S.No
Code
Title
Category
1
LSJ1501
A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks
NETWORKING
Abstract    BasePaper   
2
LSJ1502
A Proximity-Aware Interest-Clustered P2P File Sharing System
NETWORKING
Abstract    BasePaper   
3
LSJ1503
Detecting Malicious Facebook Applications
NETWORKING
Abstract    BasePaper   
4
LSJ1504
Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing
NETWORKING
Abstract    BasePaper   
5
LSJ1505
Best Keyword Cover Search
DATA MINING
Abstract    BasePaper   
6
LSJ1506
Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model
DATA MINING
Abstract    BasePaper   
7
LSJ1507
Context-Based Diversification for Keyword Queries over XML DATA
DATA MINING
Abstract    BasePaper   
8
LSJ1508
Discovery of Ranking Fraud for Mobile Apps
DATA MINING
Abstract    BasePaper   
9
LSJ1509
Malware Propagation in Large-Scale Networks
DATA MINING
Abstract    BasePaper   
10
LSJ1510
On Summarization and Timeline Generation for Evolutionary Tweet Streams
DATA MINING
Abstract    BasePaper   
11
LSJ1511
Privacy Policy Inference of User Uploaded Images on Content Sharing Sites
DATA MINING
Abstract    BasePaper   
12
LSJ1512
Progressive Duplicate Detection
DATA MINING
Abstract    BasePaper   
13
LSJ1513
Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection
DATA MINING
Abstract    BasePaper   
14
LSJ1514
Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services
DATA MINING
Abstract    BasePaper   
15
LSJ1515
Scalable Constrained Spectral Clustering
DATA MINING
Abstract    BasePaper   
16
LSJ1516
Towards Effective Bug Triage with Software Data Reduction Techniques
DATA MINING
Abstract    BasePaper   
17
LSJ1517
Tweet Segmentation and Its Application to Named Entity Recognition
DATA MINING
Abstract    BasePaper   
18
LSJ1518
Real-Time Detection of Traffic From Twitter Stream Analysis
DATA MINING
Abstract    BasePaper   
19
LSJ1519
t-Closeness through Micro Aggregation: Strict Privacy with Enhanced Utility Preservation
DATA MINING
Abstract    BasePaper   
20
LSJ1520
Stealthy Denial of Service Strategy in Cloud Computing
CLOUD COMPUTING
Abstract    BasePaper   
21
LSJ1521
Secure Auditing and Deduplicating Data in Cloud
CLOUD COMPUTING
Abstract    BasePaper   
22
LSJ1522
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
CLOUD COMPUTING
Abstract    BasePaper   
23
LSJ1523
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
CLOUD COMPUTING
Abstract    BasePaper   
24
LSJ1524
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
CLOUD COMPUTING
Abstract    BasePaper   
25
LSJ1525
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
CLOUD COMPUTING
Abstract    BasePaper   
26
LSJ1526
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage
CLOUD COMPUTING
Abstract    BasePaper   
27
LSJ1527
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
CLOUD COMPUTING
Abstract    BasePaper   
28
LSJ1528
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
CLOUD COMPUTING
Abstract    BasePaper   
29
LSJ1529
Enabling Cloud Storage Auditing With Key-Exposure Resistance
CLOUD COMPUTING
Abstract    BasePaper   
30
LSJ1530
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption
CLOUD COMPUTING
Abstract    BasePaper   
31
LSJ1531
Cloud Armor: Supporting Reputation-based Trust Management for Cloud Services
CLOUD COMPUTING
Abstract    BasePaper   
32
LSJ1532
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
CLOUD COMPUTING
Abstract    BasePaper   
33
LSJ1533
Audit-Free Cloud Storage via Deniable Attribute-based Encryption
CLOUD COMPUTING
Abstract    BasePaper   
34
LSJ1534
An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration
CLOUD COMPUTING
Abstract    BasePaper   
35
LSJ1535
A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
CLOUD COMPUTING
Abstract    BasePaper   
36
LSJ1536
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
CLOUD COMPUTING
Abstract    BasePaper   
37
LSJ1537
A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems
CLOUD COMPUTING
Abstract    BasePaper   
38
LSJ1538
A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
CLOUD COMPUTING
Abstract    BasePaper   
39
LSJ1539
A Hybrid Cloud Approach for Secure Authorized Deduplication
CLOUD COMPUTING
Abstract    BasePaper   
40
LSJ1540
Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
SERVICE COMPUTING
Abstract    BasePaper   
41
LSJ1541
Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
SERVICE COMPUTING
Abstract    BasePaper   
42
LSJ1542
Prediction of Atomic Web Services Reliability for QoS-Aware Recommendation
SERVICE COMPUTING
Abstract    BasePaper   
43
LSJ1543
A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to-Business E-Services
FUZZY SYSTEMS
Abstract    BasePaper   
44
LSJ1544
Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks
MOBILE COMPUTING
Abstract    BasePaper   
45
LSJ1545
Friendbook: A Semantic-Based Friend Recommendation System for Social Networks
MOBILE COMPUTING
Abstract    BasePaper   
46
LSJ1546
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks
MOBILE COMPUTING
Abstract    BasePaper   
47
LSJ1547
User-Defined Privacy Grid System for Continuous Location-Based Services
MOBILE COMPUTING
Abstract    BasePaper   
48
LSJ1548
An Attribute-Assisted Reranking Model for Web Image Search
IMAGE PROCESSING
Abstract    BasePaper   
49
LSJ1549
EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
IMAGE PROCESSING
Abstract    BasePaper   
50
LSJ1550
Learning to Rank Image Tags With Limited Training Examples
IMAGE PROCESSING
Abstract    BasePaper   
51
LSJ1551
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks
SECURE COMPUTING
Abstract    BasePaper   
52
LSJ1552
Continuous and Transparent User Identity Verification for Secure Internet Services
SECURE COMPUTING
Abstract    BasePaper   
53
LSJ1553
A Computational Dynamic Trust Model for User Authorization
SECURE COMPUTING
Abstract    BasePaper   
54
LSJ1554
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
SECURE COMPUTING
Abstract    BasePaper   
55
LSJ1555
DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks
SECURE COMPUTING
Abstract    BasePaper   
56
LSJ1556
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints
SECURE COMPUTING
Abstract    BasePaper   
57
LSJ1557
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks
SECURE COMPUTING
Abstract    BasePaper   
58
LSJ1558
Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers
SECURE COMPUTING
Abstract    BasePaper   
59
LSJ1559
Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks
PARALLEL & DISTRIBUTED SYSTEMS
Abstract    BasePaper   
60
LSJ1560
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
PARALLEL & DISTRIBUTED SYSTEMS
Abstract    BasePaper   
61
LSJ1561
Secure Distributed Deduplication Systems with Improved Reliability
PARALLEL & DISTRIBUTED SYSTEMS
Abstract    BasePaper   
62
LSJ1562
A Framework for Secure Computations with Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations
INFORMATION FORENSICS & SECURITY
Abstract    BasePaper   
63
LSJ1563
Effective Key Management in Dynamic Wireless Sensor Networks
INFORMATIONFORENSICS & SECURITY
Abstract    BasePaper   
64
LSJ1564
Key Updating for Leakage Resiliency with Application to AES Modes of Operation
INFORMATIONFORENSICS & SECURITY
Abstract    BasePaper   
65
LSJ1565
Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backscatter
INFORMATION FORENSICS & SECURITY
Abstract    BasePaper   
66
LSJ1566
Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks
INFORMATION FORENSICS & SECURITY
Abstract    BasePaper