IEEE 2018 Java/Dotnet

IEEE 2018 Dotnet/Java Project Titles
1.Complementary Aspect-based Opinion Mining
2.A Shoulder Surfing Resistant Graphical Authentication System
3.Sketch-Based User Authentication With a Novel String Edit Distance Model
4.Cleaning Antipatterns in an SQL Query Log
5.PrivBioMTAuth: Privacy Preserving Biometrics-Based and User Centric Protocol for User Authentication From Mobile Phones
6.Visual Secret Sharing Schemes Encrypting Multiple Images
7.Improved Visual Secret Sharing Scheme for QR Code Applications
8.Research on Deep Learning Techniques in Breaking Text-based Captchas and Designing Image-based Captcha
9.PassBio: Privacy-Preserving User-Centric Biometric Authentication
10.Authentication by Encrypted Negative Password
11.Secure Distributed Computing with Straggling Servers Using Polynomial Codes.
12.Lightweight RFID Protocol for Medical Privacy Protection in IoT.
13.Inference Attack-Resistant E-Healthcare Cloud System with Fine-Grained Access Control.
14.Auditing Big Data Storage in Cloud Computing Using Divide and Conquer Tables
15.Outsourced Biometric Identification with Privacy.
16.Identification of differentially expressed genes to establish new Biomarker for cancer prediction
17.Towards Privacy-preserving Content-based Image Retrieval in Cloud Computing.
18.Automatic Generation of Social Event Storyboard from Image Click-through Data.
19.Quality and Profit Assured Trusted Cloud Federation Formation: Game Theory Based Approach
20.Enabling Generic, Verifiable, and Secure Data Search in Cloud Services
21.SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage
22.Provably secure and lightweight identity-based authenticated data sharing protocol for cyber-physical cloud environment
23.Efficient Retrieval over Documents Encrypted by Attributes in Cloud Computing
24.Liveness Detection and Automatic Template Updating using Fusion of ECG and Fingerprint
25.Cryptographic Side-Channel Signaling and Authentication via Fingerprint Embedding
26.Leveraging Spatial Diversity for Privacy-Aware Location Based Services in Mobile Networks
27.HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems
28. Privacy Protection for E-health Systems by Means of Dynamic Authentication and Three-factor Key Agreement
29.A Framework of Customizing Electricity Retail Prices
30.Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in Cloud
31.Anonymous and Traceable Group Data Sharing in Cloud Computing
32.Supervised Learning of Semantics-Preserving Hash via Deep Convolutional Neural Networks
33.Cloud Centric Authentication for Wearable Healthcare Monitoring System
34. Learning Deep Off-the-Person Heart Biometrics Representations
35.Collaborative Index Embedding for Image Retrieval
36.A Feature Descriptor based on Local Normalized Difference for Real-World Texture Classification
37.Sub-Selective Quantization for Learning Binary Code in Large-Scale Image Search
38.VMGuard: A VMI-based Security Architecture for Intrusion Detection in Cloud Environment
39.Normalization and Weighting Techniques Based on Genuine-impostor Score Fusion in Multi biometric Systems
40. Towards Shared Ownership in the Cloud
41.Cloud-Based Approximate Constrained Shortest Distance Queries over Encrypted Graphs with Privacy Protection
42.Weakly-supervised Deep Embedding for Product Review Sentiment Analysis
43.Online Failure Prediction for Railway Transportation Systems Based on Fuzzy Rules and Data Analysis
44.Risk Assessment in Social Networks based on User Anomalous Behaviours
45.Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage
46.Privacy-preserving Indexing and Query Processing for Secure Dynamic Cloud Storage
47.Semantic-aware Searching over Encrypted Data for Cloud Computing
48.On the Secure and Reconfigurable Multi-Layer Network Design for Critical Information Dissemination in the Internet of Battlefield Things(IoBT)
49.Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things
50. A Data-Emergency-Aware Scheduling Scheme for Internet of Things in Smart Cities
51.Lifelogging Data Validation Model for Internet of Things Enabled Personalized Healthcare
52.MetaFlow: a Scalable Metadata Lookup Service for Distributed File Systems in Data Centers
53.Distributed Feature Selection for Efficient Economic Big Data Analysis
54.Online Similarity Learning for Big Data with Overfitting
55.Web Media and Stock Markets : A Survey and Future Directions from a Big Data Perspective
56.Secure Hashing Based Verifiable Pattern Matching
57.A Software Agent Enabled Biometric Security Algorithm for Secure File Access in Consumer Storage Devices
58.Forecasting Adverse Weather Situations in the Road Network
59.MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection.
60.On the Security of Data Access Control for Multiauthority Cloud Storage Systems.
61.Unsupervised Visual Hashing with Semantic Assistant for Content-based Image Retrieval.
62.Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud.
63.Publicly Verifiable Computation of Polynomials over Outsourced Data with Multiple Sources.
64.Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud
65.TeamPhone: Networking SmartPhones for Disaster Recovery
66.Statistical Meta-Analysis of Presentation Attacks for Secure Multibiometric Systems
67.Privacy-Preserving Aggregate Queries for Optimal Location Selection