java projects 2019 - 2020 list





Java 2019 – 2020 in bulk sale 

1.       Spammer Detection and Fake User Identificationon Social Networks
2.       Social Network Rumor Diffusion Predication Based on Equal Responsibility Game Model
3.       Securing Data in Internet of Things Using Cryptography and Steganography Techniques
4.       Retrieving Hidden Friends A Collusion Privacy Attack Against Online Friend Search Engine
5.       Profit Maximization for Cloud Brokers in Cloud Computing
6.       Privacy-aware Personal Data Storage PPDS Learning
7.       Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Learning Algorithms
8.       Performance and power consumption evaluation in smartphone based image processing for medical applications
9.       Online Public Shaming on Twitter Detection Analysis and Mitigation
10.   I injection Toward effective collaborative filtering using uninteresting items
11.   Fundamental Visual Concept Learning from Correlated Images and Text
12.   Filtering Instagram hashtags through crowdtagging and the HITS algorithm
13.   Dynamic Multi Keyword Ranked Search Based on Bloom Filter
14.   Detecting Malicious Social Bots Based on Clickstream Sequences
15.   Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments
16.   DCCR Deep Collaborative Conjunctive Recommender for Rating Prediction
17.   Crypt DAC Cryptographically Enforced Dynamic Access Control in the Cloud
18.   Clustering Based Collaborative Filtering Using an Incentivized Penalized User Model
19.   Cloud Data Protection for Masses
20.   CHARON A Secure Cloud of Clouds System for Storing and Sharing Big Data
21.   Applied Machine Learning Predictive Analytics toSQL Injection Attack Detection and Prevention
22.   Sensitive label privacy preservation with anatomization for data publishing
23.   A Hierarchical Attention Model for Social Contextual Image Recommendation
24.   A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing
25.   A Secure G-Cloud-Based Framework for Government Healthcare Services
26.   A Trust Based Agent Learning Model for Service Composition
27.   Adaptive self-paced Deep clustering with Data Augmention
28.   An attack resistant trust inference model
29.   An Efficient Message Authentication Scheme
30.   An Efficient Multi-User Searchable Encryption Scheme
31.   Authentication by Encrypted Negative Password
32.   CoDetect Financial Fraud Detection With Anomaly Feature Detection
33.   Composition Context-Based Web Services Similarity Measure
34.   Data Integrity Auditing without Private Key Storage for Secure Cloud Storage
35.   Efficient and Privacy-Preserving Medical Data Sharing in IoT
36.   Enabling Authorized Encrypted Search for Multi Authority Medical Databases
37.   Frequent Itemsets Mining with Differential Privacy over Large-scale Data
38.   Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing
39.   Joint Hypergraph Learning for Tag-based
40.   Privacy Protection Smartcard Authentication
41.   Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks
42.   Selective Authentication Based Geographic Opportunistic Routing in wsn
43.   Semantic-Aware Searching Over Encrypted Data for Cloud Computing
44.   Traffic and Energy Aware Routing for Heterogeneous Wireless Sensor Networks             
45.   Trustworthy Delegation toward Securing Mobile Healthcare Cyber Physical Systems
46.   A Fog-centric Secure Cloud Storage Scheme
47.   Coverless Information Hiding Method Based on Web Text          
48.   Detection of fake online reviews using semi-supervised and supervised learning
49.   Dynamic Resource Allocation for MapReduce with Partitioning Skew
50.   Hidden Ciphertext Policy Attribute-Based Encryption with Fast Decryption for PHRS
51.   K-nearest Neighbors Search by Random Projection Forests
52.   Normalization of Duplicate Records from Multiple Sources
53.   Provable Data Possession with Outsourced Data Transfer (1)
54.   Searchable Symmetric Encryption with Forward Search Privacy
55.   SEPTIC Detecting Injection Attacks and Vulnerabilities Inside the DBMS


Projects
56.   source code - A Probabilistic Source Location Privacy Protection Scheme in Wireless Sensor Networks
57.   source code - A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage Services
58.   source code - Adaptive Self-paced Deep Clustering with Data Augmentation
59.   source code - Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks
60.   source code - Selective Authentication based Geographic Opportunistic Routing in WSN for IoT against DoS Attacks


1. an attribute based controlled collaborative access control scheme for public cloud storage


2.  enabling identity based integrity auding and data sharing with sensitive information hiding for secure cloud storage

3. verifiable and multi keyword searchable attribute based encryption scheme for cloud storage

4 privacy preserving searchable encryption with fine grained access control

5. recovable identity based broadcast proxy re-encryption for data sharing in clouds

6.  a lighweight securing auditing scheme for shared data in cloud storage

7. p-mod: secure priviliage based multilevel organisation data sharing in cloud computing 

8. privacy preserving attribute based keyword search in shared multi owner setting

9. enabling verifiable and dynamic ranked search over outsourced data

10. towords achieving keyword search over dynamic encrypted cloud data with symmertic key based verification 

11. a novel load image profile based electricity load clustering methodology

12. LBOA: location based secure outsourced aggregation in IOT

13. active online learning for social media analysis to support crisis management 

14. FooDNet: Toward an Optimized Food Delivery Network based on Spatial Crowdsourcing



thank you for your comment

pls call me on 8125424511