| S.NO | Dotnet IEEE Titles | Abstract |
| 1 | Query aware determinization of uncertain objects | View |
| 2 | Shared authority based privacy-preserving authentication protocol in cloud computing | View |
| 3 | Single image super-resolution based on gradient profile sharpness | View |
| 4 | Neighbor similarity trust against Sybil attack in p2p e-commerce | View |
| 5 | Pages partition aware engine for parallel graph computation | View |
| 6 | T-broker a trust-aware service brokering scheme for multiple cloud collaborative services | View |
| 7 | Annotating search result from web databases | View |
| 8 | Attribute based access scalable media in cloud assisted content sharing networks | View |
| 9 | Cam_ cloud assisted privacy preserving mobile health monitoring | View |
| 10 | Cloud computing security from single to multi-clouds | View |
| 11 | . Dynamic resource allocation using virtual machines for cloud computing environment | View |
| 12 | Efficient computation of range aggregates | View |
| 13 | Enabling data dynamic & indirect mutual trust cloud computing | View |
| 14 | Malicious node detection using a dual threshold in wireless sensor networks | View |
| 15 | Mining web graphs for recommendations | View |
| 16 | Mona: secure multi-owner data sharing for dynamic groups in the cloud | View |
| 17 | Privacy preserving data sharing with anonymous id | View |
| 18 | Privacy-preserving public auditing for secure cloud storage | View |
| 19 | A proxy-based architecture for dynamic discovery and invocation of web services from mobile devices | View |
| 20 | A query formulation language for the data web | View |
| 21 | A secure erasure code-based cloud storage system with secure data forwarding | View |
| 22 | Distributed throughput maximization in wireless sensor network | View |
| 23 | A gossip protocol for dynamic resource management in large cloud environments | View |
| 24 | Horizontal aggregations in sql to prepare data sets for data mining analysis | View |
| 25 | Optimal source-based filtering of malicious traffic | View |
| 26 | Protecting location privacy in sensor networks against a global eavesdropper | View |
| 27 | Revisiting defenses against large-scale online password guessing attacks | View |
| 28 | Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption | View |
| 29 | Semi supervised biased maximum margin analysis for interactive image retrieval | View |
| 30 | Slicing: a new approach for privacy preserving data publishing | View |
| 31 | . Tree-based mining for discovering patterns of human interaction in meetings | View |
| 32 | A novel anti phishing visual cryptographic framework | View |
| 33 | Enhanced data security model for cloud computing | View |
| 34 | Review of apriority based frequent item set mining solutions on big data | View |
| 35 | Watermarking-based secure plaintext image protocols for storage, show, deletion and retrieval in the cloud | View |
| 36 | Scalable and efficient authentication scheme for secure smart grid communication | View |
| 37 | A novel feature matching ranked search mechanism over encrypted cloud data | View |
| 38 | A secure data dynamics and public auditing scheme for cloud storage | View |
| 39 | A verifiable semantic searching scheme by optimal matching over encrypted data in public cloud | View |
| 40 | Fast secure and anonymous key agreement against bad randomness for cloud computing | View |
| 41 | Key-escrow free attribute-based multi-keyword search with dynamic policy update in cloud computing | View |
| 42 | Key-policy attribute-based encryption with keyword search in virtualized environments | View |
| 43 | .A secure and efficient cloud-centric internet of medical thingsenabled smart healthcare system with public verifiability | View |
| 44 | A secure enhanced key-policy attribute-based temporary keyword search scheme in the cloud | View |
| 45 | dentity-based encryption transformation for flexible sharing of encrypted data in public cloud | View |
| 46 | Authentication and key agreement based on anonymous identity for peer- to-peer cloud | View |
| 47 | Fine-grained access control in the era of cloud computing: an analytical review | View |
| 48 | Personalized market basket prediction with temporal annotated recurring sequences | View |
| 49 | Drops: division and replication of data in cloud for optimal performance and securit | View |
| 50 | Mining users trust from e commerce reviews based on sentiment similarity analysis | View |
| 51 | Spammer detection and fake user identification on social networks | View |
| 52 | Privacy-preserving attribute-based keyword search in shared multiowner setting | View |
| 53 | Revocable identity-based broadcast proxy re-encryption for data sharing in clouds | View |
| 54 | Dynamic multi keyword ranked search based on bloom filter over encrypted cloud data | View |
| 55 | Data integrity auditing without private key storage for secure cloud storage | View |
| 56 | Enabling verifiable and dynamic ranked search over outsourced data | View |
| 57 | Hidden cipher text policy attribute-based encryption with fast decryption for personal health record system | View |
| 58 | .A practical attribute-based document collection hierarchical encryption scheme in cloud computing | View |
| 59 | Privacy preservation for outsourced medical data with flexible access control | View |
| 60 | Privacy preserving indexing and query processing for secure dynamic cloud storage | View |
| 61 | SEPDP secure and efficient privacy preserving provable data possession in cloud storage | View |
| 62 | An efficient and privacy preserving biometric identification scheme in cloud computing | View |
| 63 | Secured outsourcing towards a cloud computing environment based on DNA cryptography | View |
| 64 | Detection of suicide-related posts in twitter data streams | View |
| 65 | Combining data owner-side and cloud-side access control for encrypted cloud storage | View |
| 66 | Characterizing and predicting early reviewers for effective product marketing on e commerce websites | View |
| 67 | Event detection and identification of influential spreaders in social media data streams | View |
| 68 | Enabling identity-based integrity auditing and data sharing with sensitive information hiding | View |
| 69 | Class: cloud log assuring soundness and secrecy scheme for cloud forensics | View |
| 70 | Provably secure and lightweight identity based authenticated data sharing protocol for cyber physical environmen | View |
| 71 | Efficient retrieval over documents encrypted by attributes in cloud computing | View |
| 72 | Improving privacy and security in decentralizing multi-authority attribute-based encryption in cloud computing | View |
| 73 | Semantic aware searching over encrypted data for cloud computing | View |
| 74 | Privacy-preserving search over encrypted personal health record in multi-source cloud | View |
| 75 | Search rank fraud and malware detection in Google play | View |
| 76 | Detecting stress based on social interaction in social networks | View |
| 77 | TAFC time and attribute factors combined access control for timesensitive data in public cloud | View |
| 78 | Optimal resource scheduling and allocation system | View |
| 79 | .SeGoAC: a tree-based model for self-defined, proxy-enabled and group-oriented access control in mobile cloud computing | View |
| 80 | Shilling attack models in recommender system | View |
| 81 | FastGeo: efficient geometric range queries on encrypted spatial data | View |
| 82 | Query reorganization algorithms for efficient Boolean information filtering | View |
| 83 | Continuous top-k monitoring on document streams | View |
| 84 | Energy efficient clustering algorithm for multi-hop wireless sensor network using type-2 fuzzy logic | View |
| 85 | Trajectory community discovery and recommendation by multisource diffusion modeling | View |
| 1 | Privacy protection based access control scheme in cloud-based services | View |
| 86 | User service rating prediction by exploring the social user rating behaviours | View |
| 87 | My privacy my decision | View |
| 88 | Net spam-a network based spam detection framework | View |
| 89 | Heterogeneous cloud computing network | View |
| 90 | Net spam-a network based spam detection framework | View |
| 91 | Achieving energy efficiency in data centers using an artificial intelligence abstraction model | View |
| 92 | An efficient file hierarchy attribute-based encryption scheme in cloud computing | View |
| 93 | Authenticated key exchange protocols for parallel network file systems | View |
| 94 | Circuit cipher text-policy attribute-based hybrid encryption with verifiable | View |
| 95 | Cloud workflow scheduling with deadline and time slot algorithm | View |
| 96 | Cloudarmor-supporting-reputation-based-trust-management-forcloud-services | View |
| 97 | Collective data-sanitization for preventing sensitive information inference attacks in social networks | View |
| 98 | Conditional identity-based broadcast proxy re-encryption and its application to cloud email | View |
| 99 | Discovery of ranking fraud for mobile | View |
| 100 | Efficient multipath communication for time-critical applications in underwater acoustic sensor networks | View |
| 101 | Fine-grained two-factor access control for cloud computing services | View |