0% found this document useful (0 votes)
30 views8 pages

IEEE Current Titles-1

The document lists 71 IEEE paper titles across various technologies like .net, Java, and PHP. The titles cover topics in security, cloud computing, machine learning, computer vision, and more.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views8 pages

IEEE Current Titles-1

The document lists 71 IEEE paper titles across various technologies like .net, Java, and PHP. The titles cover topics in security, cloud computing, machine learning, computer vision, and more.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

SSi Education, 266, Goodshed Street, Madurai Contact: 8870382777, 8056361688

IEEE Current Titles


.net new Titles (IEEE):

1. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc
Network.
2. Data Leakage Detection
3. Optimal Service Pricing For A Cloud Cache
4. Three Party Authentication Key Distributed Protocols Using Implicit and Explicit
Quantum Cryptography.
5. Data Integrity Proofs In Cloud Storage
6. NABS Novel Approaches for Biometric Systems
7. Online Modeling of Proactive Moderation System for Auction Fraud Detection
8. Quick Answering General Queries for Web search
9. The World in a Nutshell
10. Towards Secure and Dependable Storage
11. A New Cell Counting Based Attack Against Tor
12. Outsourced Similarity Search on Metric Data Assets
13. The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks.
14. MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad
Hoc Networks
15. Integration of Sound Signature in Graphical Password Authentication System
16. One Size Does Not Fit All Towards User- And Query-Dependent Ranking For Web
Databases
17. AMES-Cloud A Framework of Adaptive Mobile Video Streaming and Efficient
Social Video Sharing in the Clouds
18. A System to Filter Unwanted Messages from OSN User Walls
19. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
20. Robust Face-Name Graph Matching for Movie Character Identification
21. Robust Watermarking of Compressed and Encrypted JPEG2000 Images.
22. A Keyless Approach to Image Encryption
23. Optimizing Cloud Resources for Delivering IPTV Services Through Virtualization
24. Participatory Privacy Enabling Privacy in Participatory Sensing
SSi Education, 266, Goodshed Street, Madurai Contact: 8870382777, 8056361688

25. Privacy-Preserving Public Auditing for Secure Cloud Storage


26. EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
27. Optimal Multicast capacity and delay tradeoff in manet
28. Local Directional Number Pattern for Face Analysis Face and Expression
Recognition
29. Perceptual Video Coding Based on SSIM-Inspired Divisive Normalization
30. Altered Fingerprint analysis and detection
31. Building Confidential and Efficient Query Services in the Cloud with RASP Data
Perturbation
32. Mining Weakly Labeled Web Facial Images for Search Based Face Annotation
33. Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI
Problems
34. Identity Based Distributed Provable Data Possession in Multi Cloud Storage
35. Supporting Privacy Protection in Personalized Web Search
36. Secure Mining of Association Rules in Horizontally Distributed Databases
37. CAM Cloud-Assisted Privacy Preserving Mobile Health Monitoring
38. A Systematic Approach Toward Description and Classification of Cyber crime
Incidents
39. food-recognition-system-for-diabetic-patients

40. ID2S Password-Authenticated Key Exchange Protocols


41. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under
Multiple Keys
42. Connecting Social Media to E-Commerce-Cold-Start Product Recommendation
Using Micro blogging Information
43. Mining User-Aware Rare Sequential Topic Patterns in Document Streams
44. Shoulder Surfing attack in graphical password authentication

45. a Secure Anti Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
46. Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
(asp, J2ee)
47. Tag Based Image Search by Social Reranking (asp, J2ee)
SSi Education, 266, Goodshed Street, Madurai Contact: 8870382777, 8056361688

48. Understanding Short Texts through Semantic Enrichment and Hashing (Java)
49. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted
Cloud Data (Asp, Java)

50. Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
51. User Vitality Ranking and Prediction in Social Networking
52. SociRank: Identifying and Ranking Prevalent News Topics Using Social Media
Factors
53. Strong Key-Exposure Resilient Auditing for Secure Cloud Storage
54. TAFC Time and Attribute Factors Combined Access Control
55. Two-Stage Friend Recommendation Based on Network Alignment
56. NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social
Media
57. CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics
58. Rich Short Text Conversation Using Semantic Key Controlled Sequence Generation
59. A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational
Intelligence in Fog Computing
60. Efficient Traceable Authorization Search System for Secure Cloud Storage
61. Characterizing and Predicting Early Reviewers for Effective Product Marketing on E-
Commerce Websites
62. Detection of suicide-related posts in Twitter data streams
63. Scalable Content-Aware Collaborative Filtering for Location Recommendation
64. Credit card fraud detection using AdaBoost and majority voting
65. Analyzing and Detecting Money-Laundering Accounts in Online Social networks
66. Visual Secret Sharing Schemes Encrypting Multiple Images
67. Using Data Mining to Predict Hospital Admissions from the Emergency Department
68. Segregating Spammers and Unsolicited Bloggers from Genuine Experts on Twitter
69. Lightwight Fine-Grained Search over Encrypted Data in Fog Computing
70. Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage
71. Intelligent Electronic Voting System Using Blockchain Technology
SSi Education, 266, Goodshed Street, Madurai Contact: 8870382777, 8056361688

Java (IEEE)
1. Cloud Computing Security From Single to Multi-Clouds
2. Cloud computing for mobile users can offloading compution save energy
3. Ensuring Distributed Accountability for Data Sharing in the Cloud
4. Cooperative Provable Data Possession
5. Organizing User Search Histories
6. Packet-Hiding Methods for Preventing Selective Jamming Attacks
7. Ranking Model Adaptation for Domain-Specific Search
8. AMES-Cloud A Framework of Adaptive Mobile Video Streaming and Efficient
Social Video Sharing in the Clouds
9. A System to Filter Unwanted Messages from OSN User Walls
10. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-
hoc Network.
11. Integration of Sound Signature in Graphical Password Authentication System.
12. Ensuring Data Storage Security in Cloud Computing
13. Ajax Browser
14. An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P
System
15. Handling Multiple Failures In IP Networks Through Localized On Demand Link
State Routing
16. Independent Directed Acyclic Graphs For Resillient Multipath Routing
17. A Framework for Personal Mobile Commerce Pattern Mining and Prediction
18. Vampire attacks Draining life from wireless ad-hoc sensor networks
19. Captcha as Graphical Passwords A New Security Primitive Based on Hard AI
Problems
20. A Hybrid Cloud Approach for Secure Authorized Deduplication
21. Supporting Privacy Protection in Personalized Web Search
22. Secure Outsourced Attribute-Based Signatures
23. Privacy Preserving Data Sharing With Anonymous ID Assignment
24. Dealing with Concept Drifts in Process Mining
25. A Fast Re-Route Method
SSi Education, 266, Goodshed Street, Madurai Contact: 8870382777, 8056361688

26. Intelligent Electronic Voting System Using Blockchain Technology


27. Towards Thwarting Template Side-channel Attacks in Secure Cloud
Deduplications
28. Traffic Analysis Attack for Identifying Users Online Activities
29. Two-Step Artificial Bee Colony Algorithm Enhancement for QoS-Aware Web
Service Selection Problem
30. Mining Weakly Labeled Web Facial Images for Search Based Face Annotation
31. Public Integrity Auditing for Shared dynamic cloud data with group user
revocation
32. Secured Anti collusion Data Sharing for Dynamic Groups in this Cloud
33. Understanding short text retrieval
34. Enabling Cloud Storage Auditing With Verifiable
35. A scalable and Reliable Matching Service for content-based publish/subscribe
systems.
36. Deduplicatable Dynamic Proof of cloud storage
SSi Education, 266, Goodshed Street, Madurai Contact: 8870382777, 8056361688

Php (IEEE)

1. Learn to Personalized Image Search from the Photo Sharing Websites.

2. Question Answering System for an Effective Collaborative Learning.

3. Lost in Translation: Improving snare Documents via Automated Translation.

4. Cryptonite: A Secure and Performent Data Repository on Public Clouds.

5. Efficient Anonymous Message Submission.

6. In Tags We Trust.

7. Statistical Entity Extraction from Web

8. Captcha as Graphical Passwords A New Security Primitive Based on Hard AI

Problems

9. A System to Filter Unwanted Messages from OSN User Walls

10. Optimal Service Pricing For A Cloud Cache

11. Integration of Sound Signature in Graphical Password Authentication System

13. Optimizing Cloud Resources for Delivering IPTV Services Through Virtualization

14. Secure Mining of Association Rules in Horizontally Distributed Databases

15. Mining Weakly Labeled Web Facial Images for Search Based Face Annotation

16. AMES-Cloud A Framework of Adaptive Mobile Video Streaming and Efficient

Social Video Sharing in the Clouds

17. Discovery of Ranking Fraud for Mobile Apps

18. A Computational Dynamic Trust Model for User Authorization

19. Iris recognition using QR code for online assessment

20. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
SSi Education, 266, Goodshed Street, Madurai Contact: 8870382777, 8056361688

21. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under

Multiple Keys

22. Deduplicatable dynamic proof of storage for multi user environments

23. Cloud Computing Security From Single to Multi-Clouds

24. Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates

25. MMBcloud-tree Authenticated Index for Verifiable Cloud Service Selection

26. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking

in Public Cloud

27. Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to

Cloud Email

28. Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage

29. ID2S Password-Authenticated Key Exchange Protocols

30. Providing user security guarantee in public infra cloud.

31. An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing

32. Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts

33. NetSpam a Review Detection Framework

34. User Vitality Ranking & Prediction in Social Networking Services

35. A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational

Intelligence in Fog Computing

36. An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data

Hiding in Encrypted Images

37. A Systematic Approach Toward Description and Classification of Cyber crime

Incidents
SSi Education, 266, Goodshed Street, Madurai Contact: 8870382777, 8056361688

38. Prediction of Effective Rainfall and Crop Water Needs using Data Mining

Techniques

39. Heart Disease Prediction using Machine Learning

40. Chatbot using Natural language toolkit.

41. A Behavior Based Trustworthy Service Composition Discovery Approach in Cloud

Environment (PHP)

42. TPCKT: Two-level Progressive Cross-media Knowledge Transfer (PHP)

43. Blockchain-based Outsourced Storage Schema in Untrusted Environment (PHP)

44. Revocable Cloud-Assisted Attribute-Based Signcryption In Personal Health System

(PHP)

45. Personalized Recommendation of Social Images by Constructing a User Interest Tree

with Deep Features and Tag Trees (PHP)

46. A Fog-centric Secure Cloud Storage Scheme (PHP)

47. Blockchain-based Outsourced Storage Schema in Untrusted Environment

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy