IEEE 2017-2018 JAVA/DOTNET/NS2
PROJECTS
CLOUD COMPUTING
MICI17-001.Achieving Secure, Universal, and
Fine-Grained Query Results Verification for Secure Search Scheme over Encrypted
Cloud Data. (May 2017).
MICI17-002.Fast Phrase Search for Encrypted Cloud
Storage. (May 2017).
MICI17-003.Partial Utility-Driven Scheduling for
Flexible SLA and Pricing Arbitration in Clouds
MICI17-004.Securing Cloud Data under Key Exposure
MICI17-005.Privacy Protection based Access Control Scheme in
Cloud-based Services
MICI17-006. Practical Privacy-Preserving Content-Based Retrieval
in Cloud Image Repositories
MICI17-007.A New Cloud Service Mechanism for
Profit Optimizations of a Cloud Provider and Its Users(June 2017)
MICI17-008.Two-Aggregator Topology Optimization
using Multiple Paths in Data Center Networks(June 2017)
MICI17-009.Application-Aware Big Data
Deduplication in Cloud Environment
MICI17-010.Virtual Machine Migration Planning in
Software-Defined Networks
MICI17-011.Fault Tolerant Stencil Computation on
Cloud-based GPU Spot Instances
MICI17-012.A New Service Mechanism for Profit
Optimizations of a Cloud Provider and Its Users
MICI17-013.Dynamic Resource Provisioning for
Energy Efficient Cloud Radio Access Networks
MICI17-014.Customer-Satisfaction-Aware Optimal Multiserver
Configuration for Profit Maximization in Cloud Computing
MICI17-015.Privacy-Preserving Location-Proximity for Mobile
Apps
MICI17-016.Cooperative Query Answer Authentication
Scheme Over Anonymous Sensing Data
MICI17-017.Resource provisioning for task-batch
based workflows with deadlines in public clouds
MICI17-018.Secure Data Sharing and Searching at
the Edge of Cloud-Assisted Internet of Things
DATA MINING
MICI17-001.Probabilistic Models For Ad View
ability Prediction On The Web. (May 2017).
MICI17-002.Mining Competitors from Large
Unstructured Datasets.(May 2017).
MICI17-003.GALLOP: GlobAL feature fused LOcation
Prediction for Different Check-in Scenarios.(May 2017)
MICI17-004. Efficient Clue-based Route Search on
Road Networks(May 2017)
MICI17-005.Microscopic and Macroscopic
spatio-temporal Topic Models for Check-in Data.(May 2017)
MICI17-006.Large-scale Location Prediction
for Web Pages(May 2016).
MICI17-007.Modeling Information Diffusion
over Social Networks for Temporal Dynamic Prediction(May 2017).
MICI17-008.Discrete Nonnegative Spectral
Clustering(May 2017)
MICI17-009.Managing Temporal Constraints with
Preferences: Representation, Reasoning, and Querying(May 2017)
MICI17-010.Facilitating Time Critical Information
Seeking in Social Media(May 2017)
MICI17-011.Stochastic Blockmodeling and
Variational Bayes Learning for Signed Network Analysis
MICI17-012.Finding Related Forum Posts through
Content Similarity over Intention-based Segmentation
MICI17-013.Big Search in Cyberspace
MICI17-014.Supervised Taxonomies—Algorithms and
Applications
MICI17-015.l-Injection: Toward Effective
Collaborative Filtering Using Uninteresting Items
MICI17-016.Towards Real-Time, Country-Level Location
Classification of Worldwide Tweets
MICI17-017.Differentially Private Data Publishing
and Analysis: a Survey
MICI17-018.Scalable Algorithms for CQA Post Voting
Prediction
MICI17-019.Adaptive ensembling of semi-supervised
clustering solutions
MICI17-020.A Multi-objective Optimization Approach
for Question Routing in Community Question Answering Sevices
MICI17-021.User Vitality Ranking and Prediction in
Social Networking Services: A Dynamic Network Perspective(Feb -2017)
MICI17-022.Search Rank Fraud and Malware Detection
in Google Play(Feb -2017)
MICI17-023.SAP: Improving Continuous Top-K Queries
Over Streaming Data(Feb 2017)
MICI17-024.Data-Driven Answer Selection in
Community QA Systems(Feb 2017)
MICI17-025.Analyzing Sentiments in One Go: A
Supervised Joint Topic Modeling Approach(Feb 2017)
MICI17-026.Analyzing Sentiments in One Go: A
Supervised Joint Topic Modeling Approach(Feb 2017).
MICI17-027.Energy-efficient Query Processing in
Web Search Engines
MICI17-028.Online Multi-task Learning Framework for
Ensemble Forecasting
MICI17-029.Privacy-Preserving Selective
Aggregation of Online User Behavior Data
MICI17-030.Privacy protection based access control
scheme in cloud-based services
MICI17-031.Continuous Top-k Monitoring on Document
Streams
MICI17-032.Dynamic Facet Ordering for Faceted
Product Search Engines
NETWORKING
MICI17-001.An Overlay Architecture for Throughput
Optimal Multipath Routing(May 2017)
MICI17-002.Routing
in Accumulative Multi-Hop Networks(May 2017)
MICI17-003.Coding
for Improved Throughput Performance in Network Switches(May 2017)
MICI17-004.Power
Efficiency and Delay Tradeoff of 10GBase-T Energy Efficient Ethernet
Protocol(May 2017)
MICI17-005.A
Scalable Framework for Wireless Distributed Computing(May 2017)
MICI17-006.Efficient
Unknown Tag Detection in Large-Scale RFID Systems With Unreliable Channels
MICI17-007.Data
Center Server Provision: Distributed Asynchronous Control for Coupled Renewal
Systems
MICI17-008.Privacy
and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Networks
MICI17-009.A
Longitudinal Measurement Study of TCP Performance and Behavior in 3G/4G
Networks Over High Speed Rails
MICI17-010.On
Oblivious Neighbor Discovery in Distributed Wireless Networks With Directional
Antennas: Theoretical Foundation and Algorithm Design
MICI17-011.When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting
Prediction in Online Social Networks
MICI17-012.Socially-Driven Learning-Based Prefetching in
Mobile Online Social Networks
NETWORK
SECURITY & SECURE COMPUTING
MICI17-001 .Security
Implications of Permission Models in Smart-Home Application Frameworks.
MOBILE
COMPUTING
MICI17-001.Searching Trajectories by Regions of Interest
MICI17-002.Knowledge-Enhanced Mobile Video Broadcasting
(KMV-Cast) Framework with Cloud Support
MICI17-003. A Classroom Scheduling Service for Smart Classes
MICI17-004.Efficient and Privacy-preserving Min and k-th Min
Computations in Mobile Sensing Systems
MICI17-005. ShakeIn: Secure User Authentication of Smartphones with
Habitual Single-handed Shakes
MICI17-006.Performance Analysis of Mobile Data Offloading in
Heterogeneous Networks
MICI17-007.Distributed Clustering-Task Scheduling
for Wireless Sensor Networks Using Dynamic Hyper Round Policy
WIRELESS
SENSOR NETWORKS
MICI17-001.Data-Driven Faulty Node
Detection Scheme for Wireless Sensor Networks
SERVICE
COMPUTING
MICI17-001.Resource renting for periodical cloud workflow
applications
MICI17-002.Time
Dependent Pricing for Large-scale Mobile Networks of Urban Environment:
Feasibility and Adaptability
MICI17-003.TAFC: Time and Attribute Factors Combined Access
Control on Time-Sensitive Data in Public Cloud
MICI17-004. Resource renting for periodical cloud workflow
applications
KNOWLEDGE AND
DATA ENGINEERING
MICI17-001.Temporal task
scheduling with constrained service delay for profit maximization in hybrid
clouds
MICI17-002.Explaining Missing
Answers to Top-k SQL Queries
MICI17-003.Designing High
Performance Web-Based Computing Services to Promote Telemedicine Database
Management System
MICI17-004. Continuous Top-k
Monitoring on Document Streams
MICI17-005.Generating Query
Facets using Knowledge Bases
MICI17-006.PPRank:
Economically Selecting Initial Users for Influence Maximization in Social
Networks
MICI17-007. Influence
Maximization in Trajectory Databases
MICI17-008.An Iterative
Classification Scheme for Sanitizing Large-Scale Datasets
MICI17-009.Personal Web
Revisitation by Context and Content Keywords with Relevance Feedback
MICI17-010.Query Expansion with
Enriched User Profiles for Personalized Search Utilizing Folksonomy Data
DEPENDABLE AND
SECURE COMPUTING
MICI17-001.A
Scalable Approach to Joint Cyber Insurance and Security-as-a-Service
Provisioning in Cloud Computing
MICI17-002.Cryptographic
Solutions for Credibility and Liability Issues of Genomic Data
MICI17-003.Efficient
Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications
MICI17-004.Fault-Tolerant
Adaptive Routing in Dragonfly Networks
MICI17-005.On
the Security of a Variant of ElGamal Encryption Scheme
MICI17-006.Optimal
Spot-Checking for Collusion Tolerance in
Computer Grids
-Preserving Multi-keyword Top-k Similarity Search
Over Encrypted Data
MICI17-007.Privacy-Preserving
Aggregate Queries for Optimal Location Selection
MICI17-008.Design
and Implementation of the Ascend Secure Processor
MICI17-009.Efficient
Delegated Private Set Intersection on Outsourced Private Datasets
MICI17-001.Optimized
Identity-Based Encryption from Bilinear Pairing for Lightweight Devices
MICI17-010.Privacy-Aware
Caching in Information-Centric Networking
MICI17-011.Fuzzy Identity-Based Data Integrity
Auditing for Reliable Cloud Storage Systems
IMAGE
PROCESSING
MICI17-001.Temporal Dependent Rate-Distortion
Optimization for Low-Delay Hierarchical Video Coding.
MICI17-002.Scalable
Image Coding Based on Epitomes
MICI17-003.Image Re-ranking based on Topic
Diversity
MICI17-004.Coherent Semantic-visual Indexing for
Large-scale Image Retrieval in the Cloud
MICI17-005.Learning the image processing pipeline
MULTIMEDIA
MICI17-001.Optimal Representations for Adaptive
Streaming in Interactive Multi-View Video Systems
MICI17-002.Structure-Preserving Image
Super-resolution via Contextualized Multi-task Learning
MICI17-003.Visual Tracking via Nonnegative
Multiple Coding
MICI17-004.Image Based Appraisal of Real Estate
Properties
MICI17-005.Cost-Effective Low-Delay Design for
Multi-Party Cloud Video Conferencing
PARALLEL AND
DISTRIBUTED SYSTEM
MICI17-001.The Importance of Worker Reputation Information in Microtask-Based Crowd
Work Systems
SERVICE
COMPUTING, COMPUTERS, IOT
MICI17-001.TAFC: Time and
Attribute Factors Combined Access Control on Time-Sensitive Data in Public
Cloud
MICI17-002.Transactional
Behavior Verification in Business Process as a Service Configuration
MICI17-003.FogRoute: DTN-based
Data Dissemination Model in Fog Computing
MICI17-004.Pattern−Based
Design and Verification of Secure Service Compositions
MICI17-005.LoDPD:
A Location Difference-based Proximity Detection Protocol for Fog Computing
MICI17-006.Resource
Allocation in Vehicular Cloud Computing Systems with MICI17-007.Heterogeneous Vehicles and
Roadside Units
MICI17-008.Security-Aware
Waveforms for Enhancing Wireless Communications Privacy in Cyber-Physical
Systems via Multipath Receptions
SOFTWARE
ENGINEERING
MICI17-001.A Formal Specification and Verification
Framework for Timed Security Protocols
MICI17-002.A Survey of Recent Trends in Testing
Concurrent Software Systems
INFORMATION
FORENSICS AND SECURITY
MICI17-001.Two-Cloud Secure Database for Numeric-Related SQL
Range Queries with Privacy Preserving
MICI17-002.Twitter Trends Manipulation: A First Look Inside the
Security of Twitter Trending
MICI17-003.A Novel Efficient Remote Data Possession Checking
Protocol in Cloud Storage
MICI17-004. A Cross Tenant
Access Control (CTAC) Model for Cloud Computing: Formal Specification and
Verification
MICI17-005.RAAC: Robust and Auditable Access Control with
Multiple Attribute Authorities for Public Cloud Storage
MICI17-006.Identity-Based Data Outsourcing with Comprehensive
Auditing in Clouds
MICI17-007.Strong Key-Exposure Resilient Auditing for Secure
Cloud Storage
MICI17-008.Image origin classification
based on social network provenance
MICI17-009.Person Identification by Keystroke
Dynamics using Pairwise User Coupling
MICI17-010.Efficiently Promoting Product
Online Outcome: An Iterative Rating Attack Utilizing Product and Market
Property
INTELLIGENT TRANSPORTATION SYSTEMS
MICI17-001.EAAP: Efficient Anonymous
Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc
Networks
SECURITY COMPUTING
MICI17-001.FastGeo: Efficient Geometric Range Queries on
Encrypted Spatial Data
MICI17-002.Fuzzy Identity-Based Data Integrity Auditing for
Reliable Cloud Storage Systems
MICI17-003.Cloud Data Auditing
Techniques with a Focus on Privacy and Security
BIG DATA
MICI17-001.Attribute Based Storage Supporting Secure
Deduplication of Encrypted Data in Cloud
MICI17-002.Detecting and Analyzing Urban Regions
with High Impact of Weather Change on Transport
MICI17-003.Visual Analysis of Multiple Route
Choices based on General GPS Trajectories
MICI17-004.Survey on Improving Data Utility in
Differentially Private Sequential Data Publishing
MICI17-005.Big Data Based Security Analytics for
Protecting Virtualized Infrastructures in Cloud Computing
MICI17-006.Secure k-NN Query on Encrypted Cloud
Data with Multiple Keys
MICI17-007.A Pre-Authentication Approach to Proxy
Re-encryption in Big Data Context
MICI17-008.Secure Authentication in Cloud Big Data
with Hierarchical Attribute Authorization Structure
MICI17-009.Privacy-Preserving Data Encryption
Strategy for Big Data in Mobile Cloud Computing
MICI17-010.Optimizing Share Size in Efficient and
Robust Secret Sharing Scheme for Big Data
MICI17-011.Revocable Identity-Based Access Control
for Big Data with Verifiable Outsourced Computing
MICI17-012.Efficient Recommendation of
De-identification Policies using Map Reduce
MICI17-013.NPP: A New Privacy-Aware Public
Auditing Scheme for Cloud Data Sharing with Group Users
MICI17-014.A
Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
MICI17-015.Heterogeneous Data Storage Management with
Deduplication in Cloud Computing
PROJECT TITLES 2016-2017
BIGDATA mongoDB
|
NOSQL-mongoDB on BIG DATA
|
1. FiDoop: Parallel Mining of Frequent Itemsets Using
MapReduce
|
2. Self-Healing in Mobile Networks with Big Data
|
3. Secure Sensitive Data Sharing on a Big Data Platform
|
4. Big Data, Big Knowledge: Big Data for Personalized
Healthcare
|
5. k-Nearest Neighbor Classification over Semantically
Secure Encrypted Relational Data
|
6. Toward Optimal Resource Provisioning for Cloud MapReduce
and Hybrid Cloud Applications
|
7. Secure Big Data Storage and Sharing Scheme for Cloud
Tenants
|
8. Differentially Private Frequent Itemset Mining via
Transaction Splitting
|
9. SUBGRAPH MATCHING WITH SET SIMILARITY IN A LARGE GRAPH
DATABASE
|
10. MULTIVIEW ALIGNMENT HASHING FOR EFFICIENT IMAGE SEARCH
|
11. Fast Best-Effort Pattern Matching in Large Attributed
Graphs
|
JAVA IEEE 2016-17
|
IEEE Transactions on Emerging Topics in Computing
|
12. Then and Now: On The Maturity of the Cybercrime Markets
|
Transactions on Dependable and Secure Computing
|
13. Online Subgraph Skyline Analysis Over Knowledge Graphs
|
14. 2DCrypt: Image Scaling and Cropping in Encrypted
Domains
|
15. Mitigating Cross-Site Scripting Attacks with a Content
Security Policy
|
16. ID2S Password-Authenticated Key Exchange Protocols
|
17. Dual-Server Public-Key Encryption with Keyword Search
for Secure Cloud Storage
|
18. A Shoulder Surfing Resistant Graphical Authentication
System
|
Transactions on Knowledge and Data Engineering
|
19. NATERGM: A Model for Examining the Role of Nodal
Attributes in Dynamic Social Media Networks
|
20. Crawling Hidden Objects with kNN Queries
|
21. A Comprehensive Study on Willingness Maximization for
Social Activity Planning with Quality Guarantee
|
22. Cyberbullying Detection based on Semantic-Enhanced
Marginalized Denoising Auto-Encoder
|
23. Cross-Platform Identification of Anonymous Identical
Users in Multiple Social Media Networks
|
24. DeyPoS: Deduplicatable Dynamic Proof of Storage for
Multi-User Environments
|
25. Mining User-Aware Rare Sequential Topic Patterns in
Document Streams
|
26. Nearest Keyword Set Search in Multi-dimensional
Datasets
|
27. Quality-Aware Subgraph Matching Over Inconsistent
Probabilistic Graph Databases
|
28. Inverted Linear Quadtree: Efficient Top K Spatial
Keyword Search
|
29. Practical Approximate k Nearest Neighbor Queries with
Location and Query Privacy
|
IEEE TRANSACTIONS ON SERVICES COMPUTING
|
30. OUTSOURCED ATTRIBUTE BASED ENCRYPTION WITH KEYWORD
SEARCH FUNCTION FOR CLOUD STORAGE
|
31. SecRBAC: Secure data in the Clouds
|
IEEE INTELLIGENT SYSTEMS
|
32. Trust Agent-Based Behavior Induction in Social Networks
|
IEEE TRANSACTIONS ON MULTIMEDIA
|
33. Tag Based Image Search by Social Re-ranking
|
34. Enhancing Sketch-Based Image Retrieval by Re-ranking
and Relevance Feedback
|
35. A Locality Sensitive Low-Rank Model for Image Tag
Completion
|
ANDROID IEEE 2016 -17
|
Internet-of-Things Technologies
|
36. EPLQ: Efficient Privacy-Preserving Location-based Query
over Outsourced Encrypted Data
|
37. A Cloud-Based Smart-Parking System Based on
Internet-of-Things Technologies
|
Secure Computing
|
38. PassBYOP: Bring Your Own Picture for Securing Graphical
Passwords
|
39. Authentication of Smartphone Users Using Behavioral
Biometrics
|
40. An Exploration of Geographic Authentication Schemes
|
41. A Shoulder Surfing Resistant Graphical Authentication
System
|
TRANSACTIONS ON NETWORKING
|
42. STAMP: Enabling Privacy-Preserving Location Proofs for
Mobile Users
|
Transactions on Mobile Computing
|
43. Understanding Smartphone Sensor and App Data for Enhancing
the Security of Secret Questions
|
44. SBVLC: Secure Barcode-based Visible Light Communication
for Smartphones
|
Transactions on Services Computing
|
45. Read2Me: A Cloud- based Reading Aid for the Visually
Impaired
|
46. Designing a Secure Exam Management System (SEMS) for
M-Learning Environments
|
47. Privacy-Preserving Location Sharing Services for Social
Networks
|
Speech Recognition
|
48. Intelligent Hands Free Speech based SMS System on
Android
|
CLOUD IMPLEMENTATION- ANDROID
|
IEEE REAL CLOUD IMPLEMENTATION
|
49. One-Round Privacy-Preserving Meeting Location
Determination for Smartphone Applications
|
50. Mobile cloud support for semantic enriched speech
recognition in social care
|
51. Distributing secret sharing approach with cheater
prevention based on QR code
|
52. Design of Secure Location and Message Sharing System for
Android Platform
|
53. The impact of cloud technology on the automation of
businesses
|
54. Design and Analysis of an Efficient Friend-to-Friend
Content Dissemination System
|
55. WORAL: A Witness Oriented Secure Location Provenance
Framework for Mobile Devices
|
ANDOROID JSON PHP
|
ANDROID- JSON - PHP
|
56. Rescue Management System
|
57. Android Army - Military Apps
|
58. Android Beauty Parlor
|
59. Android E Municipality
|
60. ANDROID NURSE AID
|
61. Android Customer Care ANDROID, PHP JSON, MySQL
|
Dot Net IEEE 2016-17
|
IEEE Transactions on Computers
|
62. Beating the Artificial Chaos Fighting OSN Spam Using Its
Own Templates
|
63. Personalizing Sample Databases With Facebook Information
to Increase Intrinsic Motivation
|
64. Conditional Identity-based Broadcast Proxy Re-Encryption
and Its Application to Cloud Email
|
IEEE Transactions on Cloud Computing
|
65. Dynamic and Public Auditing with Fair Arbitration for
Cloud Data
|
66. Enabling Cloud Storage Auditing with Verifiable
Outsourcing of Key Updates
|
67. Providing User Security Guarantees in Public
Infrastructure Clouds
|
IEEE TRANSACTIONS ON MOBILE COMPUTING
|
68. Service Usage Classification with Encrypted Internet
Traffic in Mobile Messaging Apps
|
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
|
69. Text Mining the Contributors to Rail Accidents
|
IEEE Transactions on Security Computing
|
70. Steganalysis Features for Content-Adaptive JPEG
Steganography
|
71. Measuring the Influence of Perceived Cybercrime Risk on
Online Service Avoidance
|
72. PiCode: a New Picture-Embedding 2D Barcode
|
73. Privacy-Preserving Outsourced Association Rule Mining on
Vertically Partitioned Databases
|
74. Secure Reversible Image Data Hiding over Encrypted Domain
via Key Modulation
|
75. MMBcloud-tree: Authenticated Index for Verifiable Cloud
Service Selection
|
76. Identity-Based Proxy-Oriented Data Uploading and Remote
Data Integrity Checking in Public Cloud
|
77. Fine-grained Two-factor Access Control for Web-based Cloud
Computing Services
|
Services Computing
|
78. Flexible and Fine-Grained Attribute-BasedData Storage in
Cloud Computing
|
79. Trust-but-Verify: Verifying Result Correctness of
Outsourced Frequent Itemset Mining in Data-mining-as-a-service Paradigm
|
80. Cloud workflow scheduling with deadlines and time slot
availability
|
81. Publicly Verifiable Inner Product Evaluation over
Outsourced Data Streams under Multiple Keys
|
RAZOR MVC 4 ASP.NET
|
IEEE TRANSACTIONS ON EDUCATION
|
82. Personalizing Sample Databases With Facebook Information
to Increase Intrinsic Motivation
|
IEEE/ACM TRANSACTIONS ON NETWORKING
|
83. Beating the Artificial Chaos: Fighting OSN Spam Using Its Own
Templates
|
IEEE Transactions on Dependable and Secure Computing
|
84. Covering the Sensitive Subjects to Protect Personal
Privacy in Personalized Recommendation
|
85. Measuring the Influence of Perceived Cybercrime Risk on
Online Service Avoidance
|
IEEE MULTIMEDIA AND IMAGE PROCESSONG
|
86. Democratic Diffusion Aggregation for Image Retrieval
|
ASP.NET MVC Framework
|
ASP.NET MVC Framework Project
|
87. Towards Effective Bug Triage
with Software Data Reduction Techniques
|
88. Using Ant Colony System to Consolidate
VMs for Green Cloud Computing
|
89. A Hybrid Scheme of Public-Key
Encryption and Somewhat Homomorphic Encryption
|
90. Attribute-Based Encryption
with Efficient Verifiable Outsourced Decryption
|
91. Real-time Semantic Search
using Approximate Methodology for Large-scale Storage Systems
|
92. Detecting and Removing Web
Application Vulnerabilities with Static Analysis and Data Mining
|
93. Proof of retrievability with
public verifiability resilient against related-key attacks
|
94. Secure Anonymous Key
Distribution Scheme for Smart Grid
|
95. Converses For Secret Key
Agreement and Secure Computing
|
96. An efficient algorithm for
the bursting of Service-based applications in hybrid Clouds
|
https://spring-source.blogspot.in/
Comments
Post a Comment