| S No | Year | Project Title |
|---|---|---|
| 1 | 2025 | Detecting the Undetected: Cutting-Edge Machine Learning Techniques for Network Anomaly Discovery |
| 2 | 2025 | Strengthening Cloud Security with Machine Learning-Driven Multi-Factor Authentication and Adaptive Cryptography |
| 3 | 2025 | Driving Zero Trust Evolution Across Industries Through Emerging Technologies |
| 4 | 2025 | Machine and Deep Learning Approaches to Personalized App Recommendations Using Crowd Sourced Education Data |
| 5 | 2025 | Interpretable AI for Healthcare: Deep Learning-Based Long-Term ECG Noise Classification |
| 6 | 2025 | Transforming Aphasia Detection: A Novel ROI-Focused Method Leveraging Structural MRI Spot language impairment areas in the brain with MRI + AI |
| 7 | 2025 | Forecasting the Storm: A Modified Stacking Ensemble Approach for Enhanced Precipitation Prediction in China |
| 8 | 2025 | Securing the Future of Care: Cybersecurity in AI-Driven Digital Health Communication Networks |
| 9 | 2025 | Predicting Diabetic Progression in the Cloud:An Optimized Ensemble Approach using Azure Machine Learning |
| 10 | 2025 | Explainable Deep Learning for Breast Cancer Detection: Bridging Accuracy and Interpretability |
| 11 | 2025 | Machine Learning Made Child s Play: A Platform for Designing and Deploying Al Apps by Young Innovators |
| 12 | 2025 | The Future of Secure Identity:A Systematic Review of Passwordless Authentication Methods and challenges |
| 13 | 2025 | Cyber Threat Resilience in Logistics Chains: A Systematic Review and Conceptual DetectionFrameworks |
| 14 | 2025 | From Pixels to Provenance: Harnessing Source Camera Fingerprints to Detect AICreated Images |
| 15 | 2025 | Smart Instruction: Leveraging Machine Learning to Personalize Engineering Education Through Data on Learning Behaviors |
| 16 | 2025 | Photographic Innovation in the AI Era: Virtual Image Art Creation Powered by Deep Learning |
| 17 | 2025 | Cyber Intelligent Risk Assessment for Industrial loT Using Machine Learning |
| 18 | 2025 | Machine Learning for Meat Drying Time Prediction: A Smart Manufacturing Perspective |
| 19 | 2025 | Deep Reinforcement Learning for Efficient Task Scheduling and Load Balancing in Fog Computing for Critical Healthcare |
| 20 | 2025 | Predictive migration of service function chains for fault tolerent mobile edge computing |
| 21 | 2025 | Exploring Machine and Deep Learning Methods for Accurate Accent Recognition |
| 22 | 2025 | Fusion of Infrared and Visible Images Using Target-Oriented Image Enhancement Strategies |
| 23 | 2025 | Cardiovascular Disease Diagnosis and Risk Evaluation Through a Novel MambaBased VoxelMorph Model |
| 24 | 2025 | Social Sensing for Public Health : TepiSense AI System |
| 25 | 2025 | A Neutrosophic fuzzy lot framework for remote healthcare |
| 26 | 2025 | Adaptive Threat Intelligence: An AI-Integrated Holistic Framework for Modern Cybersecurity Challenges |
| 27 | 2025 | Efficient Brains for Digital Medicine: Memory-Centric Optimization of CNNs and SNNs Using |
| 28 | 2025 | Multi-Language Code Generation with ChatGPT: Insights into AI s CrossLingustic Programming Abilities. |
| 29 | 2025 | Convolutional Neural Networks in Motion: Automating Passenger Identification at Terrestrial Terminals |
| 30 | 2025 | Integrating CNN and Image Processing Methods for Precise Detection and Quantification of Pulp Fibril |
| 31 | 2025 | Exploring quantum horizons, performance analysis of annealing based ML on ADMET Datasets |
| 32 | 2025 | Predicting Lung Cancer With AI-Enhanced Breath Analysis: Feature-Selected Ensemble Models of VOC Biomarkers |
| 33 | 2025 | Security Implications of Direct User File Uploads to Cloud Storage in Web Applications |
| 34 | 2025 | Energy-Efficient Task Scheduling in Cloud Data Centers Using Enhanced MultiObjective Optimization (EMO-TS) |
| 35 | 2025 | Machine Learning for Truth Discovery: A Review of Fake News, Propaganda Authors, and Their Influence on Society |
| 36 | 2025 | Intuitionistic Fuzzy Generator-Based Retinex Framework for Advanced LowLight Image Enhancement |
| 37 | 2025 | Advanced Prediction of Bitcoin Block Delays via Bayesian and Non-Bayesian Logistic Regression |
| 38 | 2025 | Adaptive Cryptography and Multi-Factor Authentication in Cloud Security Using Machine Learning Techniques |
| 39 | 2025 | Harnessing Modern Deep Learning for Efficient Processing of Big Medical Data in Cloud Environments |
| 40 | 2025 | Cyber Threat Forecasting: The Transition from Traditional ML to Generative AI |
| 41 | 2024 | A Machine Learning Approach Using Statistical Models for Early Detection of Cardiac Arrest in Newborn Babies in the Cardiac Intensive Care Unit |
| 42 | 2024 | A Deep Learning-Based Efficient Firearms Monitoring Technique for Building Secure Smart Cities |
| 43 | 2024 | A Novel Approach for Disaster Victim Detection Under Debris Environments Using Decision Tree Algorithms With Deep Learning Features |
| 44 | 2024 | An Efficient Privacy-enhancing Cross-silo Federated Learning and Applications for False Data Injection Attack Detection in Smart Grids |
| 45 | 2024 | Automated Emerging Cyber Threat Identification and Profiling Based on Natural Language Processing |
| 46 | 2024 | Creating Alert Messages Based on Wild Animal Activity Detection Using Hybrid Deep Neural Networks |
| 47 | 2024 | DataFITS: A Heterogeneous Data Fusion Framework for Traffic and Incident Prediction |
| 48 | 2024 | Explainable Artificial Intelligence for Patient Safety: A Review of Application in Pharmacovigilance |
| 49 | 2024 | Improving Shopping Mall Revenue by Real-Time Customized Digital Coupon Issuance |
| 50 | 2024 | Personalized Federated Learning for In-Hospital Mortality Prediction of Multi-Center ICU |
| 51 | 2024 | Propounding First Artificial Intelligence Approach for Predicting Robbery Behavior Potential in an Indoor Security Camera |
| 52 | 2024 | PupilHeart: Heart Rate Variability Monitoring via Pupillary Fluctuations on Mobile Devices |
| 53 | 2024 | Real-Time Personalized Physiologically Based Stress Detection for Hazardous Operations |
| 54 | 2024 | RMT-Net: Reject-aware Multi-Task Network for Modeling Missing-not-at-random Data in Financial Credit Scoring |
| 55 | 2024 | The Influence of Artificial Intelligence on E-Governance and Cybersecurity in Smart Cities: A Stakeholder’s Perspective |
| 56 | 2024 | Trustworthy and Reliable Deep-Learning-Based Cyberattack Detection in Industrial IoT |
| 57 | 2024 | Optimal Ambulance Positioning for Road Accidents With Deep Embedded Clustering |
| 58 | 2024 | Data Driven Energy Economy Prediction for Electric City Buses Using Machine Learning |
| 59 | 2024 | FraudAuditor: A Visual Analytics Approach for Collusive Fraud in Health Insurance |
| 60 | 2024 | Predicting hourly boarding demand of bus passengers using imbalanced records from smart-cards: A deep learning approach |
| 61 | 2024 | A Multi-perspective Fraud Detection Method for Multi-Participant E-commerce Transactions |
| 62 | 2024 | Abnormal Traffic Detection Based on Attention and Big Step Convolution |
| 63 | 2024 | Identifying Student Profiles within Online Judge systems using Explainable Artificial Intelligence |
| 64 | 2024 | Predicting Behavior Change in Students With Special Education Needs Using Multimodal Learning Analytics |
| 65 | 2024 | Automated Android Malware Detection Using Optimal Ensemble Learning Approach for Cybersecurity |
| 66 | 2024 | DeepSide: A Deep Learning Framework for Drug Side Effect Prediction |
| 67 | 2024 | Unsupervised Machine Learning for Managing Safety Accidents in Railway Stations |
| 68 | 2024 | BLOOD GROUP DETECTION USING IMAGE PROCESSING AND FINGERPRINT |
| 69 | 2024 | Artificial Intelligence Techniques for Landslides Prediction Using Satellite Imagery |
| 70 | 2024 | Climate Change Impact on Agricultural Land Suitability: An Interpretable Machine Learning Based Eurasia Case Study |
| 71 | 2024 | Deep Convolutional Neural Network For Robust Detection Of Object-Based Forgeries In Advanced Video |
| 72 | 2024 | DeepDiabetic: An Identification System of Diabetic Eye Diseases Using Deep Neural Networks |
| 73 | 2024 | Driver Drowsiness Detection Based on Convolutional Neural Network Architecture Optimization Using Genetic Algorithm |
| 74 | 2024 | Energy Demand Forecasting for Electric Vehicles Using Blockchain-Based Federated Learning |
| 75 | 2024 | Financial Fraud Detection Using Value-at-Risk With Machine Learning in Skewed Data |
| 76 | 2024 | Hybrid Machine Learning Model for Efficient Botnet Attack Detection in IoT Environment |
| 77 | 2024 | Machine Learning Approach to Classification of Online Users by Exploiting Information Seeking Behavior |
| 78 | 2024 | Multi-Modal Features Representation-Based Convolutional Neural Network Model for Malicious Website Detection |
| 79 | 2024 | Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches |
| 80 | 2024 | PersoNet: A Novel Framework for Personality Classification-Based Apt Customer Service Agent Selection |
| 81 | 2024 | Smart City Transportation: Deep Learning Ensemble Approach for Traffic Accident Detection |
| 82 | 2024 | Social Media as a Mirror: Reflecting Mental Health through Computational Linguistics |
| 83 | 2024 | Software Fault Prediction Using Cross Project Analysis A Study on Class Imbalance and Model Generalization |
| 84 | 2024 | The Short Video Popularity Prediction Using Internet of Things and Deep Learning |
| 85 | 2024 | Unveiling Vulnerabilities of Web Attacks Considering Man in the Middle Attack and Session Hijacking |
| 86 | 2024 | Machine Learning for Peatland Ground Water Level GWL Prediction via IoT System |
| 87 | 2024 | FEPP Advancing Software Risk Prediction in Requirements Engineering Through Innovative Rule Extraction and Multi-Class Integration |
| 88 | 2024 | Emotion Recognition and Management in the Tourism Industry During Emergency Events |
| 89 | 2024 | Detecting Side Effects Of Adverse Drug Reactions Through Drug-Drug Interactions Using Graph Neural Networks And Self Supervised Learning |
| 90 | 2024 | Assessing Data Breach Factors Through Modern Crime Theory: A Structural Equation Modeling Approach |
| 91 | 2024 | Intelligent Pattern Recognition Using Equilibrium Optimizer With Deep Learning Model For Android Malware Detection |
| 92 | 2024 | Detection And Prediction Of Future Mental Disorder From Social Media Data Using Machine Learning, Ensemble Learning, And Large Language Models |
| 93 | 2024 | Detection And Defense: Student-Teacher Network For Adversarial Robustness |
| 94 | 2024 | Multi-Modal Features Representation-Based Convolutional Neural Network Model For Malicious Website Detection |
| 95 | 2024 | Live Event Detection For People’s Safety Using Nlp And Deep Learning |
| 96 | 2024 | Enhancing Medicare Fraud Detection Through Ml: Addressing Class Imbalance With Smote-Enn |
| 97 | 2024 | Smart City Transportation: Deep Learning Ensemble Approach For Traffic Accident Detection |
| 98 | 2024 | A Suspicious Financial Transaction Detection Model Using Autoencoder And RiskBased Approach |
| 99 | 2024 | Enhancing Urban Parking Efficiency Through Machine Learning Model Integration |
| 100 | 2024 | A Hybrid Machine Learning And Regression Approach For Validating A MultiDimensional Crime Index In The Context Of Crime Against Women |
| 101 | 2024 | Remaining Useful Life Predictor For Ev Batteries Using Machine Learning |
| 102 | 2024 | Optimizing Patient Recruitment For Clinical Trials: A Hybrid Classification Model And Game-Theoretic Approach For Strategic Interaction |
| 103 | 2024 | Smart Iot-Blockchain Security To Secure Sensitive Personal Medical Data Using Shuffled Random Starvation Link Encryption |
| 104 | 2024 | RANSOMWARE CLASSIFICATION AND DETECTION WITH MACHINE LEARNING ALGORITHMS |
| 105 | 2024 | CALORIE ESTIMATION OF FOOD AND BEVERAGES USING DEEP LEARNING |
| 106 | 2024 | A Proposed Model for Improving the Reliability of Online Exam Results Using Blockchain |
| 107 | 2024 | AgriResponse: A Real-Time Agricultural Query-Response Generation System for Assisting Nationwide Farmers |
| 108 | 2024 | Attribute-Based Searchable Encryption With Forward Security for Cloud- Assisted IoT |
| 109 | 2024 | Blockchain Based Data Integrity Verification for Large-Scale IoT Data |
| 110 | 2024 | Blockchain-Based Authorization Mechanism for Educational Social Internet of Things |
| 111 | 2024 | Blockchain-Enabled Framework for Transparent Land Lease and Mortgage Management |
| 112 | 2024 | City Hotspot Identification Using Smart Cyber-Physical Social System |
| 113 | 2024 | Collaborative Learning for Cyberattack Detection in Blockchain Networks |
| 114 | 2024 | Efficient Privacy-Friendly and Flexible Wearable Data Processing With User-Centric Access Control |
| 115 | 2024 | eKYC-DF: A Large-Scale Deepfake Dataset for Developing and Evaluating eKYC Systems |
| 116 | 2024 | Interest-Based E-Commerce and Users’ Purchase Intention on Social Network Platforms |
| 117 | 2024 | IoT-Enabled Advanced Water Quality Monitoring System for Pond Management and Environmental Conservation |
| 118 | 2024 | Predicting Voting Outcomes for Multi-Alternative Elections in Social Networks |
| 119 | 2024 | Privacy-Preserving and Lightweight Verification of Deep Packet Inspection in Clouds |
| 120 | 2024 | PublicEduChain: A Framework for Sharing Student-Owned Educational Data on Public Blockchain Network |
| 121 | 2024 | Safeguarding Patient Data-Sharing: Blockchain-Enabled Federated Learning in Medical Diagnostics |
| 122 | 2024 | Social Media Forensics: An Adaptive Cyberbullying-Related Hate Speech Detection Approach Based on Neural Networks With Uncertainty |
| 123 | 2024 | Spam Text Detection Over Social Media Usage: A Supervised Sampling Approach for the Social Web of Things |
| 124 | 2024 | TruthSeeker: The Largest Social Media Ground-Truth Dataset for Real/Fake Content |
| 125 | 2023-2024 | Vulnerability assessment over the “Network Infrastructure”. |
| 126 | 2023-2024 | Web application security project on any organization |
| 127 | 2023-2024 | Network penetration testing on Website |
| 128 | 2023-2024 | Wireless penetration testing on Organization website |
| 129 | 2023-2024 | Application level penetration testing |
| 130 | 2023-2024 | Mobile black box security testing |
| 131 | 2023-2024 | Operating system level penetration testing |
| 132 | 2023-2024 | Discover the vulnerable assessment on the network |
| 133 | 2023-2024 | Defensive mode security testing on any windows flat form. |
| 134 | 2023-2024 | Cryptographic failures over the organization |
| 135 | 2023-2024 | Open web applications secure project on any organization |
| 136 | 2023-2024 | Discover all the machines in the network along with ip’s, services, o.s and versions. |
| 137 | 2023-2024 | Vulnerable assessment pen testing on windows environment. |
| 138 | 2023-2024 | Authentication bypass related security testing on “altoro mutual company”. |
| 139 | 2023-2024 | Vapt by using nessus on any organization. |
| 140 | 2023-2024 | Offensive mode security testing on windows flat form. |
| 141 | 2023-2024 | Foot printing with respect of black box and white box security testing. |
| 142 | 2023-2024 | Offensive security testing on Linux environment. |
| 143 | 2023-2024 | Windows security testing with respect of black box. |
| 144 | 2023-2024 | Security testing with help of IoT tools on any organization. |
| 145 | 2023-2024 | Gray box security testing on http://www.testfire.net |
| 146 | 2023-2024 | Set on any website with respect of black box security testing. |
| 147 | 2023-2024 | Vulnerable assessment on organization with help of nikto, skipfish & owasp-zap. |
| 148 | 2023-2024 | Black box security testing over the host machine with help of “openvas”. |
| 149 | 2023-2024 | Application security testing with reference of “owasp”. |
| 150 | 2023 | Towards Blockchain Based Secure Storage and Trusted Data Sharing Scheme for IoT Environment |
| 151 | 2023 | Computer Vision and Machine Learning for Viticulture Technology |
| 152 | 2023 | Song Recommendation based on Voice Tone Analysis |
| 153 | 2023 | Artificial Intelligence based Cyber Security Threats Identification in Financial Institutions Using Machine Learning Approach |
| 154 | 2023 | An Improved System for Brain Pathology Classification using Hybrid Deep Learning Algorithm |
| 155 | 2023 | Identifying the Gender of Human Cyber Attackers Using Machine Learning Techniques |
| 156 | 2023 | Machine Learning based Iris Recognition Modern Voting System |
| 157 | 2023 | Machine Learning Approach for Estimation and Novel Design of Stroke Disease Predictions using Numerical and Categorical Feature |
| 158 | 2023 | A Novel Software Engineering Approach Toward using Machine Learning for Improving the Efficiency of Health Systems |
| 159 | 2023 | An Expert System for Insulin Dosage Prediction |
| 160 | 2023 | Automatic Detection of Genetic Diseases in Pediatric Age Using Pupillometry |
| 161 | 2023 | Image Enhancement with the Application of Local and Global Enhancement Methods for Dark Images |
| 162 | 2023 | Groundwater level prediction using hybrid artificial neural network with genetic algorithm |
| 163 | 2023 | Automated Vision-based Surveillance System to Detect Drowning Incidents in Swimming Pools |
| 164 | 2023 | Smart health consulting online system |
| 165 | 2023 | Securing pharmaceutical data using homomorphic encryption |
| 166 | 2023 | Sarcasm detection using machine learning |
| 167 | 2023 | Flood forecasting using machine learning |
| 168 | 2023 | Composite Behavioural Modelling for Identity Theft Detection in Online Social Networks |
| 169 | 2023 | Predicting Urban Water Quality with Ubiquitous Data |
| 170 | 2023 | Wish list products price comparison website project |
| 171 | 2023 | Dfr-tsd a deep learning based framework for robust traffic sign detection under challenging weather conditions |
| 172 | 2023 | Data Poisoning Attacks on Federated Machine Learning |
| 173 | 2023 | A Comprehensive Survey on Computer Forensics: State-of-the-Art, Tools, Techniques, Challenges, and Future Directions |
| 174 | 2023 | You walk we authenticate lightweight seamless authentication based on gait in wearable iot systems |
| 175 | 2023 | A Deep Attentive Multimodal Learning Approach for Disaster Identification From Social Media Posts |
| 176 | 2022 | Intelligent Video Surveillance Using Deep Learning |
| 177 | 2022 | A Deep Transfer Learning-based Edge Computing Method for Home Health Monitoring |
| 178 | 2022 | A Hybrid Deep Learning Technique for Personality Trait Classification From Text |
| 179 | 2022 | SSLA Based Traffic Sign and Lane Detection for Autonomouscars |
| 180 | 2022 | A Time-Frequency Based Suspicious Activity Detection for Anti-Money Laundering |
| 181 | 2022 | IRIS RECOGNITION USING MACHINE LEARNING TECHNIQUE |
| 182 | 2022 | Machine Learning and End-to-end Deep Learning for the Detection of Chronic Heart Failure from Heart Sounds |
| 183 | 2022 | Detection and Isolation of Sensor Attacks for AutonomousVehicles: Framework, Algorithms, and Validation |
| 184 | 2022 | Text And Image Plagiarism Detection |
| 185 | 2022 | Anomaly Detection and Attack Classification for Train Real-time Ethernet |
| 186 | 2022 | Identifying Bone Tumor using X-Ray Images |
| 187 | 2022 | Fingerprint based ATM system |
| 188 | 2022 | Image Forensic for Digital Image Copy Move Forgery Detection |
| 189 | 2022 | Machine Learning Methods for Attack Detection in the Smart Grid |
| 190 | 2022 | Analysis and Detection of Autism Spectrum Disorder Using Machine Learning Techniques |
| 191 | 2022 | Person Re-Identification With Reinforced Attribute Attention Selection |
| 192 | 2022 | Integrating Stacked Sparse Auto-Encoder Into Matrix Factorization for Rating Prediction |
| 193 | 2022 | Deep Learning of Facial Depth Maps for Obstructive Sleep Apnea Prediction |
| 194 | 2022 | Toward Detection and Attribution of Cyber-Attacks in IoT-enabled Cyber-physical Systems |
| 195 | 2022 | SyntheticNET: A 3GPP Compliant Simulator for AI Enabled 5G and Beyond |
| 196 | 2022 | Geo Tracking of Waste and Triggering Alerts and MappingAreas with High Waste Index |
| 197 | 2022 | An Experimental Study for Software Quality Prediction with Machine Learning Methods |
| 198 | 2022 | A Data Analytics Approach to the Cybercrime Underground Economy |
| 199 | 2022 | An Automatic Advisor for Refactoring Software Clones Based on Machine Learning |
| 200 | 2022 | Blockchain Based Certificate Validation |
| 201 | 2022 | Application and evaluation of a K-Medoids based shape clustering method for an articulated design space |
| 202 | 2022 | Local Dynamic Neighborhood Based Outlier Detection Approach and its Framework for Large-Scale Datasets |
| 203 | 2022 | Image Forgery Detection Based on Fusion of Lightweight Deep Learning Models |
| 204 | 2022 | Hand Gesture Recognition and Voice Conversion for Deaf and Dumb |
| 205 | 2022 | A BI-OBJECTIVE HYPER-HEURISTIC SUPPORT VECTOR MACHINES FOR BIG DATA CYBER-SECURITY |
| 206 | 2022 | Fall Detection For Elderly People Using Machine Learning |
| 207 | 2022 | SESV: Accurate Medical Image Segmentation by Predicting and Correcting Errors |
| 208 | 2022 | A Deep Neural Framework for Continuous Sign Language Recognition by Iterative Training |
| 209 | 2022 | Captcha Recognition Using CNN |
| 210 | 2022 | Fake detector Effective Fake News Detection With Deep Diffusive Neural Network |
| 211 | 2022 | Stress Detection In It Professionals By Image Processing And Machine Learning |
| 212 | 2022 | Transfer Learning For Recognizing Face In Disguise |
| 213 | 2022 | Application Research Of Text Classification Based On Random Forest Algorithm |
| 214 | 2022 | Checking Security Properties Of Cloud Service Rest Apis |
| 215 | 2022 | An Examination System Automation Using Natural Language Processing |
| 216 | 2022 | Applications Of Machine Learning In The Field Of Medical Care |
| 217 | 2022 | Interpretable Machine Learning In Healthcare Through Generalized Additive Model With Pairwise Interactions (Ga2m): Predicting Severe Retinopathy Of Prematurity* |
| 218 | 2022 | Analysis And Prediction Of Cardio Vascular Disease Using Machine Learning Classifiers |
| 219 | 2022 | Design Of Restaurant Billing System (E Bill Resto) By Applying Synchronization Of Data Billing In Branch Companies To Main Companies Based On Rest Api |
| 220 | 2022 | Building Search Engine Using Machine Learning Technique |
| 221 | 2022 | A Study Of Blockchain Technology In Farmer’s Portal |
| 222 | 2022 | Improving Lives Of Indebted Farmers Using Deep Learning |
| 223 | 2022 | Content Analysis Of Messages In Social Networks, Identification Of Suicidal Types |
| 224 | 2022 | Crop Yield Prediction Using Machine Learning Techniques |
| 225 | 2022 | Text Classification On Twitter Data |
| 226 | 2022 | Automated Machine Learning: The New Wave Of Machine Learning |
| 227 | 2022 | Scalable Analytics Platform For Machine Learning In Smart Production Systems |
| 228 | 2022 | An Application Of A Deep Learning Algorithm For Automatic Detection Of Unexpected Accidents Under Bad Cctv Monitoring Conditions In Tunnels |
| 229 | 2022 | End-To-End Conversion Speed Analysis Of An Fpt.Ai-Based Text-To- Speech Application |
| 230 | 2022 | Towards Blockchain Based Secure Storage and Trusted Data Sharing Scheme for IoT Environment |
| 231 | 2022 | Location Prediction On Twitter Using Machine Learning Techniques |
| 232 | 2022 | Machine Learning For Web Vulnerability Detection: The Case Of Cross-Site Request Forgery |
| 233 | 2022 | Artificial Intelligence And Covid-19 Deep Learning Approaches For Diagnosis And Treatment |
| 234 | 2022 | Generating Cloud Monitors From Models To Secure Clouds |
| 235 | 2022 | Leveraging Cnn And Transfer Learning For Vision-Based Human Activity Recognition |
| 236 | 2022 | B5g And Explainable Deep Learning Assisted Healthcare Vertical At The Edge Covid-19 Perspective |
| 237 | 2022 | Cryptocurrency Price Analysis With Artificial Intelligence |
| 238 | 2022 | Predicting And Defining B2b Sales Success With Machine Learning |
| 239 | 2022 | Design And Implementation Of Domestic News Collection System Based On Python |
| 240 | 2022 | Data Analysis By Web Scraping Using Python |
| 241 | 2022 | A Lightweight Secure Data Sharing Scheme For Mobile Cloud Computing |
| 242 | 2022 | Semi-supervised machine learning approach for DDoS detection |
| 243 | 2022 | Attribute-Based Cloud Data Integrity Auditing For Secure Outsourced Storage |
| 244 | 2022 | Automatic Keyword And Sentence-Based Text Summarization For Software Bug Reports |
| 245 | 2022 | News Text Summarization Based On Multi-Feature And Fuzzy Logic |
| 246 | 2022 | Automated Machine Learning Approach For Smart Waste Management System |
| 247 | 2022 | Digital Vehicle – License, Insurance And Rc Book Tracing For Police |
| 248 | 2022 | Securing Data With Blockchain And Ai |
| 249 | 2022 | A Decision Tree Based Recommendation System For Tourists |
| 250 | 2022 | You Tube Spam Detection |
| 251 | 2022 | Car Popularity Prediction |
| 252 | 2022 | Performance Analysis On Student Feedback Using Machine Learning Algorithms |
| 253 | 2022 | Diabetes Disease Prediction Using Machine Learning Algorithms |
| 254 | 2022 | Crime Type And Occurrence Prediction Using Machine Learning Algorithm |
| 255 | 2022 | Image Caption Generator Using Cnn And Lstm |
| 256 | 2022 | Predicting Flight Delays With Error Calculation Using Machine Learned Classifiers |
| 257 | 2022 | Nse Stock Monitoring & Prediction Using Robotic Process Automation |
| 258 | 2022 | Bird Species Identification Using Deep Learning |
| 259 | 2022 | Online Depression Detection Application |
| 260 | 2022 | Weapon Detection Using Artificial Intelligence And Deep Learning For Security Applications |
| 261 | 2022 | Missing Child Identification System Using Deep Learning And Multiclass Svm |
| 262 | 2022 | Suspicious Activity Detection |
| 263 | 2022 | Deep Learning Applications In Medical Image Analysis-brain tumor |
| 264 | 2022 | Classifying Fake News Articles Using Natural Language Processing To Identify In-Article Attribution As A Supervised Learning Estimator |
| 265 | 2022 | Real Time Object Detection Using Yolo Algorithm |
| 266 | 2022 | Context Based Image Processing Using Machine Learning Approaches |
| 267 | 2022 | A Machine Learning Model For Average Fuelconsumption In HeavyVehicles |
| 268 | 2022 | Detecting Spam Email With Machine Learning Optimized With Bio- Inspired Metaheuristic Algorithms |
| 269 | 2022 | Eye Ball Cursor Movement Using Opencv |
| 270 | 2022 | Spammer Detection and Fake User Identification on Social Networks |
| 271 | 2022 | Helmet Detection And License Plate Recgnozation Using Cnn |
| 272 | 2022 | E-Assessment Using Image Processing In Exams |
| 273 | 2022 | Rainfall prediction using wavelet neural network analysis |
| 274 | 2022 | Prediction of House Pricing Using Machine Learning with Python |
| 275 | 2022 | Heart Disease Prediction Using Machine Learning Algorithms |
| 276 | 2022 | Traffic sign recognition and detection |
| 277 | 2022 | Weather Forecasting to prevents a natural clamities |
| 278 | 2022 | Converging Blockchain and Machine Learning for Healthcare |
| 279 | 2022 | An Efficient Spam Detection Technique for IoT Devices Using Machine Learning |
| 280 | 2022 | CREDIT CARD FRAUD DETECTION USING ADABOOST AND MAJORITY VOTING |
| 281 | 2022 | URBAN STREET CLEANLINESS ASSESSMENT USING MOBILE EDGE COMPUTING AND DEEP LEARNING |
| 282 | 2022 | Network Intrusion Detection for IoT Security based on Learning Techniques |
| 283 | 2022 | Liver Disease Prediction using SVM and Naïve Bayes Algorithms |
| 284 | 2022 | MODELING AND PREDICTING CYBER HACKING BREACHES |
| 285 | 2022 | DATA SECURITY APPROACH ON CYBER CRIME WITH WEB VULNERABILITY |
| 286 | 2022 | TOWARD BETTER STATISTICAL VALIDATION OF MACHINE LEARNING-BASED MULTIMEDIA QUALITY ESTIMATORS |
| 287 | 2022 | Predicting the top-N popular videos via cross-domain hybrid model |
| 288 | 2022 | FINDING TRUSTWORTHY SERVICE PROVIDER IN TRUSTED NETWORK |
| 289 | 2022 | USE OF ARTIFICIAL NEURAL NETWORKS TO IDENTIFY FAKEPROFILES |
| 290 | 2022 | Machine Learning Techniques for Cyber Attacks Detection |
| 291 | 2022 | Prediction of Hepatitis Disease Using Machine Learning Technique |
| 292 | 2022 | WEB APPLICATION FOR COMMUNITY QUESTION ANSWERING |
| 293 | 2022 | ANALYSIS OF WOMEN SAFETY IN INDIAN CITIES USING MACHINE LEARNING ON TWEETS |
| 294 | 2022 | Density based smart traffic control system using canny edge detection algorithm for congregrating traffic information using AI |
| 295 | 2022 | IMAGE BASED APPRAISAL OF REAL ESTATE PROPERTIES |
| 296 | 2022 | A NEW APPROACH FOR COMPLEX ENCRYPTING AND DECRYPTING DATA |
| 297 | 2022 | Applied Machine Learning Predictive Analytics to SQL Injection Attack Detection and Prevention |
| 298 | 2022 | Driver Drowsiness Monitoring System using VisualBehaviour and Machine Learning |
| 299 | 2022 | WEAKLY-SUPERVISED DEEP EMBEDDING FOR PRODUCT REVIEW SENTIMENT ANALYSIS |
| 300 | 2022 | MULTI-TRAFFICSCENCE PERCEPTION BASED ON SUPERVISED LEARNING |
| 301 | 2022 | A Data Mining based Model for Detection of Fraudulent Behaviour in Water Consumption |
| 302 | 2022 | CHARACTERIZING AND PREDICTING EARLY REVIEWERS FOR EFFECTIVE PRODUCT MARKETING ON E-COMMERCE WEBSITES |
| 303 | 2022 | Vehicle Pattern Recognition using Machine Deep Learning to Predict Car Model |
| 304 | 2022 | Social Network Rumor Diffusion Predication Based on Equal Responsibility Game Model |
| 305 | 2022 | An Analysis of Machine Learning Classifiers in Breast Cancer Diagnosis |
| 306 | 2022 | A holistic framework for crime prevention, response, and analysis with emphasis on women safety using technology and societal participation |
| 307 | 2022 | A Personalized Healthcare Monitoring System for Diabetic Patients |
| 308 | 2022 | A DEEP LEARNING FACIAL EXPRESSION RECOGNITION BASED SCORING SYSTEM FOR RESTAURANTS |
| 309 | 2022 | A Sentiment Analysis System to Improve Teaching and Learning |
| 310 | 2022 | Pregbot A system based on ml and NLP for supporting women and family during pregnancy |
| 311 | 2022 | DeprNet A Deep Convolution Neural Network Framework for Detecting Depression |
| 312 | 2022 | Chronic Kidney Disease Stage Identification in HIV Infected Patients using Machine Learning |
| 313 | 2022 | IMPLEMENTATION OF MACHINE LEARNING ALGORITHMS FOR DETECTION OF NETWORK INTRUSION |
| 314 | 2022 | Traffic Prediction for Intelligent Transportation System using Machine Learning |
| 315 | 2022 | A User-Centric Machine Learning Framework for Cyber Security Operations Center |
| 316 | 2022 | Automating E-Government Services With Artificial Intelligence |
| 317 | 2022 | Police FIR Management Application |
| 318 | 2022 | An Emotion Based Music Player using python |
| 319 | 2022 | Real Time Vehicle Detection and Counting Using ML |
| 320 | 2022 | Human activity recognition using python |
| 321 | 2022 | Face Mask Detection Application |
| 322 | 2022 | Online Railway Reservation Application |
| 323 | 2022 | Online Food Order Application Using Django |
| 324 | 2022 | Online e-commerce Shopping Application |
| 325 | 2022 | Student Result Management Application |
| 326 | 2022 | Face Recognition Based Attendance Application |
| 327 | 2022 | School Library Application |
| 328 | 2022 | During Covid-19 Situation Social Distance Detection Application |
| 329 | 2022 | Student Result Management Application |
| 330 | 2022 | College Event Management System |
| 331 | 2022 | Students Attendance Management Application |
| 332 | 2022 | Library Management Application using Django |
| 333 | 2022 | Fire Detection using OpenCV |
| 334 | 2022 | Face Recognition using YOLO Python |
| 335 | 2022 | Inventory Management System |
| 336 | 2022 | Handwriting Alphabet and Number Recognition using Machine Learning |
| 337 | 2022 | Moving Object and Hand, Finger Counting Detection using Frame Differencing |
| 338 | 2022 | ROAD LANE LINE DETECTION USING OPENCV |
| 339 | 2022 | Sign to Speech Conversion using Machine Learning |
| 340 | 2022 | Brain Stroke Prediction and Analysis of Machine Learning |
| 341 | 2022 | Car Rental Application |
| 342 | 2022 | ecommerce Application with Order tracking |
| 343 | 2022 | Chess Game in Web Application |
| 344 | 2022 | Laundry Shop Management Application |
| 345 | 2022 | Grocery Point Of Sale Application |
| 346 | 2022 | Django School Management Application |
| 347 | 2021 | A Statistical Inference Attack on Privacy-Preserving Biometric Identification Scheme |
| 348 | 2021 | RACE Resource Aware Cost-Efficient Scheduler for Cloud Fog Environment |
| 349 | 2021 | Certificateless public integrity checking of group shared data on cloud storage |
| 350 | 2021 | Efficient Auditing Scheme for Secure Data Storage in Fog-to-Cloud Computing |
| 351 | 2021 | Dual Access Control for Cloud-Based Data Storage and Sharing |
| 352 | 2021 | An Efficient Ciphertext Index Retrieval Scheme based on Edge Computing Framework |
| 353 | 2021 | Efficient Revocable Multi-Authority Attribute-Based Encryption for Cloud Storage |
| 354 | 2021 | Pocket Diagnosis: Secure Federated Learning against Poisoning Attack in the Cloud |
| 355 | 2021 | Blockchain Assisted Collaborative Service Recommendation Scheme With Data Sharing |
| 356 | 2021 | A Blockchain-based Approach for Drug Traceability in Healthcare Supply Chain |
| 357 | 2021 | Data Trust Framework Using Blockchain Technology and Adaptive Transaction Validation |
| 358 | 2021 | A Blockchain based Autonomous Decentralized Online Social Network |
| 359 | 2021 | Blockchain Based Accounts Payable Platform for Goods Trade |
| 360 | 2021 | A Trusted Blockchain-Based Traceability System for Fruit and Vegetable Agricultural |
| 361 | 2021 | Design of Secure Authenticated Key Management Protocol for Cloud Computing Environment |
| 362 | 2021 | A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on |
| 363 | 2021 | Fast Containment of Infectious Diseases with E-healthcare Mobile Social Internet of Things |
| 364 | 2021 | Toward Detection and Attribution of Cyber-Attacks in IoT-enabled Cyber-physical Systems |
| 365 | 2021 | Personality aware Product Recommendation System based on User Interests Mining and |
| 366 | 2021 | Discovering Hidden Topical Hubs and Authorities Across Multiple Online Social Networks |
| 367 | 2021 | Query Expansion with Local Conceptual Word Embeddings in Microblog Retrieval |
| 368 | 2021 | Enabling Secure and Space-Efficient Metadata Management in Encrypted Deduplication |
| 369 | 2021 | Hybrid Recommender System for Tourism Based on Big Data and AI A Conceptual |
| 370 | 2021 | A Blockchain-based Approach for Drug Traceability in Healthcare Supply Chain |
| 371 | 2021 | Detecting Mental Disorders in Social Media Through Emotional Patterns The case of Anorexia |
| 372 | 2021 | Protecting Your Shopping Preference with Differential Privacy |
| 373 | 2021 | BullyNet: Unmasking Cyberbullies on Social Networks |
| 374 | 2021 | Privacy Preserving Media Sharing with Scalable Access Control and Secure Deduplication in |
| 375 | 2021 | A TRUST-BASED AGENT LEARNING MODEL FOR SERVICE COMPOSITION IN MOBILE OMPUTING ENVIRONMENTS |
| 376 | 2020 | Cashless Society: Managing Privacy and Security in the Technological Age |
| 377 | 2020 | Online Pricing with Reserve Price Constraint for Personal Data Markets |
| 378 | 2020 | Cashless Society Managing Privacy and Security in the Technological Age |
| 379 | 2020 | Online Pricing with Reserve Price Constraint for Personal Data Markets |
| 380 | 2020 | Personalized Long and Short term Preference Learning for Next POI Recommendation |
| 381 | 2020 | Authentication and Key Agreement Based on Anonymous Identity for Peerto-Peer Cloud |
| 382 | 2020 | Designing Secure and Efficient Biometric-Based Secure Access Mechanism for Cloud Services |
| 383 | 2020 | Secure Keyword Search and Data Sharing Mechanism for Cloud Computing |
| 384 | 2020 | Development and Examination of Fog Computing-Based Encrypted Control System. |
| 385 | 2020 | A Secure and Efficient Cloud-Centric Internet of Medical Things-Enabled Smart Healthcare System with Public Verifiability |
| 386 | 2020 | Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud. |
| 387 | 2020 | Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud Computing |
| 388 | 2020 | Secure Cloud Storage with Data Dynamics Using Secure Network Coding Techniques |
| 389 | 2020 | Improving Security and Privacy Attribute Based Data Sharing in Cloud Computing |
| 390 | 2020 | An Efficient Privacy Preserving Message Authentication Scheme for Internet-ofThings |
| 391 | 2020 | A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage |
| 392 | 2020 | User Behavior Prediction of Social Hotspots Based on Multi message Interaction and Neural Network |
| 393 | 2020 | LEVER Secure Deduplicated Cloud Storage with Encrypted Two-Party Interactions in Cyber-Physical Systems |
| 394 | 2020 | Decentralized Lightweight Group Key Management for Dynamic Access Control in IoT Environments |
| 395 | 2020 | Secure IoT Data Outsourcing With Aggregate Statistics and Fine- Grained Access Control |
| 396 | 2020 | Block chain-Based Secure Computation Offloading in Vehicular Networks |
| 397 | 2020 | Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing |
| 398 | 2020 | A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems |
| 399 | 2020 | Benchmarking Image Retrieval Diversification Techniques for Social Media |
| 400 | 2020 | Secure Channel Free Certificate-Based Searchable Encryption Withstanding Outside and Inside Keyword Guessing Attacks |
| 401 | 2020 | Efficiently Processing Spatial and Keyword Queries in Indoor Venues |
| 402 | 2020 | Efficient Decentralized Attribute Based Access Control for Mobile Clouds |
| 403 | 2020 | Crisis-Critical Intellectual Property Findings From the COVID-19 Pandemic |
| 404 | 2020 | Block chain based Data Storage with Privacy and Authentication in Internet of Things |
| 405 | 2020 | Detecting and Characterizing Extremist Reviewer Groups in Online Product Reviews |
| 406 | 2020 | Characterizing the Propagation of Situational Information in Social Media During COVID-19 Epidemic A Case Study on Weibo |
| 407 | 2020 | Fake News, Disinformation,and Deepfakes: Leveraging Distributed Ledger Technologies and Blockchain to Combat Digital Deception and Counterfeit Reality |
| 408 | 2020 | Feature-Level Rating System Using Customer Reviews and Review Votes |
| 409 | 2020 | Detection of Social Network Spam Based on Improved Extreme Learning Machine |
| 410 | 2020 | Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography |
| 411 | 2019 | A Practical attribute based document collection Hierarchical Encryption Scheme in Cloud Computing |
| 412 | 2019 | Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud |
| 413 | 2019 | CHARON: A Secure Cloud-of-Clouds System for Storing and Sharing Big Data |
| 414 | 2019 | An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud Storage |
| 415 | 2019 | Hidden Cipher text Policy Attribute-Based Encryption with Fast Decryption for Personal Health Record System |
| 416 | 2019 | Privacy-aware Personal Data Storage (P-PDS) Learning how to Protect User Privacy from External Applications |
| 417 | 2019 | Clustering-Based Collaborative Filtering Using an Incentivized/Penalized User Model |
| 418 | 2019 | A Hierarchical Attention Model for Social Contextual Image Recommendation |
| 419 | 2019 | DCCR: Deep Collaborative Conjunctive Recommender for Rating Prediction |
| 420 | 2019 | Privacy Preserving Searchable Encryption with Fine-grained Access Control |
| 421 | 2019 | Filtering Instagram hashtags through crowd tagging and the HITS algorithm |
| 422 | 2019 | A Hybrid E-learning Recommendation Approach Based on Learners’ Influence Propagation |
| 423 | 2019 | Detecting Pickpocket Suspects from Large-Scale Public Transit Records |
| 424 | 2019 | Coverless Information Hiding Method Based on Web Text |
| 425 | 2019 | SEPTIC Detecting Injection Attacks and Vulnerabilities |
| 426 | 2019 | Detecting Malicious Social Bots Based on Click stream Sequences |
| 427 | 2019 | Authentication by Encrypted Negative Password |
| 428 | 2019 | Retrieving Hidden Friends: A Collusion Privacy Attack Against Online Friend Search Engine |
| 429 | 2019 | Enabling Efficient and Geometric Range Query With Access Control Over Encrypted Spatial Data |
| 430 | 2019 | Social Network Rumor Diffusion Predication Based on Equal Responsibility Game Model |
| 431 | 2015 | Copyrightform |