JC1 |
A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data |
2017-2018 |
|
JC10 |
Identity-Based Encryption with Cloud Revocation Authority and Its Applications |
2017-2018 |
|
JC11 |
Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems |
2017-2018 |
|
JC12 |
Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing |
2017-2018 |
|
JC13 |
A secured resource access management in educational cloud computing environment |
2017-2018 |
|
JC14 |
Dynamic virtualized network function allocation in a multi-cloud environment |
2017-2018 |
|
JC15 |
Efficient SQL adaptive query processing in cloud databases systems |
2017-2018 |
|
JC16 |
Goal-based security components for cloud storage security framework |
2017-2018 |
|
JC17 |
Parallel Execution of Space-Aware Applications in a Cloud Environment |
2017-2018 |
|
JC2 |
A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud |
2017-2018 |
|
JC3 |
An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing |
2017-2018 |
|
JC4 |
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing |
2017-2018 |
|
JC5 |
CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services |
2017-2018 |
|
JC6 |
Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email |
2017-2018 |
|
JC7 |
Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage |
2017-2018 |
|
JC8 |
Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates |
2017-2018 |
|
JC9 |
Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services |
2017-2018 |
|
JD1 |
A Novel Recommendation Model Regularized with User Trust and Item Ratings |
2017-2018 |
|
JD10 |
Rating Prediction based on Social Sentiment from Textual Reviews |
2017-2018 |
|
JD11 |
Location Aware Keyword Query Suggestion Based on Document Proximity |
2017-2018 |
|
JD12 |
Quantifying Political Leaning from Tweets, Retweets, and Retweeters |
2017-2018 |
|
JD13 |
Sentiment Embeddings with Applications to Sentiment Analysis |
2017-2018 |
|
JD14 |
TopicSketch: Real-time Bursty Topic Detection from Twitter |
2017-2018 |
|
JD15 |
Network intrusion detection system model based on data mining |
2017-2018 |
|
JD16 |
Opinion mining from student feedback data using supervised learning algorithms |
2017-2018 |
|