Project List | Project List | download |
Cloud Computing | CLASS: Cloud Log Assuring Soundness and Secrecy Sc | download |
Cloud Computing | Cloud Centric Authentication for Wearable Healthca | download |
Cloud Computing | Towards Shared Ownership in the Cloud | download |
Cloud Computing | Security Analysis of Smartphone and Cloud Computin | download |
Cloud Computing | Integrated Authentication and Key Agreement Framew | download |
Cloud Computing | Dynamic VM Scaling: Provisioning and Pricing throu | download |
Cloud Computing | An Approach to Balance Maintenance Costs and Elect | download |
Cloud Computing | Secure and Sustainable Load Balancing of Edge Data | download |
Cloud Computing | Semantic-based Compound Keyword Search over Encryp | download |
Cloud Computing | A Practical Public Key Encryption Scheme Based on | download |
Cloud Computing | A Power-of-Two Choices Based Algorithm for Fog Com | download |
Cloud Computing | virtFlow: Guest Independent Execution Flow Analysi | download |
Cloud Computing | Adaptive Resource Management for Analyzing Video S | download |
Cloud Computing | Enhancing Performance and Energy Efficiency for Hy | download |
Cloud Computing | Minimal Cost Server Configuration for Meeting Time | download |
Cloud Computing | Aggregation-Based Colocation Datacenter Energy Man | download |
Cloud Computing | Provably secure and lightweight identity-based aut | download |
Cloud Computing | Energy Efficient Scheduling of Servers with Multi- | download |
Cloud Computing | SEPDP: Secure and Efficient Privacy Preserving Pro | download |
Cloud Computing | HealthDep: An Efficient and Secure Deduplication S | download |
Cloud Computing | An Efficient and Fair Multi-Resource Allocation Me | download |
Cloud Computing | VMGuard: A VMI-based Security Architecture for Int | download |
Cloud Computing | Price-based Resource Allocation for Edge Computing | download |
Cloud Computing | Efficient Resource Allocation for On-Demand Mobile | download |
Cloud Computing | An Efficient and Secured Framework for Mobile Clou | download |
Cloud Computing | Efficient Traceable Authorization Search System fo | download |
Cloud Computing | A Robust Formulation for Efficient Application Off | download |
Cloud Computing | A Planning Approach for Reassigning Virtual Machin | download |
Cloud Computing | Efficient Retrieval Over Documents Encrypted by At | download |
Cloud Computing | A Key-Policy Attribute-Based Temporary Keyword Sea | download |
Cloud Computing | Combining Data Owner-side and Cloud-side Access Co | download |
Cloud Computing | A Lightweight Secure Data Sharing Scheme for Mobil | download |
Cloud Computing | Inference Attack-Resistant E-Healthcare Cloud Syst | download |
Cloud Computing | Identity-Based Private Matching over Outsourced En | download |
Cloud Computing | Fine-Grained Two-Factor Protection Mechanism for D | download |
Cloud Computing | Efficient Traceable Authorization Search System fo | download |
Cloud Computing | Efficient Retrieval over Documents Encrypted by At | download |
Cloud Computing | Efficient Fine-Grained Data Sharing Mechanism for | download |
Cloud Computing | Efficient and Expressive Keyword Search Over Encry | download |
Cloud Computing | DROPS: Division and Replication of Data in Cloud f | download |
Cloud Computing | CryptCloud+: Secure and Expressive Data Access Con | download |
Cloud Computing | Unified Fine-grained Access Control for Personal H | download |
Cloud Computing | Chaotic Searchable Encryption for Mobile Cloud Sto | download |
Cloud Computing | Catch You if You Misbehave: Ranked Keyword Search | download |
Cloud Computing | Audit-Free Cloud Storage via Deniable Attribute-ba | download |
Cloud Computing | An Efficient Ranked Multi-Keyword Search for Multi | download |
Cloud Computing | An Efficient and Privacy-Preserving Biometric Iden | download |
Cloud Computing | Achieving Secure and Efficient Dynamic Searchable | download |
Cloud Computing | A Three-Layer Privacy Preserving Cloud Storage Sch | download |
Cloud Computing | A New Lightweight Symmetric Searchable Encryption | download |
Cloud Computing | A Lightweight Secure Data Sharing Scheme for Mobil | download |
Cloud Computing | Combining Data Owner-side and Cloud-side Access Co | download |
Cloud Computing | Lightweight and Privacy-Preserving Delegatable Pro | download |
Cloud Computing | Privacy Preservation for Outsourced Medical Data W | download |
Cloud Computing | Privacy Protection and Intrusion Avoidance for Clo | download |
Cloud Computing | Provably Secure Fine-Grained Data Access Control o | download |
Cloud Computing | Publicly Verifiable Boolean Query Over Outsourced | download |
Cloud Computing | Secure and Efficient Attribute-Based Access Contro | download |
Cloud Computing | Secure Data Group Sharing and Dissemination with A | download |
Cloud Computing | Secure Fine-Grained Access Control and Data Sharin | download |
Cloud Computing | SeSPHR: A Methodology for Secure Sharing of Person | download |
Cloud Computing | Towards Privacy-preserving Content-based Image Ret | download |
Information Forensics Network Security & Informa | 3-HBP: A Three-Level Hidden Bayesian Link Predicti | download |
Information Forensics Network Security & Informa | Supervised and Unsupervised Aspect Category Detect | download |
Information Forensics Network Security & Informa | Towards Shared Ownership in the Cloud | download |
Information Forensics Network Security & Informa | Cyber threats under the Bed | download |
Information Forensics Network Security & Informa | A Practical Public Key Encryption Scheme Based on | download |
Information Forensics Network Security & Informa | A Network Coding and DES Based Dynamic Encryption | download |
Information Forensics Network Security & Informa | Exploring Feature Coupling and Model Coupling for | download |
Information and Security Systems | Fraud Find: Financial Fraud Detection by Analyzing | download |
Information and Security Systems | Fraud Vis: Understanding Unsupervised Fraud Detect | download |
Information and Security Systems | Machine Learning Applied to Rotating Check Fraud D | download |
Information and Security Systems | Random Forest for Credit Card Fraud Detection | download |
SOCIAL NETWORK | 3-HBP: A Three-Level Hidden Bayesian Link Predicti | download |
SOCIAL NETWORK | Analyzing and Detecting Money-Laundering Accounts | download |
SOCIAL NETWORK | Detection of suicide-related posts in Twitter data | download |
SOCIAL NETWORK | Risk Assessment in Social Networks based on User A | download |
SOCIAL NETWORK | Segregating Spammers and Unsolicited Bloggers from | download |
SOCIAL NETWORK | Semi-Supervised Spam Detection in Twitter Stream | download |
DATA MINING | Emotion Recognition on Twitter: Comparative Study | download |
DATA MINING | Discovering Canonical Correlations between Topical | download |
DATA MINING | Reverse k Nearest Neighbor Search over Trajectorie | download |
DATA MINING | Range-based Nearest Neighbor Queries with Complex- | download |
DATA MINING | Complementary Aspect-based Opinion Mining | download |
DATA MINING | Profit Maximization for Viral Marketing in Online | download |
DATA MINING | A Two-Phase Algorithm for Differentially Private F | download |
DATA MINING | Online Product Quantization | download |
DATA MINING | An Efficient Method for High Quality and Cohesive | download |
DATA MINING | Fast Cosine Similarity Search in Binary Space with | download |
DATA MINING | Automated Phrase Mining from Massive Text Corpora | download |
DATA MINING | Collective List-Only Entity Linking: A Graph-Based | download |
DATA MINING | Principal Component Analysis Based Filtering for S | download |
DATA MINING | Complementary Aspect-based Opinion Mining | download |
DATA MINING | A Weighted Frequent Itemset Mining Algorithm for I | download |
DATA MINING | Fuzzy Bag-of-Words Model for Document Representati | download |
DATA MINING | Document Summarization for Answering Non-Factoid Q | download |
DATA MINING | Efficient Vertical Mining of High Average-Utility | download |
DATA MINING | Supervised Topic Modeling using Hierarchical Diric | download |
DATA MINING | Entity Linking: An Issue to Extract Corresponding | download |
DATA MINING | Frequent Itemsets Mining with Differential Privacy | download |
DATA MINING | Opinion Aspect Relations in Cognizing Customer Fee | download |
DATA MINING | Highlighter: automatic highlighting of electronic | download |
DATA MINING | Predicting Contextual Informativeness for Vocabula | download |
DATA MINING | Search Result Diversity Evaluation based on Intent | download |
DATA MINING | Selective Database Projections Based Approach for | download |
DATA MINING | A Correlation-based Feature Weighting Filter for N | download |
DATA MINING | Web Media and Stock Markets : A Survey and Future | download |
DATA MINING | A Two-stage Biomedical Event Trigger Detection Met | download |
DATA MINING | Bayesian Nonparametric Learning for Hierarchical a | download |
DATA MINING | Comments Mining With TF-IDF: The Inherent Bias and | download |
DATA MINING | Relevant Feedback Based Accurate and Intelligent R | download |
DATA MINING | Characterizing and Predicting Early Reviewers for | download |
DATA MINING | CoDetect: Financial Fraud Detection With Anomaly F | download |
DATA MINING | When to Make a Topic Popular Again? A Temporal Mod | download |
DATA MINING | Health Monitoring on Social Media over Time | download |
DATA MINING | l-Injection: Toward Effective Collaborative Filter | download |
DATA MINING | On Generalizing Collective Spatial Keyword Queries | download |
DATA MINING | Privacy Characterization and Quantification in Dat | download |
DATA MINING | Road Traffic Speed Prediction: A Probabilistic Mod | download |
DATA MINING | Scalable Content-Aware Collaborative Filtering for | download |
DATA MINING | SDE: A Novel Clustering Framework Based on Sparsit | download |
Wireless Sensor Networks | Traffic and Energy Aware Routing for Heterogeneous | download |
Mobile Computing | Distributed Faulty Node Detection in Delay Toleran | download |
Mobile Computing | Selfish Decentralized Computation Offloading for M | download |
Mobile Computing | Service Provisioning in Mobile Environments throug | download |
Mobile Computing | Traffic-Aware Efficient Mapping of Wireless Body A | download |
Mobile Computing | Efficient Privacy-Aware Authentication Scheme for | download |
Mobile Computing | Identifying On-site Users for Social Events: Mobil | download |
Mobile Computing | Protecting Location Privacy for Task Allocation in | download |
MACHINE LEARNING | A Comprehensive Study on Social Network Mental Dis | download |
MACHINE LEARNING | A Credibility Analysis System for Assessing Inform | download |
MACHINE LEARNING | A Novel Machine Learning Algorithm for Spammer Ide | download |
MACHINE LEARNING | Credit Card Fraud Detection Using AdaBoost and Maj | download |
MACHINE LEARNING | Hate Speech on Twitter: A Pragmatic Approach to Co | download |
MACHINE LEARNING | Performance Comparison of Support Vector Machine, | download |
MACHINE LEARNING | Supervised and Unsupervised Aspect Category Detect | download |
MACHINE LEARNING | Using Data Mining to Predict Hospital Admissions F | download |
Software Engineering | Reviving Sequential Program Birthmarking for Multi | download |
Software Engineering | EVA: Visual Analytics to Identify Fraudulent Event | download |
Software Engineering | A Developer Centered Bug Prediction Model | download |
Image Processing and Multimedia | Query-free Clothing Retrieval via Implicit Relevan | download |
Image Processing and Multimedia | Automatic Annotation of Text with Pictures | download |
Image Processing and Multimedia | Joint Latent Dirichlet Allocation for Social Tags | download |
Image Processing and Multimedia | Automatic Generation of Social Event Storyboard Fr | download |
Image Processing and Multimedia | Joint Hypergraph Learning for Tag-based Image Retr | download |
Image Processing and Multimedia | A Unified Framework for Tracking Based Text Detect | download |
IEEE ACCESS & CYBER SECURITY | CoDetect: Financial Fraud Detection with Anomaly F | download |
IEEE ACCESS & CYBER SECURITY | Credit card fraud detection using AdaBoost and maj | download |
IEEE ACCESS & CYBER SECURITY | A Network Coding and DES Based Dynamic Encryption | download |
IEEE ACCESS & CYBER SECURITY | A Data Analytics Approach to the Cybercrime Underg | download |
INTERNET OF THINGS (IOT) | Cloud-based Fine-grained Health Information Access | download |
INTERNET OF THINGS (IOT) | Light-Weight Security and Data Provenance for Mult | download |
INTERNET OF THINGS (IOT) | MDSClone: Multidimensional Scaling Aided Clone Det | download |
Android Projects | Cloud Centric Authentication for Wearable Healthca | download |
Android Projects | Significant Permission Identification for Machine | download |
Android Projects | MoRe-care: Mobile-assisted remote healthcare servi | download |
Android Projects | Droid Fusion: A Novel Multilevel Classifier Fusion | download |
Android Projects | A Tale of Two Fashions: An Empirical Study on the | download |
Android Projects | Characterizing Privacy Risks of Mobile Apps with S | download |
Android Projects | Ad Capsule: Practical Confinement of Advertisement | download |
Android Projects | Android User Privacy Preserving through Crowdsourc | download |
Android Projects | Uncovering the Face of Android Ransomware: Charact | download |
Android Projects | MalPat: Mining Patterns of Malicious and Benign An | download |
Android Projects | Understanding In-app Ads and Detecting Hidden Atta | download |
Android Projects | Text based Graphical Password System to Obscure Sh | download |
Android Projects | Shift Route: Achieving Location Privacy for Map Se | download |
Android Projects | Counter Measuring Conceivable Security Threats on | download |
Android Projects | Construction and Mitigation of User-Behavior-Based | download |
Android Projects | A Secure Transaction Scheme With Certificateless C | download |
Android Projects | Code Tracker: A Lightweight Approach to Track and | download |
Networking and Service Computing, Dependable and | Deep Learning of Constrained Autoencoders for Enha | download |
Networking and Service Computing, Dependable and | Efficient Fine-Grained Data Sharing Mechanism for | download |
Networking and Service Computing, Dependable and | Analyzing and Detecting Money-Laundering Accounts | download |
Networking and Service Computing, Dependable and | Magic Train: Design of Measurement Methods Against | download |
Networking and Service Computing, Dependable and | Energy Efficient Link-Delay Aware Routing in Wirel | download |
Networking and Service Computing, Dependable and | Quality and Profit Assured Trusted Cloud Federatio | download |
Networking and Service Computing, Dependable and | Optimizing Autonomic Resources for the Management | download |
Networking and Service Computing, Dependable and | Scheduling Inter-Datacenter Video Flows for Cost E | download |
Networking and Service Computing, Dependable and | Lightweight Fine-Grained Search over Encrypted Dat | download |
Networking and Service Computing, Dependable and | GeTrust: A guarantee-based trust model in Chord-ba | download |
Networking and Service Computing, Dependable and | Migration Modeling and Learning Algorithms for Con | download |
Networking and Service Computing, Dependable and | Multi-user Multi-task Computation Offloading in Gr | download |
Networking and Service Computing, Dependable and | Achieving Fairness-aware Two-level Scheduling for | download |
Networking and Service Computing, Dependable and | Shared Predictive Cross-Modal Deep Quantization | download |
Networking and Service Computing, Dependable and | PROVEST: Provenance-based Trust Model for Delay To | download |
Networking and Service Computing, Dependable and | Traffic and Energy Aware Routing for Heterogeneous | download |
Networking and Service Computing, Dependable and | A Hybrid Approach for Detecting Automated Spammers | download |
Networking and Service Computing, Dependable and | A Provably-Secure Cross-Domain Handshake Scheme wi | download |
Networking and Service Computing, Dependable and | Anonymization of Sensitive Quasi-Identifiers for l | download |
Networking and Service Computing, Dependable and | Collective Data-Sanitization for Preventing Sensit | download |
Networking and Service Computing, Dependable and | Exploiting Social Network to Enhance Human-to-Huma | download |
Networking and Service Computing, Dependable and | Trust-based Collaborative Privacy Management in On | download |
Networking and Service Computing, Dependable and | Lightweight Fine-Grained Search over Encrypted Dat | download |
MACHINE LEARNING/PYTHON | A user-centric machine learning framework for cybe | download |
MACHINE LEARNING/PYTHON | Review of the Use of AI Techniques in Serious Game | download |
MACHINE LEARNING/PYTHON | Semi-supervised machine learning approach for ddos | download |
MACHINE LEARNING/PYTHON | Weakly-supervised Deep Embedding for Product Revie | download |
MACHINE LEARNING/PYTHON | How Data-Driven Entrepreneur Analyzes Imperfect In | download |
MACHINE LEARNING/PYTHON | Multi-Traffic Scene Perception Based on Supervised | download |
MACHINE LEARNING/PYTHON | A Bi-objective Hyper-Heuristic Support Vector Mach | download |
MACHINE LEARNING/PYTHON | Modeling and Predicting Cyber Hacking Breaches | download |
MACHINE LEARNING/PYTHON | Price-based Resource Allocation for Edge Computing | download |
MACHINE LEARNING/PYTHON | String Similarity Search: A Hash-Based Approach | download |
MACHINE LEARNING/PYTHON | A Data Mining based Model for Detection of Fraudul | download |
MACHINE LEARNING/PYTHON | Data-Driven Design of Fog Computing aided Process | download |
MACHINE LEARNING/PYTHON | Designing Cyber Insurance Policies: The Role of Pr | download |
MACHINE LEARNING/PYTHON | Web application for community question answering | download |
MACHINE LEARNING/PYTHON | Text classification for newsgroup using machine le | download |
MACHINE LEARNING/PYTHON | Data Analytics Approach to the Cybercrime Undergro | download |
MACHINE LEARNING/PYTHON | Image based appraisal of real estate properties | download |
MACHINE LEARNING/PYTHON | Cloud-based multimedia content protection system | download |
MACHINE LEARNING/PYTHON | Assessing the effectiveness of riparian restoratio | download |
MACHINE LEARNING/PYTHON | Data security approach on cyber crime with web vul | download |
MACHINE LEARNING/PYTHON | Exploratory Visual Sequence Mining Based on Patter | download |
MACHINE LEARNING/PYTHON | Toward better statistical validation of machine le | download |
MACHINE LEARNING/PYTHON | Rainfall rate prediction based on artificial neura | download |
MACHINE LEARNING/PYTHON | Phishing web sites features classification based o | download |
MACHINE LEARNING/PYTHON | Applied machine learning predictive analytics to s | download |
MACHINE LEARNING/PYTHON | Machine learning and deep learning methods for cyb | download |
MACHINE LEARNING/PYTHON | Self-taught low-rank coding for visual learning | download |
MACHINE LEARNING/PYTHON | Credit card fraud detection using AdaBoost and maj | download |
MACHINE LEARNING/PYTHON | Blockchain: A game changer for securing IoT data | download |
MACHINE LEARNING/PYTHON | Using data mining to predict hospital admissions f | download |