IEEE
2018 Dotnet/Java Project Titles
1.Complementary
Aspect-based Opinion Mining
2.A Shoulder Surfing
Resistant Graphical Authentication System
3.Sketch-Based User
Authentication With a Novel String Edit Distance Model
4.Cleaning Antipatterns in an SQL Query Log
5.PrivBioMTAuth: Privacy
Preserving Biometrics-Based and User Centric Protocol for User Authentication
From Mobile Phones
6.Visual Secret Sharing
Schemes Encrypting Multiple Images
7.Improved Visual Secret
Sharing Scheme for QR Code Applications
8.Research on Deep
Learning Techniques in Breaking Text-based Captchas and Designing Image-based
Captcha
9.PassBio:
Privacy-Preserving User-Centric Biometric Authentication
10.Authentication by
Encrypted Negative Password
11.Secure Distributed
Computing with Straggling Servers Using Polynomial Codes.
12.Lightweight RFID Protocol for Medical Privacy Protection in IoT.
13.Inference
Attack-Resistant E-Healthcare Cloud System with Fine-Grained Access Control.
14.Auditing Big Data
Storage in Cloud Computing Using Divide and Conquer Tables
15.Outsourced Biometric
Identification with Privacy.
16.Identification of
differentially expressed genes to establish new Biomarker for cancer prediction
17.Towards
Privacy-preserving Content-based Image Retrieval in Cloud Computing.
18.Automatic Generation of
Social Event Storyboard from Image Click-through Data.
19.Quality and Profit
Assured Trusted Cloud Federation Formation: Game Theory Based Approach
20.Enabling Generic,
Verifiable, and Secure Data Search in Cloud Services
21.SEPDP: Secure and
Efficient Privacy Preserving Provable Data Possession in Cloud Storage
22.Provably secure and
lightweight identity-based authenticated data sharing protocol for cyber-physical
cloud environment
23.Efficient Retrieval
over Documents Encrypted by Attributes in Cloud Computing
24.Liveness Detection and
Automatic Template Updating using Fusion of ECG and Fingerprint
25.Cryptographic
Side-Channel Signaling and Authentication via Fingerprint Embedding
26.Leveraging
Spatial Diversity for Privacy-Aware Location Based Services in Mobile Networks
27.HealthDep: An Efficient
and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems
28. Privacy Protection for
E-health Systems by Means of Dynamic Authentication and Three-factor Key
Agreement
29.A Framework of
Customizing Electricity Retail Prices
30.Secure Fine-Grained
Access Control and Data Sharing for Dynamic Groups in Cloud
31.Anonymous and Traceable
Group Data Sharing in Cloud Computing
32.Supervised Learning of
Semantics-Preserving Hash via Deep Convolutional Neural Networks
33.Cloud Centric
Authentication for Wearable Healthcare Monitoring System
34. Learning Deep
Off-the-Person Heart Biometrics Representations
35.Collaborative Index
Embedding for Image Retrieval
36.A Feature Descriptor
based on Local Normalized Difference for Real-World Texture Classification
37.Sub-Selective
Quantization for Learning Binary Code in Large-Scale Image Search
38.VMGuard: A VMI-based
Security Architecture for Intrusion Detection in Cloud Environment
39.Normalization and
Weighting Techniques Based on Genuine-impostor Score Fusion in Multi biometric
Systems
40. Towards Shared Ownership in the Cloud
41.Cloud-Based Approximate
Constrained Shortest Distance Queries over Encrypted Graphs with Privacy Protection
42.Weakly-supervised Deep Embedding for Product
Review Sentiment Analysis
43.Online Failure
Prediction for Railway Transportation Systems Based on Fuzzy Rules and Data
Analysis
44.Risk Assessment in
Social Networks based on User Anomalous Behaviours
45.Key-Policy
Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage
46.Privacy-preserving
Indexing and Query Processing for Secure Dynamic Cloud Storage
47.Semantic-aware
Searching over Encrypted Data for Cloud Computing
48.On the Secure and
Reconfigurable Multi-Layer Network Design for Critical Information
Dissemination in the Internet of Battlefield Things(IoBT)
49.Certificateless
Searchable Public Key Encryption Scheme for Industrial Internet of Things
50. A Data-Emergency-Aware
Scheduling Scheme for Internet of Things in Smart Cities
51.Lifelogging Data
Validation Model for Internet of Things Enabled Personalized Healthcare
52.MetaFlow: a Scalable
Metadata Lookup Service for Distributed File Systems in Data Centers
53.Distributed Feature
Selection for Efficient Economic Big Data Analysis
54.Online Similarity
Learning for Big Data with Overfitting
55.Web Media and Stock
Markets : A Survey and Future Directions from a Big Data Perspective
56.Secure Hashing Based
Verifiable Pattern Matching
57.A Software Agent Enabled Biometric Security
Algorithm for Secure File Access in Consumer Storage Devices
58.Forecasting
Adverse Weather Situations in the Road Network
59.MMBcloud-tree: Authenticated Index for Verifiable
Cloud Service Selection.
60.On the Security of Data Access Control for Multiauthority Cloud Storage
Systems.
61.Unsupervised Visual Hashing with Semantic Assistant
for Content-based Image Retrieval.
62.Provably Secure Key-Aggregate Cryptosystems with
Broadcast Aggregate Keys for Online Data Sharing on the Cloud.
63.Publicly Verifiable Computation of Polynomials over
Outsourced Data with Multiple Sources.
64.Privacy-Preserving Public Auditing Protocol for
Low-Performance End Devices in Cloud
65.TeamPhone:
Networking SmartPhones for Disaster Recovery
66.Statistical Meta-Analysis of Presentation Attacks
for Secure Multibiometric Systems
67.Privacy-Preserving
Aggregate Queries for Optimal Location Selection