1. |
Sec-Health: A Blockchain-Based Protocol for Securing Health Records |
Blockchain/Healthcare |
2. |
Secure and Efficient Data Duplication in Joint Cloud Storage |
Cloud Storage, Security |
3. |
Friendship Inference in Mobila Social Networks: Exploiting Multi-Source Information with Two-Stage Deep Learning Framework |
Social Networks, Deep Learning |
4. |
A sensing communication and computing approach for vulnerable road users safety |
IoT, Security |
5. |
Target-Oriented Investigation of Online Abusive Attacks: A Dataset and Analysis |
Cyber Security, Data Analysis |
6. |
Behavioral Model for Live Detection of Apps Based Attack |
Cyber Security, App Security |
7. |
Enabling Balanced Data Deduplication in Mobile Edge Computing |
Mobile Edge Computing, Data Deduplication |
8. |
A Fair Secure and Trusted Decentralized IIoT Data Marketplace Enabled by Block chain |
Blockchain, IoT |
9. |
Intelligent Distribution of Fresh Agricultural Products in Smart City |
Smart City, Logistics |
10. |
Social Spammer Detection via Convex Nonnegative Matrix Factorization |
Social Media, Machine Learning |
11. |
Identity-Based Privacy Preserving Remote Data Integrity Checking With a Designated Verifier |
Data Security, Privacy |
12. |
DSAS: A Secure Data Sharing and Authorized Searchable Framework for e-Healthcare System |
e-Healthcare, Data Security |
13. |
Detecting fraudulent student communication in a multiple choice online test environment |
Education, Fraud Detection |
14. |
Bank Record Storage Using Block chain |
Blockchain, Finance |
15. |
Travel direction recommendation model based on photos of user social network profile |
Social Media, Recommendation Systems |
16. |
Privacy preserving electricity theft detection based on block chain |
Blockchain, IoT |
17. |
Secure and privacy preserving egovt frame work using blockchain and artificial intelligence |
Blockchain, AI |
18. |
Complaint and senverity identification from online financial content |
Finance, NLP |
19. |
A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain |
IoT, Blockchain |
20. |
Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers |
Cloud Security, Access Control |
21. |
Optimal Drug Dosage Control Strategy of Immune Systems Using Reinforcement Learning |
Healthcare, Reinforcement Learning |
22. |
A Collaborative Method for Route Discovery Using Taxi Drivers Experience and Preferences |
Transportation, Data Analysis |
23. |
A Credibility Analysis System for Assessing Information on Twitter |
Social Media, Data Analysis |
24. |
A Data Sharing Protocol to Minimize Security and Privacy Risks of Cloud Storage in Big Data Era |
Cloud Security, Big Data |
25. |
A Fast Parallel Community Discovery Model on Complex |
Data Mining, Social Networks |
26. |
A General Framework for Implicit and Explicit Social Recommendation |
Social Media, Recommendation Systems |
27. |
A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing |
Mobile Computing, Cloud Security |
28. |
A New Lightweight Symmetric Searchable Encryption Scheme for String Identification |
Cryptography, Data Security |
29. |
A Resilient Dispersal Scheme for Multi-cloud Storage |
Cloud Computing, Data Storage |
30. |
A Robust Reputation Management Mechanism in the Federated Cloud |
Cloud Computing, Security |
31. |
A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing |
Cloud Computing, Privacy |
32. |
Achieving Data Truthfulness and Privacy Preservation in DataMarkets |
Data Security, Privacy |
33. |
Achieving Flexible and Self-contained Data Protection in Cloud Computing |
Cloud Computing, Data Protection |
34. |
An Efficient and Fine-Grained Big Data Access Control Scheme with Privacy-Preserving Policy |
Big Data, Access Control |
35. |
Analyzing Sentiments In One Go A Supervised Joint Topic Modeling Approach |
NLP, Sentiment Analysis |
36. |
Anonymous and Traceable Group Data Sharing in Cloud Computing |
Cloud Security, Data Sharing |
37. |
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud |
Cloud Storage, Data Deduplication |
38. |
Authenticated Outlier Mining for Outsourced Databases |
Data Mining, Security |
39. |
Automatic Extraction of Access Control Policies from Natural Language Documents |
NLP, Access Control |
40. |
Avoiding Data Corruption in Drop Computing Mobile Networks |
Mobile Networks, Data Integrity |
41. |
Ciphertext-Policy Attribute-Based Encryption With Delgated |
Cryptography, Access Control |
42. |
Computing Semantic Similarity of Concepts in Knowledge Graphs |
Knowledge Graphs, NLP |
43. |
Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing |
Cloud Computing, Business Analytics |
44. |
Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments |
Cloud Security, Key Management |
45. |
Detecting Stress Based On Social Interactions In Social Networks |
Social Media, Data Analysis |
46. |
Dynamic Multi Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data |
Cloud Computing, Data Retrieval |
47. |
Efficient and Expressive Keyword Search Over Encrypted Data in Cloud Doc |
Cloud Computing, Data Search |
48. |
Enhancing Cloud-Based IoT Security through Trustworthy Cloud Service An Integration of Security and Reputation Approach |
IoT, Cloud Security |
49. |
EPICS A Framework for Enforcing Security Policies in Composite Web Services |
Web Services, Security |
50. |
Exploiting the Dynamic Mutual Influence for Predicting Social Event Participation |
Social Networks, Predictive Analytics |
51. |
FaaSeC Enabling Forensics-as-a-Service for Cloud Computing Systems |
Cloud Computing, Forensics |
52. |
FastGeo Efficient Geometric Range Queries on Encrypted Spatial Data |
Data Security, Geospatial Data |
53. |
FooDNet Toward an Optimized Food Delivery Network based on Spatial Crowdsourcing |
Logistics, Crowdsourcing |
54. |
Generating Query Facets using Knowledge Bases |
Knowledge Bases, Information Retrieval |
55. |
Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds |
Cloud Computing, Data Auditing |
56. |
Image Re-ranking based on Topic Diversity |
Image Processing, Recommender Systems |
57. |
NAIS Neural Attentive Item Similarity Model for Recommendation |
Recommendation Systems, AI |
58. |
Online Product Quantization |
Machine Learning, E-commerce |
59. |
Optimizing Information Leakage in Multicloud Storage Services |
Cloud Computing, Security |
60. |
ParkCrowd Reliable Crowdsensing for Aggregation and Dissemination of Parking Space Information |
Crowdsourcing, Smart Cities |
61. |
Personal Web Revisitation by Context and Content Keywords with Relevance Feedback |
Information Retrieval, Web Development |
62. |
Point-of-interest Recommendation for Location Promotion in Location-based Social Networks |
Recommendation Systems, Social Networks |
63. |
Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Learning Algorithms |
Social Media, Machine Learning |
64. |
Privacy Characterization and Quantification in Data Publishing |
Data Privacy, Data Science |
65. |
Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing |
Healthcare, Cloud Security |
66. |
Privacy Protection based Access Control Scheme in Cloud-based Services |
Cloud Security, Access Control |
67. |
Privacy-Preserving Learning Analytics Challenges and Techniques |
Education, Data Privacy |
68. |
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data |
Cryptography, Data Search |
69. |
ProGuard Detecting Malicious Accounts in Social-Network-Based Online Promotions |
Social Media, Fraud Detection |
70. |
Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage |
Cloud Security, Access Control |
71. |
Search Rank Fraud and Malware Detection in Google Play |
Mobile Security, Fraud Detection |
72. |
Secure Cloud Storage based on RLWE Problem |
Cloud Security, Cryptography |
73. |
Securing Aggregate Queries for DNA Databases |
Biometrics, Database Security |
74. |
Securing Cloud Data under Key Exposure |
Cloud Security, Cryptography |
75. |
Semantically Enhanced Medical Information Retrieval System |
Healthcare, Information Retrieval |
76. |
SeSPHR A Methodology for Secure Sharing of Personal Health Records in the Cloud |
Healthcare, Cloud Security |
77. |
Social Network Rumor Diffusion Predication Based on Equal Responsibility Game Model |
Social Media, Predictive Analytics |
78. |
SocialQ&A An Online Social Network Based Question and Answer System |
Social Media, Q&A Systems |
79. |
Strong Key-Exposure Resilient Auditing for Secure Cloud Storage |
Cloud Security, Auditing |
80. |
TAFC Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud |
Cloud Security, Access Control |
81. |
Utilization-Aware Trip Advisor in Bike-sharing Systems Based on User Behavior Analysis |
Transportation, Data Analysis |
82. |
Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments |
Cloud Security, Key Management |
83. |
A Data Sharing Protocol to Minimize Security and Privacy Risks of Cloud Storage |
Cloud Security, Data Sharing |
84. |
A Fuzzy Approach to Text Classification with Two Stage Training for Ambiguous Instances |
Text Classification, Machine Learning |
85. |
A Hierarchical Attention Model for Social Contextual Image Recommendation |
Social Media, Recommendation Systems |
86. |
A Hybrid Elearning Recommendation Approach Based on Learners Influence Propagation |
E-learning, Recommendation Systems |
87. |
A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing |
Mobile Computing, Cloud Security |
88. |
A Novel Load Image Profile Based Electricity Load Clustering Methodology |
Data Science, Energy Management |
89. |
A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing |
Cloud Security, Cryptography |
90. |
A Probabilistic Source Location Privacy Protection Scheme in Wireless Sensor Networks |
IoT, Privacy |
91. |
A Secure G-Cloud-Based Framework for Government Healthcare Services |
E-Government, Healthcare |
92. |
A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage Services |
Cloud Security, Cryptography |
93. |
A Trust-Based Agent Learning Model for Service Composition in Mobile Cloud Computing Environments |
Mobile Computing, AI |
94. |
Active Online Learning for Social Media Analysis to Support Crisis Management |
Social Media, Machine Learning |
95. |
An attack resistant trust inference model for securing routing in vehicular Ad Hoc Networks |
Network Security, IoT |
96. |
An Attribute-based Controlled Collaborative Access Control Scheme for Public Cloud Storage |
Cloud Security, Access Control |
97. |
An Efficient Method for High Quality andCohesive Topical Phrase Mining |
Data Mining, NLP |
98. |
Analysis and Accurate Prediction of Users Response Behavior in Incentive-Based Demand Response |
Data Analysis, Predictive Analytics |
99. |
Android User Privacy Preserving through Crowdsourcing |
Mobile Security, Crowdsourcing |
100. |
Applying Simulated Annealing and Parallel Computing to the Mobile Sequential Recommendation |
Mobile Computing, Recommender Systems |
101. |
Authenticated Medical Documents Releasing with Privacy Protection and Release Control |
Healthcare, Data Privacy |
102. |
Characterizing and Predicting Early Reviewers for Effective Product Marketing on ECommerce Websites |
E-commerce, Data Mining |
103. |
CLASS Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics |
Cloud Computing, Forensics |
104. |
Clustering Based Collaborative Filtering Using an Incentivized Penalized User Model |
Machine Learning, Collaborative Filtering |
105. |
Collusion Defender Preserving Subscribers Privacy in Publish and Subscribe Systems |
Data Privacy, Security |
106. |
Composition Context-Based Web Services Similarity Measure |
Web Services, Data Analysis |
107. |
Conversational Networks for Automatic Online Moderation |
NLP, Social Media |
108. |
Crypt DAC Cryptographically Enforced Dynamic Access Control in the Cloud |
Cloud Security, Cryptography |
109. |
DCCR Deep Collaborative Conjunctive Recommender for Rating Prediction |
Deep Learning, Recommender Systems |
110. |
Detecting Pickpocket Suspects from Large-Scale Public Transit Records |
Data Mining, Security |
111. |
Dynamic Multi Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data |
Cloud Computing, Data Retrieval |
112. |
Efficient conditional anonymity with message integrity and authentication in a vehicular adhoc network |
Network Security, IoT |
113. |
Enabling Authorized Encrypted Search for Multi Authority Medical Databases |
Healthcare, Database Security |
114. |
Fast Communication-efficient Spectral Clustering Over Distributed Data |
Machine Learning, Data Processing |
115. |
Filtering Instagram hash tags through crowd tagging and the HITS algorithm |
Social Media, Data Mining |
116. |
Fundamental Visual Concept Learning from Correlated Images and Text |
AI, Image Processing |
117. |
Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems |
Cloud Computing, Data Integrity |
118. |
Hidden Ciphertext Policy Attribute-Based Encryption with Fast Decryption for Personal Health Record System |
Healthcare, Cryptography |
119. |
Towards Secure Industrial IoT: Blockchain System with Credit-Based Consensus Mechanism |
IoT, Blockchain |
120. |
Joint Hypergraph Learning for Tag-based Image Retrieval |
Image Processing, Machine Learning |
121. |
LBOA Location Based Secure Outsourced Aggregation in IoT |
IoT, Data Security |
122. |
Learning Customer Behaviors for Effective Load Forecasting |
Data Analysis, Predictive Analytics |
123. |
Memory Leakage-Resilient Dynamic and Verifiable Multi-keyword Ranked Search on Encrypted Smart Body Sensor Network Data |
IoT, Data Security |
124. |
Mining Users Trust From E-Commerce Reviews Based on Sentiment Similarity Analysis |
E-commerce, Sentiment Analysis |
125. |
MultiParty High Dimensional Data Publishing under Differential Privacy |
Data Privacy, Big Data |
126. |
NASM Nonlinearly Attentive Similarity Model for Recommendation System via Locally Attentive Embedding |
Recommender Systems, AI |
127. |
Network Representation Learning Enhanced Recommendation Algorithm |
Recommender Systems, Machine Learning |
128. |
Normalization of Duplicate Records from Multiple Sources |
Data Processing, Data Science |
129. |
Novel Multi-Keyword Search on Encrypted Data in the Cloud |
Cloud Computing, Data Search |
130. |
On Scalable and Robust Truth Discovery in Big Data Social Media Sensing Applications |
Big Data, Social Media |
131. |
Online Public Shaming on Twitter Detection Analysis and Mitigation |
Social Media, Data Analysis |
132. |
PersoNet Friend Recommendation System Based on Big-Five Personality Traits and Hybrid Filtering |
Social Media, Recommender Systems |
133. |
PMOD Secure Privilege-Based Multilevel Organizational Data Sharing in Cloud Computing |
Cloud Security, Data Sharing |
134. |
Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Learning Algorithms |
Social Media, Machine Learning |
135. |
Privacy aware Personal Data Storage PPDS Learning how to Protect User Privacy |
Data Privacy, Cloud Storage |
136. |
RescueMe Smartphone Based Self Rescue System for Disaster Rescue |
Mobile Apps, Emergency Services |
137. |
Revocable Identity Based Broadcast Proxy Reencryption for Data Sharing in Clouds |
Cloud Security, Data Sharing |
138. |
Robust defense scheme against selective drop attack in wireless Ad Hoc Networks |
Network Security, IoT |
139. |
Scheduling Real Time Security Aware tasks in Fog Networks |
Network Security, IoT |
140. |
Searchable Symmetric Encryption with Forward Search Privacy |
Cryptography, Data Privacy |
141. |
Secure and Efficient Skyline Queries on Encrypted Data |
Cloud Computing, Data Retrieval |
142. |
Secure data group sharing and conditional dissemination |
Data Security, Data Sharing |
143. |
Secure Key Agreement and Key Protection for Mobile Device User Authentication |
Mobile Security, Cryptography |
144. |
Selective Authentication Based Geographic Opportunistic Routing in wsn |
Network Security, IoT |
145. |
Sensitive Label Privacy Preservation with Anatomization for Data Publishing |
Data Privacy, Data Publishing |
146. |
Social Network Rumor Diffusion Predication Based on Equal Responsibility Game Model |
Social Media, Predictive Analytics |
147. |
Spammer Detection and Fake User Identification on Social Networks |
Social Media, AI |
148. |
Transactional Behavior Verification in Business Process as a Service Configuration |
Business, Data Integrity |
149. |
Trust Relationship Prediction in Alibaba ECommerce Platform |
E-commerce, Predictive Analytics |
150. |
Trust-based Privacy-Preserving Photo Sharing in Online Social Networks |
Social Media, Data Privacy |
151. |
Using Data Mining to Predict Hospital Admissions From the Emergency Department |
Healthcare, Data Mining |
152. |
Detecting Suspicious File Migration or Replication in the Cloud |
Cloud Security, Forensics |
153. |
Toward Detection and Attribution of Cyber-Attacks in IoT enabled Cyber physical Systems |
Cyber Security, IoT |
154. |
Active Online Learning for Social Media Analysis to Support Crisis Management |
Social Media, Machine Learning |
155. |
Weakly-Supervised Deep Learning for Customer Review Sentiment Classification |
Deep Learning, Sentiment Analysis |
156. |
An Efficient and Secured Framework for Mobile Cloud Computing |
Mobile Computing, Cloud Security |
157. |
Detection of fake online reviews using semi-supervised and supervised learning |
Machine Learning, E-commerce |
158. |
Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing |
Healthcare, Cloud Security |
159. |
Combining data owner side and cloud side access control for Encrypted cloud storage |
Cloud Security, Access Control |
160. |
Development and Examination of Fog Computing-Based Encrypted Control System |
Fog Computing, Cryptography |
161. |
Inference Attack-Resistant E-Healthcare Cloud System with Fine-Grained Access |
Healthcare, Cloud Security |
162. |
A Power-of-Two Choices Based Algorithm for Fog Computing |
Fog Computing, Algorithms |
163. |
Detecting Malicious Social Bots Based on Click stream Sequences |
Social Media, Cyber Security |
164. |
Protecting Your Shopping Preference with Differential Privacy |
E-commerce, Data Privacy |
165. |
Retrieving Hidden Friends A Collusion Privacy Attack Against Online Friend Search Engine |
Social Media, Data Privacy |
166. |
Dual Access Control for Cloud-Based Data Storage and Sharing |
Cloud Security, Access Control |
167. |
Block chain technology for protecting the banking transaction without using tokens |
Blockchain, Finance |
168. |
Detecting Group Shilling Attacks in Online Recommender Systems Based on Bisecting K-Means Clustering |
Recommender Systems, Fraud Detection |
169. |
Block chain management based on organ donation and transplantation |
Blockchain, Healthcare |
170. |
Credit Card Fraud Detection Using AdaBoost and Majority Voting |
Finance, Machine Learning |
171. |
Optimal filter assignment policy against distributed denial of service attack |
Network Security, DoS Attack |
172. |
Block Hunter Federated Learning for Cyber Threat Hunting in Blockchain-based IIoT Networks |
Blockchain, Cyber Security |
173. |
Secure cloud storage with data dynamics using secure network coding techniques |
Cloud Security, Networking |
174. |
HinCTI: A Cyber Threat Intelligence Modeling and Identification System Based on Heterogeneous Information Network |
Cyber Security, AI |
175. |
CloudRaid Detecting Distributed Concurrency Bugs via Log Mining and Enhancement |
Cloud Computing, Debugging |
176. |
An Efficient Ciphertext Index Retrieval Scheme based on Edge Computing Framework |
Edge Computing, Data Retrieval |
177. |
A Secure E Coupon Service Based on Blockchain Systems |
Blockchain, E-commerce |
178. |
Secure Mobile Edge Computing Networks in the Presence of Multiple Eavesdroppers |
Mobile Edge Computing, Security |
179. |
EntrapNet a Blockchain Based Verification Protocol for Trustless Computing |
Blockchain, Cloud Computing |
180. |
Quantum Safe Round Optimal Password Authentication for Mobile Devices |
Mobile Security, Quantum Computing |
181. |
A Secure E-Coupon Service Based on Blockchain Systems |
Blockchain, E-commerce |
182. |
A Secure and Efficient Cloud-Centric Internet-of-Medical-Things-Enabled Smart Healthcare System With Public Verifiability |
Healthcare, IoT, Cloud |
183. |
Data Trust Framework Using Blockchain Technology and Adaptive Transaction Validation |
Blockchain, Data Integrity |
184. |
Assessment of the Suitability of Fog Computing in the Context of Internet of Things |
IoT, Fog Computing |