S. No. |
Project Title |
Journal / Year |
Abstract |
Base Paper |
1 |
A Credibility Analysis System for Assessing Information on Twitter |
IEEE 2016 |
|
|
2 |
A Forecasting Methodology for Workload Forecasting in Cloud Systems |
IEEE 2016 |
|
|
3 |
A Recommendation System to Facilitate Business Process Modeling |
IEEE 2016 |
|
|
4 |
Attribute-Based Data Sharing Scheme Revisited in Cloud Computing |
IEEE 2016 |
|
|
5 |
Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates |
IEEE 2016 |
|
|
6 |
Bilevel Feature Extraction-Based Text Mining for Fault Diagnosis of Railway Systems |
IEEE 2016 |
|
|
7 |
Cloud workflow scheduling with deadlines and time slot availability |
IEEE 2016 |
|
|
8 |
Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation |
IEEE 2016 |
|
|
9 |
Democratic Diffusion Aggregation for Image Retrieval |
IEEE 2016 |
|
|
10 |
Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates |
IEEE 2016 |
|
|
11 |
Filtering of Brand-related Microblogs using Social-Smooth Multiview Embedding |
IEEE 2016 |
|
|
12 |
Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing |
IEEE 2016 |
|
|
13 |
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud |
IEEE 2016 |
|
|
14 |
Incremental Consolidation of Data-Intensive Multi-flows |
IEEE 2016 |
|
|
15 |
Mining Health Examination Records — A Graph-based Approach |
IEEE 2016 |
|
|
16 |
Modeling and Verification of Online Shopping Business Processes by Considering Malicious Behavior Patterns |
IEEE 2016 |
|
|
17 |
Optimal Shipping Strategy and Return Service Charge Under No-Reason Return Policy in Online Retailing |
IEEE 2016 |
|
|
18 |
Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation |
IEEE 2016 |
|
|
19 |
PiCode: a New Picture-Embedding 2D Barcode |
IEEE 2016 |
|
|
20 |
Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud |
IEEE 2016 |
|
|
21 |
Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme |
IEEE 2016 |
|
|
22 |
Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases |
IEEE 2016 |
|
|
23 |
Privacy-Preserving Outsourced Media Search |
IEEE 2016 |
|
|
24 |
Privacy-Preserving Selective Aggregation of Online User Behavior Data |
IEEE 2016 |
|
|
25 |
Probabilistic Flood Mapping Using Synthetic Aperture Radar Data |
IEEE 2016 |
|
|
26 |
User Preference Learning for Online Social Recommendation |
IEEE 2016 |
|
|
27 |
Providing User Security Guarantees in Public Infrastructure Clouds |
IEEE 2016 |
|
|
28 |
Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys |
IEEE 2016 |
|
|
29 |
Query Reorganisation Algorithms for Efficient Boolean Information Filtering |
IEEE 2016 |
|
|
30 |
Reversible Data Hiding in Encrypted Images by Reversible Image Transformation |
IEEE 2016 |
|
|
31 |
Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps |
IEEE 2016 |
|
|
32 |
Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis |
IEEE 2016 |
|
|
33 |
TagBook: A Semantic Video Representation without Supervision for Event Detection |
IEEE 2016 |
|
|
34 |
Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound |
IEEE 2016 |
|
|