Beruflich Dokumente
Kultur Dokumente
InfoTech, Bangalore
#1510,Sri Gowri Shankara Complex, 2nd Floor,MKK Road, Near Harishchandra Ghat,
Mariyappanapalya, Rajajinagar 2nd Stage, Bangalore - 560021.
Contact :: K.Manjunath -- 09535866270
Sl.
Project Title
No
Yea
r
Cloud Computing
1
2
2016
2016
2016
4
5
6
7
8
9
2016
2016
2016
2016
2016
2016
10
11
Based Encryption
Malware Detection in Cloud Computing Infrastructures
Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates
2016
2016
12
13
14
2016
2016
2016
15
Services
Protecting Your Right: Attribute-based Keyword Search with Fine-grained
2016
16
2016
17
18
2016
2016
19
20
2016
2016
21
Cloud Email
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted
2016
22
23
Cloud Data
A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
CD Store: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via
2016
2016
24
Convergent Dispersal
Circuit Cipher text-policy Attribute-based Hybrid Encryption with Verifiable
2016
25
2016
26
Services
Privacy Preserving Ranked Multi Keyword Search for Multiple Data Owners in
2016
27
Cloud Computing
Reducing Fragmentation for In line De duplication Backup Storage via
2016
28
2016
29
2016
30
Computing
Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy
2016
31
2016
32
Storage
Real-Time Semantic Search Using Approximate Methodology for Large Scale
2016
33
34
Storage Systems
Geometric Range Search on Encrypted Spatial Data
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub
2016
2016
35
2016
36
37
2016
2016
38
39
40
41
2016
2016
2016
2016
42
2016
43
44
2016
2016
45
and-Sharing in Cloud
Leveraging Data De duplication to Improve the Performance of Primary Storage
2016
48
2016
2016
2016
49
50
Clouds
Encrypted Data Management with Deduplication in Cloud Computing
Enabling Personalized Search over Encrypted Outsourced Data with Efficiency
2016
2016
46
47
Improvement
2016
2016
2016
2016
Avoidance
Secure Transmission Against Pilot Spoofing Attack: A Two-Way Training-Based
2016
Scheme
Secure Reversible Image Data Hiding over Encrypted Domain via Key
2016
Modulation
Hierarchical and Shared Access Control
2016
2016
9
10
11
12
13
Assumptions
GeTrust: A guarantee-based trust model in Chord-based P2P networks
FRoDO: Fraud Resilient Device for Off-line micro-payments
Formal Verification of the xDAuth Protocol
Fast Detection of Transformed Data Leaks
Privacy-Preserving Outsourced Association Rule Mining on Vertically
2016
2016
2016
2016
2016
14
Partitioned Databases
Inference Attack on Browsing History of Twitter Users using Public Click
2016
15
16
17
2016
2016
2016
19
Auto-Encoder
Profiling Online Social Behaviors for Compromised Account Detection
Optimized Search-and-Compute Circuits and Their Application to Query
2016
2016
20
2016
21
2016
22
2016
18
Data Mining
1
2
3
2016
2016
2016
4
5
6
Clustering
Quantifying Political Leaning from Tweets, Re tweets, and Re tweeters
RSkNN: kNN Search on Road Networks by Incorporating Social Influence
Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings
2016
2016
2016
7
8
9
10
A Novel Recommendation Model Regularized with User Trust and Item Ratings
Automatically Mining Facets for Queries from Their Search Results
Booster in High Dimensional Data Classification
Connecting Social Media to E-Commerce Cold-Start Product Recommendation
2016
2016
2016
2016
11
12
13
2016
2016
2016
14
15
System
Inverted Linear Quad tree: Efficient Top K Spatial Keyword Search
kNNVWC An Efficient k-Nearest Neighbors Approach Based on Various-Widths
2016
2016
16
17
18
19
Clustering
Location Aware Keyword Query Suggestion Based on Document Proximity
Mining User-Aware Rare Sequential Topic Patterns in Document Streams
Nearest Keyword Set Search in Multi-Dimensional Datasets
Practical Approximate k Nearest Neighbor Queries with Location and Query
2016
2016
2016
2016
23
24
Privacy
Sentiment Embeddings with Applications to Sentiment Analysis
Top-Down XML Keyword Query Processing
Topic Sketch Real-time Bursty Topic Detection from Twitter
Top-k Dominating Queries on Incomplete Data
Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Item set
25
2016
26
27
Databases
Understanding Short Texts through Semantic Enrichment and Hashing
Cross-Platform Identification of Anonymous Identical Users in Multiple Social
2016
2016
28
29
30
31
32
33
Media Networks
Explicit Minimum Storage Regenerating Codes
Private Over-threshold Aggregation Protocols over Distributed Datasets
MAVE: Multilevel wrApper Verification systEm
Personalized travel sequence recommendation on multi score Big social media
A Mixed Generative-Discriminative Based Hashing Method
Text mining to the contributors to rail accidents
2016
2016
2016
2016
2016
2016
20
21
22
2016
2016
2016
2016
34
35
2016
2016
36
37
38
algorithm
Domain-Sensitive Recommendation with User-Item Subgroup Analysis
Efficient Algorithms for Mining Top-K High Utility Item sets
Using Hash tag Graph-Based Topic Model to Connect Semantically-Related
2016
2016
2016
39
40
2016
2016
41
42
43
2016
2016
2016
44
2016
Mobile Computing
1
2016
Messaging Apps
Filtering of Brand-related
Multiview
2016
Embedding
Distributed and Fair Beaconing Congestion Control Schemes for Vehicular
2016
Networks
Secure Overlay Routing Using Key Pre-Distribution
A Linear Distance
2016
5
6
Optimization Approach
Towards Information Diffusion in Mobile Social Networks
Design and Analysis of an Efficient Friend-to-Friend Content Dissemination
2016
2016
System
Covering the Sensitive Subjects to Protect Personal Privacy in Personalized
2016
Recommendation
DaGCM A Current Data Uploading framework for mobile data gathering in
2016
Microblogs
using
Social-Smooth
2016
10
WSNs
WORAL A Witness Oriented Secure Location Provenance Framework for Mobile
2016
11
Devices
EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced
2016
12
Encrypted Data
Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach
2016
2016
2016
2016
2016
5
6
Networks
PKC-Based DoS Attacks-Resistant Scheme in Wireless Sensor Networks
Cluster-Based Routing for the Mobile Sink in Wireless Sensor Networks With
2016
2016
Obstacle
CANS Towards Congestion-Adaptive and Small Stretch Emergency Navigation
2016
8
9
with WSNs
NACRP A Connectivity Protocol for Star Topology Wireless Sensor Networks
DaGCM A Concurrent Data Uploading Framework for Mobile Data Gathering in
2016
2016
10
11
2016
2016
12
2016
13
14
Transfaulty Nodes
Dynamic Cluster Head Selection Method for Wireless Sensor Network
Duplicate Detectable Opportunistic Forwarding in Duty-Cycled Wireless Sensor
2016
2016
15
Network
Towards Distributed Optimal Movement Strategy for Data Gathering in Wireless
2016
Sensor Networks
16
17
Location aware sensor routing protocol for mobile wireless sensor networks
Mobile Coordinated Wireless Sensor Network An Energy Efficient Scheme for
2016
2016
18
2016
multiple sinks
Android Projects
1
2
2016
2016
Devices.
MADAM: Effective and Efficient Behavior-based Android Malware Detection
2016
4
5
and Prevention.
Authentication of Smartphone Users Using Behavioral Biometrics
Droid Detector: Android malware characterization and detection using deep
2016
2016
learning
EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced
2016
7
8
9
10
11
Encrypted Data
A Shoulder Surfing Resistant Graphical Authentication System
Pass BY OP Bring Your Own Picture for Securing Graphical Passwords
Privacy Preserving Location Sharing Services for Social Networks
SBVLC: Secure barcode-based visible light communication for smart phones
SenSpeed: Sensing Driving Conditions to Estimate Vehicle Speed in Urban
2016
2016
2016
2016
2016
12
13
14
Environments
ALTERDROID: Differential Fault Analysis of Obfuscated Smartphone Malware
Towards Information Diffusion in Mobile Social Networks
Understanding Smartphone Sensor and App Data for Enhancing the Security of
2016
2016
2016
15
Secret Questions
Designing a Secure Exam Management System (SEMS) for M-Learning
2016
Environments
1
2
3
4
5
6
7
8
2016
2016
2016
2016
2016
2016
2016
2016
12
13
2016
2016
2016
2016
2016
2016
2016
2016
2016
2016
2016
2016
2016
14
15
Cloud Computing
Graph Regularized Feature Selection with Data Reconstruction
Secure Multi-Attribute One-to-Many Bilateral Negotiation Framework for E-
2016
2016
16
17
18
Commerce
Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage
Efficient Certificate less Access Control for Wireless Body Area networks
Finding non equivalent classifiers in Boolean space to reduce TCAM Usage
2016
2016
2016
1
2
3
4
5
6
7
8
9
10
11
19
20
21
2016
2016
2016
22
Networks
Personalizing Sample Databases With Facebook Information to Increase Intrinsic
2016
Motivation
2016
Networks
Online Multi-Modal Distance Metric Learning with Application to Image
2016
Retrieval
Secure Reversible Image Data Hiding over Encrypted Domain via Key
2016
4
5
6
Modulation
Social Friend Recommendation Based on Multiple Network Correlation
User-Service Rating Prediction by Exploring Social Users Rating Behaviors
A Locality Sensitive Low-Rank Model for Image Tag Completion
2016
2016
2016
7
8
Image
2016
2016
11
12
13
14
15
Transformation
Tag Based Image Search by Social Re-ranking
Semantic Discriminative Metric Learning for Image Similarity Measurement
Semantic Concept Co-occurrence Patterns for Image Annotation and Retrieval
Multi-Modal Event Topic Model for Social Event Analysis
Learning from Weak and Noisy Labels for Semantic Segmentation
Content Adaptive Steganography by Minimizing Statistical Detectability
Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature
2016
2016
2016
2016
2016
2016
2016
16
17
18
2016
2016
2016
9
10
Feedback
19
Filtering
of
Brand-related
Microblogs
using
Social-Smooth
Multiview
2016
1
2
2016
2016
Networks
The Server Provisioning Problem for Continuous Distributed Interactive
2016
4
5
Applications
Authenticated Key Exchange Protocols for Parallel Network File Systems
Real-time Semantic Search using Approximate Methodology for Large-scale
2016
2016
Storage Systems
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted
2016
7
8
Cloud Data
An Efficient Privacy-Preserving Ranked Keyword Search Method
Real-Time Semantic Search Using Approximate Methodology for Large-Scale
2016
2016
9
10
Storage Systems
Dictionary Based Secure Provenance Compression for Wireless Sensor Networks
The Server Provisioning Problem for Continuous Distributed Interactive
2016
2016
11
Applications
Contributory Broadcast Encryption with Efficient Encryption and Short Cipher
2016
Embedding
texts
Service Computing,Computers,IOT
1
2
2016
2016
texts
EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced
2016
Encrypted Data
2016
Software Engineering
1
2016
2016
3
4
Engines
SITAR GUI Test Script Repair
Answering Approximate queries Over XML Data