Java Projects - M-Tech Projects -
S No IEEE Project Title Price Base Papers Screen Shorts Buy Project
1 2017 Securing Cloud Data under Key Exposure 2000
2 2017 Detecting Stress Based on Social Interactions 2000
3 2017 Follow But No Track: Privacy Preserved Profile Publishing in Cyber-Physical Social Systems 2000
4 2017 Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud 2000
5 2017 SocialQ&A An Online Social Network Based Question and Answer System 2000
6 2017 A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection 2000
7 2017 Collaborative Filtering-Based Recommendation of Online Social Voting 2000
8 2017 Transactional Behavior Verification in Business Process as a Service Configuration 3000 coming soon
9 2017 Collaborative Filtering Service Recommendation Based on a Novel Similarity Computation Method 3000 coming soon
10 2017 Improving Automated Bug Triaging with Specialized Topic Model 3000 coming soon
11 2017 Two-Stage Friend Recommendation Based on Network Alignment and Series-Expansion of Probabilistic Topic Model 3000 coming soon
12 2017 Tri-Clustered Tensor Completion for Social-Aware Image Tag Refinement 3000 coming soon
13 2017 Image Re-ranking based on Topic Diversity 3000 coming soon
14 2017 Automatic Generation of Social Event Storyboard from Image Click-through Data 3000 coming soon
15 2017 SocialQ&A: An Online Social Network Based Question and Answer System 3000 coming soon
16 2017 Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud 3000 coming soon
17 2017 SPFM: Scalable and Privacy-preserving Friend Matching in Mobile Cloud 3000 coming soon
18 2017 Follow But No Track: Privacy Preserved Profile Publishing in Cyber-Physical Social Systems 3000 coming soon
19 2017 Efficient and Privacy-preserving Polygons Spatial Query Framework for Location-based Services 3000 coming soon
20 2017 An Efficient and Fine-grained Big Data Access Control Scheme with Privacy-preserving Policy 3000 coming soon
21 2017 A Distributed Publisher-Driven Secure Data Sharing Scheme for Information-Centric IoT 3000 coming soon
22 2017 Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending 3000 coming soon
23 2017 Preventing Distributed Denial-of-Service Flooding Attacks with Dynamic Path Identifiers 3000 coming soon
24 2017 NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media 3000 coming soon
25 2017 Towards Detecting Compromised Accounts on Social Networks 3000 coming soon
26 2017 Search Rank Fraud and Malware Detection in Google Play 3000 coming soon
27 2017 ProGuard: Detecting Malicious Accounts in Social-Network-Based Online Promotions 3000 coming soon
28 2017 Privacy-Preserving Selective Aggregation of Online User Behavior Data 3000 coming soon
29 2017 My Privacy My Decision: Control of Photo Sharing on Online Social Networks 3000 coming soon
30 2017 FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data 3000 coming soon
31 2017 Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems 3000 coming soon
32 2017 A Credibility Analysis System for Assessing Information on Twitter 2017 coming soon
33 2017 iASK: A Distributed Q&A System Incorporating Social Community and Global Collective Intelligence 3000 coming soon
34 2017 SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks 3000 coming soon
35 2017 Searching Trajectories by Regions of Interest 3000 coming soon
36 2017 Quantifying Interdependent Privacy Risks with Location Data 3000 coming soon
37 2017 Detecting Mobile Malicious Webpages in Real Time 3000 coming soon
38 2017 A Proxy-based Collaboration System to Minimize Content Download Time and Energy Consumption 3000 coming soon
39 2017 SWEET: Serving the Web by Exploiting Email Tunnels 3000 coming soon
40 2017 Routing in Accumulative Multi-Hop Networks 3000 coming soon
41 2017 Privacy and Integrity Preserving Top-k Query Processing for Two- Tiered Sensor Network 3000 coming soon
42 2017 Network Capability in Localizing Node Failures via End-to-End Path Measurements 3000 coming soon
43 2017 FaceChange: Attaining Neighbor Node Anonymity in Mobile Opportunistic Social Networks With Fine-Grained Control 3000 coming soon
44 2017 An Overlay Architecture for Throughput Optimal Multipath Routing 3000 coming soon
45 2017 When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks 3000 coming soon
46 2017 User-Centric Similarity Search 3000 coming soon
47 2017 User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective 3000 coming soon
48 2017 Understand Short Texts by Harvesting and Analyzing Semantic Knowledge 3000 coming soon
49 2017 Trajectory Community Discovery and Recommendation by Multisource Diffusion Modeling 3000 coming soon
50 2017 Towards Real-Time, Country-Level Location Classification of Worldwide Tweets 3000 coming soon
51 2017 SociRank: Identifying and Ranking Prevalent News Topics Using Social Media Factors 3000 coming soon
52 2017 RAPARE: A Generic Strategy for Cold-Start Rating Prediction Problem 3000 coming soon
53 2017 Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data 3000 coming soon
54 2017 QDA: A Query-Driven Approach to Entity Resolution 3000 coming soon
55 2017 PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks 3000 coming soon
56 2017 Personal Web Revisitation by Context and Content Keywords with Relevance Feedback 3000 coming soon
57 2017 Modeling Information Diffusion over Social Networks for Temporal Dynamic Prediction 3000 coming soon
58 2017 Mining Competitors from Large Unstructured Datasets 3000 coming soon
59 2017 l-Injection: Toward Effective Collaborative Filtering Using Uninteresting Items 3000 coming soon
60 2017 Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach 3000 coming soon
61 2017 Generating Query Facets using Knowledge Bases 3000 coming soon
62 2017 Energy-efficient Query Processing in Web Search Engines 3000 coming soon
63 2017 Efficient Keyword-aware Representative Travel Route Recommendation 3000 coming soon
64 2017 Efficient Clue-based Route Search on Road Networks 3000 coming soon
65 2017 Dynamic Facet Ordering for Faceted Product Search Engines 3000 coming soon
66 2017 Detecting Stress Based on Social Interactions in Social Networks 3000 coming soon
67 2017 Computing Semantic Similarity of Concepts in Knowledge Graphs 3000 coming soon
68 2017 Collaborative Filtering-Based Recommendation of Online Social Voting 3000 coming soon
69 2017 Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach 2000
70 2017 An Iterative Classification Scheme for Sanitizing Large-Scale Datasets 2000
71 2017 Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving 3000 coming soon
72 2017 TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud 3000 coming soon
73 2017 TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud 3000 coming soon
74 2017 Securing Cloud Data under Key Exposure 2000
75 2017 Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption 2000
76 2017 RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage 2000
77 2017 Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud 3000 coming soon
78 2017 Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data 3000 coming soon
79 2017 Privacy Protection based Access Control Scheme in Cloud-based Services 2000
80 2017 Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing 2000
81 2017 On the Security of Data Access Control for Multi-authority Cloud Storage Systems 3000 coming soon
82 2017 Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage 2000
83 2017 Identity-Based Private Matching over Outsourced Encrypted Datasets 3000 coming soon
84 2017 Identity-Based Encryption with Cloud Revocation Authority and Its Applications 3000 coming soon
85 2017 Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds 3000 coming soon
86 2017 Fast Phrase Search for Encrypted Cloud Storage 2000
87 2017 Efficient and Expressive Keyword Search Over Encrypted Data in Cloud 2000
88 2017 Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing 2000
89 2017 Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems 3000 coming soon
90 2017 Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data 2000
91 2017 Achieving Efficient and Secure Data Acquisition for Cloudsupported Internet of Things in Smart Grid 2000
92 2017 A robust reputation management mechanism in the federated cloud 3000 coming soon
93 2017 A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage 2000
94 2017 A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users 3000 coming soon
95 2017 A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing 2000
96 2017 A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 2000
97 2017 A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification 2000
98 2016 Resolving Multi-party Privacy Conflicts in Social Media 2000
99 2016 Two-Factor Data Security Protection Mechanism for Cloud Storage System 2000
100 2016 TopicSketch: Real-time Bursty Topic Detection from Twitter 2000
101 2016 Nearest Keyword Set Search in Multi-Dimensional Datasets 2000
102 2016 TMACS: a robust and verifiable threshold multiauthority access control system in public cloud Storage 2000
103 2016 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates 2000 coming soon
104 2016 A Scalable Approach for Content-Based Image Retrieval in Peer to- Peer Networks 2000 coming soon
105 2016 Learning of Multimodal Representations with Random Walks on the Click Graph 2000 coming soon
106 2016 Tag Based Image Search by Social Re-ranking 2000 coming soon
107 2016 Online Multi-Modal Distance Metric Learning with Application to Image Retrieval 2000 coming soon
108 2016 Profiling Online Social Behaviors for Compromised Account Detection 2000 coming soon
109 2016 Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data 2000 coming soon
110 2016 Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach 2000 coming soon
111 2016 Energy and Memory Efficient Clone Detection in Wireless Sensor Networks 2000 coming soon
112 2016 Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach 2000 coming soon
113 2016 EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data 2000 coming soon
114 2016 Dictionary Based Secure Provenance Compression for Wireless Sensor Networks 2000 coming soon
115 2016 Continuous Answering Holistic Queries over Sensor Networks 2000 coming soon
116 2016 The Server Provisioning Problem for Continuous Distributed Interactive Applications 2000 coming soon
117 2016 A Hop-by-Hop Routing Mechanism for Green Internet 2000 coming soon
118 2016 Resolving Multi-party Privacy Conflicts in Social Media 2000
119 2016 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments 2000 coming soon
120 2016 Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts 2000 coming soon
121 2016 Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata 2000
122 2016 Data Lineage in Malicious Environments 2000
123 2016 iPath: Path Inference in Wireless Sensor Networks 2000 coming soon
124 2016 STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users 2000 coming soon
125 2016 Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks 2000 coming soon
126 2016 Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks 2000
127 2016 A Stable Approach for Routing Queries in Unstructured P2P Networks 2000 coming soon
128 2016 SecRBAC: Secure data in the Clouds 2000
129 2016 Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing 2000 coming soon
130 2016 A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing 2000 coming soon
131 2016 DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments 2000 coming soon
132 2016 Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming 2000 coming soon
133 2016 Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems 2000 coming soon
134 2016 Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption 2000 coming soon
135 2016 TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage 2000 coming soon
136 2016 Diplo Cloud: Efficient and Scalable Management of RDF Data in the Cloud 2000
137 2016 Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud 2000
138 2016 Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud 2000 coming soon
139 2016 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates 2000 coming soon
140 2016 Identity-Based Encryption with Cloud Revocation Authority and Its Applications 2000 coming soon
141 2016 Geometric Range Search on Encrypted Spatial Data 2000 coming soon
142 2016 Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage 2000
143 2016 Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email 2000
144 2016 Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services 2000
145 2016 Cloud Armor: Supporting Reputation-Based Trust Management for Cloud Services 2000
146 2016 Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds 2000 coming soon
147 2016 Circuit Cipher text-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing 2000 coming soon
148 2016 An Efficient Privacy-Preserving Ranked Keyword Search Method 2000 coming soon
149 2016 A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data 2000
150 2016 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud 2000 coming soon
151 2016 CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System 2000
152 2016 An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing 2000 coming soon
153 2016 Relevance Feedback Algorithms Inspired By Quantum Detection 2000 coming soon
154 2016 Using Hash tag Graph-based Topic Model to Connect Semantically-related Words without Co-occurrence in Micro blogs 2000 coming soon
155 2016 Rating Prediction based on Social Sentiment from Textual Reviews 2000 coming soon
156 2016 Nearest Keyword Set Search in Multi-Dimensional Datasets 2000
157 2016 Sentiment Embeddings with Applications to Sentiment Analysis 2000 coming soon
158 2016 Efficient Cache-Supported Path Planning on Roads 2000 coming soon
159 2016 TopicSketch: Real-time Bursty Topic Detection from Twitter 2000
160 2016 Quantifying Political Leaning from Tweets, Retweets, and Retweeters 2000 coming soon
161 2016 Location Aware Keyword Query Suggestion Based on Document Proximity 2000 coming soon
162 2016 Mining User-Aware Rare Sequential Topic Patterns in Document Streams 2000 coming soon
163 2016 Top-k Dominating Queries on Incomplete Data 2000
164 2016 Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings 2000 coming soon
165 2016 Efficient Algorithms for Mining Top-K High Utility Itemsets 2000
166 2016 Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder 2000
167 2016 Booster in High Dimensional Data Classification 2000
168 2016 Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information 2000
169 2016 Domain-Sensitive Recommendation with User-Item Subgroup Analysis 2000 coming soon
170 2016 Crowd sourcing for Top-K Query Processing over Uncertain Data 2000 coming soon
171 2016 Building an intrusion detection system using a filter-based feature selection algorithm 2000 coming soon
172 2016 Automatically Mining Facets for Queries from Their Search Results 2000
173 2015 understanding the performance and potential of cloud computing for scientific applications 1500
174 2015 Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing 1500
175 2015 Tweet Segmentation and Its Application to Named Entity Recognition 1500
176 2015 Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing 1500
177 2015 Progressive Duplicate Detection 1500
178 2015 A Computational Dynamic Trust Model for User Authorization 1500
179 2015 Friendbook: A Semantic-Based Friend Recommendation System for Social Networks 1500
180 2015 FRAppE: Detecting Malicious Facebook Applications 1500
181 2015 A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks 1500
182 2015 k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data 1500
183 2015 Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services 1500
184 2015 Stealthy Denial of Service Strategy in Cloud Computing 1500
185 2015 Secure Auditing and Deduplicating Data in Cloud 1500
186 2015 Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage 1500
187 2015 A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems 1500
188 2015 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing 1500
189 2015 A Hybrid Cloud Approach for Secure Authorized Deduplication 1500
190 2015 Detecting Malicious Facebook Applications 1500
191 2014 SOS: A Distributed Mobile Q&A System Based on Social Networks 1000
192 2014 Fast Nearest Neighbor Search with Keywords 1000
193 2014 Dealing With Concept Drifts in Process Mining 1000
194 2014 Data Mining with Big Data 1000
195 2014 Efficient Authentication for Mobile and Pervasive Computing 1000
196 2014 Hiding in the Mobile Crowd: Location Privacy through Collaboration 1000
197 2014 Towards Differential Query Services in Cost-Efficient Clouds 1000