2019 Projects

1. A Cross Tenant Access Control.CP

2. A Methodology for Secure Sharing of Personal Health Records in the Cloud

3. A New Lightweight Symmetric Searchable Encryption Scheme for String Identification

4. A Three-Layer Privacy Preserving Cloud Storage Scheme

5. Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data

6. An Efficient and Privacy

7. An Efficient Ranked Multi

8. Audit-Free Cloud Storage via Deniable Attribute-based Encryption

9. Catch You if You Misbehave Ranked Keyword Search Results Verification

10. Chaotic Searchable Encryption for Mobile Cloud Storage

11. Characterizing and Predicting Early Reviewers for Effective Product Marketing on E

12. CLASS Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics

13. Combining Data Owner-side and Cloud-side Access Control for Encrypted Cloud Storage

14. Complementary Aspect-based Opinion Mining

15. Division and Replication of Data in Cloud for Optimal Performance and Security

16. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud

17. Efficient Fine-Grained Data Sharing

18. Efficient Retrieval over Documents Encrypted by Attributes in Cloud Computing

19. Efficient Traceable Authorization Search System for Secure Cloud Storage

20. Emotion Recognition on Twitter

21. Financial Fraud Detection With Anomaly Feature Detection

22. Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage

23. Frequent Itemsets Mining With Differential Privacy Over Large

24. Health Monitoring on Social Media over Time

25. Identity-Based Private Matching over Outsourced Encrypted Datasets

26. Inference Attack-Resistant E-Healthcare Cloud System with Fine-Grained Access Control

27. Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage

28. Privacy Preservation for Outsourced Medical Data With Flexible Access Control

29. Privacy Protection and Intrusion Avoidance for Cloudlet

30. Provably Secure Fine

31. Publicly Verifiable Boolean Query Over Outsourced Encrypted Data

32. Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage

33. Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage

34. Secure and Expressive Data Access Control for Cloud Storage

35. Secure Data Group Sharing and Dissemination with Attribute and Time Conditions in Public Cloud

36. Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in Cloud

37. Semantic-aware Searching over Encrypted Data for Cloud Computing

38. Toward Effective Collaborative Filtering Using Uninteresting Items

39. Towards Privacy-preserving Content-based Image Retrieval in Cloud Computing

40. Unified Fine-grained Access Control for Personal Health Records in Cloud Computing

41. A Comprehensive Study on Social Network Mental Disorders Detection via Online Social Media Mining

42. A Credibility Analysis System for Assessing Information on Twitter

43. A Developer Centered Bug Prediction Model

44. A guarantee-based trust model in Chord-based P2P networks

45. A Hybrid Approach for Detecting Automated Spammers in Twitter

46. A Novel Clustering Framework Based on Sparsity-Density Entropy

47.A Novel Machine Learning Algorithm for Spammer Identification in Industrial Mobile Cloud Computing

48. A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network

49. A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds

50. When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks

51. 3-HBP: A Three-Level Hidden Bayesian Link Prediction Model in Social Networks

52. AccountTrade : Accountability Dishonest Big Data Buyers and Sellers

53. Analyzing and Detecting Money-Laundering Accounts in Online Social Networks

54. Anonymization of Sensitive Quasi-Identifiers for l-Diversity and t-Closeness

55. Automatic Generation of Social Event Storyboard from Image Click-through Data

56. Trust-based Collaborative Privacy Management in Online Social Networks

57. Cloud-based Fine-grained Health Information Access Control Framework for Lightweight IoT Devices with Dynamic Auditing and Attribute Revocation

58. Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks

59. Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks

60. Credit Card Fraud Detection Using AdaBoost and Majority Voting

61. Detection of suicide-related posts in Twitter data streams

62. Distributed Faulty Node Detection in Delay Tolerant Networks: Design and Analysis

63. Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services

64. Energy Efficient Link-Delay Aware Routing in Wireless Sensor Networks

65. Energy Efficient Link-Delay Aware Routing in Wireless Sensor Networks Data

66. Exploiting Social Network to Enhance Human-to-Human Infection Analysis Without Privacy Leakage

67. Hate Speech on Twitter: A Pragmatic Approach to Collect Hateful and Offensive Expressions and Perform Hate Speech Detection

68. Identifying On-site Users for Social Events: Mobility, Content, and Social Relationship

69. Joint Hypergraph Learning for Tag-based Image Retrieval

70. Light-Weight Security and Data Provenance for Multi-Hop Internet of Things

71. Detection of suicide-related posts in Twitter data streams

72. Distributed Faulty Node Detection in Delay Tolerant Networks: Design and Analysis

73. Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services

74. Energy Efficient Link-Delay Aware Routing in Wireless Sensor Networks

75. Energy Efficient Link-Delay Aware Routing in Wireless Sensor Networks Data

76. Exploiting Social Network to Enhance Human-to-Human Infection Analysis Without Privacy Leakage

77. Hate Speech on Twitter: A Pragmatic Approach to Collect Hateful and Offensive Expressions and Perform Hate Speech Detection

78. Identifying On-site Users for Social Events: Mobility, Content, and Social Relationship

79. Joint Hypergraph Learning for Tag-based Image Retrieval

80. Light-Weight Security and Data Provenance for Multi-Hop Internet of Things

81. Risk Assessment in Social Networks based on User Anomalous Behaviours

82. Road Traffic Speed Prediction: A Probabilistic Model Fusing Multi-Source Data

83. Scalable Content-Aware Collaborative Filtering for Location Recommendation

84. Search Result Diversity Evaluation based on Intent Hierarchies

85. Segregating Spammers and Unsolicited Bloggers from Genuine Experts on Twitter

86. Structural Balance Theory-based E-commerce Recommendation over Big Rating Data

87. Supervised and Unsupervised Aspect Category Detection for Sentiment Analysis With Co-Occurrence Data

88. Semi-Supervised Spam Detection in Twitter Stream

89. Traffic and Energy Aware Routing for Heterogeneous Wireless Sensor Networks

90. Using Data Mining to Predict Hospital Admissions From the Emergency Department