CSE – Software

JV_01A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and VerificationCLOUD COMPUTING2018DOWNLOAD
JV_02A Lightweight Secure Data Sharing Scheme for Mobile Cloud ComputingCLOUD COMPUTING2018DOWNLOAD
JV_03A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud ComputingCLOUD COMPUTING2018DOWNLOAD
JV_04A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its UsersCLOUD COMPUTING2018DOWNLOAD
JV_05A robust reputation management mechanism in the federated cloudCLOUD COMPUTING2018DOWNLOAD
JV_06Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud dataCLOUD COMPUTING2018DOWNLOAD
JV_07Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud ComputingCLOUD COMPUTING2018DOWNLOAD
JV_08Efficient and Expressive Keyword Search Over Encrypted Data in CloudCLOUD COMPUTING2018DOWNLOAD
JV_09Identity-Based Data Outsourcing with Comprehensive Auditing in CloudsCLOUD COMPUTING2018DOWNLOAD
JV_10Identity-Based Encryption with Cloud Revocation Authority and Its ApplicationsCLOUD COMPUTING2018DOWNLOAD
JV_11Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud StorageCLOUD COMPUTING2018DOWNLOAD
JV_12Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data SharingCLOUD COMPUTING2018DOWNLOAD
JV_13Privacy Protection based Access Control Scheme in Cloud-based ServicesCLOUD COMPUTING2018DOWNLOAD
JV_14Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud DataCLOUD COMPUTING2018DOWNLOAD
JV_15Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the CloudCLOUD COMPUTING2018DOWNLOAD
JV_16RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud StorageCLOUD COMPUTING2018DOWNLOAD
JV_17Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based EncryptionCLOUD COMPUTING2018DOWNLOAD
JV_18Securing Cloud Data under Key ExposureCLOUD COMPUTING2018DOWNLOAD
JV_19TEES: An Efficient Search Scheme over Encrypted Data on Mobile CloudCLOUD COMPUTING2018DOWNLOAD
JV_20CDA Generation and Integration for Health Information Exchange Based on Cloud Computing SystemCLOUD COMPUTING2018DOWNLOAD
JV_21A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud DataCLOUD COMPUTING2018DOWNLOAD
JV_22A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the CloudCLOUD COMPUTING2018DOWNLOAD
JV_23Circuit Cipher text-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud ComputingCLOUD COMPUTING2018DOWNLOAD
JV_24CloudArmor: Supporting Reputation-Based Trust Management for Cloud ServicesCLOUD COMPUTING2018DOWNLOAD
JV_25Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud EmailCLOUD COMPUTING2018DOWNLOAD
JV_26Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud StorageCLOUD COMPUTING2018DOWNLOAD
JV_27Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key UpdatesCLOUD COMPUTING2018DOWNLOAD
JV_28Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing ServicesCLOUD COMPUTING2018DOWNLOAD
JV_29Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public CloudCLOUD COMPUTING2018DOWNLOAD
JV_30TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud StorageCLOUD COMPUTING2018DOWNLOAD
JV_31DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User EnvironmentsCLOUD COMPUTING2018DOWNLOAD
JV_32a profit maximization scheme with guaranteed quality of service in cloud computingCLOUD COMPUTING2018DOWNLOAD
JV_33a secure and dynamic multi-keyword ranked search scheme over encrypted a secure anti-collusion data sharing cloud dataCLOUD COMPUTING2018DOWNLOAD
JV_34stealthy denial of service strategy in cloud computingCLOUD COMPUTING2018DOWNLOAD
JV_35a secure anti-collusion data sharing scheme for dynamic groups in the cloudCLOUD COMPUTING2018DOWNLOAD
JV_36privacy-preserving public auditing for regenerating-code-based cloud storageCLOUD COMPUTING2018DOWNLOAD
JV_37Location-Aware and Personalized Collaborative Filtering for Web Service RecommendationCLOUD COMPUTING2018DOWNLOAD
JV_38SelCSP: A Framework to Facilitate Selection of Cloud Service ProvidersCLOUD COMPUTING2018DOWNLOAD
JV_39Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical SystemsCLOUD COMPUTING2018DOWNLOAD
JV_40Steganography Using Reversible Texture SynthesisCLOUD COMPUTING2018DOWNLOAD
JV_41PAGE: A Partition Aware Engine for Parallel Graph ComputationCLOUD COMPUTING2018DOWNLOAD
JV_42CHARM: A Cost-Efficient Multi-Cloud Data Hosting Scheme with High AvailabilityCLOUD COMPUTING2018DOWNLOAD
JV_43A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud DataCLOUD COMPUTING2018DOWNLOAD
JV_44Circuit Cipher text-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud ComputingCLOUD COMPUTING2018DOWNLOAD
JV_45Towards optimized fine-grained pricing of Iaas Cloud platformCLOUD COMPUTING2018DOWNLOAD
JV_46Enabling Cloud Storage Auditing with Key-Exposure ResistanceCLOUD COMPUTING2018DOWNLOAD
JV_47Identity-Based Encryption with Outsourced Revocation in Cloud ComputingCLOUD COMPUTING2018DOWNLOAD
JV_48Malware propagation in large-scale networkCLOUD COMPUTING2018DOWNLOAD
JV_49cloud armor: supporting reputation-based trust management for cloud servicesCLOUD COMPUTING2018DOWNLOAD
JV_50lifelong personal health data and application software via virtual machines in the cloudCLOUD COMPUTING2018DOWNLOAD
JV_51Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling ApproachDATA MINING2018DOWNLOAD
JV_52Collaborative Filtering-Based Recommendation of Online Social VotingDATA MINING2018DOWNLOAD
JV_53Detecting Stress Based on Social Interactions in Social NetworksDATA MINING2018DOWNLOAD
JV_54Dynamic Facet Ordering for Faceted Product Search EnginesDATA MINING2018DOWNLOAD
JV_55Efficient Keyword-aware Representative Travel Route RecommendationDATA MINING2018DOWNLOAD
JV_56SociRank: Identifying and Ranking Prevalent News Topics Using Social Media FactorsDATA MINING2018DOWNLOAD
JV_57RAPARE: A Generic Strategy for Cold-Start Rating Prediction ProblemDATA MINING2018DOWNLOAD
JV_58SociRank: Identifying and Ranking Prevalent News Topics Using Social Media FactorsDATA MINING2018DOWNLOAD
JV_59User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network PerspectiveDATA MINING2018DOWNLOAD
JV_60An Iterative Classification Scheme for Sanitizing Large scale DatasetsDATA MINING2018DOWNLOAD
JV_61Computing Semantic Similarity of Concepts in Knowledge GraphsDATA MINING2018DOWNLOAD
JV_62Influence Maximization in Trajectory DatabasesDATA MINING2018DOWNLOAD
JV_63Personal web re visitation by context &content keyword with relevance feedbackDATA MINING2018DOWNLOAD
JV_64User Vitality Ranking and Prediction in Social Networking ServicesDATA MINING2018DOWNLOAD
JV_65Automatically Mining Facets for Queries from Their Search ResultsDATA MINING2018DOWNLOAD
JV_66Booster in High Dimensional Data ClassificationDATA MINING2018DOWNLOAD
JV_67Building an intrusion detection system using a filter-based feature selection algorithmDATA MINING2018DOWNLOAD
JV_68Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging InformationDATA MINING2018DOWNLOAD
JV_69Crowdsourcing for Top-K Query Processing over Uncertain DataDATA MINING2018DOWNLOAD
JV_70Cyber bullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-EncoderDATA MINING2018DOWNLOAD
JV_71Efficient Cache-Supported Path Planning on RoadsDATA MINING2018DOWNLOAD
JV_72Nearest Keyword Set Search in Multi-Dimensional DatasetsDATA MINING2018DOWNLOAD
JV_73Rating Prediction based on Social Sentiment from Textual ReviewsDATA MINING2018DOWNLOAD
JV_74Location Aware Keyword Query Suggestion Based on Document ProximityDATA MINING2018DOWNLOAD
JV_75An Overlay Architecture for Throughput Optimal Multipath RoutingNETWORKING2018DOWNLOAD
JV_76Network Capability in Localizing Node Failures via End-to-End Path MeasurementsNETWORKING2018DOWNLOAD
JV_77Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor NetworkNETWORKING2018DOWNLOAD
JV_78iPath: Path Inference in Wireless Sensor NetworksNETWORKING2018DOWNLOAD
JV_79Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc NetworksNETWORKING2018DOWNLOAD
JV_80A Proxy-based Collaboration System to Minimize Content Download Time and Energy ConsumptionMobile Computing2018DOWNLOAD
JV_81Detecting Mobile Malicious Webpages in Real TimeMobile Computing2018DOWNLOAD
JV_82Quantifying Interdependent Privacy Risks with Location DataMobile Computing2018DOWNLOAD
JV_83Continuous Answering Holistic Queries over Sensor NetworksPARALLEL & DISTRIBUTED SYSTEMS2018DOWNLOAD
JV_84Detecting Malicious Facebook ApplicationsSECURE COMPUTING2018DOWNLOAD
JV_85FRoDO: Fraud Resilient Device for Off-Line Micro-PaymentsSECURE COMPUTING2018DOWNLOAD
JV_86Resolving Multi-party Privacy Conflicts in Social MediaSECURE COMPUTING2018DOWNLOAD
JV_87Online Multi-Modal Distance Metric Learning with Application to Image RetrievalIMAGE PROCESSING2018DOWNLOAD
JV_88Tag Based Image Search by Social Re-rankingIMAGE PROCESSING2018DOWNLOAD