Secure Computing

Project Titles 2021 -2022

  1. Fraud Detection in Online Product Review Systems via Heterogeneous Graph Transformer
  2. BullyNet: Unmasking Cyberbullies on Social Networks


Project Titles 2020 -2021

1 Detection of Malicious Social Bots Using Learning Automata With URL Features in Twitter Network

2 Automatically Dismantling Online Dating Fraud

3 DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Block chain

4 Detection of Social Network Spam Based on Improved Extreme Learning Machine

5 Identification of Malicious Injection Attacks in Dense Rating and Co visitation Behaviors

6 Privacy-Preserving User Profile Matching in Social Networks

7 Identification of Malicious Injection Attacks in Dense Rating and Co-visitation Behaviors

8 SPCSS: Social Network Based Privacy-Preserving Criminal Suspects Sensing

9 Using Improved Conditional Generative Adversarial Networks to Detect Social Bots on Twitter

10 Modeling Behavioral Dynamics for Asymmetric Application Layer DDoS Detection

11 Privacy-Preserving User Profile Matching in Social Networks

12 Cloud Centric Authentication for Wearable Healthcare Monitoring System

13 Fast Secure and Anonymous Key Agreement Against Bad Randomness for Cloud Computing

Project Titles 2019 -20
1 A Probabilistic Source Location Privacy Protection Scheme in Wireless Sensor Networks

2 Achieving Data Truthfulness and Privacy Preservation in Data Markets

3 Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe Systems

4 Dating with Scambots: Understanding the Ecosystem of Fraudulent Dating Applications

5 Efficient and Privacy-preserving Online Fingerprint Authentication Scheme Over Outsourced Data

6 Scalable Access Control For Privacy-Aware Media Sharing

7 Searchable Symmetric Encryption with Forward Search Privacy

8 Secure Channel Free Certificate-Based Searchable Encryption Withstanding Outside and Inside Keyword Guessing Attacks

9 Sensitive Label Privacy Preservation with Anatomization for Data Publishing

10 Authenticated Medical Documents Releasing with Privacy Protection and Release Control

11 Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe Systems

12 Dating with Scambots: Understanding the Ecosystem of Fraudulent Dating Applications

13 Detecting Malicious Social Bots Based on Clickstream Sequences

14 Privacy-Preserving Aggregate Queries for Optimal Location Selection

15 Sensitive Label Privacy Preservation with Anatomization for Data Publishing

16 Authentication by Encrypted Negative Password

17 Enabling Efficient and Geometric Range Query with Access Control over Encrypted Spatial Data






Post a Comment

0 Comments