Anda di halaman 1dari 5

S.

N
O
1

Project Title
SAE: Toward Efficient Cloud Data Analysis Service for LargeScale Social Networks
On Summarization and Timeline Generation for Evolutionary
Tweet Streams

Tech
JAVA
JAVA

Year

2015
2015
2015

A Secure and Dynamic Multi-keyword Ranked Search Scheme


over Encrypted Cloud Data

JAVA

EnDAS Efficient Encrypted Data Search as a Mobile Cloud


Service

JAVA

FRAppE: Detecting Malicious Facebook Applications

JAVA

2015
2015

Steganography Using Reversible Texture Synthesis


Smar tCrawler : A Two-stage Crawler for Efficiently Har vesting
Deep-Web Interfaces
Generating Searchable Public Key Ciphertexts with Hidden
Structures for Fast Keyword Search
Passive IP Traceback: Disclosing the Locations
of IP Spoofers From Path Backscatter
Route-Saver: Leveraging Route APIs for Accurate and Efficient
Query Processing at Location-Based Services
Public Integrity Auditing for Shared Dynamic Cloud Data with
Group User Revocation
Privacy Policy Inference of User-Uploaded Images on Content
Sharing Sites
A Distributed Three-hop Routing Protocol to Increase the Capacity
of Hybrid Wireless Networks
An Attribute-assisted Re ranking Model for Web Image Search
Authenticated Key Exchange Protocols for Parallel Network File
Systems
Cost-Aware SEcure Routing (CASER) Protocol Design for
Wireless Sensor Networks
Dynamic Routing for Data Integrity and Delay Differentiated
Services in Wireless Sensor Networks
EMR: A Scalable Graph-based Ranking Model for Content-based
Image Retrieval
A Lightweight Secure Scheme for Detecting Provenance Forgery
and Packet Drop Attacks in Wireless Sensor Networks
My Privacy My Decision: Control of Photo Sharing on Online
Social Networks
Software Puzzle: A Countermeasure to Resource-Inflated Denialof-Service Attacks
Tweet Segmentation and Its Application to Named Entity
Recognition
Opportunistic Routing Algorithm for Relay Node Selection in
Wireless Sensor Networks

JAVA

2015

7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23

JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA

2015
2015
2015

2015
2015
2015

2015
2015
2015

2015
2015
2015

2015
2015
2015

2015
2015

24

Privacy-Preserving and Truthful Detection of Packet Dropping


Attacks in Wireless Ad Hoc Networks

JAVA

25

Effective Key Management in Dynamic Wireless Sensor Networks

JAVA

27

Smartphone-Based Wound Assessment System for Patients With


Diabetes
Secure Auditing and Deduplicating Data in Cloud

28

Discovery of Ranking Fraud for Mobile Apps

JAVA

29

Secure Spatial Top-k Query Processing via Un trusted LocationBased Service Providers

JAVA

30

Enabling Cloud Storage Auditing With Key-Exposure Resistance

JAVA

26

31

Data Lineage in Malicious Environments

JAVA
JAVA

JAVA

32

Key-Aggregate Searchable Encryption (KASE) for


Group Data Sharing via Cloud Storage

JAVA

33

Provable Multicopy Dynamic Data Possession in


Cloud Computing Systems

JAVA

2015

2015
2015
2015
2015
2015
2015
2015
2015

2015

34

35

Anonymizing Collections of Tree-Structured Data


Maximizing P2P File Access Availability in Mobile Ad
Hoc Networks though Replication for Efficient File
Sharing

JAVA

2015
2015

JAVA
2015

36

Active Learning for Ranking through Expected Loss


Optimization

37

Privacy Preserving Ranked Multi-Keyword Search for


Multiple Data Owners in Cloud Computing

JAVA
2015

38

Tracking Temporal Community Strength in Dynamic Networks

JAVA
JAVA

2015
2015

39

Co-Extracting Opinion Targets and Opinion Words


from Online Reviews Based on the Word Alignment
Model

JAVA
2015

40

A Distortion-Resistant Routing Framework for Video


Traffic in Wireless Multihop Networks

JAVA
2015

41

A Scalable and Reliable Matching Service for ContentBased Publish/Subscribe Systems

JAVA
2015

42

Continuous and Transparent User Identity Verification


for Secure Internet Services

JAVA

2015
43

User Defined Privacy Grid System for Continuous


Location Based Services

44

On the security of data access control for


Multiauthority cloud storage system

45

Friend book A Semantic-based Friend


Recommendation System for Social Networks
Audit-Free Cloud Storage via Deniable Attributebased Encryption

JAVA
2015
JAVA
2015

46

JAVA
JAVA

2015
2015

47

k-Nearest Neighbor Classification over Semantically


Secure Encrypted Relational Data

JAVA
2015

48

TEES: An Efficient Search Scheme over Encrypted


Data on Mobile Cloud

JAVA
2015

49

Location-Aware and Personalized Collaborative


Filtering for Web Service Recommendation

JAVA
2015

50
51

A Profit Maximization Scheme with Guaranteed


Quality of Service in Cloud Computing
Progressive Duplicate Detection

JAVA
JAVA

2015
2015

52

Secure Distributed Deduplication Systems with


Improved Reliability

JAVA
2015

53

Context Based Access Control Systems for Mobile


Devices

JAVA

54

Combining Efficiency, Fidelity, and Flexibility in


Resource Information Services

JAVA

55

Context-Based Diversification for Keyword Queries


Over XML Data

JAVA

56

Towards Effective Bug Triage with Software Data


Reduction Techniques

57

Key recovery Attacks on KIDS, a Keyed Anomaly


Detection System

2015

2015

2015
JAVA
2015

58
59

Scalable Constrained Spectral Clustering


Best Keyword Cover Search

JAVA
JAVA
JAVA

2015
2015

2015
60

Understanding the Performance and Potential of


Cloud Computing for Scientific Applications

61

Adaptive Network Coded Clouds: High Speed


Downloads and Cost-Effective Version Control

62

Energy-Efficient Fault-Tolerant Data Storage and


Processing in Mobile Cloud

JAVA
2015
JAVA
2015

63

A Computational Dynamic Trust Model for User Authorization

JAVA
JAVA

64

An Authenticated Trust and Reputation Calculation and


Management System for Cloud and Sensor

JAVA

65

A secure data self destructing scheme in cloud computing

JAVA

66

A Time Efficient Approach for Detecting Errors in Big


Sensor Data on Cloud

JAVA

67

Group Key Agreement with Local Connectivity

JAVA

68
69

Sub graph Matching with Set Similarity in a Large Graph


Database
Cost-Effective Authentic and Anonymous Data Sharing
with Forward Security

JAVA
JAVA

2015
2015
2015
2015
2015
2015
2015
2015

70

Control Cloud Data Access Privilege and Anonymity


With Fully Anonymous Attribute-Based Encryption

JAVA
2015

71

Circuit Ciphertext-policy Attribute-based Hybrid


Encryption with Verifiable Delegation in Cloud
Computing

JAVA
2015

72

DDSGA: A Data-Driven Semi-Global Alignment


Approach for Detecting Masquerade Attacks

JAVA

73

YouTube Video Promotion by Cross-Network Association

JAVA

74

Learning to Rank Image Tags With Limited Training Examples

JAVA

75

CloudArmor: Supporting Reputation-based Trust Management for


Cloud Services

JAVA

76

Stealthy Denial of Service Strategy in Cloud Computing

JAVA

77

A Proximity-Aware Interest-Clustered P2P File Sharing System

JAVA

78
79

Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier


Detection
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud
Storage

JAVA
JAVA

2015
2015
2015
2015
2015
2015
2015

80

Identity-Based Encryption with Outsourced Revocation in Cloud


Computing

JAVA

81

Malware Propagation in Large-Scale Networks

JAVA

82

Innovative Schemes for Resource Allocation in the Cloud for Media


Streaming

JAVA

83

Task Trail An Effective Segmentation of User Search Behavior

JAVA

84

Energy-aware Load Balancing and Application Scaling for the Cloud

JAVA

85
86

87
88
89

Scalable architecture for multi user encrypted SQL operations on cloud


database services
A Secure Anti-Collusion Data Sharing Scheme for Dynamic
Groups in the Cloud
Efficient Notification of Meeting Points for Moving Groups
via Independent Safe Regions
T-Broker: A Trust-Aware Service Brokering Scheme for
Multiple Cloud Collaborative Services
Cooperative Load Balancing and Dynamic Channel
Allocation for Cluster Based MANETs

JAVA
JAVA
JAVA
JAVA
JAVA

90

Real-Time Detection of Traffic From Twitter Stream Analysis

JAVA

91

Cloud-Based Multimedia Content Protection System

JAVA

92

Secure Data Aggregation Technique for WSN in the Presence of


Collusion Attacks
Contributory Broadcast Encryption with Efficient Encryption and Short
Ciphertexts

JAVA
JAVA

2015
2015
2015
2015
2015
2015
2015
2015
2015
2015
2015
2015
2015
2015

Anda mungkin juga menyukai