S.No
Code
Title
Category
1
LSJ1601
A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
CLOUD COMPUTING
Abstract    BasePaper   
2
LSJ1602
A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
CLOUD COMPUTING
Abstract    BasePaper   
3
LSJ1603
An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing
CLOUD COMPUTING
Abstract    BasePaper   
4
LSJ1604
An Efficient Privacy-Preserving Ranked Keyword Search Method
CLOUD COMPUTING
Abstract    BasePaper   
5
LSJ1605
CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System
CLOUD COMPUTING
Abstract    BasePaper   
6
LSJ1606
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing
CLOUD COMPUTING
Abstract    BasePaper   
7
LSJ1607
CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services
CLOUD COMPUTING
Abstract    BasePaper   
8
LSJ1608
Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
CLOUD COMPUTING
Abstract    BasePaper   
9
LSJ1609
Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds
CLOUD COMPUTING
Abstract    BasePaper   
10
LSJ1610
DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud
CLOUD COMPUTING
Abstract    BasePaper   
11
LSJ1611
Dual-Server Public-Key Encryption With Keyword Search for
CLOUD COMPUTING
Abstract    BasePaper   
12
LSJ1612
Dynamic and Public Auditing with Fair Arbitration for Cloud Data
CLOUD COMPUTING
Abstract    BasePaper   
13
LSJ1613
Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
CLOUD COMPUTING
Abstract    BasePaper   
14
LSJ1614
Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services
CLOUD COMPUTING
Abstract    BasePaper   
15
LSJ1615
Geometric Range Search on Encrypted Spatial Data
CLOUD COMPUTING
Abstract    BasePaper   
16
LSJ1616
Identity-Based Encryption with Cloud Revocation Authority and Its Applications
CLOUD COMPUTING
Abstract    BasePaper   
17
LSJ1617
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
CLOUD COMPUTING
Abstract    BasePaper   
18
LSJ1618
Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud
CLOUD COMPUTING
Abstract    BasePaper   
19
LSJ1619
Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems
CLOUD COMPUTING
Abstract    BasePaper   
20
LSJ1620
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
CLOUD COMPUTING
Abstract    BasePaper   
21
LSJ1621
Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming
CLOUD COMPUTING
Abstract    BasePaper   
22
LSJ1622
TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage
CLOUD COMPUTING
Abstract    BasePaper   
23
LSJ1623
A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
CLOUD COMPUTING
Abstract    BasePaper   
24
LSJ1624
DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
CLOUD COMPUTING
Abstract    BasePaper   
25
LSJ1625
Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing
CLOUD COMPUTING
Abstract    BasePaper   
26
LSJ1626
SecRBAC: Secure data in the Clouds
CLOUD COMPUTING
Abstract    BasePaper   
27
LSJ1627
A Novel Recommendation Model Regularized with User Trust and Item Ratings
DATA MINING
Abstract    BasePaper   
28
LSJ1628
Automatically Mining Facets for Queries from Their Search Results
DATA MINING
Abstract    BasePaper   
29
LSJ1629
Booster in High Dimensional Data Classification
DATA MINING
Abstract    BasePaper   
30
LSJ1630
Building an intrusion detection system using a filter-based feature selection algorithm
DATA MINING
Abstract    BasePaper   
31
LSJ1631
Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information
DATA MINING
Abstract    BasePaper   
32
LSJ1632
Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings
DATA MINING
Abstract    BasePaper   
33
LSJ1633
Crowdsourcing for Top-K Query Processing over Uncertain Data
DATA MINING
Abstract    BasePaper   
34
LSJ1634
Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
DATA MINING
Abstract    BasePaper   
35
LSJ1635
Domain-Sensitive Recommendation with User-Item Subgroup Analysis
DATA MINING
Abstract    BasePaper   
36
LSJ1636
Efficient Algorithms for Mining Top-K High Utility Itemsets
DATA MINING
Abstract    BasePaper   
37
LSJ1637
Efficient Cache-Supported Path Planning on Roads
DATA MINING
Abstract    BasePaper   
38
LSJ1638
Mining User-Aware Rare Sequential Topic Patterns in Document Streams
DATA MINING
Abstract    BasePaper   
39
LSJ1639
Nearest Keyword Set Search in Multi-Dimensional Datasets
DATA MINING
Abstract    BasePaper   
40
LSJ1640
Rating Prediction based on Social Sentiment from Textual Reviews
DATA MINING
Abstract    BasePaper   
41
LSJ1641
Location Aware Keyword Query Suggestion Based on Document Proximity
DATA MINING
Abstract    BasePaper   
42
LSJ1642
Using Hashtag Graph-based Topic Model to Connect Semantically-related Words without Co-occurrence in Microblogs
DATA MINING
Abstract    BasePaper   
43
LSJ1643
Quantifying Political Leaning from Tweets, Retweets, and Retweeters
DATA MINING
Abstract    BasePaper   
44
LSJ1644
Relevance Feedback Algorithms Inspired By Quantum Detection
DATA MINING
Abstract    BasePaper   
45
LSJ1645
Sentiment Embeddings with Applications to Sentiment Analysis
DATA MINING
Abstract    BasePaper   
46
LSJ1646
Top-Down XML Keyword Query Processing
DATA MINING
Abstract    BasePaper   
47
LSJ1647
TopicSketch: Real-time Bursty Topic Detection from Twitter
DATA MINING
Abstract    BasePaper   
48
LSJ1648
Top-k Dominating Queries on Incomplete Data
DATA MINING
Abstract    BasePaper   
49
LSJ1649
Understanding Short Texts through Semantic Enrichment and Hashing
DATA MINING
Abstract    BasePaper   
50
LSJ1650
A Stable Approach for Routing Queries in Unstructured P2P Networks
NETWORKING
Abstract    BasePaper   
51
LSJ1651
iPath: Path Inference in Wireless Sensor Networks
NETWORKING
Abstract    BasePaper   
52
LSJ1652
Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks
NETWORKING
Abstract    BasePaper   
53
LSJ1653
Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks
NETWORKING
Abstract    BasePaper   
54
LSJ1654
STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
NETWORKING
Abstract    BasePaper   
55
LSJ1655
Energy and Memory Efficient Clone Detection in Wireless Sensor Networks
MOBILE COMPUTING
Abstract    BasePaper   
56
LSJ1656
EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data
MOBILE COMPUTING
Abstract    BasePaper   
57
LSJ1657
Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach
MOBILE COMPUTING
Abstract    BasePaper   
58
LSJ1658
Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach
MOBILE COMPUTING
Abstract    BasePaper   
59
LSJ1659
A Hop-by-Hop Routing Mechanism for Green Internet
PARALLEL & DISTRIBUTED SYSTEMS
Abstract    BasePaper   
60
LSJ1660
Continuous Answering Holistic Queries over Sensor Networks
PARALLEL & DISTRIBUTED SYSTEMS
Abstract    BasePaper   
61
LSJ1661
Dictionary Based Secure Provenance Compression for Wireless Sensor Networks
PARALLEL & DISTRIBUTED SYSTEMS
Abstract    BasePaper   
62
LSJ1662
The Server Provisioning Problem for Continuous Distributed Interactive Applications
PARALLEL & DISTRIBUTED SYSTEMS
Abstract    BasePaper   
63
LSJ1663
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
SECURE COMPUTING
Abstract    BasePaper   
64
LSJ1664
Data Lineage in Malicious Environments
SECURE COMPUTING
Abstract    BasePaper   
65
LSJ1665
Detecting Malicious Facebook Applications
SECURE COMPUTING
Abstract    BasePaper   
66
LSJ1666
FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
SECURE COMPUTING
Abstract    BasePaper   
67
LSJ1666
Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata
SECURE COMPUTING
Abstract    BasePaper   
68
LSJ1666
Resolving Multi-party Privacy Conflicts in Social Media
SECURE COMPUTING
Abstract    BasePaper   
69
LSJ1669
Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions
INFORMATION FORENSICS & SECURITY
Abstract    BasePaper   
70
LSJ1670
Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data
INFORMATION FORENSICS & SECURITY
Abstract    BasePaper   
71
LSJ1671
Privacy-Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms
INFORMATION FORENSICS & SECURITY
Abstract    BasePaper   
72
LSJ1672
Profiling Online Social Behaviors for Compromised Account Detection
INFORMATION FORENSICS & SECURITY
Abstract    BasePaper   
73
LSJ1673
A Locality Sensitive Low-Rank Model for Image Tag Completion
IMAGE PROCESSING
Abstract    BasePaper   
74
LSJ1674
A Scalable Approach for Content-Based Image Retrieval in Peer- to-Peer Networks
IMAGE PROCESSING
Abstract    BasePaper   
75
LSJ1675
Learning of Multimodal Representations with Random Walks on the Click Graph
IMAGE PROCESSING
Abstract    BasePaper   
76
LSJ1676
Online Multi-Modal Distance Metric Learning with Application to Image Retrieval
IMAGE PROCESSING
Abstract    BasePaper   
77
LSJ1677
Tag Based Image Search by Social Re-ranking
IMAGE PROCESSING
Abstract    BasePaper   
78
LSJ1678
Social Friend Recommendation Based on Multiple Network Correlation
MULTIMEDIA (SOCIAL NETWORKING)
Abstract    BasePaper   
79
LSJ1679
User-Service Rating Prediction by Exploring Social Users Rating Behaviors
MULTIMEDIA (SOCIAL NETWORKING)
Abstract    BasePaper   
80
LSJ1680
Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine- Grained Benchmark, and Feature Evaluation
SOFTWARE ENGINEERING
Abstract    BasePaper   
81
LSJ1681
Metamorphic Testing for Software Quality Assessment: A Study of Search Engines
SOFTWARE ENGINEERING
Abstract    BasePaper   
82
LSJ1682
SITAR: GUI Test Script Repair
SOFTWARE ENGINEERING
Abstract    BasePaper   
83
LSJ1683
Answering Approximate Queries over XML Data
FUZZY SYSTEMS
Abstract    BasePaper   
84
LSJ1684
Malware Detection in Cloud Computing Infrastructures
SECURE COMPUTING
Abstract    BasePaper   
85
LSJ1685
Two-Factor Data Security Protection Mechanism for Cloud Storage System
CLOUD COMPUTING
Abstract    BasePaper   
86
LSJ1686
Attribute Based Data Sharing Scheme Revisited in Cloud Computing
CLOUD COMPUTING
Abstract    BasePaper   
87
LSJ1687
Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud
CLOUD COMPUTING
Abstract    BasePaper   
88
LSJ1688
Encrypted Data Management with Deduplication in Cloud Computing
CLOUD COMPUTING
Abstract    BasePaper   
89
LSJ1689
ID2S Password-Authenticated Key Exchange Protocols
SECURE COMPUTING
Abstract    BasePaper   
90
LSJ1690
Crawling Hidden Objects with kNN Queries
DATA MINING
Abstract    BasePaper