FZID1601 |
CATCH YOU IF YOU MISBEHAVE: RANKED KEYWORD SEARCH RESULTS VERIFICATION IN CLOUD COMPUTING |
CLOUD COMPUTING |
DOTNET |
2016-17 |
|
|
FZID1602 |
CIRCUIT CIPHERTEXT-POLICY ATTRIBUTE-BASED HYBRID ENCRYPTION WITH VERIFIABLE DELEGATION IN CLOUD COMPUTING |
CLOUD COMPUTING |
DOTNET |
2016-17 |
|
|
FZID1603 |
CONJUNCTIVE KEYWORD SEARCH WITH DESIGNATED TESTER AND TIMING ENABLED PROXY RE-ENCRYPTION FUNCTION FOR E-HEALTH CLOUDS |
CLOUD COMPUTING |
DOTNET |
2016-17 |
|
|
FZID1604 |
DYNAMIC AND PUBLIC AUDITING WITH FAIR ARBITRATION FOR CLOUD DATA |
CLOUD COMPUTING |
DOTNET |
2016-17 |
|
|
FZID1605 |
DYNAMIC-HASH-TABLE BASED PUBLIC AUDITING FOR SECURE CLOUD STORAGE |
CLOUD COMPUTING |
DOTNET |
2016-17 |
|
|
FZID1606 |
ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES |
CLOUD COMPUTING |
DOTNET |
2016-17 |
|
|
FZID1607 |
FINE-GRAINED TWO-FACTOR ACCESS CONTROL FOR WEB-BASED CLOUD COMPUTING SERVICES |
CLOUD COMPUTING |
DOTNET |
2016-17 |
|
|
FZID1608 |
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD |
CLOUD COMPUTING |
DOTNET |
2016-17 |
|
|
FZID1609 |
KSF-OABE: OUTSOURCED ATTRIBUTE-BASED ENCRYPTION WITH KEYWORD SEARCH FUNCTION FOR CLOUD STORAGE |
CLOUD COMPUTING |
DOTNET |
2016-17 |
|
|
FZID1610 |
LEVERAGING DATA DEDUPLICATION TO IMPROVE THE PERFORMANCE OF PRIMARY STORAGE SYSTEMS IN THE CLOUD |
CLOUD COMPUTING |
DOTNET |
2016-17 |
|
|
FZID1611 |
MMB CLOUD-TREE: AUTHENTICATED INDEX FOR VERIFIABLE CLOUD SERVICE SELECTION |
CLOUD COMPUTING |
DOTNET |
2016-17 |
|
|
FZID1612 |
TRUST-BUT-VERIFY: VERIFYING RESULT CORRECTNESS OF OUTSOURCED FREQUENT ITEM SET MINING IN DATA-MINING-AS-A-SERVICE PARADIGM |
CLOUD COMPUTING |
DOTNET |
2016-17 |
|
|
FZID1613 |
A MIXED GENERATIVE-DISCRIMINATIVE BASED HASHING METHOD |
DATA MINING |
DOTNET |
2016-17 |
|
|
FZID1614 |
PERSONALIZED TRAVEL SEQUENCE RECOMMENDATION ON MULTI-SOURCE BIG SOCIAL MEDIA |
DATA MINING |
DOTNET |
2016-17 |
|
|
FZID1615 |
PRACTICAL APPROXIMATE K NEAREST NEIGHBOR QUERIES WITH LOCATION AND QUERY PRIVACY |
DATA MINING |
DOTNET |
2016-17 |
|
|
FZID1616 |
TEXT MINING THE CONTRIBUTORS TO RAIL ACCIDENTS |
DATA MINING |
DOTNET |
2016-17 |
|
|
FZID1617 |
USER-SERVICE RATING PREDICTION BY EXPLORING SOCIAL USERS’ RATING BEHAVIORS |
DATA MINING |
DOTNET |
2016-17 |
|
|
FZID1618 |
CONTENT-ADAPTIVE STEGANOGRAPHY BY MINIMIZING STATISTICAL DETECTABILITY |
IMAGE PROCESSING |
DOTNET |
2016-17 |
|
|
FZID1619 |
SECURE REVERSIBLE IMAGE DATA HIDING OVER ENCRYPTED DOMAIN VIA KEY MODULATION |
IMAGE PROCESSING |
DOTNET |
2016-17 |
|
|
FZID1620 |
SECURING SIFT: PRIVACY-PRESERVING OUTSOURCING COMPUTATION OF FEATURE EXTRACTIONS OVER ENCRYPTED IMAGE DATA |
IMAGE PROCESSING |
DOTNET |
2016-17 |
|
|
FZID1621 |
A JOINT TIME SYNCHRONIZATION AND LOCALIZATION DESIGN FOR MOBILE UNDERWATER SENSOR NETWORKS |
MOBILE COMPUTING |
DOTNET |
2016-17 |
|
|
FZID1622 |
DAGCM: A CONCURRENT DATA UPLOADING FRAMEWORK FOR MOBILE DATA GATHERING IN WIRELESS SENSOR NETWORKS |
MOBILE COMPUTING |
DOTNET |
2016-17 |
|
|
FZID1623 |
SERVICE USAGE CLASSIFICATION WITH ENCRYPTED INTERNET TRAFFIC IN MOBILE MESSAGING APPS |
MOBILE COMPUTING |
DOTNET |
2016-17 |
|
|
FZID1624 |
TRAFFIC DECORRELATION TECHNIQUES FOR COUNTERING A GLOBAL EAVESDROPPER IN WSNS |
MOBILE COMPUTING |
DOTNET |
2016-17 |
|
|
FZID1625 |
WORAL: A WITNESS ORIENTED SECURE LOCATION PROVENANCE FRAMEWORK FOR MOBILE DEVICES |
MOBILE COMPUTING |
DOTNET |
2016-17 |
|
|
FZID1626 |
EFFICIENT CERTIFICATE LESS ACCESS CONTROL FOR WIRELESS BODY AREA NETWORKS |
NETWORKING |
DOTNET |
2016-17 |
|
|
FZID1627 |
FINDING NONEQUIVALENT CLASSIFIERS IN BOOLEAN SPACE TO REDUCE TCAM USAGE |
NETWORKING |
DOTNET |
2016-17 |
|
|
FZID1628 |
GEOGRAPHIC AND OPPORTUNISTIC ROUTING FOR UNDERWATER SENSOR NETWORKS |
NETWORKING |
DOTNET |
2016-17 |
|
|
FZID1629 |
OPTIMIZING COST FOR ONLINE SOCIAL NETWORKS ON GEO-DISTRIBUTED CLOUDS |
NETWORKING |
DOTNET |
2016-17 |
|
|
FZID1630 |
SECURE AND EFFICIENT DATA COMMUNICATION PROTOCOL FOR WIRELESS BODY AREA NETWORKS |
NETWORKING |
DOTNET |
2016-17 |
|
|
FZID1631 |
AUTHENTICATED KEY EXCHANGE PROTOCOLS FOR PARALLEL NETWORK FILE SYSTEMS |
PARALLEL & DISTRIBUTED SYSTEMS |
DOTNET |
2016-17 |
|
|
FZID1632 |
REAL-TIME SEMANTIC SEARCH USING APPROXIMATE METHODOLOGY FOR LARGE-SCALE STORAGE SYSTEMS |
PARALLEL & DISTRIBUTED SYSTEMS |
DOTNET |
2016-17 |
|
|
FZID1633 |
DETECTING AND REMOVING WEB APPLICATION VULNERABILITIES WITH STATIC ANALYSIS AND DATA MINING |
SECURE COMPUTING |
DOTNET |
2016-17 |
|
|
FZID1634 |
ID2S PASSWORD-AUTHENTICATED KEY EXCHANGE PROTOCOLS |
SECURE COMPUTING |
DOTNET |
2016-17 |
|
|