BD1. |
Robust Big Data Analytics for Electricity Price Forecasting in the Smart Grid |
Big Data |
JAVA/2019 |
BD2. |
A Searchable and Verifiable Data Protection Scheme for Scholarly Big Data |
Big Data |
JAVA/2019 |
BD3. |
Handling Big Data Using a Data-Aware HDFS and Evolutionary Clustering Technique |
Big Data |
JAVA/2019 |
BD4. |
Transfer to Rank for Top-N Recommendation |
Big Data |
JAVA/2019 |
BD5. |
T-PCCE: Twitter Personality based Communicative Communities Extraction System for Big Data |
Big Data |
JAVA/2019 |
BD6. |
Collaboratively Tracking Interests for User Clustering in Streams of Short Texts |
Big Data |
JAVA/2019 |
BD7. |
Lightweight Indexing and Querying Services for Big Spatial Data |
Big Data |
JAVA/2019 |
BD8. |
Scalable Healthcare Assessment for Diabetic Patients using Deep Learning on Multiple GPUs |
Big Data |
JAVA/2019 |
BD9. |
Maximum Data-resolution Efficiency for Fog-Computing Supported Spatial Big Data Processing in Disaster Scenarios |
Big Data |
JAVA/2019 |
BD10. |
CHARON: A Secure Cloud-of-Clouds System for Storing and Sharing Big Data |
Big Data |
JAVA/2019 |
BD11. |
Deep Irregular Convolutional Residual LSTM for Urban Traffic Passenger Flows Prediction |
Big Data |
JAVA/2019 |
BD12. |
Ontology-Based Privacy Data Chain Disclosure Discovery Method for Big Data |
Big Data |
JAVA/2019 |
BD13. |
PriRadar: A Privacy-Preserving Framework for Spatial Crowdsourcing |
Big Data |
JAVA/2019 |
BD14. |
Flow Context and Host Behavior Based Shadowsocks’s Traffic Identification |
Big Data |
JAVA/2019 |
JNS1. |
Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage |
Network Security |
NET/JAVA/2019 |
JNS2. |
An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud Storage |
Network Security |
NET/JAVA/2019 |
JNS3. |
Anonymous Single Sign-on with Proxy Re-Verification |
Network Security |
NET/JAVA/2019 |
JNS4. |
A New Reversible Data Hiding in Encrypted Image Based on Multi-Secret Sharing and Lightweight Cryptographic Algorithms |
Network Security |
NET/JAVA/2019 |
JNS5. |
Authentication by Encrypted Negative Password |
Network Security |
NET/JAVA/2019 |
JNS6. |
Enabling Efficient and Geometric Range Query With Access Control Over Encrypted Spatial Data |
Network Security |
NET/JAVA/2019 |
JNS7. |
Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authentication in VANETs |
Network Security |
NET/JAVA/2019 |
JNS8. |
Secure Key Agreement and Key Protection for Mobile Device User Authentication |
Network Security |
NET/JAVA/2019 |
JNS9. |
PrivateLink: Privacy-Preserving Integration and Sharing of Datasets |
Network Security |
NET/JAVA/2019 |
JNS10. |
LPPA: Lightweight Privacy-preserving Authentication from Efficient Multi-key Secure Outsourced Computation for Location-based Services in VANETs |
Network Security |
NET/JAVA/2019 |
JNS11. |
Secure Approximate String Matching for Privacy-Preserving Record Linkage |
Network Security |
NET/JAVA/2019 |
JNS12. |
OTPaaS—One Time Password as a Service |
Network Security |
NET/JAVA/2019 |
JNS13. |
Trust-Based Collaborative Privacy Management in Online Social Networks |
Network Security |
NET/JAVA/2019 |
JNS14. |
Retrieving Hidden Friends: A Collusion Privacy Attack Against Online Friend Search Engine |
Network Security |
NET/JAVA/2019 |
JNS15. |
Peer Prediction-Based Trustworthiness Evaluation and Trustworthy Service Rating in Social Networks |
Network Security |
NET/JAVA/2019 |
PDC1 |
Enabling Encrypted Rich Queries in Distributed Key-Value Stores |
Parallel and distributed Computing |
JAVA/2019 |
PDC2 |
Piggyback Game: Efficient Event Stream Dissemination in Online Social Network Systems |
Parallel and distributed Computing |
JAVA/2019 |
PDC3 |
A Distributed Trust Evaluation Protocol with Privacy Protection for Intercloud |
Parallel and distributed Computing |
JAVA/2019 |
PDC4 |
CrowdBC: A Blockchain-Based Decentralized Framework for Crowdsourcing |
Parallel and distributed Computing |
JAVA/2019 |
DSC1. |
Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments |
Dependable and secure computing |
NET/JAVA/2019 |
DSC2. |
Privacy-Preserving Multi-Keyword Top-k k Similarity Search Over Encrypted Data |
Dependable and secure computing |
NET/JAVA/2019 |
DSC3. |
Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting |
Dependable and secure computing |
NET/JAVA/2019 |
DSC4. |
Differentially Private Publication of Vertically Partitioned Data |
Dependable and secure computing |
NET/JAVA/2019 |
DSC5. |
FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data |
Dependable and secure computing |
NET/JAVA/2019 |
DSC6. |
Revocable Identity-Based Broadcast Proxy Re-encryption for Data Sharing in Clouds |
Dependable and secure computing |
NET/JAVA/2019 |
DSC7. |
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification |
Dependable and secure computing |
NET/JAVA/2019 |
DSC8. |
Searchable Symmetric Encryption with Forward Search Privacy |
Dependable and secure computing |
NET/JAVA/2019 |
DSC9. |
PrivHome: Privacy-Preserving Authenticated Communication in Smart Home Environment |
Dependable and secure computing |
NET/JAVA/2019 |
DSC10. |
A privacy-preserving framework for outsourcing location-based services to the cloud |
Dependable and secure computing |
NET/JAVA/2019 |
DSC11. |
An Electronic Voting Scheme Based on Revised-SVRM and Confirmation Numbers |
Dependable and secure computing |
NET/JAVA/2019 |
DSC12. |
A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage Services |
Dependable and secure computing |
JAVA/2019 |
DSC13. |
Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems |
Dependable and secure computing |
NET/JAVA/2019 |
DM1 |
Achieving Data Truthfulness and Privacy Preservation in Data Markets |
Data mining |
NET/JAVA/2019 |
DM2 |
Multi-Party High-Dimensional Data Publishing under Differential Privacy |
Data mining |
NET/JAVA/2019 |
DM3 |
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Based Recommendation |
Data mining |
NET/JAVA/2019 |
DM4 |
Member Behavior in Dynamic Online Communities: Role Affiliation Frequency Model |
Data mining |
NET/JAVA/2019 |
DM5 |
Real-Time Ambulance Redeployment: A Data-Driven Approach |
Data mining |
NET/JAVA/2019 |
DM6 |
Secure and Efficient Skyline Queries on Encrypted Data |
Data mining |
NET/JAVA/2019 |
DM7 |
Voice of Charity: Prospecting the Donation Recurrence & Donor Retention in Crowdfunding |
Data mining |
NET/JAVA/2019 |
DM8 |
Finding Optimal Skyline Product Combinations under Price Promotion |
Data mining |
NET/JAVA/2019 |
DM9 |
Privacy-Preserving User Profile Matching in Social Networks |
Data mining |
NET/JAVA/2019 |
DM10 |
Trust Relationship Prediction in Alibaba E-Commerce Platform |
Data mining |
NET/JAVA/2019 |
DM11 |
SentiDiff: Combining Textual Information and Sentiment Diffusion Patterns for Twitter Sentiment Analysis |
Data mining |
JAVA/2019 |
DM12 |
Translation-Based Sequential Recommendation for Complex Users on Sparse Data |
Data mining |
JAVA/2019 |
DM13 |
Cleaning Data with Forbidden Itemsets |
Data mining |
JAVA/2019 |
DM14 |
Predicting Consumption Patterns with Repeated and Novel Events |
Data mining |
JAVA/2019 |
CC1 |
Key Management Scheme for Secure Channel Establishment in Fog Computing |
Cloud Computing |
JAVA/2019 |
CC2 |
Blockchain-assisted Public-key Encryption with Keyword Search against Keyword Guessing Attacks for Cloud Storage |
Cloud Computing |
JAVA/2019 |
CC3 |
Privacy Preserving Searchable Encryption with Fine-grained Access Control |
Cloud Computing |
JAVA/2019 |
CC4 |
Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage |
Cloud Computing |
JAVA/2019 |
CC5 |
Hybrid Keyword-Field Search With Efficient Key Management for Industrial Internet of Things |
Cloud Computing |
JAVA/2019 |
CC6 |
Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud |
Cloud Computing |
JAVA/2019 |
CC7 |
Two-Server Delegation of Computation on Label-Encrypted Data |
Cloud Computing |
JAVA/2019 |
CC8 |
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing |
Cloud Computing |
JAVA/2019 |
CC9 |
Data Integrity Auditing without Private Key Storage for Secure Cloud Storage |
Cloud Computing |
JAVA/2019 |
CC10 |
Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors |
Cloud Computing |
JAVA/2019 |
CC11 |
Outsourced Decentralized Multi-authority Attribute Based Signature and Its Application in IoT |
Cloud Computing |
JAVA/2019 |
JN1. |
A Privacy-Preserving and Verifiable Querying Scheme in Vehicular Fog Data Dissemination |
NETWORK |
JAVA/2019 |
JN2. |
TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment |
NETWORK |
JAVA/2019 |
JN3. |
Location-Based Online Task Assignment and Path Planning for Mobile Crowdsensing |
NETWORK |
JAVA/2019 |
JN4. |
Privacy-preserving Task Scheduling for Time-sharing Services of Autonomous Vehicles |
NETWORK |
PYTHON/2019 |
JN5. |
A Lightweight Authentication Scheme for Cloud-Based RFID Healthcare Systems |
NETWORK |
JAVA/2019 |
BC1. |
Building Redactable Consortium Blockchain for Industrial Internet-of-Things |
Blockchain |
PYTHON/JAVA/2019 |
BC2. |
A Privacy-Preserving E-Commerce System Based on the Blockchain Technology |
Blockchain |
PYTHON/JAVA/2019 |
BC3. |
Research of a Possibility of Using Blockchain Technology without Tokens to Protect Banking Transactions |
Blockchain |
PYTHON/JAVA/2019 |
ML1. |
Automatic Question Tagging with Deep Neural Networks |
Machine learning |
PYTHON/JAVA/2019 |
ML2. |
Detecting Malicious Social Bots Based on Clickstream Sequences |
Machine learning |
PYTHON/JAVA/2019 |
ML3. |
Collaborative Filtering-based Electricity Plan Recommender System |
Machine learning |
PYTHON/JAVA/2019 |
ML4. |
Leveraging Product Characteristics for Online Collusive Detection in Big Data Transactions |
Machine learning |
PYTHON/JAVA/2019 |
ML5. |
New Development of Online Retail in China and the Associated (Accounting) Challenges |
Machine learning |
PYTHON/JAVA/2019 |
ML6. |
Real-Time Change Point Detection with application to Smart Home Time Series Data |
Machine learning |
PYTHON/JAVA/2019 |
DS1. |
Authentication by Encrypted Negative Password |
Database Security |
JAVA/2019 |
DS2. |
Secure Storage for Identification; Random Resources and Privacy Leakage |
Database Security |
JAVA/2019 |
DS3. |
Passive Attacks Against Searchable Encryption |
Database Security |
JAVA/2019 |
DS4. |
Enabling Authorized Encrypted Search for Multi-Authority Medical Databases |
Database Security |
JAVA/2019 |
DS5. |
A key for John Doe: modeling and designing Anonymous Password-Authenticated Key Exchange protocols |
Database Security |
JAVA/2019 |
DS6. |
A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data |
Database Security |
JAVA/2019 |
DS7. |
Searchable Symmetric Encryption with Forward Search Privacy |
Database Security |
JAVA/2019 |
DD1. |
Enabling Encrypted Rich Queries in Distributed Key-Value Stores |
Distribute database |
JAVA/2019 |
DD2. |
Scalable Linear Algebra on a Relational Database System |
Distribute database |
JAVA/2019 |
DD3. |
Distributed Blockchain-Based Data Protection Framework for Modern Power Systems Against Cyber Attacks |
Distribute database |
JAVA/2019 |
DD4. |
GreenDB: Energy-Efficient Prefetching and Caching in Database Clusters |
Distribute database |
JAVA/2019 |
GD1. |
Indirect Customer-to-Customer Energy Trading With Reinforcement Learning |
Grid Computing |
JAVA/2019 |
GD2. |
Demand-Side Management Using Deep Learning for Smart Charging of Electric Vehicles |
Grid Computing |
JAVA/2019 |
IM1. |
Fast and Effective Image Copy-Move Forgery Detection via Hierarchical Feature Point Matching |
Image processing |
PYTHON/JAVA/2019 |
IM2 |
Encryption-Free Framework of Privacy-Preserving Image Recognition for Photo-Based Information Services |
Image processing |
PYTHON/JAVA/2019 |
AI1. |
Learning Time Series Associated Event Sequences With Recurrent Point Process Networks |
Artificial Intelligence |
PYTHON/JAVA/2019 |
AI2. |
Event Triggered Social Media Chatter: A New Modeling Framework |
Artificial Intelligence |
PYTHON/JAVA/2019 |
AI3. |
Mining Users Trust From E-Commerce Reviews Based on Sentiment Similarity Analysis |
Artificial Intelligence |
PYTHON/JAVA/2019 |
SC1 |
Delegated Authorization Framework for EHR Services using Attribute Based Encryption |
Service Computing |
JAVA/2019 |
SC2 |
A Lightweight Auditing Service for Shared Data With Secure User Revocation in Cloud Storage |
Service Computing |
JAVA/2019 |
SC3 |
Practical Multi-Keyword and Boolean Search Over Encrypted E-mail in Cloud Server |
Service Computing |
JAVA/2019 |
SC4 |
Enabling Verifiable and Dynamic Ranked Search Over Outsourced Data |
Service Computing |
JAVA/2019 |
SC5 |
Achieve Efficient and Verifiable Conjunctive and Fuzzy Queries over Encrypted Data in Cloud |
Service Computing |
JAVA/2019 |
SC6 |
A Novel Workflow-Level Data Placement Strategy for Data-Sharing Scientific Cloud Workflows |
Service Computing |
CLOUDSIM/2019 |
SC7 |
Provable Data Possession with Outsourced Data Transfer |
Service Computing |
JAVA/2019 |
SC8 |
A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage Services |
Service Computing |
JAVA/2019 |
SC9 |
A Learning Automata-based Scheduling for Deadline Sensitive Task in The Cloud |
Service Computing |
CLOUDSIM/2019 |
SC10 |
HAP: A Hybrid QoS Prediction Approach in Cloud Manufacturing combining Local Collaborative Filtering and Global Case-based Reasoning |
Service Computing |
JAVA/2019 |
SC11 |
Variation-aware Cloud Service Selection via Collaborative QoS Prediction |
Service Computing |
JAVA/2019 |
SC12 |
SMS: A Framework for Service Discovery by Incorporating Social Media Information |
Service Computing |
JAVA/2019 |
SC13 |
Ontology-Based Privacy Data Chain Disclosure Discovery Method for Big Data |
Service Computing |
JAVA/2019 |
IOT1 |
Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-assisted Industrial IoT |
IOT |
JAVA/2019 |
IOT2 |
Hybrid Keyword-Field Search With Efficient Key Management for Industrial Internet of Things |
IOT |
JAVA/2019 |
IOT3 |
SIGMM: A Novel Machine Learning Algorithm for Spammer Identification in Industrial Mobile Cloud Computing |
IOT |
JAVA/2019 |
IOT4 |
An Attribute Credential Based Public Key Scheme for Fog Computing in Digital Manufacturing |
IOT |
JAVA/2019 |
IOT5 |
FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things |
IOT |
JAVA/2019 |
MC1. |
Learning to Index for Nearest Neighbor Search |
Mobile Computing |
JAVA/2019 |
MC2. |
Multilabel Deep Visual-Semantic Embedding |
Mobile Computing |
JAVA/2019 |
MC3. |
Vocabulary-informed Zero-shot and Open-set Learning |
Mobile Computing |
JAVA/2019 |
MC4. |
Temporal Segment Networks for Action Recognition in Videos |
Mobile Computing |
JAVA/2019 |
MC5. |
Context-Aware Visual Policy Network for Fine-Grained Image Captioning |
Mobile Computing |
JAVA/2019 |