1.Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing.
2.Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing.
3.Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage.
4.Enabling Semantic Search based on Conceptual Graphs over Encrypted Outsourced Data.
5.Graph Encryption for Top-K Nearest Keyword Search Queries on Cloud.
6.Keyword Search with Access Control over Encrypted Cloud Data.
7.MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection.
8.Privacy Protection Based Access Control Scheme in Cloud-Based Services.
9.Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data.
10.Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data.
11.SeDaSC: Secure Data Sharing in Clouds.
12.Strong Key-Exposure Resilient Auditing for Secure Cloud Storage.
13.TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud.
14.User Differentiated Verifiable File Search on the Cloud.
15.VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data.
16.A Multi-Agent Advanced Traveler Information System for Optimal Trip Planning in a Co-Modal Framework.
17.Continuous Top-k Monitoring on Document Streams.
18.Detecting Stress Based on Social Interactions in Social Networks.
19.Dynamic Facet Ordering for Faceted Product Search Engines.
20.Efficient Keyword-aware Representative Travel Route Recommendation.
21.Filtering out Infrequent Behavior from Business Process Event Logs.
22.GALLOP: GlobAL feature fused Location Prediction for Different Check-in Scenarios.
23.Generating Query Facets using Knowledge Bases.
24.Influence Maximization in Trajectory Databases.
25.Query Reorganisation Algorithms for Efficient Boolean Information Filtering.
26.E2HRC: An Energy-Efficient Heterogeneous Ring Clustering Routing Protocol for Wireless Sensor Networks.
27.Energy Efficient Clustering Algorithm for Multi-Hop Wireless Sensor Network Using Type-2 Fuzzy Logic.
28.Energy Efficient Multipath Routing Protocol for Mobile ad-hoc Network Using the Fitness Function.
29.Lightweight Three-factor Authentication and Key Agreement Protocol for Internet-integrated Wireless Sensor Networks.
30.Research on Trust Sensing based Secure Routing Mechanism for Wireless Sensor Network.
31.Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs.
32.Cooperative Query Answer Authentication Scheme over Anonymous Sensing Data.
33.FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data.
34.NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media.
35.Privacy-Preserving Selective Aggregation of Online User Behavior Data.
36.Search Rank Fraud and Malware Detection in Google Play.
37.Leveraging Crowdsourcing for Efficient Malicious Users Detection in Large-Scale Social Networks.
38.SPFM: Scalable and Privacy-preserving Friend Matching in Mobile Cloud.
39.A Novel Data Hiding Algorithm for High Dynamic Range Images.
40.Image Re-ranking based on Topic Diversity.
41.Flexible Wildcard Searchable Encryption System.
42.Transactional Behavior Verification in Business Process as a Service Configuration.