1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
IEEE-JAVA-2014-2015 TITLES
A Hybr id Cloud Approach for Secure Authorized Deduplication
A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using Map Red
A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Syst
Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
Distributed , Concurrent , and Independent Access to Encrypted Cloud Databases
Expressive , Efficient , and Revocable Data Access Control for Multi - Authority Cloud Storage
Key - Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
Performance and cost evaluation of an adaptive encryption architecture for cloud databases
Scalable Distributed Service Integrity Attestation for Software-as-a- Service Clouds
Towards Differential Query Services in Cost - Efficient Clouds
A Cocktail Approach for Travel Package Recommendation
A Super modularity-Based Differential Privacy Preserving Algorithm for Data Anonymization
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
BestPeer++: A Peer-to-Peer Based Large-Scale Data Processing Platform
Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
Data Mining with Big Data
Dealing With Concept Drifts in Process Mining
Discovering Emerging Topics in Social Streams via Link-Anomaly Detection
Efficient Prediction of Difficult Keyword Queries over Databases
Facilitating Document Annotation using Content and Querying Value
Fast Nearest Neighbor Search with Keywords
Incremental Affinity Propagation Clustering Based on Message Passing
Keyword Query Routing
Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
Online Feature Selection and Its Applications
Personalized Recommendation Combining User Interest and Social Circle
Privacy-Preserving Enhanced Collaborative Tagging
Decentralized Queue Balancing and Differentiated Service Scheme Based on Cooperative Control C
HALO: Hop-by-Hop Adaptive Link-State Optimal Routing
Optimized Multicast Routing Algorithm Based on Tree Structure in MANETs
Boundary Cutting for Packet Classi fication
Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
A System for Denial-of-Ser vice Attack Detection Based on Multivar iate Correlation Analysis
A Two-stage Deanonymization Attack Against Anonymized Social Networks
Behavioral Malware Detection in Delay Tolerant Networks
Enabling Trust worthy Service Evaluation in Service - Oriented Mobile Social Networks
Exploiting Service Similarity for Privacy in Location - Based Search Queries
Loca Ward : A Security and Privacy Aware Location - Based Rewarding System
On False Data - Injection Attacks against Power System State Estimation : Modeling and Counter m
The Client Assignment Problem for Continuous Distributed Interactive Applications: Analysis, Algo
The Design and Evaluation of An Information Sharing System for Human Networks
Traffic Pattern-Based Content leakage Detection for Trusted Content Delivery Networks
Captcha as Graphical PasswordsA New Security Primitive Based on Hard AI Problems
Efficient and Privacy - Aware Data Aggregation in Mobile Sensing
PROFILR: Toward Preserving Privacy and Functionality in Geosocial Networks
Top-k Query Result Completeness Verification in Tiered Sensor Networks
Web Service Recommendation via Exploiting Location and QoS Information
Privacy - Enhanced Web Service Composition
A Real-Time Adaptive Algorithm for Video Streaming over Multiple Wireless Access Networks
Catch Me If You Can Evaluating Android
Collaborative Policy Administration
Context-based Access Control Systems
Context-driven Prescription-Based Personal Activity
Cooperative Positioning and Tracking in Disruption Tolerant Networks
GreenDroid Automated Diagnosis of Energy Inefficiency for Smartphone Applications
Effective Risk Communication for Android Apps
MOSES Supporting and Enforcing Security
Hiding in the Mobile Crowd Location
DOMAIN
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Image Processing
Image Processing
Mobile Computing
Mobile Computing
Mobile Computing
Mobile Computing
Mobile Computing
Mobile Computing
Mobile Computing
Mobile Computing
Mobile Computing
Mobile Computing
Net Working
Net Working
Net Working
Net Working
Net Working
Net Working
Net Working
Parllel Distriuting System
Parllel Distriuting System
Parllel Distriuting System
Parllel Distriuting System
Parllel Distriuting System
Parllel Distriuting System
Parllel Distriuting System