Skip to main content

CSE PROJECT TITLES 2017-2017

IEEE 2017-2018 JAVA/DOTNET/NS2 PROJECTS
CLOUD COMPUTING

MICI17-001.Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme over Encrypted Cloud Data. (May 2017).
MICI17-002.Fast Phrase Search for Encrypted Cloud Storage. (May 2017).
MICI17-003.Partial Utility-Driven Scheduling for Flexible SLA and Pricing Arbitration in Clouds
MICI17-004.Securing Cloud Data under Key Exposure
MICI17-005.Privacy Protection based Access Control Scheme in Cloud-based Services
MICI17-006. Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories
MICI17-007.A New Cloud Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users(June 2017)
MICI17-008.Two-Aggregator Topology Optimization using Multiple Paths in Data Center Networks(June 2017)
MICI17-009.Application-Aware Big Data Deduplication in Cloud Environment
MICI17-010.Virtual Machine Migration Planning in Software-Defined Networks
MICI17-011.Fault Tolerant Stencil Computation on Cloud-based GPU Spot Instances
MICI17-012.A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users
MICI17-013.Dynamic Resource Provisioning for Energy Efficient Cloud Radio Access Networks
MICI17-014.Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
MICI17-015.Privacy-Preserving Location-Proximity for Mobile Apps
MICI17-016.Cooperative Query Answer Authentication Scheme Over Anonymous Sensing Data
MICI17-017.Resource provisioning for task-batch based workflows with deadlines in public clouds
MICI17-018.Secure Data Sharing and Searching at the Edge of Cloud-Assisted Internet of Things


DATA MINING

MICI17-001.Probabilistic Models For Ad View ability Prediction On The Web. (May 2017).
MICI17-002.Mining Competitors from Large Unstructured Datasets.(May 2017).
MICI17-003.GALLOP: GlobAL feature fused LOcation Prediction for Different Check-in Scenarios.(May 2017)
MICI17-004. Efficient Clue-based Route Search on Road Networks(May 2017)

MICI17-005.Microscopic and Macroscopic spatio-temporal Topic Models for Check-in Data.(May 2017)

MICI17-006.Large-scale Location Prediction for Web Pages(May 2016).

MICI17-007.Modeling Information Diffusion over Social Networks for Temporal Dynamic Prediction(May 2017).

MICI17-008.Discrete Nonnegative Spectral Clustering(May 2017)

MICI17-009.Managing Temporal Constraints with Preferences: Representation, Reasoning, and Querying(May 2017)
MICI17-010.Facilitating Time Critical Information Seeking in Social Media(May 2017)
MICI17-011.Stochastic Blockmodeling and Variational Bayes Learning for Signed Network Analysis
MICI17-012.Finding Related Forum Posts through Content Similarity over Intention-based Segmentation
MICI17-013.Big Search in Cyberspace
MICI17-014.Supervised Taxonomies—Algorithms and Applications
MICI17-015.l-Injection: Toward Effective Collaborative Filtering Using Uninteresting Items
MICI17-016.Towards Real-Time, Country-Level Location Classification of Worldwide Tweets
MICI17-017.Differentially Private Data Publishing and Analysis: a Survey
MICI17-018.Scalable Algorithms for CQA Post Voting Prediction
MICI17-019.Adaptive ensembling of semi-supervised clustering solutions
MICI17-020.A Multi-objective Optimization Approach for Question Routing in Community Question Answering Sevices
MICI17-021.User Vitality Ranking and Prediction in Social Networking Services: A Dynamic Network Perspective(Feb -2017)
MICI17-022.Search Rank Fraud and Malware Detection in Google Play(Feb -2017)
MICI17-023.SAP: Improving Continuous Top-K Queries Over Streaming Data(Feb 2017)
MICI17-024.Data-Driven Answer Selection in Community QA Systems(Feb 2017)
MICI17-025.Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach(Feb 2017)
MICI17-026.Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach(Feb 2017).
MICI17-027.Energy-efficient Query Processing in Web Search Engines
MICI17-028.Online Multi-task Learning Framework for Ensemble Forecasting
MICI17-029.Privacy-Preserving Selective Aggregation of Online User Behavior Data
MICI17-030.Privacy protection based access control scheme in cloud-based services
MICI17-031.Continuous Top-k Monitoring on Document Streams
MICI17-032.Dynamic Facet Ordering for Faceted Product Search Engines


NETWORKING

MICI17-001.An Overlay Architecture for Throughput Optimal Multipath Routing(May 2017)

MICI17-002.Routing in Accumulative Multi-Hop Networks(May 2017)
MICI17-003.Coding for Improved Throughput Performance in Network Switches(May 2017)
MICI17-004.Power Efficiency and Delay Tradeoff of 10GBase-T Energy Efficient Ethernet Protocol(May 2017)
MICI17-005.A Scalable Framework for Wireless Distributed Computing(May 2017)
MICI17-006.Efficient Unknown Tag Detection in Large-Scale RFID Systems With Unreliable Channels
MICI17-007.Data Center Server Provision: Distributed Asynchronous Control for Coupled Renewal Systems
MICI17-008.Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Networks
MICI17-009.A Longitudinal Measurement Study of TCP Performance and Behavior in 3G/4G Networks Over High Speed Rails
MICI17-010.On Oblivious Neighbor Discovery in Distributed Wireless Networks With Directional Antennas: Theoretical Foundation and Algorithm Design
MICI17-011.When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks
MICI17-012.Socially-Driven Learning-Based Prefetching in Mobile Online Social Networks


NETWORK SECURITY & SECURE COMPUTING

MICI17-001 .Security Implications of Permission Models in Smart-Home Application Frameworks.


MOBILE COMPUTING

MICI17-001.Searching Trajectories by Regions of Interest
MICI17-002.Knowledge-Enhanced Mobile Video Broadcasting (KMV-Cast) Framework with Cloud Support
MICI17-003. A Classroom Scheduling Service for Smart Classes
MICI17-004.Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
MICI17-005. ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
MICI17-006.Performance Analysis of Mobile Data Offloading in Heterogeneous Networks
MICI17-007.Distributed Clustering-Task Scheduling for Wireless Sensor Networks Using Dynamic Hyper Round Policy
WIRELESS SENSOR NETWORKS

MICI17-001.Data-Driven Faulty Node Detection Scheme for Wireless Sensor Networks


SERVICE COMPUTING

MICI17-001.Resource renting for periodical cloud workflow applications
MICI17-002.Time Dependent Pricing for Large-scale Mobile Networks of Urban Environment: Feasibility and Adaptability
MICI17-003.TAFC: Time and Attribute Factors Combined Access Control on Time-Sensitive Data in Public Cloud
MICI17-004. Resource renting for periodical cloud workflow applications

KNOWLEDGE AND DATA ENGINEERING

MICI17-001.Temporal task scheduling with constrained service delay for profit maximization in hybrid clouds
MICI17-002.Explaining Missing Answers to Top-k SQL Queries
MICI17-003.Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
MICI17-004. Continuous Top-k Monitoring on Document Streams
MICI17-005.Generating Query Facets using Knowledge Bases
MICI17-006.PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks
MICI17-007. Influence Maximization in Trajectory Databases
MICI17-008.An Iterative Classification Scheme for Sanitizing Large-Scale Datasets
MICI17-009.Personal Web Revisitation by Context and Content Keywords with Relevance Feedback
MICI17-010.Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data

DEPENDABLE AND SECURE COMPUTING

MICI17-001.A Scalable Approach to Joint Cyber Insurance and Security-as-a-Service Provisioning in Cloud Computing
MICI17-002.Cryptographic Solutions for Credibility and Liability Issues of Genomic Data
MICI17-003.Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications
MICI17-004.Fault-Tolerant Adaptive Routing in Dragonfly Networks
MICI17-005.On the Security of a Variant of ElGamal Encryption Scheme
MICI17-006.Optimal Spot-Checking for Collusion Tolerance  in Computer Grids
-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
MICI17-007.Privacy-Preserving Aggregate Queries for Optimal Location Selection
MICI17-008.Design and Implementation of the Ascend Secure Processor
MICI17-009.Efficient Delegated Private Set Intersection on Outsourced Private Datasets
MICI17-001.Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices
MICI17-010.Privacy-Aware Caching in Information-Centric Networking
MICI17-011.Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems

IMAGE PROCESSING

MICI17-001.Temporal Dependent Rate-Distortion Optimization for Low-Delay Hierarchical Video Coding.
MICI17-002.Scalable Image Coding Based on Epitomes
MICI17-003.Image Re-ranking based on Topic Diversity
MICI17-004.Coherent Semantic-visual Indexing for Large-scale Image Retrieval in the Cloud
MICI17-005.Learning the image processing pipeline
MULTIMEDIA

MICI17-001.Optimal Representations for Adaptive Streaming in Interactive Multi-View Video Systems
MICI17-002.Structure-Preserving Image Super-resolution via Contextualized Multi-task Learning
MICI17-003.Visual Tracking via Nonnegative Multiple Coding
MICI17-004.Image Based Appraisal of Real Estate Properties
MICI17-005.Cost-Effective Low-Delay Design for Multi-Party Cloud Video Conferencing
PARALLEL AND DISTRIBUTED SYSTEM

MICI17-001.The Importance of Worker Reputation Information in Microtask-Based Crowd Work Systems

SERVICE COMPUTING, COMPUTERS, IOT

MICI17-001.TAFC: Time and Attribute Factors Combined Access Control on Time-Sensitive Data in Public Cloud
MICI17-002.Transactional Behavior Verification in Business Process as a Service Configuration
MICI17-003.FogRoute: DTN-based Data Dissemination Model in Fog Computing
MICI17-004.PatternBased Design and Verification of Secure Service Compositions
MICI17-005.LoDPD: A Location Difference-based Proximity Detection Protocol for Fog Computing
MICI17-006.Resource Allocation in Vehicular Cloud Computing Systems with MICI17-007.Heterogeneous Vehicles and Roadside Units
MICI17-008.Security-Aware Waveforms for Enhancing Wireless Communications Privacy in Cyber-Physical Systems via Multipath Receptions

SOFTWARE ENGINEERING

MICI17-001.A Formal Specification and Verification Framework for Timed Security Protocols
MICI17-002.A Survey of Recent Trends in Testing Concurrent Software Systems

INFORMATION FORENSICS AND SECURITY

MICI17-001.Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving
MICI17-002.Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending
MICI17-003.A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage
MICI17-004. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification
MICI17-005.RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage
MICI17-006.Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds
MICI17-007.Strong Key-Exposure Resilient Auditing for Secure Cloud Storage
MICI17-008.Image origin classification based on social network provenance
MICI17-009.Person Identification by Keystroke Dynamics using Pairwise User Coupling
MICI17-010.Efficiently Promoting Product Online Outcome: An Iterative Rating Attack Utilizing Product and Market Property

INTELLIGENT TRANSPORTATION SYSTEMS
MICI17-001.EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks
SECURITY COMPUTING
MICI17-001.FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data
MICI17-002.Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
MICI17-003.Cloud Data Auditing Techniques with a Focus on Privacy and Security
BIG DATA
MICI17-001.Attribute Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
MICI17-002.Detecting and Analyzing Urban Regions with High Impact of Weather Change on Transport
MICI17-003.Visual Analysis of Multiple Route Choices based on General GPS Trajectories
MICI17-004.Survey on Improving Data Utility in Differentially Private Sequential Data Publishing
MICI17-005.Big Data Based Security Analytics for Protecting Virtualized Infrastructures in Cloud Computing
MICI17-006.Secure k-NN Query on Encrypted Cloud Data with Multiple Keys
MICI17-007.A Pre-Authentication Approach to Proxy Re-encryption in Big Data Context
MICI17-008.Secure Authentication in Cloud Big Data with Hierarchical Attribute Authorization Structure
MICI17-009.Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing
MICI17-010.Optimizing Share Size in Efficient and Robust Secret Sharing Scheme for Big Data
MICI17-011.Revocable Identity-Based Access Control for Big Data with Verifiable Outsourced Computing
MICI17-012.Efficient Recommendation of De-identification Policies using Map Reduce
MICI17-013.NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users
MICI17-014.A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
MICI17-015.Heterogeneous Data Storage Management with Deduplication in Cloud Computing


Comments

Popular posts from this blog

IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD report

IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD ABSTRACT More and more clients would like to store their data to PCS (public cloud servers) along with the rapid development of cloud computing. New security problems have to be solved in order to help more clients process their data in public cloud. When the client is restricted to access PCS, he will delegate its proxy to process his data and upload them. On the other hand, remote data integrity checking is also an important security problem in public cloud storage. It makes the clients check whether their outsourced data is kept intact without downloading the whole data. From the security problems, we propose a novel proxy-oriented data uploading and remote data integrity checking model in identity-based public key cryptography: IDPUIC (identity-based proxy-oriented data uploading and remote data integrity checking in public cloud). We give the formal definition, system model and se

A LOCALITY SENSITIVE LOW-RANK MODEL FOR IMAGE TAG COMPLETION

A LOCALITY SENSITIVE LOW-RANK MODEL FOR IMAGE TAG COMPLETION ABSTRACT Many visual applications have benefited from the outburst of web images, yet the imprecise and incomplete tags arbitrarily provided by users, as the thorn of the rose, may hamper the performance of retrieval or indexing systems relying on such data. In this paper, we propose a novel locality sensitive low-rank model for image tag completion, which approximates the global nonlinear model with a collection of local linear models. To effectively infuse the idea of locality sensitivity, a simple and effective pre-processing module is designed to learn suitable representation for data partition, and a global consensus regularizer is introduced to mitigate the risk of overfitting. Meanwhile, low-rank matrix factorization is employed as local models, where the local geometry structures are preserved for the low-dimensional representation of both tags and samples. Extensive empirical evaluations conducted on three

LIFI

LIFI Prof . Harald Haas is a technology of high brightness light emitting diodes(LED).It is bidirectional ,high speed and fully networked wireless communication.    LiFi is designed to use LED light bulbs similar to those currently in use in many energy-conscious homes and offices. However, LiFi bulbs are outfitted with a   chip   that modulates the light imperceptibly for optical data transmission. LiFi data is transmitted by the LED bulbs and received by photoreceptors. LiFi's early developmental models were capable of 150 megabits-per-second ( Mbps ). Some commercial kits enabling that speed have been released. In the lab, with stronger LEDs and different technology, researchers have enabled 10   gigabits -per-second (Gbps), which is faster than   802.11ad .  Benefits of LiFi: ·         Higher speeds than  Wi-Fi . ·         10000 times the frequency  spectrum  of radio. ·         More secure because data cannot be intercepted without a clear line of si