1.A Novel Recommendation Model Regularized with User Trust and Item Ratings.
2.TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage.
3. An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing.
4. An Efficient Privacy-Preserving Ranked Keyword Search Method.
5. Automatically Mining Facets for Queries from Their Search Results.
6. Building an intrusion detection system using a filter-based feature selection algorithm.
7.Conditional Identity-based Broadcast Proxy Re-Encryption and Its Application to Cloud Email.
8. Cross-domain Sentiment Classification using Sentiment Sensitive Embeddings.
9. Detecting Node Failures in Mobile WirelessNetworks: A Probabilistic Approach.
10. Dictionary Based Secure Provenance Compression for Wireless Sensor Networks.
11. Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage.
12. Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates.
13. STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users.
14. Energy and Memory Efficient Clone Detection in NWireless Sensor Networks.
15. Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing.
16. FRoDO: Fraud Resilient Device for Off-line micro-payments.
17. Hidden Ciphertext Policy Attribute Based Encryption under Standard Assumptions.
18. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud.
19.Mining User-Aware Rare Sequential Topic Patterns in Document Streams.
20. Privacy-Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms.
21. Profiling Online Social Behaviors for Compromised Account Detection.
22.Quantifying Political Leaning from Tweets,Retweets, and Retweeters.
23. Rating Prediction based on Social Sentiment from Textual Reviews.
24.Real-time Semantic Search using Approximate Methodology for Large-scale Storage Systems.
25. Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach