JAVA PROJECTS
| Code |
ProjectName |
Year |
Domain |
| 1 |
A Secure and Dynamic Multi-Keyword Ranked Search Scheme
over Encrypted Cloud Data |
2016 |
Cloud Computing |
| 2 |
A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups
in the Cloud |
2016 |
Cloud Computing |
| 3 |
An Efficient File Hierarchy Attribute-Based Encryption Scheme in
Cloud Computing |
2016 |
Cloud Computing |
| 4 |
An Efficient Privacy-Preserving Ranked Keyword Search Method |
2016 |
Cloud Computing |
| 5 |
CDA Generation and Integration for Health Information Exchange
Based on Cloud Computing System |
2016 |
Cloud Computing |
| 6 |
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with
Verifiable Delegation in Cloud Computing |
2016 |
Cloud Computing |
| 7 |
CloudArmor: Supporting Reputation-Based Trust Management
for Cloud Services |
2016 |
Cloud Computing |
| 8 |
Conditional Identity-Based Broadcast Proxy Re-Encryption and Its
Application to Cloud Email |
2016 |
Cloud Computing |
| 9 |
Conjunctive Keyword Search With Designated Tester and Timing
Enabled Proxy Re-Encryption Function for E-Health Clouds |
2016 |
Cloud Computing |
| 10 |
DiploCloud: Efficient and Scalable Management of RDF Data in
the Cloud |
2016 |
Cloud Computing |
| 11 |
Dual-Server Public-Key Encryption With Keyword Search for
Secure Cloud Storage |
2016 |
Cloud Computing |
| 12 |
Dynamic and Public Auditing with Fair Arbitration for Cloud Data |
2016 |
Cloud Computing |
| 13 |
Enabling Cloud Storage Auditing With Verifiable Outsourcing of
Key Updates |
2016 |
Cloud Computing |
| 14 |
Fine-Grained Two-Factor Access Control for Web-Based Cloud
Computing Services |
2016 |
Cloud Computing |
| 15 |
Geometric Range Search on Encrypted Spatial Data |
2016 |
Cloud Computing |
| 16 |
Identity-Based Encryption with Cloud Revocation Authority and
Its Applications |
2016 |
Cloud Computing |
| 17 |
Identity-Based Proxy-Oriented Data Uploading and Remote Data
Integrity Checking in Public Cloud |
2016 |
Cloud Computing |
| 18 |
Protecting Your Right: Verifiable Attribute-Based Keyword Search
with Fine-Grained Owner-Enforced Search Authorization in the
Cloud |
2016 |
Cloud Computing |
| 19 |
Real-Time Semantic Search Using Approximate Methodology for
Large-Scale Storage Systems |
2016 |
Cloud Computing |
| 20 |
Secure Data Sharing in Cloud Computing Using Revocable-Storage
Identity-Based Encryption |
2016 |
Cloud Computing |
| 21 |
Secure Optimization Computation Outsourcing in Cloud
Computing: A Case Study of Linear Programming |
2016 |
Cloud Computing |
| 22 |
TMACS: A Robust and Verifiable Threshold Multi-Authority
Access Control System in Public Cloud Storage |
2016 |
Cloud Computing |
| 23 |
A Modified Hierarchical Attribute-Based Encryption Access
Control Method for Mobile Cloud Computing |
2016 |
Cloud Computing |
| 24 |
DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User
Environments |
2016 |
Cloud Computing |
| 25 |
Flexible and Fine-Grained Attribute-Based Data Storage in Cloud
Computing |
2016 |
Cloud Computing |
| 26 |
SecRBAC: Secure data in the Clouds |
2016 |
Cloud Computing |
| 27 |
A Novel Recommendation Model Regularized with User Trust and
Item Ratings |
2016 |
Data Mining |
| 28 |
Automatically Mining Facets for Queries from Their Search
Results |
2016 |
Data Mining |
| 29 |
Booster in High Dimensional Data Classification |
2016 |
Data Mining |
| 30 |
Building an intrusion detection system using a filter-based
feature selection algorithm |
2016 |
Data Mining |
| 31 |
Connecting Social Media to E-Commerce: Cold-Start Product
Recommendation Using Microblogging Information |
2016 |
Data Mining |
| 32 |
Cross-Domain Sentiment Classification Using Sentiment Sensitive
Embeddings |
2016 |
Data Mining |
| 33 |
Crowdsourcing for Top-K Query Processing over Uncertain Data |
2016 |
Data Mining |
| 34 |
Cyberbullying Detection based on Semantic-Enhanced
Marginalized Denoising Auto-Encoder |
2016 |
Data Mining |
| 35 |
Domain-Sensitive Recommendation with User-Item Subgroup
Analysis |
2016 |
Data Mining |
| 36 |
Efficient Algorithms for Mining Top-K High Utility Itemsets |
2016 |
Data Mining |
| 37 |
Efficient Cache-Supported Path Planning on Roads |
2016 |
Data Mining |
| 38 |
Mining User-Aware Rare Sequential Topic Patterns in Document
Streams |
2016 |
Data Mining |
| 39 |
Nearest Keyword Set Search in Multi-Dimensional Datasets |
2016 |
Data Mining |
| 40 |
Rating Prediction based on Social Sentiment from Textual
Reviews |
2016 |
Data Mining |
| 41 |
Location Aware Keyword Query Suggestion Based on Document
Proximity |
2016 |
Data Mining |
| 42 |
Using Hashtag Graph-based Topic Model to Connect
Semantically-related Words without Co-occurrence in Microblogs |
2016 |
Data Mining |
| 43 |
Quantifying Political Leaning from Tweets, Retweets, and
Retweeters |
2016 |
Data Mining |
| 44 |
Relevance Feedback Algorithms Inspired By Quantum Detection |
2016 |
Data Mining |
| 45 |
Sentiment Embeddings with Applications to Sentiment Analysis |
2016 |
Data Mining |
| 46 |
Top-Down XML Keyword Query Processing |
2016 |
Data Mining |
| 47 |
TopicSketch: Real-time Bursty Topic Detection from Twitter |
2016 |
Data Mining |
| 48 |
Top-k Dominating Queries on Incomplete Data |
2016 |
Data Mining |
| 49 |
Understanding Short Texts through Semantic Enrichment and
Hashing |
2016 |
Data Mining |
| 50 |
A Stable Approach for Routing Queries in Unstructured P2P
Networks |
2016 |
Networking |
| 51 |
iPath: Path Inference in Wireless Sensor Networks |
2016 |
Networking |
| 52 |
Opportunistic Routing With Congestion Diversity in Wireless Ad
Hoc Networks |
2016 |
Networking |
| 53 |
Spatial Reusability-Aware Routing in Multi-Hop Wireless
Networks |
2016 |
Networking |
| 54 |
STAMP: Enabling Privacy-Preserving Location Proofs for Mobile
Users |
2016 |
Networking |
| 55 |
Energy and Memory Efficient Clone Detection in Wireless Sensor
Networks |
2016 |
MOBILE COMPUTING |
| 56 |
EPLQ: Efficient Privacy-Preserving Location-Based Query Over
Outsourced Encrypted Data |
2016 |
MOBILE COMPUTING |
| 57 |
Secure Overlay Routing Using Key Pre-Distribution: A Linear
Distance Optimization Approach |
2016 |
MOBILE COMPUTING |
| 58 |
Detecting Node Failures in Mobile Wireless Networks: A
Probabilistic Approach |
2016 |
MOBILE COMPUTINGtd>
|
| 59 |
A Hop-by-Hop Routing Mechanism for Green Internet |
2016 |
PARALLEL &
DISTRIBUTED SYSTEMS |
| 60 |
Continuous Answering Holistic Queries over Sensor Networks |
2016 |
PARALLEL &
DISTRIBUTED SYSTEMS |
| 61 |
Dictionary Based Secure Provenance Compression for Wireless
Sensor Networks |
2016 |
PARALLEL &
DISTRIBUTED SYSTEMS |
| 62 |
The Server Provisioning Problem for Continuous Distributed
Interactive Applications |
2016 |
PARALLEL &
DISTRIBUTED SYSTEMS |
| 63 |
Contributory Broadcast Encryption with Efficient Encryption and
Short Ciphertexts |
2016 |
SECURE COMPUTING |
| 64 |
Data Lineage in Malicious Environments |
2016 |
SECURE COMPUTING |
| 65 |
Detecting Malicious Facebook Applications |
2016 |
SECURE COMPUTING |
| 66 |
FRoDO: Fraud Resilient Device for Off-Line Micro-Payments |
2016 |
SECURE COMPUTING |
| 67 |
Inference Attack on Browsing History of Twitter Users using
Public Click Analytics and Twitter Metadata |
2016 |
SECURE COMPUTING |
| 68 |
Resolving Multi-party Privacy Conflicts in Social Media |
2016 |
SECURE COMPUTING |
| 69 |
Hidden Ciphertext Policy Attribute-Based Encryption Under
Standard Assumptions |
2016 |
INFORMATION
FORENSICS &
SECURITY |
| 70 |
Optimized Search-and-Compute Circuits and Their Application to
Query Evaluation on Encrypted Data |
2016 |
INFORMATION FORENSICS & SECURITY |
| 71 |
Privacy-Preserving Utility Verification of the Data Published by
Non-interactive Differentially Private Mechanisms |
2016 |
INFORMATION
FORENSICS &
SECURITY |
| 72 |
Profiling Online Social Behaviors for Compromised Account
Detection |
2016 |
INFORMATION
FORENSICS &
SECURITY |
| 73 |
A Locality Sensitive Low-Rank Model for Image Tag Completion |
2016 |
IMAGE PROCESSING |
| 74 |
A Scalable Approach for Content-Based Image Retrieval in Peerto-
Peer Networks |
2016 |
IMAGE PROCESSING |
| 75 |
Learning of Multimodal Representations with Random Walks on
the Click Graph |
2016 |
IMAGE PROCESSING |
| 76 |
Online Multi-Modal Distance Metric Learning with Application to
Image Retrieval |
2016 |
IMAGE PROCESSING |
| 77 |
Tag Based Image Search by Social Re-ranking |
2016 |
IMAGE PROCESSING |
| 78 |
Social Friend Recommendation Based on Multiple Network
Correlation |
2016 |
MULTIMEDIA (Social
Networking) |
| 79 |
User-Service Rating Prediction by Exploring Social Users’ Rating
Behaviors |
2016 |
MULTIMEDIA (Social
Networking) |
| 80 |
Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine-Grained Benchmark, and Feature Evaluation |
2016 |
SOFTWARE
ENGINEERING |
| 81 |
Metamorphic Testing for Software Quality Assessment: A Study
of Search Engines |
2016 |
SOFTWARE
ENGINEERING |
| 82 |
SITAR: GUI Test Script Repair |
2016 |
SOFTWARE
ENGINEERING |
| 83 |
Answering Approximate Queries over XML Data |
2016 |
FUZZY SYSTEMS |
| 84 |
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation |
2015 |
Cloud Computing |
| 85 |
Fine-Grained Knowledge Sharing in Collaborative Environments |
2015 |
Knowledge and Data Engineering |
| 86 |
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems |
2015 |
Cloud Computing |
| 87 |
A Similarity-Based Learning Algorithm Using Distance Transformation |
2015 |
Knowledge and Data Engineering |
| 88 |
Improving Accuracy and Robustness of Self-Tuning Histograms by Subspace Clustering |
2015 |
Knowledge and Data Engineering |
| 89 |
Privacy Protection for Wireless Medical Sensor Data |
2015 |
Mobile Computing |
| 90 |
Identity-Based Encryption with Outsourced Revocation in Cloud Computing |
2015 |
Cloud Computing |
| 91 |
Verifiable Auditing for Outsourced Database in Cloud Computing |
2015 |
Cloud Computing |
| 92 |
Scalable Distributed Processing Of K Nearest Neighbore Queries over Moving Objects |
2015 |
Knowledge and Data Engineering |
| 93 |
Audit-Free Cloud Storage via Deniable Attribute-based Encryption |
2015 |
Cloud Computing |
| 94 |
An Efficient Privacy-Preserving Ranked Keyword Search Method |
2015 |
Cloud Computing |
| 95 |
Efficient Top-k Retrieval on Massive Data |
2015 |
Knowledge and Data Engineering |
| 96 |
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data |
2015 |
Cloud Computing |
| 97 |
TRIP: An Interactive Retrieving-Inferring Data Imputation Approach |
2015 |
Knowledge and Data Engineering |
| 98 |
CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability |
2015 |
Cloud Computing |
| 99 |
Secure Auditing and Deduplicating Data in Cloud |
2015 |
Cloud Computing |
| 100 |
Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing |
2015 |
Knowledge and Data Engineering |
| 101 |
Self-Adjusting Slot Configurations for Homogeneous and Heterogeneous Hadoop |
2015 |
Cloud Computing |
| 102 |
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Optimization |
2015 |
Networking |
| 103 |
Metaheuristic Algorithm for Feature Selection in Sentiment Analysis |
2015 |
Knowledge and Data Engineering |
| 104 |
Student Time Management (JSP) |
2015 |
|
| 105 |
Student Profile Generation (JSP) |
2015 |
|
| 106 |
Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing |
2015 |
Cloud Computing |
| 107 |
A Profit Maximization Scheme with Guaranteed
Quality of Service in Cloud Computing |
2015 |
Cloud Computing |
| 108 |
On efficient feature ranking methods for High-throughput data analysis |
2015 |
Knowledge and Data Engineering |
| 109 |
An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques |
2015 |
Networking |
| 110 |
Topic Model for Graph Mining |
2015 |
Knowledge and Data Engineering |
| 111 |
A decision-theoretic rough set approach for dynamic data mining |
2015 |
Knowledge and Data Engineering |
| 112 |
A Privacy-Aware Authentication Scheme for
Distributed Mobile Cloud Computing Services |
2015 |
Cloud Computing |
| 113 |
Online Resource Scheduling under
Concave Pricing for Cloud Computing |
2015 |
Cloud Computing |
| 114 |
The Value of Cooperation: Minimizing
User Costs in Multi-broker Mobile
Cloud Computing Networks |
2015 |
Cloud Computing |
| 115 |
A Universal Fairness Evaluation Framework for
Resource Allocation in Cloud Computing |
2015 |
Cloud Computing |
| 116 |
A Set of Complexity Measures Designed for Applying Meta-Learning to Instance Selection |
2015 |
Knowledge and Data Engineering |
| 117 |
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security |
2015 |
Networking |
| 118 |
System of Systems for Quality-of-Service
Observation and Response in Cloud
Computing Environments |
2015 |
Cloud Computing |
| 119 |
Efficient Algorithms for Mining the Concise and Lossless Representation of High Utility Item sets |
2015 |
Knowledge and Data Engineering |
| 120 |
Keyword Extraction and Clustering for Document Recommendation in Conversations |
2015 |
Knowledge and Data Engineering |
| 121 |
Monitoring the Online Test Through Data Visualization |
2015 |
Knowledge and Data Engineering |
| 122 |
Arabic Text Categorization: a comparative study of Different Representation Modes |
2015 |
Knowledge and Data Engineering |
| 1233 |
CloudArmor: Supporting Reputation-based Trust Management for Cloud Services |
2015 |
Cloud Computing |
| 124 |
A Computational Dynamic Trust Model
for User Authorization |
2015 |
Networking |
| 125 |
Top-k Similarity Join in Heterogeneous Information Networks |
2015 |
Knowledge and Data Engineering |
| 126 |
CPCDN: Content Delivery Powered by Context and User Intelligence |
2015 |
Knowledge and Data Engineering |
| 127 |
k-Nearest Neighbor Classification over
Semantically Secure Encrypted Relational Data |
2015 |
Knowledge and Data Engineering |
| 128 |
Active Learning for Ranking through
Expected Loss Optimization |
2015 |
Knowledge and Data Engineering |
| 129 |
Pattern-based Topics for Document Modelling
in Information Filtering |
2015 |
Knowledge and Data Engineering |
| 130 |
Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption |
2015 |
Cloud Computing |
| 131 |
An Access Control Model for Online Social
Networks Using User-to-User Relationships |
2015 |
Networking |
| 132 |
Relational Collaborative Topic Regression for
Recommender Systems |
2015 |
Knowledge and Data Engineering |
| 133 |
Relevance Feature Discovery for Text Mining |
2015 |
Knowledge and Data Engineering |
| 134 |
Correlated concept based dynamic document
clustering algorithms for newsgroups and
scientific literature |
2015 |
Knowledge and Data Engineering |
| 135 |
Distributed denial of service attacks in software-defined networking with cloud computing |
2015 |
Cloud Computing |
| 136 |
Differentially Private Frequent Itemset
Mining via Transaction Splitting |
2015 |
Knowledge and Data Engineering |
| 137 |
Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing |
2015 |
Cloud Computing |
| 138 |
Review Selection Using Micro-Reviews |
2015 |
Knowledge and Data Engineering |
| 139 |
Backward Path Growth for Efficient Mobile Sequential Recommendation |
2015 |
Knowledge and Data Engineering |
| 140 |
Mining Partially-Ordered Sequential Rules Common to Multiple Sequences |
2015 |
Knowledge and Data Engineering |
| 141 |
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data |
2015 |
Cloud Computing |
| 142 |
On the Security of Data Access Control for Multiauthority Cloud Storage Systems |
2015 |
Cloud Computing |