1. JAVA IEEE β 2016 PROJECTS LIST
S.NO
PROJECT
CODE PROJECT TITLE DOMAIN
1 J1601
Automatically Mining Facets for Queries from Their
Search Results
Data Mining
2 J1602
Building an intrusion detection system using a filter-
based feature selection algorithm
Data Mining
3 J1603
Crowd sourcing for Top-K Query Processing over
Uncertain Data
Data Mining
4 J1604
Domain-Sensitive Recommendation with User-Item
Subgroup Analysis
Data Mining
5 J1605
Connecting Social Media to E-Commerce: Cold-Start
Product Recommendation Using Microblogging
Information
Data Mining
6 J1606 Booster in High Dimensional Data Classification Data Mining
7 J1607
Cyberbullying Detection based on Semantic-Enhanced
Marginalized Denoising Auto-Encoder
Data Mining
8 J1608
Efficient Algorithms for Mining Top-K High Utility
Itemsets
Data Mining
9 J1609
Cross-Domain Sentiment Classification Using
Sentiment Sensitive Embeddings
Data Mining
10 J1610 Top-k Dominating Queries on Incomplete Data Data Mining
11 J1611
Mining User-Aware Rare Sequential Topic Patterns in
Document Streams
Data Mining
12 J1612
Location Aware Keyword Query Suggestion Based on
Document Proximity
Data Mining
13 J1613
Quantifying Political Leaning from Tweets, Retweets,
and Retweeters
Data Mining
14 J1614
TopicSketch: Real-time Bursty Topic Detection from
Twitter
Data Mining
15 J1615 Efficient Cache-Supported Path Planning on Roads Data Mining
16 J1616
Sentiment Embeddings with Applications to
Sentiment Analysis
Data Mining
17 J1617
Nearest Keyword Set Search in Multi-Dimensional
Datasets
Data Mining
18 J1618
Rating Prediction based on Social Sentiment from
Textual Reviews
Data Mining
19 J1619
Using Hash tag Graph-based Topic Model to Connect
Semantically-related Words without Co-occurrence in
Micro blogs
Data Mining
20 J1620
Relevance Feedback Algorithms Inspired By Quantum
Detection
Data Mining
2. JAVA IEEE β 2016 PROJECTS LIST
21 J1621
An Efficient File Hierarchy Attribute-Based
Encryption Scheme in Cloud Computing
Cloud Computing
22 J1622
CDA Generation and Integration for Health
Information Exchange Based on Cloud Computing
System
Cloud Computing
23 J1623
A Secure Anti-Collusion Data Sharing Scheme for
Dynamic Groups in the Cloud
Cloud Computing
24 J1624
A Secure and Dynamic Multi-Keyword Ranked
Search Scheme over Encrypted Cloud Data
Cloud Computing
25 J1625
An Efficient Privacy-Preserving Ranked Keyword
Search Method
Cloud Computing
26 J1626
Circuit Cipher text-Policy Attribute-Based Hybrid
Encryption with Verifiable Delegation in Cloud
Computing
Cloud Computing
27 J1627
Conjunctive Keyword Search With Designated Tester
and Timing Enabled Proxy Re-Encryption Function
for E-Health Clouds
Cloud Computing
28 J1628
Cloud Armor: Supporting Reputation-Based Trust
Management for Cloud Services
Cloud Computing
29 J1629
Fine-Grained Two-Factor Access Control for Web-
Based Cloud Computing Services
Cloud Computing
30 J1630
Conditional Identity-Based Broadcast Proxy Re-
Encryption and Its Application to Cloud Email
Cloud Computing
31 J1631
Dual-Server Public-Key Encryption With Keyword
Search for Secure Cloud Storage
Cloud Computing
32 J1632 Geometric Range Search on Encrypted Spatial Data Cloud Computing
33 J1633
Identity-Based Encryption with Cloud Revocation
Authority and Its Applications
Cloud Computing
34 J1634
Enabling Cloud Storage Auditing With Verifiable
Outsourcing of Key Updates
Cloud Computing
35 J1635
Protecting Your Right: Verifiable Attribute-Based
Keyword Search with Fine-Grained Owner-Enforced
Search Authorization in the Cloud
Cloud Computing
36 J1636
Identity-Based Proxy-Oriented Data Uploading and
Remote Data Integrity Checking in Public Cloud
Cloud Computing
37 J1637
Diplo Cloud: Efficient and Scalable Management of
RDF Data in the Cloud
Cloud Computing
38 J1638
TMACS: A Robust and Verifiable Threshold Multi-
Authority Access Control System in Public Cloud
Storage
Cloud Computing
39 J1639
Secure Data Sharing in Cloud Computing Using
Revocable-Storage Identity-Based Encryption
Cloud Computing
40 J1640
Real-Time Semantic Search Using Approximate
Methodology for Large-Scale Storage Systems
Cloud Computing
3. JAVA IEEE β 2016 PROJECTS LIST
41 J1641
Secure Optimization Computation Outsourcing in
Cloud Computing: A Case Study of Linear
Programming
Cloud Computing
42 J1642
DeyPoS: Deduplicatable Dynamic Proof of Storage
for Multi-User Environments
Cloud Computing
43 J1643
A Modified Hierarchical Attribute-Based Encryption
Access Control Method for Mobile Cloud Computing
Cloud Computing
44 J1644
Flexible and Fine-Grained Attribute-Based Data
Storage in Cloud Computing
Cloud Computing
45 J1645 SecRBAC: Secure data in the Clouds Cloud Computing
46 J1646
A Stable Approach for Routing Queries in
Unstructured P2P Networks
Networking
47 J1647
Spatial Reusability-Aware Routing in Multi-Hop
Wireless Networks
Networking
48 J1648
Opportunistic Routing With Congestion Diversity in
Wireless Ad Hoc Networks
Networking
49 J1649
STAMP: Enabling Privacy-Preserving Location
Proofs for Mobile Users
Networking
50 J1650 iPath: Path Inference in Wireless Sensor Networks Networking
51 J1651 Data Lineage in Malicious Environments
Secure
Computing
52 J1652 Detecting Malicious Facebook Applications
Secure
Computing
53 J1653
Inference Attack on Browsing History of Twitter
Users using Public Click Analytics and Twitter
Metadata
Secure
Computing
54 J1654
Contributory Broadcast Encryption with Efficient
Encryption and Short Ciphertexts
Secure
Computing
55 J1655
FRoDO: Fraud Resilient Device for Off-Line Micro-
Payments
Secure
Computing
56 J1656
Resolving Multi-party Privacy Conflicts in Social
Media
Secure
Computing
57 J1657 A Hop-by-Hop Routing Mechanism for Green Internet PDS
58 J1658
The Server Provisioning Problem for Continuous
Distributed Interactive Applications
PDS
59 J1659
Continuous Answering Holistic Queries over Sensor
Networks
PDS
60 J1660
Dictionary Based Secure Provenance Compression for
Wireless Sensor Networks
PDS
4. JAVA IEEE β 2016 PROJECTS LIST
61 J1661
EPLQ: Efficient Privacy-Preserving Location-Based
Query Over Outsourced Encrypted Data
Mobile
Computing
62 J1662
Detecting Node Failures in Mobile Wireless
Networks: A Probabilistic Approach
Mobile
Computing
63 J1663
Energy and Memory Efficient Clone Detection in
Wireless Sensor Networks
Mobile
Computing
64 J1664
Secure Overlay Routing Using Key Pre-Distribution:
A Linear Distance Optimization Approach
Mobile
Computing
65 J1665
Optimized Search-and-Compute Circuits and Their
Application to Query Evaluation on Encrypted Data
Information
Forensics &
Security
66 J1666
Profiling Online Social Behaviors for Compromised
Account Detection
Information
Forensics &
Security
67 J1667
Online Multi-Modal Distance Metric Learning with
Application to Image Retrieval
Image Processing
68 J1668 Tag Based Image Search by Social Re-ranking Image Processing
69 J1669
Learning of Multimodal Representations with Random
Walks on the Click Graph
Image Processing
70 J1670
A Scalable Approach for Content-Based Image
Retrieval in Peer to- Peer Networks
Image Processing