IEEE JAVA PROJECTS 2022 - 2023
S.NO |
IEEE 2022-23 JAVA Project Titles |
Domain |
1 |
Privacy-Preserving Public
Auditing for Shared Cloud Data With Secure Group Management |
CLOUD COMPUTING |
2 |
BOEW: A Content-based
Image Retrieval Scheme using Bag-of-Encrypted-Words in Cloud Computing |
CLOUD COMPUTING |
3 |
Cloud Raid: Detecting
Distributed Concurrency Bugs via Log Mining and Enhancement |
CLOUD COMPUTING |
4 |
Data Integrity Audit
Scheme Based on Blockchain Expansion Technology |
CLOUD COMPUTING |
5 |
Data Integrity Audit Based
on Data Blinding for Cloud and Fog Environment |
CLOUD COMPUTING |
6 |
Achieving Efficient Secure
Deduplication with User-Defined Access Control in Cloud |
CLOUD COMPUTING |
7 |
Efficient CP-ABE Scheme
with Shared Decryption in Cloud Storage |
CLOUD COMPUTING |
8 |
VeriDedup: A Verifiable
Cloud Data Deduplication Scheme with Integrity and Duplication Proof |
CLOUD COMPUTING |
9 |
Identity-Based Privacy
Preserving Remote Data Integrity Checking With a Designated Verifier |
CLOUD COMPUTING |
10 |
Efficient Identity-based
Provable Multi-Copy Data Possession in Multi-Cloud Storage |
CLOUD COMPUTING |
11 |
Secure and Lightweight
Fine-grained Searchable Data Sharing for IoT-oriented and Cloud-assisted
Smart Healthcare System |
CLOUD COMPUTING |
12 |
PMRSS: Privacy-preserving Medical Record Searching Scheme for
Intelligent Diagnosis in IoT Healthcare |
CLOUD COMPUTING |
13 |
DSAS: A Secure Data
Sharing and Authorized Searchable Framework for e-Healthcare System |
CLOUD COMPUTING |
14 |
Enabling Efficient, Secure
and Privacy-preserving Mobile Cloud Storage |
CLOUD COMPUTING |
15 |
Enabling Verifiable and
Dynamic Ranked Search Over Outsourced Data |
CLOUD COMPUTING |
16 |
Forward Secure Public Key
Encryption with Keyword Search for Outsourced Cloud Storage |
CLOUD COMPUTING |
17 |
Lightweight and Expressive
Fine-grained Access Control for Healthcare Internet-of-Things |
CLOUD COMPUTING |
18 |
Web Cloud: Web-Based Cloud
Storage for Secure Data Sharing across Platforms |
CLOUD COMPUTING |
19 |
Verifiable Searchable
Encryption Framework against Insider Keyword-Guessing Attack in Cloud Storage |
CLOUD COMPUTING |
20 |
Revocable Identity-Based
Access Control for Big Data with Verifiable Outsourced Computing |
CLOUD COMPUTING |
21 |
Server-Aided Fine-Grained
Access Control Mechanism with Robust Revocation in Cloud Computing |
CLOUD COMPUTING |
22 |
Secure Cloud Data
Deduplication with Efficient Re-encryption |
CLOUD COMPUTING |
23 |
Social Media Driven Big
Data Analysis for Disaster Situation Awareness: A Tutorial |
DATA MINING |
24 |
Activity Organization for
Friend-Making Optimization in Online Social Networks |
DATA MINING |
25 |
Predicting Hot Events in
the Early Period through Bayesian Model for Social Networks |
DATA MINING |
26 |
Modeling Health Stage
Development of Patients with Dynamic Attributed Graphs in Online Health
Communities |
DATA MINING |
27 |
Principle-Based Approach
for the De-Identification of Code-Mixed Electronic Health Records |
DATA MINING |
28 |
Evaluating Public Anxiety
for Topic-based Communities in Social Networks |
DATA MINING |
29 |
Feature Selection
Algorithms For Predicting Students Academic Performance Using Data Mining
Techniques |
DATA MINING |
30 |
HinCTI: A Cyber Threat
Intelligence Modeling and Identification System Based on Heterogeneous
Information Network |
DATA MINING |
31 |
The Effect of Social Media
User Behaviors on Security and Privacy Threats |
SOCIAL COMPUTING & NETWORKS |
32 |
A Taxonomy of Fake News
Classification Techniques: Survey and Implementation Aspects |
SOCIAL COMPUTING & NETWORKS |
33 |
The Social Media Break-Up:
Psycho-Behavioral Measures and Implications |
SOCIAL COMPUTING & NETWORKS |
34 |
Composite Behavioral Modeling for Identity Theft Detection in Online
Social Networks |
SOCIAL COMPUTING & NETWORKS |
35 |
Social Spammer Detection via Convex Nonnegative Matrix Factorization |
SOCIAL COMPUTING & NETWORKS |
36 |
Social Engineering Attacks
Prevention: A Systematic Literature Review |
SOCIAL COMPUTING & NETWORKS |
37 |
Cross-Platform Reputation
Generation System Based on Aspect-Based Sentiment Analysis |
SOCIAL COMPUTING & NETWORKS |
38 |
PredicTour: Predicting
Mobility Patterns of Tourists Based on Social Media User's Profiles |
SOCIAL COMPUTING & NETWORKS |
39 |
DEA-RNN: A Hybrid Deep Learning Approach for Cyberbullying Detection in
Twitter Social Media Platform |
SOCIAL COMPUTING & NETWORKS |
40 |
FADOHS: Framework for
Detection and Integration of Unstructured Data of Hate Speech on Facebook
Using Sentiment and Emotion Analysis |
SOCIAL COMPUTING & NETWORKS |
41 |
Toward Data Justice
Understanding Police Shooting Data Systems and Narratives |
SOCIAL COMPUTING & NETWORKS |
42 |
Intelligent Distribution
of Fresh Agricultural Products in Smart City |
SOCIAL COMPUTING & NETWORKS |
43 |
Influence Based Defense
Against Data Poisoning Attacks in Online Learning |
SOCIAL COMPUTING & NETWORKS |
44 |
DetectDUI: An In-Car
Detection System for Drink Driving and BACs |
SOCIAL COMPUTING & NETWORKS |
45 |
Trust Based Incentive
Scheme to Allocate Big Data Tasks with Mobile Social Cloud |
MOBILE COMPUTING |
46 |
Eclipse: Preserving
Differential Location Privacy Against Long-Term Observation Attacks |
MOBILE COMPUTING |
47 |
Towards Personalized
Privacy-Preserving Incentive for Truth Discovery in Mobile Crowd sensing
Systems |
MOBILE COMPUTING |
48 |
Secure Mobile Edge
Computing Networks in the Presence of Multiple Eavesdroppers |
MOBILE COMPUTING |
49 |
Membership Inference
Attack and Defense for Wireless Signal Classifiers with Deep Learning |
MOBILE COMPUTING |
50 |
A Secure E-Coupon Service
Based on Blockchain Systems |
BLOCKCHAIN |
51 |
A Block chain Based System
for Healthcare Digital Twin |
BLOCKCHAIN |
52 |
Block chain technology for
protecting the banking transaction without using tokens |
BLOCKCHAIN |
53 |
Privacy-Preserving
Framework for Blockchain-Based Stock Exchange Platform |
BLOCKCHAIN |
54 |
Blockchain-Based
Electronic Health Records Management: A Comprehensive Review and Future
Research Direction |
BLOCKCHAIN |
55 |
Blockchain-Based
Management for Organ Donation and Transplantation |
BLOCKCHAIN |
56 |
Blockchain-based Management
of Blood Donation |
BLOCKCHAIN |
57 |
Blockchain Technology for
Secure Supply Chain Management A Comprehensive Review |
BLOCKCHAIN |
58 |
Enabling Trust and
Privacy-Preserving e-KYC System Using Blockchain |
BLOCKCHAIN |
59 |
Decentralized Blockchain-Based
Trust Management Protocol for the Internet of Things |
BLOCKCHAIN |
60 |
Protecting Vaccine Safety:
An Improved, Blockchain-Based, Storage-Efficient Scheme |
BLOCKCHAIN |
61 |
Blockchain as a Cyber
Defense: Opportunities, Applications, and Challenges |
BLOCKCHAIN |
62 |
Automatic Generation of
Ethereum-Based Smart Contracts for Agri-Food Traceability System |
BLOCKCHAIN |
63 |
Towards Blockchain Based
Secure Storage and Trusted Data Sharing Scheme for IoT Environment |
BLOCKCHAIN |
64 |
Block Hunter: Federated
Learning for Cyber Threat Hunting in Blockchain-based IIoT Networks |
BLOCKCHAIN |
65 |
VFChain: Enabling
Verifiable and Auditable Federated Learning via Blockchain Systems |
BLOCKCHAIN |
66 |
A Blockchain Approach to
Ensuring Provenance to Outsourced Cloud Data in a Sharing Ecosystem |
BLOCKCHAIN |
67 |
Trustworthiness Assessment
of Users in Social Reviewing Systems |
CYBERNETICS |
68 |
A Learning-Based POI
Recommendation With Spatiotemporal Context Awareness |
CYBERNETICS |
69 |
False-Data-Injection
Attacks on Remote Distributed Consensus Estimation |
CYBERNETICS |
70 |
Optimal Filter Assignment
Policy Against Distributed Denial-of-Service Attack |
DEPENDABLE & SECURE COMPUTING |
71 |
One Parameter Defense -
Defending against Data Inference Attacks via Differential Privacy |
DEPENDABLE
& SECURE COMPUTING |
72 |
An Explainable Multi-Modal
Hierarchical Attention Model for Developing Phishing Threat Intelligence |
DEPENDABLE & SECURE COMPUTING |
73 |
Blockchain-based
Certificate Transparency and Revocation Transparency |
DEPENDABLE
& SECURE COMPUTING |
74 |
CryptoMaze:
Privacy-Preserving Splitting of Off-Chain Payments |
DEPENDABLE
& SECURE COMPUTING |
75 |
Cyber security Awareness in
Online Education: A Case Study Analysis |
DEPENDABLE
& SECURE COMPUTING |
76 |
Detecting Sybil Attacks
using Proofs of Work and Location in VANETs |
DEPENDABLE
& SECURE COMPUTING |
77 |
Representing Fine-Grained
Co-Occurrences for Behavior-Based Fraud Detection in Online Payment Services |
DEPENDABLE
& SECURE COMPUTING |
78 |
Efficient Certificateless
Multi-Copy Integrity Auditing Scheme Supporting Data Dynamics |
DEPENDABLE
& SECURE COMPUTING |
79 |
Efficient Provably-Secure
Dynamic ID-Based Authenticated Key Agreement Scheme with Enhanced Security
Provision |
DEPENDABLE
& SECURE COMPUTING |
80 |
EntrapNet: a
Blockchain-Based Verification Protocol for Trustless Computing |
DEPENDABLE
& SECURE COMPUTING |
81 |
Trust But Verify: a
framework for the trustworthiness of distributed systems |
DEPENDABLE
& SECURE COMPUTING |
82 |
Lightweight and
Certificateless Multi-Receiver Secure Data Transmission Protocol for Wireless
Body Area Networks |
DEPENDABLE
& SECURE COMPUTING |
83 |
Achieve Efficient and
Privacy-preserving Disease Risk Assessment over Multi-outsourced Vertical
Datasets |
DEPENDABLE &
SECURE COMPUTING |
84 |
Quantum-Safe Round-Optimal
Password Authentication for Mobile Devices |
DEPENDABLE &
SECURE COMPUTING |
85 |
A Real Time Firewall
Policy Rule Set Anomaly Free Mechanism |
DEPENDABLE &
SECURE COMPUTING |
86 |
SC-TRUST: A Dynamic Model
for Trustworthy Service Composition in the Internet of Things |
DEPENDABLE &
SECURE COMPUTING |
87 |
SCA: Sybil-based Collusion
Attacks of IIoT Data Poisoning in Federated Learning |
DEPENDABLE &
SECURE COMPUTING |
88 |
Show, Price and Negotiate
A Negotiator With Online Value Look-Ahead |
IMAGE PROCESSING
& MULTIMEDIA |
89 |
Multi-modal Meta Multi-Task
Learning for Social Media Rumor Detection |
IMAGE PROCESSING AND MULTIMEDIA |
90 |
Asymmetric Hash Code
Learning for Remote Sensing Image Retrieval |
IMAGE PROCESSING AND MULTIMEDIA |
91 |
Scalable Distributed
Hashing for Approximate Nearest Neighbor Search |
IMAGE PROCESSING AND MULTIMEDIA |
92 |
SAC: Semantic Attention
Composition for Text-Conditioned Image Retrieval |
IMAGE PROCESSING AND MULTIMEDIA |
93 |
Global-Aware Ranking Deep
Metric Learning for Remote Sensing Image Retrieval |
IMAGE PROCESSING AND MULTIMEDIA |
94 |
Hash Learning with
Variable Quantization for Large-scale Retrieval |
IMAGE PROCESSING AND MULTIMEDIA |
0 Comments