S.No |
Code |
Title |
Category |
---|---|---|---|
1 |
LSJ1401 |
A Hybrid Cloud Approach for Secure Authorized Deduplication |
CLOUD COMPUTING |
2 |
LSJ1402 |
Behavioral Malware Detection in Delay Tolerant Networks |
CLOUD COMPUTING |
3 |
LSJ1403 |
A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems |
CLOUD COMPUTING |
4 |
LSJ1404 |
Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation |
CLOUD COMPUTING |
5 |
LSJ1405 |
Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds |
CLOUD COMPUTING |
6 |
LSJ1406 |
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases |
CLOUD COMPUTING |
7 |
LSJ1407 |
Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage |
CLOUD COMPUTING |
8 |
LSJ1408 |
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage |
CLOUD COMPUTING |
9 |
LSJ1409 |
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud |
CLOUD COMPUTING |
10 |
LSJ1410 |
PACK Prediction-Based Cloud Bandwidth and Cost Reduction System |
CLOUD COMPUTING |
11 |
LSJ1411 |
Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data |
CLOUD COMPUTING |
12 |
LSJ1412 |
Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds |
CLOUD COMPUTING |
13 |
LSJ1413 |
Towards Differential Query Services in Cost-Efficient Clouds |
CLOUD COMPUTING |
14 |
LSJ1414 |
A Cocktail Approach for Travel Package Recommendation |
DATA MINING |
15 |
LSJ1415 |
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data |
DATA MINING |
16 |
LSJ1416 |
BestPeer++ A Peer-to-Peer Based Large-Scale Data Processing Platform |
DATA MINING |
17 |
LSJ1417 |
Computing Multi-Dimensional Trust by Mining E-Commerce Feedback Comments |
DATA MINING |
18 |
LSJ1418 |
Dealing With Concept Drifts in Process Mining |
DATA MINING |
19 |
LSJ1419 |
Discovering Emerging Topics in Social Streams via Link-Anomaly Detection |
DATA MINING |
20 |
LSJ1420 |
Efficient Prediction of Difficult Keyword Queries over Databases |
DATA MINING |
21 |
LSJ1421 |
Facilitating Document Annotation Using Content and Querying Value |
DATA MINING |
22 |
LSJ1422 |
Fast Nearest Neighbor Search with Keywords |
DATA MINING |
23 |
LSJ1423 |
Keyword Query Routing |
DATA MINING |
24 |
LSJ1424 |
Privacy-Preserving and Content-Protecting Location Based Queries |
DATA MINING |
25 |
LSJ1425 |
Security Evaluation of Pattern Classifiers under Attack |
DATA MINING |
26 |
LSJ1426 |
Supporting Privacy Protection in Personalized Web Search |
DATA MINING |
27 |
LSJ1427 |
Towards Online Shortest Path Computation |
DATA MINING |
28 |
LSJ1428 |
Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems |
SECURE COMPUTING |
29 |
LSJ1429 |
Efficient and Privacy-Aware Data Aggregation in Mobile Sensing |
SECURE COMPUTING |
30 |
LSJ1430 |
PROFILR Toward Preserving Privacy and Functionality in Geosocial Networks |
SECURE COMPUTING |
31 |
LSJ1431 |
Top-k Query Result Completeness Verification in Tiered Sensor Networks |
SECURE COMPUTING |
32 |
LSJ1432 |
Automatic Test Packet Generation |
NETWORKING |
33 |
LSJ1433 |
Cost-Effective Resource Allocation of Overlay Routing Relay Nodes |
NETWORKING |
34 |
LSJ1434 |
Boundary Cutting for Packet Classification |
NETWORKING |
35 |
LSJ1435 |
Secure Data Retrieval For Decentralized Disruption-Tolerant Military Networks |
NETWORKING |
36 |
LSJ1436 |
Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks |
PARALLEL & DISTRIBUTED SYSTEMS |
37 |
LSJ1437 |
Consistency as a Service: Auditing Cloud Consistency |
NETWORKING |
38 |
LSJ1438 |
Learning and Recognition of On-Premise Signs from Weakly Labeled Street View Images |
IMAGE PROCESSING |
39 |
LSJ1439 |
Multi-Path Routing and Forwarding in Non-Cooperative Wireless Networks |
PARALLEL & DISTRIBUTED SYSTEMS |
40 |
LSJ1440 |
RRE: A Game-Theoretic Intrusion Response and Recovery Engine |
PARALLEL & DISTRIBUTED SYSTEMS |
41 |
LSJ1441 |
Securing Broker-Less PublishSubscribe Systems Using Identity-Based Encryption |
PARALLEL & DISTRIBUTED SYSTEMS |
42 |
LSJ1442 |
SOS A Distributed Mobile Q&A System Based on Social Networks |
PARALLEL & DISTRIBUTED SYSTEMS |
43 |
LSJ1443 |
The Client Assignment Problem for Continuous Distributed Interactive Applications Analysis, Algorithms, and Eva |
PARALLEL & DISTRIBUTED SYSTEMS |
44 |
LSJ1444 |
The Design and Evaluation of An Information Sharing System for Human Networks |
PARALLEL & DISTRIBUTED SYSTEMS |
45 |
LSJ1445 |
Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks |
PARALLEL & DISTRIBUTED SYSTEMS |
46 |
LSJ1446 |
Secure Outsourced Attribute-based Signatures |
PARALLEL & DISTRIBUTED SYSTEMS |
47 |
LSJ1447 |
An Incentive Framework for Cellular Traffic Offloading |
MOBILE COMPUTING |
48 |
LSJ1448 |
Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks |
MOBILE COMPUTING |
49 |
LSJ1449 |
Efficient Authentication for Mobile and Pervasive Computing |
MOBILE COMPUTING |
50 |
LSJ1450 |
Friendbook A Semantic-based Friend Recommendation System for Social Networks |
MOBILE COMPUTING |
51 |
LSJ1451 |
Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices |
MOBILE COMPUTING |
52 |
LSJ1452 |
Privacy-Enhanced Web Service Composition |
SERVICE COMPUTING (Web Service) |
53 |
LSJ1453 |
Web Service Recommendation via Exploiting Location and QoS Information |
SERVICE COMPUTING (Web Service) |
54 |
LSJ1454 |
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis |
PARALLEL & DISTRIBUTED SYSTEMS |
55 |
LSJ1455 |
Secure Mining of Association Rules in Horizontally Distributed Databases |
Data Mining |
56 |
LSJ1456 |
Privacy Preserving Delegated Access Control in Public Clouds |
CLOUD COMPUTING |
57 |
LSJ1457 |
m-Privacy for Collaborative Data Publishing |
DATA MINING |
58 |
LSJ1458 |
Personalized Web Search Using Browsing History and Domain Knowledge | Intelligent Computing |
59 |
LSJ1459 |
SocialTube: P2P-Assisted Video Sharing in Online Social Networks |
PARALLEL & DISTRIBUTED SYSTEMS |
60 |
LSJ1460 |
On the Use of Side Information for Mining Text Data |
DATA MINING |
61 |
LSJ1461 |
Secure kNN Query Processing in Untrusted Cloud Environments |
DATA MINING |
62 |
LSJ1462 |
TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality |
DATA MINING |
63 |
LSJ1463 |
XSPath: Navigation on XML Schemas Made Easy |
DATA MINING |
64 |
LSJ1464 |
Dynamic Query Forms for Database Queries |
DATA MINING |
65 |
LSJ1465 |
Video Dissemination over Hybrid Cellular and Ad Hoc Networks |
MOBILE COMPUTING |
66 |
LSJ1466 |
Mapping XML to a Wide Sparse Table |
DATA MINING |
67 |
LSJ1467 |
A Cloud Enviroment for Backup and Data Storage |
CLOUD COMPUTING |
68 |
LSJ1468 |
Low-Priced and Energy-Efficient Detection of Replicas for Wireless Sensor Networks |
SECURE COMPUTING |
69 |
LSJ1469 |
Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation |
DATA MINING |
70 |
LSJ1470 |
A Scientometric Analysis of Cloud Computing Literature |
CLOUD COMPUTING |
71 |
LSJ1471 |
Best Keyword Cover Search |
DATA MINING |
72 |
LSJ1472 |
A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks |
PARALLEL & DISTRIBUTED SYSTEMS |
73 |
LSJ1473 |
Incremental Affinity Propagation Clustering Based on Message Passing |
DATA MINING |
74 |
LSJ1474 |
A General Self-Organized Tree-Based Energy-Balance Routing Protocol for Wireless Sensor Network |
NETWORKING |
75 |
LSJ1475 |
Personalized Geo-Specific Tag Recommendation for Photos on Social Websites |
MULTIMEDIA |
76 |
LSJ1476 |
A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks
|
SERVICE COMPUTING |
77 |
LSJ1477 |
Image Search Reranking With Query-Dependent Click-Based Relevance Feedback |
IMAGE PROCESSING |
78 |
LSJ1478 |
Click Prediction for Web Image Reranking Using Multimodal Sparse Coding
|
IMAGE PROCESSING |
79 |
LSJ1479 |
LARS*: An Efficient and Scalable Location-Aware Recommender System |
DATA MINING |
80 |
LSJ1480 |
A Two-stage Deonoymization Attack Against Anonymized Social Networks |
PARALLEL & DISTRIBUTED SYSTEMS |
81 |
LSJ1481 |
Privacy Preserving Enhance Collaborative Tagging | DATA MINING |
82 |
LSJ1482 |
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing |
PARALLEL & DISTRIBUTED SYSTEMS |
83 |
LSJ1483 |
E-MACs: Towards More Secure and More Efficient Constructions of Secure Channels | SECURE COMPUTING |
84 |
LSJ1484 |
A Tag Encoding Scheme against Pollution Attack to Linear Network Coding |
PARALLEL & DISTRIBUTED SYSTEMS |
85 |
LSJ1485 |
Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices |
MOBILE COMPUTING |
86 |
LSJ1486 |
Preserving location privacy in geo social application |
MOBILE COMPUTING |
87 |
LSJ1487 |
Identity Based Distributed Provable Data Possession in Multi Cloud Storage |
CLOUD COMPUTING |