About
156
Publications
28,402
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,239
Citations
Introduction
Additional affiliations
August 2014 - January 2015
Chandigarh Group of Colleges, Landran
Position
- Professor (Assistant)
Education
January 2015 - September 2018
Thapar Institute of Engineering & Technology (Deemed to be University)
Field of study
- Computer Science & Engineering
Publications
Publications (156)
Cyber physical systems (CPSs) are multi-dimensional complex systems integrated with computing, networking and physical modules, enabling to realize complex computing and communication tasks. Vehicles are composed of many electrical and electronic hardware modules. With integrating mobile vehicles, CPSs can be extended to realize more remote tasks....
Deep learning has been created as a practical artificial intelligence strategy that takes various layers of information and gives the best in the effects of different classes. The use of deep learning has indicated exceptional execution in other regions, especially in image clustering, division, and recognition. The ongoing advanced learning strate...
The Internet of Things (IoT) networks are obstructed by security vulnerabilities that hackers can leverage to operate intrusions in many environments, such as smart homes, smart factories, and smart healthcare systems. To overcome this obstruction, researchers have come up with different intrusion detection and prevention systems (IDPSs). Out of al...
This book provides comprehensive discussion on key topics related to the usage and deployment of software defined networks (SDN) in Internet of Everything applications like, healthcare systems, data centers, edge/fog computing, vehicular networks, intelligent transportation systems, smart grids, smart cities and more. The authors provide diverse so...
The Internet of Things (IoT) is emerging as a new technology for the development of various critical applications. However, these applications are still working on centralized storage architecture and have various key challenges like privacy, security, and single point of failure. Recently, the blockchain technology has emerged as a backbone for th...
Underwater optical wireless communications (UOWCs) are promising and potential wireless carriers to envisage underwater phenomenal activities for various applications towards the futuristic 5G and beyond (5GB) wireless systems. The main challenges to deploy underwater
applications are the physicochemical properties and strong
turbulence channel con...
Both space information networks (SINs) and software-defined networking (SDN) have gained considerable attention from industry and academia in recent years. Due to the unique characteristics of SDN and SINs, a hybrid version of them, e.g. Software-defined space information networks (SDSINs), can handle many complicated tasks. Some technological adva...
Internet of Things (IoT)-based paradigm connects multitudinous IoT devices that operate in a wireless mode to gather information about various attributes from their surrounding. These IoT devices suffer from the limited energy resources and hence, these must be used in an optimized way to elongate network lifetime and to improve various performance...
The fifth-generation (5G) wireless communication technology enables high-reliability and low-latency communications for the Intelligent Transportation System (ITS). However, the growingly sophisticated attacks against 5G-enabled ITS (5G-ITS) might cause serious damages to the valuable data generated by various ITS applications. Therefore, establish...
The popularity of drones has increased their deployment in a wide range of applications like commercial delivery, industrial systems, monitoring, surveillance, and surveys. The facility of fast deployment and cost effectiveness make drones a potential choice for an aerial base station to serve user equipments (UEs) in a defined area. Drones are equ...
The recent burgeoning of Internet of Things (IoT) technologies in the maritime industry is successfully digitalizing Maritime Transportation Systems (MTS). In IoT-enabled MTS, the smart maritime objects, infrastructure associated with ship or port communicate wirelessly using an open channel Internet. The intercommunication and incorporation of het...
Artificial Intelligence (AI) based models are increasingly deployed in the Internet of Things (IoT), paving the evolution of the IoT into the AI of things (AIoT). Currently, the predominant approach for AI model training is cloud-centric and involves the sharing of data with external parties. To preserve privacy while enabling collaborative model t...
With the exponential growth in the number of connected devices, in recent years there has been a paradigm shift toward mobile edge computing. As a promising edge technology, it pushes mobile computing, network control, and storage to the network edges so as to provide better support to computation-intensive Internet of Things (IoT) applications. Al...
The ability to detect which wireless devices are belonging to the same person from Wi-Fi access point (AP) enables many potential Internet of Things (IoT) applications, including continuous authentication and user-oriented devices isolation. The existing cryptographic-based solutions are not suitable for IoT devices with limited power and computing...
Internet of Drones (IoD)-enabled aerial computing can effectively reduce communication delay and energy consumption as compared to conventional computing environments. It seems very useful for its deployment in disaster areas, emergency relief and battlefield communications. However, different types of attacks, such as replay, man-in-the-middle, imp...
In the Internet of Things (IoT), a huge amount of valuable data is generated by various IoT applications. As the IoT technologies become more complex, the attack methods are more diversified and can cause serious damages. Thus, establishing a secure IoT network based on user trust evaluation to defend against security threats and ensure the reliabi...
The exponential increase in the number of connected devices in the network led to a paradigm shift from the traditional host-centric IP-based network architecture to a content-based paradigm, which eliminates the address-content bindings in traditional IP-based architectures. In content-centric networking (CCN) architecture, contents are accessed b...
The automatic extraction of hottest shipping routes is naturally beneficial for ship monitoring, maritime surveillance, and traffic safety management in vessel traffic service (VTS) systems. The extraction results are highly dependent on the historical positioning data collected from the widely-used automatic identification system (AIS). It plays a...
Cloud envisioned Cyber-Physical Systems (CCPS) is a practical technology that relies on the interaction among cyber elements like mobile users to transfer data in cloud computing. In CCPS, cloud storage applies data deduplication techniques aiming to save data storage and bandwidth for real-time services. In this infrastructure, data deduplication...
Big Data (BD) platforms have a long tradition of leveraging trends and technologies from the broader computer network and communication community. For several years, dedicated servers of homogeneous clusters were employed as the dominant paradigm in BD networks. In recent years, the BD landscape has changed, porting different deployment architectur...
Vehicle taillight detection is essential to analyze and predict driver intention in collision avoidance systems. In this article, we propose an end-to-end framework that locates the rear brake and turn signals from video stream in real-time. The system adopts the fast YOLOv3-tiny as the backbone model and three improvements have been made to increa...
Devices with full-duplex (FD) radios are able to transmit and receive at the same time without requiring orthogonal resources, thereby creating strong self-interference (SI) that results from their own transmissions. Spatial modulation (SM), on the other hand, is a multi-antenna scheme that activates only one transmit antenna to send a data symbol,...
In the 5G era, heterogeneous networks (Het-Nets) are designed for achieving data rates and customized service demands. To realize this, virtualization technologies are widely accepted as enablers for implementing 5G HetNets, aimed at managing and scheduling virtualized physical resources in a flexible manner. However, the major focus of the existin...
Heterogeneous networks (HetNets) are becoming a promising solution for future wireless systems to satisfy the high data rate requirements. This paper introduces a stochastic geometry framework for the analysis of the downlink coverage probability in a multi-tier HetNet consisting of a macro-base station (MBS) operating at sub-6 GHz, millimeter wave...
Insufficient parking space and traffic congestion are important usual suspects in our urban life. Organisation and managing available parking spaces have raised a lot of awareness. Traditional centralized parking approaches are with an insidious single point of failure and unsuitable for large organization because the manager is overburdened with a...
Energy consumption minimization of cloud data centers (DCs) has attracted much attention from the research community in the recent years; particularly due to the increasing dependence of emerging Cyber-Physical Systems on them. An effective way to improve the energy efficiency of DCs is by using efficient job scheduling strategies. However, the mos...
Industrial Internet of Things (IIoT) is an emerging technology that can promote the development of industrial intelligence, improve production efficiency, and reduce manufacturing costs. However, anomalies of IIoT devices might expose sensitive data about users of high authenticity and validity, resulting in security and privacy threats to the IIoT...
Future generation communication systems, such as 5G and 6G wireless systems, exploit the combined satellite-terrestrial communication infrastructures to extend network coverage and data throughput for data-driven applications. These groundbreaking techniques have promoted the rapid development of Internet of Things (IoT) in maritime industries. In...
Named entity recognition (NER) is one of the most challenging natural language processing (NLP) tasks, as its performance is related to constantly evolving languages and dependency on expert (human) annotation. The diverse and dynamic content on the web significantly raises the need for a more generalized approach—one that is capable of correctly c...
In this paper, we propose a novel lightweight relation extraction approach of structural block driven - convolutional neural learning. Specifically, we detect the essential sequential tokens associated with entities through dependency analysis, named as a structural block, and only encode the block on a block-wise and an inter-block-wise representa...
COVID-19 is an extremely dangerous disease because of its highly infectious nature. In order to provide a quick and immediate identification of infection, a proper and immediate clinical support is needed. Researchers have proposed various Machine Learning and smart IoT based schemes for categorizing the COVID-19 patients. Artificial Neural Network...
In any cognitive radio sensor networks (CRSNs), the secondary users (SUs) and primary users (PUs) share the opportunity to use the authorized frequency band. Here, the SU nodes can only transmit in the temporarily idle spectrum when it is not in use by any PU nodes. The proper estimation and detection of primary nodes are important for the energy-e...
The pervasive growth in the variety of consumer electronics devices (CEDs), as well as the Internet traffic, has evolved various security risks towards their usage. This study presents the concept of communications without a centralized server to facilitate the fastest communication between end devices, e.g. user handheld devices, and edge devices....
Nowadays the deployment of drones/UAVs is not just limited to military and defense establishments; they are also widely deployed in geo-dispersed applications (environmental monitoring, rescue operation monitoring, road and traffic surveillance, natural disaster monitoring, soil and crop analysis, and consumer product delivery). Drones have become...
Energy Internet (also referred to as Smart Grid 2.0) is another promising application of the Industrial Internet of Things (IIoT), for example, in the way energy is being produced, traded, distributed, and consumed. This is partly due to the lowering of barriers (e.g., costs and Internet connectivity) and advances in the underlying technologies, su...
The past few years have witnessed the compelling applications of the Internet of Things (IoT) in our daily life. Meanwhile, with the explosion of IoT devices and various applications, the expectations for the performance, reliability, and security of networks are greater than ever. The current end-host-based or centralized control framework incurs...
The advances in the Internet of Things (IoT) provide several chances to develop a variety of innovations supporting smart home users in several industries including healthcare, energy management, etc. Ubiquitous support by intelligent appliances at modern homes, which constantly work to gather information can help us to solve everyday issues. In th...
Today, with the worldwide offer and rapid increment in multimedia applications on the web, the demands of users to get them accessed are also increasing prominently. The users in vehicular environment too expect efficient multimedia streaming while travelling on the road. However, the high mobility of vehicles as well as the limited transmission ra...
Industrial Internet of Things (IIoT) is ushering inhuge development opportunities in the era of Industry 4.0. However, there are significant data security and privacy challenges during automatic and real-time data collection, monitoring for industrial applications in IIoT. Data security and privacy in IIoT applications are closely related to the re...
Surveillance drones, called as unmanned aerial vehicles (UAV), are aircrafts that are utilized to collect video recordings, still images, or live video of the targets, such as vehicles, people or specific areas. Particularly in battlefield surveillance, there is high possibility of eavesdropping, inserting, modifying or deleting the messages during...
Online social networking is expanding gradually in our professional as well as personal life in a variety of natures, beliefs, attitudes, and personalities. During communicating through the networks, the trust plays a very significant role while undertaking the communication process. This paper proposes a secure trusted hypothetical mathematical mo...
The sixth-generation (6G) wireless communication network is expected to integrate the terrestrial, aerial, and maritime communications into a robust network which would be more reliable, fast, and can support a massive number of devices with ultra-low latency requirements. The researchers around the globe are proposing cutting edge technologies suc...
As the amount of data collected for crowdsensing applications increases rapidly due to improved sensing capabilities and the increasing number of Internet of Things (IoT) devices, the cloud server is no longer able to handle the large-scale datasets individually. Given the improved computational capabilities of the edge devices, coded distributed c...
The dynamic and highly open nature of cognitive radio (CR) makes cognitive communication extremely vulnerable to various malicious activities resulting from several security threats. Although extensive efforts have been devoted to the research and development of spectrum sharing systems, security issues are not well addressed for the cognitive radi...
Unmanned Aerial Vehicle (UAV) has become a significant part of 5G or beyond 5G (B5G) paradigm, and is used in various scenarios, including cargo delivery, agricultural application, event surveillance, etc. Although plenty of studies have been proposed on UAV-based data aggregation, how to ensure security and energy-efficiency of the data aggregatio...
Conventional models in the intelligent transportation system (ITS) are confronted by large computational overheads and how they react during real-time scenarios. To appropriately manage the communication process in real-time, a trust-based mechanism can provide an efficient approach to acclimatize its deeds based on indecision sensory information....
Sixth generation (6G) network is a revolutionary technology to satisfy the ever-growing demands from the sustainable development of emerging industrial applications and services. Due to its high flexibility, convenient and rapid deployment, self-organization capability, and outstanding expansibility, Network-in-Box (NIB) represents a promising appr...
Currently, the data collected by the Internet of Healthcare Things, i.e., healthcare oriented IoT, still rely on cloud-based centralized data aggregation and processing. To reduce the need for transmission of data to the cloud, the edge computing architecture may be adopted to facilitate machine learning at the edge of the network through leveragin...
With the worldwide large-scale outbreak of COVID-19, Internet of Medical Things (IoMT), as a new type of Internet of Things (IoT) based intelligent medical system, is being used for COVID-19 prevention and detection. However, since the widespread use of IoMT will generate a large amount of sensitive information related to patients, it is becoming m...
Mobile edge crowdsensing is capable of providing a large amount of data via pervasive mobile teminals for Industrial Internet of Things (IIoT). However, the generated data often contains users’ sensitive information, which suggests the significance of privacy-preserving in data aggregation and analysis for IIoT. Privacy-preserving in mobile edge cr...
The sixth-generation (6G) wireless communication network is expected to integrate the terrestrial, aerial, and maritime communications into a robust network which would be more reliable, fast, and can support a massive number of devices with ultra-low latency requirements. The researchers around the globe are proposing cutting edge technologies suc...
Owing to its benefits such as flexibility, scalability, and interoperability, Software-Defined Networking (SDN) has been incorporated into Internet of Vehicles (IoV) to cope with the increasing demands of vehicular applications. The integration of SDN and IoV, namely SDN-IoV, can enrich many new applications for intelligent transportation such as t...
With the advancements in real-time applications, age of information (AoI) emerges to describe the freshness of data. Here, we investigate AoI performance metric in simultaneous wireless information and power transfer (SWIPT) enabled cooperative wireless communication system. We use two SWIPT protocols: time-switching (TS) and power-splitting (PS) a...
With the rapid development of the Internet of Things (IoT), more and more data are generated by smart devices to support various edge services. Since these data may contain sensitive information, security and privacy of data aggregation has become a key challenge in IoT. To tackle this problem, a Blockchain based Secure Data Aggregation strategy, n...
Decision-making is of critical significance in Internet-of-Vehicles (IoV), where vehicles need to quickly make decisions in real-time when sharing or transferring the information. In addition, it is necessary to identify the significant factors of an entity while measuring its legitimacy or to record the real-time data generated by it. Traditional...
There is a need for improvement of tools to deal with large volumes of multimedia data effectively. In particular, real-time data processing is one of the major problems for multimedia data computing in remote sensing systems. Such big data systems have to offer effective management and computational efficiency for applications in real-time. In thi...
Metropolitan transportation is a dynamic and non-linear complex system. In such a system, there are possibilities of altering, monitoring, forging, and accessing private, public, and resource information of depot staff and communicating agents by unauthorized agencies the metropolitan area. Existing solutions for the management of security and priv...
Reconfigurable Wireless Sensor Network (RWSN) schedules a set of devices with reconfigurable wireless interface to accomplish different data collection plans in a cost-effective way. AI technologies are applied to optimize decision making for high-level network reconfiguration. Besides, AI based data mining tools are exploited by third parities to...