Java Projects

2017-2018 JAVA IEEE PROJECT TITLES:
IEEE 2017 – 2018 CLOUD COMPUTING PROJECT TITLES:
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification
A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users
A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage
A robust reputation management mechanism in the federated cloud
Achieving Efficient and Secure Data Acquisition for Cloud-supported Internet of Things in Smart Grid
Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data
Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems
Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
Fast Phrase Search for Encrypted Cloud Storage
Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds
Identity-Based Encryption with Cloud Revocation Authority and Its Applications
Identity-Based Private Matching over Outsourced Encrypted Datasets
Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage
On the Security of Data Access Control for Multi-authority  Cloud Storage Systems
Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing
Privacy Protection based Access Control Scheme in Cloud-based Services
Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data
Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud
RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
Securing Cloud Data under Key Exposure
TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud
TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud
Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving
IEEE 2017 – 2018 DATA MINING PROJECT TITLES
An Iterative Classification Scheme for Sanitizing Large-Scale Datasets
Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach
Collaborative Filtering-Based Recommendation of Online Social Voting
Computing Semantic Similarity of Concepts in Knowledge Graphs
Detecting Stress Based on Social Interactions in Social Networks
Dynamic Facet Ordering for Faceted Product Search Engines
Efficient Clue-based Route Search on Road Networks
Efficient Keyword-aware Representative Travel Route Recommendation
Energy-efficient Query Processing in Web Search Engines
Generating Query Facets using Knowledge Bases
Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach
l-Injection: Toward Effective Collaborative Filtering Using Uninteresting Items
Mining Competitors from Large Unstructured Datasets
Modeling Information Diffusion over Social Networks for Temporal Dynamic Prediction
Personal Web Revisitation by Context and Content Keywords with Relevance Feedback
PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks
QDA: A Query-Driven Approach to Entity Resolution
Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data
RAPARE: A Generic Strategy for Cold-Start Rating Prediction Problem
SociRank: Identifying and Ranking Prevalent News Topics Using Social Media Factors
Towards Real-Time, Country-Level Location Classification of Worldwide Tweets
Trajectory Community Discovery and Recommendation by Multi-source Diffusion Modeling
Understand Short Texts by Harvesting and Analyzing Semantic Knowledge
User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective
User-Centric Similarity Search
When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks
IEEE 2017 – 2018 NETWORKING PROJECT TITLES
An Overlay Architecture for Throughput Optimal Multipath Routing
FaceChange: Attaining Neighbor Node Anonymity in Mobile Opportunistic Social Networks With Fine-Grained Control
Network Capability in Localizing Node Failures via End-to-End Path Measurements
Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Network
Routing in Accumulative Multi-Hop Networks
SWEET: Serving the Web by Exploiting Email Tunnels
IEEE 2017 – 2018 MOBILE COMPUTING PROJECT TITLES
A Proxy-based Collaboration System to Minimize Content Download Time and Energy Consumption
Detecting Mobile Malicious Webpages in Real Time
Quantifying Interdependent Privacy Risks with Location Data
Searching Trajectories by Regions of Interest
SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks
IEEE 2017 – 2018 PARALLEL AND DISTRIBUTED SYSTEMS PROJECT TITLES
iASK: A Distributed Q&A System Incorporating Social Community and Global Collective Intelligence
IEEE 2017 – 2018 SECURE COMPUTING PROJECT TITLES
A Credibility Analysis System for Assessing Information on Twitter
Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data
My Privacy My Decision: Control of Photo Sharing on Online Social Networks
Privacy-Preserving Selective Aggregation of Online User Behavior Data
ProGuard: Detecting Malicious Accounts in Social-Network-Based Online Promotions
Search Rank Fraud and Malware Detection in Google Play
Towards Detecting Compromised Accounts on Social Networks
IEEE 2017 – 2018 INFORMATION FORENSICS AND SECURITY PROJECT TITLES
NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media
Preventing Distributed Denial-of-Service Flooding Attacks with Dynamic Path Identifiers
Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending

IEEE 2017 – 2018 IOT Titles
A Distributed Publisher-Driven Secure Data Sharing Scheme for Information-Centric IoT
An Efficient and Fine-grained Big Data Access Control Scheme with Privacy-preserving Policy
Efficient and Privacy-preserving Polygons Spatial Query Framework for Location-based Services
Follow But No Track: Privacy Preserved Profile Publishing in Cyber-Physical Social Systems
SPFM: Scalable and Privacy-preserving Friend Matching in Mobile Cloud
IEEE 2017 – 2018 BIG DATA
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
SocialQ&A: An Online Social Network Based Question and Answer System
IEEE 2017 – 2018 IMAGE PROCESSING PROJECT TITLES
Automatic Generation of Social Event Storyboard from Image Click-through Data
Image Re-ranking based on Topic Diversity
Tri-Clustered Tensor Completion for Social-Aware Image Tag Refinement
IEEE 2017 – 2018 MULTIMEDIA PROJECT TITLES
Two-Stage Friend Recommendation Based on Network Alignment and Series-Expansion of Probabilistic Topic Model
IEEE 2017 – 2018 SOFTWARE ENGINEERING PROJECT TITLES
A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection
Improving Automated Bug Triaging with Specialized Topic Model
IEEE 2017 – 2018 SERVICE COMPUTING (WEB SERVICES)
Collaborative Filtering Service Recommendation Based on a Novel Similarity Computation Method
Transactional Behavior Verification in Business Process as a Service Configuration
2016-2017 JAVA IEEE PROJECT TITLES:
IEEE 2016-2017 CLOUD COMPUTING PROJECT TITLES:
A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing
An Efficient Privacy-Preserving Ranked Keyword Search Method
CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing
CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services
Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds
DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud
Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage
Dynamic and Public Auditing with Fair Arbitration for Cloud Data
Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services
Geometric Range Search on Encrypted Spatial Data
Identity-Based Encryption with Cloud Revocation Authority and Its Applications
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud
Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming
TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage
A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing
SecRBAC: Secure data in the Clouds
IEEE 2016-2017 DATA MINING PROJECT TITLES
A Novel Recommendation Model Regularized with User Trust and Item Ratings
Automatically Mining Facets for Queries from Their Search Results
Booster in High Dimensional Data Classification
Building an intrusion detection system using a filter-based feature selection algorithm
Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information
Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings
Crowdsourcing for Top-K Query Processing over Uncertain Data
Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
Domain-Sensitive Recommendation with User-Item Subgroup Analysis
Efficient Algorithms for Mining Top-K High Utility Itemsets
Efficient Cache-Supported Path Planning on Roads
Mining User-Aware Rare Sequential Topic Patterns in Document Streams
Nearest Keyword Set Search in Multi-Dimensional Datasets
Rating Prediction based on Social Sentiment from Textual Reviews
Location Aware Keyword Query Suggestion Based on Document Proximity
Using Hashtag Graph-based Topic Model to Connect Semantically-related Words without Co-occurrence in Microblogs
Quantifying Political Leaning from Tweets, Retweets, and Retweeters
Relevance Feedback Algorithms Inspired By Quantum Detection
Sentiment Embeddings with Applications to Sentiment Analysis
Top-Down XML Keyword Query Processing
TopicSketch: Real-time Bursty Topic Detection from Twitter
Top-k Dominating Queries on Incomplete Data
Understanding Short Texts through Semantic Enrichment and Hashing
IEEE 2016-2017 NETWORKING PROJECT TITLES
A Stable Approach for Routing Queries in Unstructured P2P Networks
iPath: Path Inference in Wireless Sensor Networks
Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks
Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks
STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
IEEE 2016-2017 MOBILE COMPUTING PROJECT TITLES
Energy and Memory Efficient Clone Detection in Wireless Sensor Networks
EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data
Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach
Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach
IEEE 2016-2017 PARALLEL AND DISTRIBUTED SYSTEMS PROJECT TITLES
A Hop-by-Hop Routing Mechanism for Green Internet
Continuous Answering Holistic Queries over Sensor Networks
Dictionary Based Secure Provenance Compression for Wireless Sensor Networks
The Server Provisioning Problem for Continuous Distributed Interactive Applications
IEEE 2016-2017 SECURE COMPUTING PROJECT TITLES
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
Data Lineage in Malicious Environments
Detecting Malicious Facebook Applications
FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata
Resolving Multi-party Privacy Conflicts in Social Media

IEEE 2016-2017 INFORMATION FORENSICS AND SECURITY PROJECT TITLES
Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions
Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data
Privacy-Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms
Profiling Online Social Behaviors for Compromised Account Detection
IEEE 2016-2017 IMAGE PROCESSING PROJECT TITLES
A Locality Sensitive Low-Rank Model for Image Tag Completion
A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks
Learning of Multimodal Representations with Random Walks on the Click Graph
Online Multi-Modal Distance Metric Learning with Application to Image Retrieval
Tag Based Image Search by Social Re-ranking
IEEE 2016-2017 MULTIMEDIA PROJECT TITLES
Social Friend Recommendation Based on Multiple Network Correlation
User-Service Rating Prediction by Exploring Social Users’ Rating Behaviors

IEEE 2016-2017 SOFTWARE ENGINEERING PROJECT TITLES
Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine-Grained Benchmark, and Feature Evaluation
Metamorphic Testing for Software Quality Assessment: A Study of Search Engines
SITAR: GUI Test Script Repair
IEEE 2016-2017 FUZZY SYSTEMS PROJECT TITLES
Answering Approximate Queries over XML Data

2015-2016 IEEE JAVA PROJECT TITLES:
2015 – 16 IEEE CLOUD COMPUTING PROJECT TITLES:
JPJ1501 - A Hybrid Cloud Approach for Secure Authorized Deduplication
JPJ1502 - A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
JPJ1503 - A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems
JPJ1504 - A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
JPJ1505 - A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
JPJ1506 - An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration
JPJ1507 - Audit-Free Cloud Storage via Deniable Attribute-based Encryption
JPJ1508 - Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
JPJ1509 - CloudArmor: Supporting Reputation-based Trust Management for Cloud Services
JPJ1510 - Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption
JPJ1511 - Enabling Cloud Storage Auditing With Key-Exposure Resistance
JPJ1512 - Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
JPJ1513 - Identity-Based Encryption with Outsourced Revocation in Cloud Computing
JPJ1514 - Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage
JPJ1515 - Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
JPJ1516 - Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
JPJ1517 - Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
JPJ1518 - Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
JPJ1519 - Secure Auditing and Deduplicating Data in Cloud
JPJ1520 - Stealthy Denial of Service Strategy in Cloud Computing

2015 -16 IEEE DATA MINING PROJECT TITLES
JPJ1521 - Best Keyword Cover Search
JPJ1522 - Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model
JPJ1523 - Context-Based Diversification for Keyword Queries over XML Data
JPJ1524 - Discovery of Ranking Fraud for Mobile Apps
JPJ1525 - Malware Propagation in Large-Scale Networks
JPJ1526 - On Summarization and Timeline Generation for Evolutionary Tweet Streams
JPJ1527 - Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
JPJ1528 - Progressive Duplicate Detection
JPJ1529 - Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection
JPJ1530 - Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services
JPJ1531 - Scalable Constrained Spectral Clustering
JPJ1532 - Towards Effective Bug Triage with Software Data Reduction Techniques
JPJ1533 - Tweet Segmentation and Its Application to Named Entity Recognition

2015- 16 IEEE NETWORKING PROJECT TITLES
JPJ1534 - A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks
JPJ1535 - A Proximity-Aware Interest-Clustered P2P File Sharing System
JPJ1536 - Detecting Malicious Facebook Applications
JPJ1537 - Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing

2015- 16 IEEE MOBILE COMPUTING PROJECT TITLES
JPJ1538 - Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks
JPJ1539 - Friendbook: A Semantic-Based Friend Recommendation System for Social Networks
JPJ1540 - Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks
JPJ1541 - User-Defined Privacy Grid System for Continuous Location-Based Services

2015 – 16 IEEE SECURE COMPUTING PROJECT TITLES
JPJ1542 - A Computational Dynamic Trust Model for User Authorization
JPJ1543 - A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks
JPJ1544 - Continuous and Transparent User Identity Verification for Secure Internet Services
JPJ1545 - Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
JPJ1546 - DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks
JPJ1547 - Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints
JPJ1548 - Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks
JPJ1549 - Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers

2015 – 16 IEEE PARALLEL AND DISTRIBUTED SYSTEMS PROJECT TITLES
JPJ1550 - Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks
JPJ1551 - Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
JPJ1552 - Secure Distributed Deduplication Systems with Improved Reliability

2015- 16 IEEE INFORMATION FORENSICS AND SECURITY PROJECT TITLES
JPJ1553 - A Framework for Secure Computations with Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations
JPJ1554 - Effective Key Management in Dynamic Wireless Sensor Networks
JPJ1555 - Key Updating for Leakage Resiliency with Application to AES Modes of Operation
JPJ1556 - Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backscatter
JPJ1557 - Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks

2015 – 16 IEEE IMAGE PROCESSING PROJECT TITLES
JPJ1558 - An Attribute-Assisted Reranking Model for Web Image Search
JPJ1559 - EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
JPJ1560 - Learning to Rank Image Tags With Limited Training Examples


2015- 16 IEEE SERVICE COMPUTING (WEBS SERVICE) PROJECT TITLES
JPJ1561 - Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
JPJ1562 - Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
2015 – 16 IEEE FUZZY SYSTEMS PROJECT TITLES
JPJ1563 - A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to-Business E-Services