Research Topics
• Distributed Gateway Selection Algorithm for UAV Networks ieee trans 2015
• Dynamic Networking Substrate for Distributed MMOGs ieee trans 2015
• Joint Encryption Watermarking System for Medical Images IEEE Trans 2015
• New Graphical Password Scheme Resistant to Shoulder-Surfing ieee trans 2015
• Novel Approach for Data Hiding using LSB on Edges of a Gray Scale Cover Images
ieee trans 2015
• Robust Encryption Method for Speech Data Hiding In Images IEEE trans 2015
• Secure Multi-Tier Authentication Scheme in Cloud Computing Environment ieee
trans 2015
• Semantic IoT Early Warning System for Natural Environment Crisis Management
ieee trans 2015
• Survey and Analysis of Techniques for Player Behavior Prediction in Massively
Multiplayer Online Role-Playing Games 2015
• Survey of Clustering Algorithms for BigData Taxonomy and Empirical Analysis
ieee trans 2015
• Accelerometer-Based Digital Pen IEEE Trans 2015
• Adaptive Wideband Delphi Method to Study State Cyber-Defence Requirements ieee
trans 2015
• Improved K-Means Clustering Algorithm Removal Of Dependency Of K IEEE Data
Mining 2014
• Improved Module Based Substitution Steganography Method ieee trans 2015
• Overlay-Based Data Mining Architecture Tolerant to Physical Network
Disruptions ieee trans 2015
• Analysis and Classification of Respiratory Health IEEE 2015
• Applying Data Mining Techniques to IDS IEEE trans 2015
• Authentication Using Graphical Passwords Effects of Tolerance and Image Choice
ieee trans 2015
• Automated Security Test Generation SE Testing IEEE Trans 2015
• Automatic License Plate Recognition IEEE Trans 2013
• Blind Image Quality Assessment IEEE Trans IP 2015
• Captcha as Graphical Passwords IEEE Trans Security IP 2014
• Catch Me If You Can Android Malware Data Mining IEEE 2014
• Characterizing User Behavior in Mobile Internet ieee trans 2015
• CHARM A Cost efficient Multi cloud Data Hosting Scheme with High Availability
ieee trans 2015
• Classification Algorithms for Email Filtering IEEE 2014 Text Mining ANN
• ClubCF A Clustering-Based Collaborative Filtering Approach for Big Data
Application ieee trans 2015
• Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without
Secure Channel ieee trans 2015
• Computer-Aided Detection Of Brain Tumors Using Image Processing Techniques
2015
• Computer-Aided Detection Of Brain Tumors Using IP 2015 IEEE Medical
• Computing on Base Station Behavior using Erlang Measurement and Call Detail
Record ieee trans 2015
• Cost Minimization for Big Data Processing in Geo-Distributed Data Centers ieee
trans 2015
• Cost-Effective Authentic and Anonymous Data Sharing with Forward Security ieee
trans 2015
• Decision Tree Classification to Assist Prediction Of Alzherimers Disease Data
Mining IEEE 2014
• Designing Energy Routing Protocol With Power Consumption Optimization in MANET
ieee trans 2014
• Detecting Software Design Defects Using Association Rules Data Mining IEEE
2014
• Detecting Suspicious URL Bayesian Classification OSN Data Mining 2014
• Digital Image Sharing by Diverse Image Media IP IEEE Trans 2014
• Discover the Expert Context-Adaptive Expert Selection for Medical Diagnosis
ieee trans 2015
• Dominating Set and Network Coding-based Routing in Wireless Mesh Networks ieee
trans 2015
• Dynamic Query Forms for Database Queries IEEE Data Mining Trans 2013
• Dynamic Resource Allocation Cloud IEEE 2013 Trans
• Edge Adaptive Image Steganography Based on LSB Matching Revisited ieee trans
2015
• Effective Utilization of Page Ranking and HITS in significant Information
Retrieval WDE Mining 2014
• Efficient Multicast Delivery for Data Redundancy Minimization over Wireless
Data Centers ieee trans 2015
• Enabling Cloud Storage Auditing with Key Exposure Resistance ieee trans 2015
• Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud
Data Through Blind Storage ieee trans 2015 • Enabling Self Learning In Dynamic &
Open IOT IEEESD 2014
• Energy Cost Models of Smartphones for Task Offloading to the Cloud ieee trans
2015
• Enhancement of old images and documents By Digital IP IEEE 2015
• Enhancing Product Detection With Multicue Optimization for TV Shopping
Applications ieee trans 2015
• Ensuring Data Storage Security in Cloud Computing
• Ensuring Distributed Accountability for Data Sharing in the Cloud IEEE Trans
2012
• Errors and Power when Communicating with spins ieee trans 2015
• Estimating the Statistical Characteristics of Remote Sensing Big Data in the
Wavelet Transform Domain ieee trans 2014
• Evaluation of Data Mining Classification Models for NIDS 2014 IEEE
• Expressive, Efficient, and Revocable Data Access Control for Multi-Authority
Cloud Storage ieee trans 2014
• Extraction of Energy Information From Analog Meters Using Image Processing
ieee trans 2015
• Feature Dependent Method for Sentiment Analysis Text Mining 2014
• Gateway Placement and Packet Routing For Multihop In-Vehicle Internet Access
ieee trans 2015
• Graphical Passwords A Survey ieee trans 2015
• Group Key Agreement with Local Connectivity ieee trans 2015
• Incentive Compatible Privacy-Preserving Data Analysis IEEE Mining Trans 2014
• Interactive Multimodal Visual Search IEEE Transactions 2013 Android IP
• Internet of Things (IoT) Architecture For Embedded Application IEEE trans 2015
• Intrusion Detection System for Cloud Network Using FC-ANN Algorithm IEEE Trans
2011
• Invariant-Based Automatic Testing of Modern Web Applications IEEE Trans 2012
• Just-in-Time Code Offloading for Wearable Computing ieee trans 2015
• KNN based Machine Learning Approach for Text Mining Document 2014
• Laboratory To Support Rapid Prototyping of Robotics And IOT Compiler IEEE
Trans 2013
• Large Iterative Multitier Ensemble Classifiers for Security of Big Data ieee
trans 2015
• Learning Based Presentation Slide Generation For Academic Papers Text Mining
IEEE Trans 2015
• Lossless and Reversible Data Hiding in Encrypted Images IEEE IP Steganography
trans 2015
• MMCD Cooperative Downloading for Highway VANETs ieee trans 2015
• Mobile Based Health Monitoring Using Data Minning IEEE 2015
• Mobility Prediction-based Adaptive duty cycling data mining ieee trans 2013
• Modeling and Analysis of RRC-Based Signalling Storms in 3G Networks ieee trans
2015
• My Privacy My Decision Control of Photo Sharing on Online Social Networks ieee
trans 2015
• Network Traffic Data to ARFF Convertor For Association Rule Data Mining IEEE
2014
• Outsourcing Privacy-Preserving Social Networks to a Cloud ieee trans 2015
• Parking Availability Prediction for Sensor-Enabled Car Parking In Smart Cities
IOT Embedded IEEE trans 2015
• PDDS - Improving Cloud Data Storage Security Using Data Partitioning Technique ieee trans 2015
• Personalized Mobile Search Engine Android Mining IEEE Trans 2013
• Personalized Web Service Recommendation
IEEE Trans 2013 Data Mining
• PPM-HDA Privacy-preserving
and multifunctional health data aggregation with fault tolerance IEEE trans 2015
• Prediction of Heart Disease Using a Hybrid Technique In Data Mining IEEE 2015
• Predictive Analytics Using Data Mining Technique Student College IEEE 2015
• Predictive Monitoring of Mobile Patients by WSN Data Mining Android IEEE 2014
• Privacy Preserving BPNN ANN IEEE 2014 Transaction
• Privacy preserving
revocation update protocol for Group Signature in cloud 2015
• Privacy
Protection for Preventing Data Over-Collection in Smart City ieee trans 2015
•
Privacy-aware IoT Cloud Survivability for Future Connected Home Ecosystem IEEE
trans 2015
• Privacy-Preserving Mining of Association Rules Data Mining IEEE
Trans 2013
• Privacy-Preserving Public Auditing for Regenerating-Code-Based
Cloud Storage ieee trans 2015
• Privacy-Preserving Public Auditing for Secure
Cloud Storage ieee trans2015
• Protecting Data Privacy by Authentication and
Secret Sharing in Cloud Computing
• Prototype for a Sign Language Interfacing
System Embedded IP IEEE Trans 2014
• Provable Multicopy Dynamic Data Possession
in Cloud Computing Systems ieee trans 2015
• Quick and Secure Clustering
Labelling for Digital forensic analysis Data Mining 2014
• Radio Frequency based
Navigation and Management For Kumbh Embedded IEEE 2015
• Reactive Resource
Provisioning Heuristics for Dynamic Dataflows on Cloud Infrastructure ieee trans
2015
• Real Time Imaging Acquisition and Processing System For Fire Protection
IP IEEE 2015
• Real Time Kinect Based Robotic Arm Manipulation With Five Degree
Of Freedom IEEE Gesture IP 2015
• Real-Time and Temporal-Coherent Foreground
Extraction With Commodity RGBD Camera ieee trans 2015
• Remote Authentication via Biometrics A Robust Video-Object Steganographic
Mechanism Over Wireless Networks 2015
• Reversible Data Hiding in Encrypted Images by
Reserving Room Before Encryption IEEE Trans 2013
• RFID Technology for IoT-Based
Personal Healthcare in Smart Spaces IEEE 2014
• Robust Document Image
Binarization Technique IEEE Trans 2013
• Robust Part-Based Hand Gesture
Recognition Using Kinect Sensor IEEE Trans 2013
• Rule Based Inference Engine to
forecast IEEE 2015
• Runtime Values and its Application to software Plagiarism
Detection IEEE Trans 2015
• Safe Chat - Shield Childrens Communication OSN IEEE
Text Mining 2014
• Scalable and Secure Sharing of Personal Health In Cloud
Computing IEEE Trans 2012
• Schema Inference and Data Extraction from
Templatized Web Pages IEEE WDE 2015
• Secure and Anonymous Communication
TechniqueFormal Model and its Prototype Implementation ieee trans 2015
• Secure
Auditing and Deduplicating Data in Cloud ieee trans 2015
• Secure Data Mining in
Cloud Using Homomorphic Encryption IEEE 2014 Cloud Security
• Secure Distributed
Deduplication Systems with Improved Reliability ieee trans 2015
• Separable
Reversible Data Hiding in Encrypted Image IEEE Trans 2012
• Service
Operatoraware Trust Scheme for Resource ieee trans 2015
• Shared Authority Based
Privacy-preserving Authentication Protocol in Cloud Computing ieee trans 2014
•
Software Plagiarism Detection With Birthmarks Based On Dynamic Key Instruction
Seq IEEE Trans 2015
• Sparse Linear Integration of Content and Context
Modalities for Semantic Concept Retrieval ieee trans 2015
• Supporting Privacy
Protection in Personalized Web Search IEEE Data Mining Trans 2014
• Symmetric
Key Cryptography Using Genetic Algorithm And BPNN ANN IEEE Encryption 2015
•
T-Broker A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative
Services ieee trans 2015
• Threshold Cryptography Based Data Security in Cloud
Computing IEEE trans 2015
• Toward Offering More Useful Data Reliably to Mobile
Cloud From Wireless Sensor Network ieee trans 2015
• Towards a Unified Framework
for Data Mining IEEE trans 2015
• Traffic queue length measurement by using
Digital IP IEEE 2015
• Transductive Face Sketch-Photo Synthesis IEEE 2013 Trans
IP
• Two-layered Permission-based Android Malware Detection Data Mining IEEE
2014
• User Authentication Protocol Resistant to Password Stealing and Password
Reuse Attacks OPASS Trans IEEE 2012
• User Authentication Protocol Resistant to
Password Stealing and Reuse Cloud Security OPASS Trans IEEE 2012
• User-Friendly
and Secure Architecture (UFSA) for Authentication of Cloud Services 2015
•
User-Habit-Oriented Authentication ModelToward Secure, User-Friendly
Authentication for Mobile Devices ieee trans 2015
• Video Inpainting With
Short-Term Windows Application to Object Removal and Error Concealment IEEE
trans 2015
• Visualization of Human Poses From Kinect Data IEEE Gesture 2015
•
Web Server Log Analyzer Mining 2014
• Web Service Recommendation via Exploiting
Location and QoS Information IEEE Trans 2014 Data Mining
• Weblog Mining Privacy
Issues and Application of Web Log Data Mining IEEE 2014
• Wireless Sensor
Networks in Application to Patients Health Monitoring ieee trans 2015
• WORAL A
Witness Oriented Secure Location Provenance Framework for Mobile Devices ieee
trans 2015