IEEE JAVA PROJECTS 2020 - 2021
S.NO |
IEEE
2020-21 JAVA Project Titles |
Domain |
Lang |
1 |
A Verifiable
Semantic Searching Scheme by Optimal Matching over Encrypted Data in Public
Cloud |
CLOUD COMPUTING |
JAVA |
2 |
Attribute-Based
Cloud Data Integrity Auditing for Secure Outsourced Storage |
CLOUD COMPUTING |
JAVA |
3 |
Attribute-Based Hybrid Boolean Keyword Search over
Outsourced Encrypted Data |
CLOUD COMPUTING |
JAVA |
4 |
Authentication
and Key Agreement Based on Anonymous Identity for Peer-to-Peer Cloud |
CLOUD COMPUTING |
JAVA |
5 |
Efficient
Decentralized Attribute Based Access Control for Mobile Clouds |
CLOUD COMPUTING |
JAVA |
6 |
Designing Secure
and Efficient Biometric-Based Secure Access Mechanism for Cloud Services |
CLOUD COMPUTING |
JAVA |
7 |
Efficient Regular
Language Search for Secure Cloud Storage |
CLOUD COMPUTING |
JAVA |
8 |
Efficient
Traceable Authorization Search System for Secure Cloud Storage |
CLOUD COMPUTING |
JAVA |
9 |
Privacy-Preserving
Outsourced Support Vector Machine Design for Secure Drug Discovery |
CLOUD COMPUTING |
JAVA |
10 |
Enabling
Efficient User Revocation in Identity-based Cloud Storage Auditing for Shared
Big Data |
CLOUD COMPUTING |
JAVA |
11 |
Lightweight Cloud
Storage Auditing With De duplication Supporting Strong Privacy Protection |
CLOUD COMPUTING |
JAVA |
12 |
Multi-user
Verifiable Searchable Symmetric Encryption for Cloud Storage |
CLOUD COMPUTING |
JAVA |
13 |
Optimizing
Information Leakage in Multi cloud Storage Services |
CLOUD COMPUTING |
JAVA |
14 |
Secure Keyword
Search and Data Sharing Mechanism for Cloud Computing |
CLOUD COMPUTING |
JAVA |
15 |
Toward Practical
Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data |
CLOUD COMPUTING |
JAVA |
16 |
Privacy-Preserving
Data Processing with Flexible Access Control |
CLOUD COMPUTING |
JAVA |
17 |
TAFC: Time and Attribute Factors Combined Access Control
for Time-Sensitive Data in Public Cloud |
CLOUD COMPUTING |
JAVA |
18 |
You Can Access But You Cannot Leak: Defending
Against Illegal Content Redistribution in Encrypted Cloud Media Center |
CLOUD COMPUTING |
JAVA |
19 |
Privacy Protection and Intrusion Avoidance for
Cloudlet-based Medical Data Sharing |
CLOUD COMPUTING |
JAVA |
20 |
Privacy Aware Data De duplication for Side Channel
in Cloud Storage |
CLOUD COMPUTING |
JAVA |
21 |
Achieving Secure and Efficient Dynamic Searchable
Symmetric Encryption over Medical Cloud Data |
CLOUD COMPUTING |
JAVA |
22 |
A New Lightweight Symmetric Searchable Encryption
Scheme for String Identification |
CLOUD COMPUTING |
JAVA |
23 |
A Key-Policy Attribute-Based Temporary Keyword
Search scheme for Secure Cloud Storage |
CLOUD COMPUTING |
JAVA |
24 |
A Secure Enhanced Key-Policy Attribute-Based
Temporary Keyword Search Scheme in the Cloud |
CLOUD COMPUTING |
JAVA |
25 |
Development and Examination of Fog Computing-Based
Encrypted Control System. |
CLOUD COMPUTING |
JAVA |
26 |
A Novel Feature Matching Ranked Search Mechanism
Over Encrypted Cloud Data |
CLOUD COMPUTING |
JAVA |
27 |
A Secure and Efficient Cloud-Centric Internet of
Medical Things-Enabled Smart Healthcare System with Public Verifiability |
CLOUD COMPUTING |
JAVA |
28 |
Scalable and Secure Big Data IoT System Based on
Multifactor Authentication and Lightweight Cryptography |
CLOUD COMPUTING |
JAVA |
29 |
Key Policy
Attribute-Based Encryption with Keyword Search in Virtualized Environments |
CLOUD COMPUTING |
JAVA |
30 |
Identity-Based
Encryption Transformation for Flexible Sharing of Encrypted Data in Public
Cloud. |
CLOUD COMPUTING |
JAVA |
31 |
Secure Data
Transfer and Deletion from Counting Bloom Filter in Cloud Computing. |
CLOUD COMPUTING |
JAVA |
32 |
Key-Escrow Free
Attribute-Based Multi-Keyword Search with Dynamic Policy Update in Cloud Computing |
CLOUD COMPUTING |
JAVA |
33 |
Fast Secure and
Anonymous Key Agreement Against Bad Randomness for Cloud Computing |
CLOUD COMPUTING |
JAVA |
34 |
Achieving
Practical Symmetric Searchable Encryption with Search Pattern Privacy over
Cloud |
CLOUD COMPUTING |
JAVA |
35 |
Achieving Secure
and Dynamic Range Queries Over Encrypted Cloud Data |
CLOUD COMPUTING |
JAVA |
36 |
Secure Cloud
Storage with Data Dynamics Using Secure Network Coding Techniques |
CLOUD COMPUTING |
JAVA |
37 |
SecDedup Secure
Encrypted Data De duplication with Dynamic Ownership Updating |
CLOUD COMPUTING |
JAVA |
38 |
LEVER Secure
Deduplicated Cloud Storage with Encrypted Two-Party Interactions in
Cyber-Physical Systems |
CLOUD COMPUTING |
JAVA |
39 |
Improving
Security and Privacy Attribute Based Data Sharing in Cloud Computing |
CLOUD COMPUTING |
JAVA |
40 |
A Scalable
Attribute-Based Access Control Scheme with Flexible Delegation cum Sharing of
Access Privileges for Cloud Storage |
CLOUD COMPUTING |
JAVA |
41 |
A Secure Privacy
Preserving Cloud-based Framework for Sharing Electronic Health Data |
CLOUD COMPUTING |
JAVA |
|
A Survey
on Health Care
facilities by Cloud Computing |
CLOUD COMPUTING |
JAVA |
42 |
Dynamic Connection-based Social Group Recommendation |
DATA MINING |
JAVA |
43 |
Adaptive Diffusion of Sensitive Information In
Online Social Networks |
DATA MINING |
JAVA |
44 |
Detecting Group Shilling Attacks in Online
Recommender Systems Based on Bisecting K-Means Clustering |
DATA MINING |
JAVA |
45 |
Active Online Learning for Social Media Analysis to
Support Crisis Management |
DATA MINING |
JAVA |
46 |
Location-Aware Service Recommendations With Privacy-
Preservation in the Internet of Things |
DATA MINING |
JAVA |
47 |
Cashless Society Managing Privacy and Security in
the Technological Age |
DATA MINING |
JAVA |
48 |
DGDFS Dependence Guided Discriminative Feature
Selection for Predicting Adverse Drug-Drug Interaction |
DATA MINING |
JAVA |
49 |
Movie Recommendation System Using Sentiment Analysis
From Micro blogging Data |
DATA MINING |
JAVA |
50 |
What and With Whom? Identifying Topics in Twitter
Through Both Interactions and Text |
DATA MINING |
JAVA |
51 |
Personalized Recommendation System based on
Collaborative Filtering for IoT
Scenarios |
DATA MINING |
JAVA |
52 |
Efficiently Processing Spatial and Keyword Queries
in Indoor Venues |
DATA MINING |
JAVA |
53 |
Evaluating Public Anxiety for Topic-based Communities
in Social Networks |
DATA MINING |
JAVA |
54 |
Multi-Party High-Dimensional Data Publishing under
Differential Privacy |
DATA MINING |
JAVA |
55 |
TAQE: Tweet Retrieval Based Infrastructure Damage
Assessment During Disasters |
DATA MINING |
JAVA |
56 |
A Sentiment Polarity Categorization Technique for
Online Product Reviews |
DATA MINING |
JAVA |
57 |
Characterizing the Propagation of Situational
Information in Social Media During COVID-19 Epidemic: A Case Study on Weibo |
DATA MINING |
JAVA |
58 |
Land Use Classification with Point of Interests and
Structural Patterns |
DATA MINING |
JAVA |
59 |
Feature Level Rating System Using Customer Reviews
and Review Votes |
DATA MINING |
JAVA |
60 |
Online Pricing with Reserve Price Constraint for
Personal Data Markets |
DATA MINING |
JAVA |
61 |
Predicting Hot Events in the Early Period through
Bayesian Model for Social Networks |
DATA MINING |
JAVA |
62 |
Predicting Student Performance in an Educational
Game Using a Hidden Markov Model |
DATA MINING |
JAVA |
63 |
Privacy Preserving Location Data Publishing A
Machine Learning Approach |
DATA MINING |
JAVA |
64 |
Product Quantized Collaborative Filtering |
DATA MINING |
JAVA |
65 |
Social Boosted Recommendation with Folded Bipartite
Network Embedding |
DATA MINING |
JAVA |
66 |
Emotion Correlation Mining Through Deep Learning
Models on Natural Language Text |
DATA MINING |
JAVA |
67 |
Emotion Detection in Online Social Networks: A
Multi-label Learning Approach |
DATA MINING |
JAVA |
68 |
Analyzing Product Usage Based on Twitter Users
Based on Data mining Process |
DATA MINING |
JAVA |
69 |
Review of Apriori based Frequent Itemset Mining Solutions on
Big Data |
DATA MINING |
JAVA |
70 |
Data Mining
and Feature Analysis of College Students’ Campus Network Behavior |
DATA MINING |
JAVA |
71 |
Crime Analysis Mapping, Intrusion Detection - Using Data Mining |
DATA MINING |
JAVA |
72 |
AdSherlock
Efficient and Deployable Click Fraud Detection for Mobile Applications |
MOBILE
COMPUTING |
JAVA |
73 |
PASPORT: A Secure
and Private Location Proof Generation and Verification Framework |
MOBILE
COMPUTING |
JAVA |
74 |
KOLLECTOR
Detecting Fraudulent Activities on Mobile Devices Using Deep Learning |
MOBILE
COMPUTING |
JAVA |
75 |
Detection of
Malicious Social Bots Using Learning Automata With URL Features in Twitter
Network |
SECURE
COMPUTING |
JAVA |
76 |
Automatically
Dismantling Online Dating Fraud |
SECURE COMPUTING |
JAVA |
77 |
DCAP: A Secure
and Efficient Decentralized Conditional Anonymous Payment System Based on
Block chain |
SECURE
COMPUTING |
JAVA |
78 |
Detection of
Social Network Spam Based on Improved Extreme Learning Machine |
SECURE
COMPUTING |
JAVA |
79 |
Identification of
Malicious Injection Attacks in Dense Rating and Co visitation Behaviors |
SECURE
COMPUTING |
JAVA |
80 |
Privacy-Preserving User Profile Matching in
Social Networks |
SECURE
COMPUTING |
JAVA |
81 |
Identification of
Malicious Injection Attacks in Dense Rating and Co-visitation Behaviors |
SECURE
COMPUTING |
JAVA |
82 |
SPCSS: Social
Network Based Privacy-Preserving Criminal Suspects Sensing |
SECURE
COMPUTING |
JAVA |
83 |
Using Improved
Conditional Generative Adversarial Networks to Detect Social Bots on Twitter |
SECURE
COMPUTING |
JAVA |
84 |
Modeling
Behavioral Dynamics for Asymmetric Application Layer DDoS Detection |
SECURE
COMPUTING |
JAVA |
85 |
Privacy-Preserving User Profile Matching in Social
Networks |
SECURE
COMPUTING |
JAVA |
86 |
Detecting and
Characterizing Extremist Reviewer Groups in Online Product Reviews |
MACHINE LEARNING |
JAVA |
87 |
Suicidal Ideation
Detection: A Review of Machine Learning Methods and Applications |
MACHINE LEARNING |
JAVA |
88 |
Human-in-the-Loop-Aided
Privacy-Preserving Scheme for Smart Healthcare |
EMERGING TOPICS IN COMPUTING |
JAVA |
89 |
Recommending
Activities for Mental Health and Well-being Insights from Two User Studies |
EMERGING TOPICS IN COMPUTING |
JAVA |
90 |
Credit Card
Transactions Data Adversarial Augmentation in the Frequency Domain |
BIG DATA |
JAVA |
91 |
Secure Channel
Free Certificate-Based Searchable Encryption Withstanding Outside and Inside
Keyword Guessing Attacks |
BIG DATA |
JAVA |
92 |
Scalable and
Secure Big Data IoT System
Based on Multifactor Authentication and Lightweight Cryptography |
BIG DATA |
JAVA |
93 |
Feature-Level Rating
System Using Customer Reviews and Review Votes |
NLP (Natural
Language Processing) |
JAVA |
94 |
A Trustworthy
Privacy Preserving Framework for Machine Learning in Industrial IoT Systems |
INTERNET OF THINGS (IOT) |
JAVA |
95 |
An Efficient
IoT-Based Platform for Remote Real Time Cardiac Activity Monitoring |
INTERNET OF THINGS (IOT) |
JAVA |
96 |
An Efficient
Privacy Preserving Message Authentication Scheme for Internet-of-Things |
INTERNET OF THINGS (IOT) |
JAVA |
97 |
An Efficient Spam
Detection Technique for IoT Devices using Machine Learning |
INTERNET OF THINGS (IOT) |
JAVA |
98 |
Decentralized
Lightweight Group Key Management for Dynamic Access Control in IoT
Environments |
INTERNET OF THINGS (IOT) |
JAVA |
99 |
Secure IoT Data
Outsourcing With Aggregate Statistics and Fine- Grained Access Control |
INTERNET OF THINGS (IOT) |
JAVA |
100 |
An efficient framework for privacy-preserving
computations on encrypted IoT data |
INTERNET OF THINGS (IOT) |
JAVA |
101 |
Benchmarking
Image Retrieval Diversification Techniques for Social Media |
IMAGE PROCESSING AND MULTIMEDIA |
JAVA |
102 |
Online Hashing
with Bit Selection for Image Retrieval |
IMAGE PROCESSING AND MULTIMEDIA |
JAVA |
103 |
Trust-Based Video
Management Framework for Social Multimedia Networks |
IMAGE PROCESSING AND MULTIMEDIA |
JAVA |
104 |
Crisis-Critical Intellectual Property Findings From
the COVID-19 Pandemic |
SOFTWARE
ENGINEERING |
JAVA |
105 |
Block chain based
Data Storage with Privacy and Authentication in Internet of Things |
BLOCK CHAIN |
JAVA |
106 |
Block chain-Based
Secure Computation Offloading in Vehicular Networks |
BLOCK CHAIN |
JAVA |
0 Comments