1 Anonymity-based Privacy-preserving Data Reporting for Participatory Data Mining
Sensing
2 Anonymizing Collections of Tree-Structured Data Data Mining
3 Making Digital Artifacts on the Web Verifiable and Reliable Data Mining
4 Socialite: An Efficient Graph Query Language Based on Data log Data Mining
5 Differentially Private Frequent Item set Mining via Transaction Splitting Data Mining
6 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites Data Mining
7 Structured Learning from Heterogeneous Behavior for Social Identity Data Mining
Linkage
8 k-Nearest Neighbor Classification over Semantically Secure Encrypted Data Mining
Relational Data
9 Efficient Enforcement of Action-Aware Purpose-Based Access Control Data Mining
within Relational Database Management Systems
10 Towards Effective Bug Triage with Software Data Reduction Techniques Data Mining
11
Precision-Bounded Access Control Using Sliding-Window Query Views for
Data Mining
Privacy-Preserving Data Streams
12 Tracking Message Spread in Mobile Delay Tolerant Networks Mobile
Computing
13 ROFF: Robust and Fast Forwarding in Vehicular Ad-Hoc Networks Mobile
Computing
14 Prioritized Optimal Channel Allocation Schemes for Multi-Channel Mobile
Vehicular Networks Computing
15 Minimum Energy Routing and Jamming to Thwart Wireless Network Mobile
Eavesdroppers Computing
16 Restricted Epidemic Routing in Multi-Community Delay Tolerant Networks Mobile
Computing
17 Modeling and Analysis of Communication Traffic Heterogeneity in Mobile
Opportunistic Networks Computing
18
Cost-Effective Authentic and Anonymous Data Sharing with Forward Parallel And
Security Distribution
19 Control Cloud Data Access Privilege and Anonymity With Fully
Parallel And Distribution Anonymous Attribute-Based Encryption
JAVA IEEE 2015
20
Reducing Fragmentation for In-line Deduplication Backup Storage via
Parallel And
Exploiting Backup History and Cache
Distribution
Knowledge
21 Identity-based Encryption with Outsourced Revocation in Cloud Parallel And
Computing Distribution
22
Service Operator-aware Trust Scheme for Resource Matchmaking across Parallel And
Multiple Clouds Distribution
23 Data Lineage in Malicious Environments Secure
Computing
24 T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Secure
Collaborative Services Computing
25 Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Secure
Storage Computing
26 Collusion-Tolerable Privacy-Preserving Sum and Product Calculation Secure
without Secure Channel Computing
27 Vote Trust: Leveraging Friend Invitation Graph to Defend against Social Secure
Network Sybils Computing
28 Social Cloud Computing: an Opportunity for Technology Enhanced Cloud
Competence Based Learning Computing
29
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Cloud
Revocation Computing
30
Performing Initiative Data Prefetching in Distributed File Systems for Cloud
Cloud Computing Computing
31
A Scalable and Reliable Matching Service for Content-Based Cloud
Publish/Subscribe Systems
Computing
32 Provable Multicopy Dynamic Data Possession in Cloud Computing Cloud
Systems Computing
33 Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Cloud
Verifiable Delegation in Cloud Computing Computing
34 Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud
Cloud Storage Computing
35
Public Integrity Auditing for Dynamic Data Sharing with Multi-User Cloud
36 Enabling Cloud Storage Auditing with Key-Exposure Resistance Cloud
Computing
37 Understanding the Performance and Potential of Cloud Computing for Cloud
Scientific Applications Computing
38 Secure Distributed Deduplication Systems with Improved Reliability Cloud
Computing
39 Maximum Entropy-based Thresholding algorithm for Face image Image
segmentation Processing
40 Geolocalized Modeling for Dish Recognition Image
Processing
41 Multiview Alignment Hashing for Efficient Image Search Image
Processing
42 Semantic-Improved Color Imaging Applications: It Is All About Context Image
Processing
43 High-Quality JPEG Compression Through Quantization Noise Analysis Image
Processing
44
Vector Sparse Representation of Color Image Using Quaternion Matrix Image
Analysis Processing
45 Neighborhood Discriminated Hashing for Large-Scale Image Retrieval Image
Processing
46 Single Image Super-Resolution Based on Gradient Profile Sharpness Image
Processing
47 Multi-scale Image Blind Denoising Image
Processing
48 An Approach Toward Fast Gradient-Based Image Segmentation Image
Processing
49 Enhancement of Textural Differences Based on Morphological Component Image
Analysis Processing
50 A Comparison of Dense Region Detectors for Image Search and Fine- Image
Grained Classification Processing
51 Steganography Using Reversible Texture Synthesis Image
Processing
52 EMR: A Scalable Graph-based Ranking Model for Content-based Image Image
Retrieval Processing
53 Saliency-based color accessibility
Image Processing
JAVA IEEE 2015
54 Location-Aware and Personalized Collaborative Filtering for Web Service Services
Recommendation Computing
55 My Privacy My Decision: Control of Photo Sharing on Online Social Services
Networks Computing
56 Smart Crawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Services
Interfaces Computing
57 A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Services
Drop Attacks in Wireless Sensor Networks Computing
58 Guest Editorial: Recommendation Techniques for Services Computing and Services
Cloud Computing Computing
59 Generating Searchable Public-Key Ciphertexts with Hidden Structures for Services
Fast Keyword Search Computing
60 Group Key Agreement with Local Connectivity Services
Computing
61 Towards Operational Cost Minimization in Hybrid Clouds for Dynamic Services
Resource Provisioning with Delay-Aware Optimization Computing
62 Neighborhood Filtering Strategies for Overlay Construction in P2P-TV Networking
Systems: Design and Experimental Comparison
63 EDAL: An Energy-Efficient, Delay-Aware, and Lifetime-Balancing Data Networking
Collection Protocol for Heterogeneous Wireless Sensor Networks
64 The Conservation of Information, Towards an Axiomatized Modular Networking
Modeling Approach to Congestion Control
65 Design and Analysis of Medium Access Protocol: Throughput and Short- Networking
Term Fairness Perspective
Big Data
66 Secure Big Data Storage And Sharing Scheme For Cloud Tenants
67
Hire some-II: Towards Privacy-Aware Cross-Cloud Service Composition For Big Data
Big Data Applications
68
FastRAQ: A Fast Approach to Range-Aggregate Queries in Big Data Big Data
Environments
Big Data
69 Sketch and Validate for Big Data Clustering
70
Big Data
Concurrent Bandwidth Reservation Strategies for Big Data Transfers in
71 i ^2 Map Reduce: Incremental Map Reduce for Mining Evolving Big Data Big Data
72 In-Memory Big Data Management and Processing: A Survey Big Data