Latest Java Topics
Latest Java Topics
2.A proof of concept of farmer to consumer food products traceability for local communities
3.A smart and ubiquitous controlled agriculture system integrated with multi purpose in smart
agriculture
5.An integrated bulk products enabled on demand grocery shopping and delivery cloud system
in the innovative approach
11.design of operating distributions for a cable operater with the defined life cycles
18.construct food safety traceability system for peoples health under the internet of things and
big data
27.Real Time Emergency Aid System with analysis Vehicle Breakdown Finder Assistance and
the Services
48.A Web to database system for collecting student College Events and Feed back
52.Airline Reservation
103.Movie_Recommendation
BLOCK CHAIN:
1.A Trusted Blockchain-Based Traceability System for Fruit and Vegetable Agricultural
Products
6.Fortified Chain A Blockchain Based Framework for Security and Privacy Assured Internet
of Medical Things
9.A Proxy Re-encryption Approach to Secure Data Sharing in the of Things Based on Block
Chain
10.Data Trust Framework Using Blockchain Technology and Adaptive Transaction Validation
CLOUD COMPUTING:
1.A Verifiable and Fair Attribute-based Proxy Re-encryption Scheme for Data Sharing in
Clouds
2.Similarity Search for Encrypted Images in Secure Cloud Computing Secure Cloud
Computing
5.Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage
6.An Efficient Search Method Using Features to Match Joint Keywords on Encrypted Cloud
Data
11.Provably secure and lightweight identity-based authenticated data sharing protocol for
cyber-physical cloud environment
12.A Cloud Secure Storage Mechanism Based on Data Dispersion and Encryption
13.A Lightweight policy update scheme for outsourced personal health records sharing
17.Secure Cloud Storage with Data Dynamics Using Secure Network Coding Techniques
23.A Data Sharing Protocol to Minimize Security and Privacy Risks of Cloud Storage in Big
Data Era
25.A Trust-Based Agent Learning Model for Service Composition in Mobile Cloud Computing
Environments
26.Data Integrity Auditing without Private Key Storage for Secure Cloud Storage
28.Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud
Data
30.Hidden Ciphertext Policy Attribute-Based Encryption With Fast Decryption for Personal
Health Record System
33.Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud
Computing
34.Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT
1.Efficient and Privacy-Preserving Similarity Range Query over Encrypted Time Series Data
2.Achieving Efficient and Privacy-Preserving Exact Set Similarity Search over Encrypted Data
5.Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data
Publishers
6.Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-
Key Based Verification
7.Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key
Based Verification
1.Owner-Enabled Secure Authorized Keyword Search Over Encrypted Data With Flexible
Metadata
3.Scalable and Secure Big Data IoT System Based on Multifactor Authentication and
Lightweight Cryptography
4.Identity Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public
Cloud
SERVICES COMPUTING:
2.Achieve Efficient and Verifiable Conjunctive and Fuzzy Queries over Encrypted Data in
Cloud
5.Attribute Based Cloud Data Integrity Auditing for Secure Outsourced Storage
DATA MINING:
3.Discovering Hidden Topical Hubs and Authorities Across Multiple Online Social Networks
10.Predicting Taxi and Uber Demand in Cities Approaching the Limit of Predictability
17.Construct Food Safety Traceability System for Peoples Health Under the Internet of Things
and Big Data
21.User Behavior Prediction of Social Hotspots Based on Multimessage Interaction and Neural
Network
24.AdSherlock Efficient and Deployable Click Fraud Detection for Mobile Applications
25.Emotion Correlation Mining Through Deep Learning Models on Natural Language Text
26.Online Pricing with Reserve Price Constraint for Personal Data Markets
28.Achieving Secure and Dynamic Range Queries Over Encrypted Cloud Data
29.Suicide Ideation Detection using Multiple Feature Analysis from Twitter Data
34.A Study of Bug Management Using the Stack Exchange Question and Answering Platform
36.Structural and Textual Information Fusion for Symptom and Disease Representation
Learning
INDUSTRIAL INFORMATICS:
1.A Fast Nearest Neighbor Search Scheme over Outsourced Encrypted Medical Images
2.Pairing-Free Certificate-Based Searchable Encryption Supporting Privacy-Preserving
Keyword Search Function for IIoTs
MULTIMEDIA: