IEEE Java Projects IEEE Dotnet Projects IEEE Python Projectst IEEE Android Projects IEEE NS2 Projects IEEE MATLAB Projects

Java IEEE Projects

Click on the following list to download the titles for corresponding year

JAVA PROJECTS LIST


2018 and 2019 IEEE Projects || 2017 and 2018 IEEE Projects || 2016 and 2017 IEEE Projects || 2015 and 2016 IEEE Projects||2014 and 2015 IEEE Projects||

2013 and 2014 IEEE Projects ||

 

Live 2023 and 2024 Java IEEE Projects List --- Download

 

Live Demo is available on youtube.You can click on demo link and can download the video for further reference and send your title name to the following email id to get base paper and Abstract.Please mention your degree and other requirements also..

Cloud Computing
Sl.No
Project Title Name
Domain
Year
Demo
1
An Effective Privacy-Preserving Blockchain-Assisted Security Protocol for Cloud-Based Digital Twin Environment
Cloud Computing
2023
Click Here
2
Authenticated Key Agreement Scheme for Fog Computing in a Health-Care Environment
Cloud Computing
2023
Click Here
3
Data Integrity Audit Scheme Based on Quad Merkle Tree and Blockchain
Cloud Computing
2023
Click Here
4
Data Secure De-Duplication and Recovery Based on Public Key Encryption With Keyword Search
Cloud Computing
2023
Click Here
5
Delegate and Verify the Update Keys of Revocable Identity-Based Encryption
Cloud Computing
2023
Click Here
6
Dynamic Secure Access Control and Data Sharing Through Trusted Delegation and Revocation in a Blockchain-Enabled Cloud-IoT Environment
Cloud Computing
2023
Click Here
7
Efficient, Traceable and Privacy-Aware Data Access Control in Distributed Cloud-Based IoD Systems
Cloud Computing
2023
Click Here
8
EFPB: Efficient Fair Payment Based on Blockchain for Outsourcing Services in Cloud Computing
Cloud Computing
2023
Click Here
9
Enabling Simultaneous Content Regulation and Privacy Protection for Cloud Storage Image
Cloud Computing
2023
Click Here
10
FAST DATA: A Fair, Secure and Trusted Decentralized IIoT Data Marketplace enabled by Blockchain
Cloud Computing
2023
Click Here
11
Mitigating Software Integrity Attacks With Trusted Computing in a Time Distribution Network
Cloud Computing
2023
Click Here
12
Optimized Proactive Recovery in Erasure-Coded Cloud Storage Systems
Cloud Computing
2023
Click Here
13
PackCache: An Online Cost-driven Data Caching Algorithm in the Cloud
Cloud Computing
2023
Click Here
14
Privacy Preservation in Multi-Cloud Secure Data Fusion for Infectious-Disease Analysis
Cloud Computing
2023
Click Here
15
RRFT: A Rank-Based Resource Aware Fault Tolerant Strategy for Cloud Platforms
Cloud Computing
2023
Click Here
16
Secure and Efficient Data Deduplication in JointCloud Storage
Cloud Computing
2023
Click Here
17
Secure and Lightweight Blockchain-Enabled Access Control for Fog-Assisted IoT Cloud Based Electronic Medical Records Sharing
Cloud Computing
2023
Click Here
18
Securing Organization’s Data: A Role-Based Authorized Keyword Search Scheme with Efficient Decryption
Cloud Computing
2023
Click Here
19
CloudNet: A LiDAR-Based Face Anti-Spoofing Model That Is Robust Against Light Variation
Cloud Computing
2023
Click Here
20
A Data Deduplication Scheme Based on DBSCAN With Tolerable Clustering Deviation
Cloud Computing
2023
Click Here
21
A Personal Privacy Data Protection Scheme for Encryption and Revocation of High-Dimensional Attribute Domains
Cloud Computing
2023
Click Here
22
An Effective Privacy-Preserving Blockchain-Assisted Security Protocol for Cloud-Based Digital Twin Environment
Cloud Computing
2023
Click Here
23
An Efficient Post-Quantum Attribute-Based Encryption Scheme Based on Rank Metric Codes for Cloud Computing
Cloud Computing
2023
Click Here
24
CACPA: Credible Alliance-Chain-Based Public Auditing Scheme for Cloud Storage
Cloud Computing
2023
Click Here
25
Enabling Balanced Data Deduplication in Mobile Edge Computing
Cloud Computing
2023
Click Here
26
Efficient Large-Capacity Caching in Cloud Storage Using Skip-Gram-Based File Correlation Analysis
Cloud Computing
2023
Click Here
27
Multi-Task Learning for Electricity Price Forecasting and Resource Management in Cloud Based Industrial IoT Systems
Cloud Computing
2023
Click Here
28
Secure and Efficient Data Deduplication in JointCloud Storage
Cloud Computing
2023
Click Here
29
Nimbus: Towards Latency-Energy Efficient Task Offloading for AR Services
Cloud Computing
2023
Click Here
30
VeriDedup: A Verifiable Cloud Data Deduplication Scheme With Integrity and Duplication Proof
Cloud Computing
2023
Click Here
31
CryptoArcade: A Cloud Gaming System With Blockchain-Based Token Economy
Cloud Computing
2023
Click Here
BLOCKCHAIN

 

1
A Blockchain-based Decentralized, Fair and Authenticated Information Sharing Scheme in Zero Trust Internet-of-Things
Block Chain
2023
Click Here
2
A Blockchain-based E-Commerce Reputation System Built with Verifiable Credentials
Block Chain
2023
Click Here
3
A Blockchain-Based Mutual Authentication Method to Secure the Electric Vehicles’ TPMS
Block Chain
2023
Click Here
4
A Secure and Intelligent Data Sharing Scheme for UAV-Assisted Disaster Rescue
Block Chain
2023
Click Here
5
A Secure Decentralized E-Voting with Blockchain & Smart Contracts
Block Chain
2023
Click Here
6
A Tractable Probabilistic Approach to Analyze Sybil Attacks in Sharding-Based Blockchain Protocols
Block Chain
2023
Click Here
7
A Blockchain-Based Crowdsourcing Loan Platform for Funding Higher Education in Developing Countries
Block Chain
2023
Click Here
8
A Privacy-preserving Medical Data Sharing Scheme Based on Blockchain
Block Chain
2023
Click Here
9
A Secure and Privacy-Preserving E-Government Framework Using Blockchain and Artificial Immunity
Block Chain
2023
Click Here
10
Aegis: Privacy-Preserving Market for Non-Fungible Tokens
Block Chain
2023
Click Here
11
Bank record storage using blockchain
Block Chain
2023
Click Here
12
BCGeo: Blockchain-Assisted Geospatial Web Service for Smart Healthcare System
Block Chain
2023
Click Here
13
BitAnalysis: A Visualization System for Bitcoin Wallet Investigation
Block Chain
2023
Click Here
14
Blockchain Enabled Decentralized Local Electricity Markets with Flexibility from Heating Sources
Block Chain
2023
Click Here
15
Blockchain Adoption in Food Supply Chains: A Systematic Literature Review on Enablers, Benefits, and Barriers
Block Chain
2023
Click Here
16
Blockchain for Healthcare Management Systems: A Survey on Interoperability and Security
Block Chain
2023
Click Here
17
Blockchain-based Federated Learning with SMPC Model Verification Against Poisoning Attack for Healthcare Systems
Block Chain
2023
Click Here
18
Blockchain-Enabled Authenticated Key Agreement Scheme for Mobile Vehicles-Assisted Precision Agricultural IoT Networks
Block Chain
2023
Click Here
19
Blockchain-Enabled Technique for Privacy- Preserved Medical Recommender System
Block Chain
2023
Click Here
20
Cryptocurrency Transaction Network Embedding From Static and Dynamic Perspectives: An Overview
Block Chain
2023
Click Here
21
Cyber-Physical Customer Management for Internet of Robotic Things-Enabled Banking
Block Chain
2023
Click Here
22
Federated Learning and Blockchain-enabled Fog-IoT Platform for Wearables in Predictive Healthcare
Block Chain
2023
Click Here
23
FLAME: Trusted Fire Brigade Service and Insurance Claim System using Blockchain for Enterprises
Block Chain
2023
Click Here
24
Privacy-Preserving Electricity Theft Detection based on Blockchain
Block Chain
2023
Click Here
25
Sec-Health: A Blockchain-Based Protocol for Securing Health Records
Block Chain
2023
Click Here
26
UCoin: An Efficient Privacy Preserving Scheme for Cryptocurrencies
Block Chain
2023
Click Here
27
User Interface of Blockchain-based Agri-Food Traceability Applications: A Review
Block Chain
2023
Click Here
28
Using Blockchain for Enabling Transparent, Traceable, and Trusted University Ranking Systems
Block Chain
2023
Click Here
29
Using Composable NFTs for Trading and Managing Expensive Packaged Products in the Food Industry
Block Chain
2023
Click Here
DATA MINING
1
A Comparative Analysis of Sampling Techniques for Click-Through Rate Prediction in Native Advertising
Data Mining
2023
Click Here
2
CrowdSPaFE: A Crowd-Sourced Multimodal Recommendation System for Urban Route Safety
Data Mining
2023
Click Here
3
Exploiting Category-Level Multiple Characteristics for POI Recommendation
Data Mining
2023
Click Here
4
Finding Critical Users in Social Communities via Graph Convolutions
Data Mining
2023
Click Here
5
Fine-Grained Relation Extraction for Drug Instructions Using Contrastive Entity Enhancement
Data Mining
2023
Click Here
6
Modeling Health Stage Development of Patients with Dynamic Attributed Graphs in Online Health Communities
Data Mining
2023
Click Here
7
Modeling Human Driving Behavior through Generative Adversarial Imitation Learning
Data Mining
2023
Click Here
8
Multi-Objective Dynamic Software Project Scheduling: A Novel Approach to Handle Employee’s Addition
Data Mining
2023
Click Here
9
NetFense: Adversarial Defenses against Privacy Attacks on Neural Networks for Graph Data
Data Mining
2023
Click Here
10
Optimal Drug Dosage Control Strategy of Immune Systems Using Reinforcement Learning
Data Mining
2023
Click Here
11
Remaining Shelf-Life Estimation of Fresh Fruits and Vegetables During Transportation
Data Mining
2023
Click Here
12
Two Stage Job Title Identification System for Online Job Advertisements
Data Mining
2023
Click Here
13
Shopping Hard or Hardly Shopping: Revealing Consumer Segments Using Clickstream Data
Data Mining
2023
Click Here
CYBERNETICS
1
A Dynamic Data Slice Approach to the Vulnerability Analysis of E-Commerce Systems
Cybernetics
2023
Click Here
2
Data Trust Framework Using Blockchain Technology and Adaptive Transaction Validation
Cybernetics
2023
Click Here
SOCIAL NETWORKS & NETWORKS

1
Friendship Inference in Mobile Social Networks: Exploiting Multi-Source Information With Two-Stage Deep Learning Framework
Social Networks
2023
Click Here
2
Socio-Technical Ecosystem Considerations: An Emergent Research Agenda for AI in Cybersecurity
Social Networks
2023
Click Here
3
Complaint and Severity Identification from Online Financial Content
Social Networks
2023
Click Here
4
Behavioral Model for Live Detection of Apps Based Attack
Social Networks
2023
Click Here
5
Explainable Misinformation Detection Across Multiple Social Media Platforms
Social Networks
2023
Click Here
6
Online POI Recommendation: Learning Dynamic Geo-Human Interactions in Streams
Social Networks
2023
Click Here
7
Target-Oriented Investigation of Online Abusive Attacks: A Dataset and Analysis
Social Networks
2023
Click Here
8
Textual Pre-Trained Models for Gender Identification Across Community Question-Answering Members
Social Networks
2023
Click Here
9
Travel Direction Recommendation Model Based on Photos of User Social Network Profile
Social Networks
2023
Click Here
10
Mitigating Influence of Disinformation Propagation Using Uncertainty-Based Opinion Interactions
Social Networks
2023
Click Here
11
Limited-Trust in Diffusion of Competing Alternatives over Social Networks
Social Networks
2023
Click Here
12
Detecting Fraudulent Student Communication in a Multiple Choice Online Test Environment
Social Networks
2023
Click Here
13
Consumer Behavior Analysis on Sales Process Model Using Process Discovery Algorithm for the Omnichannel Distribution System
Social Networks
2023
Click Here
14
Credible Expert Rank: Leveraging Social Network Analysis and Opinion Mining to Facilitate Reliable Information Retrieval on Knowledge-Sharing Sites
Social Networks
2023
Click Here
15
Exploring the Contextual Factors Affecting Multimodal Emotion Recognition in Videos
Social Networks
2023
Click Here
16
Multi-Objective Optimization of Evacuation Route for Heterogeneous Passengers in the Metro Station Considering Node Efficiency
Social Networks
2023
Click Here
17
Assessing the Impact of Contextual Information in Hate Speech Detection
Social Networks
2023
Click Here
       
DEPENDABLE AND SECURE COMPUTING
1
PhiKitA: Phishing Kit Attacks Dataset for Phishing Websites Identification
Secure Computing
2023
Click Here
2
On Detecting Route Hijacking Attack in Opportunistic Mobile Networks
Secure Computing
2023
Click Here
3
Sanare: Pluggable Intrusion Recovery for Web Applications
Secure Computing
2023
Click Here
4
A URL-Based Social Semantic Attacks Detection With Character-Aware Language Model
Secure Computing
2023
Click Here
5
Achieving Online and Scalable Information Integrity by Harnessing Social Spam Correlations
Secure Computing
2023
Click Here
6
Secure, ID Privacy and Inference Threat Prevention Mechanisms for Distributed Systems
Secure Computing
2023
Click Here
7
Vulnerability Evaluation Method for E-Commerce Transaction Systems With Unobservable Transitions
Secure Computing
2023
Click Here
8
SpADe: Multi-Stage Spam Account Detection for Online Social Networks
Secure Computing
2023
Click Here
     
MOBILE COMPUTING

 

1
CrowdPatrol: A Mobile Crowdsensing Framework for Traffic Violation Hotspot Patrolling
Mobile Computing
2023
Click Here
2
A Sensing, Communication and Computing Approach for Vulnerable Road Users Safety
Mobile Computing
2023
Click Here
3
Characterizing Mobile Money Phishing Using Reinforcement Learning
Mobile Computing
2023
Click Here
4
Enabling Balanced Data Deduplication in Mobile Edge Computing
Mobile Computing
2023
Click Here
5
Hiring a Team from Social Network: Incentive Mechanism Design for Two-tiered Social Mobile Crowdsourcing
Mobile Computing
2023
Click Here
6
RedPacketBike: A Graph-Based Demand Modeling and Crowd-Driven Station Rebalancing Framework for Bike Sharing Systems
Mobile Computing
2023
Click Here
7
Smart Edge-Based Driver Drowsiness Detection in Mobile Crowd sourcing
Mobile Computing
2023
Click Here
8
Urban Wellbeing: A Portable Sensing Approach to unravel the link between Environment and Mental Wellbeing
Mobile Computing
2023
Click Here
         
IMAGE PROCESSING
1
PhotoHelper: Portrait Photographing Guidance Via Deep Feature Retrieval and Fusion
Image Processing
2023
Click Here
2
ReLoc: A Restoration-Assisted Framework for Robust Image Tampering Localization
Image Processing
2023
Click Here
3
HoVer-Trans: Anatomy-Aware HoVer-Transformer for ROI-Free Breast Cancer Diagnosis in Ultrasound Images
Image Processing
2023
Click Here
4
Hercules: Deep Hierarchical Attentive Multilevel Fusion Model With Uncertainty Quantification for Medical Image Classification
Image Processing
2023
Click Here
5
HybrUR: A Hybrid Physical-Neural Solution for Unsupervised Underwater Image Restoration
Image Processing
2023
Click Here
Live 2022 and 2023 JAVA IEEE Projects List --- Download
Live Demo is available on youtube.You can click on demo link and can download the video for further reference and send your title name to the following email id to get base paper and Abstract.Please mention your degree and other requirements also..
Cloud Computing
Sl.No
Project Title Name
Domain
Year
Demo
1
Privacy-Preserving Public Auditing for Shared Cloud Data With Secure Group Management
Cloud Computing
2022
Click Here
2
BOEW: A Content-based Image Retrieval Scheme using Bag-of-Encrypted-Words in Cloud Computing
Cloud Computing
2022
Click Here
3
Cloud Raid: Detecting Distributed Concurrency Bugs via Log Mining and Enhancement
Cloud Computing
2022
Click Here
4
Data Integrity Audit Scheme Based on Blockchain Expansion Technology
Cloud Computing
2022
Click Here
5
Data Integrity Audit Based on Data Blinding for Cloud and Fog Environment
Cloud Computing
2022
Click Here
6
Achieving Efficient Secure Deduplication with User-Defined Access Control in Cloud
Cloud Computing
2022
Click Here
7
Efficient CP-ABE Scheme with Shared Decryption in Cloud Storage
Cloud Computing
2022
Click Here
8
VeriDedup: A Verifiable Cloud Data Deduplication Scheme with Integrity and Duplication Proof
Cloud Computing
2022
Click Here
9
Identity-Based Privacy Preserving Remote Data Integrity Checking With a Designated Verifier
Cloud Computing
2022
Click Here
10
Efficient Identity-based Provable Multi-Copy Data Possession in Multi-Cloud Storage
Cloud Computing
2022
Click Here
11
Secure and Lightweight Fine-grained Searchable Data Sharing for IoT-oriented and Cloud-assisted Smart Healthcare System
Cloud Computing
2022
Click Here
12
PMRSS: Privacy-preserving Medical Record Searching Scheme for Intelligent Diagnosis in IoT Healthcare
Cloud Computing
2022
Click Here
13
DSAS: A Secure Data Sharing and Authorized Searchable Framework for e-Healthcare System
Cloud Computing
2022
Click Here
14
Enabling Efficient, Secure and Privacy-preserving Mobile Cloud Storage
Cloud Computing
2022
Click Here
15
Enabling Verifiable and Dynamic Ranked Search Over Outsourced Data
Cloud Computing
2022
Click Here
16
Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage
Cloud Computing
2022
Click Here
17
Lightweight and Expressive Fine-grained Access Control for Healthcare Internet-of-Things
Cloud Computing
2022
Click Here
18
Web Cloud: Web-Based Cloud Storage for Secure Data Sharing across Platforms
Cloud Computing
2022
Click Here
19
Verifiable Searchable Encryption Framework against Insider Keyword-Guessing Attack in Cloud Storage
Cloud Computing
2022
Click Here
20
Revocable Identity-Based Access Control for Big Data with Verifiable Outsourced Computing
Cloud Computing
2022
Click Here
21
Server-Aided Fine-Grained Access Control Mechanism with Robust Revocation in Cloud Computing
Cloud Computing
2022
Click Here
22
Secure Cloud Data Deduplication with Efficient Re-encryption
Cloud Computing
2022
Click Here
23
A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain
Cloud Computing
2022
Click Here
24
A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds
Cloud Computing
2022
Click Here
25
Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT
Cloud Computing
2022
Click Here
26
Authorized Keyword Search over Outsourced Encrypted Data in Cloud Environment
Cloud Computing
2022
Click Here
27
Dual Access Control for Cloud-Based Data Storage and Sharing
Cloud Computing
2022
Click Here
28
Dual-Server Public-Key Authenticated Encryption with Keyword Search
Cloud Computing
2022
Click Here
29
Enabling Fast Public Auditing and Data Dynamics in Cloud Services
Cloud Computing
2022
Click Here
30
Fast Secure and Anonymous Key Agreement Against Bad Randomness for Cloud Computing
Cloud Computing
2022
Click Here
31
Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers
Cloud Computing
2022
Click Here
32
Practical Multi-Keyword Ranked Search With Access Control Over Encrypted Cloud Data
Cloud Computing
2022
Click Here
33
Publicly Verifiable Shared Dynamic Electronic Health Record Databases With Functional Commitment Supporting Privacy-Preserving Integrity Auditing
Cloud Computing
2022
Click Here
34
Similarity Search for Encrypted Images in Secure Cloud Computing
Cloud Computing
2022
Click Here
35
Auction based Resource Allocation Mechanism in Federated Cloud Environment: TARA
Cloud Computing
2022
Click Here
36
Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data
Cloud Computing
2022
Click Here
BLOCKCHAIN

 

1
A Secure E-Coupon Service Based on Blockchain Systems
Block Chain
2022
Click Here
2
A Block chain Based System for Healthcare Digital Twin
Block Chain
2022
Click Here
3
Block chain technology for protecting the banking transaction without using tokens
Block Chain
2022
Click Here
4
Privacy-Preserving Framework for Blockchain-Based Stock Exchange Platform
Block Chain
2022
Click Here
5
Blockchain-Based Electronic Health Records Management: A Comprehensive Review and Future Research Direction
Block Chain
2022
Click Here
6
Blockchain-Based Management for Organ Donation and Transplantation
Block Chain
2022
Click Here
7
Blockchain-based Management of Blood Donation
Block Chain
2022
Click Here
8
Blockchain Technology for Secure Supply Chain Management A Comprehensive Review
Block Chain
2022
Click Here
9
Enabling Trust and Privacy-Preserving e-KYC System Using Blockchain
Block Chain
2022
Click Here
10
Decentralized Blockchain-Based Trust Management Protocol for the Internet of Things
Block Chain
2022
Click Here
11
Protecting Vaccine Safety: An Improved, Blockchain-Based, Storage-Efficient Scheme
Block Chain
2022
Click Here
12
Blockchain as a Cyber Defense: Opportunities, Applications, and Challenges
Block Chain
2022
Click Here
13
Automatic Generation of Ethereum-Based Smart Contracts for Agri-Food Traceability System
Block Chain
2022
Click Here
14
Towards Blockchain Based Secure Storage and Trusted Data Sharing Scheme for IoT Environment
Block Chain
2022
Click Here
15
Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-based IIoT Networks
Block Chain
2022
Click Here
16
VFChain: Enabling Verifiable and Auditable Federated Learning via Blockchain Systems
Block Chain
2022
Click Here
17
A Blockchain Approach to Ensuring Provenance to Outsourced Cloud Data in a Sharing Ecosystem
Block Chain
2022
Click Here
18
PROTECTING PERSONAL HEALTHCARE RECORD USING BLOCK CHAIN
Block Chain
2022
Click Here
DATA MINING
1
Social Media Driven Big Data Analysis for Disaster Situation Awareness: A Tutorial
Data Mining
2022
Click Here
2
Activity Organization for Friend-Making Optimization in Online Social Networks
Data Mining
2022
Click Here
3
Predicting Hot Events in the Early Period through Bayesian Model for Social Networks
Data Mining
2022
Click Here
4
Modeling Health Stage Development of Patients with Dynamic Attributed Graphs in Online Health Communities
Data Mining
2022
Click Here
5
Principle-Based Approach for the De-Identification of Code-Mixed Electronic Health Records
Data Mining
2022
Click Here
6
Evaluating Public Anxiety for Topic-based Communities in Social Networks
Data Mining
2022
Click Here
7
Feature Selection Algorithms For Predicting Students Academic Performance Using Data Mining Techniques
Data Mining
2022
Click Here
8
HinCTI: A Cyber Threat Intelligence Modeling and Identification System Based on Heterogeneous Information Network
Data Mining
2022
Click Here
9
Item Recommendation for Word-of-Mouth Scenario in Social ECommerce
Data Mining
2022
Click Here
10
Modeling Product’s Visual and Functional Characteristics for Recommender Systems
Data Mining
2022
Click Here
11
Racism Detection by Analyzing Differential Opinions Through Sentiment Analysis of Tweets Using Stacked Ensemble GCR-NN Model
Data Mining
2022
Click Here
12
Rating Prediction With Review Network Feedback: A New Direction in Recommendation
Data Mining
2022
Click Here
13
Exploring E-Commerce Product Experience Based on Fusion Sentiment Analysis Method
Data Mining
2022
Click Here
14
User Identity Linkage via Co-Attentive Neural Network from Heterogeneous Mobility Data
Data Mining
2022
Click Here

CYBERNETICS
1
Trustworthiness Assessment of Users in Social Reviewing Systems
Cybernetics
2022
Click Here
2
A Learning-Based POI Recommendation With Spatiotemporal Context Awareness
Cybernetics
2022
Click Here
3
False-Data-Injection Attacks on Remote Distributed Consensus Estimation
Cybernetics
2022
Click Here

SOCIAL NETWORKS & NETWORKS

1
The Effect of Social Media User Behaviors on Security and Privacy Threats
Social Networks
2022
Click Here
2
A Taxonomy of Fake News Classification Techniques: Survey and Implementation Aspects
Social Networks
2022
Click Here
3
The Social Media Break-Up: Psycho-Behavioral Measures and Implications
Social Networks
2022
Click Here
4
Composite Behavioral Modeling for Identity Theft Detection in Online Social Networks
Social Networks
2022
Click Here
5
Social Spammer Detection via Convex Nonnegative Matrix Factorization
Social Networks
2022
Click Here
6
Social Engineering Attacks Prevention: A Systematic Literature Review
Social Networks
2022
Click Here
7
Cross-Platform Reputation Generation System Based on Aspect-Based Sentiment Analysis
Social Networks
2022
Click Here
8
PredicTour: Predicting Mobility Patterns of Tourists Based on Social Media User's Profiles
Social Networks
2022
Click Here
9
DEA-RNN: A Hybrid Deep Learning Approach for Cyberbullying Detection in Twitter Social Media Platform
Social Networks
2022
Click Here
10
FADOHS: Framework for Detection and Integration of Unstructured Data of Hate Speech on Facebook Using Sentiment and Emotion Analysis
Social Networks
2022
Click Here
11
Toward Data Justice Understanding Police Shooting Data Systems and Narratives
Social Networks
2022
Click Here
12
Intelligent Distribution of Fresh Agricultural Products in Smart City
Social Networks
2022
Click Here
13
Influence Based Defense Against Data Poisoning Attacks in Online Learning
Social Networks
2022
Click Here
14
DetectDUI: An In-Car Detection System for Drink Driving and BACs
Social Networks
2022
Click Here
       

DEPENDABLE AND SECURE COMPUTING
1
Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack
Secure Computing
2022
Click Here
2
One Parameter Defense - Defending against Data Inference Attacks via Differential Privacy
Secure Computing
2022
Click Here
3
An Explainable Multi-Modal Hierarchical Attention Model for Developing Phishing Threat Intelligence
Secure Computing
2022
Click Here
4
Blockchain-based Certificate Transparency and Revocation Transparency
Secure Computing
2022
Click Here
5
CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments
Secure Computing
2022
Click Here
6
Cyber security Awareness in Online Education: A Case Study Analysis
Secure Computing
2022
Click Here
7
Detecting Sybil Attacks using Proofs of Work and Location in VANETs
Secure Computing
2022
Click Here
8
Representing Fine-Grained Co-Occurrences for Behavior-Based Fraud Detection in Online Payment Services
Secure Computing
2022
Click Here
9
Efficient Certificateless Multi-Copy Integrity Auditing Scheme Supporting Data Dynamics
Secure Computing
2022
Click Here
10
Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme with Enhanced Security Provision
Secure Computing
2022
Click Here
11
EntrapNet: a Blockchain-Based Verification Protocol for Trustless Computing
Secure Computing
2022
Click Here
12
Trust But Verify: a framework for the trustworthiness of distributed systems
Secure Computing
2022
Click Here
13
Lightweight and Certificateless Multi-Receiver Secure Data Transmission Protocol for Wireless Body Area Networks
Secure Computing
2022
Click Here
14
Achieve Efficient and Privacy-preserving Disease Risk Assessment over Multi-outsourced Vertical Datasets
Secure Computing
2022
Click Here
15
Quantum-Safe Round-Optimal Password Authentication for Mobile Devices
Secure Computing
2022
Click Here
16
A Real Time Firewall Policy Rule Set Anomaly Free Mechanism
Secure Computing
2022
Click Here
17
SC-TRUST: A Dynamic Model for Trustworthy Service Composition in the Internet of Things
Secure Computing
2022
Click Here
18
SCA: Sybil-based Collusion Attacks of IIoT Data Poisoning in Federated Learning
Secure Computing
2022
Click Here
     

MOBILE COMPUTING

 

1
Trust Based Incentive Scheme to Allocate Big Data Tasks with Mobile Social Cloud
Mobile Computing
2022
Click Here
2
Eclipse: Preserving Differential Location Privacy Against Long-Term Observation Attacks
Mobile Computing
2022
Click Here
3
Towards Personalized Privacy-Preserving Incentive for Truth Discovery in Mobile Crowd sensing Systems
Mobile Computing
2022
Click Here
4
Secure Mobile Edge Computing Networks in the Presence of Multiple Eavesdroppers
Mobile Computing
2022
Click Here
5
Membership Inference Attack and Defense for Wireless Signal Classifiers with Deep Learning
Mobile Computing
2022
Click Here
         
IMAGE PROCESSING
1
Show, Price and Negotiate A Negotiator With Online Value Look-Ahead
Image Processing
2022
Click Here
2
Multi-modal Meta Multi-Task Learning for Social Media Rumor Detection
Image Processing
2022
Click Here
3
Asymmetric Hash Code Learning for Remote Sensing Image Retrieval
Image Processing
2022
Click Here
4
Scalable Distributed Hashing for Approximate Nearest Neighbor Search
Image Processing
2022
Click Here
5
SAC: Semantic Attention Composition for Text-Conditioned Image Retrieval
Image Processing
2022
Click Here
6
Global-Aware Ranking Deep Metric Learning for Remote Sensing Image Retrieval
Image Processing
2022
Click Here
7
Hash Learning with Variable Quantization for Large-scale Retrieval
Image Processing
2022
Click Here

     

Live 2021 and 2022 JAVA IEEE Projects List --- Download

Live Demo is available on youtube.You can click on demo link and can download the video for further reference and send your title name to the following email id to get base paper and Abstract.Please mention your degree and other requirements also..
Cloud Computing
Sl.No
Project Title Name
Domain
Year
Demo
1
Pocket Diagnosis: Secure Federated Learning against Poisoning Attack in the Cloud
Cloud Computing
2021
Click Here
2
Detecting Suspicious File Migration or Replication in the Cloud
Cloud Computing
2021
Click Here
3
CryptCloud+: Secure and Expressive Data Access Control for Cloud Storage
Cloud Computing
2021
Click Here
4
Attacking and Protecting Data Privacy in Edge-Cloud Collaborative Inference Systems
Cloud Computing
2021
Click Here
5
A Verifiable Semantic Searching Scheme by Optimal Matching over Encrypted Data in Public Cloud
Cloud Computing
2021
Click Here
6
An Efficient Ciphertext Index Retrieval Scheme based on Edge Computing Framework
Cloud Computing
2021
Click Here
7
Efficient Revocable Multi-Authority Attribute-Based Encryption for Cloud Storage
Cloud Computing
2021
Click Here
8
Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness
Cloud Computing
2021
Click Here
9
A Fast Nearest Neighbor Search Scheme over Outsourced Encrypted Medical Images
Cloud Computing
2021
Click Here
10
A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain
Cloud Computing
2020
Click Here
11
Certificateless public integrity checking of group shared data on cloud storage
Cloud Computing
2021
Click Here
12
Efficient Identity-Based Distributed Decryption Scheme for Electronic Personal Health Record Sharing System
Cloud Computing
2021
Click Here
13
Multi authority Attribute Based Keyword Search over Encrypted Cloud Data
Cloud Computing
2021
Click Here
14
PPCSA A Privacy Preserving Cloud Storage Auditing Scheme for Data Sharing
Cloud Computing
2021
Click Here
15
RACE Resource Aware Cost-Efficient Scheduler for Cloud Fog Environment
Cloud Computing
2021
Click Here
16
Enabling Secure and Space-Efficient Metadata Management in Encrypted Deduplication
Cloud Computing
2021
Click Here
17
Privacy-Preserving Media Sharing with Scalable Access Control and Secure Deduplication in Mobile Cloud Computing
Cloud Computing
2021
Click Here
18
Efficient Auditing Scheme for Secure Data Storage in Fog-to-Cloud Computing
Cloud Computing
2021
Click Here
19
A Statistical Inference Attack on Privacy-Preserving Biometric Identification Scheme
Cloud Computing
2021
Click Here
20
A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users
Cloud Computing
2021
Click Here
21
Accountable Proxy Re-Encryption for Secure Data Sharing
Cloud Computing
2021
Click Here
22
Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data
Cloud Computing
2021
Click Here
23
Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud
Cloud Computing
2021
Click Here
24
Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments
Cloud Computing
2021
Click Here
25
Dual Access Control for Cloud-Based Data Storage and Sharing
Cloud Computing
2021
Click Here
26
Inference Attack-Resistant E-Healthcare Cloud System with Fine-Grained Access Control
Cloud Computing
2021
Click Here
27
Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data           Cloud Computing
Cloud Computing
2021
Click Here
28
Practical Multi keyword Ranked Search with Access Control over Encrypted Cloud Data
Cloud Computing
2021
Click Here
29
Privacy Preserving Searchable Encryption with Fine-grained Access Control
Cloud Computing
2021
Click Here
30
Dynamic Group-Oriented Provable Data Possession in the Cloud
Cloud Computing
2021
Click Here
31
Publicly Verifiable Shared Dynamic Electronic Health Record Databases with Functional Commitment Supporting Privacy-Preserving Integrity Auditing
Cloud Computing
2021
Click Here
32
Secure Fine-Grained Encrypted Keyword Search for E-Healthcare Cloud
Cloud Computing
2021
Click Here
33
SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage
Cloud Computing
2021
Click Here
34
SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the Cloud
Cloud Computing
2021
Click Here
35
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification
Cloud Computing
2021
Click Here
36 A Fine-Grained and Lightweight Data Access Control Model for Mobile Cloud Computing
Cloud Computing
2021
Click Here
BLOCKCHAIN

 

1
A Blockchain based Autonomous Decentralized Online Social Network
Block Chain
2021
Click Here
2
A Blockchain-based Approach for Drug Traceability in Healthcare Supply Chain
Block Chain
2021
Click Here
3
A Trusted Blockchain-Based Traceability System for Fruit and Vegetable Agricultural Products
Block Chain
2021
Click Here
4
Blockchain Assisted Collaborative Service Recommendation Scheme With Data Sharing
Block Chain
2021
Click Here
5
Blockchain Based Accounts Payable Platform for Goods Trade
Block Chain
2021
Click Here
6
Blockchain-based Decentralized Authentication Modeling Scheme in Edge and IoT Environment
Block Chain
2021
Click Here
8
Fortified Chain A Blockchain Based Framework for Security and Privacy Assured Internet of Medical Things
Block Chain
2021
Click Here
INTERNET OF THINGS(IOT)
1
Fast Containment of Infectious Diseases with E-healthcare Mobile Social Internet of Things
IOT
2021
Click Here
2
SBBS A Secure Blockchain-Based Scheme for IoT Data Credibility in Fog Environment
IOT
2021
Click Here
3
Social Interaction and Information Diffusion in Social Internet of Things Dynamics Cloud Edge Traceability
IOT
2021
Click Here
4
Trustworthy Digital Twins in the Industrial Internet of Things with Blockchain
IOT
2021
Click Here
5
A Proxy Re-Encryption Approach to Secure Data Sharing in the
Internet of Things Based on Block chain
IOT
2021
Click Here
6
Dynamic Resource Allocation and Computation Offloading for IoT Fog Computing System
IOT
2021
Click Here
7
Secure ABE Scheme for Access Management in Blockchain-Based IoT
IOT
2021
Click Here
8
Timely Detection and Mitigation of Stealthy DDoS Attacks via IoT Networks
IOT
2021
Click Here
9
Towards Fine-Grained Access Control in Enterprise-Scale Internet-of-Things
IOT
2021
Click Here
10
Toward Detection and Attribution of Cyber-Attacks in IoT-enabled Cyber-physical Systems
IOT
2021
Click Here
     
DATA MINING
1
Mining Fraudsters and Fraudulent Strategies in Large-Scale Mobile Social
Data Mining
2021
Click Here
2
Method for Ranking the Helpfulness of Online Reviews Based on SO-ILES TODIM
Data Mining
2021
Click Here
3
Leveraging Affective Hashtags for Ranking Music Recommendations
Data Mining
2021
Click Here
4
Personality aware Product Recommendation System based on User Interests Mining and Meta path Discovery
Data Mining
2021
Click Here
5
Suicidal Ideation Detection: A Review of Machine Learning Methods and Applications
Data Mining
2021
Click Here
6
“What Do Your Friends Think” Efficient Polling Methods for Networks Using Friendship Paradox
Data Mining
2021
Click Here
7
Discovering Hidden Topical Hubs and Authorities Across Multiple Online Social Networks
Data Mining
2021
Click Here
8
Improvising Personalized Travel Recommendation System with Recency Effects
Data Mining
2021
Click Here
9
Modeling Influence Diffusion over Signed Social Networks
Data Mining
2021
Click Here
10
Popularity Prediction for Single Tweet based on Heterogeneous Bass Model
Data Mining
2021
Click Here
11
Query Expansion with Local Conceptual Word Embeddings in Microblog Retrieval
Data Mining
2021
Click Here
12
Sentiment Polarity Classification at EVALITA: Lessons Learned and Open Challenges
Data Mining
2021
Click Here
13
Robust Detection of Link Communities With Summary Description in Social Networks
Data Mining
2021
Click Here
14
Rumor Source Detection With Multiple Observations Under Adaptive Diffusions
Data Mining
2021
Click Here
15
User-Driven Geolocated Event Detection in Social Media
Data Mining
2021
Click Here

BIG DATA
1
Hybrid Recommender System for Tourism Based on Big Data and AI A Conceptual Framework
Bigdata
2021
Click Here
2
A Searchable and Verifiable Data Protection Scheme for Scholarly Big Data
Bigdata
2021
Click Here

SOCIAL NETWORKS & NETWORKS

1
Sentiment Analysis of Lockdown in India During COVID19 A Case Study
Social Networks
2021
Click Here
2
Detecting Mental Disorders in Social Media Through Emotional Patterns The case of Anorexia and Depression
Social Networks
2021
Click Here
3
Dynamic Control of Fraud Information Spreading in Mobile Social Networks
Social Networks
2021
Click Here
4
Load Photo A Novel Analysis Method for Load Data
Social Networks
2021
Click Here
5
Public Opinion Analysis on Novel Coronavirus Pneumonia and
Interaction With Event Evolution in Real World
Social Networks
2021
Click Here
6
Trust Assessment in Online Social Networks
Social Networks
2021
Click Here
7
Trace Me If You Can An Unlinkability Approach for Privacy-Preserving in Social Networks
Social Networks
2021
Click Here
8
Leveraging Social Network Analysis for Characterizing Cohesion of Human-Managed Animals
Social Networks
2021
Click Here
9
Privacy-Preserving Media Sharing with Scalable Access Control and Secure De duplication in Mobile Cloud Computing
Social Networks
2021
Click Here
10
Social Recommendation With Learning Personal and Social Latent Factors
Social Networks
2021
Click Here
       

SECURE COMPUTING
1
oGBAC A Group Based Access Control Framework for Information Sharing in Online Social Networks
Secure Computing
2021
Click Here
2
Privacy Preserving Electronic Ticket Scheme with Attribute based Credentials
Secure Computing
2021
Click Here
3
Fraud Detection in Online Product Review Systems via Heterogeneous Graph Transformer
Secure Computing
2021
Click Here
4
Protecting Your Shopping Preference with Differential Privacy
Secure Computing
2021
Click Here
5
Sensitive Label Privacy Preservation with Anatomization for Data Publishing
Secure Computing
2021
Click Here
6
BullyNet: Unmasking Cyberbullies on Social Networks
Secure Computing
2021
Click Here
7
Quantifying Membership Privacy via Information Leakage
Secure Computing
2021
Click Here
8
Privacy Preserving Location-Aware Personalized Web Service Recommendations
Secure Computing
2021
Click Here
     
SOFTWARE ENGINEERING,SERVICE COMPUTING
1
Crisis-Critical Intellectual Property Findings From the COVID-19 Pandemic
Software Engineering
2021
Click Here
     

MOBILE COMPUTING

 

1
Privacy Preserving Media Sharing with Scalable Access Control and Secure Deduplication in Mobile Cloud Computing
Mobile Computing
2021
Click Here
2
PROTECT Efficient Password-Based Threshold Single-Sign-On Authentication for Mobile Users against Perpetual Leakage
Vehicular Technology
2021
Click Here
         
IMAGE PROCESSING
1
Load Photo A Novel Analysis Method for Load Data
Image Processing
2021
Click Here

     

 

Live 2020 and 2021 JAVA IEEE Projects List --- Download

Live Demo is available on youtube.You can click on demo link and can download the video for further reference and send your title name to the following email id to get base paper and Abstract.Please mention your degree and other requirements also..
Cloud Computing
Sl.No
Project Title Name
Domain
Year
Demo
1
A Verifiable Semantic Searching Scheme by Optimal Matching over Encrypted Data in Public Cloud
Cloud Computing
2020
Click Here
2
Achieving Practical Symmetric Searchable Encryption with Search Pattern Privacy over Cloud
Cloud Computing
2020
Click Here
3
Achieving Searchable Encryption Scheme with Search Pattern Hidden
Cloud Computing
2020
Click Here
4
Authentication and Key Agreement Based on Anonymous Identity for Peer-to-Peer Cloud
Cloud Computing
2020
Click Here
5
CloudRaid Detecting Distributed Concurrency Bugs via Log-Mining and Enhancement
Cloud Computing
2020
Click Here
6
Designing Secure and Efficient Biometric-Based Secure Access Mechanism for Cloud Services
Cloud Computing
2020
Click Here
7
Lightweight Privacy-preserving Medical Diagnosis in Edge Computing
Cloud Computing
2020
Click Here
8
Personality and Value-aware Scheduling of User Requests in Cloud for Profit Maximization
Cloud Computing
2020
Click Here
9
Privacy-preserving Efficient Verifiable Deep Packet Inspection for Cloud-assisted Middlebox
Cloud Computing
2020
Click Here
10
Privacy-preserving Medical Treatment System through Nondeterministic Finite Automata
Cloud Computing
2020
Click Here
11
Privacy-Preserving Outsourced Inner Product Computation on Encrypted Database
Cloud Computing
2020
Click Here
12
Proactive Fault-Tolerance Technique to Enhance Reliability of Cloud Service in Cloud Federation Environment
Cloud Computing
2020
Click Here
13
Publicly Verifiable Shared Dynamic Electronic Health Record Databases
Cloud Computing
2020
Click Here
14
Revocable Attribute-based Data Storage in Mobile Clouds
Cloud Computing
2020
Click Here
15
Scalable Discovery of Hybrid Process Models in a Cloud Computing Environment
Cloud Computing
2020
Click Here
16
Secure Cloud Storage with Data Dynamics Using Secure Network Coding Techniques
Cloud Computing
2020
Click Here
17
Secure Keyword Search and Data Sharing Mechanism for Cloud Computing
Cloud Computing
2020
Click Here
18
Secure Similarity Search over Encrypted Non-Uniform Datasets
Cloud Computing
2020
Click Here
19
Secure Storage Auditing with Efficient Key Updates for Cognitive Industrial IoT Environment
Cloud Computing
2020
Click Here
20
Semantics of Data Mining Services in Cloud Computing
Cloud Computing
2020
Click Here
21
Similarity Search for Encrypted Images in Secure Cloud Computing
Cloud Computing
2020
Click Here
22
Tag-based Verifiable Delegated Set Intersection over Outsourced Private Datasets
Cloud Computing
2020
Click Here
23
Threshold Multi-keyword Search for Cloud-Based Group Data Sharing
Cloud Computing
2020
Click Here
24
Towards Secure and Efficient Equality Conjunction Search over Outsourced Databases
Cloud Computing
2020
Click Here
25
Verifiable Searchable Encryption Framework against Insider Keyword-Guessing Attack in Cloud Storage
Cloud Computing
2020
Click Here
26
A Secure Enhanced Key-Policy Attribute-Based Temporary Keyword Search Scheme in the Cloud
Cloud Computing
2020
Click Here
27
Development and Examination of Fog Computing-Based Encrypted Control System.
Cloud Computing
2020
Click Here
28
A Novel Feature Matching Ranked Search Mechanism Over Encrypted Cloud Data
Cloud Computing
2020
Click Here
29
A Secure and Efficient Cloud-Centric Internet of Medical Things-Enabled Smart Healthcare System with Public Verifiability
Cloud Computing
2020
Click Here
30
Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography
Cloud Computing
2020
Click Here
31
Key Policy Attribute-Based Encryption with Keyword Search in Virtualized Environments
Cloud Computing
2020
Click Here
32
Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud.
Cloud Computing
2020
Click Here
33
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud Computing.
Cloud Computing
2020
Click Here
34
Key-Escrow Free Attribute-Based Multi-Keyword Search with Dynamic Policy Update in Cloud Computing.
Cloud Computing
2020
Click Here
35
Fast Secure and Anonymous Key Agreement Against Bad Randomness for Cloud Computing.
Cloud Computing
2020
Click Here

 

DATA MINING

 

1
A Hidden Markov Contour Tree Model for Spatial Structured Prediction
Data Mining
2020
Click Here
2
Achieving Practical Symmetric Searchable Encryption with Search Pattern Privacy over Cloud
Data Mining
2020
Click Here
3
Achieving Secure and Dynamic Range Queries Over Encrypted Cloud Data
Data Mining
2020
Click Here
4
Adaptive Diffusion of Sensitive Information In Online Social Networks
Data Mining
2020
Click Here
5
Adaptive Similarity Embedding For Unsupervised Multi-View Feature Selection
Data Mining
2020
Click Here
6
Adaptively Secure and Fast Processing of Conjunctive Queries over Encrypted Data
Data Mining
2020
Click Here
7
BATCH A Scalable Asymmetric Discrete Cross-Modal Hashing
Data Mining
2020
Click Here
8
Cashless Society Managing Privacy and Security in the Technological Age
Data Mining
2020
Click Here
9
DGDFS Dependence Guided Discriminative Feature Selection for Predicting Adverse Drug-Drug Interaction
Data Mining
2020
Click Here
10
Discovering Temporal Patterns for Event Sequence Clustering via Policy Mixture Model
Data Mining
2020
Click Here
11
Effective Keyword Search over Weighted Graphs
Data Mining
2020
Click Here
12
Efficient Match-Based Candidate Network Generation for Keyword Queries over Relational Databases
Data Mining
2020
Click Here
13
Efficient Processing of Group Planning Queries Over Spatial-Social Networks
Data Mining
2020
Click Here
14
Efficiently Processing Spatial and Keyword Queries in Indoor Venues
Data Mining
2020
Click Here
15
Evaluating Public Anxiety for Topic-based Communities in Social Networks
Data Mining
2020
Click Here
16
Fast Multi-view Semi-supervised Learning with Learned Graph
Data Mining
2020
Click Here
17
Fuzzy K-Means Clustering With Discriminative Embedding
Data Mining
2020
Click Here
18
Guarantee the Quality-of-Service of Control Transactions in Real-Time Database Systems
Data Mining
2020
Click Here
19
Hierarchical Prediction and Adversarial Learning For Conditional Response Generation
Data Mining
2020
Click Here
20
Land Use Classification with Point of Interests and Structural Patterns
Data Mining
2020
Click Here
21
Modeling Relation Paths for Knowledge Graph Completion
Data Mining
2020
Click Here
22
Multi-view Clustering with the Cooperation of Visible and Hidden Views
Data Mining
2020
Click Here
23
Online Pricing with Reserve Price Constraint for Personal Data Markets
Data Mining
2020
Click Here
24
Personalized Long and Short term Preference Learning for Next POI Recommendation
Data Mining
2020
Click Here
25
Predicting Hot Events in the Early Period through Bayesian Model for Social Networks
Data Mining
2020
Click Here
26
Predicting Student Performance in an Educational Game Using a Hidden Markov Model
Data Mining
2020
Click Here
27
Privacy Preserving Location Data Publishing A Machine Learning Approach
Data Mining
2020
Click Here
28
Product Quantized Collaborative Filtering
Data Mining
2020
Click Here
29
Publicly Verifiable Databases with All Efficient Updating Operations
Data Mining
2020
Click Here
30
Scalable and Adaptive Data Replica Placement for Geo-Distributed Cloud Storages
Data Mining
2020
Click Here
31
Social Boosted Recommendation with Folded Bipartite Network Embedding
Data Mining
2020
Click Here
32
Emotion Correlation Mining Through Deep Learning Models on Natural Language Textg
Data Mining
2020
Click Here
         

SECURE COMPUTING

 

1
A hybrid fault-tolerant scheduling for deadline-constrained tasks in Cloud systems
Secure Computing
2020
Click Here
2
CloudRaid Detecting Distributed Concurrency Bugs via Log-Mining and Enhancement
Secure Computing
2020
Click Here
3
Dynamic Resource Allocation and Computation Offloading for IoT Fog Computing System
Secure Computing
2020
Click Here
4
ECOGreen Electricity Cost Optimization for Green Datacenters in Emerging Power Markets
Secure Computing
2020
Click Here
5
Efficient Encrypted Data Search with Expressive Queries and Flexible Update
Secure Computing
2020
Click Here
6
Energy-aware cloud workflow applications scheduling with geo-distributed data
Secure Computing
2020
Click Here
7
KeySea Keyword-based Search with Receiver Anonymity in Attribute-based Searchable Encryption
Secure Computing
2020
Click Here
8
Lightweight Privacy-preserving Raw Data Publishing Scheme
Secure Computing
2020
Click Here
9
Location-Aware Service Recommendations With Privacy-Preservation in the Internet of Things
Secure Computing
2020
Click Here
10
Lucid A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection
Secure Computing
2020
Click Here
11
Minimizing Financial Cost of DDoS Attack Defense in Clouds with Fine-Grained Resource Management
Secure Computing
2020
Click Here
12
Personalized Recommendation System based on Collaborative Filtering for IoT Scenarios
Secure Computing
2020
Click Here
13
Privacy Preserving QoS Forecasting in Mobile Edge Environments
Secure Computing
2020
Click Here
14
Provably Efficient Resource Allocation for Edge Service Entities Using Hermes
Secure Computing
2020
Click Here
15
Reverse Nearest Neighbor Search in Semantic Trajectories for Location based Services
Secure Computing
2020
Click Here
16
Revocable Attribute-based Data Storage in Mobile Clouds
Secure Computing
2020
Click Here
17
Scalable Discovery of Hybrid Process Models in a Cloud Computing Environment
Secure Computing
2020
Click Here
18
Semantics of Data Mining Services in Cloud Computing
Secure Computing
2020
Click Here
19
Shed+ Optimal Dynamic Speculation to Meet Application Deadlines in Cloud
Secure Computing
2020
Click Here
     
INTERNET OF THINGS(IOT)
1
A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems
IOT
2020
Click Here
2
An Efficient IoT-Based Platform for Remote Real-Time Cardiac Activity Monitoring
IOT
2020
Click Here
3
An Efficient Privacy Preserving Message Authentication Scheme for Internet-of-Things
IOT
2020
Click Here
4
An Efficient Spam Detection Technique for IoT Devices using Machine Learning
IOT
2020
Click Here
5
Efficient IoT Management with Resilience to Unauthorized Access to Cloud Storage
IOT
2020
Click Here
6
Efficient Privacy Preserving Data Collection and Computation Offloading for Fog-Assisted IoT
IOT
2020
Click Here
7
Secure Storage Auditing with Efficient Key Updates for Cognitive Industrial IoT Environment
IOT
2020
Click Here

 

INFORMATION FORENSICS and SECURITY

 

1
Sparse Mobile Crowdsensing With Differential and Distortion Location Privacy
Information Forensics and Secuirty
2020
Click Here
2
A Verifiable Semantic Searching Scheme by Optimal Matching over Encrypted Data in Public Cloud
Information Forensics and Secuirty
2020
Click Here
3
Pay as You Decrypt Decryption Outsourcing for Functional Encryption Using Blockchain
Information Forensics and Secuirty
2020
Click Here
4
Securing Resources in Decentralized Cloud Storage
Information Forensics and Secuirty
2020
Click Here
5
Fake News, Disinformation,and Deepfakes: Leveraging Distributed Ledger Technologies and Blockchain to Combat Digital Deception and Counterfeit Reality
Information Forensics and Secuirty
2020
Click Here
6
 
Information Forensics and Secuirty
2020
Click Here
7
 
Information Forensics and Secuirty
2020
Click Here

MOBILE COMPUTING

1
AdSherlock Efficient and Deployable Click Fraud Detection for Mobile Applications
Mobile Computing
2020
Click Here
2
Distributed Time-Sensitive Task Selection in Mobile Crowdsensing
Mobile Computing
2020
Click Here
3
Eclipse Preserving Differential Location Privacy Against Long-Term Observation Attacks
Mobile Computing
2020
Click Here
4
Exploiting Multi-Dimensional Task Diversity in Distributed Auctions for Mobile Crowd Sensing
Mobile Computing
2020
Click Here
5
Fine Grained User Profiling for Personalized Task Matching in Mobile Crowd Sensing
Mobile Computing
2020
Click Here
6
KOLLECTOR Detecting Fraudulent Activities on Mobile Devices Using Deep Learning
Mobile Computing
2020
Click Here
7
PACE Privacy-Preserving and Quality-Aware Incentive Mechanism for Mobile Crowd Sensing
Mobile Computing
2020
Click Here
8
Predictability and Prediction of Human Mobility Based on Application-collected Location Data
Mobile Computing
2020
Click Here
9
Privacy-Preserving Media Sharing with Scalable Access Control and Secure De duplication in Mobile Cloud Computing
Mobile Computing
2020
Click Here
10
Protecting Your Shopping Preference with Differential Privacy
Mobile Computing
2020
Click Here
11
Proximity-Aware Location Based Collaborative Sensing for Energy-Efficient Mobile Devices
Mobile Computing
2020
Click Here
12
Social Recruiter Dynamic Incentive Mechanism for Mobile Crowd Sourcing Worker Recruitment with Social Networks
Mobile Computing
2020
Click Here
13
Towards Fine-Grained Access Control in Enterprise-Scale Internet-of-Things
Mobile Computing
2020
Click Here
14
Towards Personalized Privacy-Preserving Incentive for Truth Discovery in Mobile Crowd Sensing Systems
Mobile Computing
2020
Click Here
       

 

SOCIAL NETWORK

 

 

1
Activity Minimization of Misinformation Influence in Online Social Networks
Social Network
2020
Click Here
2
An Efficient Feedback Control Mechanism for Positive or  Negative Information Spread in Online Social Networks
Social Network
2020
Click Here
3
ArvaNet Deep Recurrent Architecture for PPG-Based Negative Mental-State Monitoring
Social Network
2020
Click Here
4
Characterizing the Propagation of Situational Information in Social Media During COVID-19 Epidemic A Case Study on Weibo
Social Network
2020
Click Here
5
Continuous Activity Maximization in Online Social Networks
Social Network
2020
Click Here
6
Detecting and Characterizing Extremist Reviewer Groups in Online Product Reviews
Social Network
2020
Click Here
7
Detection of Malicious Social Bots Using Learning Automata With URL Features in Twitter Network
Social Network
2020
Click Here
8
Information Dissemination From Social Network for Extreme Weather Scenario
Social Network
2020
Click Here
9
Location-Aware Service Recommendations With Privacy-Preservation in the Internet of Things
Social Network
2020
Click Here
10
Movie Recommendation System Using Sentiment Analysis From Micro blogging Data
Social Network
2020
Click Here
11
On Utilizing Communities Detected From Social Networks in Hashtag Recommendation
Social Network
2020
Click Here
12
Understanding the User Behavior of Foursquare A Data-Driven Study on a Global Scale
Social Network
2020
Click Here
13
User Behavior Prediction of Social Hotspots Based on Multi message Interaction and Neural Network
Social Network
2020
Click Here
14
Popular Matching for Security-Enhanced Resource Allocation in Social Internet of Flying Things
Social Network
2020
Click Here
15
SciChallenge A Social Media Aware Platform for Contest-Based STEM Education and Motivation of Young Students
Social Network
2020
Click Here
     
SOFTWARE ENGINEERING,SERVICE COMPUTING
1
Crisis-Critical Intellectual Property Findings From the COVID-19 Pandemic
Software Engineering
2020
Click Here
     

 

VEHICULAR TECHNOLOGY AND INDUSTRIAL INFORMATICS

 

1
A Secure and Verifiable Data Sharing Scheme Based on Blockchain in Vehicular Social Networks
Vehicular Technology
2020
Click Here
2
Collaborative Content Delivery in Software-Defined Heterogeneous Vehicular Networks
Vehicular Technology
2020
Click Here
3
Dynamic Network Slicing and Resource Allocation in Mobile Edge Computing Systems
Vehicular Technology
2020
Click Here
4
Security Enhanced Content Sharing in Social IoT A Directed Hypergraph-Based Learning Scheme
Vehicular Technology
2020
Click Here
5
An Efficient Privacy Preserving Message Authentication Scheme for Internet-of-Things
Industrial Informatics
2020
Click Here
6
Detection and Mitigation of Cyber Attacks on Voltage Stability Monitoring of Smart Grids
Industrial Informatics
2020
Click Here
7
Enabling Privacy-assured Fog-based Data Aggregation in E-healthcare Systems
Industrial Informatics
2020
Click Here
8
Hidden Electricity Theft by Exploiting Multiple-Pricing Scheme in Smart Grids
Industrial Informatics
2020
Click Here
9
Social Image Sentiment Analysis by Exploiting Multimodal Content and Heterogeneous Relations
Industrial Informatics
2020
Click Here
         
BIG DATA
1
Credit Card Transactions Data Adversarial Augmentation in the Frequency Domain
Bigdata
2020
Click Here
2
Building and Querying an Enterprise Knowledge Graph
Bigdata
2020
Click Here
3
Delegated Authorization Framework for EHR Services using Attribute Based Encryption
Bigdata
2020
Click Here
4
Secure Channel Free Certificate-Based Searchable Encryption Withstanding Outside and Inside Keyword Guessing Attacks
Bigdata
2020
Click Here
         
EMERGING TOPICS IN COMPUTING
1
FarSight Long-Term Disease Prediction Using Unstructured Clinical Nursing Notes
Emerging Topics
2020
Click Here
2
Human-in-the-Loop-Aided Privacy-Preserving Scheme for Smart Healthcare
Emerging Topics
2020
Click Here
3
Recommending Activities for Mental Health and Well-being Insights from Two User Studies
Emerging Topics
2020
Click Here
4
Semantic Access Control for Privacy Management of Personal Sensing in Smart Cities
Emerging Topics
2020
Click Here
         
SERVICE COMPUTING
1
A hybrid fault-tolerant scheduling for deadline-constrained tasks in Cloud systems
Service Computing
2020
Click Here
2
CloudRaid Detecting Distributed Concurrency Bugs via Log-Mining and Enhancement
Service Computing
2020
Click Here
3
Dynamic Resource Allocation and Computation Offloading for IoT Fog Computing System
Service Computing
2020
Click Here
4
ECOGreen Electricity Cost Optimization for Green Datacenters in Emerging Power Markets
Service Computing
2020
Click Here
5
Efficient Encrypted Data Search with Expressive Queries and Flexible Update
Service Computing
2020
Click Here
6
Energy-aware cloud workflow applications scheduling with geo-distributed data
Service Computing
2020
Click Here
7
KeySea Keyword-based Search with Receiver Anonymity in Attribute-based Searchable Encryption
Service Computing
2020
Click Here
8
Lightweight Privacy-preserving Raw Data Publishing Scheme
Service Computing
2020
Click Here
9
Location-Aware Service Recommendations With Privacy-Preservation in the Internet of Things
Service Computing
2020
Click Here
10
Lucid A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection
Service Computing
2020
Click Here
11
Minimizing Financial Cost of DDoS Attack Defense in Clouds with Fine-Grained Resource Management
Service Computing
2020
Click Here
12
Personalized Recommendation System based on Collaborative Filtering for IoT Scenarios
Service Computing
2020
Click Here
13
Privacy Preserving QoS Forecasting in Mobile Edge Environments
Service Computing
2020
Click Here
14
Provably Efficient Resource Allocation for Edge Service Entities Using Hermes
Service Computing
2020
Click Here
15
Reverse Nearest Neighbor Search in Semantic Trajectories for Location based Services
Service Computing
2020
Click Here
16
Revocable Attribute-based Data Storage in Mobile Clouds
Service Computing
2020
Click Here
17
Scalable Discovery of Hybrid Process Models in a Cloud Computing Environment
Service Computing
2020
Click Here
18
Semantics of Data Mining Services in Cloud Computing
Service Computing
2020
Click Here
19
Shed+ Optimal Dynamic Speculation to Meet Application Deadlines in Cloud
Service Computing
2020
Click Here
         
DEPENDABLE AND SECURE COMPUTING
1
Shielding Collaborative Learning  Mitigating Poisoning Attacks through Client Side Detection
Dependable and Secure Computing
2020
Click Here
2
Scaling Camouflage Content Disguising Attack Against Computer Vision Applications
Dependable and Secure Computing
2020
Click Here
3
Representing Fine-Grained Co-Occurrences for Behavior-Based Fraud Detection in Online Payment Services
Dependable and Secure Computing
2020
Click Here
4
Privacy-Preserving Federated Deep Learning with Irregular Users
Dependable and Secure Computing
2020
Click Here
5
Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack
Dependable and Secure Computing
2020
Click Here
6
On-the-fly Privacy for Location Histograms
Dependable and Secure Computing
2020
Click Here
7
Multi-client Sub-Linear Boolean Keyword Searching for Encrypted Cloud Storage with Owner-enforced Authorization
Dependable and Secure Computing
2020
Click Here
8
Match in My Way Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing
Dependable and Secure Computing
2020
Click Here
9
Geometric range search on encrypted data with Forward or Backward security
Dependable and Secure Computing
2020
Click Here
10
Efficient Server-Aided Secure Two-Party Computation in Heterogeneous Mobile Cloud Computing
Dependable and Secure Computing
2020
Click Here
11
Efficient and Secure Attribute-based Access Control with Identical Sub-Policies Frequently Used in Cloud Storage
Dependable and Secure Computing
2020
Click Here
12
Detection and Defense of Cache Pollution Based on Popularity Prediction in Named Data Networking
Dependable and Secure Computing
2020
Click Here
13
Adaptive Secure Nearest Neighbor Query Processing over Encrypted Data
Dependable and Secure Computing
2020
Click Here
14
Achieving Efficient Secure Deduplication with User-Defined Access Control in Cloud
Dependable and Secure Computing
2020
Click Here
15
Achieving Efficient and Privacy-Preserving Exact Set Similarity Search over Encrypted Data
Dependable and Secure Computing
2020
Click Here
16
A Traceable and Revocable Ciphertext-policy Attribute-based Encryption Scheme Based on Privacy Protection
Dependable and Secure Computing
2020
Click Here
         
IMAGE PROCESSING AND MULTIMEDIA
1
Benchmarking Image Retrieval Diversification Techniques for Social Media
Image Processing
2020
Click Here
2
Online Hashing with Bit Selection for Image Retrieval
Image Processing
2020
Click Here
3
Trust-Based Video Management Framework for Social Multimedia Networks
Image Processing
2020
Click Here
         
         
PARALLEL AND DISTRIBUTED SYTSTEMS
1
An Integrated Indexing and Search Service for Distributed File Systems
Distributed Systems
2020
Click Here
2
ESetStore An Erasure-Coded Storage System With Fast Data Recovery
Distributed Systems
2020
Click Here
3
Scalable and Adaptive Data Replica Placement for Geo-Distributed Cloud Storages
Distributed Systems
2020
Click Here
         
ADHOC NETWORKS
1
Efficient Conditional Anonymity With Message Integrity and Authentication in a Vehicular Ad-Hoc Network
Adhoc Networks
2019
Click Here
2
Kalman Prediction based Neighbor Discovery and its Effect on Routing Protocol in Vehicular Ad Hoc Networks
Adhoc Networks
2019
Click Here
3
New Multi-Hop Clustering Algorithm for Vehicular Ad Hoc Networks
Adhoc Networks
2019
Click Here
4
Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks
Adhoc Networks
2019
Click Here
5
V2V Routing in a VANET Based on the Autoregressive Integrated Moving Average Model
Adhoc Networks
2019
Click Here
6
An Evolutionary Self-Cooperative Trust Scheme Against Routing Disruptions in MANETs
Adhoc Networks
2019
Click Here
7
An Attack-resistant Trust Inference Model for Securing Routing in Vehicular Ad-hoc Networks
Adhoc Networks
2019
Click Here
8
An Efficient Message-Authentication Scheme Based on Edge Computing for Vehicular Ad Hoc Networks
Adhoc Networks
2019
Click Here
9
DeQoS Attack: Degrading Quality of Service in VANETs and its Mitigation
Adhoc Networks
2019
Click Here
10
Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks
Adhoc Networks
2019
Click Here
         

     

Live 2019 and 2020 JAVA IEEE Projects List --- Download

 

Live Demo is available on youtube.You can click on demo link and can download the video for further reference and send your title name to the following email id to get base paper and Abstract.Please mention your degree and other requirements also..
Cloud Computing
Sl.No
Project Title Name
Domain
Year
Demo
1
A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing
Cloud Computing
2019
Click Here
2
A Trust-Based Agent Learning Model for Service Composition in Mobile Cloud Computing Environments
Cloud Computing
2019
Click Here
3
Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data
Cloud Computing
2019
Click Here
4
Reliability and Availability Evaluation for Cloud Data Center Networks Using Hierarchical Models
Cloud Computing
2019
Click Here
5
Verifiable and Multi-keyword Searchable Attribute-based Encryption Scheme for Cloud Storage
Cloud Computing
2019
Click Here
6
Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud
Cloud Computing
2019
Click Here
7
CHARON: A Secure Cloud-of-Clouds System for Storing and Sharing Big Data
Cloud Computing
2019
Click Here
8
An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud Storage
Cloud Computing
2019
Click Here
9
Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data
Cloud Computing
2019
Click Here
10
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing
Cloud Computing
2019
Click Here
11
Hidden Ciphertext Policy Attribute-Based Encryption with Fast Decryption for Personal Health Record System
Cloud Computing
2019
Click Here
12
A Lightweight Secure Auditing Scheme for Shared Data in Cloud Storage
Cloud Computing
2019
Click Here
13
Novel Multi-Keyword Search on Encrypted Data in the Cloud
Cloud Computing
2019
Click Here
14
Privacy-aware Personal Data Storage (P-PDS) Learning how to Protect User Privacy from External Applications
Cloud Computing
2019
Click Here
15
Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting
Cloud Computing
2019
Click Here
16
Fast Boolean Queries With Minimized Leakage for Encrypted Databases in Cloud Computing 
Cloud Computing
2019
Click Here
17
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing
Cloud Computing
2019
Click Here
18
Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments
Cloud Computing
2019
Click Here
19
A Fog-centric Secure Cloud Storage Scheme
Cloud Computing
2019
Click Here
20
Enabling Verifiable and Dynamic Ranked Search Over Outsourced Data
Cloud Computing
2019
Click Here
21
A Data Sharing Protocol to Minimize Security and Privacy Risks of Cloud Storage in Big Data Era
Cloud Computing
2019
Click Here
22
A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage Services
Cloud Computing
2019
Click Here
23
Achieve Privacy-Preserving Priority Classification on Patient Health Data in Remote eHealthcare System
Cloud Computing
2019
Click Here
24
Data Integrity Auditing without Private Key Storage for Secure Cloud Storage
Cloud Computing
2019
Click Here
25
Enabling Authorized Encrypted Search for Multi-Authority Medical Databases
Cloud Computing
2019
Click Here
26
Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
Cloud Computing
2019
Click Here
27
P-MOD: Secure Privilege-Based Multilevel Organizational Data-Sharing in Cloud Computing
Cloud Computing
2019
Click Here
28
Practical Privacy-Preserving MapReduce Based K-means Clustering over Large-scale Dataset
Cloud Computing
2019
Click Here
29
Profit Maximization for Cloud Brokers in Cloud Computing
Cloud Computing
2019
Click Here
30
Provable Data Possession with Outsourced Data Transfer
Cloud Computing
2019
Click Here
31
Provably Secure Fine-Grained Data Access Control over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications
Cloud Computing
2019
Click Here
32
Revocable Identity-Based Broadcast Proxy Re-encryption for Data Sharing in Clouds
Cloud Computing
2019
Click Here
33
Searchable Symmetric Encryption with Forward Search Privacy
Cloud Computing
2019
Click Here
34
Privacy Preserving Searchable Encryption with Fine-grained Access Control
Cloud Computing
2019
Click Here
35
A Secure G-Cloud-Based Framework for Government Healthcare Services
Cloud Computing
2019
Click Here

 

DATA MINING

 

1
Clustering-Based Collaborative Filtering Using an Incentivized/Penalized User Model
Data Mining
2019
Click Here
2
A Hierarchical Attention Model for Social Contextual Image Recommendation
Data Mining
2019
Click Here
3
Mining Users Trust From E-Commerce Reviews Based on Sentiment Similarity Analysis
Data Mining
2019
Click Here
4
Old and Young Users’ White Space Preferences for Online News Web Pages
Data Mining
2019
Click Here
5
Analysis and Accurate Prediction of User’s Response Behavior in Incentive-Based Demand Response
Data Mining
2019
Click Here
6
DCCR: Deep Collaborative Conjunctive Recommender for Rating Prediction
Data Mining
2019
Click Here
7
Network Representation Learning Enhanced Recommendation Algorithm
Data Mining
2019
Click Here
8
Trust Relationship Prediction in Alibaba E-Commerce Platform
Data Mining
2019
Click Here
9
Composition Context-Based Web Services Similarity Measure
Data Mining
2019
Click Here
10
NASM: Nonlinearly Attentive Similarity Model for Recommendation System via Locally Attentive Embedding
Data Mining
2019
Click Here
11
A Novel Load Image Profile-Based Electricity Load Clustering Methodology
Data Mining
2019
Click Here
12
An Efficient Method for High Quality and Cohesive Topical Phrase Mining
Data Mining
2019
Click Here
13
Credibility Evaluation of Twitter-Based Event Detection by a Mixing Analysis of Heterogeneous Data
Data Mining
2019
Click Here
14
Filtering Instagram hashtags through crowd tagging and the HITS algorithm
Data Mining
2019
Click Here
15
A Hybrid E-learning Recommendation Approach Based on Learners’ Influence Propagation
Data Mining
2019
Click Here
16
Active Online Learning for Social Media Analysis to Support Crisis Management
Data Mining
2019
Click Here
17
Applying Simulated Annealing and Parallel Computing to the Mobile Sequential Recommendation
Data Mining
2019
Click Here
18
Collaboratively Tracking Interests for User Clustering in Streams of Short Texts
Data Mining
2019
Click Here
19
Detecting Pickpocket Suspects from Large-Scale Public Transit Records
Data Mining
2019
Click Here
20
Finding Optimal Skyline Product Combinations under Price Promotion
Data Mining
2019
Click Here
21
Heterogeneous Information Network Embedding for Recommendation
Data Mining
2019
Click Here
22
Hierarchical Multi-Clue Modelling for POI Popularity Prediction with Heterogeneous Tourist Information
Data Mining
2019
Click Here
23
K-nearest Neighbor Search by Random Projection Forests
Data Mining
2019
Click Here
24
Learning Customer Behaviors for Effective Load Forecasting
Data Mining
2019
Click Here
25
Normalization of Duplicate Records from Multiple Sources
Data Mining
2019
Click Here
26
On Scalable and Robust Truth Discovery in Big Data Social Media Sensing Applications
Data Mining
2019
Click Here
27
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Based Recommendation
Data Mining
2019
Click Here
28
Secure and Efficient Skyline Queries on Encrypted Data
Data Mining
2019
Click Here
29
Predicting Consumption Patterns with Repeated and Novel Events
Data Mining
2019
Click Here
30
Multi-Party High-Dimensional Data Publishing under Differential Privacy
Data Mining
2019
Click Here
31
Minimizing Influence of Rumors by Blockers on Social Networks: Algorithms and Analysis
Data Mining
2019
Click Here
32
Detection of fake online reviews using semi-supervised and supervised learning
Data Mining
2019
Click Here
33
Collaborative Filtering-based Electricity Plan Recommender System               
Data Mining
2019
Click Here

SECURE COMPUTING

 

1
A Novel Load Image Profile-Based Electricity Load Clustering Methodology
Secure Computing
2019
Click Here
2
Coverless Information Hiding Method Based on Web Text
Secure Computing
2019
Click Here
3
SEPTIC Detecting Injection Attacks and Vulnerabilities Inside the DBMS
Secure Computing
2019
Click Here
4
LBOA: Location-Based Secure Outsourced Aggregation in IoT
Secure Computing
2019
Click Here
5
Towards Thwarting Template Side-channel Attacks in Secure Cloud Deduplications
Secure Computing
2019
Click Here
6
Automated Decision Making in Airport Checkpoints: Bias Detection Toward Smarter Security and Fairness
Secure Computing
2019
Click Here
7
Detecting Malicious Social Bots Based on Click stream Sequences
Secure Computing
2019
Click Here
8
Authenticated Medical Documents Releasing with Privacy Protection and Release Control
Secure Computing
2019
Click Here
9
Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe Systems
Secure Computing
2019
Click Here
10
Privacy-Preserving Aggregate Queries for Optimal Location Selection
Secure Computing
2019
Click Here
11
Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting
Secure Computing
2019
Click Here
12
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Secure Computing
2019
Click Here
13
Sensitive Label Privacy Preservation with Anatomization for Data Publishing
Secure Computing
2019
Click Here
14
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification
Secure Computing
2019
Click Here
15
Who You Should Not Follow: Extracting Word Embeddings from Tweets to Identify Groups of Interest and Hijackers in Demonstrations
Secure Computing
2019
Click Here
     
BLOCKCHAIN TECHNOLOGY
1
PBCert: Privacy-Preserving Blockchain-Based Certificate Status Validation Toward Mass Storage Management
Blockchain Technology
2019
Click Here
2
Blockchain for AI: Review and Open Research Challenges
Blockchain Technology
2019
Click Here
3
Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors
Blockchain Technology
2019
Click Here

 

INFORMATION FORENSICS and SECURITY

 

1
Authentication by Encrypted Negative Password
Information Forensics and Secuirty
2019
Click Here
2
Retrieving Hidden Friends: A Collusion Privacy Attack Against Online Friend Search Engine
Information Forensics and Secuirty
2019
Click Here
3
Account Trade Accountability Against Dishonest Big Data Buyers and Sellers
Information Forensics and Secuirty
2019
Click Here
4
Enabling Efficient and Geometric Range Query with Access Control over Encrypted Spatial Data
Information Forensics and Secuirty
2019
Click Here
5
Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage
Information Forensics and Secuirty
2019
Click Here
6
Peer Prediction Based Trustworthiness Evaluation and Trustworthy Service Rating in Social Networks
Information Forensics and Secuirty
2019
Click Here
7
Secure Key Agreement and Key Protection for Mobile Device User Authentication
Information Forensics and Secuirty
2019
Click Here

MOBILE COMPUTING

1
An Indoor Position-Estimation Algorithm Using Smartphone IMU Sensor Data
Mobile Computing
2019
Click Here
2
FooDNet: Toward an Optimized Food Delivery Network based on Spatial Crowdsourcing
Mobile Computing
2019
Click Here
3
Privacy-preserving Crowd-sourced Statistical Data Publishing with An Untrusted Server
Mobile Computing
2019
Click Here
4
 
Mobile Computing
2019
Click Here
5
 
Mobile Computing
2019
Click Here
6
 
Mobile Computing
2019
Click Here

 

SOCIAL NETWORK

 

 

1
A Hybrid Approach to Service Recommendation Based on Network Representation Learning
Social Network
2019
Click Here
2
Social Network Rumor Diffusion Predication Based on Equal Responsibility Game Model
Social Network
2019
Click Here
3
Online Public Shaming on Twitter: Detection, Analysis and Mitigation
Social Network
2019
Click Here
4
PersoNet: Friend Recommendation System Based on Big-Five Personality Traits and Hybrid Filtering
Social Network
2019
Click Here
5
A Fuzzy Approach to Text Classification with Two Stage Training for Ambiguous Instances
Social Network
2019
Click Here
6
Conversational Networks For Automatic Online Moderation
Social Network
2019
Click Here
     
SOFTWARE ENGINEERING,SERVICE COMPUTING
1
Platform-Independent Dynamic Taint Analysis for JavaScript
Software Engineering
2019
Click Here
2
Scheduling Real Time Security Aware tasks in Fog Networks
Software Engineering
2019
Click Here

 

WIRELESS SENSOR NETWOKS

 

1
V-Matrix-Based Scalable Data Aggregation Scheme in WSN
WSN
2019
Click Here
2
A Probabilistic Source Location Privacy Protection Scheme in Wireless Sensor Networks
WSN
2019
Click Here
3
Memory Leakage-Resilient Dynamic and Verifiable Multi-keyword Ranked Search on Encrypted Smart Body Sensor Network Data
WSN
2019
Click Here
4
Primary User-aware Optimal Discovery Routing for Cognitive Radio Networks
WSN
2019
Click Here
         
ANDROID
1
RescueMe: Smartphone-Based Self Rescue System for Disaster Rescue
Android
2019
Click Here
2
FallDroid: An Automated Smart Phone based Fall Detection System using Multiple Kernel Learning
Android
2019
Click Here
3
Dating with Scambots: Understanding the Ecosystem of Fraudulent Dating Applications
Android
2019
Click Here
4
Applying Simulated Annealing and Parallel Computing to the Mobile Sequential Recommendation
Android
2019
Click Here
5
An Indoor Position-Estimation Algorithm Using Smartphone IMU Sensor Data
Android
2019
Click Here
6
Achieve Privacy-Preserving Priority Classification on Patient Health Data in Remote eHealthcare System
Android
2019
Click Here
         
         
         
CYBER SECURITY
1
Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Learning Algorithms: Review of Literature and Open Challenges
Cyber Secuirty
2019
Click Here
2
Spammer Detection and Fake User Identification on Social Networks
Cyber Secuirty
2019
Click Here
3
Ant Colony Stream Clustering: A Fast Density Clustering Algorithm for Dynamic Data Streams
Cyber Secuirty
2019
Click Here
         
SERVICE COMPUTING
1
Transactional Behavior Verification in Business Process as a Service Configuration
Service Computing
2019
Click Here
2
Building and Querying an Enterprise Knowledge Graph
Service Computing
2019
Click Here
3
Delegated Authorization Framework for EHR Services using Attribute Based Encryption
Service Computing
2019
Click Here
4
Secure Channel Free Certificate-Based Searchable Encryption Withstanding Outside and Inside Keyword Guessing Attacks
Service Computing
2019
Click Here
         
INTERNET OF THINGS(IOT)
1
Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT
IOT
2019
Click Here
2
Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques
IOT
2019
Click Here
3
Trustworthy Delegation toward Securing Mobile Healthcare Cyber-Physical Systems
IOT
2019
Click Here
4
Hybrid Keyword-Field Search with Efficient Key Management for Industrial Internet of Things
IOT
2019
Click Here
5
Trustworthy Delegation toward Securing Mobile Healthcare Cyber-Physical Systems
IOT
2019
Click Here
6
Securing Data in Internet of Things (IoT) Using Cryptography and Stegano graphy Techniques
IOT
2019
Click Here
IMAGE PROCESSING and MULTIMEDIA
1
Fundamental Visual Concept Learning from Correlated Images and Text
Image Processing
2019
Click Here
2
Trust-based Privacy-Preserving Photo Sharing in Online Social Networks
Image Processing
2019
Click Here
3
Towards Robust Image Steganography
Image Processing
2019
Click Here
         
         
PARALLEL and DISTRIBUTED SYTSTEMS
1
A Distributed Trust Evaluation Protocol with Privacy Protection for Inter cloud
Distributed Systems
2019
Click Here
2
Deadline-aware MapReduce Job Scheduling with Dynamic Resource Availability
Distributed Systems
2019
Click Here
         
ADHOC NETWORKS
1
Efficient Conditional Anonymity With Message Integrity and Authentication in a Vehicular Ad-Hoc Network
Adhoc Networks
2019
Click Here
2
Kalman Prediction based Neighbor Discovery and its Effect on Routing Protocol in Vehicular Ad Hoc Networks
Adhoc Networks
2019
Click Here
3
New Multi-Hop Clustering Algorithm for Vehicular Ad Hoc Networks
Adhoc Networks
2019
Click Here
4
Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks
Adhoc Networks
2019
Click Here
5
V2V Routing in a VANET Based on the Autoregressive Integrated Moving Average Model
Adhoc Networks
2019
Click Here
6
An Evolutionary Self-Cooperative Trust Scheme Against Routing Disruptions in MANETs
Adhoc Networks
2019
Click Here
7
An Attack-resistant Trust Inference Model for Securing Routing in Vehicular Ad-hoc Networks
Adhoc Networks
2019
Click Here
8
An Efficient Message-Authentication Scheme Based on Edge Computing for Vehicular Ad Hoc Networks
Adhoc Networks
2019
Click Here
9
DeQoS Attack: Degrading Quality of Service in VANETs and its Mitigation
Adhoc Networks
2019
Click Here
10
Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks
Adhoc Networks
2019
Click Here