1 A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data 2018 Cloud Computing
2 Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing 2018 Cloud Computing
3 Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing 2018 Cloud Computing
4 Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds 2018 Cloud Computing
5 Dynamic and Public Auditing with Fair Arbitration for Cloud Data 2018 Cloud Computing
6 TDynamic-Hash-Table Based Public Auditing for Secure Cloud Storage 2018 Cloud Computing
7 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates. 2018 Cloud Computing
8 Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services. 2018 Cloud Computing
9 Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud 2018 Cloud Computing
10 KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage 2018 Cloud Computing
11 Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud 2018 Cloud Computing
12 MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection 2018 Cloud Computing
13 Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-Mining-As-a-Service Paradigm 2018 Cloud Computing
14 A Mixed Generative-Discriminative Based Hashing Method 2018 Datamining
15 Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data 2018 Datamining
16 OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data Linkage 2018 Datamining
17 Efficiency Support Edit Distance Based Strings Similarity Search Using B+ Trees 2018 Datamining
18 Active Learning Of Constraints For Semi Supervised Clustering 2018 Datamining
19 Oruta:Privacy Preserving Public Auditing For Shared Data In The Cloud 2018 Cloud Computing
20 TopicMachine: Conversion Prediction in Search Advertising using Latent Topic Models 2018 Datamining
21 Wormhole Attack Detection Algorithms in Wireless Network Coding Systems 2018 Networking
22 Swiper: Exploiting Virtual Machine Vulnerability in Third-Party 2018 Cloud Computing
23 A Hyper-Heuristic Scheduling Algorithm for Cloud 2018 Cloud Computing
24 Secure kNN Query Processing in Untrusted Cloud Environments 2018 Datamining
25 Clustering sentence leveltext using a novel fuzzy relational clustering algorithm. 2018 Datamining
26 Robust Perceptual Image Hashing Based On Ring Partition and NMF . 2018 Datamining
27 Facilitating Effective User Navigation through Website Structure Improvement 2018 Datamining
28 A Novel Model for Mining Association Rules from Semantic Web Data 2018 Datamining
29 Personalized Recommendation Combining User Interest and Social Circle 2018 Datamining
30 Supporting Privacy Protection in Personalized Web Search 2018 Datamining
31 A Scalable and Modular Architecture for High-Performance Packet Classification 2018 Datamining
32 Mining Semantically Consistent Patterns for Cross-View Data 2018 Datamining
33 Distributed Strategies For Mining Outliers in Large Datasets 2018 Datamining
34 A Group Incremental Approach to Feature Selection Applying Rough Set Technique 2018 Datamining
35 Efficient Authentication for Mobile and Pervasive Computing 2018 Datamining
36 Performance and Cost Evaluation of an Adaptive Encryption Architecture for Cloud Databases 2018 Mobilecomputing
37 Private Prdeictive Analysis On Encrypted Medical Data 2018 Mobilecomputing
38 Web Image Re-ranking using Query Specific Semantic Signatures 2018 Imageprocessing
39 Image-Difference Prediction: From Color to Spectral 2018 Imageprocessing
40 Gradient Histogram Estimation and Preservation for Texture Enhanced Image Denoising 2018 Imageprocessing
41 Set Predicates in SQL: Enabling Set-Level Comparisons for Dynamically Formed Groups 2018 Datamining
42 Self-Adaptive Semantic Focused Crawler for Mining Services Information Discovery 2018 Information Forensics
43 Building a Scalable System for Stealthy P2P-Botnet Detection 2018 Information Forensics
44 DOTS: A Propagation Delay-Aware Opportunistic MAC Protocol for Mobile Underwater Networks 2018 Mobilecomputing
45 Video Annotation Via Image Groups From The Web 2018 Information Forensics
46 Concurrent Single-Label Image Classification and Annotation via Efficient Multi-Layer Group Sparse Coding 2018 Imageprocessing
47 Video Annotation via Image Groups from the Web 2018 Datamining
48 Privacy Preserving Authenticated Key-Exchange Over Internet 2018 Information Forensics
49 Efficiently Supporting Edit Distance Based String Similariry Search Using B+trees. 2018 Datamining
50 A privacy Leakage Upper -Bound Constraint based Approach for Cost-Effective Privacy Preserving of Intermediate Datasets in Cloud 2018 Datamining
51 Predicting the Analysis of Heart Disease Symptoms using medicinal Data Mining Methods 2018 Datamining
52 Online Resume Tracking System using Computer 2018 Datamining
53 A Light Weight Encryption Scheme for Network-coded mobile Ad Hoc Network 2018 Networking
54 Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks 2018 Networking
55 Toward Transcoding as a Service in a Multimedia Cloud: Energy-Efficient Job-Dispatching Algorithm 2018 Mobilecomputing
56 Privacy Preserving Data Sharing With Anonymous ID Assignment 2018 Information Forensics
57 Human Effects of Enhanced Privacy Management Models 2018 Networking
58 Analysis of feature selection stability on high dimension and small sample data 2018 Datamining
59 A Unifying Model and Analysis of P2P VoD Replication and Scheduling 2018 Networking
60 Discovering High Quality Answers in Community Question Answering Archieves Using a Hierachy of Classifiers 2018 Datamining
61 Exploration of Data mining techniques in Fraud Detection: Credit Card 2018 Datamining
62 Mobiflage: Deniable Storage Encryption for Mobile Devices 2018 Mobilecomputing
63 Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems 2018 Service Computing
64 Capacity Achieving Distributed Scheduling With Finite Buffers 2018 Networking
65 On Sample-Path Optimal Dynamic Scheduling for Sum-Queue Minimization in Forests 2018 Networking
66 Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems 2018 Information Forensics
67 Discovering Emerging Topics in Social Streams via Link-Anomaly Detection 2018 Datamining
68 Towards Online Shortest Path Computation 2018 Datamining
69 Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks 2018 Dependable Secure Computing
70 Hidden Data Extraction Using Steganography 2018 Networking
71 Techniques to Minimize State Transfer Costs for Dynamic Execution Offloading in Mobile Cloud Computing 2018 Cloud Computing
72 Predicting the analysis of heart disease Symptomps using medicinal data mining methods 2018 Datamining
73 RFID Based Toll Collection System 2018 Application
74 Real-Time Scheduling with Security Enhancement for Packet Switched Networks 2018 Networking
75 Redundancy Management ofMultipath Routing for Intrusion Tolerance inHeterogeneous Wireless Sensor Networks 2018 Networking
76 Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm 2018 Networking