SNo. |
Code |
TITLE |
DOMAIN |
DOWNLOAD |
1 |
LSJ1501 |
A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks |
Networking |
|
2 |
LSJ1502 |
A Proximity-Aware Interest-Clustered P2P File Sharing System |
Networking |
|
3 |
LSJ1503 |
Detecting Malicious Facebook Applications |
Networking |
|
4 |
LSJ1504 |
Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing |
Networking |
|
5 |
LSJ1505 |
Best Keyword Cover Search |
Data Mining |
|
6 |
LSJ1506 |
Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model |
Data Mining |
|
7 |
LSJ1507 |
Context-Based Diversification for Keyword Queries over XML DATA |
Data Mining |
|
8 |
LSJ1508 |
Discovery of Ranking Fraud for Mobile Apps |
Data Mining |
|
9 |
LSJ1509 |
Malware Propagation in Large-Scale Networks |
Data Mining |
|
10 |
LSJ1510 |
On Summarization and Timeline Generation for Evolutionary Tweet Streams |
Data Mining |
|
11 |
LSJ1511 |
Privacy Policy Inference of User Uploaded Images on Content Sharing Sites |
Data Mining |
|
12 |
LSJ1512 |
Progressive Duplicate Detection |
Data Mining |
|
13 |
LSJ1513 |
Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection |
Data Mining |
|
14 |
LSJ1514 |
Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services |
Data Mining |
|
15 |
LSJ1515 |
Scalable Constrained Spectral Clustering |
Data Mining |
|
16 |
LSJ1516 |
Towards Effective Bug Triage with Software Data Reduction Techniques |
Data Mining |
|
17 |
LSJ1517 |
Tweet Segmentation and Its Application to Named Entity Recognition |
Data Mining |
|
18 |
LSJ1518 |
Real-Time Detection of Traffic From Twitter Stream Analysis |
Data Mining |
|
19 |
LSJ1519 |
t-Closeness through Micro Aggregation: Strict Privacy with Enhanced Utility Preservation |
Data Mining |
|
20 |
LSJ1520 |
Stealthy Denial of Service Strategy in Cloud Computing |
Cloud Computing |
|
21 |
LSJ1521 |
Secure Auditing and Deduplicating Data in Cloud |
Cloud Computing |
|
22 |
LSJ1522 |
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation |
Cloud Computing |
|
23 |
LSJ1523 |
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems |
Cloud Computing |
|
24 |
LSJ1524 |
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage |
Cloud Computing |
|
25 |
LSJ1525 |
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing |
Cloud Computing |
|
26 |
LSJ1526 |
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage |
Cloud Computing |
|
27 |
LSJ1527 |
Identity-Based Encryption with Outsourced Revocation in Cloud Computing |
Cloud Computing |
|
28 |
LSJ1528 |
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data |
Cloud Computing |
|
29 |
LSJ1529 |
Enabling Cloud Storage Auditing With Key-Exposure Resistance |
Cloud Computing |
|
30 |
LSJ1530 |
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption |
Cloud Computing |
|
31 |
LSJ1531 |
Cloud Armor: Supporting Reputation-based Trust Management for Cloud Services |
Cloud Computing |
|
32 |
LSJ1532 |
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing |
Cloud Computing |
|
33 |
LSJ1533 |
Audit-Free Cloud Storage via Deniable Attribute-based Encryption |
Cloud Computing |
|
34 |
LSJ1534 |
An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration |
Cloud Computing |
|
35 |
LSJ1535 |
A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud |
Cloud Computing |
|
36 |
LSJ1536 |
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data |
Cloud Computing |
|
37 |
LSJ1537 |
A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems |
Cloud Computing |
|
38 |
LSJ1538 |
A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing |
Cloud Computing |
|
39 |
LSJ1539 |
A Hybrid Cloud Approach for Secure Authorized Deduplication |
Cloud Computing |
|
40 |
LSJ1540 |
Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System |
SERVICE COMPUTING |
|
41 |
LSJ1541 |
Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation |
SERVICE COMPUTING |
|
42 |
LSJ1542 |
Prediction of Atomic Web Services Reliability for QoS-Aware Recommendation |
SERVICE COMPUTING |
|
43 |
LSJ1543 |
A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to-Business E-Services |
FUZZY SYSTEMS |
|
44 |
LSJ1544 |
Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks |
Mobile Computing |
|
45 |
LSJ1545 |
Friendbook: A Semantic-Based Friend Recommendation System for Social Networks |
Mobile Computing |
|
46 |
LSJ1546 |
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks |
Mobile Computing |
|
47 |
LSJ1547 |
User-Defined Privacy Grid System for Continuous Location-Based Services |
Mobile Computing |
|
48 |
LSJ1548 |
An Attribute-Assisted Reranking Model for Web Image Search |
Image Processing |
|
49 |
LSJ1549 |
EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval |
Image Processing |
|
50 |
LSJ1550 |
Learning to Rank Image Tags With Limited Training Examples |
Image Processing |
|
51 |
LSJ1551 |
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks |
Secure Computing |
|
52 |
LSJ1552 |
Continuous and Transparent User Identity Verification for Secure Internet Services |
Secure Computing |
|
53 |
LSJ1553 |
A Computational Dynamic Trust Model for User Authorization |
Secure Computing |
|
54 |
LSJ1554 |
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts |
Secure Computing |
|
55 |
LSJ1555 |
DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks |
Secure Computing |
|
56 |
LSJ1556 |
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints |
Secure Computing |
|
57 |
LSJ1557 |
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks |
Secure Computing |
|
58 |
LSJ1558 |
Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers |
Secure Computing |
|
59 |
LSJ1559 |
Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks |
Parallel & Distributed Systems |
|
60 |
LSJ1560 |
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security |
Parallel & Distributed Systems |
|
61 |
LSJ1561 |
Secure Distributed Deduplication Systems with Improved Reliability |
Parallel & Distributed Systems |
|
62 |
LSJ1562 |
A Framework for Secure Computations with Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations |
INFORMATION FORENSICS & SECURITY |
|
63 |
LSJ1563 |
Effective Key Management in Dynamic Wireless Sensor Networks |
INFORMATIONFORENSICS & SECURITY |
|
64 |
LSJ1564 |
Key Updating for Leakage Resiliency with Application to AES Modes of Operation |
INFORMATIONFORENSICS & SECURITY |
|
65 |
LSJ1565 |
Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backscatter |
INFORMATION FORENSICS & SECURITY |
|
66 |
LSJ1566 |
Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks |
INFORMATION FORENSICS & SECURITY |
|