ABSTRACT: Contactless personal identification utilizing biometrics qualities brings multifaceted advantages with enhanced cleanliness, client security, and the convenience. Such imaging likewise produces deformation free palmprint images which can prompt higher matching exactness as the ground truth data is better protected as contrasted and those from contact-based imaging. Advancement of palmprint identification technologies for new domains […]
.NET MINI PROJECTS
IFS03-Semantic-aware Searching over Encrypted Data for Cloud
ABSTRACT: With the increasing adoption of cloud computing, an increasing number of clients outsource their datasets to a cloud. To preserve privacy, the datasets are usually encrypted before outsourcing. Be that as it may, the common practice with regards to encryption makes the compelling use of the data difficulty. For instance, it is hard to […]
IFS02-Privacy-preserving Indexing and Query Processing for Secure Dynamic Cloud Storage
ABSTRACT: With the increasing popularity of cloud-based data services, data proprietors are highly motivated to store their huge amount of potentially sensitive personal data files on remote servers in encoded form. Customers later can query over the encrypted database to retrieve files while protecting the privacy of both the queries and the database, by permitting some reasonable […]
IFS01-Efficient Retrieval over Documents Encrypted by Attributes in Cloud Computing
ABSTRACT: Secure document storage and retrieval are one of the hottest research headings in cloud computing. Despite the fact that many searchable encryption plans have been proposed, few of them bolster effective retrieval over the documents which are encrypted based of their attributes. In this project, a hierarchical attribute-based encryption scheme is first designed for […]
KDE07-PrivateGraph: Privacy-Preserving Spectral Analysis of Encrypted Graphs in the Cloud
ABSTRACT: With the wide deployment of public clouds, proprietors of big graphs need to utilize the cloud to deal with the scalability issues. However, the privacy and ownership for graphs in the cloud has turned into a major concern. In this project, we examine privacy-preserving algorithms for graph spectral analysis of outsourced encrypted graph in […]
KDE06-Secure and Efficient Skyline Queries on Encrypted Data-knowledge
ABSTRACT: Outsourcing data to cloud server gives a cost-effective way approach to support large-scale data storage and query processing. Be that as it may, because of security and privacy concerns, sensitive information (e.g., medical records) should be protected from the cloud server and other unauthorized clients. One approach is to outsource encrypted data to the cloud server […]
KDE05-DeepClue: Visual Interpretation of Text-based Deep Stock Prediction-knowledge
ABSTRACT: The recent advance of deep learning has enabled trading algorithms to predict stock value developments all the more accurately. Unfortunately, there is a critical gap in the real-world deployment of this breakthrough. This project presents DeepClue, a system develop to connect text-based deep learning models and end clients through visually interpreting the key elements learned […]
KDE04-Location Inference for Non-geotagged Tweets in User Timelines
ABSTRACT: As social media clients are increasingly going mobile, different location based Services (LBS) have been sent via web-based social media like Twitter. The success of them heavily relies upon the availability and accuracy of clients’ location data. Be that as it may, just a little fraction of tweets are geo-tagged. In this way, it […]
KDE03-Modeling and Predicting Community Structure Changes in Time-Evolving Social Networks
ABSTRACT: As time evolves, a community in a social network may experience different changes known as critical events. For example, a community can either split into a few different communities, project into a larger community, shrink to a smaller community, remain stable or merge into another network. Prediction of critical events has attracted in expanding […]
KDE02-A New Robust Approach for Reversible Database Watermarking With Distortion Control
ABSTRACT: These days information is crucial in numerous fields, for example, such as, medicine, science, and business, where databases are utilized effectively for data sharing. In any case, the databases face the risk of being pirated, stolen or abused, which may bring about a lot of security threats concerning proprietorship rights, data tempering and privacy protection. […]