1. A Cross Tenant Access Control.CP
2. A Methodology for Secure Sharing of Personal Health Records in the Cloud
3. A New Lightweight Symmetric Searchable Encryption Scheme for String Identification
4. A Three-Layer Privacy Preserving Cloud Storage Scheme
5. Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data
6. An Efficient and Privacy
7. An Efficient Ranked Multi
8. Audit-Free Cloud Storage via Deniable Attribute-based Encryption
9. Catch You if You Misbehave Ranked Keyword Search Results Verification
10. Chaotic Searchable Encryption for Mobile Cloud Storage
11. Characterizing and Predicting Early Reviewers for Effective Product Marketing on E
12. CLASS Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics
13. Combining Data Owner-side and Cloud-side Access Control for Encrypted Cloud Storage
14. Complementary Aspect-based Opinion Mining
15. Division and Replication of Data in Cloud for Optimal Performance and Security
16. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
17. Efficient Fine-Grained Data Sharing
18. Efficient Retrieval over Documents Encrypted by Attributes in Cloud Computing
19. Efficient Traceable Authorization Search System for Secure Cloud Storage
20. Emotion Recognition on Twitter
21. Financial Fraud Detection With Anomaly Feature Detection
22. Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage
23. Frequent Itemsets Mining With Differential Privacy Over Large
24. Health Monitoring on Social Media over Time
25. Identity-Based Private Matching over Outsourced Encrypted Datasets
26. Inference Attack-Resistant E-Healthcare Cloud System with Fine-Grained Access Control
27. Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage
28. Privacy Preservation for Outsourced Medical Data With Flexible Access Control
29. Privacy Protection and Intrusion Avoidance for Cloudlet
30. Provably Secure Fine
31. Publicly Verifiable Boolean Query Over Outsourced Encrypted Data
32. Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage
33. Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage
34. Secure and Expressive Data Access Control for Cloud Storage
35. Secure Data Group Sharing and Dissemination with Attribute and Time Conditions in Public Cloud
36. Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in Cloud
37. Semantic-aware Searching over Encrypted Data for Cloud Computing
38. Toward Effective Collaborative Filtering Using Uninteresting Items
39. Towards Privacy-preserving Content-based Image Retrieval in Cloud Computing
40. Unified Fine-grained Access Control for Personal Health Records in Cloud Computing
41. A Comprehensive Study on Social Network Mental Disorders Detection via Online Social Media Mining
42. A Credibility Analysis System for Assessing Information on Twitter
43. A Developer Centered Bug Prediction Model
44. A guarantee-based trust model in Chord-based P2P networks
45. A Hybrid Approach for Detecting Automated Spammers in Twitter
46. A Novel Clustering Framework Based on Sparsity-Density Entropy
47.A Novel Machine Learning Algorithm for Spammer Identification in Industrial Mobile Cloud Computing
48. A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network
49. A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
50. When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks
51. 3-HBP: A Three-Level Hidden Bayesian Link Prediction Model in Social Networks
52. AccountTrade : Accountability Dishonest Big Data Buyers and Sellers
53. Analyzing and Detecting Money-Laundering Accounts in Online Social Networks
54. Anonymization of Sensitive Quasi-Identifiers for l-Diversity and t-Closeness
55. Automatic Generation of Social Event Storyboard from Image Click-through Data
56. Trust-based Collaborative Privacy Management in Online Social Networks
57. Cloud-based Fine-grained Health Information Access Control Framework for Lightweight IoT Devices with Dynamic Auditing and Attribute Revocation
58. Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks
59. Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks
60. Credit Card Fraud Detection Using AdaBoost and Majority Voting
61. Detection of suicide-related posts in Twitter data streams
62. Distributed Faulty Node Detection in Delay Tolerant Networks: Design and Analysis
63. Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services
64. Energy Efficient Link-Delay Aware Routing in Wireless Sensor Networks
65. Energy Efficient Link-Delay Aware Routing in Wireless Sensor Networks Data
66. Exploiting Social Network to Enhance Human-to-Human Infection Analysis Without Privacy Leakage
67. Hate Speech on Twitter: A Pragmatic Approach to Collect Hateful and Offensive Expressions and Perform Hate Speech Detection
68. Identifying On-site Users for Social Events: Mobility, Content, and Social Relationship
69. Joint Hypergraph Learning for Tag-based Image Retrieval
70. Light-Weight Security and Data Provenance for Multi-Hop Internet of Things
71. Detection of suicide-related posts in Twitter data streams
72. Distributed Faulty Node Detection in Delay Tolerant Networks: Design and Analysis
73. Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services
74. Energy Efficient Link-Delay Aware Routing in Wireless Sensor Networks
75. Energy Efficient Link-Delay Aware Routing in Wireless Sensor Networks Data
76. Exploiting Social Network to Enhance Human-to-Human Infection Analysis Without Privacy Leakage
77. Hate Speech on Twitter: A Pragmatic Approach to Collect Hateful and Offensive Expressions and Perform Hate Speech Detection
78. Identifying On-site Users for Social Events: Mobility, Content, and Social Relationship
79. Joint Hypergraph Learning for Tag-based Image Retrieval
80. Light-Weight Security and Data Provenance for Multi-Hop Internet of Things
81. Risk Assessment in Social Networks based on User Anomalous Behaviours
82. Road Traffic Speed Prediction: A Probabilistic Model Fusing Multi-Source Data
83. Scalable Content-Aware Collaborative Filtering for Location Recommendation
84. Search Result Diversity Evaluation based on Intent Hierarchies
85. Segregating Spammers and Unsolicited Bloggers from Genuine Experts on Twitter
86. Structural Balance Theory-based E-commerce Recommendation over Big Rating Data
87. Supervised and Unsupervised Aspect Category Detection for Sentiment Analysis With Co-Occurrence Data
88. Semi-Supervised Spam Detection in Twitter Stream
89. Traffic and Energy Aware Routing for Heterogeneous Wireless Sensor Networks
90. Using Data Mining to Predict Hospital Admissions From the Emergency Department
91. Combining Data Owner-side and Cloud-side Access Control for Encrypted Cloud Storage
92. Data Security in Cloud Computing Using AES Under HEROKU Cloud
93. Designing and Evaluating Hybrid Storage for High Performance Cloud Computing
94. Efficient Traceable Authorization Search System for Secure Cloud Storage
95. Energy-efficient and Deadline-satisfied Task Scheduling in Mobile Cloud Computing
96. Normal cloud model-based algorithm for multi-attribute trusted cloud service selection
97. Privacy Preservation for Outsourced Medical Data with Flexible Access Control
98. Privacy-preserving Search over Encrypted Personal Health Record in Multi-Source Cloud
99. Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage
100. Semantic-aware Searching over Encrypted Data for Cloud Computing
101. Towards Privacy-preserving Content-based Image Retrieval in Cloud Computing
102. Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services
103. Efficient Resource Allocation for On-Demand Mobile-Edge Cloud Computing
104. Relevant Feedback Based Accurate and Intelligent Retrieval on Capturing User Intention for Personalized Websites
105. Reward or Penalty: Aligning Incentives of Stakeholders in Crowdsourcing
106. Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks
107. Risk Assessment in Social Networks based on User Anomalous Behaviours
108. Rumor Source Identification in Social Networks with Time-varying Topology
109. Trust-based Collaborative Privacy Management in Online Social Networks