S.No |
Code |
Title |
Category |
---|---|---|---|
1 |
LSJ1601 |
A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data |
CLOUD COMPUTING |
2 |
LSJ1602 |
A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud |
CLOUD COMPUTING |
3 |
LSJ1603 |
An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing |
CLOUD COMPUTING |
4 |
LSJ1604 |
An Efficient Privacy-Preserving Ranked Keyword Search Method
|
CLOUD COMPUTING |
5 |
LSJ1605 |
CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System |
CLOUD COMPUTING |
6 |
LSJ1606 |
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing |
CLOUD COMPUTING |
7 |
LSJ1607 |
CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services |
CLOUD COMPUTING |
8 |
LSJ1608 |
Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email |
CLOUD COMPUTING |
9 |
LSJ1609 |
Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds |
CLOUD COMPUTING |
10 |
LSJ1610 |
DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud |
CLOUD COMPUTING |
11 |
LSJ1611 |
Dual-Server Public-Key Encryption With Keyword Search for |
CLOUD COMPUTING |
12 |
LSJ1612 |
Dynamic and Public Auditing with Fair Arbitration for Cloud Data |
CLOUD COMPUTING |
13 |
LSJ1613 |
Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates |
CLOUD COMPUTING |
14 |
LSJ1614 |
Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services |
CLOUD COMPUTING |
15 |
LSJ1615 |
Geometric Range Search on Encrypted Spatial Data |
CLOUD COMPUTING |
16 |
LSJ1616 |
Identity-Based Encryption with Cloud Revocation Authority and Its Applications |
CLOUD COMPUTING |
17 |
LSJ1617 |
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud |
CLOUD COMPUTING |
18 |
LSJ1618 |
Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud |
CLOUD COMPUTING |
19 |
LSJ1619 |
Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems |
CLOUD COMPUTING |
20 |
LSJ1620 |
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption |
CLOUD COMPUTING |
21 |
LSJ1621 |
Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming |
CLOUD COMPUTING |
22 |
LSJ1622 |
TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage |
CLOUD COMPUTING |
23 |
LSJ1623 |
A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing |
CLOUD COMPUTING |
24 |
LSJ1624 |
DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments |
CLOUD COMPUTING |
25 |
LSJ1625 |
Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing |
CLOUD COMPUTING |
26 |
LSJ1626 |
SecRBAC: Secure data in the Clouds |
CLOUD COMPUTING |
27 |
LSJ1627 |
A Novel Recommendation Model Regularized with User Trust and Item Ratings |
DATA MINING |
28 |
LSJ1628 |
Automatically Mining Facets for Queries from Their Search Results |
DATA MINING |
29 |
LSJ1629 |
Booster in High Dimensional Data Classification |
DATA MINING |
30 |
LSJ1630 |
Building an intrusion detection system using a filter-based feature selection algorithm |
DATA MINING |
31 |
LSJ1631 |
Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information |
DATA MINING |
32 |
LSJ1632 |
Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings |
DATA MINING |
33 |
LSJ1633 |
Crowdsourcing for Top-K Query Processing over Uncertain Data |
DATA MINING |
34 |
LSJ1634 |
Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder |
DATA MINING |
35 |
LSJ1635 |
Domain-Sensitive Recommendation with User-Item Subgroup Analysis |
DATA MINING |
36 |
LSJ1636 |
Efficient Algorithms for Mining Top-K High Utility Itemsets |
DATA MINING |
37 |
LSJ1637 |
Efficient Cache-Supported Path Planning on Roads |
DATA MINING |
38 |
LSJ1638 |
Mining User-Aware Rare Sequential Topic Patterns in Document Streams |
DATA MINING |
39 |
LSJ1639 |
Nearest Keyword Set Search in Multi-Dimensional Datasets |
DATA MINING |
40 |
LSJ1640 |
Rating Prediction based on Social Sentiment from Textual Reviews |
DATA MINING |
41 |
LSJ1641 |
Location Aware Keyword Query Suggestion Based on Document Proximity |
DATA MINING |
42 |
LSJ1642 |
Using Hashtag Graph-based Topic Model to Connect Semantically-related Words without Co-occurrence in Microblogs |
DATA MINING |
43 |
LSJ1643 |
Quantifying Political Leaning from Tweets, Retweets, and Retweeters |
DATA MINING |
44 |
LSJ1644 |
Relevance Feedback Algorithms Inspired By Quantum Detection |
DATA MINING |
45 |
LSJ1645 |
Sentiment Embeddings with Applications to Sentiment Analysis |
DATA MINING |
46 |
LSJ1646 |
Top-Down XML Keyword Query Processing |
DATA MINING |
47 |
LSJ1647 |
TopicSketch: Real-time Bursty Topic Detection from Twitter |
DATA MINING |
48 |
LSJ1648 |
Top-k Dominating Queries on Incomplete Data |
DATA MINING |
49 |
LSJ1649 |
Understanding Short Texts through Semantic Enrichment and Hashing |
DATA MINING |
50 |
LSJ1650 |
A Stable Approach for Routing Queries in Unstructured P2P Networks |
NETWORKING |
51 |
LSJ1651 |
iPath: Path Inference in Wireless Sensor Networks |
NETWORKING |
52 |
LSJ1652 |
Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks |
NETWORKING |
53 |
LSJ1653 |
Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks |
NETWORKING |
54 |
LSJ1654 |
STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users |
NETWORKING |
55 |
LSJ1655 |
Energy and Memory Efficient Clone Detection in Wireless Sensor Networks |
MOBILE COMPUTING |
56 |
LSJ1656 |
EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data |
MOBILE COMPUTING |
57 |
LSJ1657 |
Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach |
MOBILE COMPUTING |
58 |
LSJ1658 |
Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach |
MOBILE COMPUTING |
59 |
LSJ1659 |
A Hop-by-Hop Routing Mechanism for Green Internet |
PARALLEL & DISTRIBUTED SYSTEMS |
60 |
LSJ1660 |
Continuous Answering Holistic Queries over Sensor Networks |
PARALLEL & DISTRIBUTED SYSTEMS |
61 |
LSJ1661 |
Dictionary Based Secure Provenance Compression for Wireless Sensor Networks |
PARALLEL & DISTRIBUTED SYSTEMS |
62 |
LSJ1662 |
The Server Provisioning Problem for Continuous Distributed Interactive Applications |
PARALLEL & DISTRIBUTED SYSTEMS |
63 |
LSJ1663 |
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts | SECURE COMPUTING |
64 |
LSJ1664 |
Data Lineage in Malicious Environments |
SECURE COMPUTING |
65 |
LSJ1665 |
Detecting Malicious Facebook Applications |
SECURE COMPUTING |
66 |
LSJ1666 |
FRoDO: Fraud Resilient Device for Off-Line Micro-Payments |
SECURE COMPUTING |
67 |
LSJ1666 |
Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata |
SECURE COMPUTING |
68 |
LSJ1666 |
Resolving Multi-party Privacy Conflicts in Social Media |
SECURE COMPUTING |
69 |
LSJ1669 |
Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions |
INFORMATION FORENSICS & SECURITY |
70 |
LSJ1670 |
Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data |
INFORMATION FORENSICS & SECURITY |
71 |
LSJ1671 |
Privacy-Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms |
INFORMATION FORENSICS & SECURITY |
72 |
LSJ1672 |
Profiling Online Social Behaviors for Compromised Account Detection |
INFORMATION FORENSICS & SECURITY |
73 |
LSJ1673 |
A Locality Sensitive Low-Rank Model for Image Tag Completion |
IMAGE PROCESSING |
74 |
LSJ1674 |
A Scalable Approach for Content-Based Image Retrieval in Peer- to-Peer Networks |
IMAGE PROCESSING |
75 |
LSJ1675 |
Learning of Multimodal Representations with Random Walks on the Click Graph |
IMAGE PROCESSING |
76 |
LSJ1676 |
Online Multi-Modal Distance Metric Learning with Application to Image Retrieval |
IMAGE PROCESSING |
77 |
LSJ1677 |
Tag Based Image Search by Social Re-ranking |
IMAGE PROCESSING |
78 |
LSJ1678 |
Social Friend Recommendation Based on Multiple Network Correlation |
MULTIMEDIA (SOCIAL NETWORKING) |
79 |
LSJ1679 |
User-Service Rating Prediction by Exploring Social Users Rating Behaviors |
MULTIMEDIA (SOCIAL NETWORKING) |
80 |
LSJ1680 |
Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine- Grained Benchmark, and Feature Evaluation |
SOFTWARE ENGINEERING |
81 |
LSJ1681 |
Metamorphic Testing for Software Quality Assessment: A Study of Search Engines |
SOFTWARE ENGINEERING |
82 |
LSJ1682 |
SITAR: GUI Test Script Repair |
SOFTWARE ENGINEERING |
83 |
LSJ1683 |
Answering Approximate Queries over XML Data |
FUZZY SYSTEMS |
84 |
LSJ1684 |
Malware Detection in Cloud Computing Infrastructures |
SECURE COMPUTING |
85 |
LSJ1685 |
Two-Factor Data Security Protection Mechanism for Cloud Storage System |
CLOUD COMPUTING |
86 |
LSJ1686 |
Attribute Based Data Sharing Scheme Revisited in Cloud Computing |
CLOUD COMPUTING |
87 |
LSJ1687 |
Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud |
CLOUD COMPUTING |
88 |
LSJ1688 |
Encrypted Data Management with Deduplication in Cloud Computing |
CLOUD COMPUTING |
89 |
LSJ1689 |
ID2S Password-Authenticated Key Exchange Protocols |
SECURE COMPUTING |
90 |
LSJ1690 |
Crawling Hidden Objects with kNN Queries |
DATA MINING |