1 |
A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data |
2018 |
Cloud Computing |
2 |
A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud |
2018 |
Cloud Computing |
3 |
An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing |
2018 |
Cloud Computing |
4 |
An Efficient Privacy-Preserving Ranked Keyword Search Method |
2018 |
Cloud Computing |
5 |
CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System |
2018 |
Cloud Computing |
6 |
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing |
2018 |
Cloud Computing |
7 |
CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services |
2018 |
Cloud Computing |
8 |
Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email |
2018 |
Cloud Computing |
9 |
Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds |
2018 |
Cloud Computing |
10 |
DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud |
2018 |
Cloud Computing |
11 |
Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage |
2018 |
Cloud Computing |
12 |
Dynamic and Public Auditing with Fair Arbitration for Cloud Data |
2018 |
Cloud Computing |
13 |
Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates |
2018 |
Cloud Computing |
14 |
Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services |
2018 |
Cloud Computing |
15 |
Geometric Range Search on Encrypted Spatial Data |
2018 |
Cloud Computing |
16 |
Identity-Based Encryption with Cloud Revocation Authority and Its Applications |
2018 |
Cloud Computing |
17 |
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud |
2018 |
Cloud Computing |
18 |
Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud |
2018 |
Cloud Computing |
19 |
Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems |
2018 |
Cloud Computing |
20 |
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption |
2018 |
Cloud Computing |
21 |
Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming |
2018 |
Cloud Computing |
22 |
TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage |
2018 |
Cloud Computing |
23 |
A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing |
2018 |
Cloud Computing |
24 |
DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments |
2018 |
Cloud Computing |
25 |
Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing |
2018 |
Cloud Computing |
26 |
SecRBAC: Secure data in the Clouds |
2018 |
Datamining |
27 |
A Novel Recommendation Model Regularized with User Trust and Item Ratings |
2018 |
Datamining |
28 |
Automatically Mining Facets for Queries from Their Search Results |
2018 |
Datamining |
29 |
Booster in High Dimensional Data Classification |
2018 |
Datamining |
30 |
Building an intrusion detection system using a filter-based feature selection algorithm |
2018 |
Datamining |
31 |
Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information |
2018 |
Datamining |
32 |
Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings |
2018 |
Datamining |
33 |
Crowdsourcing for Top-K Query Processing over Uncertain Data |
2018 |
Datamining |
34 |
Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder |
2018 |
Datamining |
35 |
Domain-Sensitive Recommendation with User-Item Subgroup Analysis |
2018 |
Datamining |
36 |
Efficient Algorithms for Mining Top-K High Utility Itemsets |
2018 |
Datamining |
37 |
Efficient Cache-Supported Path Planning on Roads |
2018 |
Datamining |
38 |
Mining User-Aware Rare Sequential Topic Patterns in Document Streams |
2018 |
Datamining |
39 |
Nearest Keyword Set Search in Multi-Dimensional Datasets |
2018 |
Datamining |
40 |
Rating Prediction based on Social Sentiment from Textual Reviews |
2018 |
Datamining |
41 |
Location Aware Keyword Query Suggestion Based on Document Proximity |
2018 |
Datamining |
42 |
Using Hashtag Graph-based Topic Model to Connect Semantically-related Words without Co-occurrence in Microblogs |
2018 |
Datamining |
43 |
Quantifying Political Leaning from Tweets, Retweets, and Retweeters |
2018 |
Datamining |
44 |
Relevance Feedback Algorithms Inspired By Quantum Detection |
2018 |
Datamining |
45 |
Sentiment Embeddings with Applications to Sentiment Analysis |
2018 |
Datamining |
46 |
Top-Down XML Keyword Query Processing |
2018 |
Datamining |
47 |
TopicSketch: Real-time Bursty Topic Detection from Twitter |
2018 |
Datamining |
48 |
Top-k Dominating Queries on Incomplete Data |
2018 |
Datamining |
49 |
Understanding Short Texts through Semantic Enrichment and Hashing |
2018 |
Datamining |
50 |
A Stable Approach for Routing Queries in Unstructured P2P Networks |
2018 |
Networking |
51 |
iPath: Path Inference in Wireless Sensor Networks |
2018 |
Networking |
52 |
Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks |
2018 |
Networking |
53 |
Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks |
2018 |
Networking |
54 |
STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users |
2018 |
Networking |
55 |
Energy and Memory Efficient Clone Detection in Wireless Sensor Networks |
2018 |
MOBILE COMPUTING |
56 |
EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data |
2018 |
MOBILE COMPUTING |
57 |
Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach |
2018 |
MOBILE COMPUTING |
58 |
Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach |
2018 |
MOBILE COMPUTING |
59 |
A Hop-by-Hop Routing Mechanism for Green Internet |
2018 |
PARALLEL & DISTRIBUTED SYSTEMS |
60 |
Continuous Answering Holistic Queries over Sensor Networks |
2018 |
PARALLEL & DISTRIBUTED SYSTEMS |
61 |
Dictionary Based Secure Provenance Compression for Wireless Sensor Networks |
2018 |
PARALLEL & DISTRIBUTED SYSTEMS |
62 |
The Server Provisioning Problem for Continuous Distributed Interactive Applications |
2018 |
PARALLEL & DISTRIBUTED SYSTEMS |
63 |
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts |
2018 |
SECURE COMPUTING |
64 |
Data Lineage in Malicious Environments |
2018 |
SECURE COMPUTING |
65 |
Detecting Malicious Facebook Applications |
2018 |
SECURE COMPUTING |
66 |
FRoDO: Fraud Resilient Device for Off-Line Micro-Payments |
2018 |
SECURE COMPUTING |
67 |
Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata |
2018 |
SECURE COMPUTING |
68 |
Resolving Multi-party Privacy Conflicts in Social Media |
2018 |
SECURE COMPUTING |
69 |
Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions |
2018 |
INFORMATION FORENSICS & SECURITY |
70 |
Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data |
2018 |
INFORMATION FORENSICS & SECURITY |
71 |
Privacy-Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms |
2018 |
INFORMATION FORENSICS & SECURITY |
72 |
Profiling Online Social Behaviors for Compromised Account Detection |
2018 |
INFORMATION FORENSICS & SECURITY |
73 |
A Locality Sensitive Low-Rank Model for Image Tag Completion |
2018 |
IMAGE PROCESSING |
74 |
A Scalable Approach for Content-Based Image Retrieval in Peerto- Peer Networks |
2018 |
IMAGE PROCESSING |
75 |
Learning of Multimodal Representations with Random Walks on the Click Graph |
2018 |
IMAGE PROCESSING |
76 |
Online Multi-Modal Distance Metric Learning with Application to Image Retrieval |
2018 |
IMAGE PROCESSING |
77 |
Tag Based Image Search by Social Re-ranking |
2018 |
IMAGE PROCESSING |
78 |
Social Friend Recommendation Based on Multiple Network Correlation |
2018 |
MULTIMEDIA (Social Networking) |
79 |
User-Service Rating Prediction by Exploring Social Users’ Rating Behaviors |
2018 |
MULTIMEDIA (Social Networking) |
80 |
Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine-Grained Benchmark, and Feature Evaluation |
2018 |
SOFTWARE ENGINEERING |
81 |
Metamorphic Testing for Software Quality Assessment: A Study of Search Engines |
2018 |
SOFTWARE ENGINEERING |
82 |
SITAR: GUI Test Script Repair |
2018 |
SOFTWARE ENGINEERING |
83 |
Answering Approximate Queries over XML Data |
2018 |
FUZZY SYSTEMS |
84 |
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation |
2018 |
Cloud Computing |
85 |
Fine-Grained Knowledge Sharing in Collaborative Environments |
2018 |
Knowledge and Data Engineering |
86 |
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems |
2018 |
Cloud Computing |
87 |
A Similarity-Based Learning Algorithm Using Distance Transformation |
2018 |
Knowledge and Data Engineering |
88 |
Improving Accuracy and Robustness of Self-Tuning Histograms by Subspace Clustering |
2018 |
Knowledge and Data Engineering |
89 |
Privacy Protection for Wireless Medical Sensor Data |
2018 |
Mobile Computing |
90 |
Identity-Based Encryption with Outsourced Revocation in Cloud Computing |
2018 |
Cloud Computing |
91 |
Verifiable Auditing for Outsourced Database in Cloud Computing |
2018 |
Cloud Computing |
92 |
Scalable Distributed Processing Of K Nearest Neighbore Queries over Moving Objects |
2018 |
Knowledge and Data Engineering |
93 |
Audit-Free Cloud Storage via Deniable Attribute-based Encryption |
2018 |
Cloud Computing |
94 |
An Efficient Privacy-Preserving Ranked Keyword Search Method |
2018 |
Cloud Computing |
95 |
Efficient Top-k Retrieval on Massive Data |
2018 |
Knowledge and Data Engineering |
96 |
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data |
2018 |
Cloud Computing |
97 |
TRIP: An Interactive Retrieving-Inferring Data Imputation Approach |
2018 |
Knowledge and Data Engineering |
98 |
CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability |
2018 |
Cloud Computing |
99 |
Secure Auditing and Deduplicating Data in Cloud |
2018 |
Cloud Computing |
100 |
Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing |
2018 |
Knowledge and Data Engineering |
101 |
Self-Adjusting Slot Configurations for Homogeneous and Heterogeneous Hadoop |
2018 |
Cloud Computing |
102 |
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Optimization |
2018 |
Networking |
103 |
Metaheuristic Algorithm for Feature Selection in Sentiment Analysis |
2018 |
Knowledge and Data Engineering |
104 |
Student Time Management (JSP) |
2018 |
Networking |
105 |
Student Profile Generation (JSP) |
2018 |
Networking |
106 |
Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing |
2018 |
Cloud Computing |
107 |
A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing |
2018 |
Cloud Computing |
108 |
On efficient feature ranking methods for High-throughput data analysis |
2018 |
Knowledge and Data Engineering |
109 |
An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques |
2018 |
Networking |
110 |
Topic Model for Graph Mining |
2018 |
Knowledge and Data Engineering |
111 |
A decision-theoretic rough set approach for dynamic data mining |
2018 |
Knowledge and Data Engineering |
112 |
A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services |
2018 |
Cloud Computing |
113 |
Online Resource Scheduling under Concave Pricing for Cloud Computing |
2018 |
Cloud Computing |
114 |
The Value of Cooperation: Minimizing User Costs in Multi-broker Mobile Cloud Computing Networks |
2018 |
Cloud Computing |
115 |
A Universal Fairness Evaluation Framework for Resource Allocation in Cloud Computing |
2018 |
Cloud Computing |
116 |
A Set of Complexity Measures Designed for Applying Meta-Learning to Instance Selection |
2018 |
Knowledge and Data Engineering |
117 |
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security |
2018 |
Networking |
118 |
System of Systems for Quality-of-Service Observation and Response in Cloud Computing Environments |
2018 |
Cloud Computing |
119 |
Efficient Algorithms for Mining the Concise and Lossless Representation of High Utility Item sets |
2018 |
Knowledge and Data Engineering |
120 |
Keyword Extraction and Clustering for Document Recommendation in Conversations |
2018 |
Knowledge and Data Engineering |
121 |
Monitoring the Online Test Through Data Visualization |
2018 |
Knowledge and Data Engineering |
122 |
Arabic Text Categorization: a comparative study of Different Representation Modes |
2018 |
Knowledge and Data Engineering |
123 |
CloudArmor: Supporting Reputation-based Trust Management for Cloud Services |
2018 |
Cloud Computing |
124 |
A Computational Dynamic Trust Model for User Authorization |
2018 |
Networking |
125 |
Top-k Similarity Join in Heterogeneous Information Networks |
2018 |
Knowledge and Data Engineering |
126 |
CPCDN: Content Delivery Powered by Context and User Intelligence |
2018 |
Knowledge and Data Engineering |
127 |
k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data |
2018 |
Knowledge and Data Engineering |
128 |
Active Learning for Ranking through Expected Loss Optimization |
2018 |
Knowledge and Data Engineering |
129 |
Pattern-based Topics for Document Modelling in Information Filtering |
2018 |
Knowledge and Data Engineering |
130 |
Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption |
2018 |
Cloud Computing |
131 |
An Access Control Model for Online Social Networks Using User-to-User Relationships |
2018 |
Networking |
132 |
Relational Collaborative Topic Regression for Recommender Systems |
2018 |
Knowledge and Data Engineering |
133 |
Relevance Feature Discovery for Text Mining |
2018 |
Knowledge and Data Engineering |
134 |
Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption |
2018 |
Knowledge and Data Engineering |
135 |
Distributed denial of service attacks in software-defined networking with cloud computing |
2018 |
Knowledge and Data Engineering |
136 |
Differentially Private Frequent Itemset Mining via Transaction Splitting |
2018 |
Knowledge and Data Engineering |
137 |
Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing |
2018 |
Cloud Computing |
138 |
Review Selection Using Micro-Reviews |
2018 |
Knowledge and Data Engineering |
139 |
Backward Path Growth for Efficient Mobile Sequential Recommendation |
2018 |
Knowledge and Data Engineering |
140 |
Mining Partially-Ordered Sequential Rules Common to Multiple Sequences |
2018 |
Knowledge and Data Engineering |
141 |
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data |
2018 |
Cloud Computing |
142 |
On the Security of Data Access Control for Multiauthority Cloud Storage Systems |
2018 |
Cloud Computing |