001 |
A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing
|
Abstract |
002 |
A Trust-Based Agent Learning Model for Service Composition in Mobile Cloud Computing Environments |
Abstract |
003 |
Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data |
Abstract |
004 |
Reliability and Availability Evaluation for Cloud Data Center Networks Using Hierarchical Models |
Abstract |
005 |
Verifiable and Multi-keyword Searchable Attribute-based Encryption Scheme for Cloud Storage |
Abstract |
006 |
Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud |
Abstract |
007 |
CHARON: A Secure Cloud-of-Clouds System for Storing and Sharing Big Data |
Abstract |
008 |
An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud Storage |
Abstract |
009 |
Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data |
Abstract |
0010 |
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing |
Abstract |
0011 |
Hidden Ciphertext Policy Attribute-Based Encryption with Fast Decryption for Personal Health Record System |
Abstract |
0012 |
A Lightweight Secure Auditing Scheme for Shared Data in Cloud Storage |
Abstract |
0013 |
Novel Multi-Keyword Search on Encrypted Data in the Cloud |
Abstract |
0014 |
Privacy-aware Personal Data Storage (P-PDS) Learning how to Protect User Privacy from External Applications |
Abstract |
0015 |
Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting |
Abstract |
0016 |
Fast Boolean Queries With Minimized Leakage for Encrypted Databases in Cloud Computing |
Abstract |
0017 |
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing |
Abstract |
0018 |
Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments |
Abstract |
0019 |
A Fog-centric Secure Cloud Storage Scheme |
Abstract |
0020 |
Enabling Verifiable and Dynamic Ranked Search Over Outsourced Data |
Abstract |
0021 |
A Data Sharing Protocol to Minimize Security and Privacy Risks of Cloud Storage in Big Data Era |
Abstract |
0022 |
A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage Services |
Abstract |
0023 |
Achieve Privacy-Preserving Priority Classification on Patient Health Data in Remote eHealthcare System |
Abstract |
0024 |
Data Integrity Auditing without Private Key Storage for Secure Cloud Storage |
Abstract |
0025 |
Enabling Authorized Encrypted Search for Multi-Authority Medical Databases |
Abstract |
0026 |
Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems |
Abstract |
0027 |
P-MOD: Secure Privilege-Based Multilevel Organizational Data-Sharing in Cloud Computing |
Abstract |
0028 |
Practical Privacy-Preserving MapReduce Based K-means Clustering over Large-scale Dataset |
Abstract |
0029 |
Profit Maximization for Cloud Brokers in Cloud Computing |
Abstract |
0030 |
Provable Data Possession with Outsourced Data Transfer |
Abstract |
0031 |
Provably Secure Fine-Grained Data Access Control over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications |
Abstract |
0032 |
Revocable Identity-Based Broadcast Proxy Re-encryption for Data Sharing in Clouds |
Abstract |
0033 |
Searchable Symmetric Encryption with Forward Search Privacy |
Abstract |
0034 |
Clustering-Based Collaborative Filtering Using an Incentivized/Penalized User Model |
Abstract |
0035 |
A Hierarchical Attention Model for Social Contextual Image Recommendation |
Abstract |
0036 |
Mining Users Trust From E-Commerce Reviews Based on Sentiment Similarity Analysis |
Abstract |
0037 |
Old and Young Users’ White Space Preferences for Online News Web Pages |
Abstract |
0038 |
Analysis and Accurate Prediction of User’s Response Behavior in Incentive-Based Demand Response |
Abstract |
0039 |
DCCR: Deep Collaborative Conjunctive Recommender for Rating Prediction |
Abstract |
0040 |
Network Representation Learning Enhanced Recommendation Algorithm |
Abstract |
0041 |
Composition Context-Based Web Services Similarity Measure |
Abstract |
0042 |
NASM: Nonlinearly Attentive Similarity Model for Recommendation System via Locally Attentive Embedding |
Abstract |
0043 |
A Novel Load Image Profile-Based Electricity Load Clustering Methodology |
Abstract |
0044 |
An Efficient Method for High Quality and Cohesive Topical Phrase Mining |
Abstract |
0045 |
A Hybrid E-learning Recommendation Approach Based on Learners’ Influence Propagation |
Abstract |
0046 |
Active Online Learning for Social Media Analysis to Support Crisis Management |
Abstract |
0047 |
Applying Simulated Annealing and Parallel Computing to the Mobile Sequential Recommendation |
Abstract |
0048 |
Collaboratively Tracking Interests for User Clustering in Streams of Short Texts |
Abstract |
0049 |
Detecting Pickpocket Suspects from Large-Scale Public Transit Records |
Abstract |
0050 |
Finding Optimal Skyline Product Combinations under Price Promotion |
Abstract |
0051 |
Heterogeneous Information Network Embedding for Recommendation |
Abstract |
0052 |
Hierarchical Multi-Clue Modelling for POI Popularity Prediction with Heterogeneous Tourist Information |
Abstract |
0053 |
K-nearest Neighbor Search by Random Projection Forests |
Abstract |
0054 |
Learning Customer Behaviors for Effective Load Forecasting |
Abstract |
0055 |
Normalization of Duplicate Records from Multiple Sources |
Abstract |
0056 |
On Scalable and Robust Truth Discovery in Big Data Social Media Sensing Applications |
Abstract |
0057 |
Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Based Recommendation |
Abstract |
0058 |
Secure and Efficient Skyline Queries on Encrypted Data |
Abstract |
0059 |
Trust Relationship Prediction in Alibaba E-Commerce Platform |
Abstract |
0060 |
A Novel Load Image Profile-Based Electricity Load Clustering Methodology |
Abstract |
0061 |
Coverless Information Hiding Method Based on Web Text |
Abstract |
0062 |
SEPTIC Detecting Injection Attacks and Vulnerabilities Inside the DBMS |
Abstract |
0063 |
LBOA: Location-Based Secure Outsourced Aggregation in IoT |
Abstract |
0064 |
Towards Thwarting Template Side-channel Attacks in Secure Cloud Deduplications |
Abstract |
0065 |
Automated Decision Making in Airport Checkpoints: Bias Detection Toward Smarter Security and Fairness |
Abstract |
0066 |
Detecting Malicious Social Bots Based on Click stream Sequences |
Abstract |
0067 |
Authenticated Medical Documents Releasing with Privacy Protection and Release Control |
Abstract |
0068 |
Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe Systems |
Abstract |
0069 |
Privacy-Preserving Aggregate Queries for Optimal Location Selection |
Abstract |
0070 |
Authentication by Encrypted Negative Password |
Abstract |
0071 |
Retrieving Hidden Friends: A Collusion Privacy Attack Against Online Friend Search Engine |
Abstract |
0072 |
Account Trade Accountability Against Dishonest Big Data Buyers and Sellers |
Abstract |
0073 |
Enabling Efficient and Geometric Range Query with Access Control over Encrypted Spatial Data |
Abstract |
0074 |
Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage |
Abstract |
0075 |
A Hybrid Approach to Service Recommendation Based on Network Representation Learning |
Abstract |
0076 |
Social Network Rumor Diffusion Predication Based on Equal Responsibility Game Model |
Abstract |
0077 |
Online Public Shaming on Twitter: Detection, Analysis and Mitigation |
Abstract |
0078 |
PersoNet: Friend Recommendation System Based on Big-Five Personality Traits and Hybrid Filtering |
Abstract |
0079 |
A Fuzzy Approach to Text Classification with Two Stage Training for Ambiguous Instances |
Abstract |
0080 |
Conversational Networks For Automatic Online Moderation |
Abstract |
0081 |
An Indoor Position-Estimation Algorithm Using Smartphone IMU Sensor Data |
Abstract |
0082 |
FooDNet: Toward an Optimized Food Delivery Network based on Spatial Crowdsourcing |
Abstract |
0083 |
Privacy-preserving Crowd-sourced Statistical Data Publishing with An Untrusted Server |
Abstract |
0084 |
V-Matrix-Based Scalable Data Aggregation Scheme in WSN |
Abstract |
0085 |
A Probabilistic Source Location Privacy Protection Scheme in Wireless Sensor Networks |
Abstract |
0086 |
Memory Leakage-Resilient Dynamic and Verifiable Multi-keyword Ranked Search on Encrypted Smart Body Sensor Network Data |
Abstract |
0087 |
Scheduling Real Time Security Aware tasks in Fog Networks |
Abstract |
0088 |
Primary User-aware Optimal Discovery Routing for Cognitive Radio Networks |
Abstract |
0089 |
Efficient Conditional Anonymity With Message Integrity and Authentication in a Vehicular Ad-Hoc Network |
Abstract |
0090 |
Kalman Prediction based Neighbor Discovery and its Effect on Routing Protocol in Vehicular Ad Hoc Networks |
Abstract |
0091 |
New Multi-Hop Clustering Algorithm for Vehicular Ad Hoc Networks |
Abstract |
0092 |
Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks |
Abstract |
0093 |
V2V Routing in a VANET Based on the Autoregressive Integrated Moving Average Model |
Abstract |
0094 |
Dating with Scambots: Understanding the Ecosystem of Fraudulent Dating Applications |
Abstract |
0095 |
Applying Simulated Annealing and Parallel Computing to the Mobile Sequential Recommendation |
Abstract |
0096 |
An Indoor Position-Estimation Algorithm Using Smartphone IMU Sensor Data |
Abstract |
0097 |
Achieve Privacy-Preserving Priority Classification on Patient Health Data in Remote eHealthcare System |
Abstract |
0098 |
Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Learning Algorithms: Review of Literature and Open Challenges |
Abstract |
0099 |
Spammer Detection and Fake User Identification on Social Networks |
Abstract |
0100 |
Ant Colony Stream Clustering: A Fast Density Clustering Algorithm for Dynamic Data Streams |
Abstract |
0101 |
Transactional Behavior Verification in Business Process as a Service Configuration |
Abstract |
0102 |
Building and Querying an Enterprise Knowledge Graph |
Abstract |
0103 |
Delegated Authorization Framework for EHR Services using Attribute Based Encryption |
Abstract |
0104 |
Secure Channel Free Certificate-Based Searchable Encryption Withstanding Outside and Inside Keyword Guessing Attacks |
Abstract |
0105 |
Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT |
Abstract |
0106 |
Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques |
Abstract |
0107 |
Trustworthy Delegation toward Securing Mobile Healthcare Cyber-Physical Systems |
Abstract |
0108 |
Fundamental Visual Concept Learning from Correlated Images and Text |
Abstract |
0109 |
Trust-based Privacy-Preserving Photo Sharing in Online Social Networks |
Abstract |
0110 |
Towards Robust Image Steganography |
Abstract |