1 |
A Deep Learning Approach to Infer Employment Status of Passengers by Using Smart Card Data |
Big Data |
Python / 2020 |
2 |
Domain-Specific Bayesian Deep-learning Approach for Air Pollution Forecast |
Big Data |
Python / 2020 |
3 |
A Time Series Mining Approach For Agricultural Area Detection |
Big Data |
Python/Java / 2020 |
4 |
Benchmarking Blocking Algorithms for Web Entities |
Big Data |
Python/Java / 2020 |
5 |
Blockchain-Based Adaptive Trust Management in Internet of Vehicles Using Smart Contract |
Big Data |
Java/Dotnet / 2020 |
6 |
Comorbidity Patterns and its Impact on Health Outcomes: Two-way Clustering Analysis |
Big Data |
Java/Python / 2020 |
7 |
Deep Convolutional Neural Network based Medical Concept Normalization |
Big Data |
Python / 2020 |
8 |
EKT: Exercise-aware Knowledge Tracing for Student Performance Prediction |
Big Data |
Python / 2020 |
9 |
Extracting Medical Knowledge from Crowd sourced Question Answering Website |
Big Data |
Java/Python/Dotnet / 2020 |
10 |
Geospatial Event Detection by Grouping Emotion Contagion in Social Media |
Big Data |
Java/Python / 2020 |
11 |
Heterogeneous Daily Living Activity Learning through Domain Invariant Feature Subspace |
Big Data |
Java/Python / 2020 |
12 |
LSTM based Phishing Detection for Big Email Data |
Big Data |
Python / 2020 |
13 |
On Security of an Identity-Based Dynamic Data Auditing Protocol for Big Data Storage |
Big Data |
Python / 2020 |
14 |
Optimizing Taxi Driver Profit Efficiency:A Spatial Network-Based Markov Decision Process Approach |
Big Data |
Java / 2020 |
15 |
Overlapping Community Change-Point Detection in an Evolving Network |
Big Data |
Java / 2020 |
16 |
P-MOD: Secure Privilege-Based Multilevel Organizational Data-Sharing in Cloud Computing |
Big Data |
Java/Dotnet / 2020 |
17 |
Prediction of Taxi Destinations Using a Novel Data Embedding Method and Ensemble Learning |
Big Data |
Java/Python / 2020 |
18 |
Privacy-Preserving Continuous Data Collection for Predictive Maintenance in Vehicular Fog-Cloud |
Big Data |
Java/Dotnet / 2020 |
19 |
Product Supply Optimization for Crowdfunding Campaigns |
Big Data |
Java/Dotnet / 2020 |
20 |
Voice of Charity: Prospecting the Donation Recurrence & Donor Retention in Crowdfunding |
Big Data |
Java/Dotnet / 2020 |
21 |
Sense and Sensibility: Characterizing Social Media Users Regarding the Use of Controversial Terms for COVID-19 |
Big Data |
Python / 2020 |
22 |
Short-term Rainfall Forecasting Using Multi-layer Perceptron |
Big Data |
Java/Python / 2020 |
23 |
D-LSTM: Short-Term Road Traffic Speed Prediction Model Based on GPS Positioning Data |
Big Data |
Python / 2020 |
24 |
Taxi Demand Prediction Using Parallel Multi-Task Learning Model |
Big Data |
Python / 2020 |
25 |
Traffic Demand Prediction Based on Dynamic Transition Convolutional Neural Network |
Big Data |
Python / 2020 |
26 |
Transfer to Rank for Top-N Recommendation |
Big Data |
Python/Java / 2020 |
27 |
OpinionRank: Trustworthy Website Detection using Three Valued Subjective Logic |
Big Data |
Java/Dotnet / 2020 |
28 |
T-PCCE: Twitter Personality based Communicative Communities Extraction System for Big Data |
Big Data |
Python/Java / 2020 |
29 |
Crowdsourcing based Description of Urban Emergency Events using Social Media Big Data |
Big Data |
Python / 2020 |
30 |
A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage |
Cloud computing |
Java/Dotnet / 2020 |
31 |
A New Lightweight Symmetric Searchable Encryption Scheme for String Identification |
Cloud computing |
Java/Dotnet / 2020 |
32 |
Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data |
Cloud computing |
Java/Dotnet / 2020 |
33 |
An Efficient Privacy-Aware Authentication Scheme with Hierarchical Access Control for Mobile Cloud Computing Services |
Cloud computing |
Java/Dotnet / 2020 |
34 |
Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT |
Cloud computing |
Java/Dotnet / 2020 |
35 |
Authentication and Key Agreement Based on Anonymous Identity for Peer-to-Peer Cloud |
Cloud computing |
Java/Dotnet / 2020 |
36 |
Designing Secure and Efficient Biometric-Based Secure Access Mechanism for Cloud Services |
Cloud computing |
Python/Java/Dotnet / 2020 |
37 |
DNA Similarity Search with Access Control over Encrypted Cloud Data |
Cloud computing |
Java/Dotnet / 2020 |
38 |
Efficient Decentralized Attribute Based Access Control for Mobile Clouds |
Cloud computing |
Java/Dotnet / 2020 |
39 |
Fast Secure and Anonymous Key Agreement Against Bad Randomness for Cloud Computing |
Cloud computing |
Java/Dotnet / 2020 |
40 |
Fine-grained Query Authorization with Integrity Verification over Encrypted Spatial Data in Cloud Storage |
Cloud computing |
Java/Dotnet / 2020 |
41 |
Intelligent Health Vessel ABC-DE: An Electrocardiogram Cloud Computing Service |
Cloud computing |
Java/Dotnet / 2020 |
42 |
QuickN: Practical and Secure Nearest NeighborSearch on Encrypted Large-Scale Data |
Cloud computing |
Java/Dotnet / 2020 |
43 |
Practical Multi-keyword Ranked Search with Access Control over Encrypted Cloud |
Cloud computing |
Java/Dotnet / 2020 |
44 |
Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing |
Cloud computing |
Java/Dotnet / 2020 |
45 |
Privacy-Preserving Subgraph Matching Scheme with Authentication in Social Networks |
Cloud computing |
Java/Dotnet / 2020 |
46 |
PKE-MET: Public-Key Encryption with Multi-Ciphertext Equality Test in Cloud Computing |
Cloud computing |
Java/Dotnet / 2020 |
47 |
Publicly Verifiable Shared Dynamic Electronic Health Record Databases with Functional Commitment Supporting Privacy-Preserving Integrity Auditing |
Cloud computing |
Java/Dotnet / 2020 |
48 |
Threshold Multi-keyword Search for Cloud-Based Group Data Sharing |
Cloud computing |
Java/Dotnet / 2020 |
49 |
Towards Secure and Efficient Equality Conjunction Search over Outsourced Databases |
Cloud computing |
Java/Dotnet / 2020 |
50 |
VPSL: Verifiable Privacy-Preserving Data Search for Cloud-Assisted Internet of Things |
Cloud computing |
Java/Dotnet / 2020 |
51 |
Verifiable Searchable Encryption Framework against Insider Keyword-Guessing Attack in Cloud Storage |
Cloud computing |
Java/Dotnet / 2020 |
52 |
PriRadar: A Privacy-Preserving Framework for Spatial Crowdsourcing |
Network Security |
Java/Python / 2020 |
53 |
DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain |
Network Security |
Java/Python / 2020 |
54 |
SDTE: A Secure Blockchain-based Data Trading Ecosystem |
Network Security |
Java/Python / 2020 |
55 |
SecureNLP: A System for Multi-Party Privacy-Preserving Natural Language Processing |
Network Security |
Python / 2020 |
56 |
A Verifiable Semantic Searching Scheme by Optimal Matching over Encrypted Data in Public Cloud |
Network Security |
Java/Dotnet / 2020 |
57 |
An Adaptive Authenticated Data Structure With Privacy-Preserving for Big Data Stream in Cloud |
Network Security |
Java/Dotnet / 2020 |
58 |
AAAS: An Anonymous Authentication Scheme Based on Group Signature in VANETs(IEEE Access) |
Network Security |
Java/Dotnet / 2020 |
59 |
An Efficient Conditional Privacy-Preserving Authentication Scheme for the Prevention of Side-Channel Attacks in Vehicular Ad hoc Networks(IEEE Access) |
Network Security |
Java/Dotnet/Python / 2020 |
60 |
An end-to-end attack on text CAPTCHAs |
Network Security |
Python / 2020 |
61 |
Anonymous Single Sign-on with Proxy Re-Verification |
Network Security |
Java / 2020 |
62 |
Authorized keyword searches on public key encrypted data with time controlled keyword privacy |
Network Security |
Java/Dotnet / 2020 |
63 |
Pay as You Decrypt: Decryption Outsourcing for Functional Encryption Using Blockchain |
Network Security |
Java/Dotnet / 2020 |
64 |
HawkesEye: Detecting Fake Retweeters Using Hawkes Process and Topic Modeling |
Network Security |
Python / 2020 |
65 |
Extensible Conditional Privacy Protection Authentication Scheme for Secure Vehicular Networks in a Multi-Cloud Environment |
Network Security |
Java/Dotnet / 2020 |
66 |
LPPA: Lightweight Privacy-preserving Authentication from Efficient Multi-key Secure Outsourced Computation for Location-based Services in VANETs |
Network Security |
Java/Dotnet / 2020 |
67 |
On the Security of Reversible Data Hiding in Encrypted Images by MSB Prediction |
Network Security |
Java/Python / 2020 |
68 |
Practical Escrow Protocol for Bitcoin |
Network Security |
Java/Python / 2020 |
69 |
PrivateLink: Privacy-Preserving Integration and Sharing of Datasets |
Network Security |
Java/Dotnet / 2020 |
70 |
Private Coded Matrix Multiplication |
Network Security |
Java/Python / 2020 |
71 |
Puncturable Signatures and Applications in Proof-of-Stake Blockchain Protocols |
Network Security |
Java/Dotnet / 2020 |
72 |
Reversible Image Secret Sharing |
Network Security |
/ 2020 |
73 |
A Blockchain-based Model for Cloud Service Quality Monitoring |
Blockchain |
Python / 2020 |
74 |
A Blockchain-Based Searchable Public-Key Encryption with Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks |
Blockchain |
Java/Dotnet / 2020 |
75 |
Decentralized Blockchain-Based Trust Management Protocol for the Internet of Things |
Blockchain |
Java/Dotnet / 2020 |
76 |
DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain |
Blockchain |
Java/Dotnet / 2020 |
77 |
SDTE: A Secure Blockchain-based Data Trading Ecosystem |
Blockchain |
Java/Dotnet / 2020 |
78 |
Blockchain Based Anonymous Authentication with Key Management for Smart Grid Edge Computing Infrastructure |
Blockchain |
Java/Dotnet / 2020 |
79 |
Blockchain-Based Adaptive Trust Management in Internet of Vehicles Using Smart Contract |
Blockchain |
Java/Dotnet / 2020 |
80 |
Blockchain-based Data Storage with Privacy and Authentication in Internet-of-Things |
Blockchain |
Java/Dotnet / 2020 |
81 |
GUARDIAN: Blockchain-based Secure Demand Response Management in Smart Grid System |
Blockchain |
Java/Dotnet / 2020 |
82 |
Pay as You Decrypt: Decryption Outsourcing for Functional Encryption Using Blockchain |
Blockchain |
Java/Dotnet / 2020 |
83 |
Lightweight Blockchain Consensus Protocols for Vehicular Social Networks |
Blockchain |
Java/Dotnet / 2020 |
84 |
Groupchain: Towards a Scalable Public Blockchain in Fog Computing of IoT Services Computing |
Blockchain |
Java/Dotnet / 2020 |
85 |
A blockchain-based trust management with conditional privacy-preserving announcement scheme for VANETs |
Blockchain |
Java/Dotnet / 2020 |
86 |
GERF: a group event recommendation framework based on learning-to-rank |
DataMining |
Java/Dotnet / 2020 |
87 |
A Unified Framework for User Identification across Online and Offline Data |
DataMining |
Python / 2020 |
88 |
Adaptive Similarity Embedding for Unsupervised Multi-View Feature Selection |
DataMining |
Java/Python / 2020 |
89 |
BRIGHT - Drift-Aware Demand Predictions for Taxi Networks |
DataMining |
Python / 2020 |
90 |
Building Personalized Transportation Model for Online Taxi-Hailing Demand Prediction |
DataMining |
Java/Python / 2020 |
91 |
Citywide Bike Usage Prediction in a Bike-Sharing System |
DataMining |
Python / 2020 |
92 |
SentiDiff: Combining Textual Information and Sentiment Diffusion Patterns for Twitter Sentiment Analysis |
DataMining |
Java/Python / 2020 |
93 |
CAPER: Context-Aware Personalized Emoji Recommendation |
DataMining |
Java/Python / 2020 |
94 |
DAG: A General Model for Privacy-Preserving Data Mining |
DataMining |
Python / 2020 |
95 |
Dynamic Connection-based Social Group Recommendation |
DataMining |
Java / 2020 |
96 |
Enriching Data Imputation under Similarity Rule Constraints |
DataMining |
Python/Java / 2020 |
97 |
e-RNSP: An Efficient Method for Mining Repetition Negative Sequential Patterns |
DataMining |
Java/Python / 2020 |
98 |
ESPM: Efficient Spatial Pattern Matching |
DataMining |
Java / 2020 |
99 |
From Anticipation to Action: Data Reveal Mobile Shopping Patterns During a Yearly Mega Sale Event in China |
DataMining |
Java / 2020 |
100 |
Half-Quadratic Minimization for Unsupervised Feature Selection on Incomplete Data |
DataMining |
Python / 2020 |
101 |
Hierarchical Latent Context Representation for Context-Aware Recommendations |
DataMining |
Python / 2020 |
102 |
Item Recommendation for Word-of-Mouth Scenario in Social E-Commerce |
DataMining |
Python/Java / 2020 |
103 |
MAB-Based Reinforced Worker Selection Framework for Budgeted Spatial Crowdsensing |
DataMining |
Python / 2020 |
104 |
Mining Maximal Dynamic Spatial Colocation Patterns |
DataMining |
Java/Dotnet / 2020 |
105 |
On both Cold-Start and Long-Tail Recommendation with Social Data |
DataMining |
Java/Python / 2020 |
106 |
Online Pricing with Reserve Price Constraint for Personal Data Markets |
DataMining |
Java/Python / 2020 |
107 |
Personalized Long- and Short-term Preference Learning for Next POI Recommendation |
DataMining |
Java/Dotnet / 2020 |
108 |
Predicting Hot Events in the Early Period through Bayesian Model for Social Networks |
DataMining |
Java/Dotnet / 2020 |
109 |
Privacy-Preserving User Profile Matching in Social Networks |
DataMining |
Java/Python / 2020 |
110 |
Product Quantized Collaborative Filtering |
DataMining |
Java/Dotnet / 2020 |
111 |
Quality Inference Based Task Assignment in Mobile Crowdsensing |
DataMining |
Java/Python/Dotnet / 2020 |
112 |
Representation Learning from Limited Educational Data with Crowdsourced Labels |
DataMining |
Java/Dotnet / 2020 |
113 |
Representation Learning with Multi-level Attention for Activity Trajectory Similarity Computation |
DataMining |
Java/Dotnet / 2020 |
114 |
Robust Cumulative Crowdsourcing Framework Using New Incentive Payment Function and Joint Aggregation Model |
DataMining |
Python / 2020 |
115 |
SRA: Secure Reverse Auction for Task Assignment in Spatial Crowdsourcing |
DataMining |
Java/Dotnet / 2020 |
116 |
Sequence Pattern Mining with Variables |
DataMining |
Java/Dotnet / 2020 |
117 |
SoulMate: Short-text author linking through Multi-aspect temporal-textual embedding |
DataMining |
Java / 2020 |
118 |
Trust Relationship Prediction in Alibaba E-Commerce Platform |
DataMining |
Python / 2020 |
119 |
Using Latent Knowledge to Improve Real-Time Activity Recognition for Smart IoT |
DataMining |
Java/Python / 2020 |
120 |
Blockchain Based Anonymous Authentication with Key Management for Smart Grid Edge Computing Infrastructure |
Edge Computing |
Java/Python / 2020 |
121 |
Cost-Effective App Data Distribution in Edge Computing |
Edge Computing |
Java/Dotnet / 2020 |
122 |
Lightweighted Secure Searching over Public-key Ciphertexts for Edge-Cloud Assisted Industrial IoT Devices |
Edge Computing |
Java / 2020 |
123 |
DeepEDN: A Deep Learning-based Image Encryption and Decryption Network for Internet of Medical Things |
IOT |
Java/Dotnet / 2020 |
124 |
A Secure and Efficient Cloud-Centric Internet of Medical Things-Enabled Smart Healthcare System with Public Verifiability |
IOT |
Python / 2020 |
125 |
A Trusted Attestation Scheme for Data Source of Internet of Things in Smart City Based on Dynamic Trust Classification |
IOT |
Java/Dotnet / 2020 |
126 |
Blockchain-based Data Storage with Privacy and Authentication in Internet-of-Things |
IOT |
Java/Dotnet / 2020 |
127 |
CB-CAS: Certificate-Based Efficient Signature Scheme with Compact Aggregation for Industrial Internet of Things Environment |
IOT |
Java/Dotnet / 2020 |
128 |
Decentralized Self-enforcing Trust Management System for Social Internet of Things |
IOT |
Java/Dotnet / 2020 |
129 |
ST-DeepHAR: Deep Learning Model for Human Activity Recognition in IoHT Applications |
IOT |
Java/Dotnet / 2020 |
130 |
Deep Learning Enhanced Human Activity Recognition for Internet of Healthcare Things |
IOT |
Python / 2020 |
131 |
Energy-Efficient Resource Allocation for Blockchain-Enabled Industrial Internet of Things with Deep Reinforcement Learning |
IOT |
/ 2020 |
132 |
NeuroTrust - Artificial Neural Network-based Intelligent Trust Management Mechanism for Large-Scale Internet of Medical Things |
IOT |
Python / 2020 |
133 |
Preserving Balance between Privacy and Data Integrity in Edge-Assisted Internet of Things |
IOT |
Java/Python / 2020 |
134 |
Privacy-Preserving Implicit Authentication Protocol Using Cosine Similarity for Internet of Things |
IOT |
Java/Dotnet / 2020 |
135 |
Robust Spammer Detection Using Collaborative Neural Network in Internet of Thing Applications |
IOT |
Java/Dotnet / 2020 |
136 |
Matchmaker: Stable Task Assignment with Bounded Constraints for Crowdsourcing Platforms |
IOT |
Java/Dotnet / 2020 |
137 |
Time-aware Smart Object Recommendation in Social Internet of Things |
IOT |
Python / 2020 |
138 |
A Flexible Deep CNN Framework for Image Restoration |
Image Processing |
Java/Dotnet / 2020 |
139 |
A Framework of Reversible Color-tograyscale Conversion with Watermarking Feature |
Image Processing |
Java/Dotnet / 2020 |
140 |
A Joint Relationship Aware Neural Network for Single-Image 3D Human Pose Estimation |
Image Processing |
Python / 2020 |
141 |
Conditional Variational Image Deraining |
Image Processing |
Python / 2020 |
142 |
End-to-End Single Image Fog Removal Using Enhanced Cycle Consistent Adversarial Networks |
Image Processing |
Python / 2020 |
143 |
KT-GAN: Knowledge-Transfer Generative Adversarial Network for Text-to-Image Synthesis |
Image Processing |
Python / 2020 |
144 |
Object Discovery From a Single Unlabeled Image by Mining Frequent Itemset With Multi-scale Features |
Image Processing |
Python / 2020 |
145 |
Outlier Detection Using Structural Scores in a High-Dimensional Space |
Image Processing |
Python / 2020 |
146 |
Personality-Assisted Multi-Task Learning for Generic and Personalized Image Aesthetics Assessment |
Image Processing |
Python / 2020 |
147 |
Towards Unsupervised Deep Image Enhancement With Generative Adversarial Network |
Image Processing |
Python / 2020 |
148 |
Differentially Private Unknown Worker Recruitment for Mobile Crowdsensing Using Multi-Armed Bandits |
Mobile Computing |
Python / 2020 |
149 |
Enabling Strong Privacy Preservation and Accurate Task Allocation for Mobile Crowdsensing |
Mobile Computing |
Python / 2020 |
150 |
Fine-Grained User Profiling for Personalized Task Matching in Mobile Crowdsensing |
Mobile Computing |
Java/Dotnet / 2020 |
151 |
HyTasker: Hybrid Task Allocation in Mobile Crowd Sensing |
Mobile Computing |
Java/Dotnet / 2020 |
152 |
Incentive Mechanism for Multiple Cooperative Tasks with Compatible Users in Mobile Crowd Sensing via Online Communities |
Mobile Computing |
Java/Dotnet / 2020 |
153 |
ARETE: On Designing Joint Online Pricing and Reward Sharing Mechanisms for Mobile Data Markets |
Mobile Computing |
Java/Dotnet / 2020 |
154 |
Privacy-Preserving Media Sharing with Scalable Access Control and Secure Deduplication in Mobile Cloud Computing |
Mobile Computing |
Java/Dotnet / 2020 |
155 |
Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing |
Mobile Computing |
Java/Dotnet / 2020 |
156 |
Stable Task Assignment for Mobile Crowdsensing with Budget Constraint |
Mobile Computing |
Java/Dotnet / 2020 |
157 |
Towards Personalized Privacy Preserving Incentive for Truth Discovery in Mobile CrowdsensingSystems |
Mobile Computing |
Java/Dotnet / 2020 |
158 |
A Blockchain-Based Searchable Public-Key Encryption with Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks |
Networking |
Java/Dotnet / 2020 |
159 |
A Distributed Mobile Fog Computing Scheme for Mobile Delay-Sensitive Applications in SDN-Enabled Vehicular Networks |
Networking |
Java/Dotnet / 2020 |
160 |
A Novel Multi-task learning framework for Semi-supervised Semantic Parsing |
Networking |
Java/Dotnet / 2020 |
161 |
A Secure and Verifiable Data Sharing Scheme Based on Blockchain in Vehicular Social Networks |
Networking |
Java/Dotnet / 2020 |
162 |
Ant Colony Optimization for the Control of Pollutant Spreading on Social Networks |
Networking |
Python / 2020 |
163 |
Congestion Propagation Based Bottleneck Identification in Urban Road Networks |
Networking |
Java/Dotnet / 2020 |
164 |
Lightweight Blockchain Consensus Protocols for Vehicular Social Networks |
Networking |
Python / 2020 |
165 |
Multi-Party Privacy ConflictManagement in Online Social Networks: A Network Game Perspective |
Networking |
Java/Dotnet / 2020 |
166 |
Quick and Accurate False Data Detection in Mobile Crowd Sensing |
Networking |
Java/Dotnet / 2020 |
167 |
Random Network Coding Enabled Routing Protocol in Unmanned Aerial Vehicle Networks |
Networking |
Java/Dotnet / 2020 |
168 |
Source-Location Privacy Protection based on Anonymity Cloud in Wireless Sensor Networks |
Networking |
Python / 2020 |
169 |
LDV: A Lightweight DAG-based Blockchain for Vehicular Social Networks |
Networking |
Ns2 / 2020 |
170 |
A Semisupervised Recurrent Convolutional Attention Model for Human Activity Recognition |
Neural Network |
Ns2 / 2020 |
171 |
A Wide-Deep-Sequence Model-Based Quality Prediction Method in Industrial Process Analysis |
Neural Network |
Java/Dotnet / 2020 |
172 |
Adversarial Training-Based Hard Example Mining for Pedestrian Detection in Fish-Eye Images |
Neural Network |
Python / 2020 |
173 |
Context-Aware Deep Spatiotemporal Network for Hand Pose Estimation From Depth Images |
Neural Network |
Python / 2020 |
174 |
Deep Pyramidal Pooling With Attention for Person Re-Identification |
Neural Network |
Python / 2020 |
175 |
Deep Representation-Based Domain Adaptation for Nonstationary EEG Classification |
Neural Network |
Python / 2020 |
176 |
Deep Saliency Hashing for Fine-Grained Retrieval |
Neural Network |
Python / 2020 |
177 |
Discriminative Reconstruction Constrained Generative Adversarial Network for Hyperspectral Anomaly Detection |
Neural Network |
Python / 2020 |
178 |
Discriminative Residual Analysis for Image SetClassification with Posture and Age Variations |
Neural Network |
Python / 2020 |
179 |
Emotion Correlation Mining Through Deep Learning Models on Natural Language Text |
Neural Network |
Python / 2020 |
180 |
Hierarchical Human-Like Deep Neural Networks for Abstractive Text Summarization |
Neural Network |
Python / 2020 |
181 |
Lightening Network for Low-light Image Enhancement |
Neural Network |
Python / 2020 |
182 |
Local–Global Memory Neural Network for Medication Prediction |
Neural Network |
Python / 2020 |
183 |
SIF: Self-Inspirited Feature Learning for Person Re-Identification |
Neural Network |
Python / 2020 |
184 |
Taxi Demand Prediction Using Parallel Multi-Task Learning Model |
Neural Network |
Python / 2020 |
185 |
Thresholds Based Image Extraction Schemes in Big Data Environment in Intelligent Traffic Management |
Neural Network |
Python / 2020 |
186 |
Vision-Based Fatigue Driving Recognition Method Integrating Heart Rate and Facial Features |
Neural Network |
Python / 2020 |
187 |
A Highly Reliable Metadata Service for Large-Scale Distributed File Systems |
Parallel And Distributed Computing |
Python / 2020 |
188 |
Enabling Encrypted Boolean Queries in Geographically Distributed Databases |
Parallel And Distributed Computing |
Python / 2020 |
189 |
Fully Homomorphic based Privacy-Preserving Distributed Expectation Maximization on Cloud |
Parallel And Distributed Computing |
Java/Dotnet / 2020 |
190 |
BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users |
Secure Computing |
Java/Dotnet / 2020 |
191 |
Decentralized Blockchain-Based Trust Management Protocol for the Internet of Things |
Secure Computing |
Java/Dotnet / 2020 |
192 |
Achieve Efficient and Privacy-preserving Disease Risk Assessment over Multi-outsourced Vertical Datasets |
Secure Computing |
Java/Dotnet / 2020 |
193 |
Adaptive Secure Nearest Neighbor Query Processing over Encrypted Data |
Secure Computing |
Java/Dotnet / 2020 |
194 |
An Anonymous Authentication System for Pay-As-You-Go Cloud Computing |
Secure Computing |
Java/Dotnet / 2020 |
195 |
Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices |
Secure Computing |
Java/Dotnet / 2020 |
196 |
Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme with Enhanced Security Provision |
Secure Computing |
Java/Dotnet / 2020 |
197 |
Efficient Secure Pattern Matching with Malicious Adversaries |
Secure Computing |
Java/Dotnet / 2020 |
198 |
Lightweight Sharable and Traceable Secure Mobile Health System |
Secure Computing |
Java/Dotnet / 2020 |
199 |
PBT: A New Privacy-Preserving Payment Protocol for Blockchain Transactions |
Secure Computing |
Java/Dotnet / 2020 |
200 |
Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions |
Secure Computing |
Java/Dotnet / 2020 |
201 |
Practical and Provably Secure Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Mobile Lightweight Devices |
Secure Computing |
Java/Dotnet / 2020 |
202 |
Providing Task Allocation and Secure Deduplicationfor Mobile Crowdsensing via Fog Computing |
Secure Computing |
Java/Python / 2020 |
203 |
Secure Keyword Search and Data Sharing Mechanism for Cloud Computing |
Secure Computing |
Java/Dotnet / 2020 |
204 |
Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment |
Secure Computing |
Java/Dotnet / 2020 |
205 |
A Blockchain-based Model for Cloud Service Quality Monitoring |
Service Computing |
Java/Dotnet / 2020 |
206 |
FASE: A Fast and Accurate Privacy-Preserving Multi-keyword Top-k Retrieval Scheme over Encrypted Cloud Data |
Service Computing |
Java/Dotnet / 2020 |
207 |
A Practical System for Privacy-Aware Targeted Mobile Advertising Services |
Service Computing |
Java/Dotnet / 2020 |
208 |
Achieving Practical Symmetric Searchable Encryption with Search Pattern Privacy over Cloud |
Service Computing |
Java/Dotnet / 2020 |
209 |
Achieving Searchable Encryption Scheme with Search Pattern Hidden |
Service Computing |
Java/Dotnet / 2020 |
210 |
AQA: An Adaptive Quality Assessment Framework for Online Review Systems |
Service Computing |
Java/Dotnet / 2020 |
211 |
IMS: An Identity-Based Many-to-Many Subscription Scheme with Efficient Key Management for Wireless Broadcast Systems |
Service Computing |
Java/Dotnet / 2020 |
212 |
Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing |
Service Computing |
Java/Python / 2020 |
213 |
GUARDIAN:Blockchain-based Secure Demand Response Management in Smart Grid System |
Service Computing |
Java / 2020 |
214 |
ContractGuard: Defend Ethereum Smart Contracts with Embedded Intrusion Detection |
Service Computing |
Java/Dotnet / 2020 |
215 |
Dynamic Outsourced Auditing Services for Cloud Storage Based on Batch-Leaves- Authenticated Merkle Hash Tree |
Service Computing |
Java/Dotnet / 2020 |
216 |
Enabling Fast Public Auditing and Data Dynamics in Cloud Services |
Service Computing |
Java/Dotnet / 2020 |
217 |
Flexible Wildcard Searchable Encryption System |
Service Computing |
Java/Dotnet / 2020 |
218 |
Full Verifiability for Outsourced Decryption in Attribute Based Encryption |
Service Computing |
Java/Dotnet / 2020 |
219 |
Message-Locked Searchable Encryption: A New Versatile Tool for Secure Cloud Storage |
Service Computing |
Java/Dotnet / 2020 |
220 |
Mining Domain Knowledge on Service Goal Goals from Textual Service Descriptions |
Service Computing |
Java/Dotnet / 2020 |
221 |
Multi-value-Independent Ciphertext-Policy Attribute Based Encryption with Fast Keyword Search |
Service Computing |
Java/Dotnet / 2020 |
222 |
Personalized Recommendation System based on Collaborative Filtering for IoT Scenarios |
Service Computing |
Java/Dotnet / 2020 |
223 |
Secure and Efficient Cloud Data Deduplication with Ownership Management |
Service Computing |
Java/Dotnet / 2020 |
224 |
Groupchain: Towards a Scalable Public Blockchain in Fog Computing of IoT Services Computing |
Service Computing |
Java/Dotnet / 2020 |
225 |
DORA: A Destination Oriented Routing Algorithm for Energy-Balanced Wireless Sensor Networks |
WSN |
Java/Dotnet / 2020 |
226 |
LIDOR: A Lightweight DoS-Resilient Communication Protocol for Safety-Critical IoT Systems |
WSN |
Java/Dotnet / 2020 |
227 |
A Dynamic Multipath Scheme for Protecting Source-Location Privacy Using Multiple Sinks in WSNs Intended for IIoT |
WSN |
Ns2 / 2020 |
228 |
A Secure Clustering Protocol with Fuzzy Trust Evaluation and Outlier Detection for Industrial Wireless Sensor Networks |
WSN |
Ns2 / 2020 |
229 |
A Trust-based Security System for Data Collecting in Smart City |
WSN |
Ns2 / 2020 |
230 |
I-SEP: An Improved Routing Protocol for Heterogeneous WSN for IoT based Environmental Monitoring |
WSN |
Ns2 / 2020 |
231 |
Centralized Routing Protocol for DetectingWormhole Attacks in WirelessSensor Networks(IEEE Access) |
WSN |
Ns2 / 2020 |
232 |
CPSLP: A Cloud-Based Scheme for ProtectingSource-Location Privacy in Wireless Sensor Networks Using Multi-Sinks |
WSN |
Ns2 / 2020 |
233 |
Delay-aware Green Routing for Mobile Sink based Wireless Sensor Networks |
WSN |
Ns2 / 2020 |
234 |
Energy-Efficient Relay Selection based Dynamic Routing Algorithm for IoT-Oriented Software-Defined WSNs |
WSN |
Ns2 / 2020 |
235 |
Latency-Aware Path Planning for Disconnected Sensor Networks with Mobile Sinks |
WSN |
Ns2 / 2020 |
236 |
Tuft: Tree Based Heuristic Data Dissemination for Mobile Sink Wireless Sensor Networks |
WSN |
Ns2 / 2020 |
237 |
A Multi-Path Routing Protocol Based on Link Lifetime and Energy Consumption Prediction for Mobile Edge Computing(IEEE Access) |
WSN |
Ns2 / 2020 |
238 |
A Smart Collaborative Routing Protocol for Delay Sensitive Applications in Industrial IoT(IEEE Access) |
WSN |
Ns2 / 2020 |
239 |
A Stable and Reliable Short-Path Routing Scheme for Efficient Acoustic Wireless Sensor Networks (AWSNs) (IEEE Access) |
WSN |
Ns2 / 2020 |
240 |
An Energy Efficient Routing Protocol Based on Improved Artificial Bee Colony Algorithm for Wireless Sensor Networks(IEEE Access) |
WSN |
Ns2 / 2020 |
241 |
An Energy-Efficient Mobility-Based Cluster Head Selection for Lifetime Enhancement of Wireless Sensor Networks(IEEE Access) |
WSN |
Ns2 / 2020 |
242 |
Energy-Efficient and Load-Balanced Clustering Routing Protocol for Wireless Sensor Networks Using a Chaotic Genetic Algorithm(IEEE Access) |
WSN |
Ns2 / 2020 |
243 |
Fault Tolerance Mechanism Combining Static Backup and Dynamic Timing Monitoring forCluster Heads(IEEE Access) |
WSN |
Ns2 / 2020 |
244 |
Heterogeneous Energy and Traffic Aware Sleep-Awake Cluster-Based Routing Protocol for Wireless Sensor Network(IEEE Access) |
WSN |
Ns2 / 2020 |
245 |
New Approach of Energy-Efficient Hierarchical Clustering Based on Neighbor Rotation for RWSN(IEEE Access) |
WSN |
Ns2 / 2020 |
246 |
Routing Clustering Protocol for 3D Wireless Sensor Networks Based on Fragile Collection Ant Colony Algorithm(IEEE Access) |
WSN |
Ns2 / 2020 |
247 |
FFRP: Dynamic Firefly Mating Optimization Inspired Energy Efficient Routing Protocol for Internet of Underwater Wireless Sensor Networks(IEEE Access) |
WSN |
Ns2 / 2020 |
248 |
Towards Void Hole Alleviation: EnhancedGEographic and Opportunistic RoutingProtocols in Harsh Underwater WSNs(IEEE Access) |
WSN |
Ns2 / 2020 |
249 |
SEECR: Secure Energy Efficient and Cooperative Routing Protocol for Underwater Wireless Sensor Networks(IEEE Access) |
WSN |
Ns2 / 2020 |
250 |
A Novel Broadcast Network Design for Routing in Mobile Ad-Hoc Network |
MANET |
Ns2 / 2020 |
251 |
An Adaptive on-Demand Multipath Routing Protocol With QoS Support for High-Speed MANET(IEEE Access) |
MANET |
Ns2 / 2020 |
252 |
Dual-Channel-Based Mobile Ad Hoc Network Routing Technique for Indoor Disaster Environment(IEEE Access) |
MANET |
Ns2 / 2020 |
253 |
Efficient Route Discovery and Link Failure Detection Mechanisms for Source Routing Protocol in Mobile Ad-Hoc Networks(IEEE Access) |
MANET |
Ns2 / 2020 |
254 |
Mitigation of Black Hole and Gray Hole Attack Using Swarm Inspired Algorithm With Artificial Neural Network(IEEE Access) |
MANET |
Ns2 / 2020 |
255 |
Multipath Routing Protocol Using Genetic Algorithm in Mobile Ad Hoc Networks(IEEE Access) |
MANET |
Ns2 / 2020 |
256 |
Trust Routing Protocol Based on Cloud-Based Fuzzy Petri Net and Trust Entropy for Mobile Ad hoc Network(IEEE Access) |
MANET |
Ns2 / 2020 |
257 |
Trust-Based Probabilistic Broadcast Scheme for Mobile Ad Hoc Networks(IEEE Access) |
MANET |
Ns2 / 2020 |
258 |
Trusted Opportunistic Routing Based on Node Trust Model(IEEE Access) |
MANET |
Ns2 / 2020 |
259 |
An Efficient Load Balancing Scheme of EnergyGauge Nodes to Maximize the Lifespan ofConstraint Oriented Networks(IEEE Access) |
Heterogeneous WSN |
Ns2 / 2020 |
260 |
Coyote Optimization Based on a Fuzzy Logic Algorithm for Energy-Efficiency in Wireless Sensor Networks(IEEE Access) |
Heterogeneous WSN |
Ns2 / 2020 |
261 |
Energy-Efficient Cooperative Routing Scheme for Heterogeneous Wireless Sensor Networks(IEEE Access) |
Heterogeneous WSN |
Ns2 / 2020 |
262 |
Scalable Grid-Based Data Gathering Algorithm for Environmental Monitoring Wireless Sensor Networks(IEEE Access) |
Heterogeneous WSN |
Ns2 / 2020 |
263 |
A Simple and Robust Clustering Scheme for Large-Scale and Dynamic VANETs(IEEE Access) |
VANET |
Ns2 / 2020 |
264 |
An Adaptive Relay Selection Scheme for Enhancing Network Stability in VANETs(IEEE Access) |
VANET |
Ns2 / 2020 |
265 |
AATMS: An Anti-Attack Trust Management Scheme in VANET(IEEE Access) |
VANET |
Ns2 / 2020 |
266 |
Beaconless Traffic-Aware Geographical RoutingProtocol for Intelligent Transportation System(IEEE Access) |
VANET |
Ns2 / 2020 |
267 |
Intelligent Detection of Black Hole Attacks for Secure Communication in Autonomous and Connected Vehicles(IEEE Access) |
VANET |
Ns2 / 2020 |
268 |
New Discrete Cuckoo Search Optimization Algorithms for Effective Route Discovery in IoT-Based Vehicular Ad-Hoc Networks(IEEE Access) |
VANET |
Ns2 / 2020 |
269 |
On the Elliptic Curve Cryptography for Privacy-Aware Secure ACO-AODV Routing in Intent-Based Internet of Vehicles for Smart Cities |
VANET |
Ns2 / 2020 |
270 |
Parking-area-assisted Spider-web Routing Protocol for Emergency Data in Urban VANET |
VANET |
Ns2 / 2020 |
271 |
RSU-Assisted Traffic-Aware Routing Based on Reinforcement Learning for Urban Vanets(IEEE Access) |
VANET |
Ns2 / 2020 |
272 |
A Provenance-Aware Distributed Trust Model forResilient Unmanned Aerial Vehicle Networks(IEEE Access) |
UAV |
Ns2 / 2020 |
273 |
Mobility and Location-Aware Stable Clustering Scheme for UAV Networks(IEEE Access) |
UAV |
Ns2 / 2020 |
274 |
Smart IoT Control-Based Nature Inspired Energy Efficient Routing Protocol for Flying Ad Hoc Network (FANET)(IEEE Access) |
UAV |
Ns2 / 2020 |
275 |
Object Discovery From a Single Unlabeled Image by Mining Frequent Itemset With Multi-scale Features |
Image Processing |
Ns2 / 2020 |
276 |
Personality-Assisted Multi-Task Learning for Generic and Personalized Image Aesthetics Assessment |
Image Processing |
Ns2 / 2020 |
277 |
A Wide-Deep-Sequence Model-Based Quality Prediction Method in Industrial Process Analysis |
Machine Learning |
Python / 2020 |
278 |
Emotion Correlation Mining Through Deep Learning Models on Natural Language Text |
Machine Learning |
Python / 2020 |
279 |
Local-Global Memory Neural Network for Medication Prediction |
Machine Learning |
Python / 2020 |
280 |
Hierarchical Human-Like Deep Neural Networks for Abstractive Text Summarization |
Machine Learning |
Python / 2020 |
281 |
Discriminative Residual Analysis for Image Set Classification With Posture and Age Variations |
Machine Learning |
Python / 2020 |
282 |
Thresholds Based Image Extraction Schemes in Big Data Environment in Intelligent Traffic Management |
Machine Learning |
Python / 2020 |
283 |
Adversarial Training-Based Hard Example Mining for Pedestrian Detection in Fish-Eye Images |
Machine Learning |
Python / 2020 |
284 |
Deep Saliency Hashing for Fine-Grained Retrieval |
Machine Learning |
Python / 2020 |
285 |
Deep Representation-Based Domain Adaptation for Nonstationary EEG Classification |
Machine Learning |
Python / 2020 |
286 |
Taxi Demand Prediction Using Parallel Multi-Task Learning Model |
Machine Learning |
Python / 2020 |
287 |
Context-Aware Deep Spatiotemporal Network for Hand Pose Estimation From Depth Images |
Machine Learning |
Python / 2020 |
288 |
Vision-Based Fatigue Driving Recognition Method Integrating Heart Rate and Facial Features |
Machine Learning |
Python / 2020 |
289 |
Lightening Network for Low-Light Image Enhancement |
Machine Learning |
Python / 2020 |
290 |
SIF: Self-Inspirited Feature Learning for Person Re-Identification |
Machine Learning |
Python / 2020 |