Projects (Java Based) - 2016


S. No. Project Title Journal / Year Abstract Base Paper
1 2DCrypt: Image Scaling and Cropping in Encrypted Domains IEEE 2016 ClickHere ClickHere
2 KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage IEEE 2016 ClickHere ClickHere
3 A Locality Sensitive Low-Rank Model for Image Tag Completion IEEE 2016 ClickHere ClickHere
4 A Shoulder Surfing Resistant Graphical Authentication System IEEE 2016 ClickHere ClickHere
5 Aspect-level Influence Discovery from Graphs IEEE 2016 ClickHere ClickHere
6 Connecting Social Media to E-Commerce: Cold-Start Product Recommendation using Microblogging Information IEEE 2016 ClickHere ClickHere
7 Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy IEEE 2016 ClickHere ClickHere
8 Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases IEEE 2016 ClickHere ClickHere
9 Relevance Feedback Algorithms Inspired By Quantum Detection IEEE 2016 ClickHere ClickHere
10 SecRBAC: Secure data in the Clouds IEEE 2016 ClickHere ClickHere
11 D-ToSS: A Distributed Throwaway Spatial Index Structure for Dynamic Location Data IEEE 2016 ClickHere ClickHere
12 Where you are is who you are: User identification by matching statistics IEEE 2016 ClickHere ClickHere
13 Efficient and Expressive Keyword Search Over Encrypted Data in Cloud IEEE 2016 ClickHere ClickHere
14 Efficiently Estimating Statistics of Points of Interests on Maps IEEE 2016 ClickHere ClickHere
15 Sentiment Embeddings with Applications to Sentiment Analysis IEEE 2016 ClickHere ClickHere
16 Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement IEEE 2016 ClickHere ClickHere
17 Enabling Secure and Fast Indexing for Privacy-assured Healthcare Monitoring via Compressive Sensing IEEE 2016 ClickHere ClickHere
18 Encrypted Data Management with Deduplication in Cloud Computing IEEE 2016 ClickHere ClickHere
19 Server-Aided Public Key Encryption with Keyword Search IEEE 2016 ClickHere ClickHere
20 Social Friend Recommendation Based on Multiple Network Correlation IEEE 2016 ClickHere ClickHere
21 From Latency, through Outbreak, to Decline: Detecting Different States of Emergency Events Using Web Resources IEEE 2016 ClickHere ClickHere
22 Tag Based Image Search by Social Re-ranking IEEE 2016 ClickHere ClickHere
23 Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search IEEE 2016 ClickHere ClickHere
24 Mining High Utility Patterns in One Phase without Generating Candidates IEEE 2016 ClickHere ClickHere
25 Tell Me What You Eat, and I Will Tell You Where You Come From: A Data Science Approach for Global Recipe Data on the Web IEEE 2016 ClickHere ClickHere
26 Mining User-Aware Rare Sequential Topic Patterns in Document Streams IEEE 2016 ClickHere ClickHere
27 Mitigating Cross-Site Scripting Attacks with a Content Security Policy IEEE 2016 ClickHere ClickHere
28 Multi-Modal Event Topic Model for Social Event Analysis IEEE 2016 ClickHere ClickHere
29 Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement IEEE 2016 ClickHere ClickHere
30 Trust Agent-Based Behavior Induction in Social Networks IEEE 2016 ClickHere ClickHere
31 TTSA: An Effective Scheduling Approach for Delay Bounded Tasks in Hybrid Clouds IEEE 2016 ClickHere ClickHere
32 Two-Factor Data Security Protection Mechanism for Cloud Storage System IEEE 2016 ClickHere ClickHere
33 Uncertainty Analysis for the Keyword System of Web Events IEEE 2016 ClickHere ClickHere
34 Understanding Deep Representations Learned in Modeling Users ‘Likes’ IEEE 2016 ClickHere ClickHere