DotNet Projects 2018-19

Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing

Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing

Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage

Enabling Semantic Search based on Conceptual Graphs over Encrypted Outsourced Data

Graph Encryption for Top-K Nearest Keyword Search Queries on Cloud

Keyword Search with Access Control over Encrypted Cloud Data

MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection

Privacy Protection Based Access Control Scheme in Cloud-Based Services

Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data

Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data

SeDaSC: Secure Data Sharing in Clouds

Strong Key-Exposure Resilient Auditing for Secure Cloud Storage

TAFC: Time and Attribute Factors Combined Access Control for Time- Sensitive Data in Public Cloud

User Differentiated Verifiable File Search on the Cloud

VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data

A Multi-Agent Advanced Traveler Information System for Optimal Trip Planning in a Co-Modal Framework

Continuous Top-k Monitoring on Document Streams

Detecting Stress Based on Social Interactions in Social Networks

Dynamic Facet Ordering for Faceted Product Search Engines

Efficient Keyword-aware Representative Travel Route Recommendation

Filtering out Infrequent Behavior from Business Process Event Logs

GALLOP: GlobAL feature fused Location Prediction for Different Check-in Scenarios

Generating Query Facets using Knowledge Bases

Influence Maximization in Trajectory Databases

Query Reorganisation Algorithms for Efficient Boolean Information Filtering

E2HRC: An Energy-Efficient Heterogeneous Ring Clustering Routing Protocol for Wireless Sensor Networks

Energy Efficient Clustering Algorithm for Multi-Hop Wireless Sensor Network Using Type-2 Fuzzy Logic

Energy Efficient Multipath Routing Protocol for Mobile ad-hoc Network Using the Fitness Function

Lightweight Three-factor Authentication and Key Agreement Protocol for Internet-integrated Wireless Sensor Networks

Research on Trust Sensing based Secure Routing Mechanism for Wireless Sensor Network

Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs

Cooperative Query Answer Authentication Scheme over Anonymous Sensing Data

FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data

NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media

Privacy-Preserving Selective Aggregation of Online User Behavior Data

Search Rank Fraud and Malware Detection in Google Play

Leveraging Crowdsourcing for Efficient Malicious Users Detection in Large-Scale Social Networks

SPFM: Scalable and Privacy-preserving Friend Matching in Mobile Cloud

A Novel Data Hiding Algorithm for High Dynamic Range Images

Image Re-ranking based on Topic Diversity

Flexible Wildcard Searchable Encryption System

Transactional Behavior Verification in Business Process as a Service Configuration