SlNo
|
Titles
|
Domain
|
1
|
Audit
Free Cloud Storage via deniable Attribute based Encryption
|
Cloud Computing
|
2
|
A
Secure and Dynamic Multi keyword Ranked Search Scheme over Encrypted Cloud
Data
|
Parallel and Distributed Systems
|
3
|
Eye
Gaze Tracking With a Web Camera in a Desktop Environment
|
Human-Machine Systems
|
4
|
A
Methodology for Extracting Standing Human Bodies From Single Images in C#.Net
|
Human-Machine Systems
|
5
|
Face Recognition Across Non Uniform Motion
Blur, Illumination, and Pose
|
Image Processing
|
6
|
A
Fiducial Facial Point Extraction Using a Novel Projective Invariant
|
Image Processing
|
7
|
DROPS Division and Replication of Data in
Cloud for Optimal Performance and Security
|
Cloud Computing
|
8
|
Automatic
Face Naming by Learning Discriminative Affinity Matrices From Weakly Labeled
Images
|
Neural Networks and Learning Systems
|
9
|
Single
Image Super Resolution Based on Gradient Proļ¬le Sharpness
|
|
10
|
Provable
Multicopy Dynamic Data Possession in Cloud Computing Systems
|
Information Forensics and Security
|
11
|
OPoR:
Enabling Proof of Retrievability in Cloud Computing
|
Cloud Computing
|
12
|
A
Distributed Three-hop Routing Protocol to
Increase the Capacity of Hybrid Wireless
|
Mobile Computing
|
13
|
Defeating
Jamming With the Power of Silence:A Game-Theoretic Analysis
|
Wireless Communications
|
14
|
Steganography
Using Reversible Texture Synthesis
|
Image Processing
|
15
|
Privacy-Preserving
and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks
|
Mobile Computing
|
16
|
IncreSTS:
Towards Real-Time Incremental Short Text Summarization on Comment Streams
from SNS
|
Knowledge and Data Engineering
|
17
|
Privacy
Policy Inference of User-Uploaded Images on ContentSharing Sites
|
Knowledge and Data Engineering
|
18
|
Continuous
and Transparent User Identity Verification for SecureInternet Services
|
Dependable and Secure Computing
|
19
|
TEES:
An Efficient Search Scheme overEncrypted Data on Mobile Cloud
|
Cloud Computing
|
20
|
Optimal
Configuration of Network Coding in Ad Hoc Networks
|
Vehicular Technology
|
21
|
PSMPA:
Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative
Authentication in Distributed m-Healthcare Cloud Computing System
|
Parallel and Distributed Systems
|
22
|
Universal
Network Coding-Based Opportunistic Routing for Unicast
|
Parallel and Distributed Systems
|
23
|
Authenticated
Key Exchange Protocols for Parallel Network File Systems
|
Parallel and Distributed Systems
|
24
|
An
Attribute-Assisted Reranking Model for Web Image Search
|
Image Processing
|
25
|
A
Scalable and Reliable Matching Service for Content-Based Publish/Subscribe
Systems
|
Cloud Computing
|
26
|
Location-Aware
and Personalized Collaborative Filtering for Web Service Recommendation
|
Services Computing
|
27
|
EMR:
A Scalable Graph-based Ranking Model for Content-based Image Retrieval
|
Knowledge and Data Engineering
|
28
|
Software
Puzzle: A Countermeasure to Resource-Inflated Denialof-Service Attacks
|
Information Forensics and Security
|
29
|
Effective
Key Management in Dynamic Wireless Sensor Networks
|
Information Forensics and Security
|
30
|
Maximizing
P2P File Access Availability in Mobile Ad Hoc Networks though Replication for
Efficient File Sharing
|
Computers
|
31
|
Stealthy
Denial of Service Strategy in Cloud Computing
|
Cloud Computing
|
32
|
Public
Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
|
Computers
|
33
|
Privacy
Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud
Computing
|
Computers
|
34
|
Identity-Based
Encryption with Outsourced Revocation in Cloud Computing
|
Computers
|
35
|
VANET
Modeling and Clustering Design Under Practical Traffic, Channel and Mobility
Conditions
|
Communications
|
36
|
Real-Time
Path Planning Based on Hybrid-VANET-Enhanced Transportation System
|
Vehicular Technology
|
37
|
Toward
Energy-Efficient Trust System Through Watchdog Optimization for WSNs
|
Information Forensics and Security
|
38
|
CoCoWa:
A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes
|
Mobile Computing
|
39
|
Defending
Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative
Bait Detection Approach
|
Mobile Computing
|
40
|
Time-Delayed
Broadcasting for Defeating Inside Jammers
|
Dependable and Secure Computing
|
41
|
Data
Collection in Multi-Application Sharing Wireless Sensor Networks
|
Parallel and Distributed Systems
|
42
|
A
Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid
Wireless Networks
|
Mobile Computing
|
43
|
Friendbook:
A Semantic-Based Friend Recommendation System for Social Networks
|
Mobile Computing
|
44
|
Discovery
of Ranking Fraud for Mobile Apps
|
Knowledge and Data Engineering
|
45
|
Secure
Auditing and Deduplicating Data in Cloud
|
Computers
|
46
|
Authenticated
Key Exchange Protocols for Parallel Network File Systems
|
Parallel and Distributed Systems
|
47
|
Collision
Tolerant and Collision Free Packet Scheduling for Underwater Acoustic
Localization
|
Wireless Communications
|
48
|
Secure
Distributed Deduplication Systems with ImprovedReliability
|
Computers
|
49
|
A Computational
Dynamic Trust Model for User Authorization
|
DEPENDABLE AND SECURE
COMPUTING
|
50
|
Co-Extracting Opinion
Targets and Opinion Words from Online Reviews Based on the Word Alignment
Model
|
KNOWLEDGE AND DATA
ENGINEERING
|
No comments:
Post a Comment