Sl.No Project code Project title Domain Year Enquiry
1ECJAV_1601 Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing CLOUD COMPUTING 2015
2ECJAV_1602 Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption CLOUD COMPUTING 2015
3ECJAV_1603 An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration CLOUD COMPUTING 2015
4ECJAV_1604 Enabling Cloud Storage Auditing With Key-Exposure Resistance CLOUD COMPUTING 2015
5ECJAV_1605 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud CLOUD COMPUTING 2015
6ECJAV_1606 CloudArmor: Supporting Reputation-based Trust Management for Cloud Services CLOUD COMPUTING 2015
7ECJAV_1607 Audit-Free Cloud Storage via Deniable Attribute-based Encryption CLOUD COMPUTING 2015
8ECJAV_1608 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data CLOUD COMPUTING 2015
9ECJAV_1609 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing CLOUD COMPUTING 2015
10ECJAV_1610 A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems CLOUD COMPUTING 2015
11ECJAV_1611 A Hybrid Cloud Approach for Secure Authorized Deduplication CLOUD COMPUTING 2015
12ECJAV_1612 Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage CLOUD COMPUTING 2015
13ECJAV_1613 Identity-Based Encryption with Outsourced Revocation in Cloud Computing CLOUD COMPUTING 2015
14ECJAV_1614 Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data CLOUD COMPUTING 2015
15ECJAV_1615 Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing CLOUD COMPUTING 2015
16ECJAV_1616 Secure Auditing and Deduplicating Data in Cloud CLOUD COMPUTING 2015
17ECJAV_1617 Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation CLOUD COMPUTING 2015
18ECJAV_1618 Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage CLOUD COMPUTING 2015
19ECJAV_1619 Stealthy Denial of Service Strategy in Cloud Computing CLOUD COMPUTING 2015
20ECJAV_1620 Provable Multicopy Dynamic Data Possession in Cloud Computing Systems CLOUD COMPUTING 2015
21ECJAV_1621 Progressive Duplicate Detection DATA MINING 2015
22ECJAV_1622 Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model DATA MINING 2015
23ECJAV_1623 Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services DATA MINING 2015
24ECJAV_1624 Discovery of Ranking Fraud for Mobile Apps DATA MINING 2015
25ECJAV_1625 t-Closeness through Microaggregation: Strict Privacy with Enhanced Utility Preservation DATA MINING 2015
26ECJAV_1626 Tweet Segmentation and Its Application to Named Entity Recognition DATA MINING 2015
27ECJAV_1627 On Summarization and Timeline Generation for Evolutionary Tweet Streams DATA MINING 2015
28ECJAV_1628 Context-Based Diversification for Keyword Queries over XML Data DATA MINING 2015
29ECJAV_1629 Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection DATA MINING 2015
30ECJAV_1630 Malware Propagation in Large-Scale Networks DATA MINING 2015
31ECJAV_1631 Scalable Constrained Spectral Clustering DATA MINING 2015
32ECJAV_1632 Real-Time Detection of Traffic From Twitter Stream Analysis DATA MINING 2015
33ECJAV_1633 Best Keyword Cover Search DATA MINING 2015
34ECJAV_1634 Towards Effective Bug Triage with Software Data Reduction Techniques DATA MINING 2015
35ECJAV_1635 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites DATA MINING 2015
36ECJAV_1636 A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks NETWORKING 2015
37ECJAV_1637 Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing NETWORKING 2015
38ECJAV_1638 Detecting Malicious Facebook Applications NETWORKING 2015
39ECJAV_1639 A Proximity-Aware Interest-Clustered P2P File Sharing System NETWORKING 2015
40ECJAV_1640 User-Defined Privacy Grid System for Continuous Location-Based Services MOBILE COMPUTING 2015
41ECJAV_1641 Friendbook: A Semantic-Based Friend Recommendation System for Social Networks MOBILE COMPUTING 2015
42ECJAV_1642 Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks MOBILE COMPUTING 2015
43ECJAV_1643 Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks MOBILE COMPUTING 2015
44ECJAV_1644 Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts SECURE COMPUTING 2015
45ECJAV_1645 Secure Spatial Top-k Query Processing via Untrusted Location- Based Service Providers SECURE COMPUTING 2015
46ECJAV_1646 Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints SECURE COMPUTING 2015
47ECJAV_1647 Continuous and Transparent User Identity Verification for Secure Internet Services SECURE COMPUTING 2015
48ECJAV_1648 DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks SECURE COMPUTING 2015
49ECJAV_1649 A Computational Dynamic Trust Model for User Authorization SECURE COMPUTING 2015
50ECJAV_1650 Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks SECURE COMPUTING 2015
51ECJAV_1651 A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Network SECURE COMPUTING 2015
52ECJAV_1652 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security PARALLEL & DISTRIBUTED SYSTEMS 2015
53ECJAV_1653 Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks PARALLEL & DISTRIBUTED SYSTEMS 2015
54ECJAV_1654 Secure Distributed Deduplication Systems with Improved Reliability PARALLEL & DISTRIBUTED SYSTEMS 2015
55ECJAV_1655 Software Puzzle: A Countermeasure to Resource-Inflated Denialof- Service Attacks INFORMATION FORENSICS AND SECURITY 2015
56ECJAV_1656 Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backscatter INFORMATION FORENSICS AND SECURITY 2015
57ECJAV_1657 Key Updating for Leakage Resiliency with Application to AES Modes of Operation INFORMATION FORENSICS AND SECURITY 2015
58ECJAV_1658 A Framework for Secure Computations with Two Non-Colluding Servers and Multiple Clients, Applied to Recommendat INFORMATION FORENSICS AND SECURITY 2015
59ECJAV_1659 Effective Key Management in Dynamic Wireless Sensor Networks INFORMATION FORENSICS AND SECURITY 2015
60ECJAV_1660 Learning to Rank Image Tags With Limited Training Examples IMAGE PROCESSING 2015
61ECJAV_1661 An Attribute-Assisted Reranking Model for Web Image Search IMAGE PROCESSING 2015
62ECJAV_1662 EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval IMAGE PROCESSING 2015
63ECJAV_1663 Prediction of Atomic Web Services Reliability for QoS-Aware Recommendation SERVICE COMPUTING (WEB SERVICE) 2015
64ECJAV_1664 Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System SERVICE COMPUTING (WEB SERVICE) 2015
65ECJAV_1665 Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation SERVICE COMPUTING (WEB SERVICE) 2015
66ECJAV_1666 A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to-Business E-Services FUZZY SYSTEMS 2015