PLAGIARISM

HOME / JAVA / M.TECH / PROJECTS

M.TECH JAVA PROJECTS LIST 2018-19

S.No Code PROJECT TITLE Download Titles Action
CLOUD COMPUTING
1 CTJV801 A Practical Public Key Encryption Scheme Based on Learning Parity with Noise
2 CTJV802 An Approach to Balance Maintenance Costs and Electricity Consumption in Cloud Data Centers
3 CTJV803 CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics
4 CTJV804 Integrated Authentication and Key Agreement Framework for Vehicular Cloud Computing
5 CTJV805 A Power-of-Two Choices Based Algorithm for Fog Computing
6 CTJV806 virtFlow: Guest Independent Execution Flow Analysis Across Virtualized Environments
7 CTJV807 Adaptive Resource Management for Analyzing Video Streams from Globally Distributed Network Cameras
8 CTJV808 Enhancing Performance and Energy Efficiency for Hybrid Workloads in Virtualized Cloud Environment
9 CTJV809 Minimal Cost Server Configuration for Meeting Time-Varying Resource Demands in Cloud Centers
10 CTJV810 Aggregation-Based Colocation Datacenter Energy Management in Wholesale Markets
11 CTJV811 Provably secure and lightweight identity-based authenticated data sharing protocol for cyber-physical
cloud environment
12 CTJV812 Energy Efficient Scheduling of Servers with Multi-Sleep Modes for Cloud Data Center
13 CTJV813 A tight estimate of job completion time in vehicular clouds
14 CTJV814 HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems
15 CTJV815 An Efficient and Fair Multi-Resource Allocation Mechanism for Heterogeneous Servers
16 CTJV816 Dynamic VM Scaling: Provisioning and Pricing through an Online Auction
17 CTJV817 Price-based Resource Allocation for Edge Computing: A Market Equilibrium Approach
18 CTJV818 Efficient Resource Allocation for On-Demand Mobile-Edge Cloud Computing
19 CTJV819 An Efficient and Secured Framework for Mobile Cloud Computing
20 CTJV820 Efficient Traceable Authorization Search System for Secure Cloud Storage
21 CTJV821 A Robust Formulation for Efficient Application Offloading to Clouds
22 CTJV822 A Planning Approach for Reassigning Virtual Machines in IaaS Clouds
23 CTJV823 Efficient Retrieval Over Documents Encrypted by Attributes in Cloud Computing
24 CTJV873 A Lightweight secure data sharing scheme for mobile cloud computing
DATA MINING
1 CTJV824 CoDetect: Financial Fraud Detection With Anomaly Feature detection
2 CTJV825 Complementary Aspect-based Opinion Mining
3 CTJV826 Emotion Recognition on Twitter: Comparative Study and Training a Unison Model
4 CTJV827 Frequent Itemsets Mining With Differential Privacy Over Large- Scale Data
5 CTJV828 Health Monitoring on Social Media over Time
6 CTJV829 Online Product Quantization
7 CTJV830 Privacy Characterization and Quantification in Data Publishing
8 CTJV831 Road Traffic Speed Prediction: A Probabilistic Model Fusing multi secure data
9 CTJV832 Scalable Content-Aware Collaborative Filtering for Location Recommendation
10 CTJV833 SDE: A Novel Clustering Framework Based on Sparsity-Density Entropy
11 CTJV834 Search Result Diversity Evaluation based on Intent Hierarchies
12 CTJV835 When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks
13 CTJV836 A Two-stage Biomedical Event Trigger Detection Method Integrating Feature Selection and Word Embeddings
14 CTJV837 Automated Phrase Mining from Massive Text Corpora
15 CTJV838 A Two-Phase Algorithm for Differentially Private Frequent Subgraph Mining
16 CTJV839 Supervised Topic Modeling using Hierarchical Dirichlet Process-based Inverse Regression: Experiments
on E-Commerce Applications
17 CTJV840 Bayesian Nonparametric Learning for Hierarchical and Sparse Topics
18 CTJV841 Comments Mining With TF-IDF: The Inherent Bias and Its Removal
19 CTJV842 A Correlation-based Feature Weighting Filter for Naive Bayes
20 CTJV843 A Weighted Frequent Item set Mining Algorithm for Intelligent Decision in Smart Systems
21 CTJV844 An Efficient Method for High Quality and Cohesive Topical Phrase Mining
MACHINE LEARNING
1 CTJV845 A Comprehensive Study on Social Network Mental Disorders Detection via Online Social Media Mining
2 CTJV846 A Credibility Analysis System for Assessing Information on Twitter
3 CTJV847 A Novel Machine Learning Algorithm for Spammer Identification in Industrial Mobile Cloud Computing
4 CTJV848 Credit Card Fraud Detection Using AdaBoost and Majority Voting
5 CTJV849 Hate Speech on Twitter: A Pragmatic Approach to Collect Hateful and Offensive Expressions and Perform Hate Speech
Detection
6 CTJV950 Using Data Mining to Predict Hospital Admissions From the Emergency Department
SECURE COMPUTING
1 CTJV951 Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices
2 CTJV952 Magic Train: Design of Measurement Methods Against Bandwidth Inflation Attacks
NETWORKING
1 CTJV953 Energy Efficient Link-Delay Aware Routing in Wireless Sensor networks
2 CTJV954 GeTrust: A guarantee-based trust model in Chord-based P2P networks
3 CTJV955 PROVEST: Provenance-based Trust Model for Delay Tolerant networks
4 CTJV956 Traffic and Energy Aware Routing for Heterogeneous Wireless networks
SOCIAL NETWORKING
1 CTJV857 3-HBP: A Three-Level Hidden Bayesian Link Prediction Model in social networks
2 CTJV858 Analyzing and Detecting Money-Laundering Accounts in Online social networks
3 CTJV859 Detection of suicide-related posts in Twitter data streams
4 CTJV860 Risk Assessment in Social Networks based on User Anomalous Behaviours
5 CTJV861 Segregating Spammers and Unsolicited Bloggers from Genuine Experts on Twitter
MOBILE COMPUTING
1 CTJV862 Distributed Faulty Node Detection in Delay Tolerant Networks: Design and Analysis
2 CTJV863 Efficient Privacy-Aware Authentication Scheme for Mobile Cloud
3 CTJV864 Identifying On-site Users for Social Events: Mobility, Content, and Social Relationship
4 CTJV865 Protecting Location Privacy for Task Allocation in Ad Hoc Mobile Cloud Computing
5 CTJV866 Traffic-Aware Efficient Mapping of Wireless Body Area Networks to Health Cloud Service Providers in Critical Emergency
Situations
WEB MINING
1 CTJV867 Relevant Feedback Based Accurate and Intelligent Retrieval on Capturing User Intention for Personalized Websites
SECURE COMPUTING
1 CTJV868 A Hybrid Approach for Detecting Automated Spammers in twitter
2 CTJV869 A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network
3 CTJV870 Anonymization of Sensitive Quasi-Identifiers for l-Diversity and t- Closeness
4 CTJV871 Exploiting Social Network to Enhance Human-to-Human Infection Analysis Without Privacy Leakage
INFORMATION FORENSIC SECURITY
1 CTJV872 Trust-based Collaborative Privacy Management in Online Social networks
INTERNET OF THINGS
1 CTJV874 Cloud-based Fine-grained Health Information Access Control Framework for Lightweight IoT Devices with Dynamic
Auditing and Attribute Revocation
2 CTJV875 Light-Weight Security and Data Provenance for Multi-Hop Internet of Things
IMAGE PROCESSING
1 CTJV876 Automatic Generation of Social Event Storyboard From Image Click-Through Data
2 CTJV877 Query-free Clothing Retrieval via Implicit Relevance Feedback
SOFTWARE ENGINEERING
1 CTJV878 A Developer Centered Bug Prediction Model
SERVICE COMPUTING(WEB SERVICES)
1 CTJV879 Lightweight Fine-Grained Search over Encrypted Data in Fog Computing
2 CTJV880 Semantic-based Compound Keyword Search over Encrypted Cloud Data
3 CTJV881 Quality and Profit Assured Trusted Cloud Federation Formation: Game Theory Based Approach
4 CTJV882 Optimizing Autonomic Resources for the Management of Large Service-Based Business Processes
5 CTJV883 Scheduling Inter-Datacenter Video Flows for Cost Efficiency
6 CTJV884 Migration Modeling and Learning Algorithms for Containers in Fog Computing
7 CTJV885 Multi-user Multi-task Computation Offloading in Green Mobile Edge Cloud Computing
8 CTJV886 Achieving Fairness-aware Two-level Scheduling for Heterogeneous Distributed Systems
BIG DATA
1 CTJV887 A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
2 CTJV888 AccountTrade: Accountability Against Dishonest Big Data Buyers and Sellers
3 CTJV889 Structural Balance Theory-based E-commerce Recommendation over Big Rating Data
4 CTJV890 Towards Green Cloud Computing: Demand Allocation and Pricing Policies for Cloud Service Brokerage
CONSUMER ELECTRONICS , INDUSTRIAL ELECTRONICS
1 CTJV891 RRPhish Anti-Phishing via Mining Brand Resources Request
2 CTJV892 Confidence-interval Fuzzy Model-based Indoor Localization
INFORMATION AND COMMUNICATION SYSTEM
1 CTJV893 A Data Mining based Model for Detection of Fraudulent Behaviour in Water Consumpti
PATTERN ANALYSIS AND MACHINE INTELLIGENCE
1 CTJV894 Detecting Regions of Maximal Divergence for Spatio-Temporal Anomaly Detection
2 CTJV895 Ordinal Constraint Binary Coding for Approximate Nearest Neighbor Search
SOFTWARE ENGINEERING, COMPUTER GRAPHICS
1 CTJV896 Reviving Sequential Program Birthmarking for Multithreaded Software Plagiarism Detection
2 CTJV897 EVA: Visual Analytics to Identify Fraudulent Events
INFORMATION AND SECURITY SYSTEMS
1 CTJV898 FraudFind: Financial Fraud Detection by Analyzing Human Behavior
2 CTJV899 FraudVis: Understanding Unsupervised Fraud Detection Algorithms
3 CTJV900 Machine Learning Applied to Rotating Check Fraud Detection

M.TECH JAVA PROJECTS LIST 2017-18

S.No Code PROJECT TITLE Download Titles Action
1 CTJV701 A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification
2 CTJV702 A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
3 CTJV703 A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
4 CTJV704 A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users
5 CTJV105 A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage
6 CTJV706 A robust reputation management mechanism in the federated cloud
7 CTJV707 Achieving Efficient and Secure Data Acquisition for Cloudsupported Internet of Things in Smart Grid
8 CTJV708 Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data
9 CTJV709 Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems
10 CTJV710 Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
11 CTJV711 Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
12 CTJV712 Fast Phrase Search for Encrypted Cloud Storage
13 CTJV713 Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds
14 CTJV714 Identity-Based Encryption with Cloud Revocation Authority and Its Applications
15 CTJV715 Identity-Based Private Matching over Outsourced Encrypted Datasets
16 CTJV716 Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage
17 CTJV717 On the Security of Data Access Control for Multi-authority Cloud Storage Systems
18 CTJV718 Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing
19 CTJV719 Privacy Protection based Access Control Scheme in Cloud-based Services
20 CTJV720 Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data
21 CTJV721 Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud
22 CTJV722 RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage
23 CTJV723 Secure Data Sharing in Cloud Computing Using RevocableStorage Identity-Based Encryption
24 CTJV724 Securing Cloud Data under Key Exposure
25 CTJV725 TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud
26 CTJV726 TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud
27 CTJV727 Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving
28 CTJV728 An Efficient Privacy-Preserving Ranked Keyword Search Method
29 CTJV729 Cda Generation And Integration For Health Information Exchange Based On Cloud Computing System
30 CTJV730 Conditional Identity-Based Broadcast Proxy Re-Encryption And Its Application To Cloud Email
31 CTJV731 Conjunctive Keyword Search With Designated Tester AndTiming Enabled Proxy Re Encryption Function For E-Health Clouds
32 CTJV732 Deypos: Deduplicatable Dynamic Proof Of Storage For MultiUse Environments
33 CTJV733 Diplocloud: Efficient And Scalable Management Of Rdf Data In The Cloud
34 CTJV734 Dual-Server Public-Key Encryption With Keyword Search For Secure CloudStorage
35 CTJV735 Dynamic And Public Auditing With Fair Arbitration For Cloud Data
36 CTJV736 Enabling Cloud Storage Auditing With Verifiable Outsourcing Of Keyupdates
37 CTJV737 Fine-Grained Two-Factor Access Control For Web-Based Cloud Computing Services
38 CTJV738 Flexible And Fine-Grained Attribute-Based Data Storage In Cloud Computing
39 CTJV739 Geometric Range Search On Encrypted Spatial Data
40 CTJV740 Identity-Based Encryption With Cloud Revocation Authority And Its Applications
41 CTJV741 Identity-Based Proxy-Oriented Data Uploading And Remote Data Integrity Checking In Public Cloud
42 CTJV742 Protecting Your Right: Verifiable Attribute-Based Keyword Serch With Fine-Grained Owner-Enforced Search
Authorization In The Cloud
43 CTJV743 Building An Intrusion Detection System Using A Filter-Based Feature Selection Algorithm
44 CTJV744 Connecting Social Media To E-Commerce: Cold-Start Product Recommendation Using Microblogging Information
45 CTJV745 Cyberbullying Detection Based On Semantic-Enhanced Marginalized Denoising Auto-Encoder
46 CTJV746 Domain-Sensitive Recommendation With User-Item Subgroup Analysis
47 CTJV747 Efficient Algorithms For Mining Top-K High Utility Itemsets
48 CTJV748 Efficient Cache-Supported Path Planning On Roads
49 CTJV749 Location Aware Keyword Query Suggestion Based On Document Proximity
50 CTJV750 Nearest Keyword Set Search In Multi-Dimensional Datasets
51 CTJV751 Answering Approximate Queries Over Xml Data
52 CTJV752 An Iterative Classification Scheme for Sanitizing Large-Scale Datasets
53 CTJV753 Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach
54 CTJV754 Collaborative Filtering-Based Recommendation of Online Social Voting
55 CTJV755 Computing Semantic Similarity of Concepts in Knowledge Graphs
56 CTJV756 Detecting Stress Based on Social Interactions in Social Networks
57 CTJV757 Dynamic Facet Ordering for Faceted Product Search Engines
58 CTJV758 Efficient Clue-based Route Search on Road Networks
59 CTJV759 Efficient Keyword-aware Representative Travel Route Recommendation
60 CTJV760 Energy-efficient Query Processing in Web Search Engines
61 CTJV761 Generating Query Facets using Knowledge Bases
62 CTJV762 Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach
63 CTJV763 l-Injection: Toward Effective Collaborative Filtering Using Uninteresting Items
64 CTJV764 Mining Competitors from Large Unstructured Datasets
65 CTJV765 Modeling Information Diffusion over Social Networks for Temporal Dynamic Prediction
66 CTJV766 Personal Web Revisitation by Context and Content Keywords with Relevance Feedback
67 CTJV767 PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks
68 CTJV768 QDA: A Query-Driven Approach to Entity Resolution
69 CTJV769 Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data
70 CTJV770 RAPARE: A Generic Strategy for Cold-Start Rating Prediction Problem
71 CTJV771 SociRank: Identifying and Ranking Prevalent News Topics Using Social Media Factors
72 CTJV772 Towards Real-Time, Country-Level Location Classification of Worldwide Tweets
73 CTJV773 Trajectory Community Discovery and Recommendation by Multi- source Diffusion Modeling
74 CTJV774 Understand Short Texts by Harvesting and Analyzing Semantic Knowledge
75 CTJV775 User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective
76 CTJV776 User-Centric Similarity Search
77 CTJV777 When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks
78 CTJV778 An Overlay Architecture for Throughput Optimal Multipath Routing
79 CTJV779 FaceChange: Attaining Neighbor Node Anonymity in Mobile Opportunistic Social Networks With Fine-Grained Control
80 CTJV780 Network Capability in Localizing Node Failures via End-to-End Path Measurements
81 CTJV781 Privacy and Integrity Preserving Top-k Query Processing for Two- Tiered Sensor Network
82 CTJV782 Routing in Accumulative Multi-Hop Networks
83 CTJV783 SWEET: Serving the Web by Exploiting Email Tunnels
84 CTJV784 Ipath: Path Inference In Wireless Sensor Networks
85 CTJV785 A Proxy-based Collaboration System to Minimize Content Download Time and Energy Consumption
86 CTJV786 Detecting Mobile Malicious Webpages in Real Time
87 CTJV787 Quantifying Interdependent Privacy Risks with Location Data
88 CTJV788 Searching Trajectories by Regions of Interest
89 CTJV789 SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks
90 CTJV790 Detecting Node Failures In Mobile Wireless Networks: A Probabilistic Approach
91 CTJV791 Energy And Memory Efficient Clone Detection In Wireless Sensor Networks
92 CTJV792 iASK: A Distributed Q&A System Incorporating Social Community and Global Collective Intelligence
93 CTJV793 A Credibility Analysis System for Assessing Information on twitter
94 CTJV794 Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
95 CTJV795 FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data
96 CTJV796 My Privacy My Decision: Control of Photo Sharing on Online Social Networks
97 CTJV797 Privacy-Preserving Selective Aggregation of Online User Behavior Data
98 CTJV798 ProGuard: Detecting Malicious Accounts in Social-NetworkBased Online Promotions
99 CTJV799 Search Rank Fraud and Malware Detection in Google Play
100 CTJV800 Towards Detecting Compromised Accounts on Social Networks
101 CTJV801 Data Lineage In Malicious Environments
102 CTJV802 Frodo: Fraud Resilient Device For Off-Line Micro-Payments
103 CTJV803 Inference Attack On Browsing History Of Twitter
104 CTJV804 NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media
105 CTJV805 Preventing Distributed Denial-of-Service Flooding Attacks with Dynamic Path Identifiers
106 CTJV806 Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending
107 CTJV807 Privacy-Preserving Utility Verification Of The Data Published By Non-Interactive Differentially Private Mechanisms
108 CTJV808 A Distributed Publisher-Driven Secure Data Sharing Scheme for Information-Centric IoT
109 CTJV809 An Efficient and Fine-grained Big Data Access Control Scheme with Privacy-preserving Policy
110 CTJV810 Efficient and Privacy-preserving Polygons Spatial Query Framework for Location-based Services
111 CTJV811 Follow But No Track: Privacy Preserved Profile Publishing in Cyber-Physical Social Systems
112 CTJV812 SPFM: Scalable and Privacy-preserving Friend Matching in Mobile Cloud
113 CTJV813 Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
114 CTJV814 SocialQ&A: An Online Social Network Based Question and Answer System
115 CTJV815 Automatic Generation of Social Event Storyboard from Image Click-through Data
116 CTJV816 Image Re-ranking based on Topic Diversity
117 CTJV817 Tri-Clustered Tensor Completion for Social-Aware Image Tag Refinement
118 CTJV818 A Scalable Approach For Content-Based Image Retrieval In Peer-To- Peer Networks
119 CTJV819 Two-Stage Friend Recommendation Based on Network Alignment and Series-Expansion of Probabilistic Topic Model
120 CTJV820 A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection
121 CTJV821 Improving Automated Bug Triaging with Specialized Topic Model
122 CTJV822 Collaborative Filtering Service Recommendation Based on a Novel Similarity Computation Method
123 CTJV823 Transactional Behavior Verification in Business Process as a Service Configuration

M.TECH JAVA PROJECTS LIST 2016-17

S.No Code PROJECT TITLE Download Titles Action
1 CTJV601 A MODIFIED HIERARCHICAL ATTRIBUTE-BASED ENCRYPTION ACCESS CONTROL METHOD FOR
MOBILE CLOUD COMPUTING
2 CTJV602 AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUTING
3 CTJV603 AN EFFICIENT PRIVACY-PRESERVING RANKED KEYWORD SEARCH METHOD
4 CTJV604 CDA GENERATION AND INTEGRATION FOR HEALTH INFORMATION EXCHANGE
BASED ON CLOUD COMPUTING SYSTEM
5 CTJV605 CONDITIONAL IDENTITY-BASED BROADCAST PROXY RE-ENCRYPTION AND ITS APPLICATION
TO CLOUD EMAIL
6 CTJV606 CONJUNCTIVE KEYWORD SEARCH WITH DESIGNATED TESTER AND TIMING ENABLED PROXY
RE-ENCRYPTION FUNCTION FOR E-HEALTH CLOUDS
7 CTJV607 DEYPOS: DEDUPLICATABLE DYNAMIC PROOF OF STORAGE FOR MULTI-USER ENVIRONMENTS
8 CTJV608 DIPLOCLOUD: EFFICIENT AND SCALABLE MANAGEMENT OF RDF DATA IN THE CLOUD
9 CTJV609 DUAL-SERVER PUBLIC-KEY ENCRYPTION WITH KEYWORD SEARCH FOR SECURE CLOUD STORAGE
10 CTJV610 DYNAMIC AND PUBLIC AUDITING WITH FAIR ARBITRATION FOR CLOUD DATA
11 CTJV611 ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES
12 CTJV612 FINE-GRAINED TWO-FACTOR ACCESS CONTROL FOR WEB-BASED CLOUD COMPUTING SERVICES
13 CTJV613 FLEXIBLE AND FINE-GRAINED ATTRIBUTE-BASED DATA STORAGE IN CLOUD COMPUTING
14 CTJV614 GEOMETRIC RANGE SEARCH ON ENCRYPTED SPATIAL DATA
15 CTJV615 IDENTITY-BASED ENCRYPTION WITH CLOUD REVOCATION AUTHORITY AND ITS APPLICATIONS
16 CTJV616 IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING
IN PUBLIC CLOUD
17 CTJV617 PROTECTING YOUR RIGHT: VERIFIABLE ATTRIBUTE-BASED KEYWORD SEARCH WITH
FINE-GRAINED OWNER-ENFORCED SEARCH AUTHORIZATION IN THE CLOUD
18 CTJV618 REAL-TIME SEMANTIC SEARCH USING APPROXIMATE METHODOLOGY FOR LARGE-SCALE
STORAGE SYSTEMS
19 CTJV619 SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY
OF LINEAR PROGRAMMING
20 CTJV620 A NOVEL RECOMMENDATION MODEL REGULARIZED WITH USER TRUST AND ITEM RATINGS
21 CTJV621 AUTOMATICALLY MINING FACETS FOR QUERIES FROM THEIR SEARCH RESULTS
22 CTJV622 BOOSTER IN HIGH DIMENSIONAL DATA CLASSIFICATION
23 CTJV623 BUILDING AN INTRUSION DETECTION SYSTEM USING A FILTER-BASED FEATURE SELECTION
ALGORITHM
24 CTJV624 CONNECTING SOCIAL MEDIA TO E-COMMERCE: COLD-START PRODUCT RECOMMENDATION
USING MICROBLOGGING INFORMATION
25 CTJV625 CROSS-DOMAIN SENTIMENT CLASSIFICATION USING SENTIMENT SENSITIVE EMBEDDING’S
26 CTJV626 CROWDSOURCING FOR TOP-K QUERY PROCESSING OVER UNCERTAIN DATA
27 CTJV627 CYBERBULLYING DETECTION BASED ON SEMANTIC-ENHANCED MARGINALIZED DENOISING AUTO-ENCODER
28 CTJV628 DOMAIN-SENSITIVE RECOMMENDATION WITH USER-ITEM SUBGROUP ANALYSIS
29 CTJV629 EFFICIENT ALGORITHMS FOR MINING TOP-K HIGH UTILITY ITEMSETS
30 CTJV630 EFFICIENT CACHE-SUPPORTED PATH PLANNING ON ROADS
31 CTJV631 LOCATION AWARE KEYWORD QUERY SUGGESTION BASED ON DOCUMENT PROXIMITY
32 CTJV632 MINING USER-AWARE RARE SEQUENTIAL TOPIC PATTERNS IN DOCUMENT STREAMS
33 CTJV633 NEAREST KEYWORD SET SEARCH IN MULTI-DIMENSIONAL DATASETS
34 CTJV634 QUANTIFYING POLITICAL LEANING FROM TWEETS, RETWEETS, AND RETWEETERS
35 CTJV635 RATING PREDICTION BASED ON SOCIAL SENTIMENT FROM TEXTUAL REVIEWS
36 CTJV636 SENTIMENT EMBEDDING’S WITH APPLICATIONS TO SENTIMENT ANALYSIS
37 CTJV637 ANSWERING APPROXIMATE QUERIES OVER XML DATA
38 CTJV638 A LOCALITY SENSITIVE LOW-RANK MODEL FOR IMAGE TAG COMPLETION
39 CTJV639 A SCALABLE APPROACH FOR CONTENT-BASED IMAGE RETRIEVAL IN PEER-TO-PEER NETWORKS
40 CTJV640 LEARNING OF MULTIMODAL REPRESENTATIONS WITH RANDOM WALKS ON THE CLICK GRAPH
41 CTJV641 ONLINE MULTI-MODAL DISTANCE METRIC LEARNING WITH APPLICATION TO IMAGE RETRIEVAL
42 CTJV642 OPTIMIZED SEARCH-AND-COMPUTE CIRCUITS AND THEIR APPLICATION TO QUERY EVALUATION
ON ENCRYPTED DATA
43 CTJV643 PRIVACY-PRESERVING UTILITY VERIFICATION OF THE DATA PUBLISHED BY NON-INTERACTIVE
DIFFERENTIALLY PRIVATE MECHANISMS
44 CTJV644 PROFILING ONLINE SOCIAL BEHAVIORS FOR COMPROMISED ACCOUNT DETECTION
45 CTJV645 HIDDEN CIPHERTEXT POLICY ATTRIBUTE-BASED ENCRYPTION UNDER STANDARD ASSUMPTIONS
46 CTJV646 DETECTING NODE FAILURES IN MOBILE WIRELESS NETWORKS: A PROBABILISTIC APPROACH
47 CTJV647 ENERGY AND MEMORY EFFICIENT CLONE DETECTION IN WIRELESS SENSOR NETWORKS
48 CTJV648 EPLQ: EFFICIENT PRIVACY-PRESERVING LOCATION-BASED QUERY OVER OUTSOURCED ENCRYPTED DATA
49 CTJV649 SECURE OVERLAY ROUTING USING KEY PRE-DISTRIBUTION: A LINEAR DISTANCE OPTIMIZATION APPROACH
50 CTJV650 A STABLE APPROACH FOR ROUTING QUERIES IN UNSTRUCTURED P2P NETWORKS
51 CTJV651 IPATH: PATH INFERENCE IN WIRELESS SENSOR NETWORKS
52 CTJV652 OPPORTUNISTIC ROUTING WITH CONGESTION DIVERSITY IN WIRELESS AD HOC NETWORKS
53 CTJV653 A HOP-BY-HOP ROUTING MECHANISM FOR GREEN INTERNET
54 CTJV654 CONTINUOUS ANSWERING HOLISTIC QUERIES OVER SENSOR NETWORKS
55 CTJV655 DICTIONARY BASED SECURE PROVENANCE COMPRESSION FOR WIRELESS SENSOR NETWORKS
56 CTJV656 DATA LINEAGE IN MALICIOUS ENVIRONMENTS
57 CTJV657 FRODO: FRAUD RESILIENT DEVICE FOR OFF-LINE MICRO-PAYMENTS
58 CTJV658 INFERENCE ATTACK ON BROWSING HISTORY OF TWITTER
59 CTJV659 MAPPING BUG REPORTS TO RELEVANT FILES: A RANKING MODEL, A FINE-GRAINED BENCHMARK,
AND FEATURE EVALUATION
60 CTJV660 METAMORPHIC TESTING FOR SOFTWARE QUALITY ASSESSMENT: A STUDY OF SEARCH ENGINES
61 CTJV661 A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION
62 CTJV662 A DISTORTION-RESISTANT ROUTING FRAMEWORK FOR VIDEO TRAFFIC IN WIRELESS
MULTIHOP NETWORKS
63 CTJV663 A FRAMEWORK FOR SECURE COMPUTATIONS WITH TWO NON-COLLUDING SERVERS AND
MULTIPLE CLIENTS, APPLIED TO RECOMMENDAT
64 CTJV664 A LIGHTWEIGHT SECURE SCHEME FOR DETECTING PROVENANCE FORGERY AND PACKET DROP
ATTACKS IN WIRELESS SENSOR NETWORK
65 CTJV665 A PROFIT MAXIMIZATION SCHEME WITH GUARANTEED QUALITY OF SERVICE IN CLOUD COMPUTING
66 CTJV666 A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM
67 CTJV667 A SCALABLE AND RELIABLE MATCHING SERVICE FOR CONTENT-BASED PUBLISH/SUBSCRIBE SYSTEMS
68 CTJV668 A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA
69 CTJV669 A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA
70 CTJV670 AN ATTRIBUTE-ASSISTED RERANKING MODEL FOR WEB IMAGE SEARCH
71 CTJV671 AN AUTHENTICATED TRUST AND REPUTATION CALCULATION AND MANAGEMENT SYSTEM FOR
CLOUD AND SENSOR NETWORKS INTEGRATI
72 CTJV672 ASYMMETRIC SOCIAL PROXIMITY BASED PRIVATE MATCHING PROTOCOLS FOR ONLINE SOCIAL NETWORKS
73 CTJV673 AUDIT-FREE CLOUD STORAGE VIA DENIABLE ATTRIBUTE-BASED ENCRYPTION
74 CTJV674 CIRCUIT CIPHERTEXT-POLICY ATTRIBUTE-BASED HYBRID ENCRYPTION WITH VERIFIABLE DELEGATION
IN CLOUD COMPUTING
75 CTJV675 CLOUDARMOR: SUPPORTING REPUTATION-BASED TRUST MANAGEMENT FOR CLOUD SERVICES
76 CTJV676 CO-EXTRACTING OPINION TARGETS AND OPINION WORDS FROM ONLINE REVIEWS BASED ON
THE WORD ALIGNMENT MODEL
77 CTJV677 CONTEXT-BASED DIVERSIFICATION FOR KEYWORD QUERIES OVER XML DATA
78 CTJV678 CONTEXT-BASED DIVERSIFICATION FOR KEYWORD QUERIES OVER XML DATA
79 CTJV679 CONTRIBUTORY BROADCAST ENCRYPTION WITH EFFICIENT ENCRYPTION AND SHORT CIPHERTEXTS
80 CTJV680 CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS
ATTRIBUTE-BASED ENCRYPTION
81 CTJV681 COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
82 CTJV682 DDSGA: A DATA-DRIVEN SEMI-GLOBAL ALIGNMENT APPROACH FOR DETECTING MASQUERADE ATTACKS
83 CTJV683 DESIGNING HIGH PERFORMANCE WEB-BASED COMPUTING SERVICES TO PROMOTE TELEMEDICINE
DATABASE MANAGEMENT SYSTEM
84 CTJV684 DETECTING MALICIOUS FACEBOOK APPLICATIONS
85 CTJV685 DISCOVERY OF RANKING FRAUD FOR MOBILE APPS
86 CTJV686 DYNAMIC ROUTING FOR DATA INTEGRITY AND DELAY DIFFERENTIATED SERVICES IN WIRELESS
SENSOR NETWORKS
87 CTJV687 EMR: A SCALABLE GRAPH-BASED RANKING MODEL FOR CONTENT-BASED IMAGE RETRIEVAL
88 CTJV688 IMPROVED PRIVACY-PRESERVING P2P MULTIMEDIA DISTRIBUTION BASED ON RECOMBINED FINGERPRINTS
89 CTJV689 KEY UPDATING FOR LEAKAGE RESILIENCY WITH APPLICATION TO AES MODES OF OPERATION
90 CTJV690 LEARNING TO RANK IMAGE TAGS WITH LIMITED TRAINING EXAMPLES
91 CTJV691 LOCATION-AWARE AND PERSONALIZED COLLABORATIVE FILTERING FOR WEB SERVICE RECOMMENDATION
92 CTJV692 MALWARE PROPAGATION IN LARGE-SCALE NETWORKS
93 CTJV693 MAXIMIZING P2P FILE ACCESS AVAILABILITY IN MOBILE AD HOC NETWORKS THOUGH REPLICATION
FOR EFFICIENT FILE SHARING
94 CTJV694 ON SUMMARIZATION AND TIMELINE GENERATION FOR EVOLUTIONARY TWEET STREAMS
95 CTJV695 PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
96 CTJV696 PRIVACY-PRESERVING AND TRUTHFUL DETECTION OF PACKET DROPPING ATTACKS IN WIRELESS
AD HOC NETWORKS
97 CTJV697 PRIVACY-PRESERVING PUBLIC AUDITING FOR REGENERATING-CODE-BASED CLOUD STORAGE
98 CTJV698 PROGRESSIVE DUPLICATE DETECTION
99 CTJV699 REAL-TIME DETECTION OF TRAFFIC FROM TWITTER STREAM ANALYSIS
100 CTJV700 REVERSE NEAREST NEIGHBORS IN UNSUPERVISED DISTANCE-BASED OUTLIER DETECTION
101 CTJV701 ROUTE-SAVER: LEVERAGING ROUTE APIS FOR ACCURATE AND EFFICIENT QUERY PROCESSING
AT LOCATION-BASED SERVICES
102 CTJV702 SECURE DISTRIBUTED DEDUPLICATION SYSTEMS WITH IMPROVED RELIABILITY
103 CTJV703 SECURE SPATIAL TOP-K QUERY PROCESSING VIA UN TRUSTED LOCATION-BASED SERVICE PROVIDERS
104 CTJV704 STEALTHY DENIAL OF SERVICE STRATEGY IN CLOUD COMPUTING
105 CTJV705 T-CLOSENESS THROUGH MICRO AGGREGATION: STRICT PRIVACY WITH ENHANCED UTILITY PRESERVATION
106 CTJV706 TOWARDS EFFECTIVE BUG TRIAGE WITH SOFTWARE DATA REDUCTION TECHNIQUES
107 CTJV707 TWEET SEGMENTATION AND ITS APPLICATION TO NAMED ENTITY RECOGNITION
108 CTJV708 USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES
109 CTJV709 CIRCUIT CIPHER TEXT-POLICY ATTRIBUTE-BASED HYBRID ENCRYPTION WITH VERIFIABLE
DELEGATION IN CLOUD COMPUTING
110 CTJV710 PROVABLE MULTI COPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEM
111 CTJV711 SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
112 CTJV712 STEGANOGRAPHY USING REVERSIBLE TEXTURE SYNTHESIS
113 CTJV713 A LOAD BALANCING MODEL BASED ON CLOUD PARTITIONING FOR THE PUBLIC CLOUD
114 CTJV714 A HYBRID CLOUD APPROACH FOR SECURE AUTHORIZED DEDUPLICATION
115 CTJV715 DECENTRALIZED ACCESS CONTROL WITH ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS
116 CTJV716 KEY-AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD STORAGE
117 CTJV717 ORUTA: PRIVACY-PRESERVING PUBLIC AUDITING FOR SHARED DATA IN THE CLOUD
118 CTJV718 BEST KEYWORD COVER SEARCH
119 CTJV719 PRIVACY-PRESERVING AND TRUTHFUL DETECTION OF PACKET DROPPING ATTACKS IN WIRELESS
120 CTJV720 DETECTING MALICIOUS FACE BOOK APPLICATIONS

M.TECH JAVA PROJECTS LIST 2015-16

S.No Code PROJECT TITLE Download Titles Action
1 CTJV001 A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION
2 CTJV002 A DISTORTION-RESISTANT ROUTING FRAMEWORK FOR VIDEO TRAFFIC IN WIRELESS MULTIHOP NETWORKS
3 CTJV003 A FRAMEWORK FOR SECURE COMPUTATIONS WITH TWO NON-COLLUDING SERVERS AND MULTIPLE CLIENTS,
APPLIED TO RECOMMENDAT
4 CTJV004 A LIGHTWEIGHT SECURE SCHEME FOR DETECTING PROVENANCE FORGERY AND PACKET DROP ATTACKS IN
WIRELESS SENSOR NETWORK
5 CTJV005 A PROFIT MAXIMIZATION SCHEME WITH GUARANTEED QUALITY OF SERVICE IN CLOUD COMPUTING
6 CTJV006 A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM
7 CTJV007 A SCALABLE AND RELIABLE MATCHING SERVICE FOR CONTENT-BASED PUBLISH/SUBSCRIBE SYSTEMS
8 CTJV008 A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA
9 CTJV009 A SECURE ANTI-COLLUSION DATA SHARING SCHEME FOR DYNAMIC GROUPS IN THE CLOUD
10 CTJV010 AN ATTRIBUTE-ASSISTED RERANKING MODEL FOR WEB IMAGE SEARCH
11 CTJV011 AN AUTHENTICATED TRUST AND REPUTATION CALCULATION AND MANAGEMENT SYSTEM FOR CLOUD AND
SENSOR NETWORKS INTEGRATI
12 CTJV012 ASYMMETRIC SOCIAL PROXIMITY BASED PRIVATE MATCHING PROTOCOLS FOR ONLINE SOCIAL NETWORKS
13 CTJV013 AUDIT-FREE CLOUD STORAGE VIA DENIABLE ATTRIBUTE-BASED ENCRYPTION
14 CTJV014 CIRCUIT CIPHERTEXT-POLICY ATTRIBUTE-BASED HYBRID ENCRYPTION WITH VERIFIABLE DELEGATION IN
CLOUD COMPUTING
15 CTJV015 CLOUDARMOR: SUPPORTING REPUTATION-BASED TRUST MANAGEMENT FOR CLOUD SERVICES
16 CTJV016 CO-EXTRACTING OPINION TARGETS AND OPINION WORDS FROM ONLINE REVIEWS BASED ON THE WORD
ALIGNMENT MODEL
17 CTJV017 CONTEXT-BASED DIVERSIFICATION FOR KEYWORD QUERIES OVER XML DATA
18 CTJV018 DATA MINIING WITH BIG DATA
19 CTJV019 CONTRIBUTORY BROADCAST ENCRYPTION WITH EFFICIENT ENCRYPTION AND SHORT CIPHERTEXTS
20 CTJV020 CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED
ENCRYPTION
21 CTJV021 COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
22 CTJV022 DDSGA: A DATA-DRIVEN SEMI-GLOBAL ALIGNMENT APPROACH FOR DETECTING MASQUERADE ATTACKS
23 CTJV023 DESIGNING HIGH PERFORMANCE WEB-BASED COMPUTING SERVICES TO PROMOTE TELEMEDICINE DATABASE
MANAGEMENT SYSTEM
24 CTJV024 DETECTING MALICIOUS FACEBOOK APPLICATIONS
25 CTJV025 DISCOVERY OF RANKING FRAUD FOR MOBILE APPS
26 CTJV026 DYNAMIC ROUTING FOR DATA INTEGRITY AND DELAY DIFFERENTIATED SERVICES IN WIRELESS SENSOR
NETWORKS
27 CTJV027 EMR: A SCALABLE GRAPH-BASED RANKING MODEL FOR CONTENT-BASED IMAGE RETRIEVAL
28 CTJV028 IMPROVED PRIVACY-PRESERVING P2P MULTIMEDIA DISTRIBUTION BASED ON RECOMBINED FINGERPRINTS
29 CTJV029 KEY UPDATING FOR LEAKAGE RESILIENCY WITH APPLICATION TO AES MODES OF OPERATION
30 CTJV030 LEARNING TO RANK IMAGE TAGS WITH LIMITED TRAINING EXAMPLES
31 CTJV031 LOCATION-AWARE AND PERSONALIZED COLLABORATIVE FILTERING FOR WEB SERVICE RECOMMENDATION
32 CTJV032 MALWARE PROPAGATION IN LARGE-SCALE NETWORKS
33 CTJV033 MAXIMIZING P2P FILE ACCESS AVAILABILITY IN MOBILE AD HOC NETWORKS THOUGH REPLICATION FOR
EFFICIENT FILE SHARING
34 CTJV034 ON SUMMARIZATION AND TIMELINE GENERATION FOR EVOLUTIONARY TWEET STREAMS
35 CTJV035 PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
36 CTJV036 PRIVACY-PRESERVING AND TRUTHFUL DETECTION OF PACKET DROPPING ATTACKS IN WIRELESS AD HOC
NETWORKS
37 CTJV037 PRIVACY-PRESERVING PUBLIC AUDITING FOR REGENERATING-CODE-BASED CLOUD STORAGE
38 CTJV038 PROGRESSIVE DUPLICATE DETECTION
39 CTJV039 REAL-TIME DETECTION OF TRAFFIC FROM TWITTER STREAM ANALYSIS
40 CTJV040 REVERSE NEAREST NEIGHBORS IN UNSUPERVISED DISTANCE-BASED OUTLIER DETECTION
41 CTJV041 ROUTE-SAVER: LEVERAGING ROUTE APIS FOR ACCURATE AND EFFICIENT QUERY PROCESSING AT
LOCATION-BASED SERVICES
42 CTJV042 SECURE DISTRIBUTED DEDUPLICATION SYSTEMS WITH IMPROVED RELIABILITY
43 CTJV043 SECURE SPATIAL TOP-K QUERY PROCESSING VIA UN TRUSTED LOCATION-BASED SERVICE PROVIDERS
44 CTJV044 STEALTHY DENIAL OF SERVICE STRATEGY IN CLOUD COMPUTING
45 CTJV045 T-CLOSENESS THROUGH MICRO AGGREGATION: STRICT PRIVACY WITH ENHANCED UTILITY PRESERVATION
46 CTJV046 TOWARDS EFFECTIVE BUG TRIAGE WITH SOFTWARE DATA REDUCTION TECHNIQUES
47 CTJV047 TWEET SEGMENTATION AND ITS APPLICATION TO NAMED ENTITY RECOGNITION
48 CTJV048 USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES
49 CTJV049 DISCOVERING EMERGING TOPICS IN SOCIAL STREAMS VIA LINK-ANOMALY DETECTION
50 CTJV050 DISTRIBUTED, CONCURRENT, AND INDEPENDENT ACCESS TO ENCRYPTED CLOUD DATABASES
51 CTJV051 EFFICIENT PREDICTION OF DIFFICULT KEYWORD QUERIES OVER DATABASES
52 CTJV052 DEALING WITH CONCEPT DRIFTS IN PROCESS MINING
53 CTJV053 A COCKTAIL APPROACH FOR TRAVEL PACKAGE RECOMMENDATION
54 CTJV054 A HYBRID CLOUD APPROACH FOR SECURE AUTHORIZED DEDUPLICATION
55 CTJV055 A SCALABLE TWO-PHASE TOP-DOWN SPECIALIZATION APPROACH FOR DATA ANONYMIZATION USING MAP
REDUCE ON CLOUD
56 CTJV056 A STOCHASTIC MODEL TO INVESTIGATE DATA CENTER PERFORMANCE AND QOS IN IAAS CLOUD COMPUTING
SYSTEMS
57 CTJV057 ACCURACY-CONSTRAINED PRIVACY-PRESERVING ACCESS CONTROL MECHANISM FOR RELATIONAL DATA
58 CTJV058 AN INCENTIVE FRAMEWORK FOR CELLULAR TRAFFIC OFFLOADING
59 CTJV059 AUTOMATIC TEST PACKET GENERATION
60 CTJV060 BESTPEER++: A PEER-TO-PEER BASED LARGE-SCALE DATA PROCESSING PLATFORM
61 CTJV061 BOUNDARY CUTTING FOR PACKET CLASSIFICATION
62 CTJV062 BUILDING CONFIDENTIAL AND EFFICIENT QUERY SERVICES IN THE CLOUD WITH RASP DATA PERTURBATION
63 CTJV063 CAPTCHA AS GRAPHICAL PASSWORDS—A NEW SECURITY PRIMITIVE BASED ON HARD AI PROBLEMS
64 CTJV064 COOPERATIVE CACHING FOR EFFICIENT DATA ACCESS IN DISRUPTION TOLERANT NETWORKS
65 CTJV065 COST-EFFECTIVE RESOURCE ALLOCATION OF OVERLAY ROUTING RELAY NODES
66 CTJV066 TRAFFIC PATTERN-BASED CONTENT LEAKAGE DETECTION FOR TRUSTED CONTENT DELIVERY NETWORKS
67 CTJV067 DECENTRALIZED ACCESS CONTROL WITH ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS
68 CTJV068 EFFICIENT AND PRIVACY-AWARE DATA AGGREGATION IN MOBILE SENSING
69 CTJV069 EFFICIENT AUTHENTICATION FOR MOBILE AND PERVASIVE COMPUTING
70 CTJV070 ENABLING TRUSTWORTHY SERVICE EVALUATION IN SERVICE-ORIENTED MOBILE SOCIAL NETWORKS
71 CTJV071 EXPLOITING SERVICE SIMILARITY FOR PRIVACY IN LOCATION-BASED SEARCH QUERIES
72 CTJV072 EXPRESSIVE, EFFICIENT, AND REVOCABLE DATA ACCESS CONTROL FOR MULTI-AUTHORITY CLOUD STORAGE
73 CTJV073 FACILITATING DOCUMENT ANNOTATION USING CONTENT AND QUERYING VALUE
74 CTJV074 FAST NEAREST NEIGHBOR SEARCH WITH KEYWORDS
75 CTJV075 FRIENDBOOK: A SEMANTIC-BASED FRIEND RECOMMENDATION SYSTEM FOR SOCIAL NETWORKS
76 CTJV076 KEY-AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD STORAGE
77 CTJV077 LOCAWARD: A SECURITY AND PRIVACY AWARE LOCATION-BASED REWARDING SYSTEM
78 CTJV078 ON FALSE DATA-INJECTION ATTACKS AGAINST POWER SYSTEM STATE ESTIMATION: MODELING AND
COUNTERMEASURES
79 CTJV079 OPTIMAL DISTRIBUTED MALWARE DEFENSE IN MOBILE NETWORKS WITH HETEROGENEOUS DEVICES
80 CTJV080 ORUTA: PRIVACY-PRESERVING PUBLIC AUDITING FOR SHARED DATA IN THE CLOUD
81 CTJV081 PRIVACY-ENHANCED WEB SERVICE COMPOSITION
82 CTJV082 PRIVACY-PRESERVING AND CONTENT-PROTECTING LOCATION BASED QUERIES
83 CTJV083 PRIVACY-PRESERVING MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED CLOUD DATA
84 CTJV084 PROFILR : TOWARD PRESERVING PRIVACY AND FUNCTIONALITY IN GEOSOCIAL NETWORKS
85 CTJV085 RRE: A GAME-THEORETIC INTRUSION RESPONSE AND RECOVERY ENGINE
86 CTJV086 SCALABLE DISTRIBUTED SERVICE INTEGRITY ATTESTATION FOR SOFTWARE-AS-A-SERVICE CLOUDS
87 CTJV087 SECURE DATA RETRIEVAL FOR DECENTRALIZED DISRUPTION-TOLERANT MILITARY NETWORKS
88 CTJV088 SECURE OUT SOURCED ATTRIBUTE-BASED SIGNATURES
89 CTJV089 SECURING BROKER-LESS PUBLISH/SUBSCRIBE SYSTEMS USING IDENTITY-BASED ENCRYPTION
90 CTJV090 SECURITY EVALUATION OF PATTERN CLASSIFIERS UNDER ATTACK
91 CTJV091 SOS: A DISTRIBUTED MOBILE Q&A SYSTEM BASED ON SOCIAL NETWORKS
92 CTJV092 SUPPORTING PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH
93 CTJV093 THE CLIENT ASSIGNMENT PROBLEM FOR CONTINUOUS DISTRIBUTED INTERACTIVE APPLICATIONS: ANALYSIS,
ALGORITHMS, AND EVALUATION
94 CTJV094 THE DESIGN AND EVALUATION OF AN INFORMATION SHARING SYSTEM FOR HUMAN NETWORKS
95 CTJV095 TOP-K QUERY RESULT COMPLETENESS VERIFICATION IN TIERED SENSOR NETWORKS
96 CTJV096 TOWARDS DIFFERENTIAL QUERY SERVICES IN COST-EFFICIENT CLOUDS
97 CTJV097 TOWARDS ONLINE SHORTEST PATH COMPUTATION