| Course Others | You are Offering Professional Course | Locality Vadapalani |
2017 2018
DOTNET
IEEE PROJECT TITLES
IEEE Transactions on Knowledge and Data Engineering
1. Search Rank Fraud and Malware Detection in Google Play
2. Personal Web Revisitation by Context and Content Keywords with Relevance Feedback
3. Efficient Clue-based Route Search on Road Networks
4. Majority Voting and Pairing with Multiple Noisy Labeling
5. Filtering Out Infrequent Behavior from Business Process Event Logs
6. Detecting Stress Based on Social Interactions in Social Networks
7. Continuous Top-k Monitoring on Document Streams
8. Influence Maximization in Trajectory Databases
9. Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach
10. PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks
11. User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective
12. Trajectory Community Discovery and Recommendation by Multi-source Diffusion Modeling
13. GALLOP: GlobAL feature fused Location Prediction for Different Check-in Scenarios
14. Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data
IEEE Transactions on Cloud Computing
15. Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme over Encrypted Cloud Data
16. Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud
17. Cost Optimization for Dynamic Replication and Migration of Data in Cloud Data Centers
18. Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing
19. On the Security of Data Access Control for Multi authority Cloud Storage Systems
20. Temporal task scheduling with constrained service delay for profit maximization in hybrid clouds
21. Identity-Based Private Matching over Outsourced Encrypted Datasets
22. User Differentiated Verifiable File Search on the Cloud
23. Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving
24. Fast Phrase Search for Encrypted Cloud Storage
IEEE Transactions on Information Forensics and Security
25. RAAC: Robust and Auditable Access Control With Multiple Attribute Authorities for Public Cloud Storage
26. Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems
27. Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds
IEEE Transactions on Dependable and Secure Computing
28. Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
29. A Multilevel Access Control Scheme for Data Security in Transparent Computing
30. Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending
31. Cooperative Query Answer Authentication Scheme over Anonymous Sensing Data
32. SADI: A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks
IEEE Transactions on Mobile Cloud Computing
33. Mobile Based Location Tracking without Internet Connectivity using Cloud Computing Environment
34. A Proxy-based Collaboration System to Minimize Content Download Time and Energy Consumption
35. SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks
IEEE Transactions on Networking
36. Routing in Accumulative Multi-Hop Networks
37. Energy Efficient Multipath Routing Protocol for Mobile Ad-Hoc Network Using the Fitness Function
38. E2HRC: An Energy-Efficient Heterogeneous Ring Clustering Routing Protocol for Wireless Sensor Networks
39. Research on Trust Sensing based Secure Routing Mechanism for Wireless Sensor Network
40. Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Network
41. Energy Efficient Clustering Algorithm for Multi-Hop Wireless Sensor Network Using Type-2 Fuzzy Logic
42. Lightweight Three-factor Authentication and Key Agreement Protocol for Internet-integrated Wireless Sensor Networks
IEEE Transactions on Internet of Things
43. Follow But No Track Privacy Preserved Profile Publishing in Cyber Physical Social Systems
44. An Efficient and Fine-grained Big Data Access Control Scheme with Privacy-preserving Policy
45. SPFM: Scalable and Privacy-Preserving Friend Matching in Mobile Cloud
IEEE Transactions on Big Data
46. A Situational Analytic Method for User Behavior Pattern in Multimedia Social Networks
47. A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
IEEE Transactions on Services Computing
48. Resource renting for periodical cloud workflow applications
49. Privacy-Preserving Selective Aggregation of Online User Behavior Data
50. ProGuard: Detecting Malicious Accounts in Social-Network-Based Online Promotions