S.No | Project Title | Domain | Year | Abstract | Basepaper |
---|---|---|---|---|---|
1 | A Verifiable Semantic Searching Scheme by Optimal Matching over Encrypted Data in Public Cloud | Cloud Computing | 2020 | Download | Download |
2 | Achieving Practical Symmetric Searchable Encryption with Search Pattern Privacy over Cloud | Cloud Computing | 2020 | Download | Download |
3 | Authentication and Key Agreement Based on Anonymous Identity for Peer-to-Peer Cloud | Cloud Computing | 2020 | Download | Download |
4 | CloudRaid Detecting Distributed Concurrency Bugs via Log-Mining and Enhancement | Cloud Computing | 2020 | Download | Download |
5 | Authentication and Key Agreement Based on Anonymous Identity for Peer-to-Peer Cloud | Cloud Computing | 2020 | Download | Download |
6 | Designing Secure and Efficient Biometric-Based Secure Access Mechanism for Cloud Services | Cloud Computing | 2020 | Download | Download |
7 | Lightweight Privacy-preserving Medical Diagnosis in Edge Computing | Machine Learning | 2020 | Download | Download |
8 | Active Learning From Imbalanced Data: A Solution Of Online Weighted Extreme | Machine Learning | 2020 | Download | Download |
9 | Spammer Identification In Social Networks Based On Gaussian Mixture Model | Machine Learning | 2020 | Download | Download |
10 | Phylogenetic Tree Construction Of Biological Datasets Of Cyclooxygenase (COX-1) And (COX-2) By Using Cluster Analysis Based On Experimental Values | Machine Learning | 2020 | Download | Download |
11 | Android Malware Detection Using Genetic Algorithm Based Optimized Feature Selection And Machine Learning | Machine Learning | 2020 | Download | Download |
12 | Predicting Cyberbullying On Social Media In The Big Data Era Using Machine Learning Algorithms: Review Of Literature And Open Challenges | Machine Learning | 2020 | Download | Download |
13 | Classifying Fake News Articles Using Natural Language Processing To Identify In-Article Attribution As A Supervised Learning Estimator | Machine Learning | 2020 | Download | Download |
14 | Ground Water Modelling | Machine Learning | 2020 | Download | Download |
15 | Abnormality Feature Extraction In The Spinal Cord MRI Using K-Means Clustering | Machine Learning | 2020 | Download | Download |
16 | Prediction Of Quality For Different Type Of Wine Based On Different Feature Sets Using Supervised Machine Learning Techniques | Machine Learning | 2020 | Download | Download |
17 | Cognitive Agent System To Retrieve Relevant Code Components From A Repository | Machine Learning | 2020 | Download | Download |
18 | A Machine Learning Model For Average Fuel Consumption In Heavy Vehicles | Machine Learning | 2020 | Download | Download |
19 | Opinion Dynamics-Based Group Recommender Systems | Machine Learning | 2020 | Download | Download |
20 | Twitter Sentiment Analysis Based On Ordinal Regression | Machine Learning | 2020 | Download | Download |
21 | Software Defect Estimation Using Machine Learning Algorithms | Machine Learning | 2020 | Download | Download |
22 | Measuring Accuracy Of KNN Using Different Distance Calculation Methods | Machine Learning | 2020 | Download | Download |
23 | Analysis Of Interactive Mechanism Using Random Forest | Machine Learning | 2020 | Download | Download |
24 | A Decision Tree Based Recommendation System For Tourists | Machine Learning | 2020 | Download | Download |
25 | MULTI-CLASS MULTI-TAG Classifier System For Stack Overflow Quesitions | Machine Learning | 2020 | Download | Download |
26 | A Novel Adaptive Resource Allocation Model Based On SMDP And Reinforcement Learning Alirorithms In Vehicular Cloud Systems | Machine Learning | 2020 | Download | Download |
27 | Significant Permission Identification For Android Malware Detection | Machine Learning | 2020 | Download | Download |
28 | Multi-Tasks Discovery Method Based On The Concept Network For AI USING PYTHON | Machine Learning | 2020 | Download | Download |
29 | Fake Account Detection Using Machine Learning And Data Science | Machine Learning | 2020 | Download | Download |
30 | Improved Predection Of Post-Operative Life Expectancy After Thoracic Surgey | Machine Learning | 2020 | Download | Download |
31 | Identification And Classification For Special Attention Students Using Deep Learning | Machine Learning | 2020 | Download | Download |
32 | Opining Mining For Feedback Management System | Machine Learning | 2020 | Download | Download |
33 | Predective Model Ling And Analytics For Diabetes Using Machine Learning Approach | Machine Learning | 2020 | Download | Download |
34 | Diabetic Retinopathy Identification Using Eye Fundus Images | Machine Learning | 2020 | Download | Download |
35 | Underwater Sonar Signals Recognition By Incremental Data Stream Mining With Conflit Analysis | Machine Learning | 2020 | Download | Download |
36 | #Ml#Nlp : Autonomous Tagging Of Stack Overflow Questions | Machine Learning | 2020 | Download | Download |
37 | Predict Influencers In The Social Network Detection System | Machine Learning | 2020 | Download | Download |
38 | Hybrid Feature Selection Using Correlation Coefficient And Particle Swarm Optimization On Microarray Gene Expression Data | Machine Learning | 2020 | Download | Download |
39 | Crime Prediction And Analysis Using Machine Learning | Machine Learning | 2020 | Download | Download |
40 | A Machine Learning Framework For Biometric Authentication Using Electrocardiogram | Machine Learning | 2020 | Download | Download |
41 | Plagiarism Detection Process Using AI USING PYTHON Techniques | Machine Learning | 2020 | Download | Download |
42 | Fake Product Review Monitoring And Removal For Genuine Online Product Reviews Using Opinion Mining | Machine Learning | 2020 | Download | Download |
43 | A Nonlinear Regression Application Via Machine Learning Techniques For Geomagnetic Data Reconstruction Processing | Machine Learning | 2020 | Download | Download |
44 | Detecting At-Risk Students With Early Interventions Using Machine Learning Techniques | Machine Learning | 2020 | Download | Download |
45 | A Machine Learning Based Approach For Detection Of AlzheimerS Disease Using Analysis Of Hippocampus Region From MRI Scan | Machine Learning | 2020 | Download | Download |
46 | Machine Learning For Plant Leaf Disease Detection And Classification | Machine Learning | 2020 | Download | Download |
47 | Driver Drowsiness Monitoring System Using Visual Behaviour And Machine Learning | Machine Learning | 2020 | Download | Download |
48 | Performance Analysis Of Machine Learning Techniques To Predict Diabetes | Machine Learning | 2020 | Download | Download |
49 | Implementation Of Deep Learning Alg Orithm With Perceptron Using Tenzor Flow Library | Machine Learning | 2020 | Download | Download |
50 | Machine Learning Assessment For Severity Of Liver Fibrosis For Chronic HBV Based On Physical-Layer With Serum Markers | Machine Learning | 2020 | Download | Download |
51 | Stock Market Predection Using Knn | Machine Learning | 2020 | Download | Download |
S.No | Project Title | Domain | Year | Abstract | Basepaper | Video |
---|---|---|---|---|---|---|
1 | Network Representation Learning Enhanced Recommendation Algorithm | Data Mining | 2019 | Download | Download | Download |
2 | A Trust Based Agent Learning Model for Service Composition in Mobile Cloud Computing | CLOUD COMPUTING | 2019 | Download | Download | Download |
3 | Dynamic Multi Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data | CLOUD COMPUTING | 2019 | Download | Download | Download |
4 | Hidden Ciphertext Policy Attribute Based Encryption With Fast Decryption for Personal Health Record System | CLOUD COMPUTING | 2019 | Download | Download | Download |
5 | Privacy aware Personal Data Storage PPDS Learning how to Protect User Privacy from Applications | DATA MINING | 2019 | Download | Download | Download |
6 | Verifiable and Multi Keyword Searchable Attribute Based Encryption Scheme for Cloud Storage | CLOUD COMPUTING | 2019 | Download | Download | Download |
7 | Social Network Rumor Diffusion Predication Based on Equal Responsibility Game Model | Social Networking | 2019 | Download | Download | Download |
8 | NASM Nonlinearly Attentive Similarity Model for Recommendation System via Locally Attentive Embedding | Neural Network | 2019 | Download | Download | Download |
9 | Clustering Based Collaborative Filtering Using an Incentivized Penalized User Model | DATA MINING | 2019 | Download | Download | Download |
10 | DCCR Deep Collaborative Conjunctive Recommender for Rating Prediction | DATA MINING | 2019 | Download | Download | Download |
11 | Mining Users Trust From E Commerce Reviews Based on Sentiment Similarity Analysis | DATA MINING | 2019 | Download | Download | Download |
12 | A Hierarchical Attention Model for Social Contextual Image Recommendation | Social Networking | 2019 | Download | Download | Download |
13 | CryptDAC Cryptographically Enforced Dynamic Access Control in the Cloud | CLOUD COMPUTING | 2019 | Download | Download | Download |
14 | Filtering Instagram hashtags through crowdtagging and the HITS algorithm | CLOUD COMPUTING | 2019 | Download | Download | Download |
15 | Credibility Evaluation of Twitter Based Event Detection by a Mixing Analysis of Heterogeneous Data | DATA MINING | 2019 | Download | Download | Download |
16 | Online Public Shaming on Twitter Detection, Analysis and Mitigation | SOCIAL SYSTEMS | 2019 | Download | Download | Download |
17 | Detecting Malicious Social Bots Based on Clickstream Sequences | Machine learning | 2019 | Download | Download | Download |
18 | Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Learning Algorithms Review of Literature and Open Challenges | MACHINE LEARNING | 2019 | Download | Download | Download |
19 | PersoNet Friend Recommendation System Based on Big Five Personality Traits and Hybrid Filtering | SOCIAL SYSTEMS | 2019 | Download | Download | Download |
20 | Ant Colony Stream Clustering A Fast Density Clustering Algorithm For Dynamic Data Streams | BIG DATA | 2019 | Download | Download | Download |
21 | A Hybrid E-learning Recommendation Approach Based on Learners' Influence Propagation | DATA MINING | 2019 | Download | Download | Download |
22 | Spammer Detection and Fake User Identification on Social Networks | MACHINE LEARNING | 2019 | Download | Download | Download |
23 | Retrieving Hidden Friends A Collusion Privacy Attack Against Online Friend Search Engine | Information Forensics and Analysis | 2019 | Download | Download | Download |
24 | Authentication by Encrypted Negative Password | Information Forensics and Analysis | 2019 | Download | Download | Download |
25 | Active Online Learning for Social Media Analysis to Support Crisis Management | Data Mining | 2019 | Download | Download | Download |
26 | Data Integrity Auditing without Private Key Storage for Secure Cloud Storage | CLOUD COMPUTING | 2019 | Download | Download | Download |
27 | A Practical Attribute Based Document Collection Hierarchical Encryption Scheme in Cloud Computing | CLOUD COMPUTING | 2019 | Download | Download | Download |
28 | Trust Relationship Prediction in Alibaba E Commerce Platform | Data Mining | 2019 | Download | Download | Download |
29 | Finding Optimal Skyline Product Combinations under Price Promotion | Data Mining | 2019 | Download | Download | Download |
30 | Secure and Efficient Skyline Queries on Encrypted Data | Data Mining | 2019 | Download | Download | Download |
31 | Automated Decision Making in Airport Checkpoints Bias Detection Toward Smarter Security and Fairness | ML & AI | 2019 | Download | Download | Download |
32 | Detecting Pickpocket Suspects from Large Scale Public Transit Records | Data Mining | 2019 | Download | Download | Download |
33 | Secure Channel Free Certificate Based Searchable Encryption Withstanding Outside and Inside Keyword | Secure Computing | 2019 | Download | Download | Download |
34 | A Fuzzy Approach to Text Classification with Two Stage Training for Ambiguous Instances Disability | Data Mining | 2019 | Download | Download | Download |
35 | KeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption ANALYSIS | Cloud Computing | 2019 | Download | Download | Download |
36 | Secure Data Group Sharing and Conditional Dissemination with Multi Owner in Cloud Computing | MACHINE LEARNING | 2019 | Download | Download | Download |
37 | Who You Should Not Follow Extracting Word Embeddings from Tweets to Identify Groups of Interest | MACHINE LEARNING | 2019 | Download | Download | |
38 | Enabling Efficient and Geometric Range Query with Access Control over Encrypted Spatial Data | Information Forensics and Security | 2019 | Download | Download | Download |
39 | Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud Based IoT | 2019 | Download | Download | Download | |
40 | Privacy Preserving Searchable Encryption with Fine grained Access Control | Cloud Computing | 2019 | Download | Download | Download |
41 | Hybrid Keyword Field Search with Efficient Key Management for Industrial Internet of Things | IOT | 2019 | Download | Download | Download |
42 | Enhancing Performance and Energy Efficiency for Hybrid Workloads in Virtualized Cloud Environment | Cloud Computing | 2019 | Download | Download | Download |
43 | Aggregation-Based Colocation Datacenter Energy Management in Wholesale Markets | Cloud Computing | 2019 | Download | Download | Download |
44 | Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing | Cloud Computing | 2019 | Download | Download | Download |
45 | A Distributed Trust Evaluation Protocol with Privacy Protection for Intercloud | Cloud Computing | 2019 | Download | Download | Download |
46 | A Secure G-Cloud-Based Framework for Government Healthcare Services | Cloud Computing | 2019 | Download | Download | Download |
47 | A Modified Hierarchical Attribute-Based Encryption Access Control Method For Mobile Cloud Computing | Cloud Computing | 2019 | Download | Download | Download |
48 | A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage Services | Cloud Computing | 2019 | Download | Download | Download |
49 | Hybrid Keyword-Field Search with Efficient Key Management for Industrial Internet of Things | Cloud Computing | 2019 | Download | Download | Download |
50 | An Attribute-based Controlled Collaborative Access Control Scheme for Public Cloud Storage | Cloud Computing | 2019 | Download | Download | Download |