IEEE CSE PROJECT TITLES 2019-2020
Cloud Computing
|
|
---|---|
TruPCC001 | RLWE-Based ID-DIA Protocols for Cloud Storage |
TruPCC002 | Verifiable and Multi-Keyword Searchable Attribute-Based Encryption Scheme forCloud Storage-Published |
TruPCC003 | A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality |
TruPCC004 | Public Auditing for Trusted Cloud Storage Services-Published in: IEEE Security & Privacy |
TruPCC005 | Generic Approach to Outsource the Decryption of Attribute-Based Encryption in Cloud Computing |
TruPCC006 | A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing |
TruPCC007 | An Efficient Authentication Scheme for Block chain-Based Electronic Health Records- Published |
TruPCC008 | Hidden Cipher text Policy Attribute-Based Encryption With Fast Decryption for Personal Health Record System |
TruPCC009 | Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data- Published |
TruPCC010 | Efficient Real-Time Integrity Auditing With Privacy-Preserving Arbitration for Images in Cloud Storage System |
TruPCC011 | Novel Multi-Keyword Search on Encrypted Data in the Cloud |
TruPCC012 | An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption |
TruPCC013 | Dynamic Keyword Search With Hierarchical Attributes in Cloud Computing |
TruPCC014 | A Lightweight Cloud Sharing PHR System With Access Policy Updating |
TruPCC015 | Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing |
TruPCC016 | A Fog-centric Secure Cloud Storage Scheme |
TruPCC017 | CHARON: A Secure Cloud-of-Clouds System for Storing and Sharing Big Data |
TruPCC018 | Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments |
TruPCC019 | Towards AI-Powered Multiple Cloud Management |
TruPCC020 | An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud Storage |
TruPCC021 | FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things |
TruPCC022 | A Trust-Based Agent Learning Model for Service Composition in Mobile CloudComputing Environments |
TruPCC023 | Revocable Identity-Based Broadcast Proxy Re-encryption for Data Sharing in Clouds |
TruPCC024 | Improving The Efficiency of E-Healthcare System Based on Cloud |
TruPCC025 | V-Matrix-Based Scalable Data Aggregation Scheme in WSN |
TruPCC026 | Dynamic Demand Prediction and Allocation in Cloud Service Brokerage. |
TruPCC027 | Towards AI-Powered Multiple Cloud Management. |
TruPCC028 | A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality |
TruPCC029 | Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud |
TruPCC030 | Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments |
TruPCC031 | Fast Boolean Queries With Minimized Leakage for Encrypted Databases in Cloud Computing |
TruPCC032 | FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things |
TruPCC033 | The Soft Underbelly of Cloud Security |
TruPCC034 | Verifiable and Multi-Keyword Searchable Attribute-Based Encryption Scheme for Cloud Storage |
IEEE CSE PROJECT TITLES 2019-2020
Data Mining
|
|
---|---|
TruPDM035 | Machine learning-resistant pseudo-random number generator |
TruPDM036 | Collaborative Variational Deep Learning for Healthcare Recommendation |
TruPDM037 | Enabling Feature Location for API Method Recommendation and Usage Location |
TruPDM038 | A Consensus Model for Large-Scale Linguistic Group Decision Making With a Feedback Recommendation Based on Clustered Personalized Individual Semantics and Opposing Consensus Groups |
TruPDM039 | Collaborative Filtering-Based Electricity Plan Recommender System |
TruPDM040 | Clustering-Algorithm-Based Rare-Event Evolution Analysis via Social Media Data |
TruPDM041 | Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Based Recommendation |
TruPDM042 | Mining Users Trust From E-Commerce Reviews Based on Sentiment Similarity Analysis |
TruPDM043 | Retrieving Hidden Friends: A Collusion Privacy Attack Against Online Friend Search Engine |
TruPDM044 | Mining Location Influence for Location Promotion in Location-Based Social Networks |
TruPDM045 | A User Identification Algorithm Based on User Behavior Analysis in Social Networks |
TruPDM046 | Tourism Mobile App With Aspect-Based Sentiment Classification Framework for Tourist Reviews |
TruPDM047 | Exploring Users' Internal Influence from Reviews for Social Recommendation |
TruPDM048 | Secure and energy aware load balancing framework for cloud data centre networks |
TruPDM049 | A Deep Learning-Based Intelligent Medicine Recognition System for Chronic Patients |
TruPDM050 | Network Representation Learning Enhanced Recommendation Algorithm |
TruPDM051 | DCCR: Deep Collaborative Conjunctive Recommender for Rating Prediction |
TruPDM052 | A Novel Load Image Profile-Based Electricity Load Clustering Methodology |
TruPDM053 | Predicting the Impact of Android Malicious Samples via Machine Learning |
TruPDM054 | Network Representation Learning Enhanced Recommendation Algorithm |
TruPDM055 | Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Based Recommendation |
TruPDM056 | Motion Based Inference of Social Circles via Self-Attention and Contextualized Embedding |
TruPDM057 | Composition Context-Based Web Services Similarity Measure |
TruPDM058 | Neural Binary Representation Learning for Large-Scale Collaborative Filtering |
TruPDM059 | Clustering-Based Collaborative Filtering Using an Incentivized/Penalized User Model |
TruPDM060 | A Hierarchical Attention Model for Social Contextual Image Recommendation |
TruPDM061 | Visualizing Three-Dimensional Ocean Eddies in Web Browsers |
TruPDM062 | A Query-based Framework for Searching, Sorting, and Exploring Data Ensembles |
TruPDM063 | BD2K Training Coordinating Center's ERuDIte: the Educational Resource Discovery Index |
TruPDM064 | A Particle Swarm Optimized Learning Model of Fault Classification in Web-Apps |
TruPDM065 | Mining Users Trust From E-Commerce Reviews Based on Sentiment Similarity Analysis |
TruPDM066 | Old and Young Users’ White Space Preferences for Online News Web Pages |
TruPDM067 | A Generalized Locally Linear Factorization Machine with Supervised Variational Encoding |
TruPDM068 | Analysis and Accurate Prediction of User’s Response Behavior in Incentive-Based Demand |
IEEE CSE PROJECT TITLES 2019-2020
Secure Computing
|
|
---|---|
TruPSC069 | Traffic Analysis Attack for Identifying Users’ Online Activities |
TruPSC070 | Coverless Information Hiding Method Based on Web Text |
TruPSC071 | Automated Decision Making in Airport Checkpoints: Bias Detection Toward Smarter Security and Fairness |
TruPSC072 | A Lightweight Privacy-Preserving CNN Feature Extraction Framework for MobileSensing |
TruPSC073 | LBOA: Location-Based Secure Outsourced Aggregation in IoT |
TruPSC074 | Looking Back! Using Early Versions of Android Apps as Attack Vectors |
TruPSC075 | Towards Thwarting Template Side-channel Attacks in Secure Cloud Deduplications |
TruPSC076 | Toward Edge-Assisted Internet of Things: From Security and EfficiencyPerspectives |
IEEE CSE PROJECT TITLES 2019-2020
Information Security
|
|
---|---|
TruPIP077 | Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage |
TruPIP078 | Unified Fine-Grained Access Control for Personal Health Records in Cloud Computing |
TruPIP079 | Provably Secure Fine-Grained Data Access Control Over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications |
IEEE CSE PROJECT TITLES 2019-2020
Distrusted System
|
|
---|---|
TruPIP080 | Access Control for Emerging Distributed Systems |
IEEE CSE PROJECT TITLES 2019-2020
Cryptography
|
|
---|---|
TruPIP081 | Cancelable Permutation-Based Indexing for Secure and Efficient Biometric Identification |
TruPIP082 | Autonomous Resource Request Transaction Framework Based on Block chain in Social Network |
TruPIP083 | Cryptanalysis and improvement of blind signcryption scheme based on elliptic curve |
IEEE CSE PROJECT TITLES 2019-2020
Image Processing
|
|
---|---|
TruPIP084 | Cryptanalysis of an Image Encryption Using 2D Henon-Sine Map and DNA Approach |
TruPIP085 | Real-time recovery and recognition of motion blurry QR code image based on fractional order deblurring method |
TruPIP086 | Measuring similarity between geo-tagged videos using largest common view |
TruPIP087 | Shoe-Print Image Retrieval With Multi-Part Weighted CNN |
TruPIP088 | Data Hiding for Ensuring the Quality of the Host Image and the Security of the Message |
TruPIP089 | Multimodal Neural Machine Translation With Weakly Labeled Images |
TruPIP090 | Medical Image Retrieval Based on Convolution Neural Network and Supervised Hashing |
TruPIP091 | A Hybrid Approach to Service Recommendation Based on Network Representation Learning |
TruPIP092 | Social Network Rumor Diffusion Predication Based on Equal Responsibility Game Model |
TruPIP093 | Fundamental Visual Concept Learning from Correlated Images and Text |
IEEE CSE PROJECT TITLES 2019-2020
Big Data
|
|
---|---|
TruPBD094 | Location Optimization for Urban Taxi Stands Based on Taxi GPS Trajectory Big Data |
TruPBD095 | Exploratory Analysis for Big Social Data Using Deep Network |
TruPBD096 | Big Data Opportunities: System Health Monitoring and Management |
TruPBD097 | A Data Sharing Protocol to Minimize Security and Privacy Risks of Cloud Storage in Big Data Era |
TruPBD098 | Crowd Management: A New Challenge for Urban Big Data Analytics |
TruPBD099 | The Rising Role of Big Data Analytics and IoT in Disaster Management: RecentAdvances, Taxonomy and Prospects |
TruPBD100 | Patient-Centric Cellular Networks Optimization Using Big Data Analytics |
TruPBD101 | Bayesian analysis of complex mutations in HBV, HCV, and HIV studies |
TruPBD102 | Multi-class sentiment analysis on twitter: Classification performance and challenges |
TruPBD103 | Big Data-Based Improved Data Acquisition and Storage System for Designing Industrial Data Platform |
TruPBD104 | Spreading social influence with both positive and negative opinions in online networks |
TruPBD105 | An Integrated Methodology for Big Data Classification and Security for Improving Cloud Systems Data Mobility |
TruPBD106 | Heterogeneous network-based chronic disease progression mining |
TruPBD107 | Fuzzy-Folded Bloom Filter-as-a-Service for Big Data Storage in the Cloud |
TruPBD108 | Comparison of Swam Intelligence Clustering Algorithms for Analysis of Big Data in Healthcare |
TruPBD109 | Effective and Efficient Content Redundancy Detection of Web Videos |
TruPBD110 | Incorporating Data Context to Cost-Effectively Automate End-to-End Data Wrangling |
TruPBD111 | Sentiment Analysis of Comment Texts Based on BiLSTM |
TruPBD112 | Data Interpolation and Reconstruction. |
TruPBD113 | Large-Margin Regularized Softmax Cross-Entropy Loss |
IEEE CSE PROJECT TITLES 2019-2020
Multimedia
|
|
---|---|
TruPMM114 | Learning Hierarchical Emotion Context for Continuous Dimensional Emotion Recognition From Video Sequences |
TruPMM115 | LTrust-Based Privacy-Preserving Photo Sharing in Online Social Networks |
TruPMM116 | Exploring Users' Internal Influence from Reviews for Social Recommendation |
IEEE CSE PROJECT TITLES 2019-2020
Online Social Network
|
|
---|---|
TruPSN117 | Network Representation Learning Enhanced Recommendation Algorithm |
TruPSN118 | Contrast Pattern-Based Classification for Bot Detection on Twitter |
TruPSN119 | Trust-Based Privacy-Preserving Photo Sharing in Online Social Networks |
TruPSN120 | Exploring Users' Internal Influence from Reviews for Social Recommendation |
TruPSN121 | Retrieving Hidden Friends: A Collusion Privacy Attack Against Online Friend Search Engine |
TruPSN122 | A Hybrid Approach to Service Recommendation Based on Network Representation Learning |
IEEE CSE PROJECT TITLES 2019-2020
Network
|
|
---|---|
TruPN123 | Enabling Secure Intelligent Network with Cloud-Assisted Privacy-Preserving Machine Learning |
TruPN124 | Data-Driven Network Intelligence for Anomaly Detection |
TruPN125 | Resource Management at the Network Edge: A Deep Reinforcement Learning Approach |
TruPN126 | A Lightweight Privacy-Preserving Protocol for VANETs Based on Secure Outsourcing Computing |
TruPN127 | An Adaptive Profile-Based Approach for Detecting Anomalous Traffic in Backbone |
TruPN128 | Secure and energy aware load balancing framework for cloud data centre networks |