• No results found

JAVA IEEE Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites Data Mining

N/A
N/A
Protected

Academic year: 2021

Share "JAVA IEEE Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites Data Mining"

Copied!
5
0
0

Loading.... (view fulltext now)

Full text

(1)

1 Anonymity-based Privacy-preserving Data Reporting for Participatory Data Mining

Sensing

2 Anonymizing Collections of Tree-Structured Data Data Mining

3 Making Digital Artifacts on the Web Verifiable and Reliable Data Mining

4 Socialite: An Efficient Graph Query Language Based on Data log Data Mining

5 Differentially Private Frequent Item set Mining via Transaction Splitting Data Mining

6 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites Data Mining

7 Structured Learning from Heterogeneous Behavior for Social Identity Data Mining

Linkage

8 k-Nearest Neighbor Classification over Semantically Secure Encrypted Data Mining

Relational Data

9 Efficient Enforcement of Action-Aware Purpose-Based Access Control Data Mining

within Relational Database Management Systems

10 Towards Effective Bug Triage with Software Data Reduction Techniques Data Mining

11

Precision-Bounded Access Control Using Sliding-Window Query Views for

Data Mining

Privacy-Preserving Data Streams

12 Tracking Message Spread in Mobile Delay Tolerant Networks Mobile

Computing

13 ROFF: Robust and Fast Forwarding in Vehicular Ad-Hoc Networks Mobile

Computing

14 Prioritized Optimal Channel Allocation Schemes for Multi-Channel Mobile

Vehicular Networks Computing

15 Minimum Energy Routing and Jamming to Thwart Wireless Network Mobile

Eavesdroppers Computing

16 Restricted Epidemic Routing in Multi-Community Delay Tolerant Networks Mobile

Computing

17 Modeling and Analysis of Communication Traffic Heterogeneity in Mobile

Opportunistic Networks Computing

18

Cost-Effective Authentic and Anonymous Data Sharing with Forward Parallel And

Security Distribution

19 Control Cloud Data Access Privilege and Anonymity With Fully

Parallel And Distribution Anonymous Attribute-Based Encryption

(2)

JAVA IEEE 2015

20

Reducing Fragmentation for In-line Deduplication Backup Storage via

Parallel And

Exploiting Backup History and Cache

Distribution

Knowledge

21 Identity-based Encryption with Outsourced Revocation in Cloud Parallel And

Computing Distribution

22

Service Operator-aware Trust Scheme for Resource Matchmaking across Parallel And

Multiple Clouds Distribution

23 Data Lineage in Malicious Environments Secure

Computing

24 T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Secure

Collaborative Services Computing

25 Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Secure

Storage Computing

26 Collusion-Tolerable Privacy-Preserving Sum and Product Calculation Secure

without Secure Channel Computing

27 Vote Trust: Leveraging Friend Invitation Graph to Defend against Social Secure

Network Sybils Computing

28 Social Cloud Computing: an Opportunity for Technology Enhanced Cloud

Competence Based Learning Computing

29

Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Cloud

Revocation Computing

30

Performing Initiative Data Prefetching in Distributed File Systems for Cloud

Cloud Computing Computing

31

A Scalable and Reliable Matching Service for Content-Based Cloud

Publish/Subscribe Systems

Computing

32 Provable Multicopy Dynamic Data Possession in Cloud Computing Cloud

Systems Computing

33 Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Cloud

Verifiable Delegation in Cloud Computing Computing

34 Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud

Cloud Storage Computing

35

Public Integrity Auditing for Dynamic Data Sharing with Multi-User Cloud

(3)

36 Enabling Cloud Storage Auditing with Key-Exposure Resistance Cloud

Computing

37 Understanding the Performance and Potential of Cloud Computing for Cloud

Scientific Applications Computing

38 Secure Distributed Deduplication Systems with Improved Reliability Cloud

Computing

39 Maximum Entropy-based Thresholding algorithm for Face image Image

segmentation Processing

40 Geolocalized Modeling for Dish Recognition Image

Processing

41 Multiview Alignment Hashing for Efficient Image Search Image

Processing

42 Semantic-Improved Color Imaging Applications: It Is All About Context Image

Processing

43 High-Quality JPEG Compression Through Quantization Noise Analysis Image

Processing

44

Vector Sparse Representation of Color Image Using Quaternion Matrix Image

Analysis Processing

45 Neighborhood Discriminated Hashing for Large-Scale Image Retrieval Image

Processing

46 Single Image Super-Resolution Based on Gradient Profile Sharpness Image

Processing

47 Multi-scale Image Blind Denoising Image

Processing

48 An Approach Toward Fast Gradient-Based Image Segmentation Image

Processing

49 Enhancement of Textural Differences Based on Morphological Component Image

Analysis Processing

50 A Comparison of Dense Region Detectors for Image Search and Fine- Image

Grained Classification Processing

51 Steganography Using Reversible Texture Synthesis Image

Processing

52 EMR: A Scalable Graph-based Ranking Model for Content-based Image Image

Retrieval Processing

53 Saliency-based color accessibility

Image Processing

(4)

JAVA IEEE 2015

54 Location-Aware and Personalized Collaborative Filtering for Web Service Services

Recommendation Computing

55 My Privacy My Decision: Control of Photo Sharing on Online Social Services

Networks Computing

56 Smart Crawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Services

Interfaces Computing

57 A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Services

Drop Attacks in Wireless Sensor Networks Computing

58 Guest Editorial: Recommendation Techniques for Services Computing and Services

Cloud Computing Computing

59 Generating Searchable Public-Key Ciphertexts with Hidden Structures for Services

Fast Keyword Search Computing

60 Group Key Agreement with Local Connectivity Services

Computing

61 Towards Operational Cost Minimization in Hybrid Clouds for Dynamic Services

Resource Provisioning with Delay-Aware Optimization Computing

62 Neighborhood Filtering Strategies for Overlay Construction in P2P-TV Networking

Systems: Design and Experimental Comparison

63 EDAL: An Energy-Efficient, Delay-Aware, and Lifetime-Balancing Data Networking

Collection Protocol for Heterogeneous Wireless Sensor Networks

64 The Conservation of Information, Towards an Axiomatized Modular Networking

Modeling Approach to Congestion Control

65 Design and Analysis of Medium Access Protocol: Throughput and Short- Networking

Term Fairness Perspective

Big Data

66 Secure Big Data Storage And Sharing Scheme For Cloud Tenants

67

Hire some-II: Towards Privacy-Aware Cross-Cloud Service Composition For Big Data

Big Data Applications

68

FastRAQ: A Fast Approach to Range-Aggregate Queries in Big Data Big Data

Environments

Big Data

69 Sketch and Validate for Big Data Clustering

70

Big Data

Concurrent Bandwidth Reservation Strategies for Big Data Transfers in

(5)

71 i ^2 Map Reduce: Incremental Map Reduce for Mining Evolving Big Data Big Data

72 In-Memory Big Data Management and Processing: A Survey Big Data

References

Related documents

Functional and radiological outcomes of a minimally invasive surgical approach to monostotic fibrous dysplasia TECHNICAL INNOVATIONS Open Access Functional and radiological outcomes of

The impact and optimal indication of non curative gastric resection for stage IV advanced gastric cancer diagnosed during surgery 10 years of experience at a single institute RESEARCH

Our previous research with dimensionality reduction has shown that when only fur and neutral clutter are used, the bear data is a 1-D separable problem.. Two dimensions (two

Table specifies available formats for color stream data [4].To display the sensor camera view to screen we have used Color Frame class.. All the image data and format are present

During battery charging, the controller operates as constant current mode (CC) or constant voltage mode (CV) depending on battery voltage while, in battery discharging, the

Least squares means (±SE) by strain for 2E55 Phase II final commercial tank sample fingerling traits, including body weight, total length, and condition factor. Roanoke sires

Multi-V rib and V-rib with gap shows the highest THP (Kumar et al. Thus there is scope of further enhancement of THP by increase in Nusselt number with less penalty of

fiber size below one micron to achieve higher filtration quality at lower basis weight relative to the conventional meltblown webs.. We found that production