EXPOSYS DATA LABS
BANGLORE 7795207065
Sr No |
Project ID |
Project Title |
Domain |
| 1 |
EDL1000 |
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification |
Cloud Computing |
| 2 |
EDL1001 |
A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing |
Cloud Computing |
| 3 |
EDL1002 |
A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing |
Cloud Computing |
| 4 |
EDL1003 |
A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users |
Cloud Computing |
| 5 |
EDL1004 |
A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage |
Cloud Computing |
| 6 |
EDL1005 |
A Robust Reputation Management Mechanism In The Federated Cloud |
Cloud Computing |
7 |
EDL1006 |
Achieving Efficient and Secure Data Acquisition for Cloud- supported Internet of Things in Smart Grid |
Cloud Computing |
| 8 |
EDL1007 |
Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data |
Cloud Computing |
| 9 |
EDL1008 |
Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems |
Cloud Computing |
| 10 |
EDL1009 |
Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing |
Cloud Computing |
| 11 |
EDL1010 |
Efficient and Expressive Keyword Search Over Encrypted Data in Cloud |
Cloud Computing |
| 12 |
EDL1011 |
Fast Phrase Search for Encrypted Cloud Storage Cloud Computing |
Cloud Computing |
| 13 |
EDL1012 |
Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds |
Cloud Computing |
| 14 |
EDL1013 |
Identity-Based Encryption with Cloud Revocation Authority and Its Applications |
Cloud Computing |
| 15 |
EDL1014 |
Identity-Based Private Matching over Outsourced Encrypted Datasets |
Cloud Computing |
| 16 |
EDL1015 |
Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage |
Cloud Computing |
| 17 |
EDL1016 |
On the Security of Data Access Control for Multi-authority Cloud Storage Systems |
Cloud Computing |
| 18 |
EDL1017 |
Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing |
Cloud Computing |
| 19 |
EDL1018 |
Privacy Protection based Access Control Scheme in Cloud-based Services |
Cloud Computing |
| 20 |
EDL1019 |
Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data |
Cloud Computing |
| 21 |
EDL1020 |
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud |
Cloud Computing |
| 22 |
EDL1021 |
RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage |
Cloud Computing |
| 23 |
EDL1022 |
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption |
Cloud Computing |
| 24 |
EDL1023 |
Securing Cloud Data under Key Exposure |
Cloud Computing |
| 25 |
EDL1024 |
TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud |
Cloud Computing |
| 26 |
EDL1025 |
TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud |
Cloud Computing |
| 27 |
EDL1026 |
Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving |
Data Mining |
| 28 |
EDL1027 |
An Iterative Classification Scheme for Sanitizing Large-Scale Datasets |
Data Mining |
| 29 |
EDL1028 |
Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach |
Data Mining |
| 30 |
EDL1029 |
Collaborative Filtering-Based Recommendation of Online Social Voting |
Data Mining |
| 31 |
EDL1030 |
Computing Semantic Similarity of Concepts in Knowledge Graphs |
Data Mining |
| 32 |
EDL1031 |
Detecting Stress Based on Social Interactions in Social Networks |
Data Mining |
| 33 |
EDL1032 |
Dynamic Facet Ordering for Faceted Product Search Engines |
Data Mining |
| 34 |
EDL1033 |
Efficient Clue-based Route Search on Road Networks |
Data Mining |
| 35 |
EDL1034 |
Efficient Keyword-aware Representative Travel Route Recommendation |
Data Mining |
| 36 |
EDL1035 |
Energy-efficient Query Processing in Web Search Engines |
Data Mining |
| 37 |
EDL1036 |
Generating Query Facets using Knowledge Bases Data Mining |
Data Mining |
| 38 |
EDL1037 |
Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach |
Data Mining |
| 39 |
EDL1038 |
l-Injection: Toward Effective Collaborative Filtering Using Uninteresting Items |
Data Mining |
| 40 |
EDL1039 |
Mining Competitors from Large Unstructured Datasets |
Data Mining |
| 41 |
EDL1040 |
Modeling Information Diffusion over Social Networks for Temporal Dynamic Prediction |
Data Mining |
| 42 |
EDL1041 |
Personal Web Revisitation by Context and Content Keywords with Relevance Feedback |
Data Mining |
| 43 |
EDL1042 |
PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks |
Data Mining |
| 44 |
EDL1043 |
QDA: A Query-Driven Approach to Entity Resolution |
Data Mining |
| 45 |
EDL1044 |
Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data |
Data Mining |
| 46 |
EDL1045 |
RAPARE: A Generic Strategy for Cold-Start Rating Prediction Problem |
Data Mining |
| 47 |
EDL1046 |
SociRank: Identifying and Ranking Prevalent News Topics Using Social Media Factors |
Data Mining |
| 48 |
EDL1047 |
Towards Real-Time, Country-Level Location Classification of Worldwide Tweets Data Mining |
Data Mining |
| 49 |
EDL1048 |
Trajectory Community Discovery and Recommendation by Multi- source Diffusion Modeling |
Data Mining |
| 50 |
EDL1049 |
Understand Short Texts by Harvesting and Analyzing Semantic Knowledge |
Data Mining |
| 51 |
EDL1050 |
User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective |
Data Mining |
| 52 |
EDL1051 |
User-Centric Similarity Search |
Data Mining |
| 53 |
EDL1052 |
When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks |
Data Mining |
| 54 |
EDL1053 |
An Overlay Architecture for Throughput Optimal Multipath Routing |
Networking |
| 55 |
EDL1054 |
FaceChange: Attaining Neighbor Node Anonymity in Mobile Opportunistic Social Networks With Fine-Grained Control |
Networking |
| 56 |
EDL1055 |
Network Capability in Localizing Node Failures via End-to-End Path Measurements |
Networking |
| 57 |
EDL1056 |
Privacy and Integrity Preserving Top-k Query Processing for Two- Tiered Sensor Network |
Networking |
| 58 |
EDL1057 |
Routing in Accumulative Multi-Hop Networks |
Networking |
| 59 |
EDL1058 |
SWEET: Serving the Web by Exploiting Email Tunnels |
Networking |
| 60 |
EDL1059 |
A Proxy-based Collaboration System to Minimize Content Download Time and Energy Consumption |
Mobile Computing |
| 61 |
EDL1060 |
Detecting Mobile Malicious Webpages in Real Time |
Mobile Computing |
| 62 |
EDL1061 |
Quantifying Interdependent Privacy Risks with Location Data |
Mobile Computing |
| 63 |
EDL1062 |
Searching Trajectories by Regions of Interest |
Mobile Computing |
| 64 |
EDL1063 |
SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks |
Mobile Computing |
| 65 |
EDL1064 |
iASK: A Distributed Q & System Incorporating Social Community and Global Collective Intelligence Parallel & Distributed Systems |
Mobile Computing |
| 66 |
EDL1065 |
A Credibility Analysis System for Assessing Information on Twitter |
Secure Computing |
| 67 |
EDL1066 |
Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems |
Secure Computing |
| 68 |
EDL1067 |
FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data |
Secure Computing |
| 69 |
EDL1068 |
My Privacy My Decision: Control of Photo Sharing on Online Social Networks |
Secure Computing |
| 70 |
EDL1069 |
Privacy-Preserving Selective Aggregation of Online User Behavior Data |
Secure Computing |
| 71 |
EDL1070 |
ProGuard: Detecting Malicious Accounts in Social-Network-Based Online Promotions |
Secure Computing |
| 72 |
EDL1071 |
Search Rank Fraud and Malware Detection in Google Play |
Secure Computing |
| 73 |
EDL1072 |
Towards Detecting Compromised Accounts on Social Networks |
Secure Computing |
| 74 |
EDL1073 |
NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media |
Information Forensics & Security |
| 75 |
EDL1074 |
Preventing Distributed Denial-of-Service Flooding Attacks with Dynamic Path Identifiers |
Information Forensics & Security |
| 76 |
EDL1075 |
Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending |
Information Forensics & Security |
| 77 |
EDL1076 |
A Distributed Publisher-Driven Secure Data Sharing Scheme for Information-Centric IoT |
Internet of Things(Iot) |
| 78 |
EDL1077 |
An Efficient and Fine-grained Big Data Access Control Scheme with Privacy-preserving Policy |
Internet of Things(Iot) |
| 79 |
EDL1078 |
Efficient and Privacy-preserving Polygons Spatial Query Framework for Location-based Services |
Internet of Things(Iot) |
| 80 |
EDL1079 |
Follow But No Track: Privacy Preserved Profile Publishing in Cyber-Physical Social Systems |
Internet of Things(Iot) |
| 81 |
EDL1080 |
SPFM: Scalable and Privacy-preserving Friend Matching in Mobile Cloud |
Internet of Things(Iot) |
| 82 |
EDL1081 |
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud |
BIG DATA |
| 83 |
EDL1082 |
SocialQA An Online Social Network Based Question and Answer System |
BIG DATA |
| 84 |
EDL1083 |
Automatic Generation of Social Event Storyboard from Image Click-through Data |
Image Processing |
| 85 |
EDL1084 |
Image Re-ranking based on Topic Diversity |
Image Processing |
| 86 |
EDL1085 |
Tri-Clustered Tensor Completion for Social-Aware Image Tag Refinement |
Image Processing |
| 87 |
EDL1086 |
Two-Stage Friend Recommendation Based on Network Alignment and Series-Expansion of Probabilistic Topic Model |
Multimedia |
| 88 |
EDL1087 |
A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection |
Software Engineering |
| 89 |
EDL1088 |
Improving Automated Bug Triaging with Specialized Topic Model |
Software Engineering |
| 90 |
EDL1089 |
Collaborative Filtering Service Recommendation Based on a Novel Similarity Computation Method Service Computing(Web Services) |
Service Computing(Web Services) |
| 91 |
EDL1090 |
Transactional Behavior Verification in Business Process as a Service Configuration |
Service Computing(Web Services) |