1 |
A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data |
2018 |
Cloud Computing |
2 |
Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing |
2018 |
Cloud Computing |
3 |
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing |
2018 |
Cloud Computing |
4 |
Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds |
2018 |
Cloud Computing |
5 |
Dynamic and Public Auditing with Fair Arbitration for Cloud Data |
2018 |
Cloud Computing |
6 |
TDynamic-Hash-Table Based Public Auditing for Secure Cloud Storage |
2018 |
Cloud Computing |
7 |
Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates. |
2018 |
Cloud Computing |
8 |
Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services. |
2018 |
Cloud Computing |
9 |
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud |
2018 |
Cloud Computing |
10 |
KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage |
2018 |
Cloud Computing |
11 |
Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud |
2018 |
Cloud Computing |
12 |
MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection |
2018 |
Cloud Computing |
13 |
Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-Mining-As-a-Service Paradigm |
2018 |
Cloud Computing |
14 |
A Mixed Generative-Discriminative Based Hashing Method |
2018 |
Datamining |
15 |
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data |
2018 |
Datamining |
16 |
OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data Linkage |
2018 |
Datamining |
17 |
Efficiency Support Edit Distance Based Strings Similarity Search Using B+ Trees |
2018 |
Datamining |
18 |
Active Learning Of Constraints For Semi Supervised Clustering |
2018 |
Datamining |
19 |
Oruta:Privacy Preserving Public Auditing For Shared Data In The Cloud |
2018 |
Cloud Computing |
20 |
TopicMachine: Conversion Prediction in Search Advertising using Latent Topic Models |
2018 |
Datamining |
21 |
Wormhole Attack Detection Algorithms in Wireless Network Coding Systems |
2018 |
Networking |
22 |
Swiper: Exploiting Virtual Machine Vulnerability in Third-Party |
2018 |
Cloud Computing |
23 |
A Hyper-Heuristic Scheduling Algorithm for Cloud |
2018 |
Cloud Computing |
24 |
Secure kNN Query Processing in Untrusted Cloud Environments |
2018 |
Datamining |
25 |
Clustering sentence leveltext using a novel fuzzy relational clustering algorithm. |
2018 |
Datamining |
26 |
Robust Perceptual Image Hashing Based On Ring Partition and NMF . |
2018 |
Datamining |
27 |
Facilitating Effective User Navigation through Website Structure Improvement |
2018 |
Datamining |
28 |
A Novel Model for Mining Association Rules from Semantic Web Data |
2018 |
Datamining |
29 |
Personalized Recommendation Combining User Interest and Social Circle |
2018 |
Datamining |
30 |
Supporting Privacy Protection in Personalized Web Search |
2018 |
Datamining |
31 |
A Scalable and Modular Architecture for High-Performance Packet Classification |
2018 |
Datamining |
32 |
Mining Semantically Consistent Patterns for Cross-View Data |
2018 |
Datamining |
33 |
Distributed Strategies For Mining Outliers in Large Datasets |
2018 |
Datamining |
34 |
A Group Incremental Approach to Feature Selection Applying Rough Set Technique |
2018 |
Datamining |
35 |
Efficient Authentication for Mobile and Pervasive Computing |
2018 |
Datamining |
36 |
Performance and Cost Evaluation of an Adaptive Encryption Architecture for Cloud Databases |
2018 |
Mobilecomputing |
37 |
Private Prdeictive Analysis On Encrypted Medical Data |
2018 |
Mobilecomputing |
38 |
Web Image Re-ranking using Query Specific Semantic Signatures |
2018 |
Imageprocessing |
39 |
Image-Difference Prediction: From Color to Spectral |
2018 |
Imageprocessing |
40 |
Gradient Histogram Estimation and Preservation for Texture Enhanced Image Denoising |
2018 |
Imageprocessing |
41 |
Set Predicates in SQL: Enabling Set-Level Comparisons for Dynamically Formed Groups |
2018 |
Datamining |
42 |
Self-Adaptive Semantic Focused Crawler for Mining Services Information Discovery |
2018 |
Information Forensics |
43 |
Building a Scalable System for Stealthy P2P-Botnet Detection |
2018 |
Information Forensics |
44 |
DOTS: A Propagation Delay-Aware Opportunistic MAC Protocol for Mobile Underwater Networks |
2018 |
Mobilecomputing |
45 |
Video Annotation Via Image Groups From The Web |
2018 |
Information Forensics |
46 |
Concurrent Single-Label Image Classification and Annotation via Efficient Multi-Layer Group Sparse Coding |
2018 |
Imageprocessing |
47 |
Video Annotation via Image Groups from the Web |
2018 |
Datamining |
48 |
Privacy Preserving Authenticated Key-Exchange Over Internet |
2018 |
Information Forensics |
49 |
Efficiently Supporting Edit Distance Based String Similariry Search Using B+trees. |
2018 |
Datamining |
50 |
A privacy Leakage Upper -Bound Constraint based Approach for Cost-Effective Privacy Preserving of Intermediate Datasets in Cloud |
2018 |
Datamining |
51 |
Predicting the Analysis of Heart Disease Symptoms using medicinal Data Mining Methods |
2018 |
Datamining |
52 |
Online Resume Tracking System using Computer |
2018 |
Datamining |
53 |
A Light Weight Encryption Scheme for Network-coded mobile Ad Hoc Network |
2018 |
Networking |
54 |
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks |
2018 |
Networking |
55 |
Toward Transcoding as a Service in a Multimedia Cloud: Energy-Efficient Job-Dispatching Algorithm |
2018 |
Mobilecomputing |
56 |
Privacy Preserving Data Sharing With Anonymous ID Assignment |
2018 |
Information Forensics |
57 |
Human Effects of Enhanced Privacy Management Models |
2018 |
Networking |
58 |
Analysis of feature selection stability on high dimension and small sample data |
2018 |
Datamining |
59 |
A Unifying Model and Analysis of P2P VoD Replication and Scheduling |
2018 |
Networking |
60 |
Discovering High Quality Answers in Community Question Answering Archieves Using a Hierachy of Classifiers |
2018 |
Datamining |
61 |
Exploration of Data mining techniques in Fraud Detection: Credit Card |
2018 |
Datamining |
62 |
Mobiflage: Deniable Storage Encryption for Mobile Devices |
2018 |
Mobilecomputing |
63 |
Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems |
2018 |
Service Computing |
64 |
Capacity Achieving Distributed Scheduling With Finite Buffers |
2018 |
Networking |
65 |
On Sample-Path Optimal Dynamic Scheduling for Sum-Queue Minimization in Forests |
2018 |
Networking |
66 |
Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems |
2018 |
Information Forensics |
67 |
Discovering Emerging Topics in Social Streams via Link-Anomaly Detection |
2018 |
Datamining |
68 |
Towards Online Shortest Path Computation |
2018 |
Datamining |
69 |
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks |
2018 |
Dependable Secure Computing |
70 |
Hidden Data Extraction Using Steganography |
2018 |
Networking |
71 |
Techniques to Minimize State Transfer Costs for Dynamic Execution Offloading in Mobile Cloud Computing |
2018 |
Cloud Computing |
72 |
Predicting the analysis of heart disease Symptomps using medicinal data mining methods |
2018 |
Datamining |
73 |
RFID Based Toll Collection System |
2018 |
Application |
74 |
Real-Time Scheduling with Security Enhancement for Packet Switched Networks |
2018 |
Networking |
75 |
Redundancy Management ofMultipath Routing for Intrusion Tolerance inHeterogeneous Wireless Sensor Networks |
2018 |
Networking |
76 |
Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm |
2018 |
Networking |