Latest
IEEE 2014- 2015- 2016 Dotnet and JAVA Project List for ME/ MCA/MSc/BE/BSc
Students
SECURE COMPUTING (Base paper &
Abstract Contact 9843360513)
1.
Hacking
is not random: a case-control study of webserver-compromise risk
2.
Vote
Trust: Leveraging Friend Invitation Graph to Defend against Social Network
Sybil’s
3.
Public
Integrity Auditing for Dynamic Data Sharing with Multi-User Modification
4.
My
Privacy My Decision: Control of Photo Sharing on Online Social Networks
5.
Knowledge
Sharing in the Online Social Network of Yahoo! Answers and Its Implications
6.
Generating
Searchable Public-Key Cipher texts with Hidden Structures for Fast Keyword
Search
7.
Generating
Searchable Public-Key Cipher texts with Hidden Structures for Fast Keyword
Search
8.
Automatic
Face Naming by Learning Discriminative Affinity Matrices from Weakly Labeled
Images
9.
Revealing
the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis
SERVICES COMPUTING (Base paper &
Abstract Contact 9843360513)
1.
Trustworthy
Parking Communities: Helping Your Neighbor to Find a Space
2.
On
the Security of Data Access Control for Multi authority Cloud Storage Systems
3.
Guest
Editorial: Recommendation Techniques for Services Computing and Cloud Computing
4.
Diversifying
Web Service Recommendation Results via Exploring Service Usage History
5.
A
Highly Accurate Prediction Algorithm for Unknown Web Service QoS Values
6.
Location-Aware
and Personalized Collaborative Filtering for Web Service Recommendation
NETWORKING (Base paper &
Abstract Contact 9843360513)
1.
Congestion
Aware Load Balancing for Multi radio Wireless Mesh Network
IMAGE PROCESSING – MULTIMEDIA (Base
paper & Abstract Contact 9843360513)
1.
A
Regularization Approach to Blind Deblurringand Denoising of QR Barcodes
2.
Vector
Sparse Representation of Color Image Using Quaternion Matrix Analysis
3.
Saliency-based
color accessibility
4.
Contextual
Online Learning for Multimedia Content Aggregation
5.
A
Probabilistic Approach for Color Correction in Image Mosaicking Applications
6.
A
Methodology for Visually Lossless JPEG2000 Compression of Monochrome Stereo
Images
7.
An
Attribute-assisted Reranking Model for Web Image Search
8.
RRW
- A Robust and Reversible Watermarking
9.
Steganography
Using Reversible Texture Synthesis
10.
Single
Image Super-Resolution Based on Gradient Profile Sharpness
11.
Detection
and Rectification of Distorted Fingerprints
12.
Learning
Fingerprint Reconstruction: From Minutiae to Image
CLOUD COMPUTING (Base paper &
Abstract Contact 9843360513)
1.
Performing
Initiative Data Prefetching in Distributed File Systems for Cloud Computing
2.
Space-efficient
Verifiable Secret Sharing Using Polynomial Interpolation
3.
Energy-aware
Load Balancing and Application Scaling for the Cloud Ecosystem
4.
Combining
Efficiency, Fidelity, and Flexibility in Resource Information Services
PARALLEL AND DISTRIBUTED SYSTEMS
WITH SECURE COMPUTING (Base paper & Abstract Contact 9843360513)
1.
Dominating
Set and Network Coding-based Routing in Wireless Mesh Networks
2.
A
Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
3.
Authenticated
Key Exchange Protocols for Parallel Network File Systems
4.
Data
Collection in Multi-Application Sharing Wireless Sensor Networks
5.
Enabling
Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over
Encrypted Cloud Data
6.
A
Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
7.
Cost-Minimizing
Dynamic Migration of Content Distribution Services into Hybrid Clouds
MOBILE COMPUTING - WIRELESS
COMMUNICATION (Base paper & Abstract Contact 9843360513)
1.
Optimum
Power Allocation in Sensor Networks for Active Radar Applications
2.
A
Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid
Wireless Networks
KNOWLEDGE AND DATA ENGINEERING -
(DATA MINING) (Base paper & Abstract Contact 9843360513)
1.
Reverse
Keyword Search for Spatio-Textual Top-k Queries in Location-Based Services
2.
Tweet
Segmentation and Its Application to Named Entity Recognition
3.
EMR:
A Scalable Graph-based Ranking Model for Content-based Image Retrieval
4.
Automatic
Group Happiness Intensity Analysis
5.
RRW
- A Robust and Reversible Watermarking Technique for Relational Data
6.
Query
Aware Determinization of Uncertain Objects
7.
PAGE:
A Partition Aware Engine for Parallel Graph Computation
Latest
IEEE 2015-2016 Java Project List for ME/ MCA/MSc/BE/BSc Students
SECURE COMPUTING(Base paper &
Abstract Contact 9843360513)
1. SmartCrawler: A Two-stage Crawler
for Efficiently Harvesting Deep-Web Interfaces
2. Collusion-Tolerable Privacy-Preserving
Sum and Product Calculation without Secure Channel
3. Formalization and Verification of
Group Behavior Interactions
4. Group Key Agreement with Local
Connectivity
5. Data Lineage in Malicious
Environments
6. Privacy-Preserving Public Auditing
for Regenerating-Code-Based Cloud Storage
7. Improving Privacy and Security in
Decentralized Ciphertext-Policy Attribute-Based Encryption
8. Formalization and Verification of
Group Behavior Interactions
9. Enabling Cloud Storage Auditing with
Key-Exposure Resistance
10. Control Cloud Data Access Privilege
and Anonymity With Fully Anonymous Attribute-Based Encryption
11. Anonymity-based Privacy-preserving
Data Reporting for Participatory Sensing
12. T-Broker: A Trust-Aware Service
Brokering Scheme for Multiple Cloud Collaborative Services
CLOUD COMPUTING (Base paper &
Abstract Contact 9843360513)
1. MobiContext: A Context-aware
Cloud-Based Venue Recommendation Framework
2. SAE: Toward Efficient Cloud Data
Analysis Service for Large-Scale Social Networks
3. MobiContext: A Context-aware
Cloud-Based Venue Recommendation Framework
4. Understanding the Performance and
Potential of Cloud Computing for Scientific Applications
5. Towards Optimized Fine-Grained
Pricing of IaaS Cloud Platform
6. Service Operator-aware Trust Scheme
for Resource Matchmaking across Multiple Clouds
7. Reactive Resource Provisioning
Heuristics for Dynamic Dataflows on Cloud Infrastructure
8. A Profit Maximization Scheme with
Guaranteed Quality of Service in Cloud Computing
9. Privacy-Preserving Public Auditing
for Regenerating-Code-Based Cloud Storage
10. OPoR: Enabling Proof of Retrievability
in Cloud Computing with Resource-Constrained Devices
11. Enabling Cloud Storage Auditing with
Key-Exposure Resistance
12. Control Cloud Data Access Privilege
And Anonymity With Fully Anonymous Attribute-Based Encryption
13. Circuit Ciphertext-policy Attribute-based
Hybrid Encryption with Verifiable Delegation in Cloud Computing
14. Audit-Free Cloud Storage via
Deniable Attribute-based Encryption
15. CHARM: A Cost-efficient Multi-cloud
Data Hosting Scheme with High Availability
16. Audit-Free Cloud Storage via
Deniable Attribute-based Encryption
17. A Profit Maximization Scheme with
Guaranteed Quality of Service in Cloud Computing
18. Provable Multicopy Dynamic Data
Possession in Cloud Computing Systems
19. Public Integrity Auditing for Shared
Dynamic Cloud Data with Group User Revocation
20. Key-Aggregate Searchable Encryption
(KASE)for Group Data Sharing via Cloud Storage
21. Secure Auditing and Deduplicating
Data in Cloud
22. Identity-based Encryption with
Outsourced Revocation in Cloud Computing
KNOWLEDGE AND DATA ENGINEERING -
(DATA MINING) (Base paper & Abstract Contact 9843360513)
1.
Subgraph
Matching with Set Similarity in a Large Graph Database
2.
Structured
Learning from Heterogeneous Behavior for Social Identity Linkage
3.
Making
Digital Artifacts on the Web Verifiable and Reliable
4.
Anonymizing
Collections of Tree-Structured Data
5.
Privacy
Policy Inference of User-Uploaded Images on Content Sharing Sites
6.
FOCS:
Fast Overlapped Community Search
7.
Sparsity
Learning Formulations for Mining Time-Varying Data
8.
k-Nearest
Neighbor Classification over Semantically Secure Encrypted Relational Data
9.
The
Impact of View Histories on Edit Recommendations
10.
Agent-based
Interactions and Economic Encounters in an Intelligent InterCloud
11.
Discovery
of Ranking Fraud for Mobile Apps
12.
Towards
Effective Bug Triage with Software Data Reduction Techniques
13.
Subgraph
Matching with Set Similarity in a Large Graph Database
SOFTWARE ENGINEERING (Base paper
& Abstract Contact 9843360513)
1.
The
Impact of View Histories on Edit Recommendations
NETWORKING (Base paper &
Abstract Contact 9843360513)
1.
FRAppE:
Detecting Malicious Facebook Applications
IMAGE PROCESSING – MULTIMEDIA (Base
paper & Abstract Contact 9843360513)
1.
Multiview
Alignment Hashing for Efficient Image Search
2.
YouTube
Video Promotion by Cross-network
3.
Semantic-Improved
Color Imaging Applications: It Is All About Context
4.
Geolocalized
Modeling for Dish Recognition
5.
Learning
to Rank Image Tags with Limited Training Examples
6.
Automatic
Face Naming by Learning Discriminative Affnity Matrices From Weakly Labeled
Image
7.
Multiview
Alignment Hashing for Efficient Image
MOBILE COMPUTING - WIRELESS
COMMUNICATION (Base paper & Abstract Contact 9843360513)
1.
Maximizing
Energy Efficiency in Multiple Access Channels by Exploiting Packet Dropping and
Transmitter Buffering
2.
Tracking
Temporal Community Strength in Dynamic Networks
3.
Modelling
and Analysis of Communication Traffic Heterogeneity in Opportunistic Networks
4.
Towards
Information Diffusion in Mobile Social Networks
5.
User-Defined
Privacy Grid System for Continuous Location-Based Services
PARALLEL AND DISTRIBUTED SYSTEMS
WITH SECURE COMPUTING (Base paper & Abstract Contact 9843360513)
1.
Service
Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
2.
A
Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
3.
Cost-Effective
Authentic and Anonymous Data Sharing with Forward Security
4.
A
Computational Dynamic Trust Model for User Authorization
5.
Secure
Distributed Deduplication Systems with Improved Reliability
6.
Collusion-Tolerable
Privacy-Preserving Sum and Product Calculation without Secure Channel
7.
Control
Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based
Encryption
Latest
IEEE 2014-2015 Dotnet Project List for ME/ MCA/MSc/BE/BSc Students
MOBILE COMPUTING - WIRELESS COMMUNICATION
(Base paper & Abstract Contact 9843360513)
1. Keylogging-resistant Visual
Authentication Protocols
SOFTWARE ENGINEERING (Base paper
& Abstract Contact 9843360513)
1. Governing Software Process
Improvements in Globally Distributed Product Development
KNOWLEDGE AND DATA ENGINEERING -
(DATA MINING) (Base paper & Abstract Contact 9843360513)
1.
Efficient
Community Formation for Web Services
2.
BestPeer++
A Peer-to-Peer based Large-scale Data Processing Platform
3.
Secure
Mining of Association Rules in Hor izontally Distributed Databases
4.
Dynamic
Query Forms for Database Queries
5.
Secure
kNN Query Processing in Untrusted Cloud Environments
6.
An
Empirical Performance Evaluation of Relational Keyword Search Systems
7.
Keyword
Query Routing
8.
Web
Image Re-Ranking UsingQuery-Specific Semantic Signatures
9.
Demand
Bidding Program and Its Application in Hotel Energy Management
10.
An
Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
11.
Incremental
Detection of Inconsistencies in Distributed Data
12.
A
Cocktail Approach for Travel Package Recommendation
13.
The
Role of Hubness in Clustering High-Dimensional Data
PARALLEL AND DISTRIBUTED SYSTEMS WITH
SECURE COMPUTING (Base paper & Abstract Contact 9843360513)
1.
A
Random Decision Tree Framework for Privacy-Preserving Data Mining
2.
Analysis
of Field Data on Web Security Vulnerabilities
3.
The
Client Assignment Problem for Continuous Distributed Interactive Applications
Analysis, Algorithms, and Evaluation
4.
A
Reliability Improvement Method for SOA-Based Applications
5.
Authorized
Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable
Fine-Grained Updates
6.
Efficient
and Privacy-Aware Data Aggregation in Mobile Sensing
7.
Web
Service Recommendation via Exploiting Location and QoS Information
8.
Traffic
Pattern Based Content Leakage Detection for Trusted Content Delivery Networks
9.
Exploiting
Rateless Codes in Cloud Storage Systems
10.
COMIC:Cost
Optimization for Internet Content Multihoming
11.
Behavior
Rule Specification-based Intrusion Detection for Safety Critical Medical Cyber
Physical Systems
12.
Privacy-Preserving
Multi-keyword Ranked Search over Encrypted Cloud Data
13.
An
Ontology-Based Hybrid Approach to Activity Modeling for Smart Homes
14.
Uniform
Embedding for Efficient JPEG Steganography
15.
Secure
Deduplication with Efficient and Reliable Convergent Key Management
16.
QoS
Aware Geographic Opportunistic Routing in Wireless Sensor Networks
17.
Link
Quality Aware Code Dissemination in Wireless Sensor Networks
18.
Exploiting
Service Similarity for Privacy in Location Based Search Queries
CLOUD COMPUTING (Base paper &
Abstract Contact 9843360513)
1.
Oruta:
Privacy-Preserving Public Auditing for Shared Data in the Cloud
2.
A
secure data self-destructing scheme in cloud computing
3.
A
Dynamic Secure Group Sharing Framework in Public Cloud Computing
4.
Privacy-Preserving
Multi-keyword Ranked Search over Encrypted Cloud Data
5.
An
Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
6.
Secure
kNN Query Processing in Untrusted Cloud Environments
7.
Exploiting
Rateless Codes in Cloud Storage Systems
8.
Fuzzy
Authorization for Cloud Storage
9.
Planning
vs. dynamic control Resource allocation in corporate clouds
10.
Automatic
Scaling of Internet Applications for Cloud Computing Services
11.
Strategy-proof
Pricing for Cloud Service Composition
12.
Privacy
Preserving Delegated Access Control in Public Clouds
13.
A
Social Compute Cloud: Allocating and Sharing Infrastructure Resources via
Social Networks
14.
Securing
the cloud storage audit service: defending against frame and collude attacks of
third party auditor
15.
Compatibility-Aware
Cloud Service Composition under Fuzzy Preferences o f Users
16.
Achieving
Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted
Cloud Data Supporting Synonym Query
17.
A
Mechanism Design Approach to Resource Procurement in Cloud Computing
18.
Panda
Public Auditing for Shared Data with Efficient User Revocation in the Cloud
19.
Identity-Based
Distributed Provable Data Possession in Multi-Cloud Storage
20.
A
Scientometric Analysis of Cloud Computing Literature
21.
Consistency
as a Service Auditing Cloud Consistency
IMAGE PROCESSING – MULTIMEDIA (Base
paper & Abstract Contact 9843360513)
1.
A
Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image
Inpainting
2.
Visibility
Restoration of Single Hazy Images Captured in Real-World Weather Conditions
3.
Image
Search Re-ranking with Query-dependent Click-based Relevance Feedback
4.
FeatureMatch:
A General ANNF Estimation Technique and its Applications
5.
Robust
Semi-Automatic Depth Map Generation in Unconstrained Images and Video Sequences
for 2D to Stereoscopic 3D Conversion
6.
Multisensor
Fusion-Based Concurrent Environment Mapping and Moving Object Detection for
Intelligent Service Robotics
7.
As-Projective-As-Possible
Image Stitching with Moving DLT
8.
Sharing
Visual Secrets in Single Image Random Dot Stereograms
9.
Photometric
Stereo Using Sparse Bayesian Regression for General Diffuse Surfaces
10.
Image
Classification Using Multiscale Information Fusion Based on Saliency Driven
Nonlinear Diffusion Filtering
11.
A
New Iterative Triclass Thresholding Technique in Image Segmentation
12.
How
to Estimate the Regularization Parameter for Spectral Regression Discriminant
Analysis and its Kernel Version?
13.
Localization
of License Plate Number Using Dynamic Image Processing Techniques And Genetic
Algorithms
14.
An
Iranian License Plate Recognition System Based on Color Features
15.
Learning
Layouts for Single-Page Graphic Designs
16.
Weighted
KPCA Degree of Homogeneity Amended Nonclassical Receptive Field Inhibition
Model for Salient Contour Extraction in Low-Light-Level Image
17.
Single-Image
Superresolution of Natural Stochastic Textures Based on Fractional Brownian
Motion
18.
Model-Based
Edge Detector for Spectral Imagery Using Sparse Spatiospectral Masks
19.
Offline
Text-Independent Writer Identification Based on Scale Invariant Feature
Transform
20.
Fingerprint
Compression Based on Sparse Representation
21.
Modeling
of Speaking Rate Influences on Mandarin Speech Prosody and Its Application
22.
LBP-Based
Edge-Texture Features for Object Recoginition
23.
A
Compressive Sensing based Secure Watermark Detection and Privacy Preserving Storage
Framework
24.
Toward
Experiential Mobile Media Processing
25.
Quality
Assessment of Stereoscopic 3D Image Compression by Binocular Integration
Behaviors
26.
.
Corruptive Artifacts Suppression for Example-Based Color Transfer
NETWORKING (Base paper &
Abstract Contact 9843360513)
1.
Cost-Effective
Resource Allocation of Overlay Routing Relay Nodes
2.
On
the Payoff Mechanisms in Peer-Assisted Services With Multiple Content Providers
Rationality and Fairness
3.
Designing
Truthful Spectrum Double Auctions with Local Markets
4.
Secure
Data Retrieval for Decentralized Disruption-Tolerant Military Networks
5.
Retransmission
Delays With Bounded Packets: Power-Law Body and Exponential Tail
6.
Message
Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks
7.
Distributed
Mobile Sink Routing for Wireless Sensor Networks: A Survey
8.
D2P:
Distributed Dynamic Pricing Policy in Smart Grid for PHEVs Management
9.
Cooperation
Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks
INTERNATIONAL CONFERENCE (Base paper
& Abstract Contact 9843360513)
1.
A
Study on Clinical Prediction Using Data Mining Techniques
2.
Online
Payment System using Steganography and Visual Cryptography
3.
Efficient
Instant-Fuzzy Search with Proximity Ranking
4.
Attribute
Based Encryption with Privacy Preserving In Clouds
5.
A
Secure Client Side Deduplication Scheme in Cloud Storage Environments
Latest
IEEE 2014-2015 Java Project List for ME/ MCA/MSc/BE/BSc Students
MOBILE
COMPUTING - WIRELESS COMMUNICATION (Base paper & Abstract Contact 9843360513)
1. Leveraging the Tail Time for Saving
Energy in Cellular Networks
2. Keylogging-resistant Visual
Authentication Protocols
3. Video Dissemination over Hybrid
Cellular and Ad Hoc Networks
4. Privacy-Preserving Optimal Meeting
Location Determination on Mobile Devices
5. Preserving Location Privacy in
Geo-Social Applications
6. Efficient Authentication for Mobile
and Pervasive Computing
7. Cloud-Assisted Mobile-Access of
Health Data With Privacy and Auditability
8. Map-Aware Models for Indoor Wireless
Localization Systems: An Experimental Study
KNOWLEDGE AND DATA ENGINEERING -
(DATA MINING) (Base paper & Abstract Contact 9843360513)
1. Typicality-Based Collaborative
Filtering Recommendation
2. Reputation Measurement and Malicious
Feedback Rating Prevention in Web Service Recommendation Systems
3. CoRE: A Context-Aware Relation
Extraction Method for Relation Completion
4. Keyword Search Over Probabilistic
RDF Graphs
5. Efficient Prediction of Difficult
Keyword Queries over Databases
6. Interpreting the Public Sentiment
Variations on Twitter
7. An Efficient Recommendation Method
for Improving Business Process Modeling
8. Determining Process Model Precision
and Generalization with Weighted Artificial Negative Events
9. Computing Multi-Dimensional Trust by
Mining E-Commerce Feedback Comments
10. On the use of Side Information for
Mining Text Data
11. Privacy Preserving and Content
Protecting Location based Queries
12. Fast Nearest Neighbor Search with
Keywords
13. Towards Differential Query Services
in Cost-Efficient Clouds
14. Facilitating Document Annotation
using Content and Querying Value
15. Decentralized Queue Balancing and
Differentiated Service Scheme Based on Cooperative Control Concept
16. Mining Weakly Labeled Web Facial
Images for Search-Based Face Annotation
17. Secure Outsourced Attribute-Based
Signatures
18. Supporting Privacy Protection in
Personalized Web Search
19. Dealing With Concept Drifts in
Process Mining
20. Building Confidential and Efficient
Query Services in the Cloud with RASP Data Perturbation
21. A Meta-Top-Down Method for
Large-Scale Hierarchical Classification
22. Approximate Shortest Distance
Computing: A Query-Dependent Local Landmark Scheme
23. Active Learning of Constraints for
Semi-Supervised Clustering
24. Best Keyword Cover Search
25. Personalized Recommendation
Combining User Interest and Social Circle
26. Online Feature Selection and Its
Applications
27. A Supermodularity-Based Differential
Privacy Preserving Algorithm for Data Anonymization
28. Incremental Affinity Propagation
Clustering Based on Message Passing
29. Accuracy-Constrained Privacy-Preserving
Access Control Mechanism for Relational Data
30. Secure kNN Query Processing in
Untrusted Cloud Environments
31. Malware Propagation in Large-Scale
Networks
32. Infrequent Weighted Itemset Mining
Using Frequent Pattern Growth
33. Identifying Features in Opinion
Mining via Intrinsic and Extrinsic Domain Relevance
34. Discovering Emerging Topics in
Social Streams via Link Anomaly Detection
35. Efficient Ranking on Entity Graphs
with Personalized Relationships
36. Task Trail: An Effective
Segmentation of User Search Behavior
37. Privacy-Preserving Enhanced
Collaborative Tagging
38. XSPath Navigation on XML Schemas
Made Easy
39. Security Evaluation of Pattern
Classifiers under Attack
40. Self-Adaptive Semantic Focused
Crawler for Mining Services Information Discovery
41. On Skyline Groups
PARALLEL AND DISTRIBUTED SYSTEMS
WITH SECURE COMPUTING (Base paper & Abstract Contact 9843360513)
1. Catch Me If You Can: Evaluating
Android Anti-Malware Against Transformation Attacks
2. A Stochastic Model to Investigate
Data Center Performance and QoS in IaaS Cloud Computing Systems
3. Nothing is for Free: Security in
Searching Shared and Encrypted Data
4. SocialTube: P2P-assisted Video
Sharing in Online Social Networks
5. Behavioral Malware Detection in
Delay Tolerant Networks
6. Distributed, Concurrent, and
Independent Access to Encrypted Cloud Databases
7. On the Security of a Public Auditing
Mechanism for Shared Cloud Data Service
8. Application-Aware Local-Global
Source Deduplication for Cloud Backup Services of Personal Storage
9. On the Security of Trustee-Based
Social Authentications
10. Expressive, Efficient, and Revocable
Data Access Control for Multi-Authority Cloud Storage
11. Asymmetric Social Proximity Based
Private Matching Protocols for Online Social Networks
12. Hop-by-Hop Message Authentication
and Source Privacy in Wireless Sensor Networks
13. Shared Authority Based Privacy-preserving
Authentication Protocol in Cloud Computing
14. A Two-stage Deanonymization Attack
Against Anonymized Social Networks
15. A System for Denial-of-Service
Attack Detection Based on Multivariate Correlation Analysis
CLOUD COMPUTING (Base paper &
Abstract Contact 9843360513)
1. Scalable architecture for multi-user
encrypted SQL operations on cloud database services
2. Expressive, Efficient, and Revocable
Data Access Control for Multi-Authority Cloud Storage
3. Shared Authority Based
Privacy-preserving Authentication Protocol in Cloud Computing
4. Application-Aware Local-Global
Source Deduplication for Cloud Backup Services of Personal Storage
5. On the Security of a Public Auditing
Mechanism for Shared Cloud Data Service
6. Distributed, Concurrent, and
Independent Access to Encrypted Cloud Databases
7. A Stochastic Model to Investigate
Data Center Performance and QoS in IaaS Cloud Computing Systems
8. Secure kNN Query Processing in
Untrusted Cloud Environments
9. A Scalable and Reliable Matching
Service for Content-based Publish/Subscribe Systems
10. Key-Aggregate Cryptosystem for
Scalable Data Sharing in Cloud Storage
11. A Hybrid Cloud Approach for Secure
Authorized Deduplication
12. Decentralized Access Control with
Anonymous Authentication of Data Stored in Clouds
13. Performance and cost evaluation of
an adaptive encryption architecture for cloud databases
14. A Novel Model for Competition and
Cooperation Among Cloud Providers
15. CLOUDQUAL: A Quality Model for Cloud
Services
16. Oruta Privacy-Preserving Public
Auditing for Shared Data in the Cloud
IMAGE PROCESSING – MULTIMEDIA (Base
paper & Abstract Contact 9843360513)
1. Learning and Recognition of
On-Premise Signs from Weakly Labeled Street View Images
2. Personalized Geo-Specific Tag
Recommendation for Photos on Social Websites
3. Captcha as Graphical Passwords A New
Security Primitive Based on Hard AI Problems
NETWORKING (Base paper &
Abstract Contact 9843360513)
1. PSR: A Lightweight Proactive Source
Routing Protocol For Mobile Ad Hoc Networks
2. Scaling Laws for Throughput Capacity
and Delay in Wireless Networks A Survey
3. Secure Data Aggregation in Wireless
Sensor Networks Filtering out the Attackers Impact
4. Optimized Multicast Routing
Algorithm Based on Tree Structure in MANETs
5. HALO: Hop-by-Hop Adaptive Link-State
Optimal Routing
INTERNATIONAL CONFERENCE (Base paper
& Abstract Contact 9843360513)
1. Enhanced Security for Association
Rule Mining to secure Transactional Databases
2. Operational Pattern Revealing
Technique in Text Mining
3. VABKS: Verifiable Attribute-based
Keyword Search over Outsourced Encrypted Data
4. Personalized web search using
Browsing history and domain Knowledge
5. Decentralized Access Control Of Data
Stored In Cloud Using Key Policy Attribute Based Encryption
6. Data Security the Challenge of Cloud
Computing
7. Access Control in Decentralized
Online Social Networks: Applying a Policy-Hiding Cryptographic Scheme and
Evaluating Its Performance
8. A Cloud Enviroment for Backup and
Data Storage