Msr-Mipy-2100 |
Fake detector Effective Fake News Detection With Deep Diffusive Neural Network |
Msr-Mipy-2101 |
Stress Detection In It Professionals By Image Processing And Machine Learning |
Msr-Mipy-2102 |
Transfer Learning For Recognizing Face In Disguise |
Msr-Mipy-2103 |
Application Research Of Text Classification Based On Random Forest Algorithm |
Msr-Mipy-2104 |
Checking Security Properties Of Cloud Service Rest Apis |
Msr-Mipy-2105 |
Behaviour Analysis For Mentally Affected People |
Msr-Mipy-2106 |
Filtering Instagram Hashtags Through Crowdtagging And The Hits Algorithm |
Msr-Mipy-2107 |
A Hybrid Cloud Approach For Secure Authorized Deduplication |
Msr-Mipy-2108 |
An Examination System Automation Using Natural Language Processing |
Msr-Mipy-2109 |
Applications Of Machine Learning In The Field Of Medical Care |
Msr-Mipy-2110 |
Interpretable Machine Learning In Healthcare Through Generalized Additive Model With Pairwise Interactions (Ga2m): Predicting Severe Retinopathy Of Prematurity* |
Msr-Mipy-2111 |
Analysis And Prediction Of Cardio Vascular Disease Using Machine Learning Classifiers |
Msr-Mipy-2112 |
Design Of Restaurant Billing System (E Bill Resto) By Applying Synchronization Of Data Billing In Branch Companies To Main Companies Based On Rest Api |
Msr-Mipy-2113 |
Building Search Engine Using Machine Learning Technique |
Msr-Mipy-2114 |
School-Enterprise Cooperation On Python Data Analysis Teaching |
Msr-Mipy-2115 |
A Study Of Blockchain Technology In Farmer’s Portal |
Msr-Mipy-2116 |
Improving Lives Of Indebted Farmers Using Deep Learning |
Msr-Mipy-2117 |
Content Analysis Of Messages In Social Networks, Identification Of Suicidal Types |
Msr-Mipy-2118 |
Artificial Intelligence In Prediction Of Postmortem Interval (Pmi) Through Blood Biomarkers In Forensic Examination-A Concept |
Msr-Mipy-2119 |
Crop Yield Prediction Using Machine Learning Techniques |
Msr-Mipy-2120 |
Text Classification On Twitter Data |
Msr-Mipy-2121 |
Automated Machine Learning: The New Wave Of Machine Learning |
Msr-Mipy-2122 |
Predicting Covid-19 In China Using Hybrid Ai Model |
Msr-Mipy-2123 |
Scalable Analytics Platform For Machine Learning In Smart Production Systems |
Msr-Mipy-2124 |
An Application Of A Deep Learning Algorithm For Automatic Detection Of Unexpected Accidents Under Bad Cctv Monitoring Conditions In Tunnels |
Msr-Mipy-2125 |
Alzheimer Disease Prediction Using Machine Learning Algorithms |
Msr-Mipy-2126 |
End-To-End Conversion Speed Analysis Of An Fpt.Ai-Based Text-To-Speech Application |
Msr-Mipy-2127 |
A Corona Recognition Method Based On Visible Light Color And Machine Learning |
Msr-Mipy-2128 |
Location Prediction On Twitter Using Machine Learning Techniques |
Msr-Mipy-2129 |
Machine Learning For Web Vulnerability Detection: The Case Of Cross-Site Request Forgery |
Msr-Mipy-2130 |
Artificial Intelligence And Covid-19 Deep Learning Approaches For Diagnosis And Treatment |
Msr-Mipy-2131 |
Generating Cloud Monitors From Models To Secure Clouds
|
Msr-Mipy-2132 |
Leveraging Cnn And Transfer Learning For Vision-Based Human Activity Recognition |
Msr-Mipy-2133 |
B5g And Explainable Deep Learning Assisted Healthcare Vertical At The Edge Covid-19 Perspective |
Msr-Mipy-2134 |
Cryptocurrency Price Analysis With Artificial Intelligence
|
Msr-Mipy-2135 |
Image-Based Plant Disease Detetction A Comparison Of Deep Learning And Classical |
Msr-Mipy-2136 |
Predicting And Defining B2b Sales Success With Machine Learning
|
Msr-Mipy-2137 |
Design And Implementation Of Domestic News Collection System Based On Python |
Msr-Mipy-2138 |
Data Analysis By Web Scraping Using Python |
Msr-Mipy-2139 |
A Lightweight Secure Data Sharing Scheme For Mobile Cloud Computing |
Msr-Mipy-2140 |
A Supervised Machine Learning Algorithm For Heart-Rate Detection Using Doppler Motion-Sensing Radar |
Msr-Mipy-2141 |
Accurate And Robust Video Saliency Detection Via Self-Paced Diffusion |
Msr-Mipy-2142 |
Attribute-Based Cloud Data Integrity Auditing For Secure Outsourced Storage |
Msr-Mipy-2143 |
Automatic Keyword And Sentence-Based Text Summarization For Software Bug Reports |
Msr-Mipy-2144 |
News Text Summarization Based On Multi-Feature And Fuzzy Logic |
Msr-Mipy-2145 |
Automated Machine Learning Approach For Smart Waste Management System |
Msr-Mipy-2146 |
Digital Vehicle – License, Insurance And Rc Book Tracing For Police |
Msr-Mipy-2147 |
Reviewer Credibility And Sentiment Analysis Based User Profile Modelling For Online Product Recommendation |
Msr-Mipy-2148 |
Using Eo Satellite Data In Safe City And Coastal Zone Web-Gis |
Msr-Mipy-2149 |
Rescue Wings: Web Computing And Active Services Support For Disaster Rescue |
Msr-Mipy-2150 |
Traffic Sign Recognition By Combining Global And Local Features Based On Semi-Supervised Classification |
Msr-Mipy-2151 |
Video Behavior Profiling For Anomaly Detection |
Msr-Mipy-2152 |
Heart Disease Prediction Using Bio Inspired Algorithms |
Msr-Mipy-2153 |
Securing Data With Blockchain And Ai |
Msr-Mipy-2154 |
Intelligent Agent Based Job Search System In Web Environment |
Msr-Mipy-2155 |
Automatic Traffic Sign Detection And Recognition Using Segu-Net And A Modified Tversky Loss Function With L1- Constraint |
Msr-Mipy-2156 |
A Decision Tree Based Recommendation System For Tourists |
Msr-Mipy-2157 |
Blockchain E-Voting Done Right: Privacy And Transparency With Public Blockchain |
Msr-Mipy-2158 |
You Tube Spam Detection |
Msr-Mipy-2159 |
Car Popularity Prediction |
Msr-Mipy-2160 |
User Behavior Prediction Of Social Hotspots Based On Multi Message Interaction And Neural Network |
Msr-Mipy-2161 |
On The Personalization Of Classification Models For Human Activity Recognition |
Msr-Mipy-2162 |
Detection Of Malicious Social Bots Using Learning Automata With Url Features In Twitter Network |
Msr-Mipy-2163 |
Computer-Aided Diagnosis Of Chronic Kidney Disease In Developing Countries A Comparative Analysis Of Machine Learning Techniques |
Msr-Mipy-2164 |
Bird Classification Using Binary Relevance Approach With Random Forest |
Msr-Mipy-2165 |
Performance Analysis On Student Feedback Using Machine Learning Algorithms |
Msr-Mipy-2166 |
Academic Performance Prediction Based On Multisource, Multi Feature Behavioral Data |
Msr-Mipy-2167 |
Hdpm: An Effective Heart Disease Prediction Model For A Clinical Decision Support System |
Msr-Mipy-2168 |
Machine Learning Based Suicide Ideation Prediction For Military Personnel |
Msr-Mipy-2169 |
A Lightweight Convolutional Neural Network For Real-Time Facial Expression Detection |
Msr-Mipy-2170 |
Diabetic Retinopathy Detection By Means Of Deep Learning |
Msr-Mipy-2171 |
Melanoma Detection Using Convolutional Neural Network |
Msr-Mipy-2172 |
Covidsenti: A Large-Scale Benchmark Twitter Data Set For Covid-19 Sentiment Analysis |
Msr-Mipy-2173 |
Diabetes Disease Prediction Using Machine Learning Algorithms |
Msr-Mipy-2174 |
Crime Type And Occurrence Prediction Using Machine Learning Algorithm |
Msr-Mipy-2175 |
Image Caption Generator Using Cnn And Lstm |
Msr-Mipy-2176 |
Lung Nodule Alignacy Classification Using Machine Learning |
Msr-Mipy-2177 |
Predicting Flight Delays With Error Calculation Using Machine Learned Classifiers |
Msr-Mipy-2178 |
Nse Stock Monitoring & Prediction Using Robotic Process Automation |
Msr-Mipy-2179 |
Density Based Smart Traffic Control System Using Canny Edge Detection Algorithm For Congregrating Traffic Information Using Ai |
Msr-Mipy-2180 |
Deep Learning For Face Recognition Under Complex Illumination Conditions Based On Log-Gabor And Lb |
Msr-Mipy-2181 |
Seer Cancer Incidence Using Machine Learning With Data Analysis |
Msr-Mipy-2182 |
5g-Smart Diabetes Toward Personalized Diabetes Diagnosis With Healthcare Big Data Clouds |
Msr-Mipy-2183 |
A Deep Learning Facial Expression Recognition Based Scoring System For Restaurants |
Msr-Mipy-2184 |
A Machine Learning Model For Average Fuelconsumption In Heavy Vehicles |
Msr-Mipy-2185 |
Bird Species Identification Using Deep Learning |
Msr-Mipy-2186 |
Online Depression Detection Application |
Msr-Mipy-2187 |
Drug-Disease-Prediction-Using-Machine-Learning |
Msr-Mipy-2188 |
Link Prediction In Evolving Networks Base On Information Propagation |
Msr-Mipy-2189 |
Weapon Detection Using Artificial Intelligence And Deep Learning For Security Applications |
Msr-Mipy-2190 |
Missing Child Identification System Using Deep Learning And Multiclass Svm |
Msr-Mipy-2191 |
Suspicious Activity Detection |
Msr-Mipy-2192 |
Pregbot: A System Based On Ml And Nlp For Supporting Women And Families During Pregnancy |
Msr-Mipy-2193 |
Movie Recommendation System Using Sentiment Analysis From Microblogging Data |
Msr-Mipy-2194 |
Deep Learning Applications In Medical Image Analysis |
Msr-Mipy-2195 |
Classifying Fake News Articles Using Natural Language Processing To Identify In-Article Attribution As A Supervised Learning Estimator |
Msr-Mipy-2196 |
Real Time Object Detection Using Yolo Algorithm |
Msr-Mipy-2197 |
Context Based Image Processing Using Machine Learning Approaches |
Msr-Mipy-2198 |
Detecting Spam Email With Machine Learning Optimized With Bio- Inspired Metaheuristic Algorithms |
Msr-Mipy-2199 |
Emotion Correlation Mining Through Deep Learning Models On Natural Language Text |
Project Id |
Title |
Msr-Py-001 |
A User-Centric Machine Learning Framework For Cyber Security Operations Center |
Msr-Py-002 |
Correlated Matrix Factorization For Recommendation With Implicit Feedback |
Msr-Py-003 |
Review Of The Use Of Ai Techniques In Serious Games: Decision-Mamsrng And Machine |
Msr-Py-004 |
Semi-Supervised Machine Learning Approach For Ddos Detection |
Msr-Py-005 |
Weakly-Supervised Deep Embedding For Product Review Sentiment Analysis |
Msr-Py-006 |
Personalized Affective Feedback To Address Students’ Frustration In Its |
Msr-Py-007 |
How Data-Driven Entrepreneur Analyzes Imperfect Information For Business Opportunity Evaluation |
Msr-Py-008 |
Multi-Traffic Scene Perception Based On Supervised Learning |
Msr-Py-009 |
Robust Malware Detection For Internet Of (Battlefield) Things Devices Using Deep Eigenspace Learning |
Msr-Py-010 |
A Bi-Objective Hyper-Heuristic Support Vector Machines For Big Data Cyber-Security |
Msr-Py-011 |
Modeling And Predicting Cyber Hacmsrng Breaches |
Msr-Py-012 |
Price-Based Resource Allocation For Edge Computing: A Market Equilibrium Approach |
Msr-Py-013 |
String Similarity Search: A Hash-Based Approach |
Msr-Py-014 |
A Data Mining Based Model For Detection Of Fraudulent Behaviour In Water Consumption |
Msr-Py-015 |
Data-Driven Design Of Fog Computing Aided Process Monitoring System For Large-Scale Industrial Processes |
Msr-Py-016 |
Efficient Vertical Mining Of High Average-Utility Itemsets Based On Novel Upper-Bounds |
Msr-Py-017 |
Designing Cyber Insurance Policies: The Role Of Pre-Screening And Security Interdependence |
Msr-Py-018 |
Nonintrusive Smartphone User Verification Using Anonymized Multimodal Data |
Msr-Py-019 |
Web Application For Community Question Answering |
Msr-Py-020 |
Text Classification For Newsgroup Using Machine Learning |
Msr-Py-021 |
Data Analytics Approach To The Cybercrime Underground Economy |
Msr-Py-022 |
Image Based Appraisal Of Real Estate Properties |
Msr-Py-023 |
Cloud-Based Multimedia Content Protection System |
Msr-Py-024 |
Serendipitous Recommendation In E- Commerce Using Innovator –Based Collaborative Filtering |
Msr-Py-025 |
Assessing The Effectiveness Of Riparian Restoration Projects Using Landsat And Precipitation Data From The Cloud-Computing Application |
Msr-Py-026 |
Data Security Approach On Cyber Crime With Web Vulnerability |
Msr-Py-027 |
Exploratory Visual Sequence Mining Based On Pattern-Growth |
Msr-Py-028 |
Toward Better Statistical Validation Of Machine Learning-Based Multimedia Quality Estimators |
Msr-Py-029 |
Rainfall Rate Prediction Based On Artificial Neural Networks For Rain Fade Mitigation Over Earth-Satellite Link |
Msr-Py-030 |
Phishing Web Sites Features Classification Based On Machine Learning |
Msr-Py-031 |
Predicting The Top-N Popular Videos Via A Cross-Domain Hybrid Model |
Msr-Py-032 |
Applied Machine Learning Predictive Analytics To Sql Injection Attack Detection And Prevention |
Msr-Py-033 |
A Multi-Task Learning Approach For Image Captioning |
Msr-Py-034 |
Machine Learning And Deep Learning Methods For Cybersecurity |
Msr-Py-035 |
Credit Card Fraud Detection Using Adaboost And Majority Voting |
Msr-Py-036 |
Blockchain: A Game Changer For Securing Iot Data |
Msr-Py-037 |
Object Visual Detection For Intelligent Vehicles |
Msr-Py-038 |
Automatic Visual Features For Writer Identification A Deep Learning Approach |
Msr-Py-039 |
Analysis Of Women Safety In Indian Cities Using Machine Learning On Tweets |
Msr-Py-040 |
Phishing Email Detection Using Improved Rcnn Model With Multilevel Vectors And Attention Mechanism |
Msr-Py-041 |
Urban Street Cleanliness Assessment Using Mobile Edge Computing And Deep Learning |
Msr-Py-042 |
Characterizing And Predicting Early Reviewers For Effective Product Marketing On E-Commerce Websites |
Msr-Py-043 |
Rich Short Text Conversation Using Semantic Key Controlled Sequence Generation |
Msr-Py-044 |
Bag-Of-Discriminative-Words (Bodw) Representation Via Topic Modeling |
Msr-Py-045 |
Finding Trustworthy Service Provider In Trusted Network |
Msr-Py-046 |
Document Clustering Using Improved K-Means Algorithm |
Msr-Py-047 |
Multifactor Opinion Mining And Intention Analysis For Business Intelligence |
Msr-Py-048 |
Sentiment Analysis System To Improve Teaching And Learning |
Msr-Py-049 |
The Most Trending Articles Every Year Using Nlp Techniques |
Msr-Py-050 |
Dynamic Fact Ordering For Factated Product Search Engines |
Msr-Py-051 |
Frequent Itemsets Mining With Differential Privacy Over Large Scale Data |
Msr-Py-052 |
Personalized Recommendation Of Social Images By Constructing A User Interest Tree With Deep Features And Tag Trees |
Msr-Py-053 |
Audio Sentiment Analysis System |
Msr-Py-054 |
A Fast Scene Text Detector Using Knowledge Distillation |
Msr-Py-055 |
An Efficient Steganography Method Using Ad Pvd |
Msr-Py-056 |
Recolored Image Detection Via A Deep Discriminative Model |
Msr-Py-057 |
E-Assessment Using Image Processing |
Msr-Py-058 |
Currency Recognition System Using Image Processing |
Msr-Py-059 |
Classifying Depressed Users With Multiple Instance Learning From Social Network Data |
Msr-Py-060 |
Selective Learning Confusion Class For Text-Based Captcha Recognition |
Msr-Py-061 |
Accuracy Of Convolution Neural Networks For Classifying Sentiments On Movie Reviews |
Msr-Py-062 |
Cnn Based Leaf Disease Identification And Remedy Recommendation System |
Msr-Py-063 |
Hybrid Self-Organized Clustering Scheme For Drone Based Cognitive Internet Of Things |
Msr-Py-064 |
Network Intrusion Detection For Iot Security Based On Learning Techniques |
Msr-Py-065 |
To Identify Tree Species With Highly Similar Leaves Based On A Novel Attention Mechanism For Cnn |
Msr-Py-066 |
A Detailed Investigation And Analysis Of Using Machine Learning Techniques For Intrusion Detection |
Msr-Py-067 |
Prediction Of Heart Disease Using Machine Learning Algorithms |
Msr-Py-068 |
Leveraging Unlabelled Data For Emotion Recognition With Enhanced Collaborative Semi-Supervised Learning |
Msr-Py-069 |
Model For Handwritten Recognition Based On Artificial Intelligence |
Msr-Py-070 |
Utilization-Aware Trip Advisor In Bike-Sharing Systems Based On User Behavior Analysis |
Msr-Py-071 |
Breast Cancer Prediction |
Msr-Py-072 |
Deep Clue: Visual Interpretation Of Text-Based Deep Stock Prediction |
Msr-Py-073 |
Automating E-Government Services With Artificial Intelligence |
Msr-Py-074 |
Exploring Trajectory Prediction Through Machinelearning Methods |
Msr-Py-075 |
Enron Emails Using Machine Learning With Data Analysis |
Msr-Py-076 |
Generating Wimsrpedia By Summarizing Long Sequences |
Msr-Py-077 |
A Survey On Optical Character Recognition System |
Msr-Py-078 |
5g-Smart Diabetes Toward Personalized Diabetes Diagnosis With Healthcare Big Data Clouds |
Msr-Py-079 |
A Decision Tree Based Recommendation System For Tourists |
Msr-Py-080 |
Video-Based Abnormal Driving Behaviourdetection Via Deep Learning Fusions |
Msr-Py-081 |
A Machine Learning Model For Average Fuelconsumption In Heavy Vehicles |
Msr-Py-082 |
Deep Learning Applications In Medical Image Analysis-Brain Tumor |
Msr-Py-083 |
Human Activity Recognization |
Msr-Py-084 |
Twiter Sentimantal Analysis |
Msr-Py-085 |
Bird Species Identification Using Deep Learning |
Msr-Py-086 |
Density Based Smart Traffic Control System Usingcanny Edge Detection Algorithm For Congregatingtraffic Information |
Msr-Py-087 |
Driver Drowsiness Monitoring System Using Visual Behaviour And Machine Learning |
Msr-Py-088 |
Image Classification Using Cnn (Convolution Neural Networks) Algorithm |
Msr-Py-089 |
Eye Ball Cursor Movement Using Opencv |
Msr-Py-090 |
Coorting Of An Image |
Msr-Py-091 |
Big Mart Sales |
Msr-Py-092 |
Use Of Artificial Neural Networks To Identify Fakeprofiles |
Msr-Py-093 |
A Deep Learning Facial Expression Recognition Based Scoring System For Restaurants |
Msr-Py-094 |
Emotion Recognition On Twitter Using Unisol Model |
Msr-Py-095 |
Network Intrusion Detection Using Supervisedmachine Learning Technique With Feature Selection |
Msr-Py-096 |
Stock Market Trend Using Knn |
Msr-Py-097 |
Sentiment Lexicon Constriuction With Hierarchical Supervision Topic Model |
Msr-Py-098 |
Analysis Of Road Traffic Fatal Accidents Using Data Mining Techniques |
Msr-Py-099 |
Analysis Of The Logistic Model For Accident Severity On Urban Road |
Msr-Py-100 |
Estimating The Price Of Houses Using Machine Learning |
Msr-Py-101 |
Liver Disease Prediction Using Svm And Naïve Bayes Algorithms |
Msr-Py-102 |
Predicting The Strength Of The Concrete Pillars Used In Industrial Infrastructure |
Msr-Py-103 |
Market Basket Analysis |
Msr-Py-104 |
Wordcloud |
Msr-Py-105 |
Weather Forecasting To Prevents A Natural Calamities |
S.NO PROJECT TITLE NAME
CLOUD COMPUTING
J2101 RACE Resource Aware Cost-Efficient Scheduler for Cloud Fog Environment
J2111 Certificateless public integrity checking of group shared data on cloud storage
J2116 A Statistical Inference Attack on Privacy-Preserving Biometric Identification Scheme
J2118 Efficient Auditing Scheme for Secure Data Storage in Fog-to-Cloud Computing
J2125 Dual Access Control for Cloud-Based Data Storage and Sharing
J2128 An Efficient Ciphertext Index Retrieval Scheme based on Edge Computing Framework
J2129 Efficient Revocable Multi-Authority Attribute-Based Encryption for Cloud Storage
J2131 Pocket Diagnosis: Secure Federated Learning against Poisoning Attack in the Cloud
BLOCKCHAIN TECHNOLOGY
J2132 Blockchain Assisted Collaborative Service Recommendation Scheme With Data Sharing
J2133 A Blockchain-based Approach for Drug Traceability in Healthcare Supply Chain
J2134 Data Trust Framework Using Blockchain Technology and Adaptive Transaction Validation
J2135 A Blockchain based Autonomous Decentralized Online Social Network
J2136 Blockchain Based Accounts Payable Platform for Goods Trade
J2138 A Trusted Blockchain-Based Traceability System for Fruit and Vegetable Agricultural Products
J21 Design of Secure Authenticated Key Management Protocol for Cloud Computing Environment
J2140 A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain
INTERNET OF THINGS(IOT)
J2141 Fast Containment of Infectious Diseases with E-healthcare Mobile Social Internet of Things
J2150 Toward Detection and Attribution of Cyber-Attacks in IoT-enabled Cyber-physical Systems DATA MINING
J2154 Personality aware Product Recommendation System based on User Interests Mining and Meta path Discovery
J2157 Discovering Hidden Topical Hubs and Authorities Across Multiple Online Social Networks
J2161 Query Expansion with Local Conceptual Word Embeddings in Microblog Retrieval
J2164 Enabling Secure and Space-Efficient Metadata Management in Encrypted Deduplication
BIG DATA
J2165 Hybrid Recommender System for Tourism Based on Big Data and AI A Conceptual Framework
J21 A Blockchain-based Approach for Drug Traceability in Healthcare Supply Chain
SOCIAL NETWORKS & NETWORKS
J2168 Detecting Mental Disorders in Social Media Through Emotional Patterns The case of Anorexia and Depression
J2176 Protecting Your Shopping Preference with Differential Privacy
J2178 BullyNet: Unmasking Cyberbullies on Social Networks
MOBILE COMPUTING
J2179 Privacy Preserving Media Sharing with Scalable Access Control and Secure Deduplication in Mobile Cloud Computing
J21 A TRUST-BASED AGENT LEARNING MODEL FOR SERVICE COMPOSITION IN MOBILE CLOUD COMPUTING ENVIRONMENTS
1 J2002 Cashless Society Managing Privacy and Security in the Technological Age
2 J2009 Online Pricing with Reserve Price Constraint for Personal Data Markets
3 J2013 Personalized Long and Short term Preference Learning for Next POI Recommendation
4 J2018 Authentication and Key Agreement Based on Anonymous Identity for Peerto-Peer Cloud
5 J2019 Designing Secure and Efficient Biometric-Based Secure Access Mechanism for Cloud Services
6 J2022 Secure Keyword Search and Data Sharing Mechanism for Cloud Computing
7 J2024 Development and Examination of Fog Computing-Based Encrypted Control System.
8 J2026 A Secure and Efficient Cloud-Centric Internet of Medical Things-Enabled Smart Healthcare System with Public Verifiability
9 J2029 Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud.
10 J2030 Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud Computing.
11 J2035 Secure Cloud Storage with Data Dynamics Using Secure Network Coding Techniques
12 J2036 Improving Security and Privacy Attribute Based Data Sharing in Cloud Computing
13 J2055 An Efficient Privacy Preserving Message Authentication Scheme for Internet-of-Things
14 J2023 A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage
15 J2052 User Behavior Prediction of Social Hotspots Based on Multi message Interaction and Neural Network
16 J2037 LEVER Secure Deduplicated Cloud Storage with Encrypted Two-Party Interactions in Cyber-Physical Systems
17 J2057 Decentralized Lightweight Group Key Management for Dynamic Access Control in IoT Environments
18 J2058 Secure IoT Data Outsourcing With Aggregate Statistics and Fine- Grained Access Control
19 J2074 Block chain-Based Secure Computation Offloading in Vehicular Networks
20 J2025 Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing
21 J2053 A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems
22 J2059 Benchmarking Image Retrieval Diversification Techniques for Social Media
23 J2076 Secure Channel Free Certificate-Based Searchable Encryption Withstanding Outside and Inside Keyword Guessing Attacks
24 J2004 Efficiently Processing Spatial and Keyword Queries in Indoor Venues
25 J2038 Efficient Decentralized Attribute Based Access Control for Mobile Clouds
26 J2072 Crisis-Critical Intellectual Property Findings From the COVID-19 Pandemic
27 J2073 Block chain based Data Storage with Privacy and Authentication in Internet of Things
28 J2077 Detecting and Characterizing Extremist Reviewer Groups in Online Product Reviews
29 J2045 Characterizing the Propagation of Situational Information in Social Media During COVID-19 Epidemic A Case Study on Weibo
30 J2082 Fake News, Disinformation,and Deepfakes: Leveraging Distributed Ledger Technologies and Blockchain to Combat Digital Deception and Counterfeit Reality
31 J2008 Feature-Level Rating System Using Customer Reviews and Review Votes
32 J2067 Detection of Social Network Spam Based on Improved Extreme Learning Machine
33 J2027 Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography
34 J1906 A Practical attribute based document collection Hierarchical Encryption Scheme in Cloud Computing
35 J1907 Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud
36 J1914 CHARON: A Secure Cloud-of-Clouds System for Storing and Sharing Big Data
37 J1920 An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud Storage
38 J1924 Hidden Cipher text Policy Attribute-Based Encryption with Fast Decryption for Personal Health Record System
39 J1927 Privacy-aware Personal Data Storage (P-PDS) Learning how to Protect User Privacy from External Applications
40 J1930 Clustering-Based Collaborative Filtering Using an Incentivized/Penalized User Model
41 J1934 A Hierarchical Attention Model for Social Contextual Image Recommendation
42 J1935 DCCR: Deep Collaborative Conjunctive Recommender for Rating Prediction
43 J1939 Privacy Preserving Searchable Encryption with Fine-grained Access Control
44 J1944 Filtering Instagram hashtags through crowd tagging and the HITS algorithm
45 J1945 A Hybrid E-learning Recommendation Approach Based on Learners’ Influence Propagation
46 J1946 Detecting Pickpocket Suspects from Large-Scale Public Transit Records
47 J1949 Coverless Information Hiding Method Based on Web Text
48 J1953 SEPTIC Detecting Injection Attacks and Vulnerabilities
49 J1954 Detecting Malicious Social Bots Based on Click stream Sequences
50 J1961 Authentication by Encrypted Negative Password
51 J1962 Retrieving Hidden Friends: A Collusion Privacy Attack Against Online Friend Search Engine
52 J1965 Enabling Efficient and Geometric Range Query With Access Control Over Encrypted Spatial Data
53 J1966 Social Network Rumor Diffusion Predication Based on Equal Responsibility Game Model
54 J1967 Online Public Shaming on Twitter: Detection, Analysis and Mitigation
55 J1969 A Fuzzy Approach to Text Classification with Two Stage Training for Ambiguous Instances
56 J1973 Privacy-Preserving Crowd-Sourced Statistical Data Publishing with An Untrusted Server
57 J1976 Detection of fake online reviews using semi-supervised and supervised learning
58 J1977 Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Learning Algorithms: Review of Literature and Open Challenges
59 J1978 Spammer Detection and Fake User Identification on Social Networks
60 J1979 Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques
61 J1991 Achieve Privacy Preserving Priority Classification on Patient Health Data
62 J1992 A Computational Dynamic Trust Model for User Authorization
63 J1998 A Lightweight Secure Auditing Scheme for Shared Data in Cloud Storage
64 J1999 A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage Services
65 J19100 An Approach to Balance Maintenance Costs and Electricity
66 J19109 Data Integrity Auditing without Private Key Storage for Secure Cloud Storage
67 J19110 Searchable Symmetric Encryption with Forward Search Privacy
68 J19111 Secure Data Group Sharing and Dissemination with Attribute and Time Conditions in Public Cloud
69 J19112 Achieve Privacy Preserving Priority Classification on Patient Health Data
70 J19113 A Computational Dynamic Trust Model for User Authorization
71 J19114 A Lightweight Secure Auditing Scheme for Shared Data in Cloud Storage
72 J19115 A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage Services
73 J1834 Health Monitoring on Social Media over Time
74 J1844 Using Data Mining to Predict Hospital Admissions From the Emergency Department
75 J1856 HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems
76 J1864 A Planning Approach for Reassigning Virtual Machines in IaaS Clouds
77 J18119 Light-Weight Security and Data Provenance for Multi-Hop Internet of Things
78 J18120 MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things
79 J1701 An Iterative Classification Scheme for Sanitizing Large-Scale Datasets
80 J1702 Computing Semantic Similarity of Concepts in Knowledge Graphs
81 J1706 Understand Short Texts by Harvesting and Analyzing Semantic Knowledge
82 J1707 User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective
83 J1708 Dynamic Facet Ordering for Faceted Product Search Engines
84 J1709 Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach
85 J1712 Detecting Stress Based on Social Interactions in Social Networks
86 J1713 Efficient Clue-based Route Search on Road Networks
87 J1714 Efficient Keyword-aware Representative Travel Route Recommendation
88 J1716 Collaborative Filtering-Based Recommendation of Online Social Voting
89 J1719 l-Injection: Toward Effective Collaborative Filtering Using Uninteresting Items
90 J1721 Modeling Information Diffusion over Social Networks for Temporal Dynamic Prediction
91 J1722 QDA: A Query-Driven Approach to Entity Resolution
92 J1728 A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage
93 J1730 Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
94 J1732 Securing Cloud Data under Key Exposure
95 J1733 Privacy Protection based Access Control Scheme in Cloud-based Services
96 J1735 A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
97 J1736 TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud
98 J1739 Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage
99 J1740 Identity-Based Private Matching over Outsourced Encrypted Datasets
100 J1744 A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its User