JAVA -2014-2015
- Key – Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage Cloud Computing
- Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds Cloud Computing
- A Hybrid Cloud Approach for Secure Authorized Deduplication Cloud Computing
- Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud Cloud Computing
- Accuracy Constrained Privacy-Preserving Access Control Mechanism for Relational Data Data Mining
- Supporting Privacy Protection in Personalized Web Search Data Mining
- Security Evaluation of Pattern Classifiers under Attack Data Mining
- Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks Mobile Computing
- Efficient Authentication for Mobile and Pervasive Computing Android
- Friend book: A Semantic-based Friend Recommendation System for Social Networks Mobile Computing
- Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks Wireless Sensor Networks
- Secure Continuous Aggregation in Wireless Sensor Networks Wireless Sensor Networks
- Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks Wireless Sensor Networks
- Cost-Effective Resource Allocation of Overlay Routing Relay Nodes Wireless Sensor Networks
- Securing Broker Less Publish Subscribe Systems Using Identity-Based Encryption Network Security
- Automatic Test Packet Generation Networking
- A System for Denial-of-Service Attack Detection Based on Multivar iate Correlation Analysis Network Security
- Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data Cloud Computing
- Trajectory Improves Data Delivery in Urban Vehicular Networks MANET, Ad Hoc Networks
- Click Prediction for Web Image Reranking Using Multimodal Sparse Coding Image Processing
- Captcha as Graphical Passwords-A New Security Primitive Based on Hard AI Problems Image Processing
- Privacy-Enhanced Web Service Composition Services Computing
- Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attacker’s Impact Information Forensics and Security
- Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme Knowledge and Data Engineering
- CLOUDQUAL A Quality Model for Cloud Services Industrial Informatics
- Multi-Core Embedded Wireless Sensor Networks Architecture and Applications Parallel and Distributed Systems
- Cross-Layer Approach for Minimizing Routing Disruption in IP Networks Parallel and Distributed Systems
- Multicast Capacity in MANET with Infrastructure Support Parallel and Distributed Systems
- Efficient Data Collection for Large-Scale Mobile Monitoring Applications Parallel and Distributed Systems
- Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks Wireless Sensor Networks
- Joint Topology-Transparent Scheduling and QoS Routing in Ad Hoc Networks Vehicular Technology
- Quality of Service Provision in Cloud-based Storage System for Multimedia Delivery Cloud Computing
- Distributed Mobile Sink Routing for Wireless Sensor Networks A Survey Parallel and Distributed Systems
- The Design and Evaluation of An Information Sharing System for Human Networks Parallel and Distributed Systems
- Web Service Recommendation via Exploiting Location and QoS Information Parallel and Distributed Systems
- Congestion Aware Routing in Nonlinear Elastic Optical Networks
- Leveraging Social Networks for P2P Content based File Sharing in Disconnected MANETs Mobile Computing
- Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds Cloud Computing
- Energy Efficient Reliable Routing Considering Residual Energy in Wireless Ad Hoc Networks MANET, Ad Hoc Networks
- Building Confidential And Efficient Query Services In The Cloud With RASP Data Cloud Computing
- An Empirical Performance Evaluation of Relational Keyword Search Systems Data Mining
- ITA Innocuous Topology Awareness Parallel and Distributed Systems
- Cloning, Resource Exchange, and Relation Adaptation: An Integrative Self-Organization Mechanism in a Distributed Agent Network.Parallel and Distributed Systems
- A Stochastic Model to Investigate Data Center Performance Data Cloud Computing
- Distributed , Concurrent , and Independent Access to Encrypted Cloud Databases Cloud Computing
- Efficient Prediction of Difficult Keyword Queries over Databases Data Mining
- Expressive , Efficient , and Revocable Data Access Control for Multi – Authority Cloud Storage Cloud Computing
- Keyword Query Routing Knowledge and Data Engineering
- Fast Nearest Neighbor Search with Keywords Data Mining
- Privacy-Preserving and Content-Protecting Location Based Queries Knowledge and Data Engineering
- PROFILR : Toward Preserving Privacy and Functionality in Geosocial Networks Network Security
- Scalable Distributed Service Integrity Attestation for Software-as-a- Service Clouds Cloud Computing
- The Client Assignment Problem for Continuous Distributed Computing Systems
- Towards Online Shortest Path Computation Knowledge and Data Engineering
- A Social Compute Cloud Allocating and Sharing Infrastructure Resources via Social Networks Services Computing
- A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using Map Reduce on Cloud Parallel and Distributed Systems
- Best Peer++: A Peer-to-Peer Based Large-Scale Data Processing Platform Data Mining
- Data Mining with Big Data Knowledge and Data Engineering
- Facilitating Document Annotation Using Content and Querying Value Knowledge and Data Engineering
- An Incentive Framework for Cellular Traffic Offloading Mobile Computing
- The Design and Evaluation of An Information Sharing System for Human Networks Parallel and Distributed Systems
- Transmission-Efficient Clustering Method for Wireless Sensor Networks Using Compressive Sensing. Parallel and Distributed Systems
- A Qos-Oriented Distributed Routing Protocol For Hybrid Wireless Networks Mobile Computing
- Network Coding Aware Cooperative MAC Protocol for Wireless Ad Hoc Networks Networking
- Exploiting Service Similarity for Privacy in Location-Based Search Queries. Parallel and Distributed Systems
- Efficient and Privacy Aware Data Aggregation in Mobile Sensing Network Security
- Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices Mobile Computing
- Secure Mining of Association Rules in Horizontally Distributed Databases Data Mining
- Trusted DB-A trusted hardware based database with privacy and confidentiality Data Mining
- A Cocktail Approach for Travel Package Recommendation Knowledge and Data Engineering
- Discovering Emerging Topics in Social Streams via Link-Anomaly Detection Data Mining
- Top-k Query Result Completeness Verification in Tiered Sensor Networks Communications
- SOS: A Distributed Mobile Q&A System Based on Social Networks Parallel and Distributed Systems
- Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks Parallel and Distributed Systems
- Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions Parallel and Distributed Systems
- Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks Parallel and Distributed Systems
.NET Projects 2014-2015
- Optimized multicast routing algorithm based on tree structure in MANETs Communications
- Security Analysis of Handover Key Management in 4G LTESAE Networks Mobile Computing
- Fast and Secure Multihop Broadcast Solutions for Intervehicular Communication Intelligent Transportation Systems
- Key Aggregate Cryptosystem For Scalable Data Sharing In Cloud Storage Parallel and Distributed Systems
- An Empirical Performance Evaluation of Relational Keyword Search Systems Knowledge and Data Engineering
- Supporting Privacy Protection in Personalized Web Search Knowledge and Data Engineering
- Building Confidential And Efficient Query Services In The Cloud With RASP Data Knowledge and Data Engineering
- A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis Parallel and Distributed Systems
- An Empirical Performance Evaluation of Relational Keyword Search Techniques Knowledge and Data Engineering
- Autonomous Mobile Mesh Networks Mobile Computing
- Consistency as a Service Auditing Cloud Consistency Network and Service Management
- Content Caching and Scheduling in Wireless Networks With Elastic and Inelastic Traffic Networking
- Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds Parallel and Distributed Systems
- Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases Parallel and Distributed Systems
- Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage Theory and Implementation Parallel and Distributed Systems
- Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage Services Computing
- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage Parallel and Distributed Systems
- LARS An Efficient and Scalable Location-Aware Recommender System Knowledge and Data Engineering
- Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected MANETs Mobile Computing
- Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud Services Computing
- Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds Parallel and Distributed Systems
- Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks Networking
- Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions Parallel and Distributed Systems
- Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation Knowledge and Data Engineering
- Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems Information Forensics and Security
- An Error-Minimizing Framework for Localizing Jammers in Wireless Networks Parallel and Distributed Systems
- Efficient Data Query in Intermittently-Connected Mobile Ad Hoc Social Networks Parallel and Distributed Systems
- A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks Mobile Computing
- Web Image Re-Ranking Using Query-Specific Semantic Signatures Pattern Analysis and Machine Intelligence
- Click Prediction for Web Image Reranking Using Multimodal Sparse Coding Image Processing
- Designing an Efficient Image Encryption-Then-Compression System via Prediction Information Forensics and Security
- Facilitating Document Annotation Using Content and Querying Value
- An Empirical Performance Evaluation of Relational Keyword Search Techniques
- Set Predicates in SQL: Enabling Set-Level Comparisons for Dynamically Formed Groups
- Keyword Query Routing
- Supporting Privacy Protection in Personalized Web Search
- Product Aspect Ranking and Its Applications
- Interpreting the Public Sentiment Variations on Twitter
- Infrequent Weighted Itemset Mining Using Frequent Pattern Growth
- An Efficient Certificate less Encryption for Secure Data Sharing in Public Clouds
Data Mining – .NET
- A Group Incremental Approach to Feature Selection Applying Rough Set Technique
- Rough Sets, Kernel Set, and Spatiotemporal Outlier Detection
- Consensus-Based Ranking of Multivalued Objects: A Generalized Borda Count Approach
- Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
- Fast nearest Neighbor Search with Keywords
- Efficient Prediction of Difficult Keyword Queries over Databases
- Web Service Recommendation via Exploiting Location and QoS Information (Data Mining with Networking)
- Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data (Data Mining with Network Security)
NETWORKING – JAVA
- Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks
- A Tag Encoding Scheme against Pollution Attack to Linear Network Coding
- Exploiting Service Similarity for Privacy in Location-Based Search Queries
- Network Coding Aware Cooperative MAC Protocol for Wireless Ad Hoc Networks
- A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks
- A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
- Behavioral Malware Detection in Delay Tolerant Networks
- PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
- Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
NETWORKING – .NET
- LocaWard: A Security and Privacy Aware Location-Based Rewarding System
- Power Cost Reduction in Distributed Data Centers: A Two-Time-Scale Approach for Delay Tolerant Workloads
- Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks (Networking)
- Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
CLOUD COMPUTING – JAVA
- Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
- Modeling of Distributed File Systems for Practical Performance Analysis
- A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud
- A Hybrid Cloud Approach for Secure Authorized Deduplication
- Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions
- Secure Deduplication with Efficient and Reliable Convergent Key Management
- Transformation-Based Monetary Cost Optimizations for Workflows in the Cloud
- Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing
- Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage (Cloud Java)
Cloud Computing – .NET
- A Novel Economic Sharing Model in a Federation of Selfish Cloud Providers
- A UCONABC Resilient Authorization Evaluation for Cloud Computing
- Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
- Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds
- Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
- Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
- Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
Mobile Computing – JAVA
- Preserving Location Privacy in Geosocial Applications
- A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks
- Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks
- Cooperative Spectrum Sharing: A Contract-Based Approach
Dependable and Secure Computing (Network Security) – JAVA
- Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data
- Bandwidth Distributed Denial of Service: Attacks and Defenses (Dependable and secure computing
- k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities
- On the Security of Trustee-Based Social Authentications
- Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
Image Processing – JAVA
- Vector-Val
- Translation Invariant Directional Framelet Transform Combined With Gabor Filters for Image Denoising ued Image Processing by Parallel Level Sets
- Accelerated Learning-Based Interactive Image Segmentation Using Pairwise Constraints
- Large Discriminative Structured Set Prediction Modeling With Max-Margin Markov Network for Lossless Image Coding
- Image Reconstruction from Double Random Projection
- Saliency-Aware Video Compression.
- md
EmoticonEmoticon