About Internet of Things (IOT)

The Internet of things (stylised Internet of Things or IoT) is the internetworking of physical devices, vehicles (also referred to as "connected devices" and "smart devices"), buildings and other items—embedded with electronics, software, sensors, actuators, and network connectivity that enable these objects to collect and exchange data. In 2013 the Global Standards Initiative on Internet of Things (IoT-GSI) defined the IoT as "the infrastructure of the information society.". The IoT allows objects to be sensed and/or controlled remotely across existing network infrastructure,creating opportunities for more direct integration of the physical world into computer-based systems, and resulting in improved efficiency, accuracy and economic benefit. When IoT is augmented with sensors and actuators, the technology becomes an instance of the more general class of cyber-physical systems, which also encompasses technologies such as smart grids, smart homes, intelligent transportation and smart cities. Each thing is uniquely identifiable through its embedded computing system but is able to interoperate within the existing Internet infrastructure. Experts estimate that the IoT will consist of almost 50 billion objects by 2020.


Projects on IOT

Projects - IEEE 2016-17 Network Simulator 2

S.No.Project CodeProject TitleDomainLanguage / Year
1N1601A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc NetworksMANETNS2/2016
2N1602D2D: Delay-Aware Distributed Dynamic Adaptation of Contention Window in Wireless NetworksMANETNS2/2016
3N1603Detecting Colluding Blackhole and Greyhole Attacks in Delay Tolerant NetworksMANETNS2/2016
4N1604Distance-Based Location Management Utilizing Initial Position for Mobile Communication Networks MANETNS2/2016
5N1605Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes MANETNS2/2016
6N1606Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks MANETNS2/2016
7N1607Top-k Query Processing and Malicious Node Identification Based on Node Grouping in MANETs MANETNS2/2016
8N1608Resisting Blackhole Attacks on MANETsMANET (IEEE CONFERENCE)NS2/2016
9N1609A Kautz-Based Wireless Sensor and Actuator Network for Real-Time, Fault-Tolerant and Energy-Efficient TransmissionWSN(Routing)NS2/2016
10N1610CANS: Towards Congestion-Adaptive and Small Stretch Emergency Navigation with Wireless Sensor NetworksWSN(Routing)NS2/2016
11N1611Cluster-Based Routing for the Mobile Sink in Wireless Sensor Networks With ObstaclesWSN(Routing)NS2/2016
12N1612Code-Based Neighbor Discovery Protocols in Mobile Wireless Networks WSN(Routing)NS2/2016
13N1613DaGCM: A Concurrent Data Uploading Framework for Mobile Data Gathering in Wireless Sensor NetworksWSN(Routing)NS2/2016
14N1614Dictionary Based Secure Provenance Compression for Wireless Sensor NetworksWSN(Routing)NS2/2016
15N1615Distributed Emergency Guiding with Evacuation Time Optimization Based on Wireless Sensor NetworksWSN(Routing)NS2/2016
16N1616Duplicate Detectable Opportunistic Forwarding in Duty-Cycled Wireless Sensor NetworksWSN(Routing)NS2/2016
17N1617Fair Routing for Overlapped Cooperative Heterogeneous Wireless Sensor Networks WSN(Routing)NS2/2016
18N1618Geographic and Opportunistic Routing for Underwater Sensor NetworksWSN(Routing)NS2/2016
19N1619iPath: Path Inference in Wireless Sensor NetworksWSN(Routing)NS2/2016
20N1620Joint Optimization of Lifetime and Transport Delay under Reliability Constraint Wireless Sensor NetworksWSN(Routing)NS2/2016
21N1621Location aware sensor routing protocol for mobile wireless sensor networksWSN(Routing)NS2/2016
22N1622Maximizing Data Collection Throughput on a Path in Energy Harvesting Sensor Networks Using a Mobile SinkWSN(Routing)NS2/2016
23N1623Maximum Data Collection Rate in Rechargeable Wireless Sensor Networks with Multiple SinksWSN(Routing)NS2/2016
24N1624Mobile Coordinated Wireless Sensor Network: An Energy Efficient Scheme for Real-Time TransmissionsWSN(Routing)NS2/2016
25N1625NACRP: A Connectivity Protocol for Star Topology Wireless Sensor NetworksWSN(Routing)NS2/2016
26N1626Privacy-Preserving Data Aggregation in Mobile Phone SensingWSN(Routing)NS2/2016
27N1627RSSI-based Localization through Uncertain Data Mapping for Wireless Sensor NetworksWSN(Routing)NS2/2016
28N1628Towards Distributed Optimal Movement Strategy for Data Gathering in Wireless Sensor NetworksWSN(Routing)NS2/2016
29N1629DTMAC: A Delay Tolerant MAC Protocol for Underwater Wireless Sensor NetworksUWSN (Routing)NS2/2016
30N1630A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor NetworksWSN (Security)NS2/2016
31N1631ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks WSN (Security)NS2/2016
32N1632Adaptive and Channel-Aware Detection of Selective Forwarding Attacks in Wireless Sensor NetworksWSN (Security)NS2/2016
33N1633Analysis of One-Time Random Projections for Privacy Preserving Compressed Sensing WSN (Security)NS2/2016
34N1634Energy and Memory Efficient Clone Detection in Wireless Sensor Networks WSN (Security)NS2/2016
35N1635PKC-Based DoS Attacks-Resistant Scheme in Wireless Sensor NetworksWSN (Security)NS2/2016
36N1636Reliable and Efficient Data Acquisition in Wireless Sensor Networks in the Presence of Transfaulty NodesWSN (Security)NS2/2016
37N1637Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNsWSN (Security)NS2/2016
38N1638A Pseudonym Management System to Achieve Anonymity in Vehicular Ad Hoc NetworksVANETNS2/2016
39N1639A Threshold Anonymous Authentication Protocol for VANETsVANETNS2/2016
40N1640ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc NetworksVANETNS2/2016
41N1641Coalition Formation for Cooperative Service-Based Message Sharing in Vehicular Ad Hoc NetworksVANETNS2/2016
42N1642Contact-Aware Data Replication in Roadside Unit Aided Vehicular Delay Tolerant NetworksVANETNS2/2016
43N1643DIVERT: A Distributed Vehicular Traffic Re-routing System for Congestion AvoidanceVANETNS2/2016
44N1644Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc NetworksVANETNS2/2016
45N1645LORA: Loss Differentiation Rate Adaptation Scheme for Vehicle-to-Vehicle Safety CommunicationsVANETNS2/2016
46N1646SCRP: Stable CDS-Based Routing Protocol for Urban Vehicular Ad Hoc NetworksVANETNS2/2016
47N1647Secure and Robust Multi-Constrained QoS Aware Routing Algorithm for VANETsVANETNS2/2016
48N1648A Hop-by-Hop Routing Mechanism for Green InternetWIRELESS COMMUNICATIONSNS2/2016
49N1649Achieving Optimal Traffic Engineering Using a Generalized Routing Framework WIRELESS COMMUNICATIONSNS2/2016
50N1650Assessing Performance Gains Through Global Resource Control of Heterogeneous Wireless NetworksWIRELESS COMMUNICATIONSNS2/2016
51N1651Contact Duration Aware Data Replication in DTNs with Licensed and Unlicensed SpectrumWIRELESS COMMUNICATIONSNS2/2016
52N1652Cost-Aware Caching: Caching More (Costly Items) for Less (ISPs Operational Expenditures)WIRELESS COMMUNICATIONSNS2/2016
53N1653Design of Scheduling Algorithms for End-to-End Backlog Minimization in Wireless Multi-Hop Networks Under -Hop Interference Models WIRELESS COMMUNICATIONSNS2/2016
54N1654DSearching: Using Floating Mobility Information for Distributed Node Searching in DTNsWIRELESS COMMUNICATIONSNS2/2016
55N1655Dynamic Network Control for Confidential Multi-Hop CommunicationsWIRELESS COMMUNICATIONSNS2/2016
56N1656Embedding IP Unique Shortest Path Topology on a Wavelength-Routed Network: Normal and Survivable DesignWIRELESS COMMUNICATIONSNS2/2016
57N1657Ghost-in-ZigBee: Energy Depletion Attack on ZigBee based Wireless NetworksInternet of Things (IoT)NS2/2016
58N1658Improving Access Point Association Protocols Through Channel Utilization and Adaptive ProbingWIRELESS COMMUNICATIONS NS2/2016
59N1659LAAEM: A Method to Enhance LDoS AttackSECURE COMPUTINGNS2/2016
60N1660Mimicry Attacks Against Wireless Link Signature and New Defense Using Time-Synched Link SignatureSECURE COMPUTINGNS2/2016
61N1661PROVEST: Provenance-based Trust Model for Delay Tolerant NetworksSECURE COMPUTINGNS2/2016
62N1662Routing Protocol for Heterogeneous Wireless Mesh NetworksMesh NetworksNS2/2016
63N1663Opportunistic Piggyback Marking for IP TracebackSECURE COMPUTINGNS2/2016
64N1664Secure Transmission Against Pilot Spoofing Attack: A Two-Way Training-Based SchemeSECURE COMPUTINGNS2/2016
65N1665Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network CodingSECURE COMPUTINGNS2/2016
66N1666Thwarting Selfish Behavior in 802.11 WLANsNETWORKINGNS2/2016
67N1667Mobility Prediction Based Joint Stable Routing and Channel Assignment for Mobile Ad Hoc Cognitive NetworksCOGNITIVE NETWORKNS2/2016
68N1668Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach MOBILE COMPUTINGNS2/2016
69N1669Local Anchor Schemes for Seamless and Low-Cost Handover in Coordinated Small CellsMOBILE COMPUTINGNS2/2016
70N1670Robotic Message Ferrying for Wireless Networks using Coarse-Grained Backpressure ControlMOBILE COMPUTINGNS2/2016
71N1671TCP-Aware Backpressure Routing and SchedulingMOBILE COMPUTINGNS2/2016
72N1672Virtual Multipath Attack and Defense for Location Distinction in Wireless NetworksMOBILE COMPUTINGNS2/2016

Projects - IEEE 2016 DOT NET

S.No.Project CodeProject TitleDomainLanguage / Year
1D1601A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud DataCLOUD COMPUTING.NET/2016
2D1602Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing CLOUD COMPUTING.NET/2016
3D1603Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud ComputingCLOUD COMPUTING.NET/2016
4D1604Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health CloudsCLOUD COMPUTING.NET/2016
5D1605Dynamic and Public Auditing with Fair Arbitration for Cloud DataCLOUD COMPUTING.NET/2016
6D1606Dynamic-Hash-Table Based Public Auditing for Secure Cloud StorageCLOUD COMPUTING.NET/2016
7D1607Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates CLOUD COMPUTING.NET/2016
8D1608Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing ServicesCLOUD COMPUTING.NET/2016
9D1609Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public CloudCLOUD COMPUTING.NET/2016
10D1610KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud StorageCLOUD COMPUTING.NET/2016
11D1611Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud CLOUD COMPUTING.NET/2016
12D1612MMBcloud-tree: Authenticated Index for Verifiable Cloud Service SelectionCLOUD COMPUTING.NET/2016
13D1613Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-Mining-As-a-Service ParadigmCLOUD COMPUTING.NET/2016
14D1614A Mixed Generative-Discriminative Based Hashing MethodDATA MINING.NET/2016
15D1615Personalized Travel Sequence Recommendation on Multi-Source Big Social MediaDATA MINING.NET/2016
16D1616Practical Approximate k Nearest Neighbor Queries with Location and Query PrivacyDATA MINING.NET/2016
17D1617Text Mining the Contributors to Rail AccidentsDATA MINING.NET/2016
18D1618User-Service Rating Prediction by Exploring Social Users’ Rating BehaviorsDATA MINING.NET/2016
19D1619Efficient Certificateless Access Control for Wireless Body Area NetworksNETWORKING.NET/2016
20D1620Finding Nonequivalent Classifiers in Boolean Space to Reduce TCAM UsageNETWORKING.NET/2016
21D1621Geographic and Opportunistic Routing for Underwater Sensor Networks NETWORKING.NET/2016
22D1622Optimizing Cost for Online Social Networks on Geo-Distributed CloudsNETWORKING.NET/2016
23D1623Secure and Efficient data communication protocol for Wireless Body Area NetworksNETWORKING.NET/2016
24D1624A Joint Time Synchronization and Localization Design for Mobile Underwater Sensor NetworksMOBILE COMPUTING.NET/2016
25D1625DaGCM: A Concurrent Data Uploading Framework for Mobile Data Gathering in Wireless Sensor NetworksMOBILE COMPUTING.NET/2016
26D1626Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging AppsMOBILE COMPUTING.NET/2016
27D1627Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNsMOBILE COMPUTING.NET/2016
28D1628WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile DevicesMOBILE COMPUTING.NET/2016
29D1629Authenticated Key Exchange Protocols for Parallel Network File SystemsPARALLEL AND DISTRIBUTED SYSTEMS.NET/2016
30D1630Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage SystemsPARALLEL AND DISTRIBUTED SYSTEMS.NET/2016
31D1631Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data MiningSECURE COMPUTING.NET/2016
32D1632ID2S Password-Authenticated Key Exchange ProtocolsSECURE COMPUTING.NET/2016
33D1633Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases INFORMATION FORENSICS AND SECURITY .NET/2016
34D1634Content-Adaptive Steganography by Minimizing Statistical DetectabilityIMAGE PROCESSING.NET/2016
35D1635Secure Reversible Image Data Hiding over Encrypted Domain via Key ModulationIMAGE PROCESSING.NET/2016
36D1636Securing SIFT: Privacy-preserving Outsourcing Computation of Feature Extractions over Encrypted Image DataIMAGE PROCESSING.NET/2016
37D1637EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted DataIoT (INTERNET OF THINGS).NET/2016
38D1638Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple KeysSERVICE COMPUTING.NET/2016

Projects - IEEE 2016-17 JAVA

S.No.Project CodeProject TitleDomainLanguage / Year
1J1601A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data CLOUD COMPUTINGJAVA/2016
2J1602A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud CLOUD COMPUTINGJAVA/2016
3J1603An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing CLOUD COMPUTINGJAVA/2016
4J1604An Efficient Privacy-Preserving Ranked Keyword Search MethodCLOUD COMPUTINGJAVA/2016
5J1605CDA Generation and Integration for Health Information Exchange Based on Cloud Computing SystemCLOUD COMPUTINGJAVA/2016
6J1606Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud ComputingCLOUD COMPUTINGJAVA/2016
7J1607CloudArmor: Supporting Reputation-Based Trust Management for Cloud ServicesCLOUD COMPUTINGJAVA/2016
8J1608Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud EmailCLOUD COMPUTINGJAVA/2016
9J1609Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health CloudsCLOUD COMPUTINGJAVA/2016
10J1610DiploCloud: Efficient and Scalable Management of RDF Data in the CloudCLOUD COMPUTINGJAVA/2016
11J1611Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud StorageCLOUD COMPUTINGJAVA/2016
12J1612Dynamic and Public Auditing with Fair Arbitration for Cloud DataCLOUD COMPUTINGJAVA/2016
13J1613Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key UpdatesCLOUD COMPUTINGJAVA/2016
14J1614Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing ServicesCLOUD COMPUTINGJAVA/2016
15J1615Geometric Range Search on Encrypted Spatial DataCLOUD COMPUTINGJAVA/2016
16J1616Identity-Based Encryption with Cloud Revocation Authority and Its ApplicationsCLOUD COMPUTINGJAVA/2016
17J1617Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public CloudCLOUD COMPUTINGJAVA/2016
18J1618Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the CloudCLOUD COMPUTINGJAVA/2016
19J1619Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage SystemsCLOUD COMPUTINGJAVA/2016
20J1620Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption CLOUD COMPUTINGJAVA/2016
21J1621Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear ProgrammingCLOUD COMPUTINGJAVA/2016
22J1622TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud StorageCLOUD COMPUTINGJAVA/2016
23J1623A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud ComputingCLOUD COMPUTINGJAVA/2016
24J1624DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User EnvironmentsCLOUD COMPUTINGJAVA/2016
25J1625Flexible and Fine-Grained Attribute-Based Data Storage in Cloud ComputingCLOUD COMPUTINGJAVA/2016
26J1626SecRBAC: Secure data in the CloudsCLOUD COMPUTINGJAVA/2016
27J1627A Novel Recommendation Model Regularized with User Trust and Item RatingsDATA MININGJAVA/2016
28J1628Automatically Mining Facets for Queries from Their Search ResultsDATA MININGJAVA/2016
29J1629Booster in High Dimensional Data ClassificationDATA MININGJAVA/2016
30J1630Building an intrusion detection system using a filter-based feature selection algorithm DATA MININGJAVA/2016
31J1631Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging InformationDATA MININGJAVA/2016
32J1632Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings DATA MININGJAVA/2016
33J1633Crowdsourcing for Top-K Query Processing over Uncertain DataDATA MININGJAVA/2016
34J1634Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder DATA MININGJAVA/2016
35J1635Domain-Sensitive Recommendation with User-Item Subgroup Analysis DATA MININGJAVA/2016
36J1636Efficient Algorithms for Mining Top-K High Utility ItemsetsDATA MININGJAVA/2016
37J1637Efficient Cache-Supported Path Planning on RoadsDATA MININGJAVA/2016
38J1638Mining User-Aware Rare Sequential Topic Patterns in Document Streams DATA MININGJAVA/2016
39J1639Nearest Keyword Set Search in Multi-Dimensional DatasetsDATA MININGJAVA/2016
40J1640Rating Prediction based on Social Sentiment from Textual Reviews DATA MININGJAVA/2016
41J1641Location Aware Keyword Query Suggestion Based on Document ProximityDATA MININGJAVA/2016
42J1642Using Hashtag Graph-based Topic Model to Connect Semantically-related Words without Co-occurrence in MicroblogsDATA MININGJAVA/2016
43J1643Quantifying Political Leaning from Tweets, Retweets, and RetweetersDATA MININGJAVA/2016
44J1644Relevance Feedback Algorithms Inspired By Quantum DetectionDATA MININGJAVA/2016
45J1645Sentiment Embeddings with Applications to Sentiment AnalysisDATA MININGJAVA/2016
46J1646Top-Down XML Keyword Query ProcessingDATA MININGJAVA/2016
47J1647TopicSketch: Real-time Bursty Topic Detection from TwitterDATA MININGJAVA/2016
48J1648Top-k Dominating Queries on Incomplete DataDATA MININGJAVA/2016
49J1649Understanding Short Texts through Semantic Enrichment and HashingDATA MININGJAVA/2016
50J1650A Stable Approach for Routing Queries in Unstructured P2P NetworksNETWORKINGJAVA/2016
51J1651iPath: Path Inference in Wireless Sensor NetworksNETWORKINGJAVA/2016
52J1652Opportunistic Routing With Congestion Diversity in Wireless AdHoc NetworksNETWORKINGJAVA/2016
53J1653Spatial Reusability-Aware Routing in Multi-Hop Wireless NetworksNETWORKINGJAVA/2016
54J1654STAMP: Enabling Privacy-Preserving Location Proofs for Mobile UsersNETWORKINGJAVA/2016
55J1655Energy and Memory Efficient Clone Detection in Wireless Sensor Networks MOBILE COMPUTINGJAVA/2016
56J1656EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted DataMOBILE COMPUTINGJAVA/2016
57J1657Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach MOBILE COMPUTINGJAVA/2016
58J1658Detecting Node Failures in Mobile Wireless Networks: A Probabilistic ApproachMOBILE COMPUTINGJAVA/2016
59J1659A Hop-by-Hop Routing Mechanism for Green InternetPARALLEL & DISTRIBUTED SYSTEMSJAVA/2016
60J1660Continuous Answering Holistic Queries over Sensor NetworksPARALLEL & DISTRIBUTED SYSTEMSJAVA/2016
61J1661Dictionary Based Secure Provenance Compression for Wireless Sensor Networks PARALLEL & DISTRIBUTED SYSTEMSJAVA/2016
62J1662The Server Provisioning Problem for Continuous Distributed Interactive ApplicationsPARALLEL & DISTRIBUTED SYSTEMSJAVA/2016
63J1663Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts SECURE COMPUTINGJAVA/2016
64J1664Data Lineage in Malicious EnvironmentsSECURE COMPUTINGJAVA/2016
65J1665Detecting Malicious Facebook ApplicationsSECURE COMPUTINGJAVA/2016
66J1666FRoDO: Fraud Resilient Device for Off-Line Micro-PaymentsSECURE COMPUTINGJAVA/2016
67J1667Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata SECURE COMPUTINGJAVA/2016
68J1668Resolving Multi-party Privacy Conflicts in Social MediaSECURE COMPUTINGJAVA/2016
69J1669Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions INFORMATION FORENSICS & SECURITYJAVA/2016
70J1670Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data INFORMATION FORENSICS & SECURITYJAVA/2016
71J1671Privacy-Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms INFORMATION FORENSICS & SECURITYJAVA/2016
72J1672Profiling Online Social Behaviors for Compromised Account DetectionINFORMATION FORENSICS & SECURITYJAVA/2016
73J1673A Locality Sensitive Low-Rank Model for Image Tag CompletionIMAGE PROCESSINGJAVA/2016
74J1674A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer NetworksIMAGE PROCESSINGJAVA/2016
75J1675Learning of Multimodal Representations with Random Walks on the Click GraphIMAGE PROCESSINGJAVA/2016
76J1676Online Multi-Modal Distance Metric Learning with Application to Image RetrievalIMAGE PROCESSINGJAVA/2016
77J1677Tag Based Image Search by Social Re-rankingIMAGE PROCESSINGJAVA/2016
78J1678Social Friend Recommendation Based on Multiple Network CorrelationMULTIMEDIA (Social Networking)JAVA/2016
79J1679User-Service Rating Prediction by Exploring Social Users’ Rating BehaviorsMULTIMEDIA (Social Networking)JAVA/2016
80J1680Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine-Grained Benchmark, and Feature EvaluationSOFTWARE ENGINEERINGJAVA/2016
81J1681Metamorphic Testing for Software Quality Assessment: A Study of Search Engines SOFTWARE ENGINEERINGJAVA/2016
83J1683Answering Approximate Queries over XML DataFUZZY SYSTEMSJAVA/2016