A Computational Dynamic Trust Model For User Authorization
A Computational dynamic trust model for user authorization
A Distortion-Resistant Routing Framework For Video Traffic In Wireless Multihop Networks
A Distributed Three-Hop Routing Protocol To Increase The Capacity Of Hybrid Wireless Networks
A Framework For Secure Computations With Two Non-Colluding Servers And Multiple Clients, Applied To Recomm
A Hop-by-Hop Routing Mechanism for Green Internet
A Locality Sensitive Low-Rank Model for Image Tag Completion
A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
A Profit Maximization Scheme With Guaranteed Quality Of Service In Cloud Computing
A Proximity-Aware Interest-Clustered P2p File Sharing System
A Proximity-Aware Interest-Clustered P2P FileSharing System
A Scalable And Reliable Matching Service For Content-Based Publish/Subscribe Systems
A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
A Shoulder Surfing Resistant Graphical Authentication System
A Stable Approach for Routing Queries in Unstructured P2P Networks
A Time Efficient Approach For Detecting Errors In Big Sensor Data On Cloud
Agent-Based Interactions And Economic Encounters In An Intelligent Intercloud
Agent-based Interactions and EconomicEncounters in an Intelligent InterCloud
An Attribute Assisted Reranking Model For Web Image Search1
An Authenticated Trust And Reputation Calculation And Management System For Cloud And Sensor Networks Integ
An Efficient Privacy-Preserving Ranked Keyword Search Method
Anonymizing Collections Of Tree-Structured Data
Answering Approximate Queries Over XML Data
Asymmetric Social Proximity Based Private Matching Protocols For Online Social Networks
Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
Audit-Free Cloud Storage Via Deniable Attribute-Based Encryption
Authenticated Key Exchange Protocols For Parallel Network File Systems
Automatically Mining Facets for Queries from Their Search Results
Best Keyword Cover Search
Booster in High Dimensional Data Classification
Building an intrusion detection system using a filter-based feature selection algorithm
CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System
Charm: A Cost-Efficient Multi-Cloud Data Hosting Scheme With High Availability
CHARM: A Cost-Efficient Multi-Cloud DataHosting Scheme with High Availability
Circuit Ciphertext-policy Attribute-based
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing
Cloud Armor Supporting Reputation-Based Trust Management For Cloud Services
Co-Extracting Opinion Targets And Opinion Words From Online Reviews Based On The Word Alignment Model
Conditional Identity-Based Broadcast Proxy
Configurations for Map Reduce Workloads
Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds
Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information
Context-Based Diversification For Keyword Queries Over Xml Data
Continuous And Transparent User Identity Verification For Secure Internet Services
Continuous Answering Holistic Queries over
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute Based Encryption
Cost-Aware Secure Routing (Caser) Protocol Design For Wireless Sensor Networks
Cost-Effective Resource Allocation Of Overlay Routing Networks
Crowdsourcing for Top-K Query Processing over Uncertain Data
Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
Data Lineage in Malicious Environments
Data Visualization of the echo query system
Ddsga A Data Driven Semi Global Alignment Approach For Detecting Masquerade Attacks
Designing High Performance Web-Based Computing Services To Promote Telemedicine Database Management Syste
Detecting Malicious Facebook Applications
Detecting Node Failures in Mobile Wireless Networks A Probabilistic Approach
Development of Integrated Mobile Money System Using Near Field Communication (NFC)
DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud
Discovery Of Ranking Fraud For Mobile Apps
Domain-Sensitive Recommendation with User-Item Subgroup Analysis
Dual-Server Public-Key Encryption With Keyword
Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage
Dynamic and Public Auditing with Fair Arbitration for Cloud Data
Dynamic Job Ordering and Slot
Dynamic Routing For Data Integrity And Delay Differentiated Services In Wireless Sensor Networks
Dynamic Routing For Data Integrity And Delay Differentiated Services In Wireless Sensor Networks
Effective Key Management In Dynamic Wireless Sensor Networks
Efficient Algorithms for Mining Top-K High Utility Itemsets
Efficient And Privacy-Aware Data Aggregation In Mobile Sensing
Efficient Cache-Supported Path Planning on Roads
Emr A Scalable Graph-Based Ranking Model For Content-Based Image Retrieval
Emr: A Scalable Graph-Based Ranking Model For Content-Based Image Retrieval
Enabling Cloud Storage Auditing With Key-Exposure Resistance
Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries Over Encrypted Cloud Data
Energy and Memory Efficient Clone Detection in Wireless Sensor Networks
Entity linking with knowledge database issues, techniques, solutions
EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data
Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services
Focs: fast over lapped community clustering
FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
Geometric Range Search on Encrypted Spatial Data
Identity-Based Encryption with Cloud Revocation Authority and Its Applications
Identity-Based Encryption With Outsourced Revocation In Cloud Computing
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
Inference Attack on Browsing History
iPath Path Inference in Wireless Sensor Networks
Key Updating for Leakage Resiliency With
Key Updating for Leakage Resiliency With Application to AES Modes of Operation
Key-Aggregate Searchable Encryption (Kase) For Group Data Sharing Via Cloud Storage
Key-Aggregate Searchable Encryption (KASE)for Group Data Sharing via Cloud Storage
Keylogging-resistant Visual Authentication protocol
kNNVWC An Efficient k Nearest Neighbours Approach based
Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud
Lightweight Secure Scheme For Detecting Provenance Forgery And Packet Drop Attacks
Location Aware Keyword Query Suggestion Based on Document Proximity
Location-Aware And Personalid Collaborative Filtering For Web Service Recommendation
Location-Aware And Personalized Collaborative Filtering For Web Service Recommendation
Making Digital Artifacts
Malware Detection in Cloud Computing Infrastructures
Malware Propagation
Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine-Grained Benchmark, and Feature Evaluation
Maximizing P2p File Access Availability In Mobile Ad Hoc Networks Though Replication For Efficient File Sharing
Merlin: Exploratory Analysiswith Imprecise Queries
Mining User Aware Rare Sequential Topic Patterns in Document Streams
Multi-Modal Event Topic Model for Social Event Analysis
My Privacy My Decision Control Of Photo Sharing On Online Social Networks
Nearest Keyword Set Search in Multi-Dimensional Datasets
On Summarization And Timeline Generation For Evaluationary Tweet Streams
On Summarization And Timeline Generation For Evolutionary Tweet Streams
Online Multi-Modal Distance Metric Learning with Application to Image Retrieval
Opportunistic Routing Algorithm For Relay Node Selection In Wireless Sensor Networks
Opportunistic Routing With Congestion Diversity in
Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks
OPTIMIZATION OF DENSITY BASED HIERARCHICAL clustering algorithm
Passive IP Traceback: Disclosing The Locations Of IP Spoofers From Path Backscatter
Passive IpTraceback: Disclosing The Locations Of IpSpoofers From Path Backscatter
Prediction of Movies Box Office Performance Using Social Media
Privacy Policy Inference Of User Uploaded Images On Content Sharing Sites
Privacy Preserving And Truthful Detection Of Packet Dropping Attacks
Privacy Preserving And Truthful Detection Of Packet Dropping Attacks(2)
Privacy Preserving Public Audit For Cloud Storage
Privacy Preserving Ranked Multi-Keyword Search For Multiple Data Owners In Cloud Computing
Privacy-Enhanced Web Service Composition
Privacy-Preserving And Truthful Detection Of Packet Dropping Attacks In Wireless Ad Hoc Networks
Progressive Duplicate Detection
Provable Multicopy Dynamic Data Possession
Public Integrity Auditing For Shared Dynamic Cloud Data With Group User Revocation
Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databasescode
Quantifying Political Leaning from Tweets
Quantifying Political Leaning from Tweets, Retweets, and Retweeters
Rating Prediction based on Social Sentiment from Textual Reviews
Real Time Traffic Detection From Twitter Streaming Analysis
Real Time Traffic Detection From Twitter Streaming Analysis
Real-Time Semantic Search Using Approximate
Relevance Feedback Algorithms Inspired By Quantum Detection
Removing of Unwanted Messages From Online Social Networks
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
Reverse Nearest Neighbors In Unsupervised Distance-Based Outlier Detection
Route-Saver-Leveraging-Route-Apis-For-Accurate-And-Efficient-Query-Processing-At-Location-Based-Services_Co
Rule-Based Method For Entity Resolution
Scalable Constrained Spectral Clustering
SecRBAC:Secure Data in Clouds
Secure Data Aggregation Technique For Wireless Sensor Networks In The Presence Of Collusion Attacks
Secure Data Retrieval For Decentralized Disruption-Tolerant Military Networks
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
Secure Distributed Deduplication Systems
Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming
Secure Spatial Top-K Query Processing Via Untrusted Location-Based Service Providers
Securing Network Processors with High Performance Hardware Monitors
Sentiment Embeddings with Applications to Sentiment Analysis
Service Operator-Aware Trust Scheme For Resource Matchmaking Across Multiple Clouds
Smart Crawler
Software Puzzle A Countermeasure To Resource Inflated Denial Of Service Attacks
Sparsity Learning Formulations for Mining
Sparsity Learning Formulations For Mining Time-Varying Data
Spatial Reusability-Aware Routing
Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks
SR-TOWARDS ONLINE SHORTEST PATH Computation
STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
Structured Learning from Heterogeneous Behavior
Tag Based Image Search by Social Re-ranking
T-Closeness Through Micro Aggregation Strict Privacy With Enhanced Utility Preservation
T-Closeness Through MicroAggregation Strict Privacy With Enhanced Utility Preservation
The impact of you storage on edit recommendations
Time-Varying Data
TmacsA robust and verifiable threshold multi- authority access control
Top k Dominating Queries on Incomplete Data_Code
Topic Detection by Clustering Keywords
TopicSketch Real-time Bursty Topic Detection
Top-k Dominating Queries on Incomplete Data
Towards Effective Bug Triage with Software Data Reduction Techniques
Towards Optimized Fine-Grained Pricing Of Iaas Cloud Platform Iaas Cloud Platform
Towards Secure And Dependable Storage Service In Cloud Storage
Towards Secure and Dependable Storage servioce in cloud storage
Tracking Temporal Community Strength In Dynamic Networks
Traffic Pattern-Based Content Leakage
Tweet Segmentation And Its Application To Named Entity Recognition
Two-Factor Data Security Protection Mechanism for Cloud Storage System
User Authentication by Typing Pattern forComputer and Computer based devices
User-Defined Privacy Grid System For Continuous Location-Based Services
Using Hashtag Graph-based Topic Model to Connect Semantically-related Words without Co-occurrence in Microblogs
Wireless Ad Hoc Networks
Data mining
Cloud Computing
Image Processing
Mobile Computing
Networking
Secure Computing