S. NO.

Project ID

Project Title

Project Domain

1 EDLB1601 A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data Cloud Computing
2 EDLB1602 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud Cloud Computing
3 EDLB1603 An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing Cloud Computing
4 EDLB1604 An Efficient Privacy-Preserving Ranked Keyword Search Method Cloud Computing
5 EDLB1605 CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System Cloud Computing
6 EDLB1606 Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing Cloud Computing
7 EDLB1607 CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services Cloud Computing
8 EDLB1608 Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email Cloud Computing
9 EDLB1609 Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds Cloud Computing
10 EDLB1610 DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud Cloud Computing
11 EDLB1611 Dual-Server Public-Key Encryption With Keyword Search for Cloud Computing
12 EDLB1612 Dynamic and Public Auditing with Fair Arbitration for Cloud Data Cloud Computing
13 EDLB1613 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates Cloud Computing
14 EDLB1614 Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services Cloud Computing
15 EDLB1615 Geometric Range Search on Encrypted Spatial Data Cloud Computing
16 EDLB1616 Identity-Based Encryption with Cloud Revocation Authority and Its Applications Cloud Computing
17 EDLB1617 Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud Cloud Computing
18 EDLB1618 Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud Cloud Computing
19 EDLB1619 Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems Cloud Computing
20 EDLB1620 Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption Cloud Computing
21 EDLB1621 Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming Cloud Computing
22 EDLB1622 TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage Cloud Computing
23 EDLB1623 A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing Cloud Computing
24 EDLB1624 DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments Cloud Computing
25 EDLB1625 Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing Cloud Computing
26 EDLB1626 SecRBAC: Secure data in the Clouds Cloud Computing
27 EDLB1627 A Novel Recommendation Model Regularized with User Trust and Item Ratings Data Mining
28 EDLB1628 Automatically Mining Facets for Queries from Their Search Results Data Mining
29 EDLB1629 Booster in High Dimensional Data Classification Data Mining
30 EDLB1630 Building an intrusion detection system using a filter-based feature selection algorithm Data Mining
31 EDLB1631 Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information Data Mining
32 EDLB1632 Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings Data Mining
33 EDLB1633 Crowdsourcing for Top-K Query Processing over Uncertain Data Data Mining
34 EDLB1634 Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder Data Mining
35 EDLB1635 Domain-Sensitive Recommendation with User-Item Subgroup Analysis Data Mining
36 EDLB1636 Efficient Algorithms for Mining Top-K High Utility Itemsets Data Mining
37 EDLB1637 Efficient Cache-Supported Path Planning on Roads Data Mining
38 EDLB1638 Mining User-Aware Rare Sequential Topic Patterns in Document Streams Data Mining
39 EDLB1639 Nearest Keyword Set Search in Multi-Dimensional Datasets Data Mining
40 EDLB1640 Rating Prediction based on Social Sentiment from Textual Reviews Data Mining
41 EDLB1641 Location Aware Keyword Query Suggestion Based on Document Proximity Data Mining
42 EDLB1642 Using Hashtag Graph-based Topic Model to Connect Semantically-related Words without Co-occurrence in Microblogs Data Mining
43 EDLB1643 Quantifying Political Leaning from Tweets, Retweets, and Retweeters Data Mining
44 EDLB1644 Relevance Feedback Algorithms Inspired By Quantum Detection Data Mining
45 EDLB1645 Sentiment Embeddings with Applications to Sentiment Analysis Data Mining
46 EDLB1646 Top-Down XML Keyword Query Processing Data Mining
47 EDLB1647 TopicSketch: Real-time Bursty Topic Detection from Twitter Data Mining
48 EDLB1648 Top-k Dominating Queries on Incomplete Data Data Mining
49 EDLB1649 Understanding Short Texts through Semantic Enrichment and Hashing Data Mining
50 EDLB1650 A Stable Approach for Routing Queries in Unstructured P2P Networks Networking
51 EDLB1651 iPath: Path Inference in Wireless Sensor Networks Networking
52 EDLB1652 Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks Networking
53 EDLB1653 Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks Networking
54 EDLB1654 STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users Networking
55 EDLB1655 Energy and Memory Efficient Clone Detection in Wireless Sensor Networks Mobile Computing
56 EDLB1656 EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data Mobile Computing
57 EDLB1657 Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach Mobile Computing
58 EDLB1658 Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach Mobile Computing
59 EDLB1659 A Hop-by-Hop Routing Mechanism for Green Internet Parallel & Distributed Systems
60 EDLB1660 Continuous Answering Holistic Queries over Sensor Networks Parallel & Distributed Systems
61 EDLB1661 Dictionary Based Secure Provenance Compression for Wireless Sensor Networks Parallel & Distributed Systems
62 EDLB1662 The Server Provisioning Problem for Continuous Distributed Interactive Applications Parallel & Distributed Systems
63 EDLB1663 Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts Secure Computing
64 EDLB1664 Data Lineage in Malicious Environments Secure Computing
65 EDLB1665 Detecting Malicious Facebook Applications Secure Computing
66 EDLB1666 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments Secure Computing
67 EDLB1667 Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata Secure Computing
68 EDLB1668 Resolving Multi-party Privacy Conflicts in Social Media Secure Computing
69 EDLB1669 Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions Information Forensics & Security
70 EDLB1670 Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data Information Forensics & Security
71 EDLB1671 Privacy-Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms Information Forensics & Security
72 EDLB1672 Profiling Online Social Behaviors for Compromised Account Detection Information Forensics & Security
73 EDLB1673 A Locality Sensitive Low-Rank Model for Image Tag Completion Image Processing
74 EDLB1674 A Scalable Approach for Content-Based Image Retrieval in Peer- to-Peer Networks Image Processing
75 EDLB1675 Learning of Multimodal Representations with Random Walks on the Click Graph Image Processing
76 EDLB1676 Online Multi-Modal Distance Metric Learning with Application to Image Retrieval Image Processing
77 EDLB1677 Tag Based Image Search by Social Re-ranking Image Processing
78 EDLB1678 Social Friend Recommendation Based on Multiple Network Correlation Mutlimedia
79 EDLB1679 User-Service Rating Prediction by Exploring Social Users Rating Behaviors Mutlimedia
80 EDLB1680 Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine- Grained Benchmark, and Feature Evaluation Software Engineering
81 EDLB1681 Metamorphic Testing for Software Quality Assessment: A Study of Search Engines Software Engineering
82 EDLB1682 SITAR: GUI Test Script Repair Software Engineering
83 EDLB1683 Answering Approximate Queries over XML Data Fuzzy Systems
84 EDLB1684 Malware Detection in Cloud Computing Infrastructures Secure Computing
85 EDLB1685 Two-Factor Data Security Protection Mechanism for Cloud Storage System Cloud Computing
86 EDLB1686 Attribute Based Data Sharing Scheme Revisited in Cloud Computing Cloud Computing
87 EDLB1687 Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud Cloud Computing
88 EDLB1688 Encrypted Data Management with Deduplication in Cloud Computing Cloud Computing
89 EDLB1689 ID2S Password-Authenticated Key Exchange Protocols Secure Computing
90 EDLB1690 Crawling Hidden Objects with kNN Queries Data Mining