Java Titles 5
Java Titles 5
2 Designing secure and efficient biometirc based secure access mechanism for cloud services
3 Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud
4 Key Sea Keyword-based Search with Receiver Anonymity in Attribute-based Searchable Encryption
5 Efficient Traceable Authorization Search System for Secure Cloud Storage
6 Cloud Centric Authentication for Wearable Healthcare Monitoring System
7 Key Policy Attribute-Based Encryption with Keyword Search in Virtualized Environments
8 Characterizing the Propagation of Situational Information in Social Media During COVID-19
9 LEVER Secure Deduplicated Cloud Storage with Encrypted Two-Party Interactions in Cyber-Physical Systems
10 sentiment polarity categorization technique for online product reviews
11 Emotion Detection in online soscial networks a multi label learning approach
12 SecDedup Secure Encrypted Data De duplication with Dynamic Ownership Updating
13 charon a secure cloud of clud system for storing and sharing big data
14 Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography
15 a novel multi keyword search on encrypted dat in the cloud
16 Crisis-Critical Intellectual Property Findings From the COVID-19 Pandemic
17 Detecting Group Shilling Attacks in Online Recommender Systems Based on Bisecting K-Means Clustering
18 A Lightweight secure auditing scheme for shared data in cloud storage
19 Cashless Society Managing Privacy and Security in the Technological Age
20 A Verifiable Semantic Searching Scheme by Optimal Matching over Encrypted Data in Public Cloud
21 A Data Sharing Protocol to Minimize Security and Privacy Risks of Cloud Storage in Big Data Era
22 Multi Party Hgh dimensional data publishing
23 Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
24 active online wearing for scoial media analysis support cirist managaement (PENDING)
25 authentication and key agreement based on anymous identity for peer to peer cloud
26 a novel feature matching ranked search mechanism over encyrpted cloud
27 TAQE Tweet Retrieval Based Infrastructure Damage Assessment During Disasters
28 ANALYSIS OF WOMEN SAFETY IN INDIAN CITIES USING MACHINE LEARNING ON TWEETS
29 A Three Layer Preserving Cloud Storagescheme Based on Computational intellligence in FOG Computing
30 Activity Minimization of Misinformation Influence in Online Social Networks
31 block chain based secure computation of floading in vechicular networks
32 a novel feataure mataching ranked search mechanism over encrypted cloud
33 Socirank Identifying And Ranking Prevalent News Topics Using Social Media Factors
34 Secure Cloud Storage with Data Dynamics Using Secure Network Coding Techniques
35 Towards Detecting Compromised Accounts on Social Networks socia friends
36 learning customer behaviour
37 A EFFICIENT FEEDBACK CONTROL MECHANISM FOR POSITIVE OR NEGATIVE INFORMATION SPREAD IN ONLINE SOCIAL NETWORKS
38 dual access control for cloud based data storage and sharing
39 AdSherlock Efficient and Deployable Click Fraud Detection for Mobile Applications
40 detection of fake online reviews
41 privacy presering data publishing
42 CYBER TREAT DETECTION
43 Retrieving Hidden Friends A Collusion Privacy Attack Against Online Friend Search Engine
44 Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols
45 Securing All Media Data Using Cryptography And Steganography Techniques
46 Selective Authentication Based Geographic Opportunistic Routing in Wireless Sensor Networks for Internet of Things Against DoS Attacks
47 SEPDP Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage
48 Enabling Verifiable and Dynamic Ranked Search Over Outsourced Data
49 Fast Secure and Anonymous Key Agreement Against Bad Randomness for Cloud Computing
50 Detecting and Characterizing Extremist Reviewer Groups in Online Product Reviews
51 Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
52 CROSS-PLATFORM OF MULTIPLE SOCIAL MEDIA NETWORKS
53 Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
54 A Parallel Patient Treatment Time Prediction Algorithm and Its Applications in Hospital Queuing-Recommendation in a Big Data Environment
55 A robust reputation management mechanism in the fedrated cloud
56 Achieving efficient and secure data acquistion for cloud supported iot in smart drive
57 An Integrated Semantic web service discovery and compsotioin framework
58 AN OPTIMIZED SPECULATIVE EXECUTION PROCESS FOR BIG DATA CLUSTER
59 Authenticaed Key exchange protocols for parallel network file systems
60 CHAOTIC SEARCHABLE ENCRYPTION FOR MOBILE CLOUD STORAGE
61 Circuit Ciphertext-Policy Attribute Based Hybrid Encryption with Verifiable Delegation in Cloud Computing
62 CLOUD LOG ASSURING SOUNDNESS AND SECRECY SCHEME FOR CLOUD FORENSICS
63 Connecting Social Media to E-Commerce Cold-Start Product Recommendation Using Microblogging Information
64 CONTRIBUTORY BROADCAST ENCRYPTION WITH EFFICIENT ENCRYPTION AND SHORT CIPHERTEXTS
65 discovering canical corelations between topical and toplogical information in document networks
66 Discovery of Ranking Fraud for Mobile Apps
67 Dynamic Multigranularity service composition
68 Dynamic VM Scaling Provisioning and Pricing through an Online Auction
69 E2HRC An Energy-Efficient Heterogeneous Ring Clustering Routing Protocol for Wireless Sensor Networks
70 Efficient and Expressive Keyword Search over Encrypted Data in Cloud
71 FIDOOP-DP DATA PARTITIONING IN FREQUENT ITEMSET MINING ON HADOOP CLUSTERS
72 influential node tracking on dynamic social network an interchange greedy approach
73 Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications
74 IPATH PATH INFERENCE IN WIRELESS SENSOR NETWORKS
75 MICROBLOG DIMENSIONALITY REDUCTION A DEEP LEARNING APPROACH
76 Mining Competitors from Large Unstructured Datasets
77 MMBcloud-tree Authenticated Index for Verifiable Cloud Service Selection
78 Nearest Keyword Set Search In Multi-Dimensional Dataset
79 Netspam A Network-Based Spam Detection Framework For Reviews In Online Social Media
80 Network Capability in Localizing Node Failures via End-to-End Path Measurements
81 online coin management
82 PassBYOP Bring Your Own Picture for Securing Graphical Passwords (1)
83 Preventing Distributed Deniel of service flooding attacks with dynamic path identifiers
84 Privacy Protection based Access Control Scheme in Cloud-based Services
85 provest provenance-based trust model for delay tolerant networks
86 Providing User Security Guarantees in Public Infrastructure Clouds
87 Search Rank Fraud and Malware Detection in Google Play
88 SUPERMAN Security Using Pre-Existing Routing for Mobile Adhoc Networks
89 Towards Efficient Data Analysis Service For Large Scale Social Networks
90 Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks
91 FastGeo-Efficient Geometric Range Queries and Encrypted Spaital Data
92 Privacy Protection based access control scheme in cloud based services
93 Towards detecting compromised accounts on social networks
94 SECURE CLOUD BASED SEARCH FOR NUMERICAL AND DATE RANGE QUERIES
95 CLOUD CENTRIC AUTHENTICATION FOR WEARABLE HEALTHCARE MONITORING SYSTEM
96 AN OPTIMIZED SPECULATIVE EXECUTION PROCESS FOR BIG DATA CLUSTER
97 COMBINING DATA OWNER-SIDE AND CLOUD-SIDE ACCESS CONTROL FOR ENCRYPTED CLOUD STORAGE
98 Characterizing and Predicting Early Reviewers for Effective Product Marketing on E-Commerce Websites
99 Privacy Characterization and Quantification in Data Publishing
100 Hate Speech on Twitter A Pragmatic Approach to Collect Hateful and Offensive Expressions
101 Finding Optimal Skyline Product Combinations under Price Promotion
102 AN APPROACH TO BALANCE MAINTENANCE COSTS AND ELECTRICITY CONSUMPTION IN CLOUD DATA CENTERS
103 Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols
104 Protecting Location Privacy for Task Allocation in Ad Hoc Mobile Cloud Computing
105 privacy characterication and quanitzatiion in data publishing
106 provence based trust model in dealy tolerant networks
107 credit card fraud detection using adboost and majority voting
108 Online Social Media Stress Detection Based on Historical Observation and Polling based Analysis
109 Automated Phrase Mining from Massive Text Corpora
110 AN EFFICIENT METHOD FOR HIGH QUALITY ANDCOHESIVE TOPICAL PHRASE MINING
111 TRAFFIC AND ENERGY AWARE ROUTING FOR HETEROGENEOUS WIRELESS SENSOR NETWORKS
112 A Data Sharing Protocol to Minimize Security and Privacy Risks of Cloud Storage in Big Data Era
113 Selective Authentication Based Geographic Opportunistic Routing in WSN for IOT Against DoS Attacks
114 Novel Multi Keyword Search on Encrypted Data in the Cloud
115 Detection of fake online reviews using semi-supervised and supervised learning
116 Retrieving Hidden Friends A Collusion Privacy Attack Against Online Friend Search Engine
117 Predicting cyberbullying on social media in the big data era using machine learning algorithms review of literature and open challenges
118 authenticaing negative passowrds
119 Adaptive Resource Allocation and Provisioning in Multi-Service Cloud Environments
120 Optimal Control for Generalized Network-Flow
121 efficient and expressive keyword search over encrypted data in clouds
122 Facilititating Secure and efficient spatial query processing on the cloud
123 network aware feasible repairs for erasure coded storage
124 Maximizing Broadcast Throughput Under Ultra-Low-Power Constraints
125 Joint Optimization of Multicast Energy in Delay Constrained Mobile WSN's.
126 ONLINE VEHICLE INSURANCE MANAGEMENT
127 a probabilistic source location privacy protection scheme in wireless sensor networks
128 Congestion Avoidance for Smart Devices by Caching Information in MANETS and IOT
129 Detecting Pickpocket Suspects from Large-Scale Public Transit Records (no prints)
130 Trust based privacy preserving photo sharing in online social networks
131 ROAD TRAFFIC SPEED PREDICTION: A PROBABILISTIC MODEL FUSING MULTI-SOURCE DATA
132 Using Data Mining to Predict Hospital Admissions from the Emergency Department
133 MINING USERS TRUST FROM E-COMMERCE REVIEWS BASED ON SENTIMENT SIMILARITY ANALYSIS
134 KEYD: SECURE KEY-DEDUPLICATION WITH IDENTITY-BASED BROADCAST ENCRYPTION
135 Achieving Privacy friendly storage and secure stattiscs for smart meter data on outsourced clouds
136 Efficient and secured Framework with parallelization Scheme
137 Trust is Good, Control is Better Creating Secure Clouds by Continuous Auditing
138 Neural Attentive Item Similarity Model for Recommendation
139 privacy preserving attribute based multi owner settings
140 A DEVELOPER CENTERED BUG PREDICTION MODEL
141 Learning Customer Behaviors for Effective Load Forecasting
142 A Trust-Based Agent Learning Model for Service Composition in Mobile Cloud Computing Environments
143 CoDetect Financial Fraud Detection with Anomaly Feature Detection
144 Trust Relationship Prediction in Alibaba E-Commerce Platform (Prnt Completed)
145 PMOD Secure Privilege-Based Multilevel Organizational Data-Sharing in Cloud Computing (c)
146 CHARON A Secure Cloud of Clouds System for Storing and Sharing Big Data
147 AN EFFICIENT AND PRIVACY-PRESERVING BIOMETRIC IDENTIFICATION SCHEME IN CLOUD COMPUTING
148 A LIGHTWEIGHT SECURE AUDITING SCHEME FOR SHARED DATA IN CLOUD STORAGE
149 A Fog centric Secure Cloud Storage Scheme
150 Normalization of Duplicate Records from Multiple Sources
151 Hidden Cipher text Policy Attribute-Based Encryption with Fast Decryption for Personal Health Record System
152 SECURING ALL MEDIA DATA USING CRYPTOGRAPHY AND STEGANOGRAPHY TECHNIQUES
153 Frequent Itemsets Mining with Differential Privacy over Large-scale Data
154 MAGIC TRAIN: DESIGN OF MEASUREMENT METHODS AGAINST BANDWIDTH INFLATION ATTACKS
155 Hidden Ciphertext Policy Attribute-Based Encryption With Fast Decryption for Personal Health Record System
156 PRIVACY CHARACTERIZATION AND QUANTIFICATION IN DATA PUBLISHING
157 DIVISION AND REPLICATION OF DATA IN CLOUD FOR OPTIMAL PERFORMANCE AND SECURITY
158 PROST: PRIVACY-PRESERVING AND TRUTHFUL ONLINE DOUBLE AUCTION FOR SPECTRUM ALLOCATION
159 Ant Colony Stream Clustering A Fast Density Clustering Algorithm for Dynamic Data Streams
160 A Network Coding and DES Based Dynamic Encryption Scheme for Moving Target Defense
161 Encrypted Data Management with DeDuplication in Cloud Computing
162 Attribute Based Data Sharing Scheme Revisited in Cloud Computing
163 Energy and Memory Efficient Clone detection in WSN
164 Traffic and Energy Aware Routing for Heterogeneous WSN
165 Secure Overlay Routing using key pre-distribution: A Linear Distance Optimization Approach
166 Data Driven faulty Node Detection Scheme for WSN
167 Efficient Retrival over documents encrypted by Attributes in Cloud Computing
168 Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services
169 CryptoCloud: Secure and Expressive data Access Control for cloud storage
170 Maximizing Broadcast Throuput under Ultra Low-Power Constraints
171 Routing in Accumulative MultiHop Networks
172 A Fog-Centric Secure Cloud Storage Scheme
173 Hidden Cipher text Policy Attribute-Based Encryption with Fast Decryption for Personal Health Record System
174 DIVISION AND REPLICATION OF DATA IN CLOUD FOR OPTIMAL PERFORMANCE AND SECURITY
175 KEYD: SECURE KEY-DEDUPLICATION WITH IDENTITY-BASED BROADCAST ENCRYPTION
176 SECURING ALL MEDIA DATA USING CRYPTOGRAPHY AND STEGANOGRAPHY TECHNIQUES
177 PRIVACY CHARACTERIZATION AND QUANTIFICATION IN DATA PUBLISHING
178 DETECTING PICKPOCKET SUSPECTS FROM LARGE-SCALE PUBLIC TRANSIT RECORDS
179 Detection of fake online reviews using semi-supervised and supervised learning
180 AUTOMATIC ANNOTATION OF TEXT WITH PICTURES
181 MINING USERS TRUST FROM E-COMMERCE REVIEWS BASED ON SENTIMENT SIMILARITY ANALYSIS
182 Using Data Mining to Predict Hospital Admissions from the Emergency Department
183 Test Case Prioritization for Service-Oriented workflow applications A perspective of modification impact analysis
184 Parametered Attentive Model for Item Recommendations in E-Commerce
185 Comparison of Machine Learning Algorithms for Predicting Crime Hotspots
186 Data Driven Faulty Node Detection for WSN
187 Three Level Password Security
188 secure key agreement and key protection for mobile
189 MACHINE LEARNING ON SOCIAL MEDIA TO PREDICT CYBER BULLYING IN BIG DATA ERA
190 Adaptive Diffusion of Sensitive Information In Online Social Networks
191 Benchmarking image retrieval diversification techniques for social media
192 Privacy-Preserving Social Media Data Publishing for Personalized Ranking Based Recommendation
193 Cluster-Based Routing for the Mobile Sink in Wireless Sensor Networks With Obstacles
194 AdSherlock Efficient and Deployable Click Fraud Detection for Mobile Applications
195 Selective Authentication Based Geographic Opportunistic Routing in WSN for IOT Against DoS Attacks
196 privacy preserving similarity computation in cloud based mobile social networks
197 Fair Routing for Overlapped Cooperative Heterogeneous WSN
198 PARAMETERED ATTENTIVE MODEL FOR ITEM RECOMMENDATIONS IN E-COMMERCE
199 Improving security and privacy attribute based
200 Verifiable and Multi-keyword Searchable Attribute-based Encryption Scheme for Cloud Storage
201 Designing secure and efficient biometirc based secure access mechanism for cloud services
202 Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud
203 Key Sea Keyword-based Search with Receiver Anonymity in Attribute-based Searchable Encryption
204 Efficient Traceable Authorization Search System for Secure Cloud Storage
205 Cloud Centric Authentication for Wearable Healthcare Monitoring System
206 Key Policy Attribute-Based Encryption with Keyword Search in Virtualized Environments
207 Characterizing the Propagation of Situational Information in Social Media During COVID-19
208 LEVER Secure Deduplicated Cloud Storage with Encrypted Two-Party Interactions in Cyber-Physical Systems
209 sentiment polarity categorization technique for online product reviews
210 Emotion Detection in online soscial networks a multi label learning approach
211 SecDedup Secure Encrypted Data De duplication with Dynamic Ownership Updating
212 charon a secure cloud of clud system for storing and sharing big data
213 Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography
214 a novel multi keyword search on encrypted dat in the cloud
215 Crisis-Critical Intellectual Property Findings From the COVID-19 Pandemic
216 Detecting Group Shilling Attacks in Online Recommender Systems Based on Bisecting K-Means Clustering
217 A Lightweight secure auditing scheme for shared data in cloud storage
218 Cashless Society Managing Privacy and Security in the Technological Age
219 A Verifiable Semantic Searching Scheme by Optimal Matching over Encrypted Data in Public Cloud
220 A Data Sharing Protocol to Minimize Security and Privacy Risks of Cloud Storage in Big Data Era
221 Multi Party Hgh dimensional data publishing
222 Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
223 active online wearing for scoial media analysis support cirist managaement (PENDING)
224 authentication and key agreement based on anymous identity for peer to peer cloud
225 a novel feature matching ranked search mechanism over encyrpted cloud
226 TAQE Tweet Retrieval Based Infrastructure Damage Assessment During Disasters
227 ANALYSIS OF WOMEN SAFETY IN INDIAN CITIES USING MACHINE LEARNING ON TWEETS
228 A Three Layer Preserving Cloud Storagescheme Based on Computational intellligence in FOG Computing
229 Activity Minimization of Misinformation Influence in Online Social Networks
230 block chain based secure computation of floading in vechicular networks
231 a novel feataure mataching ranked search mechanism over encrypted cloud
232 Socirank Identifying And Ranking Prevalent News Topics Using Social Media Factors
233 Secure Cloud Storage with Data Dynamics Using Secure Network Coding Techniques
234 Towards Detecting Compromised Accounts on Social Networks socia friends
235 learning customer behaviour
236 A EFFICIENT FEEDBACK CONTROL MECHANISM FOR POSITIVE OR NEGATIVE INFORMATION SPREAD IN ONLINE SOCIAL NETWORKS
237 dual access control for cloud based data storage and sharing
238 AdSherlock Efficient and Deployable Click Fraud Detection for Mobile Applications
239 detection of fake online reviews
240 privacy presering data publishing
241 CYBER TREAT DETECTION
242 Retrieving Hidden Friends A Collusion Privacy Attack Against Online Friend Search Engine
243 Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols
244 Securing All Media Data Using Cryptography And Steganography Techniques
245 Selective Authentication Based Geographic Opportunistic Routing in Wireless Sensor Networks for Internet of Things Against DoS Attacks
246 SEPDP Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage
247 Enabling Verifiable and Dynamic Ranked Search Over Outsourced Data
248 Fast Secure and Anonymous Key Agreement Against Bad Randomness for Cloud Computing
249 Detecting and Characterizing Extremist Reviewer Groups in Online Product Reviews
250 Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
251 CROSS-PLATFORM OF MULTIPLE SOCIAL MEDIA NETWORKS
252 Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
253 A Parallel Patient Treatment Time Prediction Algorithm and Its Applications in Hospital Queuing-Recommendation in a Big Data Environment
254 A robust reputation management mechanism in the fedrated cloud
255 Achieving efficient and secure data acquistion for cloud supported iot in smart drive
256 An Integrated Semantic web service discovery and compsotioin framework
257 AN OPTIMIZED SPECULATIVE EXECUTION PROCESS FOR BIG DATA CLUSTER
258 Authenticaed Key exchange protocols for parallel network file systems
259 CHAOTIC SEARCHABLE ENCRYPTION FOR MOBILE CLOUD STORAGE
260 Circuit Ciphertext-Policy Attribute Based Hybrid Encryption with Verifiable Delegation in Cloud Computing
261 CLOUD LOG ASSURING SOUNDNESS AND SECRECY SCHEME FOR CLOUD FORENSICS
262 Connecting Social Media to E-Commerce Cold-Start Product Recommendation Using Microblogging Information
263 CONTRIBUTORY BROADCAST ENCRYPTION WITH EFFICIENT ENCRYPTION AND SHORT CIPHERTEXTS
264 discovering canical corelations between topical and toplogical information in document networks
265 Discovery of Ranking Fraud for Mobile Apps
266 Dynamic Multigranularity service composition
267 Dynamic VM Scaling Provisioning and Pricing through an Online Auction
268 E2HRC An Energy-Efficient Heterogeneous Ring Clustering Routing Protocol for Wireless Sensor Networks
269 Efficient and Expressive Keyword Search over Encrypted Data in Cloud
270 FIDOOP-DP DATA PARTITIONING IN FREQUENT ITEMSET MINING ON HADOOP CLUSTERS
271 influential node tracking on dynamic social network an interchange greedy approach
272 Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications
273 IPATH PATH INFERENCE IN WIRELESS SENSOR NETWORKS
274 MICROBLOG DIMENSIONALITY REDUCTION A DEEP LEARNING APPROACH
275 Mining Competitors from Large Unstructured Datasets
276 MMBcloud-tree Authenticated Index for Verifiable Cloud Service Selection
277 Nearest Keyword Set Search In Multi-Dimensional Dataset
278 Netspam A Network-Based Spam Detection Framework For Reviews In Online Social Media
279 Network Capability in Localizing Node Failures via End-to-End Path Measurements
280 online coin management
281 PassBYOP Bring Your Own Picture for Securing Graphical Passwords (1)
282 Preventing Distributed Deniel of service flooding attacks with dynamic path identifiers
283 Privacy Protection based Access Control Scheme in Cloud-based Services
284 provest provenance-based trust model for delay tolerant networks
285 Providing User Security Guarantees in Public Infrastructure Clouds
286 Search Rank Fraud and Malware Detection in Google Play
287 SUPERMAN Security Using Pre-Existing Routing for Mobile Adhoc Networks
288 Towards Efficient Data Analysis Service For Large Scale Social Networks
289 Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks
290 FastGeo-Efficient Geometric Range Queries and Encrypted Spaital Data
291 Privacy Protection based access control scheme in cloud based services
292 Towards detecting compromised accounts on social networks
293 SECURE CLOUD BASED SEARCH FOR NUMERICAL AND DATE RANGE QUERIES
294 CLOUD CENTRIC AUTHENTICATION FOR WEARABLE HEALTHCARE MONITORING SYSTEM
295 AN OPTIMIZED SPECULATIVE EXECUTION PROCESS FOR BIG DATA CLUSTER
296 COMBINING DATA OWNER-SIDE AND CLOUD-SIDE ACCESS CONTROL FOR ENCRYPTED CLOUD STORAGE
297 Characterizing and Predicting Early Reviewers for Effective Product Marketing on E-Commerce Websites
298 Privacy Characterization and Quantification in Data Publishing
299 Hate Speech on Twitter A Pragmatic Approach to Collect Hateful and Offensive Expressions
300 Finding Optimal Skyline Product Combinations under Price Promotion
301 AN APPROACH TO BALANCE MAINTENANCE COSTS AND ELECTRICITY CONSUMPTION IN CLOUD DATA CENTERS
302 Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols
303 Protecting Location Privacy for Task Allocation in Ad Hoc Mobile Cloud Computing
304 privacy characterication and quanitzatiion in data publishing
305 provence based trust model in dealy tolerant networks
306 credit card fraud detection using adboost and majority voting
307 Online Social Media Stress Detection Based on Historical Observation and Polling based Analysis
308 Automated Phrase Mining from Massive Text Corpora
309 AN EFFICIENT METHOD FOR HIGH QUALITY ANDCOHESIVE TOPICAL PHRASE MINING
310 TRAFFIC AND ENERGY AWARE ROUTING FOR HETEROGENEOUS WIRELESS SENSOR NETWORKS
311 A Data Sharing Protocol to Minimize Security and Privacy Risks of Cloud Storage in Big Data Era
312 Selective Authentication Based Geographic Opportunistic Routing in WSN for IOT Against DoS Attacks
313 Novel Multi Keyword Search on Encrypted Data in the Cloud
314 Detection of fake online reviews using semi-supervised and supervised learning
315 Retrieving Hidden Friends A Collusion Privacy Attack Against Online Friend Search Engine
316 Predicting cyberbullying on social media in the big data era using machine learning algorithms review of literature and open challenges
317 authenticaing negative passowrds
318 Adaptive Resource Allocation and Provisioning in Multi-Service Cloud Environments
319 Optimal Control for Generalized Network-Flow
320 efficient and expressive keyword search over encrypted data in clouds
321 Facilititating Secure and efficient spatial query processing on the cloud
322 network aware feasible repairs for erasure coded storage
323 Maximizing Broadcast Throughput Under Ultra-Low-Power Constraints
324 Joint Optimization of Multicast Energy in Delay Constrained Mobile WSN's.
325 ONLINE VEHICLE INSURANCE MANAGEMENT
326 a probabilistic source location privacy protection scheme in wireless sensor networks
327 Congestion Avoidance for Smart Devices by Caching Information in MANETS and IOT
328 Detecting Pickpocket Suspects from Large-Scale Public Transit Records (no prints)
329 Trust based privacy preserving photo sharing in online social networks
330 ROAD TRAFFIC SPEED PREDICTION: A PROBABILISTIC MODEL FUSING MULTI-SOURCE DATA
331 Using Data Mining to Predict Hospital Admissions from the Emergency Department
332 MINING USERS TRUST FROM E-COMMERCE REVIEWS BASED ON SENTIMENT SIMILARITY ANALYSIS
333 KEYD: SECURE KEY-DEDUPLICATION WITH IDENTITY-BASED BROADCAST ENCRYPTION
334 Achieving Privacy friendly storage and secure stattiscs for smart meter data on outsourced clouds
335 Efficient and secured Framework with parallelization Scheme
336 Trust is Good, Control is Better Creating Secure Clouds by Continuous Auditing
337 Neural Attentive Item Similarity Model for Recommendation
338 privacy preserving attribute based multi owner settings
339 A DEVELOPER CENTERED BUG PREDICTION MODEL
340 Learning Customer Behaviors for Effective Load Forecasting
341 A Trust-Based Agent Learning Model for Service Composition in Mobile Cloud Computing Environments
342 CoDetect Financial Fraud Detection with Anomaly Feature Detection
343 Trust Relationship Prediction in Alibaba E-Commerce Platform (Prnt Completed)
344 PMOD Secure Privilege-Based Multilevel Organizational Data-Sharing in Cloud Computing (c)
345 CHARON A Secure Cloud of Clouds System for Storing and Sharing Big Data
346 AN EFFICIENT AND PRIVACY-PRESERVING BIOMETRIC IDENTIFICATION SCHEME IN CLOUD COMPUTING
347 A LIGHTWEIGHT SECURE AUDITING SCHEME FOR SHARED DATA IN CLOUD STORAGE
348 A Fog centric Secure Cloud Storage Scheme
349 Normalization of Duplicate Records from Multiple Sources
350 Hidden Cipher text Policy Attribute-Based Encryption with Fast Decryption for Personal Health Record System
351 SECURING ALL MEDIA DATA USING CRYPTOGRAPHY AND STEGANOGRAPHY TECHNIQUES
352 Frequent Itemsets Mining with Differential Privacy over Large-scale Data
353 MAGIC TRAIN: DESIGN OF MEASUREMENT METHODS AGAINST BANDWIDTH INFLATION ATTACKS
354 Hidden Ciphertext Policy Attribute-Based Encryption With Fast Decryption for Personal Health Record System
355 PRIVACY CHARACTERIZATION AND QUANTIFICATION IN DATA PUBLISHING
356 DIVISION AND REPLICATION OF DATA IN CLOUD FOR OPTIMAL PERFORMANCE AND SECURITY
357 PROST: PRIVACY-PRESERVING AND TRUTHFUL ONLINE DOUBLE AUCTION FOR SPECTRUM ALLOCATION
358 Ant Colony Stream Clustering A Fast Density Clustering Algorithm for Dynamic Data Streams
359 A Network Coding and DES Based Dynamic Encryption Scheme for Moving Target Defense
360 Encrypted Data Management with DeDuplication in Cloud Computing
361 Attribute Based Data Sharing Scheme Revisited in Cloud Computing
362 Energy and Memory Efficient Clone detection in WSN
363 Traffic and Energy Aware Routing for Heterogeneous WSN
364 Secure Overlay Routing using key pre-distribution: A Linear Distance Optimization Approach
365 Data Driven faulty Node Detection Scheme for WSN
366 Efficient Retrival over documents encrypted by Attributes in Cloud Computing
367 Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services
368 CryptoCloud: Secure and Expressive data Access Control for cloud storage
369 Maximizing Broadcast Throuput under Ultra Low-Power Constraints
370 Routing in Accumulative MultiHop Networks
371 A Fog-Centric Secure Cloud Storage Scheme
372 Hidden Cipher text Policy Attribute-Based Encryption with Fast Decryption for Personal Health Record System
373 DIVISION AND REPLICATION OF DATA IN CLOUD FOR OPTIMAL PERFORMANCE AND SECURITY
374 KEYD: SECURE KEY-DEDUPLICATION WITH IDENTITY-BASED BROADCAST ENCRYPTION
375 SECURING ALL MEDIA DATA USING CRYPTOGRAPHY AND STEGANOGRAPHY TECHNIQUES
376 PRIVACY CHARACTERIZATION AND QUANTIFICATION IN DATA PUBLISHING
377 DETECTING PICKPOCKET SUSPECTS FROM LARGE-SCALE PUBLIC TRANSIT RECORDS
378 Detection of fake online reviews using semi-supervised and supervised learning
379 AUTOMATIC ANNOTATION OF TEXT WITH PICTURES
380 MINING USERS TRUST FROM E-COMMERCE REVIEWS BASED ON SENTIMENT SIMILARITY ANALYSIS
381 Using Data Mining to Predict Hospital Admissions from the Emergency Department
382 Test Case Prioritization for Service-Oriented workflow applications A perspective of modification impact analysis
383 Parametered Attentive Model for Item Recommendations in E-Commerce
384 Comparison of Machine Learning Algorithms for Predicting Crime Hotspots
385 Data Driven Faulty Node Detection for WSN
386 Three Level Password Security
387 secure key agreement and key protection for mobile
388 MACHINE LEARNING ON SOCIAL MEDIA TO PREDICT CYBER BULLYING IN BIG DATA ERA
389 Adaptive Diffusion of Sensitive Information In Online Social Networks
390 Benchmarking image retrieval diversification techniques for social media
391 Privacy-Preserving Social Media Data Publishing for Personalized Ranking Based Recommendation
392 Cluster-Based Routing for the Mobile Sink in Wireless Sensor Networks With Obstacles
393 AdSherlock Efficient and Deployable Click Fraud Detection for Mobile Applications
394 Selective Authentication Based Geographic Opportunistic Routing in WSN for IOT Against DoS Attacks
395 privacy preserving similarity computation in cloud based mobile social networks
396 Fair Routing for Overlapped Cooperative Heterogeneous WSN
397 PARAMETERED ATTENTIVE MODEL FOR ITEM RECOMMENDATIONS IN E-COMMERCE
398 Improving security and privacy attribute based
399 Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases
400 GROUP QUERY ANALYSIS AND PUBLISHING SEARCH LOGS WITH PRIVACY
401 QoS Ranking Prediction for Cloud Services
402 redundancy management of multipath routing for intrusion tolerance in heterogeneous wireless sensor networks
403 KSSecure Logging As a Service—Delegating Log Management to the Cloud
404 Secure Mining Of Association Rules In Horizontally Distributed Databases
405 Sensitive Label Privacy Protection on Social Network Data
406 A New Approach For Privacy Persevering Data Publishing
407 storing shareddata on the cloud via security mediator
408 User Action Interpretation for Online Content Optimization
409 Vampire attacks Draining life from wireless ad-hoc sensor networks
410 An extended visual cryptography scheme without pixel expansion for halftone images
411 An extended visual cryptography scheme without pixel expansion for halftone images
412 HOP-BY-HOP MESSAGE AUTHENTICATION AND SOURCE PRIVACY IN WIRELESS SENSOR NETWORKS
413 Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attacker’s Impact
414 Facilitating document Annonation using Content and Querying Values
415 Detecting Malicious Facebook Applications
416 Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks
417 EnDAS Efficient Encrypted Data Search as a Mobile Cloud Service
418 On Summarization and Timeline Generation
419 PFA Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites?
420 extracting spread spectrum hidden data from digital media
421 Intelligent Security Platform for Multiple Access Controls
422 Mobility Management Approaches for Mobile IP Networks
423 Service Rating Prediction by Exploring Social
424 Dynamic Job Ordering and Slot Configurations
425 Efficient Algorithms for Mining Top-K query
426 MAPREDUCE APPLICATIONS IN HETROGENIOUS COMPUTING ENVIRONMENT
427 E2R2 Energy-Efficient and Reliable Routing for Mobile Wireless Sensor Networks
428 Service Rating Prediction by Exploring Social
429 Provenance Based Trust model for delay tolerant networks
430 DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
431 RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
432 CONDITIONAL IDENTITY-BASED BROADCAST PROXY RE-ENCRYPTION AND ITS APPLICATION TO CLOUD EMAIL
433 TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
434 Social friend recommendation on multiple network correlation
435 Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
436 Enabling Personalized Search over Encrypted
437 A Scalable Approach for Content-Based Image Retrieval
438 Energy and Memory Efficient Clone Detection in Wireless Sensor Networks
439 A Shoulder Surfing Resistant Graphical Authentication System
440 ActiveTrust Secure and Trustable Routing in
441 Traffic Decorrelation Techniques for Countering
442 CDA Generation and Integration for Health
443 Incremental Semi-Supervised Clustering Ensemble for High Dimensional Data Clustering (1)
444 cloud based multimedia content protection system
445 Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks
446 Efficient and Privacy Aware Data Aggregation in Mobile Sensing
447 Efficient Authentication for Mobile and Pervasive Computing
448 Hop-By-Hop Message Authentication And Source Privacy In Wireless Sensor Networks
449 Preserving Integrity of Data and Public Auditing
450 Privacy-Preserving and Content-Protecting Location Based Queries
451 Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks
452 Securing Broker Less Publish Subscribe Systems Using Identity Based Encryption
453 SinkTrail A Proactive Data ReportingProtocol
454 Supporting Privacy Protection in Personalized Web Search
455 Mining User Queries with Markov Chains Application to Online Image Retrieval_new
456 Mobility Management Approaches for Mobile IP Networks
457 PACK Prediction-Based Cloud Bandwidth and Cost Reduction System