IEEE Java Projects
IEEE 2015-16 Computer Science List
Check out the list for technology and domain options.
Cloud Computing IEEE Java - 2015-16
| # | Project Title |
|---|---|
| 1 | A Hybrid Cloud Approach for Secure Authorized Deduplication Location- and Diversity-aware News Feed System for Mobile Users. |
| 2 | A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing |
| 3 | A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems |
| 4 | A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data |
| 5 | A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud |
| 6 | An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration |
| 7 | Audit-Free Cloud Storage via Deniable Attribute-based Encryption |
| 8 | Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing |
| 9 | CloudArmor: Supporting Reputation-based Trust Management for Cloud Services |
| 10 | Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption |
| 11 | Enabling Cloud Storage Auditing With Key-Exposure Resistance |
| 12 | Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data |
| 13 | Identity-Based Encryption with Outsourced Revocation in Cloud Computing |
| 14 | Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage |
| 15 | Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing |
| 16 | Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage |
| 17 | Provable Multicopy Dynamic Data Possession in Cloud Computing Systems |
| 18 | Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation |
| 19 | Secure Auditing and Deduplicating Data in Cloud |
| 20 | Stealthy Denial of Service Strategy in Cloud Computing |
DATA MINING PROJECTS IEEE JAVA 2015-16
| # | Project Title |
|---|---|
| 1 | Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model |
| 2 | Context-Based Diversification for Keyword Queries over XML Data |
| 3 | Best Keyword Cover Search |
| 4 | Discovery of Ranking Fraud for Mobile Apps |
| 5 | Malware Propagation in Large-Scale Networks |
| 6 | On Summarization and Timeline Generation for Evolutionary Tweet Streams |
| 7 | Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites |
| 8 | Progressive Duplicate Detection |
| 9 | Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection |
| 10 | Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services |
| 11 | Scalable Constrained Spectral Clustering |
| 12 | Towards Effective Bug Triage with Software Data Reduction Techniques |
| 13 | Tweet Segmentation and Its Application to Named Entity Recognition |
IEEE MOBILE COMPUTING PROJECTS JAVA 2015-16
| # | Project Title |
|---|---|
| 1 | Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks |
| 2 | Friendbook: A Semantic-Based Friend Recommendation System for Social Networks |
| 3 | Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks |
| 4 | User-Defined Privacy Grid System for Continuous Location-Based Services |
IEEE NETWORKING PROJECTS JAVA 2015-16
| # | Project Title |
|---|---|
| 1 | A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks |
| 2 | A Proximity-Aware Interest-Clustered P2P File Sharing System |
| 3 | Detecting Malicious Facebook Applications |
| 4 | Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing |
SECURE COMPUTING PROJECT IEEE JAVA 2015-16
| # | Project Title |
|---|---|
| 1 | A Computational Dynamic Trust Model for User Authorization |
| 2 | A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks |
| 3 | Continuous and Transparent User Identity Verification for Secure Internet Services |
| 4 | Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts |
| 5 | DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks |
| 6 | Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints |
| 7 | Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks |
| 8 | Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers |
PARALLEL AND DISTRIBUTED SYSTEMS IEEE JAVA 2015-16
| # | Project Title |
|---|---|
| 1 | Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks |
| 2 | Cost-Effective Authentic and Anonymous Data Sharing with Forward Security |
| 3 | Secure Distributed Deduplication Systems with Improved Reliability |
INFORMATION FORENSICS AND SECURITY IEEE JAVA 2015-16
| # | Project Title |
|---|---|
| 1 | A Framework for Secure Computations with Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations |
| 2 | Effective Key Management in Dynamic Wireless Sensor Networks |
| 3 | Key Updating for Leakage Resiliency with Application to AES Modes of Operation |
| 4 | Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backscatter |
| 5 | Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks |
FUZZY SYSTEMS IEEE JAVA 2015-16
| # | Project Title |
|---|---|
| 1 | A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to-Business E-Services |
IMAGE PROCESSING IEEE JAVA 2015-16
| # | Project Title |
|---|---|
| 1 | An Attribute-Assisted Reranking Model for Web Image Search |
| 2 | EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval |
| 3 | Learning to Rank Image Tags With Limited Training Examples |
SERVICE COMPUTING (WEBS SERVICE)IEEE JAVA 2015-16
| # | Project Title |
|---|---|
| 1 | Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System |
| 2 | Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation |