IEEE 2017 Java/Dotnet

1.A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection.
2.A Software Agent Enabled Biometric Security Algorithm for Secure File Access in Consumer Storage Devices.
3. MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection.
4.Cloud-based Utility Service Framework for Trust Negotiations using Federated Identity Management.
5.Question Quality Analysis and Prediction in Community Question Answering Services with Coupled Mutual Reinforcement.
6. Learning Discriminative Binary Codes for Large-scale Cross-modal Retrieval.
7. Someone in Your Contact List: Cued Recall-Based Textual Passwords.
8.Semantics-enhanced Online Intellectual Capital Mining Service for Enterprise Customer Centers.
9.Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation,
10.  Highly Reliable Key Generation from Electrocardiogram (ECG).
11.  Towards Encrypted Cloud Media Center with Secure Deduplication.
12.  Engagement dynamics and sensitivity analysis of YouTube videos.
13.  On the Security of Data Access Control for Multiauthority Cloud Storage Systems.
14.  Repair Tree: Fast Repair for Single Failure in Erasure-coded Distributed Storage Systems.
15.  Failure Diagnosis for Distributed Systems using Targeted Fault Injection.
16.  Search Rank Fraud and Malware Detection in Google Play.
17.  Traffic-aware Geo-distributed Big Data Analytics with Predictable Job Completion Time.
18.  Unsupervised Visual Hashing with Semantic Assistant for Content-based Image Retrieval
19.  Rating Prediction based on Social Sentiment from Textual Reviews.
20.  Efficient Processing of Skyline Queries Using MapReduce.
21.  Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud.
22.  Novel Visual and Statistical Image Features for Microblogs News Verifications
23.  SocialQ&A: An Online Social Network Based Question and Answer System.
24.  Publicly Verifiable Computation of Polynomials over Outsourced Data with Multiple Sources.
25.  Exploring Body Shape from mmW Images for Person Recognition.
26.  Personal Information in Passwords and Its Security Implications.
27.  My Privacy My Decision: Control of Photo Sharing on Online Social Networks.
28.  Securing coding-based cloud storage against pollution attacks.
29.  Modeling and Learning Continuous Word Embedding with Metadata for Question Retrieval.
30.  Renewable Energy Pricing Driven Scheduling in Distributed Smart Community Systems.
31.  Private and Secured Medical Data Transmission and Analysis for Wireless Sensing Healthcare System.
32.  Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis.
33.  Sketch-Based User Authentication With a Novel String Edit Distance Model.
34.  Privacy Preserving Smart Meter Streaming against Information Leakage of Appliance Status.
35.  NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media.
36.  Authentication of Swipe Fingerprint Scanners.
37.  Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving.
38.  Provably Secure Dynamic ID-based Anonymous Two-factor Authenticated Key Exchange Protocol with Extended Security Model.

39.  Provably Secure Dynamic ID-based Anonymous Two-factor Authenticated Key Exchange Protocol with Extended Security Model