IEEE Project Titles
Big Data
           Efficient and Privacy preserving Approximation of Distributed Statistical
1
           Queries
           Security-Aware Resource Allocation for Mobile Social Big Data: A Matching-
2
           Coalitional Game Solution
           A New Approach of Exploiting Self-Adjoint Matrix Polynomials of Large
3
           Random Matrices for Anomaly Detection and Fault Location
           Privacy-Preserving Public Release of Datasets for Support Vector Machine
4
           Classification
5          SOREL: Efficient and Secure ORE-based Range Query over Outsourced Data
6          Hierarchical Density-Based Clustering using MapReduce
7          BusBeat: Early Event Detection with Real-Time Bus GPS Trajectories
           A User-Oriented Taxi Ridesharing System with Large-Scale Urban GPS Sensor
8
           Data
           Optimizing Share Size in Efficient and Robust Secret Sharing Scheme for Big
9
           Data
Cloud Computing
           OP-MLB: An Online VM Prediction based Multi-objective Load Balancing
1
           Framework for Resource Management at Cloud Data center
           Application-Aware Migration Algorithm with Prefetching in Heterogeneous
2
           Cloud Environments
           Reliability-Aware Cost-Efficient Scientific Workflows Scheduling Strategy on
3
           Multi-Cloud Systems
4          Blockchain-Based Decentralized Public Auditing for Cloud Storage
           A Blockchain-Based Multi-Cloud Storage Data Auditing Scheme to Locate
5
           Faults
6          Secure and Efficient Data Deduplication in JointCloud Storage
           Resource Management and Pricing for Cloud Computing based Mobile
7
           Blockchain with Pooling
           Optimal Task Allocation and Coding Design for Secure Edge Computing with
8
           Heterogeneous Edge Devices
         Attribute-based pseudonymity for privacy-preserving authentication in cloud
9
         services
         Enabling Simultaneous Content Regulation and Privacy Protection for Cloud
10
         Storage Image
11       Efficient Replica Migration Scheme for Distributed Cloud Storage Systems
12       KeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption
         Efficient and Privacy-preserving Online Fingerprint Authentication Scheme
13
         Over Outsourced Data
         Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data
14
         Dynamics in Cloud Storage
15       Demand-aware Erasure Coding for Distributed Storage Systems
16       Privacy Preserving Searchable Encryption with Fine-grained Access Control
Dependable and Secure Computing
         Enabling Reliable Keyword Search in Encrypted Decentralized Storage with
1
         Fairness
2        Accountable Proxy Re-Encryption for Secure Data Sharing
         Enabling Privacy-Preserving Shortest Distance Queries on Encrypted Graph
3
         Data
         Security Model of Authentication at the Physical Layer and Performance
4
         Analysis over Fading Channels
5        Detecting Suspicious File Migration or Replication in the Cloud
         Authenticated Medical Documents Releasing with Privacy Protection and
6
         Release Control
7        Searchable Symmetric Encryption with Forward Search Privacy
         Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner
8
         Setting
         Revocable Identity-Based Broadcast Proxy Re-encryption for Data Sharing in
9
         Clouds
         Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with
10
         Symmetric-Key Based Verification
11       Secure Halftone Image Steganography Based on Pixel Density Transition
Information Forensics and Security
1         Fingerprint Spoof Detector Generalization
2         Multi-Scale Deep Representation Aggregation for Vein Recognition
          A Verifiable Semantic Searching Scheme by Optimal Matching over Encrypted
3
          Data in Public Cloud
          Visible-Infrared Person Re-Identification via Homogeneous Augmented Tri-
4
          Modal Learning
5         Natural Steganography in JPEG Domain with a Linear Development Pipeline
          PolyShard: Coded Sharding Achieves Linearly Scaling Efficiency and Security
6
          Simultaneously
7         Relational Deep Feature Learning for Heterogeneous Face Recognition
          Identification of Malicious Injection Attacks in Dense Rating and Co-visitation
8
          Behaviors
          A Performance-Sensitive Malware Detection System Using Deep Learning on
9
          Mobile Devices
          Modelling Behavioural Dynamics for Asymmetric Application Layer DDoS
10
          Detection
Mobile Computing
          Towards Personalized Privacy-Preserving Incentive for Truth Discovery in
1
          Mobile Crowdsensing Systems
          CollabLoc: Privacy-preserving Multi-modal Collaborative Mobile Phone
2
          Localization
          Distributed and Energy-Efficient Mobile Crowdsensing with Charging Stations
3
          by Deep Reinforcement Learning
          Analysis of Drone assisted Network Coded Cooperation for Next Generation
4
          Wireless Network
5         Wireless-Assisted Key Establishment Leveraging Channel Manipulation
          Improving the Performance of Online Bitrate Adaptation with Multi-step
6
          Prediction over Cellular Networks
          An Inter-data Encoding Technique that Exploits Synchronized Data for
7
          Network Applications
          Throughput-Optimal Broadcast in Wireless Networks with Point-to-Multipoint
8
          Transmissions
          On the Data Quality in Privacy-Preserving Mobile Crowdsensing Systems with
9
          Untruthful Reporting
10        Optimal Multicasting Strategies in Underwater Acoustic Networks
          An Indirect Eavesdropping Attack of Keystrokes on Touch Screen through
11
          Acoustic Sensing
          Energy-efficient resource allocation for ultra-dense licensed and unlicensed
12
          dual-access small cell networks
          Energy Efficient Collaborative Beamforming for Reducing Sidelobe in Wireless
13
          Sensor Networks
Image Processing
1         Exploring the Effects of Blur and Deblurring to Visual Object Tracking
          Orientation Field Code Hashing: A Novel Method for Fast Palmprint
2
          Identification
          A Decision Support System for Face Sketch Synthesis Using Deep Learning and
3
          Artificial Intelligence
          An Automatic Detection and Classification System of Five Stages for
4         Hypertensive Retinopathy Using Semantic and Instance Segmentation in
          DenseNet Architecture
                                NON-IEEE TITLES
Android
1         Emergency Ambulance Booking App
2         Barbershop Service Booking App
3         Waste Food Management & Donation App
4         Android Blood Donation & Blood Bank Finder
5         Gym Trainer & Progress Tracker App
6         College Connect Chat App
7         Android College Attendance System
8         Android Food order and delivery app
9         Friendly Map Android Application for Disabled People
10        Image Analysis Application & Image Insight
11        Vehicle Number Plate Recognition
12   Android based QR Parking Booking
13   Android Battery Saver System
14   Android Attendance System
15   Android Based School Bus Tracking System
16   Android Expense Tracker
17   Android Patient Tracker
18   Android location Alarm
19   Accident Detection & Alert Android App
20   Covid Contact Tracing Android Application
21   Currency Detector App for Visually Impaired
22   Graphical Password Authentication for Android App
23   Canteen Automation System using Android
24   Multi Restaurant Food Ordering & Management System
25   Android Based Encrypted SMS System
26   Bus Pass Android Project
27   College Selector App
28   Organ Donation Android Application
29   Android Vehicle Toll Payment System
30   Child Monitoring System App