Java 2019 – 2020 in bulk sale
1. Spammer
Detection and Fake User Identificationon Social Networks
2. Social
Network Rumor Diffusion Predication Based on Equal Responsibility Game Model
3. Securing
Data in Internet of Things Using Cryptography and Steganography Techniques
4. Retrieving
Hidden Friends A Collusion Privacy Attack Against Online Friend Search Engine
5. Profit
Maximization for Cloud Brokers in Cloud Computing
6. Privacy-aware
Personal Data Storage PPDS Learning
7. Predicting
Cyberbullying on Social Media in the Big Data Era Using Machine Learning
Algorithms
8. Performance
and power consumption evaluation in smartphone based image processing for
medical applications
9. Online
Public Shaming on Twitter Detection Analysis and Mitigation
10. I
injection Toward effective collaborative filtering using uninteresting items
11. Fundamental
Visual Concept Learning from Correlated Images and Text
12. Filtering
Instagram hashtags through crowdtagging and the HITS algorithm
13. Dynamic
Multi Keyword Ranked Search Based on Bloom Filter
14. Detecting
Malicious Social Bots Based on Clickstream Sequences
15. Design
of Secure Authenticated Key Management Protocol for Cloud Computing
Environments
16. DCCR
Deep Collaborative Conjunctive Recommender for Rating Prediction
17. Crypt
DAC Cryptographically Enforced Dynamic Access Control in the Cloud
18. Clustering
Based Collaborative Filtering Using an Incentivized Penalized User Model
19. Cloud
Data Protection for Masses
20. CHARON
A Secure Cloud of Clouds System for Storing and Sharing Big Data
21. Applied
Machine Learning Predictive Analytics toSQL Injection Attack Detection and
Prevention
22. Sensitive
label privacy preservation with anatomization for data publishing
23. A
Hierarchical Attention Model for Social Contextual Image Recommendation
24. A
Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in
Cloud Computing
25. A
Secure G-Cloud-Based Framework for Government Healthcare Services
26. A
Trust Based Agent Learning Model for Service Composition
27. Adaptive
self-paced Deep clustering with Data Augmention
28. An
attack resistant trust inference model
29. An
Efficient Message Authentication Scheme
30. An
Efficient Multi-User Searchable Encryption Scheme
31. Authentication
by Encrypted Negative Password
32. CoDetect
Financial Fraud Detection With Anomaly Feature Detection
33. Composition
Context-Based Web Services Similarity Measure
34. Data
Integrity Auditing without Private Key Storage for Secure Cloud Storage
35. Efficient
and Privacy-Preserving Medical Data Sharing in IoT
36. Enabling
Authorized Encrypted Search for Multi Authority Medical Databases
37. Frequent
Itemsets Mining with Differential Privacy over Large-scale Data
38. Improving
Privacy and Security in Decentralizing Multi-Authority Attribute-Based
Encryption in Cloud Computing
39. Joint
Hypergraph Learning for Tag-based
40. Privacy
Protection Smartcard Authentication
41. Robust
Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks
42. Selective
Authentication Based Geographic Opportunistic Routing in wsn
43. Semantic-Aware
Searching Over Encrypted Data for Cloud Computing
44. Traffic
and Energy Aware Routing for Heterogeneous Wireless Sensor Networks
45. Trustworthy
Delegation toward Securing Mobile Healthcare Cyber Physical Systems
46. A
Fog-centric Secure Cloud Storage Scheme
47. Coverless
Information Hiding Method Based on Web Text
48. Detection
of fake online reviews using semi-supervised and supervised learning
49. Dynamic
Resource Allocation for MapReduce with Partitioning Skew
50. Hidden
Ciphertext Policy Attribute-Based Encryption with Fast Decryption for PHRS
51. K-nearest
Neighbors Search by Random Projection Forests
52. Normalization
of Duplicate Records from Multiple Sources
53. Provable
Data Possession with Outsourced Data Transfer (1)
54. Searchable
Symmetric Encryption with Forward Search Privacy
55. SEPTIC
Detecting Injection Attacks and Vulnerabilities Inside the DBMS
Projects
56. source
code - A Probabilistic Source Location Privacy Protection Scheme in Wireless
Sensor Networks
57. source
code - A Secure Searchable Encryption Framework for Privacy-Critical Cloud
Storage Services
58. source
code - Adaptive Self-paced Deep Clustering with Data Augmentation
59. source
code - Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc
Networks
60. source
code - Selective Authentication based Geographic Opportunistic Routing in WSN
for IoT against DoS Attacks
1. an attribute based controlled collaborative access control scheme for public cloud storage
2. enabling identity based integrity auding and data sharing with sensitive information hiding for secure cloud storage
3. verifiable and multi keyword searchable attribute based encryption scheme for cloud storage
4 privacy preserving searchable encryption with fine grained access control
5. recovable identity based broadcast proxy re-encryption for data sharing in clouds
6. a lighweight securing auditing scheme for shared data in cloud storage
7. p-mod: secure priviliage based multilevel organisation data sharing in cloud computing
8. privacy preserving attribute based keyword search in shared multi owner setting
9. enabling verifiable and dynamic ranked search over outsourced data
10. towords achieving keyword search over dynamic encrypted cloud data with symmertic key based verification
11. a novel load image profile based electricity load clustering methodology
12. LBOA: location based secure outsourced aggregation in IOT
13. active online learning for social media analysis to support crisis management
14. FooDNet: Toward an Optimized Food Delivery Network based on Spatial Crowdsourcing
thank you for your comment
pls call me on 8125424511