S.No |
Name |
1 |
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing |
2 |
Secure Keyword Search and Data Sharing Mechanism for Cloud Computing |
3 |
Verifiable and Multi Keyword Searchable Attribute Based Encryption Scheme for Cloud Storage |
4 |
Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing |
5 |
A Distributed Publisher-Driven Secure Data Sharing Scheme for Information-Centric IoT |
6 |
Performance and power consumption evaluation in smart phone based image processing for medical applications |
7 |
Filtering Instagram hash tags through crowd tagging and the HITS algorithm |
8 |
Cloud Data Protection for the Masses |
9 |
Adaptive Resource Management for Analyzing Video Streams from Globally Distributed Network Cameras |
10 |
Social Network Rumor Diffusion Predication Based on Equal Responsibility Game Model |
11 |
Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques |
12 |
Retrieving Hidden Friends A Collusion Privacy Attack Against Online Friend Search Engine |
13 |
Predicting Cyber bullying on Social Media in the Big Data Era Using Machine Learning Algorithms |
14 |
Online Public Shaming on Twitter Detection Analysis and Mitigation |
15 |
Hidden Cipher text Policy Attribute-Based Encryption with Fast Decryption for Personal Health Record System |
16 |
Hate Speech on Twitter A Pragmatic Approach to Collect Hateful and Offensive Expressions and Perform Hate Speech Detection |
17 |
Follow But No Track Privacy Preserved Profile Publishing in Cyber-Physical Social Systems |
18 |
Detecting Malicious Social Bots Based on Clickstream Sequences |
19 |
DCCR Deep Collaborative Conjunctive Recommender for Rating Prediction |
20 |
Crypt-DAC Cryptographically Enforced Dynamic Access Control in the Cloud |
21 |
Combining Data Owner-Side and Cloud-Side Access Control for Encrypted Cloud Storage |
22 |
Automated Phrase Mining from Massive Text Corpora |
23 |
An Approach to Balance Maintenance Costs and Electricity Consumption in Cloud Data Centers |
24 |
A Hierarchical Attention Model for Social Contextual Image Recommendation |
25 |
A Credibility Analysis System for Assessing Information on Twitter |
26 |
Authentication by Encrypted Negative Password |
27 |
ActiveTrust Secure and Trustable Routing in Wireless Sensor Networks |
28 |
User Vitality Ranking and Prediction in Social Networking Servicesa Dynamic Network Perspective |
29 |
Traffic and Energy Aware Routing for Heterogeneous Wireless Sensor Networks |
30 |
Toward Shared Ownership in the Cloud |
31 |
The Server Provisioning Problem for Continuous Distributed Interactive Applications |
32 |
Tag Based Image Search by Social Re-ranking |
33 |
SUPERMAN Security Using Pre-Existing Routing for Mobile Ad hoc Networks |
34 |
Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks |
35 |
SociRank Identifying and Ranking Prevalent News Topics Using Social Media Factors |
36 |
SeSPHR A Methodology for Secure Sharing of Personal Health Records in the Cloud |
37 |
Securing Aggregate Queries for DNA Databases |
38 |
Secure Range Search over Encrypted Uncertain loT Outsourced Data |
39 |
SDE A Novel Clustering Framework Based on Sparsity-Density Entropy |
40 |
Resource renting for periodical cloud workflow applications |
41 |
RAPARE A Generic Strategy for Cold-Start Rating Prediction Problem |
42 |
QoS Recommendation in Cloud Services |
43 |
Profiling Online Social Behaviors for Compromised Account Detection |
44 |
PrivacyProtectionAccessControlScheme |
45 |
Privacy Characterization and Quantification in Data Publishing |
46 |
Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy |
47 |
NetSpam a Network-based Spam Detection Framework for Reviews in Online Social Media |
48 |
Multi-Owner Keyword Search over Shared Data without Secure Channels in the Cloud |
49 |
Mitigating Cross-Site Scripting Attacks with a Content Security Policy |
50 |
Location Aware Keyword Query Suggestion Based on Document Proximity |
51 |
Joint Optimization of Multicast Energy in Delay Constrained Mobile WSNs |
52 |
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage |
53 |
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud |
54 |
Identity-Based Private Matching over Outsourced Encrypted Datasets |
55 |
Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds |
56 |
Ghost Riders Sybil Attacks on Crowdsourced Mobile Mapping Services |
57 |
Generating Query Facets using Knowledge Bases |
58 |
FRoDO Fraud Resilient Device for Off-Line Micro-Payments |
59 |
Frequent Itemsets Mining with Differential Privacy over Large-scale Data |
60 |
FraudFind Financial Fraud Detection by Analyzing Human Behavior |
61 |
Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services |
62 |
Fast Phrase Search for Encrypted Cloud Storage |
63 |
EPLQ Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data |
64 |
Enhancing Information Resilience in Disruptive Information-Centric Networks |
65 |
Energy Efficient Link-Delay Aware Routing in Wireless Sensor Networks |
66 |
Efficient Keyword-aware Representative Travel Route Recommendation |
67 |
Efficient and Expressive Keyword Search Over Encrypted Data in Cloud |
68 |
Dynamic and Public Auditing with Fair Arbitration for Cloud Data |
69 |
Distributed Faulty Node Detection in Delay Tolerant Networks Design and Analysis |
70 |
DeyPoS Deduplicatable Dynamic Proof of Storage for Multi-User Environments |
71 |
Detecting Node Failures in Mobile Wireless Networks A Probabilistic Approach |
72 |
Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing |
73 |
CryptCloud+ Secure and Expressive Data Access Control for Cloud Storage |
74 |
CREDIT CARD FRAUD DETECTION USING ADABOOST AND MAJORITY VOTING |
75 |
Crawling Hidden Objects with kNN Queries |
76 |
CoDetect Financial Fraud Detection with Anomaly Feature Detection |
77 |
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing |
78 |
Characterizing and Predicting Early Reviewers for Effective Product Marketing on E-Commerce Websites |
79 |
Block Design-based Key Agreement for Group Data Sharing in Cloud Computing |
80 |
Automatically Mining Facets for Queries from Their Search Results |
81 |
Audience Behavior Mining Integrating TV Ratings with Multimedia Conten |
82 |
Aspect-level Influence Discovery from Graphs |
83 |
Analyzing Sentiments in One Go A Supervised Joint Topic Modeling Approach |
84 |
Analysis of users behaviour in structured e-commerce websites |
85 |
An Efficient Privacy-Preserving Ranked Keyword Search Method |
86 |
Active Trust Secure and Trustable Routing in Wireless Sensor Network Networks |
87 |
Achieving Scalable Access Control Over Encrypted Data for Edge Computing Networks |
88 |
Achieving Data Truthfulness and Privacy Preservation in Data Markets |
89 |
A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks |
90 |
A Network Coding and DES Based Dynamic Encryption Scheme for Moving Target Defense |
91 |
A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing |
92 |
A Hybrid Approach for Detecting Automated Spammers in Twitter |
93 |
A Cross Tenant Access Control (CTAC) Model for Cloud Computing Formal Specification and Verification |
94 |
A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn |
95 |
Secure Data Sharing In Cloud Computing Using Revocable-Storage Identity-Based Encryption |
96 |
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification |
97 |
A Shoulder Surfing Resistant Graphical Authentication System |
98 |
SocialQ&A An Online Social Network Based Question and Answer System |
99 |
Using Data Mining to Predict Hospital Admissions from the Emergency Department |
100 |
Secure k-NN Query on Encrypted Cloud Data with Multiple Keys (Big Data) |
101 |
Minimum-Cost Cloud Storage Service Across Multiple Cloud Providers (NETWORKING) |
102 |
Supervised and Unsupervised Aspect Category Detection for Sentiment Analysis with Co-Occurrence Data |
103 |
Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder |
104 |
Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach (KNOWLEDGE AND DATA ENGINEERING) |
105 |
iPath Path Inference in Wireless Sensor Networks |
106 |
SmartCrawler A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces (SERVICES COMPUTING) |
107 |
Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems (PARALLEL AND DISTRIBUTED SYSTEMS) |
108 |
Continuous Answering Holistic Queries over Sensor Networks(PARALLEL AND DISTRIBUTED SYSTEMS) |
109 |
FRAppE Detecting Malicious Facebook Applications (NETWORKING) |
110 |
Search Me If You Can Privacy-preserving Location Query Service (MOBILE COMPUTING) |
111 |
Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach (MOBILE COMPUTING) |
112 |
An Incentive Framework for Cellular Traffic Offloading(MOBILE COMPUTING) |
113 |
Privacy-Preserving and Content-Protecting Location Based Queries (KNOWLEDGE AND DATA ENGINEERING) |
114 |
Location Aware Keyword Query Suggestion Based on Document Proximity (KNOWLEDGE AND DATA ENGINEERING) |
115 |
Resolving Multi-party Privacy Conflicts in Social Media (KNOWLEDGE AND DATA ENGINEERING) |
116 |
FOCS Fast Overlapped Community Search (KNOWLEDGE AND DATA ENGINEERING) |
117 |
DiploCloud Efficient and Scalable Management of RDF Data in the Cloud |
118 |
Automatically Mining Facets for Queries from Their Search Results (KNOWLEDGE AND DATA ENGINEERING) |
119 |
A Cocktail Approach for Travel Package Recommendation (KNOWLEDGE AND DATA ENGINEERING) |
120 |
EPLQ Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data (INTERNET OF THINGS) |
121 |
Geometric Range Search on Encrypted Spatial Data (INFORMATION Forensics and Security) |
122 |
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security (Computers) |
123 |
Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email (Computers) |
124 |
Building an intrusion detection system using a filter-based feature selection algorithm (Computers) |
125 |
Identity Based Encryption with Cloud Revocation Authority and Its Applications (Cloud Computing) |
S.No |
Name |
1 |
READEASE EMPOWERING DYSLEXIA |
2 |
Automated Multi-Language Video Subtitle Generation with English Translation |
3 |
MediBot Drug Recommendations system |
4 |
Deep Learning-based Auto Accident Detection and Alert System |
5 |
Large Language Model (LLM) for Blog Article Generator with both text and images |
6 |
Detecting Suspicious Activities in Exam Halls to Prevent Cheating |
7 |
AI-Assisted Search for Identifying Missing Persons by Facial Recognition |
8 |
Intelligent Social Distancing Enforcement for Health Security |
9 |
Secured E-voting system based on iris identification |
10 |
Educational Certificate Verification System Using Blockchain |
11 |
Cervical Spine Fracture Detection Using Deep Neural Networks |
12 |
Video-Text Retrieval Using Deep Learning |
13 |
Secure and Transparent Donation Platform with Blockchain |
14 |
Language Detection Using Machine Learning |
15 |
Automatic Timetable Generator Using Python |
16 |
Cough Sound Diagnostics for Lung Infection Identification |
17 |
Malware Classification Is Used To Distinguish Unique Types of Malware from Each Other |
18 |
An Intelligent Data-Driven Model to Secure Intravehicle Communications Based on Machine Learning |
19 |
A Controllable False Data Injection Attack for a Cyber Physical System |
20 |
Movie Recommendation System Using Collaborative Filtering |
21 |
ONLINE DIGITAL CHEQUE CLEARANCE AND VERIFICATION SYSTEM |
22 |
Cyber Attack Detection Model (CADM) Based on Machine Learning |
23 |
Spammer Detection and Fake User Identification on Social Networks |
24 |
Currency Detection For Visually Impaired |
25 |
Automatic Text Transcribes and Summarize From Length Audio |
26 |
Generating Synthetic Images from textual description using GAN |
27 |
Smart Suspect Tracker Using ML |
28 |
Image forgery detection based on fusion of lightweight deep learning model |
29 |
End-to-end Conversion Speed Analysis of an FPT AI-based Text-to-Speech Application |
30 |
Machine Learning Methods For Calories Measurement of Fruits and Vegetables |
31 |
Skin Disease Classification using Convolutional Neural Network |
32 |
Cyber Threat Detection Based on Artificial Neural Networks Using Event Profiles |
33 |
Diabetes Prediction Using Machine Learning Algorithm |
34 |
Social Media and Misleading Information in a Democracy A Mechanism Design Approach |
35 |
Real Time Object detection and Recognition Using Deep Learning |
36 |
Sign language recognition to text and voice using Cnn |
37 |
Image Based Question and Answering System |
38 |
Drug Recommendation System based on Sentiment Analysis of Drug Reviews using Machine Learning |
39 |
Facial Recognition for Crime Detection |
40 |
Gender and Age classification using CNN |
41 |
Machine learning techniques for cyber attacks detection in network |
42 |
DocEnTr-An End-to-End Document Image Enhancement Transformer |
43 |
Phishing Website Detection Using Machine Learning Algorithm |
44 |
IPL MATCH PREDICTION |
45 |
Disease Prediction using Machine Learning |
46 |
Online Food Ordering System |
47 |
Clustering News Headlines using k-means and Hierarchical algorithm |
48 |
Serendipitous Drug Usage In Social Media |
49 |
personalized recommendataion of social images by constrcuting a user interest tree with deep features and tag trees |
50 |
machine learning based error detection and dell design optimisation in signal intergrity application |
51 |
Hitboost survival analysis via a multi-output gradient boosting decision tree method |
52 |
Efficient vertical mining of high average utility itemset based on novel upper bonds |
53 |
classified different users with mulitple instance learning from social network data |
54 |
block chain a a game charnger for securing iot data |
55 |
assessing the effectiveness of riparian restoration projects using landsat and preception data from the cloud computing application |
56 |
A Generic Human Machine Annotation Framework Based on Dynamic Cooperative Learning |
57 |
Securing ATM Transactions using Face Recognition |
58 |
Estimate the Height Weight and BMI from Face Using Machine Learning |
59 |
TwitPersonality-Computing Personality Traits from Tweets Using Word Embeddings and Supervised Learning |
60 |
Fault Detection and Isolation in Industrial Processes Using Deep Learning Approaches |
61 |
Number Plate Recognition by using ML algorithm |
62 |
Blockchain-based Electronic Voting System with Special Ballot and Block Structures that Complies with Indonesian Principle of Voting |
63 |
SUPERMARKET SALES ANALYSIS |
64 |
user ratings and reviews based fraud app detection in google playstore |
65 |
Mark It For Down Article Maker |
66 |
EMOTION DETECTION FROM LIVE CAMERA USING CNN |
67 |
Solving Nurse Scheduling Problem Using Constraint Programming Technique |
68 |
Facial Movements Based Mouse Cursor Control for Physically Disabled Individual |
69 |
Weakly-supervised Deep Embedding for Product Review Sentiment Analysis |
70 |
Toward Better Statistical Validation of Machine Learning-Based Multimedia Quality Estimators |
71 |
Semi-supervised machine learning approach for DDoS detection |
72 |
Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning |
73 |
Rich Short Text Conversation Using Semantic-Key-Controlled Sequence Generation |
74 |
Price-based Resource Allocation for Edge Computing A Market Equilibrium Approach |
75 |
Prediction of Crude Oil Prices using Support Vector Regression (SVR) with grid search cross validation algorithm |
76 |
Personalized Affective Feedback to Address Students Frustration in ITS |
77 |
Multi-Traffic Scene Perception Based on Supervised Learning |
78 |
Modeling and Predicting Cyber Hacking Breaches |
79 |
Loan Approval Prediction based on Machine Learning Approach |
80 |
Image Based Appraisal of Real Estate Properties |
81 |
How Data-Driven Entrepreneur Analyzes Imperfect Information for Business Opportunity Evaluation |
82 |
Generating Wikipedia By Summarizing Long Sequences |
83 |
Exploratory Visual Sequence Mining Based on Pattern-Growth |
84 |
Efficient Vertical Mining of High Average-Utility Itemsets Based on Novel Upper-Bounds |
85 |
Designing Cyber Insurance Policies The Role of Pre-Screening and Security Interdependence |
86 |
Deep Learning Applications in Medical Image Analysis |
87 |
Data-Driven Design of Fog-Computing-Aided Process Monitoring System for Large-Scale Industrial Processes |
88 |
Correlated Matrix Factorization for Recommendation with Implicit Feedback |
89 |
Characterizing And Predicting Early Reviewers For Effective Product Marketing On E-Commerce Websites |
90 |
Cancer Scenario in India with Future Perspectives |
91 |
Bag-of-Discriminative-Words (BoDW) Representation via Topic Modeling |
92 |
A user-centric machine learning framework for cyber security operations center |
93 |
A Data Mining Based Model For Detection Of Fraudulent Behaviour In Water Consumption |
94 |
A Bi-objective Hyper-Heuristic Support Vector Machines for Big Data Cyber-Security |
95 |
Spammer Detection and Fake User Identification on Social Networks |
96 |
Credit card Fraud Detection using Predictive Modeling |
97 |
Motion Influence Map for Unusual Human Activity Detection and Localization in Crowded Scenes |
98 |
A Method for Hybrid Personalized Recommender based on Clustering of Fuzzy User Profiles |