IEEE TRANSACTIONS ON EDUCATION |
1. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme |
|
|
|
|
2. Modeling and Verification of Online Shopping Business Processes by Considering Malicious Behavior Patterns |
|
|
|
|
3. A Forecasting Methodology for Workload Forecasting in Cloud Systems |
|
|
|
|
4. Optimal Shipping Strategy and Return Service Charge Under No-Reason |
|
|
|
|
5. PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud |
|
|
|
|
More Projects>> |
IEEE/ACM TRANSACTIONS ON NETWORKING |
1. Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound |
|
|
|
|
2. User Differentiated Verifiable File Search on the Cloud |
|
|
|
|
3. Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates |
|
|
|
|
IEEE Transactions on Dependable and Secure Computing |
1. Statistical Features Based Real-time Detection of Drifted Twitter Spam |
|
|
|
|
2. Incremental Consolidation of Data-Intensive Multi-flows |
|
|
|
|
3. Service Pattern: An Integrated Business Process Model for Modern Service Industry |
|
|
|
|
4. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation |
|
|
|
|
5. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance |
|
|
|
|
IEEE MULTIMEDIA AND IMAGE PROCESSONG |
1. Filtering of Brand-related Microblogs using Social-Smooth Multiview Embedding |
|
|
|
|
2. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing |
|
|
|
|
3. Democratic Diffusion Aggregation for Image Retrieval |
|
|
|
|
|
|
Android Application Demo |
|
|
|
Professional Referrance |
|
- Enterprise IT Training
- Interview Questions
- Technical Reference
- Placement Papers
- Inplant Training
|
 |
|
IEEE 2014 Latest Projects |
|
- IEEE 2013 Projects
- IEEE 2012 Projects
- Software Application Projects
|
|
Online Projects Support |
|
 |
 |
|
|