About
181
Publications
36,912
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
5,455
Citations
Citations since 2017
Introduction
Additional affiliations
August 2014 - January 2015
Chandigarh Group of Colleges, Landran
Position
- Professor (Assistant)
Education
January 2015 - September 2018
Thapar Institute of Engineering & Technology (Deemed to be University)
Field of study
- Computer Science & Engineering
Publications
Publications (181)
The integration of Terrestrial and Non-Terrestrial Networks (TNTNs) with the sixth-generation (6G) wireless ecosystem will revolutionize the futuristic communication networks by enabling comprehensive interconnection and quality of service. However, such an integrated network will raise serious security and privacy issues due to the insecure commun...
Due to the privacy breach risks and data aggregation of traditional centralized machine learning (ML) approaches, applications, data and computing power are being pushed from centralized data centers to network edge nodes. Federated Learning (FL) is an emerging privacy-preserving distributed ML paradigm suitable for edge network applications, which...
In Internet of Things (IoT)-based e-Health Systems
(IoTEHS), medical devices form a large network that continuously sense and share the healthcare data with the nearby edge
devices or cloud servers. The health data is subsequently made
available to various IoTEHS stakeholders (such as doctors, nurses
and patients) to track and monitor patients unde...
Driven by the ever-increasing requirements of autonomous vehicles, such as traffic monitoring and driving assistant, deep learning-based object detection (DL-OD) has been increasingly attractive in intelligent transportation systems. However, it is difficult for the existing DL-OD schemes to realize the responsible, cost-saving, and energy-efficien...
New industrial control systems (ICSs) that have been modernized with the industrial internet of things (IIoT) are exposed to cyber-attacks that exploit IIoT vulnerabilities. Numerous intrusion detection systems (IDSs) have therefore been proposed to secure ICSs, many of which are based on machine learning, specifically deep neural networks (DNNs)....
Cooperative intelligent transport system (C-ITS) is one emerging application scenario in 6G. Within the content of 6G, softwarization is the dominant attribute of networks 6G networks are required to have the intelligence and autonomy attributes, too. With softwarization and autonomy, not only the network capable of flexibly managing softwarized re...
Using unmanned aerial vehicles (UAVs) for data collecting in remote places is advantageous because of UAVs' low cost and extended range mobility. To facilitate the operation of time-sensitive applications, the acquired data is processed as geographically close to the end user as is practically possible. The suggested paradigm for energy-efficient U...
The idea of the quantum internet is to provide an internet technology that can enable quantum communication between any two points on Earth. Researchers are proposing a theoretically large number of quantum networks, but practically they are still far from reality Yet the aspect of security can not be ignored as it has always remained a crucial asp...
The heterogeneity and growing complexity from the evolution of 5G and beyond networks and the development of future IoT networks necessitate the automatic management of these networks. The exacerbated growth of IoT devices and foreseen network complexity deem manual management impractical. Zero touch networks (ZTNs) seems the practical solution to...
5G communication technologies and networks help researchers and engineers look into intelligent transportation systems (ITS) with a new eye, including vehicular ad hoc networks (VANET) application. Network function virtualization (NFV) and network slicing (NS) are accepted as two most promising technologies towards the agile and elastic network arc...
Underwater optical wireless communications (UOWCs) are promising and potential wireless carriers to envisage underwater phenomenal activities for various applications towards the futuristic 5G and beyond (5GB) wireless systems. The main challenges to deploy underwater
applications are the physicochemical properties and strong
turbulence channel con...
The increasing power consumption and the energy crisis owing to several billion of connected devices raises concern. The battery powered devices or mobile terminals consume a lot of power and led to huge energy overhead. Thus, the need is to design energy sustainable networks which aims for optimum utilization of power resources. 6G enabled network...
Cyber physical systems (CPSs) are multi-dimensional complex systems integrated with computing, networking and physical modules, enabling to realize complex computing and communication tasks. Vehicles are composed of many electrical and electronic hardware modules. With integrating mobile vehicles, CPSs can be extended to realize more remote tasks....
The intelligent warehouse logistics system (IWLS) is an essential component in the emerging industry 5.0. To well assist the IWLS, advanced network architecture and control policies with the adaptive capability to the variation of traffic should be specially designed. In this paper, we consider an air-and-ground cooperative wireless network that en...
Deep learning has been created as a practical artificial intelligence strategy that takes various layers of information and gives the best in the effects of different classes. The use of deep learning has indicated exceptional execution in other regions, especially in image clustering, division, and recognition. The ongoing advanced learning strate...
The Internet of Things (IoT) networks are obstructed by security vulnerabilities that hackers can leverage to operate intrusions in many environments, such as smart homes, smart factories, and smart healthcare systems. To overcome this obstruction, researchers have come up with different intrusion detection and prevention systems (IDPSs). Out of al...
This book provides comprehensive discussion on key topics related to the usage and deployment of software defined networks (SDN) in Internet of Everything applications like, healthcare systems, data centers, edge/fog computing, vehicular networks, intelligent transportation systems, smart grids, smart cities and more. The authors provide diverse so...
The Internet of Things (IoT) is emerging as a new technology for the development of various critical applications. However, these applications are still working on centralized storage architecture and have various key challenges like privacy, security, and single point of failure. Recently, the blockchain technology has emerged as a backbone for th...
Many IoT-based applications have inherited the artificial intelligence of Things (AIoT) techniques to explore new services and benefits of smart recording and monitoring generated information. However, hundreds of hacking incidents caused by highly sophisticated attackers have generated serious risks, where they compromised various IoT sensors for...
The optimal transmit power that maximizes energy efficiency (EE) in Longe Range (LoRa) networks is investigated by using the deep learning (DL) approach. Particularly, the proposed artificial neural network (ANN) is trained two times; in the first phase, the ANN is trained by the model-based data which are generated from the simplified system model...
The rapid expansion of the Industrial Internet of Things (IIoT) necessitates the digitization of industrial processes in order to increase network efficiency. The integration of Digital Twin (DT) with IIoT digitizes physical objects into virtual representations to improve data analytics performance. Nevertheless, DT empowered IIoT generates a massi...
The recent development of Internet of Things (IoT) and Unmanned Aerial Vehicles has revolutionized traditional agriculture with intelligence and automation. In a typical Intelligent Agriculture (IA) ecosystem, massive and real-time data are generated, analyzed, and sent to the Cloud Server (CS) for the purpose of addressing complex agricultural iss...
The rapid expansion of wearable medical devices and health data of Internet of Medical Things (IoMT) poses new challenges to the high Quality of Service (QoS) of intelligent health care in the foreseeable 6G era. Healthcare applications and services require ultra reliable, ultra low delay and energy consumption data communication and computing. Wir...
Both space information networks (SINs) and software-defined networking (SDN) have gained considerable attention from industry and academia in recent years. Due to the unique characteristics of SDN and SINs, a hybrid version of them, e.g. Software-defined space information networks (SDSINs), can handle many complicated tasks. Some technological adva...
Internet of Things (IoT)-based paradigm connects multitudinous IoT devices that operate in a wireless mode to gather information about various attributes from their surrounding. These IoT devices suffer from the limited energy resources and hence, these must be used in an optimized way to elongate network lifetime and to improve various performance...
The fifth-generation (5G) wireless communication technology enables high-reliability and low-latency communications for the Intelligent Transportation System (ITS). However, the growingly sophisticated attacks against 5G-enabled ITS (5G-ITS) might cause serious damages to the valuable data generated by various ITS applications. Therefore, establish...
The popularity of drones has increased their deployment in a wide range of applications like commercial delivery, industrial systems, monitoring, surveillance, and surveys. The facility of fast deployment and cost effectiveness make drones a potential choice for an aerial base station to serve user equipments (UEs) in a defined area. Drones are equ...
The recent burgeoning of Internet of Things (IoT) technologies in the maritime industry is successfully digitalizing Maritime Transportation Systems (MTS). In IoT-enabled MTS, the smart maritime objects, infrastructure associated with ship or port communicate wirelessly using an open channel Internet. The intercommunication and incorporation of het...
Artificial Intelligence (AI) based models are increasingly deployed in the Internet of Things (IoT), paving the evolution of the IoT into the AI of things (AIoT). Currently, the predominant approach for AI model training is cloud-centric and involves the sharing of data with external parties. To preserve privacy while enabling collaborative model t...
With the exponential growth in the number of connected devices, in recent years there has been a paradigm shift toward mobile edge computing. As a promising edge technology, it pushes mobile computing, network control, and storage to the network edges so as to provide better support to computation-intensive Internet of Things (IoT) applications. Al...
The ability to detect which wireless devices are belonging to the same person from Wi-Fi access point (AP) enables many potential Internet of Things (IoT) applications, including continuous authentication and user-oriented devices isolation. The existing cryptographic-based solutions are not suitable for IoT devices with limited power and computing...
Internet of Drones (IoD)-enabled aerial computing can effectively reduce communication delay and energy consumption as compared to conventional computing environments. It seems very useful for its deployment in disaster areas, emergency relief and battlefield communications. However, different types of attacks, such as replay, man-in-the-middle, imp...
In the Internet of Things (IoT), a huge amount of valuable data is generated by various IoT applications. As the IoT technologies become more complex, the attack methods are more diversified and can cause serious damages. Thus, establishing a secure IoT network based on user trust evaluation to defend against security threats and ensure the reliabi...
The exponential increase in the number of connected devices in the network led to a paradigm shift from the traditional host-centric IP-based network architecture to a content-based paradigm, which eliminates the address-content bindings in traditional IP-based architectures. In content-centric networking (CCN) architecture, contents are accessed b...
The automatic extraction of hottest shipping routes is naturally beneficial for ship monitoring, maritime surveillance, and traffic safety management in vessel traffic service (VTS) systems. The extraction results are highly dependent on the historical positioning data collected from the widely-used automatic identification system (AIS). It plays a...
Cloud envisioned Cyber-Physical Systems (CCPS) is a practical technology that relies on the interaction among cyber elements like mobile users to transfer data in cloud computing. In CCPS, cloud storage applies data deduplication techniques aiming to save data storage and bandwidth for real-time services. In this infrastructure, data deduplication...
Big Data (BD) platforms have a long tradition of leveraging trends and technologies from the broader computer network and communication community. For several years, dedicated servers of homogeneous clusters were employed as the dominant paradigm in BD networks. In recent years, the BD landscape has changed, porting different deployment architectur...
Vehicle taillight detection is essential to analyze and predict driver intention in collision avoidance systems. In this article, we propose an end-to-end framework that locates the rear brake and turn signals from video stream in real-time. The system adopts the fast YOLOv3-tiny as the backbone model and three improvements have been made to increa...
Devices with full-duplex (FD) radios are able to transmit and receive at the same time without requiring orthogonal resources, thereby creating strong self-interference (SI) that results from their own transmissions. Spatial modulation (SM), on the other hand, is a multi-antenna scheme that activates only one transmit antenna to send a data symbol,...
In the 5G era, heterogeneous networks (Het-Nets) are designed for achieving data rates and customized service demands. To realize this, virtualization technologies are widely accepted as enablers for implementing 5G HetNets, aimed at managing and scheduling virtualized physical resources in a flexible manner. However, the major focus of the existin...
Heterogeneous networks (HetNets) are becoming a promising solution for future wireless systems to satisfy the high data rate requirements. This paper introduces a stochastic geometry framework for the analysis of the downlink coverage probability in a multi-tier HetNet consisting of a macro-base station (MBS) operating at sub-6 GHz, millimeter wave...
Insufficient parking space and traffic congestion are important usual suspects in our urban life. Organisation and managing available parking spaces have raised a lot of awareness. Traditional centralized parking approaches are with an insidious single point of failure and unsuitable for large organization because the manager is overburdened with a...
Energy consumption minimization of cloud data centers (DCs) has attracted much attention from the research community in the recent years; particularly due to the increasing dependence of emerging Cyber-Physical Systems on them. An effective way to improve the energy efficiency of DCs is by using efficient job scheduling strategies. However, the mos...
Industrial Internet of Things (IIoT) is an emerging technology that can promote the development of industrial intelligence, improve production efficiency, and reduce manufacturing costs. However, anomalies of IIoT devices might expose sensitive data about users of high authenticity and validity, resulting in security and privacy threats to the IIoT...
Future generation communication systems, such as 5G and 6G wireless systems, exploit the combined satellite-terrestrial communication infrastructures to extend network coverage and data throughput for data-driven applications. These groundbreaking techniques have promoted the rapid development of Internet of Things (IoT) in maritime industries. In...
Named entity recognition (NER) is one of the most challenging natural language processing (NLP) tasks, as its performance is related to constantly evolving languages and dependency on expert (human) annotation. The diverse and dynamic content on the web significantly raises the need for a more generalized approach—one that is capable of correctly c...
In this paper, we propose a novel lightweight relation extraction approach of structural block driven - convolutional neural learning. Specifically, we detect the essential sequential tokens associated with entities through dependency analysis, named as a structural block, and only encode the block on a block-wise and an inter-block-wise representa...
COVID-19 is an extremely dangerous disease because of its highly infectious nature. In order to provide a quick and immediate identification of infection, a proper and immediate clinical support is needed. Researchers have proposed various Machine Learning and smart IoT based schemes for categorizing the COVID-19 patients. Artificial Neural Network...
In any cognitive radio sensor networks (CRSNs), the secondary users (SUs) and primary users (PUs) share the opportunity to use the authorized frequency band. Here, the SU nodes can only transmit in the temporarily idle spectrum when it is not in use by any PU nodes. The proper estimation and detection of primary nodes are important for the energy-e...
The pervasive growth in the variety of consumer electronics devices (CEDs), as well as the Internet traffic, has evolved various security risks towards their usage. This study presents the concept of communications without a centralized server to facilitate the fastest communication between end devices, e.g. user handheld devices, and edge devices....
Nowadays the deployment of drones/UAVs is not just limited to military and defense establishments; they are also widely deployed in geo-dispersed applications (environmental monitoring, rescue operation monitoring, road and traffic surveillance, natural disaster monitoring, soil and crop analysis, and consumer product delivery). Drones have become...
Energy Internet (also referred to as Smart Grid 2.0) is another promising application of the Industrial Internet of Things (IIoT), for example, in the way energy is being produced, traded, distributed, and consumed. This is partly due to the lowering of barriers (e.g., costs and Internet connectivity) and advances in the underlying technologies, su...
The past few years have witnessed the compelling applications of the Internet of Things (IoT) in our daily life. Meanwhile, with the explosion of IoT devices and various applications, the expectations for the performance, reliability, and security of networks are greater than ever. The current end-host-based or centralized control framework incurs...
The advances in the Internet of Things (IoT) provide several chances to develop a variety of innovations supporting smart home users in several industries including healthcare, energy management, etc. Ubiquitous support by intelligent appliances at modern homes, which constantly work to gather information can help us to solve everyday issues. In th...
Today, with the worldwide offer and rapid increment in multimedia applications on the web, the demands of users to get them accessed are also increasing prominently. The users in vehicular environment too expect efficient multimedia streaming while travelling on the road. However, the high mobility of vehicles as well as the limited transmission ra...
Industrial Internet of Things (IIoT) is ushering inhuge development opportunities in the era of Industry 4.0. However, there are significant data security and privacy challenges during automatic and real-time data collection, monitoring for industrial applications in IIoT. Data security and privacy in IIoT applications are closely related to the re...
Surveillance drones, called as unmanned aerial vehicles (UAV), are aircrafts that are utilized to collect video recordings, still images, or live video of the targets, such as vehicles, people or specific areas. Particularly in battlefield surveillance, there is high possibility of eavesdropping, inserting, modifying or deleting the messages during...
The development and maturity of the fifth-generation (5G) wireless communication technology provides the industrial Internet of Things (IIoT) with ultra-reliable and low-latency communications and massive machine-type communications, and forms a novel IIoT architecture, 5G-IIoT. However, massive data transfer between interconnecting industrial devi...
Online social networking is expanding gradually in our professional as well as personal life in a variety of natures, beliefs, attitudes, and personalities. During communicating through the networks, the trust plays a very significant role while undertaking the communication process. This paper proposes a secure trusted hypothetical mathematical mo...
The sixth-generation (6G) wireless communication network is expected to integrate the terrestrial, aerial, and maritime communications into a robust network which would be more reliable, fast, and can support a massive number of devices with ultra-low latency requirements. The researchers around the globe are proposing cutting edge technologies suc...
As the amount of data collected for crowdsensing applications increases rapidly due to improved sensing capabilities and the increasing number of Internet of Things (IoT) devices, the cloud server is no longer able to handle the large-scale datasets individually. Given the improved computational capabilities of the edge devices, coded distributed c...