IEEE 2016 - JAVA/DOTNET
1. 2FLIP:
A Two-Factor Lightweight Privacy-Preserving Authentication Scheme for VANET.
2. Dynamic
Routing for Flying Ad Hoc Networks.
3. Online
Resource Scheduling Under Concave Pricing for Cloud Computing.
4. Development
and Testing of a 3G/LTE Adaptive Data Collection System in Vehicular Networks.
5. An
Energy-Balanced Heuristic for Mobile Sink Scheduling in Hybrid WSNs.
6. An
Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing.
7. FD4C:
Automatic Fault Diagnosis Framework for Web Applications in Cloud Computing.
8. Privacy Preserving Ranked Multi-Keyword
Search for Multiple Data Owners in
Cloud Computing.
9.
Fine-Grained Two-Factor Access Control
for Web-Based Cloud Computing Services.
10. Ontology-Based Search of
Genomic Metadata.
11. A Shoulder Surfing Resistant Graphical Authentication System.
12. A Security-Enhanced Alignment-Free Fuzzy
Vault-Based Fingerprint Cryptosystem Using Pair-Polar Minutiae Structures.
13. Fingerprint Liveness Detection from
Single Image Using Low-Level Features and Shape Analysis.
14. Distance-Based Encryption: How to Embed Fuzziness
in Biometric-Based Encryption.
15. Dynamic Facial Expression Recognition with
Atlas Construction and Sparse Representation.
16. A person authentication system based on
RFID tags and a cascade of face recognition algorithms.
17. Lossless and Reversible Data Hiding in
Encrypted Images with Public Key Cryptography.
18. A Secure and Dynamic Multi-keyword
Ranked Search Scheme over Encrypted Cloud Data.
19. Attribute-based
Access Control with Constant-size Ciphertext in Cloud Computing
20. Authenticated Key Exchange Protocols for
Parallel Network File Systems.
21. Audit-Free Cloud Storage via Deniable
Attribute-based Encryption.
22. DROPS: Division and Replication of Data
in the Cloud for Optimal Performance and Security.
23. TEES: An Efficient Search Scheme over
Encrypted Data on Mobile Cloud.
24. Energy-aware Load Balancing and
Application Scaling for the Cloud Ecosystem.
25. Public Integrity Auditing for Shared
Dynamic Cloud Data with Group User Revocation.
26. Security Optimization of Dynamic
Networks with Probabilistic Graph Modeling and Linear Programming.
27. Secure Auditing and Deduplicating Data
in Cloud.
28. A Holistic Approach to Distributed
Dimensionality Reduction of Big Data.
29. BDCaM:
Big Data for Context-aware Monitoring - A Personalized Knowledge Discovery
Framework for Assisted Healthcare.
30.Circuit
Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation
in Cloud Computing.
31.Cloud-Trust
- a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds.
32.Performing
Initiative Data Prefetching in Distributed File Systems for Cloud Computing.
33. Space-efficient Verifiable Secret
Sharing Using Polynomial Interpolation.
34. Prefetching-Based Data Dissemination in
Vehicular Cloud Systems.
35. A
Novel Recommendation Model Regularized with User Trust and Item Ratings
36. Automatically
Mining Facets for Queries from Their Search Results
37. Connecting
Social Media to E-Commerce: Cold-Start Product Recommendation using
Microblogging Information
38. Mining User-Aware Rare Sequential Topic Patterns in
Document Streams
39. Rating Prediction based on Social Sentiment
from Textual Reviews
40. Location Aware Keyword Query Suggestion Based
on Document Proximity
41. Crowdsourcing for Top-K Query Processing over Uncertain Data
42. STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
43. Spatial Reusability-Aware Routing in
Multi-Hop Wireless Networks
44. A Stable Approach for Routing Queries in Unstructured P2P Networks
45. Detecting
Malicious Facebook Applications
46. FRoDO:
Fraud Resilient Device for Off-line micro-payments
47. Resolving Multi-Party Privacy Conflicts in Social Media
48. Profiling Online Social Behaviors for Compromised Account Detection
49. Online Multi-modal Distance Metric Learning
with Application to Image Retrieval
50. User-Service Rating Prediction by Exploring
Social Users’ Rating Behaviors
51. Mapping Bug Reports to Relevant Files: A
Ranking Model, a Fine-grained Benchmark, and Feature Evaluation
52. Detecting and Removing Web
Application Vulnerabilities with Static Analysis and Data Mining.