JAVA M.TECH PROJECT LIST
Sl. No |
2022& 2023 Project Title |
Year |
|
CLOUD COMPUTING |
|
1 |
Revocable Attribute-based Data Storage in Mobile Clouds |
2022 |
2 |
BOEW: A Content-based Image Retrieval Scheme using Bag-of-EncryptedWords in Cloud Computing |
2022 |
3 |
Cloud Raid: Detecting Distributed Concurrency Bugs via Log Mining and Enhancement |
2022 |
4 |
Data Integrity Audit Scheme Based on Blockchain Expansion Technology |
2022 |
5 |
Data Integrity Audit Based on Data Blinding for Cloud and Fog Environment |
2022 |
6 |
Achieving Efficient Secure Deduplication with User-Defined Access Control in Cloud |
2022 |
7 |
Efficient CP-ABE Scheme with Shared Decryption in Cloud Storage |
2022 |
8 |
An Efficient Public-Key Dual-Receiver Encryption Scheme |
2022 |
9 |
Identity-Based Privacy Preserving Remote Data Integrity Checking with a Designated Verifier |
2022 |
10 |
Efficient Identity-based Provable Multi-Copy Data Possession in Multi-Cloud Storage |
2022 |
11 |
Cloud-based Digital Twinning for Structural Health Monitoring Using Deep Learning |
2022 |
12 |
A Secure Clinical Diagnosis with Privacy-Preserving Multiclass Support Vector Machine in Clouds |
2022 |
13 |
Achieve Efficient and Verifiable Conjunctive and Fuzzy Queries over Encrypted Data in Cloud |
2022 |
14 |
A Secure Cloud Data Sharing Protocol for Enterprise Supporting Hierarchical Keyword Search |
2022 |
15 |
Distributed Ciphertext-Policy Attribute-Based Encryption with Enhanced Collusion Resilience and Privacy Preservation |
2022 |
16 |
DSAS: A Secure Data Sharing and Authorized Searchable Framework for e-Healthcare System |
2022 |
17 |
Efficient and Secure Attribute-based Access Control with Identical Sub-Policies Frequently Used in Cloud Storage |
2022 |
18 |
Adaptively Secure and Fast Processing of Conjunctive Queries over Encrypted Data |
2022 |
19 |
A Practical and Efficient Bidirectional Access Control Scheme for Cloud-Edge Data Sharing |
2022 |
20 |
Enabling Efficient, Secure and Privacy-preserving Mobile Cloud Storage |
2022 |
21 |
Enabling Verifiable and Dynamic Ranked Search Over Outsourced Data |
2022 |
22 |
Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage |
2022 |
23 |
Auction based Resource Allocation Mechanism in Federated Cloud Environment: TARA |
2022 |
24 |
Lightweight and Expressive Fine-grained Access Control for Healthcare Internet-of-Things |
2022 |
25 |
Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing |
2022 |
26 |
Multi-Access Filtering for Privacy-preserving Fog Computing |
2022 |
27 |
Privacy-Preserving Public Auditing for Shared Cloud Data with Secure Group Management |
2022 |
28 |
Revocable Identity-Based Access Control for Big Data with Verifiable Outsourced Computing |
2022 |
29 |
Secure and Lightweight Fine-grained Searchable Data Sharing for IoT-oriented and Cloud-assisted Smart Healthcare System |
2022 |
30 |
Secure Cloud Data Deduplication with Efficient Re-encryption |
2022 |
31 |
Server-Aided Fine-Grained Access Control Mechanism with Robust Revocation in Cloud Computing |
2022 |
32 |
Tag-based Verifiable Delegated Set Intersection over Outsourced Private Datasets |
2022 |
33 |
Toward Privacy-Preserving Healthcare Monitoring based on Time-Series Activities over Cloud |
2022 |
34 |
Trapdoor Privacy in Public Key Encryption with Keyword Search: A Review |
2022 |
35 |
Derided: A Verifiable Cloud Data Deduplication Scheme with Integrity and Duplication Proof |
2022 |
36 |
Verifiable Searchable Encryption Framework against Insider KeywordGuessing Attack in Cloud Storage |
2022 |
37 |
Web Cloud: Web-Based Cloud Storage for Secure Data Sharing across Platforms |
2022 |
38 |
Trust Based Incentive Scheme to Allocate Big Data Tasks with Mobile Social Cloud |
2022 |
39 |
PMRSS: Privacy-preserving Medical Record Searching Scheme for Intelligent Diagnosis in IoT Healthcare |
2022 |
40 |
Achieving Efficient and Privacy-Preserving Exact Set Similarity Search over Encrypted Data |
2022 |
|
|
|
|
BLOCKCHAIN |
|
1 |
A Secure E-Coupon Service Based on Blockchain Systems |
2022 |
2 |
A Blockchain Based System for Healthcare Digital Twin |
2022 |
3 |
Blockchain Traceability in Healthcare: Blood Donation Supply Chain |
2022 |
4 |
Privacy-Preserving Framework for Blockchain-Based Stock Exchange Platform |
2022 |
5 |
Blockchain-Based Electronic Health Records Management: A Comprehensive Review and Future Research Direction |
2022 |
6 |
Blockchain-Based Management for Organ Donation and Transplantation |
2022 |
7 |
Blockchain-based Management of Blood Donation |
2022 |
8 |
A Blockchain-Based Application System for Product Anti-Counterfeiting |
2022 |
9 |
Enabling Trust and Privacy-Preserving e-KYC System Using Blockchain |
2022 |
10 |
Fighting Fake News Propagation With Blockchains |
2022 |
11 |
Protecting Vaccine Safety: An Improved, Blockchain-Based, Storage-Efficient Scheme |
2022 |
12 |
Protecting Vaccine Safety: An Improved, Blockchain-Based, Storage-Efficient Scheme |
2022 |
13 |
Automatic Generation of Ethereum-Based Smart Contracts for Agri-Food Traceability System |
2022 |
14 |
Protecting Personal Healthcare Record Using Blockchain & Federated Learning Technologies |
2022 |
15 |
Integrating Healthcare Services Using Blockchain-Based Telehealth Framework |
2022 |
16 |
Anti-Counterfeit Product System Using Blockchain Technology |
2022 |
17 |
Use Chains to Block DNS Attacks: A Trusty Blockchain-based Domain Name System |
2022 |
18 |
A Blockchain Approach to Ensuring Provenance to Outsourced Cloud Data in a Sharing Ecosystem |
2022 |
19 |
VF Chain: Enabling Verifiable and Auditable Federated Learning via Blockchain Systems |
2022 |
20 |
Blockchain Bridges Critical National Infrastructures: E-Healthcare Data Migration Perspective |
2022 |
21 |
Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-based IIoT Networks |
2022 |
22 |
Blockchain as a Cyber Defence: Opportunities, Applications, and Challenges |
2022 |
23 |
Blockchain-Based Event Detection and Trust Verification Using Natural Language Processing and Machine Learning |
2022 |
24 |
Blockchain-Based Electronic Health Records Management: A Comprehensive Review and Future Research Direction |
2022 |
25 |
Decentralized Blockchain-Based Trust Management Protocol for the Internet of Things |
2022 |
26 |
Leveraging Blockchain for Scaffolding Work Management in Construction |
2022 |
27 |
Towards Blockchain-Based Secure Storage and Trusted Data Sharing Scheme for IoT Environment |
2022 |
28 |
Blockchain and IoT based Food Traceability for Smart Agriculture |
2022 |
29 |
Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-based IIoT Networks |
2022 |
|
|
|
|
DATA MINING |
|
|
|
|
1 |
A Unified Framework for User Identification across Online and Offline Data |
2022 |
2 |
Activity Organization for Friend-Making Optimization in Online Social Networks |
2022 |
3 |
Adaptively Secure and Fast Processing of Conjunctive Queries over Encrypted Data |
2022 |
4 |
Discovering Temporal Patterns for Event Sequence Clustering via Policy Mixture Model |
2022 |
5 |
Efficient Processing of Group Planning Queries Over Spatial-Social Networks |
2022 |
6 |
Evaluating Public Anxiety for Topic-based Communities in Social Networks |
2022 |
7 |
Feature Selection Algorithms for Predicting Students Academic Performance Using Data Mining Techniques |
2022 |
8 |
Hint CTI: A Cyber Threat Intelligence Modelling and Identification System Based on Heterogeneous Information Network |
2022 |
9 |
Incorporating Multi-Source Urban Data for Personalized and Context-Aware Multi-Modal Transportation Recommendation |
2022 |
10 |
Item Recommendation for Word-of-Mouth Scenario in Social E-Commerce |
2022 |
11 |
Modelling Health Stage Development of Patients with Dynamic Attributed Graphs in Online Health Communities |
2022 |
12 |
Modelling Product’s Visual and Functional Characteristics for Recommender Systems |
2022 |
13 |
Multi-Behaviour Sequential Recommendation with Temporal Graph Transformer |
2022 |
14 |
P Geo Topic: A Distributed Solution for Mining Geographical Topic Models |
2022 |
15 |
Predicting Hot Events in the Early Period through Bayesian Model for Social Networks |
2022 |
16 |
Principle-Based Approach for the De-Identification of Code-Mixed Electronic Health Records |
2022 |
17 |
Social Media Driven Big Data Analysis for Disaster Situation Awareness: A Tutorial |
2022 |
18 |
Social Recommendation with Characterized Regularization |
2022 |
19 |
The Dynamic Privacy-preserving Mechanisms for Online Dynamic Social Networks |
2022 |
20 |
Toward Predicting Active Participants in Tweet Streams: A case study on Two Civil Rights Events |
2022 |
21 |
User Identity Linkage via Co-Attentive Neural Network from Heterogeneous Mobility Data |
2022 |
22 |
User Identity Linkage via Co-Attentive Neural Network from Heterogeneous Mobility Data |
2022 |
|
|
|
|
DEPENDABLE & SECURE COMPUTING |
|
1 |
Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack |
2022 |
2 |
One Parameter Defence - Defending against Data Inference Attacks via Differential Privacy |
2022 |
3 |
An Explainable Multi-Modal Hierarchical Attention Model for Developing Phishing Threat Intelligence |
2022 |
4 |
Blockchain-based Certificate Transparency and Revocation Transparency |
2022 |
5 |
Crypto Maze: Privacy-Preserving Splitting of Off-Chain Payments |
2022 |
6 |
Cyber security Awareness in Online Education: A Case Study Analysis |
2022 |
7 |
Detecting Sybil Attacks using Proofs of Work and Location in VANETs |
2022 |
9 |
Representing Fine-Grained Co-Occurrences for Behaviour-Based Fraud Detection in Online Payment Services |
2022 |
10 |
Efficient Certificateless Multi-Copy Integrity Auditing Scheme Supporting Data Dynamics |
2022 |
11 |
Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme with Enhanced Security Provision |
2022 |
12 |
Entrapment: a Blockchain-Based Verification Protocol for Trust less Computing |
2022 |
13 |
Harnessing Policy Authenticity for Hidden Cipher text Policy Attribute Based Encryption |
2022 |
14 |
Harnessing Policy Authenticity for Hidden Cipher text Policy Attribute Based Encryption |
2022 |
15 |
Achieve Efficient and Privacy-preserving Disease Risk Assessment over Multioutsourced Vertical D |
2022 |
16 |
A Traceable and Revocable Cipher text-policy Attribute-based Encryption Scheme Based on Privacy Protection |
2022 |
17 |
PPCA - Privacy-Preserving Collision Avoidance for Autonomous Unmanned Aerial Vehicles |
2022 |
18 |
Privacy Preservation in Multi-Cloud Secure Data Fusion for InfectiousDisease Analysis |
2022 |
19 |
Distributed Ciphertext-Policy Attribute-Based Encryption with Enhanced Collusion Resilience and Privacy Preservation |
2022 |
20 |
SC-TRUST: A Dynamic Model for Trustworthy Service Composition in the Internet of Things |
2022 |
21 |
SPECBOX: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks |
2022 |
22 |
SSHC: A Secure and Scalable Hybrid Consensus Protocol for Shading Blockchains with a Formal Security Framework |
2022 |
23 |
Stick: An End-to-End Encryption Protocol Tailored for Social Network Platforms |
2022 |
24 |
Trust But Verify: a framework for the trustworthiness of distributed systems |
2022 |
25 |
Who Are the Phishers? Phishing Scam Detection on Ethereum via Network Embedding |
2022 |
26 |
On-the-Fly Privacy for Location Histograms |
2022 |
27 |
Quantum-Safe Round-Optimal Password Authentication for Mobile Devices |
2022 |
28 |
SAFE A General Secure and Fair Auction Framework for Wireless Markets with Privacy Preservation |
2022 |
29 |
SCA: Sybil-based Collusion Attacks of IIoT Data Poisoning in Federated Learning |
2022 |
30 |
A Real Time Firewall Policy Rule Set Anomaly Free Mechanism |
2022 |
|
|
|
|
SOCIAL COMPUTING & NETWORKS |
|
1 |
The Effect of Social Media User Behaviours on Security and Privacy Threats |
2022 |
2 |
A Taxonomy of Fake News Classification Techniques: Survey and Implementation Aspects |
2022 |
3 |
The Social Media Break-Up: Psycho-Behavioural Measures and Implications |
2022 |
4 |
Composite Behavioural Modelling for Identity Theft Detection in Online Social Networks |
2022 |
5 |
Social Spammer Detection via Convex Nonnegative Matrix Factorization |
2022 |
6 |
Social Engineering Attacks Prevention: A Systematic Literature Review |
2022 |
7 |
Cross-Platform Reputation Generation System Based on Aspect-Based Sentiment Analysis |
2022 |
8 |
Predictor: Predicting Mobility Patterns of Tourists Based on Social Media User's Profiles |
2022 |
9 |
DEA-RNN: A Hybrid Deep Learning Approach for Cyberbullying Detection in Twitter Social Media Platform |
2022 |
10 |
FADOHS: Framework for Detection and Integration of Unstructured Data of Hate Speech on Facebook Using Sentiment and Emotion Analysis |
2022 |
11 |
Fusing User Reviews into Heterogeneous Information Network Recommendation Model |
2022 |
12 |
Leveraging Multiple Relations for Fashion Trend Forecasting Based on social media |
2022 |
13 |
Modelling Influencer Marketing Campaigns in Social Networks |
|
14 |
Positive and Negative Behaviours of Oppositional Loyalty in Online Communities |
2022 |
15 |
Data-Driven Diffusion Recommendation in Online Social Networks for the Internet of People |
2022 |
16 |
Rating Prediction with Review Network Feedback: A New Direction in Recommendation |
2022 |
17 |
Sentiment Analysis of Customers' Reviews Using a Hybrid Evolutionary SVM-Based Approach in an Imbalanced Data |
2022 |
18 |
Service-Aware Personalized Item Recommendation |
2022 |
19 |
Social Media Popularity Prediction based on Multi-modal Self-Attention Mechanisms |
2022 |
20 |
Continuous Influence-based Community Partition for Social Networks |
2022 |
21 |
Consent Receipts for a Usable and Auditable Web of Personal Data |
2022 |
22 |
Template Aging in Multi-Modal Social Behavioural Biometrics |
2022 |
23 |
A Trust Risk Dynamic Management Mechanism Based on Third-Party Monitoring for the Conflict-Eliminating Process |
2022 |
24 |
An Influence Maximization Algorithm Based on Community-Topic Features for Dynamic Social Networks |
2022 |
25 |
Toward Data Justice Understanding Police Shooting Data Systems and Narratives |
2022 |
26 |
Vulnerability Detection in SIoT Applications A Fuzzing Method on their Binaries |
2022 |
27 |
Intelligent Distribution of Fresh Agricultural Products in Smart City |
2022 |
28 |
Influence Based Defence Against Data Poisoning Attacks in Online Learning |
2022 |
29 |
Detect DUI: An In-Car Detection System for Drink Driving and BACs |
2022 |
30 |
An Accurate and Efficient Large-scale Regression Method through Best Friend Clustering |
2022 |
|
|
|
|
CYBERNETICS |
|
1 |
Trustworthiness Assessment of Users in Social Reviewing Systems |
2022 |
2 |
A Learning-Based POI Recommendation with Spatiotemporal Context Awareness |
2022 |
3 |
False-Data-Injection Attacks on Remote Distributed Consensus Estimation |
2022 |
|
|
|
|
MOBILE COMPUTING |
|
1 |
Trust Based Incentive Scheme to Allocate Big Data Tasks with Mobile Social Cloud |
2022 |
2 |
User Community Identification Through Fine-Grained Mobility Records for Smart City Applications |
2022 |
3 |
Towards Personalized Privacy-Preserving Incentive for Truth Discovery in Mobile Crowd sensing Systems |
2022 |
4 |
Share On: Shared Resource Dynamic Container Migration Framework for Real-Time Support in Mobile Edge Clouds |
2022 |
5 |
Secure Mobile Edge Computing Networks in the Presence of Multiple Eavesdroppers |
2022 |
6 |
Profit and Satisfaction Aware Order Assignment for Online Food Delivery Systems Exploiting Water Wave Optimization |
2022 |
7 |
Privacy-Preserving Data Integrity Verification for Secure Mobile Edge Storage |
2022 |
8 |
Normalized Attraction Travel Personality Representation for Improving Travel Recommender Systems |
2022 |
9 |
Membership Inference Attack and Defence for Wireless Signal Classifiers with Deep Learning |
2022 |
10 |
Eclipse: Preserving Differential Location Privacy Against Long-Term Observation Attacks |
2022 |
11 |
Anonymous authenticated key agreement and group proof protocol for wearable computing |
2022 |
12 |
Identity-Based Attack Detection and Classification Utilizing Reciprocal RSS Variations in Mobile Wireless Networks |
2022 |
|
|
|
|
IMAGE PROCESSING & MULTIMEDIA |
|
1 |
Show, Price and Negotiate a Negotiator with Online Value Look-Ahead |
2022 |
2 |
Multi-modal Meta Multi-Task Learning for Social Media Rumour Detection |
2022 |
3 |
A Novel Adaptive Hybrid Fusion Network for Multiresolution Remote Sensing Images Classification |
2022 |
4 |
Asymmetric Hash Code Learning for Remote Sensing Image Retrieval |
2022 |
5 |
Content-Based Remote Sensing Image Retrieval Based on Fuzzy Rules and a Fuzzy Distance |
2022 |
6 |
Similarity Search for Encrypted Images in Secure Cloud Computing |
2022 |
7 |
Global-Aware Ranking Deep Metric Learning for Remote Sensing Image Retrieval |
2022 |
8 |
Global-Aware Ranking Deep Metric Learning for Remote Sensing Image Retrieval |
2022 |
9 |
Learning a Model-Driven Variational Network for Deformable Image Registration |
2022 |
10 |
SAC: Semantic Attention Composition for Text-Conditioned Image Retrieval |
2022 |
11 |
Scalable Distributed Hashing for Approximate Nearest Neighbour Search |
2022 |