S.No |
Code |
Title |
Category |
---|---|---|---|
1 |
LSJ1501 |
A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks |
NETWORKING |
2 |
LSJ1502 |
A Proximity-Aware Interest-Clustered P2P File Sharing System |
NETWORKING |
3 |
LSJ1503 |
Detecting Malicious Facebook Applications |
NETWORKING |
4 |
LSJ1504 |
Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing
|
NETWORKING |
5 |
LSJ1505 |
Best Keyword Cover Search |
DATA MINING |
6 |
LSJ1506 |
Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model |
DATA MINING |
7 |
LSJ1507 |
Context-Based Diversification for Keyword Queries over XML DATA |
DATA MINING |
8 |
LSJ1508 |
Discovery of Ranking Fraud for Mobile Apps |
DATA MINING |
9 |
LSJ1509 |
Malware Propagation in Large-Scale Networks |
DATA MINING |
10 |
LSJ1510 |
On Summarization and Timeline Generation for Evolutionary Tweet Streams |
DATA MINING |
11 |
LSJ1511 |
Privacy Policy Inference of User Uploaded Images on Content Sharing Sites |
DATA MINING |
12 |
LSJ1512 |
Progressive Duplicate Detection |
DATA MINING |
13 |
LSJ1513 |
Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection |
DATA MINING |
14 |
LSJ1514 |
Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services |
DATA MINING |
15 |
LSJ1515 |
Scalable Constrained Spectral Clustering |
DATA MINING |
16 |
LSJ1516 |
Towards Effective Bug Triage with Software Data Reduction Techniques |
DATA MINING |
17 |
LSJ1517 |
Tweet Segmentation and Its Application to Named Entity Recognition |
DATA MINING |
18 |
LSJ1518 |
Real-Time Detection of Traffic From Twitter Stream Analysis |
DATA MINING |
19 |
LSJ1519 |
t-Closeness through Micro Aggregation: Strict Privacy with Enhanced Utility Preservation |
DATA MINING |
20 |
LSJ1520 |
Stealthy Denial of Service Strategy in Cloud Computing |
CLOUD COMPUTING |
21 |
LSJ1521 |
Secure Auditing and Deduplicating Data in Cloud |
CLOUD COMPUTING |
22 |
LSJ1522 |
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation |
CLOUD COMPUTING |
23 |
LSJ1523 |
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems |
CLOUD COMPUTING |
24 |
LSJ1524 |
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage |
CLOUD COMPUTING |
25 |
LSJ1525 |
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing |
CLOUD COMPUTING |
26 |
LSJ1526 |
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage |
CLOUD COMPUTING |
27 |
LSJ1527 |
Identity-Based Encryption with Outsourced Revocation in Cloud Computing |
CLOUD COMPUTING |
28 |
LSJ1528 |
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data |
CLOUD COMPUTING |
29 |
LSJ1529 |
Enabling Cloud Storage Auditing With Key-Exposure Resistance |
CLOUD COMPUTING |
30 |
LSJ1530 |
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption |
CLOUD COMPUTING |
31 |
LSJ1531 |
Cloud Armor: Supporting Reputation-based Trust Management for Cloud Services |
CLOUD COMPUTING |
32 |
LSJ1532 |
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing |
CLOUD COMPUTING |
33 |
LSJ1533 |
Audit-Free Cloud Storage via Deniable Attribute-based Encryption |
CLOUD COMPUTING |
34 |
LSJ1534 |
An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration |
CLOUD COMPUTING |
35 |
LSJ1535 |
A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud |
CLOUD COMPUTING |
36 |
LSJ1536 |
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data |
CLOUD COMPUTING |
37 |
LSJ1537 |
A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems |
CLOUD COMPUTING |
38 |
LSJ1538 |
A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing |
CLOUD COMPUTING |
39 |
LSJ1539 |
A Hybrid Cloud Approach for Secure Authorized Deduplication |
CLOUD COMPUTING |
40 |
LSJ1540 |
Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System |
SERVICE COMPUTING |
41 |
LSJ1541 |
Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation |
SERVICE COMPUTING |
42 |
LSJ1542 |
Prediction of Atomic Web Services Reliability for QoS-Aware Recommendation |
SERVICE COMPUTING |
43 |
LSJ1543 |
A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to-Business E-Services |
FUZZY SYSTEMS |
44 |
LSJ1544 |
Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks |
MOBILE COMPUTING |
45 |
LSJ1545 |
Friendbook: A Semantic-Based Friend Recommendation System for Social Networks |
MOBILE COMPUTING |
46 |
LSJ1546 |
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks |
MOBILE COMPUTING |
47 |
LSJ1547 |
User-Defined Privacy Grid System for Continuous Location-Based Services |
MOBILE COMPUTING |
48 |
LSJ1548 |
An Attribute-Assisted Reranking Model for Web Image Search |
IMAGE PROCESSING |
49 |
LSJ1549 |
EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval |
IMAGE PROCESSING |
50 |
LSJ1550 |
Learning to Rank Image Tags With Limited Training Examples |
IMAGE PROCESSING |
51 |
LSJ1551 |
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks |
SECURE COMPUTING |
52 |
LSJ1552 |
Continuous and Transparent User Identity Verification for Secure Internet Services |
SECURE COMPUTING |
53 |
LSJ1553 |
A Computational Dynamic Trust Model for User Authorization |
SECURE COMPUTING |
54 |
LSJ1554 |
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts |
SECURE COMPUTING |
55 |
LSJ1555 |
DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks |
SECURE COMPUTING |
56 |
LSJ1556 |
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints |
SECURE COMPUTING |
57 |
LSJ1557 |
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks |
SECURE COMPUTING |
58 |
LSJ1558 |
Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers |
SECURE COMPUTING |
59 |
LSJ1559 |
Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks |
PARALLEL & DISTRIBUTED SYSTEMS |
60 |
LSJ1560 |
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security |
PARALLEL & DISTRIBUTED SYSTEMS |
61 |
LSJ1561 |
Secure Distributed Deduplication Systems with Improved Reliability |
PARALLEL & DISTRIBUTED SYSTEMS |
62 |
LSJ1562 |
A Framework for Secure Computations with Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations |
INFORMATION FORENSICS & SECURITY |
63 |
LSJ1563 |
Effective Key Management in Dynamic Wireless Sensor Networks | INFORMATIONFORENSICS & SECURITY |
64 |
LSJ1564 |
Key Updating for Leakage Resiliency with Application to AES Modes of Operation |
INFORMATIONFORENSICS & SECURITY |
65 |
LSJ1565 |
Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backscatter |
INFORMATION FORENSICS & SECURITY |
66 |
LSJ1566 |
Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks |
INFORMATION FORENSICS & SECURITY |