Code | Project Title | Year |
---|---|---|
JCP01 | A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification | IEEE 2017-18 |
JCP02 | A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing | IEEE 2017-18 |
JCP03 | A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing | IEEE 2017-18 |
JCP04 | A System for Monitoring Hand Hygiene Compliance based-on Internet-of- Things | IEEE 2017-18 |
JCP05 | A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users | IEEE 2017-18 |
JCP06 | A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage | IEEE 2017-18 |
JCP07 | A robust reputation management mechanism in the federated cloud | IEEE 2017-18 |
JCP08 | Achieving Efficient and Secure Data Acquisition for Cloudsupported Internet of Things in Smart Grid | IEEE 2017-18 |
JCP09 | Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data | IEEE 2017-18 |
JCP10 | Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems | IEEE 2017-18 |
JCP11 | Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing | IEEE 2017-18 |
JCP12 | Efficient and Expressive Keyword Search Over Encrypted Data in Cloud | IEEE 2017-18 |
JCP13 | Fast Phrase Search for Encrypted Cloud Storage | IEEE 2017-18 |
JCP14 | Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds | IEEE 2017-18 |
JCP15 | Identity-Based Encryption with Cloud Revocation Authority and Its Applications | IEEE 2017-18 |
JCP16 | Identity-Based Private Matching over Outsourced Encrypted Datasets | IEEE 2017-18 |
JCP17 | Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage | IEEE 2017-18 |
JCP18 | On the Security of Data Access Control for Multi-authority Cloud Storage Systems | IEEE 2017-18 |
JCP19 | Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing | IEEE 2017-18 |
JCP20 | Privacy Protection based Access Control Scheme in Cloud-based Services | IEEE 2017-18 |
JCP21 | Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data | IEEE 2017-18 |
JCP22 | Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud | IEEE 2017-18 |
JCP23 | RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage | IEEE 2017-18 |
JCP24 | Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption | IEEE 2017-18 |
JCP25 | Securing Cloud Data under Key Exposure | IEEE 2017-18 |
JCP26 | TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud | IEEE 2017-18 |
JCP27 | TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud | IEEE 2017-18 |
JCP28 | Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving | IEEE 2017-18 |
Code | Project Title | Year |
---|---|---|
JDM01 | An Iterative Classification Scheme for Sanitizing Large-Scale Datasets | IEEE 2017-18 |
JDM02 | Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach | IEEE 2017-18 |
JDM03 | Collaborative Filtering-Based Recommendation of Online Social Voting | IEEE 2017-18 |
JDM04 | Computing Semantic Similarity of Concepts in Knowledge Graphs | IEEE 2017-18 |
JDM05 | Detecting Stress Based on Social Interactions in Social Networks | IEEE 2017-18 |
JDM06 | Dynamic Facet Ordering for Faceted Product Search Engines | IEEE 2017-18 |
JDM07 | Efficient Keyword-aware Representative Travel Route Recommendation | IEEE 2017-18 |
JDM08 | Energy-efficient Query Processing in Web Search Engines | IEEE 2017-18 |
JDM09 | Generating Query Facets using Knowledge Bases | IEEE 2017-18 |
JDM10 | Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach | IEEE 2017-18 |
JDM11 | l-Injection: Toward Effective Collaborative Filtering Using Uninteresting Items | IEEE 2017-18 |
JDM12 | Mining Competitors from Large Unstructured Datasets | IEEE 2017-18 |
JDM13 | Mining Competitors from Large Unstructured Datasets | IEEE 2017-18 |
JDM14 | Mining Competitors from Large Unstructured Datasets | IEEE 2017-18 |
JDM15 | Modeling Information Diffusion over Social Networks for Temporal Dynamic Prediction | IEEE 2017-18 |
JDM16 | Personal Web Revisitation by Context and Content Keywords with Relevance Feedback | IEEE 2017-18 |
JDM17 | PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks | IEEE 2017-18 |
JDM18 | QDA: A Query-Driven Approach to Entity Resolution | IEEE 2017-18 |
JDM19 | Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data | IEEE 2017-18 |
JDM20 | RAPARE: A Generic Strategy for Cold-Start Rating Prediction Problem | IEEE 2017-18 |
JDM21 | SociRank: Identifying and Ranking Prevalent News Topics Using Social Media Factors | IEEE 2017-18 |
JDM22 | Towards Real-Time, Country-Level Location Classification of Worldwide Tweets | IEEE 2017-18 |
JDM23 | Trajectory Community Discovery and Recommendation by Multisource Diffusion Modeling | IEEE 2017-18 |
JDM24 | Understand Short Texts by Harvesting and Analyzing Semantic Knowledge | IEEE 2017-18 |
JDM25 | User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective | IEEE 2017-18 |
JDM26 | User-Centric Similarity Search | IEEE 2017-18 |
JDM27 | When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks | IEEE 2017-18 |
Code | Project Title | Year |
---|---|---|
JNW01 | An Overlay Architecture for Throughput Optimal Multipath Routing | IEEE 2017-18 |
JNW02 | FaceChange: Attaining Neighbor Node Anonymity in Mobile Opportunistic Social Networks With Fine-Grained Control | IEEE 2017-18 |
JNW03 | Network Capability in Localizing Node Failures via End-to-End Path Measurements | IEEE 2017-18 |
JNW04 | Privacy and Integrity Preserving Top-k Query Processing for Two- Tiered Sensor Network | IEEE 2017-18 |
JNW05 | Routing in Accumulative Multi-Hop Networks | IEEE 2017-18 |
JNW06 | SWEET: Serving the Web by Exploiting Email Tunnels | IEEE 2017-18 |
Code | Project Title | Year |
---|---|---|
JMC01 | A Proxy-based Collaboration System to Minimize Content Download Time and Energy Consumption | IEEE 2017-18 |
JMC02 | Detecting Mobile Malicious Webpages in Real Time | IEEE 2017-18 |
JMC03 | Quantifying Interdependent Privacy Risks with Location Data | IEEE 2017-18 |
JMC04 | Searching Trajectories by Regions of Interest | IEEE 2017-18 |
JMC05 | SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks | IEEE 2017-18 |
Code | Project Title | Year |
---|---|---|
JSC01 | A Credibility Analysis System for Assessing Information on Twitter | IEEE 2017-18 |
JSC02 | Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems | IEEE 2017-18 |
JSC03 | FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data | IEEE 2017-18 |
JSC04 | My Privacy My Decision: Control of Photo Sharing on Online Social Networks | IEEE 2017-18 |
JSC05 | Privacy-Preserving Selective Aggregation of Online User Behavior Data | IEEE 2017-18 |
JSC06 | ProGuard: Detecting Malicious Accounts in Social-Network-Based Online Promotions | IEEE 2017-18 |
JSC07 | Search Rank Fraud and Malware Detection in Google Play | IEEE 2017-18 |
JSC08 | Towards Detecting Compromised Accounts on Social Networks | IEEE 2017-18 |
Code | Project Title | Year |
---|---|---|
JIFS01 | NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media | IEEE 2017-18 |
JIFS02 | Preventing Distributed Denial-of-Service Flooding Attacks with Dynamic Path Identifiers | IEEE 2017-18 |
JIFS03 | Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending | IEEE 2017-18 |
Code | Project Title | Year |
---|---|---|
JIOT01 | A Distributed Publisher-Driven Secure Data Sharing Scheme for Information-Centric IoT | IEEE 2017-18 |
JIOT02 | An Efficient and Fine-grained Big Data Access Control Scheme with Privacy-preserving Policy | IEEE 2017-18 |
JIOT03 | Efficient and Privacy-preserving Polygons Spatial Query Framework for Location-based Services | IEEE 2017-18 |
JIOT04 | Follow But No Track: Privacy Preserved Profile Publishing in Cyber-Physical Social Systems | IEEE 2017-18 |
JIOT05 | SPFM: Scalable and Privacy-preserving Friend Matching in Mobile Cloud | IEEE 2017-18 |
Code | Project Title | Year |
---|---|---|
JBD01 | Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud | IEEE 2017-18 |
JBD02 | SocialQ&A: An Online Social Network Based Question and Answer System | IEEE 2017-18 |
Code | Project Title | Year |
---|---|---|
JIP01 | Automatic Generation of Social Event Storyboard from Image Click-through Data | IEEE 2017-18 |
JIP02 | Image Re-ranking based on Topic Diversity | IEEE 2017-18 |
JIP03 | Tri-Clustered Tensor Completion for Social-Aware Image Tag Refinement | IEEE 2017-18 |