• CUSTOMER_FEEDBACK_SYSTEM
  • DETECTION OF CYBER HARASSERS ON SOCIAL MEDIA
  • ELECTRIC_VEHICLE_RECHARGE
  • HOTEL_RESERVATION SYSTEM
  • LAW AND ORDER
  • MAIL_RECEIVED_AUTHENTICATION
  • ONLINE COLLEGE FEST ORGANIZATION
  • ONLINE SPORTS TRUF PLAYGROUND BOOKING SYSTEM
  • ORDER_MANAGEMENT_SYSTEM
  • VIRTUAL TOURIST GUIDE
  • VEHICLE MAINTENANCE
  • SECURING DATA IN I (IOT) USING CRYPTOGRAPHY AND STEGANOGRAPHY
  • PHARMACY INFORMATION SYSTEM
  • ONLINE SPORTS BOOKING SYSTEM
  • ELECTRIC VEHICLE RECHARGE MANAGEMENT SYSTEM
  • CRIME REPORT MANAGEMENT
  • DETECTION OF SUICIDE-RELATED POSTS IN TWITTER DATA STREAMS
  • RAISE FUNDS ONLINE FOR MEDICAL EMERGENCIES AND SOCIAL CAUSES
  • DETECTION OF CYBER BULLYING IN SOCIAL MEDIA USING ML
  • ROAD ACCIDENT PREDICTION USING MACHINE LEARNING
  • CHILD MORTALITY PREDICTION USING MACHINE LEARNING
  • CREDIT CARD FRAUD DETECTION USING STATE-OF-THE-ART MACHINE
  • BRAIN STROKE PREDICTION USING MACHINE LEARNING
  • ESTIMATION OF NUTRITION COMPONENTS.
  • DESIGNING SECURE AND EFFICIENT BIOMETRIC
  • DOCTOR AND PATIENT PORTAL FOR APPOINTMENT BOOKING
  • LOCALITY-CONSTRAINED LINEAR CODING FOR IMAGE CLASSIFICATION
  • DATA POISON DETECTION SCHEMES FOR DISTRIBUTED MACHINE LEARNING
  • FINGERPRINT COMPRESSION BASED ON SPARSE REPRESENTATION
  • ANDROID MALWARE DETECTION USING MACHINE LEARNING TECHNIQUES
  • HOW DATA-DRIVEN ENTREPRENEUR ANALYZES IMPERFECT INFORMATION FOR BUSINESS OPPORTUNITY EVALUATION
  • MODELING AND PREDICTING CYBER HACKING BREACHES
  • GEO TRACKING OF WASTE AND TRIGGERING ALERTS AND MAPPING AREAS WITH HIGH WASTE INDEX
  • COST-SENSITIVE PAYMENT CARD FRAUD DETECTION BASED ON DYNAMIC RANDOM FOREST AND K-NEAREST NEIGHBORS
  • TOWARD BETTER STATISTICAL VALIDATION OF MACHINE LEARNING-BASED MULTIMEDIA QUALITY ESTIMATORS.
  • USER CENTRIC MACHINE LEARNING FRAMEWORK FOR CYBER SECURITY OPERATIONS CENTER
  • WEAKLY-SUPERVISED DEEP EMBEDDING FOR PRODUCT REVIEW SENTIMENT ANALYSIS
  • HUMAN ACTIVITY REORGANIZATION USING SMART PHONE DATA
  • MUSIC RECOMMEND SYSTEM USING DECISION TREE CLASSIFIER
  • EXPLORING TRAJECTORY PREDICTION THROUGH MACHINE LEARNING PROJECTS
  • A SURVEY ON OPTICAL CHARACTER RECOGNITION SYSTEM
  • CHATBOT APPLICATION
  • COMPARISON OF MACHINE LEARNING METHODS FOR BREAST CANCER DIAGNOSIS
  • DENSITY BASED SMART TRAFFIC CONTROL SYSTEM USING CANNY EDGE DETECTION ALGORITHM FOR CONGREGATING TRAFFIC INFORMATION
  • DRIVER DROWSINESS MONITORING SYSTEM USING VISUAL BEHAVIOUR AND MACHINE LEARNING
  • FEATURE EXTRACTION FOR CLASSIFYING STUDENTS BASED ON THEIR ACADEMIC PERFORMANCE
  • HEART DISEASE PREDICTION USING BIO INSPIRED ALGORITHMS
  • HOW DATA-DRIVEN ENTREPRENEUR ANALYZES IMPERFECT INFORMATION FOR BUSINESS OPPORTUNITY EVALUATION
  • NETWORK INTRUSION DETECTION USING SUPERVISED MACHINE LEARNING TECHNIQUE WITH FEATURE SELECTION
  • PERSONALIZED AFFECTIVE FEEDBACK TO ADDRESS STUDENTS FRUSTRATION INITS
  • OBJECT DETECTION USING YOLO ALGORITHM
  • SENTIMENT ANALYSIS USING TELUGU SENTIWORDNET
  • SUSPICIOUS ACTIVITY DETECTION
  • A DATA MINING BASED MODEL FOR DETECTION OF FRAUDULENT BEHAVIOUR IN WATER CONSUMPTION
  • A BI-OBJECTIVE HYPER-HEURISTIC SUPPORT VECTOR MACHINES FOR BIG DATA CYBER-SECURITY
  • BLOCK CHAIN TECHNOLOGY
  • BREAST CANCER DETECTION
  • CHARACTERIZING AND PREDICTING EARLY REVIEWERS FOR EFFECTIVE PRODUCT MARKETING ON ECOMMERCE WEBSITES
  • CREDIT CARD FRAUD ANALYSIS USING PREDICTIVE MODELLING
  • CUSTOMER LOAN PREDICTION ANALYSIS
  • DEEP LEARNING APPLICATIONS IN MEDICAL IMAGE ANALYSIS-BRAIN TUMOR
  • DESIGNING CYBER INSURANCE POLICIES-THE ROLE OF PRE-SCREENING AND SECURITY INTERDEPENDENCE
  • HEART DISEASE PREDICTION
  • IMAGE BASED APPRAISAL OF REAL ESTATE PROPERTIES
  • PERSONALIZED AFFECTIVE FEEDBACK TO ADDRESS STUDENTS FRUSTRATION IN INTELLIGENT TUTORING SYSTEM
  • PREDICTING THE REVIEWS OF THE RESTAURANT USING NATURAL LANGUAGE PROCESSING TECHNIQUE
  • RECOLORED IMAGE DETECTION
  • REVIEW OF THE USE OF AI TECHNIQUES IN SERIOUS GAMES-DECISION MAKING AND ML
  • BIG MART SALES USING MACHINE LEARNING WITH DATA ANALYSIS
  • CENSUS INCOME DATASET USING MACHINE LEARNING WITH DATA ANALYSIS
  • ANALYSIS OF WOMEN SAFETY IN INDIAN CITIES USING MACHINE LEARNING ON TWEET
  • DATA ANALYSIS FOR UNDERSTANDING THE IMPACT OF COVID–19 VACCINATIONS ON THE SOCIETY
  • HOSPITAL EXIGENCY FORECAST
  • ONLINE VOTING SYSTEM
  • TWITTER TREND MINING
  • AUTHENTICATION OF PRODUCT & COUNTERFEITS ELIMINATION USING BLOCK CHAIN
  • LIFE STYLE DISEASE PREDICTION USING SUPPORT VECTOR MACHINE
  • DISTRIBUTED MACHINE LEARNING ORIENTED DATA INTEGRITY
  • NETWORK REPRESENTATION LEARNING ENHANCED RECOMMENDATION ALGORITHM
  • DEEP COLLABORATIVE CONJUNCTIVE RECOMMENDER FOR RATING PREDICTION
  • A FUZZY APPROACH TO TEXT CLASSIFICATION WITH TWO STAGE TRAINING FOR AMBIGUOUS INSTANCES
  • A NOVEL METHOD FOR INTRUSION DETECTION SYSTEMS USING SUPPORT VECTOR MACHINE
  • CLASSIFICATION OF NON LINEAR CLUSTERING ALGORITHMS
  • CREDIT CARD FRAUD DETECTION USING ADABOOST AND MAJORITY VOTING
  • DETECTING MALICIOUS PACKET LOSSES

INTERNET OF THINGS

  • AN EFFICIENT PRIVACY PRESERVING MESSAGE AUTHENTICATION SCHEME FOR INTERNET OF THINGS
  • SCALABLE AND SECURE BIG DATA IOT SYSTEM BASED ON MULTIFACTOR AUTHENTICATION AND LIGHTWEIGHT CRYPTOGRAPHY
  • AN EFFICIENT IOT BASED PLATFORM FOR REMOTE REAL TIME CARDIAC ACTIVITY MONITORING
  • TOWARDS FINE-GRAINED ACCESS CONTROL IN ENTERPRISE-SCALE INTERNET-OF-THINGS
  • SECURING DATA IN INTERNET OF THINGS USING CRYPTOGRAPHY AND STEGANOGRAPHY TECHNIQUES
  • ENHANCING DATA SECURITY IN IOT HEALTHCARE SERVICES USING FOG COMPUTING

INFORMATION SECURITY

  • EMPLOYEE ATTENDANCE USING QR-SCAN IN FRONT OF WEBCAM
  • CASHLESS SOCIETY MANAGING PRIVACY AND SECURITY IN THE TECHNOLOGICAL AGE
  • FRAUD FIND FINANCIAL FRAUD DETECTION BY ANALYZING HUMAN BEHAVIOR
  • FRAUDVIS UNDERSTANDING UNSUPERVISED FRAUD DETECTION ALGORITHMS

BIG DATA

  • WEB BASED COLLABORATIVE BIG DATA ANALYTICS ON BIG DATA
  • LEVERAGING MAP REDUCE TO EFFICIENTLY EXTRACT ASSOCIATIONS BETWEEN BIOMEDICAL CONCEPTS FROM LARGE TEXT DATA
  • ACCOUNTTRADE ACCOUNTABILITY AGAINST DISHONEST BIG DATA BUYERS AND SELLERS
  • BIG DATA ANALYTICS FOR PROGRAM POPULARITY PREDICTION IN BROADCAST TV INDUSTRIES

NETWORKING

  • TRAFFIC AND ENERGY AWARE ROUTING FOR HETEROGENEOUS WSN
  • ENERGY EFFICIENT LINK-DELAY AWARE ROUTING IN WIRELESS SENSOR NETWORKS
  • A LIGHTWEIGHT PRIVACY-PRESERVING AUTHENTICATION PROTOCOL FOR VANETS

DISTRIBUTE SYSTEM

  • AN INTEGRATED INDEXING AND SEARCH SERVICE FOR DISTRIBUTED FILE SYSTEM

SOFTWARE ENGINEERING

  • A DEVELOPER CENTERED BUG PREDICTION MODEL

BLOCK CHAIN

  • BLOCK CHAIN BASED ACCOUNTS PAYABLE PLATFORM FOR GOODS TRADE
  • BLOCKCHAIN BASED MANAGEMENT FOR ORGAN DONATION AND TRANSPLANTATION

CYBER SECURITY

  • A DATA ANALYTICAL APPROACH TO THE CYBERCRIME UNDERGROUND ECONOMY.

BLOCK CHAIN

  • HOMOMORPHIC CONSORTIUM BLOCK CHAIN FOR SMART HOME SYSTEM SENSITIVE DATA PRIVACY PRESERVING.
  • BLOCK CHAIN BASED ACCOUNTS PAYABLE PLATFORM FOR GOODS TRADE
  • BLOCKCHAIN BASED MANAGEMENT FOR ORGAN DONATION AND TRANSPLANTATION.
  • HOMOMORPHIC CONSORTIUM BLOCK CHAIN FOR SMART HOME SYSTEM SENSITIVE DATA PRIVACY PRESERVING.
  • CARTOONING OF AN IMAGE
  • E-ASSESSMENT USING IMAGE PROCESSING IN EXAMS
  • EYE BALL CURSOR MOVEMENT USING OPENCV
  • INVISIBILITY CLOAK USING IMAGE PROCESSING
  • SOCIAL DISTANCING PREDICTION USING OPENCV
  • AUTOMATIC EYE DISEASE PREDICTION
  • CURRENCY RECOGNITION SYSTEM USING IMAGE PROCESSING
  • AN ATTRIBUTE ASSISTED RE-RANKING MODEL FOR WEB IMAGE SEARCH.
  • AN EFFICIENT PRIVACY PRESERVING MESSAGE AUTHENTICATION SCHEME FOR INTERNET OF THINGS
  • SCALABLE AND SECURE BIG DATA IOT SYSTEM BASED ON MULTIFACTOR AUTHENTICATION AND LIGHTWEIGHT CRYPTOGRAPHY
  • AN EFFICIENT IOT BASED PLATFORM FOR REMOTE REAL TIME CARDIAC ACTIVITY MONITORING
  • TOWARDS FINE-GRAINED ACCESS CONTROL IN ENTERPRISE-SCALE INTERNET-OF-THINGS
  • SECURING DATA IN INTERNET OF THINGS USING CRYPTOGRAPHY AND STEGANOGRAPHY TECHNIQUES
  • ENHANCING DATA SECURITY IN IOT HEALTHCARE SERVICES USING FOG COMPUTING
  • EMPLOYEE ATTENDANCE USING QR-SCAN IN FRONT OF WEBCAM
  • CASHLESS SOCIETY MANAGING PRIVACY AND SECURITY IN THE TECHNOLOGICAL AGE
  • FRAUD FIND FINANCIAL FRAUD DETECTION BY ANALYZING HUMAN BEHAVIOR
  • FRAUDVIS UNDERSTANDING UNSUPERVISED FRAUD DETECTION ALGORITHMS
  • TRAFFIC AND ENERGY AWARE ROUTING FOR HETEROGENEOUS WSN
  • ENERGY EFFICIENT LINK-DELAY AWARE ROUTING IN WIRELESS SENSOR NETWORKS
  • A LIGHTWEIGHT PRIVACY-PRESERVING AUTHENTICATION PROTOCOL FOR VANETS
  • AN INTEGRATED INDEXING AND SEARCH SERVICE FOR DISTRIBUTED FILE SYSTEM
  • A DEVELOPER CENTERED BUG PREDICTION MODEL
  • WEB BASED COLLABORATIVE BIG DATA ANALYTICS ON BIG DATA
  • LEVERAGING MAP REDUCE TO EFFICIENTLY EXTRACT ASSOCIATIONS BETWEEN BIOMEDICAL CONCEPTS FROM LARGE TEXT DATA
  • ACCOUNTTRADE ACCOUNTABILITY AGAINST DISHONEST BIG DATA BUYERS AND SELLERS
  • BIG DATA ANALYTICS FOR PROGRAM POPULARITY PREDICTION IN BROADCAST TV INDUSTRIES
  • A DATA ANALYTICAL APPROACH TO THE CYBERCRIME UNDERGROUND ECONOMY.
  • A MACHINE LEARNING MODEL FOR AVERAGE FUEL CONSUMPTION IN HEAVY VEHICLES
  • AUTOMATING E-GOVERNMENT SERVICES WITH ARTIFICIAL INTELLIGENCE
  • SECURING DATA WITH BLOCK CHAIN AND AI
  • TWITTER SENTIMENT ANALYSIS BASED ON ORDINAL REGRESSION
  • 5G-SMART DIABETES: TOWARD PERSONALIZED DIABETES DIAGNOSIS WITH HEALTHCARE BIG DATA CLOUDS
  • A DECISION TREE BASED RECOMMENDATION SYSTEM FOR TOURISTS
  • CREDIT CARD FRAUD DETECTION USING RANDOM FOREST & CART ALGORITHM
  • HOW DATA-DRIVEN ENTREPRENEUR ANALYZES IMPERFECT INFORMATION FOR BUSINESS OPPORTUNITY EVALUATION
  • MODELLING AND PREDICTING CYBER HACKING BREACHES
  • MULTI-TRAFFICSCENCE PERCEPTION BASED ON SUPERVISED LEARNING
  • PRICE BASED RESOURCE ALLOCATION FOR EDGE COMPUTING A MARKET EQUILIBRIUM APPROACH
  • RICH SHORT TEXT CONVERSATION USING SEMANTIC KEY CONTROLLED SEQUENCE GENERATION
  • ROBUST MALWARE DETECTION FOR IOT DEVICES USING DEEP EIGENSPACE LEARNING

SEMI-SUPERVISED MACHINE LEARNING APPROACH FOR DDOS DETECTION.

  • REDUCE THE AMOUNT OF PUSH NOTIFICATIONS REQUIRED FOR E-COMMERCE APPS
  • MULTIVIEW CLUSTERING WITH THE COOPERATION OF VISIBLE AND HIDDEN VIEWS
  • DATA MINING AND FEATURE ANALYSIS OF COLLEGE STUDENTS’ CAMPUS
  • PROTECTING YOUR SHOPPING PREFERENCE WITH DIFFERENTIAL PRIVACY
  • SECURING DATA IN INTERNET OF THINGS USING CRYPTOGRAPHY AND STEGANOGRAPHY TECHNIQUES
  • BENCHMARKING IMAGE RETRIEVAL DIVERSIFICATION TECHNIQUES FOR +SOCIAL MEDIA
  • VIRTUAL TOURIST GUIDE
  • SECURE KEYWORD SEARCH AND DATA SHARING MECHANISM FOR CLOUD COMPUTING
  • NETWORK REPRESENTATION LEARNING ENHANCED RECOMMENDATION ALGORITHM
  • ONLINE USER BEHAVIOUR ANALYSIS ON GRAPHICAL MODEL
  • EFFICIENT AND DEPLOYABLE CLICK FRAUD DETECTION FOR MOBILE APPLICATIONS
  • ANT COLONY STREAM CLUSTERING A FAST DENSITY CLUSTERING ALGORITHM FOR DYNAMIC DATA STREAMS
  • CRIME ANALYSIS MAPPING, INTRUSION DETECTION – USING DATA MINING
  • DETECTION OF CYBER HARASSERS ON SOCIAL MEDIA
  • ADAPTIVE DIFFUSION OF SENSITIVE INFORMATION IN ONLINE SOCIAL NETWORKS
  • IDENTITY-BASED ENCRYPTION TRANSFORMATION FOR FLEXIBLE SHARING OF ENCRYPTED DATA IN PUBLIC CLOUD
  • A DATA COMPRESSION AND STORAGE OPTIMIZATION FRAMEWORK
  • COVID TRACKING AND MIGRATION PERMISSION SYSTEM
  • PRIVACY AWARE PERSONAL DATA STORAGE PPDS LEARNING HOW TO PROTECT USER PRIVACY
  • LOAD BALANCING OPTIMIZATION IN CLOUD COMPUTING BASED ON TASK SCHEDULING
  • A SECURE ELLIPTIC CURVE CRYPTOGRAPHY BASED MUTAL AUTHENTICATION PROTOCAL FOR CLOUD-ASSISTED TMIS
  • PROTECTING USER DATA IN PROFILE-MATCHING SOCIAL NETWORKS
  • RATING SYSTEM FOR WORKER SATISFACTION
  • EFFICIENT RESOURCE ALLOCATION AND SCHEDULING
  • RESTRICTIVE AMBIGUITY AND ADD-ON ARCHITECTURE PROTOTYPE FOR PRIVACY PRESERVATION IN CLOUD AUDITING
  • A SECURE ENHANCED KEY-POLICY ATTRIBUTE-BASED TEMPORARY KEYWORD SEARCH SCHEME IN THE CLOUD
  • ANALYSIS ON MEDICINE AND DOCTOR AVAILABILITY IN GOVERNMENT HOSPITAL
  • A DATA ANALYTICS APPROACH TO THE CYBERCRIME UNDERGROUND ECONOMY
  • SCALABLE AND SECURE BIG DATA IOT SYSTEM BASED ON MULTIFACTOR AUTHENTICATION
  • VEHICLE MAINTENANCE
  • ENHANCING DATA SECURITY IN IOT HEALTHCARE SERVICES USING FOG COMPUTING
  • A SECURE SEARCHABLE ENCRYPTION FRAMEWORK
  • PRIVACY-PRESERVING EFFICIENT VERIFIABLE DEEP PACKET INSPECTION
  • MOVIE RECOMMENDATOIN SYSTEM
  • ANALYSIS OF DDOS ATTACK
  • IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING
  • CONDITIONAL IDENTITY-BASED BROADCAST PROXY RE-ENCRYPTION AND ITS APPLICATION TO CLOUD EMAIL
  • IMPLEMENTATION OF DATA MINING TECHNIQUES IN UPCODING FRAUD DETECTION IN THE MONETARY DOMAINS
  • DYNAMIC JOB ORDERING AND SLOT CONFIGURATIONS FOR MAP REDUCE WORKLOADS
  • CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION
  • ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES
  • ACCESS CONTROL BY SIGNATURE-KEYS TO PROVIDE PRIVACY FOR CLOUD AND BIG DATA
  • PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS IN CLOUD COMPUTING
  • PRIVACY-PRESERVING SEARCH OVER ENCRYPTED PERSONAL HEALTH RECORD IN MULTI-SOURCE CLOUD
  • PERFORMANCE-ORIENTED DEPLOYMENT OF STREAMING APPLICATIONS ON CLOUD
  • A SECURE ANTI-COLLUSION DATA SHARING SCHEME FOR DYNAMIC GROUPS IN THE CLOUD
  • IFCAAS: INFORMATION FLOW CONTROL AS A SERVICE FOR CLOUD SECURITY
  • PRIVACY-PRESERVING PUBLIC AUDITING FOR SHARED CLOUD DATA WITH SECURE GROUP MANAGEMENT
  • WEB CLOUD WEB BASED CLOUD STORAGE FOR SECURE DATA SHARING ACROSS PLATFORMS
  • A PROXY RE-ENCRYPTION APPROACH TO SECURE DATA SHARING IN THE INTERNET OF THINGS BASED ON BLOCK CHAIN
  • DYNAMIC CONTROL OF FRAUD INFORMATION SPREADING IN MOBILE SOCIAL NETWORKS
  • BOEW A CONTENT BASED IMAGE RETRIEVAL SCHEME USING BAG OF ENCRYPTED WORDS IN CLOUD COMPUTING
  • DESIGNING SECURE AND EFFICIENT BIOMETRIC-BASED SECURE ACCESS MECHANISM FOR CS
  • DSAS A SECURE DATA SHARING AND AUTHORIZED SEARCHABLE FRAMEWORK FOR E-HEALTHCARE SYSTEM
  • A NOVEL FEATURE MATCHING RANKED SEARCH MECHANISM OVER ENCRYPTED CLOUD DATA
  • IDENTITY-BASED ENCRYPTION TRANSFORMATION FOR FLEXIBLE SHARING OF ENCRYPTED DATA IN PUBLIC CLOUD
  • PAY AS YOU DECRYPT DECRYPTION OUTSOURCING FOR FUNCTIONAL ENCRYPTION USING BLOCK CHAIN
  • PRIVACY-PRESERVING EFFICIENT VERIFIABLE DEEP PACKET INSPECTION
  • PROACTIVE FAULT-TOLERANCE TECHNIQUE TO ENHANCE RELIABILITY OF CLOUD SERVICE IN CLOUD FEDERATION ENVIRONMENT
  • PROTECTING YOUR SHOPPING PREFERENCE WITH DIFFERENTIAL PRIVACY
  • REPRESENTING FINE GRAINED CO-OCCURRENCES FOR BEHAVIOR BASED FRAUD DETECTION
  • SCALABLE AND ADAPTIVE DATA REPLICA PLACEMENT FOR GEO-DISTRIBUTED CLOUD STORAGES
  • SECURE CLOUD STORAGE WITH DATA DYNAMICS USING SECURE NETWORK CODING TECHNIQUES
  • SECURE DATA TRANSFER AND DELETION FROM COUNTING BLOOM FILTER IN CLOUD COMPUTING
  • SECURE KEYWORD SEARCH AND DATA SHARING MECHANISM FOR CLOUD COMPUTING
  • SIMILARITY SEARCH FOR ENCRYPTED IMAGES IN SECURE CLOUD COMPUTING
  • A VERIFIABLE SEMANTIC SEARCHING SCHEME BY OPTIMAL MATCHING OVER ENCRYPTED DATA IN PUBLIC CLOUD
  • PRIVACY PRESERVING AND QUALITY-AWARE INCENTIVE MECHANISM FOR MOBILE CROWD SENSING
  • PRIVACY-PRESERVING MEDICAL TREATMENT SYSTEM THROUGH NONDETERMINISTIC FINITE AUTOMATA
  • PUBLICLY VERIFIABLE SHARED DYNAMIC ELECTRONIC HEALTH RECORD DATABASES
  • SECURING RESOURCES IN DECENTRALIZED CLOUD STORAGE
  • SEMANTICS OF DATA MINING SERVICES IN CLOUD COMPUTING
  • SECURE STORAGE AUDITING WITH EFFICIENT KEY UPDATES
  • PUBLICLY VERIFIABLE SHARED DYNAMIC ELECTRONIC HEALTH RECORD DATABASES
  • ENABLING IDENTITY-BASED INTEGRITY AUDITING AND DATA
  • EFFICIENT RESOURCE ALLOCATION FOR TASK SCHEDULING IN CLOUD COMPUTING
  • DYNAMIC MULTI-KEYWORD RANKED SEARCH BASED ON BLOOM FILTER
  • VERIFIABLE AND MULTI KEYWORD SEARCHABLE ATTRIBUTE BASED ENCRYPTION SCHEME FOR CLOUD
  • A PRACTICAL PUBLIC KEY ENCRYPTION SCHEME BASED ON LEARNING PARITY WITH NOISE
  • PRIVACY AWARE PERSONAL DATA STORAGE PPDS LEARNING HOW TO PROTECT USER PRIVACY
  • A SECURE ELLIPTIC CURVE CRYPTOGRAPHY BASED MUTUAL AUTHENTICATION PROTOCOL FOR CLOUD ASSISTED TMIS
  • A SECURE SEARCHABLE ENCRYPTION FRAMEWORK FOR PRIVACY-CRITICAL CLOUD STORAGE SERVICES
  • PROFIT MAXIMIZATION FOR CLOUD BROKERS IN CLOUD COMPUTING
  • HIDDEN CIPHERTEXT POLICY ATTRIBUTE-BASED ENCRYPTION WITH FAST DECRYPTION FOR PERSONAL HEALTH RECORD SYSTEM
  • SECURE DATA GROUP SHARING AND CONDITIONAL DISSEMINATION WITH MULTI-OWNER IN CLOUD COMPUTING
  • CRYPTOGRAPHICALLY ENFORCED DYNAMIC ACCESS CONTROL IN THE CLOUD
  • ADAPTIVE RESOURCE MANAGEMENT FOR ANALYZING VIDEO STREAMS FROM GLOBALLY DISTRIBUTED NETWORK CAMERAS
  • AN APPROACH TO BALANCE MAINTENANCE COSTS AND ELECTRICITY CONSUMPTION IN CLOUD DATA CENTERS
  • A POWER-OF-TWO CHOICES BASED ALGORITHM FOR FOG COMPUTING
  • PROVABLY SECURE AND LIGHTWEIGHT IDENTITY BASED AUTHENTICATED DATA SHARING PROTOCOL
  • EFFICIENT RETRIEVAL OVER DOCUMENTS ENCRYPTED BY ATTRIBUTES IN CLOUD COMPUTING
  • AN EFFICIENT AND SECURED FRAMEWORK FOR MOBILE CLOUD COMPUTING
  • A KEY-POLICY ATTRIBUTE-BASED TEMPORARY KEYWORD SEARCH SCHEME FOR SECURE CLOUD STORAGE
  • AN EFFICIENT AND PRIVACY-PRESERVING BIOMETRIC IDENTIFICATION SCHEME IN CLOUD COMPUTING
  • CHAOTIC SEARCHABLE ENCRYPTION FOR MOBILE CLOUD STORAGE
  • EFFICIENT TRACEABLE AUTHORIZATION SEARCH SYSTEM FOR SECURE CLOUD STORAGE
  • AN EFFICIENT AND SECURE DEDUPLICATION SCHEME FOR CLOUD-ASSISTED EHEALTH SYSTEMS
  • SECURE FILE STORAGE IN CLOUD COMPUTING USING HYBRID CRYPTOGRAPHY ALGORITHM
  • DIVISION AND REPLICATION OF DATA IN CLOUD FOR OPTIMAL PERFORMANCE AND SECURITY
  • EMOTION RECOGNITION ON TWITTER COMPARATIVE STUDY AND TRAINING A UNISON MODEL
  • A KEY-POLICY ATTRIBUTE-BASED TEMPORARY KEYWORD SEARCH SCHEME FOR SECURE CLOUD STORAGE
  • KEYD SECURE KEY-DEDUPLICATION WITH IDENTITY-BASED BROADCAST ENCRYPTION
  • EFFICIENT PRIVACY-AWARE AUTHENTICATION SCHEME FOR MOBILE
  • SESPHR A METHODOLOGY FOR SECURE SHARING OF PERSONAL HEALTH RECORDS
  • ADVANCED SECURITY IN CLOUD COMPUTING OF MILITARY WEAPONS.
  • DEVELOPMENT AND EXAMINATION OF FOG COMPUTING BASED ENCRYPTED CONTROL SYSTEM
  • ON-THE-FLY PRIVACY FOR LOCATION HISTOGRAMS
  • ANALYZING PRODUCT USAGE BASED ON TWITTER USERS BASED ON DATA MINING PROCESS
  • BIG DATA ANALYTICS OF GEOSOCIAL MEDIA FOR PLANNING AND REAL-TIME DECISIONS
  • CREDIT CARD TRANSACTIONS DATA ADVERSARIAL AUGMENTATION IN THE FREQUENCY DOMAIN
  • CRIME ANALYSIS MAPPING, INTRUSION DETECTION – USING DATA MINING
  • DATA MINING AND FEATURE ANALYSIS OF COLLEGE STUDENTS’ CAMPUS NETWORK BEHAVIOR
  • MULTI VIEW CLUSTERING WITH THE COOPERATION OF VISIBLE AND HIDDEN VIEWS
  • FUZZY K-MEANS CLUSTERING WITH DISCRIMINATIVE EMBEDDING
  • EFFECTIVE KEYWORD SEARCH OVER WEIGHTED GRAPHS
  • ANT COLONY STREAM CLUSTERING A FAST DENSITY CLUSTERING ALGORITHM FOR DYNAMIC DATA STREAMS
  • TOWARD EFFECTIVE COLLABORATIVE FILTERING USING UNINTERESTING ITEMS
  • CO-DETECT FINANCIAL FRAUD DETECTION WITH ANOMALY FEATURE DETECTION
  • A WEIGHTED FREQUENT ITEM SET MINING ALGORITHM
  • PRIVACY CHARACTERIZATION AND QUANTIFICATION IN DATA PUBLISHING
  • STOCK MARKET ANALYSIS AND PREDICTION
  • PREDICTABILITY AND PREDICTION OF HUMAN MOBILITY BASED ON APPLICATION-COLLECTED LOCATION DATA
  • COMPOSITE BEHAVIORAL MODELING FOR IDENTITY THEFT DETECTION IN ONLINE SOCIAL NETWORKS
  • DETECTING AND CHARACTERIZING EXTREMIST REVIEWER GROUPS IN ONLINE PRODUCT REVIEWS
  • PROTECTING USER DATA IN PROFILE MATCHING SOCIAL NETWORKS
  • TRUST-BASED VIDEO MANAGEMENT FRAMEWORK FOR SOCIAL MULTIMEDIA NETWORKS
  • USER BEHAVIOR PREDICTION OF SOCIAL HOTSPOTS
  • AN EFFICIENT SECURE ELECTRONIC PAYMENT SYSTEM FOR E-COMMERCE
  • FAKE NEWS, DISINFORMATION, AND DEEP FAKES: LEVERAGING DISTRIBUTED LEDGER TECHNOLOGIES AND BLOCKCHAIN TO COMBAT DIGITAL DECEPTION AND COUNTERFEIT REALITY
  • DETECTING MALICIOUS SOCIAL BOTS BASED ON CLICK STREAM SEQUENCES
  • PREDICTING CYBER BULLYING ON SOCIAL MEDIA IN THE BIG DATA ERA USING MACHINE LEARNING ALGORITHMS REVIEW OF LITERATURE AND OPEN CHALLENGES
  • SPAMMER DETECTION AND FAKE USER IDENTIFICATION ON SOCIAL NETWORKS
  • TOWARDS ROBUST IMAGE STEGANOGRAPHY
  • ONLINE PUBLIC SHAMING ON TWITTER DETECTION, ANALYSIS AND MITIGATION
  • SOCIAL NETWORK RUMOR DIFFUSION PREDICATION BASED ON EQUAL RESPONSIBILITY GAME MODEL
  • RETRIEVING HIDDEN FRIENDS A COLLUSION PRIVACY ATTACK AGAINST ONLINE FRIEND SEARCH ENGINE
  • A HIERARCHICAL ATTENTION MODEL FOR SOCIAL CONTEXTUAL
  • MINING USERS TRUST FROM E-COMMERCE REVIEWS BASED ON SENTIMENT SIMILARITY ANALYSIS
  • RISK ASSESSMENT IN SOCIAL NETWORKS BASED ON USER ANOMALOUS BEHAVIORS
  • HEALTH MONITORING ON SOCIAL MEDIA OVER TIME
  • A COMPREHENSIVE STUDY ON SOCIAL NETWORK
  • ADAPTIVE DIFFUSION OF SENSITIVE INFORMATION IN ONLINE SOCIAL NETWORKS
  • ANALYZING AND DETECTING MONEY-LAUNDERING ACCOUNTS IN ONLINE SOCIAL NETWORKS
  • BENCHMARKING IMAGE RETRIEVAL DIVERSIFICATION TECHNIQUES FOR SOCIAL MEDIA
  • DETECTION OF SUICIDE-RELATED POSTS IN TWITTER DATA STREAMS
  • HATE SPEECH ON TWITTER A PRAGMATIC APPROACH TO COLLECT HATEFUL AND OFFENSIVE EXPRESSIONS AND PERFORM HATE SPEECH DETECTION

AN ONLINE SOCIAL NETWORK BASED QUESTION AND ANSWER SYSTEM

  • IMAGE FORGERY DETECTION BASED ON FUSION OF LIGHTWEIGHT DEEP LEARNING MODELS
  • VIDEO-BASED ABNORMAL DRIVING BEHAVIOR DETECTION VIA DEEP LEARNING FUSIONS
  • A DEEP LEARNING FACIAL EXPRESSION RECOGNITION BASED SCORING SYSTEM FOR RESTAURANTS
  • BIRD SPECIES IDENTIFICATION USING DEEP LEARNING
  • FAKE CURRENCY DETECTION USING IMAGE PROCESSING.
  • SIGN LANGUAGE RECOGNITION USING CNN
  • IMAGE CLASSIFICATION USING CNN (CONVOLUTION NEURAL NETWORKS) ALGORITHM
  • USE OF ARTIFICIAL NEURAL NETWORKS TO IDENTIFY FAKE PROFILES