1. IEEE CSE TITLES 2019-20
I.CLOUD COMPUTING
S.NO TITLES YEAR
1 A Practical Attribute-Based Document Collection
Hierarchical Encryption Scheme in Cloud Computing
2019
2 A Trust-Based Agent Learning Model for Service
Composition in Mobile Cloud Computing Environments
2019
3 Dynamic Multi-Keyword Ranked Search Based on Bloom
Filter Over Encrypted Cloud Data
2019
4 Reliability and Availability Evaluation for Cloud Data
Center Networks Using Hierarchical Models
2019
5 Verifiable and Multi-keyword Searchable Attribute-based
Encryption Scheme for Cloud Storage
2019
6 Hidden Cipher text Policy Attribute-Based Encryption with
Fast Decryption for Personal Health Record System
2019
7 A Lightweight Secure Auditing Scheme for Shared Data in
Cloud Storage
2019
8 Practical Attribute-Based Document Collection
Hierarchical Encryption Scheme in Cloud Computing
2019
9 Dynamic Cloud Network Control Under Reconfiguration
Delay and Cost
2019
10 Novel Multi-Keyword Search on Encrypted Data in the
Cloud
2019
11
Privacy-aware Personal Data Storage (P-PDS) Learning
how to Protect User Privacy from External Applications 2019
12 Privacy-Preserving Attribute-Based Keyword Search in
Shared Multi-owner Setting
2019
13 SEPTIC Detecting Injection Attacks and Vulnerabilities
Inside the DBMS
2019
2. 14 V-Matrix-Based Scalable Data Aggregation Scheme in
WSN
2019
15 Dynamic Demand Prediction and Allocation in Cloud
Service Brokerage
2019
16 Towards AI-Powered Multiple Cloud Management 2019
17 A Fog-centric Secure Cloud Storage Scheme 2019
18 A New Encrypted Data Switching Protocol: Bridging IBE and
ABE Without Loss of Data Confidentiality
2019
19 An Attribute-Based Controlled Collaborative Access Control
Scheme for Public Cloud Storage
2019
20 CHARON: A Secure Cloud-of-Clouds System for Storing
and Sharing Big Data
2019
21 Crypt-DAC: Cryptographically Enforced Dynamic Access
Control in the Cloud
2019
22 Design of Secure Authenticated Key Management Protocol
for Cloud Computing Environments
2019
23 Fast Boolean Queries With Minimized Leakage for Encrypted
Databases in Cloud Computing
2019
24 FS-PEKS: Lattice-based Forward Secure Public-key
Encryption with Keyword Search for Cloud-assisted
Industrial Internet of Things
2019
25 Secure Data Group Sharing and Conditional Dissemination
with Multi-Owner in Cloud Computing
2019
26 The Soft Underbelly of Cloud Security 2019
27 Enabling Verifiable and Dynamic Ranked Search Over
Outsourced Data
2019
28 A Data Sharing Protocol to Minimize Security and Privacy
Risks of Cloud Storage in Big Data Era
2019
29 A Secure Searchable Encryption Framework for Privacy-
Critical Cloud Storage Services
2019
30 Achieve Privacy-Preserving Priority Classification on Patient 2019
3. Health Data in Remote eHealth care System
31 Data Integrity Auditing without Private Key Storage for
Secure Cloud Storage
2019
32 Enabling Authorized Encrypted Search for Multi-Authority
Medical Databases
2019
33 Fuzzy Identity-Based Data Integrity Auditing for Reliable
Cloud Storage Systems
2019
34 P-MOD: Secure Privilege-Based Multilevel Organizational
Data-Sharing in Cloud Computing
2019
35 Practical Privacy-Preserving MapReduce Based K-means
Clustering over Large-scale Dataset
2019
36 Profit Maximization for Cloud Brokers in Cloud Computing 2019
37 Provable Data Possession with Outsourced Data Transfer 2019
38 Provably Secure Fine-Grained Data Access Control over
Multiple Cloud Servers in Mobile Cloud Computing Based
Healthcare Applications
2019
39 Revocable Identity-Based Broadcast Proxy Re-encryption for
Data Sharing in Clouds
2019
40 Searchable Symmetric Encryption with Forward Search
Privacy
2019
41 Privacy Preserving Searchable Encryption with Fine-grained
Access Control
2019
42 A Secure G-Cloud-Based Framework for Government
Healthcare Services
2019
II.SECURE COMPUTING
S.NO TITLE YEAR
1 Traffic Analysis Attack for Identifying Users’ Online
Activities
2019
2 Coverless Information Hiding Method Based on Web
Text
2019
4. 3 Automated Decision Making in Airport Checkpoints:
Bias Detection Toward Smarter Security and Fairness
2019
4 A Lightweight Privacy-Preserving CNN Feature
Extraction Framework for Mobile Sensing
2019
5 LBOA: Location-Based Secure Outsourced Aggregation
in IoT
2019
6 Looking Back! Using Early Versions of Android Apps as
Attack Vectors
2019
7 Towards Thwarting Template Side-channel Attacks in
Secure Cloud Deduplications
2019
8 Toward Edge-Assisted Internet of Things: From Security
and Efficiency Perspectives
2019
9 SEPTIC Detecting Injection Attacks and Vulnerabilities
Inside the DBMS
2019
10 Detecting Malicious Social Bots Based on Click stream
Sequences
2019
11 Authenticated Medical Documents Releasing with
Privacy Protection and Release Control
2019
12 Collusion Defender: Preserving Subscribers’ Privacy in
Publish and Subscribe Systems
2019
13 Privacy-Preserving Aggregate Queries for Optimal
Location Selection
2019
14 Privacy-Preserving Attribute-Based Keyword Search in
Shared Multi-owner Setting
2019
15 Privacy-Preserving Multi-keyword Top-k Similarity
Search Over Encrypted Data
2019
16 Sensitive Label Privacy Preservation with Anatomization
for Data Publishing
2019
5. 17 Towards Achieving Keyword Search over Dynamic
Encrypted Cloud Data with Symmetric-Key Based
Verification
2019
18 Who You Should Not Follow: Extracting Word
Embeddings from Tweets to Identify Groups of Interest
and Hijackers in Demonstrations
2019
III.DATA MINING
S.NO TITLE YEAR
1 A Novel Load Image Profile-Based Electricity Load
Clustering Methodology
2019
2 Predicting the Impact of Android Malicious Samples via
Machine Learning
2019
3 NASM: Nonlinearly Attentive Similarity Model for
Recommendation System via Locally Attentive Embedding
2019
4 Network Representation Learning Enhanced
Recommendation Algorithm
2019
5 DCCR: Deep Collaborative Conjunctive Recommender for
Rating Prediction
2019
6 Motion Based Inference of Social Circles via Self-Attention
and Contextualized Embedding
2019
7 Composition Context-Based Web Services Similarity
Measure
2019
8 Neural Binary Representation Learning for Large-Scale
Collaborative Filtering
2019
9 Clustering-Based Collaborative Filtering Using an
Incentivized/Penalized User Model
2019
10 A Hierarchical Attention Model for Social Contextual
Image Recommendation
2019
11 Visualizing Three-Dimensional Ocean Eddies in Web 2019
12 A Query-based Framework for Searching, Sorting, and 2019
6. Exploring Data Ensembles
13 BD2K Training Coordinating Center's Erudite: the
Educational Resource Discovery Index for Data Science
2019
14 A Particle Swarm Optimized Learning Model of Fault
Classification in Web-Apps
2019
15 Mining Users Trust From E-Commerce Reviews Based on
Sentiment Similarity Analysis
2019
16 Old and Young Users’ White Space Preferences for Online
News Web Pages
2019
17 A Generalized Locally Linear Factorization Machine with
Supervised Variation Encoding
2019
18 Analysis and Accurate Prediction of User’s Response
Behavior in Incentive-Based Demand Response
2019
19 Trust Relationship Prediction in Alibaba E-Commerce
Platform
2019
20 An Efficient Method for High Quality and Cohesive
Topical Phrase Mining
2019
21 Credibility Evaluation of Twitter-Based Event Detection by
a Mixing Analysis of Heterogeneous Data
2019
22 Filtering Instagram hash tags through crowd tagging and the
HITS algorithm
2019
23 A Hybrid E-learning Recommendation Approach Based on
Learners’ Influence Propagation
2019
24 Active Online Learning for Social Media Analysis to
Support Crisis Management
2019
25 Applying Simulated Annealing and Parallel Computing to
the Mobile Sequential Recommendation
2019
26 Collaboratively Tracking Interests for User Clustering in 2019
7. Streams of Short Texts
27 Detecting Pickpocket Suspects from Large-Scale Public
Transit Records
2019
28 Finding Optimal Skyline Product Combinations under Price
Promotion
2019
29 Heterogeneous Information Network Embedding for
Recommendation
2019
30 Hierarchical Multi-Clue Modeling for POI Popularity
Prediction with Heterogeneous Tourist Information
2019
31 K-nearest Neighbor Search by Random Projection Forests 2019
32 Learning Customer Behaviors for Effective Load
Forecasting
2019
33 Normalization of Duplicate Records from Multiple Sources 2019
34 On Scalable and Robust Truth Discovery in Big Data Social
Media Sensing Applications
2019
35 Privacy-Preserving Social Media Data Publishing for
Personalized Ranking-Based Recommendation
2019
36 Secure and Efficient Skyline Queries on Encrypted Data 2019
37 Predicting Consumption Patterns with Repeated and Novel
Events
2019
38 Multi-Party High-Dimensional Data Publishing under
Differential Privacy
2019
39 Minimizing Influence of Rumors by Blockers on Social
Networks: Algorithms and Analysis
2019
8. 40 Detection of fake online reviews using semi-supervised and
supervised learning
2019
41 Collaborative Filtering-based Electricity Plan
Recommender System
2019
IV.BLOCK CHAIN TECHNOLOGY
S.NO TITLE YEAR
1 PBCert: Privacy-Preserving Block chain-Based Certificate
Status Validation Toward Mass Storage Management
2019
2 Blockchain for AI: Review and Open Research Challenges 2019
3 Block chain-Based Public Integrity Verification for Cloud
Storage against Procrastinating Auditors
2019
V.MACHINE LEARNING
S.NO TITLE YEAR
1 Towards Efficient U-Nets: A Coupled and Quantized
Approach
2019
2 Inferring Salient Objects from Human Fixations 2019
3 ROAM: a Rich Object Appearance Model with
Application to Rotoscoping
2019
4 End-to-end Active Object Tracking and Its Real-world
Deployment via Reinforcement Learning
2019
VI.BIG DATA
S.NO TITLE YEAR
1 Comparison of Swam Intelligence Clustering Algorithms
for Analysis of Big Data in Healthcare
2019
2 Effective and Efficient Content Redundancy Detection of
Web Videos
2019
3 Incorporating Data Context to Cost-Effectively Automate
End-to-End Data Wrangling
2019
4 Sentiment Analysis of Comment Texts Based on BiLSTM 2019
9. 5 Data Interpolation and Reconstruction 2019
6 Large-Margin Regularized Soft max Cross-Entropy Loss 2019
VII.SOCIAL NETWORK
S.NO TITLE YEAR
1 A Hybrid Approach to Service Recommendation Based on
Network Representation Learning
2019
2 Social Network Rumor Diffusion Predication Based on
Equal Responsibility Game Model
2019
3 Fundamental Visual Concept Learning from Correlated
Images and Text
2019
VIII.SOFTWARE ENGINEERING
S.NO TITLE YEAR
1 Scheduling real time security aware tasks in fog networks 2019
2 Platform-Independent Dynamic Taint Analysis for
JavaScript
2019
IX.FUZZY SYSTEM
S.NO TITLE YEAR
1 Epistasis Analysis Using an Improved Fuzzy C-means-based
Entropy Approach
2019
2 Intelligent Security Planning for Regional Distributed Energy
Internet
2019
X.ANDROID PROJECTS
S.NO TITLE year
1 RescueMe: Smartphone-Based Self Rescue System for
Disaster Rescue
2019
(IEEE)
10. 2 FallDroid: An Automated Smart Phone based Fall Detection
System using Multiple Kernel Learning
2019
(IEEE)
3 Dating with Scambots: Understanding the Ecosystem of
Fraudulent Dating Applications
2019
(IEEE)
4 Applying Simulated Annealing and Parallel Computing to the
Mobile Sequential Recommendation
2019
(IEEE)
5 An Indoor Position-Estimation Algorithm Using Smartphone
IMU Sensor Data
2019
(IEEE)
6 Achieve Privacy-Preserving Priority Classification on Patient
Health Data in Remote eHealthcare System
2019
(IEEE)
7 Blood banking 2018
8 Unified locality management system 2018
9 College management system 2018
10 Former forum 2018
11 Hospital Management System 2018
12 Google Maps
Application
2018
13 News Application 2018
14 Offline Mobile Management Tec knowledge 2018
15 Placement Assistance 2018
16 Placement Management
System
2018
`17 Uber application 2018
18 Online Blood Banking 2018
19 College Event Management
System
2018
11. XI.CYBER SECURITY
S.NO TITLE Year
1 Predicting Cyber bullying on Social Media in the Big Data
Era Using Machine Learning Algorithms: Review of
Literature and Open Challenges
2019
2 Spammer Detection and Fake User Identification on Social
Networks
2019
3 Ant Colony Stream Clustering: A Fast Density Clustering
Algorithm for Dynamic Data Streams
2019
XII.IMAGE PROCESSING AND MULTI MEDIA
S.NO TITLE YEAR
1 Fundamental Visual Concept Learning from Correlated
Images and Text
2019
2 Trust-based Privacy-Preserving Photo Sharing in Online
Social Networks
2019
3 Towards Robust Image Stegnography 2019
20 Emergency Call 2018
21 Agriculture Update Send Via SMS 2018
12. XIII.INTERNET OF THINGS
S.NO TITLE YEAR
1 Secure Phrase Search for Intelligent Processing of Encrypted
Data in Cloud-Based IoT
2019
2 Securing Data in Internet of Things (IoT) Using
Cryptography and Steganography Techniques
2019
3 Trustworthy Delegation toward Securing Mobile Healthcare
Cyber-Physical Systems
2019
4 Hybrid Keyword-Field Search with Efficient Key
Management for Industrial Internet of Things
2019
5 Trustworthy Delegation toward Securing Mobile Healthcare
Cyber-Physical Systems
2019
6 Securing Data in Internet of Things (IoT) Using
Cryptography and Steganography Techniques
2019
XIV.MOBILE COMPUTING
S.NO TITLE YEAR
1 An Indoor Position-Estimation Algorithm Using Smartphone
IMU Sensor Data
2019
2 FooDNet: Toward an Optimized Food Delivery Network
based on Spatial Crowd sourcing
2019
3 Privacy-preserving Crowd-sourced Statistical Data Publishing 2019
13. with An Untrusted Server
XV.PARALLEL AND DISTRIBUTED SYSTEMS
S.NO TITLE YEAR
1 A Distributed Trust Evaluation Protocol with Privacy
Protection for Inter cloud
2019
2 Deadline-aware Map Reduce Job Scheduling with Dynamic
Resource Availability
2019
XVI.SERVICE COMPUTING
S.NO TITLE YEAR
1 Transactional Behavior Verification in Business Process as a
Service Configuration
2019
2 Building and Querying an Enterprise Knowledge Graph 2019
3 Delegated Authorization Framework for EHR Services using
Attribute Based Encryption
2019
4 Secure Channel Free Certificate-Based Searchable Encryption
Withstanding Outside and Inside Keyword Guessing Attacks
2019
XVII.WIRELESS SENSOR NETWORKS
S.NO TITLE YEAR
1 V-Matrix-Based Scalable Data Aggregation Scheme in WSN 2019
2 A Probabilistic Source Location Privacy Protection Scheme
in Wireless Sensor Networks
2019
14. 3 Memory Leakage-Resilient Dynamic and Verifiable Multi-
keyword Ranked Search on Encrypted Smart Body Sensor
Network Data
2019
4 Primary User-aware Optimal Discovery Routing for
Cognitive Radio Networks
2019
5 A Probabilistic Source Location Privacy Protection Scheme
in Wireless Sensor Networks
2019
XVIII.PYTHON
S.NO TITLE YEAR
1 A Distributed Trust Evaluation Protocol with Privacy
Protection for Intercloud
2018
2 A Secure Searchable Encryption Framework for Privacy-
Critical Cloud Storage Services
2018
3 Crypt-DAC: Cryptographically Enforced Dynamic Access 2018
4 P-MOD: Secure Privilege-Based Multilevel
Organizational Data-Sharing in Cloud Computing
2018
5 Revocable Identity-Based Broadcast Proxy Re-encryption
for Data Sharing in Clouds
2018
6 Ant Colony Stream Clustering: A Fast Density Clustering
Algorithm for Dynamic Data Streams
2018
7 Detecting Pickpocket Suspects from Large-Scale Public
Transit Records
2018
8 Secure and Efficient Skyline Queries on Encrypted Data 2018
9 Conversational Networks for Automatic Online
Moderation
2018
10 Sensitive Label Privacy Preservation with Anatomization
for Data Publishing
2018
11
Multi-faced Workplace Grievance Reporting Mechanism
2018
12
Missing People Identification System
2018
15. 13 sentiment embedding with applications to sentiment analysis
using Twitter
2018
14 Online Car service 2018
15 combining data owner side and cloud side access control for
encrypted cloud storage
2018
16 Characterizing and Predicting Early Reviewers for Effective
Product Marketing on E-Commerce Websites
2018
17 Automatic Generation of Social Event Storyboard from
Image Click-through Data
2018
18 efficient clue based route search on road networks 2018
19 Search rank fraud and malware detection in google play 2018
20 detecting stress based on social interactions in social
networks
2018
21 Sentiment Analysis On Text Data 2018