Please select a table from setting!
PROJECT CODEPROJECT TITLEPROJECT DOMAINDOWNLOAD PAPER
AND_1AGRICULTURE DECISION SUPPORT SYSTEMAndroidDOWNLOAD
AND_2Android Assist for Lecturer and StudentAndroidDOWNLOAD
AND_3Android Attack ApplicationAndroidDOWNLOAD
AND_4Athlete Meet guide(AMG)AndroidDOWNLOAD
AND_5Attendace and AssesmentAndroidDOWNLOAD
AND_6Blood bankAndroidDOWNLOAD
AND_7Builders Help(Construction Management)AndroidDOWNLOAD
AND_8Car PoolingAndroidDOWNLOAD
AND_9Car Service & RemainderAndroidDOWNLOAD
AND_10ChildcareAndroidDOWNLOAD
AND_11CONFERENCE HALL BOOKINGAndroidDOWNLOAD
AND_12COURIER SERVICE AUTOMATION SYSTEMAndroidDOWNLOAD
AND_13E-courseAndroidDOWNLOAD
AND_14Event ManagementAndroidDOWNLOAD
AND_15Event ReminderAndroidDOWNLOAD
AND_16Feeding the Poor from the SupermarketAndroidDOWNLOAD
AND_17Friend Mapper on Mobiles - Friend LocatorAndroidDOWNLOAD
AND_18GPS TRANSPORT PACKERS AND MOVERSAndroidDOWNLOAD
AND_19GRACE(Food waste management)AndroidDOWNLOAD
AND_20Grocery Shopping(Love And Care)AndroidDOWNLOAD
AND_21GST RATE FINDERAndroidDOWNLOAD
AND_22HealthcareAndroidDOWNLOAD
AND_23Indian ArmyAndroidDOWNLOAD
AND_24Intelligent Time Tracking SystemAndroidDOWNLOAD
AND_25Lecturer AssistAndroidDOWNLOAD
AND_26Location Based AlarmAndroidDOWNLOAD
AND_27MICRO CREDIT BANKING ON SMARTPHONEAndroidDOWNLOAD
AND_28News BlogAndroidDOWNLOAD
AND_29PAMENT REMAINDER ANDROID APPLICATIONAndroidDOWNLOAD
AND_30Parking ManagementAndroidDOWNLOAD
AND_31Police DiaryAndroidDOWNLOAD
AND_32Reality Shows Ticket Booking SystemsAndroidDOWNLOAD
AND_33Rescuse ManagemetAndroidDOWNLOAD
AND_34Shopping mallAndroidDOWNLOAD
AND_35TRAFFIC UPDATES AND AWARENESSAndroidDOWNLOAD
AND_36TAXI APPSAndroidDOWNLOAD
AND_37Time TableAndroidDOWNLOAD
AND_38Toll calculatorAndroidDOWNLOAD
AND_39Bank Loan AgentsAndroidDOWNLOAD
AND_40Budget Home DesignAndroidDOWNLOAD
AND_41Home Applies Warranty RemainderAndroidDOWNLOAD
AND_42House Rent Management SystemAndroidDOWNLOAD
AND_43Voyage Management SystemAndroidDOWNLOAD
AND_44Micro Credit Banking On SmartphoneAndroidDOWNLOAD
AND_45Nearby LocationsAndroidDOWNLOAD
AND_46Nearest Shopping Location Identification SystemsAndroidDOWNLOAD
AND_47Reality Shows Ticket Booking SystemsAndroidDOWNLOAD
AND_48Taxi BookingAndroidDOWNLOAD
AND_49Fertilizer management systemAndroidDOWNLOAD
AND_50MechanicaAndroidDOWNLOAD
AND_51Nearest ATMÕs FinderAndroidDOWNLOAD
AND_52Nearest Petrol bunk FinderAndroidDOWNLOAD
JVWB_1Datamart Management SystemJAVA WEB BASEDDOWNLOAD
JVWB_2Exposure Of Suspicious EmailJAVA WEB BASEDDOWNLOAD
JVWB_3Online Attendance Management SystemJAVA WEB BASEDDOWNLOAD
JVWB_4Online ExaminationsJAVA WEB BASEDDOWNLOAD
JVWB_5Online Job PortalJAVA WEB BASEDDOWNLOAD
JVWB_6Online Library Management SystemJAVA WEB BASEDDOWNLOAD
JVWB_7Student Counseling Management SystemJAVA WEB BASEDDOWNLOAD
JVWB_8Car Rental SystemJAVA WEB BASEDDOWNLOAD
JVWB_9E-LearningJAVA WEB BASEDDOWNLOAD
JVWB_10E-PostalJAVA WEB BASEDDOWNLOAD
JVWB_11Multi Search SystemJAVA WEB BASEDDOWNLOAD
JVWB_12Hospital Management SystemJAVA WEB BASEDDOWNLOAD
JVWB_13Online City GuideJAVA WEB BASEDDOWNLOAD
JVWB_14Group Examination ProcessJAVA WEB BASEDDOWNLOAD
JVWB_15Citizen Services Management SystemJAVA WEB BASEDDOWNLOAD
JVWB_16Student Information SystemJAVA WEB BASEDDOWNLOAD
JVWB_17Online InsuranceJAVA WEB BASEDDOWNLOAD
JVWB_18Online BankingJAVA WEB BASEDDOWNLOAD
JVWB_19E-Shopping MallJAVA WEB BASEDDOWNLOAD
JVWB_20Easy Movie Ticket BookingJAVA WEB BASEDDOWNLOAD
JVWB_21E-Time TableJAVA WEB BASEDDOWNLOAD
JVWB_22Hotel ManagementJAVA WEB BASEDDOWNLOAD
JVWB_23Hostel ManagementJAVA WEB BASEDDOWNLOAD
JVWB_24Data Security Using Images Voyage Management SystemJAVA WEB BASEDDOWNLOAD
JVWB_25Crowdsourcing Predictors Of Behavioral OutcomesJAVA WEB BASEDDOWNLOAD
JVWB_26Filter Unwanted Messages From Osn User WallsJAVA WEB BASEDDOWNLOAD
JVWB_27Friendbook: A Semantic-Based Friend Recommendation System For Social NetworksJAVA WEB BASEDDOWNLOAD
JVWB_28Security Evaluation Of Pattern Classifiers Under AttackJAVA WEB BASEDDOWNLOAD
JVWB_29Cloudqual A Quality Model For Cloud ServicesJAVA WEB BASEDDOWNLOAD
JVWB_30A Hybrid Cloud Approach For Secure Authorized In CloudJAVA WEB BASEDDOWNLOAD
JVWB_31Secure Auditing And Deduplicating Data In CloudJAVA WEB BASEDDOWNLOAD
JVWB_32Towards Differential Query Services In Cost-Efficient CloudsJAVA WEB BASEDDOWNLOAD
JVWB_33Privacy Policy Inference Of User-Uploaded Images On Content Sharing SitesJAVA WEB BASEDDOWNLOAD
JVWB_34Audit-Free Cloud Storage Via Deniable Attribute-Based EncryptionJAVA WEB BASEDDOWNLOAD
JVWB_35Cloud-Based Multimedia Content Protection SystemJAVA WEB BASEDDOWNLOAD
JVWB_36Structured Learning From Heterogeneous Behavior for Social Identity LinkageJAVA WEB BASEDDOWNLOAD
JVWB_37Captcha As Graphical PasswordJAVA WEB BASEDDOWNLOAD
JVWB_38Competition And Cooperation Among Cloud ProvidersJAVA WEB BASEDDOWNLOAD
JVWB_39Control Cloud Data Access Privilege And Anonymity With Fully Anonymous Attribute-Based EncryptionJAVA WEB BASEDDOWNLOAD
JVWB_40Cloudarmor: Supporting Reputation-Based Trust Management For Cloud ServicesJAVA WEB BASEDDOWNLOAD
JVWB_41Multikeyword Ranked SearchJAVA WEB BASEDDOWNLOAD
JVWB_42An Efficient Privacy-Preserving Ranked Keyword Search MethodJAVA WEB BASEDDOWNLOAD
JVWB_43Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption With Verifiable Delegation In Cloud ComputingJAVA WEB BASEDDOWNLOAD
JVWB_44Dual-Server Public-Key Encryption With Keyword SearchJAVA WEB BASEDDOWNLOAD
JVWB_45Location Aware Keyword Query SuggestionJAVA WEB BASEDDOWNLOAD
JVWB_46Secure data sharing In Dynamic GroupsJAVA WEB BASEDDOWNLOAD
JVWB_47Connecting E-Commerce And Social MediaJAVA WEB BASEDDOWNLOAD
JVWB_48Detecting Malicious Facebook ApplicationsJAVA WEB BASEDDOWNLOAD
JVWB_49Secure Location Sharing ApplicationJAVA WEB BASEDDOWNLOAD
JVWB_50My Privacy My Decision: Control of Photo Sharing on Online Social NetworksJAVA WEB BASEDDOWNLOAD
JVWB_51Railway Management SystemJAVA WEB BASEDDOWNLOAD
JVWB_52District collector managementJAVA WEB BASEDDOWNLOAD
JVWB_53Find Nearest Hotels and mall detailsJAVA WEB BASEDDOWNLOAD
JVWB_54E-Voting SystemJAVA WEB BASEDDOWNLOAD
JVWB_55Online venue booking systemJAVA WEB BASEDDOWNLOAD
JVWB_56Secure Data Sharing In Adhoc NetworkJAVA WEB BASEDDOWNLOAD
JVWB_57Online grievance redressal systemJAVA WEB BASEDDOWNLOAD
JVWB_58A Web Portal for Drinking Water Details SystemJAVA WEB BASEDDOWNLOAD
JVWB_59CONFERENCE ROOM BOOKING SYSTEMJAVA WEB BASEDDOWNLOAD
JVWB_60Bus Reservation SystemJAVA WEB BASEDDOWNLOAD
JVWB_61A Secure Data Forwarding in Cloud Storage System using Threshold Proxy Re-Encryption schemeJAVA WEB BASEDDOWNLOAD
JVWB_62ABE Technique in cloudJAVA WEB BASEDDOWNLOAD
JVWB_63Providing security By Using EncryptionJAVA WEB BASEDDOWNLOAD
JVWB_64Public Key encryption for cloud Using two serversJAVA WEB BASEDDOWNLOAD
JVWB_65Avoiding deduplication of data in cloudJAVA WEB BASEDDOWNLOAD
JVWB_66Government scheme Managment SystemJAVA WEB BASEDDOWNLOAD
JVWB_67Reporting Online Media News SystemsJAVA WEB BASEDDOWNLOAD
JVWB_68Modern Agriculture Development SystemJAVA WEB BASEDDOWNLOAD
JVWB_69Management System in Metro TrainJAVA WEB BASEDDOWNLOAD
JVWB_70Efficient Information Retrieval Using Ranked Query (EIRQ)JAVA WEB BASEDDOWNLOAD
JVWB_71LEAVE MANAGEMENT SYSTEM FOR MNCJAVA WEB BASEDDOWNLOAD
JVWB_72Cricket Stadium Seat BookingJAVA WEB BASEDDOWNLOAD
JVWB_73Car Care Management SystemJAVA WEB BASEDDOWNLOAD
JVWB_74Embedded Images and text for securityJAVA WEB BASEDDOWNLOAD
JVWB_75Advance Health Care SystemJAVA WEB BASEDDOWNLOAD
JVWB_76Rural Area Educational Trouble ShooterJAVA WEB BASEDDOWNLOAD
JVWB_77Job fair section processJAVA WEB BASEDDOWNLOAD
JVWB_78Cloud Storage Public Digital CertificateJAVA WEB BASEDDOWNLOAD
JVWB_79Moblie App fraud Detection SystemJAVA WEB BASEDDOWNLOAD
JVWB_80Online medical saleJAVA WEB BASEDDOWNLOAD
JVWB_81A novel recommendation model with user trust and item ratingsJAVA WEB BASEDDOWNLOAD
JVWB_82Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder?JAVA WEB BASEDDOWNLOAD
JVWB_83SmartCrawler A Two-stage CrawlerJAVA WEB BASEDDOWNLOAD
JVWB_84A Proxy based Collaboration System to Minimize Content Download Time and Energy ConsumptionJAVA WEB BASEDDOWNLOAD
JVWB_85Detecting Stress Based on Social Interactions in Social NetworksJAVA WEB BASEDDOWNLOAD
JVWB_86Collectorate Management SystemJAVA WEB BASEDDOWNLOAD
JVWB_87Management system in metro trainJAVA WEB BASEDDOWNLOAD
JVWB_88Improving rural communities health care systemJAVA WEB BASEDDOWNLOAD
JVWB_89Leave management system for MNCJAVA WEB BASEDDOWNLOAD
JVWB_90Advance web based multimedia answer generationJAVA WEB BASEDDOWNLOAD
JVWB_91Multimedia content protection systemJAVA WEB BASEDDOWNLOAD
JVWB_92Developing rural economyJAVA WEB BASEDDOWNLOAD
JVWB_93E-tuoter modern education systemJAVA WEB BASEDDOWNLOAD
JVWB_94cryptography key exchange authenticationJAVA WEB BASEDDOWNLOAD
JVWB_95courier tracking (Advance courier service)JAVA WEB BASEDDOWNLOAD
JVWB_96prison management systemJAVA WEB BASEDDOWNLOAD
JVWB_97Homeopathy treatment and health recordsJAVA WEB BASEDDOWNLOAD
JVWB_98Miliatary rental Equipment systemJAVA WEB BASEDDOWNLOAD
JVWB_99Tollgate managementJAVA WEB BASEDDOWNLOAD
JVWB_100Forensic managerJAVA WEB BASEDDOWNLOAD
JVWB_101Moderate Robotics with Public OpinionJAVA WEB BASEDDOWNLOAD
JVWB_102Forestry management systemJAVA WEB BASEDDOWNLOAD
JVWB_103Friednz AvenueJAVA WEB BASEDDOWNLOAD
IEEEJV_1A New Lightweight Symmetric Searchable Encryption Scheme For String IdentificationCloud ComputingDOWNLOAD
IEEEJV_2SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the CloudCloud ComputingDOWNLOAD
IEEEJV_3SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud StorageCloud ComputingDOWNLOAD
IEEEJV_4Semantic-aware Searching over Encrypted Data for Cloud ComputingCloud ComputingDOWNLOAD
IEEEJV_5Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in CloudCloud ComputingDOWNLOAD
IEEEJV_6An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over Encrypted Cloud DataCloud ComputingDOWNLOAD
IEEEJV_7Audit-Free Cloud Storage via Deniable Attribute-based EncryptionCloud ComputingDOWNLOAD
IEEEJV_8Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud ComputingCloud ComputingDOWNLOAD
IEEEJV_9Chaotic Searchable Encryption for Mobile Cloud StorageCloud ComputingDOWNLOAD
IEEEJV_10CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud ForensicsCloud ComputingDOWNLOAD
IEEEJV_11Combining Data Owner-side and Cloud-side Access Control for Encrypted Cloud StorageCloud ComputingDOWNLOAD
IEEEJV_12CryptCloud+: Secure and Expressive Data Access Control for Cloud StorageCloud ComputingDOWNLOAD
IEEEJV_13DROPS: Division and Replication of Data in Cloud for Optimal Performance and SecurityCloud ComputingDOWNLOAD
IEEEJV_14Efficient and Expressive Keyword Search Over Encrypted Data in CloudCloud ComputingDOWNLOAD
IEEEJV_15Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile DevicesCloud ComputingDOWNLOAD
IEEEJV_16Efficient Retrieval over Documents Encrypted by Attributes in Cloud ComputingCloud ComputingDOWNLOAD
IEEEJV_17Efficient Traceable Authorization Search System for Secure Cloud StorageCloud ComputingDOWNLOAD
IEEEJV_18Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud StorageCloud ComputingDOWNLOAD
IEEEJV_19Identity-Based Private Matching over Outsourced Encrypted DatasetsCloud ComputingDOWNLOAD
IEEEJV_20Inference Attack-Resistant E-Healthcare Cloud System with Fine-Grained Access ControlCloud ComputingDOWNLOAD
IEEEJV_21Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud StorageCloud ComputingDOWNLOAD
IEEEJV_22Privacy Preservation for Outsourced Medical Data With Flexible Access ControlCloud ComputingDOWNLOAD
IEEEJV_23Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data SharingCloud ComputingDOWNLOAD
IEEEJV_24Provably Secure Fine-Grained Data Access Control over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare ApplicationsCloud ComputingDOWNLOAD
IEEEJV_25Publicly Verifiable Boolean Query Over Outsourced Encrypted DataCloud ComputingDOWNLOAD
IEEEJV_26Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud StorageCloud ComputingDOWNLOAD
IEEEJV_27Secure Data Group Sharing and Dissemination with Attribute and Time Conditions in Public CloudCloud ComputingDOWNLOAD
IEEEJV_28Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in CloudCloud ComputingDOWNLOAD
IEEEJV_29Semantic-aware Searching over Encrypted Data for Cloud ComputingCloud ComputingDOWNLOAD
IEEEJV_30SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud StorageCloud ComputingDOWNLOAD
IEEEJV_31SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the CloudCloud ComputingDOWNLOAD
IEEEJV_32Towards Privacy-preserving Content-based Image Retrieval in Cloud ComputingCloud ComputingDOWNLOAD
IEEEJV_33Unified Fine-grained Access Control for Personal Health Records in Cloud ComputingCloud ComputingDOWNLOAD
IEEEJV_34A Cross Tenant Access Control ( CTAC) Model for Cloud Computing: Formal Specification and VerificationCloud ComputingDOWNLOAD
IEEEJV_35A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud ComputingCloud ComputingDOWNLOAD
IEEEJV_36A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its UsersCloud ComputingDOWNLOAD
IEEEJV_37A robust reputation management mechanism in the federated cloudCloud ComputingDOWNLOAD
IEEEJV_38Achieving secure, universal, and fine-grained query results verificationCloud ComputingDOWNLOAD
IEEEJV_39Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud ComputingCloud ComputingDOWNLOAD
IEEEJV_40Efficient and Expressive Keyword Search Over Encrypted Data in CloudCloud ComputingDOWNLOAD
IEEEJV_41Identity-Based Data Outsourcing with Comprehensive Auditing in CloudsCloud ComputingDOWNLOAD
IEEEJV_42Identity-Based Encryption with Cloud Revocation Authority and Its ApplicationsCloud ComputingDOWNLOAD
IEEEJV_43Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud StorageCloud ComputingDOWNLOAD
IEEEJV_44Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data SharingCloud ComputingDOWNLOAD
IEEEJV_45Privacy Protection based Access Control Scheme in Cloud-based ServicesCloud ComputingDOWNLOAD
IEEEJV_46Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud DataCloud ComputingDOWNLOAD
IEEEJV_47Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the CloudCloud ComputingDOWNLOAD
IEEEJV_48Authorities for Public Cloud StorageCloud ComputingDOWNLOAD
IEEEJV_49Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based EncryptionCloud ComputingDOWNLOAD
IEEEJV_50Securing Cloud Data under Key ExposureCloud ComputingDOWNLOAD
IEEEJV_51TEES: An Efficient Search Scheme over Encrypted Data on Mobile CloudCloud ComputingDOWNLOAD
IEEEJV_52A Secure and Dynamic Multi-Keyword Ranked search scheme over encrypted cloud dataCloud ComputingDOWNLOAD
IEEEJV_53Flexible and Fine-Grained Attribute-Based Data Storage in Cloud ComputingCloud ComputingDOWNLOAD
IEEEJV_54An Efficient Privacy-Preserving Ranked Keyword Search MethodCloud ComputingDOWNLOAD
IEEEJV_55An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud ComputingCloud ComputingDOWNLOAD
IEEEJV_56Delegation in Cloud ComputingCloud ComputingDOWNLOAD
IEEEJV_57A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the CloudCloud ComputingDOWNLOAD
IEEEJV_58CloudArmor: Supporting Reputation-Based Trust Management for Cloud ServicesCloud ComputingDOWNLOAD
IEEEJV_59Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud EmailCloud ComputingDOWNLOAD
IEEEJV_60DiploCloud: Efficient and Scalable Management of RDF Data in the CloudCloud ComputingDOWNLOAD
IEEEJV_61Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud StorageCloud ComputingDOWNLOAD
IEEEJV_62Dynamic and Public Auditing with Fair Arbitration for Cloud DataCloud ComputingDOWNLOAD
IEEEJV_63Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key UpdatesCloud ComputingDOWNLOAD
IEEEJV_64Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing ServicesCloud ComputingDOWNLOAD
IEEEJV_65Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public CloudCloud ComputingDOWNLOAD
IEEEJV_66Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public CloudCloud ComputingDOWNLOAD
IEEEJV_67Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based EncryptionCloud ComputingDOWNLOAD
IEEEJV_68Efficient and Privacy-Aware Data Aggregation in Mobile SensingCloud ComputingDOWNLOAD
IEEEJV_69SecRBAC: Secure data in the CloudsCloud ComputingDOWNLOAD
IEEEJV_70DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User EnvironmentsCloud ComputingDOWNLOAD
IEEEJV_71Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based EncryptionCloud ComputingDOWNLOAD
IEEEJV_72TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud StorageCloud ComputingDOWNLOAD
IEEEJV_73Crowdsourcing Predictors of Behavioral OutcomesCloud ComputingDOWNLOAD
IEEEJV_74cloudqual a quality model for cloud servicesCloud ComputingDOWNLOAD
IEEEJV_75A Hybrid Cloud Approach for Secure Authorized In CloudCloud ComputingDOWNLOAD
IEEEJV_76Secure Auditing and Deduplicating Data in CloudCloud ComputingDOWNLOAD
IEEEJV_77AUDIT-FREE CLOUD STORAGE VIA DENIABLE ATTRIBUTE-BASED ENCRYPTIONCloud ComputingDOWNLOAD
IEEEJV_78A Novel Model for Competition and Cooperation Among Cloud ProvidersCloud ComputingDOWNLOAD
IEEEJV_79Characterizing and Predicting Early Reviewers for Effective Product Marketing on E-Commerce WebsitesData miningDOWNLOAD
IEEEJV_80CoDetect: Financial Fraud Detection With Anomaly Feature DetectionData miningDOWNLOAD
IEEEJV_81Complementary Aspect-based Opinion MiningData miningDOWNLOAD
IEEEJV_82Emotion Recognition on Twitter: Comparative Study and Training a Unison ModelData miningDOWNLOAD
IEEEJV_83Frequent Itemsets Mining With Differential Privacy Over Large-Scale DataData miningDOWNLOAD
IEEEJV_84Health Monitoring on Social Media over TimeData miningDOWNLOAD
IEEEJV_85l-Injection: Toward Effective Collaborative Filtering Using Uninteresting ItemsData miningDOWNLOAD
IEEEJV_86On Generalizing Collective Spatial Keyword QueriesData miningDOWNLOAD
IEEEJV_87Online Product QuantizationData miningDOWNLOAD
IEEEJV_88Privacy Characterization and Quantification in Data PublishingData miningDOWNLOAD
IEEEJV_89Road Traffic Speed Prediction: A Probabilistic Model Fusing Multi-Source DataData miningDOWNLOAD
IEEEJV_90Scalable Content-Aware Collaborative Filtering for Location RecommendationData miningDOWNLOAD
IEEEJV_91SDE: A Novel Clustering Framework Based on Sparsity-Density EntropyData miningDOWNLOAD
IEEEJV_92Search Result Diversity Evaluation based on Intent HierarchiesData miningDOWNLOAD
IEEEJV_93When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social NetworksData miningDOWNLOAD
IEEEJV_94Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling ApproachData miningDOWNLOAD
IEEEJV_95Collaborative Filtering-Based Recommendation of Online Social VotingData miningDOWNLOAD
IEEEJV_96Detecting Stress Based on Social Interactions in Social NetworksData miningDOWNLOAD
IEEEJV_97Dynamic Facet Ordering for Faceted Product Search EnginesData miningDOWNLOAD
IEEEJV_98Efficient Keyword-aware Representative Travel Route RecommendationData miningDOWNLOAD
IEEEJV_99SociRank: Identifying and Ranking Prevalent News Topics Using Social Media FactorsData miningDOWNLOAD
IEEEJV_100RAPARE: A Generic Strategy for Cold-Start Rating Prediction ProblemData miningDOWNLOAD
IEEEJV_101SociRank: Identifying and Ranking Prevalent News Topics Using Social Media FactorsData miningDOWNLOAD
IEEEJV_102User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network PerspectiveData miningDOWNLOAD
IEEEJV_103An Iterative Classification Scheme for Sanitizing Large scale DatasetsData miningDOWNLOAD
IEEEJV_104Computing Semantic Similarity of Concepts in Knowledge GraphsData miningDOWNLOAD
IEEEJV_105Influence Maximization in Trajectory DatabasesData miningDOWNLOAD
IEEEJV_106Personal web re visitation by context &content keyword with relevance feedbackData miningDOWNLOAD
IEEEJV_107User Vitality Ranking and Prediction in Social Networking ServicesData miningDOWNLOAD
IEEEJV_108A Novel Recommendation Model Regularized with User Trust and Item RatingsData miningDOWNLOAD
IEEEJV_109Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Micro blogging InformationData miningDOWNLOAD
IEEEJV_110Crowdsourcing for Top-K Query Processing over Uncertain DataData miningDOWNLOAD
IEEEJV_111Efficient Cache-Supported Path Planning on RoadsData miningDOWNLOAD
IEEEJV_112Nearest Keyword Set Search in Multi-Dimensional DatasetsData miningDOWNLOAD
IEEEJV_113A Novel Recommendation Model Regularized with User Trust and Item RatingsData miningDOWNLOAD
IEEEJV_114Rating Prediction based on Social Sentiment from Textual ReviewsData miningDOWNLOAD
IEEEJV_115Location Aware Keyword Query Suggestion Based on Document ProximityData miningDOWNLOAD
IEEEJV_116A System to Filter Unwanted Messages from OSN User WallsData miningDOWNLOAD
IEEEJV_117Security Evaluation of Pattern Classifiers under AttackData miningDOWNLOAD
IEEEJV_118Towards Differential Query Services in Cost-Efficient CloudsData miningDOWNLOAD
IEEEJV_119Structured Learning from Heterogeneous Behavior for Social Identity LinkageData miningDOWNLOAD
IEEEJV_120A Comprehensive Study on Social Network Mental Disorders Detection via Online Social Media MiningMACHINE LEARNINGDOWNLOAD
IEEEJV_121A Credibility Analysis System for Assessing Information on TwitterMACHINE LEARNINGDOWNLOAD
IEEEJV_122A Novel Machine Learning Algorithm for Spammer Identification in Industrial Mobile Cloud ComputingMACHINE LEARNINGDOWNLOAD
IEEEJV_123Credit Card Fraud Detection Using AdaBoost and Majority VotingMACHINE LEARNINGDOWNLOAD
IEEEJV_124Hate Speech on Twitter: A Pragmatic Approach to Collect Hateful and Offensive Expressions and Perform Hate Speech DetectionMACHINE LEARNINGDOWNLOAD
IEEEJV_125Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion DetectionMACHINE LEARNINGDOWNLOAD
IEEEJV_126Supervised and Unsupervised Aspect Category Detection for Sentiment Analysis With Co-Occurrence DataMACHINE LEARNINGDOWNLOAD
IEEEJV_127Using Data Mining to Predict Hospital Admissions From the Emergency DepartmentMACHINE LEARNINGDOWNLOAD
IEEEJV_128Energy Efficient Link-Delay Aware Routing in Wireless Sensor NetworksNETWORKINGDOWNLOAD
IEEEJV_129GeTrust: A guarantee-based trust model in Chord-based P2P networksNETWORKINGDOWNLOAD
IEEEJV_130PROVEST: Provenance-based Trust Model for Delay Tolerant NetworksNETWORKINGDOWNLOAD
IEEEJV_131Traffic and Energy Aware Routing for Heterogeneous Wireless Sensor NetworksNETWORKINGDOWNLOAD
IEEEJV_132An Overlay Architecture for Throughput Optimal Multipath RoutingNETWORKINGDOWNLOAD
IEEEJV_133Network Capability in Localizing Node Failures via End-to-End Path MeasurementsNETWORKINGDOWNLOAD
IEEEJV_134Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor NetworkNETWORKINGDOWNLOAD
IEEEJV_135STAMP Enabling Privacy- Preserving Location Proofs for Mobile UsersNETWORKINGDOWNLOAD
IEEEJV_136Building an intrusion detection system using a filter-based feature selection algorithmNETWORKINGDOWNLOAD
IEEEJV_137iPath Path Inference in Wireless Sensor NetworksNETWORKINGDOWNLOAD
IEEEJV_138Detecting malicious facebook applicationsNETWORKINGDOWNLOAD
IEEEJV_139Social Friend Recommendation Based on Multiple Network CorrelationNETWORKINGDOWNLOAD
IEEEJV_140Resolving Multi-party Privacy Conflicts in Social MediaNETWORKINGDOWNLOAD
IEEEJV_141Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor NetworksNETWORKINGDOWNLOAD
IEEEJV_142Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc NetworksNETWORKINGDOWNLOAD
IEEEJV_143Friendbook: A Semantic-based Friend Recommendation System for Social NetworksNETWORKINGDOWNLOAD
IEEEJV_144Analyzing and Detecting Money-Laundering Accounts in Online Social NetworksNETWORKINGDOWNLOAD
IEEEJV_145Detection of suicide-related posts in Twitter data streamsSOCIAL NETWORKINGDOWNLOAD
IEEEJV_146Risk Assessment in Social Networks based on User Anomalous BehavioursSOCIAL NETWORKINGDOWNLOAD
IEEEJV_147Segregating Spammers and Unsolicited Bloggers from Genuine Experts on TwitterSOCIAL NETWORKINGDOWNLOAD
IEEEJV_148Semi-Supervised Spam Detection in Twitter StreamSOCIAL NETWORKINGDOWNLOAD
IEEEJV_149Distributed Faulty Node Detection in Delay Tolerant Networks: Design and AnalysisMobile ComputingDOWNLOAD
IEEEJV_150Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing ServicesMobile ComputingDOWNLOAD
IEEEJV_151Identifying On-site Users for Social Events: Mobility, Content, and Social RelationshipMobile ComputingDOWNLOAD
IEEEJV_152Protecting Location Privacy for Task Allocation in Ad Hoc Mobile Cloud ComputingMobile ComputingDOWNLOAD
IEEEJV_153A Proxy-based Collaboration System to Minimize Content Download Time and Energy ConsumptionMobile ComputingDOWNLOAD
IEEEJV_154Detecting Mobile Malicious Webpages in Real TimeMobile ComputingDOWNLOAD
IEEEJV_155Quantifying Interdependent Privacy Risks with Location DataMobile ComputingDOWNLOAD
IEEEJV_156A Hybrid Approach for Detecting Automated Spammers in TwitterSecure ComputingDOWNLOAD
IEEEJV_157A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social NetworkSecure ComputingDOWNLOAD
IEEEJV_158Anonymization of Sensitive Quasi-Identifiers for l-Diversity and t-ClosenessSecure ComputingDOWNLOAD
IEEEJV_159Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social NetworksSecure ComputingDOWNLOAD
IEEEJV_160Exploiting Social Network to Enhance Human-to-Human Infection Analysis Without Privacy LeakageSecure ComputingDOWNLOAD
IEEEJV_161My Privacy My Decision: Control of Photo Sharing on Online Social NetworksSecure ComputingDOWNLOAD
IEEEJV_162Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing SystemsSecure ComputingDOWNLOAD
IEEEJV_163Privacy-Preserving Selective Aggregation of Online User Behavior DataSecure ComputingDOWNLOAD
IEEEJV_164ProGuard: Detecting Malicious Accounts in Social-Network-Based Online PromotionsSecure ComputingDOWNLOAD
IEEEJV_165Towards Detecting Compromised Accounts on Social NetworksSecure ComputingDOWNLOAD
IEEEJV_166A Multilevel Access Control Scheme for Data Security in Transparent ComputingSecure ComputingDOWNLOAD
IEEEJV_167Data Lineage in Malicious EnvironmentsSecure ComputingDOWNLOAD
IEEEJV_168FRoDO Fraud Resilient DeviceSecure ComputingDOWNLOAD
IEEEJV_169SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-WebSecure ComputingDOWNLOAD
IEEEJV_170Captcha As Graphical PasswordSecure ComputingDOWNLOAD
IEEEDN_1Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud ComputingCLOUD COMPUTINGDOWNLOAD
IEEEDN_2Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud ComputingCLOUD COMPUTINGDOWNLOAD
IEEEDN_3Enabling Semantic Search based on Conceptual Graphs over Encrypted Outsourced DataCLOUD COMPUTINGDOWNLOAD
IEEEDN_4Keyword Search with Access Control over Encrypted Cloud DataCLOUD COMPUTINGDOWNLOAD
IEEEDN_5Privacy Protection Based Access Control Scheme in Cloud-Based ServicesCLOUD COMPUTINGDOWNLOAD
IEEEDN_6Continuous Top-k Monitoring on Document StreamsData MiningDOWNLOAD
IEEEDN_7Dynamic Facet Ordering for Faceted Product Search EnginesData MiningDOWNLOAD
IEEEDN_8Efficient Keyword-aware Representative Travel Route RecommendationData MiningDOWNLOAD
IEEEDN_9NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social MediaSECURE COMPUTINGDOWNLOAD
DNWB_1Consistency as a Service Auditing Cloud ConsistencyIEEE DOTNETDOWNLOAD
DNWB_2Multi Cloud Data Storage For Data SecurityIEEE DOTNETDOWNLOAD
DNWB_3Secure Multi-Owner Data SharingIEEE DOTNETDOWNLOAD
DNWB_4Confidential and Efficient Query Services in the CloudIEEE DOTNETDOWNLOAD
DNWB_5Distributed, Concurrent, and Independent Data access control MechanismsIEEE DOTNETDOWNLOAD
DNWB_6Captcha As Graphical Password For SecurityIEEE DOTNETDOWNLOAD
DNWB_7Multimedia Content Protection SystemIEEE DOTNETDOWNLOAD
DNWB_8Control of Photo Sharing on Online Social NetworksIEEE DOTNETDOWNLOAD
DNWB_9Thief detector(motion Detector)IEEE DOTNETDOWNLOAD
DNWB_10Attendance and marks management systemIEEE DOTNETDOWNLOAD
DNWB_11Civil registryIEEE DOTNETDOWNLOAD
DNWB_12Drug management systemIEEE DOTNETDOWNLOAD
DNWB_13Global NavigatorIEEE DOTNETDOWNLOAD
DNWB_14Income Tax management systemIEEE DOTNETDOWNLOAD
DNWB_15E- support for formersIEEE DOTNETDOWNLOAD