Corporate Office
​MKS Towers, S. A. Road, Kadavanthra,
Cochin - 682020
P : +91 484 2204108 / 2204109
Trivandrum Branch
​Pazhoor Plaza, Opp. MG College, Kesavadasapuram, Thiruvananthapuram
P : +91 471-2446617/18
Calicut Branch
​First Floor, Aydeed Complex, YMCA Cross Road, Kozhikode
P : +91 495-2762188/99
Kannur Branch
​Second Floor, Lal's Appartment, South Bazar Kannur
P : +91 497 2762188/99
W: www.qis.co.in
IEEE Topics
TitleYearTypeTechnologyArea/Domain
AbstractTrustworthy Electronic Voting Using Adjusted Blockchain Technology2019TransactionsJavaBlockchain
AbstractSession-Key Establishment and Authentication in a Smart Home Network using Public Key Cryptography2019TransactionsJavaIoT/Security
Abstract‘A Wisdom of Crowds’: Social Media Mining for Soccer Match Analysis2019TransactionsJavaData Engineering/Data Mining
AbstractEfficient Vertical Mining of High Average-Utility Itemsets based on Novel Upper-Bounds2019TransactionsJavaData Engineering/ Data Mining
AbstractUsing Blockchain for Improved Video Integrity Verification2019TransactionsJavaBlockchain
AbstractSeVEP: Secure and Verifiable Electronic Polling System2019TransactionsJavaCloud Security
AbstractBlockchain-Based Proof of Delivery of Physical Assets With Single and Multiple Transporters2018TransactionsJavaBlockChain/ECommerce
AbstractA Secure Verifiable Ranked Choice Online Voting System Based on Homomorphic Encryption2018TransactionsJavaSecurity
AbstractAn Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images2018TransactionsJavaImage Processing/Data Hiding
AbstractA New Lightweight Symmetric Searchable Encryption Scheme for String Identification2018TransactionsJavaCloud Security
AbstractSemi-supervised learning based big data-driven anomaly detection in mobile wireless networks2018TransactionsJavaData Engineering/Big Data
AbstractAn Advanced Information Security System Using Image Based Graphical Password Scheme2018ConferenceJavaImage Processing/Security
AbstractAITSteg: An Innovative Text Steganography Technique for Hidden Transmission of Text Message via Social Media2018TransactionsJavaNetworking/Security
AbstractSecure Identity-Based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing2018TransactionsJavaCloud/Security
AbstractTAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud2018TransactionsJavaCloud Computing
AbstractSecure Data Collection Storage and Access in Cloud-Assisted IoT2018TransactionsJavaIoT/Security
AbstractSecure and Efficient Two-Party Signing Protocol2018TransactionsJavaSecurity/Networking
AbstractEfficient High Utility Negative Sequential Patterns Mining in Smart Campus2018TransactionsJavaData Mining
AbstractCypherDB: A Novel Architecture for Outsourcing Secure Database Processing2018TransactionsJavaCloud/Security
AbstractLightweight Block Ciphers for IoT: Energy Optimization and Survivability Techniques2018TransactionsJavaIoT
AbstractPrivacy preserving big data mining: association rule hiding using fuzzy logic approach2018TransactionsJavaData Mining/Security
AbstractA Secure Client-Side Framework for Protecting the Privacy of Health Data Stored on the Cloud2018ConferenceJavaCloud
AbstractAutomated Phrase Mining from Massive Text Corpora2018TransactionsJavaData Engineering / Data Mining
AbstractJ-17-17 - Enhanced Frequent Itemsets Based on Topic Modeling in Information Filtering2017ConferenceJavaData Engineering/Information Filtering
AbstractJ-17-16 - On the Security of Data Access Control for Multiauthority Cloud Storage Systems2017TransactionsJavaCloud/Security
AbstractJ-17-15 - Variable Neighborhood Search for a Colored Traveling Salesman Problem2017TransactionsJavaData Engineering
AbstractJ-17-14 - Drug-Target Interaction Prediction with Graph Regularized Matrix Factorization2017TransactionsJavaMedical/Data Engineering
AbstractJ-17-13 - SociRank: Identifying and Ranking Prevalent News Topics Using Social Media Factors2017TransactionsJavaData Engineering
AbstractJ-17-12 - Anomaly Detection for Big Log Data Using a Hadoop Ecosystem2017ConferenceJavaBig Data/ Mining
AbstractJ-17-11 - Two-Cloud Secure Database for Numeric-Related SQL Range Queries With Privacy Preserving2017TransactionsJavaCloud Security
AbstractJ-17-10 - NetSpam: A Network-Based Spam Detection Framework for Reviews in Online Social Media2017TransactionsJavaInformation Security/ Big Data
AbstractJ-17-09 - Cryptographic Solutions for Credibility and Liability Issues of Genomic Data2017TransactionsJavaSecure Computing/Security
AbstractJ-17-08 - Spamdoop: A privacy-preserving Big Data platform for collaborative spam detection2017TransactionsJavaBig Data
AbstractJ-17-07 - Efficient High Utility Pattern Mining for Establishing Manufacturing Plans With Sliding Window Control2017TransactionsJavaData Mining/Big Data
AbstractJ-17-06 - A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes2017TransactionsJavaIOT
AbstractJ-17-05 - Personal Web Revisitation by Context and Content Keywords with Relevance Feedback2017TransactionsJavaData Engineering
AbstractJ-17-04 - Strong Key-Exposure Resilient Auditing for Secure Cloud Storage2017TransactionsJavaCloud Security
AbstractJ-17-03 - Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds2017TransactionsJavaCloud Security
AbstractJ-17-02 - Mining High-Utility Itemsets with Irregular Occurrence2017ConferenceJavaData Mining /Big Data
AbstractJ-17-01 - Distributed Document Clustering Analysis Based on a Hybrid Method2017TransactionsJavaData Mining/ Big Data
Abstractj-16-17 - Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases 2016Transactions java Security/Data Mining/Cloud
AbstractJ-16-16 - Cryptographic Public Verification of Data Integrity for Cloud Storage Systems2016Transactions JavaCloud/Security
AbstractJ-16-15 - Secure Auditing and Deduplicating Data in Cloud2016Transactions JavaCloud/Security
AbstractJ-16-14 - A privacy-preserving multi-keyword ranked search scheme over encrypted cloud data using MIR-tree2016Conference JavaCloud/Security
AbstractJ-16-13 - Attribute-Based Data Sharing Scheme Revisited in Cloud Computing2016Transactions JavaCloud/Security
AbstractJ-16-12 - Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data2016Transactions JavaCloud/Security
AbstractJ-16-11 - Mapping Bug Reports to Relevant Files: A Ranking Model a Fine-Grained Benchmark and Feature Evaluation2016Transactions Java Data Engineering
AbstractJ-16-10 -A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn2016Transactions Java Data Mining/ Big Data
AbstractJ-16-09 -PBA: Prediction-Based Authentication for Vehicle-to-Vehicle Communications2016Transactions Java Secure Computing/ VANET
AbstractJ-16-08 - A Clustering Algorithm Based on Integration of K-Means and PSO2016Conference Java Data Engineering/Big Data
AbstractJ-16-07 - Personalized Travel Package With Multi-Point-of-Interest Recommendation Based on Crowdsourced User Footprints2016Transactions Java Data Engineering
AbstractJ-16-06 - Privacy Protection for Wireless Medical Sensor Data2016Transactions Java IOT/Medical
AbstractJ-16-05 - Two-Factor Data Security Protection Mechanism for Cloud Storage System2016Transactions Java Cloud Security
AbstractJ-16-04 - Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage2016Conference Java Data Engineering
AbstractJ-16-03 - Automatically Mining Facets for Queries from Their Search Results2016 Transactions Java Data Engineering
AbstractJ-16-02 - Hidden Ciphertext Policy Attribute Based Encryption under Standard Assumptions2016 Transactions Java Security
AbstractJ-16-01 - A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data2016 Transactions Java Cloud/Data Mining
AbstractJ-15-11 - Frequent itemset mining for Big Data in social media using ClustBigFIM algorithm 2015 Conference Java Data Mining/ Big Data
AbstractJ-15-10 -Performance comparison of parallel graph coloring algorithms on BSP model using hadoop 2015 Conference Java Big Data /Data Engineering
AbstractJ-15-09 - Pattern-based Topics for Document Modelling in Information Filtering 2015 Transactions Java Data Engineering
AbstractJ-15-08 - IncreSTS: Towards Real-Time Incremental Short Text Summarization on Comment Streams from Social Network Services 2015 Transactions Java Data Engineering
AbstractJ-15-07 - Can You Trust Online Ratings? A Mutual Reinforcement Model for Trustworthy Online Rating Systems 2015 Transactions Java Cybernetics
AbstractJ-15-06 - An Improved Dual Enciphering Intrigue for Banking Process using Adaptive Huffmann Coding 2015 Journal Java Security
AbstractJ-15-05 - Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks 2015 Transactions Java Networking
AbstractJ-15-04 - Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks 2015 Transactions Java Networking
AbstractJ-15-03 - Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments2015 JournalJAVASecurity/IoT
AbstractJ-15-02 - Translating Relational Queries into Spreadsheets2015Transaction / JournalJAVAData Engineering
AbstractJ-15-01 - Efficient Privacy-Preserving Ciphertext-Policy Attribute Based-Encryption and Broadcast Encryption2015Transaction / JournalJAVASecurity
AbstractJ-14-09 - A Novel DNA Sequence Dictionary method for Securing Data in DNA using Spiral Approach and Framework of DNA Cryptography2014 Transaction / JournalJAVASecurity
AbstractJ-14-08 - Dynamic Query Forms for Database Queries2014Transaction / JournalJAVAData Mining
AbstractJ-14-07 - Arbitrary-State Attribute-Based Encryption with Dynamic Membership2014Transaction / JournalJAVASecurity
AbstractJ-14-06 - Captcha as graphical password-A New Security Primitive Based on Hard AI Problems2014Transaction / JournalJAVAImage Processing/ Security
AbstractJ-14-05 - ClubCF: A Clustering Based Collaborative Filtering Approach For Big Data Application2014 Transaction / JournalJAVABig Data
AbstractJ-14-04 - Secure Ordered Bucketization2014Transaction / JournalJAVASecurity
AbstractJ-14-03 - Random Decision Tree Framework for Privacy-Preserving Data Mining2014Transaction / JournalJAVAData Mining/Security
AbstractJ-14-02 - Fast Nearest Neighbor Search with Keywords2014Transaction / JournalJAVAData Mining
AbstractJ-14-01 - A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks2014Transaction / JournalJAVASecurity/ Networking