Research Topics
• Distributed Gateway Selection Algorithm for UAV Networks ieee trans 2015
• Dynamic Networking Substrate for Distributed MMOGs ieee trans 2015
• Joint Encryption Watermarking System for Medical Images IEEE Trans 2015
• New Graphical Password Scheme Resistant to Shoulder-Surfing ieee trans 2015
• Novel Approach for Data Hiding using LSB on Edges of a Gray Scale Cover Images ieee trans 2015
• Robust Encryption Method for Speech Data Hiding In Images IEEE trans 2015
• Secure Multi-Tier Authentication Scheme in Cloud Computing Environment ieee trans 2015
• Semantic IoT Early Warning System for Natural Environment Crisis Management ieee trans 2015
• Survey and Analysis of Techniques for Player Behavior Prediction in Massively Multiplayer Online Role-Playing Games 2015
• Survey of Clustering Algorithms for BigData Taxonomy and Empirical Analysis ieee trans 2015
• Accelerometer-Based Digital Pen IEEE Trans 2015
• Adaptive Wideband Delphi Method to Study State Cyber-Defence Requirements ieee trans 2015
• Improved K-Means Clustering Algorithm Removal Of Dependency Of K IEEE Data Mining 2014
• Improved Module Based Substitution Steganography Method ieee trans 2015
• Overlay-Based Data Mining Architecture Tolerant to Physical Network Disruptions ieee trans 2015
• Analysis and Classification of Respiratory Health IEEE 2015
• Applying Data Mining Techniques to IDS IEEE trans 2015
• Authentication Using Graphical Passwords Effects of Tolerance and Image Choice ieee trans 2015
• Automated Security Test Generation SE Testing IEEE Trans 2015
• Automatic License Plate Recognition IEEE Trans 2013
• Blind Image Quality Assessment IEEE Trans IP 2015
• Captcha as Graphical Passwords IEEE Trans Security IP 2014
• Catch Me If You Can Android Malware Data Mining IEEE 2014
• Characterizing User Behavior in Mobile Internet ieee trans 2015
• CHARM A Cost efficient Multi cloud Data Hosting Scheme with High Availability ieee trans 2015
• Classification Algorithms for Email Filtering IEEE 2014 Text Mining ANN
• ClubCF A Clustering-Based Collaborative Filtering Approach for Big Data Application ieee trans 2015
• Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel ieee trans 2015
• Computer-Aided Detection Of Brain Tumors Using Image Processing Techniques 2015
• Computer-Aided Detection Of Brain Tumors Using IP 2015 IEEE Medical
• Computing on Base Station Behavior using Erlang Measurement and Call Detail Record ieee trans 2015
• Cost Minimization for Big Data Processing in Geo-Distributed Data Centers ieee trans 2015
• Cost-Effective Authentic and Anonymous Data Sharing with Forward Security ieee trans 2015
• Decision Tree Classification to Assist Prediction Of Alzherimers Disease Data Mining IEEE 2014
• Designing Energy Routing Protocol With Power Consumption Optimization in MANET ieee trans 2014
• Detecting Software Design Defects Using Association Rules Data Mining IEEE 2014
• Detecting Suspicious URL Bayesian Classification OSN Data Mining 2014
• Digital Image Sharing by Diverse Image Media IP IEEE Trans 2014
• Discover the Expert Context-Adaptive Expert Selection for Medical Diagnosis ieee trans 2015
• Dominating Set and Network Coding-based Routing in Wireless Mesh Networks ieee trans 2015
• Dynamic Query Forms for Database Queries IEEE Data Mining Trans 2013
• Dynamic Resource Allocation Cloud IEEE 2013 Trans
• Edge Adaptive Image Steganography Based on LSB Matching Revisited ieee trans 2015
• Effective Utilization of Page Ranking and HITS in significant Information Retrieval WDE Mining 2014
• Efficient Multicast Delivery for Data Redundancy Minimization over Wireless Data Centers ieee trans 2015
• Enabling Cloud Storage Auditing with Key Exposure Resistance ieee trans 2015
• Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage ieee trans 2015 • Enabling Self Learning In Dynamic & Open IOT IEEESD 2014
• Energy Cost Models of Smartphones for Task Offloading to the Cloud ieee trans 2015
• Enhancement of old images and documents By Digital IP IEEE 2015
• Enhancing Product Detection With Multicue Optimization for TV Shopping Applications ieee trans 2015
• Ensuring Data Storage Security in Cloud Computing
• Ensuring Distributed Accountability for Data Sharing in the Cloud IEEE Trans 2012
• Errors and Power when Communicating with spins ieee trans 2015
• Estimating the Statistical Characteristics of Remote Sensing Big Data in the Wavelet Transform Domain ieee trans 2014
• Evaluation of Data Mining Classification Models for NIDS 2014 IEEE
• Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage ieee trans 2014
• Extraction of Energy Information From Analog Meters Using Image Processing ieee trans 2015
• Feature Dependent Method for Sentiment Analysis Text Mining 2014
• Gateway Placement and Packet Routing For Multihop In-Vehicle Internet Access ieee trans 2015
• Graphical Passwords A Survey ieee trans 2015
• Group Key Agreement with Local Connectivity ieee trans 2015
• Incentive Compatible Privacy-Preserving Data Analysis IEEE Mining Trans 2014
• Interactive Multimodal Visual Search IEEE Transactions 2013 Android IP
• Internet of Things (IoT) Architecture For Embedded Application IEEE trans 2015
• Intrusion Detection System for Cloud Network Using FC-ANN Algorithm IEEE Trans 2011
• Invariant-Based Automatic Testing of Modern Web Applications IEEE Trans 2012
• Just-in-Time Code Offloading for Wearable Computing ieee trans 2015
• KNN based Machine Learning Approach for Text Mining Document 2014
• Laboratory To Support Rapid Prototyping of Robotics And IOT Compiler IEEE Trans 2013
• Large Iterative Multitier Ensemble Classifiers for Security of Big Data ieee trans 2015
• Learning Based Presentation Slide Generation For Academic Papers Text Mining IEEE Trans 2015
• Lossless and Reversible Data Hiding in Encrypted Images IEEE IP Steganography trans 2015
• MMCD Cooperative Downloading for Highway VANETs ieee trans 2015
• Mobile Based Health Monitoring Using Data Minning IEEE 2015
• Mobility Prediction-based Adaptive duty cycling data mining ieee trans 2013
• Modeling and Analysis of RRC-Based Signalling Storms in 3G Networks ieee trans 2015
• My Privacy My Decision Control of Photo Sharing on Online Social Networks ieee trans 2015
• Network Traffic Data to ARFF Convertor For Association Rule Data Mining IEEE 2014
• Outsourcing Privacy-Preserving Social Networks to a Cloud ieee trans 2015
• Parking Availability Prediction for Sensor-Enabled Car Parking In Smart Cities IOT Embedded IEEE trans 2015
• PDDS - Improving Cloud Data Storage Security Using Data Partitioning Technique ieee trans 2015
• Personalized Mobile Search Engine Android Mining IEEE Trans 2013
• Personalized Web Service Recommendation IEEE Trans 2013 Data Mining
• PPM-HDA Privacy-preserving and multifunctional health data aggregation with fault tolerance IEEE trans 2015
• Prediction of Heart Disease Using a Hybrid Technique In Data Mining IEEE 2015
• Predictive Analytics Using Data Mining Technique Student College IEEE 2015
• Predictive Monitoring of Mobile Patients by WSN Data Mining Android IEEE 2014
• Privacy Preserving BPNN ANN IEEE 2014 Transaction
• Privacy preserving revocation update protocol for Group Signature in cloud 2015
• Privacy Protection for Preventing Data Over-Collection in Smart City ieee trans 2015
• Privacy-aware IoT Cloud Survivability for Future Connected Home Ecosystem IEEE trans 2015
• Privacy-Preserving Mining of Association Rules Data Mining IEEE Trans 2013
• Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage ieee trans 2015
• Privacy-Preserving Public Auditing for Secure Cloud Storage ieee trans2015
• Protecting Data Privacy by Authentication and Secret Sharing in Cloud Computing
• Prototype for a Sign Language Interfacing System Embedded IP IEEE Trans 2014
• Provable Multicopy Dynamic Data Possession in Cloud Computing Systems ieee trans 2015
• Quick and Secure Clustering Labelling for Digital forensic analysis Data Mining 2014
• Radio Frequency based Navigation and Management For Kumbh Embedded IEEE 2015
• Reactive Resource Provisioning Heuristics for Dynamic Dataflows on Cloud Infrastructure ieee trans 2015
• Real Time Imaging Acquisition and Processing System For Fire Protection IP IEEE 2015
• Real Time Kinect Based Robotic Arm Manipulation With Five Degree Of Freedom IEEE Gesture IP 2015
• Real-Time and Temporal-Coherent Foreground Extraction With Commodity RGBD Camera ieee trans 2015
• Remote Authentication via Biometrics A Robust Video-Object Steganographic Mechanism Over Wireless Networks 2015
• Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption IEEE Trans 2013
• RFID Technology for IoT-Based Personal Healthcare in Smart Spaces IEEE 2014
• Robust Document Image Binarization Technique IEEE Trans 2013
• Robust Part-Based Hand Gesture Recognition Using Kinect Sensor IEEE Trans 2013
• Rule Based Inference Engine to forecast IEEE 2015
• Runtime Values and its Application to software Plagiarism Detection IEEE Trans 2015
• Safe Chat - Shield Childrens Communication OSN IEEE Text Mining 2014
• Scalable and Secure Sharing of Personal Health In Cloud Computing IEEE Trans 2012
• Schema Inference and Data Extraction from Templatized Web Pages IEEE WDE 2015
• Secure and Anonymous Communication TechniqueFormal Model and its Prototype Implementation ieee trans 2015
• Secure Auditing and Deduplicating Data in Cloud ieee trans 2015
• Secure Data Mining in Cloud Using Homomorphic Encryption IEEE 2014 Cloud Security
• Secure Distributed Deduplication Systems with Improved Reliability ieee trans 2015
• Separable Reversible Data Hiding in Encrypted Image IEEE Trans 2012
• Service Operatoraware Trust Scheme for Resource ieee trans 2015
• Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing ieee trans 2014
• Software Plagiarism Detection With Birthmarks Based On Dynamic Key Instruction Seq IEEE Trans 2015
• Sparse Linear Integration of Content and Context Modalities for Semantic Concept Retrieval ieee trans 2015
• Supporting Privacy Protection in Personalized Web Search IEEE Data Mining Trans 2014
• Symmetric Key Cryptography Using Genetic Algorithm And BPNN ANN IEEE Encryption 2015
• T-Broker A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services ieee trans 2015
• Threshold Cryptography Based Data Security in Cloud Computing IEEE trans 2015
• Toward Offering More Useful Data Reliably to Mobile Cloud From Wireless Sensor Network ieee trans 2015
• Towards a Unified Framework for Data Mining IEEE trans 2015
• Traffic queue length measurement by using Digital IP IEEE 2015
• Transductive Face Sketch-Photo Synthesis IEEE 2013 Trans IP
• Two-layered Permission-based Android Malware Detection Data Mining IEEE 2014
• User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks OPASS Trans IEEE 2012
• User Authentication Protocol Resistant to Password Stealing and Reuse Cloud Security OPASS Trans IEEE 2012
• User-Friendly and Secure Architecture (UFSA) for Authentication of Cloud Services 2015
• User-Habit-Oriented Authentication ModelToward Secure, User-Friendly Authentication for Mobile Devices ieee trans 2015
• Video Inpainting With Short-Term Windows Application to Object Removal and Error Concealment IEEE trans 2015
• Visualization of Human Poses From Kinect Data IEEE Gesture 2015
• Web Server Log Analyzer Mining 2014
• Web Service Recommendation via Exploiting Location and QoS Information IEEE Trans 2014 Data Mining
• Weblog Mining Privacy Issues and Application of Web Log Data Mining IEEE 2014
• Wireless Sensor Networks in Application to Patients Health Monitoring ieee trans 2015
• WORAL A Witness Oriented Secure Location Provenance Framework for Mobile Devices ieee trans 2015