2 |
A Trust Based Agent Learning Model for Service Composition in Mobile Cloud Computing |
CLOUD COMPUTING |
2019 |
Download |
Download |
Download |
3 |
Dynamic Multi Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data |
CLOUD COMPUTING |
2019 |
Download |
Download |
Download |
4 |
Hidden Ciphertext Policy Attribute Based Encryption With Fast Decryption for Personal Health Record System |
CLOUD COMPUTING |
2019 |
Download |
Download |
Download |
5 |
Privacy aware Personal Data Storage PPDS Learning how to Protect User Privacy from Applications |
DATA MINING |
2019 |
Download |
Download |
Download |
6 |
Verifiable and Multi Keyword Searchable Attribute Based Encryption Scheme for Cloud Storage |
CLOUD COMPUTING |
2019 |
Download |
Download |
Download |
7 |
Social Network Rumor Diffusion Predication Based on Equal Responsibility Game Model |
Social Networking |
2019 |
Download |
Download |
Download |
8 |
NASM Nonlinearly Attentive Similarity Model for Recommendation System via Locally Attentive Embedding |
Neural Network |
2019 |
Download |
Download |
Download |
9 |
Clustering Based Collaborative Filtering Using an Incentivized Penalized User Model |
DATA MINING |
2019 |
Download |
Download |
Download |
10 |
DCCR Deep Collaborative Conjunctive Recommender for Rating Prediction |
DATA MINING |
2019 |
Download |
Download |
Download |
11 |
Mining Users Trust From E Commerce Reviews Based on Sentiment Similarity Analysis |
DATA MINING |
2019 |
Download |
Download |
Download |
12 |
A Hierarchical Attention Model for Social Contextual Image Recommendation |
Social Networking |
2019 |
Download |
Download |
Download |
13 |
CryptDAC Cryptographically Enforced Dynamic Access Control in the Cloud |
CLOUD COMPUTING |
2019 |
Download |
Download |
Download |
14 |
Filtering Instagram hashtags through crowdtagging and the HITS algorithm |
CLOUD COMPUTING |
2019 |
Download |
Download |
Download |
15 |
Credibility Evaluation of Twitter Based Event Detection by a Mixing Analysis of Heterogeneous Data |
DATA MINING |
2019 |
Download |
Download |
Download |
16 |
Online Public Shaming on Twitter Detection, Analysis and Mitigation |
SOCIAL SYSTEMS |
2019 |
Download |
Download |
Download |
17 |
Detecting Malicious Social Bots Based on Clickstream Sequences |
Machine learning |
2019 |
Download |
Download |
Download |
18 |
Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Learning Algorithms Review of Literature and Open Challenges |
MACHINE LEARNING |
2019 |
Download |
Download |
Download |
19 |
PersoNet Friend Recommendation System Based on Big Five Personality Traits and Hybrid Filtering |
SOCIAL SYSTEMS |
2019 |
Download |
Download |
Download |
20 |
Ant Colony Stream Clustering A Fast Density Clustering Algorithm For Dynamic Data Streams |
BIG DATA |
2019 |
Download |
Download |
Download |
21 |
A Hybrid E-learning Recommendation Approach Based on Learners' Influence Propagation |
DATA MINING |
2019 |
Download |
Download |
Download |
22 |
Spammer Detection and Fake User Identification on Social Networks |
MACHINE LEARNING |
2019 |
Download |
Download |
Download |
23 |
Retrieving Hidden Friends A Collusion Privacy Attack Against Online Friend Search Engine |
Information Forensics and Analysis |
2019 |
Download |
Download |
Download |
24 |
Authentication by Encrypted Negative Password |
Information Forensics and Analysis |
2019 |
Download |
Download |
Download |
25 |
Active Online Learning for Social Media Analysis to Support Crisis Management |
Data Mining |
2019 |
Download |
Download |
Download |
26 |
Data Integrity Auditing without Private Key Storage for Secure Cloud Storage |
CLOUD COMPUTING |
2019 |
Download |
Download |
Download |
27 |
A Practical Attribute Based Document Collection Hierarchical Encryption Scheme in Cloud Computing |
CLOUD COMPUTING |
2019 |
Download |
Download |
Download |
28 |
Trust Relationship Prediction in Alibaba E Commerce Platform |
Data Mining |
2019 |
Download |
Download |
Download |
29 |
Finding Optimal Skyline Product Combinations under Price Promotion |
Data Mining |
2019 |
Download |
Download |
Download |
30 |
Secure and Efficient Skyline Queries on Encrypted Data |
Data Mining |
2019 |
Download |
Download |
Download |
31 |
Automated Decision Making in Airport Checkpoints Bias Detection Toward Smarter Security and Fairness |
ML & AI |
2019 |
Download |
Download |
Download |
32 |
Detecting Pickpocket Suspects from Large Scale Public Transit Records |
Data Mining |
2019 |
Download |
Download |
Download |
33 |
Secure Channel Free Certificate Based Searchable Encryption Withstanding Outside and Inside Keyword |
Secure Computing |
2019 |
Download |
Download |
Download |
34 |
A Fuzzy Approach to Text Classification with Two Stage Training for Ambiguous Instances Disability |
Data Mining |
2019 |
Download |
Download |
Download |
35 |
KeyD: Secure Key-Deduplication with Identity-Based Broadcast
Encryption ANALYSIS |
Cloud Computing |
2019 |
Download |
Download |
Download |
36 |
Secure Data Group Sharing and Conditional Dissemination with Multi Owner in Cloud Computing |
MACHINE LEARNING |
2019 |
Download |
Download |
Download |
37 |
Who You Should Not Follow Extracting Word Embeddings from Tweets to Identify Groups of Interest |
MACHINE LEARNING |
2019 |
Download |
Download |
38 |
Enabling Efficient and Geometric Range Query with Access Control over Encrypted Spatial Data |
Information Forensics and Security |
2019 |
Download |
Download |
Download |
39 |
Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud Based IoT |
|
2019 |
Download |
Download |
Download |
40 |
Privacy Preserving Searchable Encryption with Fine grained Access Control |
Cloud Computing |
2019 |
Download |
Download |
Download |
41 |
Hybrid Keyword Field Search with Efficient Key Management for Industrial Internet of Things |
IOT |
2019 |
Download |
Download |
Download |
42 |
Enhancing Performance and Energy Efficiency for Hybrid Workloads in Virtualized Cloud Environment |
Cloud Computing |
2019 |
Download |
Download |
Download |
43 |
Aggregation-Based Colocation Datacenter Energy Management in Wholesale Markets |
Cloud Computing |
2019 |
Download |
Download |
Download |
44 |
Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing |
Cloud Computing |
2019 |
Download |
Download |
Download |
45 |
A Distributed Trust Evaluation Protocol with Privacy Protection
for Intercloud
|
Cloud Computing |
2019 |
Download |
Download |
Download |
46 |
A Secure G-Cloud-Based Framework for Government Healthcare Services |
Cloud Computing |
2019 |
Download |
Download |
Download |
47 |
A Modified Hierarchical Attribute-Based Encryption Access
Control Method For Mobile Cloud Computing
|
Cloud Computing |
2019 |
Download |
Download |
Download |
48 |
A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage Services |
Cloud Computing |
2019 |
Download |
Download |
Download |
49 |
Hybrid Keyword-Field Search with Efficient Key Management for Industrial Internet of Things |
Cloud Computing |
2019 |
Download |
Download |
Download |
50 |
An Attribute-based Controlled Collaborative Access Control Scheme for Public Cloud Storage |
Cloud Computing |
2019 |
Download |
Download |
Download |