Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
IEEE 2016 Projects
1. Sno JAVA IEEE 2016 IEEE Abstract
Base
Paper
CLOUD COMPUTING
1
A Secure and Dynamic Multi-Keyword Ranked Search
Scheme over Encrypted Cloud Data
2016 Download Download
2
A Secure Anti-Collusion Data Sharing Scheme for Dynamic
Groups in the Cloud
2016 Download Download
3
An Efficient File Hierarchy Attribute-Based Encryption
Scheme in Cloud Computing
2016 Download Download
4
An Efficient Privacy-Preserving Ranked Keyword Search
Method
2016 Download Download
5
A Modified Hierarchical Attribute-Based Encryption Access
Control Method for Mobile Cloud Computing
2016 Download Download
7
Circuit Ciphertext-policy Attribute-based Hybrid Encryption
with Verifiable Delegation in Cloud Computing
2016 Download Download
8
Conditional Identity-Based Broadcast Proxy Re-Encryption
and Its Application to Cloud Email
2016 Download Download
10
DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-
User Environments
2016 Download Download
13
Dual-Server Public-Key Encryption With Keyword Search for
Secure Cloud Storage
2016 Download Download
14
Dynamic and Public Auditing with Fair Arbitration for Cloud
Data
2016 Download Download
15
Enabling Cloud Storage Auditing With Verifiable Outsourcing
of Key Updates
2016 Download Download
16
Flexible and Fine-Grained Attribute-Based Data Storage in
Cloud Computing
2016 Download Download
17
Fine-Grained Two-Factor Access Control for Web-Based
Cloud Computing Services
2016 Download Download
19
Identity-Based Encryption with Cloud Revocation Authority
and Its Applications
2016 Download Download
20
Identity-Based Proxy-Oriented Data Uploading and Remote
Data Integrity Checking in Public Cloud
2016 Download Download
21 Protecting Your Right: Verifiable Attribute-Based Keyword 2016 Download Download
2. Search with Fine-Grained Owner-Enforced Search
Authorization in the Cloud
23 SecRBAC: Secure data in the Clouds 2016 Download Download
24
Secure Data Sharing in Cloud Computing Using Revocable-
Storage Identity-Based Encryption
2016 Download Download
25
Secure Optimization Computation Outsourcing in Cloud
Computing: A Case Study of Linear Programming
2016 Download Download
26
TMACS: A Robust and Verifiable Threshold Multi-Authority
Access Control System in Public Cloud Storage
2016 Download Download
DATA MINING
1
A Novel Recommendation Model Regularized with User Trust
and Item Ratings
2016 Download Download
2
Automatically Mining Facets for Queries from Their Search
Results
2016 Download Download
3 Booster in High Dimensional Data Classification 2016 Download Download
4
Building an intrusion detection system using a filter-based
feature selection algorithm
2016 Download Download
5
Connecting Social Media to E-Commerce: Cold-Start Product
Recommendation Using Microblogging Information
2016 Download Download
6
Cross-Domain Sentiment Classification Using Sentiment
Sensitive Embeddings
2016 Download Download
9 Efficient Algorithms for Mining Top-K High Utility Itemsets 2016 Download Download
11
Mining User-Aware Rare Sequential Topic Patterns in
Document Streams
2016 Download Download
12 Nearest Keyword Set Search in Multi-Dimensional Datasets 2016 Download Download
13
Rating Prediction based on Social Sentiment from Textual
Reviews
2016 Download Download
NETWORKING
1
A Stable Approach for Routing Queries in Unstructured P2P
Networks
2016 Download Download
3. 2 iPath: Path Inference in Wireless Sensor Networks 2016 Download Download
3
Opportunistic Routing With Congestion Diversity in Wireless
Ad Hoc Networks
2016 Download Download
4
Spatial Reusability-Aware Routing in Multi-Hop Wireless
Networks
2016 Download Download
4
STAMP: Enabling Privacy-Preserving Location Proofs for
Mobile Users
2016 Download Download
MOBILE COMPUTING
1
Energy and Memory Efficient Clone Detection in Wireless
Sensor Networks
2016 Download Download
2
EPLQ: Efficient Privacy-Preserving Location-Based Query
Over Outsourced Encrypted Data
2016 Download Download
3
Secure Overlay Routing Using Key Pre-Distribution: A Linear
Distance Optimization Approach
2016 Download Download
4
Detecting Node Failures in Mobile Wireless Networks: A
Probabilistic Approach
2016 Download Download
IMAGE PROCESSING
1
A Locality Sensitive Low-Rank Model for Image Tag
Completion
2016 Download Download
2
A Scalable Approach for Content-Based Image Retrieval in
Peer-to-Peer Networks
2016 Download Download
3
Learning of Multimodal Representations with Random Walks
on the Click Graph
2016 Download Download
4
Online Multi-Modal Distance Metric Learning with
Application to Image Retrieval
2016 Download Download
5 Tag Based Image Search by Social Re-ranking 2016 Download Download
SECURE COMPUTING
1
Contributory Broadcast Encryption with Efficient Encryption
and Short Ciphertexts
2016 Download Download
2 Data Lineage in Malicious Environments 2016 Download Download
3 Detecting Malicious Facebook Applications 2016 Download Download
4. 4 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments 2016 Download Download
5
Inference Attack on Browsing History of Twitter Users using
Public Click Analytics and Twitter Metadata
2016 Download Download
6 Resolving Multi-party Privacy Conflicts in Social Media 2016 Download Download
1
Hidden Ciphertext Policy Attribute-Based Encryption Under
Standard Assumptions
2016 Download Download
2
Optimized Search-and-Compute Circuits and Their
Application to Query Evaluation on Encrypted Data
2016 Download Download
3
Privacy-Preserving Utility Verification of the Data Published
by Non-interactive Differentially Private Mechanisms
2016 Download Download
PARALLEL AND DISTRIBUTED SYSTEMS
1 A Hop-by-Hop Routing Mechanism for Green Internet 2016 Download Download
2 Continuous Answering Holistic Queries over Sensor Networks 2016 Download Download
3
Dictionary Based Secure Provenance Compression for
Wireless Sensor Networks
2016 Download Download
4
The Server Provisioning Problem for Continuous Distributed
Interactive Applications
2016 Download Download
SOFTWARE ENGINEERING
1
Mapping Bug Reports to Relevant Files: A Ranking Model, a
Fine-Grained Benchmark, and Feature Evaluation
2016 Download Download
2
Metamorphic Testing for Software Quality Assessment: A
Study of Search Engines
2016 Download Download
3 SITAR: GUI Test Script Repair 2016 Download Download
5. Sno
NS2 & NS3 PROJECTS IEEE Abstract
Base
Paper
Mobile Ad-hoc Network
1
A Novel Approach for Efficient Usage of Intrusion Detection
System in Mobile Ad Hoc Networks
2016 Download Download
2
Detecting Colluding Blackhole and Greyhole Attacks in Delay
Tolerant Networks
2016 Download Download
3
Mitigating Denial of Service Attacks in OLSR Protocol Using
Fictitious Nodes
2016 Download Download
4
Opportunistic Routing With Congestion Diversity in Wireless
Ad Hoc Networks
2016 Download Download
5
Top-k Query Processing and Malicious Node Identification
Based on Node Grouping in MANETs
2016 Download Download
VANET
1
A Pseudonym Management System to Achieve Anonymity in
Vehicular Ad Hoc Networks
2016 Download Download
2
ART: An Attack-Resistant Trust Management Scheme for
Securing Vehicular Ad Hoc Networks
2016 Download Download
3
Contact-Aware Data Replication in Roadside Unit Aided
Vehicular Delay Tolerant Networks
2016 Download Download
4
DIVERT: A Distributed Vehicular Traffic Re-routing System
for Congestion Avoidance
2016 Download Download
5
Dual Authentication and Key Management Techniques for
Secure Data Transmission in Vehicular Ad Hoc Networks
2016 Download Download
6
Secure and Robust Multi-Constrained QoS Aware Routing
Algorithm for VANETs
2016 Download Download
Wireless Sensor Network
1 A Hop-by-Hop Routing Mechanism for Green Internet 2016 Download Download
2
Achieving Optimal Traffic Engineering Using a Generalized
Routing Framework
2016 Download Download
3
Assessing Performance Gains Through Global Resource
Control of Heterogeneous Wireless Networks
2016 Download Download
6. 4
CANS: Towards Congestion-Adaptive and Small Stretch
Emergency Navigation with Wireless Sensor Networks
2016 Download Download
5
Cluster-Based Routing for the Mobile Sink in Wireless Sensor
Networks With Obstacles
2016 Download Download
6
Code-Based Neighbor Discovery Protocols in Mobile Wireless
Networks
2016 Download Download
7
Duplicate Detectable Opportunistic Forwarding in Duty-Cycled
Wireless Sensor Networks
2016 Download Download
8
Fair Routing for Overlapped Cooperative Heterogeneous
Wireless Sensor Networks
2016 Download Download
9
Geographic and Opportunistic Routing for Underwater Sensor
Networks
2016 Download Download
10 iPath: Path Inference in Wireless Sensor Networks 2016 Download Download
11
Joint Optimization of Lifetime and Transport Delay under
Reliability Constraint Wireless Sensor Networks
2016 Download Download
12
Location aware sensor routing protocol for mobile wireless
sensor networks
2016 Download Download
13
Maximizing Data Collection Throughput on a Path in Energy
Harvesting Sensor Networks Using a Mobile Sink
2016 Download Download
15 Privacy-Preserving Data Aggregation in Mobile Phone Sensing 2016 Download Download
16
RSSI-based Localization through Uncertain Data Mapping for
Wireless Sensor Networks
2016 Download Download
17
Towards Distributed Optimal Movement Strategy for Data
Gathering in Wireless Sensor Networks
2016 Download Download
Network Security
1
A Secure and Efficient ID-Based Aggregate Signature Scheme
for Wireless Sensor Networks
2016 Download Download
2
ActiveTrust: Secure and Trustable Routing in Wireless Sensor
Networks
2016 Download Download
3
Adaptive and Channel-Aware Detection of Selective
Forwarding Attacks in Wireless Sensor Networks
2016 Download Download
4
Dynamic Network Control for Confidential Multi-Hop
Communications
2016 Download Download
7. 5
Embedding IP Unique Shortest Path Topology on a
Wavelength-Routed Network: Normal and Survivable Design
2016 Download Download
6
Energy and Memory Efficient Clone Detection in Wireless
Sensor Networks
2016 Download Download
7
Ghost-in-ZigBee: Energy Depletion Attack on ZigBee based
Wireless Networks
2016 Download Download
8 LAAEM: A Method to Enhance LDoS Attack 2016 Download Download
9
Mimicry Attacks Against Wireless Link Signature and New
Defense Using Time-Synched Link Signature
2016 Download Download
10
PKC-Based DoS Attacks-Resistant Scheme in Wireless Sensor
Networks
2016 Download Download
11
PROVEST: Provenance-based Trust Model for Delay Tolerant
Networks
2016 Download Download
12
Reliable and Efficient Data Acquisition in Wireless Sensor
Networks in the Presence of Transfaulty Nodes
2016 Download Download
13
Secure Transmission Against Pilot Spoofing Attack: A Two-
Way Training-Based Scheme
2016 Download Download
14
Security Analysis and Improvements on Two Homomorphic
Authentication Schemes for Network Coding
2016 Download Download
15
Traffic Decorrelation Techniques for Countering a Global
Eavesdropper in WSNs
2016 Download Download
8. Sno .NET PROJECTS IEEE Abstract
Base
Paper
CLOUD COMPUTING
1
A Secure and Dynamic Multi-Keyword Ranked Search Scheme
over Encrypted Cloud Data
2016 Download Download
2
Catch You if You Misbehave: Ranked Keyword Search Results
Verification in Cloud Computing
2016 Download Download
3
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption
with Verifiable Delegation in Cloud Computing
2016 Download Download
4
Dynamic and Public Auditing with Fair Arbitration for Cloud
Data
2016 Download Download
5
Dynamic-Hash-Table Based Public Auditing for Secure Cloud
Storage
2016 Download Download
6
Enabling Cloud Storage Auditing With Verifiable Outsourcing
of Key Updates
2016 Download Download
7
Fine-Grained Two-Factor Access Control for Web-Based
Cloud Computing Services
2016 Download Download
8
Identity-Based Proxy-Oriented Data Uploading and Remote
Data Integrity Checking in Public Cloud
2016 Download Download
9
MMBcloud-tree: Authenticated Index for Verifiable Cloud
Service Selection
2016 Download Download
10
Trust-but-Verify: Verifying Result Correctness of Outsourced
Frequent Itemset Mining in Data-Mining-As-a-Service
Paradigm
2016 Download Download
9. DATA MINING
1
Personalized Travel Sequence Recommendation on Multi-
Source Big Social Media
2016 Download Download
2
Practical Approximate k Nearest Neighbor Queries with
Location and Query Privacy
2016 Download Download
3 Text Mining the Contributors to Rail Accidents 2016 Download Download
4
User-Service Rating Prediction by Exploring Social Users’
Rating Behaviors
2016 Download Download
SECURE COMPUTING
1
Detecting and Removing Web Application Vulnerabilities with
Static Analysis and Data Mining
2016 Download Download
2 ID2S Password-Authenticated Key Exchange Protocols 2016 Download Download
3
Privacy-Preserving Outsourced Association Rule Mining on
Vertically Partitioned Databases
2016 Download Download
MOBILE COMPUTING
1
A Joint Time Synchronization and Localization Design for
Mobile Underwater Sensor Networks
2016 Download Download
2
DaGCM: A Concurrent Data Uploading Framework for
Mobile Data Gathering in Wireless Sensor Networks
2016 Download Download
3
Service Usage Classification with Encrypted Internet Traffic in
Mobile Messaging Apps
2016 Download Download
4
Traffic Decorrelation Techniques for Countering a Global
2016 Download Download
10. Eavesdropper in WSNs
5
WORAL: A Witness Oriented Secure Location Provenance
Framework for Mobile Devices
2016 Download Download
NETWORKING
1
Efficient Certificateless Access Control for Wireless Body Area
Networks
2016 Download Download
2
Finding Nonequivalent Classifiers in Boolean Space to Reduce
TCAM Usage
2016 Download Download
3
Geographic and Opportunistic Routing for Underwater Sensor
Networks
2016 Download Download
4
Optimizing Cost for Online Social Networks on Geo-
Distributed Clouds
2016 Download Download
5
Secure and Efficient data communication protocol for Wireless
Body Area Networks
2016 Download Download
PARALLEL AND DISTRIBUTED SYSTEMS
1
Authenticated Key Exchange Protocols for Parallel Network
File Systems
2016 Download Download
2
Real-Time Semantic Search Using Approximate Methodology
for Large-Scale Storage Systems
2016 Download Download
11. Sno HADOOP BIGDATA IEEE Abstract
Base
Paper
Big Data Projects
1
A Big Data Clustering Algorithm for Mitigating the Risk of
Customer Churn
2016 Download Download
2
A Parallel Patient Treatment Time Prediction Algorithm and
Its Applications in Hospital Queuing-Recommendation in a Big
Data Environment
2016 Download Download
3
Adaptive Replication Management in HDFS based on
Supervised Learning
2016 Download Download
4
Clustering of Electricity Consumption Behavior Dynamics
toward Big Data Applications
2016 Download Download
5
Distributed In-Memory Processing of All k Nearest Neighbor
Queries
2016 Download Download
6
Dynamic Job Ordering and Slot Configurations for MapReduce
Workloads
2016 Download Download
7
Dynamic Resource Allocation for MapReduce with Partitioning
Skew
2016 Download Download
8
FiDoop-DP: Data Partitioning in Frequent Itemset Mining on
Hadoop Clusters
2016 Download Download
9
Novel Scheduling Algorithms for Efficient Deployment of
MapReduce Applications in Heterogeneous Computing
Environments
2016 Download Download
10
On Traffic-Aware Partition and Aggregation in MapReduce for
Big Data Applications
2016 Download Download
12. 11
Optimization for Speculative Execution in Big Data Processing
Clusters
2016 Download Download
12
Service Rating Prediction by Exploring Social Mobile Users’
Geographical Locations
2016 Download Download
13
Wide Area Analytics for Geographically Distributed
Datacenters
2016 Download Download
Sno ANDROID PROJECTS IEEE Abstract
Base
Paper
Android Projects
1
A Shoulder Surfing Resistant Graphical Authentication
System
2016 Download Download
2
Authentication of Smartphone Users Using Behavioral
Biometrics
2016 Download Download
9
Context Awareness Location-based Android Application for
Tracking Purposes in Assisted Living
2016 Download Download
3
Context Awareness Location-based Android Application for
Tracking Purposes in Assisted Living
2016 Download Download
4
Design of Secure Location and Message Sharing System for
Android Platform
2016 Download Download
5
Designing a Secure Exam Management System (SEMS) for
M-Learning Environments
2016 Download Download
6
Developing Apps for Visually Impaired People: Lessons
Learned from Practice
2016 Download Download
13. 7
Design and Analysis of an Efficient Friend-to-Friend
Content Dissemination System
2016 Download Download
8
FoodForCare: An Android Application for Self-Care with
Healthy Food
2016 Download Download
9
Intelligent Hands Free Speech based SMS System on
Android
2016 Download Download
10
Mobile Cloud Support for Semantic-enriched Speech
Recognition in Social Care
2016 Download Download
11
One-Round Privacy-Preserving Meeting Location
Determination for Smartphone Applications
2016 Download Download
12
Optimizing User Experience in Choosing Android
Applications
2016 Download Download
13
PassBYOP: Bring Your Own Picture for Securing
Graphical Passwords
2016 Download Download
14
Performance Analysis of Touch-Interaction Behavior for
Active Smartphone Authentication
2016 Download Download
15
Privacy-Preserving Location Sharing Services for Social
Networks
2016 Download Download
16
Personalized Travel Sequence Recommendation on Multi-
Source Big Social Media
2016 Download Download
17
Safeguard: User Reauthentication on Smartphones via
Behavioral Biometrics
2016 Download Download