Java IEEE Projects

Here we have a huge list of Java IEEE Projects for students.
You can go through each topic and get best Java IEEE project.
Not only the academic projects in the list.
We are ready to customize computer science projects as you need.

Just get in touch with us to customize your Academic projects.

Java IEEE Projects List

  • Dynamic and Public Auditing with Fair Arbitration for Cloud Data
  • Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing
  • A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
  • Quantifying Political Leaning from Tweets, Retweets, and Retweeters
  • Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks
  • A Hop-by-Hop Routing Mechanism for Green Internet
  • Frodo: Fraud Resilient Device for Off-Line Micro-Payments
  • STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
  • Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information
  • Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
  • Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
  • Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
  • Resolving Multi-Party Privacy Conflicts In Social Media
  • Top-k Dominating Queries on Incomplete Data
  • A Locality-Sensitive Low-Rank Model for Image Tag Completion
  • A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks
  • A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
  • A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
  • An Efficient Privacy-Preserving Ranked Keyword Search Method
  • Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
  • Booster in High Dimensional Data Classification
  • Building an intrusion detection system using a filter-based feature selection algorithm
  • CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System
  • Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
  • Crowdsourcing for Top-K Query Processing over Uncertain Data
  • Data Lineage in Malicious Environments
  • Detecting Node Failures in Mobile Wireless Networks A Probabilistic Approach
  • DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud
  • Domain-Sensitive Recommendation with User-Item Subgroup Analysis
  • Efficient Algorithms for Mining Top-K High Utility Itemsets
  • Identity-Based Encryption with Cloud Revocation Authority and Its Applications
  • iPath Path Inference in Wireless Sensor Networks
  • Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds
  • Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage
  • Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services
  • Geometric Range Search on Encrypted Spatial Data
  • Identity-Based Encryption with Cloud Revocation Authority and Its Applications
  • Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming.

IEEE PROJECTS LIST

Here we have more academic projects for engineering students.

  • DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
  • Automatically Mining Facets for Queries from Their Search Results
  • Nearest Keyword Set Search in Multi-Dimensional Datasets
  • Rating Prediction based on Social Sentiment from Textual Reviews
  • A Stable Approach for Routing Queries in Unstructured P2P Networks
  • Energy and Memory Efficient Clone Detection in Wireless Sensor Networks
  • EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data
  • Data Lineage in Malicious Environments
  • Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine-Grained Benchmark, and Feature Evaluation
  • Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud
  • Location Aware Keyword Query Suggestion Based on Document Proximity
  • Online Multi-Modal Distance Metric Learning with Application to Image Retrieval
  • Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks
  • Rating Prediction based on Social Sentiment from Textual Reviews
  • SecRBAC: Secure Data in Clouds
  • Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
  • Tag Based Image Search by Social Re-ranking
  • TmacsA robust and verifiable threshold multi-authority access control
  • Towards Effective Bug Triage with Software Data Reduction Techniques
  • Two-Factor Data Security Protection Mechanism for Cloud Storage System
  • Using Hashtag Graph-based Topic Model to Connect Semantically-related Words without Co-occurrence in Microblogs
  • A Shoulder Surfing Resistant Graphical Authentication System
  • Entity linking with knowledge database issues, techniques, solutions

Java IEEE PROJECTS LIST

Here we have more academic projects for engineering students.

  • Key Updating for Leakage Resiliency With Application to AES Modes of Operation
  • Mining User Aware Rare Sequential Topic Patterns in Document Streams
  • Multi-Modal Event Topic Model for Social Event Analysis
  • Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databasescode
  • Quantifying Political Leaning from Tweets
  • Sentiment Embeddings with Applications to Sentiment Analysis
  • Traffic Pattern-Based Content Leakage
  • Continuous Answering Holistic Queries over
  • Answering Approximate Queries Over XML Data
  • Conditional Identity-Based Broadcast Proxy
  • Real-Time Semantic Search Using Approximate
  • Efficient Cache-Supported Path Planning on Roads
  • Dynamic Job Ordering and Slot
  • Configurations for Map Reduce Workloads
  • Relevance Feedback Algorithms Inspired By Quantum Detection
  • Malware Detection in Cloud Computing Infrastructures
  • Merlin: Exploratory Analysis with Imprecise Queries
  • A Shoulder Surfing Resistant Graphical Authentication System
  • Entity linking with knowledge database issues, techniques, solutions
  • Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Database code.
  • Quantifying Political Leaning from Tweets
  • Sentiment Embeddings with Applications to Sentiment Analysis
  • Traffic Pattern-Based Content Leakage
  • Multi-Modal Event Topic Model for Social Event Analysis
  • Circuit Ciphertext-policy Attribute-based
  • A Hop-by-Hop Routing Mechanism
  • Spatial Reusability-Aware Routing
  • Quantifying Political Leaning from Tweets_2
  • Topic Sketch Real-time Bursty Topic Detection
  • A Modified Hierarchical Attribute-Based
  • A Profit Maximization Scheme With Guaranteed Quality Of Service In Cloud Computing
  • Co-Extracting Opinion Targets And Opinion Words From Online Reviews Based On The Word Alignment Model
  • Secure Spatial Top-K Query Processing Via Untrusted Location-Based Service Providers
  • An Authenticated Trust And Reputation Calculation And Management System For Cloud And Sensor Networks Integration
  • Audit-Free Cloud Storage Via Deniable Attribute-Based Encryption
  • Best Keyword Cover Search
  • Discovery Of Ranking Fraud For Mobile Apps
  • Location-Aware And Personalized Collaborative Filtering For Web Service Recommendation