We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11
IEEE JAVA Projects List - 2024
1. Efficient CP-ABE Scheme with Shared Decryption in Cloud Storage
2. Sec-Health: A Blockchain-Based Protocol for Securing Health Records 3. Secure and Efficient Data Duplication in Joint Cloud Storage 4. Friendship Inference in Mobila Social Networks: Exploiting Multi-Source Information with Two-Stage Deep Learning Framework 5. A sensing communication and computing approach for vulnerable road users safety 6. Target-Oriented Investigation of Online Abusive Attacks: A Dataset and Analysis 7. Behavioral Model for Live Detection of Apps Based Attack 8. Enabling Balanced Data Deduplication in Mobile Edge Computing 9. A Fair Secure and Trusted Decentralized IIoT Data Marketplace Enabled by Blockchain 10. Intelligent Distribution of Fresh Agricultural Products in Smart City 11. Social Spammer Detection via Convex Nonnegative Matrix Factorization 12. Identity-Based Privacy Preserving Remote Data Integrity Checking With a Designated Verifier 13. DSAS: A Secure Data Sharing and Authorized Searchable Framework for e- Healthcare System 14. Detecting fraudulent student communication in a multiple choice online test environment 15. Bank Record Storage Using Blockchain 16. Travel direction recommendation model based on photos of user social network profile 17. Privacy preserving electricity theft detection based on block chain 18. Secure and privacy preserving egovt frame work using blockchain and artificial intelligence 19. Complaint and senverity identification from online financial content 20. A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain 21. Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers 22. Optimal Drug Dosage Control Strategy of Immune Systems Using Reinforcement Learning 23. A Collaborative Method for Route Discovery Using Taxi Drivers Experience and Preferences 24. A Credibility Analysis System for Assessing Information on Twitter 25. A Data Sharing Protocol to Minimize Security and Privacy Risks of Cloud Storage in Big Data Era 26. A Fast Parallel Community Discovery Model on Complex 27. A General Framework for Implicit and Explicit Social Recommendation 28. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 29. A New Lightweight Symmetric Searchable Encryption Scheme for String Identification 30. A Resilient Dispersal Scheme for Multi-cloud Storage 31. A Robust Reputation Management Mechanism in the Federated Cloud 32. A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing 33. Achieving Data Truthfulness and Privacy Preservation in DataMarkets 34. Achieving Flexible and Self-contained Data Protection in Cloud Computing 35. An Efficient and Fine-Grained Big Data Access Control Scheme with Privacy- Preserving Policy 36. Analyzing Sentiments In One Go A Supervised Joint Topic Modeling Approach 37. Anonymous and Traceable Group Data Sharing in Cloud Computing 38. Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud 39. Authenticated Outlier Mining for Outsourced Databases 40. Automatic Extraction of Access Control Policies from Natural Language Documents 41. Avoiding Data Corruption in Drop Computing Mobile Networks 42. Ciphertext-Policy Attribute-Based Encryption With Delgated 43. Computing Semantic Similarity of Concepts in Knowledge Graphs 44. Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing 45. Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments 46. Detecting Stress Based On Social Interactions In Social Networks 47. Dynamic Multi Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data 48. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud Doc 49. Enhancing Cloud-Based IoT Security through Trustworthy Cloud Service An Integration of Security and Reputation Approach 50. EPICS A Framework for Enforcing Security Policies in Composite Web Services 51. Exploiting the Dynamic Mutual Influence for Predicting Social Event Participation 52. FaaSeC Enabling Forensics-as-a-Service for Cloud Computing Systems 53. FastGeo Efficient Geometric Range Queries on Encrypted Spatial Data 54. FooDNet Toward an Optimized Food Delivery Network based on Spatial Crowdsourcing 55. Generating Query Facets using Knowledge Bases 56. Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds 57. Image Re-ranking based on Topic Diversity 58. NAIS Neural Attentive Item Similarity Model for Recommendation 59. Online Product Quantization 60. Optimizing Information Leakage in Multicloud Storage Services 61. ParkCrowd Reliable Crowdsensing for Aggregation and Dissemination of Parking Space Information 62. Personal Web Revisitation by Context and Content Keywords with Relevance Feedback 63. Point-of-interest Recommendation for Location Promotion in Location-based Social Networks 64. Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Learning Algorithms 65. Privacy Characterization and Quantification in Data Publishing 66. Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing 67. Privacy Protection based Access Control Scheme in Cloud-based Services 68. Privacy-Preserving Learning Analytics Challenges and Techniques 69. Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data 70. ProGuard Detecting Malicious Accounts in Social-Network-Based Online Promotions 71. Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage 72. Search Rank Fraud and Malware Detection in Google Play 73. Secure Cloud Storage based on RLWE Problem 74. Securing Aggregate Queries for DNA Databases 75. Securing Cloud Data under Key Exposure 76. Semantically Enhanced Medical Information Retrieval System 77. SeSPHR A Methodology for Secure Sharing of Personal Health Records in the Cloud 78. Social Network Rumor Diffusion Predication Based on Equal Responsibility Game Model 79. SocialQ&A An Online Social Network Based Question and Answer System 80. Strong Key-Exposure Resilient Auditing for Secure Cloud Storage 81. TAFC Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud 82. Utilization-Aware Trip Advisor in Bike-sharing Systems Based on User Behavior Analysis 83. Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments 84. A Data Sharing Protocol to Minimize Security and Privacy Risks of Cloud Storage 85. A Fuzzy Approach to Text Classification with Two Stage Training for Ambiguous Instances 86. A Hierarchical Attention Model for Social Contextual Image Recommendation 87. A Hybrid Elearning Recommendation Approach Based on Learners Influence Propagation 88. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 89. A Novel Load Image Profile Based Electricity Load Clustering Methodology 90. A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing 91. A Probabilistic Source Location Privacy Protection Scheme in Wireless Sensor Networks 92. A Secure G-Cloud-Based Framework for Government Healthcare Services 93. A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage Services 94. A Trust-Based Agent Learning Model for Service Composition in Mobile Cloud Computing Environments 95. Active Online Learning for Social Media Analysis to Support Crisis Management 96. An attack resistant trust inference model for securing routing in vehicular Ad Hoc Networks 97. An Attribute-based Controlled Collaborative Access Control Scheme for Public Cloud Storage 98. An Efficient Method for High Quality andCohesive Topical Phrase Mining 99. Analysis and Accurate Prediction of Users Response Behavior in Incentive-Based Demand Response 100. Android User Privacy Preserving through Crowdsourcing 101. Applying Simulated Annealing and Parallel Computing to the Mobile Sequential Recommendation 102. Authenticated Medical Documents Releasing with Privacy Protection and Release Control 103. Characterizing and Predicting Early Reviewers for Effective Product Marketing on ECommerce Websites 104. CLASS Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics 105. Clustering Based Collaborative Filtering Using an Incentivized Penalized User Model 106. Collusion Defender Preserving Subscribers Privacy in Publish and Subscribe Systems 107. Composition Context-Based Web Services Similarity Measure 108. Conversational Networks for Automatic Online Moderation 109. Crypt DAC Cryptographically Enforced Dynamic Access Control in the Cloud 110. DCCR Deep Collaborative Conjunctive Recommender for Rating Prediction 111. Detecting Pickpocket Suspects from Large-Scale Public Transit Records 112. Dynamic Multi Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data 113. Efficient conditional anonymity with message integrity and authentication in a vehicular adhoc network 114. Enabling Authorized Encrypted Search for Multi Authority Medical Databases 115. Fast Communication-efficient Spectral Clustering Over Distributed Data 116. Filtering Instagram hash tags through crowd tagging and the HITS algorithm 117. Fundamental Visual Concept Learning from Correlated Images and Text 118. Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems 119. Hidden Ciphertext Policy Attribute-Based Encryption with Fast Decryption for Personal Health Record System 120. Towards Secure Industrial IoT: Blockchain System with Credit-Based Consensus Mechanism 121. Joint Hypergraph Learning for Tag-based Image Retrieval 122. LBOA Location Based Secure Outsourced Aggregation in IoT 123. Learning Customer Behaviors for Effective Load Forecasting 124. Memory Leakage-Resilient Dynamic and Verifiable Multi-keyword Ranked Search on Encrypted Smart Body Sensor Network Data 125. Mining Users Trust From E-Commerce Reviews Based on Sentiment Similarity Analysis 126. MultiParty High Dimensional Data Publishing under Differential Privacy 127. NASM Nonlinearly Attentive Similarity Model for Recommendation System via Locally Attentive Embedding 128. Network Representation Learning Enhanced Recommendation Algorithm 129. Normalization of Duplicate Records from Multiple Sources 130. Novel Multi-Keyword Search on Encrypted Data in the Cloud 131. On Scalable and Robust Truth Discovery in Big Data Social Media Sensing Applications 132. Online Public Shaming on Twitter Detection Analysis and Mitigation 133. PersoNet Friend Recommendation System Based on Big-Five Personality Traits and Hybrid Filtering 134. PMOD Secure Privilege-Based Multilevel Organizational Data Sharing in Cloud Computing 135. Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Learning Algorithms 136. Privacy aware Personal Data Storage PPDS Learning how to Protect User Privacy 137. RescueMe Smartphone Based Self Rescue System for Disaster Rescue 138. Revocable Identity Based Broadcast Proxy Reencryption for Data Sharing in Clouds 139. Robust defense scheme against selective drop attack in wireless Ad Hoc Networks 140. Scheduling Real Time Security Aware tasks in Fog Networks 141. Searchable Symmetric Encryption with Forward Search Privacy 142. Secure and Efficient Skyline Queries on Encrypted Data 143. Secure data group sharing and conditional dissemination 144. Secure Key Agreement and Key Protection for Mobile Device User Authentication 145. Selective Authentication Based Geographic Opportunistic Routing in wsn 146. Sensitive Label Privacy Preservation with Anatomization for Data Publishing 147. Social Network Rumor Diffusion Predication Based on Equal Responsibility Game Model 148. Spammer Detection and Fake User Identification on Social Networks 149. Transactional Behavior Verification in Business Process as a Service Configuration 150. Trust Relationship Prediction in Alibaba ECommerce Platform 151. Trust-based Privacy-Preserving Photo Sharing in Online Social Networks 152. Using Data Mining to Predict Hospital Admissions From the Emergency Department 153. Detecting Suspicious File Migration or Replication in the Cloud 154. Toward Detection and Attribution of Cyber-Attacks in IoT enabled Cyber physical Systems 155. Active Online Learning for Social Media Analysis to Support Crisis Management 156. Weakly-Supervised Deep Learning for Customer Review Sentiment Classification 157. An Efficient and Secured Framework for Mobile Cloud Computing 158. Detection of fake online reviews using semi-supervised and supervised learning 159. Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing 160. Combining data owner side and cloud side access control for Encrypted cloud storage 161. Development and Examination of Fog Computing-Based Encrypted Control System 162. Inference Attack-Resistant E-Healthcare Cloud System with Fine-Grained Access 163. A Power-of-Two Choices Based Algorithm for Fog Computing 164. Detecting Malicious Social Bots Based on Click stream Sequences 165. Protecting Your Shopping Preference with Differential Privacy 166. Retrieving Hidden Friends A Collusion Privacy Attack Against Online Friend Search Engine 167. Dual Access Control for Cloud-Based Data Storage and Sharing 168. Block chain technology for protecting the banking transaction without using tokens 169. Detecting Group Shilling Attacks in Online Recommender Systems Based on Bisecting K-Means Clustering 170. Block chain management based on organ donation and transplantation 171. Credit Card Fraud Detection Using AdaBoost and Majority Voting 172. Optimal filter assignment policy against distributed denial of service attack 173. Block Hunter Federated Learning for Cyber Threat Hunting in Blockchain-based IIoT Networks 174. Secure cloud storage with data dynamics using secure network coding techniques 175. HinCTI: A Cyber Threat Intelligence Modeling and Identification System Based on Heterogeneous Information Network 176. CloudRaid Detecting Distributed Concurrency Bugs via Log Mining and Enhancement 177. An Efficient Ciphertext Index Retrieval Scheme based on Edge Computing Framework 178. A Secure E Coupon Service Based on Blockchain Systems 179. Secure Mobile Edge Computing Networks in the Presence of Multiple Eavesdroppers 180. EntrapNet a Blockchain Based Verification Protocol for Trustless Computing 181. Quantum Safe Round Optimal Password Authentication for Mobile Devices 182. A Secure E-Coupon Service Based on Blockchain Systems 183. A Secure and Efficient Cloud-Centric Internet-of-Medical-Things-Enabled Smart Healthcare System With Public Verifiability 184. Data Trust Framework Using Blockchain Technology and Adaptive Transaction Validation 185. Assessment of the Suitability of Fog Computing in the Context of Internet of Things 186. Semi-Supervised Spam Detection in Twitter Stream Spammers in Twitter 187. Online Public Shaming on Twitter: Detection, Analysis and Mitigation 188. CoDetect: Financial Fraud Detection with Anomaly Feature Detection 189. Health Monitoring on Social Media over Time 190. Web Media and Stock Markets : A Survey and Future Directions from a Big Data Perspective 191. Verifiable and Multi-Keyword Searchable Attribute-Based Encryption Scheme for Cloud Storage 192. Energy Efficient Clustering Algorithm for Multi-Hop Wireless Sensor Network Using Type-2 Fuzzy Logic 193. Trust-based Privacy-Preserving Photo Sharing in Online Social Networks 194. Risk Assessment in Social Networks based on User Anomalous Behaviours 195. A Workflow Management System for Scalable Data Mining on Clouds 196. Privacy Protection Based Access Control Scheme in Cloud-Based Services 197. A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds 198. Search Rank Fraud and Malware Detection in Google Play 199. Social Network Rumor Diffusion Predication Based on Equal Responsibility Game Model 200. Unified Fine-grained Access Control for Personal Health Records in Cloud Computing 201. Fast Cosine Similarity Search in Binary Space with Angular Multi-index Hashing 202. Detection of suicide-related posts in Twitter data streams 203. Protecting Location Privacy for Task Allocation in Ad Hoc Mobile Cloud Computing 204. Towards Shared Ownership in the Cloud 205. A Workflow Management System for Scalable Data Mining on Clouds 206. Online Product Quantization 207. Traffic and Energy Aware Routing for Heterogeneous Wireless Sensor Networks 208. SeDaSC: Secure Data Sharing in Clouds 209. Automated Decision Making in Airport Checkpoints: Bias Detection Toward Smarter Security and Fairness 210. Filtering Instagram hashtags through crowd tagging and the HITS algorithm 211. SPFM: Scalable and Privacy -Preserving Friend Matching in Mobile Cloud 212. A Comprehensive Study on Social Network Mental Disorders Detection via Online Social Media Mining 213. Spammer Detection and Fake User Identification on Social Networks 214. Chaotic Searchable Encryption for Mobile Cloud Storage 215. Credit card fraud detection using AdaBoost and majority voting 216. Securing Data in Internet of Things Using Cryptography 217. Scalable Content-Aware Collaborative Filtering for Location Recommendation 218. Efficient Retrieval over Documents Encrypted by Attributes in Cloud Computing 219. Secure Key Agreement and Key Protection for Mobile Device User Authentication 220. An Efficient and Secured Framework for Mobile Cloud Computing 221. Road Traffic Speed Prediction: A Probabilistic Model Fusing Multi-Source Data 222. Using Data Mining to Predict Hospital Admissions From the Emergency Department 223. A Developer Centered Bug Prediction Model 224. PASPORT: A Secure and Private Location Proof Generation and Verification Framework 225. An Approach to Balance Maintenance Costs and Electricity Consumption in Cloud Data Centers 226. Authentication by Encrypted Negative Password 227. CryptCloud+: Secure and Expressive Data Access Control for Cloud Storage