Sahil Garg

Sahil Garg
École de Technologie Supérieure · Resilient Machine learning Institute (ReMI)

PhD

About

212
Publications
45,475
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
7,423
Citations
Additional affiliations
August 2014 - January 2015
Chandigarh Group of Colleges, Landran
Position
  • Professor (Assistant)
Education
January 2015 - September 2018
Thapar Institute of Engineering & Technology (Deemed to be University)
Field of study
  • Computer Science & Engineering

Publications

Publications (212)
Article
Comparing with previous five generation networks consisting of dedicated appliance, 6G network appliances are designed to be softwarized and isolated into software (resource and function) blocks and general-purpose hardware. Tailored services, having customized resources and function demands, can be executed by chained software blocks and co-exist...
Article
In recent years, there has been a significant interest in ubiquitous coverage, high data rate connectivity, and mobile edge computing (MEC) as crucial services within the future sixth-generation (6G) wireless networks. These services are regarded as essential components, exemplifying the advancements anticipated in 6G technology. Nevertheless, the...
Article
Managing for local data among the increasingly popular consumer smart electronics in a secure manner while increasing the user experience is still a hard work. Federated learning (FL), can develop intelligent electronics-related applications while protecting the privacy of local data. However, considering the traditional cloud-based FL training pro...
Article
AI-enabled logistics unmanned aerial vehicles (UAVs) are progressively revealing their unique advantages for future smart cities. Nevertheless, the existing research on logistics UAV path planning lacks to simultaneously consider the UAV energy consumption constraints, the customer time windows, the impacts of wind speed and direction. This omissio...
Article
Low rank tensor ring based data recovery algorithms have been widely used in vehicle road cooperation intelligent transportation system to recover missing data entries in the sensing data pre-processing stage. However, the existing tensor ring decomposition based methods often resolve the low rank optimization with predefined ranks, which often lea...
Article
Network softwarization (NetSoft), recognized as crucial attribute of 6G networks, promises to provide enhanced and advanced services, including future quantum-enabled consumer applications. Softwarized resource allocation is the core issue in NetSoft concept. Digital twins (DT) guarantees to generate the corresponding digital world that reflects an...
Article
6G (sixth-generation wireless), the successor to 5G cellular technology, operates at higher frequencies than its predecessor and supports significantly greater capacity and markedly reduced latency. Healthcare is treated as a complex system with various stakeholders, like doctors, patients, hospitals, pharmaceutical companies as well as healthcare...
Conference Paper
The performance of integrated satellite-aerial-terrestrial relay networks (ISATRNs) faces two main challenges, severe signal strength degradation over long transmission distances and limited spectrum resources. To address these issues, we consider the introduction of high altitude platforms (HAPs) and unmanned aerial vehicles (UAVs) carrying reconf...
Article
Currently, the crowdsourcing system has serious problems such as single point of failure of the server, leakage of user privacy, unfair arbitration, etc. By storing the interactions between workers, requesters, and crowdsourcing platforms in the form of transactions on the blockchain, these problems can be effectively addressed. However, the improv...
Article
Due to the privacy breach risks and data aggregation of traditional centralized machine learning (ML) approaches, applications, data and computing power are being pushed from centralized data centers to network edge nodes. Federated Learning (FL) is an emerging privacy-preserving distributed ML paradigm suitable for edge network applications, which...
Article
The journey to the next decade of smart cellular connectivity, sixth-generation (6G) networks, has already begun, even though 6G is still in its nascent stages and far from its deployment. In telecommunications, 6G networks have gained the attention of the industry and academia. 6G is planned to succeed the 5G standard with almost 100 times greater...
Article
The integration of Terrestrial and Non-Terrestrial Networks (TNTNs) with the sixth-generation (6G) wireless ecosystem will revolutionize the futuristic communication networks by enabling comprehensive interconnection and quality of service. However, such an integrated network will raise serious security and privacy issues due to the insecure commun...
Article
Full-text available
Beyond 5G (B5G) networks rapidly growing to connect billions of Internet of Things (IoT) devices and the dense deployment of IoT devices leads the large-scale network conflict and obstacles the resource-efficient, which brings a great challenge for network resource management (NRM). To tackle this problem, hypergraph based resource-efficient collab...
Article
Unmanned aerial vehicle (UAV) has been utilized as an efficient data collector for Internet of Things (IoT) networks in sustainable industry 5.0. Whereas, how to sustain a stable power for the energy-constrained IoT devices (IoTDs) and to enhance the data gathering throughput of UAV-aided IoT networks via the wireless power transfer (WPT) or non-or...
Article
The development of industry is inseparable from the development of Industrial Internet of Things (IIoT), however, the limitations of previous wireless technologies can greatly affect the performance of all aspects of IIoT. With the continuous development of artificial intelligence (AI), deep learning enabled intelligent communication has been widel...
Article
Network slicing (NS) is a highly promising paradigm in 5G and forthcoming 6G communication networks. NS allows for the customization of multiple logically independent network slices to provide tailored service for vertical applications with diverse quality of service (QoS) requirements. However, current research on NS primarily relies on the tradit...
Article
In recent years, driver distraction behaviors, such as eating, drinking, and making phone calls, have become more and more frequent, especially during continuous driving. This results in a significant increase in traffic accidents caused by those behaviors. Therefore, it is crucial to recommend driver breaks when frequent instances of driver distra...
Conference Paper
In Internet of Things (IoT)-based e-Health Systems (IoTEHS), medical devices form a large network that continuously sense and share the healthcare data with the nearby edge devices or cloud servers. The health data is subsequently made available to various IoTEHS stakeholders (such as doctors, nurses and patients) to track and monitor patients unde...
Article
Driven by the ever-increasing requirements of autonomous vehicles, such as traffic monitoring and driving assistant, deep learning-based object detection (DL-OD) has been increasingly attractive in intelligent transportation systems. However, it is difficult for the existing DL-OD schemes to realize the responsible, cost-saving, and energy-efficien...
Article
New industrial control systems (ICSs) that have been modernized with the industrial internet of things (IIoT) are exposed to cyber-attacks that exploit IIoT vulnerabilities. Numerous intrusion detection systems (IDSs) have therefore been proposed to secure ICSs, many of which are based on machine learning, specifically deep neural networks (DNNs)....
Article
Cooperative intelligent transport system (C-ITS) is one emerging application scenario in 6G. Within the content of 6G, softwarization is the dominant attribute of networks 6G networks are required to have the intelligence and autonomy attributes, too. With softwarization and autonomy, not only the network capable of flexibly managing softwarized re...
Article
Using unmanned aerial vehicles (UAVs) for data collecting in remote places is advantageous because of UAVs' low cost and extended range mobility. To facilitate the operation of time-sensitive applications, the acquired data is processed as geographically close to the end user as is practically possible. The suggested paradigm for energy-efficient U...
Article
The idea of the quantum internet is to provide an internet technology that can enable quantum communication between any two points on Earth. Researchers are proposing a theoretically large number of quantum networks, but practically they are still far from reality Yet the aspect of security can not be ignored as it has always remained a crucial asp...
Article
The heterogeneity and growing complexity from the evolution of 5G and beyond networks and the development of future IoT networks necessitate the automatic management of these networks. The exacerbated growth of IoT devices and foreseen network complexity deem manual management impractical. Zero touch networks (ZTNs) seems the practical solution to...
Article
5G communication technologies and networks help researchers and engineers look into intelligent transportation systems (ITS) with a new eye, including vehicular ad hoc networks (VANET) application. Network function virtualization (NFV) and network slicing (NS) are accepted as two most promising technologies towards the agile and elastic network arc...
Article
Full-text available
Underwater optical wireless communications (UOWCs) are promising and potential wireless carriers to envisage underwater phenomenal activities for various applications towards the futuristic 5G and beyond (5GB) wireless systems. The main challenges to deploy underwater applications are the physicochemical properties and strong turbulence channel con...
Article
The increasing power consumption and the energy crisis owing to several billion of connected devices raises concern. The battery powered devices or mobile terminals consume a lot of power and led to huge energy overhead. Thus, the need is to design energy sustainable networks which aims for optimum utilization of power resources. 6G enabled network...
Article
Cyber physical systems (CPSs) are multi-dimensional complex systems integrated with computing, networking and physical modules, enabling to realize complex computing and communication tasks. Vehicles are composed of many electrical and electronic hardware modules. With integrating mobile vehicles, CPSs can be extended to realize more remote tasks....
Article
The intelligent warehouse logistics system (IWLS) is an essential component in the emerging industry 5.0. To well assist the IWLS, advanced network architecture and control policies with the adaptive capability to the variation of traffic should be specially designed. In this paper, we consider an air-and-ground cooperative wireless network that en...
Article
Deep learning has been created as a practical artificial intelligence strategy that takes various layers of information and gives the best in the effects of different classes. The use of deep learning has indicated exceptional execution in other regions, especially in image clustering, division, and recognition. The ongoing advanced learning strate...
Article
The Internet of Things (IoT) networks are obstructed by security vulnerabilities that hackers can leverage to operate intrusions in many environments, such as smart homes, smart factories, and smart healthcare systems. To overcome this obstruction, researchers have come up with different intrusion detection and prevention systems (IDPSs). Out of al...
Book
This book provides comprehensive discussion on key topics related to the usage and deployment of software defined networks (SDN) in Internet of Everything applications like, healthcare systems, data centers, edge/fog computing, vehicular networks, intelligent transportation systems, smart grids, smart cities and more. The authors provide diverse so...
Article
The Internet of Things (IoT) is emerging as a new technology for the development of various critical applications. However, these applications are still working on centralized storage architecture and have various key challenges like privacy, security, and single point of failure. Recently, the blockchain technology has emerged as a backbone for th...
Article
Many IoT-based applications have inherited the artificial intelligence of Things (AIoT) techniques to explore new services and benefits of smart recording and monitoring generated information. However, hundreds of hacking incidents caused by highly sophisticated attackers have generated serious risks, where they compromised various IoT sensors for...
Article
The optimal transmit power that maximizes energy efficiency (EE) in Longe Range (LoRa) networks is investigated by using the deep learning (DL) approach. Particularly, the proposed artificial neural network (ANN) is trained two times; in the first phase, the ANN is trained by the model-based data which are generated from the simplified system model...
Article
Intrusion detection systems (IDS) are amongst the most important automated defense mechanisms in modern industry. It is guarding against many attack vectors, especially in healthcare, where sensitive information (patient’s medical history, prescriptions, electronic health records, medical bills/debts, and many other sensitive data points) is open t...
Article
Full-text available
The rapid expansion of the Industrial Internet of Things (IIoT) necessitates the digitization of industrial processes in order to increase network efficiency. The integration of Digital Twin (DT) with IIoT digitizes physical objects into virtual representations to improve data analytics performance. Nevertheless, DT empowered IIoT generates a massi...
Article
Full-text available
The recent development of Internet of Things (IoT) and Unmanned Aerial Vehicles has revolutionized traditional agriculture with intelligence and automation. In a typical Intelligent Agriculture (IA) ecosystem, massive and real-time data are generated, analyzed, and sent to the Cloud Server (CS) for the purpose of addressing complex agricultural iss...
Article
The rapid expansion of wearable medical devices and health data of Internet of Medical Things (IoMT) poses new challenges to the high Quality of Service (QoS) of intelligent health care in the foreseeable 6G era. Healthcare applications and services require ultra reliable, ultra low delay and energy consumption data communication and computing. Wir...
Article
Both space information networks (SINs) and software-defined networking (SDN) have gained considerable attention from industry and academia in recent years. Due to the unique characteristics of SDN and SINs, a hybrid version of them, e.g. Software-defined space information networks (SDSINs), can handle many complicated tasks. Some technological adva...
Article
Full-text available
Internet of Things (IoT)-based paradigm connects multitudinous IoT devices that operate in a wireless mode to gather information about various attributes from their surrounding. These IoT devices suffer from the limited energy resources and hence, these must be used in an optimized way to elongate network lifetime and to improve various performance...
Article
The fifth-generation (5G) wireless communication technology enables high-reliability and low-latency communications for the Intelligent Transportation System (ITS). However, the growingly sophisticated attacks against 5G-enabled ITS (5G-ITS) might cause serious damages to the valuable data generated by various ITS applications. Therefore, establish...
Article
The popularity of drones has increased their deployment in a wide range of applications like commercial delivery, industrial systems, monitoring, surveillance, and surveys. The facility of fast deployment and cost effectiveness make drones a potential choice for an aerial base station to serve user equipments (UEs) in a defined area. Drones are equ...
Article
The recent burgeoning of Internet of Things (IoT) technologies in the maritime industry is successfully digitalizing Maritime Transportation Systems (MTS). In IoT-enabled MTS, the smart maritime objects, infrastructure associated with ship or port communicate wirelessly using an open channel Internet. The intercommunication and incorporation of het...
Article
Artificial Intelligence (AI) based models are increasingly deployed in the Internet of Things (IoT), paving the evolution of the IoT into the AI of things (AIoT). Currently, the predominant approach for AI model training is cloud-centric and involves the sharing of data with external parties. To preserve privacy while enabling collaborative model t...
Article
With the exponential growth in the number of connected devices, in recent years there has been a paradigm shift toward mobile edge computing. As a promising edge technology, it pushes mobile computing, network control, and storage to the network edges so as to provide better support to computation-intensive Internet of Things (IoT) applications. Al...
Article
The ability to detect which wireless devices are belonging to the same person from Wi-Fi access point (AP) enables many potential Internet of Things (IoT) applications, including continuous authentication and user-oriented devices isolation. The existing cryptographic-based solutions are not suitable for IoT devices with limited power and computing...
Article
Internet of Drones (IoD)-enabled aerial computing can effectively reduce communication delay and energy consumption as compared to conventional computing environments. It seems very useful for its deployment in disaster areas, emergency relief and battlefield communications. However, different types of attacks, such as replay, man-in-the-middle, imp...
Article
In the Internet of Things (IoT), a huge amount of valuable data is generated by various IoT applications. As the IoT technologies become more complex, the attack methods are more diversified and can cause serious damages. Thus, establishing a secure IoT network based on user trust evaluation to defend against security threats and ensure the reliabi...
Article
The exponential increase in the number of connected devices in the network led to a paradigm shift from the traditional host-centric IP-based network architecture to a content-based paradigm, which eliminates the address-content bindings in traditional IP-based architectures. In content-centric networking (CCN) architecture, contents are accessed b...
Conference Paper
The automatic extraction of hottest shipping routes is naturally beneficial for ship monitoring, maritime surveillance, and traffic safety management in vessel traffic service (VTS) systems. The extraction results are highly dependent on the historical positioning data collected from the widely-used automatic identification system (AIS). It plays a...
Article
Cloud envisioned Cyber-Physical Systems (CCPS) is a practical technology that relies on the interaction among cyber elements like mobile users to transfer data in cloud computing. In CCPS, cloud storage applies data deduplication techniques aiming to save data storage and bandwidth for real-time services. In this infrastructure, data deduplication...
Article
Full-text available
Big Data (BD) platforms have a long tradition of leveraging trends and technologies from the broader computer network and communication community. For several years, dedicated servers of homogeneous clusters were employed as the dominant paradigm in BD networks. In recent years, the BD landscape has changed, porting different deployment architectur...
Article
Vehicle taillight detection is essential to analyze and predict driver intention in collision avoidance systems. In this article, we propose an end-to-end framework that locates the rear brake and turn signals from video stream in real-time. The system adopts the fast YOLOv3-tiny as the backbone model and three improvements have been made to increa...
Article
Full-text available
Devices with full-duplex (FD) radios are able to transmit and receive at the same time without requiring orthogonal resources, thereby creating strong self-interference (SI) that results from their own transmissions. Spatial modulation (SM), on the other hand, is a multi-antenna scheme that activates only one transmit antenna to send a data symbol,...
Article
In the 5G era, heterogeneous networks (Het-Nets) are designed for achieving data rates and customized service demands. To realize this, virtualization technologies are widely accepted as enablers for implementing 5G HetNets, aimed at managing and scheduling virtualized physical resources in a flexible manner. However, the major focus of the existin...
Article
Full-text available
Heterogeneous networks (HetNets) are becoming a promising solution for future wireless systems to satisfy the high data rate requirements. This paper introduces a stochastic geometry framework for the analysis of the downlink coverage probability in a multi-tier HetNet consisting of a macro-base station (MBS) operating at sub-6 GHz, millimeter wave...
Article
Insufficient parking space and traffic congestion are important usual suspects in our urban life. Organisation and managing available parking spaces have raised a lot of awareness. Traditional centralized parking approaches are with an insidious single point of failure and unsuitable for large organization because the manager is overburdened with a...
Article
Energy consumption minimization of cloud data centers (DCs) has attracted much attention from the research community in the recent years; particularly due to the increasing dependence of emerging Cyber-Physical Systems on them. An effective way to improve the energy efficiency of DCs is by using efficient job scheduling strategies. However, the mos...
Article
Industrial Internet of Things (IIoT) is an emerging technology that can promote the development of industrial intelligence, improve production efficiency, and reduce manufacturing costs. However, anomalies of IIoT devices might expose sensitive data about users of high authenticity and validity, resulting in security and privacy threats to the IIoT...
Article
Full-text available
Future generation communication systems, such as 5G and 6G wireless systems, exploit the combined satellite-terrestrial communication infrastructures to extend network coverage and data throughput for data-driven applications. These groundbreaking techniques have promoted the rapid development of Internet of Things (IoT) in maritime industries. In...
Article
Named entity recognition (NER) is one of the most challenging natural language processing (NLP) tasks, as its performance is related to constantly evolving languages and dependency on expert (human) annotation. The diverse and dynamic content on the web significantly raises the need for a more generalized approach—one that is capable of correctly c...
Preprint
Full-text available
In this paper, we propose a novel lightweight relation extraction approach of structural block driven - convolutional neural learning. Specifically, we detect the essential sequential tokens associated with entities through dependency analysis, named as a structural block, and only encode the block on a block-wise and an inter-block-wise representa...
Article
Full-text available
COVID-19 is an extremely dangerous disease because of its highly infectious nature. In order to provide a quick and immediate identification of infection, a proper and immediate clinical support is needed. Researchers have proposed various Machine Learning and smart IoT based schemes for categorizing the COVID-19 patients. Artificial Neural Network...
Article
Full-text available
In any cognitive radio sensor networks (CRSNs), the secondary users (SUs) and primary users (PUs) share the opportunity to use the authorized frequency band. Here, the SU nodes can only transmit in the temporarily idle spectrum when it is not in use by any PU nodes. The proper estimation and detection of primary nodes are important for the energy-e...
Article
The pervasive growth in the variety of consumer electronics devices (CEDs), as well as the Internet traffic, has evolved various security risks towards their usage. This study presents the concept of communications without a centralized server to facilitate the fastest communication between end devices, e.g. user handheld devices, and edge devices....
Article
Nowadays the deployment of drones/UAVs is not just limited to military and defense establishments; they are also widely deployed in geo-dispersed applications (environmental monitoring, rescue operation monitoring, road and traffic surveillance, natural disaster monitoring, soil and crop analysis, and consumer product delivery). Drones have become...
Article
Energy Internet (also referred to as Smart Grid 2.0) is another promising application of the Industrial Internet of Things (IIoT), for example, in the way energy is being produced, traded, distributed, and consumed. This is partly due to the lowering of barriers (e.g., costs and Internet connectivity) and advances in the underlying technologies, su...

Network

Cited By