Data Integrity Auditing without Private Key Storage for Secure Cloud Storage
 Privacy Preserving Searchable Encryption with Fine-grained Access Control
 Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT
 A Trust-Based Agent Learning Model for Service Composition in Mobile Cloud Computing Environments
 Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data
 Novel Multi Keyword Search on Encrypted Data in the Cloud
 Hidden Ciphertext Policy Attribute-Based Encryption with Fast Decryption for Personal Health Record System
 Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing
 A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing
 Verifiable and Multi-keyword Searchable Attribute-based Encryption Scheme for Cloud Storage
 Who You Should Not Follow: Extracting Word Embeddings from Tweets to Identify Groups of Interest and Hijackers in Demonstrations
 A Data Sharing Protocol to Minimize Security and Privacy Risks of Cloud Storage in Big Data Era
 Enabling Authorized Encrypted Search for Multi-Authority Medical Databases
 Mining Users Trust from E-Commerce Reviews Based on Sentiment Similarity Analysis
 Salary Prediction in the IT Job Market with Few High Dimensional Samples A Spanish Case Study
 Hierarchical Attention Network for Visually aware Food Recommendation
 Privacy Preserving Social Media Data Publishing for Personalized Ranking Based Recommendation
 Crop Recommendation System to Maximize Crop Yield using SVM and decision Tree algorithm Using Java
 Minimizing Influence of Rumors on Social Networks Algorithms and Analysis
 A study on prediction of cancer using Data mining Techniques with CNN Algorithm
 Vehicle Price Prediction System using SVM Techniques
 Heterogeneous Information Network Embedding for Recommendation
 Finding Optimal Skyline Product Combinations under Price Promotion
 Trust Relationship Prediction in Alibaba E Commerce Platform
 Active Online Learning for Social Media Analysis to Support Crisis Management
 A Hybrid Elearning Recommendation Approach Based on Learners Influence Propagation
 Filtering Instagram Hashtags Through Crowd tagging and the HITS Algorithm
 Credibility Evaluation of Twitter Based Event Detection by a Mixing Analysis of Heterogeneous Data
 Network Representation Learning Enhanced Recommendation Algorithm
 Social Network Rumor Diffusion Predication Based on Equal Responsibility Game Model
 NASM: Nonlinearly Attentive Similarity Model for Recommendation System via Locally Attentive Embedding
 DCCR: Deep Collaborative Conjunctive Recommender for Rating Prediction
 Clustering-Based Collaborative Filtering Using an Incentivized/Penalized User Model
 A Hierarchical Attention Model for Social Contextual Image Recommendation
 Secure and Efficient Skyline Queries on Encrypted Data
 Automated Decision Making in Airport Checkpoints: Bias Detection Toward Smarter Security and Fairness
 Detecting Pickpocket Suspects from Large Scale Public Transit Records
 Predicting Consumption Patterns with Repeated and Novel Events
 Collaboratively Tracking Interests for User Clustering in Streams of Short Texts
 Learning Customer Behaviors for Effective Load Forecasting
 Normalization of Duplicate Records from Multiple Sources
 Multi-Party High-Dimensional Data Publishing under Differential Privacy
 Detection of fake online reviews using semi-supervised and supervised learning
 Achieving Data Truthfulness and Privacy Preservation in Data Markets
 Conversational Networks for Automatic Online Moderation
 Interdisciplinarity as diversity in citation patterns among journals Rao-Stirling diversity, relative variety, and the Gini coefficient
 Spammer Detection and Fake User Identification on Social Networks
 PersoNet Friend Recommendation System Based on Big Five Personality Traits and Hybrid Filtering
 Online Public Shaming on Twitter Detection, Analysis and Mitigation
 Detecting Malicious Social Bots Based on Clickstream Sequences
 Trust based Privacy Preserving Photo Sharing in Online Social Networks
 A Fuzzy Approach to Text Classification With Two-Stage Training for Ambiguous Instances
 Encryption & Decryption of text file Audio and Video using Java
 Robust Intelligent Malware Detection Using Deep Learning
 K nearest Neighbors Search by Random Projection Forests
 Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Learning Algorithms
 P-MOD: Secure Privilege-Based Multilevel Organizational Data-Sharing in Cloud Computing
 Enabling Verifiable and Dynamic Ranked Search Over Outsourced Data
 Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification
 Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting
 CryptDAC Cryptographically Enforced Dynamic Access Control in the Cloud
 A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage Services
 Revocable Identity-Based Broadcast Proxy Re-encryption for Data Sharing in Clouds
 Searchable Symmetric Encryption with Forward Search Privacy
 Sensitive Label Privacy Preservation with Anatomization for Data Publishing
 Memory Leakage-Resilient Dynamic and Verifiable Multi-Keyword Ranked Search on Encrypted Smart Body Sensor Network Data
 Authenticated Medical Documents Releasing with Privacy Protection and Release Control
 Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage
 An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud Storage
 A Secure G-Cloud-Based Framework for Government Healthcare Services
 Peer Prediction-Based Trustworthiness Evaluation and Trustworthy Service Rating in Social Networks
 Secure Key Agreement and Key Protection for Mobile Device User Authentication
 Authentication by Encrypted Negative Password
 Retrieving Hidden Friends A Collusion Privacy Attack Against Online Friend Search Engine
 Enabling Efficient and Geometric Range Query With Access Control Over Encrypted Spatial Data
 Automated Decision Making in Airport Checkpoints: Bias Detection Toward Smarter Security and Fairness
 Collusion Defender Preserving Subscribers Privacy in Publish and Subscribe Systems
 Public Auditing For Trusted Cloud Services
 Spam Filtering by Semantics-based Text Classification using LDA and SVM Algorithm
 Secure Fine-grained Encrypted Keyword Search for e-Healthcare Cloud
 Building and Querying an Enterprise Knowledge Graph
 Secure Channel Free Certificate-Based Searchable Encryption Withstanding Outside and Inside Keyword Guessing Attacks
 Provable Data Possession with Outsourced Data Transfer
 A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage Services
 Delegated Authorization Framework for EHR Services using Attribute Based Encryption
 Profit Maximization for Cloud Brokers in Cloud Computing
 A Distributed Trust Evaluation Protocol with Privacy Protection for Intercloud
 Hybrid Keyword-Field Search With Efficient Key Management for Industrial Internet of Things
 Trustworthy Delegation Toward Securing Mobile Healthcare Cyber-Physical Systems
 Ant Colony Stream Clustering A Fast Density Clustering Algorithm for Dynamic Data Streams
 Collaborative Filtering based Electricity Plan Recommender System
 Distributing Tourists Among POIs with an Adaptive Trip Recommendation System
 Privacy-Preserving Crowd-Sourced Statistical Data Publishing with An Untrusted Server
 FooDNet: Toward an Optimized Food Delivery Network Based on Spatial Crowdsourcing
 Automatic Generation of Tests to Exploit XML Injection Vulnerabilities in Web Applications
 MOOCs as a Remedial Complement Students’ Adoption and Learning Outcomes