| Title | Year | Type | Technology | Area/Domain
|
Abstract | Trustworthy Electronic Voting Using Adjusted Blockchain Technology | 2019 | Transactions | Java | Blockchain
|
Abstract | Session-Key Establishment and Authentication in a Smart Home Network using Public Key Cryptography | 2019 | Transactions | Java | IoT/Security
|
Abstract | ‘A Wisdom of Crowds’: Social Media Mining for Soccer Match Analysis | 2019 | Transactions | Java | Data Engineering/Data Mining
|
Abstract | Efficient Vertical Mining of High Average-Utility Itemsets based on Novel Upper-Bounds | 2019 | Transactions | Java | Data Engineering/ Data Mining
|
Abstract | Using Blockchain for Improved Video Integrity Verification | 2019 | Transactions | Java | Blockchain
|
Abstract | SeVEP: Secure and Verifiable Electronic Polling System | 2019 | Transactions | Java | Cloud Security
|
Abstract | Blockchain-Based Proof of Delivery of Physical Assets With Single and Multiple Transporters | 2018 | Transactions | Java | BlockChain/ECommerce
|
Abstract | A Secure Verifiable Ranked Choice Online Voting System Based on Homomorphic Encryption | 2018 | Transactions | Java | Security
|
Abstract | An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images | 2018 | Transactions | Java | Image Processing/Data Hiding
|
Abstract | A New Lightweight Symmetric Searchable Encryption Scheme for String Identification | 2018 | Transactions | Java | Cloud Security
|
Abstract | Semi-supervised learning based big data-driven anomaly detection in mobile wireless networks | 2018 | Transactions | Java | Data Engineering/Big Data
|
Abstract | An Advanced Information Security System Using Image Based Graphical Password Scheme | 2018 | Conference | Java | Image Processing/Security
|
Abstract | AITSteg: An Innovative Text Steganography Technique for Hidden Transmission of Text Message via Social Media | 2018 | Transactions | Java | Networking/Security
|
Abstract | Secure Identity-Based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing | 2018 | Transactions | Java | Cloud/Security
|
Abstract | TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud | 2018 | Transactions | Java | Cloud Computing
|
Abstract | Secure Data Collection Storage and Access in Cloud-Assisted IoT | 2018 | Transactions | Java | IoT/Security
|
Abstract | Secure and Efficient Two-Party Signing Protocol | 2018 | Transactions | Java | Security/Networking
|
Abstract | Efficient High Utility Negative Sequential Patterns Mining in Smart Campus | 2018 | Transactions | Java | Data Mining
|
Abstract | CypherDB: A Novel Architecture for Outsourcing Secure Database Processing | 2018 | Transactions | Java | Cloud/Security
|
Abstract | Lightweight Block Ciphers for IoT: Energy Optimization and Survivability Techniques | 2018 | Transactions | Java | IoT
|
Abstract | Privacy preserving big data mining: association rule hiding using fuzzy logic approach | 2018 | Transactions | Java | Data Mining/Security
|
Abstract | A Secure Client-Side Framework for Protecting the Privacy of Health Data Stored on the Cloud | 2018 | Conference | Java | Cloud
|
Abstract | Automated Phrase Mining from Massive Text Corpora | 2018 | Transactions | Java | Data Engineering / Data Mining
|
Abstract | J-17-17 - Enhanced Frequent Itemsets Based on Topic Modeling in Information Filtering | 2017 | Conference | Java | Data Engineering/Information Filtering
|
Abstract | J-17-16 - On the Security of Data Access Control for Multiauthority Cloud Storage Systems | 2017 | Transactions | Java | Cloud/Security
|
Abstract | J-17-15 - Variable Neighborhood Search for a Colored Traveling Salesman Problem | 2017 | Transactions | Java | Data Engineering
|
Abstract | J-17-14 - Drug-Target Interaction Prediction with Graph Regularized Matrix Factorization | 2017 | Transactions | Java | Medical/Data Engineering
|
Abstract | J-17-13 - SociRank: Identifying and Ranking Prevalent News Topics Using Social Media Factors | 2017 | Transactions | Java | Data Engineering
|
Abstract | J-17-12 - Anomaly Detection for Big Log Data Using a Hadoop Ecosystem | 2017 | Conference | Java | Big Data/ Mining
|
Abstract | J-17-11 - Two-Cloud Secure Database for Numeric-Related SQL Range Queries With Privacy Preserving | 2017 | Transactions | Java | Cloud Security
|
Abstract | J-17-10 - NetSpam: A Network-Based Spam Detection Framework for Reviews in Online Social Media | 2017 | Transactions | Java | Information Security/ Big Data
|
Abstract | J-17-09 - Cryptographic Solutions for Credibility and Liability Issues of Genomic Data | 2017 | Transactions | Java | Secure Computing/Security
|
Abstract | J-17-08 - Spamdoop: A privacy-preserving Big Data platform for collaborative spam detection | 2017 | Transactions | Java | Big Data
|
Abstract | J-17-07 - Efficient High Utility Pattern Mining for Establishing Manufacturing Plans With Sliding Window Control | 2017 | Transactions | Java | Data Mining/Big Data
|
Abstract | J-17-06 - A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes | 2017 | Transactions | Java | IOT
|
Abstract | J-17-05 - Personal Web Revisitation by Context and Content Keywords with Relevance Feedback | 2017 | Transactions | Java | Data Engineering
|
Abstract | J-17-04 - Strong Key-Exposure Resilient Auditing for Secure Cloud Storage | 2017 | Transactions | Java | Cloud Security
|
Abstract | J-17-03 - Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds | 2017 | Transactions | Java | Cloud Security
|
Abstract | J-17-02 - Mining High-Utility Itemsets with Irregular Occurrence | 2017 | Conference | Java | Data Mining /Big Data
|
Abstract | J-17-01 - Distributed Document Clustering Analysis Based on a Hybrid Method | 2017 | Transactions | Java | Data Mining/ Big Data
|
Abstract | j-16-17 - Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases | 2016 | Transactions | java | Security/Data Mining/Cloud
|
Abstract | J-16-16 - Cryptographic Public Verification of Data Integrity for Cloud Storage Systems | 2016 | Transactions | Java | Cloud/Security
|
Abstract | J-16-15 - Secure Auditing and Deduplicating Data in Cloud | 2016 | Transactions | Java | Cloud/Security
|
Abstract | J-16-14 - A privacy-preserving multi-keyword ranked search scheme over encrypted cloud data using MIR-tree | 2016 | Conference | Java | Cloud/Security
|
Abstract | J-16-13 - Attribute-Based Data Sharing Scheme Revisited in Cloud Computing | 2016 | Transactions | Java | Cloud/Security
|
Abstract | J-16-12 - Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data | 2016 | Transactions | Java | Cloud/Security
|
Abstract | J-16-11 - Mapping Bug Reports to Relevant Files: A Ranking Model a Fine-Grained Benchmark and Feature Evaluation | 2016 | Transactions | Java | Data Engineering
|
Abstract | J-16-10 -A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn | 2016 | Transactions | Java | Data Mining/ Big Data
|
Abstract | J-16-09 -PBA: Prediction-Based Authentication for Vehicle-to-Vehicle Communications | 2016 | Transactions | Java | Secure Computing/ VANET
|
Abstract | J-16-08 - A Clustering Algorithm Based on Integration of K-Means and PSO | 2016 | Conference | Java | Data Engineering/Big Data
|
Abstract | J-16-07 - Personalized Travel Package With Multi-Point-of-Interest Recommendation Based on Crowdsourced User Footprints | 2016 | Transactions | Java | Data Engineering
|
Abstract | J-16-06 - Privacy Protection for Wireless Medical Sensor Data | 2016 | Transactions | Java | IOT/Medical
|
Abstract | J-16-05 - Two-Factor Data Security Protection Mechanism for Cloud Storage System | 2016 | Transactions | Java | Cloud Security
|
Abstract | J-16-04 - Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage | 2016 | Conference | Java | Data Engineering
|
Abstract | J-16-03 - Automatically Mining Facets for Queries from Their Search Results | 2016 | Transactions | Java | Data Engineering
|
Abstract | J-16-02 - Hidden Ciphertext Policy Attribute Based Encryption under Standard Assumptions | 2016 | Transactions | Java | Security
|
Abstract | J-16-01 - A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data | 2016 | Transactions | Java | Cloud/Data Mining
|
Abstract | J-15-11 - Frequent itemset mining for Big Data in social media using ClustBigFIM algorithm | 2015 | Conference | Java | Data Mining/ Big Data
|
Abstract | J-15-10 -Performance comparison of parallel graph coloring algorithms on BSP model using hadoop | 2015 | Conference | Java | Big Data /Data Engineering
|
Abstract | J-15-09 - Pattern-based Topics for Document Modelling in Information Filtering | 2015 | Transactions | Java | Data Engineering
|
Abstract | J-15-08 - IncreSTS: Towards Real-Time Incremental Short Text Summarization on Comment Streams from Social Network Services | 2015 | Transactions | Java | Data Engineering
|
Abstract | J-15-07 - Can You Trust Online Ratings? A Mutual Reinforcement Model for Trustworthy Online Rating Systems | 2015 | Transactions | Java | Cybernetics
|
Abstract | J-15-06 - An Improved Dual Enciphering Intrigue for Banking Process using Adaptive Huffmann Coding | 2015 | Journal | Java | Security
|
Abstract | J-15-05 - Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks | 2015 | Transactions | Java | Networking
|
Abstract | J-15-04 - Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks | 2015 | Transactions | Java | Networking
|
Abstract | J-15-03 - Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments | 2015 | Journal | JAVA | Security/IoT
|
Abstract | J-15-02 - Translating Relational Queries into Spreadsheets | 2015 | Transaction / Journal | JAVA | Data Engineering
|
Abstract | J-15-01 - Efficient Privacy-Preserving Ciphertext-Policy Attribute Based-Encryption and Broadcast Encryption | 2015 | Transaction / Journal | JAVA | Security
|
Abstract | J-14-09 - A Novel DNA Sequence Dictionary method for Securing Data in DNA using Spiral Approach and Framework of DNA Cryptography | 2014 | Transaction / Journal | JAVA | Security
|
Abstract | J-14-08 - Dynamic Query Forms for Database Queries | 2014 | Transaction / Journal | JAVA | Data Mining
|
Abstract | J-14-07 - Arbitrary-State Attribute-Based Encryption with Dynamic Membership | 2014 | Transaction / Journal | JAVA | Security
|
Abstract | J-14-06 - Captcha as graphical password-A New Security Primitive Based on Hard AI Problems | 2014 | Transaction / Journal | JAVA | Image Processing/ Security
|
Abstract | J-14-05 - ClubCF: A Clustering Based Collaborative Filtering Approach For Big Data Application | 2014 | Transaction / Journal | JAVA | Big Data
|
Abstract | J-14-04 - Secure Ordered Bucketization | 2014 | Transaction / Journal | JAVA | Security
|
Abstract | J-14-03 - Random Decision Tree Framework for Privacy-Preserving Data Mining | 2014 | Transaction / Journal | JAVA | Data Mining/Security
|
Abstract | J-14-02 - Fast Nearest Neighbor Search with Keywords | 2014 | Transaction / Journal | JAVA | Data Mining
|
Abstract | J-14-01 - A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks | 2014 | Transaction / Journal | JAVA | Security/ Networking |