1 LSJ1701 A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification Cloud Computing
2 LSJ1702 A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing Cloud Computing
3 LSJ1703 A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing Cloud Computing
4 LSJ1704 A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users Cloud Computing
5 LSJ1705 A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage Cloud Computing
6 LSJ1706 A Robust Reputation Management Mechanism In The Federated Cloud Cloud Computing
7 LSJ1707 Achieving Efficient and Secure Data Acquisition for Cloud- supported Internet of Things in Smart Grid Cloud Computing
8 LSJ1708 Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data Cloud Computing
9 LSJ1709 Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems Cloud Computing
10 LSJ1710 Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing Cloud Computing
11 LSJ1711 Efficient and Expressive Keyword Search Over Encrypted Data in Cloud Cloud Computing
12 LSJ1712 Fast Phrase Search for Encrypted Cloud Storage Cloud Computing
13 LSJ1713 Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds Cloud Computing
14 LSJ1714 Identity-Based Encryption with Cloud Revocation Authority and Its Applications Cloud Computing
15 LSJ1715 Identity-Based Private Matching over Outsourced Encrypted Datasets Cloud Computing
16 LSJ1716 Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage Cloud Computing
17 LSJ1717 On the Security of Data Access Control for Multi-authority Cloud Storage Systems Cloud Computing
18 LSJ1718 Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing Cloud Computing
19 LSJ1719 Privacy Protection based Access Control Scheme in Cloud-based Services Cloud Computing
20 LSJ1720 Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data Cloud Computing
21 LSJ1721 Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud Cloud Computing
22 LSJ1722 RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage Cloud Computing
23 LSJ1723 Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption Cloud Computing
24 LSJ1724 Securing Cloud Data under Key Exposure Cloud Computing
25 LSJ1725 TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud Cloud Computing
26 LSJ1726 TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud Cloud Computing
27 LSJ1727 Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving Data Mining
28 LSJ1728 An Iterative Classification Scheme for Sanitizing Large-Scale Datasets Data Mining
29 LSJ1729 Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach Data Mining
30 LSJ1730 Collaborative Filtering-Based Recommendation of Online Social Voting Data Mining
31 LSJ1731 Computing Semantic Similarity of Concepts in Knowledge Graphs Data Mining
32 LSJ1732 Detecting Stress Based on Social Interactions in Social Networks Data Mining
33 LSJ1733 Dynamic Facet Ordering for Faceted Product Search Engines Data Mining
34 LSJ1734 Efficient Clue-based Route Search on Road Networks Data Mining
35 LSJ1735 Efficient Keyword-aware Representative Travel Route Recommendation Data Mining
36 LSJ1736 Energy-efficient Query Processing in Web Search Engines Data Mining
37 LSJ1737 Generating Query Facets using Knowledge Bases Data Mining
38 LSJ1738 Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach Data Mining
39 LSJ1739 l-Injection: Toward Effective Collaborative Filtering Using Uninteresting Items Data Mining
40 LSJ1740 Mining Competitors from Large Unstructured Datasets Data Mining
41 LSJ1741 Modeling Information Diffusion over Social Networks for Temporal Dynamic Prediction Data Mining
42 LSJ1742 Personal Web Revisitation by Context and Content Keywords with Relevance Feedback Data Mining
43 LSJ1743 PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks Data Mining
44 LSJ1744 QDA: A Query-Driven Approach to Entity Resolution Data Mining
45 LSJ1745 Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data Data Mining
46 LSJ1746 RAPARE: A Generic Strategy for Cold-Start Rating Prediction Problem Data Mining
47 LSJ1747 SociRank: Identifying and Ranking Prevalent News Topics Using Social Media Factors Data Mining
48 LSJ1748 Towards Real-Time, Country-Level Location Classification of Worldwide Tweets Data Mining
49 LSJ1749 Trajectory Community Discovery and Recommendation by Multi- source Diffusion Modeling Data Mining
50 LSJ1750 Understand Short Texts by Harvesting and Analyzing Semantic Knowledge Data Mining
51 LSJ1751 User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective Data Mining
52 LSJ1752 User-Centric Similarity Search Data Mining
53 LSJ1753 When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks Data Mining
54 LSJ1754 An Overlay Architecture for Throughput Optimal Multipath Routing Networking
55 LSJ1755 FaceChange: Attaining Neighbor Node Anonymity in Mobile Opportunistic Social Networks With Fine-Grained Control Networking
56 LSJ1756 Network Capability in Localizing Node Failures via End-to-End Path Measurements Networking
57 LSJ1757 Privacy and Integrity Preserving Top-k Query Processing for Two- Tiered Sensor Network Networking
58 LSJ1758 Routing in Accumulative Multi-Hop Networks Networking
59 LSJ1759 SWEET: Serving the Web by Exploiting Email Tunnels Networking
60 LSJ1760 A Proxy-based Collaboration System to Minimize Content Download Time and Energy Consumption Mobile Computing
61 LSJ1761 Detecting Mobile Malicious Webpages in Real Time Mobile Computing
62 LSJ1762 Quantifying Interdependent Privacy Risks with Location Data Mobile Computing
63 LSJ1763 Searching Trajectories by Regions of Interest Mobile Computing
64 LSJ1764 SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks Mobile Computing
65 LSJ1765 iASK: A Distributed Q & System Incorporating Social Community and Global Collective Intelligence Parallel & Distributed Systems
66 LSJ1766 A Credibility Analysis System for Assessing Information on Twitter Secure Computing
67 LSJ1767 Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems Secure Computing
68 LSJ1768 FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data Secure Computing
69 LSJ1769 My Privacy My Decision: Control of Photo Sharing on Online Social Networks Secure Computing
70 LSJ1770 Privacy-Preserving Selective Aggregation of Online User Behavior Data Secure Computing
71 LSJ1771 ProGuard: Detecting Malicious Accounts in Social-Network-Based Online Promotions Secure Computing
72 LSJ1772 Search Rank Fraud and Malware Detection in Google Play Secure Computing
73 LSJ1773 Towards Detecting Compromised Accounts on Social Networks Secure Computing
74 LSJ1774 NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media Information Forensics & Security
75 LSJ1775 Preventing Distributed Denial-of-Service Flooding Attacks with Dynamic Path Identifiers Information Forensics & Security
76 LSJ1776 Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending Information Forensics & Security
77 LSJ1777 A Distributed Publisher-Driven Secure Data Sharing Scheme for Information-Centric IoT Internet of Things(Iot)
78 LSJ1778 An Efficient and Fine-grained Big Data Access Control Scheme with Privacy-preserving Policy Internet of Things(Iot)
79 LSJ1779 Efficient and Privacy-preserving Polygons Spatial Query Framework for Location-based Services Internet of Things(Iot)
80 LSJ1780 Follow But No Track: Privacy Preserved Profile Publishing in Cyber-Physical Social Systems Internet of Things(Iot)
81 LSJ1781 SPFM: Scalable and Privacy-preserving Friend Matching in Mobile Cloud Internet of Things(Iot)
82 LSJ1782 Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud BIG DATA
83 LSJ1783 SocialQA An Online Social Network Based Question and Answer System BIG DATA
84 LSJ1784 Automatic Generation of Social Event Storyboard from Image Click-through Data Image Processing
85 LSJ1785 Image Re-ranking based on Topic Diversity Image Processing
86 LSJ1786 Tri-Clustered Tensor Completion for Social-Aware Image Tag Refinement Image Processing
87 LSJ1787 Two-Stage Friend Recommendation Based on Network Alignment and Series-Expansion of Probabilistic Topic Model Multimedia
88 LSJ1788 A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection Software Engineering
89 LSJ1789 Improving Automated Bug Triaging with Specialized Topic Model Software Engineering
90 LSJ1790 Collaborative Filtering Service Recommendation Based on a Novel Similarity Computation Method Service Computing(Web Services)
91 LSJ1791 Transactional Behavior Verification in Business Process as a Service Configuration Service Computing(Web Services)
Call us : (+91) 9030211322 / 040-40274843
Mail us : logicsystemsprojects@gmail.com
Mail us : info@logicsystems.org.in