Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

CLOUD COMPUTING

1 A Flexible Privacy-Preserving Data Sharing Scheme in Cloud-assisted IoT

Authentication and Key Agreement Based on Anonymous Identity for Peer-


2
to-Peer Cloud
3 Dual Access Control for Cloud-Based Data Storage and Sharing
Fast Secure and Anonymous Key Agreement against Bad Randomness for
4
Cloud Computing
Fine-grained Query Authorization with Integrity Verification over
5
Encrypted Spatial Data in Cloud Storage
Joint Pricing and Security Investment in Cloud Security Service Market
6
with User Interdependency
Large-Universe Attribute-Based Encryption with Public Traceability for
7
Cloud Storage
Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-
8
Fog Computing
Multi-Replica and Multi-Cloud Data Public Audit Scheme Based on
9
Blockchain
Proactive Fault-Tolerance Technique to Enhance Reliability of Cloud
10
Service in Cloud Federation Environment
Transferable Knowledge for Low-cost Decision Making in Cloud
11 Environments
NETWORK SECURITY
12 Adaptive Secure Nearest Neighbor Query Processing over Encrypted Data
BD-VTE: A Novel Baseline Data based Verifiable Trust Evaluation Scheme
13
for Smart Network Systems

14 Privacy and Security Management in Intelligent Transportation System

15 Privacy-Preserving Federated Learning in Fog Computing


Privacy-Preserving Multidimensional Data Aggregation Scheme without
16
Trusted Authority in Smart Grid
Privacy-Preserving Sub graph Matching Scheme with Authentication in
17
Social Networks
Similarity-based and Sybil Attack Defended Community Detection for
18
Social Networks.
Social Recruiter: Dynamic Incentive Mechanism for Mobile Crowdsourcing
19
Worker Recruitment with Social Networks
DATA MINING
Academic Performance Prediction Based on Multisource, Multifeature
20
Behavioral Data
Answer Keyword Generation for Community Question Answering by
21
Multi-aspect Gamma-Poisson Matrix Completion
Cloud Intrusion Detection Method Based on Stacked Contractive Auto-
22
Encoder and Support Vector Machine
CorrAUC: a Malicious Bot-IoT Traffic Detection Method in IoT Network
23
Using Machine Learning Techniques
Examining Successful Attributes for Undergraduate Students by Applying
24
Machine Learning Techniques
Karst: Transactional Data Ingestion without Blocking on a Scalable
25
Architecture

26 Learning Student Networks via Feature Embedding

27 Online Pricing with Reserve Price Constraint for Personal Data Markets

Understanding Citizens’ Emotional Pulse in a Smart City using Artificial


28
Intelligence
WR-ELM: Weighted Regularization Extreme Learning Machine for
29
Imbalance Learning in Software Fault Prediction
MOBILE COMPUTING
Ad Sherlock: Efficient and Deployable Click Fraud Detection for Mobile
30
Applications
Mobile Semantic-aware Trajectory for Personalized Location Privacy
31
Preservation
Exploiting Multi-Dimensional Task Diversity in Distributed Auctions for
32
Mobile Crowd sensing
Fine-Grained User Profiling for Personalized Task Matching in Mobile
33
Crowd sensing
iTAM: Bilateral Privacy-Preserving Task Assignment for Mobile Crowd
34
sensing
MACHINE LEARNING
Cloud Intrusion Detection Method Based on Stacked Contractive Auto-
35
Encoder and Support Vector Machine
CorrAUC: a Malicious Bot-IoT Traffic Detection Method in IoT Network
36
Using Machine Learning Techniques
Examining Successful Attributes for Undergraduate Students by Applying
37
Machine Learning Techniques
Understanding Citizens’ Emotional Pulse in a Smart City using Artificial
38
Intelligence
WR-ELM: Weighted Regularization Extreme Learning Machine for
39
Imbalance Learning in Software Fault Prediction
40 DOF: A Demand-oriented Framework for Image Denoising
Facial Expression Recognition with Two-branch Disentangled Generative
41
Adversarial Network
DATA SCIENCE
42 Rain Prediction
43 Movie Recommendations
44 Sentimental analysis of Twitter and Amazon products
45 Uber user data analysis
46 Credit card fraud detection
47 Covid -19 data analysis
48 Fake News Detection
49 Stock prediction
50 Personality Prediction
51 Sports match video to text summarization using neural network
52 Image regeneration for old damaged reel picture
53 Music generation using deep learning
54 Image caption Generator
55 Recommeding system
NATURAL LANGUAGE PROCESSING
A deep learning approach to integrate convolutional neural networks in
56
speaker recognition
57 Voice to text
58 PDF to voice
59 chat Bot
60 Business meeting summary generation using NLP
61 Music classification
62 Search Autocorrect and Autocomplete
63 Language Translator
64 Grammer checker
65 Email filtering
66 Hiring and Recirment process
67 Survey Analysis
68 Target advertising
69 Social Meida Mointering (Twitter -> Products and movie review)
70 Next word Prediction

You might also like