|
S. NO. |
Project ID |
Project Title |
Project Domain |
| 1 | EDLB1601 | A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data | Cloud Computing |
| 2 | EDLB1602 | A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud | Cloud Computing |
| 3 | EDLB1603 | An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing | Cloud Computing |
| 4 | EDLB1604 | An Efficient Privacy-Preserving Ranked Keyword Search Method | Cloud Computing |
| 5 | EDLB1605 | CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System | Cloud Computing |
| 6 | EDLB1606 | Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing | Cloud Computing |
| 7 | EDLB1607 | CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services | Cloud Computing |
| 8 | EDLB1608 | Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email | Cloud Computing |
| 9 | EDLB1609 | Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds | Cloud Computing |
| 10 | EDLB1610 | DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud | Cloud Computing |
| 11 | EDLB1611 | Dual-Server Public-Key Encryption With Keyword Search for | Cloud Computing |
| 12 | EDLB1612 | Dynamic and Public Auditing with Fair Arbitration for Cloud Data | Cloud Computing |
| 13 | EDLB1613 | Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates | Cloud Computing |
| 14 | EDLB1614 | Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services | Cloud Computing |
| 15 | EDLB1615 | Geometric Range Search on Encrypted Spatial Data | Cloud Computing |
| 16 | EDLB1616 | Identity-Based Encryption with Cloud Revocation Authority and Its Applications | Cloud Computing |
| 17 | EDLB1617 | Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud | Cloud Computing |
| 18 | EDLB1618 | Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud | Cloud Computing |
| 19 | EDLB1619 | Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems | Cloud Computing |
| 20 | EDLB1620 | Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption | Cloud Computing |
| 21 | EDLB1621 | Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming | Cloud Computing |
| 22 | EDLB1622 | TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage | Cloud Computing |
| 23 | EDLB1623 | A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing | Cloud Computing |
| 24 | EDLB1624 | DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments | Cloud Computing |
| 25 | EDLB1625 | Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing | Cloud Computing |
| 26 | EDLB1626 | SecRBAC: Secure data in the Clouds | Cloud Computing |
| 27 | EDLB1627 | A Novel Recommendation Model Regularized with User Trust and Item Ratings | Data Mining |
| 28 | EDLB1628 | Automatically Mining Facets for Queries from Their Search Results | Data Mining |
| 29 | EDLB1629 | Booster in High Dimensional Data Classification | Data Mining |
| 30 | EDLB1630 | Building an intrusion detection system using a filter-based feature selection algorithm | Data Mining |
| 31 | EDLB1631 | Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information | Data Mining |
| 32 | EDLB1632 | Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings | Data Mining |
| 33 | EDLB1633 | Crowdsourcing for Top-K Query Processing over Uncertain Data | Data Mining |
| 34 | EDLB1634 | Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder | Data Mining |
| 35 | EDLB1635 | Domain-Sensitive Recommendation with User-Item Subgroup Analysis | Data Mining |
| 36 | EDLB1636 | Efficient Algorithms for Mining Top-K High Utility Itemsets | Data Mining |
| 37 | EDLB1637 | Efficient Cache-Supported Path Planning on Roads | Data Mining |
| 38 | EDLB1638 | Mining User-Aware Rare Sequential Topic Patterns in Document Streams | Data Mining |
| 39 | EDLB1639 | Nearest Keyword Set Search in Multi-Dimensional Datasets | Data Mining |
| 40 | EDLB1640 | Rating Prediction based on Social Sentiment from Textual Reviews | Data Mining |
| 41 | EDLB1641 | Location Aware Keyword Query Suggestion Based on Document Proximity | Data Mining |
| 42 | EDLB1642 | Using Hashtag Graph-based Topic Model to Connect Semantically-related Words without Co-occurrence in Microblogs | Data Mining |
| 43 | EDLB1643 | Quantifying Political Leaning from Tweets, Retweets, and Retweeters | Data Mining |
| 44 | EDLB1644 | Relevance Feedback Algorithms Inspired By Quantum Detection | Data Mining |
| 45 | EDLB1645 | Sentiment Embeddings with Applications to Sentiment Analysis | Data Mining |
| 46 | EDLB1646 | Top-Down XML Keyword Query Processing | Data Mining |
| 47 | EDLB1647 | TopicSketch: Real-time Bursty Topic Detection from Twitter | Data Mining |
| 48 | EDLB1648 | Top-k Dominating Queries on Incomplete Data | Data Mining |
| 49 | EDLB1649 | Understanding Short Texts through Semantic Enrichment and Hashing | Data Mining |
| 50 | EDLB1650 | A Stable Approach for Routing Queries in Unstructured P2P Networks | Networking |
| 51 | EDLB1651 | iPath: Path Inference in Wireless Sensor Networks | Networking |
| 52 | EDLB1652 | Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks | Networking |
| 53 | EDLB1653 | Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks | Networking |
| 54 | EDLB1654 | STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users | Networking |
| 55 | EDLB1655 | Energy and Memory Efficient Clone Detection in Wireless Sensor Networks | Mobile Computing |
| 56 | EDLB1656 | EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data | Mobile Computing |
| 57 | EDLB1657 | Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach | Mobile Computing |
| 58 | EDLB1658 | Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach | Mobile Computing |
| 59 | EDLB1659 | A Hop-by-Hop Routing Mechanism for Green Internet | Parallel & Distributed Systems |
| 60 | EDLB1660 | Continuous Answering Holistic Queries over Sensor Networks | Parallel & Distributed Systems |
| 61 | EDLB1661 | Dictionary Based Secure Provenance Compression for Wireless Sensor Networks | Parallel & Distributed Systems |
| 62 | EDLB1662 | The Server Provisioning Problem for Continuous Distributed Interactive Applications | Parallel & Distributed Systems |
| 63 | EDLB1663 | Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts | Secure Computing |
| 64 | EDLB1664 | Data Lineage in Malicious Environments | Secure Computing |
| 65 | EDLB1665 | Detecting Malicious Facebook Applications | Secure Computing |
| 66 | EDLB1666 | FRoDO: Fraud Resilient Device for Off-Line Micro-Payments | Secure Computing |
| 67 | EDLB1667 | Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata | Secure Computing |
| 68 | EDLB1668 | Resolving Multi-party Privacy Conflicts in Social Media | Secure Computing |
| 69 | EDLB1669 | Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions | Information Forensics & Security |
| 70 | EDLB1670 | Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data | Information Forensics & Security |
| 71 | EDLB1671 | Privacy-Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms | Information Forensics & Security |
| 72 | EDLB1672 | Profiling Online Social Behaviors for Compromised Account Detection | Information Forensics & Security |
| 73 | EDLB1673 | A Locality Sensitive Low-Rank Model for Image Tag Completion | Image Processing |
| 74 | EDLB1674 | A Scalable Approach for Content-Based Image Retrieval in Peer- to-Peer Networks | Image Processing |
| 75 | EDLB1675 | Learning of Multimodal Representations with Random Walks on the Click Graph | Image Processing |
| 76 | EDLB1676 | Online Multi-Modal Distance Metric Learning with Application to Image Retrieval | Image Processing |
| 77 | EDLB1677 | Tag Based Image Search by Social Re-ranking | Image Processing |
| 78 | EDLB1678 | Social Friend Recommendation Based on Multiple Network Correlation | Mutlimedia |
| 79 | EDLB1679 | User-Service Rating Prediction by Exploring Social Users Rating Behaviors | Mutlimedia |
| 80 | EDLB1680 | Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine- Grained Benchmark, and Feature Evaluation | Software Engineering |
| 81 | EDLB1681 | Metamorphic Testing for Software Quality Assessment: A Study of Search Engines | Software Engineering |
| 82 | EDLB1682 | SITAR: GUI Test Script Repair | Software Engineering |
| 83 | EDLB1683 | Answering Approximate Queries over XML Data | Fuzzy Systems |
| 84 | EDLB1684 | Malware Detection in Cloud Computing Infrastructures | Secure Computing |
| 85 | EDLB1685 | Two-Factor Data Security Protection Mechanism for Cloud Storage System | Cloud Computing |
| 86 | EDLB1686 | Attribute Based Data Sharing Scheme Revisited in Cloud Computing | Cloud Computing |
| 87 | EDLB1687 | Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud | Cloud Computing |
| 88 | EDLB1688 | Encrypted Data Management with Deduplication in Cloud Computing | Cloud Computing |
| 89 | EDLB1689 | ID2S Password-Authenticated Key Exchange Protocols | Secure Computing |
| 90 | EDLB1690 | Crawling Hidden Objects with kNN Queries | Data Mining |