IEEE 2015-16 Computer Science List

Check out the list for technology and domain options.


Cloud Computing IEEE Java - 2015-16

# Project Title
1 A Hybrid Cloud Approach for Secure Authorized Deduplication Location- and Diversity-aware News Feed System for Mobile Users.
2 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
3 A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems
4 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
5 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
6 An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration
7 Audit-Free Cloud Storage via Deniable Attribute-based Encryption
8 Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
9 CloudArmor: Supporting Reputation-based Trust Management for Cloud Services
10 Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption
11 Enabling Cloud Storage Auditing With Key-Exposure Resistance
12 Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
13 Identity-Based Encryption with Outsourced Revocation in Cloud Computing
14 Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage
15 Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
16 Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
17 Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
18 Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
19 Secure Auditing and Deduplicating Data in Cloud
20 Stealthy Denial of Service Strategy in Cloud Computing

DATA MINING PROJECTS IEEE JAVA 2015-16

# Project Title
1 Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model
2 Context-Based Diversification for Keyword Queries over XML Data
3 Best Keyword Cover Search
4 Discovery of Ranking Fraud for Mobile Apps
5 Malware Propagation in Large-Scale Networks
6 On Summarization and Timeline Generation for Evolutionary Tweet Streams
7 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
8 Progressive Duplicate Detection
9 Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection
10 Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services
11 Scalable Constrained Spectral Clustering
12 Towards Effective Bug Triage with Software Data Reduction Techniques
13 Tweet Segmentation and Its Application to Named Entity Recognition

IEEE MOBILE COMPUTING PROJECTS JAVA 2015-16

# Project Title
1 Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks
2 Friendbook: A Semantic-Based Friend Recommendation System for Social Networks
3 Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks
4 User-Defined Privacy Grid System for Continuous Location-Based Services

IEEE NETWORKING PROJECTS JAVA 2015-16

# Project Title
1 A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks
2 A Proximity-Aware Interest-Clustered P2P File Sharing System
3 Detecting Malicious Facebook Applications
4 Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing

SECURE COMPUTING PROJECT IEEE JAVA 2015-16

# Project Title
1 A Computational Dynamic Trust Model for User Authorization
2 A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks
3 Continuous and Transparent User Identity Verification for Secure Internet Services
4 Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
5 DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks
6 Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints
7 Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks
8 Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers

PARALLEL AND DISTRIBUTED SYSTEMS IEEE JAVA 2015-16

# Project Title
1 Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks
2 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
3 Secure Distributed Deduplication Systems with Improved Reliability

INFORMATION FORENSICS AND SECURITY IEEE JAVA 2015-16

# Project Title
1 A Framework for Secure Computations with Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations
2 Effective Key Management in Dynamic Wireless Sensor Networks
3 Key Updating for Leakage Resiliency with Application to AES Modes of Operation
4 Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backscatter
5 Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks

FUZZY SYSTEMS IEEE JAVA 2015-16

# Project Title
1 A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to-Business E-Services

IMAGE PROCESSING IEEE JAVA 2015-16

# Project Title
1 An Attribute-Assisted Reranking Model for Web Image Search
2 EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
3 Learning to Rank Image Tags With Limited Training Examples

SERVICE COMPUTING (WEBS SERVICE)IEEE JAVA 2015-16

# Project Title
1 Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
2 Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation