA IEEE Projects List --- Download
Live Demo is available on youtube.You can click on demo link and can download the video for further reference and send your title name to the following email id to get base paper and Abstract.Please mention your degree and other requirements also.. | ||||
Cloud Computing |
||||
Sl.No |
Project Title Name |
Domain |
Year |
Demo |
1 |
Pocket Diagnosis: Secure Federated Learning against Poisoning Attack in the Cloud |
Cloud Computing |
2021 |
Click Here |
2 |
Detecting Suspicious File Migration or Replication in the Cloud |
Cloud Computing |
2021 |
Click Here |
3 |
CryptCloud+: Secure and Expressive Data Access Control for Cloud Storage |
Cloud Computing |
2021 |
Click Here |
4 |
Attacking and Protecting Data Privacy in Edge-Cloud Collaborative Inference Systems |
Cloud Computing |
2021 |
Click Here |
5 |
A Verifiable Semantic Searching Scheme by Optimal Matching over Encrypted Data in Public Cloud |
Cloud Computing |
2021 |
Click Here |
6 |
An Efficient Ciphertext Index Retrieval Scheme based on Edge Computing Framework |
Cloud Computing |
2021 |
Click Here |
7 |
Efficient Revocable Multi-Authority Attribute-Based Encryption for Cloud Storage |
Cloud Computing |
2021 |
Click Here |
8 |
Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness |
Cloud Computing |
2021 |
Click Here |
9 |
A Fast Nearest Neighbor Search Scheme over Outsourced Encrypted Medical Images |
Cloud Computing |
2021 |
Click Here |
10 |
A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain |
Cloud Computing |
2020 |
Click Here |
11 |
Certificateless public integrity checking of group shared data on cloud storage |
Cloud Computing |
2021 |
Click Here |
12 |
Efficient Identity-Based Distributed Decryption Scheme for Electronic Personal Health Record Sharing System |
Cloud Computing |
2021 |
Click Here |
13 |
Multi authority Attribute Based Keyword Search over Encrypted Cloud Data |
Cloud Computing |
2021 |
Click Here |
14 |
PPCSA A Privacy Preserving Cloud Storage Auditing Scheme for Data Sharing |
Cloud Computing |
2021 |
Click Here |
15 |
RACE Resource Aware Cost-Efficient Scheduler for Cloud Fog Environment |
Cloud Computing |
2021 |
Click Here |
16 |
Enabling Secure and Space-Efficient Metadata Management in Encrypted Deduplication |
Cloud Computing |
2021 |
Click Here |
17 |
Privacy-Preserving Media Sharing with Scalable Access Control and Secure Deduplication in Mobile Cloud Computing |
Cloud Computing |
2021 |
Click Here |
18 |
Efficient Auditing Scheme for Secure Data Storage in Fog-to-Cloud Computing |
Cloud Computing |
2021 |
Click Here |
19 |
A Statistical Inference Attack on Privacy-Preserving Biometric Identification Scheme |
Cloud Computing |
2021 |
Click Here |
20 |
A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users |
Cloud Computing |
2021 |
Click Here |
21 |
Accountable Proxy Re-Encryption for Secure Data Sharing |
Cloud Computing |
2021 |
Click Here |
22 |
Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data |
Cloud Computing |
2021 |
Click Here |
23 |
Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud |
Cloud Computing |
2021 |
Click Here |
24 |
Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments |
Cloud Computing |
2021 |
Click Here |
25 |
Dual Access Control for Cloud-Based Data Storage and Sharing |
Cloud Computing |
2021 |
Click Here |
26 |
Inference Attack-Resistant E-Healthcare Cloud System with Fine-Grained Access Control |
Cloud Computing |
2021 |
Click Here |
27 |
Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data Cloud Computing |
Cloud Computing |
2021 |
Click Here |
28 |
Practical Multi keyword Ranked Search with Access Control over Encrypted Cloud Data |
Cloud Computing |
2021 |
Click Here |
29 |
Privacy Preserving Searchable Encryption with Fine-grained Access Control |
Cloud Computing |
2021 |
Click Here |
30 |
Dynamic Group-Oriented Provable Data Possession in the Cloud |
Cloud Computing |
2021 |
Click Here |
31 |
Publicly Verifiable Shared Dynamic Electronic Health Record Databases with Functional Commitment Supporting Privacy-Preserving Integrity Auditing |
Cloud Computing |
2021 |
Click Here |
32 |
Secure Fine-Grained Encrypted Keyword Search for E-Healthcare Cloud |
Cloud Computing |
2021 |
Click Here |
33 |
SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage |
Cloud Computing |
2021 |
Click Here |
34 |
SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the Cloud |
Cloud Computing |
2021 |
Click Here |
35 |
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification |
Cloud Computing |
2021 |
Click Here |
36 | A Fine-Grained and Lightweight Data Access Control Model for Mobile Cloud Computing | Cloud Computing |
2021 |
Click Here |
BLOCKCHAIN
|
||||
1 |
A Blockchain based Autonomous Decentralized Online Social Network |
Block Chain |
2021 |
Click Here |
2 |
A Blockchain-based Approach for Drug Traceability in Healthcare Supply Chain |
Block Chain |
2021 |
Click Here |
3 |
A Trusted Blockchain-Based Traceability System for Fruit and Vegetable Agricultural Products |
Block Chain |
2021 |
Click Here |
4 |
Blockchain Assisted Collaborative Service Recommendation Scheme With Data Sharing |
Block Chain |
2021 |
Click Here |
5 |
Blockchain Based Accounts Payable Platform for Goods Trade |
Block Chain |
2021 |
Click Here |
6 |
Blockchain-based Decentralized Authentication Modeling Scheme in Edge and IoT Environment |
Block Chain |
2021 |
Click Here |
8 |
Fortified Chain A Blockchain Based Framework for Security and Privacy Assured Internet of Medical Things |
Block Chain |
2021 |
Click Here |
INTERNET OF THINGS(IOT) |
||||
1 |
Fast Containment of Infectious Diseases with E-healthcare Mobile Social Internet of Things |
IOT |
2021 |
Click Here |
2 |
SBBS A Secure Blockchain-Based Scheme for IoT Data Credibility in Fog Environment |
IOT |
2021 |
Click Here |
3 |
Social Interaction and Information Diffusion in Social Internet of Things Dynamics Cloud Edge Traceability |
IOT |
2021 |
Click Here |
4 |
Trustworthy Digital Twins in the Industrial Internet of Things with Blockchain |
IOT |
2021 |
Click Here |
5 |
A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Block chain |
IOT |
2021 |
Click Here |
6 |
Dynamic Resource Allocation and Computation Offloading for IoT Fog Computing System |
IOT |
2021 |
Click Here |
7 |
Secure ABE Scheme for Access Management in Blockchain-Based IoT |
IOT |
2021 |
Click Here |
8 |
Timely Detection and Mitigation of Stealthy DDoS Attacks via IoT Networks |
IOT |
2021 |
Click Here |
9 |
Towards Fine-Grained Access Control in Enterprise-Scale Internet-of-Things |
IOT |
2021 |
Click Here |
10 |
Toward Detection and Attribution of Cyber-Attacks in IoT-enabled Cyber-physical Systems |
IOT |
2021 |
Click Here |
DATA MINING |
||||
1 |
Mining Fraudsters and Fraudulent Strategies in Large-Scale Mobile Social |
Data Mining |
2021 |
Click Here |
2 |
Method for Ranking the Helpfulness of Online Reviews Based on SO-ILES TODIM |
Data Mining |
2021 |
Click Here |
3 |
Leveraging Affective Hashtags for Ranking Music Recommendations |
Data Mining |
2021 |
Click Here |
4 |
Personality aware Product Recommendation System based on User Interests Mining and Meta path Discovery |
Data Mining |
2021 |
Click Here |
5 |
Suicidal Ideation Detection: A Review of Machine Learning Methods and Applications |
Data Mining |
2021 |
Click Here |
6 |
“What Do Your Friends Think” Efficient Polling Methods for Networks Using Friendship Paradox |
Data Mining |
2021 |
Click Here |
7 |
Discovering Hidden Topical Hubs and Authorities Across Multiple Online Social Networks |
Data Mining |
2021 |
Click Here |
8 |
Improvising Personalized Travel Recommendation System with Recency Effects |
Data Mining |
2021 |
Click Here |
9 |
Modeling Influence Diffusion over Signed Social Networks |
Data Mining |
2021 |
Click Here |
10 |
Popularity Prediction for Single Tweet based on Heterogeneous Bass Model |
Data Mining |
2021 |
Click Here |
11 |
Query Expansion with Local Conceptual Word Embeddings in Microblog Retrieval |
Data Mining |
2021 |
Click Here |
12 |
Sentiment Polarity Classification at EVALITA: Lessons Learned and Open Challenges |
Data Mining |
2021 |
Click Here |
13 |
Robust Detection of Link Communities With Summary Description in Social Networks |
Data Mining |
2021 |
Click Here |
14 |
Rumor Source Detection With Multiple Observations Under Adaptive Diffusions |
Data Mining |
2021 |
Click Here |
15 |
User-Driven Geolocated Event Detection in Social Media |
Data Mining |
2021 |
Click Here |
BIG DATA |
||||
1 |
Hybrid Recommender System for Tourism Based on Big Data and AI A Conceptual Framework |
Bigdata |
2021 |
Click Here |
2 |
A Searchable and Verifiable Data Protection Scheme for Scholarly Big Data |
Bigdata |
2021 |
Click Here |
SOCIAL NETWORKS & NETWORKS
|
||||
1 |
Sentiment Analysis of Lockdown in India During COVID19 A Case Study |
Social Networks |
2021 |
Click Here |
2 |
Detecting Mental Disorders in Social Media Through Emotional Patterns The case of Anorexia and Depression |
Social Networks |
2021 |
Click Here |
3 |
Dynamic Control of Fraud Information Spreading in Mobile Social Networks |
Social Networks |
2021 |
Click Here |
4 |
Load Photo A Novel Analysis Method for Load Data | Social Networks |
2021 |
Click Here |
5 |
Public Opinion Analysis on Novel Coronavirus Pneumonia and Interaction With Event Evolution in Real World |
Social Networks |
2021 |
Click Here |
6 |
Trust Assessment in Online Social Networks |
Social Networks |
2021 |
Click Here |
7 |
Trace Me If You Can An Unlinkability Approach for Privacy-Preserving in Social Networks |
Social Networks |
2021 |
Click Here |
8 |
Leveraging Social Network Analysis for Characterizing Cohesion of Human-Managed Animals |
Social Networks |
2021 |
Click Here |
9 |
Privacy-Preserving Media Sharing with Scalable Access Control and Secure De duplication in Mobile Cloud Computing |
Social Networks |
2021 |
Click Here |
10 |
Social Recommendation With Learning Personal and Social Latent Factors |
Social Networks |
2021 |
Click Here |
SECURE COMPUTING |
||||
1 |
oGBAC A Group Based Access Control Framework for Information Sharing in Online Social Networks |
Secure Computing |
2021 |
Click Here |
2 |
Privacy Preserving Electronic Ticket Scheme with Attribute based Credentials |
Secure Computing |
2021 |
Click Here |
3 |
Fraud Detection in Online Product Review Systems via Heterogeneous Graph Transformer |
Secure Computing |
2021 |
Click Here |
4 |
Protecting Your Shopping Preference with Differential Privacy |
Secure Computing |
2021 |
Click Here |
5 |
Sensitive Label Privacy Preservation with Anatomization for Data Publishing |
Secure Computing |
2021 |
Click Here |
6 |
BullyNet: Unmasking Cyberbullies on Social Networks |
Secure Computing |
2021 |
Click Here |
7 |
Quantifying Membership Privacy via Information Leakage |
Secure Computing |
2021 |
Click Here |
8 |
Privacy Preserving Location-Aware Personalized Web Service Recommendations |
Secure Computing |
2021 |
Click Here |
SOFTWARE ENGINEERING,SERVICE COMPUTING |
||||
1 |
Crisis-Critical Intellectual Property Findings From the COVID-19 Pandemic |
Software Engineering |
2021 |
Click Here |
MOBILE COMPUTING
|
||||
1 |
Privacy Preserving Media Sharing with Scalable Access Control and Secure Deduplication in Mobile Cloud Computing |
Mobile Computing |
2021 |
Click Here |
2 |
PROTECT Efficient Password-Based Threshold Single-Sign-On Authentication for Mobile Users against Perpetual Leakage |
Vehicular Technology |
2021 |
Click Here |
IMAGE PROCESSING |
||||
1 |
Load Photo A Novel Analysis Method for Load Data |
Image Processing |
2021 |
Click Here |
Live 2020 and 2021 JAVA IEEE Projects List --- Download
Live Demo is available on youtube.You can click on demo link and can download the video for further reference and send your title name to the following email id to get base paper and Abstract.Please mention your degree and other requirements also.. | ||||
Cloud Computing |
||||
Sl.No |
Project Title Name |
Domain |
Year |
Demo |
1 |
A Verifiable Semantic Searching Scheme by Optimal Matching over Encrypted Data in Public Cloud |
Cloud Computing |
2020 |
Click Here |
2 |
Achieving Practical Symmetric Searchable Encryption with Search Pattern Privacy over Cloud |
Cloud Computing |
2020 |
Click Here |
3 |
Achieving Searchable Encryption Scheme with Search Pattern Hidden |
Cloud Computing |
2020 |
Click Here |
4 |
Authentication and Key Agreement Based on Anonymous Identity for Peer-to-Peer Cloud |
Cloud Computing |
2020 |
Click Here |
5 |
CloudRaid Detecting Distributed Concurrency Bugs via Log-Mining and Enhancement |
Cloud Computing |
2020 |
Click Here |
6 |
Designing Secure and Efficient Biometric-Based Secure Access Mechanism for Cloud Services |
Cloud Computing |
2020 |
Click Here |
7 |
Lightweight Privacy-preserving Medical Diagnosis in Edge Computing |
Cloud Computing |
2020 |
Click Here |
8 |
Personality and Value-aware Scheduling of User Requests in Cloud for Profit Maximization |
Cloud Computing |
2020 |
Click Here |
9 |
Privacy-preserving Efficient Verifiable Deep Packet Inspection for Cloud-assisted Middlebox |
Cloud Computing |
2020 |
Click Here |
10 |
Privacy-preserving Medical Treatment System through Nondeterministic Finite Automata |
Cloud Computing |
2020 |
Click Here |
11 |
Privacy-Preserving Outsourced Inner Product Computation on Encrypted Database |
Cloud Computing |
2020 |
Click Here |
12 |
Proactive Fault-Tolerance Technique to Enhance Reliability of Cloud Service in Cloud Federation Environment |
Cloud Computing |
2020 |
Click Here |
13 |
Publicly Verifiable Shared Dynamic Electronic Health Record Databases |
Cloud Computing |
2020 |
Click Here |
14 |
Revocable Attribute-based Data Storage in Mobile Clouds |
Cloud Computing |
2020 |
Click Here |
15 |
Scalable Discovery of Hybrid Process Models in a Cloud Computing Environment |
Cloud Computing |
2020 |
Click Here |
16 |
Secure Cloud Storage with Data Dynamics Using Secure Network Coding Techniques |
Cloud Computing |
2020 |
Click Here |
17 |
Secure Keyword Search and Data Sharing Mechanism for Cloud Computing |
Cloud Computing |
2020 |
Click Here |
18 |
Secure Similarity Search over Encrypted Non-Uniform Datasets |
Cloud Computing |
2020 |
Click Here |
19 |
Secure Storage Auditing with Efficient Key Updates for Cognitive Industrial IoT Environment |
Cloud Computing |
2020 |
Click Here |
20 |
Semantics of Data Mining Services in Cloud Computing |
Cloud Computing |
2020 |
Click Here |
21 |
Similarity Search for Encrypted Images in Secure Cloud Computing |
Cloud Computing |
2020 |
Click Here |
22 |
Tag-based Verifiable Delegated Set Intersection over Outsourced Private Datasets |
Cloud Computing |
2020 |
Click Here |
23 |
Threshold Multi-keyword Search for Cloud-Based Group Data Sharing |
Cloud Computing |
2020 |
Click Here |
24 |
Towards Secure and Efficient Equality Conjunction Search over Outsourced Databases |
Cloud Computing |
2020 |
Click Here |
25 |
Verifiable Searchable Encryption Framework against Insider Keyword-Guessing Attack in Cloud Storage |
Cloud Computing |
2020 |
Click Here |
26 |
A Secure Enhanced Key-Policy Attribute-Based Temporary Keyword Search Scheme in the Cloud |
Cloud Computing |
2020 |
Click Here |
27 |
Development and Examination of Fog Computing-Based Encrypted Control System. |
Cloud Computing |
2020 |
Click Here |
28 |
A Novel Feature Matching Ranked Search Mechanism Over Encrypted Cloud Data |
Cloud Computing |
2020 |
Click Here |
29 |
A Secure and Efficient Cloud-Centric Internet of Medical Things-Enabled Smart Healthcare System with Public Verifiability |
Cloud Computing |
2020 |
Click Here |
30 |
Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography |
Cloud Computing |
2020 |
Click Here |
31 |
Key Policy Attribute-Based Encryption with Keyword Search in Virtualized Environments |
Cloud Computing |
2020 |
Click Here |
32 |
Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud. |
Cloud Computing |
2020 |
Click Here |
33 |
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud Computing. |
Cloud Computing |
2020 |
Click Here |
34 |
Key-Escrow Free Attribute-Based Multi-Keyword Search with Dynamic Policy Update in Cloud Computing. |
Cloud Computing |
2020 |
Click Here |
35 |
Fast Secure and Anonymous Key Agreement Against Bad Randomness for Cloud Computing. |
Cloud Computing |
2020 |
Click Here |
DATA MINING
|
||||
1 |
A Hidden Markov Contour Tree Model for Spatial Structured Prediction |
Data Mining |
2020 |
Click Here |
2 |
Achieving Practical Symmetric Searchable Encryption with Search Pattern Privacy over Cloud |
Data Mining |
2020 |
Click Here |
3 |
Achieving Secure and Dynamic Range Queries Over Encrypted Cloud Data |
Data Mining |
2020 |
Click Here |
4 |
Adaptive Diffusion of Sensitive Information In Online Social Networks |
Data Mining |
2020 |
Click Here |
5 |
Adaptive Similarity Embedding For Unsupervised Multi-View Feature Selection |
Data Mining |
2020 |
Click Here |
6 |
Adaptively Secure and Fast Processing of Conjunctive Queries over Encrypted Data |
Data Mining |
2020 |
Click Here |
7 |
BATCH A Scalable Asymmetric Discrete Cross-Modal Hashing |
Data Mining |
2020 |
Click Here |
8 |
Cashless Society Managing Privacy and Security in the Technological Age |
Data Mining |
2020 |
Click Here |
9 |
DGDFS Dependence Guided Discriminative Feature Selection for Predicting Adverse Drug-Drug Interaction |
Data Mining |
2020 |
Click Here |
10 |
Discovering Temporal Patterns for Event Sequence Clustering via Policy Mixture Model |
Data Mining |
2020 |
Click Here |
11 |
Effective Keyword Search over Weighted Graphs |
Data Mining |
2020 |
Click Here |
12 |
Efficient Match-Based Candidate Network Generation for Keyword Queries over Relational Databases |
Data Mining |
2020 |
Click Here |
13 |
Efficient Processing of Group Planning Queries Over Spatial-Social Networks |
Data Mining |
2020 |
Click Here |
14 |
Efficiently Processing Spatial and Keyword Queries in Indoor Venues |
Data Mining |
2020 |
Click Here |
15 |
Evaluating Public Anxiety for Topic-based Communities in Social Networks |
Data Mining |
2020 |
Click Here |
16 |
Fast Multi-view Semi-supervised Learning with Learned Graph |
Data Mining |
2020 |
Click Here |
17 |
Fuzzy K-Means Clustering With Discriminative Embedding |
Data Mining |
2020 |
Click Here |
18 |
Guarantee the Quality-of-Service of Control Transactions in Real-Time Database Systems |
Data Mining |
2020 |
Click Here |
19 |
Hierarchical Prediction and Adversarial Learning For Conditional Response Generation |
Data Mining |
2020 |
Click Here |
20 |
Land Use Classification with Point of Interests and Structural Patterns |
Data Mining |
2020 |
Click Here |
21 |
Modeling Relation Paths for Knowledge Graph Completion |
Data Mining |
2020 |
Click Here |
22 |
Multi-view Clustering with the Cooperation of Visible and Hidden Views |
Data Mining |
2020 |
Click Here |
23 |
Online Pricing with Reserve Price Constraint for Personal Data Markets |
Data Mining |
2020 |
Click Here |
24 |
Personalized Long and Short term Preference Learning for Next POI Recommendation |
Data Mining |
2020 |
Click Here |
25 |
Predicting Hot Events in the Early Period through Bayesian Model for Social Networks |
Data Mining |
2020 |
Click Here |
26 |
Predicting Student Performance in an Educational Game Using a Hidden Markov Model |
Data Mining |
2020 |
Click Here |
27 |
Privacy Preserving Location Data Publishing A Machine Learning Approach |
Data Mining |
2020 |
Click Here |
28 |
Product Quantized Collaborative Filtering |
Data Mining |
2020 |
Click Here |
29 |
Publicly Verifiable Databases with All Efficient Updating Operations |
Data Mining |
2020 |
Click Here |
30 |
Scalable and Adaptive Data Replica Placement for Geo-Distributed Cloud Storages |
Data Mining |
2020 |
Click Here |
31 |
Social Boosted Recommendation with Folded Bipartite Network Embedding |
Data Mining |
2020 |
Click Here |
32 |
Emotion Correlation Mining Through Deep Learning Models on Natural Language Textg |
Data Mining |
2020 |
Click Here |
SECURE COMPUTING
|
||||
1 |
A hybrid fault-tolerant scheduling for deadline-constrained tasks in Cloud systems |
Secure Computing |
2020 |
Click Here |
2 |
CloudRaid Detecting Distributed Concurrency Bugs via Log-Mining and Enhancement |
Secure Computing |
2020 |
Click Here |
3 |
Dynamic Resource Allocation and Computation Offloading for IoT Fog Computing System |
Secure Computing |
2020 |
Click Here |
4 |
ECOGreen Electricity Cost Optimization for Green Datacenters in Emerging Power Markets |
Secure Computing |
2020 |
Click Here |
5 |
Efficient Encrypted Data Search with Expressive Queries and Flexible Update |
Secure Computing |
2020 |
Click Here |
6 |
Energy-aware cloud workflow applications scheduling with geo-distributed data |
Secure Computing |
2020 |
Click Here |
7 |
KeySea Keyword-based Search with Receiver Anonymity in Attribute-based Searchable Encryption |
Secure Computing |
2020 |
Click Here |
8 |
Lightweight Privacy-preserving Raw Data Publishing Scheme |
Secure Computing |
2020 |
Click Here |
9 |
Location-Aware Service Recommendations With Privacy-Preservation in the Internet of Things |
Secure Computing |
2020 |
Click Here |
10 |
Lucid A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection |
Secure Computing |
2020 |
Click Here |
11 |
Minimizing Financial Cost of DDoS Attack Defense in Clouds with Fine-Grained Resource Management |
Secure Computing |
2020 |
Click Here |
12 |
Personalized Recommendation System based on Collaborative Filtering for IoT Scenarios |
Secure Computing |
2020 |
Click Here |
13 |
Privacy Preserving QoS Forecasting in Mobile Edge Environments |
Secure Computing |
2020 |
Click Here |
14 |
Provably Efficient Resource Allocation for Edge Service Entities Using Hermes |
Secure Computing |
2020 |
Click Here |
15 |
Reverse Nearest Neighbor Search in Semantic Trajectories for Location based Services |
Secure Computing |
2020 |
Click Here |
16 |
Revocable Attribute-based Data Storage in Mobile Clouds |
Secure Computing |
2020 |
Click Here |
17 |
Scalable Discovery of Hybrid Process Models in a Cloud Computing Environment |
Secure Computing |
2020 |
Click Here |
18 |
Semantics of Data Mining Services in Cloud Computing |
Secure Computing |
2020 |
Click Here |
19 |
Shed+ Optimal Dynamic Speculation to Meet Application Deadlines in Cloud |
Secure Computing |
2020 |
Click Here |
INTERNET OF THINGS(IOT) |
||||
1 |
A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems |
IOT |
2020 |
Click Here |
2 |
An Efficient IoT-Based Platform for Remote Real-Time Cardiac Activity Monitoring |
IOT |
2020 |
Click Here |
3 |
An Efficient Privacy Preserving Message Authentication Scheme for Internet-of-Things |
IOT |
2020 |
Click Here |
4 |
An Efficient Spam Detection Technique for IoT Devices using Machine Learning |
IOT |
2020 |
Click Here |
5 |
Efficient IoT Management with Resilience to Unauthorized Access to Cloud Storage |
IOT |
2020 |
Click Here |
6 |
Efficient Privacy Preserving Data Collection and Computation Offloading for Fog-Assisted IoT |
IOT |
2020 |
Click Here |
7 |
Secure Storage Auditing with Efficient Key Updates for Cognitive Industrial IoT Environment |
IOT |
2020 |
Click Here |
INFORMATION FORENSICS and SECURITY
|
||||
1 |
Sparse Mobile Crowdsensing With Differential and Distortion Location Privacy |
Information Forensics and Secuirty |
2020 |
Click Here |
2 |
A Verifiable Semantic Searching Scheme by Optimal Matching over Encrypted Data in Public Cloud |
Information Forensics and Secuirty |
2020 |
Click Here |
3 |
Pay as You Decrypt Decryption Outsourcing for Functional Encryption Using Blockchain |
Information Forensics and Secuirty |
2020 |
Click Here |
4 |
Securing Resources in Decentralized Cloud Storage |
Information Forensics and Secuirty |
2020 |
Click Here |
5 |
Fake News, Disinformation,and Deepfakes: Leveraging Distributed Ledger Technologies and Blockchain to Combat Digital Deception and Counterfeit Reality |
Information Forensics and Secuirty |
2020 |
Click Here |
6 |
Information Forensics and Secuirty |
2020 |
Click Here |
|
7 |
Information Forensics and Secuirty |
2020 |
Click Here |
|
MOBILE COMPUTING
|
||||
1 |
AdSherlock Efficient and Deployable Click Fraud Detection for Mobile Applications |
Mobile Computing |
2020 |
Click Here |
2 |
Distributed Time-Sensitive Task Selection in Mobile Crowdsensing |
Mobile Computing |
2020 |
Click Here |
3 |
Eclipse Preserving Differential Location Privacy Against Long-Term Observation Attacks |
Mobile Computing |
2020 |
Click Here |
4 |
Exploiting Multi-Dimensional Task Diversity in Distributed Auctions for Mobile Crowd Sensing | Mobile Computing |
2020 |
Click Here |
5 |
Fine Grained User Profiling for Personalized Task Matching in Mobile Crowd Sensing | Mobile Computing |
2020 |
Click Here |
6 |
KOLLECTOR Detecting Fraudulent Activities on Mobile Devices Using Deep Learning |
Mobile Computing |
2020 |
Click Here |
7 |
PACE Privacy-Preserving and Quality-Aware Incentive Mechanism for Mobile Crowd Sensing |
Mobile Computing |
2020 |
Click Here |
8 |
Predictability and Prediction of Human Mobility Based on Application-collected Location Data |
Mobile Computing |
2020 |
Click Here |
9 |
Privacy-Preserving Media Sharing with Scalable Access Control and Secure De duplication in Mobile Cloud Computing |
Mobile Computing |
2020 |
Click Here |
10 |
Protecting Your Shopping Preference with Differential Privacy |
Mobile Computing |
2020 |
Click Here |
11 |
Proximity-Aware Location Based Collaborative Sensing for Energy-Efficient Mobile Devices |
Mobile Computing |
2020 |
Click Here |
12 |
Social Recruiter Dynamic Incentive Mechanism for Mobile Crowd Sourcing Worker Recruitment with Social Networks |
Mobile Computing |
2020 |
Click Here |
13 |
Towards Fine-Grained Access Control in Enterprise-Scale Internet-of-Things |
Mobile Computing |
2020 |
Click Here |
14 |
Towards Personalized Privacy-Preserving Incentive for Truth Discovery in Mobile Crowd Sensing Systems |
Mobile Computing |
2020 |
Click Here |
SOCIAL NETWORK
|
||||
1 |
Activity Minimization of Misinformation Influence in Online Social Networks |
Social Network |
2020 |
Click Here |
2 |
An Efficient Feedback Control Mechanism for Positive or Negative Information Spread in Online Social Networks |
Social Network |
2020 |
Click Here |
3 |
ArvaNet Deep Recurrent Architecture for PPG-Based Negative Mental-State Monitoring |
Social Network |
2020 |
Click Here |
4 |
Characterizing the Propagation of Situational Information in Social Media During COVID-19 Epidemic A Case Study on Weibo |
Social Network |
2020 |
Click Here |
5 |
Continuous Activity Maximization in Online Social Networks |
Social Network |
2020 |
Click Here |
6 |
Detecting and Characterizing Extremist Reviewer Groups in Online Product Reviews |
Social Network |
2020 |
Click Here |
7 |
Detection of Malicious Social Bots Using Learning Automata With URL Features in Twitter Network |
Social Network |
2020 |
Click Here |
8 |
Information Dissemination From Social Network for Extreme Weather Scenario |
Social Network |
2020 |
Click Here |
9 |
Location-Aware Service Recommendations With Privacy-Preservation in the Internet of Things |
Social Network |
2020 |
Click Here |
10 |
Movie Recommendation System Using Sentiment Analysis From Micro blogging Data |
Social Network |
2020 |
Click Here |
11 |
On Utilizing Communities Detected From Social Networks in Hashtag Recommendation |
Social Network |
2020 |
Click Here |
12 |
Understanding the User Behavior of Foursquare A Data-Driven Study on a Global Scale |
Social Network |
2020 |
Click Here |
13 |
User Behavior Prediction of Social Hotspots Based on Multi message Interaction and Neural Network |
Social Network |
2020 |
Click Here |
14 |
Popular Matching for Security-Enhanced Resource Allocation in Social Internet of Flying Things |
Social Network |
2020 |
Click Here |
15 |
SciChallenge A Social Media Aware Platform for Contest-Based STEM Education and Motivation of Young Students |
Social Network |
2020 |
Click Here |
SOFTWARE ENGINEERING,SERVICE COMPUTING |
||||
1 |
Crisis-Critical Intellectual Property Findings From the COVID-19 Pandemic |
Software Engineering |
2020 |
Click Here |
VEHICULAR TECHNOLOGY AND INDUSTRIAL INFORMATICS
|
||||
1 |
A Secure and Verifiable Data Sharing Scheme Based on Blockchain in Vehicular Social Networks |
Vehicular Technology |
2020 |
Click Here |
2 |
Collaborative Content Delivery in Software-Defined Heterogeneous Vehicular Networks |
Vehicular Technology |
2020 |
Click Here |
3 |
Dynamic Network Slicing and Resource Allocation in Mobile Edge Computing Systems |
Vehicular Technology |
2020 |
Click Here |
4 |
Security Enhanced Content Sharing in Social IoT A Directed Hypergraph-Based Learning Scheme |
Vehicular Technology |
2020 |
Click Here |
5 |
An Efficient Privacy Preserving Message Authentication Scheme for Internet-of-Things |
Industrial Informatics |
2020 |
Click Here |
6 |
Detection and Mitigation of Cyber Attacks on Voltage Stability Monitoring of Smart Grids |
Industrial Informatics |
2020 |
Click Here |
7 |
Enabling Privacy-assured Fog-based Data Aggregation in E-healthcare Systems |
Industrial Informatics |
2020 |
Click Here |
8 |
Hidden Electricity Theft by Exploiting Multiple-Pricing Scheme in Smart Grids |
Industrial Informatics |
2020 |
Click Here |
9 |
Social Image Sentiment Analysis by Exploiting Multimodal Content and Heterogeneous Relations |
Industrial Informatics |
2020 |
Click Here |
BIG DATA |
||||
1 |
Credit Card Transactions Data Adversarial Augmentation in the Frequency Domain |
Bigdata |
2020 |
Click Here |
2 |
Building and Querying an Enterprise Knowledge Graph |
Bigdata |
2020 |
Click Here |
3 |
Delegated Authorization Framework for EHR Services using Attribute Based Encryption |
Bigdata |
2020 |
Click Here |
4 |
Secure Channel Free Certificate-Based Searchable Encryption Withstanding Outside and Inside Keyword Guessing Attacks |
Bigdata |
2020 |
Click Here |
EMERGING TOPICS IN COMPUTING |
||||
1 |
FarSight Long-Term Disease Prediction Using Unstructured Clinical Nursing Notes |
Emerging Topics |
2020 |
Click Here |
2 |
Human-in-the-Loop-Aided Privacy-Preserving Scheme for Smart Healthcare |
Emerging Topics |
2020 |
Click Here |
3 |
Recommending Activities for Mental Health and Well-being Insights from Two User Studies |
Emerging Topics |
2020 |
Click Here |
4 |
Semantic Access Control for Privacy Management of Personal Sensing in Smart Cities |
Emerging Topics |
2020 |
Click Here |
SERVICE COMPUTING |
||||
1 |
A hybrid fault-tolerant scheduling for deadline-constrained tasks in Cloud systems |
Service Computing |
2020 |
Click Here |
2 |
CloudRaid Detecting Distributed Concurrency Bugs via Log-Mining and Enhancement |
Service Computing |
2020 |
Click Here |
3 |
Dynamic Resource Allocation and Computation Offloading for IoT Fog Computing System |
Service Computing |
2020 |
Click Here |
4 |
ECOGreen Electricity Cost Optimization for Green Datacenters in Emerging Power Markets |
Service Computing |
2020 |
Click Here |
5 |
Efficient Encrypted Data Search with Expressive Queries and Flexible Update |
Service Computing |
2020 |
Click Here |
6 |
Energy-aware cloud workflow applications scheduling with geo-distributed data |
Service Computing |
2020 |
Click Here |
7 |
KeySea Keyword-based Search with Receiver Anonymity in Attribute-based Searchable Encryption |
Service Computing |
2020 |
Click Here |
8 |
Lightweight Privacy-preserving Raw Data Publishing Scheme |
Service Computing |
2020 |
Click Here |
9 |
Location-Aware Service Recommendations With Privacy-Preservation in the Internet of Things |
Service Computing |
2020 |
Click Here |
10 |
Lucid A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection |
Service Computing |
2020 |
Click Here |
11 |
Minimizing Financial Cost of DDoS Attack Defense in Clouds with Fine-Grained Resource Management |
Service Computing |
2020 |
Click Here |
12 |
Personalized Recommendation System based on Collaborative Filtering for IoT Scenarios |
Service Computing |
2020 |
Click Here |
13 |
Privacy Preserving QoS Forecasting in Mobile Edge Environments |
Service Computing |
2020 |
Click Here |
14 |
Provably Efficient Resource Allocation for Edge Service Entities Using Hermes |
Service Computing |
2020 |
Click Here |
15 |
Reverse Nearest Neighbor Search in Semantic Trajectories for Location based Services |
Service Computing |
2020 |
Click Here |
16 |
Revocable Attribute-based Data Storage in Mobile Clouds |
Service Computing |
2020 |
Click Here |
17 |
Scalable Discovery of Hybrid Process Models in a Cloud Computing Environment |
Service Computing |
2020 |
Click Here |
18 |
Semantics of Data Mining Services in Cloud Computing |
Service Computing |
2020 |
Click Here |
19 |
Shed+ Optimal Dynamic Speculation to Meet Application Deadlines in Cloud |
Service Computing |
2020 |
Click Here |
DEPENDABLE AND SECURE COMPUTING |
||||
1 |
Shielding Collaborative Learning Mitigating Poisoning Attacks through Client Side Detection |
Dependable and Secure Computing |
2020 |
Click Here |
2 |
Scaling Camouflage Content Disguising Attack Against Computer Vision Applications |
Dependable and Secure Computing |
2020 |
Click Here |
3 |
Representing Fine-Grained Co-Occurrences for Behavior-Based Fraud Detection in Online Payment Services |
Dependable and Secure Computing |
2020 |
Click Here |
4 |
Privacy-Preserving Federated Deep Learning with Irregular Users |
Dependable and Secure Computing |
2020 |
Click Here |
5 |
Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack |
Dependable and Secure Computing |
2020 |
Click Here |
6 |
On-the-fly Privacy for Location Histograms |
Dependable and Secure Computing |
2020 |
Click Here |
7 |
Multi-client Sub-Linear Boolean Keyword Searching for Encrypted Cloud Storage with Owner-enforced Authorization |
Dependable and Secure Computing |
2020 |
Click Here |
8 |
Match in My Way Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing |
Dependable and Secure Computing |
2020 |
Click Here |
9 |
Geometric range search on encrypted data with Forward or Backward security |
Dependable and Secure Computing |
2020 |
Click Here |
10 |
Efficient Server-Aided Secure Two-Party Computation in Heterogeneous Mobile Cloud Computing |
Dependable and Secure Computing |
2020 |
Click Here |
11 |
Efficient and Secure Attribute-based Access Control with Identical Sub-Policies Frequently Used in Cloud Storage |
Dependable and Secure Computing |
2020 |
Click Here |
12 |
Detection and Defense of Cache Pollution Based on Popularity Prediction in Named Data Networking |
Dependable and Secure Computing |
2020 |
Click Here |
13 |
Adaptive Secure Nearest Neighbor Query Processing over Encrypted Data |
Dependable and Secure Computing |
2020 |
Click Here |
14 |
Achieving Efficient Secure Deduplication with User-Defined Access Control in Cloud |
Dependable and Secure Computing |
2020 |
Click Here |
15 |
Achieving Efficient and Privacy-Preserving Exact Set Similarity Search over Encrypted Data |
Dependable and Secure Computing |
2020 |
Click Here |
16 |
A Traceable and Revocable Ciphertext-policy Attribute-based Encryption Scheme Based on Privacy Protection |
Dependable and Secure Computing |
2020 |
Click Here |
IMAGE PROCESSING AND MULTIMEDIA |
||||
1 |
Benchmarking Image Retrieval Diversification Techniques for Social Media |
Image Processing |
2020 |
Click Here |
2 |
Online Hashing with Bit Selection for Image Retrieval |
Image Processing |
2020 |
Click Here |
3 |
Trust-Based Video Management Framework for Social Multimedia Networks |
Image Processing |
2020 |
Click Here |
PARALLEL AND DISTRIBUTED SYTSTEMS |
||||
1 |
An Integrated Indexing and Search Service for Distributed File Systems |
Distributed Systems |
2020 |
Click Here |
2 |
ESetStore An Erasure-Coded Storage System With Fast Data Recovery |
Distributed Systems |
2020 |
Click Here |
3 |
Scalable and Adaptive Data Replica Placement for Geo-Distributed Cloud Storages |
Distributed Systems |
2020 |
Click Here |
ADHOC NETWORKS |
||||
1 |
Efficient Conditional Anonymity With Message Integrity and Authentication in a Vehicular Ad-Hoc Network |
Adhoc Networks |
2019 |
Click Here |
2 |
Kalman Prediction based Neighbor Discovery and its Effect on Routing Protocol in Vehicular Ad Hoc Networks |
Adhoc Networks |
2019 |
Click Here |
3 |
New Multi-Hop Clustering Algorithm for Vehicular Ad Hoc Networks |
Adhoc Networks |
2019 |
Click Here |
4 |
Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks |
Adhoc Networks |
2019 |
Click Here |
5 |
V2V Routing in a VANET Based on the Autoregressive Integrated Moving Average Model |
Adhoc Networks |
2019 |
Click Here |
6 |
An Evolutionary Self-Cooperative Trust Scheme Against Routing Disruptions in MANETs |
Adhoc Networks |
2019 |
Click Here |
7 |
An Attack-resistant Trust Inference Model for Securing Routing in Vehicular Ad-hoc Networks |
Adhoc Networks |
2019 |
Click Here |
8 |
An Efficient Message-Authentication Scheme Based on Edge Computing for Vehicular Ad Hoc Networks |
Adhoc Networks |
2019 |
Click Here |
9 |
DeQoS Attack: Degrading Quality of Service in VANETs and its Mitigation |
Adhoc Networks |
2019 |
Click Here |
10 |
Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks |
Adhoc Networks |
2019 |
Click Here |
Live Demo is available on youtube.You can click on demo link and can download the video for further reference and send your title name to the following email id to get base paper and Abstract.Please mention your degree and other requirements also.. | ||||
Cloud Computing |
||||
Sl.No |
Project Title Name |
Domain |
Year |
Demo |
1 |
A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing |
Cloud Computing |
2019 |
Click Here |
2 |
A Trust-Based Agent Learning Model for Service Composition in Mobile Cloud Computing Environments |
Cloud Computing |
2019 |
Click Here |
3 |
Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data |
Cloud Computing |
2019 |
Click Here |
4 |
Reliability and Availability Evaluation for Cloud Data Center Networks Using Hierarchical Models |
Cloud Computing |
2019 |
Click Here |
5 |
Verifiable and Multi-keyword Searchable Attribute-based Encryption Scheme for Cloud Storage |
Cloud Computing |
2019 |
Click Here |
6 |
Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud |
Cloud Computing |
2019 |
Click Here |
7 |
CHARON: A Secure Cloud-of-Clouds System for Storing and Sharing Big Data |
Cloud Computing |
2019 |
Click Here |
8 |
An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud Storage |
Cloud Computing |
2019 |
Click Here |
9 |
Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data |
Cloud Computing |
2019 |
Click Here |
10 |
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing |
Cloud Computing |
2019 |
Click Here |
11 |
Hidden Ciphertext Policy Attribute-Based Encryption with Fast Decryption for Personal Health Record System |
Cloud Computing |
2019 |
Click Here |
12 |
A Lightweight Secure Auditing Scheme for Shared Data in Cloud Storage |
Cloud Computing |
2019 |
Click Here |
13 |
Novel Multi-Keyword Search on Encrypted Data in the Cloud |
Cloud Computing |
2019 |
Click Here |
14 |
Privacy-aware Personal Data Storage (P-PDS) Learning how to Protect User Privacy from External Applications |
Cloud Computing |
2019 |
Click Here |
15 |
Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting |
Cloud Computing |
2019 |
Click Here |
16 |
Fast Boolean Queries With Minimized Leakage for Encrypted Databases in Cloud Computing |
Cloud Computing |
2019 |
Click Here |
17 |
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing |
Cloud Computing |
2019 |
Click Here |
18 |
Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments |
Cloud Computing |
2019 |
Click Here |
19 |
A Fog-centric Secure Cloud Storage Scheme |
Cloud Computing |
2019 |
Click Here |
20 |
Enabling Verifiable and Dynamic Ranked Search Over Outsourced Data |
Cloud Computing |
2019 |
Click Here |
21 |
A Data Sharing Protocol to Minimize Security and Privacy Risks of Cloud Storage in Big Data Era |
Cloud Computing |
2019 |
Click Here |
22 |
A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage Services |
Cloud Computing |
2019 |
Click Here |
23 |
Achieve Privacy-Preserving Priority Classification on Patient Health Data in Remote eHealthcare System |
Cloud Computing |
2019 |
Click Here |
24 |
Data Integrity Auditing without Private Key Storage for Secure Cloud Storage |
Cloud Computing |
2019 |
Click Here |
25 |
Enabling Authorized Encrypted Search for Multi-Authority Medical Databases |
Cloud Computing |
2019 |
Click Here |
26 |
Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems |
Cloud Computing |
2019 |
Click Here |
27 |
P-MOD: Secure Privilege-Based Multilevel Organizational Data-Sharing in Cloud Computing |
Cloud Computing |
2019 |
Click Here |
28 |
Practical Privacy-Preserving MapReduce Based K-means Clustering over Large-scale Dataset |
Cloud Computing |
2019 |
Click Here |
29 |
Profit Maximization for Cloud Brokers in Cloud Computing |
Cloud Computing |
2019 |
Click Here |
30 |
Provable Data Possession with Outsourced Data Transfer |
Cloud Computing |
2019 |
Click Here |
31 |
Provably Secure Fine-Grained Data Access Control over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications |
Cloud Computing |
2019 |
Click Here |
32 |
Revocable Identity-Based Broadcast Proxy Re-encryption for Data Sharing in Clouds |
Cloud Computing |
2019 |
Click Here |
33 |
Searchable Symmetric Encryption with Forward Search Privacy |
Cloud Computing |
2019 |
Click Here |
34 |
Privacy Preserving Searchable Encryption with Fine-grained Access Control |
Cloud Computing |
2019 |
Click Here |
35 |
A Secure G-Cloud-Based Framework for Government Healthcare Services |
Cloud Computing |
2019 |
Click Here |
DATA MINING
|
||||
1 |
Clustering-Based Collaborative Filtering Using an Incentivized/Penalized User Model |
Data Mining |
2019 |
Click Here |
2 |
A Hierarchical Attention Model for Social Contextual Image Recommendation |
Data Mining |
2019 |
Click Here |
3 |
Mining Users Trust From E-Commerce Reviews Based on Sentiment Similarity Analysis |
Data Mining |
2019 |
Click Here |
4 |
Old and Young Users’ White Space Preferences for Online News Web Pages |
Data Mining |
2019 |
Click Here |
5 |
Analysis and Accurate Prediction of User’s Response Behavior in Incentive-Based Demand Response |
Data Mining |
2019 |
Click Here |
6 |
DCCR: Deep Collaborative Conjunctive Recommender for Rating Prediction |
Data Mining |
2019 |
Click Here |
7 |
Network Representation Learning Enhanced Recommendation Algorithm |
Data Mining |
2019 |
Click Here |
8 |
Trust Relationship Prediction in Alibaba E-Commerce Platform |
Data Mining |
2019 |
Click Here |
9 |
Composition Context-Based Web Services Similarity Measure |
Data Mining |
2019 |
Click Here |
10 |
NASM: Nonlinearly Attentive Similarity Model for Recommendation System via Locally Attentive Embedding |
Data Mining |
2019 |
Click Here |
11 |
A Novel Load Image Profile-Based Electricity Load Clustering Methodology |
Data Mining |
2019 |
Click Here |
12 |
An Efficient Method for High Quality and Cohesive Topical Phrase Mining |
Data Mining |
2019 |
Click Here |
13 |
Credibility Evaluation of Twitter-Based Event Detection by a Mixing Analysis of Heterogeneous Data |
Data Mining |
2019 |
Click Here |
14 |
Filtering Instagram hashtags through crowd tagging and the HITS algorithm |
Data Mining |
2019 |
Click Here |
15 |
A Hybrid E-learning Recommendation Approach Based on Learners’ Influence Propagation |
Data Mining |
2019 |
Click Here |
16 |
Active Online Learning for Social Media Analysis to Support Crisis Management |
Data Mining |
2019 |
Click Here |
17 |
Applying Simulated Annealing and Parallel Computing to the Mobile Sequential Recommendation |
Data Mining |
2019 |
Click Here |
18 |
Collaboratively Tracking Interests for User Clustering in Streams of Short Texts |
Data Mining |
2019 |
Click Here |
19 |
Detecting Pickpocket Suspects from Large-Scale Public Transit Records |
Data Mining |
2019 |
Click Here |
20 |
Finding Optimal Skyline Product Combinations under Price Promotion |
Data Mining |
2019 |
Click Here |
21 |
Heterogeneous Information Network Embedding for Recommendation |
Data Mining |
2019 |
Click Here |
22 |
Hierarchical Multi-Clue Modelling for POI Popularity Prediction with Heterogeneous Tourist Information |
Data Mining |
2019 |
Click Here |
23 |
K-nearest Neighbor Search by Random Projection Forests |
Data Mining |
2019 |
Click Here |
24 |
Learning Customer Behaviors for Effective Load Forecasting |
Data Mining |
2019 |
Click Here |
25 |
Normalization of Duplicate Records from Multiple Sources |
Data Mining |
2019 |
Click Here |
26 |
On Scalable and Robust Truth Discovery in Big Data Social Media Sensing Applications |
Data Mining |
2019 |
Click Here |
27 |
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Based Recommendation |
Data Mining |
2019 |
Click Here |
28 |
Secure and Efficient Skyline Queries on Encrypted Data |
Data Mining |
2019 |
Click Here |
29 |
Predicting Consumption Patterns with Repeated and Novel Events |
Data Mining |
2019 |
Click Here |
30 |
Multi-Party High-Dimensional Data Publishing under Differential Privacy |
Data Mining |
2019 |
Click Here |
31 |
Minimizing Influence of Rumors by Blockers on Social Networks: Algorithms and Analysis |
Data Mining |
2019 |
Click Here |
32 |
Detection of fake online reviews using semi-supervised and supervised learning |
Data Mining |
2019 |
Click Here |
33 |
Collaborative Filtering-based Electricity Plan Recommender System |
Data Mining |
2019 |
Click Here |
SECURE COMPUTING
|
||||
1 |
A Novel Load Image Profile-Based Electricity Load Clustering Methodology |
Secure Computing |
2019 |
Click Here |
2 |
Coverless Information Hiding Method Based on Web Text |
Secure Computing |
2019 |
Click Here |
3 |
SEPTIC Detecting Injection Attacks and Vulnerabilities Inside the DBMS |
Secure Computing |
2019 |
Click Here |
4 |
LBOA: Location-Based Secure Outsourced Aggregation in IoT |
Secure Computing |
2019 |
Click Here |
5 |
Towards Thwarting Template Side-channel Attacks in Secure Cloud Deduplications |
Secure Computing |
2019 |
Click Here |
6 |
Automated Decision Making in Airport Checkpoints: Bias Detection Toward Smarter Security and Fairness |
Secure Computing |
2019 |
Click Here |
7 |
Detecting Malicious Social Bots Based on Click stream Sequences |
Secure Computing |
2019 |
Click Here |
8 |
Authenticated Medical Documents Releasing with Privacy Protection and Release Control |
Secure Computing |
2019 |
Click Here |
9 |
Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe Systems |
Secure Computing |
2019 |
Click Here |
10 |
Privacy-Preserving Aggregate Queries for Optimal Location Selection |
Secure Computing |
2019 |
Click Here |
11 |
Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting |
Secure Computing |
2019 |
Click Here |
12 |
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data |
Secure Computing |
2019 |
Click Here |
13 |
Sensitive Label Privacy Preservation with Anatomization for Data Publishing |
Secure Computing |
2019 |
Click Here |
14 |
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification |
Secure Computing |
2019 |
Click Here |
15 |
Who You Should Not Follow: Extracting Word Embeddings from Tweets to Identify Groups of Interest and Hijackers in Demonstrations |
Secure Computing |
2019 |
Click Here |
BLOCKCHAIN TECHNOLOGY |
||||
1 |
PBCert: Privacy-Preserving Blockchain-Based Certificate Status Validation Toward Mass Storage Management |
Blockchain Technology |
2019 |
Click Here |
2 |
Blockchain for AI: Review and Open Research Challenges |
Blockchain Technology |
2019 |
Click Here |
3 |
Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors |
Blockchain Technology |
2019 |
Click Here |
INFORMATION FORENSICS and SECURITY
|
||||
1 |
Authentication by Encrypted Negative Password |
Information Forensics and Secuirty |
2019 |
Click Here |
2 |
Retrieving Hidden Friends: A Collusion Privacy Attack Against Online Friend Search Engine |
Information Forensics and Secuirty |
2019 |
Click Here |
3 |
Account Trade Accountability Against Dishonest Big Data Buyers and Sellers |
Information Forensics and Secuirty |
2019 |
Click Here |
4 |
Enabling Efficient and Geometric Range Query with Access Control over Encrypted Spatial Data |
Information Forensics and Secuirty |
2019 |
Click Here |
5 |
Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage |
Information Forensics and Secuirty |
2019 |
Click Here |
6 |
Peer Prediction Based Trustworthiness Evaluation and Trustworthy Service Rating in Social Networks |
Information Forensics and Secuirty |
2019 |
Click Here |
7 |
Secure Key Agreement and Key Protection for Mobile Device User Authentication |
Information Forensics and Secuirty |
2019 |
Click Here |
MOBILE COMPUTING
|
||||
1 |
An Indoor Position-Estimation Algorithm Using Smartphone IMU Sensor Data |
Mobile Computing |
2019 |
Click Here |
2 |
FooDNet: Toward an Optimized Food Delivery Network based on Spatial Crowdsourcing |
Mobile Computing |
2019 |
Click Here |
3 |
Privacy-preserving Crowd-sourced Statistical Data Publishing with An Untrusted Server |
Mobile Computing |
2019 |
Click Here |
4 |
Mobile Computing |
2019 |
Click Here |
|
5 |
Mobile Computing |
2019 |
Click Here |
|
6 |
Mobile Computing |
2019 |
Click Here |
|
SOCIAL NETWORK
|
||||
1 |
A Hybrid Approach to Service Recommendation Based on Network Representation Learning |
Social Network |
2019 |
Click Here |
2 |
Social Network Rumor Diffusion Predication Based on Equal Responsibility Game Model |
Social Network |
2019 |
Click Here |
3 |
Online Public Shaming on Twitter: Detection, Analysis and Mitigation |
Social Network |
2019 |
Click Here |
4 |
PersoNet: Friend Recommendation System Based on Big-Five Personality Traits and Hybrid Filtering |
Social Network |
2019 |
Click Here |
5 |
A Fuzzy Approach to Text Classification with Two Stage Training for Ambiguous Instances |
Social Network |
2019 |
Click Here |
6 |
Conversational Networks For Automatic Online Moderation |
Social Network |
2019 |
Click Here |
SOFTWARE ENGINEERING,SERVICE COMPUTING |
||||
1 |
Platform-Independent Dynamic Taint Analysis for JavaScript |
Software Engineering |
2019 |
Click Here |
2 |
Scheduling Real Time Security Aware tasks in Fog Networks |
Software Engineering |
2019 |
Click Here |
WIRELESS SENSOR NETWOKS
|
||||
1 |
V-Matrix-Based Scalable Data Aggregation Scheme in WSN |
WSN |
2019 |
Click Here |
2 |
A Probabilistic Source Location Privacy Protection Scheme in Wireless Sensor Networks |
WSN |
2019 |
Click Here |
3 |
Memory Leakage-Resilient Dynamic and Verifiable Multi-keyword Ranked Search on Encrypted Smart Body Sensor Network Data |
WSN |
2019 |
Click Here |
4 |
Primary User-aware Optimal Discovery Routing for Cognitive Radio Networks |
WSN |
2019 |
Click Here |
ANDROID |
||||
1 |
RescueMe: Smartphone-Based Self Rescue System for Disaster Rescue |
Android |
2019 |
Click Here |
2 |
FallDroid: An Automated Smart Phone based Fall Detection System using Multiple Kernel Learning |
Android |
2019 |
Click Here |
3 |
Dating with Scambots: Understanding the Ecosystem of Fraudulent Dating Applications |
Android |
2019 |
Click Here |
4 |
Applying Simulated Annealing and Parallel Computing to the Mobile Sequential Recommendation |
Android |
2019 |
Click Here |
5 |
An Indoor Position-Estimation Algorithm Using Smartphone IMU Sensor Data |
Android |
2019 |
Click Here |
6 |
Achieve Privacy-Preserving Priority Classification on Patient Health Data in Remote eHealthcare System |
Android |
2019 |
Click Here |
CYBER SECURITY |
||||
1 |
Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Learning Algorithms: Review of Literature and Open Challenges |
Cyber Secuirty |
2019 |
Click Here |
2 |
Spammer Detection and Fake User Identification on Social Networks |
Cyber Secuirty |
2019 |
Click Here |
3 |
Ant Colony Stream Clustering: A Fast Density Clustering Algorithm for Dynamic Data Streams |
Cyber Secuirty |
2019 |
Click Here |
SERVICE COMPUTING |
||||
1 |
Transactional Behavior Verification in Business Process as a Service Configuration |
Service Computing |
2019 |
Click Here |
2 |
Building and Querying an Enterprise Knowledge Graph |
Service Computing |
2019 |
Click Here |
3 |
Delegated Authorization Framework for EHR Services using Attribute Based Encryption |
Service Computing |
2019 |
Click Here |
4 |
Secure Channel Free Certificate-Based Searchable Encryption Withstanding Outside and Inside Keyword Guessing Attacks |
Service Computing |
2019 |
Click Here |
INTERNET OF THINGS(IOT) |
||||
1 |
Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT |
IOT |
2019 |
Click Here |
2 |
Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques |
IOT |
2019 |
Click Here |
3 |
Trustworthy Delegation toward Securing Mobile Healthcare Cyber-Physical Systems |
IOT |
2019 |
Click Here |
4 |
Hybrid Keyword-Field Search with Efficient Key Management for Industrial Internet of Things |
IOT |
2019 |
Click Here |
5 |
Trustworthy Delegation toward Securing Mobile Healthcare Cyber-Physical Systems |
IOT |
2019 |
Click Here |
6 |
Securing Data in Internet of Things (IoT) Using Cryptography and Stegano graphy Techniques |
IOT |
2019 |
Click Here |
IMAGE PROCESSING and MULTIMEDIA |
||||
1 |
Fundamental Visual Concept Learning from Correlated Images and Text |
Image Processing |
2019 |
Click Here |
2 |
Trust-based Privacy-Preserving Photo Sharing in Online Social Networks |
Image Processing |
2019 |
Click Here |
3 |
Towards Robust Image Steganography |
Image Processing |
2019 |
Click Here |
PARALLEL and DISTRIBUTED SYTSTEMS |
||||
1 |
A Distributed Trust Evaluation Protocol with Privacy Protection for Inter cloud |
Distributed Systems |
2019 |
Click Here |
2 |
Deadline-aware MapReduce Job Scheduling with Dynamic Resource Availability |
Distributed Systems |
2019 |
Click Here |
ADHOC NETWORKS |
||||
1 |
Efficient Conditional Anonymity With Message Integrity and Authentication in a Vehicular Ad-Hoc Network |
Adhoc Networks |
2019 |
Click Here |
2 |
Kalman Prediction based Neighbor Discovery and its Effect on Routing Protocol in Vehicular Ad Hoc Networks |
Adhoc Networks |
2019 |
Click Here |
3 |
New Multi-Hop Clustering Algorithm for Vehicular Ad Hoc Networks |
Adhoc Networks |
2019 |
Click Here |
4 |
Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks |
Adhoc Networks |
2019 |
Click Here |
5 |
V2V Routing in a VANET Based on the Autoregressive Integrated Moving Average Model |
Adhoc Networks |
2019 |
Click Here |
6 |
An Evolutionary Self-Cooperative Trust Scheme Against Routing Disruptions in MANETs |
Adhoc Networks |
2019 |
Click Here |
7 |
An Attack-resistant Trust Inference Model for Securing Routing in Vehicular Ad-hoc Networks |
Adhoc Networks |
2019 |
Click Here |
8 |
An Efficient Message-Authentication Scheme Based on Edge Computing for Vehicular Ad Hoc Networks |
Adhoc Networks |
2019 |
Click Here |
9 |
DeQoS Attack: Degrading Quality of Service in VANETs and its Mitigation |
Adhoc Networks |
2019 |
Click Here |
10 |
Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks |
Adhoc Networks |
2019 |
Click Here |