SNo. |
Code |
TITLE |
DOMAIN |
DOWNLOAD |
1 |
LSJ1701 |
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification |
Cloud Computing |
|
2 |
LSJ1702 |
A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing |
Cloud Computing |
|
3 |
LSJ1703 |
A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing |
Cloud Computing |
|
4 |
LSJ1704 |
A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users |
Cloud Computing |
|
5 |
LSJ1705 |
A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage |
Cloud Computing |
|
6 |
LSJ1706 |
A Robust Reputation Management Mechanism In The Federated Cloud |
Cloud Computing |
|
7 |
LSJ1707 |
Achieving Efficient and Secure Data Acquisition for Cloud- supported Internet of Things in Smart Grid |
Cloud Computing |
|
8 |
LSJ1708 |
Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data |
Cloud Computing |
|
9 |
LSJ1709 |
Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems |
Cloud Computing |
|
10 |
LSJ1710 |
Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing |
Cloud Computing |
|
11 |
LSJ1711 |
Efficient and Expressive Keyword Search Over Encrypted Data in Cloud |
Cloud Computing |
|
12 |
LSJ1712 |
Fast Phrase Search for Encrypted Cloud Storage |
Cloud Computing |
|
13 |
LSJ1713 |
Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds |
Cloud Computing |
|
14 |
LSJ1714 |
Identity-Based Encryption with Cloud Revocation Authority and Its Applications |
Cloud Computing |
|
15 |
LSJ1715 |
Identity-Based Private Matching over Outsourced Encrypted Datasets |
Cloud Computing |
|
16 |
LSJ1716 |
Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage |
Cloud Computing |
|
17 |
LSJ1717 |
On the Security of Data Access Control for Multi-authority Cloud Storage Systems |
Cloud Computing |
|
18 |
LSJ1718 |
Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing |
Cloud Computing |
|
19 |
LSJ1719 |
Privacy Protection based Access Control Scheme in Cloud-based Services |
Cloud Computing |
|
20 |
LSJ1720 |
Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data |
Cloud Computing |
|
21 |
LSJ1721 |
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud |
Cloud Computing |
|
22 |
LSJ1722 |
RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage |
Cloud Computing |
|
23 |
LSJ1723 |
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption |
Cloud Computing |
|
24 |
LSJ1724 |
Securing Cloud Data under Key Exposure |
Cloud Computing |
|
25 |
LSJ1725 |
TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud |
Cloud Computing |
|
26 |
LSJ1726 |
TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud |
Cloud Computing |
|
27 |
LSJ1727 |
Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving |
Data Mining |
|
28 |
LSJ1728 |
An Iterative Classification Scheme for Sanitizing Large-Scale Datasets |
Data Mining |
|
29 |
LSJ1729 |
Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach |
Data Mining |
|
30 |
LSJ1730 |
Collaborative Filtering-Based Recommendation of Online Social Voting |
Data Mining |
|
31 |
LSJ1731 |
Computing Semantic Similarity of Concepts in Knowledge Graphs |
Data Mining |
|
32 |
LSJ1732 |
Detecting Stress Based on Social Interactions in Social Networks |
Data Mining |
|
33 |
LSJ1733 |
Dynamic Facet Ordering for Faceted Product Search Engines |
Data Mining |
|
34 |
LSJ1734 |
Efficient Clue-based Route Search on Road Networks |
Data Mining |
|
35 |
LSJ1735 |
Efficient Keyword-aware Representative Travel Route Recommendation |
Data Mining |
|
36 |
LSJ1736 |
Energy-efficient Query Processing in Web Search Engines |
Data Mining |
|
37 |
LSJ1737 |
Generating Query Facets using Knowledge Bases |
Data Mining |
|
38 |
LSJ1738 |
Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach |
Data Mining |
|
39 |
LSJ1739 |
l-Injection: Toward Effective Collaborative Filtering Using Uninteresting Items |
Data Mining |
|
40 |
LSJ1740 |
Mining Competitors from Large Unstructured Datasets |
Data Mining |
|
41 |
LSJ1741 |
Modeling Information Diffusion over Social Networks for Temporal Dynamic Prediction |
Data Mining |
|
42 |
LSJ1742 |
Personal Web Revisitation by Context and Content Keywords with Relevance Feedback |
Data Mining |
|
43 |
LSJ1743 |
PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks |
Data Mining |
|
44 |
LSJ1744 |
QDA: A Query-Driven Approach to Entity Resolution |
Data Mining |
|
45 |
LSJ1745 |
Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data |
Data Mining |
|
46 |
LSJ1746 |
RAPARE: A Generic Strategy for Cold-Start Rating Prediction Problem |
Data Mining |
|
47 |
LSJ1747 |
SociRank: Identifying and Ranking Prevalent News Topics Using Social Media Factors |
Data Mining |
|
48 |
LSJ1748 |
Towards Real-Time, Country-Level Location Classification of Worldwide Tweets |
Data Mining |
|
49 |
LSJ1749 |
Trajectory Community Discovery and Recommendation by Multi- source Diffusion Modeling |
Data Mining |
|
50 |
LSJ1750 |
Understand Short Texts by Harvesting and Analyzing Semantic Knowledge |
Data Mining |
|
51 |
LSJ1751 |
User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective |
Data Mining |
|
52 |
LSJ1752 |
User-Centric Similarity Search |
Data Mining |
|
53 |
LSJ1753 |
When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks |
Data Mining |
|
54 |
LSJ1754 |
An Overlay Architecture for Throughput Optimal Multipath Routing |
Networking |
|
55 |
LSJ1755 |
FaceChange: Attaining Neighbor Node Anonymity in Mobile Opportunistic Social Networks With Fine-Grained Control |
Networking |
|
56 |
LSJ1756 |
Network Capability in Localizing Node Failures via End-to-End Path Measurements |
Networking |
|
57 |
LSJ1757 |
Privacy and Integrity Preserving Top-k Query Processing for Two- Tiered Sensor Network |
Networking |
|
58 |
LSJ1758 |
Routing in Accumulative Multi-Hop Networks |
Networking |
|
59 |
LSJ1759 |
SWEET: Serving the Web by Exploiting Email Tunnels |
Networking |
|
60 |
LSJ1760 |
A Proxy-based Collaboration System to Minimize Content Download Time and Energy Consumption |
Mobile Computing |
|
61 |
LSJ1761 |
Detecting Mobile Malicious Webpages in Real Time |
Mobile Computing |
|
62 |
LSJ1762 |
Quantifying Interdependent Privacy Risks with Location Data |
Mobile Computing |
|
63 |
LSJ1763 |
Searching Trajectories by Regions of Interest |
Mobile Computing |
|
64 |
LSJ1764 |
SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks |
Mobile Computing |
|
65 |
LSJ1765 |
iASK: A Distributed Q & System Incorporating Social Community and Global Collective Intelligence |
Parallel & Distributed Systems |
|
66 |
LSJ1766 |
A Credibility Analysis System for Assessing Information on Twitter |
Secure Computing |
|
67 |
LSJ1767 |
Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems |
Secure Computing |
|
68 |
LSJ1768 |
FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data |
Secure Computing |
|
69 |
LSJ1769 |
My Privacy My Decision: Control of Photo Sharing on Online Social Networks |
Secure Computing |
|
70 |
LSJ1770 |
Privacy-Preserving Selective Aggregation of Online User Behavior Data |
Secure Computing |
|
71 |
LSJ1771 |
ProGuard: Detecting Malicious Accounts in Social-Network-Based Online Promotions |
Secure Computing |
|
72 |
LSJ1772 |
Search Rank Fraud and Malware Detection in Google Play |
Secure Computing |
|
73 |
LSJ1773 |
Towards Detecting Compromised Accounts on Social Networks |
Secure Computing |
|
74 |
LSJ1774 |
NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media |
Information Forensics & Security |
|
75 |
LSJ1775 |
Preventing Distributed Denial-of-Service Flooding Attacks with Dynamic Path Identifiers |
Information Forensics & Security |
|
76 |
LSJ1776 |
Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending |
Information Forensics & Security |
|
77 |
LSJ1777 |
A Distributed Publisher-Driven Secure Data Sharing Scheme for Information-Centric IoT |
Internet of Things(Iot) |
|
78 |
LSJ1778 |
An Efficient and Fine-grained Big Data Access Control Scheme with Privacy-preserving Policy |
Internet of Things(Iot) |
|
79 |
LSJ1779 |
Efficient and Privacy-preserving Polygons Spatial Query Framework for Location-based Services |
Internet of Things(Iot) |
|
80 |
LSJ1780 |
Follow But No Track: Privacy Preserved Profile Publishing in Cyber-Physical Social Systems |
Internet of Things(Iot) |
|
81 |
LSJ1781 |
SPFM: Scalable and Privacy-preserving Friend Matching in Mobile Cloud |
Internet of Things(Iot) |
|
82 |
LSJ1782 |
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud |
BIG DATA |
|
83 |
LSJ1783 |
SocialQA An Online Social Network Based Question and Answer System |
BIG DATA |
|
84 |
LSJ1784 |
Automatic Generation of Social Event Storyboard from Image Click-through Data |
Image Processing |
|
85 |
LSJ1785 |
Image Re-ranking based on Topic Diversity |
Image Processing |
|
86 |
LSJ1786 |
Tri-Clustered Tensor Completion for Social-Aware Image Tag Refinement |
Image Processing |
|
87 |
LSJ1787 |
Two-Stage Friend Recommendation Based on Network Alignment and Series-Expansion of Probabilistic Topic Model |
Multimedia |
|
88 |
LSJ1788 |
A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection |
Software Engineering |
|
89 |
LSJ1789 |
Improving Automated Bug Triaging with Specialized Topic Model |
Software Engineering |
|
90 |
LSJ1790 |
Collaborative Filtering Service Recommendation Based on a Novel Similarity Computation Method |
Service Computing(Web Services) |
|
91 |
LSJ1791 |
Transactional Behavior Verification in Business Process as a Service Configuration |
Service Computing(Web Services) |
|