S.N O Project Title Tech
S.N O Project Title Tech
N
O
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
Project Title
SAE: Toward Efficient Cloud Data Analysis Service for
Large-Scale Social Networks
On Summarization and Timeline Generation for
Evolutionary Tweet Streams
A Secure and Dynamic Multi-keyword Ranked Search
Scheme over Encrypted Cloud Data
EnDAS Efficient Encrypted Data Search as a Mobile
Cloud Service
FRAppE: Detecting Malicious Facebook Applications
Steganography Using Reversible Texture Synthesis
Smar tCrawler : A Two-stage Crawler for Efficiently Har
vesting Deep-Web Interfaces
PSMPA: Patient Self-Controllable and Multi-Level
Privacy-Preserving Cooperative Authentication in
Distributed m-Healthcare Cloud Computing System
Passive IP Traceback: Disclosing the Locations
of IP Spoofers From Path Backscatter
Route-Saver: Leveraging Route APIs for Accurate and
Efficient Query Processing at Location-Based Services
Secure Auditing and Deduplicating Data in Cloud
Privacy Policy Inference of User-Uploaded Images on
Content Sharing Sites
A Distributed Three-hop Routing Protocol to Increase the
Capacity of Hybrid Wireless Networks
An Attribute-assisted Re ranking Model for Web Image
Search
Authenticated Key Exchange Protocols for Parallel
Network File Systems
Cost-Aware SEcure Routing (CASER) Protocol Design
for Wireless Sensor Networks
Dynamic Routing for Data Integrity and Delay
Differentiated Services in Wireless Sensor Networks
EMR: A Scalable Graph-based Ranking Model for
Content-based Image Retrieval
A Lightweight Secure Scheme for Detecting Provenance
Forgery and Packet Drop Attacks in Wireless Sensor
Networks
My Privacy My Decision: Control of Photo Sharing on
Online Social Networks
Software Puzzle: A Countermeasure to Resource-Inflated
Tech
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
DOTNE
T
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
Denial-of-Service Attacks
Tweet Segmentation and Its Application to Named Entity
Recognition
Opportunistic Routing Algorithm for Relay Node
Selection in Wireless Sensor Networks
Privacy-Preserving and Truthful Detection of Packet
Dropping Attacks in Wireless Ad Hoc Networks
Effective Key Management in Dynamic Wireless Sensor
Networks
Discovery of Ranking Fraud for Mobile Apps
Key-Aggregate Searchable Encryption (KASE) for Group
Data Sharing via Cloud Storage
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA
JAVA