IEEE 2016 JAVA PROJECTS LISTDownload Project List
S. No. |
Code |
IEEE 2016 Project Titles |
Domain |
Tech |
Download Abstract |
Download BasePaper |
1 |
ASJ1601 |
A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data |
CLOUD COMPUTING |
JAVA |
||
2 |
ASJ1602 |
A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud |
CLOUD COMPUTING |
JAVA |
||
3 |
ASJ1603 |
An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing |
CLOUD COMPUTING |
JAVA |
||
4 |
ASJ1604 |
An Efficient Privacy-Preserving Ranked Keyword Search Method |
CLOUD COMPUTING |
JAVA |
||
5 |
ASJ1605 |
CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System |
CLOUD COMPUTING |
JAVA |
||
6 |
ASJ1606 |
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing |
CLOUD COMPUTING |
JAVA |
||
7 |
ASJ1607
|
CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services |
CLOUD COMPUTING |
JAVA |
||
8 |
ASJ1608 |
Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email |
CLOUD COMPUTING |
JAVA |
||
9 |
ASJ1609 |
Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds |
CLOUD COMPUTING |
JAVA |
||
10 |
ASJ1610 |
DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud |
CLOUD COMPUTING |
JAVA |
||
11 |
ASJ1611 |
Dual-Server Public-Key Encryption With Keyword Search for |
CLOUD COMPUTING |
JAVA |
||
12 |
ASJ1612 |
Dynamic and Public Auditing with Fair Arbitration for Cloud Data |
CLOUD COMPUTING |
JAVA |
||
13 |
ASJ1613 |
Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates |
CLOUD COMPUTING |
JAVA |
||
14 |
ASJ1614 |
Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services |
CLOUD COMPUTING |
JAVA |
||
15 |
ASJ1615 |
Geometric Range Search on Encrypted Spatial Data |
CLOUD COMPUTING |
JAVA |
||
16 |
ASJ1616 |
Identity-Based Encryption with Cloud Revocation Authority and Its Applications |
CLOUD COMPUTING |
JAVA |
||
17 |
ASJ1617 |
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud |
CLOUD COMPUTING |
JAVA |
||
18 |
ASJ1618 |
Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud |
Parallel & Distributed Systems |
JAVA |
||
19 |
ASJ1619 |
Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems |
Cloud Computing |
JAVA |
||
20 |
ASJ1620 |
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption |
CLOUD COMPUTING |
JAVA |
||
21 |
ASJ1621 |
Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming |
CLOUD COMPUTING |
JAVA |
||
22 |
ASJ1622 |
TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage |
CLOUD COMPUTING |
JAVA |
||
23 |
ASJ1623 |
A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing |
CLOUD COMPUTING |
JAVA |
||
24 |
ASJ1624 |
DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments |
CLOUD COMPUTING |
JAVA |
||
25 |
ASJ1625 |
Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing |
CLOUD COMPUTING |
JAVA |
||
26 |
ASJ1626 |
SecRBAC: Secure data in the Clouds |
SERVICE COMPUTING |
JAVA |
||
27 |
ASJ1627 |
A Novel Recommendation Model Regularized with User Trust and Item Ratings |
DATA MINING |
JAVA |
||
28 |
ASJ1628 |
Automatically Mining Facets for Queries from Their Search Results |
DATA MINING |
JAVA |
||
29 |
ASJ1629 |
Booster in High Dimensional Data Classification |
DATA MINING |
JAVA |
||
30 |
ASJ1630 |
Building an intrusion detection system using a filter-based feature selection algorithm |
DATA MINING |
JAVA |
||
31 |
ASJ1631 |
Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information |
DATA MINING |
JAVA |
||
32 |
ASJ1632 |
Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings |
Data Mining |
JAVA |
||
33 |
ASJ1633 |
Crowdsourcing for Top-K Query Processing over Uncertain Data |
DATA MINING |
JAVA |
||
34 |
ASJ1634 |
Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder |
DATA MINING |
JAVA |
||
35 |
ASJ1635 |
Domain-Sensitive Recommendation with User-Item Subgroup Analysis |
DATA MINING |
JAVA |
||
36 |
ASJ1636 |
Efficient Algorithms for Mining Top-K High Utility Itemsets |
DATA MINING |
JAVA |
||
37 |
ASJ1637 |
Efficient Cache-Supported Path Planning on Roads |
DATA MINING |
JAVA |
||
38 |
ASJ1638 |
Mining User-Aware Rare Sequential Topic Patterns in Document Streams |
DATA MINING |
JAVA |
||
39 |
ASJ1639
|
Nearest Keyword Set Search in Multi-Dimensional Datasets |
DATA MINING |
JAVA |
||
40 |
ASJ1640 |
Rating Prediction based on Social Sentiment from Textual Reviews |
DATA MINING |
JAVA |
||
41 |
ASJ1641 |
Location Aware Keyword Query Suggestion Based on Document Proximity |
DATA MINING |
JAVA |
||
42 |
ASJ1642 |
Using Hashtag Graph-based Topic Model to Connect Semantically-related Words without Co-occurrence in Microblogs |
DATA MINING |
JAVA |
||
43 |
ASJ1643 |
Quantifying Political Leaning from Tweets, Retweets, and Retweeters |
DATA MINING |
JAVA |
||
44 |
ASJ1644 |
Relevance Feedback Algorithms Inspired By Quantum Detection |
DATA MINING |
JAVA |
||
45 |
ASJ1645 |
Sentiment Embeddings with Applications to Sentiment Analysis |
DATA MINING |
JAVA |
||
46 |
ASJ1646 |
Top-Down XML Keyword Query Processing |
DATA MINING |
JAVA |
||
47 |
ASJ1648 |
Top-k Dominating Queries on Incomplete Data |
DATA MINING |
JAVA |
||
48 |
ASJ1650 |
A Stable Approach for Routing Queries in Unstructured P2P Networks |
NETWORKING |
JAVA |
||
49 |
ASJ1651 |
iPath: Path Inference in Wireless Sensor Networks |
NETWORKING |
JAVA |
||
50 |
ASJ1652 |
Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks |
NETWORKING |
JAVA |
||
51 |
ASJ1653 |
Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks |
NETWORKING |
JAVA |
||
52 |
ASJ1654 |
STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users |
NETWORKING |
JAVA |
||
53 |
ASJ1655 |
Energy and Memory Efficient Clone Detection in Wireless Sensor Networks |
MOBILE COMPUTING |
JAVA |
||
54 |
ASJ1656 |
EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data |
MOBILE COMPUTING |
JAVA |
||
55 |
ASJ1657 |
Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach |
Mobile Computing |
JAVA |
||
56 |
ASJ1658 |
Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach |
MOBILE COMPUTING |
JAVA |
||
57 |
ASJ1659 |
A Hop-by-Hop Routing Mechanism for Green Internet |
Parallel & Distributed Systems |
JAVA |
||
58 |
ASJ1660 |
Continuous Answering Holistic Queries over Sensor Networks |
Parallel & Distributed Systems |
JAVA |
||
59 |
ASJ1661 |
Dictionary Based Secure Provenance Compression for Wireless Sensor Networks |
PARALLEL & DISTRIBUTED SYSTEMS |
JAVA |
||
60 |
ASJ1663 |
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts |
SECURE COMPUTING |
JAVA |
||
61 |
ASJ1664 |
Data Lineage in Malicious Environments |
SECURE COMPUTING |
JAVA |
||
62 |
ASJ1665 |
Detecting Malicious Facebook Applications |
SECURE COMPUTING |
JAVA |
||
63 |
ASJ1666 |
FRoDO: Fraud Resilient Device for Off-Line Micro-Payments |
SECURE COMPUTING |
JAVA |
||
64 |
ASJ1667 |
Inference Attack on Browsing History of Twitter Users Using Public Click Analytics and Twitter Metadata |
SECURE COMPUTING |
JAVA |
||
65 |
ASJ1668 |
Resolving Multi-party Privacy Conflicts in Social Media |
SECURE COMPUTING |
JAVA |
||
66 |
ASJ1669 |
Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions |
SECURE COMPUTING |
JAVA |
||
67 |
ASJ1670 |
Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data |
Information Forensics & Security |
JAVA |
||
68 |
ASJ1671 |
Privacy-Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms |
Information Forensics & Security |
JAVA |
||
69 |
ASJ1672 |
Profiling Online Social Behaviors for Compromised Account Detection |
Information Forensics & Security |
JAVA |
||
70 |
ASJ1673 |
A Locality Sensitive Low-Rank Model for Image Tag Completion |
IMAGE PROCESSING |
JAVA |
||
71 |
ASJ1674 |
A Scalable Approach for Content-Based Image Retrieval in Peer- to-Peer Networks |
IMAGE PROCESSING |
JAVA |
||
72 |
ASJ1676 |
Online Multi-Modal Distance Metric Learning with Application to Image Retrieval |
IMAGE PROCESSING |
JAVA |
||
73 |
ASJ1677 |
Tag Based Image Search by Social Re-ranking |
IMAGE PROCESSING |
JAVA |
||
74 |
ASJ1680 |
Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine- Grained Benchmark, and Feature Evaluation |
SOFTWARE ENGINEERING |
JAVA |
||
75 |
ASJ1684 |
Malware Detection in Cloud Computing Infrastructures |
Secure Computing |
JAVA |
||
76 |
ASJ1685 |
Two-Factor Data Security Protection Mechanism for Cloud Storage System |
Cloud Computing |
JAVA |
||
77 |
ASJ1686 |
Attribute Based Data Sharing Scheme Revisited in Cloud Computing |
Cloud Computing |
JAVA |
||
78 |
ASJ1683 |
Answering Approximate Queries Over XML Data |
Fuzzy Systems |
JAVA |
||
79 |
ASJ1687 |
Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud |
Cloud Computing |
JAVA |
||
80 |
ASJ1688 |
Encrypted Data Management with Deduplication in Cloud Computing |
Cloud Computing |
JAVA |
||
81 |
ASJ1689 |
ID2S Password-Authenticated Key Exchange Protocols |
Secure Computing |
JAVA |
||
82 |
ASJ1690 |
Crawling Hidden Objects with kNN Queries |
DATA MINING |
JAVA |
||
83 |
ASJ1691 |
Achieving Flatness: Selecting the Honeywords from Existing User Passwords |
Secure Computing |
JAVA |
||
84 |
ASJ1692 |
Merlin: Exploratory Analysis with Imprecise Queries |
DAT MINING |
JAVA |
||
85 |
ASJ1693 |
Providing User Security Guarantees in Public Infrastructure Clouds |
Cloud Computing |
JAVA |
||
86 |
ASJ1694 |
Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks |
Industrial Informatics |
JAVA |
||
87 |
ASJ1695 |
Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation |
Video Technology |
JAVA |
||
88 |
ASJ1696 |
ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks |
Information Forensics |
JAVA |