IEEE DOTNET PROJECT LIST 2017-2018
CLOUD COMPUTING
SNO | Projects List |
---|---|
1 | Achieving Secure Universal and Fine-Grained Query Results Verification for Secure Search Scheme over Encrypted Cloud Data |
2 | Fast Phrase Search for Encrypted Cloud Storage |
3 | Identity-Based Private Matching over Outsourced Encrypted Datasets |
4 | Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud |
5 | Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving |
6 | User Disserentiated Verifiable File Search on the Cloud |
DATA MINING
1 | Search Rank Fraud and Malware Detection in Google Play |
2 | Personal Web Revisitation by Context and Content Keywords with Relevance Feedback |
3 | Efficient Clue-based Route Search on Road Networks |
4 | Majority Voting and Pairing with Multiple Noisy Labeling |
5 | Filtering Out Infrequent Behavior from Business Process Event Logs |
6 | Detecting Stress Based on Social Interactions in Social Networks |
7 | Continuous Top-k Monitoring on Document Streams |
8 | Influence Maximization in Trajectory Databases |
9 | Influential Node Tracking on Dynamic Social Network An Interchange Greedy Approach |
10 | Rank Economically Selecting Initial Users for Influence Maximization in Social Networks |
11 | User Vitality Ranking and Prediction in Social Networking Services a Dynamic Network Perspective |
12 | Trajectory Community Discovery and Recommendation by Multi-source Diffusion Modeling |
13 | GALLOP GlobAL feature fused Location Prediction for Different Check-in Scenarios |
BIG DATA
1 | A Situational Analytic Method for User Behavior Pattern in Multimedia |
DEPENDABLE AND SECURE COMPUTING
1 | Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems |
2 | Twitter Trends Manipulation a First look inside the Security of Twitter Trending |
INFORMATION FORENSICS AND SECURITY
1 | RAAC Robust and Auditable Access Control With Multiple Attribute Authorities for Public Cloud Storage |
2 | Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems |
3 | Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds |
INTERNET OF THINGS
1 | An Efficient and Fine Grained Big Data Access Control Scheme with Privacy Preserving Policy |
2 | Follow But No Track Privacy Preserved Profile Publishing in Cyber Physical Social Systems |
3 | SPFM Scalable and Privacy-Preserving Friend Matching in Mobile Cloud |
MOBILE COMPUTING
1 | Mobile Based Location Tracking without Internet Connectivity using Cloud Computing Environment |
NETWORKING
1 | Energy Efficient Multipath Routing Protocol for Mobile Ad-Hoc Network Using the Fitness Function |
2 | Research on Trust Sensing based Secure Routing Mechanism for Wireless Sensor Network |
3 | Lightweight Three-factor Authentication and Key Agreement Protocol for Internet-integrated Wireless Sensor Networks |
4 | Privacy and Integrity preserving top k query processing for two tiered Sensor Network |
NETWORKING
1 | Services Computing |
2 | ProGuard Detecting Malicious Accounts in Social Network Based Online Promotions |