SlideShare a Scribd company logo
2017-2018 JAVA IEEE PROJECT LIST
S.NO Titles Domain
01 A Cross Tenant Access Control (CTAC) Model for Cloud Computing:
Formal Specification and Verification
CLOUD
COMPUTING
02 A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing CLOUD
COMPUTING
03 A Modified Hierarchical Attribute-Based Encryption Access Control
Method for Mobile Cloud Computing
CLOUD
COMPUTING
04 A New Service Mechanism for Profit Optimizations of a Cloud Provider
and Its Users
CLOUD
COMPUTING
05 A Novel Efficient Remote Data Possession Checking Protocol in Cloud
Storage
CLOUD
COMPUTING
06 A robust reputation management mechanism in the federated cloud CLOUD
COMPUTING
07 Achieving Efficient and Secure Data Acquisition for cloud supported
Internet of Things in Smart Grid
CLOUD
COMPUTING
08 Achieving secure, universal, and fine-grained query results verification for
secure search scheme over encrypted cloud data
CLOUD
COMPUTING
09 Assessing Invariant Mining Techniques for Cloud-based Utility
Computing Systems
CLOUD
COMPUTING
10 Customer-Satisfaction-Aware Optimal Multiserver Configuration for
Profit Maximization in Cloud Computing
CLOUD
COMPUTING
11 Efficient and Expressive Keyword Search Over Encrypted Data in Cloud CLOUD
COMPUTING
12 Fast Phrase Search for Encrypted Cloud Storage CLOUD
COMPUTING
13 Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds CLOUD
COMPUTING
14 Identity-Based Encryption with Cloud Revocation Authority and Its
Applications
CLOUD
COMPUTING
15 Identity-Based Private Matching over Outsourced Encrypted Datasets CLOUD
COMPUTING
16 Identity-based Remote Data Integrity Checking with Perfect Data Privacy
Preserving for Cloud Storage
CLOUD
COMPUTING
17 On the Security of Data Access Control for Multi-authority Cloud Storage
Systems
CLOUD
COMPUTING
18 Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical
Data Sharing
CLOUD
COMPUTING
19 Privacy Protection based Access Control Scheme in Cloud-based Services CLOUD
COMPUTING
20 Privacy-Preserving Multikeyword Similarity Search Over Outsourced
Cloud Data
CLOUD
COMPUTING
21 Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate
Keys for Online Data Sharing on the Cloud
CLOUD
COMPUTING
22 RAAC: Robust and Auditable Access Control with Multiple Attribute
Authorities for Public Cloud Storage
CLOUD
COMPUTING
23 Secure Data Sharing in Cloud Computing Using Revocable-Storage
Identity-Based Encryption
CLOUD
COMPUTING
24 Securing Cloud Data under Key Exposure CLOUD
COMPUTING
25 TAFC: Time and Attribute Factors Combined Access Control for Time-
Sensitive Data in Public Cloud
CLOUD
COMPUTING
26 TEES: An Efficient Search Scheme over Encrypted Data on Mobile
Cloud
CLOUD
COMPUTING
27 Two-Cloud Secure Database for Numeric-Related SQL Range Queries
with Privacy Preserving
CLOUD
COMPUTING
28 An Iterative Classification Scheme for Sanitizing Large-Scale Datasets DATA MINING
29 Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling
Approach
DATA MINING
30 Collaborative Filtering-Based Recommendation of Online Social Voting DATA MINING
31 Computing Semantic Similarity of Concepts in Knowledge Graphs DATA MINING
32 Detecting Stress Based on Social Interactions in Social Networks DATA MINING
33 Dynamic Facet Ordering for Faceted Product Search Engines DATA MINING
34 Efficient Clue-based Route Search on Road Networks DATA MINING
35 Efficient Keyword-aware Representative Travel Route Recommendation DATA MINING
36 Energy-efficient Query Processing in Web Search Engines DATA MINING
37 Generating Query Facets using Knowledge Bases DATA MINING
38 Influential Node Tracking on Dynamic Social Network: An Interchange
Greedy Approach
DATA MINING
39 l-Injection: Toward Effective Collaborative Filtering Using Uninteresting
Items
DATA MINING
40 Mining Competitors from Large Unstructured Datasets DATA MINING
41 Modeling Information Diffusion over Social Networks for Temporal
Dynamic Prediction
DATA MINING
42 Personal Web Revisitation by Context and Content Keywords with
Relevance Feedback
DATA MINING
43 PPRank: Economically Selecting Initial Users for Influence Maximization
in Social Networks
DATA MINING
44 QDA: A Query-Driven Approach to Entity Resolution DATA MINING
45 Query Expansion with Enriched User Profiles for Personalized Search
Utilizing Folksonomy Data
DATA MINING
46 RAPARE: A Generic Strategy for Cold-Start Rating Prediction Problem DATA MINING
47 SociRank: Identifying and Ranking Prevalent News Topics Using Social
Media Factors
DATA MINING
48 Towards Real-Time, Country-Level Location Classification of Worldwide
Tweets
DATA MINING
49 Trajectory Community Discovery and Recommendation by Multisource
Diffusion Modeling
DATA MINING
50 Understand Short Texts by Harvesting and Analyzing Semantic
Knowledge
DATA MINING
51 User Vitality Ranking and Prediction in Social Networking Services: a
Dynamic Network Perspective
DATA MINING
52 User-Centric Similarity Search DATA MINING
53 When to Make a Topic Popular Again? A Temporal Model for Topic Re-
hotting Prediction in Online Social Networks
DATA MINING
54 An Overlay Architecture for Throughput Optimal Multipath Routing NETWORKING
55 FaceChange: Attaining Neighbor Node Anonymity in Mobile
Opportunistic Social Networks With Fine-Grained Control
NETWORKING
56 Network Capability in Localizing Node Failures via End-to-End Path
Measurements
NETWORKING
57 Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered
Sensor Network
NETWORKING
58 Routing in Accumulative Multi-Hop Networks NETWORKING
59 SWEET: Serving the Web by Exploiting Email Tunnels NETWORKING
60 A Proxy-based Collaboration System to Minimize Content Download
Time and Energy Consumption
MOBILE
COMPUTING
61 Detecting Mobile Malicious WebPages in Real Time MOBILE
COMPUTING
62 Quantifying Interdependent Privacy Risks with Location Data MOBILE
COMPUTING
63 Searching Trajectories by Regions of Interest MOBILE
COMPUTING
64 SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc
Networks
MOBILE
COMPUTING
65 iASK: A Distributed Q&A System Incorporating Social Community and
Global Collective Intelligence
PARALLEL AND
DISTRIBUTED
SYSTEMS
66 A Credibility Analysis System for Assessing Information on Twitter SECURE
COMPUTING
67 Efficient and Privacy-preserving Min and k-th Min Computations in
Mobile Sensing Systems
SECURE
COMPUTING
68 FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data SECURE
COMPUTING
69 My Privacy My Decision: Control of Photo Sharing on Online Social
Networks
SECURE
COMPUTING
70 Privacy-Preserving Selective Aggregation of Online User Behavior Data SECURE
COMPUTING
71 ProGuard: Detecting Malicious Accounts in Social-Network-Based Online
Promotions
SECURE
COMPUTING
72 Search Rank Fraud and Malware Detection in Google Play SECURE
COMPUTING
73 Towards Detecting Compromised Accounts on Social Networks SECURE
COMPUTING
74 NetSpam: a Network-based Spam Detection Framework for Reviews in
Online Social Media
INFORMATION
FORENSICS &
SECURITY
75 Preventing Distributed Denial-of-Service Flooding Attacks with Dynamic
Path Identifiers
INFORMATION
FORENSICS &
SECURITY
76 Twitter Trends Manipulation: A First Look Inside the Security of Twitter
Trending
INFORMATION
FORENSICS &
SECURITY
77 A Distributed Publisher-Driven Secure Data Sharing Scheme for
Information-Centric IoT
INTERNET OF
THINGS (IoT)
78 An Efficient and Fine-grained Big Data Access Control Scheme with
Privacy-preserving Policy
INTERNET OF
THINGS (IoT)
79 Efficient and Privacy-preserving Polygons Spatial Query Framework for
Location-based Services
INTERNET OF
THINGS (IoT)
80 Follow But No Track: Privacy Preserved Profile Publishing in Cyber-
Physical Social Systems
INTERNET OF
THINGS (IoT)
81 SPFM: Scalable and Privacy-preserving Friend Matching in Mobile Cloud INTERNET OF
THINGS (IoT)
82 Attribute-Based Storage Supporting Secure Deduplication of Encrypted
Data in Cloud
BIG DATA
83 SocialQ&A: An Online Social Network Based Question and Answer
System
BIG DATA
84 Automatic Generation of Social Event Storyboard from Image Click-
through Data
IMAGE
PROCESSING
85 Image Re-ranking based on Topic Diversity IMAGE
PROCESSING
86 Tri-Clustered Tensor Completion for Social-Aware Image Tag Refinement IMAGE
PROCESSING
87 Two-Stage Friend Recommendation Based on Network Alignment and
Series-Expansion of Probabilistic Topic Model
MULTIMEDIA
88 A System for Profiling and Monitoring Database Access Patterns by
Application Programs for Anomaly Detection
SOFTWARE
ENGINEERING
89 Improving Automated Bug Triaging with Specialized Topic Model SOFTWARE
ENGINEERING
90 Collaborative Filtering Service Recommendation Based on a Novel
Similarity Computation Method
SERVICE
COMPUTING
(WEB SERVICES)
91 Transactional Behavior Verification in Business Process as a Service
Configuration
SERVICE
COMPUTING
(WEB SERVICES)

More Related Content

PDF
CSE Java ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra ...
PDF
Final year IEEE projects for 2013-14
DOCX
2015 and 2016 ieee projects list
PDF
IEEE PROJECTS TRICHY-THANJAVUR-KARUR-PERAMBALUR
PDF
2015 and 2016 IEEE Projects for Cloud Computing
PDF
Java Project titles adrit solutions
PDF
DOTNET TITLES 2014 FROM SHPINE TECHNOLOGIES
DOCX
2014 java ieee
CSE Java ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra ...
Final year IEEE projects for 2013-14
2015 and 2016 ieee projects list
IEEE PROJECTS TRICHY-THANJAVUR-KARUR-PERAMBALUR
2015 and 2016 IEEE Projects for Cloud Computing
Java Project titles adrit solutions
DOTNET TITLES 2014 FROM SHPINE TECHNOLOGIES
2014 java ieee

What's hot (10)

DOC
2021- 22 IEEE JAVA Projects
PDF
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
PDF
cse projects,Dot net ieee projects 2015,green corner tech,nellore
DOC
Dotnet application-non-ieee
DOC
Global tech project list
DOCX
2020 and 2021 java Cloud computing
PDF
CSE Dot net ieee projects 2015.Nellore
DOC
Ieee 2014 java projects list
PDF
Ieee 2015 2016
DOCX
2018 and 2019 java ieee projects list
2021- 22 IEEE JAVA Projects
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
cse projects,Dot net ieee projects 2015,green corner tech,nellore
Dotnet application-non-ieee
Global tech project list
2020 and 2021 java Cloud computing
CSE Dot net ieee projects 2015.Nellore
Ieee 2014 java projects list
Ieee 2015 2016
2018 and 2019 java ieee projects list
Ad

Similar to Java titles 2017 2018 (20)

DOC
Java IEEE 2013 Projects list
DOC
Ieee 2013 java projects list
PDF
JAVA PROJECTS TITLES 2022-23.pdf
PDF
Java ieee titles2016 student
PDF
Cse dot net java & android
DOCX
Android,2014 and 2015 ieee projects list @ TMKS Infotech
DOCX
Network Security ,2014 and 2015 ieee projects list @ TMKS Infotech
DOCX
Mobile Computing,2014 and 2015 ieee projects @ TMKS Infotech
DOCX
IEEE project titles 2014 for CSE
PDF
Java 2015 project list
PDF
Java 2015
DOCX
Parallel and Distributed Systems,2014 and 2015 ieee projects @TMKS Infotech
DOCX
2014 and 2015 Java,Android,Dotnet ieee projects list @TMKS Infotech
DOCX
2014 and 2015 ieee projects list in Karnataka @ Bangalore
DOCX
2014 and 2015 ieee projects list @ TMKS Infotech
DOCX
2014 and 2015 ieee projects list in Bangalore
PDF
ieee projects in chennai 2018-2019
PDF
be cse projects in chennai
DOC
Java IEEE Projects 2012-2011-2010
DOCX
CREC List.docx
Java IEEE 2013 Projects list
Ieee 2013 java projects list
JAVA PROJECTS TITLES 2022-23.pdf
Java ieee titles2016 student
Cse dot net java & android
Android,2014 and 2015 ieee projects list @ TMKS Infotech
Network Security ,2014 and 2015 ieee projects list @ TMKS Infotech
Mobile Computing,2014 and 2015 ieee projects @ TMKS Infotech
IEEE project titles 2014 for CSE
Java 2015 project list
Java 2015
Parallel and Distributed Systems,2014 and 2015 ieee projects @TMKS Infotech
2014 and 2015 Java,Android,Dotnet ieee projects list @TMKS Infotech
2014 and 2015 ieee projects list in Karnataka @ Bangalore
2014 and 2015 ieee projects list @ TMKS Infotech
2014 and 2015 ieee projects list in Bangalore
ieee projects in chennai 2018-2019
be cse projects in chennai
Java IEEE Projects 2012-2011-2010
CREC List.docx
Ad

More from GREEN CORNER TECH (20)

PDF
VLSI TITLES 2022- 23.pdf
PDF
SCHOOL PROJECTS 2022-23.pdf
PDF
MINI PROJECTS TITLES 2022-23.pdf
PDF
MECHANICAL SW TITLES 2022-23.pdf
PDF
MECHANICAL HW TITLES 2022-23.pdf
PDF
EMBEDDED & IOT TITLES 2022-23.pdf
PDF
EEE MATLAB TITLES 2022-23.pdf
PDF
EEE EMBEDDED TITLES 2022-23.pdf
PDF
ECE MATLAB TITLES 2022-23.pdf
PDF
Matlab ece ieee projects 2019 20
PDF
Eee matlab simulink titles 2019 20
PDF
PDF
Mechanical Projects
PDF
PDF
Dotnet list
PDF
Bigdata projects
PDF
Cse Final year projects
PDF
Web based java projects
PDF
JAVA Web Based Projects
PDF
Vlsi titles 2017 18
VLSI TITLES 2022- 23.pdf
SCHOOL PROJECTS 2022-23.pdf
MINI PROJECTS TITLES 2022-23.pdf
MECHANICAL SW TITLES 2022-23.pdf
MECHANICAL HW TITLES 2022-23.pdf
EMBEDDED & IOT TITLES 2022-23.pdf
EEE MATLAB TITLES 2022-23.pdf
EEE EMBEDDED TITLES 2022-23.pdf
ECE MATLAB TITLES 2022-23.pdf
Matlab ece ieee projects 2019 20
Eee matlab simulink titles 2019 20
Mechanical Projects
Dotnet list
Bigdata projects
Cse Final year projects
Web based java projects
JAVA Web Based Projects
Vlsi titles 2017 18

Recently uploaded (20)

PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Business Ethics Teaching Materials for college
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPTX
Cell Types and Its function , kingdom of life
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
Classroom Observation Tools for Teachers
PPTX
Cell Structure & Organelles in detailed.
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
01-Introduction-to-Information-Management.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Business Ethics Teaching Materials for college
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Cell Types and Its function , kingdom of life
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Anesthesia in Laparoscopic Surgery in India
Renaissance Architecture: A Journey from Faith to Humanism
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Classroom Observation Tools for Teachers
Cell Structure & Organelles in detailed.
VCE English Exam - Section C Student Revision Booklet
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
01-Introduction-to-Information-Management.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
human mycosis Human fungal infections are called human mycosis..pptx

Java titles 2017 2018

  • 1. 2017-2018 JAVA IEEE PROJECT LIST S.NO Titles Domain 01 A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification CLOUD COMPUTING 02 A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing CLOUD COMPUTING 03 A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing CLOUD COMPUTING 04 A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users CLOUD COMPUTING 05 A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage CLOUD COMPUTING 06 A robust reputation management mechanism in the federated cloud CLOUD COMPUTING 07 Achieving Efficient and Secure Data Acquisition for cloud supported Internet of Things in Smart Grid CLOUD COMPUTING 08 Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data CLOUD COMPUTING 09 Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems CLOUD COMPUTING 10 Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing CLOUD COMPUTING 11 Efficient and Expressive Keyword Search Over Encrypted Data in Cloud CLOUD COMPUTING 12 Fast Phrase Search for Encrypted Cloud Storage CLOUD COMPUTING 13 Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds CLOUD COMPUTING 14 Identity-Based Encryption with Cloud Revocation Authority and Its Applications CLOUD COMPUTING
  • 2. 15 Identity-Based Private Matching over Outsourced Encrypted Datasets CLOUD COMPUTING 16 Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage CLOUD COMPUTING 17 On the Security of Data Access Control for Multi-authority Cloud Storage Systems CLOUD COMPUTING 18 Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing CLOUD COMPUTING 19 Privacy Protection based Access Control Scheme in Cloud-based Services CLOUD COMPUTING 20 Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data CLOUD COMPUTING 21 Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud CLOUD COMPUTING 22 RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage CLOUD COMPUTING 23 Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption CLOUD COMPUTING 24 Securing Cloud Data under Key Exposure CLOUD COMPUTING 25 TAFC: Time and Attribute Factors Combined Access Control for Time- Sensitive Data in Public Cloud CLOUD COMPUTING 26 TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud CLOUD COMPUTING 27 Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving CLOUD COMPUTING 28 An Iterative Classification Scheme for Sanitizing Large-Scale Datasets DATA MINING 29 Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach DATA MINING 30 Collaborative Filtering-Based Recommendation of Online Social Voting DATA MINING 31 Computing Semantic Similarity of Concepts in Knowledge Graphs DATA MINING
  • 3. 32 Detecting Stress Based on Social Interactions in Social Networks DATA MINING 33 Dynamic Facet Ordering for Faceted Product Search Engines DATA MINING 34 Efficient Clue-based Route Search on Road Networks DATA MINING 35 Efficient Keyword-aware Representative Travel Route Recommendation DATA MINING 36 Energy-efficient Query Processing in Web Search Engines DATA MINING 37 Generating Query Facets using Knowledge Bases DATA MINING 38 Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach DATA MINING 39 l-Injection: Toward Effective Collaborative Filtering Using Uninteresting Items DATA MINING 40 Mining Competitors from Large Unstructured Datasets DATA MINING 41 Modeling Information Diffusion over Social Networks for Temporal Dynamic Prediction DATA MINING 42 Personal Web Revisitation by Context and Content Keywords with Relevance Feedback DATA MINING 43 PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks DATA MINING 44 QDA: A Query-Driven Approach to Entity Resolution DATA MINING 45 Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data DATA MINING 46 RAPARE: A Generic Strategy for Cold-Start Rating Prediction Problem DATA MINING 47 SociRank: Identifying and Ranking Prevalent News Topics Using Social Media Factors DATA MINING 48 Towards Real-Time, Country-Level Location Classification of Worldwide Tweets DATA MINING 49 Trajectory Community Discovery and Recommendation by Multisource Diffusion Modeling DATA MINING
  • 4. 50 Understand Short Texts by Harvesting and Analyzing Semantic Knowledge DATA MINING 51 User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective DATA MINING 52 User-Centric Similarity Search DATA MINING 53 When to Make a Topic Popular Again? A Temporal Model for Topic Re- hotting Prediction in Online Social Networks DATA MINING 54 An Overlay Architecture for Throughput Optimal Multipath Routing NETWORKING 55 FaceChange: Attaining Neighbor Node Anonymity in Mobile Opportunistic Social Networks With Fine-Grained Control NETWORKING 56 Network Capability in Localizing Node Failures via End-to-End Path Measurements NETWORKING 57 Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Network NETWORKING 58 Routing in Accumulative Multi-Hop Networks NETWORKING 59 SWEET: Serving the Web by Exploiting Email Tunnels NETWORKING 60 A Proxy-based Collaboration System to Minimize Content Download Time and Energy Consumption MOBILE COMPUTING 61 Detecting Mobile Malicious WebPages in Real Time MOBILE COMPUTING 62 Quantifying Interdependent Privacy Risks with Location Data MOBILE COMPUTING 63 Searching Trajectories by Regions of Interest MOBILE COMPUTING 64 SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks MOBILE COMPUTING 65 iASK: A Distributed Q&A System Incorporating Social Community and Global Collective Intelligence PARALLEL AND DISTRIBUTED SYSTEMS
  • 5. 66 A Credibility Analysis System for Assessing Information on Twitter SECURE COMPUTING 67 Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems SECURE COMPUTING 68 FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data SECURE COMPUTING 69 My Privacy My Decision: Control of Photo Sharing on Online Social Networks SECURE COMPUTING 70 Privacy-Preserving Selective Aggregation of Online User Behavior Data SECURE COMPUTING 71 ProGuard: Detecting Malicious Accounts in Social-Network-Based Online Promotions SECURE COMPUTING 72 Search Rank Fraud and Malware Detection in Google Play SECURE COMPUTING 73 Towards Detecting Compromised Accounts on Social Networks SECURE COMPUTING 74 NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media INFORMATION FORENSICS & SECURITY 75 Preventing Distributed Denial-of-Service Flooding Attacks with Dynamic Path Identifiers INFORMATION FORENSICS & SECURITY 76 Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending INFORMATION FORENSICS & SECURITY 77 A Distributed Publisher-Driven Secure Data Sharing Scheme for Information-Centric IoT INTERNET OF THINGS (IoT) 78 An Efficient and Fine-grained Big Data Access Control Scheme with Privacy-preserving Policy INTERNET OF THINGS (IoT) 79 Efficient and Privacy-preserving Polygons Spatial Query Framework for Location-based Services INTERNET OF THINGS (IoT)
  • 6. 80 Follow But No Track: Privacy Preserved Profile Publishing in Cyber- Physical Social Systems INTERNET OF THINGS (IoT) 81 SPFM: Scalable and Privacy-preserving Friend Matching in Mobile Cloud INTERNET OF THINGS (IoT) 82 Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud BIG DATA 83 SocialQ&A: An Online Social Network Based Question and Answer System BIG DATA 84 Automatic Generation of Social Event Storyboard from Image Click- through Data IMAGE PROCESSING 85 Image Re-ranking based on Topic Diversity IMAGE PROCESSING 86 Tri-Clustered Tensor Completion for Social-Aware Image Tag Refinement IMAGE PROCESSING 87 Two-Stage Friend Recommendation Based on Network Alignment and Series-Expansion of Probabilistic Topic Model MULTIMEDIA 88 A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection SOFTWARE ENGINEERING 89 Improving Automated Bug Triaging with Specialized Topic Model SOFTWARE ENGINEERING 90 Collaborative Filtering Service Recommendation Based on a Novel Similarity Computation Method SERVICE COMPUTING (WEB SERVICES) 91 Transactional Behavior Verification in Business Process as a Service Configuration SERVICE COMPUTING (WEB SERVICES)