JAVA Projects 2019-20

A Secure G-Cloud-Based Framework for Government Healthcare Services

CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics

Data security in cloud computing using AES

EACS: An Efficient Access Control Scheme for Electronic Publishing in Cloud Computing

Efficient Client-Side De-duplication of Encrypted Data With Public Auditing in Cloud Storage

Privacy-preserving Crowd-sourced Statistical Data Publishing with An Untrusted Server

Credibility Evaluation of Twitter Based DATA MINING Java/2019 Event Detection by a Mixing Analysis of Heterogeneous Data

FooDNet: Toward an Optimized Food Delivery Network based on Spatial Crowdsourcing

Dating with Scam Bots: Understanding the Ecosystem of Fraudulent Dating Applications

A Fog-centric Secure Cloud Storage Scheme

PersoNet: Friend Recommendation System Based on Big-Five Personality Traits and Hybrid Filtering

Trust Relationship Prediction in Alibaba E- Commerce Platform

JAVA Projects 2018-19

Identity-Based Private Matching over Outsourced Encrypted Datasets

Collaborative Filtering-Based Recommendation of Online Social Voting

Detecting Stress Based on Social Interactions in Social Networks

Detecting Mobile Malicious WebPages in Real Time

Routing in Accumulative Multi-Hop Networks

NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Manjunath Media J1774

SWEET: Serving the Web by Exploiting Email Tunnels

Energy-efficient Query Processing in Web Search Engines

Preventing Distributed Denial-of-Service Flooding Attacks with Dynamic Path Identifiers

Mining Competitors from Large Unstructured Datasets

Efficient Clue-based Route Search on Road Networks

Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending

Continuous Top - K Monitoring Document Stream

A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing

Search Rank Fraud and Malware Detection in Google Play

SocialQ&A An Online Social Network

SUPERMAN: Security Using Pre-Existing Routing for Mobile Adhoc Networks

Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud

Understand Short Texts by Harvesting and Analyzing Semantic Knowledge

Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Networks

Customer Satisfaction Aware Optimal Multiserver Configuration for Profit Maximization

A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage

Efficient and Expressive Keyword Search Over Encrypted Data in Cloud

Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds

Securing Cloud Data under Key Exposure

ProGuard: Detecting Malicious Accounts in Social-Network-Based Online Promotions

Collaborative Filtering Service Recommendation Based on a Novel Similarity Computation Method

Java projects 2018

A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud

A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data

Circuit Cipher text-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing

Cloud Armor: Supporting Reputation-Based Trust Management for Cloud Services

Identity-Based Encryption with Cloud Revocation Authority and Its Applications

Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates

Detecting Malicious Facebook Applications

Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts

Nearest Keyword Set Search in Multi-Dimensional Datasets Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder

A Scalable Approach for Content-Based Image Retrieval in Peer to- Peer Networks

Resolving Multi-party Privacy Conflicts in Social Media

Tag Based Image Search by Social Re-ranking

Encrypted datamanagement with deduplication in cloud computing

TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage

Top-k Dominating Queries on Incomplete Data

Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks

STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users

iPath: Path Inference in Wireless Sensor Networks

Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information

Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption

Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud

CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System

Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing

Building an intrusion detection system using a filter-based feature selection algorithm

Dictionary Based Secure Provenance Compression for Wireless Sensor Networks

Efficient Cache-Supported Path Planning on Roads

Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud

Building an intrusion detection system using a filter-based feature selection algorithm

Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming

Geometric Range Search on Encrypted Spatial Data

Rating Prediction based on Social Sentiment from Textual Reviews

Location Aware Keyword Query Suggestion Based on Document Proximity

Using Hash tag Graph-based Topic Model to Connect Semantically-related Words


Relevance Feedback Algorithms Inspired By Quantum Detection

Data Lineage in Malicious Environments

Domain-Sensitive Recommendation with User-Item Subgroup Analysis

Automatically Mining Facets for Queries from Their Search Results

Rating Prediction based on Social Sentiment from Textual Reviews

Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services

Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks

FRoDO: Fraud Resilient Device for Off-Line Micro-Payments

Energy and Memory Efficient Clone Detection in Wireless Sensor Networks

Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata

Crawling Hidden Objects with kNN Queries

Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function

Dynamic-Hash-Table Based Public Auditing for Secure Cloud StorageS

Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-Mining

Mining User-Aware Rare Sequential Topic Patterns in Document Streams

An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing

A Stable Approach for Routing Queries in Unstructured P2P Networks

A Hop-by-Hop Routing Mechanism for Green Internet

Online Multi-Modal Distance Metric Learning with Application to Image Retrieval

Crowd sourcing for Top-K Query Processing over Uncertain Data

Booster in High Dimensional Data Classification

Quantifying Political Leaning from Tweets, Retweets, and Retweeters

Sentiment Embeddings with Applications to Sentiment Analysis

Relevance Feedback Algorithms Inspired By Quantum Detection

Using Hash tag Graph-based Topic Model to Connect Semantically-related Words without Co-occurrence in Micro blogs

Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage

DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments

Data Lineage in Malicious Environments

Mapping Bug Reports to Relevant Files

A Scalable Approach for Content Based Image Retrieval in Peer to Peer Networks

Practical approximate k nearest neighbor queries with location and query privacy

Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data

Detecting Node Failures in Mobile Wireless Networks : A probabilistic Approach

An Efficient Privacy-Preserving Ranked Keyword Search Method