id | domain | technology | title | year | category |
1 | NETWORK SECURITY | DOTNET | DROPS: DIVISION AND REPLICATION OF DATA IN CLOUD FOR OPTIMAL PERFORMANCE AND SECURITY | 2018 | IEEE |
2 | NETWORK SECURITY | DOTNET | PRIVACY-PRESERVING LOCATION-BASED SERVICES QUERY SCHEME AGAINST QUANTUM ATTACKS | 2018 | IEEE |
3 | NETWORK SECURITY | DOTNET | DYNAMIC PACKET FORWARDING VERIFICATION IN SDN | 2018 | IEEE |
4 | NETWORK SECURITY | DOTNET | A SECURE EXCEPTION MODE FOR FAULT-ATTACK-RESISTANT PROCESSING | 2018 | IEEE |
5 | NETWORK SECURITY | DOTNET | PFP: IMPROVING THE RELIABILITY OF DEDUPLICATION-BASED STORAGE SYSTEMS WITH PER-FILE PARITY | 2019 | IEEE |
6 | NETWORK SECURITY | DOTNET | GENERATION OF SECURE AND RELIABLE HONEYWORDS PREVENTING FALSE DETECTION | 2019 | IEEE |
7 | NETWORK SECURITY | DOTNET | EFFICIENT INTRUSION DETECTION WITH BLOOM FILTERING IN CONTROLLER AREA NETWORKS (CAN) | 2019 | IEEE |
8 | NETWORK SECURITY | DOTNET | A HIGHLY EFFICIENT SIDE CHANNEL ATTACK WITH PROFILING THROUGH RELEVANCE-LEARNING ON PHYSICAL LEAKAGE INFORMATION | 2019 | IEEE |
9 | NETWORK SECURITY | DOTNET | PRIVACY-GUARANTEED TWO-AGENT INTERACTIONS USING INFORMATION-THEORETIC MECHANISMS | 2017 | IEEE |
10 | NETWORK SECURITY | DOTNET | A CROSS TENANT ACCESS CONTROL (CTAC) MODEL FOR CLOUD COMPUTING: FORMAL SPECIFICATION AND VERIFICATION | 2017 | IEEE |
11 | NETWORK SECURITY | DOTNET | STRONG KEY-EXPOSURE RESILIENT AUDITING FOR SECURE CLOUD STORAGE | 2017 | IEEE |
12 | NETWORK SECURITY | DOTNET | A PRACTICAL SYSTEM FOR PUBLIC-AWARE TARGETED MOBILE ADVERTISING SERVICES | 2017 | IEEE |
13 | NETWORK SECURITY | DOTNET | MINING DEFICIENCIES OF ONLINE REPUTATION SYSTEMS: METHODOLOGIES EXPERIMENTS AND IMPLICATIONS | 2017 | IEEE |
14 | NETWORK SECURITY | DOTNET | AUTHENTICATED KEY EXCHANGE PROTOCOLS FOR PARALLEL NETWORK FILE SYSTEMS | 2017 | IEEE |
15 | NETWORK SECURITY | DOTNET | A SECURE ANTI-COLLUSION DATA SHARING SCHEME FOR DYNAMIC GROUPS IN THE CLOUD | 2017 | IEEE |
16 | NETWORK SECURITY | DOTNET | A SEMANTICS-AWARE APPROACH TO THE AUTOMATED NETWORK PROTOCOL IDENTIFICATION | 2017 | IEEE |
17 | NETWORK SECURITY | DOTNET | TMACS: A ROBUST AND VERIFIABLE THRESHOLD MULTI-AUTHORITY ACCESS CONTROL SYSTEM IN PUBLIC CLOUD STORAGE | 2017 | IEEE |
18 | NETWORK SECURITY | DOTNET | ENABLING FINE-GRAINED MULTI-KEYWORD SEARCHSUPPORTING CLASSIFIED SUB-DICTIONARIES OVER ENCRYPTED CLOUD DATA | 2017 | IEEE |
19 | NETWORK SECURITY | DOTNET | ACTIVETRUST: SECURE AND TRUSTABLE ROUTING IN WIRELESS SENSOR NETWORKS | 2017 | IEEE |
20 | NETWORK SECURITY | DOTNET | CHERRY-PICKING RELIABLE PUF BITS WITH DIFFERENTIAL SEQUENCE CODING | 2016 | IEEE |
21 | NETWORK SECURITY | DOTNET | EFFICIENT AND ANONYMOUS MOBILE USER AUTHENTICATION PROTOCOL USING SELF-CERTIFIED PUBLIC KEY CRYPTOGRAPHY FOR MULTI-SERVER ARCHITECTURES | 2016 | IEEE |
22 | NETWORK SECURITY | DOTNET | PPM-HDA: PRIVACY-PRESERVING AND MULTIFUNCTIONAL HEALTH DATA AGGREGATION WITH FAULT TOLERANCE | 2016 | IEEE |
23 | NETWORK SECURITY | DOTNET | A WEB TRAFFIC ANALYSIS ATTACK USING ONLY TIMING INFORMATION | 2016 | IEEE |
24 | NETWORK SECURITY | DOTNET | STEGANALYSIS FEATURES FOR CONTENT-ADAPTIVE JPEG STEGANOGRAPHY | 2016 | IEEE |
25 | NETWORK SECURITY | DOTNET | AUDITING A CLOUD PROVIDERÆS COMPLIANCE WITH DATA BACKUP REQUIREMENTS: A GAMETHEORETICAL ANALYSIS | 2016 | IEEE |
26 | NETWORK SECURITY | DOTNET | GENERIC AND EFFICIENT CONSTRUCTIONS OF ATTRIBUTE-BASED ENCRYPTION WITH VERIFIABLE OUTSOURCED DECRYPTION | 2016 | IEEE |
27 | NETWORK SECURITY | DOTNET | GROUP SECRET KEY GENERATION IN WIRELESS NETWORKS: ALGORITHMS AND RATE OPTIMIZATION | 2016 | IEEE |
28 | NETWORK SECURITY | DOTNET | PRIVACY-PRESERVING DETECTION OF SENSITIVE DATA EXPOSURE | 2016 | IEEE |
29 | NETWORK SECURITY | DOTNET | ANONYMOUS TWO-FACTOR AUTHENTICATION IN DISTRIBUTED SYSTEMS: CERTAIN GOALS ARE BEYOND ATTAINMENT | 2016 | IEEE |
30 | NETWORK SECURITY | DOTNET | DDSGA: A DATA-DRIVEN SEMI-GLOBAL ALIGNMENT APPROACH FOR DETECTING MASQUERADE ATTACKS | 2016 | IEEE |
31 | NETWORK SECURITY | DOTNET | CAPTCHA AS GRAPHICAL PASSWORDSùA NEW SECURITY PRIMITIVE BASED ON HARD AI PROBLEMS | 2016 | IEEE |
32 | NETWORK SECURITY | DOTNET | SECRET KEY GENERATION IN THE TWO-WAY RELAY CHANNEL WITH ACTIVE ATTACKERS | 2016 | IEEE |
33 | NETWORK SECURITY | DOTNET | DYNAMIC AUTHENTICATION WITH SENSORY INFORMATION FOR THE ACCESS CONTROL SYSTEMS | 2016 | IEEE |
34 | NETWORK SECURITY | DOTNET | SECURE CONTINUOUS AGGREGATION IN WIRELESS SENSOR NETWORKS | 2016 | IEEE |
35 | NETWORK SECURITY | DOTNET | A SECURE PAYMENT SCHEME WITH LOW COMMUNICATION AND PROCESSING OVERHEAD FOR MULTIHOP WIRELESS NETWORKS | 2016 | IEEE |
36 | NETWORK SECURITY | DOTNET | SPOC: A SECURE AND PRIVACY-PRESERVING OPPORTUNISTIC COMPUTING FRAMEWORK FOR MOBILE-HEALTHCARE EMERGENCY | 2016 | IEEE |
37 | NETWORK SECURITY | DOTNET | PACKET-HIDING METHODS FOR PREVENTING SELECTIVE JAMMING ATTACKS | 2016 | IEEE |
38 | NETWORK SECURITY | DOTNET | OPASS: A USER AUTHENTICATION PROTOCOL RESISTANT TO PASSWORD STEALING AND PASSWORD REUSE ATTACKS | 2016 | IEEE |
39 | NETWORK SECURITY | DOTNET | DOUBLEGUARD: DETECTING INTRUSIONS IN MULTITIER WEB APPLICATIONS | 2016 | IEEE |
40 | NETWORKING | DOTNET | DETECTING AND MITIGATING TARGET LINK-FLOODING ATTACKS USING SDN | 2018 | IEEE |
41 | NETWORKING | DOTNET | FLOW MANAGEMENT AND LOAD BALANCING IN DYNAMIC HETEROGENEOUS LANS | 2018 | IEEE |
42 | NETWORKING | DOTNET | TRAFFIC CLASSIFICATION BASED ON ZERO-LENGTH PACKETS | 2018 | IEEE |
43 | NETWORKING | DOTNET | FUSO: FAST MULTI-PATH LOSS RECOVERY FOR DATA CENTER NETWORKS | 2018 | IEEE |
44 | NETWORKING | DOTNET | HIAUTH: HIDDEN AUTHENTICATION FOR PROTECTING SOFTWARE DEFINED NETWORKS | 2019 | IEEE |
45 | NETWORKING | DOTNET | WORMHOLE: THE HIDDEN VIRUS PROPAGATION POWER OF A SEARCH ENGINE IN SOCIAL NETWORKS | 2019 | IEEE |
46 | NETWORKING | DOTNET | GENERATION OF SECURE AND RELIABLE HONEYWORDS PREVENTING FALSE DETECTION | 2019 | IEEE |
47 | NETWORKING | DOTNET | EFFICIENT MULTI-FACTOR AUTHENTICATED KEY EXCHANGE SCHEME FOR MOBILE COMMUNICATIONS | 2019 | IEEE |
48 | NETWORKING | DOTNET | EFFICIENT MULTIFACTOR AUTHENTICATION KEY EXCHANGE SCHEME FOR MOBILE COMMUNICATIONS | 2017 | IEEE |
49 | NETWORKING | DOTNET | COLLABORATIVE AUTHENTICATION IN DECENTRALIZED DENSE MOBILE NETWORKS WITH KEY REDISTRIBUTION | 2017 | IEEE |
50 | NETWORKING | DOTNET | CONTENT-AWARE CONCURRENT MULTIPATH TRANSFER FOR HIGH-DEFINITION VIDEO STREAMING OVER HETEROGENEOUS WIRELESS NETWORKS | 2016 | IEEE |
51 | NETWORKING | DOTNET | DISCHARGING THE NETWORK FROM ITS FLOW CONTROL HEADACHES: PACKET DROPS AND HOL BLOCKING | 2016 | IEEE |
52 | NETWORKING | DOTNET | MOBILITY PREDICTION BASED JOINT STABLE ROUTING AND CHANNEL ASSIGNMENT FOR MOBILE AD HOC COGNITIVE NETWORKS | 2016 | IEEE |
53 | NETWORKING | DOTNET | SIMULTANEOUSLY GENERATING SECRET AND PRIVATE KEYS IN A COOPERATIVE PAIRWISE-INDEPENDENT NETWORK | 2016 | IEEE |
54 | NETWORKING | DOTNET | TASK SCHEDULING FOR MAXIMIZING PERFORMANCE AND RELIABILITY CONSIDERING FAULT RECOVERY IN HETEROGENEOUS DISTRIBUTED SYSTEMS | | IEEE |
55 | NETWORKING | DOTNET | TOWARDS DISTRIBUTED OPTIMAL MOVEMENT STRATEGY FOR DATA GATHERING IN WIRELESS SENSOR NETWORKS | 2016 | IEEE |
56 | NETWORKING | DOTNET | IP FAST REROUTING AND DISJOINT MULTIPATH ROUTING WITH THREE EDGE-INDEPENDENT SPANNING TREES | 2016 | IEEE |
57 | NETWORKING | DOTNET | TAG-ORDERING POLLING PROTOCOLS IN RFID SYSTEMS | 2016 | IEEE |
58 | NETWORKING | DOTNET | PACKET-LEVEL NETWORK COMPRESSION: REALIZATION AND SCALING OF THE NETWORK-WIDE BENEFITS | 2016 | IEEE |
59 | NETWORKING | DOTNET | MAXIMIZING NETWORK TOPOLOGY LIFETIME USING MOBILE NODE ROTATION | 2016 | IEEE |
60 | NETWORKING | DOTNET | AN EFFICIENT DISTRIBUTED TRUST MODEL FOR WIRELESS SENSOR NETWORKS | 2016 | IEEE |
61 | NETWORKING | DOTNET | A DISTRIBUTED FAULT-TOLERANT TOPOLOGY CONTROL ALGORITHM FOR HETEROGENEOUS WIRELESS SENSOR NETWORKS | 2016 | IEEE |
62 | NETWORKING | DOTNET | AUTHENTICATED KEY EXCHANGE PROTOCOLS FOR PARALLEL NETWORK FILE SYSTEMS | 2015 | IEEE |
63 | NETWORKING | DOTNET | AN EFFICIENT DISTRIBUTED TRUST MODEL FOR WIRELESS SENSOR NETWORKS | 2016 | IEEE |
64 | NETWORKING | DOTNET | A DISTRIBUTED FAULT-TOLERANT TOPOLOGY CONTROL ALGORITHM FOR HETEROGENEOUS WIRELESS SENSOR NETWORKS | 2015 | IEEE |
65 | NETWORKING | DOTNET | PACK: PREDICTION-BASED CLOUD BANDWIDTH AND COST REDUCTION SYSTEM | 2016 | IEEE |
66 | NETWORKING | DOTNET | RELIABLE BULK-DATA DISSEMINATION IN DELAY TOLERANT NETWORKS | 2016 | IEEE |
67 | NETWORKING | DOTNET | NETWORK CODING AWARE COOPERATIVE MAC PROTOCOL FOR WIRELESS AD HOC NETWORKS | 2016 | IEEE |
68 | NETWORKING | DOTNET | FAST TRANSMISSION TO REMOTE COOPERATIVE GROUPS: A NEW KEY MANAGEMENT PARADIGM | 2016 | IEEE |
69 | NETWORKING | DOTNET | DISTORTION-AWARE SCALABLE VIDEO STREAMING TO MULTINETWORK CLIENTS | 2016 | IEEE |
70 | NETWORKING | DOTNET | A DISTRIBUTED CONTROL LAW FOR LOAD BALANCING IN CONTENT DELIVERY NETWORKS | 2016 | IEEE |
71 | NETWORKING | DOTNET | A HIGHLY SCALABLE KEY PRE-DISTRIBUTION SCHEME FOR WIRELESS SENSOR NETWORKS | 2016 | IEEE |
72 | NETWORKING | DOTNET | MITIGATING ROUTING MISBEHAVIOR IN DISRUPTION TOLERANT NETWORKS | 2016 | IEEE |
73 | NETWORKING | DOTNET | IMPROVING ENERGY SAVING AND RELIABILITY IN WIRELESS SENSOR NETWORKS USING A SIMPLE CRT-BASED PACKET-FORWARDING SOLUTION | 2016 | IEEE |
74 | DATA MINING | DOTNET | SCALABLE CONTENT-AWARE COLLABORATIVE FILTERING FOR LOCATION RECOMMENDATION | 2018 | IEEE |
75 | DATA MINING | DOTNET | A GENERAL FRAMEWORK FOR IMPLICIT AND EXPLICIT SOCIAL RECOMMENDATION | | IEEE |
76 | DATA MINING | DOTNET | ACHIEVING DATA TRUTHFULNESS AND PRIVACY PRESERVATION IN DATA MARKETS | 2018 | IEEE |
77 | DATA MINING | DOTNET | COMPLEMENTARY ASPECT-BASED OPINION MINING | 2018 | IEEE |
78 | DATA MINING | DOTNET | CUSTOMER REVIEWS ANALYSIS WITH DEEP NEURAL NETWORKS FOR E-COMMERCE RECOMMENDER SYSTEMS | 2018 | IEEE |
79 | DATA MINING | DOTNET | DLTA: A FRAMEWORK FOR DYNAMIC CROWDSOURCING CLASSIFICATION TASKS | 2018 | IEEE |
80 | DATA MINING | DOTNET | COOPERATIVE FRAUD DETECTION MODEL WITH PRIVACY-PRESERVING IN REAL CDR DATASETS | 2019 | IEEE |
81 | DATA MINING | DOTNET | EFFECTIVE HEART DISEASE PREDICTION USING HYBRID MACHINE LEARNING TECHNIQUES | 2019 | IEEE |
82 | DATA MINING | DOTNET | HIERARCHICAL MULTI-CLUE MODELLING FOR POI POPULARITY PREDICTION WITH HETEROGENEOUS TOURISTINFORMATION | 2019 | IEEE |
83 | DATA MINING | DOTNET | MULTI-PARTY HIGH-DIMENSIONAL DATA PUBLISHING UNDER DIFFERENTIAL PRIVACY | 2019 | IEEE |
84 | DATA MINING | DOTNET | PRIVACY-PRESERVING SOCIAL MEDIA DATA PUBLISHING FOR PERSONALIZED RANKING-BASED RECOMMENDATION | 2019 | IEEE |
85 | DATA MINING | DOTNET | A MULTI-LAYER DUAL ATTENTION DEEP LEARNING MODEL WITH REFINED WORD EMBEDDINGS FOR ASPECT-BASED SENTIMENT ANALYSIS | 2019 | IEEE |
86 | DATA MINING | DOTNET | SENTIDIFF: COMBINING TEXTUAL INFORMATION AND SENTIMENT DIFFUSION PATTERNS FOR TWITTER SENTIMENT ANALYSIS | 2019 | IEEE |
87 | DATA MINING | DOTNET | A NEW ROBUST APPROACH FOR REVERSIBLE DATABASE WATERMARKING WITH DISTORTION CONTROL | 2019 | IEEE |
88 | DATA MINING | DOTNET | PERSONAL WEB REVISITATION BY CONTEXT AND CONTENT KEYWORDS WITH RELEVANCE FEEDBACK | 2019 | IEEE |
89 | DATA MINING | DOTNET | EFFICIENT ALGORITHMS FOR MINING TOP-K HIGH UTILITY ITEMSETS | 2019 | IEEE |
90 | DATA MINING | DOTNET | PROBABILISTIC STATIC LOAD-BALANCING OF PARALLEL MINING OF FREQUENT SEQUENCES | 2017 | IEEE |
91 | DATA MINING | DOTNET | SENTIMENT EMBEDDINGS WITH APPLICATIONS TO SENTIMENT ANALYSIS | 2016 | IEEE |
92 | DATA MINING | DOTNET | SIMILARITY MEASURE SELECTION FOR CLUSTERING TIME SERIES DATABASES | 2016 | IEEE |
93 | DATA MINING | DOTNET | SURVEY ON ASPECT-LEVEL SENTIMENT ANALYSIS | 2016 | IEEE |
94 | DATA MINING | DOTNET | TASC:TOPIC-ADAPTIVE SENTIMENT CLASSIFICATION ON DYNAMIC TWEETS | 2016 | IEEE |
95 | DATA MINING | DOTNET | MINING HEALTH EXAMINATION RECORDSùA GRAPH-BASED APPROACH | 2016 | IEEE |
96 | DATA MINING | DOTNET | ACTIVE LEARNING FOR RANKING THROUGH EXPECTED LOSS OPTIMIZATION | 2016 | IEEE |
97 | DATA MINING | DOTNET | DISCOVERY OF RANKING FRAUD FOR MOBILE APPS | 2016 | IEEE |
98 | DATA MINING | DOTNET | LEARNING TO RANK USING USER CLICKS AND VISUAL FEATURES FOR IMAGE RETRIEVAL | 2016 | IEEE |
99 | DATA MINING | DOTNET | T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORATIVE SERVICES | 2016 | IEEE |
100 | DATA MINING | DOTNET | LINQ: A FRAMEWORK FOR LOCATION-AWARE INDEXING AND QUERY PROCESSING | 2016 | IEEE |
101 | DATA MINING | DOTNET | SCALABLE DISTRIBUTED PROCESSING OF K NEAREST NEIGHBOR QUERIES OVER MOVING OBJECTS | 2016 | IEEE |
102 | DATA MINING | DOTNET | RRWùA ROBUST AND REVERSIBLE WATERMARKING TECHNIQUE FOR RELATIONAL DATA | 2016 | IEEE |
103 | DATA MINING | DOTNET | PROGRESSIVE DUPLICATE DETECTION | 2016 | IEEE |
104 | DATA MINING | DOTNET | AUTHENTICATION OF MOVING TOP-K SPATIAL KEYWORD QUERIES | 2016 | IEEE |
105 | DATA MINING | DOTNET | FACILITATING DOCUMENT ANNOTATION USING CONTENT AND QUERYING VALUE | 2016 | IEEE |
106 | DATA MINING | DOTNET | FAST NEAREST NEIGHBOR SEARCH WITH KEYWORDS | 2016 | IEEE |
107 | DATA MINING | DOTNET | PRIVACY-PRESERVING AND CONTENT-PROTECTING LOCATION BASED QUERIES | 2016 | IEEE |
108 | DATA MINING | DOTNET | KEYWORD QUERY ROUTING | 2016 | IEEE |
109 | DATA MINING | DOTNET | A SIMILARITY MEASURE FOR TEXT CLASSIFICATION AND CLUSTERING | 2016 | IEEE |
110 | DATA MINING | DOTNET | EFFICIENT AND EFFECTIVE DUPLICATE DETECTION IN HIERARCHICAL DATA | 2016 | IEEE |
111 | DATA MINING | DOTNET | MINING USER QUERIES WITH MARKOV CHAINS: APPLICATION TO ONLINE IMAGE RETRIEVAL | 2016 | IEEE |
112 | DATA MINING | DOTNET | A NEW ALGORITHM FOR INFERRING USER SEARCH GOALS WITH FEEDBACK SESSIONS | 2016 | IEEE |
113 | DATA MINING | DOTNET | ANOMALY DETECTION VIA ONLINE OVERSAMPLING PRINCIPAL COMPONENT ANALYSIS | 2016 | IEEE |
114 | DATA MINING | DOTNET | CREATING EVOLVING USER BEHAVIOR PROFILES AUTOMATICALLY | 2016 | IEEE |
115 | DATA MINING | DOTNET | SLICING: A NEW APPROACH FOR PRIVACY PRESERVING DATA PUBLISHING | 2016 | IEEE |
116 | DATA MINING | DOTNET | ORGANIZING USER SEARCH HISTORIES | 2016 | IEEE |
117 | DATA MINING | DOTNET | DOUBLE GUARD: DETECTING INTRUSIONS IN MULTITIER WEB APPLICATIONS | 2016 | IEEE |
118 | MOBILE COMPUTING | DOTNET | A LIGHTWEIGHT SECURE DATA SHARING SCHEME FOR MOBILE CLOUD COMPUTING | 2019 | IEEE |
119 | MOBILE COMPUTING | DOTNET | MULTI-CDN: TOWARDS PRIVACY IN CONTENT DELIVERY NETWORKS | 2019 | IEEE |
120 | MOBILE COMPUTING | DOTNET | RISK ASSESSMENT IN SOCIAL NETWORKS BASED ON USER ANOMALOUS BEHAVIOURS | 2019 | IEEE |
121 | MOBILE COMPUTING | DOTNET | PERSONALIZED PRIVACY-PRESERVING TASK ALLOCATION FOR MOBILE CROWDSENSING | 2019 | IEEE |
122 | MOBILE COMPUTING | DOTNET | ENERGY-EFFICIENT DYNAMIC COMPUTATION OFFLOADING AND COOPERATIVE TASK SCHEDULING IN MOBILE CLOUD COMPUTING | 2019 | IEEE |
123 | MOBILE COMPUTING | DOTNET | PROVABLY SECURE KEY-AGGREGATE CRYPTOSYSTEMS WITH BROADCAST AGGREGATE KEYS FOR ONLINE DATA SHARING ON THE CLOUD | 2019 | IEEE |
124 | MOBILE COMPUTING | DOTNET | EFFICIENT MULTIFACTOR AUTHENTICATION KEY EXCHANGE SCHEME FOR MOBILE COMMUNICATIONS | 2019 | IEEE |
125 | MOBILE COMPUTING | DOTNET | PRIVACY-PRESERVING DATA ENCRYPTION STRATEGY FOR BIG DATA IN MOBILE CLOUD COMPUTING | 2017 | IEEE |
126 | MOBILE COMPUTING | DOTNET | A NOVEL BLOCK ENCRYPTION ALGORITHM BASED ON CHAOTIC S-BOX FOR WIRELESS SENSOR NETWORK | 2017 | IEEE |
127 | MOBILE COMPUTING | DOTNET | AN EFFICIENT INFORMATION MAXIMIZATION BASED ADAPTIVE CONGESTION CONTROL SCHEME IN WIRELESS SENSOR NETWORK | 2017 | IEEE |
128 | MOBILE COMPUTING | DOTNET | ENERGY-EFFICIENT RELAY NODE PLACEMENT IN WIRELESS HETEROGENEOUS NETWORKS WITH CAPACITY CONSTRAINTS | 2019 | IEEE |
129 | MOBILE COMPUTING | DOTNET | A LOAD-AWARE CLUSTERING MODEL FOR COORDINATED TRANSMISSION IN FUTURE WIRELESS NETWORKS | 2019 | IEEE |
130 | MOBILE COMPUTING | DOTNET | OPTIMAL RESOURCE ALLOCATION IN RANDOM ACCESS COOPERATIVE COGNITIVE RADIO NETWORKS | 2019 | IEEE |
131 | MOBILE COMPUTING | DOTNET | PRIVACY AND QUALITY PRESERVING MULTIMEDIA DATA AGGREGATION FOR PARTICIPATORY SENSING SYSTEMS | 2019 | IEEE |
132 | MOBILE COMPUTING | DOTNET | DISTRIBUTED CHANNEL PROBING FOR EFFICIENT TRANSMISSION SCHEDULING IN WIRELESS NETWORKS | 2016 | IEEE |
133 | MOBILE COMPUTING | DOTNET | DISTORTION-AWARE CONCURRENT MULTIPATH TRANSFER FOR MOBILE VIDEO STREAMING IN HETEROGENEOUS WIRELESS NETWORKS | 2016 | IEEE |
134 | MOBILE COMPUTING | DOTNET | PRIVACY-PRESERVING AND TRUTHFUL DETECTION OF PACKET DROPPING ATTACKS IN WIRELESS AD HOC NETWORKS | 2016 | IEEE |
135 | MOBILE COMPUTING | DOTNET | TOWARDS MAXIMIZING TIMELY CONTENT DELIVERY IN DELAY TOLERANT NETWORKS | 2016 | IEEE |
136 | MOBILE COMPUTING | DOTNET | A STUDY ON FALSE CHANNEL CONDITION REPORTING ATTACKS IN WIRELESS NETWORKS | 2016 | IEEE |
137 | MOBILE COMPUTING | DOTNET | COOPERATIVE PACKET DELIVERY IN HYBRID WIRELESS MOBILE NETWORKS: A COALITIONAL GAME APPROACH | 2016 | IEEE |
138 | MOBILE COMPUTING | DOTNET | NETWORK-ASSISTED MOBILE COMPUTING WITH OPTIMAL UPLINK QUERY PROCESSING | 2016 | IEEE |
139 | MOBILE COMPUTING | DOTNET | RELAY SELECTION FOR GEOGRAPHICAL FORWARDING IN SLEEP-WAKE CYCLING WIRELESS SENSOR NETWORKS | 2016 | IEEE |
140 | MOBILE COMPUTING | DOTNET | VAMPIRE ATTACKS: DRAINING LIFE FROM WIRELESS AD HOC SENSOR NETWORKS | 2016 | IEEE |
141 | MOBILE COMPUTING | DOTNET | MITIGATING ROUTING MISBEHAVIOR IN DISRUPTION TOLERANT NETWORKS | 2016 | IEEE |
142 | CLOUD COMPUTING | DOTNET | EFFICIENT TRACEABLE AUTHORIZATION SEARCH SYSTEM FOR SECURE CLOUD STORAGE | 2019 | IEEE |
143 | CLOUD COMPUTING | DOTNET | PRIVACY AWARE DATA DEDUPLICATION FOR SIDE CHANNEL IN CLOUD STORAGE | 2019 | IEEE |
144 | CLOUD COMPUTING | DOTNET | A GAME APPROACH TO MULTI-SERVERS LOAD BALANCING WITH LOAD-DEPENDENT SERVER AVAILABILITY CONSIDERATION | 2018 | IEEE |
145 | CLOUD COMPUTING | DOTNET | DESIGN OF SECURE AUTHENTICATED KEY MANAGEMENT PROTOCOL FOR CLOUD COMPUTING ENVIRONMENTS | 2018 | IEEE |
146 | CLOUD COMPUTING | DOTNET | BLOCKCHAIN-BASED PERSONAL HEALTH RECORDS SHARING SCHEME WITH DATAINTEGRITY VERIFIABLE | 2018 | IEEE |
147 | CLOUD COMPUTING | DOTNET | SECURE ENCRYPTED DATA WITH AUTHORIZED DEDUPLICATION IN CLOUD | 2019 | IEEE |
148 | CLOUD COMPUTING | DOTNET | EFFICIENT DATA PLACEMENT AND REPLICATION FOR QOS-AWARE APPROXIMATE QUERY EVALUATION OF BIG DATA ANALYTICS | 2019 | IEEE |
149 | CLOUD COMPUTING | DOTNET | ENABLING VERIFIABLE AND DYNAMIC RANKED SEARCH OVER OUTSOURCED DATA | 2019 | IEEE |
150 | CLOUD COMPUTING | DOTNET | MULTI-AUTHORITY ATTRIBUTE-BASED KEYWORD SEARC OVER ENCRYPTED CLOUD DATA | 2019 | IEEE |
151 | CLOUD COMPUTING | DOTNET | PRIVACY-PRESERVING MULTI-KEYWORD TOP-K SIMILARITY SEARCH OVER ENCRYPTED DATA | 2019 | IEEE |
152 | CLOUD COMPUTING | DOTNET | REVOCABLE CLOUD-ASSISTED ATTRIBUTE-BASED SIGNCRYPTION IN PERSONAL HEALTH SYSTEM | 2019 | IEEE |
153 | CLOUD COMPUTING | DOTNET | IDENTITY-BASED AUDITING FOR SHARED CLOUD DATA WITH EFFICIENT AND SECURE SENSITIVE INFORMATION HIDING | 2019 | IEEE |
154 | CLOUD COMPUTING | DOTNET | ACHIEVING SECURE UNIVERSAL AND FINE-GRAINED QUERY RESULTS VERIFICATION FOR SECURE SEARCH | 2019 | IEEE |
155 | CLOUD COMPUTING | DOTNET | SCHEME OVER ENCRYPTED CLOUD DATA | 2019 | IEEE |
156 | CLOUD COMPUTING | DOTNET | ASSESSING INVARIANT MINING TECHNIQUES FOR CLOUD-BASED UTILITY COMPUTING SYSTEMS | 2017 | IEEE |
157 | CLOUD COMPUTING | DOTNET | A ROBUST REPUTATION MANAGEMENT MECHANISM IN THE FEDERATED CLOUD | 2017 | IEEE |
158 | CLOUD COMPUTING | DOTNET | PROVABLY SECURE KEY-AGGREGATE CRYPTOSYSTEMS WITH BROADCAST AGGREGATE KEYS FOR ONLINE DATA SHARING ON THE CLOUD | 2017 | IEEE |
159 | CLOUD COMPUTING | DOTNET | BLOCK DESIGN-BASED KEY AGREEMENT FOR GROUP DATA SHARING IN CLOUD COMPUTING | 2017 | IEEE |
160 | CLOUD COMPUTING | DOTNET | MULTITENANT ACCESS CONTROL FOR CLOUD-AWARE DISTRIBUTED FILE SYSTEMS | 2017 | IEEE |
161 | CLOUD COMPUTING | DOTNET | ROLLBACK MECHANISMS FOR CLOUD MANAGEMENT APIS USING AI PLANNING | 2017 | IEEE |
162 | CLOUD COMPUTING | DOTNET | TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM | 2017 | IEEE |
163 | CLOUD COMPUTING | DOTNET | TOWARDS ACHIEVING DATA SECURITY WITH THE CLOUD COMPUTING ADOPTION FRAMEWORK (CCAF) | 2017 | IEEE |
164 | CLOUD COMPUTING | DOTNET | A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA | 2016 | IEEE |
165 | CLOUD COMPUTING | DOTNET | A SCALABLE DATA CHUNK SIMILARITY BASED COMPRESSION APPROACH FOR EFFICIENT BIG SENSING DATA PROCESSING ON CLOUD | 2016 | IEEE |
166 | CLOUD COMPUTING | DOTNET | ATTRIBUTE-BASED ACCESS CONTROL FOR MULTI-AUTHORITY SYSTEMS WITH CONSTANT SIZE CIPHERTEXT IN CLOUD COMPUTING | 2016 | IEEE |
167 | CLOUD COMPUTING | DOTNET | FLEXIBLE AND FINE-GRAINED ATTRIBUTE-BASED DATA STORAGE IN CLOUD COMPUTING | 2016 | IEEE |
168 | CLOUD COMPUTING | DOTNET | IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD | 2016 | IEEE |
169 | CLOUD COMPUTING | DOTNET | PRIVACY PRESERVING RANKED MULTI-KEYWORD SEARCH FOR MULTIPLE DATA OWNERS IN CLOUD COMPUTING | 2016 | IEEE |
170 | CLOUD COMPUTING | DOTNET | PROBABILISTIC OPTIMIZATION OF RESOURCE DISTRIBUTION AND ENCRYPTION FOR DATA TORAGE IN THE CLOUD | 2016 | IEEE |
171 | CLOUD COMPUTING | DOTNET | ENABLING PERSONALIZED SEARCH OVER ENCRYPTED OUTSOURCED DATA WITH EFFICIENCY IMPROVEMENT | 2016 | IEEE |
172 | CLOUD COMPUTING | DOTNET | EAVESDROPPING PREVENTION FOR NETWORK CODING ENCRYPTED CLOUD STORAGE SYSTEMS | 2016 | IEEE |
173 | CLOUD COMPUTING | DOTNET | ATTRIBUTE-BASED DATA SHARING SCHEME REVISITED IN CLOUD COMPUTING | 2016 | IEEE |
174 | CLOUD COMPUTING | DOTNET | DYNAMIC REQUEST REDIRECTION AND RESOURCE PROVISIONING FOR CLOUD-BASED VIDEO SERVICES UNDER HETEROGENEOUS ENVIRONMENT | 2016 | IEEE |
175 | CLOUD COMPUTING | DOTNET | CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION | 2016 | IEEE |
176 | CLOUD COMPUTING | DOTNET | PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE CLOUD | 2016 | IEEE |
177 | CLOUD COMPUTING | DOTNET | SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD COMPUTING | 2016 | IEEE |
178 | CLOUD COMPUTING | DOTNET | PRIVACY-PRESERVING PUBLIC AUDITING FOR REGENERATING-CODE-BASED CLOUD STORAGE | 2016 | IEEE |
179 | CLOUD COMPUTING | DOTNET | A HYBRID CLOUD APPROACH FOR SECURE AUTHORIZED DEDUPLICATION | 2016 | IEEE |
180 | CLOUD COMPUTING | DOTNET | PACK: PREDICTION-BASED CLOUD BANDWIDTH AND COST REDUCTION SYSTEM | 2016 | IEEE |
181 | CLOUD COMPUTING | DOTNET | SECURE DEDUPLICATION WITH EFFICIENT AND RELIABLE CONVERGENT KEY MANAGEMENT | 2016 | IEEE |
182 | CLOUD COMPUTING | DOTNET | KEY-AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD STORAGE | 2016 | IEEE |
183 | CLOUD COMPUTING | DOTNET | ORUTA: PRIVACY-PRESERVING PUBLIC AUDITING FOR SHARED DATA IN THE CLOUD | 2016 | IEEE |
184 | CLOUD COMPUTING | DOTNET | PRIVACY-PRESERVING MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED CLOUD DATA | 2016 | IEEE |
185 | CLOUD COMPUTING | DOTNET | A SECURE DATA SELF-DESTRUCTING SCHEME IN CLOUD COMPUTING | 2016 | IEEE |
186 | PARALLEL AND DISTRIBUTED SYSTEMS | DOTNET | ENERGY EFFICIENT COOPERATIVE COMPUTING IN MOBILE WIRELESS SENSOR NETWORKS | 2018 | IEEE |
187 | PARALLEL AND DISTRIBUTED SYSTEMS | DOTNET | A DIFFERENTIATED CACHING MECHANISM TO ENABLE PRIMARY STORAGE DEDUPLICATION IN CLOUDS | 2018 | IEEE |
188 | PARALLEL AND DISTRIBUTED SYSTEMS | DOTNET | ADAPTIVE RESOURCE ALLOCATION AND PROVISIONING IN MULTI-SERVICE CLOUD ENVIRONMENTS | 2018 | IEEE |
189 | PARALLEL AND DISTRIBUTED SYSTEMS | DOTNET | PRIVACY-PRESERVING MULTI-KEYWORD TOP-K SIMILARITY SEARCH OVER ENCRYPTED DATA | 2018 | IEEE |
190 | PARALLEL AND DISTRIBUTED SYSTEMS | DOTNET | FLEXIBLE AND EFFICIENT BLOCKCHAIN-BASED ABE SCHEME WITH MULTI-AUTHORITY FOR MEDICAL ON DEMAND IN TELEMEDICINE SYSTEM | 2018 | IEEE |
191 | PARALLEL AND DISTRIBUTED SYSTEMS | DOTNET | A DISTRIBUTED TRUST EVALUATION PROTOCOL WITH PRIVACY PROTECTION FOR INTERCLOUD | 2019 | IEEE |
192 | PARALLEL AND DISTRIBUTED SYSTEMS | DOTNET | CROWDBC: A BLOCKCHAIN-BASED DECENTRALIZED FRAMEWORK FOR CROWDSOURCING | 2019 | IEEE |
193 | PARALLEL AND DISTRIBUTED SYSTEMS | DOTNET | SECURE ANTI-COLLUSION DATA SHARING SCHEME FOR DYNAMIC GROUPS IN THE CLOUD | 2019 | IEEE |
194 | PARALLEL AND DISTRIBUTED SYSTEMS | DOTNET | AUTHENTICATED KEY EXCHANGE PROTOCOLS FOR PARALLEL NETWORK FILE SYSTEMS | 2016 | IEEE |
195 | PARALLEL AND DISTRIBUTED SYSTEMS | DOTNET | TASK SCHEDULING FOR MAXIMIZING PERFORMANCE AND RELIABILITY CONSIDERING FAULT RECOVERY IN HETEROGENEOUS DISTRIBUTED SYSTEMS | 2016 | IEEE |
196 | PARALLEL AND DISTRIBUTED SYSTEMS | DOTNET | AN EFFICIENT PRIVACY-PRESERVING RANKED KEYWORD SEARCH METHOD | 2016 | IEEE |
197 | PARALLEL AND DISTRIBUTED SYSTEMS | DOTNET | SECURE AND DISTRIBUTED DATA DISCOVERY AND DISSEMINATION IN WIRELESS SENSOR NETWORKS | 2016 | IEEE |
198 | PARALLEL AND DISTRIBUTED SYSTEMS | DOTNET | SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD COMPUTING | 2016 | IEEE |
199 | PARALLEL AND DISTRIBUTED SYSTEMS | DOTNET | A PROBABILISTIC MISBEHAVIOR DETECTION SCHEME TOWARD EFFICIENT TRUST ESTABLISHMENT IN DELAY-TOLERANT NETWORKS | 2016 | IEEE |
200 | PARALLEL AND DISTRIBUTED SYSTEMS | DOTNET | HOP-BY-HOP MESSAGE AUTHENTICATION AND SOURCE PRIVACY IN WIRELESS SENSOR NETWORKS | 2016 | IEEE |
201 | PARALLEL AND DISTRIBUTED SYSTEMS | DOTNET | A SECURE PAYMENT SCHEME WITH LOW COMMUNICATION AND PROCESSING OVERHEAD FOR MULTIHOP WIRELESS NETWORKS | 2016 | IEEE |
202 | WEB SERVICE | DOTNET | FLOW CLASSIFICATION FOR SOFTWARE-DEFINED DATA CENTERS USING STREAM MINING | 2019 | IEEE |
203 | WEB SERVICE | DOTNET | A CLOUD BROKERAGE ARCHITECTURE FOR EFFICIENT CLOUD SERVICE SELECTION | 2019 | IEEE |
204 | WEB SERVICE | DOTNET | SECO-LDA: MINING SERVICE CO-OCCURRENCE TOPICS FOR COMPOSITION RECOMMENDATION | 2019 | IEEE |
205 | WEB SERVICE | DOTNET | QOS-AWARE SERVICE SELECTION USING AN INCENTIVE MECHANISM | 2019 | IEEE |
206 | WEB SERVICE | DOTNET | RESCUE WINGS: MOBILE COMPUTING AND ACTIVE SERVICES SUPPORT FOR DISASTER RESCUE | 2018 | IEEE |
207 | WEB SERVICE | DOTNET | SMARTCRAWLER: A TWO-STAGE CRAWLER FOR EFFICIENTLY HARVESTING DEEP-WEB INTERFACES | 2018 | IEEE |
208 | WEB SERVICE | DOTNET | TICREC: A PROBABILISTIC FRAMEWORK TO UTILIZE TEMPORAL INFLUENCE CORRELATIONS FOR TIME-AWARE LOCATION RECOMMENDATIONS | 2016 | IEEE |
209 | WEB SERVICE | DOTNET | NETWORK AND QOS-BASED SELECTION OF COMPLEMENTARY SERVICES | 2016 | IEEE |
210 | WEB SERVICE | DOTNET | QOS-AWARE WEB SERVICE RECOMMENDATION BY COLLABORATIVE FILTERING | 2016 | IEEE |
211 | WEB SERVICE | DOTNET | SERVICE-CENTRIC FRAMEWORK FOR A DIGITAL GOVERNMENT APPLICATION | 2016 | IEEE |
578 | WEB TECHNOLOGY | DOTNET | PREVENTION OF DATA LEAKERS IN SPARTIAL DOMAIN | IEEE | IEEE |
579 | WEB TECHNOLOGY | DOTNET | INFORMATION-THEORETIC OUTLIER DETECTION FOR LARGE-SCALE CATEGORICAL DATA | IEEE | IEEE |
580 | WEB TECHNOLOGY | DOTNET | ORGANIZING USER SEARCH HISTORIES | IEEE | IEEE |
581 | WEB TECHNOLOGY | DOTNET | A MACHINE LEARNING APPROACH FOR IDENTIFYING DISEASE-TREATMENT RELATIONS IN SHORT TEXTS | IEEE | IEEE |
582 | WEB TECHNOLOGY | DOTNET | SERVICE-CENTRIC FRAMEWORK FOR A DIGITAL GOVERNMENT APPLICATION | IEEE | IEEE |
583 | WEB TECHNOLOGY | DOTNET | DDSGA: A DATA-DRIVEN SEMI-GLOBAL ALIGNMENT APPROACH FOR DETECTING MASQUERADE ATTACKS | IEEE | IEEE |
584 | WEB TECHNOLOGY | DOTNET | CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION | IEEE | IEEE |
585 | WEB TECHNOLOGY | DOTNET | SLICING: A NEW APPROACH FOR PRIVACY PRESERVING DATA PUBLISHING | IEEE | IEEE |
586 | WEB TECHNOLOGY | DOTNET | SHARED AUTHORITY BASED PRIVACY-PRESERVING AUTHENTICATION PROTOCOL IN CLOUD COMPUTING | IEEE | IEEE |
587 | WEB TECHNOLOGY | DOTNET | PACK: PREDICTION-BASED CLOUD BANDWIDTH AND COST REDUCTION SYSTEM | IEEE | IEEE |
588 | WEB TECHNOLOGY | DOTNET | FAST NEAREST NEIGHBOR SEARCH WITH KEYWORDS | IEEE | IEEE |
589 | WEB TECHNOLOGY | DOTNET | MINING USER QUERIES WITH MARKOV CHAINS: APPLICATION TO ONLINE IMAGE RETRIEVAL | IEEE | IEEE |
590 | WEB TECHNOLOGY | DOTNET | A NEW ALGORITHM FOR INFERRING USER SEARCH GOALS WITH FEEDBACK SESSIONS | IEEE | IEEE |
591 | WEB TECHNOLOGY | DOTNET | ANOMALY DETECTION VIA ONLINE OVERSAMPLING PRINCIPAL COMPONENT ANALYSIS | IEEE | IEEE |
592 | WEB TECHNOLOGY | DOTNET | A SECURE DATA SELF-DESTRUCTING SCHEME IN CLOUD COMPUTING | IEEE | IEEE |