1 LSJ1501 A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks Networking
2 LSJ1502 A Proximity-Aware Interest-Clustered P2P File Sharing System Networking
3 LSJ1503 Detecting Malicious Facebook Applications Networking
4 LSJ1504 Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing Networking
5 LSJ1505 Best Keyword Cover Search Data Mining
6 LSJ1506 Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model Data Mining
7 LSJ1507 Context-Based Diversification for Keyword Queries over XML DATA Data Mining
8 LSJ1508 Discovery of Ranking Fraud for Mobile Apps Data Mining
9 LSJ1509 Malware Propagation in Large-Scale Networks Data Mining
10 LSJ1510 On Summarization and Timeline Generation for Evolutionary Tweet Streams Data Mining
11 LSJ1511 Privacy Policy Inference of User Uploaded Images on Content Sharing Sites Data Mining
12 LSJ1512 Progressive Duplicate Detection Data Mining
13 LSJ1513 Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection Data Mining
14 LSJ1514 Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services Data Mining
15 LSJ1515 Scalable Constrained Spectral Clustering Data Mining
16 LSJ1516 Towards Effective Bug Triage with Software Data Reduction Techniques Data Mining
17 LSJ1517 Tweet Segmentation and Its Application to Named Entity Recognition Data Mining
18 LSJ1518 Real-Time Detection of Traffic From Twitter Stream Analysis Data Mining
19 LSJ1519 t-Closeness through Micro Aggregation: Strict Privacy with Enhanced Utility Preservation Data Mining
20 LSJ1520 Stealthy Denial of Service Strategy in Cloud Computing Cloud Computing
21 LSJ1521 Secure Auditing and Deduplicating Data in Cloud Cloud Computing
22 LSJ1522 Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation Cloud Computing
23 LSJ1523 Provable Multicopy Dynamic Data Possession in Cloud Computing Systems Cloud Computing
24 LSJ1524 Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage Cloud Computing
25 LSJ1525 Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing Cloud Computing
26 LSJ1526 Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage Cloud Computing
27 LSJ1527 Identity-Based Encryption with Outsourced Revocation in Cloud Computing Cloud Computing
28 LSJ1528 Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data Cloud Computing
29 LSJ1529 Enabling Cloud Storage Auditing With Key-Exposure Resistance Cloud Computing
30 LSJ1530 Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption Cloud Computing
31 LSJ1531 Cloud Armor: Supporting Reputation-based Trust Management for Cloud Services Cloud Computing
32 LSJ1532 Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing Cloud Computing
33 LSJ1533 Audit-Free Cloud Storage via Deniable Attribute-based Encryption Cloud Computing
34 LSJ1534 An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration Cloud Computing
35 LSJ1535 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud Cloud Computing
36 LSJ1536 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data Cloud Computing
37 LSJ1537 A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems Cloud Computing
38 LSJ1538 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing Cloud Computing
39 LSJ1539 A Hybrid Cloud Approach for Secure Authorized Deduplication Cloud Computing
40 LSJ1540 Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System SERVICE COMPUTING
41 LSJ1541 Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation SERVICE COMPUTING
42 LSJ1542 Prediction of Atomic Web Services Reliability for QoS-Aware Recommendation SERVICE COMPUTING
43 LSJ1543 A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to-Business E-Services FUZZY SYSTEMS
44 LSJ1544 Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks Mobile Computing
45 LSJ1545 Friendbook: A Semantic-Based Friend Recommendation System for Social Networks Mobile Computing
46 LSJ1546 Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks Mobile Computing
47 LSJ1547 User-Defined Privacy Grid System for Continuous Location-Based Services Mobile Computing
48 LSJ1548 An Attribute-Assisted Reranking Model for Web Image Search Image Processing
49 LSJ1549 EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval Image Processing
50 LSJ1550 Learning to Rank Image Tags With Limited Training Examples Image Processing
51 LSJ1551 A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks Secure Computing
52 LSJ1552 Continuous and Transparent User Identity Verification for Secure Internet Services Secure Computing
53 LSJ1553 A Computational Dynamic Trust Model for User Authorization Secure Computing
54 LSJ1554 Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts Secure Computing
55 LSJ1555 DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks Secure Computing
56 LSJ1556 Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints Secure Computing
57 LSJ1557 Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks Secure Computing
58 LSJ1558 Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers Secure Computing
59 LSJ1559 Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks Parallel & Distributed Systems
60 LSJ1560 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security Parallel & Distributed Systems
61 LSJ1561 Secure Distributed Deduplication Systems with Improved Reliability Parallel & Distributed Systems
62 LSJ1562 A Framework for Secure Computations with Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations INFORMATION FORENSICS & SECURITY
63 LSJ1563 Effective Key Management in Dynamic Wireless Sensor Networks INFORMATIONFORENSICS & SECURITY
64 LSJ1564 Key Updating for Leakage Resiliency with Application to AES Modes of Operation INFORMATIONFORENSICS & SECURITY
65 LSJ1565 Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backscatter INFORMATION FORENSICS & SECURITY
66 LSJ1566 Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks INFORMATION FORENSICS & SECURITY
Call us : (+91) 9030211322 / 040-40274843
Mail us : logicsystemsprojects@gmail.com
Mail us : info@logicsystems.org.in