You are on page 1of 5

IEEE 2016 PROJECTS LIST

S. No. Code IEEE 2016 Project Titles Domain Tech


1 VSJ1601 A Secure and Dynamic Multi-Keyword Ranked Search Scheme over CLOUD JAVA
Encrypted Cloud Data COMPUTING
2 VSJ1602 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in CLOUD JAVA
the Cloud COMPUTING
3 VSJ1603 An Efficient File Hierarchy Attribute-Based CLOUD JAVA
Encryption Scheme in Cloud Computing COMPUTING
4 VSJ1604 An Efficient Privacy-Preserving Ranked Keyword Search Method CLOUD JAVA
COMPUTING
5 VSJ1605 CDA Generation and Integration for Health Information Exchange CLOUD JAVA
Based on Cloud Computing System COMPUTING
6 VSJ1606 Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with CLOUD JAVA
Verifiable Delegation in Cloud Computing COMPUTING
7 VSJ1607 CloudArmor: Supporting Reputation-Based Trust Management for CLOUD JAVA
Cloud Services COMPUTING
8 VSJ1608 Conditional Identity-Based Broadcast Proxy Re-Encryption and Its CLOUD JAVA
Application to Cloud Email COMPUTING
9 VSJ1609 Conjunctive Keyword Search With Designated Tester and Timing CLOUD JAVA
Enabled Proxy Re-Encryption Function for E-Health Clouds COMPUTING
10 VSJ1610 DiploCloud: Efficient and Scalable Management of RDF Data in the CLOUD JAVA
Cloud COMPUTING
11 VSJ1611 Dual-Server Public-Key Encryption With Keyword Search for CLOUD JAVA
COMPUTING
12 VSJ1612 Dynamic and Public Auditing with Fair Arbitration for Cloud Data CLOUD JAVA
COMPUTING
13 VSJ1613 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key CLOUD JAVA
Updates COMPUTING
14 VSJ1614 Fine-Grained Two-Factor Access Control for Web-Based Cloud CLOUD JAVA
Computing Services COMPUTING
15 VSJ1615 Geometric Range Search on Encrypted Spatial Data CLOUD JAVA
COMPUTING
16 VSJ1616 Identity-Based Encryption with Cloud Revocation Authority and Its CLOUD JAVA
Applications COMPUTING
17 VSJ1617 Identity-Based Proxy-Oriented Data Uploading and Remote Data CLOUD JAVA
Integrity Checking in Public Cloud COMPUTING
18 VSJ1618 Protecting Your Right: Verifiable Attribute-Based Parallel & JAVA
Keyword Search with Fine-Grained Owner-Enforced Search Distributed
Authorization in the Cloud Systems
19 VSJ1619 Real-Time Semantic Search Using Approximate Methodology for Cloud JAVA
Large-Scale Storage Systems Computing
20 VSJ1620 Secure Data Sharing in Cloud Computing Using Revocable-Storage CLOUD JAVA
Identity-Based Encryption COMPUTING
21 VSJ1621 Secure Optimization Computation Outsourcing in Cloud Computing: A CLOUD JAVA
Case Study of Linear Programming COMPUTING
22 VSJ1622 TMACS: A Robust and Verifiable Threshold Multi-Authority Access CLOUD JAVA
Control System in Public Cloud Storage COMPUTING
23 VSJ1623 A Modified Hierarchical Attribute-Based Encryption Access Control CLOUD JAVA
Method for Mobile Cloud Computing COMPUTING
24 VSJ1624 DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User CLOUD JAVA
Environments COMPUTING
25 VSJ1625 Flexible and Fine-Grained Attribute-Based Data Storage in Cloud CLOUD JAVA
Computing COMPUTING
26 VSJ1626 SecRBAC: Secure data in the Clouds SERVICE JAVA
COMPUTING
27 VSJ1627 A Novel Recommendation Model Regularized DATA JAVA
with User Trust and Item Ratings MINING
28 VSJ1628 Automatically Mining Facets for Queries from Their Search Results DATA JAVA
IEEE 2016 PROJECTS LIST

MINING
29 VSJ1629 Booster in High Dimensional Data Classification DATA JAVA
MINING
30 VSJ1630 Building an intrusion detection system using a filter-based feature DATA JAVA
selection algorithm MINING
31 VSJ1631 Connecting Social Media to E-Commerce: Cold-Start Product DATA JAVA
Recommendation Using Microblogging Information MINING
32 VSJ1632 Cross-Domain Sentiment Classification Using Sentiment Sensitive Data Mining JAVA
Embeddings
33 VSJ1633 Crowdsourcing for Top-K Query Processing over Uncertain Data DATA JAVA
MINING
34 VSJ1634 Cyberbullying Detection based on Semantic-Enhanced Marginalized DATA JAVA
Denoising Auto-Encoder MINING
35 VSJ1635 Domain-Sensitive Recommendation with User-Item Subgroup Analysis DATA JAVA
MINING
36 VSJ1636 Efficient Algorithms for Mining Top-K High Utility Itemsets DATA JAVA
MINING
37 VSJ1637 Efficient Cache-Supported Path Planning on Roads DATA JAVA
MINING
38 VSJ1638 Mining User-Aware Rare Sequential Topic Patterns in Document DATA JAVA
Streams MINING
39 VSJ1639 Nearest Keyword Set Search in Multi-Dimensional Datasets DATA JAVA
MINING
40 VSJ1640 Rating Prediction based on Social Sentiment from Textual Reviews DATA JAVA
MINING
41 VSJ1641 Location Aware Keyword Query Suggestion Based on Document DATA JAVA
Proximity MINING
42 VSJ1642 Using Hashtag Graph-based Topic Model to Connect Semantically- DATA JAVA
related Words without Co-occurrence in Microblogs MINING
43 VSJ1643 Quantifying Political Leaning from Tweets, Retweets, and Retweeters DATA JAVA
MINING
44 VSJ1644 Relevance Feedback Algorithms Inspired By Quantum Detection DATA JAVA
MINING
45 VSJ1645 Sentiment Embeddings with Applications to Sentiment Analysis DATA JAVA
MINING
46 VSJ1648 Top-k Dominating Queries on Incomplete Data DATA JAVA
MINING
47 VSJ1650 A Stable Approach for Routing Queries in Unstructured P2P Networks NETWORKIN JAVA
G
48 VSJ1651 iPath: Path Inference in Wireless Sensor Networks NETWORKIN JAVA
G
49 VSJ1652 Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc NETWORKIN JAVA
Networks G
50 VSJ1653 Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks NETWORKIN JAVA
G
51 VSJ1654 STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users NETWORKIN JAVA
G
52 VSJ1655 Energy and Memory Efficient Clone Detection in Wireless Sensor MOBILE JAVA
Networks COMPUTING
53 VSJ1656 EPLQ: Efficient Privacy-Preserving Location-Based Query Over MOBILE JAVA
Outsourced Encrypted Data COMPUTING
54 VSJ1657 Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Mobile JAVA
Optimization Approach Computing
55 VSJ1658 Detecting Node Failures in Mobile Wireless Networks: A Probabilistic MOBILE JAVA
Approach COMPUTING
56 VSJ1659 A Hop-by-Hop Routing Mechanism for Green Internet Parallel & JAVA
Distributed
IEEE 2016 PROJECTS LIST

Systems
57 VSJ1660 Continuous Answering Holistic Queries over Sensor Networks Parallel & JAVA
Distributed
Systems
58 VSJ1661 Dictionary Based Secure Provenance Compression for Wireless Sensor PARALLEL & JAVA
Networks DISTRIBUTE
D SYSTEMS
59 VSJ1663 Contributory Broadcast Encryption with Efficient Encryption and Short SECURE JAVA
Ciphertexts COMPUTING
60 VSJ1664 Data Lineage in Malicious Environments SECURE JAVA
COMPUTING
61 VSJ1665 Detecting Malicious Facebook Applications SECURE JAVA
COMPUTING
62 VSJ1666 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments SECURE JAVA
COMPUTING
63 VSJ1667 Inference Attack on Browsing History of Twitter Users Using Public SECURE JAVA
Click Analytics and Twitter Metadata COMPUTING
64 VSJ1668 Resolving Multi-party Privacy Conflicts in Social Media SECURE JAVA
COMPUTING
65 VSJ1669 Hidden Ciphertext Policy Attribute-Based SECURE JAVA
Encryption Under Standard Assumptions COMPUTING
66 VSJ1670 Optimized Search-and-Compute Circuits and Their Application to Query Information JAVA
Evaluation on Encrypted Data Forensics &
Security
67 VSJ1672 Profiling Online Social Behaviors for Compromised Account Detection Information JAVA
Forensics &
Security
68 VSJ1673 A Locality Sensitive Low-Rank Model for Image Tag Completion IMAGE JAVA
PROCESSING
69 VSJ1674 A Scalable Approach for Content-Based Image Retrieval in Peer- to- IMAGE JAVA
Peer Networks PROCESSING
70 VSJ1676 Online Multi-Modal Distance Metric Learning with Application to IMAGE JAVA
Image Retrieval PROCESSING
71 VSJ1677 Tag Based Image Search by Social Re-ranking IMAGE JAVA
PROCESSING
72 VSJ1680 Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine- SOFTWARE JAVA
Grained Benchmark, and Feature Evaluation ENGINEERIN
G
73 VSJ1684 Malware Detection in Cloud Computing Secure JAVA
Infrastructures Computing
74 VSJ1685 Two-Factor Data Security Protection Mechanism Cloud JAVA
for Cloud Storage System Computing
75 VSJ1686 Attribute Based Data Sharing Scheme Revisited in Cloud Computing Cloud JAVA
Computing
76 VSJ1683 Answering Approximate Queries Over XML Data Fuzzy Systems JAVA

77 VSJ1687 Leveraging Data Deduplication to Improve the Performance of Primary Cloud JAVA
Storage Systems in the Cloud Computing
78 VSJ1688 Encrypted Data Management with Deduplication in Cloud Computing Cloud JAVA
Computing
79 VSJ1689 ID2S Password-Authenticated Key Exchange Protocols Secure JAVA
Computing
80 VSJ1690 Crawling Hidden Objects with kNN Queries DATA JAVA
MINING

81 VSJ1691 Achieving Flatness: Selecting the Honeywords Secure JAVA


from Existing User Passwords
IEEE 2016 PROJECTS LIST

Computing

82 VSJ1692 Merlin: Exploratory Analysis with Imprecise Queries DAT MINING JAVA

83 VSJ1693 Providing User Security Guarantees in Public Cloud JAVA


Infrastructure Clouds Computing

84 VSD1601 A Secure and Dynamic Multi-Keyword Ranked Search Scheme over CLOUD .NET
Encrypted Cloud Data COMPUTING

85 VSD1602 Catch You if You Misbehave: Ranked Keyword Search Results Cloud .NET
Verification in Cloud Computing Computing

86 VSD1603 Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Cloud .NET


Verifiable Delegation in Cloud Computing Computing

87 VSD1607 Enabling Cloud Storage Auditing with Verifiable Information .NET


Outsourcing of Key Updates Security

88 VSD1608 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Cloud .NET
Updates Computing

89 VSD1609 Fine-Grained Two-Factor Access Control for Web-Based Cloud Cloud .NET
Computing Services Computing

90 VSD1610 Identity-Based Proxy-Oriented Data Uploading and Remote Data Cloud .NET
Integrity Checking in Public Cloud Computing

91 VSD1611 Leveraging Data Deduplication to Improve the Performance of Cloud .NET


Primary Storage Systems in the Cloud Computing

92 VSD1615 Personalized Travel Sequence Recommendation on Multi-Source Big DATA .NET


Social Media MINING

93 VSD1616 Practical Approximate k Nearest Neighbor Queries with Location and DATA .NET
Query Privacy MINING

94 VSD1617 Text Mining the Contributors to Rail Accidents DATA .NET


MINING

95 VSD1618 User-Service Rating Prediction by Exploring Social Users Rating DATA .NET
Behaviors MINING

96 VSD1619 Efficient Certificate less Access Control for Wireless Body Area Networking .NET
Networks

97 VSD1621 Geographic and Opportunistic Routing for Underwater Sensor Networks Networking .NET

98 VSD1622 Optimizing Cost for Online Social Networks on Geo-Distributed Clouds Networking .NET

99 VSD1623 Secure and Efficient data communication protocol for Wireless Body NETWORKIN .NET
Area Networks G

100 VSD1624 A Joint Time Synchronization and Localization Design for Mobile Mobile .NET
Underwater Sensor Networks Computing

101 VSD1626 Service Usage Classification with Encrypted Internet Traffic in Mobile Mobile .NET
Messaging Apps Computing
IEEE 2016 PROJECTS LIST

102 VSD1627 Traffic Decorrelation Techniques for Countering a Global Eavesdropper Mobile .NET
in WSNs Computing

103 VSD1631 Detecting and Removing Web Application Vulnerabilities with Static Secure .NET
Analysis and Data Mining Computing

104 VSD1632 ID2S Password-Authenticated Key Exchange Protocols Secure .NET


Computing

105 VSD1635 Secure Reversible Image Data Hiding over Encrypted Domain via Key Image .NET
Modulation Processing

106 VSD1637 EPLQ: Efficient Privacy-Preserving Location-Based Query Over Iot .NET
Outsourced Encrypted Data (INTERNET
OF THINGS)

You might also like