1.A System for Profiling and Monitoring Database Access
Patterns by Application Programs for Anomaly Detection.
2.A Software Agent Enabled Biometric Security Algorithm for
Secure File Access in Consumer Storage Devices.
3. MMBcloud-tree: Authenticated Index for Verifiable Cloud
Service Selection.
4.Cloud-based Utility Service Framework for Trust Negotiations
using Federated Identity Management.
5.Question Quality Analysis and Prediction in Community
Question Answering Services with Coupled Mutual Reinforcement.
6. Learning Discriminative Binary Codes for Large-scale
Cross-modal Retrieval.
7. Someone in Your Contact List: Cued Recall-Based Textual
Passwords.
8.Semantics-enhanced Online Intellectual Capital Mining
Service for Enterprise Customer Centers.
9.Efficient Public Verification of Data Integrity for Cloud
Storage Systems from Indistinguishability Obfuscation,
10.
Highly Reliable Key Generation from Electrocardiogram (ECG).
11.
Towards Encrypted Cloud Media Center with Secure
Deduplication.
12.
Engagement dynamics and sensitivity analysis of YouTube
videos.
13.
On the Security of Data Access Control for Multiauthority
Cloud Storage Systems.
14.
Repair Tree: Fast Repair for Single Failure in Erasure-coded
Distributed Storage Systems.
15.
Failure Diagnosis for Distributed Systems using Targeted Fault
Injection.
16.
Search Rank Fraud and Malware Detection in Google Play.
17.
Traffic-aware Geo-distributed Big Data Analytics with
Predictable Job Completion Time.
18.
Unsupervised Visual Hashing with Semantic Assistant for
Content-based Image Retrieval
19.
Rating Prediction based on Social Sentiment from Textual
Reviews.
20.
Efficient Processing of Skyline Queries Using MapReduce.
21.
Provably Secure Key-Aggregate Cryptosystems with Broadcast
Aggregate Keys for Online Data Sharing on the Cloud.
22.
Novel Visual and Statistical Image Features for Microblogs
News Verifications
23.
SocialQ&A: An Online Social Network Based Question and
Answer System.
24.
Publicly Verifiable Computation of Polynomials over
Outsourced Data with Multiple Sources.
25.
Exploring Body Shape from mmW Images for Person Recognition.
26.
Personal Information in Passwords and Its Security
Implications.
27.
My Privacy My Decision: Control of Photo Sharing on Online
Social Networks.
28.
Securing coding-based cloud storage against pollution
attacks.
29.
Modeling and Learning Continuous Word Embedding with
Metadata for Question Retrieval.
30.
Renewable Energy Pricing Driven Scheduling in Distributed
Smart Community Systems.
31.
Private and Secured Medical Data Transmission and Analysis
for Wireless Sensing Healthcare System.
32.
Shadow Attacks based on Password Reuses: A Quantitative
Empirical Analysis.
33.
Sketch-Based User Authentication With a Novel String Edit
Distance Model.
34.
Privacy Preserving Smart Meter Streaming against Information
Leakage of Appliance Status.
35.
NetSpam: a Network-based Spam Detection Framework for
Reviews in Online Social Media.
36.
Authentication of Swipe Fingerprint Scanners.
37.
Two-Cloud Secure Database for Numeric-Related SQL Range
Queries with Privacy Preserving.
38.
Provably Secure Dynamic ID-based Anonymous Two-factor
Authenticated Key Exchange Protocol with Extended Security Model.
39.
Provably Secure Dynamic ID-based Anonymous Two-factor
Authenticated Key Exchange Protocol with Extended Security Model