Java IEEE Project Titles 2022 - 23

 

IEEE JAVA PROJECTS 2022 - 2023

S.NO

IEEE 2022-23 JAVA Project Titles

Domain

1

Privacy-Preserving Public Auditing for Shared Cloud Data With Secure Group Management

CLOUD COMPUTING

2

BOEW: A Content-based Image Retrieval Scheme using Bag-of-Encrypted-Words in Cloud Computing

CLOUD COMPUTING

3

Cloud Raid: Detecting Distributed Concurrency Bugs via Log Mining and Enhancement

CLOUD COMPUTING

4

Data Integrity Audit Scheme Based on Blockchain Expansion Technology

CLOUD COMPUTING

5

Data Integrity Audit Based on Data Blinding for Cloud and Fog Environment

CLOUD COMPUTING

6

Achieving Efficient Secure Deduplication with User-Defined Access Control in Cloud

CLOUD COMPUTING

7

Efficient CP-ABE Scheme with Shared Decryption in Cloud Storage

CLOUD COMPUTING

8

VeriDedup: A Verifiable Cloud Data Deduplication Scheme with Integrity and Duplication Proof

CLOUD COMPUTING

9

Identity-Based Privacy Preserving Remote Data Integrity Checking With a Designated Verifier

CLOUD COMPUTING

10

Efficient Identity-based Provable Multi-Copy Data Possession in Multi-Cloud Storage

CLOUD COMPUTING

11

Secure and Lightweight Fine-grained Searchable Data Sharing for IoT-oriented and Cloud-assisted Smart Healthcare System

CLOUD COMPUTING

12

PMRSS: Privacy-preserving Medical Record Searching Scheme for Intelligent Diagnosis in IoT Healthcare

CLOUD COMPUTING

13

DSAS: A Secure Data Sharing and Authorized Searchable Framework for e-Healthcare System

CLOUD COMPUTING

14

Enabling Efficient, Secure and Privacy-preserving Mobile Cloud Storage

CLOUD COMPUTING

15

Enabling Verifiable and Dynamic Ranked Search Over Outsourced Data

CLOUD COMPUTING

16

Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage

CLOUD COMPUTING

17

Lightweight and Expressive Fine-grained Access Control for Healthcare Internet-of-Things

CLOUD COMPUTING

18

Web Cloud: Web-Based Cloud Storage for Secure Data Sharing across Platforms

CLOUD COMPUTING

19

Verifiable Searchable Encryption Framework against Insider Keyword-Guessing Attack in Cloud Storage

CLOUD COMPUTING

20

Revocable Identity-Based Access Control for Big Data with Verifiable Outsourced Computing

CLOUD COMPUTING

21

Server-Aided Fine-Grained Access Control Mechanism with Robust Revocation in Cloud Computing

CLOUD COMPUTING

22

Secure Cloud Data Deduplication with Efficient Re-encryption

CLOUD COMPUTING

23

Social Media Driven Big Data Analysis for Disaster Situation Awareness: A Tutorial

DATA MINING

24

Activity Organization for Friend-Making Optimization in Online Social Networks

DATA MINING

25

Predicting Hot Events in the Early Period through Bayesian Model for Social Networks

DATA MINING

26

Modeling Health Stage Development of Patients with Dynamic Attributed Graphs in Online Health Communities

DATA MINING

27

Principle-Based Approach for the De-Identification of Code-Mixed Electronic Health Records

DATA MINING

28

Evaluating Public Anxiety for Topic-based Communities in Social Networks

DATA MINING

29

Feature Selection Algorithms For Predicting Students Academic Performance Using Data Mining Techniques

DATA MINING

30

HinCTI: A Cyber Threat Intelligence Modeling and Identification System Based on Heterogeneous Information Network

DATA MINING

31

The Effect of Social Media User Behaviors on Security and Privacy Threats

SOCIAL COMPUTING & NETWORKS

32

A Taxonomy of Fake News Classification Techniques: Survey and Implementation Aspects

SOCIAL COMPUTING & NETWORKS

33

The Social Media Break-Up: Psycho-Behavioral Measures and Implications

SOCIAL COMPUTING & NETWORKS

34

Composite Behavioral Modeling for Identity Theft Detection in Online Social Networks

SOCIAL COMPUTING & NETWORKS

35

Social Spammer Detection via Convex Nonnegative Matrix Factorization

SOCIAL COMPUTING & NETWORKS

36

Social Engineering Attacks Prevention: A Systematic Literature Review

SOCIAL COMPUTING & NETWORKS

37

Cross-Platform Reputation Generation System Based on Aspect-Based Sentiment Analysis

SOCIAL COMPUTING & NETWORKS

38

PredicTour: Predicting Mobility Patterns of Tourists Based on Social Media User's Profiles

SOCIAL COMPUTING & NETWORKS

39

DEA-RNN: A Hybrid Deep Learning Approach for Cyberbullying Detection in Twitter Social Media Platform

SOCIAL COMPUTING & NETWORKS

40

FADOHS: Framework for Detection and Integration of Unstructured Data of Hate Speech on Facebook Using Sentiment and Emotion Analysis

SOCIAL COMPUTING & NETWORKS

41

Toward Data Justice Understanding Police Shooting Data Systems and Narratives

SOCIAL COMPUTING & NETWORKS

42

Intelligent Distribution of Fresh Agricultural Products in Smart City

SOCIAL COMPUTING & NETWORKS

43

Influence Based Defense Against Data Poisoning Attacks in Online Learning

SOCIAL COMPUTING & NETWORKS

44

DetectDUI: An In-Car Detection System for Drink Driving and BACs

SOCIAL COMPUTING & NETWORKS

45

Trust Based Incentive Scheme to Allocate Big Data Tasks with Mobile Social Cloud

MOBILE COMPUTING

46

Eclipse: Preserving Differential Location Privacy Against Long-Term Observation Attacks

MOBILE COMPUTING

47

Towards Personalized Privacy-Preserving Incentive for Truth Discovery in Mobile Crowd sensing Systems

MOBILE COMPUTING

48

Secure Mobile Edge Computing Networks in the Presence of Multiple Eavesdroppers

MOBILE COMPUTING

49

Membership Inference Attack and Defense for Wireless Signal Classifiers with Deep Learning

MOBILE COMPUTING

50

A Secure E-Coupon Service Based on Blockchain Systems

BLOCKCHAIN

51

A Block chain Based System for Healthcare Digital Twin

BLOCKCHAIN

52

Block chain technology for protecting the banking transaction without using tokens

BLOCKCHAIN

53

Privacy-Preserving Framework for Blockchain-Based Stock Exchange Platform

BLOCKCHAIN

54

Blockchain-Based Electronic Health Records Management: A Comprehensive Review and Future Research Direction

BLOCKCHAIN

55

Blockchain-Based Management for Organ Donation and Transplantation

BLOCKCHAIN

56

Blockchain-based Management of Blood Donation

BLOCKCHAIN

57

Blockchain Technology for Secure Supply Chain Management A Comprehensive Review

BLOCKCHAIN

58

Enabling Trust and Privacy-Preserving e-KYC System Using Blockchain

BLOCKCHAIN

59

Decentralized Blockchain-Based Trust Management Protocol for the Internet of Things

BLOCKCHAIN

60

Protecting Vaccine Safety: An Improved, Blockchain-Based, Storage-Efficient Scheme

BLOCKCHAIN

61

Blockchain as a Cyber Defense: Opportunities, Applications, and Challenges

BLOCKCHAIN

62

Automatic Generation of Ethereum-Based Smart Contracts for Agri-Food Traceability System

BLOCKCHAIN

63

Towards Blockchain Based Secure Storage and Trusted Data Sharing Scheme for IoT Environment

BLOCKCHAIN

64

Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-based IIoT Networks

BLOCKCHAIN

65

VFChain: Enabling Verifiable and Auditable Federated Learning via Blockchain Systems

BLOCKCHAIN

66

A Blockchain Approach to Ensuring Provenance to Outsourced Cloud Data in a Sharing Ecosystem

BLOCKCHAIN

67

Trustworthiness Assessment of Users in Social Reviewing Systems

CYBERNETICS

68

A Learning-Based POI Recommendation With Spatiotemporal Context Awareness

CYBERNETICS

69

False-Data-Injection Attacks on Remote Distributed Consensus Estimation

CYBERNETICS

70

Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack

DEPENDABLE & SECURE COMPUTING

71

One Parameter Defense - Defending against Data Inference Attacks via Differential Privacy

DEPENDABLE & SECURE COMPUTING

72

An Explainable Multi-Modal Hierarchical Attention Model for Developing Phishing Threat Intelligence

DEPENDABLE & SECURE COMPUTING

73

Blockchain-based Certificate Transparency and Revocation Transparency

DEPENDABLE & SECURE COMPUTING

74

CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments

DEPENDABLE & SECURE COMPUTING

75

Cyber security Awareness in Online Education: A Case Study Analysis

DEPENDABLE & SECURE COMPUTING

76

Detecting Sybil Attacks using Proofs of Work and Location in VANETs

DEPENDABLE & SECURE COMPUTING

77

Representing Fine-Grained Co-Occurrences for Behavior-Based Fraud Detection in Online Payment Services

DEPENDABLE & SECURE COMPUTING

78

Efficient Certificateless Multi-Copy Integrity Auditing Scheme Supporting Data Dynamics

DEPENDABLE & SECURE COMPUTING

79

Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme with Enhanced Security Provision

DEPENDABLE & SECURE COMPUTING

80

EntrapNet: a Blockchain-Based Verification Protocol for Trustless Computing

DEPENDABLE & SECURE COMPUTING

81

Trust But Verify: a framework for the trustworthiness of distributed systems

DEPENDABLE & SECURE COMPUTING

82

Lightweight and Certificateless Multi-Receiver Secure Data Transmission Protocol for Wireless Body Area Networks

DEPENDABLE & SECURE COMPUTING

83

Achieve Efficient and Privacy-preserving Disease Risk Assessment over Multi-outsourced Vertical Datasets

DEPENDABLE & SECURE COMPUTING

84

Quantum-Safe Round-Optimal Password Authentication for Mobile Devices

DEPENDABLE & SECURE COMPUTING

85

A Real Time Firewall Policy Rule Set Anomaly Free Mechanism

DEPENDABLE & SECURE COMPUTING

86

SC-TRUST: A Dynamic Model for Trustworthy Service Composition in the Internet of Things

DEPENDABLE & SECURE COMPUTING

87

SCA: Sybil-based Collusion Attacks of IIoT Data Poisoning in Federated Learning

DEPENDABLE & SECURE COMPUTING

88

Show, Price and Negotiate A Negotiator With Online Value Look-Ahead

IMAGE PROCESSING & MULTIMEDIA

89

Multi-modal Meta Multi-Task Learning for Social Media Rumor Detection

IMAGE PROCESSING AND MULTIMEDIA

90

Asymmetric Hash Code Learning for Remote Sensing Image Retrieval

IMAGE PROCESSING AND MULTIMEDIA

91

Scalable Distributed Hashing for Approximate Nearest Neighbor Search

IMAGE PROCESSING AND MULTIMEDIA

92

SAC: Semantic Attention Composition for Text-Conditioned Image Retrieval

IMAGE PROCESSING AND MULTIMEDIA

93

Global-Aware Ranking Deep Metric Learning for Remote Sensing Image Retrieval

IMAGE PROCESSING AND MULTIMEDIA

94

Hash Learning with Variable Quantization for Large-scale Retrieval

IMAGE PROCESSING AND MULTIMEDIA

Post a Comment

0 Comments