Optic Bee IEEE Java Projects List - 2024

S. No Project Name Domain
1. Sec-Health: A Blockchain-Based Protocol for Securing Health Records Blockchain/Healthcare
2. Secure and Efficient Data Duplication in Joint Cloud Storage Cloud Storage, Security
3. Friendship Inference in Mobila Social Networks: Exploiting Multi-Source Information with Two-Stage Deep Learning Framework Social Networks, Deep Learning
4. A sensing communication and computing approach for vulnerable road users safety IoT, Security
5. Target-Oriented Investigation of Online Abusive Attacks: A Dataset and Analysis Cyber Security, Data Analysis
6. Behavioral Model for Live Detection of Apps Based Attack Cyber Security, App Security
7. Enabling Balanced Data Deduplication in Mobile Edge Computing Mobile Edge Computing, Data Deduplication
8. A Fair Secure and Trusted Decentralized IIoT Data Marketplace Enabled by Block chain Blockchain, IoT
9. Intelligent Distribution of Fresh Agricultural Products in Smart City Smart City, Logistics
10. Social Spammer Detection via Convex Nonnegative Matrix Factorization Social Media, Machine Learning
11. Identity-Based Privacy Preserving Remote Data Integrity Checking With a Designated Verifier Data Security, Privacy
12. DSAS: A Secure Data Sharing and Authorized Searchable Framework for e-Healthcare System e-Healthcare, Data Security
13. Detecting fraudulent student communication in a multiple choice online test environment Education, Fraud Detection
14. Bank Record Storage Using Block chain Blockchain, Finance
15. Travel direction recommendation model based on photos of user social network profile Social Media, Recommendation Systems
16. Privacy preserving electricity theft detection based on block chain Blockchain, IoT
17. Secure and privacy preserving egovt frame work using blockchain and artificial intelligence Blockchain, AI
18. Complaint and senverity identification from online financial content Finance, NLP
19. A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain IoT, Blockchain
20. Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers Cloud Security, Access Control
21. Optimal Drug Dosage Control Strategy of Immune Systems Using Reinforcement Learning Healthcare, Reinforcement Learning
22. A Collaborative Method for Route Discovery Using Taxi Drivers Experience and Preferences Transportation, Data Analysis
23. A Credibility Analysis System for Assessing Information on Twitter Social Media, Data Analysis
24. A Data Sharing Protocol to Minimize Security and Privacy Risks of Cloud Storage in Big Data Era Cloud Security, Big Data
25. A Fast Parallel Community Discovery Model on Complex Data Mining, Social Networks
26. A General Framework for Implicit and Explicit Social Recommendation Social Media, Recommendation Systems
27. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing Mobile Computing, Cloud Security
28. A New Lightweight Symmetric Searchable Encryption Scheme for String Identification Cryptography, Data Security
29. A Resilient Dispersal Scheme for Multi-cloud Storage Cloud Computing, Data Storage
30. A Robust Reputation Management Mechanism in the Federated Cloud Cloud Computing, Security
31. A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing Cloud Computing, Privacy
32. Achieving Data Truthfulness and Privacy Preservation in DataMarkets Data Security, Privacy
33. Achieving Flexible and Self-contained Data Protection in Cloud Computing Cloud Computing, Data Protection
34. An Efficient and Fine-Grained Big Data Access Control Scheme with Privacy-Preserving Policy Big Data, Access Control
35. Analyzing Sentiments In One Go A Supervised Joint Topic Modeling Approach NLP, Sentiment Analysis
36. Anonymous and Traceable Group Data Sharing in Cloud Computing Cloud Security, Data Sharing
37. Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud Cloud Storage, Data Deduplication
38. Authenticated Outlier Mining for Outsourced Databases Data Mining, Security
39. Automatic Extraction of Access Control Policies from Natural Language Documents NLP, Access Control
40. Avoiding Data Corruption in Drop Computing Mobile Networks Mobile Networks, Data Integrity
41. Ciphertext-Policy Attribute-Based Encryption With Delgated Cryptography, Access Control
42. Computing Semantic Similarity of Concepts in Knowledge Graphs Knowledge Graphs, NLP
43. Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing Cloud Computing, Business Analytics
44. Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments Cloud Security, Key Management
45. Detecting Stress Based On Social Interactions In Social Networks Social Media, Data Analysis
46. Dynamic Multi Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data Cloud Computing, Data Retrieval
47. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud Doc Cloud Computing, Data Search
48. Enhancing Cloud-Based IoT Security through Trustworthy Cloud Service An Integration of Security and Reputation Approach IoT, Cloud Security
49. EPICS A Framework for Enforcing Security Policies in Composite Web Services Web Services, Security
50. Exploiting the Dynamic Mutual Influence for Predicting Social Event Participation Social Networks, Predictive Analytics
51. FaaSeC Enabling Forensics-as-a-Service for Cloud Computing Systems Cloud Computing, Forensics
52. FastGeo Efficient Geometric Range Queries on Encrypted Spatial Data Data Security, Geospatial Data
53. FooDNet Toward an Optimized Food Delivery Network based on Spatial Crowdsourcing Logistics, Crowdsourcing
54. Generating Query Facets using Knowledge Bases Knowledge Bases, Information Retrieval
55. Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds Cloud Computing, Data Auditing
56. Image Re-ranking based on Topic Diversity Image Processing, Recommender Systems
57. NAIS Neural Attentive Item Similarity Model for Recommendation Recommendation Systems, AI
58. Online Product Quantization Machine Learning, E-commerce
59. Optimizing Information Leakage in Multicloud Storage Services Cloud Computing, Security
60. ParkCrowd Reliable Crowdsensing for Aggregation and Dissemination of Parking Space Information Crowdsourcing, Smart Cities
61. Personal Web Revisitation by Context and Content Keywords with Relevance Feedback Information Retrieval, Web Development
62. Point-of-interest Recommendation for Location Promotion in Location-based Social Networks Recommendation Systems, Social Networks
63. Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Learning Algorithms Social Media, Machine Learning
64. Privacy Characterization and Quantification in Data Publishing Data Privacy, Data Science
65. Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing Healthcare, Cloud Security
66. Privacy Protection based Access Control Scheme in Cloud-based Services Cloud Security, Access Control
67. Privacy-Preserving Learning Analytics Challenges and Techniques Education, Data Privacy
68. Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data Cryptography, Data Search
69. ProGuard Detecting Malicious Accounts in Social-Network-Based Online Promotions Social Media, Fraud Detection
70. Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage Cloud Security, Access Control
71. Search Rank Fraud and Malware Detection in Google Play Mobile Security, Fraud Detection
72. Secure Cloud Storage based on RLWE Problem Cloud Security, Cryptography
73. Securing Aggregate Queries for DNA Databases Biometrics, Database Security
74. Securing Cloud Data under Key Exposure Cloud Security, Cryptography
75. Semantically Enhanced Medical Information Retrieval System Healthcare, Information Retrieval
76. SeSPHR A Methodology for Secure Sharing of Personal Health Records in the Cloud Healthcare, Cloud Security
77. Social Network Rumor Diffusion Predication Based on Equal Responsibility Game Model Social Media, Predictive Analytics
78. SocialQ&A An Online Social Network Based Question and Answer System Social Media, Q&A Systems
79. Strong Key-Exposure Resilient Auditing for Secure Cloud Storage Cloud Security, Auditing
80. TAFC Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud Cloud Security, Access Control
81. Utilization-Aware Trip Advisor in Bike-sharing Systems Based on User Behavior Analysis Transportation, Data Analysis
82. Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments Cloud Security, Key Management
83. A Data Sharing Protocol to Minimize Security and Privacy Risks of Cloud Storage Cloud Security, Data Sharing
84. A Fuzzy Approach to Text Classification with Two Stage Training for Ambiguous Instances Text Classification, Machine Learning
85. A Hierarchical Attention Model for Social Contextual Image Recommendation Social Media, Recommendation Systems
86. A Hybrid Elearning Recommendation Approach Based on Learners Influence Propagation E-learning, Recommendation Systems
87. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing Mobile Computing, Cloud Security
88. A Novel Load Image Profile Based Electricity Load Clustering Methodology Data Science, Energy Management
89. A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing Cloud Security, Cryptography
90. A Probabilistic Source Location Privacy Protection Scheme in Wireless Sensor Networks IoT, Privacy
91. A Secure G-Cloud-Based Framework for Government Healthcare Services E-Government, Healthcare
92. A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage Services Cloud Security, Cryptography
93. A Trust-Based Agent Learning Model for Service Composition in Mobile Cloud Computing Environments Mobile Computing, AI
94. Active Online Learning for Social Media Analysis to Support Crisis Management Social Media, Machine Learning
95. An attack resistant trust inference model for securing routing in vehicular Ad Hoc Networks Network Security, IoT
96. An Attribute-based Controlled Collaborative Access Control Scheme for Public Cloud Storage Cloud Security, Access Control
97. An Efficient Method for High Quality andCohesive Topical Phrase Mining Data Mining, NLP
98. Analysis and Accurate Prediction of Users Response Behavior in Incentive-Based Demand Response Data Analysis, Predictive Analytics
99. Android User Privacy Preserving through Crowdsourcing Mobile Security, Crowdsourcing
100. Applying Simulated Annealing and Parallel Computing to the Mobile Sequential Recommendation Mobile Computing, Recommender Systems
101. Authenticated Medical Documents Releasing with Privacy Protection and Release Control Healthcare, Data Privacy
102. Characterizing and Predicting Early Reviewers for Effective Product Marketing on ECommerce Websites E-commerce, Data Mining
103. CLASS Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics Cloud Computing, Forensics
104. Clustering Based Collaborative Filtering Using an Incentivized Penalized User Model Machine Learning, Collaborative Filtering
105. Collusion Defender Preserving Subscribers Privacy in Publish and Subscribe Systems Data Privacy, Security
106. Composition Context-Based Web Services Similarity Measure Web Services, Data Analysis
107. Conversational Networks for Automatic Online Moderation NLP, Social Media
108. Crypt DAC Cryptographically Enforced Dynamic Access Control in the Cloud Cloud Security, Cryptography
109. DCCR Deep Collaborative Conjunctive Recommender for Rating Prediction Deep Learning, Recommender Systems
110. Detecting Pickpocket Suspects from Large-Scale Public Transit Records Data Mining, Security
111. Dynamic Multi Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data Cloud Computing, Data Retrieval
112. Efficient conditional anonymity with message integrity and authentication in a vehicular adhoc network Network Security, IoT
113. Enabling Authorized Encrypted Search for Multi Authority Medical Databases Healthcare, Database Security
114. Fast Communication-efficient Spectral Clustering Over Distributed Data Machine Learning, Data Processing
115. Filtering Instagram hash tags through crowd tagging and the HITS algorithm Social Media, Data Mining
116. Fundamental Visual Concept Learning from Correlated Images and Text AI, Image Processing
117. Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems Cloud Computing, Data Integrity
118. Hidden Ciphertext Policy Attribute-Based Encryption with Fast Decryption for Personal Health Record System Healthcare, Cryptography
119. Towards Secure Industrial IoT: Blockchain System with Credit-Based Consensus Mechanism IoT, Blockchain
120. Joint Hypergraph Learning for Tag-based Image Retrieval Image Processing, Machine Learning
121. LBOA Location Based Secure Outsourced Aggregation in IoT IoT, Data Security
122. Learning Customer Behaviors for Effective Load Forecasting Data Analysis, Predictive Analytics
123. Memory Leakage-Resilient Dynamic and Verifiable Multi-keyword Ranked Search on Encrypted Smart Body Sensor Network Data IoT, Data Security
124. Mining Users Trust From E-Commerce Reviews Based on Sentiment Similarity Analysis E-commerce, Sentiment Analysis
125. MultiParty High Dimensional Data Publishing under Differential Privacy Data Privacy, Big Data
126. NASM Nonlinearly Attentive Similarity Model for Recommendation System via Locally Attentive Embedding Recommender Systems, AI
127. Network Representation Learning Enhanced Recommendation Algorithm Recommender Systems, Machine Learning
128. Normalization of Duplicate Records from Multiple Sources Data Processing, Data Science
129. Novel Multi-Keyword Search on Encrypted Data in the Cloud Cloud Computing, Data Search
130. On Scalable and Robust Truth Discovery in Big Data Social Media Sensing Applications Big Data, Social Media
131. Online Public Shaming on Twitter Detection Analysis and Mitigation Social Media, Data Analysis
132. PersoNet Friend Recommendation System Based on Big-Five Personality Traits and Hybrid Filtering Social Media, Recommender Systems
133. PMOD Secure Privilege-Based Multilevel Organizational Data Sharing in Cloud Computing Cloud Security, Data Sharing
134. Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Learning Algorithms Social Media, Machine Learning
135. Privacy aware Personal Data Storage PPDS Learning how to Protect User Privacy Data Privacy, Cloud Storage
136. RescueMe Smartphone Based Self Rescue System for Disaster Rescue Mobile Apps, Emergency Services
137. Revocable Identity Based Broadcast Proxy Reencryption for Data Sharing in Clouds Cloud Security, Data Sharing
138. Robust defense scheme against selective drop attack in wireless Ad Hoc Networks Network Security, IoT
139. Scheduling Real Time Security Aware tasks in Fog Networks Network Security, IoT
140. Searchable Symmetric Encryption with Forward Search Privacy Cryptography, Data Privacy
141. Secure and Efficient Skyline Queries on Encrypted Data Cloud Computing, Data Retrieval
142. Secure data group sharing and conditional dissemination Data Security, Data Sharing
143. Secure Key Agreement and Key Protection for Mobile Device User Authentication Mobile Security, Cryptography
144. Selective Authentication Based Geographic Opportunistic Routing in wsn Network Security, IoT
145. Sensitive Label Privacy Preservation with Anatomization for Data Publishing Data Privacy, Data Publishing
146. Social Network Rumor Diffusion Predication Based on Equal Responsibility Game Model Social Media, Predictive Analytics
147. Spammer Detection and Fake User Identification on Social Networks Social Media, AI
148. Transactional Behavior Verification in Business Process as a Service Configuration Business, Data Integrity
149. Trust Relationship Prediction in Alibaba ECommerce Platform E-commerce, Predictive Analytics
150. Trust-based Privacy-Preserving Photo Sharing in Online Social Networks Social Media, Data Privacy
151. Using Data Mining to Predict Hospital Admissions From the Emergency Department Healthcare, Data Mining
152. Detecting Suspicious File Migration or Replication in the Cloud Cloud Security, Forensics
153. Toward Detection and Attribution of Cyber-Attacks in IoT enabled Cyber physical Systems Cyber Security, IoT
154. Active Online Learning for Social Media Analysis to Support Crisis Management Social Media, Machine Learning
155. Weakly-Supervised Deep Learning for Customer Review Sentiment Classification Deep Learning, Sentiment Analysis
156. An Efficient and Secured Framework for Mobile Cloud Computing Mobile Computing, Cloud Security
157. Detection of fake online reviews using semi-supervised and supervised learning Machine Learning, E-commerce
158. Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing Healthcare, Cloud Security
159. Combining data owner side and cloud side access control for Encrypted cloud storage Cloud Security, Access Control
160. Development and Examination of Fog Computing-Based Encrypted Control System Fog Computing, Cryptography
161. Inference Attack-Resistant E-Healthcare Cloud System with Fine-Grained Access Healthcare, Cloud Security
162. A Power-of-Two Choices Based Algorithm for Fog Computing Fog Computing, Algorithms
163. Detecting Malicious Social Bots Based on Click stream Sequences Social Media, Cyber Security
164. Protecting Your Shopping Preference with Differential Privacy E-commerce, Data Privacy
165. Retrieving Hidden Friends A Collusion Privacy Attack Against Online Friend Search Engine Social Media, Data Privacy
166. Dual Access Control for Cloud-Based Data Storage and Sharing Cloud Security, Access Control
167. Block chain technology for protecting the banking transaction without using tokens Blockchain, Finance
168. Detecting Group Shilling Attacks in Online Recommender Systems Based on Bisecting K-Means Clustering Recommender Systems, Fraud Detection
169. Block chain management based on organ donation and transplantation Blockchain, Healthcare
170. Credit Card Fraud Detection Using AdaBoost and Majority Voting Finance, Machine Learning
171. Optimal filter assignment policy against distributed denial of service attack Network Security, DoS Attack
172. Block Hunter Federated Learning for Cyber Threat Hunting in Blockchain-based IIoT Networks Blockchain, Cyber Security
173. Secure cloud storage with data dynamics using secure network coding techniques Cloud Security, Networking
174. HinCTI: A Cyber Threat Intelligence Modeling and Identification System Based on Heterogeneous Information Network Cyber Security, AI
175. CloudRaid Detecting Distributed Concurrency Bugs via Log Mining and Enhancement Cloud Computing, Debugging
176. An Efficient Ciphertext Index Retrieval Scheme based on Edge Computing Framework Edge Computing, Data Retrieval
177. A Secure E Coupon Service Based on Blockchain Systems Blockchain, E-commerce
178. Secure Mobile Edge Computing Networks in the Presence of Multiple Eavesdroppers Mobile Edge Computing, Security
179. EntrapNet a Blockchain Based Verification Protocol for Trustless Computing Blockchain, Cloud Computing
180. Quantum Safe Round Optimal Password Authentication for Mobile Devices Mobile Security, Quantum Computing
181. A Secure E-Coupon Service Based on Blockchain Systems Blockchain, E-commerce
182. A Secure and Efficient Cloud-Centric Internet-of-Medical-Things-Enabled Smart Healthcare System With Public Verifiability Healthcare, IoT, Cloud
183. Data Trust Framework Using Blockchain Technology and Adaptive Transaction Validation Blockchain, Data Integrity
184. Assessment of the Suitability of Fog Computing in the Context of Internet of Things IoT, Fog Computing