Professional Documents
Culture Documents
MINING
29 VSJ1629 Booster in High Dimensional Data Classification DATA JAVA
MINING
30 VSJ1630 Building an intrusion detection system using a filter-based feature DATA JAVA
selection algorithm MINING
31 VSJ1631 Connecting Social Media to E-Commerce: Cold-Start Product DATA JAVA
Recommendation Using Microblogging Information MINING
32 VSJ1632 Cross-Domain Sentiment Classification Using Sentiment Sensitive Data Mining JAVA
Embeddings
33 VSJ1633 Crowdsourcing for Top-K Query Processing over Uncertain Data DATA JAVA
MINING
34 VSJ1634 Cyberbullying Detection based on Semantic-Enhanced Marginalized DATA JAVA
Denoising Auto-Encoder MINING
35 VSJ1635 Domain-Sensitive Recommendation with User-Item Subgroup Analysis DATA JAVA
MINING
36 VSJ1636 Efficient Algorithms for Mining Top-K High Utility Itemsets DATA JAVA
MINING
37 VSJ1637 Efficient Cache-Supported Path Planning on Roads DATA JAVA
MINING
38 VSJ1638 Mining User-Aware Rare Sequential Topic Patterns in Document DATA JAVA
Streams MINING
39 VSJ1639 Nearest Keyword Set Search in Multi-Dimensional Datasets DATA JAVA
MINING
40 VSJ1640 Rating Prediction based on Social Sentiment from Textual Reviews DATA JAVA
MINING
41 VSJ1641 Location Aware Keyword Query Suggestion Based on Document DATA JAVA
Proximity MINING
42 VSJ1642 Using Hashtag Graph-based Topic Model to Connect Semantically- DATA JAVA
related Words without Co-occurrence in Microblogs MINING
43 VSJ1643 Quantifying Political Leaning from Tweets, Retweets, and Retweeters DATA JAVA
MINING
44 VSJ1644 Relevance Feedback Algorithms Inspired By Quantum Detection DATA JAVA
MINING
45 VSJ1645 Sentiment Embeddings with Applications to Sentiment Analysis DATA JAVA
MINING
46 VSJ1648 Top-k Dominating Queries on Incomplete Data DATA JAVA
MINING
47 VSJ1650 A Stable Approach for Routing Queries in Unstructured P2P Networks NETWORKIN JAVA
G
48 VSJ1651 iPath: Path Inference in Wireless Sensor Networks NETWORKIN JAVA
G
49 VSJ1652 Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc NETWORKIN JAVA
Networks G
50 VSJ1653 Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks NETWORKIN JAVA
G
51 VSJ1654 STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users NETWORKIN JAVA
G
52 VSJ1655 Energy and Memory Efficient Clone Detection in Wireless Sensor MOBILE JAVA
Networks COMPUTING
53 VSJ1656 EPLQ: Efficient Privacy-Preserving Location-Based Query Over MOBILE JAVA
Outsourced Encrypted Data COMPUTING
54 VSJ1657 Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Mobile JAVA
Optimization Approach Computing
55 VSJ1658 Detecting Node Failures in Mobile Wireless Networks: A Probabilistic MOBILE JAVA
Approach COMPUTING
56 VSJ1659 A Hop-by-Hop Routing Mechanism for Green Internet Parallel & JAVA
Distributed
IEEE 2016 PROJECTS LIST
Systems
57 VSJ1660 Continuous Answering Holistic Queries over Sensor Networks Parallel & JAVA
Distributed
Systems
58 VSJ1661 Dictionary Based Secure Provenance Compression for Wireless Sensor PARALLEL & JAVA
Networks DISTRIBUTE
D SYSTEMS
59 VSJ1663 Contributory Broadcast Encryption with Efficient Encryption and Short SECURE JAVA
Ciphertexts COMPUTING
60 VSJ1664 Data Lineage in Malicious Environments SECURE JAVA
COMPUTING
61 VSJ1665 Detecting Malicious Facebook Applications SECURE JAVA
COMPUTING
62 VSJ1666 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments SECURE JAVA
COMPUTING
63 VSJ1667 Inference Attack on Browsing History of Twitter Users Using Public SECURE JAVA
Click Analytics and Twitter Metadata COMPUTING
64 VSJ1668 Resolving Multi-party Privacy Conflicts in Social Media SECURE JAVA
COMPUTING
65 VSJ1669 Hidden Ciphertext Policy Attribute-Based SECURE JAVA
Encryption Under Standard Assumptions COMPUTING
66 VSJ1670 Optimized Search-and-Compute Circuits and Their Application to Query Information JAVA
Evaluation on Encrypted Data Forensics &
Security
67 VSJ1672 Profiling Online Social Behaviors for Compromised Account Detection Information JAVA
Forensics &
Security
68 VSJ1673 A Locality Sensitive Low-Rank Model for Image Tag Completion IMAGE JAVA
PROCESSING
69 VSJ1674 A Scalable Approach for Content-Based Image Retrieval in Peer- to- IMAGE JAVA
Peer Networks PROCESSING
70 VSJ1676 Online Multi-Modal Distance Metric Learning with Application to IMAGE JAVA
Image Retrieval PROCESSING
71 VSJ1677 Tag Based Image Search by Social Re-ranking IMAGE JAVA
PROCESSING
72 VSJ1680 Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine- SOFTWARE JAVA
Grained Benchmark, and Feature Evaluation ENGINEERIN
G
73 VSJ1684 Malware Detection in Cloud Computing Secure JAVA
Infrastructures Computing
74 VSJ1685 Two-Factor Data Security Protection Mechanism Cloud JAVA
for Cloud Storage System Computing
75 VSJ1686 Attribute Based Data Sharing Scheme Revisited in Cloud Computing Cloud JAVA
Computing
76 VSJ1683 Answering Approximate Queries Over XML Data Fuzzy Systems JAVA
77 VSJ1687 Leveraging Data Deduplication to Improve the Performance of Primary Cloud JAVA
Storage Systems in the Cloud Computing
78 VSJ1688 Encrypted Data Management with Deduplication in Cloud Computing Cloud JAVA
Computing
79 VSJ1689 ID2S Password-Authenticated Key Exchange Protocols Secure JAVA
Computing
80 VSJ1690 Crawling Hidden Objects with kNN Queries DATA JAVA
MINING
Computing
82 VSJ1692 Merlin: Exploratory Analysis with Imprecise Queries DAT MINING JAVA
84 VSD1601 A Secure and Dynamic Multi-Keyword Ranked Search Scheme over CLOUD .NET
Encrypted Cloud Data COMPUTING
85 VSD1602 Catch You if You Misbehave: Ranked Keyword Search Results Cloud .NET
Verification in Cloud Computing Computing
88 VSD1608 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Cloud .NET
Updates Computing
89 VSD1609 Fine-Grained Two-Factor Access Control for Web-Based Cloud Cloud .NET
Computing Services Computing
90 VSD1610 Identity-Based Proxy-Oriented Data Uploading and Remote Data Cloud .NET
Integrity Checking in Public Cloud Computing
93 VSD1616 Practical Approximate k Nearest Neighbor Queries with Location and DATA .NET
Query Privacy MINING
95 VSD1618 User-Service Rating Prediction by Exploring Social Users Rating DATA .NET
Behaviors MINING
96 VSD1619 Efficient Certificate less Access Control for Wireless Body Area Networking .NET
Networks
97 VSD1621 Geographic and Opportunistic Routing for Underwater Sensor Networks Networking .NET
98 VSD1622 Optimizing Cost for Online Social Networks on Geo-Distributed Clouds Networking .NET
99 VSD1623 Secure and Efficient data communication protocol for Wireless Body NETWORKIN .NET
Area Networks G
100 VSD1624 A Joint Time Synchronization and Localization Design for Mobile Mobile .NET
Underwater Sensor Networks Computing
101 VSD1626 Service Usage Classification with Encrypted Internet Traffic in Mobile Mobile .NET
Messaging Apps Computing
IEEE 2016 PROJECTS LIST
102 VSD1627 Traffic Decorrelation Techniques for Countering a Global Eavesdropper Mobile .NET
in WSNs Computing
103 VSD1631 Detecting and Removing Web Application Vulnerabilities with Static Secure .NET
Analysis and Data Mining Computing
105 VSD1635 Secure Reversible Image Data Hiding over Encrypted Domain via Key Image .NET
Modulation Processing
106 VSD1637 EPLQ: Efficient Privacy-Preserving Location-Based Query Over Iot .NET
Outsourced Encrypted Data (INTERNET
OF THINGS)