2016-2017 IEEE JAVA PROJECT TITLES:
CLOUD COMPUTING PROJECT TITLES:
DATA MINING PROJECT TITLES
NETWORKING PROJECT TITLES
MOBILE COMPUTING PROJECT TITLES
PARALLEL AND DISTRIBUTED SYSTEMS PROJECT TITLES
SECURE COMPUTING PROJECT TITLES
INFORMATION FORENSICS AND SECURITY PROJECT TITLES
IMAGE PROCESSING PROJECT TITLES
MULTIMEDIA PROJECT TITLES
- A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
- A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
- An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing
- An Efficient Privacy-Preserving Ranked Keyword Search Method
- CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System
- Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing
- CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services
- Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
- Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds
- DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud
- Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage
- Dynamic and Public Auditing with Fair Arbitration for Cloud Data
- Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
- Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services
- Geometric Range Search on Encrypted Spatial Data
- Identity-Based Encryption with Cloud Revocation Authority and Its Applications
- Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
- Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud
- Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems
- Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
- Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming
- TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage
- A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
- DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
- Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing
- SecRBAC: Secure data in the Clouds
DATA MINING PROJECT TITLES
- A Novel Recommendation Model Regularized with User Trust and Item Ratings
- Automatically Mining Facets for Queries from Their Search Results
- Booster in High Dimensional Data Classification
- Building an intrusion detection system using a filter-based feature selection algorithm
- Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information
- Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings
- Crowdsourcing for Top-K Query Processing over Uncertain Data
- Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
- Domain-Sensitive Recommendation with User-Item Subgroup Analysis
- Efficient Algorithms for Mining Top-K High Utility Itemsets
- Efficient Cache-Supported Path Planning on Roads
- Mining User-Aware Rare Sequential Topic Patterns in Document Streams
- Nearest Keyword Set Search in Multi-Dimensional Datasets
- Rating Prediction based on Social Sentiment from Textual Reviews
- Location Aware Keyword Query Suggestion Based on Document Proximity
- Using Hashtag Graph-based Topic Model to Connect Semantically-related Words without Co-occurrence in Microblogs
- Quantifying Political Leaning from Tweets, Retweets, and Retweeters
- Relevance Feedback Algorithms Inspired By Quantum Detection
- Sentiment Embeddings with Applications to Sentiment Analysis
- Top-Down XML Keyword Query Processing
- TopicSketch: Real-time Bursty Topic Detection from Twitter
- Top-k Dominating Queries on Incomplete Data
- Understanding Short Texts through Semantic Enrichment and Hashing
NETWORKING PROJECT TITLES
- A Stable Approach for Routing Queries in Unstructured P2P Networks
- iPath: Path Inference in Wireless Sensor Networks
- Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks
- Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks
- STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
MOBILE COMPUTING PROJECT TITLES
- Energy and Memory Efficient Clone Detection in Wireless Sensor Networks
- EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data
- Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach
- Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach
PARALLEL AND DISTRIBUTED SYSTEMS PROJECT TITLES
- A Hop-by-Hop Routing Mechanism for Green Internet
- Continuous Answering Holistic Queries over Sensor Networks
- Dictionary Based Secure Provenance Compression for Wireless Sensor Networks
- The Server Provisioning Problem for Continuous Distributed Interactive Applications
SECURE COMPUTING PROJECT TITLES
- Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
- Data Lineage in Malicious Environments
- Detecting Malicious Facebook Applications
- FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
- Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata
- Resolving Multi-party Privacy Conflicts in Social Media
INFORMATION FORENSICS AND SECURITY PROJECT TITLES
- Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions
- Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data
- Privacy-Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms
- Profiling Online Social Behaviors for Compromised Account Detection
IMAGE PROCESSING PROJECT TITLES
- A Locality Sensitive Low-Rank Model for Image Tag Completion
- A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks
- Learning of Multimodal Representations with Random Walks on the Click Graph
- Online Multi-Modal Distance Metric Learning with Application to Image Retrieval
- Tag Based Image Search by Social Re-ranking
MULTIMEDIA PROJECT TITLES
- Social Friend Recommendation Based on Multiple Network Correlation
- User-Service Rating Prediction by Exploring Social Users’ Rating Behaviors