sl.no |
CLOUD COMPUTING |
|
A Flexible Privacy-Preserving Data Sharing Scheme in Cloud-assisted IoT |
|
Authentication and Key Agreement Based on Anonymous Identity for Peer-to-Peer Cloud |
|
Dual Access Control for Cloud-Based Data Storage and Sharing |
|
Fast Secure and Anonymous Key Agreement against Bad Randomness for Cloud Computing |
|
Fine-grained Query Authorization with Integrity Verification over Encrypted Spatial Data in Cloud Storage |
|
Transferable Knowledge for Low-cost Decision Making in Cloud Environments |
|
Large-Universe Attribute-Based Encryption with Public Traceability for Cloud Storage |
|
Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing |
|
Multi-Replica and Multi-Cloud Data Public Audit Scheme Based on Blockchain |
|
Proactive Fault-Tolerance Technique to Enhance Reliability of Cloud Service in Cloud Federation Environment |
|
Joint Pricing and Security Investment in Cloud Security Service Market with User Interdependency |
sl.no |
DATA MINING |
|
Learning Student Networks via Feature Embedding |
|
Authentication and Key Agreement Based on Anonymous Identity for Peer-to-Peer Cloud |
|
Understanding Citizen’s Emotional Pulse in Smart City using Artificial Intelligence |
|
Cloud Intrusion Detection Method Based on Stacked Contractive Auto-Encoder and Support Vector Machine |
|
CorrAUC: a Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine Learning Techniques |
|
Karst: Transactional Data Ingestion without Blocking on a Scalable Architecture |
|
Examining Successful Attributes for Undergraduate Students by Applying Machine Learning Techniques |
|
Academic Performance Prediction Based on Multisource, Multifeature Behavioral Data |
|
Online Pricing with Reserve Price Constraint for Personal Data Markets |
|
Answer Keyword Generation for Community Question Answering by Multi-aspect Gamma-Poisson Matrix Completion |
|
WR-ELM: Weighted Regularization Extreme Learning Machine for Imbalance Learning in Software Fault Prediction |
sl.no |
NETWORK SECURITY |
|
Privacy-Preserving Federated Learning in Fog Computing |
|
BD-VTE: A Novel Baseline Data based Verifiable Trust Evaluation Scheme for Smart Network Systems |
|
Privacy and Security Management in Intelligent Transportation System |
|
Similarity-based and Sybil Attack Defended Community Detection for Social Networks. |
|
Privacy-Preserving Multidimensional Data Aggregation Scheme without Trusted Authority in Smart Grid |
|
Privacy-Preserving Sub graph Matching Scheme with Authentication in Social Networks |
|
Adaptive Secure Nearest Neighbor Query Processing over Encrypted Data |
|
Social Recruiter: Dynamic Incentive Mechanism for Mobile Crowdsourcing Worker Recruitment with Social Networks |
sl.no |
MACHINE LEARNING |
|
Examining Successful Attributes for Undergraduate Students by Applying Machine Learning Techniques |
|
CorrAUC: a Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine Learning Techniques |
|
Cloud Intrusion Detection Method Based on Stacked Contractive Auto-Encoder and Support Vector Machine |
|
Facial Expression Recognition with Two-branch Disentangled Generative
Adversarial Network |
|
WR-ELM: Weighted Regularization Extreme Learning Machine for Imbalance Learning in Software Fault Prediction |
|
Understanding Citizens’ Emotional Pulse in a Smart City using Artificial Intelligence |
|
DOF: A Demand-oriented Framework for Image Denoising |