This document lists computing and cybersecurity projects from 2019 across several domains:
1) It includes projects related to cloud computing, data mining, secure computing, information forensics and security, social networks, networking, cyber security, and the Internet of Things.
2) The projects cover topics such as cryptographically enforced access control in the cloud, health record privacy, data integrity auditing, collaborative filtering, image recommendation, bias detection, social bot detection, encrypted passwords, privacy attacks, rumor diffusion, online shaming, text classification, cyberbullying prediction, spam detection, and securing IoT data.
3) The years listed for each project are all 2019.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
89 views1 page
Ieee 2019 Java Projects List
This document lists computing and cybersecurity projects from 2019 across several domains:
1) It includes projects related to cloud computing, data mining, secure computing, information forensics and security, social networks, networking, cyber security, and the Internet of Things.
2) The projects cover topics such as cryptographically enforced access control in the cloud, health record privacy, data integrity auditing, collaborative filtering, image recommendation, bias detection, social bot detection, encrypted passwords, privacy attacks, rumor diffusion, online shaming, text classification, cyberbullying prediction, spam detection, and securing IoT data.
3) The years listed for each project are all 2019.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1
S.
No Domain & Project Title Year
IEEE 2019COMPUTING CLOUD PROJECTS LIST LSJ1906 Crypt-DAC: Cryptographically Enforced Dynamic Access 2019 Control in the Cloud LSJ1911 Hidden Ciphertext Policy Attribute-Based Encryption with Fast 2019 Decryption for Personal Health Record System LSJ1914 Privacy-aware Personal Data Storage (P-PDS) Learning how to 2019 Protect User Privacy from External Applications LSJ1924 Data Integrity Auditing without Private Key Storage for Secure 2019 Cloud Storage DATA MINING LSJ1934 Clustering-Based Collaborative Filtering Using an 2019 Incentivized/Penalized User Model LSJ1935 A Hierarchical Attention Model for Social Contextual 2019 Image Recommendation LSJ1939 DCCR: Deep Collaborative Conjunctive Recommender for 2019 Rating Prediction LSJ1944 Filtering Instagram hashtags through crowd tagging and the 2019 HITS algorithm LSJ1945 A Hybrid E-learning Recommendation Approach Based on 2019 Learners’ Influence Propagation LSJ1955 Normalization of Duplicate Records from Multiple Sources 2019 SECURE COMPUTING LSJ1965 Automated Decision Making in Airport Checkpoints: Bias 2019 Detection Toward Smarter Security and Fairness LSJ1966 Detecting Malicious Social Bots Based on Click stream Sequences 2019 INFORMATION FORENSICS AND SECURITY LSJ1970 Authentication by Encrypted Negative Password 2019 LSJ1971 Retrieving Hidden Friends: A Collusion Privacy Attack Against 2019 Online Friend Search Engine SOCIAL NETWORK'S LSJ1976 Social Network Rumor Diffusion Predication Based on 2019 Equal Responsibility Game Model LSJ1977 Online Public Shaming on Twitter: Detection, Analysis and 2019 Mitigation LSJ1979 A Fuzzy Approach to Text Classification with Two Stage 2019 Training for Ambiguous Instances NETWORKING CYBER SECURITY LSJ1998 Predicting Cyberbullying on Social Media in the Big Data Era 2019 Using Machine Learning Algorithms: Review of Literature and Open Challenges LSJ1999 Spammer Detection and Fake User Identification on Social 2019 Networks INTERNET OF THINGS (IOT) LSJ19106 Securing Data in Internet of Things (IoT) Using Cryptography 2019 and Steganography Techniques