Sahil Garg

Sahil Garg
École de Technologie Supérieure · Resilient Machine learning Institute (ReMI)

PhD

About

156
Publications
28,402
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,239
Citations
Additional affiliations
August 2014 - January 2015
Chandigarh Group of Colleges, Landran
Position
  • Professor (Assistant)
Education
January 2015 - September 2018
Thapar Institute of Engineering & Technology (Deemed to be University)
Field of study
  • Computer Science & Engineering

Publications

Publications (156)
Article
Cyber physical systems (CPSs) are multi-dimensional complex systems integrated with computing, networking and physical modules, enabling to realize complex computing and communication tasks. Vehicles are composed of many electrical and electronic hardware modules. With integrating mobile vehicles, CPSs can be extended to realize more remote tasks....
Article
Deep learning has been created as a practical artificial intelligence strategy that takes various layers of information and gives the best in the effects of different classes. The use of deep learning has indicated exceptional execution in other regions, especially in image clustering, division, and recognition. The ongoing advanced learning strate...
Article
The Internet of Things (IoT) networks are obstructed by security vulnerabilities that hackers can leverage to operate intrusions in many environments, such as smart homes, smart factories, and smart healthcare systems. To overcome this obstruction, researchers have come up with different intrusion detection and prevention systems (IDPSs). Out of al...
Book
This book provides comprehensive discussion on key topics related to the usage and deployment of software defined networks (SDN) in Internet of Everything applications like, healthcare systems, data centers, edge/fog computing, vehicular networks, intelligent transportation systems, smart grids, smart cities and more. The authors provide diverse so...
Article
The Internet of Things (IoT) is emerging as a new technology for the development of various critical applications. However, these applications are still working on centralized storage architecture and have various key challenges like privacy, security, and single point of failure. Recently, the blockchain technology has emerged as a backbone for th...
Article
Full-text available
Underwater optical wireless communications (UOWCs) are promising and potential wireless carriers to envisage underwater phenomenal activities for various applications towards the futuristic 5G and beyond (5GB) wireless systems. The main challenges to deploy underwater applications are the physicochemical properties and strong turbulence channel con...
Article
Both space information networks (SINs) and software-defined networking (SDN) have gained considerable attention from industry and academia in recent years. Due to the unique characteristics of SDN and SINs, a hybrid version of them, e.g. Software-defined space information networks (SDSINs), can handle many complicated tasks. Some technological adva...
Article
Full-text available
Internet of Things (IoT)-based paradigm connects multitudinous IoT devices that operate in a wireless mode to gather information about various attributes from their surrounding. These IoT devices suffer from the limited energy resources and hence, these must be used in an optimized way to elongate network lifetime and to improve various performance...
Article
The fifth-generation (5G) wireless communication technology enables high-reliability and low-latency communications for the Intelligent Transportation System (ITS). However, the growingly sophisticated attacks against 5G-enabled ITS (5G-ITS) might cause serious damages to the valuable data generated by various ITS applications. Therefore, establish...
Article
The popularity of drones has increased their deployment in a wide range of applications like commercial delivery, industrial systems, monitoring, surveillance, and surveys. The facility of fast deployment and cost effectiveness make drones a potential choice for an aerial base station to serve user equipments (UEs) in a defined area. Drones are equ...
Article
The recent burgeoning of Internet of Things (IoT) technologies in the maritime industry is successfully digitalizing Maritime Transportation Systems (MTS). In IoT-enabled MTS, the smart maritime objects, infrastructure associated with ship or port communicate wirelessly using an open channel Internet. The intercommunication and incorporation of het...
Article
Artificial Intelligence (AI) based models are increasingly deployed in the Internet of Things (IoT), paving the evolution of the IoT into the AI of things (AIoT). Currently, the predominant approach for AI model training is cloud-centric and involves the sharing of data with external parties. To preserve privacy while enabling collaborative model t...
Article
With the exponential growth in the number of connected devices, in recent years there has been a paradigm shift toward mobile edge computing. As a promising edge technology, it pushes mobile computing, network control, and storage to the network edges so as to provide better support to computation-intensive Internet of Things (IoT) applications. Al...
Article
The ability to detect which wireless devices are belonging to the same person from Wi-Fi access point (AP) enables many potential Internet of Things (IoT) applications, including continuous authentication and user-oriented devices isolation. The existing cryptographic-based solutions are not suitable for IoT devices with limited power and computing...
Article
Internet of Drones (IoD)-enabled aerial computing can effectively reduce communication delay and energy consumption as compared to conventional computing environments. It seems very useful for its deployment in disaster areas, emergency relief and battlefield communications. However, different types of attacks, such as replay, man-in-the-middle, imp...
Article
In the Internet of Things (IoT), a huge amount of valuable data is generated by various IoT applications. As the IoT technologies become more complex, the attack methods are more diversified and can cause serious damages. Thus, establishing a secure IoT network based on user trust evaluation to defend against security threats and ensure the reliabi...
Article
The exponential increase in the number of connected devices in the network led to a paradigm shift from the traditional host-centric IP-based network architecture to a content-based paradigm, which eliminates the address-content bindings in traditional IP-based architectures. In content-centric networking (CCN) architecture, contents are accessed b...
Conference Paper
The automatic extraction of hottest shipping routes is naturally beneficial for ship monitoring, maritime surveillance, and traffic safety management in vessel traffic service (VTS) systems. The extraction results are highly dependent on the historical positioning data collected from the widely-used automatic identification system (AIS). It plays a...
Article
Cloud envisioned Cyber-Physical Systems (CCPS) is a practical technology that relies on the interaction among cyber elements like mobile users to transfer data in cloud computing. In CCPS, cloud storage applies data deduplication techniques aiming to save data storage and bandwidth for real-time services. In this infrastructure, data deduplication...
Article
Full-text available
Big Data (BD) platforms have a long tradition of leveraging trends and technologies from the broader computer network and communication community. For several years, dedicated servers of homogeneous clusters were employed as the dominant paradigm in BD networks. In recent years, the BD landscape has changed, porting different deployment architectur...
Article
Vehicle taillight detection is essential to analyze and predict driver intention in collision avoidance systems. In this article, we propose an end-to-end framework that locates the rear brake and turn signals from video stream in real-time. The system adopts the fast YOLOv3-tiny as the backbone model and three improvements have been made to increa...
Article
Full-text available
Devices with full-duplex (FD) radios are able to transmit and receive at the same time without requiring orthogonal resources, thereby creating strong self-interference (SI) that results from their own transmissions. Spatial modulation (SM), on the other hand, is a multi-antenna scheme that activates only one transmit antenna to send a data symbol,...
Article
In the 5G era, heterogeneous networks (Het-Nets) are designed for achieving data rates and customized service demands. To realize this, virtualization technologies are widely accepted as enablers for implementing 5G HetNets, aimed at managing and scheduling virtualized physical resources in a flexible manner. However, the major focus of the existin...
Article
Full-text available
Heterogeneous networks (HetNets) are becoming a promising solution for future wireless systems to satisfy the high data rate requirements. This paper introduces a stochastic geometry framework for the analysis of the downlink coverage probability in a multi-tier HetNet consisting of a macro-base station (MBS) operating at sub-6 GHz, millimeter wave...
Article
Insufficient parking space and traffic congestion are important usual suspects in our urban life. Organisation and managing available parking spaces have raised a lot of awareness. Traditional centralized parking approaches are with an insidious single point of failure and unsuitable for large organization because the manager is overburdened with a...
Article
Energy consumption minimization of cloud data centers (DCs) has attracted much attention from the research community in the recent years; particularly due to the increasing dependence of emerging Cyber-Physical Systems on them. An effective way to improve the energy efficiency of DCs is by using efficient job scheduling strategies. However, the mos...
Article
Industrial Internet of Things (IIoT) is an emerging technology that can promote the development of industrial intelligence, improve production efficiency, and reduce manufacturing costs. However, anomalies of IIoT devices might expose sensitive data about users of high authenticity and validity, resulting in security and privacy threats to the IIoT...
Article
Full-text available
Future generation communication systems, such as 5G and 6G wireless systems, exploit the combined satellite-terrestrial communication infrastructures to extend network coverage and data throughput for data-driven applications. These groundbreaking techniques have promoted the rapid development of Internet of Things (IoT) in maritime industries. In...
Article
Named entity recognition (NER) is one of the most challenging natural language processing (NLP) tasks, as its performance is related to constantly evolving languages and dependency on expert (human) annotation. The diverse and dynamic content on the web significantly raises the need for a more generalized approach—one that is capable of correctly c...
Preprint
Full-text available
In this paper, we propose a novel lightweight relation extraction approach of structural block driven - convolutional neural learning. Specifically, we detect the essential sequential tokens associated with entities through dependency analysis, named as a structural block, and only encode the block on a block-wise and an inter-block-wise representa...
Article
Full-text available
COVID-19 is an extremely dangerous disease because of its highly infectious nature. In order to provide a quick and immediate identification of infection, a proper and immediate clinical support is needed. Researchers have proposed various Machine Learning and smart IoT based schemes for categorizing the COVID-19 patients. Artificial Neural Network...
Article
Full-text available
In any cognitive radio sensor networks (CRSNs), the secondary users (SUs) and primary users (PUs) share the opportunity to use the authorized frequency band. Here, the SU nodes can only transmit in the temporarily idle spectrum when it is not in use by any PU nodes. The proper estimation and detection of primary nodes are important for the energy-e...
Article
The pervasive growth in the variety of consumer electronics devices (CEDs), as well as the Internet traffic, has evolved various security risks towards their usage. This study presents the concept of communications without a centralized server to facilitate the fastest communication between end devices, e.g. user handheld devices, and edge devices....
Article
Nowadays the deployment of drones/UAVs is not just limited to military and defense establishments; they are also widely deployed in geo-dispersed applications (environmental monitoring, rescue operation monitoring, road and traffic surveillance, natural disaster monitoring, soil and crop analysis, and consumer product delivery). Drones have become...
Article
Energy Internet (also referred to as Smart Grid 2.0) is another promising application of the Industrial Internet of Things (IIoT), for example, in the way energy is being produced, traded, distributed, and consumed. This is partly due to the lowering of barriers (e.g., costs and Internet connectivity) and advances in the underlying technologies, su...
Article
Full-text available
The past few years have witnessed the compelling applications of the Internet of Things (IoT) in our daily life. Meanwhile, with the explosion of IoT devices and various applications, the expectations for the performance, reliability, and security of networks are greater than ever. The current end-host-based or centralized control framework incurs...
Article
Full-text available
The advances in the Internet of Things (IoT) provide several chances to develop a variety of innovations supporting smart home users in several industries including healthcare, energy management, etc. Ubiquitous support by intelligent appliances at modern homes, which constantly work to gather information can help us to solve everyday issues. In th...
Article
Today, with the worldwide offer and rapid increment in multimedia applications on the web, the demands of users to get them accessed are also increasing prominently. The users in vehicular environment too expect efficient multimedia streaming while travelling on the road. However, the high mobility of vehicles as well as the limited transmission ra...
Article
Industrial Internet of Things (IIoT) is ushering inhuge development opportunities in the era of Industry 4.0. However, there are significant data security and privacy challenges during automatic and real-time data collection, monitoring for industrial applications in IIoT. Data security and privacy in IIoT applications are closely related to the re...
Article
Surveillance drones, called as unmanned aerial vehicles (UAV), are aircrafts that are utilized to collect video recordings, still images, or live video of the targets, such as vehicles, people or specific areas. Particularly in battlefield surveillance, there is high possibility of eavesdropping, inserting, modifying or deleting the messages during...
Article
Full-text available
Online social networking is expanding gradually in our professional as well as personal life in a variety of natures, beliefs, attitudes, and personalities. During communicating through the networks, the trust plays a very significant role while undertaking the communication process. This paper proposes a secure trusted hypothetical mathematical mo...
Article
Full-text available
The sixth-generation (6G) wireless communication network is expected to integrate the terrestrial, aerial, and maritime communications into a robust network which would be more reliable, fast, and can support a massive number of devices with ultra-low latency requirements. The researchers around the globe are proposing cutting edge technologies suc...
Preprint
Full-text available
As the amount of data collected for crowdsensing applications increases rapidly due to improved sensing capabilities and the increasing number of Internet of Things (IoT) devices, the cloud server is no longer able to handle the large-scale datasets individually. Given the improved computational capabilities of the edge devices, coded distributed c...
Article
The dynamic and highly open nature of cognitive radio (CR) makes cognitive communication extremely vulnerable to various malicious activities resulting from several security threats. Although extensive efforts have been devoted to the research and development of spectrum sharing systems, security issues are not well addressed for the cognitive radi...
Article
Unmanned Aerial Vehicle (UAV) has become a significant part of 5G or beyond 5G (B5G) paradigm, and is used in various scenarios, including cargo delivery, agricultural application, event surveillance, etc. Although plenty of studies have been proposed on UAV-based data aggregation, how to ensure security and energy-efficiency of the data aggregatio...
Article
Full-text available
Conventional models in the intelligent transportation system (ITS) are confronted by large computational overheads and how they react during real-time scenarios. To appropriately manage the communication process in real-time, a trust-based mechanism can provide an efficient approach to acclimatize its deeds based on indecision sensory information....
Article
Full-text available
Sixth generation (6G) network is a revolutionary technology to satisfy the ever-growing demands from the sustainable development of emerging industrial applications and services. Due to its high flexibility, convenient and rapid deployment, self-organization capability, and outstanding expansibility, Network-in-Box (NIB) represents a promising appr...
Article
Currently, the data collected by the Internet of Healthcare Things, i.e., healthcare oriented IoT, still rely on cloud-based centralized data aggregation and processing. To reduce the need for transmission of data to the cloud, the edge computing architecture may be adopted to facilitate machine learning at the edge of the network through leveragin...
Article
With the worldwide large-scale outbreak of COVID-19, Internet of Medical Things (IoMT), as a new type of Internet of Things (IoT) based intelligent medical system, is being used for COVID-19 prevention and detection. However, since the widespread use of IoMT will generate a large amount of sensitive information related to patients, it is becoming m...
Article
Full-text available
Mobile edge crowdsensing is capable of providing a large amount of data via pervasive mobile teminals for Industrial Internet of Things (IIoT). However, the generated data often contains users’ sensitive information, which suggests the significance of privacy-preserving in data aggregation and analysis for IIoT. Privacy-preserving in mobile edge cr...
Preprint
Full-text available
The sixth-generation (6G) wireless communication network is expected to integrate the terrestrial, aerial, and maritime communications into a robust network which would be more reliable, fast, and can support a massive number of devices with ultra-low latency requirements. The researchers around the globe are proposing cutting edge technologies suc...
Article
Owing to its benefits such as flexibility, scalability, and interoperability, Software-Defined Networking (SDN) has been incorporated into Internet of Vehicles (IoV) to cope with the increasing demands of vehicular applications. The integration of SDN and IoV, namely SDN-IoV, can enrich many new applications for intelligent transportation such as t...
Article
With the advancements in real-time applications, age of information (AoI) emerges to describe the freshness of data. Here, we investigate AoI performance metric in simultaneous wireless information and power transfer (SWIPT) enabled cooperative wireless communication system. We use two SWIPT protocols: time-switching (TS) and power-splitting (PS) a...
Article
With the rapid development of the Internet of Things (IoT), more and more data are generated by smart devices to support various edge services. Since these data may contain sensitive information, security and privacy of data aggregation has become a key challenge in IoT. To tackle this problem, a Blockchain based Secure Data Aggregation strategy, n...
Article
Full-text available
Decision-making is of critical significance in Internet-of-Vehicles (IoV), where vehicles need to quickly make decisions in real-time when sharing or transferring the information. In addition, it is necessary to identify the significant factors of an entity while measuring its legitimacy or to record the real-time data generated by it. Traditional...
Article
Full-text available
There is a need for improvement of tools to deal with large volumes of multimedia data effectively. In particular, real-time data processing is one of the major problems for multimedia data computing in remote sensing systems. Such big data systems have to offer effective management and computational efficiency for applications in real-time. In thi...
Article
Full-text available
Metropolitan transportation is a dynamic and non-linear complex system. In such a system, there are possibilities of altering, monitoring, forging, and accessing private, public, and resource information of depot staff and communicating agents by unauthorized agencies the metropolitan area. Existing solutions for the management of security and priv...
Article
Reconfigurable Wireless Sensor Network (RWSN) schedules a set of devices with reconfigurable wireless interface to accomplish different data collection plans in a cost-effective way. AI technologies are applied to optimize decision making for high-level network reconfiguration. Besides, AI based data mining tools are exploited by third parities to...