JAVA  PROJECTS

CODE PROJECT NAME YEAR DOMAIN
1 A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data 2018 Cloud Computing
2 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud 2018 Cloud Computing
3 An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing 2018 Cloud Computing
4 An Efficient Privacy-Preserving Ranked Keyword Search Method 2018 Cloud Computing
5 CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System 2018 Cloud Computing
6 Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing 2018 Cloud Computing
7 CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services 2018 Cloud Computing
8 Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email 2018 Cloud Computing
9 Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds 2018 Cloud Computing
10 DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud 2018 Cloud Computing
11 Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage 2018 Cloud Computing
12 Dynamic and Public Auditing with Fair Arbitration for Cloud Data 2018 Cloud Computing
13 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates 2018 Cloud Computing
14 Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services 2018 Cloud Computing
15 Geometric Range Search on Encrypted Spatial Data 2018 Cloud Computing
16 Identity-Based Encryption with Cloud Revocation Authority and Its Applications 2018 Cloud Computing
17 Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud 2018 Cloud Computing
18 Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud 2018 Cloud Computing
19 Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems 2018 Cloud Computing
20 Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption 2018 Cloud Computing
21 Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming 2018 Cloud Computing
22 TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage 2018 Cloud Computing
23 A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing 2018 Cloud Computing
24 DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments 2018 Cloud Computing
25 Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing 2018 Cloud Computing
26 SecRBAC: Secure data in the Clouds 2018 Datamining
27 A Novel Recommendation Model Regularized with User Trust and Item Ratings 2018 Datamining
28 Automatically Mining Facets for Queries from Their Search Results 2018 Datamining
29 Booster in High Dimensional Data Classification 2018 Datamining
30 Building an intrusion detection system using a filter-based feature selection algorithm 2018 Datamining
31 Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information 2018 Datamining
32 Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings 2018 Datamining
33 Crowdsourcing for Top-K Query Processing over Uncertain Data 2018 Datamining
34 Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder 2018 Datamining
35 Domain-Sensitive Recommendation with User-Item Subgroup Analysis 2018 Datamining
36 Efficient Algorithms for Mining Top-K High Utility Itemsets 2018 Datamining
37 Efficient Cache-Supported Path Planning on Roads 2018 Datamining
38 Mining User-Aware Rare Sequential Topic Patterns in Document Streams 2018 Datamining
39 Nearest Keyword Set Search in Multi-Dimensional Datasets 2018 Datamining
40 Rating Prediction based on Social Sentiment from Textual Reviews 2018 Datamining
41 Location Aware Keyword Query Suggestion Based on Document Proximity 2018 Datamining
42 Using Hashtag Graph-based Topic Model to Connect Semantically-related Words without Co-occurrence in Microblogs 2018 Datamining
43 Quantifying Political Leaning from Tweets, Retweets, and Retweeters 2018 Datamining
44 Relevance Feedback Algorithms Inspired By Quantum Detection 2018 Datamining
45 Sentiment Embeddings with Applications to Sentiment Analysis 2018 Datamining
46 Top-Down XML Keyword Query Processing 2018 Datamining
47 TopicSketch: Real-time Bursty Topic Detection from Twitter 2018 Datamining
48 Top-k Dominating Queries on Incomplete Data 2018 Datamining
49 Understanding Short Texts through Semantic Enrichment and Hashing 2018 Datamining
50 A Stable Approach for Routing Queries in Unstructured P2P Networks 2018 Networking
51 iPath: Path Inference in Wireless Sensor Networks 2018 Networking
52 Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks 2018 Networking
53 Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks 2018 Networking
54 STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users 2018 Networking
55 Energy and Memory Efficient Clone Detection in Wireless Sensor Networks 2018 MOBILE COMPUTING
56 EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data 2018 MOBILE COMPUTING
57 Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach 2018 MOBILE COMPUTING
58 Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach 2018 MOBILE COMPUTING
59 A Hop-by-Hop Routing Mechanism for Green Internet 2018 PARALLEL & DISTRIBUTED SYSTEMS
60 Continuous Answering Holistic Queries over Sensor Networks 2018 PARALLEL & DISTRIBUTED SYSTEMS
61 Dictionary Based Secure Provenance Compression for Wireless Sensor Networks 2018 PARALLEL & DISTRIBUTED SYSTEMS
62 The Server Provisioning Problem for Continuous Distributed Interactive Applications 2018 PARALLEL & DISTRIBUTED SYSTEMS
63 Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts 2018 SECURE COMPUTING
64 Data Lineage in Malicious Environments 2018 SECURE COMPUTING
65 Detecting Malicious Facebook Applications 2018 SECURE COMPUTING
66 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments 2018 SECURE COMPUTING
67 Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata 2018 SECURE COMPUTING
68 Resolving Multi-party Privacy Conflicts in Social Media 2018 SECURE COMPUTING
69 Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions 2018 INFORMATION FORENSICS & SECURITY
70 Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data 2018 INFORMATION FORENSICS & SECURITY
71 Privacy-Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms 2018 INFORMATION FORENSICS & SECURITY
72 Profiling Online Social Behaviors for Compromised Account Detection 2018 INFORMATION FORENSICS & SECURITY
73 A Locality Sensitive Low-Rank Model for Image Tag Completion 2018 IMAGE PROCESSING
74 A Scalable Approach for Content-Based Image Retrieval in Peerto- Peer Networks 2018 IMAGE PROCESSING
75 Learning of Multimodal Representations with Random Walks on the Click Graph 2018 IMAGE PROCESSING
76 Online Multi-Modal Distance Metric Learning with Application to Image Retrieval 2018 IMAGE PROCESSING
77 Tag Based Image Search by Social Re-ranking 2018 IMAGE PROCESSING
78 Social Friend Recommendation Based on Multiple Network Correlation 2018 MULTIMEDIA (Social Networking)
79 User-Service Rating Prediction by Exploring Social Users’ Rating Behaviors 2018 MULTIMEDIA (Social Networking)
80 Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine-Grained Benchmark, and Feature Evaluation 2018 SOFTWARE ENGINEERING
81 Metamorphic Testing for Software Quality Assessment: A Study of Search Engines 2018 SOFTWARE ENGINEERING
82 SITAR: GUI Test Script Repair 2018 SOFTWARE ENGINEERING
83 Answering Approximate Queries over XML Data 2018 FUZZY SYSTEMS
84 Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation 2018 Cloud Computing
85 Fine-Grained Knowledge Sharing in Collaborative Environments 2018 Knowledge and Data Engineering
86 Provable Multicopy Dynamic Data Possession in Cloud Computing Systems 2018 Cloud Computing
87 A Similarity-Based Learning Algorithm Using Distance Transformation 2018 Knowledge and Data Engineering
88 Improving Accuracy and Robustness of Self-Tuning Histograms by Subspace Clustering 2018 Knowledge and Data Engineering
89 Privacy Protection for Wireless Medical Sensor Data 2018 Mobile Computing
90 Identity-Based Encryption with Outsourced Revocation in Cloud Computing 2018 Cloud Computing
91 Verifiable Auditing for Outsourced Database in Cloud Computing 2018 Cloud Computing
92 Scalable Distributed Processing Of K Nearest Neighbore Queries over Moving Objects 2018 Knowledge and Data Engineering
93 Audit-Free Cloud Storage via Deniable Attribute-based Encryption 2018 Cloud Computing
94 An Efficient Privacy-Preserving Ranked Keyword Search Method 2018 Cloud Computing
95 Efficient Top-k Retrieval on Massive Data 2018 Knowledge and Data Engineering
96 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data 2018 Cloud Computing
97 TRIP: An Interactive Retrieving-Inferring Data Imputation Approach 2018 Knowledge and Data Engineering
98 CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability 2018 Cloud Computing
99 Secure Auditing and Deduplicating Data in Cloud 2018 Cloud Computing
100 Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing 2018 Knowledge and Data Engineering
101 Self-Adjusting Slot Configurations for Homogeneous and Heterogeneous Hadoop 2018 Cloud Computing
102 A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Optimization 2018 Networking
103 Metaheuristic Algorithm for Feature Selection in Sentiment Analysis 2018 Knowledge and Data Engineering
104 Student Time Management (JSP) 2018 Networking
105 Student Profile Generation (JSP) 2018 Networking
106 Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing 2018 Cloud Computing
107 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing 2018 Cloud Computing
108 On efficient feature ranking methods for High-throughput data analysis 2018 Knowledge and Data Engineering
109 An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques 2018 Networking
110 Topic Model for Graph Mining 2018 Knowledge and Data Engineering
111 A decision-theoretic rough set approach for dynamic data mining 2018 Knowledge and Data Engineering
112 A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services 2018 Cloud Computing
113 Online Resource Scheduling under Concave Pricing for Cloud Computing 2018 Cloud Computing
114 The Value of Cooperation: Minimizing User Costs in Multi-broker Mobile Cloud Computing Networks 2018 Cloud Computing
115 A Universal Fairness Evaluation Framework for Resource Allocation in Cloud Computing 2018 Cloud Computing
116 A Set of Complexity Measures Designed for Applying Meta-Learning to Instance Selection 2018 Knowledge and Data Engineering
117 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security 2018 Networking
118 System of Systems for Quality-of-Service Observation and Response in Cloud Computing Environments 2018 Cloud Computing
119 Efficient Algorithms for Mining the Concise and Lossless Representation of High Utility Item sets 2018 Knowledge and Data Engineering
120 Keyword Extraction and Clustering for Document Recommendation in Conversations 2018 Knowledge and Data Engineering
121 Monitoring the Online Test Through Data Visualization 2018 Knowledge and Data Engineering
122 Arabic Text Categorization: a comparative study of Different Representation Modes 2018 Knowledge and Data Engineering
123 CloudArmor: Supporting Reputation-based Trust Management for Cloud Services 2018 Cloud Computing
124 A Computational Dynamic Trust Model for User Authorization 2018 Networking
125 Top-k Similarity Join in Heterogeneous Information Networks 2018 Knowledge and Data Engineering
126 CPCDN: Content Delivery Powered by Context and User Intelligence 2018 Knowledge and Data Engineering
127 k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data 2018 Knowledge and Data Engineering
128 Active Learning for Ranking through Expected Loss Optimization 2018 Knowledge and Data Engineering
129 Pattern-based Topics for Document Modelling in Information Filtering 2018 Knowledge and Data Engineering
130 Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption 2018 Cloud Computing
131 An Access Control Model for Online Social Networks Using User-to-User Relationships 2018 Networking
132 Relational Collaborative Topic Regression for Recommender Systems 2018 Knowledge and Data Engineering
133 Relevance Feature Discovery for Text Mining 2018 Knowledge and Data Engineering
134 Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption 2018 Knowledge and Data Engineering
135 Distributed denial of service attacks in software-defined networking with cloud computing 2018 Knowledge and Data Engineering
136 Differentially Private Frequent Itemset Mining via Transaction Splitting 2018 Knowledge and Data Engineering
137 Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing 2018 Cloud Computing
138 Review Selection Using Micro-Reviews 2018 Knowledge and Data Engineering
139 Backward Path Growth for Efficient Mobile Sequential Recommendation 2018 Knowledge and Data Engineering
140 Mining Partially-Ordered Sequential Rules Common to Multiple Sequences 2018 Knowledge and Data Engineering
141 Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data 2018 Cloud Computing
142 On the Security of Data Access Control for Multiauthority Cloud Storage Systems 2018 Cloud Computing