SNo. |
Code |
TITLE |
DOMAIN |
DOWNLOAD |
1 |
LSJ1601 |
A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data |
Cloud Computing |
|
2 |
LSJ1602 |
A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud |
Cloud Computing |
|
3 |
LSJ1603 |
An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing |
Cloud Computing |
|
4 |
LSJ1604 |
An Efficient Privacy-Preserving Ranked Keyword Search Method |
Cloud Computing |
|
5 |
LSJ1605 |
CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System |
Cloud Computing |
|
6 |
LSJ1606 |
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing |
Cloud Computing |
|
7 |
LSJ1607 |
CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services |
Cloud Computing |
|
8 |
LSJ1608 |
Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email |
Cloud Computing |
|
9 |
LSJ1609 |
Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds |
Cloud Computing |
|
10 |
LSJ1610 |
DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud |
Cloud Computing |
|
11 |
LSJ1611 |
Dual-Server Public-Key Encryption With Keyword Search for |
Cloud Computing |
|
12 |
LSJ1612 |
Dynamic and Public Auditing with Fair Arbitration for Cloud Data |
Cloud Computing |
|
13 |
LSJ1613 |
Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates |
Cloud Computing |
|
14 |
LSJ1614 |
Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services |
Cloud Computing |
|
15 |
LSJ1615 |
Geometric Range Search on Encrypted Spatial Data |
Cloud Computing |
|
16 |
LSJ1616 |
Identity-Based Encryption with Cloud Revocation Authority and Its Applications |
Cloud Computing |
|
17 |
LSJ1617 |
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud |
Cloud Computing |
|
18 |
LSJ1618 |
Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud |
Cloud Computing |
|
19 |
LSJ1619 |
Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems |
Cloud Computing |
|
20 |
LSJ1620 |
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption |
Cloud Computing |
|
21 |
LSJ1621 |
Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming |
Cloud Computing |
|
22 |
LSJ1622 |
TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage |
Cloud Computing |
|
23 |
LSJ1623 |
A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing |
Cloud Computing |
|
24 |
LSJ1624 |
DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments |
Cloud Computing |
|
25 |
LSJ1625 |
Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing |
Cloud Computing |
|
26 |
LSJ1626 |
SecRBAC: Secure data in the Clouds |
Cloud Computing |
|
27 |
LSJ1627 |
A Novel Recommendation Model Regularized with User Trust and Item Ratings |
Data Mining |
|
28 |
LSJ1628 |
Automatically Mining Facets for Queries from Their Search Results |
Data Mining |
|
29 |
LSJ1629 |
Booster in High Dimensional Data Classification |
Data Mining |
|
30 |
LSJ1630 |
Building an intrusion detection system using a filter-based feature selection algorithm |
Data Mining |
|
31 |
LSJ1631 |
Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information |
Data Mining |
|
32 |
LSJ1632 |
Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings |
Data Mining |
|
33 |
LSJ1633 |
Crowdsourcing for Top-K Query Processing over Uncertain Data |
Data Mining |
|
34 |
LSJ1634 |
Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder |
Data Mining |
|
35 |
LSJ1635 |
Domain-Sensitive Recommendation with User-Item Subgroup Analysis |
Data Mining |
|
36 |
LSJ1636 |
Efficient Algorithms for Mining Top-K High Utility Itemsets |
Data Mining |
|
37 |
LSJ1637 |
Efficient Cache-Supported Path Planning on Roads |
Data Mining |
|
38 |
LSJ1638 |
Mining User-Aware Rare Sequential Topic Patterns in Document Streams |
Data Mining |
|
39 |
LSJ1639 |
Nearest Keyword Set Search in Multi-Dimensional Datasets |
Data Mining |
|
40 |
LSJ1640 |
Rating Prediction based on Social Sentiment from Textual Reviews |
Data Mining |
|
41 |
LSJ1641 |
Location Aware Keyword Query Suggestion Based on Document Proximity |
Data Mining |
|
42 |
LSJ1642 |
Using Hashtag Graph-based Topic Model to Connect Semantically-related Words without Co-occurrence in Microblogs |
Data Mining |
|
43 |
LSJ1643 |
Quantifying Political Leaning from Tweets, Retweets, and Retweeters |
Data Mining |
|
44 |
LSJ1644 |
Relevance Feedback Algorithms Inspired By Quantum Detection |
Data Mining |
|
45 |
LSJ1645 |
Sentiment Embeddings with Applications to Sentiment Analysis |
Data Mining |
|
46 |
LSJ1646 |
Top-Down XML Keyword Query Processing |
Data Mining |
|
47 |
LSJ1647 |
TopicSketch: Real-time Bursty Topic Detection from Twitter |
Data Mining |
|
48 |
LSJ1648 |
Top-k Dominating Queries on Incomplete Data |
Data Mining |
|
49 |
LSJ1649 |
Understanding Short Texts through Semantic Enrichment and Hashing |
Data Mining |
|
50 |
LSJ1650 |
A Stable Approach for Routing Queries in Unstructured P2P Networks |
Networking |
|
51 |
LSJ1651 |
iPath: Path Inference in Wireless Sensor Networks |
Networking |
|
52 |
LSJ1652 |
Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks |
Networking |
|
53 |
LSJ1653 |
Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks |
Networking |
|
54 |
LSJ1654 |
STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users |
Networking |
|
55 |
LSJ1655 |
Energy and Memory Efficient Clone Detection in Wireless Sensor Networks |
Mobile Computing |
|
56 |
LSJ1656 |
EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data |
Mobile Computing |
|
57 |
LSJ1657 |
Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach |
Mobile Computing |
|
58 |
LSJ1658 |
Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach |
Mobile Computing |
|
59 |
LSJ1659 |
A Hop-by-Hop Routing Mechanism for Green Internet |
Parallel & Distributed Systems |
|
60 |
LSJ1660 |
Continuous Answering Holistic Queries over Sensor Networks |
Parallel & Distributed Systems |
|
61 |
LSJ1661 |
Dictionary Based Secure Provenance Compression for Wireless Sensor Networks |
Parallel & Distributed Systems |
|
62 |
LSJ1662 |
The Server Provisioning Problem for Continuous Distributed Interactive Applications |
Parallel & Distributed Systems |
|
63 |
LSJ1663 |
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts |
Secure Computing |
|
64 |
LSJ1664 |
Data Lineage in Malicious Environments |
Secure Computing |
|
65 |
LSJ1665 |
Detecting Malicious Facebook Applications |
Secure Computing |
|
66 |
LSJ1666 |
FRoDO: Fraud Resilient Device for Off-Line Micro-Payments |
Secure Computing |
|
67 |
LSJ1667 |
Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata |
Secure Computing |
|
68 |
LSJ1668 |
Resolving Multi-party Privacy Conflicts in Social Media |
Secure Computing |
|
69 |
LSJ1669 |
Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions |
Information Forensics & Security |
|
70 |
LSJ1670 |
Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data |
Information Forensics & Security |
|
71 |
LSJ1671 |
Privacy-Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms |
Information Forensics & Security |
|
72 |
LSJ1672 |
Profiling Online Social Behaviors for Compromised Account Detection |
Information Forensics & Security |
|
73 |
LSJ1673 |
A Locality Sensitive Low-Rank Model for Image Tag Completion |
Image Processing |
|
74 |
LSJ1674 |
A Scalable Approach for Content-Based Image Retrieval in Peer- to-Peer Networks |
Image Processing |
|
75 |
LSJ1675 |
Learning of Multimodal Representations with Random Walks on the Click Graph |
Image Processing |
|
76 |
LSJ1676 |
Online Multi-Modal Distance Metric Learning with Application to Image Retrieval |
Image Processing |
|
77 |
LSJ1677 |
Tag Based Image Search by Social Re-ranking |
Image Processing |
|
78 |
LSJ1678 |
Social Friend Recommendation Based on Multiple Network Correlation |
Mutlimedia |
|
79 |
LSJ1679 |
User-Service Rating Prediction by Exploring Social Users Rating Behaviors |
Mutlimedia |
|
80 |
LSJ1680 |
Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine- Grained Benchmark, and Feature Evaluation |
Software Engineering |
|
81 |
LSJ1681 |
Metamorphic Testing for Software Quality Assessment: A Study of Search Engines |
Software Engineering |
|
82 |
LSJ1682 |
SITAR: GUI Test Script Repair |
Software Engineering |
|
83 |
LSJ1683 |
Answering Approximate Queries over XML Data |
Fuzzy Systems |
|
84 |
LSJ1684 |
Malware Detection in Cloud Computing Infrastructures |
Secure Computing |
|
85 |
LSJ1685 |
Two-Factor Data Security Protection Mechanism for Cloud Storage System |
Cloud Computing |
|
86 |
LSJ1686 |
Attribute Based Data Sharing Scheme Revisited in Cloud Computing |
Cloud Computing |
|
87 |
LSJ1687 |
Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud |
Cloud Computing |
|
88 |
LSJ1688 |
Encrypted Data Management with Deduplication in Cloud Computing |
Cloud Computing |
|
89 |
LSJ1689 |
ID2S Password-Authenticated Key Exchange Protocols |
Secure Computing |
|
90 |
LSJ1690 |
Crawling Hidden Objects with kNN Queries |
Data Mining |
|