| 1 |
A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data |
2018 |
Cloud Computing |
| 2 |
A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud |
2018 |
Cloud Computing |
| 3 |
An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing |
2018 |
Cloud Computing |
| 4 |
An Efficient Privacy-Preserving Ranked Keyword Search Method |
2018 |
Cloud Computing |
| 5 |
CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System |
2018 |
Cloud Computing |
| 6 |
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing |
2018 |
Cloud Computing |
| 7 |
CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services |
2018 |
Cloud Computing |
| 8 |
Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email |
2018 |
Cloud Computing |
| 9 |
Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds |
2018 |
Cloud Computing |
| 10 |
DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud |
2018 |
Cloud Computing |
| 11 |
Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage |
2018 |
Cloud Computing |
| 12 |
Dynamic and Public Auditing with Fair Arbitration for Cloud Data |
2018 |
Cloud Computing |
| 13 |
Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates |
2018 |
Cloud Computing |
| 14 |
Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services |
2018 |
Cloud Computing |
| 15 |
Geometric Range Search on Encrypted Spatial Data |
2018 |
Cloud Computing |
| 16 |
Identity-Based Encryption with Cloud Revocation Authority and Its Applications |
2018 |
Cloud Computing |
| 17 |
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud |
2018 |
Cloud Computing |
| 18 |
Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud |
2018 |
Cloud Computing |
| 19 |
Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems |
2018 |
Cloud Computing |
| 20 |
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption |
2018 |
Cloud Computing |
| 21 |
Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming |
2018 |
Cloud Computing |
| 22 |
TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage |
2018 |
Cloud Computing |
| 23 |
A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing |
2018 |
Cloud Computing |
| 24 |
DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments |
2018 |
Cloud Computing |
| 25 |
Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing |
2018 |
Cloud Computing |
| 26 |
SecRBAC: Secure data in the Clouds |
2018 |
Datamining |
| 27 |
A Novel Recommendation Model Regularized with User Trust and Item Ratings |
2018 |
Datamining |
| 28 |
Automatically Mining Facets for Queries from Their Search Results |
2018 |
Datamining |
| 29 |
Booster in High Dimensional Data Classification |
2018 |
Datamining |
| 30 |
Building an intrusion detection system using a filter-based feature selection algorithm |
2018 |
Datamining |
| 31 |
Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information |
2018 |
Datamining |
| 32 |
Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings |
2018 |
Datamining |
| 33 |
Crowdsourcing for Top-K Query Processing over Uncertain Data |
2018 |
Datamining |
| 34 |
Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder |
2018 |
Datamining |
| 35 |
Domain-Sensitive Recommendation with User-Item Subgroup Analysis |
2018 |
Datamining |
| 36 |
Efficient Algorithms for Mining Top-K High Utility Itemsets |
2018 |
Datamining |
| 37 |
Efficient Cache-Supported Path Planning on Roads |
2018 |
Datamining |
| 38 |
Mining User-Aware Rare Sequential Topic Patterns in Document Streams |
2018 |
Datamining |
| 39 |
Nearest Keyword Set Search in Multi-Dimensional Datasets |
2018 |
Datamining |
| 40 |
Rating Prediction based on Social Sentiment from Textual Reviews |
2018 |
Datamining |
| 41 |
Location Aware Keyword Query Suggestion Based on Document Proximity |
2018 |
Datamining |
| 42 |
Using Hashtag Graph-based Topic Model to Connect Semantically-related Words without Co-occurrence in Microblogs |
2018 |
Datamining |
| 43 |
Quantifying Political Leaning from Tweets, Retweets, and Retweeters |
2018 |
Datamining |
| 44 |
Relevance Feedback Algorithms Inspired By Quantum Detection |
2018 |
Datamining |
| 45 |
Sentiment Embeddings with Applications to Sentiment Analysis |
2018 |
Datamining |
| 46 |
Top-Down XML Keyword Query Processing |
2018 |
Datamining |
| 47 |
TopicSketch: Real-time Bursty Topic Detection from Twitter |
2018 |
Datamining |
| 48 |
Top-k Dominating Queries on Incomplete Data |
2018 |
Datamining |
| 49 |
Understanding Short Texts through Semantic Enrichment and Hashing |
2018 |
Datamining |
| 50 |
A Stable Approach for Routing Queries in Unstructured P2P Networks |
2018 |
Networking |
| 51 |
iPath: Path Inference in Wireless Sensor Networks |
2018 |
Networking |
| 52 |
Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks |
2018 |
Networking |
| 53 |
Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks |
2018 |
Networking |
| 54 |
STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users |
2018 |
Networking |
| 55 |
Energy and Memory Efficient Clone Detection in Wireless Sensor Networks |
2018 |
MOBILE COMPUTING |
| 56 |
EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data |
2018 |
MOBILE COMPUTING |
| 57 |
Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach |
2018 |
MOBILE COMPUTING |
| 58 |
Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach |
2018 |
MOBILE COMPUTING |
| 59 |
A Hop-by-Hop Routing Mechanism for Green Internet |
2018 |
PARALLEL & DISTRIBUTED SYSTEMS |
| 60 |
Continuous Answering Holistic Queries over Sensor Networks |
2018 |
PARALLEL & DISTRIBUTED SYSTEMS |
| 61 |
Dictionary Based Secure Provenance Compression for Wireless Sensor Networks |
2018 |
PARALLEL & DISTRIBUTED SYSTEMS |
| 62 |
The Server Provisioning Problem for Continuous Distributed Interactive Applications |
2018 |
PARALLEL & DISTRIBUTED SYSTEMS |
| 63 |
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts |
2018 |
SECURE COMPUTING |
| 64 |
Data Lineage in Malicious Environments |
2018 |
SECURE COMPUTING |
| 65 |
Detecting Malicious Facebook Applications |
2018 |
SECURE COMPUTING |
| 66 |
FRoDO: Fraud Resilient Device for Off-Line Micro-Payments |
2018 |
SECURE COMPUTING |
| 67 |
Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata |
2018 |
SECURE COMPUTING |
| 68 |
Resolving Multi-party Privacy Conflicts in Social Media |
2018 |
SECURE COMPUTING |
| 69 |
Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions |
2018 |
INFORMATION FORENSICS & SECURITY |
| 70 |
Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data |
2018 |
INFORMATION FORENSICS & SECURITY |
| 71 |
Privacy-Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms |
2018 |
INFORMATION FORENSICS & SECURITY |
| 72 |
Profiling Online Social Behaviors for Compromised Account Detection |
2018 |
INFORMATION FORENSICS & SECURITY |
| 73 |
A Locality Sensitive Low-Rank Model for Image Tag Completion |
2018 |
IMAGE PROCESSING |
| 74 |
A Scalable Approach for Content-Based Image Retrieval in Peerto- Peer Networks |
2018 |
IMAGE PROCESSING |
| 75 |
Learning of Multimodal Representations with Random Walks on the Click Graph |
2018 |
IMAGE PROCESSING |
| 76 |
Online Multi-Modal Distance Metric Learning with Application to Image Retrieval |
2018 |
IMAGE PROCESSING |
| 77 |
Tag Based Image Search by Social Re-ranking |
2018 |
IMAGE PROCESSING |
| 78 |
Social Friend Recommendation Based on Multiple Network Correlation |
2018 |
MULTIMEDIA (Social Networking) |
| 79 |
User-Service Rating Prediction by Exploring Social Users’ Rating Behaviors |
2018 |
MULTIMEDIA (Social Networking) |
| 80 |
Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine-Grained Benchmark, and Feature Evaluation |
2018 |
SOFTWARE ENGINEERING |
| 81 |
Metamorphic Testing for Software Quality Assessment: A Study of Search Engines |
2018 |
SOFTWARE ENGINEERING |
| 82 |
SITAR: GUI Test Script Repair |
2018 |
SOFTWARE ENGINEERING |
| 83 |
Answering Approximate Queries over XML Data |
2018 |
FUZZY SYSTEMS |
| 84 |
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation |
2018 |
Cloud Computing |
| 85 |
Fine-Grained Knowledge Sharing in Collaborative Environments |
2018 |
Knowledge and Data Engineering |
| 86 |
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems |
2018 |
Cloud Computing |
| 87 |
A Similarity-Based Learning Algorithm Using Distance Transformation |
2018 |
Knowledge and Data Engineering |
| 88 |
Improving Accuracy and Robustness of Self-Tuning Histograms by Subspace Clustering |
2018 |
Knowledge and Data Engineering |
| 89 |
Privacy Protection for Wireless Medical Sensor Data |
2018 |
Mobile Computing |
| 90 |
Identity-Based Encryption with Outsourced Revocation in Cloud Computing |
2018 |
Cloud Computing |
| 91 |
Verifiable Auditing for Outsourced Database in Cloud Computing |
2018 |
Cloud Computing |
| 92 |
Scalable Distributed Processing Of K Nearest Neighbore Queries over Moving Objects |
2018 |
Knowledge and Data Engineering |
| 93 |
Audit-Free Cloud Storage via Deniable Attribute-based Encryption |
2018 |
Cloud Computing |
| 94 |
An Efficient Privacy-Preserving Ranked Keyword Search Method |
2018 |
Cloud Computing |
| 95 |
Efficient Top-k Retrieval on Massive Data |
2018 |
Knowledge and Data Engineering |
| 96 |
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data |
2018 |
Cloud Computing |
| 97 |
TRIP: An Interactive Retrieving-Inferring Data Imputation Approach |
2018 |
Knowledge and Data Engineering |
| 98 |
CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability |
2018 |
Cloud Computing |
| 99 |
Secure Auditing and Deduplicating Data in Cloud |
2018 |
Cloud Computing |
| 100 |
Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing |
2018 |
Knowledge and Data Engineering |
| 101 |
Self-Adjusting Slot Configurations for Homogeneous and Heterogeneous Hadoop |
2018 |
Cloud Computing |
| 102 |
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Optimization |
2018 |
Networking |
| 103 |
Metaheuristic Algorithm for Feature Selection in Sentiment Analysis |
2018 |
Knowledge and Data Engineering |
| 104 |
Student Time Management (JSP) |
2018 |
Networking |
| 105 |
Student Profile Generation (JSP) |
2018 |
Networking |
| 106 |
Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing |
2018 |
Cloud Computing |
| 107 |
A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing |
2018 |
Cloud Computing |
| 108 |
On efficient feature ranking methods for High-throughput data analysis |
2018 |
Knowledge and Data Engineering |
| 109 |
An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques |
2018 |
Networking |
| 110 |
Topic Model for Graph Mining |
2018 |
Knowledge and Data Engineering |
| 111 |
A decision-theoretic rough set approach for dynamic data mining |
2018 |
Knowledge and Data Engineering |
| 112 |
A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services |
2018 |
Cloud Computing |
| 113 |
Online Resource Scheduling under Concave Pricing for Cloud Computing |
2018 |
Cloud Computing |
| 114 |
The Value of Cooperation: Minimizing User Costs in Multi-broker Mobile Cloud Computing Networks |
2018 |
Cloud Computing |
| 115 |
A Universal Fairness Evaluation Framework for Resource Allocation in Cloud Computing |
2018 |
Cloud Computing |
| 116 |
A Set of Complexity Measures Designed for Applying Meta-Learning to Instance Selection |
2018 |
Knowledge and Data Engineering |
| 117 |
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security |
2018 |
Networking |
| 118 |
System of Systems for Quality-of-Service Observation and Response in Cloud Computing Environments |
2018 |
Cloud Computing |
| 119 |
Efficient Algorithms for Mining the Concise and Lossless Representation of High Utility Item sets |
2018 |
Knowledge and Data Engineering |
| 120 |
Keyword Extraction and Clustering for Document Recommendation in Conversations |
2018 |
Knowledge and Data Engineering |
| 121 |
Monitoring the Online Test Through Data Visualization |
2018 |
Knowledge and Data Engineering |
| 122 |
Arabic Text Categorization: a comparative study of Different Representation Modes |
2018 |
Knowledge and Data Engineering |
| 123 |
CloudArmor: Supporting Reputation-based Trust Management for Cloud Services |
2018 |
Cloud Computing |
| 124 |
A Computational Dynamic Trust Model for User Authorization |
2018 |
Networking |
| 125 |
Top-k Similarity Join in Heterogeneous Information Networks |
2018 |
Knowledge and Data Engineering |
| 126 |
CPCDN: Content Delivery Powered by Context and User Intelligence |
2018 |
Knowledge and Data Engineering |
| 127 |
k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data |
2018 |
Knowledge and Data Engineering |
| 128 |
Active Learning for Ranking through Expected Loss Optimization |
2018 |
Knowledge and Data Engineering |
| 129 |
Pattern-based Topics for Document Modelling in Information Filtering |
2018 |
Knowledge and Data Engineering |
| 130 |
Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption |
2018 |
Cloud Computing |
| 131 |
An Access Control Model for Online Social Networks Using User-to-User Relationships |
2018 |
Networking |
| 132 |
Relational Collaborative Topic Regression for Recommender Systems |
2018 |
Knowledge and Data Engineering |
| 133 |
Relevance Feature Discovery for Text Mining |
2018 |
Knowledge and Data Engineering |
| 134 |
Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption |
2018 |
Knowledge and Data Engineering |
| 135 |
Distributed denial of service attacks in software-defined networking with cloud computing |
2018 |
Knowledge and Data Engineering |
| 136 |
Differentially Private Frequent Itemset Mining via Transaction Splitting |
2018 |
Knowledge and Data Engineering |
| 137 |
Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing |
2018 |
Cloud Computing |
| 138 |
Review Selection Using Micro-Reviews |
2018 |
Knowledge and Data Engineering |
| 139 |
Backward Path Growth for Efficient Mobile Sequential Recommendation |
2018 |
Knowledge and Data Engineering |
| 140 |
Mining Partially-Ordered Sequential Rules Common to Multiple Sequences |
2018 |
Knowledge and Data Engineering |
| 141 |
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data |
2018 |
Cloud Computing |
| 142 |
On the Security of Data Access Control for Multiauthority Cloud Storage Systems |
2018 |
Cloud Computing |