Java Projects - -
S No IEEE Project Title Price Base Papers Screen Shorts Buy Project
1 2018 Emotion Recognition on Twitter: Comparative Study and Training a Unison Model 4000 coming soon
2 2018 Discovering Canonical Correlations between Topical and Topological Information in Document Networks 4000 coming soon
3 2018 Reverse k Nearest Neighbor Search over Trajectories 4000 coming soon
4 2018 Range-based Nearest Neighbor Queries with Complex-shaped Obstacles 4000 coming soon
5 2018 Weakly-Supervised Deep Learning for Customer Review Sentiment Classification 4000 coming soon
6 2018 Profit Maximization for Viral Marketing in Online Social Networks Algorithms and analysis 4000 coming soon
7 2018 A Two-Phase Algorithm for Differentially Private Frequent Subgraph Mining 4000 coming soon
8 2018 Online Product Quantization 4000 coming soon
9 2018 An Efficient Method for High Quality and Cohesive Topical Phrase Mining 4000 coming soon
10 2018 Automated Phrase Mining from Massive Text Corpora 4000 coming soon
11 2018 Fast Cosine Similarity Search in Binary Space with Angular Multi-index Hashing 4000 coming soon
12 2018 Collective List-Only Entity Linking: A Graph-Based Approach 4000 coming soon
13 2018 Principal Component Analysis Based Filtering for Scalable, High Precision k-NN Search 4000 coming soon
14 2018 Complementary Aspect-based Opinion Mining 4000 coming soon
15 2018 A Weighted Frequent Itemset Mining Algorithm for Intelligent Decision in Smart Systems 4000 coming soon
16 2018 Fuzzy Bag-of-Words Model for Document Representation 4000 coming soon
17 2018 Document Summarization for Answering Non-Factoid Queries 4000 coming soon
18 2018 Efficient Vertical Mining of High Average-Utility Itemsets based on Novel Upper-Bounds 4000 coming soon
19 2018 Supervised Topic Modeling using Hierarchical Dirichlet Process-based Inverse Regression: Experiments on E-Commerce Applications 4000 coming soon
20 2018 Entity Linking: An Issue to Extract Corresponding Entity With Knowledge Base 4000 coming soon
21 2018 Frequent Itemsets Mining with Differential Privacy over Large-scale Data 4000 coming soon
22 2018 Opinion Aspect Relations in Cognizing Customer Feelings via Reviews 4000 coming soon
23 2018 Highlighter: automatic highlighting of electronic learning documents 4000 coming soon
24 2018 Predicting Contextual Informativeness for Vocabulary Learning 4000 coming soon
25 2017 A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification 2000
26 2017 A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 2000
27 2017 A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing 2000
28 2017 A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users 3000 coming soon
29 2017 A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage 2000
30 2017 A robust reputation management mechanism in the federated cloud 3000 coming soon
31 2017 Achieving Efficient and Secure Data Acquisition for Cloudsupported Internet of Things in Smart Grid 2000
32 2017 Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data 2000
33 2017 Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems 3000 coming soon
34 2017 Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing 2000
35 2017 Efficient and Expressive Keyword Search Over Encrypted Data in Cloud 2000
36 2017 Fast Phrase Search for Encrypted Cloud Storage 2000
37 2017 Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds 3000 coming soon
38 2017 Identity-Based Encryption with Cloud Revocation Authority and Its Applications 3000 coming soon
39 2017 Identity-Based Private Matching over Outsourced Encrypted Datasets 3000 coming soon
40 2017 Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage 2000
41 2017 On the Security of Data Access Control for Multi-authority Cloud Storage Systems 3000 coming soon
42 2017 Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing 2000
43 2017 Privacy Protection based Access Control Scheme in Cloud-based Services 2000
44 2017 Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data 3000 coming soon
45 2017 Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud 3000 coming soon
46 2017 RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage 2000
47 2017 Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption 2000
48 2017 Securing Cloud Data under Key Exposure 2000
49 2017 TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud 3000 coming soon
50 2017 TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud 3000 coming soon
51 2017 Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving 3000 coming soon
52 2017 An Iterative Classification Scheme for Sanitizing Large-Scale Datasets 2000
53 2017 Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach 2000
54 2017 Collaborative Filtering-Based Recommendation of Online Social Voting 3000 coming soon
55 2017 Computing Semantic Similarity of Concepts in Knowledge Graphs 3000 coming soon
56 2017 Detecting Stress Based on Social Interactions in Social Networks 3000 coming soon
57 2017 Dynamic Facet Ordering for Faceted Product Search Engines 3000 coming soon
58 2017 Efficient Clue-based Route Search on Road Networks 3000 coming soon
59 2017 Efficient Keyword-aware Representative Travel Route Recommendation 3000 coming soon
60 2017 Energy-efficient Query Processing in Web Search Engines 3000 coming soon
61 2017 Generating Query Facets using Knowledge Bases 3000 coming soon
62 2017 Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach 3000 coming soon
63 2017 l-Injection: Toward Effective Collaborative Filtering Using Uninteresting Items 3000 coming soon
64 2017 Mining Competitors from Large Unstructured Datasets 3000 coming soon
65 2017 Modeling Information Diffusion over Social Networks for Temporal Dynamic Prediction 3000 coming soon
66 2017 Personal Web Revisitation by Context and Content Keywords with Relevance Feedback 3000 coming soon
67 2017 PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks 3000 coming soon
68 2017 QDA: A Query-Driven Approach to Entity Resolution 3000 coming soon
69 2017 Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data 3000 coming soon
70 2017 RAPARE: A Generic Strategy for Cold-Start Rating Prediction Problem 3000 coming soon
71 2017 SociRank: Identifying and Ranking Prevalent News Topics Using Social Media Factors 3000 coming soon
72 2017 Towards Real-Time, Country-Level Location Classification of Worldwide Tweets 3000 coming soon
73 2017 Trajectory Community Discovery and Recommendation by Multisource Diffusion Modeling 3000 coming soon
74 2017 Understand Short Texts by Harvesting and Analyzing Semantic Knowledge 3000 coming soon
75 2017 User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective 3000 coming soon
76 2017 User-Centric Similarity Search 3000 coming soon
77 2017 When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks 3000 coming soon
78 2017 An Overlay Architecture for Throughput Optimal Multipath Routing 3000 coming soon
79 2017 FaceChange: Attaining Neighbor Node Anonymity in Mobile Opportunistic Social Networks With Fine-Grained Control 3000 coming soon
80 2017 Network Capability in Localizing Node Failures via End-to-End Path Measurements 3000 coming soon
81 2017 Privacy and Integrity Preserving Top-k Query Processing for Two- Tiered Sensor Network 3000 coming soon
82 2017 Routing in Accumulative Multi-Hop Networks 3000 coming soon
83 2017 SWEET: Serving the Web by Exploiting Email Tunnels 3000 coming soon
84 2017 A Proxy-based Collaboration System to Minimize Content Download Time and Energy Consumption 3000 coming soon
85 2017 Detecting Mobile Malicious Webpages in Real Time 3000 coming soon
86 2017 Quantifying Interdependent Privacy Risks with Location Data 3000 coming soon
87 2017 Searching Trajectories by Regions of Interest 3000 coming soon
88 2017 SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks 3000 coming soon
89 2017 iASK: A Distributed Q&A System Incorporating Social Community and Global Collective Intelligence 3000 coming soon
90 2017 A Credibility Analysis System for Assessing Information on Twitter 2017 coming soon
91 2017 Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems 3000 coming soon
92 2017 FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data 3000 coming soon
93 2017 My Privacy My Decision: Control of Photo Sharing on Online Social Networks 3000 coming soon
94 2017 Privacy-Preserving Selective Aggregation of Online User Behavior Data 3000 coming soon
95 2017 ProGuard: Detecting Malicious Accounts in Social-Network-Based Online Promotions 3000 coming soon
96 2017 Search Rank Fraud and Malware Detection in Google Play 3000 coming soon
97 2017 Towards Detecting Compromised Accounts on Social Networks 3000 coming soon
98 2017 NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media 3000 coming soon
99 2017 Preventing Distributed Denial-of-Service Flooding Attacks with Dynamic Path Identifiers 3000 coming soon
100 2017 Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending 3000 coming soon
101 2017 A Distributed Publisher-Driven Secure Data Sharing Scheme for Information-Centric IoT 3000 coming soon
102 2017 An Efficient and Fine-grained Big Data Access Control Scheme with Privacy-preserving Policy 3000 coming soon
103 2017 Efficient and Privacy-preserving Polygons Spatial Query Framework for Location-based Services 3000 coming soon
104 2017 Follow But No Track: Privacy Preserved Profile Publishing in Cyber-Physical Social Systems 3000 coming soon
105 2017 SPFM: Scalable and Privacy-preserving Friend Matching in Mobile Cloud 3000 coming soon
106 2017 Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud 3000 coming soon
107 2017 SocialQ&A: An Online Social Network Based Question and Answer System 3000 coming soon
108 2017 Automatic Generation of Social Event Storyboard from Image Click-through Data 3000 coming soon
109 2017 Image Re-ranking based on Topic Diversity 3000 coming soon
110 2017 Tri-Clustered Tensor Completion for Social-Aware Image Tag Refinement 3000 coming soon
111 2017 Two-Stage Friend Recommendation Based on Network Alignment and Series-Expansion of Probabilistic Topic Model 3000 coming soon
112 2017 Improving Automated Bug Triaging with Specialized Topic Model 3000 coming soon
113 2017 Collaborative Filtering Service Recommendation Based on a Novel Similarity Computation Method 3000 coming soon
114 2017 Transactional Behavior Verification in Business Process as a Service Configuration 3000 coming soon
115 2017 Collaborative Filtering-Based Recommendation of Online Social Voting 2000
116 2017 A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection 2000
117 2017 SocialQ&A An Online Social Network Based Question and Answer System 2000
118 2017 Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud 2000
119 2017 Follow But No Track: Privacy Preserved Profile Publishing in Cyber-Physical Social Systems 2000
120 2017 Detecting Stress Based on Social Interactions 2000
121 2017 Securing Cloud Data under Key Exposure 2000
122 2016 Automatically Mining Facets for Queries from Their Search Results 2000
123 2016 Building an intrusion detection system using a filter-based feature selection algorithm 2000 coming soon
124 2016 Crowd sourcing for Top-K Query Processing over Uncertain Data 2000 coming soon
125 2016 Domain-Sensitive Recommendation with User-Item Subgroup Analysis 2000 coming soon
126 2016 Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information 2000
127 2016 Booster in High Dimensional Data Classification 2000
128 2016 Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder 2000
129 2016 Efficient Algorithms for Mining Top-K High Utility Itemsets 2000
130 2016 Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings 2000 coming soon
131 2016 Top-k Dominating Queries on Incomplete Data 2000
132 2016 Mining User-Aware Rare Sequential Topic Patterns in Document Streams 2000 coming soon
133 2016 Location Aware Keyword Query Suggestion Based on Document Proximity 2000 coming soon
134 2016 Quantifying Political Leaning from Tweets, Retweets, and Retweeters 2000 coming soon
135 2016 TopicSketch: Real-time Bursty Topic Detection from Twitter 2000
136 2016 Efficient Cache-Supported Path Planning on Roads 2000 coming soon
137 2016 Sentiment Embeddings with Applications to Sentiment Analysis 2000 coming soon
138 2016 Nearest Keyword Set Search in Multi-Dimensional Datasets 2000
139 2016 Rating Prediction based on Social Sentiment from Textual Reviews 2000 coming soon
140 2016 Using Hash tag Graph-based Topic Model to Connect Semantically-related Words without Co-occurrence in Micro blogs 2000 coming soon
141 2016 Relevance Feedback Algorithms Inspired By Quantum Detection 2000 coming soon
142 2016 An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing 2000 coming soon
143 2016 CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System 2000
144 2016 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud 2000 coming soon
145 2016 A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data 2000
146 2016 An Efficient Privacy-Preserving Ranked Keyword Search Method 2000 coming soon
147 2016 Circuit Cipher text-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing 2000 coming soon
148 2016 Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds 2000 coming soon
149 2016 Cloud Armor: Supporting Reputation-Based Trust Management for Cloud Services 2000
150 2016 Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services 2000
151 2016 Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email 2000
152 2016 Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage 2000
153 2016 Geometric Range Search on Encrypted Spatial Data 2000 coming soon
154 2016 Identity-Based Encryption with Cloud Revocation Authority and Its Applications 2000 coming soon
155 2016 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates 2000 coming soon
156 2016 Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud 2000 coming soon
157 2016 Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud 2000
158 2016 Diplo Cloud: Efficient and Scalable Management of RDF Data in the Cloud 2000
159 2016 TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage 2000 coming soon
160 2016 Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption 2000 coming soon
161 2016 Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems 2000 coming soon
162 2016 Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming 2000 coming soon
163 2016 DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments 2000 coming soon
164 2016 A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing 2000 coming soon
165 2016 Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing 2000 coming soon
166 2016 SecRBAC: Secure data in the Clouds 2000
167 2016 A Stable Approach for Routing Queries in Unstructured P2P Networks 2000 coming soon
168 2016 Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks 2000
169 2016 Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks 2000 coming soon
170 2016 STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users 2000 coming soon
171 2016 iPath: Path Inference in Wireless Sensor Networks 2000 coming soon
172 2016 Data Lineage in Malicious Environments 2000
173 2016 Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata 2000
174 2016 Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts 2000 coming soon
175 2016 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments 2000 coming soon
176 2016 Resolving Multi-party Privacy Conflicts in Social Media 2000
177 2016 A Hop-by-Hop Routing Mechanism for Green Internet 2000 coming soon
178 2016 The Server Provisioning Problem for Continuous Distributed Interactive Applications 2000 coming soon
179 2016 Continuous Answering Holistic Queries over Sensor Networks 2000 coming soon
180 2016 Dictionary Based Secure Provenance Compression for Wireless Sensor Networks 2000 coming soon
181 2016 EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data 2000 coming soon
182 2016 Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach 2000 coming soon
183 2016 Energy and Memory Efficient Clone Detection in Wireless Sensor Networks 2000 coming soon
184 2016 Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach 2000 coming soon
185 2016 Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data 2000 coming soon
186 2016 Profiling Online Social Behaviors for Compromised Account Detection 2000 coming soon
187 2016 Online Multi-Modal Distance Metric Learning with Application to Image Retrieval 2000 coming soon
188 2016 Tag Based Image Search by Social Re-ranking 2000 coming soon
189 2016 Learning of Multimodal Representations with Random Walks on the Click Graph 2000 coming soon
190 2016 A Scalable Approach for Content-Based Image Retrieval in Peer to- Peer Networks 2000 coming soon
191 2016 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates 2000 coming soon
192 2016 TMACS: a robust and verifiable threshold multiauthority access control system in public cloud Storage 2000
193 2016 Nearest Keyword Set Search in Multi-Dimensional Datasets 2000
194 2016 TopicSketch: Real-time Bursty Topic Detection from Twitter 2000
195 2016 Two-Factor Data Security Protection Mechanism for Cloud Storage System 2000
196 2016 Resolving Multi-party Privacy Conflicts in Social Media 2000
197 2015 Detecting Malicious Facebook Applications 1500
198 2015 A Hybrid Cloud Approach for Secure Authorized Deduplication 1500
199 2015 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing 1500
200 2015 A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems 1500
201 2015 Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage 1500
202 2015 Secure Auditing and Deduplicating Data in Cloud 1500
203 2015 Stealthy Denial of Service Strategy in Cloud Computing 1500
204 2015 Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services 1500
205 2015 k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data 1500
206 2015 A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks 1500
207 2015 FRAppE: Detecting Malicious Facebook Applications 1500
208 2015 Friendbook: A Semantic-Based Friend Recommendation System for Social Networks 1500
209 2015 A Computational Dynamic Trust Model for User Authorization 1500
210 2015 Progressive Duplicate Detection 1500
211 2015 Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing 1500
212 2015 Tweet Segmentation and Its Application to Named Entity Recognition 1500
213 2015 Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing 1500
214 2015 understanding the performance and potential of cloud computing for scientific applications 1500
215 2014 Towards Differential Query Services in Cost-Efficient Clouds 1000
216 2014 Hiding in the Mobile Crowd: Location Privacy through Collaboration 1000
217 2014 Efficient Authentication for Mobile and Pervasive Computing 1000
218 2014 Data Mining with Big Data 1000
219 2014 Dealing With Concept Drifts in Process Mining 1000
220 2014 Fast Nearest Neighbor Search with Keywords 1000
221 2014 SOS: A Distributed Mobile Q&A System Based on Social Networks 1000