1 LSJ1601 A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data Cloud Computing
2 LSJ1602 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud Cloud Computing
3 LSJ1603 An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing Cloud Computing
4 LSJ1604 An Efficient Privacy-Preserving Ranked Keyword Search Method Cloud Computing
5 LSJ1605 CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System Cloud Computing
6 LSJ1606 Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing Cloud Computing
7 LSJ1607 CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services Cloud Computing
8 LSJ1608 Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email Cloud Computing
9 LSJ1609 Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds Cloud Computing
10 LSJ1610 DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud Cloud Computing
11 LSJ1611 Dual-Server Public-Key Encryption With Keyword Search for Cloud Computing
12 LSJ1612 Dynamic and Public Auditing with Fair Arbitration for Cloud Data Cloud Computing
13 LSJ1613 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates Cloud Computing
14 LSJ1614 Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services Cloud Computing
15 LSJ1615 Geometric Range Search on Encrypted Spatial Data Cloud Computing
16 LSJ1616 Identity-Based Encryption with Cloud Revocation Authority and Its Applications Cloud Computing
17 LSJ1617 Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud Cloud Computing
18 LSJ1618 Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud Cloud Computing
19 LSJ1619 Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems Cloud Computing
20 LSJ1620 Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption Cloud Computing
21 LSJ1621 Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming Cloud Computing
22 LSJ1622 TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage Cloud Computing
23 LSJ1623 A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing Cloud Computing
24 LSJ1624 DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments Cloud Computing
25 LSJ1625 Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing Cloud Computing
26 LSJ1626 SecRBAC: Secure data in the Clouds Cloud Computing
27 LSJ1627 A Novel Recommendation Model Regularized with User Trust and Item Ratings Data Mining
28 LSJ1628 Automatically Mining Facets for Queries from Their Search Results Data Mining
29 LSJ1629 Booster in High Dimensional Data Classification Data Mining
30 LSJ1630 Building an intrusion detection system using a filter-based feature selection algorithm Data Mining
31 LSJ1631 Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information Data Mining
32 LSJ1632 Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings Data Mining
33 LSJ1633 Crowdsourcing for Top-K Query Processing over Uncertain Data Data Mining
34 LSJ1634 Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder Data Mining
35 LSJ1635 Domain-Sensitive Recommendation with User-Item Subgroup Analysis Data Mining
36 LSJ1636 Efficient Algorithms for Mining Top-K High Utility Itemsets Data Mining
37 LSJ1637 Efficient Cache-Supported Path Planning on Roads Data Mining
38 LSJ1638 Mining User-Aware Rare Sequential Topic Patterns in Document Streams Data Mining
39 LSJ1639 Nearest Keyword Set Search in Multi-Dimensional Datasets Data Mining
40 LSJ1640 Rating Prediction based on Social Sentiment from Textual Reviews Data Mining
41 LSJ1641 Location Aware Keyword Query Suggestion Based on Document Proximity Data Mining
42 LSJ1642 Using Hashtag Graph-based Topic Model to Connect Semantically-related Words without Co-occurrence in Microblogs Data Mining
43 LSJ1643 Quantifying Political Leaning from Tweets, Retweets, and Retweeters Data Mining
44 LSJ1644 Relevance Feedback Algorithms Inspired By Quantum Detection Data Mining
45 LSJ1645 Sentiment Embeddings with Applications to Sentiment Analysis Data Mining
46 LSJ1646 Top-Down XML Keyword Query Processing Data Mining
47 LSJ1647 TopicSketch: Real-time Bursty Topic Detection from Twitter Data Mining
48 LSJ1648 Top-k Dominating Queries on Incomplete Data Data Mining
49 LSJ1649 Understanding Short Texts through Semantic Enrichment and Hashing Data Mining
50 LSJ1650 A Stable Approach for Routing Queries in Unstructured P2P Networks Networking
51 LSJ1651 iPath: Path Inference in Wireless Sensor Networks Networking
52 LSJ1652 Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks Networking
53 LSJ1653 Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks Networking
54 LSJ1654 STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users Networking
55 LSJ1655 Energy and Memory Efficient Clone Detection in Wireless Sensor Networks Mobile Computing
56 LSJ1656 EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data Mobile Computing
57 LSJ1657 Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach Mobile Computing
58 LSJ1658 Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach Mobile Computing
59 LSJ1659 A Hop-by-Hop Routing Mechanism for Green Internet Parallel & Distributed Systems
60 LSJ1660 Continuous Answering Holistic Queries over Sensor Networks Parallel & Distributed Systems
61 LSJ1661 Dictionary Based Secure Provenance Compression for Wireless Sensor Networks Parallel & Distributed Systems
62 LSJ1662 The Server Provisioning Problem for Continuous Distributed Interactive Applications Parallel & Distributed Systems
63 LSJ1663 Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts Secure Computing
64 LSJ1664 Data Lineage in Malicious Environments Secure Computing
65 LSJ1665 Detecting Malicious Facebook Applications Secure Computing
66 LSJ1666 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments Secure Computing
67 LSJ1667 Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata Secure Computing
68 LSJ1668 Resolving Multi-party Privacy Conflicts in Social Media Secure Computing
69 LSJ1669 Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions Information Forensics & Security
70 LSJ1670 Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data Information Forensics & Security
71 LSJ1671 Privacy-Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms Information Forensics & Security
72 LSJ1672 Profiling Online Social Behaviors for Compromised Account Detection Information Forensics & Security
73 LSJ1673 A Locality Sensitive Low-Rank Model for Image Tag Completion Image Processing
74 LSJ1674 A Scalable Approach for Content-Based Image Retrieval in Peer- to-Peer Networks Image Processing
75 LSJ1675 Learning of Multimodal Representations with Random Walks on the Click Graph Image Processing
76 LSJ1676 Online Multi-Modal Distance Metric Learning with Application to Image Retrieval Image Processing
77 LSJ1677 Tag Based Image Search by Social Re-ranking Image Processing
78 LSJ1678 Social Friend Recommendation Based on Multiple Network Correlation Mutlimedia
79 LSJ1679 User-Service Rating Prediction by Exploring Social Users Rating Behaviors Mutlimedia
80 LSJ1680 Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine- Grained Benchmark, and Feature Evaluation Software Engineering
81 LSJ1681 Metamorphic Testing for Software Quality Assessment: A Study of Search Engines Software Engineering
82 LSJ1682 SITAR: GUI Test Script Repair Software Engineering
83 LSJ1683 Answering Approximate Queries over XML Data Fuzzy Systems
84 LSJ1684 Malware Detection in Cloud Computing Infrastructures Secure Computing
85 LSJ1685 Two-Factor Data Security Protection Mechanism for Cloud Storage System Cloud Computing
86 LSJ1686 Attribute Based Data Sharing Scheme Revisited in Cloud Computing Cloud Computing
87 LSJ1687 Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud Cloud Computing
88 LSJ1688 Encrypted Data Management with Deduplication in Cloud Computing Cloud Computing
89 LSJ1689 ID2S Password-Authenticated Key Exchange Protocols Secure Computing
90 LSJ1690 Crawling Hidden Objects with kNN Queries Data Mining
Call us : (+91) 9030211322 / 040-40274843
Mail us : logicsystemsprojects@gmail.com
Mail us : info@logicsystems.org.in