S.
N
O
1
Project Title
SAE: Toward Efficient Cloud Data Analysis Service for LargeScale Social Networks
On Summarization and Timeline Generation for Evolutionary
Tweet Streams
Tech
JAVA
JAVA
Year
2015
2015
2015
A Secure and Dynamic Multi-keyword Ranked Search Scheme
over Encrypted Cloud Data
JAVA
EnDAS Efficient Encrypted Data Search as a Mobile Cloud
Service
JAVA
FRAppE: Detecting Malicious Facebook Applications
JAVA
2015
2015
Steganography Using Reversible Texture Synthesis
Smar tCrawler : A Two-stage Crawler for Efficiently Har vesting
Deep-Web Interfaces
Generating Searchable Public Key Ciphertexts with Hidden
Structures for Fast Keyword Search
Passive IP Traceback: Disclosing the Locations
of IP Spoofers From Path Backscatter
Route-Saver: Leveraging Route APIs for Accurate and Efficient
Query Processing at Location-Based Services
Public Integrity Auditing for Shared Dynamic Cloud Data with
Group User Revocation
Privacy Policy Inference of User-Uploaded Images on Content
Sharing Sites
A Distributed Three-hop Routing Protocol to Increase the Capacity
of Hybrid Wireless Networks
An Attribute-assisted Re ranking Model for Web Image Search
Authenticated Key Exchange Protocols for Parallel Network File
Systems
Cost-Aware SEcure Routing (CASER) Protocol Design for
Wireless Sensor Networks
Dynamic Routing for Data Integrity and Delay Differentiated
Services in Wireless Sensor Networks
EMR: A Scalable Graph-based Ranking Model for Content-based
Image Retrieval
A Lightweight Secure Scheme for Detecting Provenance Forgery
and Packet Drop Attacks in Wireless Sensor Networks
My Privacy My Decision: Control of Photo Sharing on Online
Social Networks
Software Puzzle: A Countermeasure to Resource-Inflated Denialof-Service Attacks
Tweet Segmentation and Its Application to Named Entity
Recognition
Opportunistic Routing Algorithm for Relay Node Selection in
Wireless Sensor Networks
JAVA
2015
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
2015
2015
2015
2015
2015
2015
2015
2015
2015
2015
2015
2015
2015
2015
2015
2015
2015
24
Privacy-Preserving and Truthful Detection of Packet Dropping
Attacks in Wireless Ad Hoc Networks
JAVA
25
Effective Key Management in Dynamic Wireless Sensor Networks
JAVA
27
Smartphone-Based Wound Assessment System for Patients With
Diabetes
Secure Auditing and Deduplicating Data in Cloud
28
Discovery of Ranking Fraud for Mobile Apps
JAVA
29
Secure Spatial Top-k Query Processing via Un trusted LocationBased Service Providers
JAVA
30
Enabling Cloud Storage Auditing With Key-Exposure Resistance
JAVA
26
31
Data Lineage in Malicious Environments
JAVA
JAVA
JAVA
32
Key-Aggregate Searchable Encryption (KASE) for
Group Data Sharing via Cloud Storage
JAVA
33
Provable Multicopy Dynamic Data Possession in
Cloud Computing Systems
JAVA
2015
2015
2015
2015
2015
2015
2015
2015
2015
2015
34
35
Anonymizing Collections of Tree-Structured Data
Maximizing P2P File Access Availability in Mobile Ad
Hoc Networks though Replication for Efficient File
Sharing
JAVA
2015
2015
JAVA
2015
36
Active Learning for Ranking through Expected Loss
Optimization
37
Privacy Preserving Ranked Multi-Keyword Search for
Multiple Data Owners in Cloud Computing
JAVA
2015
38
Tracking Temporal Community Strength in Dynamic Networks
JAVA
JAVA
2015
2015
39
Co-Extracting Opinion Targets and Opinion Words
from Online Reviews Based on the Word Alignment
Model
JAVA
2015
40
A Distortion-Resistant Routing Framework for Video
Traffic in Wireless Multihop Networks
JAVA
2015
41
A Scalable and Reliable Matching Service for ContentBased Publish/Subscribe Systems
JAVA
2015
42
Continuous and Transparent User Identity Verification
for Secure Internet Services
JAVA
2015
43
User Defined Privacy Grid System for Continuous
Location Based Services
44
On the security of data access control for
Multiauthority cloud storage system
45
Friend book A Semantic-based Friend
Recommendation System for Social Networks
Audit-Free Cloud Storage via Deniable Attributebased Encryption
JAVA
2015
JAVA
2015
46
JAVA
JAVA
2015
2015
47
k-Nearest Neighbor Classification over Semantically
Secure Encrypted Relational Data
JAVA
2015
48
TEES: An Efficient Search Scheme over Encrypted
Data on Mobile Cloud
JAVA
2015
49
Location-Aware and Personalized Collaborative
Filtering for Web Service Recommendation
JAVA
2015
50
51
A Profit Maximization Scheme with Guaranteed
Quality of Service in Cloud Computing
Progressive Duplicate Detection
JAVA
JAVA
2015
2015
52
Secure Distributed Deduplication Systems with
Improved Reliability
JAVA
2015
53
Context Based Access Control Systems for Mobile
Devices
JAVA
54
Combining Efficiency, Fidelity, and Flexibility in
Resource Information Services
JAVA
55
Context-Based Diversification for Keyword Queries
Over XML Data
JAVA
56
Towards Effective Bug Triage with Software Data
Reduction Techniques
57
Key recovery Attacks on KIDS, a Keyed Anomaly
Detection System
2015
2015
2015
JAVA
2015
58
59
Scalable Constrained Spectral Clustering
Best Keyword Cover Search
JAVA
JAVA
JAVA
2015
2015
2015
60
Understanding the Performance and Potential of
Cloud Computing for Scientific Applications
61
Adaptive Network Coded Clouds: High Speed
Downloads and Cost-Effective Version Control
62
Energy-Efficient Fault-Tolerant Data Storage and
Processing in Mobile Cloud
JAVA
2015
JAVA
2015
63
A Computational Dynamic Trust Model for User Authorization
JAVA
JAVA
64
An Authenticated Trust and Reputation Calculation and
Management System for Cloud and Sensor
JAVA
65
A secure data self destructing scheme in cloud computing
JAVA
66
A Time Efficient Approach for Detecting Errors in Big
Sensor Data on Cloud
JAVA
67
Group Key Agreement with Local Connectivity
JAVA
68
69
Sub graph Matching with Set Similarity in a Large Graph
Database
Cost-Effective Authentic and Anonymous Data Sharing
with Forward Security
JAVA
JAVA
2015
2015
2015
2015
2015
2015
2015
2015
70
Control Cloud Data Access Privilege and Anonymity
With Fully Anonymous Attribute-Based Encryption
JAVA
2015
71
Circuit Ciphertext-policy Attribute-based Hybrid
Encryption with Verifiable Delegation in Cloud
Computing
JAVA
2015
72
DDSGA: A Data-Driven Semi-Global Alignment
Approach for Detecting Masquerade Attacks
JAVA
73
YouTube Video Promotion by Cross-Network Association
JAVA
74
Learning to Rank Image Tags With Limited Training Examples
JAVA
75
CloudArmor: Supporting Reputation-based Trust Management for
Cloud Services
JAVA
76
Stealthy Denial of Service Strategy in Cloud Computing
JAVA
77
A Proximity-Aware Interest-Clustered P2P File Sharing System
JAVA
78
79
Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier
Detection
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud
Storage
JAVA
JAVA
2015
2015
2015
2015
2015
2015
2015
80
Identity-Based Encryption with Outsourced Revocation in Cloud
Computing
JAVA
81
Malware Propagation in Large-Scale Networks
JAVA
82
Innovative Schemes for Resource Allocation in the Cloud for Media
Streaming
JAVA
83
Task Trail An Effective Segmentation of User Search Behavior
JAVA
84
Energy-aware Load Balancing and Application Scaling for the Cloud
JAVA
85
86
87
88
89
Scalable architecture for multi user encrypted SQL operations on cloud
database services
A Secure Anti-Collusion Data Sharing Scheme for Dynamic
Groups in the Cloud
Efficient Notification of Meeting Points for Moving Groups
via Independent Safe Regions
T-Broker: A Trust-Aware Service Brokering Scheme for
Multiple Cloud Collaborative Services
Cooperative Load Balancing and Dynamic Channel
Allocation for Cluster Based MANETs
JAVA
JAVA
JAVA
JAVA
JAVA
90
Real-Time Detection of Traffic From Twitter Stream Analysis
JAVA
91
Cloud-Based Multimedia Content Protection System
JAVA
92
Secure Data Aggregation Technique for WSN in the Presence of
Collusion Attacks
Contributory Broadcast Encryption with Efficient Encryption and Short
Ciphertexts
JAVA
JAVA
2015
2015
2015
2015
2015
2015
2015
2015
2015
2015
2015
2015
2015
2015