FZIJ1601 |
A MODIFIED HIERARCHICAL ATTRIBUTE-BASED ENCRYPTION ACCESS CONTROL METHOD FOR MOBILE CLOUD COMPUTING |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
FZIJ1602 |
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUTING |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
FZIJ1603 |
AN EFFICIENT PRIVACY-PRESERVING RANKED KEYWORD SEARCH METHOD |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
FZIJ1604 |
CDA GENERATION AND INTEGRATION FOR HEALTH INFORMATION EXCHANGE BASED ON CLOUD COMPUTING SYSTEM |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
FZIJ1605 |
CONDITIONAL IDENTITY-BASED BROADCAST PROXY RE-ENCRYPTION AND ITS APPLICATION TO CLOUD EMAIL |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
FZIJ1606 |
CONJUNCTIVE KEYWORD SEARCH WITH DESIGNATED TESTER AND TIMING ENABLED PROXY RE-ENCRYPTION FUNCTION FOR E-HEALTH CLOUDS |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
FZIJ1607 |
DEYPOS: DEDUPLICATABLE DYNAMIC PROOF OF STORAGE FOR MULTI-USER ENVIRONMENTS |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
FZIJ1608 |
DIPLOCLOUD: EFFICIENT AND SCALABLE MANAGEMENT OF RDF DATA IN THE CLOUD |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
FZIJ1609 |
DUAL-SERVER PUBLIC-KEY ENCRYPTION WITH KEYWORD SEARCH FOR SECURE CLOUD STORAGE |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
FZIJ1610 |
DYNAMIC AND PUBLIC AUDITING WITH FAIR ARBITRATION FOR CLOUD DATA |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
FZIJ1611 |
ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
FZIJ1612 |
FINE-GRAINED TWO-FACTOR ACCESS CONTROL FOR WEB-BASED CLOUD COMPUTING SERVICES |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
FZIJ1613 |
FLEXIBLE AND FINE-GRAINED ATTRIBUTE-BASED DATA STORAGE IN CLOUD COMPUTING |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
FZIJ1614 |
GEOMETRIC RANGE SEARCH ON ENCRYPTED SPATIAL DATA |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
FZIJ1615 |
IDENTITY-BASED ENCRYPTION WITH CLOUD REVOCATION AUTHORITY AND ITS APPLICATIONS |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
FZIJ1616 |
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
FZIJ1617 |
PROTECTING YOUR RIGHT: VERIFIABLE ATTRIBUTE-BASED KEYWORD SEARCH WITH FINE-GRAINED OWNER-ENFORCED SEARCH AUTHORIZATION IN THE CLOUD |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
FZIJ1618 |
REAL-TIME SEMANTIC SEARCH USING APPROXIMATE METHODOLOGY FOR LARGE-SCALE STORAGE SYSTEMS |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
FZIJ1619 |
SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY OF LINEAR PROGRAMMING |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
FZIJ1620 |
A NOVEL RECOMMENDATION MODEL REGULARIZED WITH USER TRUST AND ITEM RATINGS |
CLOUD COMPUTING |
JAVA |
2016-17 |
|
|
FZIJ1621 |
AUTOMATICALLY MINING FACETS FOR QUERIES FROM THEIR SEARCH RESULTS |
DATA MINING |
JAVA |
2016-17 |
|
|
FZIJ1622 |
BOOSTER IN HIGH DIMENSIONAL DATA CLASSIFICATION |
DATA MINING |
JAVA |
2016-17 |
|
|
FZIJ1623 |
BUILDING AN INTRUSION DETECTION SYSTEM USING A FILTER-BASED FEATURE SELECTION ALGORITHM |
DATA MINING |
JAVA |
2016-17 |
|
|
FZIJ1624 |
CONNECTING SOCIAL MEDIA TO E-COMMERCE: COLD-START PRODUCT RECOMMENDATION USING MICROBLOGGING INFORMATION |
DATA MINING |
JAVA |
2016-17 |
|
|
FZIJ1625 |
CROSS-DOMAIN SENTIMENT CLASSIFICATION USING SENTIMENT SENSITIVE EMBEDDING’S |
DATA MINING |
JAVA |
2016-17 |
|
|
FZIJ1626 |
CROWDSOURCING FOR TOP-K QUERY PROCESSING OVER UNCERTAIN DATA |
DATA MINING |
JAVA |
2016-17 |
|
|
FZIJ1627 |
CYBERBULLYING DETECTION BASED ON SEMANTIC-ENHANCED MARGINALIZED DENOISING AUTO-ENCODER |
DATA MINING |
JAVA |
2016-17 |
|
|
FZIJ1628 |
DOMAIN-SENSITIVE RECOMMENDATION WITH USER-ITEM SUBGROUP ANALYSIS |
DATA MINING |
JAVA |
2016-17 |
|
|
FZIJ1629 |
EFFICIENT ALGORITHMS FOR MINING TOP-K HIGH UTILITY ITEMSETS |
DATA MINING |
JAVA |
2016-17 |
|
|
FZIJ1630 |
EFFICIENT CACHE-SUPPORTED PATH PLANNING ON ROADS |
DATA MINING |
JAVA |
2016-17 |
|
|
FZIJ1631 |
LOCATION AWARE KEYWORD QUERY SUGGESTION BASED ON DOCUMENT PROXIMITY |
DATA MINING |
JAVA |
2016-17 |
|
|
FZIJ1632 |
MINING USER-AWARE RARE SEQUENTIAL TOPIC PATTERNS IN DOCUMENT STREAMS |
DATA MINING |
JAVA |
2016-17 |
|
|
FZIJ1633 |
NEAREST KEYWORD SET SEARCH IN MULTI-DIMENSIONAL DATASETS |
DATA MINING |
JAVA |
2016-17 |
|
|
FZIJ1634 |
QUANTIFYING POLITICAL LEANING FROM TWEETS, RETWEETS, AND RETWEETERS |
DATA MINING |
JAVA |
2016-17 |
|
|
FZIJ1635 |
RATING PREDICTION BASED ON SOCIAL SENTIMENT FROM TEXTUAL REVIEWS |
DATA MINING |
JAVA |
2016-17 |
|
|
FZIJ1636 |
SENTIMENT EMBEDDING’S WITH APPLICATIONS TO SENTIMENT ANALYSIS |
DATA MINING |
JAVA |
2016-17 |
|
|
FZIJ1637 |
ANSWERING APPROXIMATE QUERIES OVER XML DATA |
FUZZY SYSTEMS |
JAVA |
2016-17 |
|
|
FZIJ1638 |
A LOCALITY SENSITIVE LOW-RANK MODEL FOR IMAGE TAG COMPLETION |
IMAGE PROCESSING |
JAVA |
2016-17 |
|
|
FZIJ1639 |
A SCALABLE APPROACH FOR CONTENT-BASED IMAGE RETRIEVAL IN PEER-TO-PEER NETWORKS |
IMAGE PROCESSING |
JAVA |
2016-17 |
|
|
FZIJ1640 |
LEARNING OF MULTIMODAL REPRESENTATIONS WITH RANDOM WALKS ON THE CLICK GRAPH |
IMAGE PROCESSING |
JAVA |
2016-17 |
|
|
FZIJ1641 |
ONLINE MULTI-MODAL DISTANCE METRIC LEARNING WITH APPLICATION TO IMAGE RETRIEVAL |
IMAGE PROCESSING |
JAVA |
2016-17 |
|
|
FZIJ1642 |
OPTIMIZED SEARCH-AND-COMPUTE CIRCUITS AND THEIR APPLICATION TO QUERY EVALUATION ON ENCRYPTED DATA |
INFORMATION FORENSICS AND SECURITY |
JAVA |
2016-17 |
|
|
FZIJ1643 |
PRIVACY-PRESERVING UTILITY VERIFICATION OF THE DATA PUBLISHED BY NON-INTERACTIVE DIFFERENTIALLY PRIVATE MECHANISMS |
INFORMATION FORENSICS AND SECURITY |
JAVA |
2016-17 |
|
|
FZIJ1644 |
PROFILING ONLINE SOCIAL BEHAVIORS FOR COMPROMISED ACCOUNT DETECTION |
INFORMATION FORENSICS AND SECURITY |
JAVA |
2016-17 |
|
|
FZIJ1645 |
HIDDEN CIPHERTEXT POLICY ATTRIBUTE-BASED ENCRYPTION UNDER STANDARD ASSUMPTIONS |
INFORMATION FORENSICS AND SECURITY |
JAVA |
2016-17 |
|
|
FZIJ1646 |
DETECTING NODE FAILURES IN MOBILE WIRELESS NETWORKS: A PROBABILISTIC APPROACH |
MOBILE COMPUTING |
JAVA |
2016-17 |
|
|
FZIJ1647 |
ENERGY AND MEMORY EFFICIENT CLONE DETECTION IN WIRELESS SENSOR NETWORKS |
MOBILE COMPUTING |
JAVA |
2016-17 |
|
|
FZIJ1648 |
EPLQ: EFFICIENT PRIVACY-PRESERVING LOCATION-BASED QUERY OVER OUTSOURCED ENCRYPTED DATA |
MOBILE COMPUTING |
JAVA |
2016-17 |
|
|
FZIJ1649 |
SECURE OVERLAY ROUTING USING KEY PRE-DISTRIBUTION: A LINEAR DISTANCE OPTIMIZATION APPROACH |
MOBILE COMPUTING |
JAVA |
2016-17 |
|
|
FZIJ1650 |
A STABLE APPROACH FOR ROUTING QUERIES IN UNSTRUCTURED P2P NETWORKS |
NETWORKING |
JAVA |
2016-17 |
|
|
FZIJ1651 |
IPATH: PATH INFERENCE IN WIRELESS SENSOR NETWORKS |
NETWORKING |
JAVA |
2016-17 |
|
|
FZIJ1652 |
OPPORTUNISTIC ROUTING WITH CONGESTION DIVERSITY IN WIRELESS AD HOC NETWORKS |
NETWORKING |
JAVA |
2016-17 |
|
|
FZIJ1653 |
A HOP-BY-HOP ROUTING MECHANISM FOR GREEN INTERNET |
PARALLEL & DISTRIBUTED SYSTEMS |
JAVA |
2016-17 |
|
|
FZIJ1654 |
CONTINUOUS ANSWERING HOLISTIC QUERIES OVER SENSOR NETWORKS |
PARALLEL & DISTRIBUTED SYSTEMS |
JAVA |
2016-17 |
|
|
FZIJ1655 |
DICTIONARY BASED SECURE PROVENANCE COMPRESSION FOR WIRELESS SENSOR NETWORKS |
PARALLEL & DISTRIBUTED SYSTEMS |
JAVA |
2016-17 |
|
|
FZIJ1656 |
DATA LINEAGE IN MALICIOUS ENVIRONMENTS |
SECURE COMPUTING |
JAVA |
2016-17 |
|
|
FZIJ1657 |
FRODO: FRAUD RESILIENT DEVICE FOR OFF-LINE MICRO-PAYMENTS |
SECURE COMPUTING |
JAVA |
2016-17 |
|
|
FZIJ1658 |
INFERENCE ATTACK ON BROWSING HISTORY OF TWITTER |
SECURE COMPUTING |
JAVA |
2016-17 |
|
|
FZIJ1659 |
MAPPING BUG REPORTS TO RELEVANT FILES: A RANKING MODEL, A FINE-GRAINED BENCHMARK, AND FEATURE EVALUATION |
SOFTWARE ENGINEERING |
JAVA |
2016-17 |
|
|
FZIJ1660 |
METAMORPHIC TESTING FOR SOFTWARE QUALITY ASSESSMENT: A STUDY OF SEARCH ENGINES |
SOFTWARE ENGINEERING |
JAVA |
2016-17 |
|
|