IEEE 2016 - 2017 JAVA PROJECTS
Java is one of the world’s most important and widely used computer languages, and it has held this distinction for many years. Unlike some other computer languages whose influence has weared with passage if time, while java’s has grown.
IEEE 2016-2017 CLOUD COMPUTING
- Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming
- ID2S Password-Authenticated Key Exchange Protocols
- Dynamic and Public Auditing with Fair Arbitration for Cloud Data
- Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
- Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
- Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming
- ID2S Password-Authenticated Key Exchange Protocols
- Dynamic and Public Auditing with Fair Arbitration for Cloud Data
- Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
- ID2S Password-Authenticated Key Exchange Protocols
- Dynamic and Public Auditing with Fair Arbitration for Cloud Data
- Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
- Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
- DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
- Secure Auditing and Deduplicating Data in Cloud
- Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
- Identity-Based Encryption with Cloud Revocation Authority and Its Applications
IEEE 2016-2017 DATA MINING
- Booster in High Dimensional Data Classification
- Relevance Feedback Algorithms Inspired By Quantum Detection
- Top-k dominating queries on incomplete data
- Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings
- Crowdsourcing for top-K query processing over uncertain data
- Understanding short texts through semantic enrichment and hashing
- Sentiment Embeddings with Applications to Sentiment Analysis
- A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks
- RSkNN: kNN Search on Road Networks by Incorporating Social Influence
- A Novel Recommendation Model Regularized with User Trust and Item Ratings
- TopicSketch: Real-Time Bursty Topic Detection from Twitter
- Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search
- Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
- Domain-sensitive Recommendation with user-item subgroup analysis
- t-closeness through microaggregation: Strict privacy with enhanced utility preservation
- Quantifying Political Leaning from Tweets, Retweets, and Retweeters
- Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information
- Efficient Cache-Supported Path Planning on Roads
- Efficiently Estimating Statistics of Points of Interests on Maps
- Mitigating Cross-Site Scripting Attacks with a Content Security Policy
- Tell Me What You Eat, and I Will Tell You Where You Come From: A Data Science Approach for Global Recipe Data on the Web
- Online Multi-Modal Distance Metric Learning with Application to Image Retrieval
IEEE 2016-2017 INFORMATION & FORENSIC SECURITY
- An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing
- Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data
- Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage
- Privacy-Preserving Utility Verification of the Data Published by Non-Interactive Differentially Private Mechanisms
- Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
- Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions
- Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services
- Profiling Online Social Behaviors for Compromised Account Detection
- Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
- Server-Aided Public Key Encryption With Keyword Search
IEEE 2016-2017 PARALLEL AND DISTRIBUTED SYSTEM
- Dictionary Based Secure Provenance Compression for Wireless Sensor Networks
- CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services
- An Efficient Privacy-Preserving Ranked Keyword Search Method
- Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud
- Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing
- A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
- A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
- TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage
- Authenticated Key Exchange Protocols for Parallel Network File Systems
IEEE 2016-2017 NETWORKING
- STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
- Detecting Malicious Facebook Applications
- Functional Forms of Optimum Spoofing Attacks for Vector Parameter Estimation in Quantized Sensor Networks
- On Denial of Service Attacks in Software Defined Networks
- Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks
IEEE 2016-2017 INTERNET OF THINGS
IEEE 2016-2017 SOFTWARE ENGINEERING
IEEE 2016-2017 BIG DATA
IEEE 2016-2017 DATA ANALYSIS AND NETWORKING
IEEE 2016-2017 CYBERNETICS
IEEE 2016-2017 SERVICES COMPUTING
- CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System
- KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage
- Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
- Privacy-Preserving Location Sharing Services for Social Networks
- SecRBAC: Secure data in the Clouds