IEEE JAVA PROJECTS 2020 - 2021
|
S.NO |
IEEE
2020-21 JAVA Project Titles |
Domain |
Lang |
|
1 |
A Verifiable
Semantic Searching Scheme by Optimal Matching over Encrypted Data in Public
Cloud |
CLOUD COMPUTING |
JAVA |
|
2 |
Attribute-Based
Cloud Data Integrity Auditing for Secure Outsourced Storage |
CLOUD COMPUTING |
JAVA |
|
3 |
Attribute-Based Hybrid Boolean Keyword Search over
Outsourced Encrypted Data |
CLOUD COMPUTING |
JAVA |
|
4 |
Authentication
and Key Agreement Based on Anonymous Identity for Peer-to-Peer Cloud |
CLOUD COMPUTING |
JAVA |
|
5 |
Efficient
Decentralized Attribute Based Access Control for Mobile Clouds |
CLOUD COMPUTING |
JAVA |
|
6 |
Designing Secure
and Efficient Biometric-Based Secure Access Mechanism for Cloud Services |
CLOUD COMPUTING |
JAVA |
|
7 |
Efficient Regular
Language Search for Secure Cloud Storage |
CLOUD COMPUTING |
JAVA |
|
8 |
Efficient
Traceable Authorization Search System for Secure Cloud Storage |
CLOUD COMPUTING |
JAVA |
|
9 |
Privacy-Preserving
Outsourced Support Vector Machine Design for Secure Drug Discovery |
CLOUD COMPUTING |
JAVA |
|
10 |
Enabling
Efficient User Revocation in Identity-based Cloud Storage Auditing for Shared
Big Data |
CLOUD COMPUTING |
JAVA |
|
11 |
Lightweight Cloud
Storage Auditing With De duplication Supporting Strong Privacy Protection |
CLOUD COMPUTING |
JAVA |
|
12 |
Multi-user
Verifiable Searchable Symmetric Encryption for Cloud Storage |
CLOUD COMPUTING |
JAVA |
|
13 |
Optimizing
Information Leakage in Multi cloud Storage Services |
CLOUD COMPUTING |
JAVA |
|
14 |
Secure Keyword
Search and Data Sharing Mechanism for Cloud Computing |
CLOUD COMPUTING |
JAVA |
|
15 |
Toward Practical
Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data |
CLOUD COMPUTING |
JAVA |
|
16 |
Privacy-Preserving
Data Processing with Flexible Access Control |
CLOUD COMPUTING |
JAVA |
|
17 |
TAFC: Time and Attribute Factors Combined Access Control
for Time-Sensitive Data in Public Cloud |
CLOUD COMPUTING |
JAVA |
|
18 |
You Can Access But You Cannot Leak: Defending
Against Illegal Content Redistribution in Encrypted Cloud Media Center |
CLOUD COMPUTING |
JAVA |
|
19 |
Privacy Protection and Intrusion Avoidance for
Cloudlet-based Medical Data Sharing |
CLOUD COMPUTING |
JAVA |
|
20 |
Privacy Aware Data De duplication for Side Channel
in Cloud Storage |
CLOUD COMPUTING |
JAVA |
|
21 |
Achieving Secure and Efficient Dynamic Searchable
Symmetric Encryption over Medical Cloud Data |
CLOUD COMPUTING |
JAVA |
|
22 |
A New Lightweight Symmetric Searchable Encryption
Scheme for String Identification |
CLOUD COMPUTING |
JAVA |
|
23 |
A Key-Policy Attribute-Based Temporary Keyword
Search scheme for Secure Cloud Storage |
CLOUD COMPUTING |
JAVA |
|
24 |
A Secure Enhanced Key-Policy Attribute-Based
Temporary Keyword Search Scheme in the Cloud |
CLOUD COMPUTING |
JAVA |
|
25 |
Development and Examination of Fog Computing-Based
Encrypted Control System. |
CLOUD COMPUTING |
JAVA |
|
26 |
A Novel Feature Matching Ranked Search Mechanism
Over Encrypted Cloud Data |
CLOUD COMPUTING |
JAVA |
|
27 |
A Secure and Efficient Cloud-Centric Internet of
Medical Things-Enabled Smart Healthcare System with Public Verifiability |
CLOUD COMPUTING |
JAVA |
|
28 |
Scalable and Secure Big Data IoT System Based on
Multifactor Authentication and Lightweight Cryptography |
CLOUD COMPUTING |
JAVA |
|
29 |
Key Policy
Attribute-Based Encryption with Keyword Search in Virtualized Environments |
CLOUD COMPUTING |
JAVA |
|
30 |
Identity-Based
Encryption Transformation for Flexible Sharing of Encrypted Data in Public
Cloud. |
CLOUD COMPUTING |
JAVA |
|
31 |
Secure Data
Transfer and Deletion from Counting Bloom Filter in Cloud Computing. |
CLOUD COMPUTING |
JAVA |
|
32 |
Key-Escrow Free
Attribute-Based Multi-Keyword Search with Dynamic Policy Update in Cloud Computing |
CLOUD COMPUTING |
JAVA |
|
33 |
Fast Secure and
Anonymous Key Agreement Against Bad Randomness for Cloud Computing |
CLOUD COMPUTING |
JAVA |
|
34 |
Achieving
Practical Symmetric Searchable Encryption with Search Pattern Privacy over
Cloud |
CLOUD COMPUTING |
JAVA |
|
35 |
Achieving Secure
and Dynamic Range Queries Over Encrypted Cloud Data |
CLOUD COMPUTING |
JAVA |
|
36 |
Secure Cloud
Storage with Data Dynamics Using Secure Network Coding Techniques |
CLOUD COMPUTING |
JAVA |
|
37 |
SecDedup Secure
Encrypted Data De duplication with Dynamic Ownership Updating |
CLOUD COMPUTING |
JAVA |
|
38 |
LEVER Secure
Deduplicated Cloud Storage with Encrypted Two-Party Interactions in
Cyber-Physical Systems |
CLOUD COMPUTING |
JAVA |
|
39 |
Improving
Security and Privacy Attribute Based Data Sharing in Cloud Computing |
CLOUD COMPUTING |
JAVA |
|
40 |
A Scalable
Attribute-Based Access Control Scheme with Flexible Delegation cum Sharing of
Access Privileges for Cloud Storage |
CLOUD COMPUTING |
JAVA |
|
41 |
A Secure Privacy
Preserving Cloud-based Framework for Sharing Electronic Health Data |
CLOUD COMPUTING |
JAVA |
|
|
A Survey
on Health Care
facilities by Cloud Computing |
CLOUD COMPUTING |
JAVA |
|
42 |
Dynamic Connection-based Social Group Recommendation |
DATA MINING |
JAVA |
|
43 |
Adaptive Diffusion of Sensitive Information In
Online Social Networks |
DATA MINING |
JAVA |
|
44 |
Detecting Group Shilling Attacks in Online
Recommender Systems Based on Bisecting K-Means Clustering |
DATA MINING |
JAVA |
|
45 |
Active Online Learning for Social Media Analysis to
Support Crisis Management |
DATA MINING |
JAVA |
|
46 |
Location-Aware Service Recommendations With Privacy-
Preservation in the Internet of Things |
DATA MINING |
JAVA |
|
47 |
Cashless Society Managing Privacy and Security in
the Technological Age |
DATA MINING |
JAVA |
|
48 |
DGDFS Dependence Guided Discriminative Feature
Selection for Predicting Adverse Drug-Drug Interaction |
DATA MINING |
JAVA |
|
49 |
Movie Recommendation System Using Sentiment Analysis
From Micro blogging Data |
DATA MINING |
JAVA |
|
50 |
What and With Whom? Identifying Topics in Twitter
Through Both Interactions and Text |
DATA MINING |
JAVA |
|
51 |
Personalized Recommendation System based on
Collaborative Filtering for IoT
Scenarios |
DATA MINING |
JAVA |
|
52 |
Efficiently Processing Spatial and Keyword Queries
in Indoor Venues |
DATA MINING |
JAVA |
|
53 |
Evaluating Public Anxiety for Topic-based Communities
in Social Networks |
DATA MINING |
JAVA |
|
54 |
Multi-Party High-Dimensional Data Publishing under
Differential Privacy |
DATA MINING |
JAVA |
|
55 |
TAQE: Tweet Retrieval Based Infrastructure Damage
Assessment During Disasters |
DATA MINING |
JAVA |
|
56 |
A Sentiment Polarity Categorization Technique for
Online Product Reviews |
DATA MINING |
JAVA |
|
57 |
Characterizing the Propagation of Situational
Information in Social Media During COVID-19 Epidemic: A Case Study on Weibo |
DATA MINING |
JAVA |
|
58 |
Land Use Classification with Point of Interests and
Structural Patterns |
DATA MINING |
JAVA |
|
59 |
Feature Level Rating System Using Customer Reviews
and Review Votes |
DATA MINING |
JAVA |
|
60 |
Online Pricing with Reserve Price Constraint for
Personal Data Markets |
DATA MINING |
JAVA |
|
61 |
Predicting Hot Events in the Early Period through
Bayesian Model for Social Networks |
DATA MINING |
JAVA |
|
62 |
Predicting Student Performance in an Educational
Game Using a Hidden Markov Model |
DATA MINING |
JAVA |
|
63 |
Privacy Preserving Location Data Publishing A
Machine Learning Approach |
DATA MINING |
JAVA |
|
64 |
Product Quantized Collaborative Filtering |
DATA MINING |
JAVA |
|
65 |
Social Boosted Recommendation with Folded Bipartite
Network Embedding |
DATA MINING |
JAVA |
|
66 |
Emotion Correlation Mining Through Deep Learning
Models on Natural Language Text |
DATA MINING |
JAVA |
|
67 |
Emotion Detection in Online Social Networks: A
Multi-label Learning Approach |
DATA MINING |
JAVA |
|
68 |
Analyzing Product Usage Based on Twitter Users
Based on Data mining Process |
DATA MINING |
JAVA |
|
69 |
Review of Apriori based Frequent Itemset Mining Solutions on
Big Data |
DATA MINING |
JAVA |
|
70 |
Data Mining
and Feature Analysis of College Students’ Campus Network Behavior |
DATA MINING |
JAVA |
|
71 |
Crime Analysis Mapping, Intrusion Detection - Using Data Mining |
DATA MINING |
JAVA |
|
72 |
AdSherlock
Efficient and Deployable Click Fraud Detection for Mobile Applications |
MOBILE
COMPUTING |
JAVA |
|
73 |
PASPORT: A Secure
and Private Location Proof Generation and Verification Framework |
MOBILE
COMPUTING |
JAVA |
|
74 |
KOLLECTOR
Detecting Fraudulent Activities on Mobile Devices Using Deep Learning |
MOBILE
COMPUTING |
JAVA |
|
75 |
Detection of
Malicious Social Bots Using Learning Automata With URL Features in Twitter
Network |
SECURE
COMPUTING |
JAVA |
|
76 |
Automatically
Dismantling Online Dating Fraud |
SECURE COMPUTING |
JAVA |
|
77 |
DCAP: A Secure
and Efficient Decentralized Conditional Anonymous Payment System Based on
Block chain |
SECURE
COMPUTING |
JAVA |
|
78 |
Detection of
Social Network Spam Based on Improved Extreme Learning Machine |
SECURE
COMPUTING |
JAVA |
|
79 |
Identification of
Malicious Injection Attacks in Dense Rating and Co visitation Behaviors |
SECURE
COMPUTING |
JAVA |
|
80 |
Privacy-Preserving User Profile Matching in
Social Networks |
SECURE
COMPUTING |
JAVA |
|
81 |
Identification of
Malicious Injection Attacks in Dense Rating and Co-visitation Behaviors |
SECURE
COMPUTING |
JAVA |
|
82 |
SPCSS: Social
Network Based Privacy-Preserving Criminal Suspects Sensing |
SECURE
COMPUTING |
JAVA |
|
83 |
Using Improved
Conditional Generative Adversarial Networks to Detect Social Bots on Twitter |
SECURE
COMPUTING |
JAVA |
|
84 |
Modeling
Behavioral Dynamics for Asymmetric Application Layer DDoS Detection |
SECURE
COMPUTING |
JAVA |
|
85 |
Privacy-Preserving User Profile Matching in Social
Networks |
SECURE
COMPUTING |
JAVA |
|
86 |
Detecting and
Characterizing Extremist Reviewer Groups in Online Product Reviews |
MACHINE LEARNING |
JAVA |
|
87 |
Suicidal Ideation
Detection: A Review of Machine Learning Methods and Applications |
MACHINE LEARNING |
JAVA |
|
88 |
Human-in-the-Loop-Aided
Privacy-Preserving Scheme for Smart Healthcare |
EMERGING TOPICS IN COMPUTING |
JAVA |
|
89 |
Recommending
Activities for Mental Health and Well-being Insights from Two User Studies |
EMERGING TOPICS IN COMPUTING |
JAVA |
|
90 |
Credit Card
Transactions Data Adversarial Augmentation in the Frequency Domain |
BIG DATA |
JAVA |
|
91 |
Secure Channel
Free Certificate-Based Searchable Encryption Withstanding Outside and Inside
Keyword Guessing Attacks |
BIG DATA |
JAVA |
|
92 |
Scalable and
Secure Big Data IoT System
Based on Multifactor Authentication and Lightweight Cryptography |
BIG DATA |
JAVA |
|
93 |
Feature-Level Rating
System Using Customer Reviews and Review Votes |
NLP (Natural
Language Processing) |
JAVA |
|
94 |
A Trustworthy
Privacy Preserving Framework for Machine Learning in Industrial IoT Systems |
INTERNET OF THINGS (IOT) |
JAVA |
|
95 |
An Efficient
IoT-Based Platform for Remote Real Time Cardiac Activity Monitoring |
INTERNET OF THINGS (IOT) |
JAVA |
|
96 |
An Efficient
Privacy Preserving Message Authentication Scheme for Internet-of-Things |
INTERNET OF THINGS (IOT) |
JAVA |
|
97 |
An Efficient Spam
Detection Technique for IoT Devices using Machine Learning |
INTERNET OF THINGS (IOT) |
JAVA |
|
98 |
Decentralized
Lightweight Group Key Management for Dynamic Access Control in IoT
Environments |
INTERNET OF THINGS (IOT) |
JAVA |
|
99 |
Secure IoT Data
Outsourcing With Aggregate Statistics and Fine- Grained Access Control |
INTERNET OF THINGS (IOT) |
JAVA |
|
100 |
An efficient framework for privacy-preserving
computations on encrypted IoT data |
INTERNET OF THINGS (IOT) |
JAVA |
|
101 |
Benchmarking
Image Retrieval Diversification Techniques for Social Media |
IMAGE PROCESSING AND MULTIMEDIA |
JAVA |
|
102 |
Online Hashing
with Bit Selection for Image Retrieval |
IMAGE PROCESSING AND MULTIMEDIA |
JAVA |
|
103 |
Trust-Based Video
Management Framework for Social Multimedia Networks |
IMAGE PROCESSING AND MULTIMEDIA |
JAVA |
|
104 |
Crisis-Critical Intellectual Property Findings From
the COVID-19 Pandemic |
SOFTWARE
ENGINEERING |
JAVA |
|
105 |
Block chain based
Data Storage with Privacy and Authentication in Internet of Things |
BLOCK CHAIN |
JAVA |
|
106 |
Block chain-Based
Secure Computation Offloading in Vehicular Networks |
BLOCK CHAIN |
JAVA |
0 Comments