S.NO TITLES Domains 1 Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing 2 Anonymizing Collections of Tree-Structured Data 3 Making Digital Artifacts on the Web Verifiable and Reliable 4 Socialite: An Efficient Graph Query Language Based on Data log 5 Differentially Private Frequent Item set Mining via Transaction Splitting 6 Privacy Policy Inference of User-Uploaded s on Content Sharing Sites 7 8 9 Structured Learning from Heterogeneous Behavior for Social Identity Linkage k-nearest Neighbor Classification over Semantically Secure Encrypted Relational Data Efficient Enforcement of Action-Aware Purpose-Based Access Control within Relational Database Management Systems 10 Towards Effective Bug Triage with Software Data Reduction Techniques Precision-Bounded Access Control Using Sliding-Window Query Views for 11 Privacy-Preserving Data Streams 12 Tracking Message Spread in Mobile Delay Tolerant Networks Mobile 13 ROFF: Robust and Fast Forwarding in Vehicular Ad-Hoc Networks Mobile 14 Prioritized Optimal Channel Allocation Schemes for Multi-Channel Mobile Vehicular Networks 15 Minimum Energy Routing and Jamming to Thwart Wireless Network Mobile Eavesdroppers 16 Restricted Epidemic Routing in Multi-Community Delay Tolerant Networks Mobile 17 Modeling and Analysis of Communication Traffic Heterogeneity in Mobile Opportunistic Networks Cost-Effective Authentic and Anonymous Data Sharing with Forward Parallel And 18 Security Parallel And 19 Control Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
Reducing Fragmentation for In-line Deduplication Backup Storage via Parallel And 20 Exploiting Backup History and Cache Knowledge 21 Identity-based Encryption with Outsourced Revocation in Parallel And Service Operator-aware Trust Scheme for Resource Matchmaking across Parallel And 22 Multiple s 23 Data Lineage in Malicious Environments Secure 24 T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Secure Collaborative Services 25 Privacy-Preserving Public Auditing for Regenerating-Code-Based Secure Storage 26 Collusion-Tolerable Privacy-Preserving Sum and Product Calculation Secure without Secure Channel 27 Vote Trust: Leveraging Friend Invitation Graph to Defend against Social Secure Network Sybils 28 Social : an Opportunity for Technology Enhanced Competence Based Learning Public Integrity Auditing for Shared Dynamic Data with Group User 29 Revocation Performing Initiative Data Prefetching in Distributed File Systems for 30 A Scalable and Reliable Matching Service for Content-Based 31 Publish/Subscribe Systems 32 Provable Multicopy Dynamic Data Possession in Systems 33 Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in 34 Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Storage Public Integrity Auditing for Dynamic Data Sharing with Multi-User 35 Modification
36 Enabling Storage Auditing with Key-Exposure Resistance 37 Understanding the Performance and Potential of for Scientific Applications 38 Secure Distributed Deduplication Systems with Improved Reliability 39 Maximum Entropy-based Thresholding algorithm for Face image segmentation 40 Geolocalized Modeling for Dish Recognition 41 Multiview Alignment Hashing for Efficient Search 42 Semantic-Improved Color Imaging Applications: It Is All About Context 43 High-Quality JPEG Compression Through Quantization Noise Analysis Vector Sparse Representation of Color Using Quaternion Matrix 44 Analysis 45 Neighborhood Discriminated Hashing for Large-Scale Retrieval 46 Single Super-Resolution Based on Gradient Profile Sharpness 47 Multi-scale Blind Denoising 48 An Approach Toward Fast Gradient-Based Segmentation 49 Enhancement of Textural Differences Based on Morphological Component Analysis 50 A Comparison of Dense Region Detectors for Search and Fine- Grained Classification 51 Steganography Using Reversible Texture Synthesis 52 EMR: A Scalable Graph-based Ranking Model for Content-based Retrieval 53 Saliency-based color accessibility
54 Location-Aware and Personalized Collaborative Filtering for Web Service Services Recommendation 55 My Privacy My Decision: Control of Photo Sharing on Online Social Services Networks 56 Smart Crawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Services Interfaces 57 A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Services Drop Attacks in Wireless Sensor Networks 58 Guest Editorial: Recommendation Techniques for Services and Services 59 Generating Searchable Public-Key Ciphertexts with Hidden Structures for Services Fast Keyword Search 60 Group Key Agreement with Local Connectivity Services 61 Towards Operational Cost Minimization in Hybrid s for Dynamic Services Resource Provisioning with Delay-Aware Optimization 62 Neighborhood Filtering Strategies for Overlay Construction in P2P-TV Networking Systems: Design and Experimental Comparison 63 EDAL: An Energy-Efficient, Delay-Aware, and Lifetime-Balancing Data Networking Collection Protocol for Heterogeneous Wireless Sensor Networks 64 The Conservation of Information, Towards an Axiomatized Modular Networking Modeling Approach to Congestion Control 65 Design and Analysis of Medium Access Protocol: Throughput and Short- Networking Term Fairness Perspective 66 Secure Storage And Sharing Scheme For Tenants 67 68 69 70 Hire some-ii: Towards Privacy-Aware Cross- Service Composition For Applications FastRAQ: A Fast Approach to Range-Aggregate Queries in Environments Sketch and Validate for Clustering Concurrent Bandwidth Reservation Strategies for Transfers in High Performance Networks
71 i ^2 Map Reduce: Incremental Map Reduce for Mining Evolving 72 In-Memory Management and : A Survey