1 |
HSC17063 |
Safety Alarm by Using GPS in Android |
APPLICATION |
ANDROID |
2 |
HSC17113 |
Mosaicing Touchless Fingerprint Images |
APPLICATION |
C#.NET |
3 |
HSC17113 |
Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems |
Dependable and Secure Computing |
C#.NET |
4 |
HSC17118 |
Predictive Network Anomaly Detection and Visualisation |
APPLICATION |
C#.NET |
5 |
HSC17127 |
Bandwidth Efficient Video Multicasting In Multi radio Multicellular Wireless Networks |
APPLICATION |
C#.NET |
6 |
HSC17139 |
Energy Aware Data Aggregation in Wireless Sensor Networks |
APPLICATION |
C#.NET |
7 |
HSC17158 |
Autonomous Mobile Mesh Networks |
APPLICATION |
C#.NET |
8 |
HSC17212 |
Energy Theft Detection in Multi-Tenant Data Centers with Digital Protective Relay Deployment |
SUSTAINABLE COMPUTING |
JAVA |
9 |
HSC17225 |
Sales and Purchase Management System |
APPLICATION |
ASP.NET |
10 |
HSC17253 |
Online Quiz Master |
APPLICATION |
ASP.NET |
11 |
HSC17295 |
NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media |
INFORMATION FORENSICS AND SECURITY |
J2EE |
12 |
HSC17321 |
Asset Tracking System |
APPLICATION |
VB.NET |
13 |
HSC17322 |
Send SMS To Cell Phone Through SMTP Mail |
APPLICATION |
VB.NET |
14 |
HSC17472 |
Scalable Spatio Temporal Query Processing for Location-aware Services |
APPLICATION |
JAVA |
15 |
HSC17503 |
Student Size Square |
APPLICATION |
JAVA |
16 |
HSC17514 |
Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing |
CLOUD COMPUTING |
ASP.NET |
17 |
HSC17515 |
Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage |
CLOUD COMPUTING |
ASP.NET |
18 |
HSC17516 |
Enabling Semantic Search based on Conceptual Graphs over Encrypted Outsourced Data |
CLOUD COMPUTING |
ASP.NET |
19 |
HSC17517 |
Keyword Search with Access Control over Encrypted Cloud Data |
CLOUD COMPUTING |
ASP.NET |
20 |
HSC17518 |
SeDaSC: Secure Data Sharing in Clouds |
CLOUD COMPUTING |
ASP.NET |
21 |
HSC17519 |
MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection |
CLOUD COMPUTING |
ASP.NET |
22 |
HSC17520 |
User Differentiated Verifiable File Search on the Cloud |
CLOUD COMPUTING |
ASP.NET |
23 |
HSC17521 |
VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data |
CLOUD COMPUTING |
ASP.NET |
24 |
HSC17522 |
An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data |
CLOUD COMPUTING |
ASP.NET |
25 |
HSC17523 |
User Vitality Ranking and Prediction in Social Networking Service: a Dynamic Network Perspective |
DATA MINING |
ASP.NET |
26 |
HSC17524 |
SAP: Improving Continuous Top-K Queries over Streaming Data |
DATA MINING |
ASP.NET |
27 |
HSC17525 |
Energy-efficient Query Processing in Web Search Engines |
DATA MINING |
ASP.NET |
28 |
HSC17526 |
Online Multi-task Learning Framework for Ensemble Forecasting |
DATA MINING |
ASP.NET |
29 |
HSC17527 |
Privacy-Preserving Selective Aggregation of Online User Behavior Data |
DATA MINING |
ASP.NET |
30 |
HSC17528 |
Continuous Top-k Monitoring on Document Streams |
DATA MINING |
ASP.NET |
31 |
HSC17529 |
Dynamic Facet Ordering for Faceted Product Search Engines |
DATA MINING |
ASP.NET |
32 |
HSC17530 |
Generating Query Facets using Knowledge Bases |
DATA MINING |
ASP.NET |
33 |
HSC17531 |
Personal Web Revisitation by Context and Content Keywords with Relevance Feedback |
DATA MINING |
ASP.NET |
34 |
HSC17532 |
Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data |
DATA MINING |
ASP.NET |
35 |
HSC17533 |
Understand Short Texts by Harvesting and Analyzing Semantic Knowledge |
DATA MINING |
ASP.NET |
36 |
HSC17534 |
Bring Order into the Samples: A Novel Scalable Method for Influence Maximization |
DATA MINING |
ASP.NET |
37 |
HSC17535 |
Filtering out Infrequent Behavior from Business Process Event Logs |
DATA MINING |
ASP.NET |
38 |
HSC17536 |
Detecting Stress Based on Social Interactions in Social Networks |
DATA MINING |
ASP.NET |
39 |
HSC17536 |
Efficient Keyword-aware Representative Travel Route Recommendation |
DATA MINING |
ASP.NET |
40 |
HSC17537 |
GALLOP: GlobAL feature fused Location Prediction for Different Check-in Scenarios |
DATA MINING |
ASP.NET |
41 |
HSC17538 |
Influence Maximization in Trajectory Databases |
DATA MINING |
ASP.NET |
42 |
HSC17539 |
Query Reorganisation Algorithms for Efficient Boolean Information Filtering |
DATA MINING |
ASP.NET |
43 |
HSC17540 |
Search Rank Fraud and Malware Detection in Google Play |
DATA MINING |
ASP.NET |
44 |
HSC17541 |
Efficient Processing of Skyline Queries Using MapReduce |
DATA MINING |
ASP.NET |
45 |
HSC17542 |
Achieving Efficient and Privacy-Preserving Cross-Domain Big Data Deduplication in Cloud |
BIG DATA |
ASP.NET |
46 |
HSC17543 |
Big Data Privacy in Biomedical Research |
BIG DATA |
ASP.NET |
47 |
HSC17544 |
Private and Efficient Query Processing on Outsourced Genomic Databases |
BIG DATA |
ASP.NET |
48 |
HSC17545 |
Transactional Behavior Verification in Business Process as a Service Configuration |
SERVICES COMPUTING |
C#.NET |
49 |
HSC17546 |
Leveraging Crowdsourcing for Efficient Malicious Users Detection in Large-Scale Social Networks |
INTERNET OF THINGS |
ASP.NET |
50 |
HSC17547 |
Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs |
MOBILE COMPUTING |
C#.NET |
51 |
HSC17548 |
Research on Trust Sensing based Secure Routing Mechanism for Wireless Sensor Network |
NETWORKING |
C#.NET |
52 |
HSC17549 |
Lightweight Three-factor Authentication and Key Agreement Protocol for Internet-integrated Wireless Sensor Networks |
NETWORKING |
C#.NET |
53 |
HSC17550 |
Energy Efficient Multipath Routing Protocol for Mobile ad-hoc Network Using the Fitness Function |
NETWORKING |
VB.NET |
54 |
HSC17551 |
Socially-Driven Learning-Based Prefetching in Mobile Online Social Networks |
NETWORKING |
VB.NET |
55 |
HSC17552 |
E2HRC: An Energy-Efficient Heterogeneous Ring Clustering Routing Protocol for Wireless Sensor Networks |
NETWORKING |
C#.NET |
56 |
HSC17553 |
Energy Efficient Clustering Algorithm for Multi-Hop Wireless Sensor Network Using Type-2 Fuzzy Logic |
NETWORKING |
C#.NET |
57 |
HSC17554 |
NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media |
Dependable and Secure Computing |
ASP.NET |
58 |
HSC17555 |
Cooperative Query Answer Authentication Scheme over Anonymous Sensing Data |
Dependable and Secure Computing |
ASP.NET |
59 |
HSC17556 |
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data |
Dependable and Secure Computing |
ASP.NET |
60 |
HSC17557 |
Cloud Data Auditing Techniques with a Focus on Privacy and Security |
Dependable and Secure Computing |
ASP.NET |
61 |
HSC17558 |
My Privacy My Decision: Control of Photo Sharing on Online Social Networks |
Dependable and Secure Computing |
C#.NET |
62 |
HSC17559 |
Privacy-Preserving Aggregate Queries for Optimal Location Selection |
Dependable and Secure Computing |
ASP.NET |
63 |
HSC17560 |
FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data |
Dependable and Secure Computing |
ASP.NET |
64 |
HSC17561 |
MMB cloud -Tree: Authenticated Index for Verifiable Cloud Service Selection |
Dependable and Secure Computing |
ASP.NET |
65 |
HSC17562 |
Efficient and Privacy-Preserving Min and k th Min Computations in Mobile Sensing Systems |
Dependable and Secure Computing |
ASP.NET |
66 |
HSC17563 |
Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems |
Dependable and Secure Computing |
ASP.NET |
67 |
HSC17564 |
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification |
INFORMATION FORENSICS AND SECURITY |
ASP.NET |
68 |
HSC17565 |
Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending |
INFORMATION FORENSICS AND SECURITY |
ASP.NET |
69 |
HSC17566 |
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification |
CLOUD COMPUTING |
J2EE |
70 |
HSC17567 |
A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing |
CLOUD COMPUTING |
J2EE |
71 |
HSC17568 |
Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing |
CLOUD COMPUTING |
J2EE |
72 |
HSC17569 |
A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users |
CLOUD COMPUTING |
J2EE |
73 |
HSC17570 |
A robust reputation management mechanism in the federated cloud |
CLOUD COMPUTING |
J2EE |
74 |
HSC17571 |
Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data |
CLOUD COMPUTING |
J2EE |
75 |
HSC17572 |
Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems |
CLOUD COMPUTING |
J2EE |
76 |
HSC17573 |
Fast Phrase Search for Encrypted Cloud Storage |
CLOUD COMPUTING |
J2EE |
77 |
HSC17574 |
Identity-Based Encryption with Cloud Revocation Authority and Its Applications |
CLOUD COMPUTING |
J2EE |
78 |
HSC17575 |
Identity-Based Private Matching over Outsourced Encrypted Datasets |
CLOUD COMPUTING |
J2EE |
79 |
HSC17576 |
A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing |
CLOUD COMPUTING |
J2EE |
80 |
HSC17577 |
Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data |
CLOUD COMPUTING |
J2EE |
81 |
HSC17578 |
RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage |
CLOUD COMPUTING |
J2EE |
82 |
HSC17579 |
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption |
CLOUD COMPUTING |
J2EE |
83 |
HSC17580 |
Securing Cloud Data under Key Exposure |
CLOUD COMPUTING |
J2EE |
84 |
HSC17581 |
Strong Key-Exposure Resilient Auditing for Secure Cloud Storage |
CLOUD COMPUTING |
J2EE |
85 |
HSC17582 |
TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud |
CLOUD COMPUTING |
J2EE |
86 |
HSC17583 |
TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud |
CLOUD COMPUTING |
J2EE |
87 |
HSC17584 |
Towards Real-Time, Country-Level Location Classification of Worldwide Tweets |
DATA MINING |
J2EE |
88 |
HSC17585 |
User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective |
DATA MINING |
J2EE |
89 |
HSC17586 |
An Iterative Classification Scheme for Sanitizing Large-Scale Datasets |
DATA MINING |
J2EE |
90 |
HSC17587 |
Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach |
DATA MINING |
J2EE |
91 |
HSC17588 |
Collaborative Filtering-Based Recommendation of Online Social Voting |
DATA MINING |
J2EE |
92 |
HSC17589 |
Computing Semantic Similarity of Concepts in Knowledge Graphs |
DATA MINING |
J2EE |
93 |
HSC17590 |
Dynamic Facet Ordering for Faceted Product Search Engines |
DATA MINING |
J2EE |
94 |
HSC17591 |
Energy-efficient Query Processing in Web Search Engines |
DATA MINING |
J2EE |
95 |
HSC17592 |
Generating Query Facets using Knowledge Bases |
DATA MINING |
J2EE |
96 |
HSC17593 |
Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach |
DATA MINING |
J2EE |
97 |
HSC17594 |
l-Injection: Toward Effective Collaborative Filtering Using Uninteresting Items |
DATA MINING |
J2EE |
98 |
HSC17595 |
Mining Competitors from Large Unstructured Datasets |
DATA MINING |
J2EE |
99 |
HSC17596 |
Modeling Information Diffusion over Social Networks for Temporal Dynamic Prediction |
DATA MINING |
J2EE |
100 |
HSC17597 |
Personal Web Revisitation by Context and Content Keywords with Relevance Feedback |
DATA MINING |
J2EE |
101 |
HSC17598 |
QDA: A Query-Driven Approach to Entity Resolution |
DATA MINING |
J2EE |
102 |
HSC17599 |
RAPARE: A Generic Strategy for Cold-Start Rating Prediction Problem |
DATA MINING |
J2EE |
103 |
HSC17600 |
SocialQ&A: An Online Social Network Based Question and Answer System |
BIG DATA |
J2EE |
104 |
HSC17601 |
When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks |
NETWORKING |
JAVA |
105 |
HSC17602 |
An Overlay Architecture for Throughput Optimal Multipath Routing |
NETWORKING |
JAVA |
106 |
HSC17603 |
Network Capability in Localizing Node Failures via End-to-End Path Measurements |
NETWORKING |
JAVA |
107 |
HSC17604 |
FaceChange: Attaining Neighbor Node Anonymity in Mobile Opportunistic Social Networks With Fine-Grained Control |
NETWORKING |
JAVA |
108 |
HSC17605 |
Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Network |
NETWORKING |
JAVA |
109 |
HSC17606 |
Routing in Accumulative Multi-Hop Networks |
NETWORKING |
JAVA |
110 |
HSC17607 |
SWEET: Serving the Web by Exploiting Email Tunnels |
NETWORKING |
JAVA |
111 |
HSC17608 |
My Privacy My Decision: Control of Photo Sharing on Online Social Networks |
Dependable and Secure Computing |
J2EE |
112 |
HSC17609 |
Cloud Data Auditing Techniques with a Focus on Privacy and Security |
Dependable and Secure Computing |
J2EE |
113 |
HSC17610 |
Efficient and Expressive Keyword Search Over Encrypted Data in the Cloud |
Dependable and Secure Computing |
J2EE |
114 |
HSC17611 |
Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage |
Dependable and Secure Computing |
J2EE |
115 |
HSC17612 |
A Credibility Analysis System for Assessing Information on Twitter |
Dependable and Secure Computing |
J2EE |
116 |
HSC17613 |
Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems |
Dependable and Secure Computing |
J2EE |
117 |
HSC17614 |
ProGuard: Detecting Malicious Accounts in Social-Network-Based Online Promotions |
Dependable and Secure Computing |
J2EE |
118 |
HSC17615 |
Towards Detecting Compromised Accounts on Social Networks |
Dependable and Secure Computing |
J2EE |
119 |
HSC17616 |
SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks |
MOBILE COMPUTING |
JAVA |
120 |
HSC17617 |
Quantifying Interdependent Privacy Risks with Location Data |
MOBILE COMPUTING |
JAVA |
121 |
HSC17618 |
Detecting Mobile Malicious Webpages in Real Time |
MOBILE COMPUTING |
JAVA |
122 |
HSC17619 |
A Proxy-based Collaboration System to Minimize Content Download Time and Energy Consumption |
MOBILE COMPUTING |
JAVA |
123 |
HSC17621 |
Privacy-Aware Scheduling SaaS in High Performance Computing Environments |
PARALLEL & DISTRIBUTED SYSTEM |
JAVA |
124 |
HSC17622 |
An Efficient and Fine-grained Big Data Access Control Scheme with Privacy-preserving Policy |
INTERNET OF THINGS |
J2EE |
125 |
HSC17623 |
Efficient and Privacy-preserving Polygons Spatial Query Framework for Location-based Services |
INTERNET OF THINGS |
J2EE |
126 |
HSC17624 |
SPFM: Scalable and Privacy-preserving Friend Matching in Mobile Cloud |
INTERNET OF THINGS |
J2EE |
127 |
HSC17625 |
Follow But No Track: Privacy Preserved Profile Publishing in Cyber-Physical Social Systems |
INTERNET OF THINGS |
JAVA |
128 |
HSC17626 |
A Privacy-preserving Vehicular Crowdsensing based Road surface Condition Monitoring System Using Fog Computing |
INTERNET OF THINGS |
J2EE |
129 |
HSC17627 |
Achieving Efficient and Secure Data Acquisition for Cloud-supported Internet of Things in Smart Grid |
INTERNET OF THINGS |
J2EE |
130 |
HSC17628 |
LoDPD: A Location Difference-based Proximity Detection Protocol for Fog Computing |
INTERNET OF THINGS |
J2EE |
131 |
HSC17629 |
Resource Allocation in Vehicular Cloud Computing Systems with Heterogeneous Vehicles and Roadside Units |
INTERNET OF THINGS |
J2EE |
132 |
HSC17630 |
Security-Aware Waveforms for Enhancing Wireless Communications Privacy in Cyber-Physical Systems via Multipath Receptions |
INTERNET OF THINGS |
J2EE |
133 |
HSC17631 |
A Distributed Publisher-Driven Secure Data Sharing Scheme for Information-Centric IoT |
INTERNET OF THINGS |
J2EE |
134 |
HSC17632 |
Leveraging Crowdsourcing for Efficient Malicious Users Detection in Large-Scale Social Networks |
INTERNET OF THINGS |
J2EE |
135 |
HSC17633 |
Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds |
INFORMATION FORENSICS AND SECURITY |
JAVA |
136 |
HSC17634 |
Deep Representation based feature extraction and recovering for Finger-vein verification |
IMAGE PROCESSING |
MATLAB |
137 |
HSC17635 |
Study of Imposter Attacks on Novel Fingerprint Dynamics Based Verification System |
IMAGE PROCESSING |
MATLAB |
138 |
HSC17636 |
Context-Aware Local Binary Feature Learning for Face Recognition |
IMAGE PROCESSING |
MATLAB |
139 |
HSC17637 |
Data-Dependent Label Distribution Learning for Age Estimation |
IMAGE PROCESSING |
MATLAB |
140 |
HSC17638 |
Face Anti-Spoofing using Speeded-Up Robust Features and Fisher Vector Encoding |
IMAGE PROCESSING |
MATLAB |
141 |
HSC17639 |
Facial Age Estimation with Age Difference |
IMAGE PROCESSING |
MATLAB |
142 |
HSC17640 |
Largest Matching Areas for Illumination and Occlusion Robust Face Recognition |
IMAGE PROCESSING |
MATLAB |
143 |
HSC17641 |
Learning Correspondence Structures for Person Re-identification |
IMAGE PROCESSING |
MATLAB |
144 |
HSC17642 |
Simultaneous Feature and Dictionary Learning for Image Set Based Face Recognition |
IMAGE PROCESSING |
MATLAB |
145 |
HSC17643 |
A Facial-Expression Monitoring System for Improved Healthcare in Smart Cities |
IMAGE PROCESSING |
MATLAB |
146 |
HSC17644 |
An emotion recognition system for mobile applications |
IMAGE PROCESSING |
MATLAB |
147 |
HSC17645 |
The Indian Spontaneous Expression Database for Emotion Recognition |
IMAGE PROCESSING |
MATLAB |
148 |
HSC17646 |
Unconstrained Facial Beauty Prediction Based on Multi-scale K-Means |
IMAGE PROCESSING |
MATLAB |
149 |
HSC17647 |
Semi-Supervised Image-to-Video Adaptation for Video Action Recognition |
IMAGE PROCESSING |
MATLAB |
150 |
HSC17648 |
Soft Biometrics: Globally Coherent Solutions for Hair Segmentation and Style Recognition based on Hierarchical MRFs |
IMAGE PROCESSING |
MATLAB |
151 |
HSC17649 |
Automated Diagnosis of Glaucoma Using Empirical Wavelet Transform and Correntropy Features Extracted from Fundus Images |
BIOMEDICAL PROCESSING |
MATLAB |
152 |
HSC17651 |
Retinal Disease Screening through Local Binary Patterns |
BIOMEDICAL PROCESSING |
MATLAB |
153 |
HSC17652 |
Defect Detection in SEM Images of Nanofibrous Materials |
IMAGE PROCESSING |
MATLAB |
154 |
HSC17653 |
Fast Image Dehazing Method Based on Linear Transformation |
IMAGE PROCESSING |
MATLAB |
155 |
HSC17654 |
Fog Density Estimation and Image Defogging Based on Surrogate Modeling for Optical Depth |
IMAGE PROCESSING |
MATLAB |
156 |
HSC17655 |
Single Image Rain Streak Decomposition Using Layer Priors |
IMAGE PROCESSING |
MATLAB |
157 |
HSC17656 |
A Hierarchical Approach for Rain or Snow Removing in A Single Color Image |
IMAGE PROCESSING |
MATLAB |
158 |
HSC17657 |
Contrast Enhancement Based on Intrinsic Image Decomposition |
IMAGE PROCESSING |
MATLAB |
159 |
HSC17658 |
Cartoon and Texture Decomposition based Color Transfer for Fabric Images |
IMAGE PROCESSING |
MATLAB |
160 |
HSC17659 |
Optimized Multioperator Image Retargeting Based on Perceptual Similarity Measure |
IMAGE PROCESSING |
MATLAB |
161 |
HSC17660 |
Perceptual Image Fusion using Wavelets |
IMAGE PROCESSING |
MATLAB |
162 |
HSC17661 |
A Cognitively Motivated Method for Classification of Occluded Traffic Signs |
IMAGE PROCESSING |
MATLAB |
163 |
HSC17662 |
Automatic Detection of Red Light Running Using Vehicular Cameras |
IMAGE PROCESSING |
MATLAB |
164 |
HSC17663 |
A Robust and Efficient Approach to License Plate Detection |
IMAGE PROCESSING |
MATLAB |
165 |
HSC17664 |
Accurate Detection and Recognition of Dirty Vehicle Plate Numbers for High-Speed Applications |
IMAGE PROCESSING |
MATLAB |
166 |
HSC17665 |
Segmentation- and Annotation-Free License Plate Recognition With Deep Localization and Failure Identification |
IMAGE PROCESSING |
MATLAB |
167 |
HSC17666 |
A Novel Data Hiding Algorithm for High Dynamic Range Images |
IMAGE PROCESSING |
MATLAB |
168 |
HSC17667 |
Steganography with Multiple JPEG Images of the Same Scene |
IMAGE PROCESSING |
MATLAB |
169 |
HSC17668 |
Chaos-based fast colour image encryption scheme with true random number keys from environmental noise |
IMAGE PROCESSING |
MATLAB |
170 |
HSC17669 |
Features Classification Forest: A Novel Development that is Adaptable to Robust Blind Watermarking Techniques |
IMAGE PROCESSING |
MATLAB |
171 |
HSC17670 |
Fractional Krawtchouk transform with an application to image watermarking |
IMAGE PROCESSING |
MATLAB |
172 |
HSC17671 |
An Image-Based Approach to Detection of Fake Coins |
IMAGE PROCESSING |
MATLAB |
173 |
HSC17672 |
Splicing Image Forgery Detection Using Textural Features Based on the Gray Level Co-occurrence Matrices |
IMAGE PROCESSING |
MATLAB |
174 |
HSC17673 |
Affine Non-local Means Image Denoising |
IMAGE PROCESSING |
MATLAB |
175 |
HSC17674 |
Beyond a Gaussian Denoiser: Residual Learning of Deep CNN for Image Denoising |
IMAGE PROCESSING |
MATLAB |
176 |
HSC17675 |
Structure-based Low-Rank Model with Graph Nuclear Norm Regularization for Noise Removal |
IMAGE PROCESSING |
MATLAB |
177 |
HSC17676 |
Color-Based Segmentation of Sky/Cloud Images From Ground-Based Cameras |
IMAGE PROCESSING |
MATLAB |
178 |
HSC17677 |
Weak Classifier for Density Estimation in Eye Localization and Tracking |
IMAGE PROCESSING |
MATLAB |
179 |
HSC17678 |
Neighborhood Matching For Image Retrieval |
IMAGE PROCESSING |
MATLAB |
180 |
HSC17679 |
Words Matter: Scene Text for Image Classification and Retrieval |
IMAGE PROCESSING |
MATLAB |
181 |
HSC17680 |
Discriminative Multi-view Interactive Image Re-ranking |
IMAGE PROCESSING |
MATLAB |
182 |
HSC17681 |
Congestion Control Scheme Performance Analysis Based on Nonlinear RED |
WIRELESS COMMUNICATION |
NS2 |
183 |
HSC17682 |
Distributed Learning for Energy-Efficient Resource Management in Self-Organizing Heterogeneous Networks |
WIRELESS COMMUNICATION |
NS2 |
184 |
HSC17683 |
End-to-end Throughput Maximization for Underlay Multi-hop Cognitive Radio Networks with RF Energy Harvesting |
WIRELESS COMMUNICATION |
NS2 |
185 |
HSC17684 |
Spectrum-Availability based Routing for Cognitive Sensor Networks |
WIRELESS COMMUNICATION |
NS2 |
186 |
HSC17685 |
ROSE: Robustness Strategy for Scale-Free Wireless Sensor Networks |
NETWORKING |
NS2 |
187 |
HSC17686 |
Towards Effective Trust-based Packet Filtering in Collaborative Network Environments |
NETWORKING |
NS2 |
188 |
HSC17687 |
A Distributed Delay-Efficient Data Aggregation Scheduling for Duty-cycled WSNs |
WSN (ROUTING) |
NS2 |
189 |
HSC17688 |
A Joint Routing and MAC Protocol for Transmission Delay Reduction in Many-to-One Communication Paradigm for Wireless Sensor Networks |
WSN (ROUTING) |
NS2 |
190 |
HSC17689 |
A Self-Adaptive Sleep/Wake-Up Scheduling Approach for Wireless Sensor Networks |
WSN (ROUTING) |
NS2 |
191 |
HSC17690 |
E2HRC: An Energy-Efficient Heterogeneous Ring Clustering Routing Protocol for Wireless Sensor Networks |
WSN (ROUTING) |
NS2 |
192 |
HSC17691 |
Energy Efficient Clustering Algorithm for Multi-Hop Wireless Sensor Network Using Type-2 Fuzzy Logic |
WSN (ROUTING) |
NS2 |
193 |
HSC17692 |
Load Balanced Coverage with Graded Node Deployment in Wireless Sensor Networks |
WSN (ROUTING) |
NS2 |
194 |
HSC17693 |
Optimization of Watchdog Selection in Wireless Sensor Networks |
WSN (ROUTING) |
NS2 |
195 |
HSC17694 |
QoS-Aware and Heterogeneously Clustered Routing Protocol for Wireless Sensor Networks |
WSN (ROUTING) |
NS2 |
196 |
HSC17695 |
Routing Protocol for Wireless sensor networks Using Swarm intelligence-ACO with ECPSOA |
WSN (ROUTING) |
NS2 |
197 |
HSC17696 |
Optimal Privacy-Preserving Probabilistic Routing for Wireless Networks |
WSN (ROUTING) |
NS2 |
198 |
HSC17697 |
Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks |
MOBILE COMPUTING |
NS2 |
199 |
HSC17698 |
SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks |
MOBILE COMPUTING |
NS2 |
200 |
HSC17699 |
Load-Balanced Opportunistic Routing for Duty-Cycled Wireless Sensor Networks |
MOBILE COMPUTING |
NS2 |
201 |
HSC17700 |
Low-Cost Collaborative Mobile Charging for Large-Scale Wireless Sensor Networks |
MOBILE COMPUTING |
NS2 |
202 |
HSC17701 |
Near Optimal Data Gathering in Rechargeable Sensor Networks with a Mobile Sink |
MOBILE COMPUTING |
NS2 |
203 |
HSC17702 |
SEND: A Situation-Aware Emergency Navigation Algorithm with Sensor Networks |
MOBILE COMPUTING |
NS2 |
204 |
HSC17703 |
Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs |
MOBILE COMPUTING |
NS2 |
205 |
HSC17704 |
Robotic Message Ferrying for Wireless Networks using Coarse-Grained Backpressure Control |
MOBILE COMPUTING |
NS2 |
206 |
HSC17705 |
Virtual Multipath Attack and Defense for Location Distinction in Wireless Networks |
MOBILE COMPUTING |
NS2 |
207 |
HSC17706 |
GDVAN: A New Greedy Behavior Attack Detection Algorithm For VANETs |
MOBILE COMPUTING |
NS2 |
208 |
HSC17707 |
A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks |
MANET |
NS2 |
209 |
HSC17708 |
Energy Efficient Multipath Routing Protocol for Mobile ad-hoc Network Using the Fitness Function |
MANET |
NS2 |
210 |
HSC17709 |
Delay Analytical Models for Opportunistic Routing in Wireless Ad Hoc Networks |
MANET |
NS2 |
211 |
HSC17710 |
Adaptive Quality of Service based Routing for Vehicular Ad hoc Networks with Ant Colony Optimization |
VANET |
NS2 |
212 |
HSC17711 |
CBS: Community-based Bus System as Routing Backbone for Vehicular Ad Hoc Networks |
VANET |
NS2 |
213 |
HSC17712 |
DIVERT: A Distributed Vehicular Traffic Re-routing System for Congestion Avoidance |
VANET |
NS2 |
214 |
HSC17713 |
EcoTrec—A Novel VANET-Based Approach to Reducing Vehicle Emissions |
VANET |
NS2 |
215 |
HSC17714 |
Enhancing Quality of Service Conditions Using a Cross-Layer Paradigm for Ad-hoc Vehicular Communication |
VANET |
NS2 |
216 |
HSC17715 |
MoZo: A Moving Zone Based Routing Protocol Using Pure V2V Communication in VANETs |
VANET |
NS2 |
217 |
HSC17716 |
Trustworthiness Evaluation-based Routing Protocol for Incompletely Predictable Vehicular Ad hoc Networks |
VANET |
NS2 |
218 |
HSC17717 |
Distributed Aggregate Privacy-Preserving Authentication in VANETs |
VANET |
NS2 |
219 |
HSC17718 |
EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks |
VANET |
NS2 |
220 |
HSC17719 |
Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm |
VANET |
NS2 |
221 |
HSC17720 |
Enhancing Security and Privacy for Identity-based Batch Verification Scheme in VANET |
VANET |
NS2 |
222 |
HSC17721 |
REPLACE: A Reliable Trust-based Platoon Service Recommendation Scheme in VANET |
VANET |
NS2 |
223 |
HSC17722 |
An Efficient Cloud Market Mechanism for Computing Jobs With Soft Deadlines |
NETWORKING |
NS2 |
224 |
HSC17723 |
On the security of data access control for multi authority cloud storage systems |
CLOUD COMPUTING |
JAVA |
225 |
HSC17724 |
PPRank:Economically Selecting initial users for influence maximization in social networks |
DATA MINING |
J2EE |
226 |
HSC17725 |
Semantically enhanced medical information retrival system:A tensor factorization based approach |
DATA MINING |
J2EE |
227 |
HSC17726 |
A situational analytic method for user behavior pattern in multimedia social networks |
DATA MINING |
J2EE |
228 |
HSC17727 |
User-Centric similarity search |
DATA MINING |
J2EE |
229 |
HSC17728 |
iASK:A distributed Q&A system incorporating social community and global collective intelligence |
DATA MINING |
J2EE |
230 |
HSC17729 |
Improving automated bug triaging with specialized topic model |
DATA MINING |
J2EE |
231 |
HSC17730 |
Trajectory community discovery and recommendation by multi-source diffusion modeling |
DATA MINING |
J2EE |
232 |
HSC17731 |
Privacy-preserving learning analytics challenges and techniques |
DATA MINING |
J2EE |
233 |
HSC17732 |
privacy preserving selective aggregation of online user behavior data |
DATA MINING |
J2EE |
234 |
HSC17733 |
public intrest analysis based on implicit feedback of iptv users |
DATA MINING |
J2EE |
235 |
HSC17734 |
Tri clustered tensor completion for social aware image tag refinement |
DATA MINING |
J2EE |
236 |
HSC17735 |
TwoStage Friend Recommendation based on network alignment and series expansion of probabilistic Topic model |
DATA MINING |
J2EE |
237 |
HSC17736 |
A Credibility analysis system for assessing information on twitter |
SERVICES COMPUTING |
JAVA |
238 |
HSC17737 |
Securing aggregate queries for DNA database |
SERVICES COMPUTING |
JAVA |
239 |
HSC17738 |
TwoStage Friend Recommendation based on network alignment and series expansion of probabilistic Topic model |
Multimedia |
JAVA |
240 |
HSC17739 |
Personalized social image recommendation method based on user image tag model |
Multimedia |
JAVA |
241 |
HSC17740 |
A System for profiling and monitoring database access pattern by application programs for anomaly detection |
Software Engineering |
JAVA |
242 |
HSC17741 |
Improving automated bug triaging with specialized topic model |
Software Engineering |
JAVA |
243 |
HSC17742 |
A situational analytic method for user behavior pattern in multimedia social networks |
BIG DATA |
JAVA |
244 |
HSC17A001 |
FogRoute: DTN-based Data Dissemination Model in Fog Computing |
Dependable and Secure Computing |
ANDROID |
245 |
HSC17A002 |
Privacy-Preserving Location-Proximity for Mobile Apps |
Dependable and Secure Computing |
ANDROID |
246 |
HSC17A003 |
Cooperative Query Answer Authentication Scheme Over Anonymous Sensing Data |
Dependable and Secure Computing |
ANDROID |
247 |
HSC17A004 |
A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing |
Dependable and Secure Computing |
ANDROID |
248 |
HSC17A005 |
Searching Trajectories by Regions of Interest |
Dependable and Secure Computing |
ANDROID |
249 |
HSC17A006 |
MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention |
Dependable and Secure Computing |
ANDROID |
250 |
HSC17A007 |
Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems |
Dependable and Secure Computing |
ANDROID |
251 |
HSC17A008 |
ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes |
MOBILE COMPUTING |
ANDROID |
252 |
HSC17A009 |
Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Loc |
MOBILE COMPUTING |
ANDROID |
253 |
HSC17A010 |
Drive Now, Text Later: Nonintrusive Texting-while-Driving Detection using Smartphones |
MOBILE COMPUTING |
ANDROID |
254 |
HSC17A011 |
DrivingStyles: A Mobile Platform for Driving Styles and Fuel Consumption Characterization |
MOBILE COMPUTING |
ANDROID |
255 |
HSC17A012 |
Fine-grained Abnormal Driving Behaviors Detection and Identification with Smartphones |
MOBILE COMPUTING |
ANDROID |
256 |
HSC17A013 |
ShuffleDog: Characterizing and Adapting User-Perceived Latency of Android Apps |
MOBILE COMPUTING |
ANDROID |
257 |
HSC17A014 |
TeamPhone: Networking Smartphones for Disaster Recovery |
MOBILE COMPUTING |
ANDROID |
258 |
HSC17A015 |
Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions |
MOBILE COMPUTING |
ANDROID |
259 |
HSC17A016 |
ZapDroid: Managing Infrequently Used Applications on Smartphones |
MOBILE COMPUTING |
ANDROID |
260 |
HSC17A017 |
An Android-based Mechanism for Energy Efficient Localization depending on Indoor / Outdoor Context |
INTERNET OF THINGS |
ANDROID |
261 |
HSC17A018 |
Detecting Driver’s Smartphone Usage via Non-intrusively Sensing Driving Dynamics |
INTERNET OF THINGS |
ANDROID |
262 |
HSC17A019 |
DELTA++: Reducing the Size of Android Application Updates |
INTERNET OF THINGS |
ANDROID |
263 |
HSC17A020 |
A Classroom Scheduling Service for Smart Classes |
INTERNET OF THINGS |
ANDROID |
264 |
HSC17A021 |
Iterative Classifier Fusion System for the Detection of Android Malware |
BIG DATA |
ANDROID |
265 |
HSC17A022 |
Identifying User-Input Privacy in Mobile Applications at a Large Scale |
INFORMATION FORENSICS AND SECURITY |
ANDROID |
266 |
HSC17A023 |
Monet: A User-oriented Behavior-based Malware Variants Detection System for Android |
INFORMATION FORENSICS AND SECURITY |
ANDROID |
267 |
HSC17A024 |
EnergyPatch: Repairing Resource Leaks to Improve Energy-efficiency of Android Apps |
INFORMATION FORENSICS AND SECURITY |
ANDROID |
268 |
HSC17A025 |
RoadSense: Smartphone Application to Estimate Road Conditions using Accelerometer and Gyroscope |
INFORMATION FORENSICS AND SECURITY |
ANDROID |
269 |
HSC17A026 |
Towards Automatically Generating Privacy Policy for Android Apps |
INFORMATION FORENSICS AND SECURITY |
ANDROID |
270 |
HSC17A029 |
Farmer App For Agri Farm Product Trade |
APPLICATION |
ANDROID |
271 |
HSC17A043 |
A Shoulder Surfing Resistant Graphical Authentication System |
APPLICATION |
ANDROID |
272 |
HSC17A044 |
MADAM Effective and Efficient Behavior-based Android Malware Detection and Prevention |
APPLICATION |
ANDROID |
273 |
HSC17A045 |
Find Best College All Over India |
APPLICATION |
ANDROID |
274 |
HSC17A046 |
Smart Indoor Location System |
APPLICATION |
ANDROID |
275 |
HSC17A048 |
Time-and-Energy-Aware Computation Offloading in Handheld Devices to Coprocessors and Clouds |
APPLICATION |
ANDROID |
276 |
HSC17A049 |
Word Search Game For Android Document |
APPLICATION |
ANDROID |
277 |
HSC17A050 |
Android Based Solution for Indian Agriculture |
APPLICATION |
ANDROID |
278 |
HSC17A052 |
KCC Loan Scheme In Cooperative Society Bank |
APPLICATION |
ANDROID |
279 |
HSC17A054 |
BUS TRACKER |
APPLICATION |
ANDROID |
280 |
HSC17A055 |
Doctor-Patient Interaction System Based on Android |
APPLICATION |
ANDROID |
281 |
HSC17A056 |
A Secure Access Control system in Cloud |
APPLICATION |
ANDROID |
282 |
HSC17A058 |
Safe Driving Using Mobile Phones |
APPLICATION |
ANDROID |
283 |
HSC17A059 |
Silent Profile Killer using Android Mobile |
APPLICATION |
ANDROID |
284 |
HSC17A061 |
Authentication Schemes for Session Passwords Using Color and Images |
APPLICATION |
ANDROID |
285 |
HSC17A062 |
A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts |
APPLICATION |
ANDROID |
286 |
HSC17A064 |
T-Drive Enhancing Driving Directions with Taxi Drivers’ Intelligence |
APPLICATION |
ANDROID |
287 |
HSC17A065 |
Online Examination System |
APPLICATION |
ANDROID |
288 |
HSC17A066 |
Student Management System |
APPLICATION |
ANDROID |
289 |
HSC17A067 |
Student Attendance Management System |
APPLICATION |
ANDROID |
290 |
HSC17A069 |
How Long to Wait Predicting Bus Arrival Time With Mobile Phone |
APPLICATION |
ANDROID |
291 |
HSC17A070 |
Catch Me If You Can Evaluating Android Anti-Malware Against Transformation Attacks |
APPLICATION |
ANDROID |
292 |
HSC17A072 |
GreenDroid Automated Diagnosis of Energy Inefficiency for Smartphone Applications |
APPLICATION |
ANDROID |
293 |
HSC17A073 |
Context-Based Access Control Systems for Mobile Devices |
APPLICATION |
ANDROID |
294 |
HSC17A074 |
Text to speech in android |
APPLICATION |
ANDROID |
295 |
HSC17A075 |
Advanced GPS Location finder to identify Hospital Location |
APPLICATION |
ANDROID |
296 |
HSC17A076 |
Free Voice Calling In Wifi Campus Network Using Android |
APPLICATION |
ANDROID |
297 |
HSC17A077 |
Emergency Alert System using Android Text Message Service |
APPLICATION |
ANDROID |
298 |
HSC17A078 |
Color based Pattern Lock System |
APPLICATION |
ANDROID |
299 |
HSC17A079 |
Nearest ATM mobile navigation through global positioning system |
APPLICATION |
ANDROID |
300 |
HSC17A081 |
Wireless Vehicle Document Verification |
APPLICATION |
ANDROID |
301 |
HSC17A083 |
Mining Health Examination Records - A Graph-based Approach |
APPLICATION |
C#.NET |
302 |
HSC17A123 |
Secure Client-Side ST-DM Watermark Embedding |
APPLICATION |
C#.NET |
303 |
HSC17D027 |
Energy-Aware Load Balancing and Application Scaling for the Cloud Ecosystem |
CLOUD COMPUTING |
ASP.NET |
304 |
HSC17D028 |
kBF: Towards Approximate and Bloom Filter based Key-Value Storage for Cloud Computing Systems |
CLOUD COMPUTING |
ASP.NET |
305 |
HSC17D030 |
TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud |
CLOUD COMPUTING |
ASP.NET |
306 |
HSC17D031 |
Resource provisioning for task-batch based workflows with deadlines in public clouds |
CLOUD COMPUTING |
ASP.NET |
307 |
HSC17D032 |
Cost Optimization for Dynamic Replication and Migration of Data in Cloud Data Centers |
CLOUD COMPUTING |
ASP.NET |
308 |
HSC17D033 |
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud |
CLOUD COMPUTING |
ASP.NET |
309 |
HSC17D034 |
A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds |
CLOUD COMPUTING |
ASP.NET |
310 |
HSC17D035 |
Heterogeneous Data Storage Management with Deduplication in Cloud Computing |
CLOUD COMPUTING |
ASP.NET |
311 |
HSC17D036 |
Strong Key-Exposure Resilient Auditing for Secure Cloud Storage |
CLOUD COMPUTING |
ASP.NET |
312 |
HSC17D037 |
Secure Data Sharing and Searching at the Edge of Cloud-Assisted Internet of Things |
CLOUD COMPUTING |
ASP.NET |
313 |
HSC17D038 |
A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing |
CLOUD COMPUTING |
ASP.NET |
314 |
HSC17D039 |
Privacy Protection based Access Control Scheme in Cloud-based Services |
CLOUD COMPUTING |
ASP.NET |
315 |
HSC17D040 |
Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories |
CLOUD COMPUTING |
ASP.NET |
316 |
HSC17D041 |
Securing Cloud Data under Key Exposure |
CLOUD COMPUTING |
ASP.NET |
317 |
HSC17D042 |
User Vitality Ranking and Prediction in Social Networking Service: a Dynamic Network Perspective |
DATA MINING |
ASP.NET |
318 |
HSC17D045 |
Energy-efficient Query Processing in Web Search Engines |
DATA MINING |
ASP.NET |
319 |
HSC17D047 |
SAP: Improving Continuous Top-K Queries over Streaming Data |
DATA MINING |
ASP.NET |
320 |
HSC17D051 |
Online Multi-task Learning Framework for Ensemble Forecasting |
DATA MINING |
ASP.NET |
321 |
HSC17D053 |
Privacy-Preserving Selective Aggregation of Online User Behavior Data |
DATA MINING |
ASP.NET |
322 |
HSC17D055 |
Continuous Top-k Monitoring on Document Streams |
DATA MINING |
ASP.NET |
323 |
HSC17D057 |
Dynamic Facet Ordering for Faceted Product Search Engines |
DATA MINING |
ASP.NET |
324 |
HSC17D060 |
Generating Query Facets using Knowledge Bases |
DATA MINING |
ASP.NET |
325 |
HSC17D062 |
Personal Web Revisitation by Context and Content Keywords with Relevance Feedback |
DATA MINING |
ASP.NET |
326 |
HSC17D064 |
Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data |
DATA MINING |
ASP.NET |
327 |
HSC17D066 |
Understand Short Texts by Harvesting and Analyzing Semantic Knowledge |
DATA MINING |
ASP.NET |
328 |
HSC17D068 |
Bring Order into the Samples: A Novel Scalable Method for Influence Maximization |
DATA MINING |
ASP.NET |
329 |
HSC17D071 |
Filtering out Infrequent Behavior from Business Process Event Logs |
DATA MINING |
ASP.NET |
330 |
HSC17D074 |
Social Q&A: An Online Social Network Based Question and Answer System |
BIG DATA |
ASP.NET |
331 |
HSC17D077 |
Secure k-NN Query on Encrypted Cloud Data with Multiple Keys |
BIG DATA |
ASP.NET |
332 |
HSC17D078 |
NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users |
BIG DATA |
ASP.NET |
333 |
HSC17D080 |
Attribute Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud |
BIG DATA |
ASP.NET |
334 |
HSC17D082 |
Color Based ATM Machine Pin Pinconfiguration |
APPLICATION |
C#.NET |
335 |
HSC17D082 |
Performance Analysis of Mobile Data Offloading in Heterogeneous Networks |
MOBILE COMPUTING |
C#.NET |
336 |
HSC17D084 |
Traffic Decorrelation Techniques For Countering A Global Eavesdropper |
APPLICATION |
C#.NET |
337 |
HSC17D084 |
Socially-Driven Learning-Based Prefetching in Mobile Online Social Networks |
NETWORKING |
VB.NET |
338 |
HSC17D085 |
Smart Indoor Location |
APPLICATION |
C#.NET |
339 |
HSC17D086 |
Securing Node Capture Attacks for Hierarchical Data Aggregation |
APPLICATION |
C#.NET |
340 |
HSC17D087 |
Steganography Using Reversible Texture Synthesis |
APPLICATION |
C#.NET |
341 |
HSC17D087 |
DLTSR: A Deep Learning Framework for Recommendation of Long-tail Web Services |
Dependable and Secure Computing |
VB.NET |
342 |
HSC17D088 |
Image Processing for Bilinear Filters and Resizing |
APPLICATION |
C#.NET |
343 |
HSC17D089 |
Pattern Based Design and Verification of Secure Service Compositions |
SERVICES COMPUTING |
VB.NET |
344 |
HSC17D090 |
Library Management System |
APPLICATION |
C#.NET |
345 |
HSC17D091 |
Energy Enhancements For Smart Mobile Devices Using K-Nearest Algorithm |
APPLICATION |
C#.NET |
346 |
HSC17D092 |
TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud |
SERVICES COMPUTING |
C#.NET |
347 |
HSC17D093 |
Hiding messages in the Noise of a Picture |
APPLICATION |
C#.NET |
348 |
HSC17D094 |
Hiding Secret Image In Video |
APPLICATION |
C#.NET |
349 |
HSC17D095 |
Transactional Behavior Verification in Business Process as a Service Configuration |
SERVICES COMPUTING |
VB.NET |
350 |
HSC17D096 |
Palm-Print Classification by Global Features |
APPLICATION |
C#.NET |
351 |
HSC17D098 |
Steganography for Hiding Data in Wave Audio Files |
APPLICATION |
C#.NET |
352 |
HSC17D098 |
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data |
Dependable and Secure Computing |
C#.NET |
353 |
HSC17D099 |
Using Trigonometry and Pythagoras to Watermark an Image |
APPLICATION |
C#.NET |
354 |
HSC17D100 |
Cloud Data Auditing Techniques with a Focus on Privacy and Security |
Dependable and Secure Computing |
VB.NET |
355 |
HSC17D101 |
Reversible Data Hiding With Optimal Value Transfer |
APPLICATION |
C#.NET |
356 |
HSC17D102 |
My Privacy My Decision: Control of Photo Sharing on Online Social Networks |
Dependable and Secure Computing |
C#.NET |
357 |
HSC17D103 |
Reading and Writing AVI files using steganography |
APPLICATION |
C#.NET |
358 |
HSC17D104 |
Privacy-Preserving Aggregate Queries for Optimal Location Selection |
Dependable and Secure Computing |
C#.NET |
359 |
HSC17D105 |
Persuasive Cued Click Points Design Implementation and Evaluation |
APPLICATION |
C#.NET |
360 |
HSC17D106 |
Wallpaper Changer Utility |
APPLICATION |
C#.NET |
361 |
HSC17D107 |
A Distributed Control Law for Load Balancing in Content Delivery Networks |
APPLICATION |
C#.NET |
362 |
HSC17D107 |
FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data |
Dependable and Secure Computing |
C#.NET |
363 |
HSC17D108 |
An Efficient Association Rule Mining Algorithm In Distributed Databases |
APPLICATION |
C#.NET |
364 |
HSC17D109 |
An Image-Based Approach to Video Copy Detection with Spatio-temporal Post-Filtering |
APPLICATION |
C#.NET |
365 |
HSC17D110 |
MMB cloud -Tree: Authenticated Index for Verifiable Cloud Service Selection |
Dependable and Secure Computing |
VB.NET |
366 |
HSC17D111 |
Authenticated Group Key Transfer Protocol Based on Secret Sharing |
APPLICATION |
C#.NET |
367 |
HSC17D112 |
Edge Adaptive Image Steganography Based on LSBMR |
APPLICATION |
C#.NET |
368 |
HSC17D112 |
Efficient and Privacy-Preserving Min and k th Min Computations in Mobile Sensing Systems |
Dependable and Secure Computing |
C#.NET |
369 |
HSC17D114 |
Network Traffic Anomaly Detection and Visualization using Predictive Method |
APPLICATION |
C#.NET |
370 |
HSC17D115 |
Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending |
INFORMATION FORENSICS AND SECURITY |
VB.NET |
371 |
HSC17D116 |
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verificatio |
INFORMATION FORENSICS AND SECURITY |
ASP.NET |
372 |
HSC17D117 |
RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Stora |
INFORMATION FORENSICS AND SECURITY |
ASP.NET |
373 |
HSC17D119 |
Quantifying Impact of Mobility on Data Availability in Mobile Ad Hoc Networks |
APPLICATION |
C#.NET |
374 |
HSC17D120 |
Reversible Image Watermarking Using Interpolation Technique |
APPLICATION |
C#.NET |
375 |
HSC17D124 |
Steganography and Visual Cryptography in Computer Forensics |
APPLICATION |
C#.NET |
376 |
HSC17D126 |
A Hypothesis Testing Approach for Achieving Semi-Fragility in Multimedia Authentication |
APPLICATION |
C#.NET |
377 |
HSC17D128 |
Fault-Tolerant Distributed Channel Allocation in Mobile Ad-Hoc Networks |
APPLICATION |
C#.NET |
378 |
HSC17D129 |
Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks |
APPLICATION |
C#.NET |
379 |
HSC17D131 |
Image Forgery Detection |
APPLICATION |
C#.NET |
380 |
HSC17D132 |
Spot Databases Efficient Consistency Checking and Optimistic Selection In Probabilistic Spatial Data |
APPLICATION |
C#.NET |
381 |
HSC17D133 |
A Scalable Video Encryption Algorithm for H.264 SVC |
APPLICATION |
C#.NET |
382 |
HSC17D134 |
A Secure and Robust Video Watermarking Based on Chaotic Maps |
APPLICATION |
C#.NET |
383 |
HSC17D135 |
Steganography Using Audio And Video Data Hiding |
APPLICATION |
C#.NET |
384 |
HSC17D136 |
A Secure Payment Scheme with Low Communication |
APPLICATION |
C#.NET |
385 |
HSC17D137 |
A Distributed and Scalable Time Slot Allocation |
APPLICATION |
C#.NET |
386 |
HSC17D138 |
BAHG Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments |
APPLICATION |
C#.NET |
387 |
HSC17D140 |
Rate Allocation in Regular Wireless Sensor Networks |
APPLICATION |
C#.NET |
388 |
HSC17D141 |
Detection and Localization of Multiple Spoofing Attackers in Wireless Networks |
APPLICATION |
C#.NET |
389 |
HSC17D143 |
Scalable Learning of Collective Behavior |
APPLICATION |
C#.NET |
390 |
HSC17D144 |
Query-Dependent Ranking For Web Databases |
APPLICATION |
C#.NET |
391 |
HSC17D147 |
Semantics for Data Compression |
APPLICATION |
C#.NET |
392 |
HSC17D148 |
Frequency Domain Resource Allocation in WMN |
APPLICATION |
C#.NET |
393 |
HSC17D149 |
Data Leakage Detection |
APPLICATION |
C#.NET |
394 |
HSC17D150 |
Efficient Computation of Range Aggregate |
APPLICATION |
C#.NET |
395 |
HSC17D151 |
A Comparative Study of Privacy Guarantees |
APPLICATION |
C#.NET |
396 |
HSC17D152 |
EAACK-A Secure Intrusion-Detection System for MANETs |
APPLICATION |
C#.NET |
397 |
HSC17D153 |
Secure Image Transmission Technique via Secret-Fragment-Visible Mosaic Images |
APPLICATION |
C#.NET |
398 |
HSC17D154 |
Data Hiding in Encrypted H.264AVC Video Streams by Code Word Substitution |
APPLICATION |
C#.NET |
399 |
HSC17D155 |
Designing an Efficient Video File Transmission using ETC System |
APPLICATION |
C#.NET |
400 |
HSC17D156 |
Resource Allocation for QoS Support in Wireless Mesh Networks |
APPLICATION |
C#.NET |
401 |
HSC17D157 |
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks |
APPLICATION |
C#.NET |
402 |
HSC17D159 |
Shopping mall transaction on owner monitoring system |
APPLICATION |
ASP.NET |
403 |
HSC17D160 |
Wireless Vehicle Document Verification |
APPLICATION |
ASP.NET |
404 |
HSC17D162 |
Fault Detection Using Micro-Scanning Device |
APPLICATION |
ASP.NET |
405 |
HSC17D163 |
Multi-Level Quiz Master |
APPLICATION |
ASP.NET |
406 |
HSC17D164 |
Learning Object Repositories |
APPLICATION |
ASP.NET |
407 |
HSC17D166 |
Green Identity Card |
APPLICATION |
ASP.NET |
408 |
HSC17D168 |
Multipoint Jewel Management System |
APPLICATION |
ASP.NET |
409 |
HSC17D169 |
Online OBC Certificate |
APPLICATION |
ASP.NET |
410 |
HSC17D170 |
Online Job Portal |
APPLICATION |
ASP.NET |
411 |
HSC17D171 |
Online Railway Ticket Booking System |
APPLICATION |
ASP.NET |
412 |
HSC17D172 |
Recycle Box |
APPLICATION |
ASP.NET |
413 |
HSC17D173 |
Secure Online Banking Using Antiphising |
APPLICATION |
ASP.NET |
414 |
HSC17D174 |
Smart Restaurant Management |
APPLICATION |
ASP.NET |
415 |
HSC17D175 |
SMS integrated alarm tool to protect e-locker |
APPLICATION |
ASP.NET |
416 |
HSC17D176 |
Seven wonders of the world 2016 |
APPLICATION |
ASP.NET |
417 |
HSC17D177 |
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage |
APPLICATION |
ASP.NET |
418 |
HSC17D178 |
Credit Card Transaction Processing using a Hidden Markov Mode(HMM) |
APPLICATION |
ASP.NET |
419 |
HSC17D179 |
Online Matrimonial Management System |
APPLICATION |
ASP.NET |
420 |
HSC17D180 |
Home Security System |
APPLICATION |
ASP.NET |
421 |
HSC17D181 |
Detecting Malicious Facebook Applications |
APPLICATION |
ASP.NET |
422 |
HSC17D182 |
Fetch EB Bill Information |
APPLICATION |
ASP.NET |
423 |
HSC17D183 |
Online Library Management System |
APPLICATION |
ASP.NET |
424 |
HSC17D184 |
Payroll Management System |
APPLICATION |
ASP.NET |
425 |
HSC17D185 |
Blind Image Watermarking |
APPLICATION |
C#.NET |
426 |
HSC17D197 |
Automatic College TIMETABLE Generation |
APPLICATION |
ASP.NET |
427 |
HSC17D198 |
SMS Integrated Two Wheeler Management System |
APPLICATION |
ASP.NET |
428 |
HSC17D199 |
World Recipe |
APPLICATION |
ASP.NET |
429 |
HSC17D206 |
ATM Machine Security Alert |
APPLICATION |
ASP.NET |
430 |
HSC17D207 |
Online Exam Management |
APPLICATION |
ASP.NET |
431 |
HSC17D208 |
Airline Ticket Reservation System |
APPLICATION |
ASP.NET |
432 |
HSC17D209 |
Library Management Using E-Mail Transaction |
APPLICATION |
ASP.NET |
433 |
HSC17D210 |
SMS Integrated Student Information Reporting System |
APPLICATION |
ASP.NET |
434 |
HSC17D211 |
College Staff Management System |
APPLICATION |
ASP.NET |
435 |
HSC17D212 |
Online Mobile Network Offers And Online Recharge |
APPLICATION |
ASP.NET |
436 |
HSC17D213 |
Tele Communication |
APPLICATION |
ASP.NET |
437 |
HSC17D214 |
Online Shopping Management |
APPLICATION |
ASP.NET |
438 |
HSC17D215 |
Rapid Fees Collector |
APPLICATION |
ASP.NET |
439 |
HSC17D216 |
Restaurant Management System |
APPLICATION |
ASP.NET |
440 |
HSC17D217 |
College Credit System |
APPLICATION |
ASP.NET |
441 |
HSC17D218 |
Staff Management System |
APPLICATION |
ASP.NET |
442 |
HSC17D219 |
Ensuring Distributed Accountability |
APPLICATION |
ASP.NET |
443 |
HSC17D220 |
Privacy Preserving Public Auditing for Secure Cloud Storage |
APPLICATION |
ASP.NET |
444 |
HSC17D221 |
Privacy Preserving Delegated Access Control in Public Clouds |
APPLICATION |
ASP.NET |
445 |
HSC17D222 |
Dynamic Personalized Recommendation on sparse Data |
APPLICATION |
ASP.NET |
446 |
HSC17D223 |
A Survey of XML Tree Patterns |
APPLICATION |
ASP.NET |
447 |
HSC17D224 |
Textile Management System |
APPLICATION |
ASP.NET |
448 |
HSC17D226 |
Human Resources Management System |
APPLICATION |
ASP.NET |
449 |
HSC17D227 |
Inventory Manage System |
APPLICATION |
ASP.NET |
450 |
HSC17D228 |
Job Order System |
APPLICATION |
ASP.NET |
451 |
HSC17D229 |
Mobile shop shopping cart System |
APPLICATION |
ASP.NET |
452 |
HSC17D230 |
Patient Management System |
APPLICATION |
ASP.NET |
453 |
HSC17D231 |
Property Management System |
APPLICATION |
ASP.NET |
454 |
HSC17D232 |
Web Based Content Management System |
APPLICATION |
ASP.NET |
455 |
HSC17D233 |
Advocate Management System |
APPLICATION |
ASP.NET |
456 |
HSC17D234 |
Food Order Management System |
APPLICATION |
ASP.NET |
457 |
HSC17D235 |
Truth discovery Using Web Search |
APPLICATION |
ASP.NET |
458 |
HSC17D236 |
Hepatitis Diagnosis system |
APPLICATION |
ASP.NET |
459 |
HSC17D237 |
Medical Diagnosis |
APPLICATION |
ASP.NET |
460 |
HSC17D238 |
Ration Card Fraud Detection |
APPLICATION |
ASP.NET |
461 |
HSC17D239 |
Deal or No Deal Game |
APPLICATION |
ASP.NET |
462 |
HSC17D240 |
Medical Case Retrieval using Decision Tree |
APPLICATION |
ASP.NET |
463 |
HSC17D241 |
Blood Bank Management System |
APPLICATION |
ASP.NET |
464 |
HSC17D242 |
Efficient Computation of Range Aggregates against uncertain |
APPLICATION |
ASP.NET |
465 |
HSC17D243 |
Exploiting Dynamic Resource Allocation |
APPLICATION |
ASP.NET |
466 |
HSC17D244 |
Short Message Service-Cell Broad cast |
APPLICATION |
ASP.NET |
467 |
HSC17D246 |
Vehicle Maintenance System |
APPLICATION |
ASP.NET |
468 |
HSC17D247 |
Credit Card Fraud Detection |
APPLICATION |
ASP.NET |
469 |
HSC17D248 |
Fetching Of EB Information |
APPLICATION |
ASP.NET |
470 |
HSC17D251 |
Analysis on Credit Card Fraud Detection Methods |
APPLICATION |
ASP.NET |
471 |
HSC17D252 |
College Website Maintenance |
APPLICATION |
ASP.NET |
472 |
HSC17D254 |
Online Banking |
APPLICATION |
ASP.NET |
473 |
HSC17D255 |
Online Voting System |
APPLICATION |
ASP.NET |
474 |
HSC17D256 |
E-Learning |
APPLICATION |
ASP.NET |
475 |
HSC17D257 |
Integrated Restaurant Management System with Tourism |
APPLICATION |
ASP.NET |
476 |
HSC17D258 |
Citizen Card System |
APPLICATION |
ASP.NET |
477 |
HSC17D259 |
Online Examination System |
APPLICATION |
ASP.NET |
478 |
HSC17D260 |
Privacy-Preserving Multi-Keyword Ranking |
APPLICATION |
ASP.NET |
479 |
HSC17D261 |
Electronic Fund Transfer |
APPLICATION |
ASP.NET |
480 |
HSC17D262 |
Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis |
APPLICATION |
ASP.NET |
481 |
HSC17D263 |
Online Customer Care |
APPLICATION |
ASP.NET |
482 |
HSC17D264 |
College Website Maintenance |
APPLICATION |
ASP.NET |
483 |
HSC17D265 |
Student Information Reporting System |
APPLICATION |
ASP.NET |
484 |
HSC17D266 |
Online Two Wheeler Maintenance System |
APPLICATION |
ASP.NET |
485 |
HSC17D267 |
CAM-Cloud-Assisted Privacy Preserving Mobile Health Monitoring |
APPLICATION |
ASP.NET |
486 |
HSC17D268 |
Dynamic Audit Services for Outsourced Storages in Clouds |
APPLICATION |
ASP.NET |
487 |
HSC17D269 |
Adaptive Provisioning of Human Expertise in Service oriented System |
APPLICATION |
ASP.NET |
488 |
HSC17D270 |
A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding |
APPLICATION |
ASP.NET |
489 |
HSC17D271 |
Towards Differential Query Services |
APPLICATION |
ASP.NET |
490 |
HSC17D272 |
Building Confidential and Efficient Query Services |
APPLICATION |
ASP.NET |
491 |
HSC17D273 |
Consistency as a Service Auditing Cloud Consistency |
APPLICATION |
ASP.NET |
492 |
HSC17D274 |
Mona Secure Multi-Owner Data Sharing |
APPLICATION |
ASP.NET |
493 |
HSC17D275 |
Data Mining with Big Data |
APPLICATION |
ASP.NET |
494 |
HSC17D276 |
Click Prediction for Web Image Re-ranking Using Multimodal Sparse Coding |
APPLICATION |
ASP.NET |
495 |
HSC17D277 |
Multimedia Website for Tourism in Kanyakumari |
APPLICATION |
ASP.NET |
496 |
HSC17D278 |
Transformation Based Workload scheduling In Cloud |
APPLICATION |
ASP.NET |
497 |
HSC17D279 |
Business Process Outsourcing Services |
APPLICATION |
ASP.NET |
498 |
HSC17D284 |
Online Voting System |
APPLICATION |
PHP |
499 |
HSC17D287 |
Online Directory |
APPLICATION |
PHP |
500 |
HSC17D288 |
Transport Management System |
APPLICATION |
PHP |
501 |
HSC17D293 |
Automated Transportation Tracking Arrangement |
APPLICATION |
PHP |
502 |
HSC17D296 |
Library Management system |
APPLICATION |
VB.NET |
503 |
HSC17D297 |
Web Browser with Voice Recognition |
APPLICATION |
VB.NET |
504 |
HSC17D298 |
Win Application for Word Processing |
APPLICATION |
VB.NET |
505 |
HSC17D299 |
Data Communication Parallel Multichannel Communication |
APPLICATION |
VB.NET |
506 |
HSC17D301 |
University Admission Processing Tool |
APPLICATION |
VB.NET |
507 |
HSC17D304 |
Windows Multi Files Search Utility |
APPLICATION |
VB.NET |
508 |
HSC17D305 |
Apartment Management Systems |
APPLICATION |
VB.NET |
509 |
HSC17D306 |
VB .Net Smart Mail Transfer Protocol |
APPLICATION |
VB.NET |
510 |
HSC17D307 |
Windows Multi File Search Utility |
APPLICATION |
VB.NET |
511 |
HSC17D308 |
Car Speed Control using Bluetooth |
APPLICATION |
VB.NET |
512 |
HSC17D309 |
File Explorer Open Multiple Files Itself |
APPLICATION |
VB.NET |
513 |
HSC17D310 |
Patient Care System |
APPLICATION |
VB.NET |
514 |
HSC17D311 |
Online Product Opinion and Ranking System |
APPLICATION |
VB.NET |
515 |
HSC17D312 |
Human Resources Management System |
APPLICATION |
VB.NET |
516 |
HSC17D313 |
Engineering Counseling |
APPLICATION |
VB.NET |
517 |
HSC17D315 |
Employee Management System |
APPLICATION |
VB.NET |
518 |
HSC17D316 |
Intranet Mailing System |
APPLICATION |
VB.NET |
519 |
HSC17D317 |
Blood Bank Management System |
APPLICATION |
VB.NET |
520 |
HSC17D318 |
Vehicle Maintenance System |
APPLICATION |
VB.NET |
521 |
HSC17D319 |
File System Watcher and Task Monitor |
APPLICATION |
VB.NET |
522 |
HSC17D323 |
Network Based Market Basket |
APPLICATION |
VB.NET |
523 |
HSC17D324 |
Client to Server Based Traffic Anomalies |
APPLICATION |
VB.NET |
524 |
HSC17D325 |
Universal Smart Card Management |
APPLICATION |
VB.NET |
525 |
HSC17D326 |
Remote Network Monitoring and Controlling |
APPLICATION |
VB.NET |
526 |
HSC17D327 |
Network Communication System |
APPLICATION |
VB.NET |
527 |
HSC17D328 |
Network Security and Implementation |
APPLICATION |
VB.NET |
528 |
HSC17D330 |
Network Remote Controlling System |
CLOUD COMPUTING |
VB.NET |
529 |
HSC17D331 |
Network Remote Controlling System |
APPLICATION |
VB.NET |
530 |
HSC17D332 |
ATM Networks for Online Monitoring System |
APPLICATION |
VB.NET |
531 |
HSC17D333 |
Image Processing Techniques for Cracks Detection and Removal |
APPLICATION |
VB.NET |
532 |
HSC17D334 |
RFID Authentication |
APPLICATION |
VB.NET |
533 |
HSC17D335 |
Parallel Multichannel Communications |
APPLICATION |
VB.NET |
534 |
HSC17D336 |
PC Based Automatic Railway Gate Controlling System |
APPLICATION |
VB.NET |
535 |
HSC17D337 |
Student Information Reporting System |
APPLICATION |
VB.NET |
536 |
HSC17D339 |
Students Attendance System Using Barcode |
APPLICATION |
VB.NET |
537 |
HSC17D340 |
Unique Code Identification System |
APPLICATION |
VB.NET |
538 |
HSC17D341 |
Using SMS & E-Mail for Communication through PC |
APPLICATION |
VB.NET |
539 |
HSC17D342 |
Banking Security using Iris & RFID Technology |
APPLICATION |
VB.NET |
540 |
HSC17D343 |
Mobile Phone To Pc Communication |
APPLICATION |
VB.NET |
541 |
HSC17D344 |
Bluetooth Based Network Admin |
APPLICATION |
VB.NET |
542 |
HSC17D345 |
Student Time Table |
APPLICATION |
VB.NET |
543 |
HSC17D346 |
Image Morphing Detection Using Deformation Techniques |
APPLICATION |
VB.NET |
544 |
HSC17D347 |
Image Denoising |
APPLICATION |
VB.NET |
545 |
HSC17D348 |
Off-Line Signature Verification Using Local Patterns |
APPLICATION |
VB.NET |
546 |
HSC17D349 |
Universal Smart Card Management |
APPLICATION |
VB.NET |
547 |
HSC17D351 |
Steganography for Hiding Data in Wave Audio Files |
APPLICATION |
VB.NET |
548 |
HSC17D352 |
Library Management Using E-Mail Transaction |
APPLICATION |
VB.NET |
549 |
HSC17D354 |
File Access Unauthorized Person |
APPLICATION |
VB.NET |
550 |
HSC17D356 |
Email Alert on Unauthorized File Access |
APPLICATION |
VB.NET |
551 |
HSC17D357 |
Email Alert on Unauthorized File Access |
APPLICATION |
VB.NET |
552 |
HSC17D358 |
An Integrated System for Regional Environmental Monitoring |
APPLICATION |
VB.NET |
553 |
HSC17D359 |
Enabling Data Integrity Protection in Regenerating |
APPLICATION |
VB.NET |
554 |
HSC17D360 |
Black Dream |
APPLICATION |
VB.NET |
555 |
HSC17D361 |
Data Leakage Detection Using Cloud Computing |
APPLICATION |
VB.NET |
556 |
HSC17D362 |
IRIS: Pin Configuration Using Transformation |
APPLICATION |
VB.NET |
557 |
HSC17D363 |
Fast Detection Of Transformed DataLeakage |
APPLICATION |
VB.NET |
558 |
HSC17D366 |
Voice Recognition |
APPLICATION |
VISUAL BASIC |
559 |
HSC17D368 |
Quiz Master |
APPLICATION |
VISUAL BASIC |
560 |
HSC17D369 |
University Admission Processing Tool |
APPLICATION |
VISUAL BASIC |
561 |
HSC17D370 |
Courier Management System |
APPLICATION |
VISUAL BASIC |
562 |
HSC17J121 |
Optimizing Locality-Aware Memory Management of Key-Value Caches |
CLOUD COMPUTING |
J2EE |
563 |
HSC17J122 |
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on |
CLOUD COMPUTING |
J2EE |
564 |
HSC17J123 |
Correlation Modeling and Resource Optimization for Cloud Service with Fault Recovery |
CLOUD COMPUTING |
J2EE |
565 |
HSC17J125 |
Achieving Privacy-friendly Storage and Secure Statistics for Smart Meter Data on Outsourced Clouds |
CLOUD COMPUTING |
J2EE |
566 |
HSC17J128 |
Multimedia Processing Pricing Strategy in GPU-accelerated Cloud Computing |
CLOUD COMPUTING |
J2EE |
567 |
HSC17J130 |
Quantitative Modeling and Analytical Calculation of Elasticity in Cloud Computing |
CLOUD COMPUTING |
J2EE |
568 |
HSC17J133 |
Efficiently Translating Complex SQL Query to MapReduce Jobflow on Cloud |
CLOUD COMPUTING |
J2EE |
569 |
HSC17J135 |
Privacy Protection based Access Control Scheme in Cloud-based Services |
CLOUD COMPUTING |
J2EE |
570 |
HSC17J138 |
Majority Voting and Pairing with Multiple Noisy Labeling |
DATA MINING |
J2EE |
571 |
HSC17J140 |
Efficient Keyword-aware Representative Travel Route Recommendation |
DATA MINING |
J2EE |
572 |
HSC17J142 |
Detecting Stress Based on Social Interactions in Social Networks |
DATA MINING |
J2EE |
573 |
HSC17J144 |
Efficient Clue-based Route Search on Road Networks |
DATA MINING |
J2EE |
574 |
HSC17J146 |
Probabilistic Models For Ad Viewability Prediction On The Web |
DATA MINING |
J2EE |
575 |
HSC17J148 |
Large-scale Location Prediction for Web Pages |
DATA MINING |
J2EE |
576 |
HSC17J154 |
Modeling and Learning Distributed Word Representation with Metadata for Question Retrieval |
DATA MINING |
J2EE |
577 |
HSC17J155 |
Engagement dynamics and sensitivity analysis of YouTube videos |
DATA MINING |
J2EE |
578 |
HSC17J161 |
Confusion-matrix-based Kernel Logistic Regression for Imbalanced Data Classification |
DATA MINING |
J2EE |
579 |
HSC17J167 |
Influence Maximization in Trajectory Databases |
DATA MINING |
J2EE |
580 |
HSC17J186 |
Attribute Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud |
BIG DATA |
J2EE |
581 |
HSC17J187 |
An Efficient Cloud Market Mechanism for Computing Jobs With Soft Deadlines |
|
JAVA |
582 |
HSC17J187 |
An Efficient Cloud Market Mechanism for Computing Jobs With Soft Deadlines |
NETWORKING |
JAVA |
583 |
HSC17J189 |
Sink-Based Centralized Transmission Scheduling by Using Asymmetric Communication and Wake-Up Radio |
NETWORKING |
JAVA |
584 |
HSC17J190 |
Performance Optimization in Wireless Sensor Networks: A Novel Collaborative Compressed Sensing Appro |
NETWORKING |
JAVA |
585 |
HSC17J191 |
MEES: Mobile Energy Efficient Square Routing for Underwater Wireless Sensor Networks |
NETWORKING |
JAVA |
586 |
HSC17J192 |
Data-driven faulty node detection scheme for Wireless Sensor Networks |
NETWORKING |
JAVA |
587 |
HSC17J193 |
Energy-Efficient Transmission Based on Compressive Sensing in WSN |
NETWORKING |
JAVA |
588 |
HSC17J194 |
In-Network On-Demand Query-Based Sensing System for Wireless Sensor Networks |
NETWORKING |
JAVA |
589 |
HSC17J195 |
Transmission Performance Evaluation and Optimal Selection of Relay Vehicles in VANETs |
NETWORKING |
JAVA |
590 |
HSC17J196 |
When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Socia |
NETWORKING |
JAVA |
591 |
HSC17J198 |
Distributed Clustering-Task Scheduling for Wireless Sensor Networks Using Dynamic Hyper Round Policy |
MOBILE COMPUTING |
JAVA |
592 |
HSC17J200 |
MMBcloud -Tree: Authenticated Index for Verifiable Cloud Service Selection |
Dependable and Secure Computing |
J2EE |
593 |
HSC17J201 |
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection |
Dependable and Secure Computing |
J2EE |
594 |
HSC17J202 |
On the Soundness and Security of Privacy-Preserving SVM for Outsourcing Data Classification |
Dependable and Secure Computing |
J2EE |
595 |
HSC17J203 |
SADI: A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks |
Dependable and Secure Computing |
J2EE |
596 |
HSC17J204 |
A Scalable Approach to Joint Cyber Insurance and Security-as-a-Service Provisioning in Cloud Computi |
Dependable and Secure Computing |
J2EE |
597 |
HSC17J205 |
Cloud Data Auditing Techniques with a Focus on Privacy and Security |
Dependable and Secure Computing |
J2EE |
598 |
HSC17J210 |
Graph Encryption for Top-K Nearest Keyword Search Queries on Cloud |
SUSTAINABLE COMPUTING |
JAVA |
599 |
HSC17J215 |
Optimal Task Dispatching on Multiple Heterogeneous Multiserver Systems with Dynamic Speed and Power |
SUSTAINABLE COMPUTING |
JAVA |
600 |
HSC17J218 |
A Belief Rule Based Expert System for Datacenter PUE Prediction under Uncertainty |
SUSTAINABLE COMPUTING |
JAVA |
601 |
HSC17J220 |
Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Compu |
SUSTAINABLE COMPUTING |
JAVA |
602 |
HSC17J222 |
A semi-automatic and trustworthy scheme for continuous cloud service certification |
SERVICES COMPUTING |
JAVA |
603 |
HSC17J225 |
Transactional Behavior Verification in Business Process as a Service Configuration |
SERVICES COMPUTING |
JAVA |
604 |
HSC17J228 |
Resource renting for periodical cloud workflow applications |
SERVICES COMPUTING |
JAVA |
605 |
HSC17J234 |
A Hybrid Bio-Inspired Algorithm for Scheduling and Resource Management in Cloud Environment |
SERVICES COMPUTING |
JAVA |
606 |
HSC17J239 |
Optimal Symbiosis and Fair Scheduling in Shared Cache |
PARALLEL & DISTRIBUTED SYSTEM |
JAVA |
607 |
HSC17J242 |
Enabling Efficient and Reliable Transition from Replication to Erasure Coding for Clustered File Sys |
PARALLEL & DISTRIBUTED SYSTEM |
JAVA |
608 |
HSC17J245 |
Binary-Tree Based Estimation of File Requests for Efficient Data Replication |
PARALLEL & DISTRIBUTED SYSTEM |
JAVA |
609 |
HSC17J249 |
The Importance of Worker Reputation Information in Microtask-Based Crowd Work Systems |
PARALLEL & DISTRIBUTED SYSTEM |
JAVA |
610 |
HSC17J250 |
EAFR: An Energy-Efficient Adaptive File Replication System in Data-Intensive Clusters |
PARALLEL & DISTRIBUTED SYSTEM |
JAVA |
611 |
HSC17J252 |
ExCCC-DCN: A Highly Scalable, Cost-Effective and Energy-Efficient Data Center Structure |
PARALLEL & DISTRIBUTED SYSTEM |
JAVA |
612 |
HSC17J254 |
Privacy-Aware Scheduling SaaS in High Performance Computing Environments |
PARALLEL & DISTRIBUTED SYSTEM |
JAVA |
613 |
HSC17J257 |
A Multi-Agent Advanced Traveler Information System for Optimal Trip Planning in a Co-Modal Framework |
INTELLIGENT TRANSPORTATION SYSTEMS |
JAVA |
614 |
HSC17J259 |
EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad |
INTELLIGENT TRANSPORTATION SYSTEMS |
JAVA |
615 |
HSC17J261 |
A Multi-Agent Advanced Traveler Information System for Optimal Trip Planning in a Co-Modal Framework |
INTELLIGENT TRANSPORTATION SYSTEMS |
JAVA |
616 |
HSC17J268 |
Follow But No Track: Privacy Preserved Profile Publishing in Cyber-Physical Social Systems |
INTERNET OF THINGS |
J2EE |
617 |
HSC17J272 |
A Privacy-preserving Vehicular Crowdsensing based Road surface Condition Monitoring System Using Fog |
INTERNET OF THINGS |
J2EE |
618 |
HSC17J276 |
Achieving Efficient and Secure Data Acquisition for Cloud-supported Internet of Things in Smart Grid |
INTERNET OF THINGS |
J2EE |
619 |
HSC17J280 |
LoDPD: A Location Difference-based Proximity Detection Protocol for Fog Computing |
INTERNET OF THINGS |
J2EE |
620 |
HSC17J284 |
Resource Allocation in Vehicular Cloud Computing Systems with Heterogeneous Vehicles and Roadside Un |
INTERNET OF THINGS |
J2EE |
621 |
HSC17J288 |
Security-Aware Waveforms for Enhancing Wireless Communications Privacy in Cyber-Physical Systems via |
INTERNET OF THINGS |
JAVA |
622 |
HSC17J291 |
Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds |
INFORMATION FORENSICS AND SECURITY |
J2EE |
623 |
HSC17J293 |
Deep Representation based feature extraction and recovering for Finger-vein verification |
INFORMATION FORENSICS AND SECURITY |
J2EE |
624 |
HSC17J294 |
Preventing Distributed Denial-of-Service Flooding Attacks with Dynamic Path Identifiers |
INFORMATION FORENSICS AND SECURITY |
J2EE |
625 |
HSC17J297 |
Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving |
INFORMATION FORENSICS AND SECURITY |
J2EE |
626 |
HSC17J300 |
Efficiently Promoting Product Online Outcome: An Iterative Rating Attack Utilizing Product and Marke |
INFORMATION FORENSICS AND SECURITY |
J2EE |
627 |
HSC17J302 |
Person Identification by Keystroke Dynamics Using Pairwise User Coupling |
INFORMATION FORENSICS AND SECURITY |
J2EE |
628 |
HSC17J303 |
Image Origin Classification Based on Social Network Provenance |
INFORMATION FORENSICS AND SECURITY |
J2EE |
629 |
HSC17J305 |
A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage |
INFORMATION FORENSICS AND SECURITY |
J2EE |
630 |
HSC17J401 |
ERP for Leather Company |
APPLICATION |
J2EE |
631 |
HSC17J402 |
On Line Bouquet Shop |
APPLICATION |
J2EE |
632 |
HSC17J404 |
Electricity Bill |
APPLICATION |
J2EE |
633 |
HSC17J405 |
Automatic Cellphone Messaging System |
APPLICATION |
J2EE |
634 |
HSC17J406 |
Interactive Banking System With Mobile |
APPLICATION |
J2EE |
635 |
HSC17J407 |
Social Networking in Website |
APPLICATION |
J2EE |
636 |
HSC17J408 |
Shopping Mall Management System |
APPLICATION |
J2EE |
637 |
HSC17J409 |
Online Crime File Management |
APPLICATION |
J2EE |
638 |
HSC17J410 |
Telephone Billing System |
APPLICATION |
J2EE |
639 |
HSC17J411 |
Wavelet Huffman Comparison |
APPLICATION |
JAVA |
640 |
HSC17J412 |
Network Border Protocol |
APPLICATION |
JAVA |
641 |
HSC17J413 |
Toward Privacy Preserving and collusion Resistance |
APPLICATION |
JAVA |
642 |
HSC17J414 |
Discovery and verification of neighbor positions in mobile Networks |
APPLICATION |
JAVA |
643 |
HSC17J415 |
Mobile Relay configuration in Data intensive Wireless Sensor N/W |
APPLICATION |
JAVA |
644 |
HSC17J416 |
Secure Mining of Associated rule in Horizontally Distributed Databases |
APPLICATION |
JAVA |
645 |
HSC17J417 |
Toward Reliable Data Delivery for highly Dynamic Mobile Network |
APPLICATION |
JAVA |
646 |
HSC17J419 |
Privacy and Integrity Preserving Range Queries in Sensor Networks |
APPLICATION |
JAVA |
647 |
HSC17J420 |
Anomaly Discovery and Resolution using Firewall Policy |
APPLICATION |
JAVA |
648 |
HSC17J421 |
Network Intrusion Detection and Counter Measure Selection in Virtual N/W |
APPLICATION |
JAVA |
649 |
HSC17J422 |
Detecting Spam Zanbiar By Monitoring Outgoing Messages |
APPLICATION |
JAVA |
650 |
HSC17J423 |
Analysis of a Pool Management Scheme for Cloud Computing |
APPLICATION |
JAVA |
651 |
HSC17J424 |
Cloud MOV: Cloud Based Mobile Social TV |
APPLICATION |
JAVA |
652 |
HSC17J425 |
A Probalistic Misbehaviour Detection |
APPLICATION |
JAVA |
653 |
HSC17J426 |
EAACK- A Secure Intrusion Detection System For Manets |
APPLICATION |
JAVA |
654 |
HSC17J427 |
Palm Print Classification By Global Features |
APPLICATION |
JAVA |
655 |
HSC17J428 |
Warning Bird - A Near Real Time Application |
APPLICATION |
JAVA |
656 |
HSC17J429 |
Predictable Mobile Routing For Spacecraft Network |
APPLICATION |
JAVA |
657 |
HSC17J430 |
Clustering Sentence Level Text Using Novel Fuzzy |
APPLICATION |
JAVA |
658 |
HSC17J431 |
Dynamic Audit Service for Outsourced Storages in Cloud |
APPLICATION |
JAVA |
659 |
HSC17J432 |
Enabling dynamic data and indirect mutual trust for cloud computing storage systems |
APPLICATION |
JAVA |
660 |
HSC17J433 |
A Parabolic Routing Protocol with Assured Delivery Rate in Wireless Sensor Network |
APPLICATION |
JAVA |
661 |
HSC17J434 |
Two Tales Privacy in Online Social Networks |
APPLICATION |
JAVA |
662 |
HSC17J435 |
m-Privacy for Collaborative Data Publishing |
APPLICATION |
JAVA |
663 |
HSC17J436 |
Secure and Privacy- Aware Searching in Peer-to-Peer Networks |
APPLICATION |
JAVA |
664 |
HSC17J437 |
Citizen Card System |
APPLICATION |
JAVA |
665 |
HSC17J438 |
Data Hiding A Motion Vectors Of Compressed Video |
APPLICATION |
JAVA |
666 |
HSC17J439 |
Time Table Generation |
APPLICATION |
JAVA |
667 |
HSC17J440 |
License Plate Character Recognition Feature Extraction System |
APPLICATION |
JAVA |
668 |
HSC17J441 |
Fault Node Recovery Algorithm for a Wireless Sensor Network |
APPLICATION |
JAVA |
669 |
HSC17J442 |
FEC Decoding Based on the BP Algorithm in LTE and Wi MAX Systems |
APPLICATION |
JAVA |
670 |
HSC17J443 |
Efficient Relevance Feedback for CBIR |
APPLICATION |
JAVA |
671 |
HSC17J444 |
Heterogeneous Wireless Sensor Networks |
APPLICATION |
JAVA |
672 |
HSC17J445 |
Steganography Using Syndrome-Trellis Codes |
APPLICATION |
JAVA |
673 |
HSC17J446 |
Ontology Based Business Process Customization |
APPLICATION |
JAVA |
674 |
HSC17J447 |
Intrusion detection An Energy efficient approach |
APPLICATION |
JAVA |
675 |
HSC17J448 |
Interworked Fixed and Mobile Networks |
APPLICATION |
JAVA |
676 |
HSC17J449 |
Data Hiding And Selective Embedding |
APPLICATION |
JAVA |
677 |
HSC17J450 |
Data Hiding in Motion Vectors of Compressed Video |
APPLICATION |
JAVA |
678 |
HSC17J451 |
Embedded Extended Visual Cryptography Schemes |
APPLICATION |
JAVA |
679 |
HSC17J452 |
Location-Based Spatial Query Processing |
APPLICATION |
JAVA |
680 |
HSC17J453 |
Nymble Blocking Misbehaving Users in Anonymizing Networks |
APPLICATION |
JAVA |
681 |
HSC17J454 |
Design of p-Cycles for Full Node Protection |
APPLICATION |
JAVA |
682 |
HSC17J455 |
Multicast and Broadcast Service |
APPLICATION |
JAVA |
683 |
HSC17J456 |
Selective Data Stream Blocking Mechanism for Networks |
APPLICATION |
JAVA |
684 |
HSC17J457 |
Wireless Broadcast Networks Stability and Utility Maximization |
APPLICATION |
JAVA |
685 |
HSC17J458 |
Edge-based Bilateral Filter for Restoring Real Noisy Image |
APPLICATION |
JAVA |
686 |
HSC17J459 |
Mobility Management Scheme |
APPLICATION |
JAVA |
687 |
HSC17J460 |
Fast Query Point Movement |
APPLICATION |
JAVA |
688 |
HSC17J461 |
Grid Application Reliability using Communicating |
APPLICATION |
JAVA |
689 |
HSC17J462 |
Peer-to-Peer Networks |
APPLICATION |
JAVA |
690 |
HSC17J463 |
Geographical Routing With Location Service |
APPLICATION |
JAVA |
691 |
HSC17J464 |
Multiprocessor Cooperation |
APPLICATION |
JAVA |
692 |
HSC17J465 |
Image Retrieval System Using Sketches |
APPLICATION |
JAVA |
693 |
HSC17J466 |
Mobile Shop Using Cart System |
APPLICATION |
JAVA |
694 |
HSC17J467 |
Furniture Shop Management System |
APPLICATION |
JAVA |
695 |
HSC17J468 |
Server and Clients Node Capture Attacks |
APPLICATION |
JAVA |
696 |
HSC17J469 |
Low-Complexity Iris Coding and Recognition Based on Directionlets |
APPLICATION |
JAVA |
697 |
HSC17J470 |
Multi Scale Segmentation |
APPLICATION |
JAVA |
698 |
HSC17J471 |
Public Key Validation For DNS Security Extensions |
APPLICATION |
JAVA |
699 |
HSC17J473 |
Hacker Tracking System Using Honeypot |
APPLICATION |
JAVA |
700 |
HSC17J474 |
Optimal Distributed Malware Defense in Mobile Networks |
APPLICATION |
JAVA |
701 |
HSC17J475 |
Statistical Traffic Pattern Discovery System |
APPLICATION |
JAVA |
702 |
HSC17J476 |
Secure Data Retrieval for Decentralized Disruption |
APPLICATION |
JAVA |
703 |
HSC17J477 |
Efficient and Privacy-Aware Data Aggregation |
APPLICATION |
JAVA |
704 |
HSC17J478 |
Scalable Distributed Service Integrity Attestation |
APPLICATION |
JAVA |
705 |
HSC17J479 |
Context-Aware Energy Enhancements |
APPLICATION |
JAVA |
706 |
HSC17J480 |
Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks |
APPLICATION |
JAVA |
707 |
HSC17J481 |
Building Confidential and Efficient Query Services |
APPLICATION |
JAVA |
708 |
HSC17J482 |
Revocable Data Access Control for Multi-Authority Cloud Storage |
APPLICATION |
JAVA |
709 |
HSC17J483 |
Towards Differential Query Services in Cost-Efficient Clouds |
APPLICATION |
JAVA |
710 |
HSC17J484 |
VANET-Based Secure and Privacy-Preserving Navigation |
APPLICATION |
JAVA |
711 |
HSC17J485 |
Facilitating Document Annotation Using Content and Querying Value |
APPLICATION |
JAVA |
712 |
HSC17J486 |
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage |
APPLICATION |
JAVA |
713 |
HSC17J487 |
Public Service Transportation |
APPLICATION |
JAVA |
714 |
HSC17J488 |
Secure Fine Payment For Traffic Violations |
APPLICATION |
JAVA |
715 |
HSC17J489 |
Automatic Test Packet Generation |
APPLICATION |
JAVA |
716 |
HSC17J490 |
Boundary Cutting for Packet Classification |
APPLICATION |
JAVA |
717 |
HSC17J491 |
Cost Effective Resource Allocation of Overlay Routing Relay Nodes |
APPLICATION |
JAVA |
718 |
HSC17J492 |
Secure Distribution of Information Exchange |
APPLICATION |
JAVA |
719 |
HSC17J493 |
Active Source Routing Protocol For Mobile Networks |
APPLICATION |
JAVA |
720 |
HSC17J494 |
Error Tracking System |
APPLICATION |
JAVA |
721 |
HSC17J495 |
Client-Server Protocol Implementation |
APPLICATION |
JAVA |
722 |
HSC17J496 |
Efficient Key Management For Threshold-Multi Signature In Distributed System |
APPLICATION |
JAVA |
723 |
HSC17J497 |
Modeling and Automated Containment of Worms |
APPLICATION |
JAVA |
724 |
HSC17J498 |
Security in Large Networks Using Mediator Protocols |
APPLICATION |
JAVA |
725 |
HSC17J499 |
Secured Distributed Key Management for Threshold-Multisignature using Cryptography |
APPLICATION |
JAVA |
726 |
HSC17J500 |
Authentication Protocols for Dynamic Peer Groups |
APPLICATION |
JAVA |
727 |
HSC17J501 |
Boutique Management System |
APPLICATION |
JAVA |
728 |
HSC17J502 |
Petrol Bunk Management System |
APPLICATION |
JAVA |
729 |
HSC17J504 |
Automatically Mining Facets for Queries from Their Search Results |
APPLICATION |
JAVA |
730 |
HSC17J505 |
Credit Card Fraud Detection Using Hidden Markov Model |
APPLICATION |
JAVA |
731 |
HSC17J506 |
Cross-Platform Identification of Anonymous Identical Users |
APPLICATION |
JAVA |
732 |
HSC17J507 |
Dual-Server Public-Key Encryption With Keyword Search |
APPLICATION |
JAVA |
733 |
HSC17J508 |
Panda Public Auditing for Shared Data with Efficient User Revocation |
APPLICATION |
JAVA |
734 |
HSC17J509 |
Person Reidentification With Reference Descriptor |
APPLICATION |
JAVA |
735 |
HSC17J510 |
Shadow Attacks based on Password Reuses A Quantitative Empirical Analysis |
APPLICATION |
JAVA |
736 |
HSC17J511 |
STAMP Enabling Privacy-Preserving Location Proofs for Mobile Users |
APPLICATION |
JAVA |
737 |
HSC17J512 |
On-Screen Enlistment of Intramural Proceedings in Universities |
APPLICATION |
JAVA |
738 |
HSC17J513 |
e-Based Voting System Using Aadhar Card Data |
APPLICATION |
JAVA |
739 |
HSC17M314 |
Fusion Similarity-Based Re-ranking for SAR Image Retrieval |
IMAGE PROCESSING |
MATLAB |
740 |
HSC17M317 |
Selective Convolutional Descriptor Aggregation for Fine-Grained Image Retrieval |
IMAGE PROCESSING |
MATLAB |
741 |
HSC17M320 |
Learning Short Binary Codes for Large-scale Image Retrieval |
IMAGE PROCESSING |
MATLAB |
742 |
HSC17M322 |
Retrieval Compensated Group Structured Sparsity for Image Super-Resolution |
IMAGE PROCESSING |
MATLAB |
743 |
HSC17M327 |
Unsupervised Visual Hashing with Semantic Assistant for Content-Based Image Retrieval |
BIOMEDICAL PROCESSING |
MATLAB |
744 |
HSC17M329 |
Image Piece Learning for Weakly Supervised Semantic Segmentation |
IMAGE PROCESSING |
MATLAB |
745 |
HSC17M334 |
Fast Unsupervised Bayesian Image Segmentation With Adaptive Spatial Regularisation |
IMAGE PROCESSING |
MATLAB |
746 |
HSC17M338 |
Disjunctive Normal Parametric Level Set With Application to Image Segmentation |
IMAGE PROCESSING |
MATLAB |
747 |
HSC17M346 |
Weighted Level Set Evolution Based on Local Edge Features for Medical Image Segmentation |
IMAGE PROCESSING |
MATLAB |
748 |
HSC17M348 |
Unsupervised Multi-Class Co-Segmentation via Joint-Cut Over L1 -Manifold Hyper-Graph of Discriminati |
IMAGE PROCESSING |
MATLAB |
749 |
HSC17M350 |
Residual De-Convolutional Networks for Brain Electron Microscopy Image Segmentation |
IMAGE PROCESSING |
MATLAB |
750 |
HSC17M353 |
Segmentation Based Sparse Reconstruction of Optical Coherence Tomography Images |
IMAGE PROCESSING |
MATLAB |
751 |
HSC17M355 |
Automated Melanoma Recognition in Dermoscopy Images via Very Deep Residual Networks |
IMAGE PROCESSING |
MATLAB |
752 |
HSC17M355 |
Automated Melanoma Recognition in Dermoscopy Images via Very Deep Residual Networks |
IMAGE PROCESSING |
MATLAB |
753 |
HSC17M359 |
Classification via Sparse Representation of Steerable Wavelet Frames on Grassmann Manifold: Applicat |
IMAGE PROCESSING |
MATLAB |
754 |
HSC17M362 |
Turning Diffusion-Based Image Colorization Into Efficient Color Compression |
IMAGE PROCESSING |
MATLAB |
755 |
HSC17M364 |
Extended Selective Encryption of H.264/AVC (CABAC)- and HEVC-Encoded Video Streams |
IMAGE PROCESSING |
MATLAB |
756 |
HSC17M367 |
Moving Object Detection Using Tensor-Based Low-Rank and Saliently Fused-Sparse Decomposition |
IMAGE PROCESSING |
MATLAB |
757 |
HSC17M369 |
Adaptive Progressive Motion Vector Resolution Selection Based on Rate-Distortion Optimization |
IMAGE PROCESSING |
MATLAB |
758 |
HSC17M371 |
Haze Removal using the Difference-Structure-Preservation Prior |
IMAGE PROCESSING |
MATLAB |
759 |
HSC17M397 |
Joint Design of Energy-Efficient Clustering and Data Recovery for Wireless Sensor Networks |
WIRELESS COMMUNICATION |
MATLAB |
760 |
HSC17M400 |
Data-driven faulty node detection scheme for Wireless Sensor Networks |
WIRELESS COMMUNICATION |
MATLAB |
761 |
HSC17M650 |
Neuron Segmentation with High-Level Biological Priors |
IMAGE PROCESSING |
MATLAB |
762 |
HSC17N379 |
Maximizing Lifetime in Wireless Sensor Network for Structural Health Monitoring With and Without Ene |
WIRELESS COMMUNICATION |
NS2 |
763 |
HSC17N381 |
Energy Efficient Data Collection Scheme in Mobile Wireless Sensor Networks |
WIRELESS COMMUNICATION |
NS2 |
764 |
HSC17N386 |
Sink-Based Centralized Transmission Scheduling by Using Asymmetric Communication and Wake-Up Radio |
WIRELESS COMMUNICATION |
NS2 |
765 |
HSC17N388 |
Performance Optimization in Wireless Sensor Networks: A Novel Collaborative Compressed Sensing Appro |
WIRELESS COMMUNICATION |
NS2 |
766 |
HSC17N390 |
MEES: Mobile Energy Efficient Square Routing for Underwater Wireless Sensor Networks |
WIRELESS COMMUNICATION |
NS2 |
767 |
HSC17N394 |
Energy efficient mobile user tracking system with node activation mechanism using wireless sensor ne |
WIRELESS COMMUNICATION |
NS2 |
768 |
HSC17N403 |
Energy-Efficient Transmission Based on Compressive Sensing in WSN |
WIRELESS COMMUNICATION |
NS2 |
769 |
HSC17N410 |
In-Network On-Demand Query-Based Sensing System for Wireless Sensor Networks |
WIRELESS COMMUNICATION |
NS2 |
770 |
HSC17N411 |
Energy Management in LTE Networks |
WIRELESS COMMUNICATION |
NS2 |
771 |
HSC17N413 |
Game-Based Approach for QoS Provisioning and Interference Management in Heterogeneous Networks |
WIRELESS COMMUNICATION |
NS2 |
772 |
HSC17N415 |
An Efficient Cloud Market Mechanism for Computing Jobs With Soft Deadlines |
NETWORKING |
NS2 |
773 |
HSC17N418 |
Distributed Clustering-Task Scheduling for Wireless Sensor Networks Using Dynamic Hyper Round Policy |
MOBILE COMPUTING |
NS2 |
774 |
HSC17N420 |
A Delay-Sensitive Multicast Protocol for Network Capacity Enhancement in Multi-Rate MANETs |
MANET |
NS2 |
775 |
HSC17N421 |
A Scalable and Cooperative MAC Protocol for Control Channel Access in VANETs |
VANET |
NS2 |
776 |
HSC17N422 |
Transmission Performance Evaluation and Optimal Selection of Relay Vehicles in VANETs |
VANET |
NS2 |
777 |
HSC17P281 |
Online Website Builder |
APPLICATION |
PHP |
778 |
HSC17P282 |
Online Banking System |
APPLICATION |
PHP |
779 |
HSC17P283 |
Online Examination System |
APPLICATION |
PHP |
780 |
HSC17P285 |
Human Resource Management |
APPLICATION |
PHP |
781 |
HSC17P286 |
Vehicle Management System |
APPLICATION |
PHP |
782 |
HSC17P289 |
Social Networking in Website |
APPLICATION |
PHP |
783 |
HSC17P290 |
Automation of lap equipment and leave application |
APPLICATION |
PHP |
784 |
HSC17P291 |
Library Management Using E-Mail Transaction |
APPLICATION |
PHP |
785 |
HSC17P292 |
Heart Disease Prediction System Using Data Mining Clustering Techniques |
APPLICATION |
PHP |
786 |
HSC17V365 |
Library Management system |
APPLICATION |
VISUAL BASIC |
787 |
HSC17V367 |
Application for Word Processing |
APPLICATION |
VISUAL BASIC |
788 |
HSC17V372 |
Apartment Management Systems |
APPLICATION |
VISUAL BASIC |
789 |
HSC17V373 |
Hospital Management Systems |
APPLICATION |
VISUAL BASIC |
790 |
HSC17V374 |
Insurance Management System |
APPLICATION |
VISUAL BASIC |
791 |
HSC17V375 |
Pharmacy Management System |
APPLICATION |
VISUAL BASIC |
792 |
HSC17V376 |
Supermarket Management System |
APPLICATION |
VISUAL BASIC |
793 |
HSC17V377 |
Notepad with Instant Messaging Service |
APPLICATION |
VISUAL BASIC |
794 |
HSC17V378 |
Crime Investigation |
APPLICATION |
VISUAL BASIC |
795 |
HSC17V379 |
Student Time Table |
APPLICATION |
VISUAL BASIC |
796 |
HSC17V380 |
Computerized Information Software |
APPLICATION |
VISUAL BASIC |
797 |
HSC17V381 |
Employee Management System |
APPLICATION |
VISUAL BASIC |
798 |
HSC17V382 |
Hotel Management System |
APPLICATION |
VISUAL BASIC |
799 |
HSC17V383 |
Human Resources Management System |
APPLICATION |
VISUAL BASIC |
800 |
HSC17V384 |
Engineering Counseling |
APPLICATION |
VISUAL BASIC |
801 |
HSC17V385 |
Membership Management System |
APPLICATION |
VISUAL BASIC |
802 |
HSC17V386 |
Patient Care System |
APPLICATION |
VISUAL BASIC |
803 |
HSC17V387 |
File Utility |
APPLICATION |
VISUAL BASIC |
804 |
HSC17V388 |
Eye Bank Management System |
APPLICATION |
VISUAL BASIC |
805 |
HSC17V389 |
Intranet Mailing System |
APPLICATION |
VISUAL BASIC |
806 |
HSC17V390 |
Blood Bank Management System |
APPLICATION |
VISUAL BASIC |
807 |
HSC17V391 |
Query Analyzer |
APPLICATION |
VISUAL BASIC |
808 |
HSC17V392 |
Vehicle Maintenance System |
APPLICATION |
VISUAL BASIC |
809 |
HSC17V393 |
Passport Automation System |
APPLICATION |
VISUAL BASIC |
810 |
HSC17V394 |
Attendance Manager Using E–Card |
APPLICATION |
VISUAL BASIC |
811 |
HSC17V395 |
Student Information Reporting System |
APPLICATION |
VISUAL BASIC |
812 |
HSC17V396 |
Students Attendance System Using Barcode |
APPLICATION |
VISUAL BASIC |
813 |
HSC17V398 |
Unique Code Identification System |
APPLICATION |
VISUAL BASIC |
814 |
HSC17V399 |
Mobile Phone To Pc Communication |
APPLICATION |
VISUAL BASIC |
815 |
HSC17V400 |
Bluetooth Based Network Admin |
APPLICATION |
VISUAL BASIC |
816 |
HSC17V401 |
Black Dream |
APPLICATION |
VISUAL BASIC |
817 |
HSC17V403 |
XP Operating System In Mobile |
APPLICATION |
J2EE |
818 |
HSC18A01 |
A Secure Transaction Scheme with Certificateless Cryptographic Primitives for IoT-Based Mobile Payments |
IEEE Access |
ANDROID |
819 |
HSC18A02 |
Characterizing Privacy Risks of Mobile Apps with Sensitivity Analysis |
IEEE Access |
ANDROID |
820 |
HSC18A03 |
CodeTracker: A Lightweight Approach to Track and Protect Authorization Codes in SMS Messages |
IEEE Access |
ANDROID |
821 |
HSC18A04 |
Counter Measuring Conceivable Security Threats on Smart Healthcare Devices |
IEEE Access |
ANDROID |
822 |
HSC18A05 |
DELTA++: Reducing the Size of Android Application Updates |
INTERNET OF THINGS |
ANDROID |
823 |
HSC18A06 |
MoRe-Care: Mobile-Assisted Remote Healthcare Service Delivery |
Dependable and Secure Computing |
ANDROID |
824 |
HSC18A07 |
Text based Graphical Password System to Obscure Shoulder Surfing |
Dependable and Secure Computing |
ANDROID |
825 |
HSC18A08 |
A Tale of Two Fashions: An Empirical Study on the Performance of Native Apps and Web Apps on Android |
MOBILE COMPUTING |
ANDROID |
826 |
HSC18A09 |
Understanding In-app Ads and Detecting Hidden Attacks through the Mobile App-Web Interface |
MOBILE COMPUTING |
ANDROID |
827 |
HSC18A10 |
Ad Capsule: Practical Confinement of Advertisements in Android Applications |
Dependable and Secure Computing |
ANDROID |
828 |
HSC18A11 |
MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention |
Dependable and Secure Computing |
ANDROID |
829 |
HSC18A12 |
MalPat: Mining Patterns of Malicious and Benign Android Apps via Permission-Related APIs |
Dependable and Secure Computing |
ANDROID |
830 |
HSC18A13 |
A Shoulder Surfing Resistant Graphical Authentication System |
Dependable and Secure Computing |
ANDROID |
831 |
HSC18A14 |
Uncovering the Face of Android Ransomware: Characterization and Real-time Detection |
INFORMATION FORENSICS AND SECURITY |
ANDROID |
832 |
HSC18A15 |
Android User Privacy Preserving through Crowdsourcing |
INFORMATION FORENSICS AND SECURITY |
ANDROID |
833 |
HSC18A16 |
ShiftRoute: Achieving Location Privacy for Map Services on Smartphones |
VANET |
ANDROID |
834 |
HSC18A17 |
Significant Permission Identification for Machine Learning Based Android Malware Detection |
INTERNET OF THINGS |
ANDROID |
835 |
HSC18A18 |
DroidFusion: A Novel Multilevel Classifier Fusion Approach for Android Malware Detection |
Cybernetics |
ANDROID |
836 |
HSC18D01 |
A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage |
CLOUD COMPUTING |
ASP.NET |
837 |
HSC18D02 |
A New Lightweight Symmetric Searchable Encryption Scheme for String Identification |
CLOUD COMPUTING |
ASP.NET |
838 |
HSC18D03 |
Achieving Data Truthfulness and Privacy Preservation in Data Markets |
CLOUD COMPUTING |
ASP.NET |
839 |
HSC18D04 |
An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over Encrypted Cloud Data |
CLOUD COMPUTING |
ASP.NET |
840 |
HSC18D05 |
Anonymous and Traceable Group Data Sharing in Cloud Computing |
CLOUD COMPUTING |
ASP.NET |
841 |
HSC18D06 |
Block Design-based Key Agreement for Group Data Sharing in Cloud Computing |
CLOUD COMPUTING |
ASP.NET |
842 |
HSC18D07 |
Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing |
CLOUD COMPUTING |
ASP.NET |
843 |
HSC18D08 |
Ciphertext-Policy Attribute-Based Signcryption With Verifiable Outsourced Designcryption for Sharing Personal Health Records |
CLOUD COMPUTING |
ASP.NET |
844 |
HSC18D09 |
Cloud Storage for Electronic Health Records Based on Secret Sharing with Verifiable Reconstruction Outsourcing |
CLOUD COMPUTING |
ASP.NET |
845 |
HSC18D10 |
Efficient Regular Language Search for Secure Cloud Storage |
CLOUD COMPUTING |
ASP.NET |
846 |
HSC18D11 |
Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage |
CLOUD COMPUTING |
ASP.NET |
847 |
HSC18D12 |
Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage |
CLOUD COMPUTING |
ASP.NET |
848 |
HSC18D13 |
Secure and Efficient Product Information Retrieval in Cloud Computing |
CLOUD COMPUTING |
ASP.NET |
849 |
HSC18D14 |
Semantic-based Compound Keyword Search over Encrypted Cloud Data |
CLOUD COMPUTING |
ASP.NET |
850 |
HSC18D15 |
A Scalable Attribute-Based Access Control Scheme with Flexible Delegation cum Sharing of Access Privileges for Cloud Storage |
CLOUD COMPUTING |
ASP.NET |
851 |
HSC18D16 |
Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme over Encrypted Cloud Data |
CLOUD COMPUTING |
ASP.NET |
852 |
HSC18D17 |
Cost-Efficient Tasks and Data Co-Scheduling with AffordHadoop |
CLOUD COMPUTING |
ASP.NET |
853 |
HSC18D18 |
EDoS-ADS an Enhanced Mitigation Technique Against Economic Denial of Sustainability (EDoS) Attacks |
CLOUD COMPUTING |
ASP.NET |
854 |
HSC18D19 |
Efficient Proofs of Retrievability with Public Verifiability for Dynamic Cloud Storage |
CLOUD COMPUTING |
ASP.NET |
855 |
HSC18D20 |
Efficient Traceable Authorization Search System for Secure Cloud Storage |
CLOUD COMPUTING |
ASP.NET |
856 |
HSC18D21 |
Highly Efficient Linear Regression Outsourcing to a Cloud |
CLOUD COMPUTING |
ASP.NET |
857 |
HSC18D22 |
Securing Aggregate Queries for DNA Databases |
CLOUD COMPUTING |
ASP.NET |
858 |
HSC18D23 |
A Clinical Decision Support Framework for Heterogeneous Data Sources |
DATA MINING |
ASP.NET |
859 |
HSC18D24 |
Characterizing and Predicting Early Reviewers for Effective Product Marketing on E-Commerce Websites |
DATA MINING |
ASP.NET |
860 |
HSC18D25 |
Estimating Social Opinion Dynamics Models from Voting Records |
DATA MINING |
ASP.NET |
861 |
HSC18D26 |
Personalized Market Basket Prediction with Temporal Annotated Recurring Sequences |
DATA MINING |
ASP.NET |
862 |
HSC18D27 |
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Based Recommendation |
DATA MINING |
ASP.NET |
863 |
HSC18D28 |
Novel Machine Learning Algorithm for Spammer Identification in Industrial Mobile Cloud Computing |
Machine Learning |
ASP.NET |
864 |
HSC18D29 |
Analyzing and Detecting Money-Laundering Accounts in Online Social Networks |
NETWORKING |
ASP.NET |
865 |
HSC18D30 |
Detection of suicide-related posts in Twitter data streams |
NETWORKING |
ASP.NET |
866 |
HSC18D31 |
Event Detection and Identification of Influential Spreaders in Social Media Data Streams |
NETWORKING |
ASP.NET |
867 |
HSC18D32 |
Health Monitoring on Social Media over Time |
NETWORKING |
ASP.NET |
868 |
HSC18D33 |
Leveraging Affective Hashtags for Ranking Music Recommendations |
NETWORKING |
ASP.NET |
869 |
HSC18D34 |
GeTrust: A guarantee-based trust model in Chord-based P2P networks |
Dependable and Secure Computing |
ASP.NET |
870 |
HSC18D35 |
Latent-Data Privacy Preserving With Customized Data Utility for Social Network Data |
Dependable and Secure Computing |
ASP.NET |
871 |
HSC18D36 |
Searchable Encryption over Feature-Rich Data |
Dependable and Secure Computing |
ASP.NET |
872 |
HSC18D37 |
Credit Card Fraud Detection A Novel Approach Using Aggregation Strategy and Feedback Mechanism |
INTERNET OF THINGS |
ASP.NET |
873 |
HSC18D38 |
A UHF RFID based System for Children Tracking |
INTERNET OF THINGS |
ASP.NET |
874 |
HSC18D39 |
Efficient Privacy-preserving Scheme for Real-time Location Data in Vehicular Ad-hoc Network |
INTERNET OF THINGS |
ASP.NET |
875 |
HSC18D40 |
Low Power Data Integrity in IoT Systems |
INTERNET OF THINGS |
ASP.NET |
876 |
HSC18D41 |
Privacy-Preserving Content-Oriented Wireless Communication in Internet-of-Things |
INTERNET OF THINGS |
ASP.NET |
877 |
HSC18D42 |
Security and Privacy in Smart Health Efficient Policy-Hiding Attribute-Based Access Control |
INTERNET OF THINGS |
ASP.NET |
878 |
HSC18D43 |
Efficient Rectification of Distorted Fingerprints |
IMAGE PROCESSING |
ASP.NET |
879 |
HSC18D44 |
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams |
IMAGE PROCESSING |
ASP.NET |
880 |
HSC18D45 |
Scalable Access Control For Privacy-Aware Media Sharing |
IMAGE PROCESSING |
ASP.NET |
881 |
HSC18D46 |
A Developer Centered Bug Prediction Model |
Software Engineering |
ASP.NET |
882 |
HSC18D47 |
Enabling Probabilistic Differential Privacy Protection for Location Recommendations |
SERVICES COMPUTING |
ASP.NET |
883 |
HSC18D48 |
Flexible Wildcard Searchable Encryption System |
SERVICES COMPUTING |
ASP.NET |
884 |
HSC18D49 |
Transactional Behavior Verification in Business Process as a Service Configuration |
SERVICES COMPUTING |
ASP.NET |
885 |
HSC18D50 |
A Secure and Verifiable Access Control Scheme for Big Data Storage in clouds |
BIG DATA |
ASP.NET |
886 |
HSC18D51 |
AccountTrade: Accountability Against Dishonest Big Data Buyers and Sellers |
BIG DATA |
ASP.NET |
887 |
HSC18D52 |
Enabling Efficient User Revocation in Identity-based Cloud Storage Auditing for Shared Big Data |
Dependable and Secure Computing |
ASP.NET |
888 |
HSC18D53 |
Cloud Centric Authentication for Wearable Healthcare Monitoring System |
Dependable and Secure Computing |
ASP.NET |
889 |
HSC18D54 |
Multi-CDN Towards Privacy in Content Delivery Networks |
Dependable and Secure Computing |
ASP.NET |
890 |
HSC18D55 |
Multi-user Multi-Keyword Rank Search over Encrypted Data in Arbitrary Language |
Dependable and Secure Computing |
ASP.NET |
891 |
HSC18D56 |
Privacy Protection in Interactive Content Based Image Retrieval |
Dependable and Secure Computing |
ASP.NET |
892 |
HSC18D57 |
Privacy-Preserving Location Based Services Scheme Against Quantum Attacks |
Dependable and Secure Computing |
ASP.NET |
893 |
HSC18D58 |
Privacy-Preserving Outsourced Calculation Toolkit in the Cloud |
Dependable and Secure Computing |
ASP.NET |
894 |
HSC18D59 |
Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing |
Dependable and Secure Computing |
ASP.NET |
895 |
HSC18D60 |
On-Line Anomaly Detection With High Accuracy |
NETWORKING |
C#.NET |
896 |
HSC18D61 |
Taming Both Predictable and Unpredictable Link Failures for Network Tomography |
NETWORKING |
C#.NET |
897 |
HSC18J01 |
A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing |
CLOUD COMPUTING |
JAVA |
898 |
HSC18J02 |
A New Lightweight Symmetric Searchable Encryption Scheme for String Identification |
CLOUD COMPUTING |
JAVA |
899 |
HSC18J03 |
A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing |
CLOUD COMPUTING |
JAVA |
900 |
HSC18J04 |
Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data |
CLOUD COMPUTING |
JAVA |
901 |
HSC18J05 |
An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing |
CLOUD COMPUTING |
JAVA |
902 |
HSC18J06 |
An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over Encrypted Cloud Data |
CLOUD COMPUTING |
JAVA |
903 |
HSC18J07 |
Audit-Free Cloud Storage via Deniable Attribute-based Encryption |
CLOUD COMPUTING |
JAVA |
904 |
HSC18J08 |
Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing |
CLOUD COMPUTING |
JAVA |
905 |
HSC18J09 |
Chaotic Searchable Encryption for Mobile Cloud Storage |
CLOUD COMPUTING |
JAVA |
906 |
HSC18J10 |
CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics |
CLOUD COMPUTING |
JAVA |
907 |
HSC18J100 |
Low Power Data Integrity in IoT Systems |
INTERNET OF THINGS |
JAVA |
908 |
HSC18J101 |
Privacy-Preserving Content-Oriented Wireless Communication in Internet-of-Things |
INTERNET OF THINGS |
JAVA |
909 |
HSC18J102 |
Security and Privacy in Smart Health Efficient Policy-Hiding Attribute-Based Access Control |
INTERNET OF THINGS |
JAVA |
910 |
HSC18J103 |
Automatic Generation of Social Event Storyboard from Image Click-Through Data |
IMAGE PROCESSING |
JAVA |
911 |
HSC18J104 |
Joint Hypergraph Learning for Tag-based Image Retrieval |
IMAGE PROCESSING |
JAVA |
912 |
HSC18J105 |
Query-free Clothing Retrieval via Implicit Relevance Feedback |
IMAGE PROCESSING |
JAVA |
913 |
HSC18J106 |
A Developer Centered Bug Prediction Model |
Software Engineering |
JAVA |
914 |
HSC18J107 |
Lightweight Fine-Grained Search over Encrypted Data in Fog Computing |
SERVICES COMPUTING |
JAVA |
915 |
HSC18J108 |
A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds |
BIG DATA |
JAVA |
916 |
HSC18J109 |
AccountTrade: Accountability Against Dishonest Big Data Buyers and Sellers |
BIG DATA |
JAVA |
917 |
HSC18J11 |
Combining Data Owner-side and Cloud-side Access Control for Encrypted Cloud Storage |
CLOUD COMPUTING |
JAVA |
918 |
HSC18J110 |
Structural Balance Theory-based E-commerce Recommendation over Big Rating Data |
BIG DATA |
JAVA |
919 |
HSC18J111 |
A Comprehensive Trustworthy Data Collection Approach in Sensor-Cloud System |
BIG DATA |
JAVA |
920 |
HSC18J112 |
CityLines: Designing Hybrid Hub-and-Spoke Transit System with Urban Big Data |
BIG DATA |
JAVA |
921 |
HSC18J113 |
On Scalable and Robust Truth Discovery in Big Data Social Media Sensing Applications |
BIG DATA |
JAVA |
922 |
HSC18J114 |
Enabling Efficient User Revocation in Identity-based Cloud Storage Auditing for Shared Big Data |
Dependable and Secure Computing |
JAVA |
923 |
HSC18J115 |
Cloud Centric Authentication for Wearable Healthcare Monitoring System |
Dependable and Secure Computing |
JAVA |
924 |
HSC18J116 |
Multi-CDN Towards Privacy in Content Delivery Networks |
Dependable and Secure Computing |
JAVA |
925 |
HSC18J117 |
Multi-user Multi-Keyword Rank Search over Encrypted Data in Arbitrary Language |
Dependable and Secure Computing |
JAVA |
926 |
HSC18J118 |
Privacy Protection in Interactive Content Based Image Retrieval |
Dependable and Secure Computing |
JAVA |
927 |
HSC18J119 |
Privacy-Preserving Location Based Services Scheme Against Quantum Attacks |
Dependable and Secure Computing |
JAVA |
928 |
HSC18J12 |
CryptCloud+: Secure and Expressive Data Access Control for Cloud Storage |
CLOUD COMPUTING |
JAVA |
929 |
HSC18J120 |
Privacy-Preserving Outsourced Calculation Toolkit in the Cloud |
Dependable and Secure Computing |
JAVA |
930 |
HSC18J121 |
Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing |
Dependable and Secure Computing |
JAVA |
931 |
HSC18J122 |
A Hybrid Approach for Detecting Automated Spammers in Twitter |
Dependable and Secure Computing |
JAVA |
932 |
HSC18J123 |
A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network |
Dependable and Secure Computing |
JAVA |
933 |
HSC18J124 |
Anonymization of Sensitive Quasi-Identifiers for l-Diversity and t-Closeness |
Dependable and Secure Computing |
JAVA |
934 |
HSC18J125 |
Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks |
Dependable and Secure Computing |
JAVA |
935 |
HSC18J126 |
Exploiting Social Network to Enhance Human-to-Human Infection Analysis Without Privacy Leakage |
Dependable and Secure Computing |
JAVA |
936 |
HSC18J127 |
Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage |
INFORMATION FORENSICS AND SECURITY |
JAVA |
937 |
HSC18J128 |
Visual Secret Sharing Schemes Encrypting Multiple Images |
INFORMATION FORENSICS AND SECURITY |
JAVA |
938 |
HSC18J129 |
2-D Phase Demodulation for Deformable Fingerprint Registration |
INFORMATION FORENSICS AND SECURITY |
JAVA |
939 |
HSC18J13 |
DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security |
CLOUD COMPUTING |
JAVA |
940 |
HSC18J130 |
An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images |
INFORMATION FORENSICS AND SECURITY |
JAVA |
941 |
HSC18J131 |
A Concurrent Transmission Based Broadcast Scheme for Urban VANETs |
MOBILE COMPUTING |
JAVA |
942 |
HSC18J14 |
Efficient and Expressive Keyword Search Over Encrypted Data in Cloud |
CLOUD COMPUTING |
JAVA |
943 |
HSC18J15 |
Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices |
CLOUD COMPUTING |
JAVA |
944 |
HSC18J16 |
Efficient Retrieval over Documents Encrypted by Attributes in Cloud Computing |
CLOUD COMPUTING |
JAVA |
945 |
HSC18J17 |
Efficient Traceable Authorization Search System for Secure Cloud Storage |
CLOUD COMPUTING |
JAVA |
946 |
HSC18J18 |
Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage |
CLOUD COMPUTING |
JAVA |
947 |
HSC18J19 |
Identity-Based Private Matching over Outsourced Encrypted Datasets |
CLOUD COMPUTING |
JAVA |
948 |
HSC18J20 |
Inference Attack-Resistant E-Healthcare Cloud System with Fine-Grained Access Control |
CLOUD COMPUTING |
JAVA |
949 |
HSC18J21 |
Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage |
CLOUD COMPUTING |
JAVA |
950 |
HSC18J22 |
Privacy Preservation for Outsourced Medical Data With Flexible Access Control |
CLOUD COMPUTING |
JAVA |
951 |
HSC18J23 |
Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing |
CLOUD COMPUTING |
JAVA |
952 |
HSC18J24 |
Provably Secure Fine-Grained Data Access Control over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications |
CLOUD COMPUTING |
JAVA |
953 |
HSC18J25 |
Publicly Verifiable Boolean Query Over Outsourced Encrypted Data |
CLOUD COMPUTING |
JAVA |
954 |
HSC18J26 |
Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage |
CLOUD COMPUTING |
JAVA |
955 |
HSC18J27 |
Secure Data Group Sharing and Dissemination with Attribute and Time Conditions in Public Cloud |
CLOUD COMPUTING |
JAVA |
956 |
HSC18J28 |
Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in Cloud |
CLOUD COMPUTING |
JAVA |
957 |
HSC18J29 |
Semantic-aware Searching over Encrypted Data for Cloud Computing |
CLOUD COMPUTING |
JAVA |
958 |
HSC18J30 |
SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage |
CLOUD COMPUTING |
JAVA |
959 |
HSC18J31 |
SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the Cloud |
CLOUD COMPUTING |
JAVA |
960 |
HSC18J32 |
Towards Privacy-preserving Content-based Image Retrieval in cloud computing |
CLOUD COMPUTING |
JAVA |
961 |
HSC18J33 |
Unified Fine-grained Access Control for Personal Health Records in Cloud Computing |
CLOUD COMPUTING |
JAVA |
962 |
HSC18J34 |
A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage |
CLOUD COMPUTING |
JAVA |
963 |
HSC18J35 |
A Scalable Attribute-Based Access Control Scheme with Flexible Delegation cum Sharing of Access Privileges for Cloud Storage |
CLOUD COMPUTING |
JAVA |
964 |
HSC18J36 |
Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme over Encrypted Cloud Data |
CLOUD COMPUTING |
JAVA |
965 |
HSC18J37 |
Cost-Efficient Tasks and Data Co-Scheduling with AffordHadoop |
CLOUD COMPUTING |
JAVA |
966 |
HSC18J38 |
EDoS-ADS an Enhanced Mitigation Technique Against Economic Denial of Sustainability (EDoS) Attacks |
CLOUD COMPUTING |
JAVA |
967 |
HSC18J39 |
Efficient Proofs of Retrievability with Public Verifiability for Dynamic Cloud Storage |
CLOUD COMPUTING |
JAVA |
968 |
HSC18J40 |
Efficient Regular Language Search for Secure Cloud Storage |
CLOUD COMPUTING |
JAVA |
969 |
HSC18J41 |
Highly Efficient Linear Regression Outsourcing to a Cloud |
CLOUD COMPUTING |
JAVA |
970 |
HSC18J42 |
Securing Aggregate Queries for DNA Databases |
CLOUD COMPUTING |
JAVA |
971 |
HSC18J43 |
Characterizing and Predicting Early Reviewers for Effective Product Marketing on E-Commerce Websites |
DATA MINING |
JAVA |
972 |
HSC18J44 |
CoDetect: Financial Fraud Detection With Anomaly Feature Detection |
DATA MINING |
JAVA |
973 |
HSC18J45 |
Complementary Aspect-based Opinion Mining |
DATA MINING |
JAVA |
974 |
HSC18J46 |
Emotion Recognition on Twitter: Comparative Study and Training a Unison Model |
DATA MINING |
JAVA |
975 |
HSC18J47 |
Frequent Itemsets Mining With Differential Privacy Over Large-Scale Data |
DATA MINING |
JAVA |
976 |
HSC18J48 |
Health Monitoring on Social Media over Time |
DATA MINING |
JAVA |
977 |
HSC18J49 |
l-Injection: Toward Effective Collaborative Filtering Using Uninteresting Items |
DATA MINING |
JAVA |
978 |
HSC18J50 |
On Generalizing Collective Spatial Keyword Queries |
DATA MINING |
JAVA |
979 |
HSC18J51 |
Online Product Quantization |
DATA MINING |
JAVA |
980 |
HSC18J52 |
Privacy Characterization and Quantification in Data Publishing |
DATA MINING |
JAVA |
981 |
HSC18J53 |
Road Traffic Speed Prediction: A Probabilistic Model Fusing Multi-Source Data |
DATA MINING |
|
982 |
HSC18J54 |
Scalable Content-Aware Collaborative Filtering for Location Recommendation |
DATA MINING |
JAVA |
983 |
HSC18J55 |
SDE: A Novel Clustering Framework Based on Sparsity-Density Entropy |
DATA MINING |
JAVA |
984 |
HSC18J56 |
Search Result Diversity Evaluation based on Intent Hierarchies |
DATA MINING |
JAVA |
985 |
HSC18J57 |
When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks |
DATA MINING |
JAVA |
986 |
HSC18J58 |
A Comprehensive Study on Social Network Mental Disorders Detection via Online Social Media Mining |
Machine Learning |
JAVA |
987 |
HSC18J59 |
A Credibility Analysis System for Assessing Information on Twitter |
Machine Learning |
JAVA |
988 |
HSC18J60 |
A Novel Machine Learning Algorithm for Spammer Identification in Industrial Mobile Cloud Computing |
Machine Learning |
JAVA |
989 |
HSC18J61 |
Credit Card Fraud Detection Using AdaBoost and Majority Voting |
Machine Learning |
JAVA |
990 |
HSC18J62 |
Hate Speech on Twitter: A Pragmatic Approach to Collect Hateful and Offensive Expressions and Perform Hate Speech Detection |
Machine Learning |
JAVA |
991 |
HSC18J63 |
Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion Detection |
Machine Learning |
JAVA |
992 |
HSC18J64 |
Supervised and Unsupervised Aspect Category Detection for Sentiment Analysis With Co-Occurrence Data |
Machine Learning |
JAVA |
993 |
HSC18J65 |
Using Data Mining to Predict Hospital Admissions From the Emergency Department |
Machine Learning |
JAVA |
994 |
HSC18J66 |
Energy Efficient Link-Delay Aware Routing in Wireless Sensor Networks |
NETWORKING |
JAVA |
995 |
HSC18J67 |
GeTrust: A guarantee-based trust model in Chord-based P2P networks |
NETWORKING |
JAVA |
996 |
HSC18J68 |
PROVEST: Provenance-based Trust Model for Delay Tolerant Networks |
NETWORKING |
JAVA |
997 |
HSC18J69 |
Traffic and Energy Aware Routing for Heterogeneous Wireless Sensor Networks |
NETWORKING |
JAVA |
998 |
HSC18J70 |
Assuring String Pattern Matching in Outsourced Middleboxes |
NETWORKING |
JAVA |
999 |
HSC18J71 |
FUSO Fast Multi-Path Loss Recovery for Data Center Networks |
NETWORKING |
JAVA |
1000 |
HSC18J72 |
Oblivious Routing in IP Networks |
NETWORKING |
JAVA |
1001 |
HSC18J73 |
Privacy-Preserving Crowdsourced Spectrum Sensing |
NETWORKING |
JAVA |
1002 |
HSC18J74 |
Sponsoring Mobile Data Analyzing the Impact on Internet Stakeholders |
NETWORKING |
JAVA |
1003 |
HSC18J75 |
3-HBP: A Three-Level Hidden Bayesian Link Prediction Model in Social Networks |
NETWORKING |
JAVA |
1004 |
HSC18J76 |
Analyzing and Detecting Money-Laundering Accounts in Online Social Networks |
NETWORKING |
JAVA |
1005 |
HSC18J77 |
Detection of suicide-related posts in Twitter data streams |
NETWORKING |
JAVA |
1006 |
HSC18J78 |
Risk Assessment in Social Networks based on User Anomalous Behaviours |
NETWORKING |
JAVA |
1007 |
HSC18J79 |
Segregating Spammers and Unsolicited Bloggers from Genuine Experts on Twitter |
NETWORKING |
JAVA |
1008 |
HSC18J80 |
Semi-Supervised Spam Detection in Twitter Stream |
NETWORKING |
JAVA |
1009 |
HSC18J81 |
Distributed Faulty Node Detection in Delay Tolerant Networks: Design and Analysis |
MOBILE COMPUTING |
JAVA |
1010 |
HSC18J82 |
Efficient Privacy-Aware Authentication Scheme for Mobile Cloud computing services |
MOBILE COMPUTING |
JAVA |
1011 |
HSC18J83 |
Identifying On-site Users for Social Events: Mobility, Content, and Social Relationship |
MOBILE COMPUTING |
JAVA |
1012 |
HSC18J84 |
Protecting Location Privacy for Task Allocation in Ad Hoc Mobile Cloud Computing |
MOBILE COMPUTING |
JAVA |
1013 |
HSC18J85 |
A Data Parasitizing Scheme for Effective Health Monitoring in Wireless Body Area Networks |
MOBILE COMPUTING |
JAVA |
1014 |
HSC18J86 |
Attacker-Centric View of a Detection Game Against Advanced Persistent Threats |
MOBILE COMPUTING |
JAVA |
1015 |
HSC18J87 |
Dolphin Real-Time Hidden Acoustic Signal Capture with Smartphones |
MOBILE COMPUTING |
JAVA |
1016 |
HSC18J88 |
Efficient Locality Classification for Indoor Fingerprint-based Systems |
MOBILE COMPUTING |
JAVA |
1017 |
HSC18J89 |
KEH-Gait Using Kinetic Energy Harvesting for Gait-based User Authentication Systems |
MOBILE COMPUTING |
JAVA |
1018 |
HSC18J90 |
Scheduling Advertisement Delivery in Vehicular Networks |
MOBILE COMPUTING |
JAVA |
1019 |
HSC18J91 |
Service Provisioning in Mobile Environments through Opportunistic Computing |
MOBILE COMPUTING |
JAVA |
1020 |
HSC18J92 |
Relevant Feedback Based Accurate and Intelligent Retrieval on Capturing User Intention for Personalized Websites |
DATA MINING |
JAVA |
1021 |
HSC18J93 |
Trust-based Collaborative Privacy Management in Online Social Networks |
INFORMATION FORENSICS AND SECURITY |
JAVA |
1022 |
HSC18J94 |
Cloud-based Fine-grained Health Information Access Control Framework for Lightweight IoT Devices with Dynamic Auditing and Attribute Revocation |
INTERNET OF THINGS |
JAVA |
1023 |
HSC18J95 |
Light-Weight Security and Data Provenance for Multi-Hop Internet of Things |
INTERNET OF THINGS |
JAVA |
1024 |
HSC18J96 |
MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things |
INTERNET OF THINGS |
JAVA |
1025 |
HSC18J97 |
Credit Card Fraud Detection A Novel Approach Using Aggregation Strategy and Feedback Mechanism |
INTERNET OF THINGS |
JAVA |
1026 |
HSC18J98 |
A UHF RFID based System for Children Tracking |
INTERNET OF THINGS |
JAVA |
1027 |
HSC18J99 |
Efficient Privacy-preserving Scheme for Real-time Location Data in Vehicular Ad-hoc Network |
INTERNET OF THINGS |
JAVA |
1028 |
HSC18M01 |
A Gabor Feature-Based Quality Assessment Model for the Screen Content Images |
IMAGE PROCESSING |
MATLAB |
1029 |
HSC18M02 |
Blurriness-Guided Unsharp Masking |
IMAGE PROCESSING |
MATLAB |
1030 |
HSC18M03 |
FFDNet Toward a Fast and Flexible Solution for CNN-Based Image Denoising |
IMAGE PROCESSING |
MATLAB |
1031 |
HSC18M04 |
Interacting Tracklets for Multi-Object Tracking |
IMAGE PROCESSING |
MATLAB |
1032 |
HSC18M05 |
Joint Hypergraph Learning for Tag-Based Image Retrieval |
IMAGE PROCESSING |
MATLAB |
1033 |
HSC18M06 |
Landmark Free Face Attribute Prediction |
IMAGE PROCESSING |
MATLAB |
1034 |
HSC18M07 |
Pulmonary Artery-Vein Classification in CT Images |
IMAGE PROCESSING |
MATLAB |
1035 |
HSC18M08 |
Retinal Microaneurysms Detection using Local Convergence Features |
IMAGE PROCESSING |
MATLAB |
1036 |
HSC18M09 |
Ant Colony Technique for Optimizing the Order of Cascaded SVM Classifier for Sunflower Seed Classification |
IMAGE PROCESSING |
MATLAB |
1037 |
HSC18M10 |
Automatic Skin Lesion Segmentation Using Deep Fully Convolutional Networks with Jaccard Distance |
IMAGE PROCESSING |
MATLAB |
1038 |
HSC18M11 |
Robust Lane Detection and Tracking for Real-Time Applications |
IMAGE PROCESSING |
MATLAB |
1039 |
HSC18M12 |
Automated Non-Invasive Measurement of Single Sperm’s Motility and Morphology |
BIOMEDICAL PROCESSING |
MATLAB |
1040 |
HSC18M13 |
Disc-aware Ensemble Network for Glaucoma Screening from Fundus Image |
BIOMEDICAL PROCESSING |
MATLAB |
1041 |
HSC18M14 |
DRINet for Medical Image Segmentation |
BIOMEDICAL PROCESSING |
MATLAB |
1042 |
HSC18M15 |
Pulmonary Artery-Vein Classification in CT Images Using Deep Learning |
BIOMEDICAL PROCESSING |
MATLAB |
1043 |
HSC18M16 |
Structure-preserving Guided Retinal Image Filtering and Its Application for Optic Disc Analysis |
BIOMEDICAL PROCESSING |
MATLAB |
1044 |
HSC18M17 |
Unsupervised Reverse Domain Adaptation for Synthetic Medical Images via Adversarial Training |
BIOMEDICAL PROCESSING |
MATLAB |
1045 |
HSC18PY01 |
A Comprehensive Study on Social Network Mental Disorders Detection via Online Social Media Mining |
Machine Learning |
PYTHON |
1046 |
HSC18PY02 |
A General Framework for Implicit and Explicit Social Recommendation |
Machine Learning |
PYTHON |
1047 |
HSC18PY03. |
Achieving Data Truthfulness and Privacy Preservation in Data Markets |
DATA MINING |
PYTHON |
1048 |
HSC18PY05 |
Frequent Itemsets Mining With Differential Privacy Over Large-Scale Data |
DATA MINING |
PYTHON |
1049 |
HSC18PY06 |
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Based Recommendation |
DATA MINING |
PYTHON |
1050 |
HSC18PY07 |
Scalable Content-Aware Collaborative Filtering for Location Recommendation |
DATA MINING |
PYTHON |
1051 |
HSC18PY08 |
CompetitiveBike: Competitive Analysis and Popularity Prediction of Bike-Sharing Apps Using Multi-Source Data |
MOBILE COMPUTING |
PYTHON |
1052 |
HSC18PY09 |
Weakly-supervised Deep Embedding for Product Review Sentiment Analysis |
DATA MINING |
PYTHON |
1053 |
HSC19A001 |
Be Safe Application in Android |
APPLICATION |
ANDROID |
1054 |
HSC19A021 |
Be Safe Application in Android |
APPLICATION |
ANDROID |
1055 |
HSC19A022 |
Active Authentication on Mobile Devices via Stylometry Application |
APPLICATION |
ANDROID |
1056 |
HSC19A023 |
Android Based Solution for Indian Agriculture |
APPLICATION |
ANDROID |
1057 |
HSC19A024 |
Drive Now Text Later Nonintrusive Texting-While-Driving Detection Using Smartphones |
APPLICATION |
ANDROID |
1058 |
HSC19A025 |
DrivingStyles A Mobile Platform for Driving Styles and Fuel Consumption Characterization |
APPLICATION |
ANDROID |
1059 |
HSC19A026 |
Farmer App For Agri Farm Product Trade |
APPLICATION |
ANDROID |
1060 |
HSC19A027 |
GreenDroid Automated Diagnosis of Energy Inefficiency for Smartphone Applications |
APPLICATION |
ANDROID |
1061 |
HSC19A028 |
KCC Loan Scheme In Cooperative Society Bank |
APPLICATION |
ANDROID |
1062 |
HSC19A029 |
Medicine Validity Checker |
APPLICATION |
ANDROID |
1063 |
HSC19A030 |
Nearest ATM Mobile Navigation Through Global Positioning System |
APPLICATION |
ANDROID |
1064 |
HSC19A031 |
Secure Fine Payment For Traffic Violation |
APPLICATION |
ANDROID |
1065 |
HSC19A032 |
Silent Profile Killer Using Android Mobile |
APPLICATION |
ANDROID |
1066 |
HSC19A033 |
Smart Indoor Location System |
APPLICATION |
ANDROID |
1067 |
HSC19A034 |
Sports Management |
APPLICATION |
ANDROID |
1068 |
HSC19A036 |
A Shoulder Surfing Resistant Graphical Authentication System |
APPLICATION |
ANDROID |
1069 |
HSC19D001 |
Enabling User Revocation In Cloud Storage |
APPLICATION |
ASP.NET |
1070 |
HSC19D002 |
Public for Auditing End Devices In Cloud |
APPLICATION |
ASP.NET |
1071 |
HSC19D003 |
Automated Phrase Mining from Massive Text Corpora |
APPLICATION |
ASP.NET |
1072 |
HSC19D004 |
Car Rental System |
APPLICATION |
ASP.NET |
1073 |
HSC19D005 |
Asset Management System |
APPLICATION |
ASP.NET |
1074 |
HSC19D006 |
Recycle Box |
APPLICATION |
ASP.NET |
1075 |
HSC19D007 |
Regenerating-Code-Based Cloud Storage |
APPLICATION |
ASP.NET |
1076 |
HSC19D008 |
Online Home Decoration |
APPLICATION |
ASP.NET |
1077 |
HSC19D009 |
Online Voting System Using OTP |
APPLICATION |
ASP.NET |
1078 |
HSC19D010 |
Online Engineering Counselling For Students |
APPLICATION |
ASP.NET |
1079 |
HSC19D011 |
Hospital Care Management System |
APPLICATION |
ASP.NET |
1080 |
HSC19D012 |
Temporary Keyword Search for Secure Cloud Storage |
APPLICATION |
ASP.NET |
1081 |
HSC19D013 |
Data sharing with sensitive information hiding for secure cloud storage |
APPLICATION |
ASP.NET |
1082 |
HSC19D014 |
Insider Attacks in Untrusted Infrastructure-as-a-Service Clouds |
APPLICATION |
ASP.NET |
1083 |
HSC19D015 |
A Broadcast for urban VANETs |
APPLICATION |
C#.NET |
1084 |
HSC19D016 |
Privacy for Real-time Location Data in VANETs |
APPLICATION |
C#.NET |
1085 |
HSC19D017 |
RFID based System For Children Tracking |
APPLICATION |
C#.NET |
1086 |
HSC19D018 |
Online Anomaly Detection With High Accuracy |
APPLICATION |
C#.NET |
1087 |
HSC19D019 |
Taming Both Predicate and unpredictable link failures from network |
APPLICATION |
C#.NET |
1088 |
HSC19D020 |
Detecting Provenance Forgery and Packet Drop Attacks |
APPLICATION |
C#.NET |
1089 |
HSC19J037 |
Event Management In College Campus |
APPLICATION |
JAVA |
1090 |
HSC19J038 |
e-Based Voting System Using Aadhar Data |
APPLICATION |
JAVA |
1091 |
HSC19J039 |
Energy-Efficient Link Selection and Transmission Scheduling in Mobile Cloud Computing |
APPLICATION |
JAVA |
1092 |
HSC19J040 |
Enabling Efficient User Revocation in Identity-based Cloud Storage Auditing for Shared Big Data |
APPLICATION |
JAVA |
1093 |
HSC19J041 |
A Concurrent Transmission Based Broadcast Scheme for Urban VANETs |
APPLICATION |
JAVA |
1094 |
HSC19J042 |
Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage |
APPLICATION |
JAVA |
1095 |
HSC19J043 |
A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage |
APPLICATION |
JAVA |
1096 |
HSC19J044 |
Efficient Traceable Authorization Search System for Secure Cloud Storage |
APPLICATION |
JAVA |
1097 |
HSC19J045 |
Visual Secret Sharing Schemes Encrypting Multiple Images |
APPLICATION |
JAVA |
1098 |
HSC19J046 |
Leakage Resilient Leveled FHE on Multiple Bit Message |
APPLICATION |
JAVA |
1099 |
HSC19M048 |
3D Fast Automatic Segmentation of Kidney Based on Modified AAM and Random Forest |
APPLICATION |
MATLAB |
1100 |
HSC19M049 |
Context-Dependent Logo Matching and Recognition |
APPLICATION |
MATLAB |
1101 |
HSC19M050 |
Crop Yield Estimation Based on Unsupervised Linear Unmixing of Multidate Hyperspectral Imagery |
APPLICATION |
MATLAB |
1102 |
HSC19M051 |
Liver Segmentation on CT and MR Using Laplacian Mesh Optimization |
APPLICATION |
MATLAB |
1103 |
HSC19M052 |
Moving Camera Background-Subtraction for Obstacle Detection on Railway Tracks |
APPLICATION |
MATLAB |
1104 |
HSC19M053 |
Tuberculosis Detection Using Lung CT Image CNN |
APPLICATION |
MATLAB |
1105 |
HSC19M054 |
Automatic Skin Lesion Segmentation Using Deep Fully Convolutional Networks With Jaccard Distance |
APPLICATION |
MATLAB |
1106 |
HSC19M055 |
Landmark Free Face Attribute Prediction |
APPLICATION |
MATLAB |
1107 |
HSC19M056 |
Retinal Microaneurysms Detection Using Local Convergence Features |
APPLICATION |
MATLAB |
1108 |
HSC19M057 |
Driver Fatigue Detection Based on Eye |
APPLICATION |
MATLAB |
1109 |
HSC19P058 |
Alumni Portal |
APPLICATION |
PHP |
1110 |
HSC19P059 |
Bank Security Using RFID & IRIS Tecnology |
APPLICATION |
PHP |
1111 |
HSC19P060 |
Nymble Management System |
APPLICATION |
PHP |
1112 |
HSC19P061 |
College Social Network |
APPLICATION |
PHP |
1113 |
HSC19P062 |
Home Security Alert |
APPLICATION |
PHP |
1114 |
HSC19P063 |
Social Network in Website |
APPLICATION |
PHP |
1115 |
HSC19P064 |
College Event Management |
APPLICATION |
PHP |
1116 |
HSC19P065 |
Smart Indoor Location System |
APPLICATION |
PHP |
1117 |
HSC19P066 |
College Management System |
APPLICATION |
PHP |
1118 |
HSC19P067 |
Placement Automation System |
APPLICATION |
PHP |
1119 |
HSC1A9035 |
Word Search Game for Android Document |
APPLICATION |
ANDROID |
1120 |
HSC20A001 |
Digital Grama Panchayath Service |
APPLICATION |
ANDROID |
1121 |
HSC20A002 |
Food Order Management |
APPLICATION |
ANDROID |
1122 |
HSC20A003 |
Medical Emergency Caller App |
APPLICATION |
ANDROID |
1123 |
HSC20A004 |
Medicine Information Retrieval |
APPLICATION |
ANDROID |
1124 |
HSC20A005 |
Mobile Application For Grievance Redressal |
APPLICATION |
ANDROID |
1125 |
HSC20A006 |
Mobile Security |
APPLICATION |
ANDROID |
1126 |
HSC20A007 |
Object Detection Using DNN on Android Device |
APPLICATION |
ANDROID |
1127 |
HSC20A008 |
On Road Vehicle Breakdown Assistance |
APPLICATION |
ANDROID |
1128 |
HSC20A009 |
Sangrakshak Security App |
APPLICATION |
ANDROID |
1129 |
HSC20A010 |
Student Fingerprint Authentication with Attendance |
APPLICATION |
ANDROID |
1130 |
HSC20A011 |
Student Faculty Document Sharing Application |
APPLICATION |
ANDROID |
1131 |
HSC20A012 |
Women Harassment Safety |
APPLICATION |
ANDROID |
1132 |
HSC20A013 |
Women Security App |
APPLICATION |
ANDROID |
1133 |
HSC20A014 |
Word Search Game for Android Document |
APPLICATION |
ANDROID |
1134 |
HSC20A015 |
An Indoor Position-Estimation Algorithm Using Smartphone |
APPLICATION |
ANDROID |
1135 |
HSC20A016 |
Pro Music Player Application |
APPLICATION |
ANDROID |
1136 |
HSC20A017 |
News Feed Reader In Android |
APPLICATION |
ANDROID |
1137 |
HSC20A018 |
Task Manager Application |
APPLICATION |
ANDROID |
1138 |
HSC20A019 |
Medical Adviser Application In Android |
APPLICATION |
ANDROID |
1139 |
HSC20A020 |
Online Shopping Application In Android |
APPLICATION |
ANDROID |
1140 |
HSC20A021 |
Chess Game Application In Android |
APPLICATION |
ANDROID |
1141 |
HSC20A022 |
Car Rental System |
APPLICATION |
ANDROID |
1142 |
HSC20A023 |
Online Quiz Master Game |
APPLICATION |
ANDROID |
1143 |
HSC20A024 |
Tap The Bunny Game In Android |
APPLICATION |
ANDROID |
1144 |
HSC20A025 |
TEACHER CLASSROOM ASSISTANT IN ANDROID |
APPLICATION |
ANDROID |
1145 |
HSC20D001 |
Big Data and Emergency Management Concepts Methodologies and Applications |
BIG DATA |
ASP.NET |
1146 |
HSC20D001 |
Traffic Accident Record Management System |
APPLICATION |
ASP.NET |
1147 |
HSC20D002 |
Dynamic Entity-based Named Entity Recognition Under Unconstrained Tagging Schemes |
BIG DATA |
ASP.NET |
1148 |
HSC20D002 |
E-Tender |
APPLICATION |
ASP.NET |
1149 |
HSC20D003 |
LSTM based Phishing Detection for Big Email Data |
BIG DATA |
ASP.NET |
1150 |
HSC20D003 |
Detecting Spam User |
APPLICATION |
ASP.NET |
1151 |
HSC20D004 |
Predicting Urban Water Quality with Ubiquitous Data - A Data-driven Approach |
BIG DATA |
ASP.NET |
1152 |
HSC20D004 |
E-Commerce Website with Bargaining |
APPLICATION |
ASP.NET |
1153 |
HSC20D005 |
Sense and Sensibility Characterizing Social Media Users Regarding the Use of Controversial Terms for COVID-19 |
BIG DATA |
ASP.NET |
1154 |
HSC20D005 |
Dr-Finder |
APPLICATION |
ASP.NET |
1155 |
HSC20D006 |
Urban Anomaly Analytics Description, Detection and Prediction |
BIG DATA |
ASP.NET |
1156 |
HSC20D006 |
Book Lending Card |
APPLICATION |
ASP.NET |
1157 |
HSC20D007 |
Blood Management System Area Based Search |
APPLICATION |
ASP.NET |
1158 |
HSC20D007 |
An Edge Computing Matching Framework with Guaranteed Quality of Service |
CLOUD COMPUTING |
ASP.NET |
1159 |
HSC20D008 |
Traffic Squad : Penality Collection and Management |
APPLICATION |
ASP.NET |
1160 |
HSC20D008 |
Architectural Design of Cloud Applications a Performance aware Cost Minimization Approach |
CLOUD COMPUTING |
ASP.NET |
1161 |
HSC20D009 |
Gadgets Rental Website |
APPLICATION |
ASP.NET |
1162 |
HSC20D009 |
Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT |
CLOUD COMPUTING |
ASP.NET |
1163 |
HSC20D010 |
Net Classified |
APPLICATION |
ASP.NET |
1164 |
HSC20D010 |
Authentication and Key Agreement Based on Anonymous Identity for Peer-to-Peer Cloud |
CLOUD COMPUTING |
ASP.NET |
1165 |
HSC20D011 |
Cloud-based Privacy-Preserving Collaborative Consumption for Sharing Economy |
CLOUD COMPUTING |
ASP.NET |
1166 |
HSC20D012 |
Complying with Data Handling Requirements in Cloud Storage Systems |
CLOUD COMPUTING |
ASP.NET |
1167 |
HSC20D013 |
Congestion-aware Traffic Allocation for Geo-distributed Data Centers |
CLOUD COMPUTING |
ASP.NET |
1168 |
HSC20D014 |
Cost-Effective App User Allocation in an Edge Computing Environment |
CLOUD COMPUTING |
ASP.NET |
1169 |
HSC20D015 |
Designing Secure and Efficient Biometric-Based Secure Access Mechanism for Cloud Services |
CLOUD COMPUTING |
ASP.NET |
1170 |
HSC20D016 |
DNA Similarity Search with Access Control over Encrypted Cloud Data |
CLOUD COMPUTING |
ASP.NET |
1171 |
HSC20D017 |
Dynamic resource allocation method based on Symbiotic Organism Search algorithm in cloud computing |
CLOUD COMPUTING |
ASP.NET |
1172 |
HSC20D018 |
Dynamic Resource Orchestration for Service Capability Maximization in Fog-Enabled Connected Vehicle Networks |
CLOUD COMPUTING |
ASP.NET |
1173 |
HSC20D019 |
Efficient IoT Management with Resilience to Unauthorized Access to Cloud Storage |
CLOUD COMPUTING |
ASP.NET |
1174 |
HSC20D020 |
Enabling Cost-Effective, SLO-Aware Machine Learning Inference Serving on Public Cloud |
CLOUD COMPUTING |
ASP.NET |
1175 |
HSC20D021 |
FADA A Cloud-fog-edge Architecture and Ontology for Data Acquisition |
CLOUD COMPUTING |
ASP.NET |
1176 |
HSC20D022 |
Fast Secure and Anonymous Key Agreement Against Bad Randomness for Cloud Computing |
CLOUD COMPUTING |
ASP.NET |
1177 |
HSC20D023 |
Fine-grained Query Authorization with Integrity Verification over Encrypted Spatial Data in Cloud Storage |
CLOUD COMPUTING |
ASP.NET |
1178 |
HSC20D024 |
Geography-Aware Task Scheduling for Profit Maximization in Distributed Green Data Centers |
CLOUD COMPUTING |
ASP.NET |
1179 |
HSC20D025 |
Joint Optimization of VNF Placement and Flow Scheduling in Mobile Core Network |
CLOUD COMPUTING |
ASP.NET |
1180 |
HSC20D026 |
Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-based VANETs |
CLOUD COMPUTING |
ASP.NET |
1181 |
HSC20D027 |
PKE-MET Public-Key Encryption with Multi-Ciphertext Equality Test in Cloud Computing |
CLOUD COMPUTING |
ASP.NET |
1182 |
HSC20D028 |
Privacy-preserving Efficient Verifiable Deep Packet Inspection for Cloud-assisted Middlebox |
CLOUD COMPUTING |
ASP.NET |
1183 |
HSC20D029 |
Privacy-preserving Medical Treatment System through Nondeterministic Finite Automata |
CLOUD COMPUTING |
ASP.NET |
1184 |
HSC20D030 |
Privacy-Preserving Subgraph Matching Scheme with Authentication in Social Networks |
CLOUD COMPUTING |
ASP.NET |
1185 |
HSC20D031 |
QuickN Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data |
CLOUD COMPUTING |
ASP.NET |
1186 |
HSC20D032 |
Resource Allocation for Cloud-Based Software Services Using Prediction-Enabled Feedback Control with Reinforcement Learning |
CLOUD COMPUTING |
ASP.NET |
1187 |
HSC20D033 |
Resource Usage Cost Optimization in Cloud Computing Using Machine Learning |
CLOUD COMPUTING |
ASP.NET |
1188 |
HSC20D034 |
Secure Cloud Storage with Data Dynamics Using Secure Network Coding Techniques |
CLOUD COMPUTING |
ASP.NET |
1189 |
HSC20D035 |
Secure Similarity Search over Encrypted Non-Uniform Datasets |
CLOUD COMPUTING |
ASP.NET |
1190 |
HSC20D036 |
SecureAD A Secure Video Anomaly Detection Framework on Convolutional Neural Network in Edge Computing Environment |
CLOUD COMPUTING |
ASP.NET |
1191 |
HSC20D037 |
Similarity Search for Encrypted Images in Secure Cloud Computing |
CLOUD COMPUTING |
ASP.NET |
1192 |
HSC20D038 |
Threshold Multi-keyword Search for Cloud-Based Group Data Sharing |
CLOUD COMPUTING |
ASP.NET |
1193 |
HSC20D039 |
Tight Bound on Incnetive Ratio for Sybil Attack in Resource Sharing System |
CLOUD COMPUTING |
ASP.NET |
1194 |
HSC20D040 |
Achieving Secure and Dynamic Range Queries Over Encrypted Cloud Data |
DATA MINING |
ASP.NET |
1195 |
HSC20D041 |
Activity Organization for Friend-Making Optimization in Online Social Networks |
DATA MINING |
ASP.NET |
1196 |
HSC20D043 |
Deep Learning Driven Venue Recommender for Event-Based Social Networks |
DATA MINING |
ASP.NET |
1197 |
HSC20D044 |
Deep Learning for Adverse Event Detection from Web Search |
DATA MINING |
ASP.NET |
1198 |
HSC20D045 |
Distributed Multimodal Path Queries |
DATA MINING |
ASP.NET |
1199 |
HSC20D046 |
Efficient Processing of Group Planning Queries Over Spatial-Social Networks |
DATA MINING |
ASP.NET |
1200 |
HSC20D047 |
Efficiently Processing Spatial and Keyword Queries in Indoor Venues |
DATA MINING |
ASP.NET |
1201 |
HSC20D048 |
ESA-Stream: Efficient Self-Adaptive Online Data Stream Clustering |
DATA MINING |
ASP.NET |
1202 |
HSC20D049 |
Exploiting Data Skew for Improved Query Performance |
DATA MINING |
ASP.NET |
1203 |
HSC20D050 |
Item Recommendation for Word-of-Mouth Scenario in Social E-Commerce |
DATA MINING |
ASP.NET |
1204 |
HSC20D051 |
Learning to Rerank Schema Matches |
DATA MINING |
ASP.NET |
1205 |
HSC20D052 |
LShape Partitioning: Parallel Skyline Query Processing using MapReduce |
DATA MINING |
ASP.NET |
1206 |
HSC20D053 |
MAS-Encryption and Its Applications in Privacy-Preserving Classifiers |
DATA MINING |
ASP.NET |
1207 |
HSC20D054 |
Named Entity Location Prediction Combining Twitter and Web |
DATA MINING |
ASP.NET |
1208 |
HSC20D055 |
On Nearby-Fit Spatial Keyword Queries |
DATA MINING |
ASP.NET |
1209 |
HSC20D056 |
Online Pricing with Reserve Price Constraint for Personal Data Markets |
DATA MINING |
ASP.NET |
1210 |
HSC20D057 |
Privacy Preserving Location Data Publishing: A Machine Learning Approach |
DATA MINING |
ASP.NET |
1211 |
HSC20D058 |
Secure and Efficient Outsourced k-Means Clustering using Fully Homomorphic Encryption with Ciphertext Packing Technique |
DATA MINING |
ASP.NET |
1212 |
HSC20D059 |
Skyline Diagram: Efficient Space Partitioning for Skyline Queries |
DATA MINING |
ASP.NET |
1213 |
HSC20D060 |
Stream Processing of Shortest Path Query in Dynamic Road Networks |
DATA MINING |
ASP.NET |
1214 |
HSC20D061 |
Towards De-Anonymization of Google Play Search Rank Fraud |
DATA MINING |
ASP.NET |
1215 |
HSC20D062 |
Towards Understanding the Instability of Network Embedding |
DATA MINING |
ASP.NET |
1216 |
HSC20D063 |
Truth Discovery by Claim and Source Embedding |
DATA MINING |
ASP.NET |
1217 |
HSC20D064 |
A Verifiable Semantic Searching Scheme by Optimal Matching Over Encrypted Data in Public Cloud |
INFORMATION FORENSICS AND SECURITY |
ASP.NET |
1218 |
HSC20D065 |
An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning |
INFORMATION FORENSICS AND SECURITY |
C#.NET |
1219 |
HSC20D066 |
Dense Registration and Mosaicking of Fingerprints by Training an End-to-End Network |
INFORMATION FORENSICS AND SECURITY |
C#.NET |
1220 |
HSC20D067 |
Fine-Grained Facial Expression Recognition in the Wild |
INFORMATION FORENSICS AND SECURITY |
C#.NET |
1221 |
HSC20D068 |
Fingerprint Spoof Detector Generalization |
INFORMATION FORENSICS AND SECURITY |
C#.NET |
1222 |
HSC20D069 |
Minimizing Embedding Impact for H.264 Steganography by Progressive Trellis Coding |
INFORMATION FORENSICS AND SECURITY |
C#.NET |
1223 |
HSC20D070 |
Periocular-Assisted Multi-Feature Collaboration for Dynamic Iris Recognition |
INFORMATION FORENSICS AND SECURITY |
C#.NET |
1224 |
HSC20D072 |
Robust Iris Presentation Attack Detection Fusing 2D and 3D Information |
INFORMATION FORENSICS AND SECURITY |
C#.NET |
1225 |
HSC20D073 |
Smart and Practical Privacy-Preserving Data Aggregation for Fog-Based Smart Grids |
INFORMATION FORENSICS AND SECURITY |
C#.NET |
1226 |
HSC20D074 |
Soft Semantic Representation for Cross-Domain Face Recognition |
INFORMATION FORENSICS AND SECURITY |
C#.NET |
1227 |
HSC20D075 |
Sum Secret Key Rate Maximization for TDD Multi-User Massive MIMO Wireless Networks |
INFORMATION FORENSICS AND SECURITY |
C#.NET |
1228 |
HSC20D076 |
TDOA Source-Localization Technique Robust to Time-Synchronization Attacks |
INFORMATION FORENSICS AND SECURITY |
C#.NET |
1229 |
HSC20D077 |
A Flexible and Lightweight Group Authentication Scheme |
INTERNET OF THINGS |
ASP.NET |
1230 |
HSC20D078 |
A Flexible Privacy-Preserving Data Sharing Scheme in Cloud-assisted IoT |
INTERNET OF THINGS |
ASP.NET |
1231 |
HSC20D080 |
A Secure and Efficient Cloud-Centric Internet-of-Medical-Things-Enabled Smart Healthcare System With Public Verifiability |
INTERNET OF THINGS |
ASP.NET |
1232 |
HSC20D081 |
An Efficient Protocol of Queries for Large and Small Categories in RFID Systems |
INTERNET OF THINGS |
ASP.NET |
1233 |
HSC20D082 |
CMRDF: A Real-Time Food Alerting System Based on Multimodal Data |
INTERNET OF THINGS |
ASP.NET |
1234 |
HSC20D083 |
Comprehensive Analysis on Least Squares Lateration for Indoor Positioning Systems |
INTERNET OF THINGS |
ASP.NET |
1235 |
HSC20D084 |
Efficient and Secure Certificateless Aggregate Signature based Authentication Scheme for Vehicular Ad-hoc Networks |
INTERNET OF THINGS |
ASP.NET |
1236 |
HSC20D085 |
Enhancing Future Classroom Environments Based on Systems of Systems and the Internet of Anything |
INTERNET OF THINGS |
ASP.NET |
1237 |
HSC20D087 |
Fast and Reliable Dynamic Tag Estimation in Large-Scale RFID Systems |
INTERNET OF THINGS |
ASP.NET |
1238 |
HSC20D089 |
Large-Universe Attribute-Based Encryption With Public Traceability for Cloud Storage |
INTERNET OF THINGS |
ASP.NET |
1239 |
HSC20D090 |
Lightweight Broadcast Authentication Protocol for Edge-based Applications |
INTERNET OF THINGS |
ASP.NET |
1240 |
HSC20D091 |
Personalized Federated Learning With Differential Privacy |
INTERNET OF THINGS |
ASP.NET |
1241 |
HSC20D092 |
Privacy Protection Scheme Based on CP-ABE in Crowdsourcing-IoT for Smart Ocean |
INTERNET OF THINGS |
ASP.NET |
1242 |
HSC20D094 |
Secure Multi-factor Authenticated Key Agreement Scheme for Industrial IoT |
INTERNET OF THINGS |
ASP.NET |
1243 |
HSC20D096 |
Towards Convergence of AI and IoT for Energy Efficient Communication in Smart Homes |
INTERNET OF THINGS |
ASP.NET |
1244 |
HSC20D097 |
Trust-Based Cloud Machine Learning Model Selection For Industrial IoT and Smart City Services |
INTERNET OF THINGS |
ASP.NET |
1245 |
HSC20D098 |
A Framework for Proactive Indoor Positioning in Densely Deployed WiFi Networks |
MOBILE COMPUTING |
C#.NET |
1246 |
HSC20D099 |
Adaptive and Blind Regression for Mobile Crowd Sensing |
MOBILE COMPUTING |
C#.NET |
1247 |
HSC20D100 |
Blockage Aware Fair Scheduling with Differentiated Service Support in mmWave WPANs/WLANs |
MOBILE COMPUTING |
C#.NET |
1248 |
HSC20D101 |
Context-Aware and Energy-Aware Video Streaming on Smartphones |
MOBILE COMPUTING |
C#.NET |
1249 |
HSC20D102 |
Distributed Time-Sensitive Task Selection in Mobile Crowdsensing |
MOBILE COMPUTING |
C#.NET |
1250 |
HSC20D103 |
Economics of Fog Computing: Interplay Among Infrastructure and Service Providers, Users, and Edge Resource Owners |
MOBILE COMPUTING |
C#.NET |
1251 |
HSC20D104 |
FRCA: A Novel Flexible Routing Computing Approach for Wireless Sensor Networks |
MOBILE COMPUTING |
C#.NET |
1252 |
HSC20D105 |
PPtaxi: Non-Stop Package Delivery via Multi-Hop Ridesharing |
MOBILE COMPUTING |
C#.NET |
1253 |
HSC20D106 |
Privacy Preservation in Location-Based Services: A Novel Metric and Attack Model |
MOBILE COMPUTING |
C#.NET |
1254 |
HSC20D107 |
Resource Allocation in Full-Duplex UAV Enabled Multi Small Cell Networks |
MOBILE COMPUTING |
C#.NET |
1255 |
HSC20D108 |
Smartphone based Indoor Path Estimation and Localization without Human Intervention |
MOBILE COMPUTING |
C#.NET |
1256 |
HSC20D109 |
Toward a realistic approach for the deployment of 3D Wireless Sensor Networks |
MOBILE COMPUTING |
C#.NET |
1257 |
HSC20D110 |
Towards Automatic Detection of Nonfunctional Sensitive Transmissions in Mobile Applications |
MOBILE COMPUTING |
C#.NET |
1258 |
HSC20D111 |
Towards Personalized Privacy-Preserving Incentive for Truth Discovery in Mobile Crowdsensing Systems |
MOBILE COMPUTING |
C#.NET |
1259 |
HSC20D112 |
A Coverage-Aware Resource Provisioning Method for Network Slicing |
NETWORKING |
C#.NET |
1260 |
HSC20D113 |
A Multifunctional Integrated Circuit Router for Body Area Network Wearable Systems |
NETWORKING |
C#.NET |
1261 |
HSC20D114 |
High-Accuracy Packet Pacing on Commodity Servers for Constant-Rate Flows |
NETWORKING |
C#.NET |
1262 |
HSC20D115 |
Information Source Finding in Networks Querying With Budgets |
NETWORKING |
C#.NET |
1263 |
HSC20D116 |
MARS A Multi-Attribute Routing and Scheduling Algorithm for DTN Interplanetary Networks |
NETWORKING |
C#.NET |
1264 |
HSC20D117 |
Online Identification of Groups of Flows Sharing a Network Bottleneck |
NETWORKING |
C#.NET |
1265 |
HSC20D118 |
Online Resource Allocation With Machine Variability A Bandit Perspective |
NETWORKING |
C#.NET |
1266 |
HSC20D119 |
Pricing, Bandwidth Allocation, and Service Competition in Heterogeneous Wireless Networks |
NETWORKING |
C#.NET |
1267 |
HSC20D120 |
Resilient Range-Based d-Dimensional Localization for Mobile Sensor Networks |
NETWORKING |
C#.NET |
1268 |
HSC20D121 |
Rethinking Fast and Friendly Transport in Data Center Networks |
NETWORKING |
C#.NET |
1269 |
HSC20D122 |
A key for John Doe modeling and designing Anonymous Password-Authenticated Key Exchange protocols |
Dependable and Secure Computing |
ASP.NET |
1270 |
HSC20D123 |
A Secure Cloud Data Sharing Protocol for Enterprise Supporting Hierarchical Keyword Search |
Dependable and Secure Computing |
ASP.NET |
1271 |
HSC20D124 |
A Traceable and Revocable Ciphertext-policy Attribute-based Encryption Scheme Based on Privacy Protection |
Dependable and Secure Computing |
ASP.NET |
1272 |
HSC20D125 |
Achieving Efficient and Privacy-Preserving Exact Set Similarity Search over Encrypted Data |
Dependable and Secure Computing |
ASP.NET |
1273 |
HSC20D126 |
Authenticated Medical Documents Releasing with Privacy Protection and Release Control |
Dependable and Secure Computing |
ASP.NET |
1274 |
HSC20D127 |
Cloud Centric Authentication for Wearable Healthcare Monitoring System |
Dependable and Secure Computing |
ASP.NET |
1275 |
HSC20D128 |
Dual Access Control for Cloud-Based Data Storage and Sharing |
Dependable and Secure Computing |
ASP.NET |
1276 |
HSC20D129 |
Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices |
Dependable and Secure Computing |
ASP.NET |
1277 |
HSC20D130 |
Forward Private Searchable Symmetric Encryption with Optimized IO Efficiency |
Dependable and Secure Computing |
ASP.NET |
1278 |
HSC20D131 |
High Capacity Lossless Data Hiding in JPEG Bitstream Based on General VLC Mapping |
Dependable and Secure Computing |
ASP.NET |
1279 |
HSC20D132 |
Leakage-Resilient Authenticated Key Exchange for Edge Artificial Intelligence |
Dependable and Secure Computing |
ASP.NET |
1280 |
HSC20D133 |
Multi-client Cloud-based Symmetric Searchable Encryption |
Dependable and Secure Computing |
ASP.NET |
1281 |
HSC20D134 |
Multi-user Verifiable Searchable Symmetric Encryption for Cloud Storage |
Dependable and Secure Computing |
ASP.NET |
1282 |
HSC20D135 |
Physical Layer based Message Authentication with Secure Channel Codes |
Dependable and Secure Computing |
ASP.NET |
1283 |
HSC20D136 |
Privacy-preserving Navigation Supporting Similar Queries in Vehicular Networks |
Dependable and Secure Computing |
ASP.NET |
1284 |
HSC20D137 |
Privacy-Preserving Outsourced Calculation Toolkit in the Cloud |
Dependable and Secure Computing |
ASP.NET |
1285 |
HSC20D138 |
Privacy-Preserving Outsourced Inner Product Computation on Encrypted Database |
Dependable and Secure Computing |
ASP.NET |
1286 |
HSC20D139 |
PrivHome Privacy-Preserving Authenticated Communication in Smart Home Environment |
Dependable and Secure Computing |
ASP.NET |
1287 |
HSC20D140 |
Reversible Data Hiding in Encrypted Images Based on Pixel Prediction and Bit-plane Compression |
Dependable and Secure Computing |
ASP.NET |
1288 |
HSC20D141 |
Reversible Data Hiding in Encrypted Images using Chunk Encryption and Redundancy Matrix Representation |
Dependable and Secure Computing |
ASP.NET |
1289 |
HSC20D142 |
Secret sharing based reversible data hiding in encrypted images with multiple data-hiders |
Dependable and Secure Computing |
ASP.NET |
1290 |
HSC20D143 |
Secure and Efficient Two-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography |
Dependable and Secure Computing |
ASP.NET |
1291 |
HSC20D144 |
Secure Keyword Search and Data Sharing Mechanism for Cloud Computing |
Dependable and Secure Computing |
ASP.NET |
1292 |
HSC20D145 |
Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks |
Dependable and Secure Computing |
ASP.NET |
1293 |
HSC20J001 |
A Modified Hierarchical Attribute-Based Encryption Access Control Method |
APPLICATION |
JAVA |
1294 |
HSC20J001 |
Big Data and Emergency Management Concepts Methodologies and Applications |
BIG DATA |
JAVA |
1295 |
HSC20J002 |
Practical Privacy-Preserving Content-Based Retrieval |
APPLICATION |
JAVA |
1296 |
HSC20J002 |
Dynamic Entity-based Named Entity Recognition Under Unconstrained Tagging Schemes |
BIG DATA |
JAVA |
1297 |
HSC20J003 |
Sharing Cache Resources Among Content Providers |
APPLICATION |
JAVA |
1298 |
HSC20J003 |
LSTM based Phishing Detection for Big Email Data |
BIG DATA |
JAVA |
1299 |
HSC20J004 |
Privacy-Preserving Crowd-Sourced Statistical Data Publishing |
APPLICATION |
JAVA |
1300 |
HSC20J004 |
Sense and Sensibility Characterizing Social Media Users Regarding the Use of Controversial Terms for COVID-19 |
BIG DATA |
JAVA |
1301 |
HSC20J005 |
Towards Social-Aware Ridesharing Group Query Services |
APPLICATION |
JAVA |
1302 |
HSC20J005 |
Urban Anomaly Analytics Description, Detection and Prediction |
BIG DATA |
JAVA |
1303 |
HSC20J006 |
Ghost Riders Sybil Attacks on Crowdsourced Mobile Mapping Services |
APPLICATION |
JAVA |
1304 |
HSC20J006 |
An Edge Computing Matching Framework with Guaranteed Quality of Service |
CLOUD COMPUTING |
JAVA |
1305 |
HSC20J007 |
Outsourced Decentralized Multi-authority Attribute Based Signature |
APPLICATION |
JAVA |
1306 |
HSC20J007 |
Architectural Design of Cloud Applications a Performance aware Cost Minimization Approach |
CLOUD COMPUTING |
JAVA |
1307 |
HSC20J008 |
Understanding Path Reconstruction Algorithms in WSN |
APPLICATION |
JAVA |
1308 |
HSC20J008 |
Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT |
CLOUD COMPUTING |
JAVA |
1309 |
HSC20J009 |
P-MOD Secure Privilege-Based Multilevel Organizational Data-Sharing |
APPLICATION |
JAVA |
1310 |
HSC20J009 |
Authentication and Key Agreement Based on Anonymous Identity for Peer-to-Peer Cloud |
CLOUD COMPUTING |
JAVA |
1311 |
HSC20J010 |
Finding Optimal Skyline Product Combinations under Price Promotion |
APPLICATION |
JAVA |
1312 |
HSC20J010 |
Cloud-based Privacy-Preserving Collaborative Consumption for Sharing Economy |
CLOUD COMPUTING |
JAVA |
1313 |
HSC20J011 |
Credit Card Fraud Detection Using Hidden Markov Model |
APPLICATION |
JAVA |
1314 |
HSC20J011 |
Complying with Data Handling Requirements in Cloud Storage Systems |
CLOUD COMPUTING |
JAVA |
1315 |
HSC20J012 |
Electronic Health Record Management System |
APPLICATION |
JAVA |
1316 |
HSC20J012 |
Congestion-aware Traffic Allocation for Geo-distributed Data Centers |
CLOUD COMPUTING |
JAVA |
1317 |
HSC20J013 |
Cost-Effective App User Allocation in an Edge Computing Environment |
CLOUD COMPUTING |
JAVA |
1318 |
HSC20J014 |
Designing Secure and Efficient Biometric-Based Secure Access Mechanism for Cloud Services |
CLOUD COMPUTING |
JAVA |
1319 |
HSC20J015 |
DNA Similarity Search with Access Control over Encrypted Cloud Data |
CLOUD COMPUTING |
JAVA |
1320 |
HSC20J016 |
Dynamic resource allocation method based on Symbiotic Organism Search algorithm in cloud computing |
CLOUD COMPUTING |
JAVA |
1321 |
HSC20J017 |
Dynamic Resource Orchestration for Service Capability Maximization in Fog-Enabled Connected Vehicle Networks |
CLOUD COMPUTING |
JAVA |
1322 |
HSC20J018 |
Efficient IoT Management with Resilience to Unauthorized Access to Cloud Storage |
CLOUD COMPUTING |
JAVA |
1323 |
HSC20J019 |
Enabling Cost-Effective, SLO-Aware Machine Learning Inference Serving on Public Cloud |
CLOUD COMPUTING |
JAVA |
1324 |
HSC20J020 |
FADA A Cloud-fog-edge Architecture and Ontology for Data Acquisition |
CLOUD COMPUTING |
JAVA |
1325 |
HSC20J021 |
Fine-grained Query Authorization with Integrity Verification over Encrypted Spatial Data in Cloud Storage |
CLOUD COMPUTING |
JAVA |
1326 |
HSC20J022 |
Geography-Aware Task Scheduling for Profit Maximization in Distributed Green Data Centers |
CLOUD COMPUTING |
JAVA |
1327 |
HSC20J023 |
Fast Secure and Anonymous Key Agreement Against Bad Randomness for Cloud Computing |
CLOUD COMPUTING |
JAVA |
1328 |
HSC20J024 |
Joint Optimization of VNF Placement and Flow Scheduling in Mobile Core Network |
CLOUD COMPUTING |
JAVA |
1329 |
HSC20J025 |
Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-based VANETs |
CLOUD COMPUTING |
JAVA |
1330 |
HSC20J026 |
PKE-MET Public-Key Encryption with Multi-Ciphertext Equality Test in Cloud Computing |
CLOUD COMPUTING |
JAVA |
1331 |
HSC20J027 |
Privacy-preserving Medical Treatment System through Nondeterministic Finite Automata |
CLOUD COMPUTING |
JAVA |
1332 |
HSC20J028 |
Privacy-Preserving Subgraph Matching Scheme with Authentication in Social Networks |
CLOUD COMPUTING |
JAVA |
1333 |
HSC20J029 |
QuickN Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data |
CLOUD COMPUTING |
JAVA |
1334 |
HSC20J030 |
Resource Allocation for Cloud-Based Software Services Using Prediction-Enabled Feedback Control with Reinforcement Learning |
CLOUD COMPUTING |
JAVA |
1335 |
HSC20J031 |
Resource Usage Cost Optimization in Cloud Computing Using Machine Learning |
CLOUD COMPUTING |
JAVA |
1336 |
HSC20J032 |
Secure Cloud Storage with Data Dynamics Using Secure Network Coding Techniques |
CLOUD COMPUTING |
JAVA |
1337 |
HSC20J033 |
Secure Similarity Search over Encrypted Non-Uniform Datasets |
CLOUD COMPUTING |
JAVA |
1338 |
HSC20J034 |
SecureAD A Secure Video Anomaly Detection Framework on Convolutional Neural Network in Edge Computing Environment |
CLOUD COMPUTING |
JAVA |
1339 |
HSC20J035 |
Similarity Search for Encrypted Images in Secure Cloud Computing |
CLOUD COMPUTING |
JAVA |
1340 |
HSC20J036 |
Threshold Multi-keyword Search for Cloud-Based Group Data Sharing |
CLOUD COMPUTING |
JAVA |
1341 |
HSC20J037 |
Tight Bound on Incnetive Ratio for Sybil Attack in Resource Sharing System |
CLOUD COMPUTING |
JAVA |
1342 |
HSC20J038 |
Achieving Secure and Dynamic Range Queries Over Encrypted Cloud Data |
DATA MINING |
JAVA |
1343 |
HSC20J039 |
Activity Organization for Friend-Making Optimization in Online Social Networks |
DATA MINING |
JAVA |
1344 |
HSC20J040 |
Adaptively Secure and Fast Processing of Conjunctive Queries over Encrypted Data |
DATA MINING |
JAVA |
1345 |
HSC20J041 |
Deep Learning Driven Venue Recommender for Event-Based Social Networks |
DATA MINING |
JAVA |
1346 |
HSC20J042 |
Deep Learning for Adverse Event Detection from Web Search |
DATA MINING |
JAVA |
1347 |
HSC20J043 |
Distributed Multimodal Path Queries |
DATA MINING |
JAVA |
1348 |
HSC20J044 |
Item Recommendation for Word-of-Mouth Scenario in Social E-Commerce |
DATA MINING |
JAVA |
1349 |
HSC20J045 |
LShape Partitioning: Parallel Skyline Query Processing using MapReduce |
DATA MINING |
JAVA |
1350 |
HSC20J046 |
MAS-Encryption and Its Applications in Privacy-Preserving Classifiers |
DATA MINING |
JAVA |
1351 |
HSC20J047 |
Online Pricing with Reserve Price Constraint for Personal Data Markets |
DATA MINING |
JAVA |
1352 |
HSC20J048 |
Skyline Diagram: Efficient Space Partitioning for Skyline Queries |
DATA MINING |
JAVA |
1353 |
HSC20J049 |
A Verifiable Semantic Searching Scheme by Optimal Matching Over Encrypted Data in Public Cloud |
INFORMATION FORENSICS AND SECURITY |
JAVA |
1354 |
HSC20J050 |
An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning |
INFORMATION FORENSICS AND SECURITY |
JAVA |
1355 |
HSC20J051 |
Dense Registration and Mosaicking of Fingerprints by Training an End-to-End Network |
INFORMATION FORENSICS AND SECURITY |
JAVA |
1356 |
HSC20J052 |
Fine-Grained Facial Expression Recognition in the Wild |
INFORMATION FORENSICS AND SECURITY |
JAVA |
1357 |
HSC20J053 |
Fingerprint Spoof Detector Generalization |
INFORMATION FORENSICS AND SECURITY |
JAVA |
1358 |
HSC20J054 |
Minimizing Embedding Impact for H.264 Steganography by Progressive Trellis Coding |
INFORMATION FORENSICS AND SECURITY |
JAVA |
1359 |
HSC20J055 |
Periocular-Assisted Multi-Feature Collaboration for Dynamic Iris Recognition |
INFORMATION FORENSICS AND SECURITY |
JAVA |
1360 |
HSC20J056 |
Privacy-Aware Time-Series Data Sharing With Deep Reinforcement Learning |
INFORMATION FORENSICS AND SECURITY |
JAVA |
1361 |
HSC20J057 |
Robust Iris Presentation Attack Detection Fusing 2D and 3D Information |
INFORMATION FORENSICS AND SECURITY |
JAVA |
1362 |
HSC20J058 |
Smart and Practical Privacy-Preserving Data Aggregation for Fog-Based Smart Grids |
INFORMATION FORENSICS AND SECURITY |
JAVA |
1363 |
HSC20J059 |
Soft Semantic Representation for Cross-Domain Face Recognition |
INFORMATION FORENSICS AND SECURITY |
JAVA |
1364 |
HSC20J060 |
Sum Secret Key Rate Maximization for TDD Multi-User Massive MIMO Wireless Networks |
INFORMATION FORENSICS AND SECURITY |
JAVA |
1365 |
HSC20J061 |
TDOA Source-Localization Technique Robust to Time-Synchronization Attacks |
INFORMATION FORENSICS AND SECURITY |
JAVA |
1366 |
HSC20J062 |
A Flexible and Lightweight Group Authentication Scheme |
INTERNET OF THINGS |
JAVA |
1367 |
HSC20J063 |
A Flexible Privacy-Preserving Data Sharing Scheme in Cloud-assisted IoT |
INTERNET OF THINGS |
JAVA |
1368 |
HSC20J064 |
A Secure and Efficient Cloud-Centric Internet-of-Medical-Things-Enabled Smart Healthcare System With Public Verifiability |
INTERNET OF THINGS |
JAVA |
1369 |
HSC20J065 |
CMRDF: A Real-Time Food Alerting System Based on Multimodal Data |
INTERNET OF THINGS |
JAVA |
1370 |
HSC20J066 |
Comprehensive Analysis on Least Squares Lateration for Indoor Positioning Systems |
INTERNET OF THINGS |
JAVA |
1371 |
HSC20J067 |
Efficient and Secure Certificateless Aggregate Signature based Authentication Scheme for Vehicular Ad-hoc Networks |
INTERNET OF THINGS |
JAVA |
1372 |
HSC20J068 |
Enhancing Future Classroom Environments Based on Systems of Systems and the Internet of Anything |
INTERNET OF THINGS |
JAVA |
1373 |
HSC20J070 |
Fast and Reliable Dynamic Tag Estimation in Large-Scale RFID Systems |
INTERNET OF THINGS |
JAVA |
1374 |
HSC20J072 |
Large-Universe Attribute-Based Encryption With Public Traceability for Cloud Storage |
INTERNET OF THINGS |
JAVA |
1375 |
HSC20J073 |
Lightweight Broadcast Authentication Protocol for Edge-based Applications |
INTERNET OF THINGS |
JAVA |
1376 |
HSC20J074 |
Personalized Federated Learning With Differential Privacy |
INTERNET OF THINGS |
JAVA |
1377 |
HSC20J075 |
Privacy Protection Scheme Based on CP-ABE in Crowdsourcing-IoT for Smart Ocean |
INTERNET OF THINGS |
JAVA |
1378 |
HSC20J077 |
Secure Multi-factor Authenticated Key Agreement Scheme for Industrial IoT |
INTERNET OF THINGS |
JAVA |
1379 |
HSC20J079 |
Towards Convergence of AI and IoT for Energy Efficient Communication in Smart Homes |
INTERNET OF THINGS |
JAVA |
1380 |
HSC20J080 |
Trust-Based Cloud Machine Learning Model Selection For Industrial IoT and Smart City Services |
INTERNET OF THINGS |
JAVA |
1381 |
HSC20J081 |
A Framework for Proactive Indoor Positioning in Densely Deployed WiFi Networks |
MOBILE COMPUTING |
JAVA |
1382 |
HSC20J082 |
Adaptive and Blind Regression for Mobile Crowd Sensing |
MOBILE COMPUTING |
JAVA |
1383 |
HSC20J083 |
Blockage Aware Fair Scheduling with Differentiated Service Support in mmWave WPANs/WLANs |
MOBILE COMPUTING |
JAVA |
1384 |
HSC20J084 |
Context-Aware and Energy-Aware Video Streaming on Smartphones |
MOBILE COMPUTING |
JAVA |
1385 |
HSC20J085 |
Distributed Time-Sensitive Task Selection in Mobile Crowdsensing |
MOBILE COMPUTING |
JAVA |
1386 |
HSC20J086 |
Economics of Fog Computing: Interplay Among Infrastructure and Service Providers, Users, and Edge Resource Owners |
MOBILE COMPUTING |
JAVA |
1387 |
HSC20J087 |
FRCA: A Novel Flexible Routing Computing Approach for Wireless Sensor Networks |
MOBILE COMPUTING |
JAVA |
1388 |
HSC20J088 |
PPtaxi: Non-Stop Package Delivery via Multi-Hop Ridesharing |
MOBILE COMPUTING |
JAVA |
1389 |
HSC20J089 |
Privacy Preservation in Location-Based Services: A Novel Metric and Attack Model |
MOBILE COMPUTING |
JAVA |
1390 |
HSC20J090 |
Resource Allocation in Full-Duplex UAV Enabled Multi Small Cell Networks |
MOBILE COMPUTING |
JAVA |
1391 |
HSC20J091 |
Smartphone based Indoor Path Estimation and Localization without Human Intervention |
MOBILE COMPUTING |
JAVA |
1392 |
HSC20J092 |
Toward a realistic approach for the deployment of 3D Wireless Sensor Networks |
MOBILE COMPUTING |
JAVA |
1393 |
HSC20J093 |
Towards Automatic Detection of Nonfunctional Sensitive Transmissions in Mobile Applications |
MOBILE COMPUTING |
JAVA |
1394 |
HSC20J094 |
Towards Personalized Privacy-Preserving Incentive for Truth Discovery in Mobile Crowdsensing Systems |
MOBILE COMPUTING |
JAVA |
1395 |
HSC20J095 |
A Coverage-Aware Resource Provisioning Method for Network Slicing |
NETWORKING |
JAVA |
1396 |
HSC20J096 |
A Multifunctional Integrated Circuit Router for Body Area Network Wearable Systems |
NETWORKING |
JAVA |
1397 |
HSC20J097 |
High-Accuracy Packet Pacing on Commodity Servers for Constant-Rate Flows |
NETWORKING |
JAVA |
1398 |
HSC20J098 |
Information Source Finding in Networks Querying With Budgets |
NETWORKING |
JAVA |
1399 |
HSC20J099 |
MARS A Multi-Attribute Routing and Scheduling Algorithm for DTN Interplanetary Networks |
NETWORKING |
JAVA |
1400 |
HSC20J100 |
Online Identification of Groups of Flows Sharing a Network Bottleneck |
NETWORKING |
JAVA |
1401 |
HSC20J101 |
Online Resource Allocation With Machine Variability A Bandit Perspective |
NETWORKING |
JAVA |
1402 |
HSC20J102 |
Pricing, Bandwidth Allocation, and Service Competition in Heterogeneous Wireless Networks |
NETWORKING |
JAVA |
1403 |
HSC20J103 |
Resilient Range-Based d-Dimensional Localization for Mobile Sensor Networks |
NETWORKING |
JAVA |
1404 |
HSC20J104 |
Rethinking Fast and Friendly Transport in Data Center Networks |
NETWORKING |
JAVA |
1405 |
HSC20J105 |
A key for John Doe modeling and designing Anonymous Password-Authenticated Key Exchange protocols |
Dependable and Secure Computing |
JAVA |
1406 |
HSC20J106 |
A Secure Cloud Data Sharing Protocol for Enterprise Supporting Hierarchical Keyword Search |
Dependable and Secure Computing |
JAVA |
1407 |
HSC20J107 |
A Traceable and Revocable Ciphertext-policy Attribute-based Encryption Scheme Based on Privacy Protection |
Dependable and Secure Computing |
JAVA |
1408 |
HSC20J108 |
Achieving Efficient and Privacy-Preserving Exact Set Similarity Search over Encrypted Data |
Dependable and Secure Computing |
JAVA |
1409 |
HSC20J109 |
Authenticated Medical Documents Releasing with Privacy Protection and Release Control |
Dependable and Secure Computing |
JAVA |
1410 |
HSC20J110 |
Cloud Centric Authentication for Wearable Healthcare Monitoring System |
Dependable and Secure Computing |
JAVA |
1411 |
HSC20J111 |
Dual Access Control for Cloud-Based Data Storage and Sharing |
Dependable and Secure Computing |
JAVA |
1412 |
HSC20J112 |
Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices |
Dependable and Secure Computing |
JAVA |
1413 |
HSC20J113 |
Forward Private Searchable Symmetric Encryption with Optimized IO Efficiency |
Dependable and Secure Computing |
JAVA |
1414 |
HSC20J114 |
High Capacity Lossless Data Hiding in JPEG Bitstream Based on General VLC Mapping |
Dependable and Secure Computing |
JAVA |
1415 |
HSC20J115 |
Leakage-Resilient Authenticated Key Exchange for Edge Artificial Intelligence |
Dependable and Secure Computing |
JAVA |
1416 |
HSC20J116 |
Multi-client Cloud-based Symmetric Searchable Encryption |
Dependable and Secure Computing |
JAVA |
1417 |
HSC20J117 |
Multi-user Verifiable Searchable Symmetric Encryption for Cloud Storage |
Dependable and Secure Computing |
JAVA |
1418 |
HSC20J118 |
Physical Layer based Message Authentication with Secure Channel Codes |
Dependable and Secure Computing |
JAVA |
1419 |
HSC20J119 |
Privacy-preserving Navigation Supporting Similar Queries in Vehicular Networks |
Dependable and Secure Computing |
JAVA |
1420 |
HSC20J120 |
Privacy-Preserving Outsourced Calculation Toolkit in the Cloud |
Dependable and Secure Computing |
JAVA |
1421 |
HSC20J121 |
Privacy-Preserving Outsourced Inner Product Computation on Encrypted Database |
Dependable and Secure Computing |
JAVA |
1422 |
HSC20J122 |
PrivHome Privacy-Preserving Authenticated Communication in Smart Home Environment |
Dependable and Secure Computing |
JAVA |
1423 |
HSC20J123 |
Reversible Data Hiding in Encrypted Images Based on Pixel Prediction and Bit-plane Compression |
Dependable and Secure Computing |
JAVA |
1424 |
HSC20J124 |
Reversible Data Hiding in Encrypted Images using Chunk Encryption and Redundancy Matrix Representation |
Dependable and Secure Computing |
JAVA |
1425 |
HSC20J125 |
Secret sharing based reversible data hiding in encrypted images with multiple data-hiders |
Dependable and Secure Computing |
JAVA |
1426 |
HSC20J126 |
Secure and Efficient Two-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography |
Dependable and Secure Computing |
JAVA |
1427 |
HSC20J127 |
Secure Keyword Search and Data Sharing Mechanism for Cloud Computing |
Dependable and Secure Computing |
JAVA |
1428 |
HSC20J128 |
Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks |
Dependable and Secure Computing |
JAVA |
1429 |
HSC20J129 |
A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT |
INTERNET OF THINGS |
JAVA |
1430 |
HSC20M001 |
A Comprehensive Benchmark for Single Image Compression Artifact Reduction |
IMAGE PROCESSING |
MATLAB |
1431 |
HSC20M002 |
A Joint Relationship Aware Neural Network for Single-Image 3D Human Pose Estimation |
IMAGE PROCESSING |
MATLAB |
1432 |
HSC20M003 |
A Spatially Constrained Probabilistic Model for Robust Image Segmentation |
IMAGE PROCESSING |
MATLAB |
1433 |
HSC20M004 |
Background Noise Filtering and Distribution Dividing for Crowd Counting |
IMAGE PROCESSING |
MATLAB |
1434 |
HSC20M005 |
Cascaded Attention Guidance Network for Single Rainy Image Restoration |
IMAGE PROCESSING |
MATLAB |
1435 |
HSC20M006 |
Compressed Image Restoration via Artifacts-Free PCA Basis Learning and Adaptive Sparse Modeling |
IMAGE PROCESSING |
MATLAB |
1436 |
HSC20M007 |
Constrained Design of Deep Iris Networks |
IMAGE PROCESSING |
MATLAB |
1437 |
HSC20M008 |
Convexity Shape Prior for Level Set-Based Image Segmentation Method |
IMAGE PROCESSING |
MATLAB |
1438 |
HSC20M009 |
Deep Graph-Convolutional Image Denoising |
IMAGE PROCESSING |
MATLAB |
1439 |
HSC20M010 |
Deep Retinal Image Segmentation With Regularization Under Geometric Priors |
IMAGE PROCESSING |
MATLAB |
1440 |
HSC20M011 |
Efficient Low-Resolution Face Recognition via Bridge Distillation |
IMAGE PROCESSING |
MATLAB |
1441 |
HSC20M012 |
Facial Expression Recognition in Videos Using Dynamic Kernels |
IMAGE PROCESSING |
MATLAB |
1442 |
HSC20M013 |
Fractal Dimension of Color Fractal Images With Correlated Color Components |
IMAGE PROCESSING |
MATLAB |
1443 |
HSC20M014 |
Geometry Guided Pose-Invariant Facial Expression Recognition |
IMAGE PROCESSING |
MATLAB |
1444 |
HSC20M015 |
HAM: Hidden Anchor Mechanism for Scene Text Detection |
IMAGE PROCESSING |
MATLAB |
1445 |
HSC20M016 |
Lightening Network for Low-Light Image Enhancement |
IMAGE PROCESSING |
MATLAB |
1446 |
HSC20M017 |
Multilevel Optimization for Registration of Deformable Point Clouds |
IMAGE PROCESSING |
MATLAB |
1447 |
HSC20M018 |
Multi-Modal Recurrent Attention Networks for Facial Expression Recognition |
IMAGE PROCESSING |
MATLAB |
1448 |
HSC20M019 |
NLH: A Blind Pixel-Level Non-Local Method for Real-World Image Denoising |
IMAGE PROCESSING |
MATLAB |
1449 |
HSC20M020 |
Scanning Imaging Restoration of Moving or Dynamically Deforming Objects |
IMAGE PROCESSING |
MATLAB |
1450 |
HSC20M021 |
Siamese Local and Global Networks for Robust Face Tracking |
IMAGE PROCESSING |
MATLAB |
1451 |
HSC20M022 |
Single Image Deraining Using Time-Lapse Data |
IMAGE PROCESSING |
MATLAB |
1452 |
HSC20M023 |
Unified Intra Mode Coding Based on Short and Long Range Correlations |
IMAGE PROCESSING |
MATLAB |
1453 |
HSC20M024 |
Anatomy-Regularized Representation Learning for Cross-Modality Medical Image Segmentation |
BIOMEDICAL PROCESSING |
MATLAB |
1454 |
HSC20M025 |
Appearance Learning for Image-based Motion Estimation in Tomography |
BIOMEDICAL PROCESSING |
MATLAB |
1455 |
HSC20M026 |
Automated Skin Lesion Segmentation via an Adaptive Dual Attention Module |
BIOMEDICAL PROCESSING |
MATLAB |
1456 |
HSC20M027 |
Boundary Coding Representation for Organ Segmentation in Prostate Cancer Radiotherapy |
BIOMEDICAL PROCESSING |
MATLAB |
1457 |
HSC20M028 |
CABNet: Category Attention Block for Imbalanced Diabetic Retinopathy Grading |
BIOMEDICAL PROCESSING |
MATLAB |
1458 |
HSC20M029 |
Deep Learning for Ultrasound Localization Microscopy |
BIOMEDICAL PROCESSING |
MATLAB |
1459 |
HSC20M030 |
Deep Predictive Motion Tracking in Magnetic Resonance Imaging: Application to Fetal Imaging |
BIOMEDICAL PROCESSING |
MATLAB |
1460 |
HSC20M031 |
Fully Automatic Calibration of Tumor-Growth Models Using a Single mpMRI Scan |
BIOMEDICAL PROCESSING |
MATLAB |
1461 |
HSC20M032 |
High-Resolution Chest X-Ray Bone Suppression Using Unpaired CT Structural Priors |
BIOMEDICAL PROCESSING |
MATLAB |
1462 |
HSC20M033 |
Image Projection Network: 3D to 2D Image Segmentation in OCTA Images |
BIOMEDICAL PROCESSING |
MATLAB |
1463 |
HSC20M034 |
Multivariate Statistical Modeling of Retinal Optical Coherence Tomography |
BIOMEDICAL PROCESSING |
MATLAB |
1464 |
HSC20M035 |
Nondestructive Detection of Targeted Microbubbles Using Dual-Mode Data and Deep Learning for Real-Time Ultrasound Molecular Imaging |
BIOMEDICAL PROCESSING |
MATLAB |
1465 |
HSC20M036 |
Self-Supervised Ultrasound to MRI Fetal Brain Image Synthesis |
BIOMEDICAL PROCESSING |
MATLAB |
1466 |
HSC20M037 |
Semi-supervised Medical Image Classification with Relation-driven Self-ensembling Model |
BIOMEDICAL PROCESSING |
MATLAB |
1467 |
HSC20N001 |
A Robust and Resilient Load Balancing Framework for SoftRAN-Based HetNets With Hybrid Energy Supplies |
Network and Service Management |
NS2 |
1468 |
HSC20N002 |
Allocation of Resources in SAaaS Clouds Managing Thing Mashups |
Network and Service Management |
NS2 |
1469 |
HSC20N003 |
An Efficient Approach to Robust SDN Controller Placement for Security |
Network and Service Management |
NS2 |
1470 |
HSC20N004 |
Decentralized Lightweight Group Key Management for Dynamic Access Control in IoT Environments |
Network and Service Management |
NS2 |
1471 |
HSC20N005 |
DeepGuard Efficient Anomaly Detection in SDN With Fine-Grained Traffic Flow Monitoring |
Network and Service Management |
NS2 |
1472 |
HSC20N006 |
Distributed Evolutionary Hyperparameter Optimization for Fuzzy Time Series |
Network and Service Management |
NS2 |
1473 |
HSC20N007 |
Traffic Engineering in Segment Routing Networks Using MILP |
Network and Service Management |
NS2 |
1474 |
HSC20P001 |
Book Store Management System |
APPLICATION |
PYTHON |
1475 |
HSC20P002 |
Bus Information System |
APPLICATION |
PYTHON |
1476 |
HSC20P003 |
College Event Management |
APPLICATION |
PYTHON |
1477 |
HSC20P004 |
Home Security System |
APPLICATION |
PYTHON |
1478 |
HSC20P005 |
Hospital Care Management System |
APPLICATION |
PYTHON |
1479 |
HSC20P006 |
Internet Banking System |
APPLICATION |
PYTHON |
1480 |
HSC20P007 |
Multilevel Quiz Master |
APPLICATION |
PYTHON |
1481 |
HSC20P008 |
Online E-Learning Portal |
APPLICATION |
PYTHON |
1482 |
HSC20P009 |
Student Information System |
APPLICATION |
PYTHON |
1483 |
HSC20P010 |
Student Performance Prediction System |
APPLICATION |
PYTHON |
1484 |
HSC20P011 |
Library Management System |
APPLICATION |
PYTHON |
1485 |
HSC20P012 |
Blood Bank Management System |
APPLICATION |
PYTHON |
1486 |
HSC20P013 |
Online Food Order System |
APPLICATION |
PYTHON |
1487 |
HSC20PP001 |
Traffic Accident Record Management System |
APPLICATION |
PHP |
1488 |
HSC20PP002 |
E-Tender |
APPLICATION |
PHP |
1489 |
HSC20PP003 |
Detecting Spam User |
APPLICATION |
PHP |
1490 |
HSC20PP004 |
E-Commerce Website with Bargaining |
APPLICATION |
PHP |
1491 |
HSC20PP005 |
Dr-Finder |
APPLICATION |
PHP |
1492 |
HSC20PP006 |
Book Lending Card |
APPLICATION |
PHP |
1493 |
HSC20PP007 |
Blood Management System Area Based Search |
APPLICATION |
PHP |
1494 |
HSC20PP008 |
Traffic Squad : Penality Collection and Management |
APPLICATION |
PHP |
1495 |
HSC20PP009 |
Gadgets Rental Website |
APPLICATION |
PHP |
1496 |
HSC20PP010 |
Net Classified |
APPLICATION |
PHP |
1497 |
HSC20PP011 |
Alumni Portal |
APPLICATION |
PHP |
1498 |
HSC20PP012 |
Fishers Portal |
APPLICATION |
PHP |
1499 |
HSC20PP013 |
Bank Security Using RFID & IRIS Technology |
APPLICATION |
PHP |
1500 |
HSC20PP014 |
Digital Grama Panchayath Service |
APPLICATION |
PHP |
1501 |
HSC20PP015 |
e-Farmers Agriculture Using e-Digital Marketing |
APPLICATION |
PHP |
1502 |
HSC20PP016 |
Wireless Based Vehicle RFID Management System |
APPLICATION |
PHP |
1503 |
HSC20PP017 |
Wireless Vehicle Document Verification |
APPLICATION |
PHP |
1504 |
HSC20PP018 |
Heart Disease Prediction System Using Data Mining Clustering Techniques |
APPLICATION |
PHP |
1505 |
HSC20PP019 |
Nymble Blocking Misbehaving User in Anonymizing Network |
APPLICATION |
PHP |
1506 |
HSC20PP020 |
Result Alert System with Email and SMS |
APPLICATION |
PHP |
1507 |
HSC21J001 |
A Fast Nearest Neighbor Search Scheme over Outsourced Encrypted Medical Images |
CLOUD COMPUTING |
JAVA |
1508 |
HSC21J002 |
A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users |
CLOUD COMPUTING |
JAVA |
1509 |
HSC21J003 |
A Verifiable Semantic Searching Scheme by Optimal Matching over Encrypted Data in Public Cloud |
CLOUD COMPUTING |
JAVA |
1510 |
HSC21J004 |
Accountable Proxy Re-Encryption for Secure Data Sharing |
CLOUD COMPUTING |
JAVA |
1511 |
HSC21J005 |
Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data |
CLOUD COMPUTING |
JAVA |
1512 |
HSC21J006 |
Certificateless public integrity checking of group shared data on cloud storage |
CLOUD COMPUTING |
JAVA |
1513 |
HSC21J007 |
CryptCloud+: Secure and Expressive Data Access Control for Cloud Storage |
CLOUD COMPUTING |
JAVA |
1514 |
HSC21J008 |
Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud |
CLOUD COMPUTING |
JAVA |
1515 |
HSC21J009 |
Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments |
CLOUD COMPUTING |
JAVA |
1516 |
HSC21J010 |
Dual Access Control for Cloud-Based Data Storage and Sharing |
CLOUD COMPUTING |
JAVA |
1517 |
HSC21J011 |
Efficient Identity-Based Distributed Decryption Scheme for Electronic Personal Health Record Sharing System |
CLOUD COMPUTING |
JAVA |
1518 |
HSC21J012 |
Inference Attack-Resistant E-Healthcare Cloud System with Fine- Grained Access Control |
CLOUD COMPUTING |
JAVA |
1519 |
HSC21J013 |
Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data |
CLOUD COMPUTING |
JAVA |
1520 |
HSC21J014 |
PP-CSA: A Privacy-Preserving Cloud Storage Auditing Scheme for Data Sharing |
CLOUD COMPUTING |
JAVA |
1521 |
HSC21J015 |
Practical Multi-keyword Ranked Search with Access Control over Encrypted Cloud Data |
CLOUD COMPUTING |
JAVA |
1522 |
HSC21J016 |
Privacy Preserving Searchable Encryption with Fine-grained Access Control |
CLOUD COMPUTING |
JAVA |
1523 |
HSC21J017 |
Provably secure and lightweight identity-based authenticated data sharing protocol for cyber-physical cloud environment |
CLOUD COMPUTING |
JAVA |
1524 |
HSC21J018 |
Publicly Verifiable Shared Dynamic Electronic Health Record Databases with Functional Commitment Supporting Privacy- Preserving Integrity Auditing |
CLOUD COMPUTING |
JAVA |
1525 |
HSC21J019 |
Secure Fine-Grained Encrypted Keyword Search for E-Healthcare Cloud |
CLOUD COMPUTING |
JAVA |
1526 |
HSC21J020 |
SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage |
CLOUD COMPUTING |
JAVA |
1527 |
HSC21J021 |
SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the Cloud |
CLOUD COMPUTING |
JAVA |
1528 |
HSC21J022 |
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification |
CLOUD COMPUTING |
JAVA |
1529 |
HSC21J023 |
Improvising Personalized Travel Recommendation System with Recency Effects |
DATA MINING |
JAVA |
1530 |
HSC21J024 |
Leveraging Affective Hashtags for Ranking Music Recommendations |
DATA MINING |
JAVA |
1531 |
HSC21J025 |
Method for Ranking the Helpfulness of Online Reviews Based on SO-ILES TODIM |
DATA MINING |
JAVA |
1532 |
HSC21J026 |
Personality-aware Product Recommendation System based on User Interests Mining and Meta-path Discovery |
DATA MINING |
JAVA |
1533 |
HSC21J027 |
Suicidal Ideation Detection: A Review of Machine Learning Methods and Applications |
DATA MINING |
JAVA |
1534 |
HSC21J028 |
BullyNet: Unmasking Cyberbullies on Social Networks |
Dependable and Secure Computing |
JAVA |
1535 |
HSC21J029 |
oGBAC—A Group Based Access Control Framework for Information Sharing in Online Social Networks |
Dependable and Secure Computing |
JAVA |
1536 |
HSC21J030 |
Privacy-Preserving Electronic Ticket Scheme with Attribute-Based Credentials |
Dependable and Secure Computing |
JAVA |
1537 |
HSC21J031 |
Protecting Your Shopping Preference with Differential Privacy |
Dependable and Secure Computing |
JAVA |
1538 |
HSC21J032 |
Sensitive Label Privacy Preservation with Anatomization for Data Publishing |
Dependable and Secure Computing |
JAVA |
1539 |
HSC21J033 |
A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain |
INTERNET OF THINGS |
JAVA |
1540 |
HSC21J034 |
Hybrid Recommender System for Tourism Based on Big Data and AI: A Conceptual Framework |
Artificial Intelligence |
JAVA |
1541 |
HSC21J035 |
Sentiment Analysis of Lockdown in India During COVID-19: A Case Study on Twitter |
COMPUTATIONAL SOCIAL SYSTEMS |
JAVA |
1542 |
HSC21J036 |
Detecting Mental Disorders in Social Media Through Emotional Patterns – The case of Anorexia and Depression |
COMPUTATIONAL SOCIAL SYSTEMS |
JAVA |
1543 |
HSC21J037 |
Public Opinion Analysis on Novel Coronavirus Pneumonia and Interaction With Event Evolution in Real World |
COMPUTATIONAL SOCIAL SYSTEMS |
JAVA |
1544 |
HSC22A001 |
BOOK STORE APP-Mini |
APPLICATION |
ANDROID |
1545 |
HSC22A002 |
CAR RENTAL SYSTEM-Mini |
APPLICATION |
ANDROID |
1546 |
HSC22A003 |
CHESS GAME APPLICATION IN ANDROID-Mini |
APPLICATION |
ANDROID |
1547 |
HSC22A004 |
CLASSIC PINBALL GAME-Mini |
APPLICATION |
ANDROID |
1548 |
HSC22A005 |
DRAWING APP TOOL-Mini |
APPLICATION |
ANDROID |
1549 |
HSC22A006 |
FOOD ORDERING SYSTEM-Mini |
APPLICATION |
ANDROID |
1550 |
HSC22A007 |
GST BILLING APP-Mini |
APPLICATION |
ANDROID |
1551 |
HSC22A008 |
GYM WORKOUT PLANNER-Mini |
APPLICATION |
ANDROID |
1552 |
HSC22A009 |
MOVIE DB APPLICATION-Mini |
APPLICATION |
ANDROID |
1553 |
HSC22A010 |
ONLINE QUIZ MASTER GAME-Mini |
APPLICATION |
ANDROID |
1554 |
HSC22A011 |
ONLINE SHOPPING APPLICATION-Mini |
APPLICATION |
ANDROID |
1555 |
HSC22A012 |
STUDENT MANAGEMENT SYSTEM-Mini |
APPLICATION |
ANDROID |
1556 |
HSC22A013 |
TEACHER CLASSROOM ASSISTANT-Mini |
APPLICATION |
ANDROID |
1557 |
HSC22A014 |
WEREWOLF GAME-Mini |
APPLICATION |
ANDROID |
1558 |
HSC22A015 |
BUS TRACKER APP-Mini |
APPLICATION |
ANDROID |
1559 |
HSC22A016 |
SMS BASED OFFLINE MOBILE DEVICE DETECTING SYSTEM |
APPLICATION |
ANDROID |
1560 |
HSC22A017 |
FARMER APP FOR AGRIFARM PRODUCT TRADES |
APPLICATION |
ANDROID |
1561 |
HSC22D001 |
COLLEGE ENQUIRY CHATBOT |
APPLICATION |
ASP.NET |
1562 |
HSC22D002 |
AUTOMATIC QUESTION PAPER GENERATOR |
APPLICATION |
ASP.NET |
1563 |
HSC22D003 |
ONLINE HEALTH CARD SYSTEM |
APPLICATION |
ASP.NET |
1564 |
HSC22D004 |
STUDENTS INFORMATION REPORTING SYSTEM |
APPLICATION |
ASP.NET |
1565 |
HSC22D005 |
E-COMMERCE WEBSITE WITH BARGAINING |
APPLICATION |
ASP.NET |
1566 |
HSC22D006 |
HELP THE NEEDY |
APPLICATION |
ASP.NET |
1567 |
HSC22D007 |
ANALYSIS ON CREDIT CARD FRAUD DETECTION METHODS |
APPLICATION |
ASP.NET |
1568 |
HSC22J001 |
GHOST RIDERS SYBIL ATTACKS ON CROWDSOURCED MOBILE MAPPING SERVICES |
APPLICATION |
JAVA |
1569 |
HSC22J002 |
PRIVACY PRESERVING DELEGATED ACCESS CONTROL IN SOCIAL MEDIA |
APPLICATION |
JAVA |
1570 |
HSC22J003 |
PALMPRINT CLASSIFICATION BY GLOBAL FEATURES |
APPLICATION |
JAVA |
1571 |
HSC22J004 |
ONLINE SHOPPING SYSTEM |
APPLICATION |
JAVA |
1572 |
HSC22M001 |
FINGERPRINT AUTHENTICATION USING MATLAB |
APPLICATION |
MATLAB |
1573 |
HSC22M002 |
IRIS SEGMENTATION |
APPLICATION |
MATLAB |
1574 |
HSC22M003 |
DATA HIDING IN ENCRYPTED H.264/AVC VIDEO STREAMS BY CODEWORD SUBSTITUTION |
APPLICATION |
MATLAB |
1575 |
HSC22M004 |
CONTEXT DEPENDENT LOGO MATCHING AND RECOGNITION |
APPLICATION |
MATLAB |
1576 |
HSC22M005 |
MOVING CAMERA BACKGROUND SUBTRACTION FOR OBSTACLE DETECTION ON RAILWAY TRACKS |
APPLICATION |
MATLAB |
1577 |
HSC22M006 |
PREDICTION OF BREAST CANCER STAGES USING DATA MINING TECHNIQUES |
APPLICATION |
MATLAB |
1578 |
HSC22M007 |
AN AUTOMATIC GRAPH-BASED APPROACH FOR ARTERY/VEIN CLASSIFICATION IN RETINAL IMAGE |
APPLICATION |
MATLAB |
1579 |
HSC22M008 |
FINGER PRINT COMPRESSION BASED ON SPARSE REPRESENTATION |
APPLICATION |
MATLAB |
1580 |
HSC22M009 |
BLEEDING FRAME AND REGION DETECTION IN THE WIRELESS CAPSULE ENDOSCOPY VIDEO |
APPLICATION |
MATLAB |
1581 |
HSC22P001 |
AIRLINE RESERVATION SYSTEM |
APPLICATION |
PYTHON |
1582 |
HSC22P001 |
Automated Bird Species Identification using Audio Signal Processing and Neural Network |
Machine Learning |
PYTHON |
1583 |
HSC22P002 |
ATM MACHINE-Mini |
APPLICATION |
PYTHON |
1584 |
HSC22P002 |
Detection of Cardiovascular Diseases in ECG Images Using Machine Learning and Deep Learning Methods |
Machine Learning |
PYTHON |
1585 |
HSC22P003 |
BLOOD BANK MANAGEMENT SYSTEM-Mini |
APPLICATION |
PYTHON |
1586 |
HSC22P003 |
Plant Disease Detection and Classification Using Machine Learning Algorithm |
Machine Learning |
PYTHON |
1587 |
HSC22P004 |
BUS TICKET BOOKING SYSTEM |
APPLICATION |
PYTHON |
1588 |
HSC22P004 |
Fine-Grained Food Classification Methods on the UEC FOOD-100 Database |
Machine Learning |
PYTHON |
1589 |
HSC22P005 |
COURIER MANAGEMENT SYSTEM |
APPLICATION |
PYTHON |
1590 |
HSC22P005 |
Fraud Detection and Analysis for Insurance Claim using Machine Learning |
Machine Learning |
PYTHON |
1591 |
HSC22P006 |
CREATE NOTEPAD USING PYTHON-Mini |
APPLICATION |
PYTHON |
1592 |
HSC22P006 |
Improving Face-Based Age Estimation With Attention-Based Dynamic Patch Fusion |
IMAGE PROCESSING |
PYTHON |
1593 |
HSC22P007 |
ECOMMERCE WEBSITE |
APPLICATION |
PYTHON |
1594 |
HSC22P007 |
Iris Liveness Detection Using a Cascade of Dedicated Deep Learning Networks |
INFORMATION FORENSICS AND SECURITY |
PYTHON |
1595 |
HSC22P008 |
FACE RECOGNITION ATTENDANCE SYSTEM |
APPLICATION |
PYTHON |
1596 |
HSC22P008 |
On the Effectiveness of Transfer Learning for Code Search |
Software Engineering |
PYTHON |
1597 |
HSC22P009 |
FOOD ORDERING SYSTEM-Mini |
APPLICATION |
PYTHON |
1598 |
HSC22P009 |
Semantic Context-Aware Image Style Transfer |
IMAGE PROCESSING |
PYTHON |
1599 |
HSC22P010 |
HOSPITAL MANAGEMENT SYSTEM |
APPLICATION |
PYTHON |
1600 |
HSC22P010 |
Anatomy-Regularized Representation Learning for Cross-Modality Medical Image Segmentation |
MEDICAL IMAGING |
PYTHON |
1601 |
HSC22P011 |
HOSTEL MANAGEMENT SYSTEM-Mini |
APPLICATION |
PYTHON |
1602 |
HSC22P011 |
A Machine Learning-Based Classification and Prediction Technique for DDoS Attacks |
Machine Learning |
PYTHON |
1603 |
HSC22P012 |
HOTEL MANAGEMENT SYSTEM-Mini |
APPLICATION |
PYTHON |
1604 |
HSC22P013 |
LIBRARY MANAGEMENT SYSTEM |
APPLICATION |
PYTHON |
1605 |
HSC22P014 |
MEDICAL SHOP MANAGEMENT SYSTEM |
APPLICATION |
PYTHON |
1606 |
HSC22P015 |
ONLINE QUIZ-Mini |
APPLICATION |
PYTHON |
1607 |
HSC22P016 |
ONLINE VOTING SYSTEM |
APPLICATION |
PYTHON |
1608 |
HSC22P017 |
SCHOOL MANAGEMENT SYSTEM |
APPLICATION |
PYTHON |
1609 |
HSC22P018 |
SHOPPING CART |
APPLICATION |
PYTHON |
1610 |
HSC22P019 |
TIC TAC TOE-Mini |
APPLICATION |
PYTHON |
1611 |
HSC22P020 |
STUDENT PERFORMANCE PREDICTION SYSTEM-Mini |
APPLICATION |
PYTHON |
1612 |
HSC22P021 |
CONFERENCE MANAGEMENT SYSTEM |
APPLICATION |
PYTHON |
1613 |
HSC22P022 |
SYBIL ATTACKS ON MOBILE MAPPING SERVICES |
APPLICATION |
PYTHON |
1614 |
HSC22P023 |
AGRICULTURAL CROP RECOMMENDATIONS BASED ON PRODUCTIVITY AND SEASON USING MACHINE LEARNING |
APPLICATION |
PYTHON |
1615 |
HSC22P024 |
BRAIN TUMOUR DETECTION USING DEEP LEARNING |
APPLICATION |
PYTHON |
1616 |
HSC22P025 |
MACHINE LEARNING BASED HEART DISEASE PREDICTION SYSTEM |
APPLICATION |
PYTHON |
1617 |
HSC22P026 |
A ROAD ACCIDENT PREDICTION MODEL USING DATA MINING TECHNIQUES |
APPLICATION |
PYTHON |
1618 |
HSC22P027 |
SECURE DATA TRANSFER THROUGH INTERNET USING CRYPTOGRAPHY AND IMAGE STEGANOGRAPHY |
APPLICATION |
PYTHON |
1619 |
HSC22P028 |
Tourism Growth Analysis of Prediction |
APPLICATION |
PYTHON |
1620 |
HSC22P029 |
Secure ATM Based Fingerprint and Color Based Background Image |
APPLICATION |
PYTHON |
1621 |
HSC22P030 |
Rainfall Prediction System |
APPLICATION |
PYTHON |
1622 |
HSC22P031 |
Placement Automation System |
APPLICATION |
PYTHON |
1623 |
HSC22P032 |
Online Sports Turf Playground Booking System |
APPLICATION |
PYTHON |
1624 |
HSC22P033 |
Online Food Order System |
APPLICATION |
PYTHON |
1625 |
HSC22P034 |
Online Employee Leave and Payroll Management System |
APPLICATION |
PYTHON |
1626 |
HSC22P035 |
Hostel Management System |
APPLICATION |
PYTHON |
1627 |
HSC22P036 |
Home Security System Using Data Science |
APPLICATION |
PYTHON |
1628 |
HSC22P037 |
E-Farmer Agriculture Using E-Digital Marketing |
APPLICATION |
PYTHON |
1629 |
HSC22P038 |
Education Institution Chat Assistant |
APPLICATION |
PYTHON |
1630 |
HSC22P039 |
Digital Gram Panchayat Services |
APPLICATION |
PYTHON |
1631 |
HSC22P040 |
Improving Face-Based Age and Gender Estimation |
APPLICATION |
PYTHON |
1632 |
HSC22P041 |
Efficient Thyroid Disease Prediction using Features Selection and Meta Classifiers |
APPLICATION |
PYTHON |
1633 |
HSC22P042 |
Image Style Transfer |
APPLICATION |
PYTHON |
1634 |
HSC22P043 |
Iris Liveness Detection Using a Cascade of Dedicated Deep Learning Networks |
APPLICATION |
PYTHON |
1635 |
HSC22P044 |
On the Effectiveness of Transfer Learning for Code Search |
APPLICATION |
PYTHON |
1636 |
HSC22P045 |
Edible And Poisonous Mushrooms Classification |
APPLICATION |
PYTHON |
1637 |
HSC22P046 |
Electricity Theft Detection in Smart Grids |
APPLICATION |
PYTHON |
1638 |
HSC22P047 |
Detection of Phishing Websites Using Machine Learning |
APPLICATION |
PYTHON |
1639 |
HSC22P048 |
Detection of Stress in IT Employees using Machine Learning Technique |
APPLICATION |
PYTHON |
1640 |
HSC22P049 |
Intrusion Detection System Using Improved Convolution Neural Network |
APPLICATION |
PYTHON |
1641 |
HSC22P050 |
Real Time Video Streaming |
APPLICATION |
PYTHON |
1642 |
HSC22PP001 |
ATTENDANCE AND PAYROLL SYSTEM-Mini |
APPLICATION |
PHP |
1643 |
HSC22PP002 |
BLOOD BANK & DONOR SITE-Mini |
APPLICATION |
PHP |
1644 |
HSC22PP003 |
BUS BOOKING SYSTEM-Mini |
APPLICATION |
PHP |
1645 |
HSC22PP004 |
DOCTOR APPOINTMENT BOOKING |
APPLICATION |
PHP |
1646 |
HSC22PP005 |
FACE RECOGNITION ATTENDANCE |
APPLICATION |
PHP |
1647 |
HSC22PP006 |
FINGERPRINT ATTENDANCE |
APPLICATION |
PHP |
1648 |
HSC22PP007 |
HOSTEL MANAGEMENT SYSTEM-Mini |
APPLICATION |
PHP |
1649 |
HSC22PP008 |
HOUSE RENTAL MANAGEMENT SYSTEM |
APPLICATION |
PHP |
1650 |
HSC22PP009 |
INVENTORY MANAGEMENT SYSTEM-Mini |
APPLICATION |
PHP |
1651 |
HSC22PP010 |
LAUNDRY SYSTEM-Mini |
APPLICATION |
PHP |
1652 |
HSC22PP011 |
LOAN MANAGEMENT SYSTEM-Mini |
APPLICATION |
PHP |
1653 |
HSC22PP012 |
ONLINE BOAT RESERVATION SYSTEM-Mini |
APPLICATION |
PHP |
1654 |
HSC22PP013 |
ONLINE EXAMINATION SYSTEM-Mini |
APPLICATION |
PHP |
1655 |
HSC22PP014 |
ONLINE MATRIMONIAL SITE-Mini |
APPLICATION |
PHP |
1656 |
HSC22PP015 |
PHOTO EDITING APPLICATION-Mini |
APPLICATION |
PHP |
1657 |
HSC22PP016 |
RAILWAY TICKET RESERVATION SYSTEM |
APPLICATION |
PHP |
1658 |
HSC22PP017 |
SCHOOL FEES PAYMENT SYSTEM-Mini |
APPLICATION |
PHP |
1659 |
HSC22PP018 |
TOURISM MANAGEMENT SYSTEM-Mini |
APPLICATION |
PHP |
1660 |
HSC22PP019 |
VOTING SYSTEM |
APPLICATION |
PHP |
1661 |
HSC22PP020 |
ONLINE TRAIN TICKET RESERVATION SYSTEM-Mini |
APPLICATION |
PHP |
1662 |
HSC22PP021 |
COMPANY CRIME TRACKING SYSTEM |
APPLICATION |
PHP |
1663 |
HSC22PP022 |
DIGITAL LIBRARY MANAGEMENT SYSTEM |
APPLICATION |
PHP |
1664 |
HSC22PP023 |
HOME SECURITY SYSTEM |
APPLICATION |
PHP |
1665 |
HSC22PP024 |
STOCK ANALYSIS AND CUSTOMER IDENTIFICATION IN MEDICAL SHOP |
APPLICATION |
PHP |
1666 |
HSC22PP025 |
HOSPITAL MANAGEMENT SYSTEM |
APPLICATION |
PHP |
1667 |
HSC22PP026 |
STUDENT INFORMATION SYSTEM |
APPLICATION |
PHP |
1668 |
HSC22PP027 |
ONLINE WEBSITE BUILDER |
APPLICATION |
PHP |
1669 |
HSC22PP028 |
SALES AND PURCHASE MANAGEMENT SYSTEM |
APPLICATION |
PHP |
1670 |
HSC22PP029 |
ONLINE SHOPPING SYSTEM |
APPLICATION |
PHP |
1671 |
HSC22PP030 |
PLACEMENT AUTOMATION SYSTEM |
APPLICATION |
PHP |
1672 |
HSC22PP031 |
COLLEGE SOCIAL NETWORK |
APPLICATION |
PHP |
1673 |
HSC22PP032 |
PASSPORT AUTOMATION SYSTEM |
APPLICATION |
PHP |
1674 |
HSC22PP033 |
SOCIAL NETWORKING IN WEBSITE |
APPLICATION |
PHP |
1675 |
HSC22PP034 |
TRAFFIC SQUAD: PENALTY COLLECTION & MANAGEMENT |
APPLICATION |
PHP |