Code No. |
Project Title |
Base Paper |
Payment |
Video |
JV01 |
A Trust-Based Agent Learning Model for Service Composition in Mobile Cloud Computing Environments(IEEE 2019)
|
Download |
Buy |
|
JV02 |
A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing(IEEE 2019)
|
Download |
Buy |
|
JV03 |
Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data(IEEE 2019)
|
Download |
Buy |
|
JV04 |
Dynamic Cloud Network Control Under Reconfiguration Delay and Cost(IEEE 2019)
|
Download |
Buy |
|
JV05 |
Reliability and Availability Evaluation for Cloud Data Center Networks Using Hierarchical Models(IEEE 2019)
|
Download |
Buy |
|
JV06 |
An Attribute Credential Based Public Key Scheme for Fog Computing in Digital Manufacturing(IEEE 2019)
|
Download |
Buy |
|
JV07 |
Verifiable and Multi-keyword Searchable Attribute-based Encryption Scheme for Cloud Storage(IEEE 2019)
|
Download |
Buy |
|
JV08 |
Novel Multi-Keyword Search on Encrypted Data in the Cloud(IEEE 2019)
|
Download |
Buy |
|
JV09 |
An Advance Cryptographic Solutions in Cloud Computing Security(IEEE 2019)
|
Download |
Buy |
|
JV10 |
Improving The Efficiency of E-Healthcare System Based on Cloud(IEEE 2019)
|
Download |
Buy |
|
JV11 |
Mining Users Trust From E Commerce Reviews Based on Sentiment Similarity Analysis(IEEE 2019)
|
Download |
Buy |
|
JV12 |
A Hierarchical Attention Model for Social Contextual Image Recommendation(IEEE 2019)
|
Download |
Buy |
|
JV13 |
Hidden Ciphertext Policy Attribute Based Encryption With Fast Decryption for Personal Health Record(IEEE 2019)
|
Download |
Buy |
|
JV14 |
Clustering Based Collaborative Filtering Using an Incentivized Penalized User Model(IEEE 2019)
|
Download |
Buy |
|
JV15 |
CLASS:Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics(IEEE 2019)
|
Download |
Buy |
|
JV16 |
Provably secure and lightweight identity based authenticated data sharing protocol for cyber physical environment(IEEE 2019)
|
Download |
Buy |
|
JV17 |
Efficient Retrieval over Documents Encrypted by Attributes in Cloud Computing(IEEE 2019)
|
Download |
Buy |
|
JV18 |
Efficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage(IEEE 2019)
|
Download |
Buy |
|
JV19 |
Possession in Cloud Storage, Efficient client side deduplication of encrypted data(IEEE 2018)
|
Download |
Buy |
|
JV20 |
Secure and Efficient Privacy Preserving Provable Data(IEEE 2018)
|
Download |
Buy |
|
JV21 |
Automatic construction of vertical search tools for the deep web(IEEE 2018)
|
Download |
Buy |
|
JV22 |
A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Storage(IEEE 2018)
|
Download |
Buy |
|
JV23 |
Motivating content sharing and trustworthiness in mobile social networks(IEEE 2018)
|
Download |
Buy |
|
JV24 |
Encrypted personal Health Record in Multi-Source Cloud(IEEE 2018)
|
Download |
Buy |
|
JV25 |
Optimizing Locality-Aware Memory Management of Key-Value Caches(IEEE 2018)
|
Download |
Buy |
|
JV26 |
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud(IEEE 2018)
|
Download |
Buy |
|
JV27 |
Correlation Modeling and Resource Optimization for Cloud Service with Fault Recovery (IEEE 2018)
|
Download |
Buy |
|
JV28 |
Achieving Privacy-friendly Storage and Secure Statistics for Smart Meter Data on Outsourced Clouds(IEEE 2018)
|
Download |
Buy |
|
JV29 |
Multimedia Processing Pricing Strategy in GPU-accelerated Cloud Computing(IEEE 2018)
|
Download |
Buy |
|
JV30 |
Quantitative Modeling and Analytical Calculation of Elasticity in Cloud Computing (IEEE 2018)
|
Download |
Buy |
|
JV31 |
Efficiently Translating Complex SQL Query to MapReduce Jobflow on Cloud(IEEE 2018)
|
Download |
Buy |
|
JV32 |
Deep Representation based feature extraction and recovering for Finger-vein verification (IEEE 2018)
|
Download |
Buy |
|
JV33 |
Preventing Distributed Denial-of-Service Flooding Attacks with Dynamic Path Identifiers(IEEE 2018)
|
Download |
Buy |
|
JV34 |
NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media(IEEE 2018)
|
Download |
Buy |
|
JV35 |
Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving (IEEE 2018)
|
Download |
Buy |
|
JV36 |
Achieving Efficient and Secure Data Acquisition for Cloud-supported Internet of Things in Smart Grid (IEEE 2018)
|
Download |
Buy |
|
JV37 |
Follow But No Track: Privacy Preserved Profile Publishing in Cyber-Physical Social Systems (IEEE 2018)
|
Download |
Buy |
|
JV38 |
A Privacy-preserving Vehicular Crowdsensing based Road surface Condition Monitoring System Using Fog Computing (IEEE 2018)
|
Download |
Buy |
|
JV39 |
EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks (IEEE 2018)
|
Download |
Buy |
|
JV40 |
A Multi-Agent Advanced Traveler Information System for Optimal Trip Planning in a Co-Model Framework(IEEE 2018)
|
Download |
Buy |
|
JV41 |
Optimal Symbiosis and Fair Scheduling in Shared Cache (IEEE 2018)
|
Download |
Buy |
|
JV42 |
Enabling Efficient and Reliable Transition from Replication to Erasure Coding for Clustered File Systems (IEEE 2018)
|
Download |
Buy |
|
JV43 |
Binary-Tree Based Estimation of File Requests for Efficient Data Replication(IEEE 2018)
|
Download |
Buy |
|
JV44 |
MMBcloud -Tree: Authenticated Index for Verifiable Cloud Service Selection (IEEE 2018)
|
Download |
Buy |
|
JV45 |
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection (IEEE 2018)
|
Download |
Buy |
|
JV46 |
On the Soundness and Security of Privacy-Preserving SVM for Outsourcing Data Classification (IEEE 2018)
|
Download |
Buy |
|
JV47 |
SADI: A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks (IEEE 2018) |
Download |
Buy |
|
JV48 |
A Scalable Approach to Joint Cyber Insurance and Security-as-a-Service Provisioning in Cloud Computing (IEEE 2018) |
Download |
Buy |
|
JV49 |
Majority Voting and Pairing with Multiple Noisy Labeling (IEEE 2018) |
Download |
Buy |
|
JV50 |
Efficient Keyword-aware Representative Travel Route Recommendation(IEEE 2018) |
Download |
Buy |
|
JV51 |
Detecting Stress Based on Social Interactions in Social Networks (IEEE 2018) |
Download |
Buy |
|
JV52 |
Efficient Clue-based Route Search on Road Networks (IEEE 2018) |
Download |
Buy |
|
JV53 |
Probabilistic Models For Ad Viewability Prediction On The Web (IEEE 2018) |
Download |
Buy |
|
JV54 |
Large-scale Location Prediction for Web Pages(IEEE 2018) |
Download |
Buy |
|
JV55 |
Modeling and Learning Distributed Word Representation with Metadata for Question Retrieval (IEEE 2018) |
Download |
Buy |
|
JV56 |
Engagement dynamics and sensitivity analysis of YouTube videos (IEEE 2018) |
Download |
Buy |
|
JV57 |
Confusion-matrix-based Kernel Logistic Regression for Imbalanced Data Classification (IEEE 2018) |
Download |
Buy |
|
JV58 |
A Hybrid Bio-Inspired Algorithm for Scheduling and Resource Management in Cloud Environment (IEEE 2018) |
Download |
Buy |
|
JV59 |
Resource renting for periodical cloud workflow applications (IEEE 2018) |
Download |
Buy |
|
JV60 |
Transactional Behavior Verification in Business Process as a Service Configuration (IEEE 2018) |
Download |
Buy |
|
JV61 |
A semi-automatic and trustworthy scheme for continuous cloud service certification (IEEE 2018) |
Download |
Buy |
|
JV62 |
Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing (IEEE 2018) |
Download |
Buy |
|
JV63 |
A Belief Rule Based Expert System for Datacenter PUE Prediction under Uncertainty (IEEE 2018) |
Download |
Buy |
|
JV64 |
Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing(IEEE 2018) |
Download |
Buy |
|
JV65 |
An Efficient Cloud Market Mechanism for Computing Jobs With Soft Deadlines (IEEE 2018) |
Download |
Buy |
|
JV66 |
Cloud Data Auditing Techniques with a Focus on Privacy and Security (IEEE 2018) |
Download |
Buy |
|
JV67 |
Service Rating Prediction by Exploring Social Mobile User's Geographical Locations (IEEE 2018) |
Download |
Buy |
|