This document discusses various topics related to cloud computing, network security, data mining, mobile computing, machine learning, data science, and natural language processing. Specifically, it provides 70 entries on topics such as privacy-preserving data sharing in cloud-assisted IoT, key agreement for peer-to-peer cloud, data auditing schemes for multi-cloud storage, intrusion detection methods using machine learning, mobile crowdsensing applications, predictive analytics techniques, natural language tasks like translation and summarization, and more. The entries cover recent research that applies techniques from different fields to solve computing and analytics problems.
This document discusses various topics related to cloud computing, network security, data mining, mobile computing, machine learning, data science, and natural language processing. Specifically, it provides 70 entries on topics such as privacy-preserving data sharing in cloud-assisted IoT, key agreement for peer-to-peer cloud, data auditing schemes for multi-cloud storage, intrusion detection methods using machine learning, mobile crowdsensing applications, predictive analytics techniques, natural language tasks like translation and summarization, and more. The entries cover recent research that applies techniques from different fields to solve computing and analytics problems.
This document discusses various topics related to cloud computing, network security, data mining, mobile computing, machine learning, data science, and natural language processing. Specifically, it provides 70 entries on topics such as privacy-preserving data sharing in cloud-assisted IoT, key agreement for peer-to-peer cloud, data auditing schemes for multi-cloud storage, intrusion detection methods using machine learning, mobile crowdsensing applications, predictive analytics techniques, natural language tasks like translation and summarization, and more. The entries cover recent research that applies techniques from different fields to solve computing and analytics problems.
1 A Flexible Privacy-Preserving Data Sharing Scheme in Cloud-assisted IoT
Authentication and Key Agreement Based on Anonymous Identity for Peer-
2 to-Peer Cloud 3 Dual Access Control for Cloud-Based Data Storage and Sharing Fast Secure and Anonymous Key Agreement against Bad Randomness for 4 Cloud Computing Fine-grained Query Authorization with Integrity Verification over 5 Encrypted Spatial Data in Cloud Storage Joint Pricing and Security Investment in Cloud Security Service Market 6 with User Interdependency Large-Universe Attribute-Based Encryption with Public Traceability for 7 Cloud Storage Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud- 8 Fog Computing Multi-Replica and Multi-Cloud Data Public Audit Scheme Based on 9 Blockchain Proactive Fault-Tolerance Technique to Enhance Reliability of Cloud 10 Service in Cloud Federation Environment Transferable Knowledge for Low-cost Decision Making in Cloud 11 Environments NETWORK SECURITY 12 Adaptive Secure Nearest Neighbor Query Processing over Encrypted Data BD-VTE: A Novel Baseline Data based Verifiable Trust Evaluation Scheme 13 for Smart Network Systems
14 Privacy and Security Management in Intelligent Transportation System
15 Privacy-Preserving Federated Learning in Fog Computing
Privacy-Preserving Multidimensional Data Aggregation Scheme without 16 Trusted Authority in Smart Grid Privacy-Preserving Sub graph Matching Scheme with Authentication in 17 Social Networks Similarity-based and Sybil Attack Defended Community Detection for 18 Social Networks. Social Recruiter: Dynamic Incentive Mechanism for Mobile Crowdsourcing 19 Worker Recruitment with Social Networks DATA MINING Academic Performance Prediction Based on Multisource, Multifeature 20 Behavioral Data Answer Keyword Generation for Community Question Answering by 21 Multi-aspect Gamma-Poisson Matrix Completion Cloud Intrusion Detection Method Based on Stacked Contractive Auto- 22 Encoder and Support Vector Machine CorrAUC: a Malicious Bot-IoT Traffic Detection Method in IoT Network 23 Using Machine Learning Techniques Examining Successful Attributes for Undergraduate Students by Applying 24 Machine Learning Techniques Karst: Transactional Data Ingestion without Blocking on a Scalable 25 Architecture
26 Learning Student Networks via Feature Embedding
27 Online Pricing with Reserve Price Constraint for Personal Data Markets
Understanding Citizens’ Emotional Pulse in a Smart City using Artificial
28 Intelligence WR-ELM: Weighted Regularization Extreme Learning Machine for 29 Imbalance Learning in Software Fault Prediction MOBILE COMPUTING Ad Sherlock: Efficient and Deployable Click Fraud Detection for Mobile 30 Applications Mobile Semantic-aware Trajectory for Personalized Location Privacy 31 Preservation Exploiting Multi-Dimensional Task Diversity in Distributed Auctions for 32 Mobile Crowd sensing Fine-Grained User Profiling for Personalized Task Matching in Mobile 33 Crowd sensing iTAM: Bilateral Privacy-Preserving Task Assignment for Mobile Crowd 34 sensing MACHINE LEARNING Cloud Intrusion Detection Method Based on Stacked Contractive Auto- 35 Encoder and Support Vector Machine CorrAUC: a Malicious Bot-IoT Traffic Detection Method in IoT Network 36 Using Machine Learning Techniques Examining Successful Attributes for Undergraduate Students by Applying 37 Machine Learning Techniques Understanding Citizens’ Emotional Pulse in a Smart City using Artificial 38 Intelligence WR-ELM: Weighted Regularization Extreme Learning Machine for 39 Imbalance Learning in Software Fault Prediction 40 DOF: A Demand-oriented Framework for Image Denoising Facial Expression Recognition with Two-branch Disentangled Generative 41 Adversarial Network DATA SCIENCE 42 Rain Prediction 43 Movie Recommendations 44 Sentimental analysis of Twitter and Amazon products 45 Uber user data analysis 46 Credit card fraud detection 47 Covid -19 data analysis 48 Fake News Detection 49 Stock prediction 50 Personality Prediction 51 Sports match video to text summarization using neural network 52 Image regeneration for old damaged reel picture 53 Music generation using deep learning 54 Image caption Generator 55 Recommeding system NATURAL LANGUAGE PROCESSING A deep learning approach to integrate convolutional neural networks in 56 speaker recognition 57 Voice to text 58 PDF to voice 59 chat Bot 60 Business meeting summary generation using NLP 61 Music classification 62 Search Autocorrect and Autocomplete 63 Language Translator 64 Grammer checker 65 Email filtering 66 Hiring and Recirment process 67 Survey Analysis 68 Target advertising 69 Social Meida Mointering (Twitter -> Products and movie review) 70 Next word Prediction