Вы находитесь на странице: 1из 3

IEEE 2015 PROJECTS

SN
O
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26

CODE

PROJECT TITLE

DOMAIN

LSJ150
1
LSJ150
2
LSJ150
3
LSJ150
4
LSJ150
5
LSJ150
6
LSJ150
7
LSJ150
8
LSJ150
9
LSJ151
0
LSJ151
1
LSJ151
2
LSJ151
3
LSJ151
4
LSJ151
5
LSJ151
6
LSJ151
7
LSJ151
8
LSJ151
9
LSJ152
0
LSJ152
1
LSJ152
2
LSJ152
3
LSJ152
4
LSJ152
5
LSJ152
6

A Distortion-Resistant Routing Framework for Video Traffic in


Wireless Multihop Networks

Networking

A Proximity-Aware Interest-Clustered P2P File Sharing System

Networking

Detecting Malicious Facebook Applications

Networking

Maximizing P2P File Access Availability in Mobile Ad Hoc


Networks though Replication for Efficient File Sharing

Networking

Best Keyword Cover Search

Data Mining

Co-Extracting Opinion Targets and Opinion Words from Online


Reviews Based on the Word Alignment Model

Data Mining

Context-Based Diversification for Keyword Queries over XML DATA

Data Mining

Discovery of Ranking Fraud for Mobile Apps

Data Mining

Malware Propagation in Large-Scale Networks

Data Mining

On Summarization and Timeline Generation for Evolutionary Tweet


Streams
Privacy Policy Inference of User Uploaded Images on Content Sharing
Sites
Progressive Duplicate Detection
Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier
Detection
Route-Saver: Leveraging Route APIs for Accurate and Efficient Query
Processing at Location-Based Services
Scalable Constrained Spectral Clustering
Towards Effective Bug Triage with Software Data Reduction
Techniques
Tweet Segmentation and Its Application to Named Entity
Recognition

Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining
Data Mining

Real-Time Detection of Traffic From Twitter Stream Analysis

Data Mining

t-Closeness through Micro Aggregation: Strict Privacy with Enhanced


Utility Preservation

Data Mining

Stealthy Denial of Service Strategy in Cloud Computing

Cloud Computing

Secure Auditing and Deduplicating Data in Cloud

Cloud Computing

Public Integrity Auditing for Shared Dynamic Cloud Data with Group
User Revocation
Provable Multicopy Dynamic Data Possession in Cloud Computing
Systems
Privacy-Preserving Public Auditing for Regenerating-Code-Based
Cloud Storage
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data
Owners in Cloud Computing
Key-Aggregate Searchable Encryption (KASE) for Group Data
Sharing via Cloud Storage

CONTACT: ARUNKUMAR (040-40274843, 9533694296)


MAIL ID: logicsystemsprojects@gmail.com

WEBSITE: www.logicsystems.org.in

Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing

IEEE 2015 PROJECTS


27
28
29
30
31
32
33
34
35
36
37
38
39

LSJ152
7
LSJ152
8
LSJ152
9
LSJ153
0
LSJ153
1
LSJ153
2
LSJ153
3
LSJ153
4
LSJ153
5
LSJ153
6
LSJ153
7
LSJ153
8
LSJ153
9

Identity-Based Encryption with Outsourced Revocation in Cloud


Computing
Enabling Fine-grained Multi-keyword Search Supporting Classified
Sub-dictionaries over Encrypted Cloud Data
Enabling Cloud Storage Auditing With Key-Exposure Resistance
Control Cloud Data Access Privilege and Anonymity with Fully
Anonymous Attribute-Based Encryption
Cloud Armor: Supporting Reputation-based Trust Management for
Cloud Services
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with
Verifiable Delegation in Cloud Computing
Audit-Free Cloud Storage via Deniable Attribute-based Encryption
An Authenticated Trust and Reputation Calculation and
Management System for Cloud and Sensor Networks Integration
A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups
in the Cloud
A Secure and Dynamic Multi-keyword Ranked Search Scheme over
Encrypted Cloud Data
A Scalable and Reliable Matching Service for Content-Based
Publish/Subscribe Systems
A Profit Maximization Scheme with Guaranteed Quality of Service in
Cloud Computing
A Hybrid Cloud Approach for Secure Authorized Deduplication

40

LSJ154
0

Designing High Performance Web-Based Computing Services to


Promote Telemedicine Database Management System

41

LSJ154
1

Location-Aware and Personalized Collaborative Filtering for Web


Service Recommendation

LSJ154
2
LSJ154
3
LSJ154
4
LSJ154
5
LSJ154
6
LSJ154
7
LSJ154
8
LSJ154
9
LSJ155
0
LSJ155
1
LSJ155
2
LSJ155

Prediction of Atomic Web Services Reliability for QoS-Aware


Recommendation
A Fuzzy Preference Tree-Based Recommender System for
Personalized Business-to-Business E-Services
Dynamic Routing for Data Integrity and Delay Differentiated
Services in Wireless Sensor Networks
Friendbook: A Semantic-Based Friend Recommendation System
for Social Networks
Privacy-Preserving and Truthful Detection of Packet Dropping
Attacks in Wireless Ad Hoc Networks
User-Defined Privacy Grid System for Continuous Location-Based
Services

42
43
44
45
46
47
48
49
50
51
52
53

Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Service
Computing
(Web Service)
Service
Computing
(Web Service)
Service
Computing
Fuzzy Systems
Mobile Computing
Mobile Computing
Mobile Computing
Mobile Computing

An Attribute-Assisted Reranking Model for Web Image Search

Image Processing

EMR: A Scalable Graph-based Ranking Model for Content-based


Image Retrieval

Image Processing

Learning to Rank Image Tags With Limited Training Examples

Image Processing

A Lightweight Secure Scheme for Detecting Provenance Forgery


and Packet Drop Attacks in Wireless Sensor Networks
Continuous and Transparent User Identity Verification for Secure
Internet Services
A Computational Dynamic Trust Model for User Authorization

CONTACT: ARUNKUMAR (040-40274843, 9533694296)


MAIL ID: logicsystemsprojects@gmail.com

WEBSITE: www.logicsystems.org.in

Secure Computing
Secure Computing
Secure Computing

IEEE 2015 PROJECTS


3
LSJ155
4
LSJ155
5
LSJ155
6
LSJ155
7
LSJ155
8

Contributory Broadcast Encryption with Efficient Encryption and


Short Ciphertexts
DDSGA: A Data-Driven Semi-Global Alignment Approach for
Detecting Masquerade Attacks
Improved Privacy-Preserving P2P Multimedia Distribution Based
on Recombined Fingerprints
Secure Data Aggregation Technique for Wireless Sensor
Networks in the Presence of Collusion Attacks
Secure Spatial Top-k Query Processing via Untrusted LocationBased Service Providers

59

LSJ155
9

Asymmetric Social Proximity Based Private Matching Protocols


for Online Social Networks

60

LSJ156
0

Cost-Effective Authentic and Anonymous Data Sharing with


Forward Security

61

LSJ156
1

Secure Distributed Deduplication Systems with Improved


Reliability

62

LSJ156
2

A Framework for Secure Computations with Two Non-Colluding


Servers and Multiple Clients, Applied to Recommendations

63

LSJ156
3

Effective Key Management in Dynamic Wireless Sensor Networks

64

LSJ156
4

Key Updating for Leakage Resiliency with Application to AES


Modes of Operation

65

LSJ156
5

Passive IP Traceback: Disclosing the Locations of IP Spoofers from


Path Backscatter

66

LSJ156
6

Software Puzzle: A Countermeasure to Resource-Inflated Denialof-Service Attacks

54
55
56
57
58

CONTACT: ARUNKUMAR (040-40274843, 9533694296)


MAIL ID: logicsystemsprojects@gmail.com

WEBSITE: www.logicsystems.org.in

Secure Computing
Secure Computing
Secure Computing
Secure Computing
Secure Computing
Parallel &
Distributed
Systems
Parallel &
Distributed
Systems
Parallel &
Distributed
Systems
Information
Forensics &
Security
Information
Forensics &
Security
Information
Forensics &
Security
Information
Forensics &
Security
Information
Forensics &
Security

Вам также может понравиться