- CUSTOMER_FEEDBACK_SYSTEM
- DETECTION OF CYBER HARASSERS ON SOCIAL MEDIA
- ELECTRIC_VEHICLE_RECHARGE
- HOTEL_RESERVATION SYSTEM
- LAW AND ORDER
- MAIL_RECEIVED_AUTHENTICATION
- ONLINE COLLEGE FEST ORGANIZATION
- ONLINE SPORTS TRUF PLAYGROUND BOOKING SYSTEM
- ORDER_MANAGEMENT_SYSTEM
- VIRTUAL TOURIST GUIDE
- VEHICLE MAINTENANCE
- SECURING DATA IN I (IOT) USING CRYPTOGRAPHY AND STEGANOGRAPHY
- PHARMACY INFORMATION SYSTEM
- ONLINE SPORTS BOOKING SYSTEM
- ELECTRIC VEHICLE RECHARGE MANAGEMENT SYSTEM
- CRIME REPORT MANAGEMENT
- DETECTION OF SUICIDE-RELATED POSTS IN TWITTER DATA STREAMS
- RAISE FUNDS ONLINE FOR MEDICAL EMERGENCIES AND SOCIAL CAUSES
- DETECTION OF CYBER BULLYING IN SOCIAL MEDIA USING ML
- ROAD ACCIDENT PREDICTION USING MACHINE LEARNING
- CHILD MORTALITY PREDICTION USING MACHINE LEARNING
- CREDIT CARD FRAUD DETECTION USING STATE-OF-THE-ART MACHINE
- BRAIN STROKE PREDICTION USING MACHINE LEARNING
- ESTIMATION OF NUTRITION COMPONENTS.
- DESIGNING SECURE AND EFFICIENT BIOMETRIC
- DOCTOR AND PATIENT PORTAL FOR APPOINTMENT BOOKING
- LOCALITY-CONSTRAINED LINEAR CODING FOR IMAGE CLASSIFICATION
- DATA POISON DETECTION SCHEMES FOR DISTRIBUTED MACHINE LEARNING
- FINGERPRINT COMPRESSION BASED ON SPARSE REPRESENTATION
- ANDROID MALWARE DETECTION USING MACHINE LEARNING TECHNIQUES
- HOW DATA-DRIVEN ENTREPRENEUR ANALYZES IMPERFECT INFORMATION FOR BUSINESS OPPORTUNITY EVALUATION
- MODELING AND PREDICTING CYBER HACKING BREACHES
- GEO TRACKING OF WASTE AND TRIGGERING ALERTS AND MAPPING AREAS WITH HIGH WASTE INDEX
- COST-SENSITIVE PAYMENT CARD FRAUD DETECTION BASED ON DYNAMIC RANDOM FOREST AND K-NEAREST NEIGHBORS
- TOWARD BETTER STATISTICAL VALIDATION OF MACHINE LEARNING-BASED MULTIMEDIA QUALITY ESTIMATORS.
- USER CENTRIC MACHINE LEARNING FRAMEWORK FOR CYBER SECURITY OPERATIONS CENTER
- WEAKLY-SUPERVISED DEEP EMBEDDING FOR PRODUCT REVIEW SENTIMENT ANALYSIS
- HUMAN ACTIVITY REORGANIZATION USING SMART PHONE DATA
- MUSIC RECOMMEND SYSTEM USING DECISION TREE CLASSIFIER
- EXPLORING TRAJECTORY PREDICTION THROUGH MACHINE LEARNING PROJECTS
- A SURVEY ON OPTICAL CHARACTER RECOGNITION SYSTEM
- CHATBOT APPLICATION
- COMPARISON OF MACHINE LEARNING METHODS FOR BREAST CANCER DIAGNOSIS
- DENSITY BASED SMART TRAFFIC CONTROL SYSTEM USING CANNY EDGE DETECTION ALGORITHM FOR CONGREGATING TRAFFIC INFORMATION
- DRIVER DROWSINESS MONITORING SYSTEM USING VISUAL BEHAVIOUR AND MACHINE LEARNING
- FEATURE EXTRACTION FOR CLASSIFYING STUDENTS BASED ON THEIR ACADEMIC PERFORMANCE
- HEART DISEASE PREDICTION USING BIO INSPIRED ALGORITHMS
- HOW DATA-DRIVEN ENTREPRENEUR ANALYZES IMPERFECT INFORMATION FOR BUSINESS OPPORTUNITY EVALUATION
- NETWORK INTRUSION DETECTION USING SUPERVISED MACHINE LEARNING TECHNIQUE WITH FEATURE SELECTION
- PERSONALIZED AFFECTIVE FEEDBACK TO ADDRESS STUDENTS FRUSTRATION INITS
- OBJECT DETECTION USING YOLO ALGORITHM
- SENTIMENT ANALYSIS USING TELUGU SENTIWORDNET
- SUSPICIOUS ACTIVITY DETECTION
- A DATA MINING BASED MODEL FOR DETECTION OF FRAUDULENT BEHAVIOUR IN WATER CONSUMPTION
- A BI-OBJECTIVE HYPER-HEURISTIC SUPPORT VECTOR MACHINES FOR BIG DATA CYBER-SECURITY
- BLOCK CHAIN TECHNOLOGY
- BREAST CANCER DETECTION
- CHARACTERIZING AND PREDICTING EARLY REVIEWERS FOR EFFECTIVE PRODUCT MARKETING ON ECOMMERCE WEBSITES
- CREDIT CARD FRAUD ANALYSIS USING PREDICTIVE MODELLING
- CUSTOMER LOAN PREDICTION ANALYSIS
- DEEP LEARNING APPLICATIONS IN MEDICAL IMAGE ANALYSIS-BRAIN TUMOR
- DESIGNING CYBER INSURANCE POLICIES-THE ROLE OF PRE-SCREENING AND SECURITY INTERDEPENDENCE
- HEART DISEASE PREDICTION
- IMAGE BASED APPRAISAL OF REAL ESTATE PROPERTIES
- PERSONALIZED AFFECTIVE FEEDBACK TO ADDRESS STUDENTS FRUSTRATION IN INTELLIGENT TUTORING SYSTEM
- PREDICTING THE REVIEWS OF THE RESTAURANT USING NATURAL LANGUAGE PROCESSING TECHNIQUE
- RECOLORED IMAGE DETECTION
- REVIEW OF THE USE OF AI TECHNIQUES IN SERIOUS GAMES-DECISION MAKING AND ML
- BIG MART SALES USING MACHINE LEARNING WITH DATA ANALYSIS
- CENSUS INCOME DATASET USING MACHINE LEARNING WITH DATA ANALYSIS
- ANALYSIS OF WOMEN SAFETY IN INDIAN CITIES USING MACHINE LEARNING ON TWEET
- DATA ANALYSIS FOR UNDERSTANDING THE IMPACT OF COVID–19 VACCINATIONS ON THE SOCIETY
- HOSPITAL EXIGENCY FORECAST
- ONLINE VOTING SYSTEM
- TWITTER TREND MINING
- AUTHENTICATION OF PRODUCT & COUNTERFEITS ELIMINATION USING BLOCK CHAIN
- LIFE STYLE DISEASE PREDICTION USING SUPPORT VECTOR MACHINE
- DISTRIBUTED MACHINE LEARNING ORIENTED DATA INTEGRITY
- NETWORK REPRESENTATION LEARNING ENHANCED RECOMMENDATION ALGORITHM
- DEEP COLLABORATIVE CONJUNCTIVE RECOMMENDER FOR RATING PREDICTION
- A FUZZY APPROACH TO TEXT CLASSIFICATION WITH TWO STAGE TRAINING FOR AMBIGUOUS INSTANCES
- A NOVEL METHOD FOR INTRUSION DETECTION SYSTEMS USING SUPPORT VECTOR MACHINE
- CLASSIFICATION OF NON LINEAR CLUSTERING ALGORITHMS
- CREDIT CARD FRAUD DETECTION USING ADABOOST AND MAJORITY VOTING
- DETECTING MALICIOUS PACKET LOSSES
INTERNET OF THINGS
- AN EFFICIENT PRIVACY PRESERVING MESSAGE AUTHENTICATION SCHEME FOR INTERNET OF THINGS
- SCALABLE AND SECURE BIG DATA IOT SYSTEM BASED ON MULTIFACTOR AUTHENTICATION AND LIGHTWEIGHT CRYPTOGRAPHY
- AN EFFICIENT IOT BASED PLATFORM FOR REMOTE REAL TIME CARDIAC ACTIVITY MONITORING
- TOWARDS FINE-GRAINED ACCESS CONTROL IN ENTERPRISE-SCALE INTERNET-OF-THINGS
- SECURING DATA IN INTERNET OF THINGS USING CRYPTOGRAPHY AND STEGANOGRAPHY TECHNIQUES
- ENHANCING DATA SECURITY IN IOT HEALTHCARE SERVICES USING FOG COMPUTING
INFORMATION SECURITY
- EMPLOYEE ATTENDANCE USING QR-SCAN IN FRONT OF WEBCAM
- CASHLESS SOCIETY MANAGING PRIVACY AND SECURITY IN THE TECHNOLOGICAL AGE
- FRAUD FIND FINANCIAL FRAUD DETECTION BY ANALYZING HUMAN BEHAVIOR
- FRAUDVIS UNDERSTANDING UNSUPERVISED FRAUD DETECTION ALGORITHMS
BIG DATA
- WEB BASED COLLABORATIVE BIG DATA ANALYTICS ON BIG DATA
- LEVERAGING MAP REDUCE TO EFFICIENTLY EXTRACT ASSOCIATIONS BETWEEN BIOMEDICAL CONCEPTS FROM LARGE TEXT DATA
- ACCOUNTTRADE ACCOUNTABILITY AGAINST DISHONEST BIG DATA BUYERS AND SELLERS
- BIG DATA ANALYTICS FOR PROGRAM POPULARITY PREDICTION IN BROADCAST TV INDUSTRIES
NETWORKING
- TRAFFIC AND ENERGY AWARE ROUTING FOR HETEROGENEOUS WSN
- ENERGY EFFICIENT LINK-DELAY AWARE ROUTING IN WIRELESS SENSOR NETWORKS
- A LIGHTWEIGHT PRIVACY-PRESERVING AUTHENTICATION PROTOCOL FOR VANETS
DISTRIBUTE SYSTEM
- AN INTEGRATED INDEXING AND SEARCH SERVICE FOR DISTRIBUTED FILE SYSTEM
SOFTWARE ENGINEERING
- A DEVELOPER CENTERED BUG PREDICTION MODEL
BLOCK CHAIN
- BLOCK CHAIN BASED ACCOUNTS PAYABLE PLATFORM FOR GOODS TRADE
- BLOCKCHAIN BASED MANAGEMENT FOR ORGAN DONATION AND TRANSPLANTATION
CYBER SECURITY
- A DATA ANALYTICAL APPROACH TO THE CYBERCRIME UNDERGROUND ECONOMY.
BLOCK CHAIN
- HOMOMORPHIC CONSORTIUM BLOCK CHAIN FOR SMART HOME SYSTEM SENSITIVE DATA PRIVACY PRESERVING.
- BLOCK CHAIN BASED ACCOUNTS PAYABLE PLATFORM FOR GOODS TRADE
- BLOCKCHAIN BASED MANAGEMENT FOR ORGAN DONATION AND TRANSPLANTATION.
- HOMOMORPHIC CONSORTIUM BLOCK CHAIN FOR SMART HOME SYSTEM SENSITIVE DATA PRIVACY PRESERVING.
- CARTOONING OF AN IMAGE
- E-ASSESSMENT USING IMAGE PROCESSING IN EXAMS
- EYE BALL CURSOR MOVEMENT USING OPENCV
- INVISIBILITY CLOAK USING IMAGE PROCESSING
- SOCIAL DISTANCING PREDICTION USING OPENCV
- AUTOMATIC EYE DISEASE PREDICTION
- CURRENCY RECOGNITION SYSTEM USING IMAGE PROCESSING
- AN ATTRIBUTE ASSISTED RE-RANKING MODEL FOR WEB IMAGE SEARCH.
- AN EFFICIENT PRIVACY PRESERVING MESSAGE AUTHENTICATION SCHEME FOR INTERNET OF THINGS
- SCALABLE AND SECURE BIG DATA IOT SYSTEM BASED ON MULTIFACTOR AUTHENTICATION AND LIGHTWEIGHT CRYPTOGRAPHY
- AN EFFICIENT IOT BASED PLATFORM FOR REMOTE REAL TIME CARDIAC ACTIVITY MONITORING
- TOWARDS FINE-GRAINED ACCESS CONTROL IN ENTERPRISE-SCALE INTERNET-OF-THINGS
- SECURING DATA IN INTERNET OF THINGS USING CRYPTOGRAPHY AND STEGANOGRAPHY TECHNIQUES
- ENHANCING DATA SECURITY IN IOT HEALTHCARE SERVICES USING FOG COMPUTING
- EMPLOYEE ATTENDANCE USING QR-SCAN IN FRONT OF WEBCAM
- CASHLESS SOCIETY MANAGING PRIVACY AND SECURITY IN THE TECHNOLOGICAL AGE
- FRAUD FIND FINANCIAL FRAUD DETECTION BY ANALYZING HUMAN BEHAVIOR
- FRAUDVIS UNDERSTANDING UNSUPERVISED FRAUD DETECTION ALGORITHMS
- TRAFFIC AND ENERGY AWARE ROUTING FOR HETEROGENEOUS WSN
- ENERGY EFFICIENT LINK-DELAY AWARE ROUTING IN WIRELESS SENSOR NETWORKS
- A LIGHTWEIGHT PRIVACY-PRESERVING AUTHENTICATION PROTOCOL FOR VANETS
- AN INTEGRATED INDEXING AND SEARCH SERVICE FOR DISTRIBUTED FILE SYSTEM
- A DEVELOPER CENTERED BUG PREDICTION MODEL
- WEB BASED COLLABORATIVE BIG DATA ANALYTICS ON BIG DATA
- LEVERAGING MAP REDUCE TO EFFICIENTLY EXTRACT ASSOCIATIONS BETWEEN BIOMEDICAL CONCEPTS FROM LARGE TEXT DATA
- ACCOUNTTRADE ACCOUNTABILITY AGAINST DISHONEST BIG DATA BUYERS AND SELLERS
- BIG DATA ANALYTICS FOR PROGRAM POPULARITY PREDICTION IN BROADCAST TV INDUSTRIES
- A DATA ANALYTICAL APPROACH TO THE CYBERCRIME UNDERGROUND ECONOMY.
- A MACHINE LEARNING MODEL FOR AVERAGE FUEL CONSUMPTION IN HEAVY VEHICLES
- AUTOMATING E-GOVERNMENT SERVICES WITH ARTIFICIAL INTELLIGENCE
- SECURING DATA WITH BLOCK CHAIN AND AI
- TWITTER SENTIMENT ANALYSIS BASED ON ORDINAL REGRESSION
- 5G-SMART DIABETES: TOWARD PERSONALIZED DIABETES DIAGNOSIS WITH HEALTHCARE BIG DATA CLOUDS
- A DECISION TREE BASED RECOMMENDATION SYSTEM FOR TOURISTS
- CREDIT CARD FRAUD DETECTION USING RANDOM FOREST & CART ALGORITHM
- HOW DATA-DRIVEN ENTREPRENEUR ANALYZES IMPERFECT INFORMATION FOR BUSINESS OPPORTUNITY EVALUATION
- MODELLING AND PREDICTING CYBER HACKING BREACHES
- MULTI-TRAFFICSCENCE PERCEPTION BASED ON SUPERVISED LEARNING
- PRICE BASED RESOURCE ALLOCATION FOR EDGE COMPUTING A MARKET EQUILIBRIUM APPROACH
- RICH SHORT TEXT CONVERSATION USING SEMANTIC KEY CONTROLLED SEQUENCE GENERATION
- ROBUST MALWARE DETECTION FOR IOT DEVICES USING DEEP EIGENSPACE LEARNING
SEMI-SUPERVISED MACHINE LEARNING APPROACH FOR DDOS DETECTION.
- REDUCE THE AMOUNT OF PUSH NOTIFICATIONS REQUIRED FOR E-COMMERCE APPS
- MULTIVIEW CLUSTERING WITH THE COOPERATION OF VISIBLE AND HIDDEN VIEWS
- DATA MINING AND FEATURE ANALYSIS OF COLLEGE STUDENTS’ CAMPUS
- PROTECTING YOUR SHOPPING PREFERENCE WITH DIFFERENTIAL PRIVACY
- SECURING DATA IN INTERNET OF THINGS USING CRYPTOGRAPHY AND STEGANOGRAPHY TECHNIQUES
- BENCHMARKING IMAGE RETRIEVAL DIVERSIFICATION TECHNIQUES FOR +SOCIAL MEDIA
- VIRTUAL TOURIST GUIDE
- SECURE KEYWORD SEARCH AND DATA SHARING MECHANISM FOR CLOUD COMPUTING
- NETWORK REPRESENTATION LEARNING ENHANCED RECOMMENDATION ALGORITHM
- ONLINE USER BEHAVIOUR ANALYSIS ON GRAPHICAL MODEL
- EFFICIENT AND DEPLOYABLE CLICK FRAUD DETECTION FOR MOBILE APPLICATIONS
- ANT COLONY STREAM CLUSTERING A FAST DENSITY CLUSTERING ALGORITHM FOR DYNAMIC DATA STREAMS
- CRIME ANALYSIS MAPPING, INTRUSION DETECTION – USING DATA MINING
- DETECTION OF CYBER HARASSERS ON SOCIAL MEDIA
- ADAPTIVE DIFFUSION OF SENSITIVE INFORMATION IN ONLINE SOCIAL NETWORKS
- IDENTITY-BASED ENCRYPTION TRANSFORMATION FOR FLEXIBLE SHARING OF ENCRYPTED DATA IN PUBLIC CLOUD
- A DATA COMPRESSION AND STORAGE OPTIMIZATION FRAMEWORK
- COVID TRACKING AND MIGRATION PERMISSION SYSTEM
- PRIVACY AWARE PERSONAL DATA STORAGE PPDS LEARNING HOW TO PROTECT USER PRIVACY
- LOAD BALANCING OPTIMIZATION IN CLOUD COMPUTING BASED ON TASK SCHEDULING
- A SECURE ELLIPTIC CURVE CRYPTOGRAPHY BASED MUTAL AUTHENTICATION PROTOCAL FOR CLOUD-ASSISTED TMIS
- PROTECTING USER DATA IN PROFILE-MATCHING SOCIAL NETWORKS
- RATING SYSTEM FOR WORKER SATISFACTION
- EFFICIENT RESOURCE ALLOCATION AND SCHEDULING
- RESTRICTIVE AMBIGUITY AND ADD-ON ARCHITECTURE PROTOTYPE FOR PRIVACY PRESERVATION IN CLOUD AUDITING
- A SECURE ENHANCED KEY-POLICY ATTRIBUTE-BASED TEMPORARY KEYWORD SEARCH SCHEME IN THE CLOUD
- ANALYSIS ON MEDICINE AND DOCTOR AVAILABILITY IN GOVERNMENT HOSPITAL
- A DATA ANALYTICS APPROACH TO THE CYBERCRIME UNDERGROUND ECONOMY
- SCALABLE AND SECURE BIG DATA IOT SYSTEM BASED ON MULTIFACTOR AUTHENTICATION
- VEHICLE MAINTENANCE
- ENHANCING DATA SECURITY IN IOT HEALTHCARE SERVICES USING FOG COMPUTING
- A SECURE SEARCHABLE ENCRYPTION FRAMEWORK
- PRIVACY-PRESERVING EFFICIENT VERIFIABLE DEEP PACKET INSPECTION
- MOVIE RECOMMENDATOIN SYSTEM
- ANALYSIS OF DDOS ATTACK
- IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING
- CONDITIONAL IDENTITY-BASED BROADCAST PROXY RE-ENCRYPTION AND ITS APPLICATION TO CLOUD EMAIL
- IMPLEMENTATION OF DATA MINING TECHNIQUES IN UPCODING FRAUD DETECTION IN THE MONETARY DOMAINS
- DYNAMIC JOB ORDERING AND SLOT CONFIGURATIONS FOR MAP REDUCE WORKLOADS
- CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION
- ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES
- ACCESS CONTROL BY SIGNATURE-KEYS TO PROVIDE PRIVACY FOR CLOUD AND BIG DATA
- PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS IN CLOUD COMPUTING
- PRIVACY-PRESERVING SEARCH OVER ENCRYPTED PERSONAL HEALTH RECORD IN MULTI-SOURCE CLOUD
- PERFORMANCE-ORIENTED DEPLOYMENT OF STREAMING APPLICATIONS ON CLOUD
- A SECURE ANTI-COLLUSION DATA SHARING SCHEME FOR DYNAMIC GROUPS IN THE CLOUD
- IFCAAS: INFORMATION FLOW CONTROL AS A SERVICE FOR CLOUD SECURITY
- PRIVACY-PRESERVING PUBLIC AUDITING FOR SHARED CLOUD DATA WITH SECURE GROUP MANAGEMENT
- WEB CLOUD WEB BASED CLOUD STORAGE FOR SECURE DATA SHARING ACROSS PLATFORMS
- A PROXY RE-ENCRYPTION APPROACH TO SECURE DATA SHARING IN THE INTERNET OF THINGS BASED ON BLOCK CHAIN
- DYNAMIC CONTROL OF FRAUD INFORMATION SPREADING IN MOBILE SOCIAL NETWORKS
- BOEW A CONTENT BASED IMAGE RETRIEVAL SCHEME USING BAG OF ENCRYPTED WORDS IN CLOUD COMPUTING
- DESIGNING SECURE AND EFFICIENT BIOMETRIC-BASED SECURE ACCESS MECHANISM FOR CS
- DSAS A SECURE DATA SHARING AND AUTHORIZED SEARCHABLE FRAMEWORK FOR E-HEALTHCARE SYSTEM
- A NOVEL FEATURE MATCHING RANKED SEARCH MECHANISM OVER ENCRYPTED CLOUD DATA
- IDENTITY-BASED ENCRYPTION TRANSFORMATION FOR FLEXIBLE SHARING OF ENCRYPTED DATA IN PUBLIC CLOUD
- PAY AS YOU DECRYPT DECRYPTION OUTSOURCING FOR FUNCTIONAL ENCRYPTION USING BLOCK CHAIN
- PRIVACY-PRESERVING EFFICIENT VERIFIABLE DEEP PACKET INSPECTION
- PROACTIVE FAULT-TOLERANCE TECHNIQUE TO ENHANCE RELIABILITY OF CLOUD SERVICE IN CLOUD FEDERATION ENVIRONMENT
- PROTECTING YOUR SHOPPING PREFERENCE WITH DIFFERENTIAL PRIVACY
- REPRESENTING FINE GRAINED CO-OCCURRENCES FOR BEHAVIOR BASED FRAUD DETECTION
- SCALABLE AND ADAPTIVE DATA REPLICA PLACEMENT FOR GEO-DISTRIBUTED CLOUD STORAGES
- SECURE CLOUD STORAGE WITH DATA DYNAMICS USING SECURE NETWORK CODING TECHNIQUES
- SECURE DATA TRANSFER AND DELETION FROM COUNTING BLOOM FILTER IN CLOUD COMPUTING
- SECURE KEYWORD SEARCH AND DATA SHARING MECHANISM FOR CLOUD COMPUTING
- SIMILARITY SEARCH FOR ENCRYPTED IMAGES IN SECURE CLOUD COMPUTING
- A VERIFIABLE SEMANTIC SEARCHING SCHEME BY OPTIMAL MATCHING OVER ENCRYPTED DATA IN PUBLIC CLOUD
- PRIVACY PRESERVING AND QUALITY-AWARE INCENTIVE MECHANISM FOR MOBILE CROWD SENSING
- PRIVACY-PRESERVING MEDICAL TREATMENT SYSTEM THROUGH NONDETERMINISTIC FINITE AUTOMATA
- PUBLICLY VERIFIABLE SHARED DYNAMIC ELECTRONIC HEALTH RECORD DATABASES
- SECURING RESOURCES IN DECENTRALIZED CLOUD STORAGE
- SEMANTICS OF DATA MINING SERVICES IN CLOUD COMPUTING
- SECURE STORAGE AUDITING WITH EFFICIENT KEY UPDATES
- PUBLICLY VERIFIABLE SHARED DYNAMIC ELECTRONIC HEALTH RECORD DATABASES
- ENABLING IDENTITY-BASED INTEGRITY AUDITING AND DATA
- EFFICIENT RESOURCE ALLOCATION FOR TASK SCHEDULING IN CLOUD COMPUTING
- DYNAMIC MULTI-KEYWORD RANKED SEARCH BASED ON BLOOM FILTER
- VERIFIABLE AND MULTI KEYWORD SEARCHABLE ATTRIBUTE BASED ENCRYPTION SCHEME FOR CLOUD
- A PRACTICAL PUBLIC KEY ENCRYPTION SCHEME BASED ON LEARNING PARITY WITH NOISE
- PRIVACY AWARE PERSONAL DATA STORAGE PPDS LEARNING HOW TO PROTECT USER PRIVACY
- A SECURE ELLIPTIC CURVE CRYPTOGRAPHY BASED MUTUAL AUTHENTICATION PROTOCOL FOR CLOUD ASSISTED TMIS
- A SECURE SEARCHABLE ENCRYPTION FRAMEWORK FOR PRIVACY-CRITICAL CLOUD STORAGE SERVICES
- PROFIT MAXIMIZATION FOR CLOUD BROKERS IN CLOUD COMPUTING
- HIDDEN CIPHERTEXT POLICY ATTRIBUTE-BASED ENCRYPTION WITH FAST DECRYPTION FOR PERSONAL HEALTH RECORD SYSTEM
- SECURE DATA GROUP SHARING AND CONDITIONAL DISSEMINATION WITH MULTI-OWNER IN CLOUD COMPUTING
- CRYPTOGRAPHICALLY ENFORCED DYNAMIC ACCESS CONTROL IN THE CLOUD
- ADAPTIVE RESOURCE MANAGEMENT FOR ANALYZING VIDEO STREAMS FROM GLOBALLY DISTRIBUTED NETWORK CAMERAS
- AN APPROACH TO BALANCE MAINTENANCE COSTS AND ELECTRICITY CONSUMPTION IN CLOUD DATA CENTERS
- A POWER-OF-TWO CHOICES BASED ALGORITHM FOR FOG COMPUTING
- PROVABLY SECURE AND LIGHTWEIGHT IDENTITY BASED AUTHENTICATED DATA SHARING PROTOCOL
- EFFICIENT RETRIEVAL OVER DOCUMENTS ENCRYPTED BY ATTRIBUTES IN CLOUD COMPUTING
- AN EFFICIENT AND SECURED FRAMEWORK FOR MOBILE CLOUD COMPUTING
- A KEY-POLICY ATTRIBUTE-BASED TEMPORARY KEYWORD SEARCH SCHEME FOR SECURE CLOUD STORAGE
- AN EFFICIENT AND PRIVACY-PRESERVING BIOMETRIC IDENTIFICATION SCHEME IN CLOUD COMPUTING
- CHAOTIC SEARCHABLE ENCRYPTION FOR MOBILE CLOUD STORAGE
- EFFICIENT TRACEABLE AUTHORIZATION SEARCH SYSTEM FOR SECURE CLOUD STORAGE
- AN EFFICIENT AND SECURE DEDUPLICATION SCHEME FOR CLOUD-ASSISTED EHEALTH SYSTEMS
- SECURE FILE STORAGE IN CLOUD COMPUTING USING HYBRID CRYPTOGRAPHY ALGORITHM
- DIVISION AND REPLICATION OF DATA IN CLOUD FOR OPTIMAL PERFORMANCE AND SECURITY
- EMOTION RECOGNITION ON TWITTER COMPARATIVE STUDY AND TRAINING A UNISON MODEL
- A KEY-POLICY ATTRIBUTE-BASED TEMPORARY KEYWORD SEARCH SCHEME FOR SECURE CLOUD STORAGE
- KEYD SECURE KEY-DEDUPLICATION WITH IDENTITY-BASED BROADCAST ENCRYPTION
- EFFICIENT PRIVACY-AWARE AUTHENTICATION SCHEME FOR MOBILE
- SESPHR A METHODOLOGY FOR SECURE SHARING OF PERSONAL HEALTH RECORDS
- ADVANCED SECURITY IN CLOUD COMPUTING OF MILITARY WEAPONS.
- DEVELOPMENT AND EXAMINATION OF FOG COMPUTING BASED ENCRYPTED CONTROL SYSTEM
- ON-THE-FLY PRIVACY FOR LOCATION HISTOGRAMS
- ANALYZING PRODUCT USAGE BASED ON TWITTER USERS BASED ON DATA MINING PROCESS
- BIG DATA ANALYTICS OF GEOSOCIAL MEDIA FOR PLANNING AND REAL-TIME DECISIONS
- CREDIT CARD TRANSACTIONS DATA ADVERSARIAL AUGMENTATION IN THE FREQUENCY DOMAIN
- CRIME ANALYSIS MAPPING, INTRUSION DETECTION – USING DATA MINING
- DATA MINING AND FEATURE ANALYSIS OF COLLEGE STUDENTS’ CAMPUS NETWORK BEHAVIOR
- MULTI VIEW CLUSTERING WITH THE COOPERATION OF VISIBLE AND HIDDEN VIEWS
- FUZZY K-MEANS CLUSTERING WITH DISCRIMINATIVE EMBEDDING
- EFFECTIVE KEYWORD SEARCH OVER WEIGHTED GRAPHS
- ANT COLONY STREAM CLUSTERING A FAST DENSITY CLUSTERING ALGORITHM FOR DYNAMIC DATA STREAMS
- TOWARD EFFECTIVE COLLABORATIVE FILTERING USING UNINTERESTING ITEMS
- CO-DETECT FINANCIAL FRAUD DETECTION WITH ANOMALY FEATURE DETECTION
- A WEIGHTED FREQUENT ITEM SET MINING ALGORITHM
- PRIVACY CHARACTERIZATION AND QUANTIFICATION IN DATA PUBLISHING
- STOCK MARKET ANALYSIS AND PREDICTION
- PREDICTABILITY AND PREDICTION OF HUMAN MOBILITY BASED ON APPLICATION-COLLECTED LOCATION DATA
- COMPOSITE BEHAVIORAL MODELING FOR IDENTITY THEFT DETECTION IN ONLINE SOCIAL NETWORKS
- DETECTING AND CHARACTERIZING EXTREMIST REVIEWER GROUPS IN ONLINE PRODUCT REVIEWS
- PROTECTING USER DATA IN PROFILE MATCHING SOCIAL NETWORKS
- TRUST-BASED VIDEO MANAGEMENT FRAMEWORK FOR SOCIAL MULTIMEDIA NETWORKS
- USER BEHAVIOR PREDICTION OF SOCIAL HOTSPOTS
- AN EFFICIENT SECURE ELECTRONIC PAYMENT SYSTEM FOR E-COMMERCE
- FAKE NEWS, DISINFORMATION, AND DEEP FAKES: LEVERAGING DISTRIBUTED LEDGER TECHNOLOGIES AND BLOCKCHAIN TO COMBAT DIGITAL DECEPTION AND COUNTERFEIT REALITY
- DETECTING MALICIOUS SOCIAL BOTS BASED ON CLICK STREAM SEQUENCES
- PREDICTING CYBER BULLYING ON SOCIAL MEDIA IN THE BIG DATA ERA USING MACHINE LEARNING ALGORITHMS REVIEW OF LITERATURE AND OPEN CHALLENGES
- SPAMMER DETECTION AND FAKE USER IDENTIFICATION ON SOCIAL NETWORKS
- TOWARDS ROBUST IMAGE STEGANOGRAPHY
- ONLINE PUBLIC SHAMING ON TWITTER DETECTION, ANALYSIS AND MITIGATION
- SOCIAL NETWORK RUMOR DIFFUSION PREDICATION BASED ON EQUAL RESPONSIBILITY GAME MODEL
- RETRIEVING HIDDEN FRIENDS A COLLUSION PRIVACY ATTACK AGAINST ONLINE FRIEND SEARCH ENGINE
- A HIERARCHICAL ATTENTION MODEL FOR SOCIAL CONTEXTUAL
- MINING USERS TRUST FROM E-COMMERCE REVIEWS BASED ON SENTIMENT SIMILARITY ANALYSIS
- RISK ASSESSMENT IN SOCIAL NETWORKS BASED ON USER ANOMALOUS BEHAVIORS
- HEALTH MONITORING ON SOCIAL MEDIA OVER TIME
- A COMPREHENSIVE STUDY ON SOCIAL NETWORK
- ADAPTIVE DIFFUSION OF SENSITIVE INFORMATION IN ONLINE SOCIAL NETWORKS
- ANALYZING AND DETECTING MONEY-LAUNDERING ACCOUNTS IN ONLINE SOCIAL NETWORKS
- BENCHMARKING IMAGE RETRIEVAL DIVERSIFICATION TECHNIQUES FOR SOCIAL MEDIA
- DETECTION OF SUICIDE-RELATED POSTS IN TWITTER DATA STREAMS
- HATE SPEECH ON TWITTER A PRAGMATIC APPROACH TO COLLECT HATEFUL AND OFFENSIVE EXPRESSIONS AND PERFORM HATE SPEECH DETECTION
AN ONLINE SOCIAL NETWORK BASED QUESTION AND ANSWER SYSTEM
- IMAGE FORGERY DETECTION BASED ON FUSION OF LIGHTWEIGHT DEEP LEARNING MODELS
- VIDEO-BASED ABNORMAL DRIVING BEHAVIOR DETECTION VIA DEEP LEARNING FUSIONS
- A DEEP LEARNING FACIAL EXPRESSION RECOGNITION BASED SCORING SYSTEM FOR RESTAURANTS
- BIRD SPECIES IDENTIFICATION USING DEEP LEARNING
- FAKE CURRENCY DETECTION USING IMAGE PROCESSING.
- SIGN LANGUAGE RECOGNITION USING CNN
- IMAGE CLASSIFICATION USING CNN (CONVOLUTION NEURAL NETWORKS) ALGORITHM
- USE OF ARTIFICIAL NEURAL NETWORKS TO IDENTIFY FAKE PROFILES