IEEE PROJECTS JAVA 2015

1 CPJ1501 A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks
NETWORKING
2 CPJ1502 A Proximity-Aware Interest-Clustered P2P File Sharing System
NETWORKING
3 CPJ1503 Detecting Malicious Facebook Applications
NETWORKING
4 CPJ1504 Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing
NETWORKING
5 CPJ1505 Best Keyword Cover Search
DATA MINING
6 CPJ1506 Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model
DATA MINING
7 CPJ1507 Context-Based Diversification for Keyword Queries over XML DATA
DATA MINING
8 CPJ1508 Discovery of Ranking Fraud for Mobile Apps
DATA MINING
9 CPJ1509 Malware Propagation in Large-Scale Networks
DATA MINING
10 CPJ1510 On Summarization and Timeline Generation for Evolutionary Tweet Streams
DATA MINING
11 CPJ1511 Privacy Policy Inference of User Uploaded Images on Content Sharing Sites
DATA MINING
12 CPJ1512 Progressive Duplicate Detection
DATA MINING
13 CPJ1513 Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection
DATA MINING
14 CPJ1514 Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services
DATA MINING
15 CPJ1515 Scalable Constrained Spectral Clustering
DATA MINING
16 CPJ1516 Towards Effective Bug Triage with Software Data Reduction Techniques
DATA MINING
17 CPJ1517 Tweet Segmentation and Its Application to Named Entity Recognition
DATA MINING
18 CPJ1518 Real-Time Detection of Traffic From Twitter Stream Analysis
DATA MINING
19 CPJ1519 T-Closeness through Micro Aggregation: Strict Privacy with Enhanced Utility Preservation
DATA MINING
20 CPJ1520 Stealthy Denial of Service Strategy in Cloud Computing
CLOUD COMPUTING
21 CPJ1521 Secure Auditing and Deduplicating Data in Cloud
CLOUD COMPUTING
22 CPJ1522 Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
CLOUD COMPUTING
23 CPJ1523 Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
CLOUD COMPUTING
24 CPJ1524 Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
CLOUD COMPUTING
25 CPJ1525 Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
CLOUD COMPUTING
26 CPJ1526 Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage
CLOUD COMPUTING
27 CPJ1527 Identity-Based Encryption with Outsourced Revocation in Cloud Computing
CLOUD COMPUTING
28 CPJ1528 Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
CLOUD COMPUTING
29 CPJ1529 Enabling Cloud Storage Auditing With Key-Exposure Resistance
CLOUD COMPUTING
30 CPJ1530 Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption
CLOUD COMPUTING
31 CPJ1531 Cloud Armor: Supporting Reputation-based Trust Management for Cloud Services
CLOUD COMPUTING
32 CPJ1532 Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
CLOUD COMPUTING
33 CPJ1533 Audit-Free Cloud Storage via Deniable Attribute-based
CLOUD COMPUTING
34 CPJ1534 An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks
CLOUD COMPUTING
35 CPJ1535 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
CLOUD COMPUTING
36 CPJ1536 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
CLOUD COMPUTING
37 CPJ1537 A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems
CLOUD COMPUTING
38 CPJ1538 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
CLOUD COMPUTING
39 CPJ1539 A Hybrid Cloud Approach for Secure Authorized Deduplication
CLOUD COMPUTING
40 CPJ1540 Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
SERVICE COMPUTING
41 CPJ1541 Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
SERVICE COMPUTING
42 CPJ1542 Prediction of Atomic Web Services Reliability for QoS-Aware Recommendation
SERVICE COMPUTING
43 CPJ1543 A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to-Business E-Services
FUZZY SYSTEMS
44 CPJ1544 Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks
MOBILE COMPUTING
45 CPJ1545 Friendbook: A Semantic-Based Friend Recommendation System for Social Networks
MOBILE COMPUTING
46 CPJ1546 Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks
MOBILE COMPUTING
47 CPJ1547 User-Defined Privacy Grid System for Continuous Location-Based Services
MOBILE COMPUTING
48 CPJ1548 An Attribute-Assisted Reranking Model for Web Image Search
IMAGE PROCESSING
49 CPJ1549 EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
IMAGE PROCESSING
50 CPJ1550 Learning to Rank Image Tags With Limited Training Examples
IMAGE PROCESSING
51 CPJ1551 A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks
SECURE COMPUTING
52 CPJ1552 Continuous and Transparent User Identity Verification for Secure Internet Services
SECURE COMPUTING
53 CPJ1553 A Computational Dynamic Trust Model for User Authorization
SECURE COMPUTING
54 CPJ1554 Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
SECURE COMPUTING
55 CPJ1555 DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks
SECURE COMPUTING
56 CPJ1556 Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints
SECURE COMPUTING
57 CPJ1557 Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks
SECURE COMPUTING
58 CPJ1558 Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers
SECURE COMPUTING
59 CPJ1559 Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks
PARALLEL
& DISTRIBUTED SYSTEMS
60 CPJ1560 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
PARALLEL
& DISTRIBUTED SYSTEMS
61 CPJ1561 Secure Distributed Deduplication Systems with Improved Reliability
PARALLEL
& DISTRIBUTED SYSTEMS
62 CPJ1562 A Framework for Secure Computations with Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations
INFORMATION FORENSICS
& SECURITY
63 CPJ1563 Effective Key Management in Dynamic Wireless Sensor Networks
INFORMATION FORENSICS
& SECURITY
64 CPJ1564 Key Updating for Leakage Resiliency with Application to AES Modes of Operation
INFORMATION FORENSICS
& SECURITY
65 CPJ1565 Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backscatter
INFORMATION FORENSICS
& SECURITY
66 CPJ1566 Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks
INFORMATION FORENSICS
& SECURITY