IEEE Java Projects
IEEE 2015-16 Computer Science List
Check out the list for technology and domain options.
Cloud Computing IEEE Java - 2015-16
# | Project Title |
---|---|
1 | A Hybrid Cloud Approach for Secure Authorized Deduplication Location- and Diversity-aware News Feed System for Mobile Users. |
2 | A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing |
3 | A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems |
4 | A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data |
5 | A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud |
6 | An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration |
7 | Audit-Free Cloud Storage via Deniable Attribute-based Encryption |
8 | Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing |
9 | CloudArmor: Supporting Reputation-based Trust Management for Cloud Services |
10 | Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption |
11 | Enabling Cloud Storage Auditing With Key-Exposure Resistance |
12 | Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data |
13 | Identity-Based Encryption with Outsourced Revocation in Cloud Computing |
14 | Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage |
15 | Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing |
16 | Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage |
17 | Provable Multicopy Dynamic Data Possession in Cloud Computing Systems |
18 | Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation |
19 | Secure Auditing and Deduplicating Data in Cloud |
20 | Stealthy Denial of Service Strategy in Cloud Computing |
DATA MINING PROJECTS IEEE JAVA 2015-16
# | Project Title |
---|---|
1 | Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model |
2 | Context-Based Diversification for Keyword Queries over XML Data |
3 | Best Keyword Cover Search |
4 | Discovery of Ranking Fraud for Mobile Apps |
5 | Malware Propagation in Large-Scale Networks |
6 | On Summarization and Timeline Generation for Evolutionary Tweet Streams |
7 | Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites |
8 | Progressive Duplicate Detection |
9 | Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection |
10 | Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services |
11 | Scalable Constrained Spectral Clustering |
12 | Towards Effective Bug Triage with Software Data Reduction Techniques |
13 | Tweet Segmentation and Its Application to Named Entity Recognition |
IEEE MOBILE COMPUTING PROJECTS JAVA 2015-16
# | Project Title |
---|---|
1 | Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks |
2 | Friendbook: A Semantic-Based Friend Recommendation System for Social Networks |
3 | Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks |
4 | User-Defined Privacy Grid System for Continuous Location-Based Services |
IEEE NETWORKING PROJECTS JAVA 2015-16
# | Project Title |
---|---|
1 | A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks |
2 | A Proximity-Aware Interest-Clustered P2P File Sharing System |
3 | Detecting Malicious Facebook Applications |
4 | Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing |
SECURE COMPUTING PROJECT IEEE JAVA 2015-16
# | Project Title |
---|---|
1 | A Computational Dynamic Trust Model for User Authorization |
2 | A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks |
3 | Continuous and Transparent User Identity Verification for Secure Internet Services |
4 | Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts |
5 | DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks |
6 | Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints |
7 | Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks |
8 | Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers |
PARALLEL AND DISTRIBUTED SYSTEMS IEEE JAVA 2015-16
# | Project Title |
---|---|
1 | Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks |
2 | Cost-Effective Authentic and Anonymous Data Sharing with Forward Security |
3 | Secure Distributed Deduplication Systems with Improved Reliability |
INFORMATION FORENSICS AND SECURITY IEEE JAVA 2015-16
# | Project Title |
---|---|
1 | A Framework for Secure Computations with Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations |
2 | Effective Key Management in Dynamic Wireless Sensor Networks |
3 | Key Updating for Leakage Resiliency with Application to AES Modes of Operation |
4 | Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backscatter |
5 | Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks |
FUZZY SYSTEMS IEEE JAVA 2015-16
# | Project Title |
---|---|
1 | A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to-Business E-Services |
IMAGE PROCESSING IEEE JAVA 2015-16
# | Project Title |
---|---|
1 | An Attribute-Assisted Reranking Model for Web Image Search |
2 | EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval |
3 | Learning to Rank Image Tags With Limited Training Examples |
SERVICE COMPUTING (WEBS SERVICE)IEEE JAVA 2015-16
# | Project Title |
---|---|
1 | Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System |
2 | Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation |