0824 4233176


RG Patil


A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
2016 Cloud Computing
Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing
2016 Cloud Computing
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing
2016 Cloud Computing
Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds
2016 Cloud Computing
Dynamic and Public Auditing with Fair Arbitration for Cloud Data
2016 Cloud Computing
TDynamic-Hash-Table Based Public Auditing for Secure Cloud Storage
2016 Cloud Computing
Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
2016 Cloud Computing
Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services
2016 Cloud Computing
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
2016 Cloud Computing
KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage
2016 Cloud Computing
Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud
2016 Cloud Computing
MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection
2016 Cloud Computing
13 Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-Mining-As-a-Service Paradigm 2016 Cloud Computing
14 A Mixed Generative-Discriminative Based Hashing Method 2016 Datamining
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
2015 Datamining
OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data Linkage
2015 Datamining
Efficiency Support Edit Distance Based Strings Similarity Search Using B+ Trees
2015 Datamining
Active Learning Of Constraints For Semi Supervised Clustering
2015 Datamining
Oruta:Privacy Preserving Public Auditing For Shared Data In The Cloud
2015 Cloud Computing
TopicMachine: Conversion Prediction in Search Advertising using Latent Topic Models
2015 Datamining
Wormhole Attack Detection Algorithms in Wireless Network Coding Systems
2015 Networking
Swiper: Exploiting Virtual Machine Vulnerability in Third-Party
2015 Cloud Computing
A Hyper-Heuristic Scheduling Algorithm for Cloud
2015 Cloud Computing
Secure kNN Query Processing in Untrusted Cloud Environments
2015 Datamining
Clustering sentence leveltext using a novel fuzzy relational clustering algorithm.
2015 Datamining
Robust Perceptual Image Hashing Based On Ring Partition and NMF .
2015 Datamining
27 Facilitating Effective User Navigation through Website Structure Improvement 2015 Datamining
28 A Novel Model for Mining Association Rules from Semantic Web Data 2015 Datamining
29 Personalized Recommendation Combining User Interest and Social Circle 2015 Datamining
30 Supporting Privacy Protection in Personalized Web Search 2015 Datamining
31 A Scalable and Modular Architecture for High-Performance Packet Classification 2015 Datamining
32 Mining Semantically Consistent Patterns for Cross-View Data 2015 Datamining
33 Distributed Strategies For Mining Outliers in Large Datasets 2015 Datamining
34 A Group Incremental Approach to Feature Selection Applying Rough Set Technique 2015 Datamining
35 Efficient Authentication for Mobile and Pervasive Computing 2015 Datamining
36 Performance and Cost Evaluation of an Adaptive Encryption Architecture for Cloud Databases 2015 Mobilecomputing
37 Private Prdeictive Analysis On Encrypted Medical Data 2015 Mobilecomputing
38 Web Image Re-ranking using Query Specific Semantic Signatures 2015 Imageprocessing
39 Image-Difference Prediction: From Color to Spectral 2015 Imageprocessing
40 Gradient Histogram Estimation and Preservation for Texture Enhanced Image Denoising 2015 Imageprocessing
41 Set Predicates in SQL: Enabling Set-Level Comparisons for Dynamically Formed Groups 2015 Datamining
42 Self-Adaptive Semantic Focused Crawler for Mining Services Information Discovery 2015 Information Forensics
43 Building a Scalable System for Stealthy P2P-Botnet Detection 2015 Information Forensics
44 DOTS: A Propagation Delay-Aware Opportunistic MAC Protocol for Mobile Underwater Networks 2015 Mobilecomputing
45 Video Annotation Via Image Groups From The Web 2015 Information Forensics
46 Concurrent Single-Label Image Classification and Annotation via Efficient Multi-Layer Group Sparse Coding 2015 Imageprocessing
47 Video Annotation via Image Groups from the Web 2015 Datamining
48 Privacy Preserving Authenticated Key-Exchange Over Internet 2015 Information Forensics
49 Efficiently Supporting Edit Distance Based String Similariry Search Using B+trees. 2015 Datamining
50 A privacy Leakage Upper -Bound Constraint based Approach for Cost-Effective Privacy Preserving of Intermediate Datasets in Cloud 2015 Datamining
51 Predicting the Analysis of Heart Disease Symptoms using medicinal Data Mining Methods 2015 Datamining
52 Online Resume Tracking System using Computer 2015 Datamining
53 A Light Weight Encryption Scheme for Network-coded mobile Ad Hoc Network 2015 Networking
54 Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks 2015 Networking
55 Toward Transcoding as a Service in a Multimedia Cloud: Energy-Efficient Job-Dispatching Algorithm 2015 Mobilecomputing
56 Privacy Preserving Data Sharing With Anonymous ID Assignment 2015 Information Forensics
57 Human Effects of Enhanced Privacy Management Models 2015 Networking
58 Analysis of feature selection stability on high dimension and small sample data 2015 Datamining
59 A Unifying Model and Analysis of P2P VoD Replication and Scheduling 2015 Networking
60 Discovering High Quality Answers in Community Question Answering Archieves Using a Hierachy of Classifiers 2015 Datamining
61 Exploration of Data mining techniques in Fraud Detection: Credit Card 2015 Datamining
62 Mobiflage: Deniable Storage Encryption for Mobile Devices 2015 Mobilecomputing
63 Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems 2015 Service Computing
64 Capacity Achieving Distributed Scheduling With Finite Buffers 2015 Networking
65 On Sample-Path Optimal Dynamic Scheduling for Sum-Queue Minimization in Forests 2015 Networking
66 Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems 2015 Information Forensics
67 Discovering Emerging Topics in Social Streams via Link-Anomaly Detection 2015 Datamining
68 Towards Online Shortest Path Computation 2015 Datamining
69 Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks 2015 Dependable Secure Computing
70 Hidden Data Extraction Using Steganography 2015 Networking
71 Techniques to Minimize State Transfer Costs for Dynamic Execution Offloading in Mobile Cloud Computing 2015 Cloud Computing
72 Predicting the analysis of heart disease Symptomps using medicinal data mining methods 2015 Datamining
73 RFID Based Toll Collection System 2015 Application
74 Real-Time Scheduling with Security Enhancement for Packet Switched Networks 2015 Networking
75 Redundancy Management ofMultipath Routing for Intrusion Tolerance inHeterogeneous Wireless Sensor Networks 2015 Networking
76 Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm 2015 Networking


1 A Shoulder Surfing Resistant Graphical Authentication System 2016 Android
2 ALTERDROID: Differential Fault Analysis of Obfuscated Smartphone Malware 2016 Android
3 An Exploration of Geographic Authentication Schemes 2016 Android
4 Authentication of Smartphone Users Using Behavioral Biometrics 2016 Android
5 Designing a Secure Exam Management System (SEMS) for M- Learning Environments 2016 Android
6 DroidDetector: Android Malware Characterization and Detection Using Deep Learning 2016 Android
7 EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data 2016 Android
8 Intelligent Hands Free Speech based SMS System on Android 2016 Android
9 MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention 2016 Android
10 PassBYOP: Bring Your Own Picture for Securing Graphical Passwords 2016 Android
11 Privacy-Preserving Location Sharing Services for Social Networks 2016 Android
12 SBVLC: Secure Barcode-Based Visible Light Communication for Smartphones 2016 Android
13 SenSpeed: Sensing Driving Conditions to Estimate Vehicle Speed in Urban Environments 2016 Android
14 STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users 2016 Android
15 Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions 2016 Android
16 WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices 2016 Android
17 Alert zone using Android 2015 Android
18 Friendbook: A Semantic-based Friend Recommendation System for Social Network 2015 Android
19 Permission-Based Android Malware Detection 2015 Android
20 Steganography in Modern Smartphones and Mitigation Techniques 2015 Android
21 Design of a Phone-Based Clinical Decision Support System for Resource-Limited Settings 2015 Android
22 Implementation of Location based Services in Android using GPS and Web Services 2015 Android
23 Sensing as a Service: Challenges, Solutions and Future Directions 2015 Android
24 Integrate MedSearch using Android Application 2015 Android
25 A real-time multi-user face unlock system via fast sparse coding approximation 2015 Android
26 Bluetooth Remote Home Automation System Using Android Application 2015 Android
27 MOSES: Supporting and Enforcing Security Profiles on Smartphones 2015 Android
28 Wireless Machine-to-Machine Healthcare Solution Using Android Mobile Devices in Global Networks 2015 Android
29 Automobile Spare parts management system using Android 2015 Android
30 SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency 2015 Android
31 Preserving Location Privacy in Geosocial Applications 2015 Android
32 Digital Ordering System for Restaurant USING ANDROID 2015 Android
33 Realtime time User tracking System using Android 2015 Android
34 Design and Implementation of Efficient Integrity Protection for Open Mobile Platforms 2015 Android
35 Secure Sms And mail Transaction Using Android 2015 Android
36 Secure Multiparty Computation for Privacy-Preserving Data Mining 2015 Android
37 Location based medical shop system 2015 Android
38 E-Crime File Management System 2015 Android
39 College interconnect using android 2015 Android
40 Stolen mobile Tracking System Using Android 2015 Android


1 A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data 2016 Cloud Computing
2 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud 2016 Cloud Computing
3 An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing 2016 Cloud Computing
4 An Efficient Privacy-Preserving Ranked Keyword Search Method 2016 Cloud Computing
5 CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System 2016 Cloud Computing
6 Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing 2016 Cloud Computing
7 CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services 2016 Cloud Computing
8 Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email 2016 Cloud Computing
9 Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds 2016 Cloud Computing
10 DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud 2016 Cloud Computing
11 Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage 2016 Cloud Computing
12 Dynamic and Public Auditing with Fair Arbitration for Cloud Data 2016 Cloud Computing
13 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates 2016 Cloud Computing
14 Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services 2016 Cloud Computing
15 Geometric Range Search on Encrypted Spatial Data 2016 Cloud Computing
16 Identity-Based Encryption with Cloud Revocation Authority and Its Applications 2016 Cloud Computing
17 Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud 2016 Cloud Computing
18 Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud 2016 Cloud Computing
19 Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems 2016 Cloud Computing
20 Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption 2016 Cloud Computing
21 Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming 2016 Cloud Computing
22 TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage 2016 Cloud Computing
23 A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing 2016 Cloud Computing
24 DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments 2016 Cloud Computing
25 Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing 2016 Cloud Computing
26 SecRBAC: Secure data in the Clouds 2016 Cloud Computing
27 A Novel Recommendation Model Regularized with User Trust and Item Ratings 2016 Data Mining
28 Automatically Mining Facets for Queries from Their Search Results 2016 Data Mining
29 Booster in High Dimensional Data Classification 2016 Data Mining
30 Building an intrusion detection system using a filter-based feature selection algorithm 2016 Data Mining
31 Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information 2016 Data Mining
32 Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings 2016 Data Mining
33 Crowdsourcing for Top-K Query Processing over Uncertain Data 2016 Data Mining
34 Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder 2016 Data Mining
35 Domain-Sensitive Recommendation with User-Item Subgroup Analysis 2016 Data Mining
36 Efficient Algorithms for Mining Top-K High Utility Itemsets 2016 Data Mining
37 Efficient Cache-Supported Path Planning on Roads 2016 Data Mining
38 Mining User-Aware Rare Sequential Topic Patterns in Document Streams 2016 Data Mining
39 Nearest Keyword Set Search in Multi-Dimensional Datasets 2016 Data Mining
40 Rating Prediction based on Social Sentiment from Textual Reviews 2016 Data Mining
41 Location Aware Keyword Query Suggestion Based on Document Proximity 2016 Data Mining
42 Using Hashtag Graph-based Topic Model to Connect Semantically-related Words without Co-occurrence in Microblogs 2016 Data Mining
43 Quantifying Political Leaning from Tweets, Retweets, and Retweeters 2016 Data Mining
44 Relevance Feedback Algorithms Inspired By Quantum Detection 2016 Data Mining
45 Sentiment Embeddings with Applications to Sentiment Analysis 2016 Data Mining
46 Top-Down XML Keyword Query Processing 2016 Data Mining
47 TopicSketch: Real-time Bursty Topic Detection from Twitter 2016 Data Mining
48 Top-k Dominating Queries on Incomplete Data 2016 Data Mining
49 Understanding Short Texts through Semantic Enrichment and Hashing 2016 Data Mining
50 A Stable Approach for Routing Queries in Unstructured P2P Networks 2016 Networking
51 iPath: Path Inference in Wireless Sensor Networks 2016 Networking
52 Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks 2016 Networking
53 Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks 2016 Networking
54 STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users 2016 Networking
55 Energy and Memory Efficient Clone Detection in Wireless Sensor Networks 2016 MOBILE COMPUTING
56 EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data 2016 MOBILE COMPUTING
57 Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach 2016 MOBILE COMPUTING
58 Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach 2016 MOBILE COMPUTINGtd>
59 A Hop-by-Hop Routing Mechanism for Green Internet 2016 PARALLEL & DISTRIBUTED SYSTEMS
60 Continuous Answering Holistic Queries over Sensor Networks 2016 PARALLEL & DISTRIBUTED SYSTEMS
61 Dictionary Based Secure Provenance Compression for Wireless Sensor Networks 2016 PARALLEL & DISTRIBUTED SYSTEMS
62 The Server Provisioning Problem for Continuous Distributed Interactive Applications 2016 PARALLEL & DISTRIBUTED SYSTEMS
63 Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts 2016 SECURE COMPUTING
64 Data Lineage in Malicious Environments 2016 SECURE COMPUTING
65 Detecting Malicious Facebook Applications 2016 SECURE COMPUTING
66 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments 2016 SECURE COMPUTING
67 Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata 2016 SECURE COMPUTING
68 Resolving Multi-party Privacy Conflicts in Social Media 2016 SECURE COMPUTING
69 Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions 2016 INFORMATION FORENSICS & SECURITY
70 Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data 2016 INFORMATION FORENSICS & SECURITY
71 Privacy-Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms 2016 INFORMATION FORENSICS & SECURITY
72 Profiling Online Social Behaviors for Compromised Account Detection 2016 INFORMATION FORENSICS & SECURITY
73 A Locality Sensitive Low-Rank Model for Image Tag Completion 2016 IMAGE PROCESSING
74 A Scalable Approach for Content-Based Image Retrieval in Peerto- Peer Networks 2016 IMAGE PROCESSING
75 Learning of Multimodal Representations with Random Walks on the Click Graph 2016 IMAGE PROCESSING
76 Online Multi-Modal Distance Metric Learning with Application to Image Retrieval 2016 IMAGE PROCESSING
77 Tag Based Image Search by Social Re-ranking 2016 IMAGE PROCESSING
78 Social Friend Recommendation Based on Multiple Network Correlation 2016 MULTIMEDIA (Social Networking)
79 User-Service Rating Prediction by Exploring Social Users’ Rating Behaviors 2016 MULTIMEDIA (Social Networking)
80 Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine-Grained Benchmark, and Feature Evaluation 2016 SOFTWARE ENGINEERING
81 Metamorphic Testing for Software Quality Assessment: A Study of Search Engines 2016 SOFTWARE ENGINEERING
83 Answering Approximate Queries over XML Data 2016 FUZZY SYSTEMS
84 Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation 2015 Cloud Computing
85 Fine-Grained Knowledge Sharing in Collaborative Environments 2015 Knowledge and Data Engineering
86 Provable Multicopy Dynamic Data Possession in Cloud Computing Systems 2015 Cloud Computing
87 A Similarity-Based Learning Algorithm Using Distance Transformation 2015 Knowledge and Data Engineering
88 Improving Accuracy and Robustness of Self-Tuning Histograms by Subspace Clustering 2015 Knowledge and Data Engineering
89 Privacy Protection for Wireless Medical Sensor Data 2015 Mobile Computing
90 Identity-Based Encryption with Outsourced Revocation in Cloud Computing 2015 Cloud Computing
91 Verifiable Auditing for Outsourced Database in Cloud Computing 2015 Cloud Computing
92 Scalable Distributed Processing Of K Nearest Neighbore Queries over Moving Objects 2015 Knowledge and Data Engineering
93 Audit-Free Cloud Storage via Deniable Attribute-based Encryption 2015 Cloud Computing
94 An Efficient Privacy-Preserving Ranked Keyword Search Method 2015 Cloud Computing
95 Efficient Top-k Retrieval on Massive Data 2015 Knowledge and Data Engineering
96 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data 2015 Cloud Computing
97 TRIP: An Interactive Retrieving-Inferring Data Imputation Approach 2015 Knowledge and Data Engineering
98 CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability 2015 Cloud Computing
99 Secure Auditing and Deduplicating Data in Cloud 2015 Cloud Computing
100 Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing 2015 Knowledge and Data Engineering
101 Self-Adjusting Slot Configurations for Homogeneous and Heterogeneous Hadoop 2015 Cloud Computing
102 A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Optimization 2015 Networking
103 Metaheuristic Algorithm for Feature Selection in Sentiment Analysis 2015 Knowledge and Data Engineering
104 Student Time Management (JSP) 2015
105 Student Profile Generation (JSP) 2015
106 Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing 2015 Cloud Computing
107 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing 2015 Cloud Computing
108 On efficient feature ranking methods for High-throughput data analysis 2015 Knowledge and Data Engineering
109 An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques 2015 Networking
110 Topic Model for Graph Mining 2015 Knowledge and Data Engineering
111 A decision-theoretic rough set approach for dynamic data mining 2015 Knowledge and Data Engineering
112 A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services 2015 Cloud Computing
113 Online Resource Scheduling under Concave Pricing for Cloud Computing 2015 Cloud Computing
114 The Value of Cooperation: Minimizing User Costs in Multi-broker Mobile Cloud Computing Networks 2015 Cloud Computing
115 A Universal Fairness Evaluation Framework for Resource Allocation in Cloud Computing 2015 Cloud Computing
116 A Set of Complexity Measures Designed for Applying Meta-Learning to Instance Selection 2015 Knowledge and Data Engineering
117 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security 2015 Networking
118 System of Systems for Quality-of-Service Observation and Response in Cloud Computing Environments 2015 Cloud Computing
119 Efficient Algorithms for Mining the Concise and Lossless Representation of High Utility Item sets 2015 Knowledge and Data Engineering
120 Keyword Extraction and Clustering for Document Recommendation in Conversations 2015 Knowledge and Data Engineering
121 Monitoring the Online Test Through Data Visualization 2015 Knowledge and Data Engineering
122 Arabic Text Categorization: a comparative study of Different Representation Modes 2015 Knowledge and Data Engineering
1233 CloudArmor: Supporting Reputation-based Trust Management for Cloud Services 2015 Cloud Computing
124 A Computational Dynamic Trust Model for User Authorization 2015 Networking
125 Top-k Similarity Join in Heterogeneous Information Networks 2015 Knowledge and Data Engineering
126 CPCDN: Content Delivery Powered by Context and User Intelligence 2015 Knowledge and Data Engineering
127 k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data 2015 Knowledge and Data Engineering
128 Active Learning for Ranking through Expected Loss Optimization 2015 Knowledge and Data Engineering
129 Pattern-based Topics for Document Modelling in Information Filtering 2015 Knowledge and Data Engineering
130 Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption 2015 Cloud Computing
131 An Access Control Model for Online Social Networks Using User-to-User Relationships 2015 Networking
132 Relational Collaborative Topic Regression for Recommender Systems 2015 Knowledge and Data Engineering
133 Relevance Feature Discovery for Text Mining 2015 Knowledge and Data Engineering
134 Correlated concept based dynamic document clustering algorithms for newsgroups and scientific literature 2015 Knowledge and Data Engineering
135 Distributed denial of service attacks in software-defined networking with cloud computing 2015 Cloud Computing
136 Differentially Private Frequent Itemset Mining via Transaction Splitting 2015 Knowledge and Data Engineering
137 Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing 2015 Cloud Computing
138 Review Selection Using Micro-Reviews 2015 Knowledge and Data Engineering
139 Backward Path Growth for Efficient Mobile Sequential Recommendation 2015 Knowledge and Data Engineering
140 Mining Partially-Ordered Sequential Rules Common to Multiple Sequences 2015 Knowledge and Data Engineering
141 Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data 2015 Cloud Computing
142 On the Security of Data Access Control for Multiauthority Cloud Storage Systems 2015 Cloud Computing


1 A Security-Enhanced Alignment-Free Fuzzy Vault-Based Fingerprint Cryptosystem Using Pair-Polar Minutiae Structures 2016 Image Processing (Biometrics)
2 Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption 2016 Image Processing (Biometrics)
3 Fingerprint Liveness Detection From Single Image Using Low- Level Features and Shape Analysis 2016 Image Processing (Biometrics)
4 Fingerprint Liveness Detection Using Convolutional Neural Networks 2016 Image Processing (Biometrics)
5 Iris Recognition Based on Human-Interpretable Features 2016 Image Processing (Biometrics)
6 Suspecting Less and Doing Better: New Insights on Palmprint Identification for Faster and More Accurate Matching 2016 Image Processing (Biometrics)
7 Aging Face Recognition: A Hierarchical Learning Model Based on Local Patterns Selection 2016 Image Processing (Face Recognition)
8 Complementary Cohort Strategy for Multimodal Face Pair Matching 2016 Image Processing (Face Recognition)
9 Facial Sketch Synthesis Using Two-dimensional Direct Combined Model-based Face-Specific Markov Network 2016 Image Processing (Face Recognition)
10 Class-wise Sparse and Collaborative Patch Representation for Face Recognition 2016 Image Processing (Face Recognition)
11 Local-Gravity-Face (LG-face) for Illumination-Invariant and Heterogeneous Face Recognition 2016 Image Processing (Face Recognition)
12 Robust Point Set Matching for Partial Face Recognition 2016 Image Processing (Face Recognition)
13 Discriminant Incoherent Component Analysis 2016 Image Processing (Facial Expression Recognition)
14 Dynamic Facial Expression Recognition With Atlas Construction and Sparse Representation 2016 Image Processing (Facial Expression Recognition)
15 A Feature Learning and Object Recognition Framework for Underwater Fish Images 2016 Image Processing (Feature Detection)
16 Feature and Region Selection for Visual Learning 2016 Image Processing (Feature Detection)
17 Contrast Driven Elastica for Image Segmentation 2016 Image Processing (Image Segmentation)
18 Interactive Image Segmentation Using Adaptive Constraint Propagation 2016 Image Processing (Image Segmentation)
19 A Patch-Based Approach for the Segmentation of Pathologies: Application to Glioma Labelling 2016 Medical Image Processing
20 An Automatic Learning-Based Framework for Robust Nucleus Segmentation 2016 Medical Image Processing
21 Computer Aided Theragnosis Using Quantitative Ultrasound Spectroscopy and Maximum Mean Discrepancy in Locally Advanced Breast Cancer 2016 Medical Image Processing
22 On Combining Multiple-Instance Learning and Active Learning for Computer-Aided Detection of Tuberculosis 2016 Medical Image Processing
23 Real-Time Automatic Artery Segmentation, Reconstruction and Registration for Ultrasound-Guided Regional Anaesthesia of the Femoral Nerve 2016 Medical Image Processing
24 Recognizing Focal Liver Lesions in CEUS With Dynamically Trained Latent Structured Models 2016 Medical Image Processing
25 Red Lesion Detection Using Dynamic Shape Features for Diabetic Retinopathy Screening 2016 Medical Image Processing
26 Image Deblurring via Enhanced Low-Rank Prior 2016 Image Processing
27 Adaptive Pairing Reversible Watermarking 2016 Image Processing (Image Watermarking)
28 Adaptive Steganalysis Based on Embedding Probabilities of Pixels 2016 Image Processing (Steganography)
29 Content-Adaptive Steganography by Minimizing Statistical Detectability 2016 Image Processing (Steganography)
30 Game Theory and Adaptive Steganography 2016 Image Processing (Steganography)
31 Antipodally Invariant Metrics for Fast Regression-Based Super- Resolution 2016 Image Processing (Super Resolution)
32 FRESH—FRI-Based Single-Image Super-Resolution Algorithm 2016 Image Processing (Super Resolution)
33 CCR: Clustering and Collaborative Representation for Fast Single Image Super-Resolution 2016 Image Processing (Super Resolution)
34 Consistent Coding Scheme for Single-Image Super-Resolution Via Independent Dictionaries 2016 Image Processing (Super Resolution)
35 Single-Image Super-Resolution Using Active-Sampling Gaussian Process Regression 2016 Image Processing (Super Resolution)
36 Super-Interpolation With Edge-Orientation-Based Mapping Kernels for Low Complex 2× Upscaling 2016 Image Processing (Super Resolution)
37 A Completely Blind Video Integrity Oracle 2016 Image Processing (Video Processing)
38 An Approach to Streaming Video Segmentation With Sub- Optimal Low-Rank Decomposition 2016 Image Processing (Video Processing)
39 Patch-Based Video Denoising With Optical Flow Estimation 2016 Image Processing (Video Processing)
40 Surveillance Video Synopsis via Scaling Down Objects 2016 Image Processing (Video Processing)
41 Blind Quality Assessment of Tone-Mapped Images Via Analysis of Information, Naturalness, and Structure 2016 Image Processing (Image Quality Assessment)
42 CASAIR: Content and Shape-Aware Image Retargeting and Its Applications 2016 Image Processing
43 Contrast Enhancement by Nonlinear Diffusion Filtering 2016 Image Processing
44 Cross-View Action Recognition via Transferable Dictionary Learning 2016 Image Processing (Action Recognition)
45 Deep Ranking for Person Re-Identification via Joint Representation Learning 2016 Image Processing
46 Dense and Sparse Reconstruction Error Based Saliency Descriptor 2016 Image Processing
47 Depth Estimation Using a Sliding Camera 2016 Image Processing
48 Detection of Moving Objects Using Fuzzy Color Difference Histogram Based Background Subtraction 2016 Image Processing
49 Effective Active Skeleton Representation for Low Latency Human Action Recognition 2016 Image Processing (Action Recognition)
50 Fast and Provably Accurate Bilateral Filtering 2016 Image Processing
51 Human Visual System-Based Saliency Detection for High Dynamic Range Content 2016 Image Processing
52 Illuminant-Based Transformed Spaces for Image Forensics 2016 Image Processing
53 Weakly Supervised Fine-Grained Categorization With Part-Based Image Representation 2016 Image Processing
54 Learn Sparse Dictionaries for Edit Propagation 2016 Image Processing
55 Learning of Multimodal Representations With Random Walks on the Click Graph 2016 Image Processing
56 Misaligned Image Integration With Local Linear Model 2016 Image Processing
57 Multiscale Edge Detection Using a Finite Element Framework for Hexagonal Pixel-Based Images 2016 Image Processing
58 Nonconvex Nonsmooth Low Rank Minimization via Iteratively Reweighted Nuclear Norm 2016 Image Processing
59 Non-Local Auto-Encoder With Collaborative Stabilization for Image Restoration 2016 Image Processing
60 One-Class Writer-Independent Offline Signature Verification Using Feature Dissimilarity Thresholding 2016 Image Processing (Signature Verification)
61 Perceptual Visual Security Index Based on Edge and Texture Similarities 2016 Image Processing
62 Robust Image Hashing With Ring Partition and Invariant Vector Distance 2016 Image Processing
63 Salient Region Detection via High-Dimensional Color Transform and Local Spatial Support 2016 Image Processing
64 Simple to Complex Transfer Learning for Action Recognition 2016 Image Processing (Action Recognition)
65 Tasking on Natural Statistics of Infrared Images 2016 Image Processing
66 Texture-Independent Long-Term Tracking Using Virtual Corners 2016 Image Processing
67 Two-Level QR Code for Private Message Sharing and Document Authentication 2016 Image Processing
68 Robust Blur Kernel Estimation for License Plate Images From Fast Moving Vehicles 2016 Image Processing (License Plate Detection)
69 Vehicle License Plate Recognition Based on Extremal Regions and Restricted Boltzmann Machines 2016 Image Processing (License Plate Detection)
70 A Novel Approach for Denoising and Enhancement of Extremely Low-light Video 2015 DIP
71 Recognizing Common CT Imaging Signs of Lung Diseases Through a New Feature Selection Method Based on Fisher Criterion and Genetic Optimization 2015 Biomedical
72 Automatic Change Analysis in Satellite Images Using Binary Descriptors and Lloyd–Max Quantization 2015 DIP
73 Spatiotemporal Saliency Detection for Video Sequences Based on Random Walk With Restart 2015 DIP
74 An Optimal-Distance-Based Transmission Strategy for Lifetime Maximization of Wireless Sensor Networks 2015 Communication
75 Influences of Power Electronic Converters on Voltage-Current Behaviors During Faults in DGUs-Part II: Photovoltaic Systems 2015 POE
76 Successive Interference Mitigation in Multiuser MIMO Interference Channels 2015 Communication
77 Flying-Capacitor Based Hybrid LLC Converters with Input Voltage Auto-Balance Ability for High Voltage Applications 2015 POE
78 Image Super-Resolution Based on Structure-Modulated Sparse Representation 2015 DIP
79 Dynamic Channel Assignment for Wireless Sensor Networks: A Regret Matching Based Approach 2015 Communication
80 Noninvasive Real-Time Automated Skin Lesion Analysis System for Melanoma Early Detection and Prevention 2015 Biomedical
80 Acoustic features for the identification of coronary artery disease 2015 Biomedical
81 Enhancement of Textural Differences Based on Morphological Component Analysis 2015 DIP
82 Cognitive and Energy Harvesting-Based D2D Communication in Cellular Networks: Stochastic Geometry Modeling and Analysis 2015 Communication
83 Hierarchical Graphical Models for Simultaneous Tracking and Recognition in Wide-Area Scenes 2015 DIP
84 Quasi Y-Source Boost DC-DC Converter 2015 POE
85 Background Subtraction Based on Low-Rank and Structured Sparse Decomposition 2015 DIP
86 Optimal Channel Switching Over Gaussian Channels Under Average Power and Cost Constraints 2015 Communication
87 Word Segmentation Method for Handwritten Documents based on Structured Learning 2015 DIP
88 Mutual dependency of features in multimodal biometric systems 2015 DIP
89 Implementation of Wavelet Based Robust Differential Control for Electric Vehicle Application 2015 POE
90 Learning Compact Feature Descriptor and Adaptive Matching Framework for Face Recognition 2015 DIP
91 Automatic localization and segmentation of optic disc in fundus image using morphology and level set 2015 DIP
93 Adaptive Image Denoising by Targeted Databases 2015 DIP
94 Sorted Consecutive Local Binary Pattern for Texture Classification 2015 DIP
95 Impacts of Deployment Strategies on Localization Performance in Underwater Acoustic Sensor Networks 2015 Communication
96 A Novel Image Classification Algorithm Using Overcomplete Wavelet Transforms 2015 DIP
97 Neighborhood Discriminant Hashing for Large-Scale Image Retrieval 2015 Communication
98 Joint Image Registration and Fusion for Panchromatic and Multispectral Images 2015 Biomedical
99 Ground-Based Cloud Detection Using Automatic Graph Cut 2015 DIP
100 Distributed Compressed Sensing off the Grid 2015 Communication
101 Human Facial Expression Recognition Using Stepwise Linear Discriminant Analysis and Hidden Conditional Random Fields 2015 DIP
102 GaN Devices in Resonant LLC Converters: System-level considerations 2015 DIP
103 Multilevel voltage source inverter with optimised usage of bidirectional switches 2015 POE
104 Topological Modeling and Classification of Mammographic Microcalcification Clusters 2015 Biomedical
105 A Contrast Adjustment Thresholding Method for Surface Defect Detection Based on Mesoscopy 2015 DIP
106 Particle Swarm Optimization-Based Clustering by Preventing Residual Nodes in Wireless Sensor Networks 2015 Communication
107 Improving Dermoscopy Image Classification Using Color Constancy 2015 Biomedical