0% found this document useful (0 votes)
89 views1 page

Ieee 2019 Java Projects List

This document lists computing and cybersecurity projects from 2019 across several domains: 1) It includes projects related to cloud computing, data mining, secure computing, information forensics and security, social networks, networking, cyber security, and the Internet of Things. 2) The projects cover topics such as cryptographically enforced access control in the cloud, health record privacy, data integrity auditing, collaborative filtering, image recommendation, bias detection, social bot detection, encrypted passwords, privacy attacks, rumor diffusion, online shaming, text classification, cyberbullying prediction, spam detection, and securing IoT data. 3) The years listed for each project are all 2019.

Uploaded by

Santhosh Soma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
89 views1 page

Ieee 2019 Java Projects List

This document lists computing and cybersecurity projects from 2019 across several domains: 1) It includes projects related to cloud computing, data mining, secure computing, information forensics and security, social networks, networking, cyber security, and the Internet of Things. 2) The projects cover topics such as cryptographically enforced access control in the cloud, health record privacy, data integrity auditing, collaborative filtering, image recommendation, bias detection, social bot detection, encrypted passwords, privacy attacks, rumor diffusion, online shaming, text classification, cyberbullying prediction, spam detection, and securing IoT data. 3) The years listed for each project are all 2019.

Uploaded by

Santhosh Soma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

S.

No Domain & Project Title Year


IEEE 2019COMPUTING
CLOUD PROJECTS LIST
LSJ1906 Crypt-DAC: Cryptographically Enforced Dynamic Access 2019
Control in the Cloud
LSJ1911 Hidden Ciphertext Policy Attribute-Based Encryption with Fast 2019
Decryption for Personal Health Record System
LSJ1914 Privacy-aware Personal Data Storage (P-PDS) Learning how to 2019
Protect User Privacy from External Applications
LSJ1924 Data Integrity Auditing without Private Key Storage for Secure 2019
Cloud Storage
DATA MINING
LSJ1934 Clustering-Based Collaborative Filtering Using an 2019
Incentivized/Penalized User Model
LSJ1935 A Hierarchical Attention Model for Social Contextual 2019
Image Recommendation
LSJ1939 DCCR: Deep Collaborative Conjunctive Recommender for 2019
Rating Prediction
LSJ1944 Filtering Instagram hashtags through crowd tagging and the 2019
HITS algorithm
LSJ1945 A Hybrid E-learning Recommendation Approach Based on 2019
Learners’ Influence Propagation
LSJ1955 Normalization of Duplicate Records from Multiple Sources 2019
SECURE COMPUTING
LSJ1965 Automated Decision Making in Airport Checkpoints: Bias 2019
Detection Toward Smarter Security and Fairness
LSJ1966 Detecting Malicious Social Bots Based on Click stream Sequences 2019
INFORMATION FORENSICS AND SECURITY
LSJ1970 Authentication by Encrypted Negative Password 2019
LSJ1971 Retrieving Hidden Friends: A Collusion Privacy Attack Against 2019
Online Friend Search Engine
SOCIAL NETWORK'S
LSJ1976 Social Network Rumor Diffusion Predication Based on 2019
Equal Responsibility Game Model
LSJ1977 Online Public Shaming on Twitter: Detection, Analysis and 2019
Mitigation
LSJ1979 A Fuzzy Approach to Text Classification with Two Stage 2019
Training for Ambiguous Instances
NETWORKING
CYBER SECURITY
LSJ1998 Predicting Cyberbullying on Social Media in the Big Data Era 2019
Using Machine Learning Algorithms: Review of Literature and
Open Challenges
LSJ1999 Spammer Detection and Fake User Identification on Social 2019
Networks
INTERNET OF THINGS (IOT)
LSJ19106 Securing Data in Internet of Things (IoT) Using Cryptography 2019
and Steganography Techniques

You might also like