Sahil Garg

Sahil Garg
École de Technologie Supérieure · Resilient Machine learning Institute (ReMI)

PhD

About

181
Publications
36,912
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
5,455
Citations
Citations since 2017
178 Research Items
5453 Citations
201720182019202020212022202305001,0001,500
201720182019202020212022202305001,0001,500
201720182019202020212022202305001,0001,500
201720182019202020212022202305001,0001,500
Additional affiliations
August 2014 - January 2015
Chandigarh Group of Colleges, Landran
Position
  • Professor (Assistant)
Education
January 2015 - September 2018
Thapar Institute of Engineering & Technology (Deemed to be University)
Field of study
  • Computer Science & Engineering

Publications

Publications (181)
Article
The integration of Terrestrial and Non-Terrestrial Networks (TNTNs) with the sixth-generation (6G) wireless ecosystem will revolutionize the futuristic communication networks by enabling comprehensive interconnection and quality of service. However, such an integrated network will raise serious security and privacy issues due to the insecure commun...
Article
Due to the privacy breach risks and data aggregation of traditional centralized machine learning (ML) approaches, applications, data and computing power are being pushed from centralized data centers to network edge nodes. Federated Learning (FL) is an emerging privacy-preserving distributed ML paradigm suitable for edge network applications, which...
Conference Paper
In Internet of Things (IoT)-based e-Health Systems (IoTEHS), medical devices form a large network that continuously sense and share the healthcare data with the nearby edge devices or cloud servers. The health data is subsequently made available to various IoTEHS stakeholders (such as doctors, nurses and patients) to track and monitor patients unde...
Article
Driven by the ever-increasing requirements of autonomous vehicles, such as traffic monitoring and driving assistant, deep learning-based object detection (DL-OD) has been increasingly attractive in intelligent transportation systems. However, it is difficult for the existing DL-OD schemes to realize the responsible, cost-saving, and energy-efficien...
Article
New industrial control systems (ICSs) that have been modernized with the industrial internet of things (IIoT) are exposed to cyber-attacks that exploit IIoT vulnerabilities. Numerous intrusion detection systems (IDSs) have therefore been proposed to secure ICSs, many of which are based on machine learning, specifically deep neural networks (DNNs)....
Article
Cooperative intelligent transport system (C-ITS) is one emerging application scenario in 6G. Within the content of 6G, softwarization is the dominant attribute of networks 6G networks are required to have the intelligence and autonomy attributes, too. With softwarization and autonomy, not only the network capable of flexibly managing softwarized re...
Article
Using unmanned aerial vehicles (UAVs) for data collecting in remote places is advantageous because of UAVs' low cost and extended range mobility. To facilitate the operation of time-sensitive applications, the acquired data is processed as geographically close to the end user as is practically possible. The suggested paradigm for energy-efficient U...
Article
The idea of the quantum internet is to provide an internet technology that can enable quantum communication between any two points on Earth. Researchers are proposing a theoretically large number of quantum networks, but practically they are still far from reality Yet the aspect of security can not be ignored as it has always remained a crucial asp...
Article
The heterogeneity and growing complexity from the evolution of 5G and beyond networks and the development of future IoT networks necessitate the automatic management of these networks. The exacerbated growth of IoT devices and foreseen network complexity deem manual management impractical. Zero touch networks (ZTNs) seems the practical solution to...
Article
5G communication technologies and networks help researchers and engineers look into intelligent transportation systems (ITS) with a new eye, including vehicular ad hoc networks (VANET) application. Network function virtualization (NFV) and network slicing (NS) are accepted as two most promising technologies towards the agile and elastic network arc...
Article
Full-text available
Underwater optical wireless communications (UOWCs) are promising and potential wireless carriers to envisage underwater phenomenal activities for various applications towards the futuristic 5G and beyond (5GB) wireless systems. The main challenges to deploy underwater applications are the physicochemical properties and strong turbulence channel con...
Article
The increasing power consumption and the energy crisis owing to several billion of connected devices raises concern. The battery powered devices or mobile terminals consume a lot of power and led to huge energy overhead. Thus, the need is to design energy sustainable networks which aims for optimum utilization of power resources. 6G enabled network...
Article
Cyber physical systems (CPSs) are multi-dimensional complex systems integrated with computing, networking and physical modules, enabling to realize complex computing and communication tasks. Vehicles are composed of many electrical and electronic hardware modules. With integrating mobile vehicles, CPSs can be extended to realize more remote tasks....
Article
The intelligent warehouse logistics system (IWLS) is an essential component in the emerging industry 5.0. To well assist the IWLS, advanced network architecture and control policies with the adaptive capability to the variation of traffic should be specially designed. In this paper, we consider an air-and-ground cooperative wireless network that en...
Article
Deep learning has been created as a practical artificial intelligence strategy that takes various layers of information and gives the best in the effects of different classes. The use of deep learning has indicated exceptional execution in other regions, especially in image clustering, division, and recognition. The ongoing advanced learning strate...
Article
The Internet of Things (IoT) networks are obstructed by security vulnerabilities that hackers can leverage to operate intrusions in many environments, such as smart homes, smart factories, and smart healthcare systems. To overcome this obstruction, researchers have come up with different intrusion detection and prevention systems (IDPSs). Out of al...
Book
This book provides comprehensive discussion on key topics related to the usage and deployment of software defined networks (SDN) in Internet of Everything applications like, healthcare systems, data centers, edge/fog computing, vehicular networks, intelligent transportation systems, smart grids, smart cities and more. The authors provide diverse so...
Article
The Internet of Things (IoT) is emerging as a new technology for the development of various critical applications. However, these applications are still working on centralized storage architecture and have various key challenges like privacy, security, and single point of failure. Recently, the blockchain technology has emerged as a backbone for th...
Article
Many IoT-based applications have inherited the artificial intelligence of Things (AIoT) techniques to explore new services and benefits of smart recording and monitoring generated information. However, hundreds of hacking incidents caused by highly sophisticated attackers have generated serious risks, where they compromised various IoT sensors for...
Article
The optimal transmit power that maximizes energy efficiency (EE) in Longe Range (LoRa) networks is investigated by using the deep learning (DL) approach. Particularly, the proposed artificial neural network (ANN) is trained two times; in the first phase, the ANN is trained by the model-based data which are generated from the simplified system model...
Article
Full-text available
The rapid expansion of the Industrial Internet of Things (IIoT) necessitates the digitization of industrial processes in order to increase network efficiency. The integration of Digital Twin (DT) with IIoT digitizes physical objects into virtual representations to improve data analytics performance. Nevertheless, DT empowered IIoT generates a massi...
Article
Full-text available
The recent development of Internet of Things (IoT) and Unmanned Aerial Vehicles has revolutionized traditional agriculture with intelligence and automation. In a typical Intelligent Agriculture (IA) ecosystem, massive and real-time data are generated, analyzed, and sent to the Cloud Server (CS) for the purpose of addressing complex agricultural iss...
Article
The rapid expansion of wearable medical devices and health data of Internet of Medical Things (IoMT) poses new challenges to the high Quality of Service (QoS) of intelligent health care in the foreseeable 6G era. Healthcare applications and services require ultra reliable, ultra low delay and energy consumption data communication and computing. Wir...
Article
Both space information networks (SINs) and software-defined networking (SDN) have gained considerable attention from industry and academia in recent years. Due to the unique characteristics of SDN and SINs, a hybrid version of them, e.g. Software-defined space information networks (SDSINs), can handle many complicated tasks. Some technological adva...
Article
Full-text available
Internet of Things (IoT)-based paradigm connects multitudinous IoT devices that operate in a wireless mode to gather information about various attributes from their surrounding. These IoT devices suffer from the limited energy resources and hence, these must be used in an optimized way to elongate network lifetime and to improve various performance...
Article
The fifth-generation (5G) wireless communication technology enables high-reliability and low-latency communications for the Intelligent Transportation System (ITS). However, the growingly sophisticated attacks against 5G-enabled ITS (5G-ITS) might cause serious damages to the valuable data generated by various ITS applications. Therefore, establish...
Article
The popularity of drones has increased their deployment in a wide range of applications like commercial delivery, industrial systems, monitoring, surveillance, and surveys. The facility of fast deployment and cost effectiveness make drones a potential choice for an aerial base station to serve user equipments (UEs) in a defined area. Drones are equ...
Article
The recent burgeoning of Internet of Things (IoT) technologies in the maritime industry is successfully digitalizing Maritime Transportation Systems (MTS). In IoT-enabled MTS, the smart maritime objects, infrastructure associated with ship or port communicate wirelessly using an open channel Internet. The intercommunication and incorporation of het...
Article
Artificial Intelligence (AI) based models are increasingly deployed in the Internet of Things (IoT), paving the evolution of the IoT into the AI of things (AIoT). Currently, the predominant approach for AI model training is cloud-centric and involves the sharing of data with external parties. To preserve privacy while enabling collaborative model t...
Article
With the exponential growth in the number of connected devices, in recent years there has been a paradigm shift toward mobile edge computing. As a promising edge technology, it pushes mobile computing, network control, and storage to the network edges so as to provide better support to computation-intensive Internet of Things (IoT) applications. Al...
Article
The ability to detect which wireless devices are belonging to the same person from Wi-Fi access point (AP) enables many potential Internet of Things (IoT) applications, including continuous authentication and user-oriented devices isolation. The existing cryptographic-based solutions are not suitable for IoT devices with limited power and computing...
Article
Internet of Drones (IoD)-enabled aerial computing can effectively reduce communication delay and energy consumption as compared to conventional computing environments. It seems very useful for its deployment in disaster areas, emergency relief and battlefield communications. However, different types of attacks, such as replay, man-in-the-middle, imp...
Article
In the Internet of Things (IoT), a huge amount of valuable data is generated by various IoT applications. As the IoT technologies become more complex, the attack methods are more diversified and can cause serious damages. Thus, establishing a secure IoT network based on user trust evaluation to defend against security threats and ensure the reliabi...
Article
The exponential increase in the number of connected devices in the network led to a paradigm shift from the traditional host-centric IP-based network architecture to a content-based paradigm, which eliminates the address-content bindings in traditional IP-based architectures. In content-centric networking (CCN) architecture, contents are accessed b...
Conference Paper
The automatic extraction of hottest shipping routes is naturally beneficial for ship monitoring, maritime surveillance, and traffic safety management in vessel traffic service (VTS) systems. The extraction results are highly dependent on the historical positioning data collected from the widely-used automatic identification system (AIS). It plays a...
Article
Cloud envisioned Cyber-Physical Systems (CCPS) is a practical technology that relies on the interaction among cyber elements like mobile users to transfer data in cloud computing. In CCPS, cloud storage applies data deduplication techniques aiming to save data storage and bandwidth for real-time services. In this infrastructure, data deduplication...
Article
Full-text available
Big Data (BD) platforms have a long tradition of leveraging trends and technologies from the broader computer network and communication community. For several years, dedicated servers of homogeneous clusters were employed as the dominant paradigm in BD networks. In recent years, the BD landscape has changed, porting different deployment architectur...
Article
Vehicle taillight detection is essential to analyze and predict driver intention in collision avoidance systems. In this article, we propose an end-to-end framework that locates the rear brake and turn signals from video stream in real-time. The system adopts the fast YOLOv3-tiny as the backbone model and three improvements have been made to increa...
Article
Full-text available
Devices with full-duplex (FD) radios are able to transmit and receive at the same time without requiring orthogonal resources, thereby creating strong self-interference (SI) that results from their own transmissions. Spatial modulation (SM), on the other hand, is a multi-antenna scheme that activates only one transmit antenna to send a data symbol,...
Article
In the 5G era, heterogeneous networks (Het-Nets) are designed for achieving data rates and customized service demands. To realize this, virtualization technologies are widely accepted as enablers for implementing 5G HetNets, aimed at managing and scheduling virtualized physical resources in a flexible manner. However, the major focus of the existin...
Article
Full-text available
Heterogeneous networks (HetNets) are becoming a promising solution for future wireless systems to satisfy the high data rate requirements. This paper introduces a stochastic geometry framework for the analysis of the downlink coverage probability in a multi-tier HetNet consisting of a macro-base station (MBS) operating at sub-6 GHz, millimeter wave...
Article
Insufficient parking space and traffic congestion are important usual suspects in our urban life. Organisation and managing available parking spaces have raised a lot of awareness. Traditional centralized parking approaches are with an insidious single point of failure and unsuitable for large organization because the manager is overburdened with a...
Article
Energy consumption minimization of cloud data centers (DCs) has attracted much attention from the research community in the recent years; particularly due to the increasing dependence of emerging Cyber-Physical Systems on them. An effective way to improve the energy efficiency of DCs is by using efficient job scheduling strategies. However, the mos...
Article
Industrial Internet of Things (IIoT) is an emerging technology that can promote the development of industrial intelligence, improve production efficiency, and reduce manufacturing costs. However, anomalies of IIoT devices might expose sensitive data about users of high authenticity and validity, resulting in security and privacy threats to the IIoT...
Article
Full-text available
Future generation communication systems, such as 5G and 6G wireless systems, exploit the combined satellite-terrestrial communication infrastructures to extend network coverage and data throughput for data-driven applications. These groundbreaking techniques have promoted the rapid development of Internet of Things (IoT) in maritime industries. In...
Article
Named entity recognition (NER) is one of the most challenging natural language processing (NLP) tasks, as its performance is related to constantly evolving languages and dependency on expert (human) annotation. The diverse and dynamic content on the web significantly raises the need for a more generalized approach—one that is capable of correctly c...
Preprint
Full-text available
In this paper, we propose a novel lightweight relation extraction approach of structural block driven - convolutional neural learning. Specifically, we detect the essential sequential tokens associated with entities through dependency analysis, named as a structural block, and only encode the block on a block-wise and an inter-block-wise representa...
Article
Full-text available
COVID-19 is an extremely dangerous disease because of its highly infectious nature. In order to provide a quick and immediate identification of infection, a proper and immediate clinical support is needed. Researchers have proposed various Machine Learning and smart IoT based schemes for categorizing the COVID-19 patients. Artificial Neural Network...
Article
Full-text available
In any cognitive radio sensor networks (CRSNs), the secondary users (SUs) and primary users (PUs) share the opportunity to use the authorized frequency band. Here, the SU nodes can only transmit in the temporarily idle spectrum when it is not in use by any PU nodes. The proper estimation and detection of primary nodes are important for the energy-e...
Article
The pervasive growth in the variety of consumer electronics devices (CEDs), as well as the Internet traffic, has evolved various security risks towards their usage. This study presents the concept of communications without a centralized server to facilitate the fastest communication between end devices, e.g. user handheld devices, and edge devices....
Article
Nowadays the deployment of drones/UAVs is not just limited to military and defense establishments; they are also widely deployed in geo-dispersed applications (environmental monitoring, rescue operation monitoring, road and traffic surveillance, natural disaster monitoring, soil and crop analysis, and consumer product delivery). Drones have become...
Article
Energy Internet (also referred to as Smart Grid 2.0) is another promising application of the Industrial Internet of Things (IIoT), for example, in the way energy is being produced, traded, distributed, and consumed. This is partly due to the lowering of barriers (e.g., costs and Internet connectivity) and advances in the underlying technologies, su...
Article
Full-text available
The past few years have witnessed the compelling applications of the Internet of Things (IoT) in our daily life. Meanwhile, with the explosion of IoT devices and various applications, the expectations for the performance, reliability, and security of networks are greater than ever. The current end-host-based or centralized control framework incurs...
Article
Full-text available
The advances in the Internet of Things (IoT) provide several chances to develop a variety of innovations supporting smart home users in several industries including healthcare, energy management, etc. Ubiquitous support by intelligent appliances at modern homes, which constantly work to gather information can help us to solve everyday issues. In th...
Article
Today, with the worldwide offer and rapid increment in multimedia applications on the web, the demands of users to get them accessed are also increasing prominently. The users in vehicular environment too expect efficient multimedia streaming while travelling on the road. However, the high mobility of vehicles as well as the limited transmission ra...
Article
Industrial Internet of Things (IIoT) is ushering inhuge development opportunities in the era of Industry 4.0. However, there are significant data security and privacy challenges during automatic and real-time data collection, monitoring for industrial applications in IIoT. Data security and privacy in IIoT applications are closely related to the re...
Article
Surveillance drones, called as unmanned aerial vehicles (UAV), are aircrafts that are utilized to collect video recordings, still images, or live video of the targets, such as vehicles, people or specific areas. Particularly in battlefield surveillance, there is high possibility of eavesdropping, inserting, modifying or deleting the messages during...
Article
The development and maturity of the fifth-generation (5G) wireless communication technology provides the industrial Internet of Things (IIoT) with ultra-reliable and low-latency communications and massive machine-type communications, and forms a novel IIoT architecture, 5G-IIoT. However, massive data transfer between interconnecting industrial devi...
Article
Full-text available
Online social networking is expanding gradually in our professional as well as personal life in a variety of natures, beliefs, attitudes, and personalities. During communicating through the networks, the trust plays a very significant role while undertaking the communication process. This paper proposes a secure trusted hypothetical mathematical mo...
Article
Full-text available
The sixth-generation (6G) wireless communication network is expected to integrate the terrestrial, aerial, and maritime communications into a robust network which would be more reliable, fast, and can support a massive number of devices with ultra-low latency requirements. The researchers around the globe are proposing cutting edge technologies suc...
Preprint
Full-text available
As the amount of data collected for crowdsensing applications increases rapidly due to improved sensing capabilities and the increasing number of Internet of Things (IoT) devices, the cloud server is no longer able to handle the large-scale datasets individually. Given the improved computational capabilities of the edge devices, coded distributed c...