| 1. |
Sec-Health: A Blockchain-Based Protocol for Securing Health Records |
Blockchain/Healthcare |
| 2. |
Secure and Efficient Data Duplication in Joint Cloud Storage |
Cloud Storage, Security |
| 3. |
Friendship Inference in Mobila Social Networks: Exploiting Multi-Source Information with Two-Stage Deep Learning Framework |
Social Networks, Deep Learning |
| 4. |
A sensing communication and computing approach for vulnerable road users safety |
IoT, Security |
| 5. |
Target-Oriented Investigation of Online Abusive Attacks: A Dataset and Analysis |
Cyber Security, Data Analysis |
| 6. |
Behavioral Model for Live Detection of Apps Based Attack |
Cyber Security, App Security |
| 7. |
Enabling Balanced Data Deduplication in Mobile Edge Computing |
Mobile Edge Computing, Data Deduplication |
| 8. |
A Fair Secure and Trusted Decentralized IIoT Data Marketplace Enabled by Block chain |
Blockchain, IoT |
| 9. |
Intelligent Distribution of Fresh Agricultural Products in Smart City |
Smart City, Logistics |
| 10. |
Social Spammer Detection via Convex Nonnegative Matrix Factorization |
Social Media, Machine Learning |
| 11. |
Identity-Based Privacy Preserving Remote Data Integrity Checking With a Designated Verifier |
Data Security, Privacy |
| 12. |
DSAS: A Secure Data Sharing and Authorized Searchable Framework for e-Healthcare System |
e-Healthcare, Data Security |
| 13. |
Detecting fraudulent student communication in a multiple choice online test environment |
Education, Fraud Detection |
| 14. |
Bank Record Storage Using Block chain |
Blockchain, Finance |
| 15. |
Travel direction recommendation model based on photos of user social network profile |
Social Media, Recommendation Systems |
| 16. |
Privacy preserving electricity theft detection based on block chain |
Blockchain, IoT |
| 17. |
Secure and privacy preserving egovt frame work using blockchain and artificial intelligence |
Blockchain, AI |
| 18. |
Complaint and senverity identification from online financial content |
Finance, NLP |
| 19. |
A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain |
IoT, Blockchain |
| 20. |
Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers |
Cloud Security, Access Control |
| 21. |
Optimal Drug Dosage Control Strategy of Immune Systems Using Reinforcement Learning |
Healthcare, Reinforcement Learning |
| 22. |
A Collaborative Method for Route Discovery Using Taxi Drivers Experience and Preferences |
Transportation, Data Analysis |
| 23. |
A Credibility Analysis System for Assessing Information on Twitter |
Social Media, Data Analysis |
| 24. |
A Data Sharing Protocol to Minimize Security and Privacy Risks of Cloud Storage in Big Data Era |
Cloud Security, Big Data |
| 25. |
A Fast Parallel Community Discovery Model on Complex |
Data Mining, Social Networks |
| 26. |
A General Framework for Implicit and Explicit Social Recommendation |
Social Media, Recommendation Systems |
| 27. |
A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing |
Mobile Computing, Cloud Security |
| 28. |
A New Lightweight Symmetric Searchable Encryption Scheme for String Identification |
Cryptography, Data Security |
| 29. |
A Resilient Dispersal Scheme for Multi-cloud Storage |
Cloud Computing, Data Storage |
| 30. |
A Robust Reputation Management Mechanism in the Federated Cloud |
Cloud Computing, Security |
| 31. |
A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing |
Cloud Computing, Privacy |
| 32. |
Achieving Data Truthfulness and Privacy Preservation in DataMarkets |
Data Security, Privacy |
| 33. |
Achieving Flexible and Self-contained Data Protection in Cloud Computing |
Cloud Computing, Data Protection |
| 34. |
An Efficient and Fine-Grained Big Data Access Control Scheme with Privacy-Preserving Policy |
Big Data, Access Control |
| 35. |
Analyzing Sentiments In One Go A Supervised Joint Topic Modeling Approach |
NLP, Sentiment Analysis |
| 36. |
Anonymous and Traceable Group Data Sharing in Cloud Computing |
Cloud Security, Data Sharing |
| 37. |
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud |
Cloud Storage, Data Deduplication |
| 38. |
Authenticated Outlier Mining for Outsourced Databases |
Data Mining, Security |
| 39. |
Automatic Extraction of Access Control Policies from Natural Language Documents |
NLP, Access Control |
| 40. |
Avoiding Data Corruption in Drop Computing Mobile Networks |
Mobile Networks, Data Integrity |
| 41. |
Ciphertext-Policy Attribute-Based Encryption With Delgated |
Cryptography, Access Control |
| 42. |
Computing Semantic Similarity of Concepts in Knowledge Graphs |
Knowledge Graphs, NLP |
| 43. |
Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing |
Cloud Computing, Business Analytics |
| 44. |
Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments |
Cloud Security, Key Management |
| 45. |
Detecting Stress Based On Social Interactions In Social Networks |
Social Media, Data Analysis |
| 46. |
Dynamic Multi Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data |
Cloud Computing, Data Retrieval |
| 47. |
Efficient and Expressive Keyword Search Over Encrypted Data in Cloud Doc |
Cloud Computing, Data Search |
| 48. |
Enhancing Cloud-Based IoT Security through Trustworthy Cloud Service An Integration of Security and Reputation Approach |
IoT, Cloud Security |
| 49. |
EPICS A Framework for Enforcing Security Policies in Composite Web Services |
Web Services, Security |
| 50. |
Exploiting the Dynamic Mutual Influence for Predicting Social Event Participation |
Social Networks, Predictive Analytics |
| 51. |
FaaSeC Enabling Forensics-as-a-Service for Cloud Computing Systems |
Cloud Computing, Forensics |
| 52. |
FastGeo Efficient Geometric Range Queries on Encrypted Spatial Data |
Data Security, Geospatial Data |
| 53. |
FooDNet Toward an Optimized Food Delivery Network based on Spatial Crowdsourcing |
Logistics, Crowdsourcing |
| 54. |
Generating Query Facets using Knowledge Bases |
Knowledge Bases, Information Retrieval |
| 55. |
Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds |
Cloud Computing, Data Auditing |
| 56. |
Image Re-ranking based on Topic Diversity |
Image Processing, Recommender Systems |
| 57. |
NAIS Neural Attentive Item Similarity Model for Recommendation |
Recommendation Systems, AI |
| 58. |
Online Product Quantization |
Machine Learning, E-commerce |
| 59. |
Optimizing Information Leakage in Multicloud Storage Services |
Cloud Computing, Security |
| 60. |
ParkCrowd Reliable Crowdsensing for Aggregation and Dissemination of Parking Space Information |
Crowdsourcing, Smart Cities |
| 61. |
Personal Web Revisitation by Context and Content Keywords with Relevance Feedback |
Information Retrieval, Web Development |
| 62. |
Point-of-interest Recommendation for Location Promotion in Location-based Social Networks |
Recommendation Systems, Social Networks |
| 63. |
Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Learning Algorithms |
Social Media, Machine Learning |
| 64. |
Privacy Characterization and Quantification in Data Publishing |
Data Privacy, Data Science |
| 65. |
Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing |
Healthcare, Cloud Security |
| 66. |
Privacy Protection based Access Control Scheme in Cloud-based Services |
Cloud Security, Access Control |
| 67. |
Privacy-Preserving Learning Analytics Challenges and Techniques |
Education, Data Privacy |
| 68. |
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data |
Cryptography, Data Search |
| 69. |
ProGuard Detecting Malicious Accounts in Social-Network-Based Online Promotions |
Social Media, Fraud Detection |
| 70. |
Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage |
Cloud Security, Access Control |
| 71. |
Search Rank Fraud and Malware Detection in Google Play |
Mobile Security, Fraud Detection |
| 72. |
Secure Cloud Storage based on RLWE Problem |
Cloud Security, Cryptography |
| 73. |
Securing Aggregate Queries for DNA Databases |
Biometrics, Database Security |
| 74. |
Securing Cloud Data under Key Exposure |
Cloud Security, Cryptography |
| 75. |
Semantically Enhanced Medical Information Retrieval System |
Healthcare, Information Retrieval |
| 76. |
SeSPHR A Methodology for Secure Sharing of Personal Health Records in the Cloud |
Healthcare, Cloud Security |
| 77. |
Social Network Rumor Diffusion Predication Based on Equal Responsibility Game Model |
Social Media, Predictive Analytics |
| 78. |
SocialQ&A An Online Social Network Based Question and Answer System |
Social Media, Q&A Systems |
| 79. |
Strong Key-Exposure Resilient Auditing for Secure Cloud Storage |
Cloud Security, Auditing |
| 80. |
TAFC Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud |
Cloud Security, Access Control |
| 81. |
Utilization-Aware Trip Advisor in Bike-sharing Systems Based on User Behavior Analysis |
Transportation, Data Analysis |
| 82. |
Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments |
Cloud Security, Key Management |
| 83. |
A Data Sharing Protocol to Minimize Security and Privacy Risks of Cloud Storage |
Cloud Security, Data Sharing |
| 84. |
A Fuzzy Approach to Text Classification with Two Stage Training for Ambiguous Instances |
Text Classification, Machine Learning |
| 85. |
A Hierarchical Attention Model for Social Contextual Image Recommendation |
Social Media, Recommendation Systems |
| 86. |
A Hybrid Elearning Recommendation Approach Based on Learners Influence Propagation |
E-learning, Recommendation Systems |
| 87. |
A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing |
Mobile Computing, Cloud Security |
| 88. |
A Novel Load Image Profile Based Electricity Load Clustering Methodology |
Data Science, Energy Management |
| 89. |
A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing |
Cloud Security, Cryptography |
| 90. |
A Probabilistic Source Location Privacy Protection Scheme in Wireless Sensor Networks |
IoT, Privacy |
| 91. |
A Secure G-Cloud-Based Framework for Government Healthcare Services |
E-Government, Healthcare |
| 92. |
A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage Services |
Cloud Security, Cryptography |
| 93. |
A Trust-Based Agent Learning Model for Service Composition in Mobile Cloud Computing Environments |
Mobile Computing, AI |
| 94. |
Active Online Learning for Social Media Analysis to Support Crisis Management |
Social Media, Machine Learning |
| 95. |
An attack resistant trust inference model for securing routing in vehicular Ad Hoc Networks |
Network Security, IoT |
| 96. |
An Attribute-based Controlled Collaborative Access Control Scheme for Public Cloud Storage |
Cloud Security, Access Control |
| 97. |
An Efficient Method for High Quality andCohesive Topical Phrase Mining |
Data Mining, NLP |
| 98. |
Analysis and Accurate Prediction of Users Response Behavior in Incentive-Based Demand Response |
Data Analysis, Predictive Analytics |
| 99. |
Android User Privacy Preserving through Crowdsourcing |
Mobile Security, Crowdsourcing |
| 100. |
Applying Simulated Annealing and Parallel Computing to the Mobile Sequential Recommendation |
Mobile Computing, Recommender Systems |
| 101. |
Authenticated Medical Documents Releasing with Privacy Protection and Release Control |
Healthcare, Data Privacy |
| 102. |
Characterizing and Predicting Early Reviewers for Effective Product Marketing on ECommerce Websites |
E-commerce, Data Mining |
| 103. |
CLASS Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics |
Cloud Computing, Forensics |
| 104. |
Clustering Based Collaborative Filtering Using an Incentivized Penalized User Model |
Machine Learning, Collaborative Filtering |
| 105. |
Collusion Defender Preserving Subscribers Privacy in Publish and Subscribe Systems |
Data Privacy, Security |
| 106. |
Composition Context-Based Web Services Similarity Measure |
Web Services, Data Analysis |
| 107. |
Conversational Networks for Automatic Online Moderation |
NLP, Social Media |
| 108. |
Crypt DAC Cryptographically Enforced Dynamic Access Control in the Cloud |
Cloud Security, Cryptography |
| 109. |
DCCR Deep Collaborative Conjunctive Recommender for Rating Prediction |
Deep Learning, Recommender Systems |
| 110. |
Detecting Pickpocket Suspects from Large-Scale Public Transit Records |
Data Mining, Security |
| 111. |
Dynamic Multi Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data |
Cloud Computing, Data Retrieval |
| 112. |
Efficient conditional anonymity with message integrity and authentication in a vehicular adhoc network |
Network Security, IoT |
| 113. |
Enabling Authorized Encrypted Search for Multi Authority Medical Databases |
Healthcare, Database Security |
| 114. |
Fast Communication-efficient Spectral Clustering Over Distributed Data |
Machine Learning, Data Processing |
| 115. |
Filtering Instagram hash tags through crowd tagging and the HITS algorithm |
Social Media, Data Mining |
| 116. |
Fundamental Visual Concept Learning from Correlated Images and Text |
AI, Image Processing |
| 117. |
Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems |
Cloud Computing, Data Integrity |
| 118. |
Hidden Ciphertext Policy Attribute-Based Encryption with Fast Decryption for Personal Health Record System |
Healthcare, Cryptography |
| 119. |
Towards Secure Industrial IoT: Blockchain System with Credit-Based Consensus Mechanism |
IoT, Blockchain |
| 120. |
Joint Hypergraph Learning for Tag-based Image Retrieval |
Image Processing, Machine Learning |
| 121. |
LBOA Location Based Secure Outsourced Aggregation in IoT |
IoT, Data Security |
| 122. |
Learning Customer Behaviors for Effective Load Forecasting |
Data Analysis, Predictive Analytics |
| 123. |
Memory Leakage-Resilient Dynamic and Verifiable Multi-keyword Ranked Search on Encrypted Smart Body Sensor Network Data |
IoT, Data Security |
| 124. |
Mining Users Trust From E-Commerce Reviews Based on Sentiment Similarity Analysis |
E-commerce, Sentiment Analysis |
| 125. |
MultiParty High Dimensional Data Publishing under Differential Privacy |
Data Privacy, Big Data |
| 126. |
NASM Nonlinearly Attentive Similarity Model for Recommendation System via Locally Attentive Embedding |
Recommender Systems, AI |
| 127. |
Network Representation Learning Enhanced Recommendation Algorithm |
Recommender Systems, Machine Learning |
| 128. |
Normalization of Duplicate Records from Multiple Sources |
Data Processing, Data Science |
| 129. |
Novel Multi-Keyword Search on Encrypted Data in the Cloud |
Cloud Computing, Data Search |
| 130. |
On Scalable and Robust Truth Discovery in Big Data Social Media Sensing Applications |
Big Data, Social Media |
| 131. |
Online Public Shaming on Twitter Detection Analysis and Mitigation |
Social Media, Data Analysis |
| 132. |
PersoNet Friend Recommendation System Based on Big-Five Personality Traits and Hybrid Filtering |
Social Media, Recommender Systems |
| 133. |
PMOD Secure Privilege-Based Multilevel Organizational Data Sharing in Cloud Computing |
Cloud Security, Data Sharing |
| 134. |
Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Learning Algorithms |
Social Media, Machine Learning |
| 135. |
Privacy aware Personal Data Storage PPDS Learning how to Protect User Privacy |
Data Privacy, Cloud Storage |
| 136. |
RescueMe Smartphone Based Self Rescue System for Disaster Rescue |
Mobile Apps, Emergency Services |
| 137. |
Revocable Identity Based Broadcast Proxy Reencryption for Data Sharing in Clouds |
Cloud Security, Data Sharing |
| 138. |
Robust defense scheme against selective drop attack in wireless Ad Hoc Networks |
Network Security, IoT |
| 139. |
Scheduling Real Time Security Aware tasks in Fog Networks |
Network Security, IoT |
| 140. |
Searchable Symmetric Encryption with Forward Search Privacy |
Cryptography, Data Privacy |
| 141. |
Secure and Efficient Skyline Queries on Encrypted Data |
Cloud Computing, Data Retrieval |
| 142. |
Secure data group sharing and conditional dissemination |
Data Security, Data Sharing |
| 143. |
Secure Key Agreement and Key Protection for Mobile Device User Authentication |
Mobile Security, Cryptography |
| 144. |
Selective Authentication Based Geographic Opportunistic Routing in wsn |
Network Security, IoT |
| 145. |
Sensitive Label Privacy Preservation with Anatomization for Data Publishing |
Data Privacy, Data Publishing |
| 146. |
Social Network Rumor Diffusion Predication Based on Equal Responsibility Game Model |
Social Media, Predictive Analytics |
| 147. |
Spammer Detection and Fake User Identification on Social Networks |
Social Media, AI |
| 148. |
Transactional Behavior Verification in Business Process as a Service Configuration |
Business, Data Integrity |
| 149. |
Trust Relationship Prediction in Alibaba ECommerce Platform |
E-commerce, Predictive Analytics |
| 150. |
Trust-based Privacy-Preserving Photo Sharing in Online Social Networks |
Social Media, Data Privacy |
| 151. |
Using Data Mining to Predict Hospital Admissions From the Emergency Department |
Healthcare, Data Mining |
| 152. |
Detecting Suspicious File Migration or Replication in the Cloud |
Cloud Security, Forensics |
| 153. |
Toward Detection and Attribution of Cyber-Attacks in IoT enabled Cyber physical Systems |
Cyber Security, IoT |
| 154. |
Active Online Learning for Social Media Analysis to Support Crisis Management |
Social Media, Machine Learning |
| 155. |
Weakly-Supervised Deep Learning for Customer Review Sentiment Classification |
Deep Learning, Sentiment Analysis |
| 156. |
An Efficient and Secured Framework for Mobile Cloud Computing |
Mobile Computing, Cloud Security |
| 157. |
Detection of fake online reviews using semi-supervised and supervised learning |
Machine Learning, E-commerce |
| 158. |
Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing |
Healthcare, Cloud Security |
| 159. |
Combining data owner side and cloud side access control for Encrypted cloud storage |
Cloud Security, Access Control |
| 160. |
Development and Examination of Fog Computing-Based Encrypted Control System |
Fog Computing, Cryptography |
| 161. |
Inference Attack-Resistant E-Healthcare Cloud System with Fine-Grained Access |
Healthcare, Cloud Security |
| 162. |
A Power-of-Two Choices Based Algorithm for Fog Computing |
Fog Computing, Algorithms |
| 163. |
Detecting Malicious Social Bots Based on Click stream Sequences |
Social Media, Cyber Security |
| 164. |
Protecting Your Shopping Preference with Differential Privacy |
E-commerce, Data Privacy |
| 165. |
Retrieving Hidden Friends A Collusion Privacy Attack Against Online Friend Search Engine |
Social Media, Data Privacy |
| 166. |
Dual Access Control for Cloud-Based Data Storage and Sharing |
Cloud Security, Access Control |
| 167. |
Block chain technology for protecting the banking transaction without using tokens |
Blockchain, Finance |
| 168. |
Detecting Group Shilling Attacks in Online Recommender Systems Based on Bisecting K-Means Clustering |
Recommender Systems, Fraud Detection |
| 169. |
Block chain management based on organ donation and transplantation |
Blockchain, Healthcare |
| 170. |
Credit Card Fraud Detection Using AdaBoost and Majority Voting |
Finance, Machine Learning |
| 171. |
Optimal filter assignment policy against distributed denial of service attack |
Network Security, DoS Attack |
| 172. |
Block Hunter Federated Learning for Cyber Threat Hunting in Blockchain-based IIoT Networks |
Blockchain, Cyber Security |
| 173. |
Secure cloud storage with data dynamics using secure network coding techniques |
Cloud Security, Networking |
| 174. |
HinCTI: A Cyber Threat Intelligence Modeling and Identification System Based on Heterogeneous Information Network |
Cyber Security, AI |
| 175. |
CloudRaid Detecting Distributed Concurrency Bugs via Log Mining and Enhancement |
Cloud Computing, Debugging |
| 176. |
An Efficient Ciphertext Index Retrieval Scheme based on Edge Computing Framework |
Edge Computing, Data Retrieval |
| 177. |
A Secure E Coupon Service Based on Blockchain Systems |
Blockchain, E-commerce |
| 178. |
Secure Mobile Edge Computing Networks in the Presence of Multiple Eavesdroppers |
Mobile Edge Computing, Security |
| 179. |
EntrapNet a Blockchain Based Verification Protocol for Trustless Computing |
Blockchain, Cloud Computing |
| 180. |
Quantum Safe Round Optimal Password Authentication for Mobile Devices |
Mobile Security, Quantum Computing |
| 181. |
A Secure E-Coupon Service Based on Blockchain Systems |
Blockchain, E-commerce |
| 182. |
A Secure and Efficient Cloud-Centric Internet-of-Medical-Things-Enabled Smart Healthcare System With Public Verifiability |
Healthcare, IoT, Cloud |
| 183. |
Data Trust Framework Using Blockchain Technology and Adaptive Transaction Validation |
Blockchain, Data Integrity |
| 184. |
Assessment of the Suitability of Fog Computing in the Context of Internet of Things |
IoT, Fog Computing |