You are on page 1of 4

.

Net Projects 2015-2016

#1 A Hybrid Cloud Approach for Secure Authorized Deduplication

#2 Collision Tolerant and Collision Free Packet Scheduling for Underwater


Acoustic Localization

#3 Discovery of Ranking Fraud for Mobile Apps

#4 Steganography Using Reversible Texture Synthesis

#5 Authenticated Key Exchange Protocols for Parallel Network File Systems

#6 Provable Multicopy Dynamic Data Possession in Cloud Computing Systems

#7 Secure Distributed Deduplication Systems with Improved Reliability

#8 OPoR Enabling Proof of Retrievability in Cloud Computing with Resource-


Constrained Devices

#9 PSMPA Patient Self-Controllable and Multi-Level Privacy-Preserving


Cooperative Authentication in Distributed m-Healthcare Cloud Computing System

#10 Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in


WirelessAd Hoc Networks

#11 Time-Delayed Broadcasting for Defeating Inside Jammers

#12 Mobile Data Gathering with Load Balanced Clustering and Dual Data
Uploading in Wireless Sensor Networks

#13 IncreSTS Towards Real-Time Incremental Short Text Summarization on


Comment Streams from Social Network Services

#14 Lossless and Reversible Data Hiding in Encrypted Images with Public Key
Cryptography

#15 A Distributed Three-Hop Routing Protocol to Increase the Capacity of Hybrid


Wireless Networks
#16 Audit-Free Cloud Storage via Deniable Attribute-based Encryption

#17 Real-Time Path Planning Based on Hybrid-VANET-Enhanced Transportation


System

#18 Continuous and Transparent User Identity Verification for Secure Internet
Services

#19 Detecting Malicious Facebook Applications

#20 Real-Time Path Planning Based on Hybrid-VANET-Enhanced Transportation


System

#21 Co-Extracting Opinion Targets and Opinion Words from Online Reviews
Based on the Word Alignment Model

#22 DROPS Division and Replication of Data in Cloud for Optimal Performance
and Security

#23 Detection and Rectification of Distorted Fingerprints

#24 attribute based access control with based access control with constant size
cipher text

#25 Optimal Configuration of Network Coding in Ad Hoc Networks

#26 Efficient Top-k Retrieval on Massive Data

#27 A Computational Dynamic Trust Model for User Authorization

#28 Data Collection in Multi-Application Sharing Wireless Sensor Networks

#29 EMR A Scalable Graph-based Ranking Model for Content-based Image


Retrieval

#30 An Attribute-Assisted Reranking Model for Web Image Search

#31 Eye Gaze Tracking With a Web Camera in a Desktop Environment

#32 TEES An Efficient Search Scheme over Encrypted Data on Mobile Cloud
#33 A Secure and Dynamic Multi-keyword Ranked Search Scheme over
Encrypted Cloud Data

#34 Automatic Face Naming by Learning Discriminative Affinity Matrices From


Weakly Labeled Images

#35 Head Pose Estimation From a 2D Face Image Using 3D Face Morphing With
Depth Parameters

#36 Face Recognition Across NonUniform Motion Blur, Illumination, and Pose

#36 Single Image Super-Resolution Based on Gradient Profile Sharpness

#37 Friendbook A Semantic-Based Friend Recommendation System for Social


Networks

#38 Cloud-Based Multimedia Content Protection System

#39 Best Keyword Cover Search

#40 Energy-aware Load Balancing and Application Scaling for the Cloud
Ecosystem

#41 Universal Network Coding-Based Opportunistic Routing for Unicast

#42 Malware Propagation in Large-Scale Networks

#43 BRACER A Distributed Broadcast Protocol in Multi-Hop Cognitive Radio Ad


Hoc Networks

#44 Fiducial Facial Point Extraction Using a Novel Projective Invariant

#45 A Distortion-Resistant Routing Framework for Video Traffic in Wireless


Multihop Networks

#45 GDCluster

#46 Effective Key Management in Dynamic Wireless Sensor Network

#47 Improved Privacy-Preserving P2P Multimedia Distribution Based on


Recombined Fingerprints
#48 Passive IP Traceback Disclosing the Locations of IP Spoofers from Path
Backscatter

#49 Behavior Rule Specification-Based Intrusion Detection for Safety Critical


Medical Cyber Physical Systems

#50 Integrated Foreground Segmentation and Boundary Matting for Live Videos

You might also like