IEEE PROJECTS 2017 – 2018
CLOUD COMPUTING
1.Secure
Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based
Encryption – Java (Mar 2016)
2.
Protecting Your Right: Verifiable Attribute-Based Keyword Search with
Fine-Grained Owner-Enforced Search Authorization in the Cloud – Java (April
2016)
3.
Cloud workflow scheduling with deadlines and time slot availability - .NET (Jan
2016)
5. A Secure and Dynamic Multi-Keyword Ranked
Search Scheme over Encrypted Cloud Data - .NET (Feb 2016)
6. Dynamic and Public Auditing with Fair
Arbitration for Cloud Data - .NET (Feb 2016)
7. CDstore: Toward Reliable, Secure, and
Cost-Efficient Cloud Storage via Convergent Dispersal – Java (Mar 2016)
8.
Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing
- .NET (June 2015)
9. Circuit Ciphertext-Policy Attribute-Based
Hybrid Encryption with Verifiable Delegation – Java (Jan 2016)
10.Identity-based
Encryption with Outsourced Revocation in Cloud Computing - .NET( Feb 2015)
12.Prioritization
of Overflow Tasks to Improve Performance of Mobile Cloud - .NET (Feb 2016)
13.Towards
achieving data security with the cloud computing adoption framework – Java (Feb
2016)
MULTIMEDIA
14.Social Friend Recommendation Based On
Multiple Network Correlation – Java (Feb 2016)
15.A
Locality Sensitive Low-Rank Model for Image Tag Completion – Java (Mar 2016)
16.Tag
based image search by social re-ranking – Java (Aug 2016)
17.Rating
prediction based on social sentiment from textual reviews – Java (Sep 2016)
WIRELESS
SENSOR NETWORKS
18.Activetrust:
Secure and Trustable Routing in Wireless Sensor Networks – Java (Sept 2016)
19.Efficient
Certificateless Access Control for Wireless Body Area Networks - .NET (July
2016)
NETWORKING
20. Privacy Preserving Ranked Multi-Keyword
Search for Multiple Data Owners in Cloud Computing - .NET (May 2016)
21. Attribute-Based Data Sharing Scheme
Revisited in Cloud Computing - .NET & Java (Aug 2016)
22.Fast
and Scalable Range Query Processing With Strong Privacy Protection for Cloud
Computing - .NET (Aug 2016)
DEPENDABLE AND SECURE COMPUTING
24.A
Shoulder Surfing Resistant Graphical Authentication System – Java & .NET
(Mar 2016) COMPUTERS
25.Two-Factor
Data Security Protection Mechanism for Cloud Storage System - .NET (June 2016)
26.ID2S Password-Authenticated Key Exchange Protocols – Java (Dec 2016)
27.Mitigating
Cross-Site Scripting Attacks with a Content Security Policy – Java (March 2016)
28.
Dynamic resource allocation for MapReduce with partition with skew - .NET (Nov
2016)
INFORMATION FORENSICS AND SECURITY
29.2DCRYPT:
Image Scaling and Cropping in Encrypted Domains – Java (June 2016)
30.Privacy
preserving outsourced association rule mining on vertically partitioned
databases - .NET (Aug 2016)
31.Enabling Cloud Storage Auditing With
Verifiable Outsourcing of Key Updates – June 2016
32.Server-Aided
Public Key Encryption With Keyword Search – August 2016
33.Fine-Grained Two-Factor Access Control for
Web-Based Cloud Computing Services – march 2016
INTELLIGENT TRANSPORTATION SYSTEMS
34.Text
Mining the Contributors to Rail Accidents - .NET (Feb 2016)
SECURITY COMPUTING
36.Identity-Based
Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public
Cloud – Java (June 2016)
MOBILE
COMPUTING
37.EPLQ: efficient privacy-preserving location-based
query over outsourced encrypted data - .NET (Apr 2016)
38.An
Optimization Framework for Mobile Data Collection in EnergyHarvesting Wireless
Sensor Networks - .NET – (Dec 2016)
39.Detecting Node Failures in Mobile Wireless
Networks: A Probabilistic Approach - .NET (July 2016)
40.WORAL
A Witness Oriented Secure Location Provenance Framework for Mobile Devices -
.NET (Mar 2016)
SERVICE
COMPUTING
41.Publicly
Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple
Keys - .NET (Feb 2016)
KNOWLEDGE AND DATA ENGINEERING
42.Privacy
preserving outsourced media search - .NET (July 2016)
43.Online
Subgraph Skyline Analysis Over Knowledge Graphs - .NET (July 2016)
44.RSKNN:
KNN search on road networks by Incorporating social influence – Java (June
2016) 45.Nearest Keyword Set Search in Multi dimensional Datasets – Java (Mar
2016)
46.A
Scalable Approach for Content-Based Image Retrieval in Peer-toPeer Networks –
Java (April 2016)
47.Relevance
Feedback Algorithms Inspired By Quantum Detection - .NET – (Apr 2016)
48.DeyPoS:
Deduplicatable Dynamic Proof of Storage for Multi-User Environments – Java (Apr
2016)
49.Clustering
Data Streams Based on Shared Density between MicroClusters – Java (June 2016)
50.Connecting
Social Media to E-Commerce: Cold-Start Product Recommendation – Java ( May
2016)
51.Crawling
Hidden Objects with kNN Queries – April 2016
52.DiploCloud: Efficient and Scalable
Management of RDF Data in the Cloud – March 2016
53.Resolving Multi-Party Privacy Conflicts in
Social Media – July 2016
DATA MINING
54.Topicsketch:
Real-time Bursty Topic Detection from Twitter - .NET (Aug 2016)
55.Insider
Collusion Attack on Privacy-Preserving Kernel-Based Data Mining Systems – Java
(Apr 2016)
56.Mining Health Examination Records — A
Graph-based Approach – Java (Sept 2016)
57.Processing Incomplete k Nearest Neighbor
Search - .NET (Jan 2016)
IMAGE PROCESSING
58.Enhancing
Sketch-Based Image Retrieval by Re-Ranking and Relevance Feedback - .NET (Jan
2016) 59.Secure Reversible Image Data Hiding over Encrypted Domain via Key
Modulation - .NET (Mar 2016)
BIG DATA
60.Visual
Exploration of Changes in Passenger Flows and Tweets on Mega-City Metro Network
- .NET (Mar 2016)
61.Personalized Travel sequence recommendation
on multi-source big social media – March 2016
62.Hadoop
Based Scalable Cluster Deduplication for Big Data – Java (June 2016)
PARALLEL AND DISTRIBUTED SYSTEMS
63.Online
Resource Scheduling under Concave Pricing for Cloud Computing – Java (April
2016)
64.FiDoop-DP:
Data Partitioning in Frequent Itemset Mining on Hadoop Clusters – Java (April
2016)
65.Reducing
Fragmentation for In-line Deduplication Backup Storage via Exploiting Backup
History and Cache Knowledge – Java (March 2016)
INTELLIGENT TRANSPORTATION SYSTEMS
66.Bilevel
Feature Extraction-Based Text Mining for Fault Diagnosis of Railway Systems –
April 2016 PROFESSIONAL COMMUNICATION
67.The
Impact of Review Environment on Review Credibility – June 2016
Comments
Post a Comment