S.No | Code | PROJECT TITLE Download Titles![]() |
Action |
---|---|---|---|
CLOUD COMPUTING | |||
1 | CTJV801 | A Practical Public Key Encryption Scheme Based on Learning Parity with Noise | |
2 | CTJV802 | An Approach to Balance Maintenance Costs and Electricity Consumption in Cloud Data Centers | |
3 | CTJV803 | CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics | |
4 | CTJV804 | Integrated Authentication and Key Agreement Framework for Vehicular Cloud Computing | |
5 | CTJV805 | A Power-of-Two Choices Based Algorithm for Fog Computing | |
6 | CTJV806 | virtFlow: Guest Independent Execution Flow Analysis Across Virtualized Environments | |
7 | CTJV807 | Adaptive Resource Management for Analyzing Video Streams from Globally Distributed Network Cameras | |
8 | CTJV808 | Enhancing Performance and Energy Efficiency for Hybrid Workloads in Virtualized Cloud Environment | |
9 | CTJV809 | Minimal Cost Server Configuration for Meeting Time-Varying Resource Demands in Cloud Centers | |
10 | CTJV810 | Aggregation-Based Colocation Datacenter Energy Management in Wholesale Markets | |
11 | CTJV811 | Provably secure and lightweight identity-based authenticated data sharing protocol for cyber-physical cloud environment |
|
12 | CTJV812 | Energy Efficient Scheduling of Servers with Multi-Sleep Modes for Cloud Data Center | |
13 | CTJV813 | A tight estimate of job completion time in vehicular clouds | |
14 | CTJV814 | HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems | |
15 | CTJV815 | An Efficient and Fair Multi-Resource Allocation Mechanism for Heterogeneous Servers | |
16 | CTJV816 | Dynamic VM Scaling: Provisioning and Pricing through an Online Auction | |
17 | CTJV817 | Price-based Resource Allocation for Edge Computing: A Market Equilibrium Approach | |
18 | CTJV818 | Efficient Resource Allocation for On-Demand Mobile-Edge Cloud Computing | |
19 | CTJV819 | An Efficient and Secured Framework for Mobile Cloud Computing | |
20 | CTJV820 | Efficient Traceable Authorization Search System for Secure Cloud Storage | |
21 | CTJV821 | A Robust Formulation for Efficient Application Offloading to Clouds | |
22 | CTJV822 | A Planning Approach for Reassigning Virtual Machines in IaaS Clouds | |
23 | CTJV823 | Efficient Retrieval Over Documents Encrypted by Attributes in Cloud Computing | |
24 | CTJV873 | A Lightweight secure data sharing scheme for mobile cloud computing | |
DATA MINING | |||
1 | CTJV824 | CoDetect: Financial Fraud Detection With Anomaly Feature detection | |
2 | CTJV825 | Complementary Aspect-based Opinion Mining | |
3 | CTJV826 | Emotion Recognition on Twitter: Comparative Study and Training a Unison Model | |
4 | CTJV827 | Frequent Itemsets Mining With Differential Privacy Over Large- Scale Data | |
5 | CTJV828 | Health Monitoring on Social Media over Time | |
6 | CTJV829 | Online Product Quantization | |
7 | CTJV830 | Privacy Characterization and Quantification in Data Publishing | |
8 | CTJV831 | Road Traffic Speed Prediction: A Probabilistic Model Fusing multi secure data | |
9 | CTJV832 | Scalable Content-Aware Collaborative Filtering for Location Recommendation | |
10 | CTJV833 | SDE: A Novel Clustering Framework Based on Sparsity-Density Entropy | |
11 | CTJV834 | Search Result Diversity Evaluation based on Intent Hierarchies | |
12 | CTJV835 | When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks | |
13 | CTJV836 | A Two-stage Biomedical Event Trigger Detection Method Integrating Feature Selection and Word Embeddings | |
14 | CTJV837 | Automated Phrase Mining from Massive Text Corpora | |
15 | CTJV838 | A Two-Phase Algorithm for Differentially Private Frequent Subgraph Mining | |
16 | CTJV839 | Supervised Topic Modeling using Hierarchical Dirichlet Process-based Inverse Regression: Experiments on E-Commerce Applications |
|
17 | CTJV840 | Bayesian Nonparametric Learning for Hierarchical and Sparse Topics | |
18 | CTJV841 | Comments Mining With TF-IDF: The Inherent Bias and Its Removal | |
19 | CTJV842 | A Correlation-based Feature Weighting Filter for Naive Bayes | |
20 | CTJV843 | A Weighted Frequent Item set Mining Algorithm for Intelligent Decision in Smart Systems | |
21 | CTJV844 | An Efficient Method for High Quality and Cohesive Topical Phrase Mining | |
MACHINE LEARNING | |||
1 | CTJV845 | A Comprehensive Study on Social Network Mental Disorders Detection via Online Social Media Mining | |
2 | CTJV846 | A Credibility Analysis System for Assessing Information on Twitter | |
3 | CTJV847 | A Novel Machine Learning Algorithm for Spammer Identification in Industrial Mobile Cloud Computing | |
4 | CTJV848 | Credit Card Fraud Detection Using AdaBoost and Majority Voting | |
5 | CTJV849 | Hate Speech on Twitter: A Pragmatic Approach to Collect Hateful and Offensive Expressions and Perform Hate Speech Detection |
|
6 | CTJV950 | Using Data Mining to Predict Hospital Admissions From the Emergency Department | |
SECURE COMPUTING | |||
1 | CTJV951 | Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices | |
2 | CTJV952 | Magic Train: Design of Measurement Methods Against Bandwidth Inflation Attacks | |
NETWORKING | |||
1 | CTJV953 | Energy Efficient Link-Delay Aware Routing in Wireless Sensor networks | |
2 | CTJV954 | GeTrust: A guarantee-based trust model in Chord-based P2P networks | |
3 | CTJV955 | PROVEST: Provenance-based Trust Model for Delay Tolerant networks | |
4 | CTJV956 | Traffic and Energy Aware Routing for Heterogeneous Wireless networks | |
SOCIAL NETWORKING | |||
1 | CTJV857 | 3-HBP: A Three-Level Hidden Bayesian Link Prediction Model in social networks | |
2 | CTJV858 | Analyzing and Detecting Money-Laundering Accounts in Online social networks | |
3 | CTJV859 | Detection of suicide-related posts in Twitter data streams | |
4 | CTJV860 | Risk Assessment in Social Networks based on User Anomalous Behaviours | |
5 | CTJV861 | Segregating Spammers and Unsolicited Bloggers from Genuine Experts on Twitter | |
MOBILE COMPUTING | |||
1 | CTJV862 | Distributed Faulty Node Detection in Delay Tolerant Networks: Design and Analysis | |
2 | CTJV863 | Efficient Privacy-Aware Authentication Scheme for Mobile Cloud | |
3 | CTJV864 | Identifying On-site Users for Social Events: Mobility, Content, and Social Relationship | |
4 | CTJV865 | Protecting Location Privacy for Task Allocation in Ad Hoc Mobile Cloud Computing | |
5 | CTJV866 | Traffic-Aware Efficient Mapping of Wireless Body Area Networks to Health Cloud Service Providers in Critical Emergency Situations |
|
WEB MINING | |||
1 | CTJV867 | Relevant Feedback Based Accurate and Intelligent Retrieval on Capturing User Intention for Personalized Websites | |
SECURE COMPUTING | |||
1 | CTJV868 | A Hybrid Approach for Detecting Automated Spammers in twitter | |
2 | CTJV869 | A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network | |
3 | CTJV870 | Anonymization of Sensitive Quasi-Identifiers for l-Diversity and t- Closeness | |
4 | CTJV871 | Exploiting Social Network to Enhance Human-to-Human Infection Analysis Without Privacy Leakage | |
INFORMATION FORENSIC SECURITY | |||
1 | CTJV872 | Trust-based Collaborative Privacy Management in Online Social networks | |
INTERNET OF THINGS | |||
1 | CTJV874 | Cloud-based Fine-grained Health Information Access Control Framework for Lightweight IoT Devices with Dynamic Auditing and Attribute Revocation |
|
2 | CTJV875 | Light-Weight Security and Data Provenance for Multi-Hop Internet of Things | |
IMAGE PROCESSING | |||
1 | CTJV876 | Automatic Generation of Social Event Storyboard From Image Click-Through Data | |
2 | CTJV877 | Query-free Clothing Retrieval via Implicit Relevance Feedback | |
SOFTWARE ENGINEERING | |||
1 | CTJV878 | A Developer Centered Bug Prediction Model | |
SERVICE COMPUTING(WEB SERVICES) | |||
1 | CTJV879 | Lightweight Fine-Grained Search over Encrypted Data in Fog Computing | |
2 | CTJV880 | Semantic-based Compound Keyword Search over Encrypted Cloud Data | |
3 | CTJV881 | Quality and Profit Assured Trusted Cloud Federation Formation: Game Theory Based Approach | |
4 | CTJV882 | Optimizing Autonomic Resources for the Management of Large Service-Based Business Processes | |
5 | CTJV883 | Scheduling Inter-Datacenter Video Flows for Cost Efficiency | |
6 | CTJV884 | Migration Modeling and Learning Algorithms for Containers in Fog Computing | |
7 | CTJV885 | Multi-user Multi-task Computation Offloading in Green Mobile Edge Cloud Computing | |
8 | CTJV886 | Achieving Fairness-aware Two-level Scheduling for Heterogeneous Distributed Systems | |
BIG DATA | |||
1 | CTJV887 | A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds | |
2 | CTJV888 | AccountTrade: Accountability Against Dishonest Big Data Buyers and Sellers | |
3 | CTJV889 | Structural Balance Theory-based E-commerce Recommendation over Big Rating Data | |
4 | CTJV890 | Towards Green Cloud Computing: Demand Allocation and Pricing Policies for Cloud Service Brokerage | |
CONSUMER ELECTRONICS , INDUSTRIAL ELECTRONICS | |||
1 | CTJV891 | RRPhish Anti-Phishing via Mining Brand Resources Request | |
2 | CTJV892 | Confidence-interval Fuzzy Model-based Indoor Localization | |
INFORMATION AND COMMUNICATION SYSTEM | |||
1 | CTJV893 | A Data Mining based Model for Detection of Fraudulent Behaviour in Water Consumpti | |
PATTERN ANALYSIS AND MACHINE INTELLIGENCE | |||
1 | CTJV894 | Detecting Regions of Maximal Divergence for Spatio-Temporal Anomaly Detection | |
2 | CTJV895 | Ordinal Constraint Binary Coding for Approximate Nearest Neighbor Search | |
SOFTWARE ENGINEERING, COMPUTER GRAPHICS | |||
1 | CTJV896 | Reviving Sequential Program Birthmarking for Multithreaded Software Plagiarism Detection | |
2 | CTJV897 | EVA: Visual Analytics to Identify Fraudulent Events | |
INFORMATION AND SECURITY SYSTEMS | |||
1 | CTJV898 | FraudFind: Financial Fraud Detection by Analyzing Human Behavior | |
2 | CTJV899 | FraudVis: Understanding Unsupervised Fraud Detection Algorithms | |
3 | CTJV900 | Machine Learning Applied to Rotating Check Fraud Detection |
S.No | Code | PROJECT TITLE Download Titles![]() |
Action |
---|---|---|---|
1 | CTJV701 | A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification | |
2 | CTJV702 | A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing | |
3 | CTJV703 | A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing | |
4 | CTJV704 | A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users | |
5 | CTJV105 | A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage | |
6 | CTJV706 | A robust reputation management mechanism in the federated cloud | |
7 | CTJV707 | Achieving Efficient and Secure Data Acquisition for Cloudsupported Internet of Things in Smart Grid | |
8 | CTJV708 | Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data | |
9 | CTJV709 | Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems | |
10 | CTJV710 | Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing | |
11 | CTJV711 | Efficient and Expressive Keyword Search Over Encrypted Data in Cloud | |
12 | CTJV712 | Fast Phrase Search for Encrypted Cloud Storage | |
13 | CTJV713 | Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds | |
14 | CTJV714 | Identity-Based Encryption with Cloud Revocation Authority and Its Applications | |
15 | CTJV715 | Identity-Based Private Matching over Outsourced Encrypted Datasets | |
16 | CTJV716 | Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage | |
17 | CTJV717 | On the Security of Data Access Control for Multi-authority Cloud Storage Systems | |
18 | CTJV718 | Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing | |
19 | CTJV719 | Privacy Protection based Access Control Scheme in Cloud-based Services | |
20 | CTJV720 | Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data | |
21 | CTJV721 | Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud | |
22 | CTJV722 | RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage | |
23 | CTJV723 | Secure Data Sharing in Cloud Computing Using RevocableStorage Identity-Based Encryption | |
24 | CTJV724 | Securing Cloud Data under Key Exposure | |
25 | CTJV725 | TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud | |
26 | CTJV726 | TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud | |
27 | CTJV727 | Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving | |
28 | CTJV728 | An Efficient Privacy-Preserving Ranked Keyword Search Method | |
29 | CTJV729 | Cda Generation And Integration For Health Information Exchange Based On Cloud Computing System | |
30 | CTJV730 | Conditional Identity-Based Broadcast Proxy Re-Encryption And Its Application To Cloud Email | |
31 | CTJV731 | Conjunctive Keyword Search With Designated Tester AndTiming Enabled Proxy Re Encryption Function For E-Health Clouds | |
32 | CTJV732 | Deypos: Deduplicatable Dynamic Proof Of Storage For MultiUse Environments | |
33 | CTJV733 | Diplocloud: Efficient And Scalable Management Of Rdf Data In The Cloud | |
34 | CTJV734 | Dual-Server Public-Key Encryption With Keyword Search For Secure CloudStorage | |
35 | CTJV735 | Dynamic And Public Auditing With Fair Arbitration For Cloud Data | |
36 | CTJV736 | Enabling Cloud Storage Auditing With Verifiable Outsourcing Of Keyupdates | |
37 | CTJV737 | Fine-Grained Two-Factor Access Control For Web-Based Cloud Computing Services | |
38 | CTJV738 | Flexible And Fine-Grained Attribute-Based Data Storage In Cloud Computing | |
39 | CTJV739 | Geometric Range Search On Encrypted Spatial Data | |
40 | CTJV740 | Identity-Based Encryption With Cloud Revocation Authority And Its Applications | 41 | CTJV741 | Identity-Based Proxy-Oriented Data Uploading And Remote Data Integrity Checking In Public Cloud | 42 | CTJV742 | Protecting Your Right: Verifiable Attribute-Based Keyword Serch With Fine-Grained Owner-Enforced Search Authorization In The Cloud |
43 | CTJV743 | Building An Intrusion Detection System Using A Filter-Based Feature Selection Algorithm | |
44 | CTJV744 | Connecting Social Media To E-Commerce: Cold-Start Product Recommendation Using Microblogging Information | |
45 | CTJV745 | Cyberbullying Detection Based On Semantic-Enhanced Marginalized Denoising Auto-Encoder | |
46 | CTJV746 | Domain-Sensitive Recommendation With User-Item Subgroup Analysis | |
47 | CTJV747 | Efficient Algorithms For Mining Top-K High Utility Itemsets | |
48 | CTJV748 | Efficient Cache-Supported Path Planning On Roads | |
49 | CTJV749 | Location Aware Keyword Query Suggestion Based On Document Proximity | |
50 | CTJV750 | Nearest Keyword Set Search In Multi-Dimensional Datasets | |
51 | CTJV751 | Answering Approximate Queries Over Xml Data | |
52 | CTJV752 | An Iterative Classification Scheme for Sanitizing Large-Scale Datasets | |
53 | CTJV753 | Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach | |
54 | CTJV754 | Collaborative Filtering-Based Recommendation of Online Social Voting | |
55 | CTJV755 | Computing Semantic Similarity of Concepts in Knowledge Graphs | |
56 | CTJV756 | Detecting Stress Based on Social Interactions in Social Networks | |
57 | CTJV757 | Dynamic Facet Ordering for Faceted Product Search Engines | |
58 | CTJV758 | Efficient Clue-based Route Search on Road Networks | |
59 | CTJV759 | Efficient Keyword-aware Representative Travel Route Recommendation | |
60 | CTJV760 | Energy-efficient Query Processing in Web Search Engines | |
61 | CTJV761 | Generating Query Facets using Knowledge Bases | |
62 | CTJV762 | Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach | |
63 | CTJV763 | l-Injection: Toward Effective Collaborative Filtering Using Uninteresting Items | |
64 | CTJV764 | Mining Competitors from Large Unstructured Datasets | |
65 | CTJV765 | Modeling Information Diffusion over Social Networks for Temporal Dynamic Prediction | |
66 | CTJV766 | Personal Web Revisitation by Context and Content Keywords with Relevance Feedback | |
67 | CTJV767 | PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks | |
68 | CTJV768 | QDA: A Query-Driven Approach to Entity Resolution | |
69 | CTJV769 | Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data | |
70 | CTJV770 | RAPARE: A Generic Strategy for Cold-Start Rating Prediction Problem | |
71 | CTJV771 | SociRank: Identifying and Ranking Prevalent News Topics Using Social Media Factors | |
72 | CTJV772 | Towards Real-Time, Country-Level Location Classification of Worldwide Tweets | |
73 | CTJV773 | Trajectory Community Discovery and Recommendation by Multi- source Diffusion Modeling | |
74 | CTJV774 | Understand Short Texts by Harvesting and Analyzing Semantic Knowledge | |
75 | CTJV775 | User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective | |
76 | CTJV776 | User-Centric Similarity Search | |
77 | CTJV777 | When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks | |
78 | CTJV778 | An Overlay Architecture for Throughput Optimal Multipath Routing | |
79 | CTJV779 | FaceChange: Attaining Neighbor Node Anonymity in Mobile Opportunistic Social Networks With Fine-Grained Control | |
80 | CTJV780 | Network Capability in Localizing Node Failures via End-to-End Path Measurements | |
81 | CTJV781 | Privacy and Integrity Preserving Top-k Query Processing for Two- Tiered Sensor Network | |
82 | CTJV782 | Routing in Accumulative Multi-Hop Networks | |
83 | CTJV783 | SWEET: Serving the Web by Exploiting Email Tunnels | |
84 | CTJV784 | Ipath: Path Inference In Wireless Sensor Networks | |
85 | CTJV785 | A Proxy-based Collaboration System to Minimize Content Download Time and Energy Consumption | |
86 | CTJV786 | Detecting Mobile Malicious Webpages in Real Time | |
87 | CTJV787 | Quantifying Interdependent Privacy Risks with Location Data | |
88 | CTJV788 | Searching Trajectories by Regions of Interest | |
89 | CTJV789 | SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks | |
90 | CTJV790 | Detecting Node Failures In Mobile Wireless Networks: A Probabilistic Approach | |
91 | CTJV791 | Energy And Memory Efficient Clone Detection In Wireless Sensor Networks | |
92 | CTJV792 | iASK: A Distributed Q&A System Incorporating Social Community and Global Collective Intelligence | |
93 | CTJV793 | A Credibility Analysis System for Assessing Information on twitter | |
94 | CTJV794 | Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems | |
95 | CTJV795 | FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data | |
96 | CTJV796 | My Privacy My Decision: Control of Photo Sharing on Online Social Networks | |
97 | CTJV797 | Privacy-Preserving Selective Aggregation of Online User Behavior Data | |
98 | CTJV798 | ProGuard: Detecting Malicious Accounts in Social-NetworkBased Online Promotions | |
99 | CTJV799 | Search Rank Fraud and Malware Detection in Google Play | |
100 | CTJV800 | Towards Detecting Compromised Accounts on Social Networks | |
101 | CTJV801 | Data Lineage In Malicious Environments | |
102 | CTJV802 | Frodo: Fraud Resilient Device For Off-Line Micro-Payments | |
103 | CTJV803 | Inference Attack On Browsing History Of Twitter | |
104 | CTJV804 | NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media | |
105 | CTJV805 | Preventing Distributed Denial-of-Service Flooding Attacks with Dynamic Path Identifiers | |
106 | CTJV806 | Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending | |
107 | CTJV807 | Privacy-Preserving Utility Verification Of The Data Published By Non-Interactive Differentially Private Mechanisms | |
108 | CTJV808 | A Distributed Publisher-Driven Secure Data Sharing Scheme for Information-Centric IoT | |
109 | CTJV809 | An Efficient and Fine-grained Big Data Access Control Scheme with Privacy-preserving Policy | |
110 | CTJV810 | Efficient and Privacy-preserving Polygons Spatial Query Framework for Location-based Services | |
111 | CTJV811 | Follow But No Track: Privacy Preserved Profile Publishing in Cyber-Physical Social Systems | |
112 | CTJV812 | SPFM: Scalable and Privacy-preserving Friend Matching in Mobile Cloud | |
113 | CTJV813 | Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud | |
114 | CTJV814 | SocialQ&A: An Online Social Network Based Question and Answer System | |
115 | CTJV815 | Automatic Generation of Social Event Storyboard from Image Click-through Data | |
116 | CTJV816 | Image Re-ranking based on Topic Diversity | |
117 | CTJV817 | Tri-Clustered Tensor Completion for Social-Aware Image Tag Refinement | |
118 | CTJV818 | A Scalable Approach For Content-Based Image Retrieval In Peer-To- Peer Networks | |
119 | CTJV819 | Two-Stage Friend Recommendation Based on Network Alignment and Series-Expansion of Probabilistic Topic Model | |
120 | CTJV820 | A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection | |
121 | CTJV821 | Improving Automated Bug Triaging with Specialized Topic Model | |
122 | CTJV822 | Collaborative Filtering Service Recommendation Based on a Novel Similarity Computation Method | |
123 | CTJV823 | Transactional Behavior Verification in Business Process as a Service Configuration |
S.No | Code | PROJECT TITLE Download Titles![]() |
Action |
---|---|---|---|
1 | CTJV701 | A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks | |
2 | CTJV702 | AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUTING | |
3 | CTJV703 | Booster in High Dimensional Data Classification | |
4 | CTJV704 | Building an intrusion detection system using a filter-based feature selection algorithm | |
5 | CTJV705 | Cloud Based Multimedia Content Protection System | |
6 | CTJV706 | Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email | |
7 | CTJV707 | Detecting Node Failures in Mobile Wireless Networks A Probabilistic Approach | |
8 | CTJV708 | Dynamic Job Ordering and Slot Configurations for Mapreduce Workloads | |
9 | CTJV709 | Efficient Algorithms for Mining Top-K High Utility Itemsets | |
10 | CTJV710 | Efficient Cache-Supported Path Planning on Roads | |
11 | CTJV711 | iPath Path Inference in Wireless Sensor Networks | |
12 | CTJV712 | Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates | |
13 | CTJV713 | Identity-Based Encryption with Outsourced Revocation in Cloud Computing | |
14 | CTJV714 | Key Updating for Leakage Resiliency With Application to AES Modes of Operation | |
15 | CTJV715 | CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System | |
16 | CTJV716 | Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds | |
17 | CTJV717 | Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage | |
18 | CTJV718 | Dynamic and Public Auditing with Fair Arbitration for Cloud Data | |
19 | CTJV719 | Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services | |
20 | CTJV720 | Geometric Range Search on Encrypted Spatial Data | |
21 | CTJV721 | Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud | |
22 | CTJV722 | Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud |
|
23 | CTJV723 | DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments | |
24 | CTJV724 | Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information | |
25 | CTJV725 | Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder | |
26 | CTJV726 | Location Aware Keyword Query Suggestion Based on Document Proximity | |
27 | CTJV727 | Energy and Memory Efficient Clone Detection in Wireless Sensor Networks | |
28 | CTJV728 | Data Lineage in Malicious Environments | |
29 | CTJV729 | FRoDO: Fraud Resilient Device for Off-Line Micro-Payments | |
30 | CTJV730 | Answering Approximate Queries Over XML Data | |
31 | CTJV731 | Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites | |
32 | CTJV732 | Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing | |
33 | CTJV733 | Domain-Sensitive Recommendation with User-Item Subgroup Analysis | |
34 | CTJV734 | Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata | |
35 | CTJV735 | Metamorphic Testing for Software Quality Assessment A Study of Search | |
36 | CTJV736 | Nearest Keyword Set Search in Multi dimensional Datasets | |
37 | CTJV737 | Quantifying Political Leaning from Tweets,Retweets, and Retweeters | |
38 | CTJV738 | Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption | |
39 | CTJV739 | DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud |
S.No | Code | PROJECT TITLE Download Titles![]() |
Action |
---|---|---|---|
1 | CTJV601 | SUBGRAPH MATCHING WITH SET SIMILARITY IN A LARGE GRAPH DATABASE | |
2 | CTJV602 | A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks | |
3 | CTJV603 | A Proximity-Aware Interest-Clustered P2P File Sharing System | |
4 | CTJV604 | A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud | |
5 | CTJV605 | Adaptive Network Coded Clouds | |
6 | CTJV606 | Automatic Test Packet Generation | |
7 | CTJV607 | A Computational Dynamic Trust Model for User Authorization | |
8 | CTJV608 | data mining with big data | |
9 | CTJV609 | Detecting Malicious Facebook Applications | |
10 | CTJV610 | Discovery of Ranking Fraud for Mobile Apps | |
11 | CTJV611 | FOCS- Fast Overlapped Community Search | |
12 | CTJV612 | Preserving Location Privacy in Geo-Social Applications | |
13 | CTJV613 | Efficient Prediction of Difficult Keyword Queries | |
14 | CTJV614 | Efficient and Privacy-Aware Data | 15 | CTJV615 | A Profit Maximization Scheme with Guaranteed |
16 | CTJV616 | A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems | |
17 | CTJV617 | A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data | |
18 | CTJV618 | Audit-Free Cloud Storage via Deniable Attribute-based Encryption | |
19 | CTJV619 | Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing | |
20 | CTJV620 | Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption | |
21 | CTJV621 | Provable Multicopy Dynamic Data Possession in Cloud Computing System | |
22 | CTJV622 | Secure Auditing and Deduplicating Data in Cloud | |
23 | CTJV623 | Stealthy Denial of Service Strategy in Cloud Computing | |
24 | CTJV624 | Best Keyword Cover Search | |
25 | CTJV625 | Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model | |
26 | CTJV626 | Progressive Duplicate Detection | |
27 | CTJV627 | A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks | |
28 | CTJV628 | A Proximity-Aware Interest-Clustered P2P File Sharing System | |
29 | CTJV629 | Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks | |
30 | CTJV630 | User-Defined Privacy Grid System for Continuous Location-Based Services | |
31 | CTJV631 | DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks | |
32 | CTJV632 | Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints | |
33 | CTJV633 | Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System | |
34 | CTJV634 | Real-Time Detection of Traffic From Twitter Stream Analysis | |
35 | CTJV635 | Privacy-Preserving Public Auditing for Regenerating Code-Based Cloud Storage | |
36 | CTJV636 | Context-Based Diversification for Keyword Queries Over XML Data | |
37 | CTJV637 | Malware Propagation in Large-Scale Networks | |
38 | CTJV638 | Tweet Segmentation and Its Application to Named Entity Recognition | |
39 | CTJV639 | An Attribute-assisted Reranking Model for Web Image Search | |
40 | CTJV640 | Steganography Using Reversible Texture Synthesis | |
41 | CTJV641 | YouTube Video Promotion by Cross-network | |
42 | CTJV642 | Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks | |
43 | CTJV643 | The Impact of View Histories on Edit Recommendations |
S.No | Code | PROJECT TITLE Download Titles![]() |
Action |
---|---|---|---|
1 | CTJV501 | Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud | |
2 | CTJV502 | A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud | |
3 | CTJV503 | Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation | |
4 | CTJV504 | Cloud Armor: Supporting Reputation-based Trust Management for Cloud Services | |
5 | CTJV505 | Friend book A Semantic-based Friend Recommendation System for Social Networks | |
6 | CTJV506 | EAACK—A Secure Intrusion-Detection | |
7 | CTJV507 | A Load Balancing Model Based on Cloud Partitioning | |
8 | CTJV508 | Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds | |
9 | CTJV509 | Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage | |
10 | CTJV510 | Fast nearest Neighbor Search with Keywords | |
11 | CTJV511 | Towards Online Shortest Path Computation | |
12 | CTJV512 | Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems | |
13 | CTJV513 | Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks | |
14 | CTJV514 | On the Security of Data Access Control | |
15 | CTJV515 | Supporting Privacy Protection in Personalized Web Search | |
16 | CTJV516 | Cloud Based SQL Query Processor | |
17 | CTJV517 | A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data | |
18 | CTJV518 | Crowd sourcing Predictors of Behavioral Outcomes | |
19 | CTJV519 | Comparable Entity Mining from Comparative Questions | |
20 | CTJV520 | Facilitating Effective User Navigation through Website Structure Improvement | |
21 | CTJV521 | Robust Module-based Data Management | |
22 | CTJV522 | Vampire attacks: Draining life from wireless ad-hoc sensor networks | |
23 | CTJV523 | Optimizing Cloud Resources for Delivering IPTV Services through Virtualization | |
24 | CTJV524 | A Dynamic Secure Group Sharing Framework in Public Cloud Computing | |
25 | CTJV525 | A Scalable Server Architecture for Mobile Presence Services in Social Network Applications | |
26 | CTJV526 | A System to Filter Unwanted Messages from OSN User Walls | |
27 | CTJV527 | Access Policy Consolidation for Event Processing Systems | |
28 | CTJV528 | AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds | |
29 | CTJV529 | Cloud computing for mobile users can offloading compution save energy | |
30 | CTJV530 | CloudMoV Cloud-based Mobile Social TV | |
31 | CTJV531 | Crowd sourcing Predictors of Behavioral Outcomes | |
32 | CTJV532 | Enforcing Secure and Privacy-Preserving | |
33 | CTJV533 | Extracting Spread-Spectrum Hidden Data from Digital Media | |
34 | CTJV534 | FoCUS: Learning to Crawl Web Forums | |
35 | CTJV535 | Fully Anonymous Profile Matching In Mobile Social Networks | |
36 | CTJV536 | Identity-Based Secure Distributed Data Storage | |
37 | CTJV537 | Mining Contracts for Business Events And Temporal Constraints in Service Engagements | |
38 | CTJV538 | Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud | |
39 | CTJV539 | PMSE A Personalized Mobile Search Engine | |
40 | CTJV540 | Price Differentiation for Communication Networks | |
41 | CTJV541 | Security and Privacy-Enhancing Multicloud Architectures | |
42 | CTJV542 | Sensitive Label Privacy Protection on Social | |
43 | CTJV543 | Supporting Privacy Protection in Personalized Web Search | |
44 | CTJV544 | Towards a Statistical Framework for Source Anonymity in Sensor Networks | |
45 | CTJV545 | Understanding the Performance and Potential of Cloud Computingfor Scientific Applications | |
46 | CTJV546 | Comparable Entity Mining from Comparative Questions |
© 2018-20 Conscience Technologies - All Rights Reserved