IEEE 2016 Java/Dotnet

IEEE 2016 - JAVA/DOTNET
1.     2FLIP: A Two-Factor Lightweight Privacy-Preserving Authentication Scheme for VANET.
2.     Dynamic Routing for Flying Ad Hoc Networks.
3.     Online Resource Scheduling Under Concave Pricing for Cloud Computing.
4.     Development and Testing of a 3G/LTE Adaptive Data Collection System in Vehicular Networks.
5.     An Energy-Balanced Heuristic for Mobile Sink Scheduling in Hybrid WSNs.
6.     An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing.
7.     FD4C: Automatic Fault Diagnosis Framework for Web Applications in Cloud Computing.
8.     Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in
Cloud Computing.
9.     Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services.
10.  Ontology-Based Search of Genomic Metadata.
11.   A Shoulder Surfing Resistant Graphical Authentication System.
12. A Security-Enhanced Alignment-Free Fuzzy Vault-Based Fingerprint Cryptosystem Using Pair-Polar Minutiae Structures.
13. Fingerprint Liveness Detection from Single Image Using Low-Level Features and Shape Analysis.
14.  Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption.
15. Dynamic Facial Expression Recognition with Atlas Construction and Sparse Representation.
16. A person authentication system based on RFID tags and a cascade of face recognition algorithms.
17. Lossless and Reversible Data Hiding in Encrypted Images with Public Key Cryptography.
18. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data.
19.  Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing
20.  Authenticated Key Exchange Protocols for Parallel Network File Systems.
21.  Audit-Free Cloud Storage via Deniable Attribute-based Encryption.
22.  DROPS: Division and Replication of Data in the Cloud for Optimal Performance and Security.
23. TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud.
24.   Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem.
25.    Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation.
26.  Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming.
27. Secure Auditing and Deduplicating Data in Cloud.
28.  A Holistic Approach to Distributed Dimensionality Reduction of Big Data.
29. BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Discovery Framework for Assisted Healthcare.
30.Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing.
31.Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds.
32.Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing.
33.  Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation.
34. Prefetching-Based Data Dissemination in Vehicular Cloud Systems.
35.  A Novel Recommendation Model Regularized with User Trust and Item Ratings
36. Automatically Mining Facets for Queries from Their Search Results
37. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation using Microblogging Information
38. Mining User-Aware Rare Sequential Topic Patterns in Document Streams
39.  Rating Prediction based on Social Sentiment from Textual Reviews
40.  Location Aware Keyword Query Suggestion Based on Document Proximity

41.  Crowdsourcing for Top-K Query Processing over Uncertain Data

42.  STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users

43.  Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks

44.  A Stable Approach for Routing Queries in Unstructured P2P Networks

45.  Detecting Malicious Facebook Applications
46.  FRoDO: Fraud Resilient Device for Off-line micro-payments

47.  Resolving Multi-Party Privacy Conflicts in Social Media

48.  Profiling Online Social Behaviors for Compromised Account Detection

49.  Online Multi-modal Distance Metric Learning with Application to Image Retrieval
50.  User-Service Rating Prediction by Exploring Social Users’ Rating Behaviors
51.  Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine-grained Benchmark, and Feature Evaluation
52. Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining.