Roohie Naaz MirNational Institute of Technology Srinagar | NIT Srinagar · Department of Computer Science and Engineering
Roohie Naaz Mir
B.E. (Hons), M.E., Ph D
About
192
Publications
66,747
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,734
Citations
Introduction
Roohie Naaz Mir currently works as Professor (HAG) in the Department of Computer Science and Engineering, National Institute of Technology, Srinagar. Roohie does research in Computer Engineering. Her current projects are Network on Chip (NoC), Blockchain and IoT (infrastructure and security).
Additional affiliations
September 2013 - present
National Institute of Technology Srinagar, India
Position
- Professor (Full)
Publications
Publications (192)
Security risks are increasingly concerning as the Internet of Things (IoT) expands. Authentication, access control, and authorization present significant challenges for resource-constrained IoT devices. Traditional authentication methods often require enhancements for these devices, but Blockchain technology presents a potential solution. Decentral...
Steganography is the technique of hiding data for secret communication in a public media format. The image in which the hidden data is stored is called a stego image. Steganalysis is the process of targeting the methods of steganography to identify, remove, destroy, and exploit the secret data in stego images. The identification of embedded secret...
Internet of things is a little world of connected things with the integration of smart devices like sensors, actuators, gateways, gadgets etc. Smart cities, Smart home, Agriculture, Disaster management, Smart Grid, Healthcare system are some of the major applications of the Internet of Things. Machine Learning is another paradigm of the technology...
Edge computing is the best savior for latency-critical applications. It brings processing closer to the end-user and provides a secure platform for the enormous data generated by billions of IoT devices, the vast majority of which are user-centric. Neural networks are the finest models for processing this massive data, but their computational budge...
Network on chip interconnection technology is emerging as a viable solution for the replacement of the traditional interconnection techniques. The efficiency of a system typically depends upon the efficiency of its internal blocks. One such building block of a NoC is a scheduling unit, which performs the critical job of scheduling the movement of t...
Visual surveillance is a highly demanded system in various real-time applications for civil and military sectors. For huge gatherings such as rallies and stadiums, crowd monitoring becomes a tedious task. Moreover, crowd density estimation also plays an important role to improve the performance of crowd monitoring system. Several techniques have be...
In this paper, a content-adaptive adversarial steganography is proposed to improve steganography security by adaptively adding perturbations to cover images while considering image contents with rich texture, where perturbations are generated using adversarial example generation methods like the fast gradient sign method. In this approach, a hybrid...
Object detection is a basic visual identification problem in computer vision that has been explored extensively over the years. Visual object detection seeks to discover objects of specific target classes in a given image with pinpoint accuracy and apply a class label to each object instance. Object recognition strategies based on deep learning hav...
For high-quality products, surface fault identification is crucial. Surface defect identification on circular tubes, on the other hand, is more difficult than on flat plates due to the fact that the surface of circular tubes reflects light, resulting in overlooked faults. Surface defects on circular aluminium tubes, such as dents, bulges, foreign m...
As the trend of technology shrinking continues a vast amount of processors are being incorporated in a limited space. Due to this almost half of the chip area in Multi-Processor Systems-on-Chips (MPSoCs) is under interconnections, which pose a big problem for communication. Network-on-Chips (NoCs) evolved as a significant scalable solution for remo...
With the rapid advancement of technologies and proliferation of intelligent devices, connecting to the internet challenges have grown manifold, such as ensuring communication security and keeping user credentials secret. Data integrity and user privacy have become crucial concerns in any ecosystem of advanced and interconnected communications. Cryp...
The Internet of Things (IoT) is an emerging communication paradigm due to its wide range of applications. For IoT, distributed denial of service (DDoS) attacks are becoming increasingly widespread, and the solutions to combat these attacks are in increased demand. The significant contributions of this paper include offering a novel algorithm named...
Access control or authorization is referred to as the confinement of specific actions of an entity, thereby allowing them to be performed as per certain rules. Blockchain-driven access control mechanisms gained considerable attention directly after applications beyond the premise of cryptocurrency were found. However, there are no systematic effort...
Spectrum scarcity is one issue that needs to be tackled for the uninterrupted growth of the Internet of Things (IoT). Limited licensed spectrum available and hugely populated unlicensed bands are becoming a bottleneck for the expansion of IoT. Cognitive radio networks (CRNs) have been widely researched and proven to solve the issue of spectrum scar...
Due to the increase in integrated circuit technology processing, there is intense flooding of transistors on Multi-processor System-on-chips, making communication a more complex and costly asset. To regulate communication in such a complex environment, Network-on-chip (NoC) came up as a versatile and inflating communication architecture for large S...
Purpose
The world is shifting towards the fourth industrial revolution (Industry 4.0), symbolising the move to digital, fully automated habitats and cyber-physical systems. Industry 4.0 consists of innovative ideas and techniques in almost all sectors, including Smart health care, which recommends technologies and mechanisms for early prediction of...
Purpose
: Network-on-Chips (NoCs) have emerged as a valuable solution for the never-ending communication needs of large System-on-Chips (SoCs). It opened the doors for scalability, resource management, bandwidth, and power management for communication technologies. The performance and efficiency of NoCs is largely determined by the routing mechanis...
Blockchain proves to be an ideal candidate for establishing provenance in supply chains. For ensuring widespread adoption, such frameworks must have low cost-overheads while guaranteeing protection from counterfeiting and must provide end-to-end transparency. A vast majority of existing platforms that attempt to address the lack of provenance knowl...
As the trend of technology shrinking continues a vast amount of processors are being incorporated in a limited space. Due to this almost half of the chip area in Multi-Processor Systems-on-Chips (MPSoCs) is under interconnections, which pose a big problem for communication. Network-on-Chips (NoCs) evolved as a significant scalable solution for remo...
With each passing year, the compelling need to bring deep learning computational models to the edge grows, as does the disparity in resource demand between these models and Internet of Things edge devices. This article employs an old trick from the book "deflate and inflate" to bridge this gap. The proposed system uses the hashing trick to deflate...
Purpose
A huge amount of diverse data is generated in the Internet of Things (IoT) because of heterogeneous devices like sensors, actuators, gateways and many more. Due to assorted nature of devices, interoperability remains a major challenge for IoT system developers. The purpose of this study is to use mapping techniques for converting relational...
Transformed l1 regularization for generating computationally sparse neural network models
IoT is expected to have far-reaching consequences on society due to a wide spectrum of applications like smart healthcare, smart transportation, smart agriculture, smart home, etc. However, ethical considerations of AI-enabled smart devices have not been duly considered from a design perspective. In this paper, the authors propose a novel fuzzy log...
Wireless Sensor Networks is one of the most significant area of research where large number of sensor nodes that are distributed in a geographical area operate on limited battery power. As these networks, depending on the application, are sometimes deployed in in-hostile environment, which makes energy conservation one of the major challenge faced...
Internet of things (IoT) is a complex pervasive environment consisting of large number of IoT nodes that sense, process and exchange data with other nodes. The complexity of pervasive IoT system can be understood by considering the constrained nature of resources associated with these devices. An understanding of constraints in pervasive IoT applic...
The pervasive Edge-IoT systems face many challenges due to the resource-constrained nature of devices deployed in such applications. There is a need for proper allocation of resources, as such pervasive applications should incorporate an efficient resource allocation scheme that aims at providing better services at node level and experience at the...
Mobile Adhoc Network (MANET) has been a core topic of research since the last decade. Currently, this form of networking paradigm is increasingly being construed as an integral part of upcoming urban applications of Internet-of-Things (IoT), consisting of massive connectivity of diverse types of nodes. There is a significant barrier to the applicab...
Purpose
Natural languages have a fundamental quality of suppleness that makes it possible to present a single idea in plenty of different ways. This feature is often exploited in the academic world, leading to the theft of work referred to as plagiarism. Many approaches have been put forward to detect such cases based on various text features and g...
Purpose
This work focused on a basic building block of an allocation unit that carries out the critical job of deciding between the conflicting requests, i.e. an arbiter unit. The purpose of this work is to implement an improved hybrid arbiter while harnessing the basic advantages of a matrix arbiter.
Design/methodology/approach
The basic approach...
Deep Neural Networks (DNNs) is the computing paradigm that has achieved remarkable success in various fields of engineering in recent years, primarily visual recognition. DNNs owe its success to the presence of large number of weight parameters (and increased depth), which led to huge computation and memory costs for implementation. These limiting...
In the recent decade, there has been an exponential rise in the development and study of Blockchain Technology space. The driving force behind the interest in Blockchain research has been its key characteristics that provide security, anonymity, and integrity without relying on trusted third party organizations. Initially, Blockchain usage was rest...
The Internet of Things (IoT) is a promising technology for addressing the challenges of urbanisation, however ethical ramifications of introducing such pervasive technology have not been duly considered. It is assumed that smart devices are exempt from moral, religious or legal responsibilities with regard to their surroundings. Such a perspective...
Academic credentials are precious assets as they form an evidence for one’s identity and eligibility. Fraud inissuance and verification of academic certificates have been a long-standing issue in academic community. Due to lack of antiforgery mechanisms there has been substantial increase in fraudulent certificates. The need of the hour is to have...
Introduction
The breakdown of a deadly infectious disease caused by a newly discovered coronavirus (named SARS n-CoV2) back in December 2019 has shown no respite to slow or stop in general. This contagious disease has spread across different lengths and breadths of the globe, taking a death toll to nearly 700k by the start of August 2020. The numbe...
Object detection can be regarded as one of the most fundamental and challenging visual recognition task in computer vision and it has received great attention over the past few decades. Object detection techniques find their application in almost all the spheres of life, most prominent ones being surveillance, autonomous driving, pedestrian detecti...
Pervasive Internet of Things (IoT) is a research paradigm that has attracted considerable attention nowadays. The main aim of pervasive IoT is that in the future, the everyday objects (devices) would be accessible, sensed, and interconnected inside the global structure of the Internet. But in most of the pervasive IoT applications, the resources of...
Due to the recent advancement and development of sensing, wireless, and communication technologies, therehas been a shift in attention towards Body Area Networks (BANs). One of the most important services of BAN is the remote monitoring of patients, enabling doctors to observe, diagnose, and prescribe the patients without being physically present....
Purpose
The intelligence in the Internet of Things (IoT) can be embedded by analyzing the huge volumes of data generated by it in an ultralow latency environment. The computational latency incurred by the cloud-only solution can be significantly brought down by the fog computing layer, which offers a computing infrastructure to minimize the latency...
Purpose
The trend of “Deep Learning for Internet of Things (IoT)” has gained fresh momentum with enormous upcoming applications employing these models as their processing engine and Cloud as their resource giant. But this picture leads to underutilization of ever-increasing device pool of IoT that has already passed 15 billion mark in 2015. Thus, i...
The Mobile Ad-Hoc Network (MANET) incorporates a collaborative networking scenario, where dynamic host movement results in frequent topology changes. In MANET, nodes cooperate during route establishment, and the data packet must travel from source to destination through multi-hop intermediate links. The nodes in a MANET can be localized in a restri...
The current era of smart computing and enabling technologies encompasses the Internet of Things (IoT) as a network of connected, intelligent objects where objects range from sensors to smartphones and wearables. Here, nodes or objects cooperate during communication scenarios to accomplish effective throughput performance. Despite the deployment of...
Object detection and localisation is one of the major research areas in computer vision that is growing very rapidly. Currently, there is a plethora of pre-trained models for object detection including YOLO, mask RCNN, RCNN, fast RCNN, multi-box, etc. In this paper, we proposed a new framework for object detection called maximum entropy-based semis...
In this concept paper, we propose a theoretical model inspired by Merkle and Binary trees for accelerated COVID-19 testing. We have formulated and simplified the idea of how the testing can be improved drastically while tracing the infected individual with supposedly very less complexity. Our approach reduces the complexity in terms of the number o...
The progressively ubiquitous connectivity in the present information systems poses newer challenges to security. The conventional security mechanisms have come a long way in securing the well-defined objectives of confidentiality, integrity, authenticity and availability. Nevertheless, with the growth in the system complexities and attack sophistic...
Currently, Mobile Ad hoc Networks (MANETs) have evolved as one of the essential next-generation wireless network technologies. MANET comprises of mobile nodes that are self-configurable, and every mobile node behaves as a router for every other node allowing data to move by making use of multi-hop network routes. MANETs signify a networking class t...
The Internet of Things promises to offer numerous societal benefits by providing a spectrum of user applications. However, ethical ramifications of adopting such pervasive technology on a society-wide scale have not been adequately considered. Smart things endowed with artificial intelligence may carry out decisions that entail ethical consequences...
Embedding decision making capability (on-chip learning) into resource constraint Internet of things (IoT) devices is the most important and researched area in IoT. Porting deep neural network models into these devices is proving to be prohibitive in terms of energy and memory requirements. Spiking neural networks (SNN) based computational models ha...
Notwithstanding the potential of IoT to revolutionise our personal and social lives, the absence of a solid framework of ethics may lead to situations where smart devices are used in ways uncongenial to the moral fabric of a society. In this work, the authors seek to provide a conceptual framework toward incorporating ethics in IoT. They employ the...
The current COVID-19 pandemic has seen limited availability of testing kits thus hindering the ability to conduct more tests to determine the infection status among individuals at large which in turn does not allow to quantify the prevalence rate effectively and accurately. Group Testing is a long standing field that has immense potential in helpin...
One of the challenging research areas in modern day computing is to understand, analyze and model massively connected complex graphs resulting due to highly connected networks because of newly accepted paradigm of Internet of Things. Patterns of interaction between nodes reflect a lot of information about nature of underlying network graph. The con...
Background
Deep neural networks have become the state of the art technology for real- world classification tasks due to their ability to learn better feature representations at each layer. However, the added accuracy that is associated with the deeper layers comes at a huge cost of computation, energy and added latency.
Objective
The implementatio...
: In most of the IoT applications, exchange of data among various physical and virtual IoT devices having different data flows, energy and delay constraints is a challenging task in such environments. This imposes constraints in IoT applications at the node, network and application level, and to meet such constraints, we propose an adaptive IoT sys...
Aims: Internet of Things (IoT) is the evolution of the Internet designed to sense, collect, analyze and distribute the data via IoT devices that form its core component. An important aspect of pervasive IoT applications is its resource-constrained devices. Most of the real-time Edge-IoT applications generate a huge amount of data, which add to the...
Recently, the object detection and recognition based applications are widely adopted in various real-time and offline applications. The computer vision based automatic learning schemes have gained huge attraction from researchers due to their significant nature of learning that can significantly improve the detection performance. The advances in de...
The Internet of Things promises to offer numerous societal benefits by providing a spectrum of user applications. However, ethical ramifications of adopting such pervasive technology on a society-wide scale have not been adequately considered. Smart things endowed with artificial intelligence may carry out decisions that entail ethical consequences...
The exponential growth observed as well as predicted in the development and deployment of the Internet of Things (IoT) based applications in every walk of our life brings forth the mandatory requirement of the secure communication system which is seamless yet effective in the highly heterogeneous and resource-constrained network. The core philosoph...
An arbiter is identified as one of the critical components of the NoC router. Among various arbitration schemes, Round-Robin arbiter is one among the popular arbitration schemes. In this work we have proposed an arbitration scheme that will be able to solve the problem of constant wait time of a conventional Round-Robin arbiter and will provided so...
Purpose
Internet of Things (IoT) is a challenging and promising system concept and requires new types of architectures and protocols compared to traditional networks. Security is an extremely critical issue for IoT that needs to be addressed efficiently. Heterogeneity being an inherent characteristic of IoT gives rise to many security issues that n...
Game Theory is a useful tool for exploring the issues concerning Mobile Ad-Hoc Network (or MANET) security. In MANETs, coordination among the portable nodes is more significant, which encompasses their vulnerability challenges to several security assaults and the inability to run securely, when storing its resources and manage secure routing betwee...
For a secure multimedia data exchange, watermarking is used. Generally, meta-heuristic optimization is required to optimize scheme parameters in the water-marking embedding. Even though meta heuristic methods have been widely used because of their enhancing capability, due to their large time consumption nature they are not applicable for time-sens...
Advancements in Information Technology landscape over the past two decades have made the collection, preservation, and analysis of digital evidence an extremely important tool for solving cybercrimes and preparing court cases. Digital evidence plays an important role in cybercrime investigation, as it is used to link individuals with criminal activ...
Game Theory acts as a suitable tool offering promising solutions to
security-related concerns in Mobile Ad Hoc Networks (i.e., MANETs). In
MANETs, security forms a prominent concern as it includes nodes which are
usually portable and require significant coordination between them. Further, the
absence of physical organisation makes such networks sus...
Internet-banking is a crucial service offered by financial Institutions and has gained popularity at a high pace. Owing to the increasing usage of this service, it is being frequently targeted by adversaries. The login process by the user is one of the main points that are at risk of this assault. Hence, a robust security mechanism is essential for...
Wireless Sensor Network (WSN) consists of small sensor nodes that cooperate with each other to send sensed data to the Base-Station (BS). Choice of optimal next hop for data routing is really important in WSN and it acts as a significant part in preserving energy. Individual parameters or weighted metric of different parameters are used in selectin...
The applications based on IoT are ubiquitous in providing passive user involvement on the collective approach of sensor technology, embedded system, networking and communication convergence with analytical computing. The application framework of IoT comprises of devices that are highly heterogeneous and compute migrations from sensor to IoT gateway...
The advancements in modern day computing and architectures focus on harnessing parallelism and achieve high performance computing resulting in generation of massive amounts of data. The information produced needs to be represented and analyzed to address various challenges in technology and business domains. Radical expansion and integration of dig...
In this research paper, another methodology for covering up literary information in computerized hued pictures has been proposed. Digital colored pictures will simply be used as a canopy media in steganography as a result of numerous deficiencies rumored in sensory system of mortals. In the proposed system we have utilized two non-subordinate disor...
Internet of things (IoT) is a computing paradigm that connects devices (things) with the network and each other. The huge amount of data generated by IoT devices makes them promising targets for deep learning and machine learning algorithms required for analysis. The computational and memory costs associated with such algorithms is huge, which make...
Internet of Things (IoT) embodies a vision of merging heterogeneous objects to establish seamless interaction among physical and virtual entities. IoT has given the Internet a shift from connecting networks to interconnecting the physical world. The IoT devices are capable of sensing, processing, communicating and storing the data acquired from the...
Questions
Question (1)
Simulation tool required for Comparison of some symmetric ciphers.
Network
Cited