| 1 | A Deep Learning Approach to Infer Employment Status of Passengers by Using Smart Card Data | Big Data | Python / 2020 | 
								| 2 | Domain-Specific Bayesian Deep-learning Approach for Air Pollution Forecast | Big Data | Python / 2020 | 
								| 3 | A Time Series Mining Approach For Agricultural Area Detection | Big Data | Python/Java / 2020 | 
								| 4 | Benchmarking Blocking Algorithms for Web Entities | Big Data | Python/Java / 2020 | 
								| 5 | Blockchain-Based Adaptive Trust Management in Internet of Vehicles Using Smart Contract | Big Data | Java/Dotnet / 2020 | 
								| 6 | Comorbidity Patterns and its Impact on Health Outcomes: Two-way Clustering Analysis | Big Data | Java/Python / 2020 | 
								| 7 | Deep Convolutional Neural Network based Medical Concept Normalization | Big Data | Python / 2020 | 
								| 8 | EKT: Exercise-aware Knowledge Tracing for Student Performance Prediction | Big Data | Python / 2020 | 
								| 9 | Extracting Medical Knowledge   from Crowd sourced Question Answering Website | Big Data | Java/Python/Dotnet / 2020 | 
								| 10 | Geospatial Event Detection by Grouping Emotion Contagion in Social Media | Big Data | Java/Python / 2020 | 
								| 11 | Heterogeneous Daily Living Activity Learning through Domain Invariant Feature Subspace | Big Data | Java/Python / 2020 | 
								| 12 | LSTM based Phishing Detection for Big Email Data | Big Data | Python / 2020 | 
								| 13 | On Security of an Identity-Based Dynamic Data Auditing Protocol for Big Data Storage | Big Data | Python / 2020 | 
								| 14 | Optimizing Taxi Driver Profit Efficiency:A Spatial Network-Based Markov Decision Process Approach | Big Data | Java / 2020 | 
								| 15 | Overlapping Community Change-Point Detection in an Evolving Network | Big Data | Java / 2020 | 
								| 16 | P-MOD: Secure Privilege-Based Multilevel Organizational Data-Sharing in Cloud Computing | Big Data | Java/Dotnet / 2020 | 
								| 17 | Prediction of Taxi Destinations Using a Novel Data Embedding Method and Ensemble Learning | Big Data | Java/Python / 2020 | 
								| 18 | Privacy-Preserving Continuous Data Collection for Predictive Maintenance in Vehicular Fog-Cloud | Big Data | Java/Dotnet / 2020 | 
								| 19 | Product Supply Optimization for Crowdfunding Campaigns | Big Data | Java/Dotnet / 2020 | 
								| 20 | Voice of Charity: Prospecting the Donation Recurrence & Donor Retention in Crowdfunding | Big Data | Java/Dotnet / 2020 | 
								| 21 | Sense and Sensibility: Characterizing Social Media Users Regarding the Use of Controversial Terms for COVID-19 | Big Data | Python / 2020 | 
								| 22 | Short-term Rainfall Forecasting Using Multi-layer Perceptron | Big Data | Java/Python / 2020 | 
								| 23 | D-LSTM: Short-Term Road Traffic Speed Prediction Model Based on GPS Positioning Data | Big Data | Python / 2020 | 
								| 24 | Taxi Demand Prediction Using Parallel Multi-Task Learning Model | Big Data | Python / 2020 | 
								| 25 | Traffic Demand Prediction Based on Dynamic Transition Convolutional Neural Network | Big Data | Python / 2020 | 
								| 26 | Transfer to Rank for Top-N Recommendation | Big Data | Python/Java / 2020 | 
								| 27 | OpinionRank: Trustworthy Website Detection using Three Valued Subjective Logic | Big Data | Java/Dotnet / 2020 | 
								| 28 | T-PCCE: Twitter Personality based Communicative Communities Extraction System for Big Data | Big Data | Python/Java / 2020 | 
								| 29 | Crowdsourcing based Description of Urban Emergency Events using Social Media Big Data | Big Data | Python / 2020 | 
								| 30 | A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage | Cloud computing | Java/Dotnet / 2020 | 
								| 31 | A New Lightweight Symmetric Searchable Encryption Scheme for String Identification | Cloud computing | Java/Dotnet / 2020 | 
								| 32 | Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data | Cloud computing | Java/Dotnet / 2020 | 
								| 33 | An Efficient Privacy-Aware Authentication Scheme with Hierarchical Access Control for Mobile Cloud Computing Services | Cloud computing | Java/Dotnet / 2020 | 
								| 34 | Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT | Cloud computing | Java/Dotnet / 2020 | 
								| 35 | Authentication and Key Agreement Based on Anonymous Identity for Peer-to-Peer Cloud | Cloud computing | Java/Dotnet / 2020 | 
								| 36 | Designing Secure and Efficient Biometric-Based Secure Access Mechanism for Cloud Services | Cloud computing | Python/Java/Dotnet / 2020 | 
								| 37 | DNA Similarity Search with Access Control over Encrypted Cloud Data | Cloud computing | Java/Dotnet / 2020 | 
								| 38 | Efficient Decentralized Attribute Based Access Control for Mobile Clouds | Cloud computing | Java/Dotnet / 2020 | 
								| 39 | Fast Secure and Anonymous Key Agreement Against Bad Randomness for Cloud Computing | Cloud computing | Java/Dotnet / 2020 | 
								| 40 | Fine-grained Query Authorization with Integrity Verification over Encrypted Spatial Data in Cloud Storage | Cloud computing | Java/Dotnet / 2020 | 
								| 41 | Intelligent Health Vessel ABC-DE: An Electrocardiogram Cloud Computing Service | Cloud computing | Java/Dotnet / 2020 | 
								| 42 | QuickN: Practical and Secure Nearest NeighborSearch on Encrypted Large-Scale Data | Cloud computing | Java/Dotnet / 2020 | 
								| 43 | Practical Multi-keyword Ranked Search with Access Control over Encrypted Cloud | Cloud computing | Java/Dotnet / 2020 | 
								| 44 | Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing | Cloud computing | Java/Dotnet / 2020 | 
								| 45 | Privacy-Preserving Subgraph Matching Scheme with Authentication in Social Networks | Cloud computing | Java/Dotnet / 2020 | 
								| 46 | PKE-MET: Public-Key Encryption with Multi-Ciphertext Equality Test in Cloud Computing | Cloud computing | Java/Dotnet / 2020 | 
								| 47 | Publicly Verifiable Shared Dynamic Electronic Health Record Databases with Functional Commitment Supporting Privacy-Preserving Integrity Auditing | Cloud computing | Java/Dotnet / 2020 | 
								| 48 | Threshold Multi-keyword Search for Cloud-Based Group Data Sharing | Cloud computing | Java/Dotnet / 2020 | 
								| 49 | Towards Secure and Efficient Equality Conjunction Search over Outsourced Databases | Cloud computing | Java/Dotnet / 2020 | 
								| 50 | VPSL: Verifiable Privacy-Preserving Data Search for Cloud-Assisted Internet of Things | Cloud computing | Java/Dotnet / 2020 | 
								| 51 | Verifiable Searchable Encryption Framework against Insider Keyword-Guessing Attack in Cloud Storage | Cloud computing | Java/Dotnet / 2020 | 
								| 52 | PriRadar: A Privacy-Preserving Framework for Spatial Crowdsourcing | Network Security | Java/Python / 2020 | 
								| 53 | DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain | Network Security | Java/Python / 2020 | 
								| 54 | SDTE: A Secure Blockchain-based Data Trading Ecosystem | Network Security | Java/Python / 2020 | 
								| 55 | SecureNLP: A System for Multi-Party Privacy-Preserving Natural Language Processing | Network Security | Python / 2020 | 
								| 56 | A Verifiable Semantic Searching Scheme by Optimal Matching over Encrypted Data in Public Cloud | Network Security | Java/Dotnet / 2020 | 
								| 57 | An Adaptive Authenticated Data Structure With Privacy-Preserving for Big Data Stream in Cloud | Network Security | Java/Dotnet / 2020 | 
								| 58 | AAAS: An Anonymous Authentication Scheme Based on Group Signature in VANETs(IEEE Access) | Network Security | Java/Dotnet / 2020 | 
								| 59 | An Efficient Conditional Privacy-Preserving Authentication Scheme for the Prevention of Side-Channel Attacks in Vehicular Ad hoc Networks(IEEE Access) | Network Security | Java/Dotnet/Python / 2020 | 
								| 60 | An end-to-end attack on text CAPTCHAs | Network Security | Python / 2020 | 
								| 61 | Anonymous Single Sign-on with Proxy Re-Verification | Network Security | Java / 2020 | 
								| 62 | Authorized keyword searches on public key encrypted data with time controlled keyword privacy | Network Security | Java/Dotnet / 2020 | 
								| 63 | Pay as You Decrypt: Decryption Outsourcing for Functional Encryption Using Blockchain | Network Security | Java/Dotnet / 2020 | 
								| 64 | HawkesEye: Detecting Fake Retweeters Using Hawkes Process and Topic Modeling | Network Security | Python / 2020 | 
								| 65 | Extensible Conditional Privacy Protection Authentication Scheme for Secure Vehicular Networks in a Multi-Cloud Environment | Network Security | Java/Dotnet / 2020 | 
								| 66 | LPPA: Lightweight Privacy-preserving Authentication from Efficient Multi-key Secure Outsourced Computation for Location-based Services in VANETs | Network Security | Java/Dotnet / 2020 | 
								| 67 | On the Security of Reversible Data Hiding in Encrypted Images by MSB Prediction | Network Security | Java/Python / 2020 | 
								| 68 | Practical Escrow Protocol for Bitcoin | Network Security | Java/Python / 2020 | 
								| 69 | PrivateLink: Privacy-Preserving Integration and Sharing of Datasets | Network Security | Java/Dotnet / 2020 | 
								| 70 | Private Coded Matrix Multiplication | Network Security | Java/Python / 2020 | 
								| 71 | Puncturable Signatures and Applications in Proof-of-Stake Blockchain Protocols | Network Security | Java/Dotnet / 2020 | 
								| 72 | Reversible Image Secret Sharing | Network Security | / 2020 | 
								| 73 | A Blockchain-based Model for Cloud Service Quality Monitoring | Blockchain | Python / 2020 | 
								| 74 | A Blockchain-Based Searchable Public-Key Encryption with Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks | Blockchain | Java/Dotnet / 2020 | 
								| 75 | Decentralized Blockchain-Based Trust Management Protocol for the Internet of Things | Blockchain | Java/Dotnet / 2020 | 
								| 76 | DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain | Blockchain | Java/Dotnet / 2020 | 
								| 77 | SDTE: A Secure Blockchain-based Data Trading Ecosystem | Blockchain | Java/Dotnet / 2020 | 
								| 78 | Blockchain Based Anonymous Authentication with Key Management for Smart Grid Edge Computing Infrastructure | Blockchain | Java/Dotnet / 2020 | 
								| 79 | Blockchain-Based Adaptive Trust Management in Internet of Vehicles Using Smart Contract | Blockchain | Java/Dotnet / 2020 | 
								| 80 | Blockchain-based Data Storage with Privacy and Authentication in Internet-of-Things | Blockchain | Java/Dotnet / 2020 | 
								| 81 | GUARDIAN: Blockchain-based Secure Demand Response Management in Smart Grid System | Blockchain | Java/Dotnet / 2020 | 
								| 82 | Pay as You Decrypt: Decryption Outsourcing for Functional Encryption Using Blockchain | Blockchain | Java/Dotnet / 2020 | 
								| 83 | Lightweight Blockchain Consensus Protocols for Vehicular Social Networks | Blockchain | Java/Dotnet / 2020 | 
								| 84 | Groupchain: Towards a Scalable Public Blockchain in Fog Computing of IoT Services Computing | Blockchain | Java/Dotnet / 2020 | 
								| 85 | A blockchain-based trust management with conditional privacy-preserving announcement scheme for VANETs | Blockchain | Java/Dotnet / 2020 | 
								| 86 | GERF: a group event recommendation framework based on learning-to-rank | DataMining | Java/Dotnet / 2020 | 
								| 87 | A Unified Framework for User Identification across Online and Offline Data | DataMining | Python / 2020 | 
								| 88 | Adaptive Similarity Embedding for Unsupervised Multi-View Feature Selection | DataMining | Java/Python / 2020 | 
								| 89 | BRIGHT - Drift-Aware Demand Predictions for Taxi Networks | DataMining | Python / 2020 | 
								| 90 | Building Personalized Transportation Model for Online Taxi-Hailing Demand Prediction | DataMining | Java/Python / 2020 | 
								| 91 | Citywide Bike Usage Prediction in a Bike-Sharing System | DataMining | Python / 2020 | 
								| 92 | SentiDiff: Combining Textual Information and Sentiment Diffusion Patterns for Twitter Sentiment Analysis | DataMining | Java/Python / 2020 | 
								| 93 | CAPER: Context-Aware Personalized Emoji Recommendation | DataMining | Java/Python / 2020 | 
								| 94 | DAG: A General Model for Privacy-Preserving Data Mining | DataMining | Python / 2020 | 
								| 95 | Dynamic Connection-based Social Group Recommendation | DataMining | Java / 2020 | 
								| 96 | Enriching Data Imputation under Similarity Rule Constraints | DataMining | Python/Java / 2020 | 
								| 97 | e-RNSP: An Efficient Method for Mining Repetition Negative Sequential Patterns | DataMining | Java/Python / 2020 | 
								| 98 | ESPM: Efficient Spatial Pattern Matching | DataMining | Java / 2020 | 
								| 99 | From Anticipation to Action: Data Reveal Mobile Shopping Patterns During a Yearly Mega Sale Event in China | DataMining | Java / 2020 | 
								| 100 | Half-Quadratic Minimization for Unsupervised Feature Selection on Incomplete Data | DataMining | Python / 2020 | 
								| 101 | Hierarchical Latent Context Representation for Context-Aware Recommendations | DataMining | Python / 2020 | 
								| 102 | Item Recommendation for Word-of-Mouth Scenario in Social E-Commerce | DataMining | Python/Java / 2020 | 
								| 103 | MAB-Based Reinforced Worker Selection Framework for Budgeted Spatial Crowdsensing | DataMining | Python / 2020 | 
								| 104 | Mining Maximal Dynamic Spatial Colocation Patterns | DataMining | Java/Dotnet / 2020 | 
								| 105 | On both Cold-Start and Long-Tail Recommendation with Social Data | DataMining | Java/Python / 2020 | 
								| 106 | Online Pricing with Reserve Price Constraint for Personal Data Markets | DataMining | Java/Python / 2020 | 
								| 107 | Personalized Long- and Short-term Preference Learning for Next POI Recommendation | DataMining | Java/Dotnet / 2020 | 
								| 108 | Predicting Hot Events in the Early Period through Bayesian Model for Social Networks | DataMining | Java/Dotnet / 2020 | 
								| 109 | Privacy-Preserving User Profile Matching in Social Networks | DataMining | Java/Python / 2020 | 
								| 110 | Product Quantized Collaborative Filtering | DataMining | Java/Dotnet / 2020 | 
								| 111 | Quality Inference Based Task Assignment in Mobile Crowdsensing | DataMining | Java/Python/Dotnet / 2020 | 
								| 112 | Representation Learning from Limited Educational Data with Crowdsourced Labels | DataMining | Java/Dotnet / 2020 | 
								| 113 | Representation Learning with Multi-level Attention for Activity Trajectory Similarity Computation | DataMining | Java/Dotnet / 2020 | 
								| 114 | Robust Cumulative Crowdsourcing Framework Using New Incentive Payment Function and Joint Aggregation Model | DataMining | Python / 2020 | 
								| 115 | SRA: Secure Reverse Auction for Task Assignment in Spatial Crowdsourcing | DataMining | Java/Dotnet / 2020 | 
								| 116 | Sequence Pattern Mining with Variables | DataMining | Java/Dotnet / 2020 | 
								| 117 | SoulMate: Short-text author linking through Multi-aspect temporal-textual embedding | DataMining | Java / 2020 | 
								| 118 | Trust Relationship Prediction in Alibaba E-Commerce Platform | DataMining | Python / 2020 | 
								| 119 | Using Latent Knowledge to Improve Real-Time Activity Recognition for Smart IoT | DataMining | Java/Python / 2020 | 
								| 120 | Blockchain Based Anonymous Authentication with Key Management for Smart Grid Edge Computing Infrastructure | Edge Computing | Java/Python / 2020 | 
								| 121 | Cost-Effective App Data Distribution in Edge Computing | Edge Computing | Java/Dotnet / 2020 | 
								| 122 | Lightweighted Secure Searching over Public-key Ciphertexts for Edge-Cloud Assisted Industrial IoT Devices | Edge Computing | Java / 2020 | 
								| 123 | DeepEDN: A Deep Learning-based Image Encryption and Decryption Network for Internet of Medical Things | IOT | Java/Dotnet / 2020 | 
								| 124 | A Secure and Efficient Cloud-Centric Internet of Medical Things-Enabled Smart Healthcare System with Public Verifiability | IOT | Python / 2020 | 
								| 125 | A Trusted Attestation Scheme for Data Source of Internet of Things in Smart City Based on Dynamic Trust Classification | IOT | Java/Dotnet / 2020 | 
								| 126 | Blockchain-based Data Storage with Privacy and Authentication in Internet-of-Things | IOT | Java/Dotnet / 2020 | 
								| 127 | CB-CAS: Certificate-Based Efficient Signature Scheme with Compact Aggregation for Industrial Internet of Things Environment | IOT | Java/Dotnet / 2020 | 
								| 128 | Decentralized Self-enforcing Trust Management System for Social Internet of Things | IOT | Java/Dotnet / 2020 | 
								| 129 | ST-DeepHAR: Deep Learning Model for Human Activity Recognition in IoHT Applications | IOT | Java/Dotnet / 2020 | 
								| 130 | Deep Learning Enhanced Human Activity Recognition for Internet of Healthcare Things | IOT | Python / 2020 | 
								| 131 | Energy-Efficient Resource Allocation for Blockchain-Enabled Industrial Internet of Things with Deep Reinforcement Learning | IOT | / 2020 | 
								| 132 | NeuroTrust - Artificial Neural Network-based Intelligent Trust Management Mechanism for Large-Scale Internet of Medical Things | IOT | Python / 2020 | 
								| 133 | Preserving Balance between Privacy and Data Integrity in Edge-Assisted Internet of Things | IOT | Java/Python / 2020 | 
								| 134 | Privacy-Preserving Implicit Authentication Protocol Using Cosine Similarity for Internet of Things | IOT | Java/Dotnet / 2020 | 
								| 135 | Robust Spammer Detection Using Collaborative Neural Network in Internet of Thing Applications | IOT | Java/Dotnet / 2020 | 
								| 136 | Matchmaker: Stable Task Assignment with Bounded Constraints for Crowdsourcing Platforms | IOT | Java/Dotnet / 2020 | 
								| 137 | Time-aware Smart Object Recommendation in Social Internet of Things | IOT | Python / 2020 | 
								| 138 | A Flexible Deep CNN Framework for Image Restoration | Image Processing | Java/Dotnet / 2020 | 
								| 139 | A Framework of Reversible Color-tograyscale Conversion with Watermarking Feature | Image Processing | Java/Dotnet / 2020 | 
								| 140 | A Joint Relationship Aware Neural Network for Single-Image 3D Human Pose Estimation | Image Processing | Python / 2020 | 
								| 141 | Conditional Variational Image Deraining | Image Processing | Python / 2020 | 
								| 142 | End-to-End Single Image Fog Removal Using Enhanced Cycle Consistent Adversarial Networks | Image Processing | Python / 2020 | 
								| 143 | KT-GAN: Knowledge-Transfer Generative Adversarial Network for Text-to-Image Synthesis | Image Processing | Python / 2020 | 
								| 144 | Object Discovery From a Single Unlabeled Image by Mining Frequent Itemset With Multi-scale Features | Image Processing | Python / 2020 | 
								| 145 | Outlier Detection Using Structural Scores in a High-Dimensional Space | Image Processing | Python / 2020 | 
								| 146 | Personality-Assisted Multi-Task Learning for Generic and Personalized Image Aesthetics Assessment | Image Processing | Python / 2020 | 
								| 147 | Towards Unsupervised Deep Image Enhancement With Generative Adversarial Network | Image Processing | Python / 2020 | 
								| 148 | Differentially Private Unknown Worker Recruitment for Mobile Crowdsensing Using Multi-Armed Bandits | Mobile Computing | Python / 2020 | 
								| 149 | Enabling Strong Privacy Preservation and Accurate Task Allocation for Mobile Crowdsensing | Mobile Computing | Python / 2020 | 
								| 150 | Fine-Grained User Profiling for Personalized Task Matching in Mobile Crowdsensing | Mobile Computing | Java/Dotnet / 2020 | 
								| 151 | HyTasker: Hybrid Task Allocation in Mobile Crowd Sensing | Mobile Computing | Java/Dotnet / 2020 | 
								| 152 | Incentive Mechanism for Multiple Cooperative Tasks with Compatible Users in Mobile Crowd Sensing via Online Communities | Mobile Computing | Java/Dotnet / 2020 | 
								| 153 | ARETE: On Designing Joint Online Pricing and Reward Sharing Mechanisms for Mobile Data Markets | Mobile Computing | Java/Dotnet / 2020 | 
								| 154 | Privacy-Preserving Media Sharing with Scalable Access Control and Secure Deduplication in Mobile Cloud Computing | Mobile Computing | Java/Dotnet / 2020 | 
								| 155 | Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing | Mobile Computing | Java/Dotnet / 2020 | 
								| 156 | Stable Task Assignment for Mobile Crowdsensing with Budget Constraint | Mobile Computing | Java/Dotnet / 2020 | 
								| 157 | Towards Personalized Privacy Preserving Incentive for Truth Discovery in Mobile CrowdsensingSystems | Mobile Computing | Java/Dotnet / 2020 | 
								| 158 | A Blockchain-Based Searchable Public-Key Encryption with Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks | Networking | Java/Dotnet / 2020 | 
								| 159 | A Distributed Mobile Fog Computing Scheme for Mobile Delay-Sensitive Applications in SDN-Enabled Vehicular Networks | Networking | Java/Dotnet / 2020 | 
								| 160 | A Novel Multi-task learning framework for Semi-supervised Semantic Parsing | Networking | Java/Dotnet / 2020 | 
								| 161 | A Secure and Verifiable Data Sharing Scheme Based on Blockchain in Vehicular Social Networks | Networking | Java/Dotnet / 2020 | 
								| 162 | Ant Colony Optimization for the Control of Pollutant Spreading on Social Networks | Networking | Python / 2020 | 
								| 163 | Congestion Propagation Based Bottleneck Identification in Urban Road Networks | Networking | Java/Dotnet / 2020 | 
								| 164 | Lightweight Blockchain Consensus Protocols for Vehicular Social Networks | Networking | Python / 2020 | 
								| 165 | Multi-Party Privacy ConflictManagement in Online Social Networks: A Network Game Perspective | Networking | Java/Dotnet / 2020 | 
								| 166 | Quick and Accurate False Data Detection in Mobile Crowd Sensing | Networking | Java/Dotnet / 2020 | 
								| 167 | Random Network Coding Enabled Routing Protocol in Unmanned Aerial Vehicle Networks | Networking | Java/Dotnet / 2020 | 
								| 168 | Source-Location Privacy Protection based on Anonymity Cloud in Wireless Sensor Networks | Networking | Python / 2020 | 
								| 169 | LDV: A Lightweight DAG-based Blockchain for Vehicular Social Networks | Networking | Ns2 / 2020 | 
								| 170 | A Semisupervised Recurrent Convolutional Attention Model for Human Activity Recognition | Neural Network | Ns2 / 2020 | 
								| 171 | A Wide-Deep-Sequence Model-Based Quality Prediction Method in Industrial Process Analysis | Neural Network | Java/Dotnet / 2020 | 
								| 172 | Adversarial Training-Based Hard Example Mining for Pedestrian Detection in Fish-Eye Images | Neural Network | Python / 2020 | 
								| 173 | Context-Aware Deep Spatiotemporal Network for Hand Pose Estimation From Depth Images | Neural Network | Python / 2020 | 
								| 174 | Deep Pyramidal Pooling With Attention for Person Re-Identification | Neural Network | Python / 2020 | 
								| 175 | Deep Representation-Based Domain Adaptation for Nonstationary EEG Classification | Neural Network | Python / 2020 | 
								| 176 | Deep Saliency Hashing for Fine-Grained Retrieval | Neural Network | Python / 2020 | 
								| 177 | Discriminative Reconstruction Constrained  Generative Adversarial Network for Hyperspectral Anomaly Detection | Neural Network | Python / 2020 | 
								| 178 | Discriminative Residual Analysis for Image SetClassification with Posture and Age Variations | Neural Network | Python / 2020 | 
								| 179 | Emotion Correlation Mining Through Deep Learning Models on Natural Language Text | Neural Network | Python / 2020 | 
								| 180 | Hierarchical Human-Like Deep Neural Networks for Abstractive Text Summarization | Neural Network | Python / 2020 | 
								| 181 | Lightening Network for Low-light Image Enhancement | Neural Network | Python / 2020 | 
								| 182 | Local–Global Memory Neural Network for Medication Prediction | Neural Network | Python / 2020 | 
								| 183 | SIF: Self-Inspirited Feature Learning for Person Re-Identification | Neural Network | Python / 2020 | 
								| 184 | Taxi Demand Prediction Using Parallel Multi-Task Learning Model | Neural Network | Python / 2020 | 
								| 185 | Thresholds Based Image Extraction Schemes in Big Data Environment in Intelligent Traffic Management | Neural Network | Python / 2020 | 
								| 186 | Vision-Based Fatigue Driving Recognition Method Integrating Heart Rate and Facial Features | Neural Network | Python / 2020 | 
								| 187 | A Highly Reliable Metadata Service for Large-Scale Distributed File Systems | Parallel And Distributed Computing | Python / 2020 | 
								| 188 | Enabling Encrypted Boolean Queries in Geographically Distributed Databases | Parallel And Distributed Computing | Python / 2020 | 
								| 189 | Fully Homomorphic based Privacy-Preserving Distributed Expectation Maximization on Cloud | Parallel And Distributed Computing | Java/Dotnet / 2020 | 
								| 190 | BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users | Secure Computing | Java/Dotnet / 2020 | 
								| 191 | Decentralized Blockchain-Based Trust Management Protocol for the Internet of Things | Secure Computing | Java/Dotnet / 2020 | 
								| 192 | Achieve Efficient and Privacy-preserving Disease Risk Assessment over Multi-outsourced Vertical Datasets | Secure Computing | Java/Dotnet / 2020 | 
								| 193 | Adaptive Secure Nearest Neighbor Query Processing over Encrypted Data | Secure Computing | Java/Dotnet / 2020 | 
								| 194 | An Anonymous Authentication System for Pay-As-You-Go Cloud Computing | Secure Computing | Java/Dotnet / 2020 | 
								| 195 | Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices | Secure Computing | Java/Dotnet / 2020 | 
								| 196 | Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme with Enhanced Security Provision | Secure Computing | Java/Dotnet / 2020 | 
								| 197 | Efficient Secure Pattern Matching with Malicious Adversaries | Secure Computing | Java/Dotnet / 2020 | 
								| 198 | Lightweight Sharable and Traceable Secure Mobile Health System | Secure Computing | Java/Dotnet / 2020 | 
								| 199 | PBT: A New Privacy-Preserving Payment Protocol for Blockchain Transactions | Secure Computing | Java/Dotnet / 2020 | 
								| 200 | Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions | Secure Computing | Java/Dotnet / 2020 | 
								| 201 | Practical and Provably Secure Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Mobile Lightweight Devices | Secure Computing | Java/Dotnet / 2020 | 
								| 202 | Providing Task Allocation and Secure Deduplicationfor Mobile Crowdsensing via Fog Computing | Secure Computing | Java/Python / 2020 | 
								| 203 | Secure Keyword Search and Data Sharing Mechanism for Cloud Computing | Secure Computing | Java/Dotnet / 2020 | 
								| 204 | Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment | Secure Computing | Java/Dotnet / 2020 | 
								| 205 | A Blockchain-based Model for Cloud Service Quality Monitoring | Service Computing | Java/Dotnet / 2020 | 
								| 206 | FASE: A Fast and Accurate Privacy-Preserving Multi-keyword Top-k Retrieval Scheme over Encrypted Cloud Data | Service Computing | Java/Dotnet / 2020 | 
								| 207 | A Practical System for Privacy-Aware Targeted Mobile Advertising Services | Service Computing | Java/Dotnet / 2020 | 
								| 208 | Achieving Practical Symmetric Searchable Encryption with Search Pattern Privacy over Cloud | Service Computing | Java/Dotnet / 2020 | 
								| 209 | Achieving Searchable Encryption Scheme with Search Pattern Hidden | Service Computing | Java/Dotnet / 2020 | 
								| 210 | AQA: An Adaptive Quality Assessment Framework for Online Review Systems | Service Computing | Java/Dotnet / 2020 | 
								| 211 | IMS: An Identity-Based Many-to-Many Subscription Scheme with Efficient Key Management for Wireless Broadcast Systems | Service Computing | Java/Dotnet / 2020 | 
								| 212 | Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing | Service Computing | Java/Python / 2020 | 
								| 213 | GUARDIAN:Blockchain-based Secure Demand Response Management in Smart Grid System | Service Computing | Java / 2020 | 
								| 214 | ContractGuard: Defend Ethereum Smart Contracts with Embedded Intrusion Detection | Service Computing | Java/Dotnet / 2020 | 
								| 215 | Dynamic Outsourced Auditing Services for Cloud Storage Based on Batch-Leaves- Authenticated Merkle Hash Tree | Service Computing | Java/Dotnet / 2020 | 
								| 216 | Enabling Fast Public Auditing and Data Dynamics in Cloud Services | Service Computing | Java/Dotnet / 2020 | 
								| 217 | Flexible Wildcard Searchable Encryption System | Service Computing | Java/Dotnet / 2020 | 
								| 218 | Full Verifiability for Outsourced Decryption in Attribute Based Encryption | Service Computing | Java/Dotnet / 2020 | 
								| 219 | Message-Locked Searchable Encryption: A New Versatile Tool for Secure Cloud Storage | Service Computing | Java/Dotnet / 2020 | 
								| 220 | Mining Domain Knowledge on Service Goal Goals from Textual Service Descriptions | Service Computing | Java/Dotnet / 2020 | 
								| 221 | Multi-value-Independent Ciphertext-Policy Attribute Based Encryption with Fast Keyword Search | Service Computing | Java/Dotnet / 2020 | 
								| 222 | Personalized Recommendation System based on Collaborative Filtering for IoT Scenarios | Service Computing | Java/Dotnet / 2020 | 
								| 223 | Secure and Efficient Cloud Data Deduplication with Ownership Management | Service Computing | Java/Dotnet / 2020 | 
								| 224 | Groupchain: Towards a Scalable Public Blockchain in Fog Computing of IoT Services Computing | Service Computing | Java/Dotnet / 2020 | 
								| 225 | DORA: A Destination Oriented Routing Algorithm for Energy-Balanced Wireless Sensor Networks | WSN | Java/Dotnet / 2020 | 
								| 226 | LIDOR: A Lightweight DoS-Resilient Communication Protocol for Safety-Critical IoT Systems | WSN | Java/Dotnet / 2020 | 
								| 227 | A Dynamic Multipath Scheme for Protecting Source-Location Privacy Using Multiple Sinks in WSNs Intended for IIoT | WSN | Ns2 / 2020 | 
								| 228 | A Secure Clustering Protocol with Fuzzy Trust Evaluation and Outlier Detection for Industrial Wireless Sensor Networks | WSN | Ns2 / 2020 | 
								| 229 | A Trust-based Security System for Data Collecting in Smart City | WSN | Ns2 / 2020 | 
								| 230 | I-SEP: An Improved Routing Protocol for Heterogeneous WSN for IoT based Environmental Monitoring | WSN | Ns2 / 2020 | 
								| 231 | Centralized Routing Protocol for DetectingWormhole Attacks in WirelessSensor Networks(IEEE Access) | WSN | Ns2 / 2020 | 
								| 232 | CPSLP: A Cloud-Based Scheme for ProtectingSource-Location Privacy in Wireless Sensor Networks Using Multi-Sinks | WSN | Ns2 / 2020 | 
								| 233 | Delay-aware Green Routing for Mobile Sink based Wireless Sensor Networks | WSN | Ns2 / 2020 | 
								| 234 | Energy-Efficient Relay Selection based Dynamic Routing Algorithm for IoT-Oriented Software-Defined WSNs | WSN | Ns2 / 2020 | 
								| 235 | Latency-Aware Path Planning for Disconnected Sensor Networks with Mobile Sinks | WSN | Ns2 / 2020 | 
								| 236 | Tuft: Tree Based Heuristic Data Dissemination for Mobile Sink Wireless Sensor Networks | WSN | Ns2 / 2020 | 
								| 237 | A Multi-Path Routing Protocol Based on Link Lifetime and Energy Consumption Prediction for Mobile Edge Computing(IEEE Access) | WSN | Ns2 / 2020 | 
								| 238 | A Smart Collaborative Routing Protocol for Delay Sensitive Applications in Industrial IoT(IEEE Access) | WSN | Ns2 / 2020 | 
								| 239 | A Stable and Reliable Short-Path Routing Scheme for Efficient Acoustic Wireless Sensor Networks (AWSNs) (IEEE Access) | WSN | Ns2 / 2020 | 
								| 240 | An Energy Efficient Routing Protocol Based on Improved Artificial Bee Colony Algorithm for Wireless Sensor Networks(IEEE Access) | WSN | Ns2 / 2020 | 
								| 241 | An Energy-Efficient Mobility-Based Cluster Head Selection for Lifetime Enhancement of Wireless Sensor Networks(IEEE Access) | WSN | Ns2 / 2020 | 
								| 242 | Energy-Efficient and Load-Balanced Clustering Routing Protocol for Wireless Sensor Networks Using a Chaotic Genetic Algorithm(IEEE Access) | WSN | Ns2 / 2020 | 
								| 243 | Fault Tolerance Mechanism Combining Static Backup and Dynamic Timing Monitoring forCluster Heads(IEEE Access) | WSN | Ns2 / 2020 | 
								| 244 | Heterogeneous Energy and Traffic Aware Sleep-Awake Cluster-Based Routing Protocol for Wireless Sensor Network(IEEE Access) | WSN | Ns2 / 2020 | 
								| 245 | New Approach of Energy-Efficient Hierarchical Clustering Based on Neighbor Rotation for RWSN(IEEE Access) | WSN | Ns2 / 2020 | 
								| 246 | Routing Clustering Protocol for 3D Wireless Sensor Networks Based on Fragile Collection Ant Colony Algorithm(IEEE Access) | WSN | Ns2 / 2020 | 
								| 247 | FFRP: Dynamic Firefly Mating Optimization Inspired Energy Efficient Routing Protocol for Internet of Underwater Wireless Sensor Networks(IEEE Access) | WSN | Ns2 / 2020 | 
								| 248 | Towards Void Hole Alleviation: EnhancedGEographic and Opportunistic RoutingProtocols in Harsh Underwater WSNs(IEEE Access) | WSN | Ns2 / 2020 | 
								| 249 | SEECR: Secure Energy Efficient and Cooperative Routing Protocol for Underwater Wireless Sensor Networks(IEEE Access) | WSN | Ns2 / 2020 | 
								| 250 | A Novel Broadcast Network Design for Routing in Mobile Ad-Hoc Network | MANET | Ns2 / 2020 | 
								| 251 | An Adaptive on-Demand Multipath Routing Protocol With QoS Support for High-Speed MANET(IEEE Access) | MANET | Ns2 / 2020 | 
								| 252 | Dual-Channel-Based Mobile Ad Hoc Network Routing Technique for Indoor Disaster Environment(IEEE Access) | MANET | Ns2 / 2020 | 
								| 253 | Efficient Route Discovery and Link Failure Detection Mechanisms for Source Routing Protocol in Mobile Ad-Hoc Networks(IEEE Access) | MANET | Ns2 / 2020 | 
								| 254 | Mitigation of Black Hole and Gray Hole Attack Using Swarm Inspired Algorithm With Artificial Neural Network(IEEE Access) | MANET | Ns2 / 2020 | 
								| 255 | Multipath Routing Protocol Using Genetic Algorithm in Mobile Ad Hoc Networks(IEEE Access) | MANET | Ns2 / 2020 | 
								| 256 | Trust Routing Protocol Based on Cloud-Based Fuzzy Petri Net and Trust Entropy for Mobile Ad hoc Network(IEEE Access) | MANET | Ns2 / 2020 | 
								| 257 | Trust-Based Probabilistic Broadcast Scheme for Mobile Ad Hoc Networks(IEEE Access) | MANET | Ns2 / 2020 | 
								| 258 | Trusted Opportunistic Routing Based on Node Trust Model(IEEE Access) | MANET | Ns2 / 2020 | 
								| 259 | An Efficient Load Balancing Scheme of EnergyGauge Nodes to Maximize the Lifespan ofConstraint Oriented Networks(IEEE Access) | Heterogeneous WSN | Ns2 / 2020 | 
								| 260 | Coyote Optimization Based on a Fuzzy Logic Algorithm for Energy-Efficiency in Wireless Sensor Networks(IEEE Access) | Heterogeneous WSN | Ns2 / 2020 | 
								| 261 | Energy-Efficient Cooperative Routing Scheme for Heterogeneous Wireless Sensor Networks(IEEE Access) | Heterogeneous WSN | Ns2 / 2020 | 
								| 262 | Scalable Grid-Based Data Gathering Algorithm for Environmental Monitoring Wireless Sensor Networks(IEEE Access) | Heterogeneous WSN | Ns2 / 2020 | 
								| 263 | A Simple and Robust Clustering Scheme for Large-Scale and Dynamic VANETs(IEEE Access) | VANET | Ns2 / 2020 | 
								| 264 | An Adaptive Relay Selection Scheme for Enhancing Network Stability in VANETs(IEEE Access) | VANET | Ns2 / 2020 | 
								| 265 | AATMS: An Anti-Attack Trust Management Scheme in VANET(IEEE Access) | VANET | Ns2 / 2020 | 
								| 266 | Beaconless Traffic-Aware Geographical RoutingProtocol for Intelligent Transportation System(IEEE Access) | VANET | Ns2 / 2020 | 
								| 267 | Intelligent Detection of Black Hole Attacks for Secure Communication in Autonomous and Connected Vehicles(IEEE Access) | VANET | Ns2 / 2020 | 
								| 268 | New Discrete Cuckoo Search Optimization Algorithms for Effective Route Discovery in IoT-Based Vehicular Ad-Hoc Networks(IEEE Access) | VANET | Ns2 / 2020 | 
								| 269 | On the Elliptic Curve Cryptography for Privacy-Aware Secure ACO-AODV Routing in Intent-Based Internet of Vehicles for Smart Cities | VANET | Ns2 / 2020 | 
								| 270 | Parking-area-assisted Spider-web Routing Protocol for Emergency Data in Urban VANET | VANET | Ns2 / 2020 | 
								| 271 | RSU-Assisted Traffic-Aware Routing Based on Reinforcement Learning for Urban Vanets(IEEE Access) | VANET | Ns2 / 2020 | 
								| 272 | A Provenance-Aware Distributed Trust Model forResilient Unmanned Aerial Vehicle Networks(IEEE Access) | UAV | Ns2 / 2020 | 
								| 273 | Mobility and Location-Aware Stable Clustering Scheme for UAV Networks(IEEE Access) | UAV | Ns2 / 2020 | 
								| 274 | Smart IoT Control-Based Nature Inspired Energy Efficient Routing Protocol for Flying Ad Hoc Network (FANET)(IEEE Access) | UAV | Ns2 / 2020 | 
								| 275 | Object Discovery From a Single Unlabeled Image by Mining Frequent Itemset With Multi-scale Features | Image Processing | Ns2 / 2020 | 
								| 276 | Personality-Assisted Multi-Task Learning for Generic and Personalized Image Aesthetics Assessment | Image Processing | Ns2 / 2020 | 
								| 277 | A Wide-Deep-Sequence Model-Based Quality Prediction Method in Industrial Process Analysis | Machine Learning | Python / 2020 | 
								| 278 | Emotion Correlation Mining Through Deep Learning Models on Natural Language Text | Machine Learning | Python / 2020 | 
								| 279 | Local-Global Memory Neural Network for Medication Prediction | Machine Learning | Python / 2020 | 
								| 280 | Hierarchical Human-Like Deep Neural Networks for Abstractive Text Summarization | Machine Learning | Python / 2020 | 
								| 281 | Discriminative Residual Analysis for Image Set Classification With Posture and Age Variations | Machine Learning | Python / 2020 | 
								| 282 | Thresholds Based Image Extraction Schemes in Big Data Environment in Intelligent Traffic Management | Machine Learning | Python / 2020 | 
								| 283 | Adversarial Training-Based Hard Example Mining for Pedestrian Detection in Fish-Eye Images | Machine Learning | Python / 2020 | 
								| 284 | Deep Saliency Hashing for Fine-Grained Retrieval | Machine Learning | Python / 2020 | 
								| 285 | Deep Representation-Based Domain Adaptation for Nonstationary EEG Classification | Machine Learning | Python / 2020 | 
								| 286 | Taxi Demand Prediction Using Parallel Multi-Task Learning Model | Machine Learning | Python / 2020 | 
								| 287 | Context-Aware Deep Spatiotemporal Network for Hand Pose Estimation From Depth Images | Machine Learning | Python / 2020 | 
								| 288 | Vision-Based Fatigue Driving Recognition Method Integrating Heart Rate and Facial Features | Machine Learning | Python / 2020 | 
								| 289 | Lightening Network for Low-Light Image Enhancement | Machine Learning | Python / 2020 | 
								| 290 | SIF: Self-Inspirited Feature Learning for Person Re-Identification | Machine Learning | Python / 2020 |