0% found this document useful (0 votes)
17 views11 pages

Infosys Written Test Slots Details Student

Uploaded by

mullasameera2011
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views11 pages

Infosys Written Test Slots Details Student

Uploaded by

mullasameera2011
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

IEEE JAVA Projects List - 2024

1. Efficient CP-ABE Scheme with Shared Decryption in Cloud Storage


2. Sec-Health: A Blockchain-Based Protocol for Securing Health Records
3. Secure and Efficient Data Duplication in Joint Cloud Storage
4. Friendship Inference in Mobila Social Networks: Exploiting Multi-Source Information
with Two-Stage Deep Learning Framework
5. A sensing communication and computing approach for vulnerable road users safety
6. Target-Oriented Investigation of Online Abusive Attacks: A Dataset and Analysis
7. Behavioral Model for Live Detection of Apps Based Attack
8. Enabling Balanced Data Deduplication in Mobile Edge Computing
9. A Fair Secure and Trusted Decentralized IIoT Data Marketplace Enabled by
Blockchain
10. Intelligent Distribution of Fresh Agricultural Products in Smart City
11. Social Spammer Detection via Convex Nonnegative Matrix Factorization
12. Identity-Based Privacy Preserving Remote Data Integrity Checking With a Designated
Verifier
13. DSAS: A Secure Data Sharing and Authorized Searchable Framework for e-
Healthcare System
14. Detecting fraudulent student communication in a multiple choice online test
environment
15. Bank Record Storage Using Blockchain
16. Travel direction recommendation model based on photos of user social network profile
17. Privacy preserving electricity theft detection based on block chain
18. Secure and privacy preserving egovt frame work using blockchain and artificial
intelligence
19. Complaint and senverity identification from online financial content
20. A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things
Based on Blockchain
21. Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data
Publishers
22. Optimal Drug Dosage Control Strategy of Immune Systems Using Reinforcement
Learning
23. A Collaborative Method for Route Discovery Using Taxi Drivers Experience and
Preferences
24. A Credibility Analysis System for Assessing Information on Twitter
25. A Data Sharing Protocol to Minimize Security and Privacy Risks of Cloud Storage in
Big Data Era
26. A Fast Parallel Community Discovery Model on Complex
27. A General Framework for Implicit and Explicit Social Recommendation
28. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
29. A New Lightweight Symmetric Searchable Encryption Scheme for String
Identification
30. A Resilient Dispersal Scheme for Multi-cloud Storage
31. A Robust Reputation Management Mechanism in the Federated Cloud
32. A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational
Intelligence in Fog Computing
33. Achieving Data Truthfulness and Privacy Preservation in DataMarkets
34. Achieving Flexible and Self-contained Data Protection in Cloud Computing
35. An Efficient and Fine-Grained Big Data Access Control Scheme with Privacy-
Preserving Policy
36. Analyzing Sentiments In One Go A Supervised Joint Topic Modeling Approach
37. Anonymous and Traceable Group Data Sharing in Cloud Computing
38. Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
39. Authenticated Outlier Mining for Outsourced Databases
40. Automatic Extraction of Access Control Policies from Natural Language Documents
41. Avoiding Data Corruption in Drop Computing Mobile Networks
42. Ciphertext-Policy Attribute-Based Encryption With Delgated
43. Computing Semantic Similarity of Concepts in Knowledge Graphs
44. Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit
Maximization in Cloud Computing
45. Design of Secure Authenticated Key Management Protocol for Cloud Computing
Environments
46. Detecting Stress Based On Social Interactions In Social Networks
47. Dynamic Multi Keyword Ranked Search Based on Bloom Filter Over Encrypted
Cloud Data
48. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud Doc
49. Enhancing Cloud-Based IoT Security through Trustworthy Cloud Service An
Integration of Security and Reputation Approach
50. EPICS A Framework for Enforcing Security Policies in Composite Web Services
51. Exploiting the Dynamic Mutual Influence for Predicting Social Event Participation
52. FaaSeC Enabling Forensics-as-a-Service for Cloud Computing Systems
53. FastGeo Efficient Geometric Range Queries on Encrypted Spatial Data
54. FooDNet Toward an Optimized Food Delivery Network based on Spatial
Crowdsourcing
55. Generating Query Facets using Knowledge Bases
56. Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds
57. Image Re-ranking based on Topic Diversity
58. NAIS Neural Attentive Item Similarity Model for Recommendation
59. Online Product Quantization
60. Optimizing Information Leakage in Multicloud Storage Services
61. ParkCrowd Reliable Crowdsensing for Aggregation and Dissemination of Parking
Space Information
62. Personal Web Revisitation by Context and Content Keywords with Relevance
Feedback
63. Point-of-interest Recommendation for Location Promotion in Location-based Social
Networks
64. Predicting Cyberbullying on Social Media in the Big Data Era Using Machine
Learning Algorithms
65. Privacy Characterization and Quantification in Data Publishing
66. Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing
67. Privacy Protection based Access Control Scheme in Cloud-based Services
68. Privacy-Preserving Learning Analytics Challenges and Techniques
69. Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
70. ProGuard Detecting Malicious Accounts in Social-Network-Based Online Promotions
71. Robust and Auditable Access Control with Multiple Attribute Authorities for Public
Cloud Storage
72. Search Rank Fraud and Malware Detection in Google Play
73. Secure Cloud Storage based on RLWE Problem
74. Securing Aggregate Queries for DNA Databases
75. Securing Cloud Data under Key Exposure
76. Semantically Enhanced Medical Information Retrieval System
77. SeSPHR A Methodology for Secure Sharing of Personal Health Records in the Cloud
78. Social Network Rumor Diffusion Predication Based on Equal Responsibility Game
Model
79. SocialQ&A An Online Social Network Based Question and Answer System
80. Strong Key-Exposure Resilient Auditing for Secure Cloud Storage
81. TAFC Time and Attribute Factors Combined Access Control for Time-Sensitive Data
in Public Cloud
82. Utilization-Aware Trip Advisor in Bike-sharing Systems Based on User Behavior
Analysis
83. Design of Secure Authenticated Key Management Protocol for Cloud Computing
Environments
84. A Data Sharing Protocol to Minimize Security and Privacy Risks of Cloud Storage
85. A Fuzzy Approach to Text Classification with Two Stage Training for Ambiguous
Instances
86. A Hierarchical Attention Model for Social Contextual Image Recommendation
87. A Hybrid Elearning Recommendation Approach Based on Learners Influence
Propagation
88. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
89. A Novel Load Image Profile Based Electricity Load Clustering Methodology
90. A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in
Cloud Computing
91. A Probabilistic Source Location Privacy Protection Scheme in Wireless Sensor Networks
92. A Secure G-Cloud-Based Framework for Government Healthcare Services
93. A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage Services
94. A Trust-Based Agent Learning Model for Service Composition in Mobile Cloud
Computing Environments
95. Active Online Learning for Social Media Analysis to Support Crisis Management
96. An attack resistant trust inference model for securing routing in vehicular Ad Hoc
Networks
97. An Attribute-based Controlled Collaborative Access Control Scheme for Public Cloud
Storage
98. An Efficient Method for High Quality andCohesive Topical Phrase Mining
99. Analysis and Accurate Prediction of Users Response Behavior in Incentive-Based
Demand Response
100. Android User Privacy Preserving through Crowdsourcing
101. Applying Simulated Annealing and Parallel Computing to the Mobile Sequential
Recommendation
102. Authenticated Medical Documents Releasing with Privacy Protection and Release
Control
103. Characterizing and Predicting Early Reviewers for Effective Product Marketing
on ECommerce Websites
104. CLASS Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics
105. Clustering Based Collaborative Filtering Using an Incentivized Penalized User
Model
106. Collusion Defender Preserving Subscribers Privacy in Publish and Subscribe
Systems
107. Composition Context-Based Web Services Similarity Measure
108. Conversational Networks for Automatic Online Moderation
109. Crypt DAC Cryptographically Enforced Dynamic Access Control in the Cloud
110. DCCR Deep Collaborative Conjunctive Recommender for Rating Prediction
111. Detecting Pickpocket Suspects from Large-Scale Public Transit Records
112. Dynamic Multi Keyword Ranked Search Based on Bloom Filter Over Encrypted
Cloud Data
113. Efficient conditional anonymity with message integrity and authentication in a
vehicular adhoc network
114. Enabling Authorized Encrypted Search for Multi Authority Medical Databases
115. Fast Communication-efficient Spectral Clustering Over Distributed Data
116. Filtering Instagram hash tags through crowd tagging and the HITS algorithm
117. Fundamental Visual Concept Learning from Correlated Images and Text
118. Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
119. Hidden Ciphertext Policy Attribute-Based Encryption with Fast Decryption for
Personal Health Record System
120. Towards Secure Industrial IoT: Blockchain System with Credit-Based Consensus
Mechanism
121. Joint Hypergraph Learning for Tag-based Image Retrieval
122. LBOA Location Based Secure Outsourced Aggregation in IoT
123. Learning Customer Behaviors for Effective Load Forecasting
124. Memory Leakage-Resilient Dynamic and Verifiable Multi-keyword Ranked
Search on Encrypted Smart Body Sensor Network Data
125. Mining Users Trust From E-Commerce Reviews Based on Sentiment Similarity
Analysis
126. MultiParty High Dimensional Data Publishing under Differential Privacy
127. NASM Nonlinearly Attentive Similarity Model for Recommendation System via
Locally Attentive Embedding
128. Network Representation Learning Enhanced Recommendation Algorithm
129. Normalization of Duplicate Records from Multiple Sources
130. Novel Multi-Keyword Search on Encrypted Data in the Cloud
131. On Scalable and Robust Truth Discovery in Big Data Social Media Sensing
Applications
132. Online Public Shaming on Twitter Detection Analysis and Mitigation
133. PersoNet Friend Recommendation System Based on Big-Five Personality Traits
and Hybrid Filtering
134. PMOD Secure Privilege-Based Multilevel Organizational Data Sharing in Cloud
Computing
135. Predicting Cyberbullying on Social Media in the Big Data Era Using Machine
Learning Algorithms
136. Privacy aware Personal Data Storage PPDS Learning how to Protect User Privacy
137. RescueMe Smartphone Based Self Rescue System for Disaster Rescue
138. Revocable Identity Based Broadcast Proxy Reencryption for Data Sharing in
Clouds
139. Robust defense scheme against selective drop attack in wireless Ad Hoc
Networks
140. Scheduling Real Time Security Aware tasks in Fog Networks
141. Searchable Symmetric Encryption with Forward Search Privacy
142. Secure and Efficient Skyline Queries on Encrypted Data
143. Secure data group sharing and conditional dissemination
144. Secure Key Agreement and Key Protection for Mobile Device User
Authentication
145. Selective Authentication Based Geographic Opportunistic Routing in wsn
146. Sensitive Label Privacy Preservation with Anatomization for Data Publishing
147. Social Network Rumor Diffusion Predication Based on Equal Responsibility
Game Model
148. Spammer Detection and Fake User Identification on Social Networks
149. Transactional Behavior Verification in Business Process as a Service
Configuration
150. Trust Relationship Prediction in Alibaba ECommerce Platform
151. Trust-based Privacy-Preserving Photo Sharing in Online Social Networks
152. Using Data Mining to Predict Hospital Admissions From the Emergency
Department
153. Detecting Suspicious File Migration or Replication in the Cloud
154. Toward Detection and Attribution of Cyber-Attacks in IoT enabled Cyber
physical Systems
155. Active Online Learning for Social Media Analysis to Support Crisis Management
156. Weakly-Supervised Deep Learning for Customer Review Sentiment
Classification
157. An Efficient and Secured Framework for Mobile Cloud Computing
158. Detection of fake online reviews using semi-supervised and supervised learning
159. Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare
Social Networks in Cloud Computing
160. Combining data owner side and cloud side access control for Encrypted cloud
storage
161. Development and Examination of Fog Computing-Based Encrypted Control
System
162. Inference Attack-Resistant E-Healthcare Cloud System with Fine-Grained Access
163. A Power-of-Two Choices Based Algorithm for Fog Computing
164. Detecting Malicious Social Bots Based on Click stream Sequences
165. Protecting Your Shopping Preference with Differential Privacy
166. Retrieving Hidden Friends A Collusion Privacy Attack Against Online Friend
Search Engine
167. Dual Access Control for Cloud-Based Data Storage and Sharing
168. Block chain technology for protecting the banking transaction without using
tokens
169. Detecting Group Shilling Attacks in Online Recommender Systems Based on
Bisecting K-Means Clustering
170. Block chain management based on organ donation and transplantation
171. Credit Card Fraud Detection Using AdaBoost and Majority Voting
172. Optimal filter assignment policy against distributed denial of service attack
173. Block Hunter Federated Learning for Cyber Threat Hunting in Blockchain-based
IIoT Networks
174. Secure cloud storage with data dynamics using secure network coding techniques
175. HinCTI: A Cyber Threat Intelligence Modeling and Identification System Based
on Heterogeneous Information Network
176. CloudRaid Detecting Distributed Concurrency Bugs via Log Mining and
Enhancement
177. An Efficient Ciphertext Index Retrieval Scheme based on Edge Computing
Framework
178. A Secure E Coupon Service Based on Blockchain Systems
179. Secure Mobile Edge Computing Networks in the Presence of Multiple
Eavesdroppers
180. EntrapNet a Blockchain Based Verification Protocol for Trustless Computing
181. Quantum Safe Round Optimal Password Authentication for Mobile Devices
182. A Secure E-Coupon Service Based on Blockchain Systems
183. A Secure and Efficient Cloud-Centric Internet-of-Medical-Things-Enabled Smart
Healthcare System With Public Verifiability
184. Data Trust Framework Using Blockchain Technology and Adaptive Transaction
Validation
185. Assessment of the Suitability of Fog Computing in the Context of Internet of
Things
186. Semi-Supervised Spam Detection in Twitter Stream Spammers in Twitter
187. Online Public Shaming on Twitter: Detection, Analysis and Mitigation
188. CoDetect: Financial Fraud Detection with Anomaly Feature Detection
189. Health Monitoring on Social Media over Time
190. Web Media and Stock Markets : A Survey and Future Directions from a Big Data
Perspective
191. Verifiable and Multi-Keyword Searchable Attribute-Based Encryption Scheme
for Cloud Storage
192. Energy Efficient Clustering Algorithm for Multi-Hop Wireless Sensor Network
Using Type-2 Fuzzy Logic
193. Trust-based Privacy-Preserving Photo Sharing in Online Social Networks
194. Risk Assessment in Social Networks based on User Anomalous Behaviours
195. A Workflow Management System for Scalable Data Mining on Clouds
196. Privacy Protection Based Access Control Scheme in Cloud-Based Services
197. A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
198. Search Rank Fraud and Malware Detection in Google Play
199. Social Network Rumor Diffusion Predication Based on Equal Responsibility
Game Model
200. Unified Fine-grained Access Control for Personal Health Records in Cloud
Computing
201. Fast Cosine Similarity Search in Binary Space with Angular Multi-index Hashing
202. Detection of suicide-related posts in Twitter data streams
203. Protecting Location Privacy for Task Allocation in Ad Hoc Mobile Cloud
Computing
204. Towards Shared Ownership in the Cloud
205. A Workflow Management System for Scalable Data Mining on Clouds
206. Online Product Quantization
207. Traffic and Energy Aware Routing for Heterogeneous Wireless Sensor Networks
208. SeDaSC: Secure Data Sharing in Clouds
209. Automated Decision Making in Airport Checkpoints: Bias Detection Toward
Smarter Security and Fairness
210. Filtering Instagram hashtags through crowd tagging and the HITS algorithm
211. SPFM: Scalable and Privacy -Preserving Friend Matching in Mobile Cloud
212. A Comprehensive Study on Social Network Mental Disorders Detection via
Online Social Media Mining
213. Spammer Detection and Fake User Identification on Social Networks
214. Chaotic Searchable Encryption for Mobile Cloud Storage
215. Credit card fraud detection using AdaBoost and majority voting
216. Securing Data in Internet of Things Using Cryptography
217. Scalable Content-Aware Collaborative Filtering for Location Recommendation
218. Efficient Retrieval over Documents Encrypted by Attributes in Cloud Computing
219. Secure Key Agreement and Key Protection for Mobile Device User
Authentication
220. An Efficient and Secured Framework for Mobile Cloud Computing
221. Road Traffic Speed Prediction: A Probabilistic Model Fusing Multi-Source Data
222. Using Data Mining to Predict Hospital Admissions From the Emergency
Department
223. A Developer Centered Bug Prediction Model
224. PASPORT: A Secure and Private Location Proof Generation and Verification
Framework
225. An Approach to Balance Maintenance Costs and Electricity Consumption in
Cloud Data Centers
226. Authentication by Encrypted Negative Password
227. CryptCloud+: Secure and Expressive Data Access Control for Cloud Storage

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy