| +91 9790176891


« Previous



1. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud data

2. Cloud-Based Multimedia Content Protection System

3. Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption

4. Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Cloud

5. Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data

6. Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem

7. Identity-Based Distributed Provable Data Possession in Multicloud Storage

8. Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud

9. PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributed m-Healthcare Cloud Computing System

10. SelCSP: A Framework to Facilitate Selection of Cloud Service Providers


1. Discovery of Ranking Fraud for Mobile Apps

2. PAGE: A Partition Aware Engine for Parallel Graph Computation

3. Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites

4. Query Aware Determinization of Uncertain Objects


1. Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoustic Localization

2. Defeating Jamming With the Power of Silence: A Game-Theoretic Analysis

3. Universal Network Coding-Based Opportunistic Routing for Unicast


1. A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks

2. Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading in Wireless Sensor Networks

3. Optimal Configuration of Network Coding in Ad Hoc Networks

4. Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks


1. Authenticated Key Exchange Protocols for Parallel Network File Systems


1. Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems

2. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search

3. Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints

4. Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System


1. An Attribute-Assisted Reranking Model for Web Image Search

2. Automatic Face Naming by Learning Discriminative Affinity Matrices From Weakly Labeled Images

3. Detection and Rectification of Distorted Fingerprints

4. Eye Gaze Tracking With a Web Camera in a Desktop Environment

5. Learning Fingerprint Reconstruction: From Minutiae to Image

6. Multiview Alignment Hashing for Efficient Image Search

7. Single Image Superresolution Based on Gradient Profile Sharpness

8. Steganography Using Reversible Texture Synthesis


1. Location-Aware and Personalized Collaborative Filtering for Web Service




1. Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions

2. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation

3. Consistency as a Service: Auditing Cloud Consistency

4. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds

5. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases

6. Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation

7. Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage

8. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage

9. Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud

10. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data

11. Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds

12. A Hybrid Cloud Approach for Secure Authorized Deduplication

13. Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query


1. A Cocktail Approach for Travel Package Recommendation

2. An Empirical Performance Evaluation Of Relational Keyword Search Systems

3. LARS*: An Efficient and Scalable Location-Aware Recommender System

4. Product Aspect Ranking and Its Applications

5. Secure Mining of Association Rules in Horizontally Distributed Databases

6. Supporting Privacy Protection in Personalized Web Search

7. Trusted DB: A Trusted Hardware based Database with Privacy and Data Confidentiality

8. Typicality-Based Collaborative Filtering Recommendation

9. Collaborative Online Multitask Learning

10. Personalized Recommendation Combining User Interest and Social Circle

11. Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation


1. Content Caching and Scheduling in Wireless Networks With Elastic and Inelastic Traffic

2. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

3. An Overlay-Based Data Mining Architecture Tolerant to Physical Network Disruptions

4. Streaming Solutions for Fine-Grained Network Traffic Measurements and Analysis

5. Optimal Coordination of Mobile Sensors for Target Tracking Under Additive and Multiplicative Noises

6. Retransmission Delays with Bounded Packets: Power-Law Body and Exponential Tail


1. A Probabilistic Misbehavior Detection Scheme towards Efficient Trust Establishment in Delay-tolerant Networks

2. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis

3. An Error-Minimizing Framework for Localizing Jammers in Wireless Networks

4. Certificate less Remote Anonymous Authentication Schemes for Wireless Body Area Networks

5. Efficient Data Query in Intermittently-Connected Mobile Ad Hoc Social Networks

6. Multicast Capacity in MANET with Infrastructure Support

7. Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks

8. Transmission-Efficient Clustering Method for Wireless Sensor Networks Using Compressive Sensing

9. A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks

10. Distributed Channel Allocation Protocols for Wireless Sensor Networks

11. Localization-Oriented Network Adjustment in Wireless Ad Hoc and Sensor Networks


1. A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks

2. Autonomous Mobile Mesh Networks

3. DA-Sync: A Doppler-Assisted Time-Synchronization Scheme for Mobile Underwater Sensor Networks

4. Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected MANETs

5. Preserving Location Privacy in Geo social Applications

6. Fault Tolerant Localization and Tracking of Multiple Sources in WSNs Using Binary Data


1. Click Prediction for Web Image Reranking Using Multimodal Sparse Coding

2. Designing an Efficient Image Encryption-Then Compression System via Prediction Error Clustering and Random Permutation

3. A Food Recognition System for Diabetic Patients Based on an Optimized Bag-of-Features Model

4. Key logging-resistant Visual Authentication Protocols

5. Online Payment System using Steganography and Visual Cryptography

6. Sharing Visual Secrets in Single Image Random Dot Stereograms

7. Uniform Embedding for Efficient JPEG Steganography


1. Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems


1. Web Image Re-Ranking Using Query-Specific Semantic Signatures



1. An Adaptive Cloud Downloading Service

2. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems

3. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud

4. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring

5. Optimal Multiserver Configuration for Profit Maximization in Cloud Computing

6. Privacy-Preserving Public Auditing For Secure Cloud Storage

7. QoS Ranking Prediction for Cloud Services

8. Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data

9. Dynamic Audit Services for Outsourced Storages in Clouds

10. A Log-based Approach to Make Digital Forensics Easier on Cloud Computing

11. Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks

12. Cloud FTP: A Case Study of Migrating Traditional Applications to the Cloud

13. Privacy Preserving Delegated Access Control in Public Clouds


1. A New Algorithm for Inferring User Search Goals with Feedback Sessions

2. A Survey of XML Tree Patterns

3. Dynamic Personalized Recommendation on Sparse Data

4. Mining User Queries with Markov Chains: Application to Online Image Retrieval

5. Trusted DB: A Trusted Hardware based Database with Privacy and Data Confidentiality

6. A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments

7. Supporting Search-As-You-Type Using SQL in Databases

8. Secure Mining of Association Rules in Horizontally Distributed Databases


1. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks

2. EAACK—A Secure Intrusion-Detection System for MANETs

3. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing

4. Modeling the Pair wise Key Pre distribution Scheme in the Presence of Unreliable Links

5. Privacy Preserving Data Sharing With Anonymous ID Assignment

6. SORT: A Self-Organizing Trust Model for Peer-to-Peer Systems

7. Cost-Based Optimization of Service Compositions

8. Evolution of Social Networks Based on Tagging Practices


1. A Distributed Control Law for Load Balancing in Content Delivery Networks

2. A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks

3. An Efficient and Robust Addressing Protocol for Node Auto configuration in Ad Hoc Networks

4. BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments

5. Efficient Algorithms for Neighbor Discovery in Wireless Networks

6. Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality

7. Resource Allocation for QoS Support in Wireless Mesh Networks


1. Multicast Capacity in MANET with Infrastructure Support

2. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks

3. Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks

4. Attribute-Aware Data Aggregation Using Potential-Based Dynamic Routing in Wireless Sensor Networks


1. Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks

2. Cooperative Packet Delivery in Hybrid Wireless Mobile Networks: A Coalitional Game Approach

3. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks

4. Optimal Multicast Capacity and Delay Tradeoffs in MANETs

5. Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor Networks

6. Network-Assisted Mobile Computing with Optimal Uplink Query Processing

7. Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks

8. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks

9. Toward Accurate Mobile Sensor Network Localization in Noisy Environments


1. Query-Adaptive Image Search With Hash Codes

2. Reversible Data Hiding With Optimal Value Transfer

3. Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting

4. Local Directional Number Pattern for Face Analysis: Face and Expression Recognition

5. Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet Transform Shrinkage


1. Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information.

Other Work

« Previous