About
165
Publications
151,385
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
5,978
Citations
Citations since 2017
Introduction
Additional affiliations
January 2016 - November 2016
Publications
Publications (165)
With the recent use of IoT in the field of healthcare, a lot of patient data is being transmitted and made available online. This necessitates sufficient security measures to be put in place to prevent the possibilities of cyberattacks. In this regard, several authentication techniques have been designed in recent times to mitigate these challenges...
The unprecedented outbreak of the 2019 novel coronavirus, termed as COVID-19 by the World Health Organization (WHO), has placed numerous governments around the world in a precarious position. The impact of the COVID-19 outbreak, earlier witnessed by the citizens of China alone, has now become a matter of grave concern for virtually every country in...
Adverse weather conditions such as fog, haze, snow, mist and glare create visibility problems for applications of autonomous vehicles. To ensure safe and smooth operations in frequent bad weather scenarios, image dehazing is crucial to any vehicular motion and navigation task on road or air. Moreover, the commonly deployed mobile systems are resour...
The rapid improvement in the global connectivity standards has escalated the level of trade taking place among different parties. Advanced communication standards are allowing the trade of all types of commodities and services. Furthermore, the goods and services developed in a particular region are transcending boundaries to enter into foreign mar...
Unmanned Aerial Vehicles (UAVs) are becoming very popular nowadays due to the emergence of application areas such as the Internet of Drones (IoD). They are finding wide applicability in areas ranging from package delivery systems to automated military applications. Nevertheless, communication security between a UAV and its ground station (GS) is cr...
The Internet of Things (IoT) is increasingly being deployed in smart city applications such as vehicular networks. The presence of a large number of communicating vehicles greatly increases the number and types of possible anomalies in the network. These anomalies could range from faulty vehicular data being broadcast by the vehicles to more catast...
In recent years, IoT technology has been one of the most rapidly expanding fields, connecting over 27 billion connected devices worldwide. Increasing security concerns, such as software flaws and cyberattacks, limit the use of IoT devices. Tor, also known as “The Onion Router,” is one of the most popular, secure, and widely deployed anonymous routi...
Online Social Networks (OSNs) have grown exponentially in the last few years due to their applications in real life like marketing, recommendation systems, and social awareness campaigns. One of the most important research areas in this field is Influence Maximization (IM). IM pertains to finding methods to maximize the spread of information (or in...
The prediction of news popularity is having substantial importance for the digital advertisement community in terms of selecting and engaging users. Traditional approaches are based on empirical data collected through surveys and applied statistical measures to prove a hypothesis. However, predicting news popularity based on statistical measures ap...
Real-time video stream monitoring is gaining huge attention lately with an effort to fully automate this process. On the other hand, reporting can be a tedious task, requiring manual inspection of several hours of daily clippings. Errors are likely to occur because of the repetitive nature of the task causing mental strain on operators. There is a...
Complex vehicular applications, such as automatic driving and augmented reality are delay sensitive and require massive computational resources. Despite being more connected and smarter, vehicles still cannot appropriately meet the demands of these applications. By allowing neighboring vehicles and edge servers coupled to base stations to share the...
The popularity of Blockchain is rising on account of its far-reaching applications in diverse industries. However, in the recent past, blockchain has seen a rise of energy extensive mining pools which is leading to centralization, contradicting the basic blockchain tenet of decentralization. This letter proposes a novel consensus algorithm using Pr...
Untreated diseases in plants not only lead to monetary losses but can have adverse implications when consumed. Disease diagnosis requires early detection and analysis of the disease. Apple horticulture has been a significant agriculture industry around the world and is affected by three most prominent domains of disease in apple namely: Blotch, Sca...
At a time when the COVID-19's second wave is still picking up in countries like India, a number of reports describe the potential association with a rise in the number of cases of mucormycosis, commonly known as the black fungus. This fungal infection has been around for centuries and affects those people whose immunity has been compromised due to...
Automatic identification of plant diseases is critical for agricultural crop protection so
as to enhance the crop yield. The recent advances in deep learning and image processing gives hope for the development of efficient algorithms to address this issue. In this manuscript, we make use of these schemes for developing a solution (which we name LDL...
With the rise of the Internet of Vehicles (IoV) and the number of connected vehicles increasing on the roads, Cooperative Intelligent Transportation Systems (C-ITSs) have become an important area of research. As the number of Vehicle to Vehicle (V2V) and Vehicle to Interface (V2I) communication links increases, the amount of data received and proce...
The cyber physical systems integrate the sensing, computation, control and networking processes into physical objects and infrastructure, which are connected through the Internet to execute a common task. Cyber physical systems can be applied in various applications, like healthcare, transportation, industrial production, environment and sustainabi...
Unmanned Aerial Vehicles (UAVs) have seen a significant increase in their commercial application because of various technological breakthroughs. As UAVs are typically used in open environments for purposes such as military applications, surveillance, and delivery of commodities, they rely primarily on the visual signals recorded by the flying UAV....
Swarm-based Unmanned Aerial Vehicle (UAV) applications require a large number of UAVs to be deployed across a region to work cooperatively. To operate a large number of unattended UAVs in hostile environments , it is critical to secure UAV-BS (base station) communications. UAV authentication based on Physical Unclonable Functions (PUFs) has recentl...
Agricultural industry is one of the most vital industries that has a major contribution to the economy due to its share in the Gross Domestic Product (GDP) and as a source of employment. The past few decades have seen immense change in the operation of agricultural sector with the introduction of precision farming in conjunction with Inter-net of T...
Unmanned Aerial Vehicles (UAVs) are the promising 'Flying IoT' devices of the future, which can be equipped with various sensors and cognitive capabilities to perform numerous tasks related to remote sensing, search and rescue operations, object tracking, segmentation of roads and buildings, surveillance, etc. However, these AI-driven tasks require...
Machine learning (ML) is a subset of Artificial Intelligence (AI), which focuses on the implementation of some systems that can learn from the historical data, identify patterns and make logical decisions with little to no human interventions. Cyber security is the practice of protecting digital systems, such as computers, servers, mobile devices,...
Unmanned Aerial Vehicles (UAVs) have enabled a broad spectrum of applications serving social, commercial, and military purposes. However, since UAVs use wireless communication technologies, they are highly vulnerable to security threats. Establishing trust with the base station is the most fundamental security aspect in UAV networks to mitigate the...
Edge computing places cloudlets with high computational capabilities near mobile devices to reduce the latency and network congestion encountered in cloud server-based task offloading. However, large number of cloudlets needed in such an edge computing network and a tremendous increase in carbon emissions of computing networks globally envisages th...
Vehicular networks promise features such as traffic management, route scheduling, data exchange, entertainment, and much more. With any large-scale technological integration comes the challenge of providing security. Blockchain technology has been a popular choice of many studies for making the vehicular network more secure. Its characteristics mee...
Healthcare professionals, patients, and other stakeholders have been storing medical prescriptions and other relevant reports electronically. These reports contain the personal information of the patients, which is sensitive data. Therefore, there exists a need to store these records in a decentralized model (using IPFS and Ethereum Decentralized A...
For the above article
[1]
, the affiliation information is presented here.
There is an urgent need to control global warming caused by humans to achieve a sustainable future. $CO_2$ levels are rising steadily and while countries worldwide are actively moving toward the sustainability goals proposed during the Paris Agreement in 2015, we are still a long way to go from achieving a sustainable mode of global operation. The...
There is an urgent need to control global warming caused by humans to achieve a sustainable future. CO 2 levels are rising steadily and while countries worldwide are actively moving toward the sustainability goals proposed during the Paris Agreement in 2015, we are still a long way to go from achieving a sustainable mode of global operation. The in...
Due to the exponential increase in the number of users, the next-generation cellular networks are resource-constrained in power and bandwidth. Power consumption is one of the critical consideration for the next-generation wireless networks , therefore, management of available resources is essential to achieve power efficiency. With the growing ince...
Modern vehicular electronics is a complex system of multiple Electronic Control Units (ECUs) communicating to provide efficient vehicle functioning. These ECUs communicate using the well-known Controller Area Network (CAN) protocol. The increasing amount of research in the Intelligent Transportation System (ITS) domain has demonstrated that this pr...
Vehicular networks promise features such as traffic management, route scheduling, data exchange, entertainment, and much more. With any large-scale technological integration comes the challenge of providing security. Blockchain technology has been a popular choice of many studies for making the vehicular network more secure. Its characteristics mee...
While the onset of the COVID-19 pandemic has increased the popularity of home-based consultations, worries over privacy, high consultations costs, slow response times, and the burden on doctors due to the overwhelming number of COVID-19 cases have made current in-person and online models ineffective. In this study, we present an advanced, privacy-p...
Optimal resource provisioning and management of the next generation communication networks are crucial for attaining a seamless Quality of Service with reduced environmental impact. Considering the ecological assessment, urban and rural telecommunication infrastructure is moving towards deploying green cellular base stations to cater to the needs o...
Object detection in low-light aerial images is a challenging problem due to considerable variation in brightness and varying contrast. Deep learning-based approaches have recently demonstrated great promise in image enhancement. Many existing neural networks used for image quality enhancement first encode the input into low-resolution representatio...
There has been a notable increase in the research and development of Vehicular Ad-hoc Networks (VANETs) to efficiently and safely manage large amounts of traffic. Such networks are, however, also prone to various cyber threats to data integrity, privacy, authentication, and network availability, and given the potential risk to life under the event...
The future needs of the telecommunication system lie in deploying a heterogeneous ultra-dense network with varied topographical use cases. However, this increase in ultra-denseness in 5g and beyond poses several challenges in resource allocation, requiring an accurate learning-based prediction. This paper proposes a novel framework using Federated...
The COVID-19 pandemic has revealed several limitations of existing healthcare systems. Thus, there is a surge in healthcare innovation and new business models using computer-mediated virtual environments to provide an alternative healthcare system. Today, digital transformation is not limited to virtual communication alone but encompasses digitaliz...
Health insurance is crucial for each person, bearing in mind the increasing medical costs. COVID-19 has been an eye-opener as to how important it is to have health insurance. Medical emergencies can have a severe emotional and financial impact. Thus, a health insurance policy can help mitigate financial risks in unpredictable circumstances. However...
Fake news has spread across social media platforms and with the ease of access, negative consequences have come with it on individuals and society. This issue has become a focus of interest among various research communities, including artificial intelligence (AI) researchers. Existing AI-based fake news detection techniques primarily make use of a...
The growing number of Unmanned Aerial Vehicle (UAV) applications brings with it, a rising number of privacy concerns. The high availability of commercial drones is also increasing the need for strict regulations. As far away as we are from establishing such protocols to ensure that the most basic human right to privacy is not exploited, we are furt...
Researchers nowadays are particularly focusing on the interpretation of EEG signals to understand and exploit the information they provide for brain activities. Deep learning architectures performing sleep staging have recently grown to their full potential with their ability to learn and interpret highly complex mathematical contexts. This has bee...
Blockchain (BC) and Artificial Intelligence (AI) technologies have independent applications in multiple industries, including banking, finance, health care, construction, transportation, hospitality, manufacturing, and insurance, to name a few. Moreover, these two technologies can be integrated seamlessly, thanks to their complementary and mutually...
Unmanned Aerial Vehicles (UAVs) are the promising "Flying IoT" devices of the future, which can be equipped with various sensors and cognitive capabilities to perform numerous tasks related to remote sensing, search and rescue operations, object tracking, segmentation of roads and buildings, surveillance , etc. However, these AI-driven tasks requir...
Abstract Rapid developments in quantum communication are paving the way forward for more advanced technologies. Conventional channels like optical fibres have been a great resource in recent decades. However, they suffer largely from exponential transmissivity decays and are not suitable for very long‐distance communication. Satellite links along w...
In the wake of the COVID-19 pandemic, where almost the entire global healthcare ecosystem struggled to handle patients, it’s evident that the healthcare segment needs a virtual real-time digital support system. The recent advancements in technology have enabled machine-to-machine communication, enhanced mobile broadband, and real-time biometric dat...
With the ever-increasing awareness among people regarding their health, visiting a doctor has become quite common. However, with the onset of the COVID-19 pandemic, home-based consultations are gaining popularity. Nevertheless, the worries over privacy and the lack of willingness to assist patients by the medical professionals in the online consult...
Unmanned aerial vehicles (UAVs), also called drones, are extensively being adopted for a wide variety of applications such as traffic surveillance, disaster management, rescue operations, and environment monitoring. With the adoption of the Internet of Things (IoT), UAV networks are quickly transforming into the Internet of Drones (IoD) paradigm. T...
Brain Computer Interfaces (BCIs) and Extended Reality (XR) have seen significant advances as independent disciplines over the past 50 years. XR has been developed as an umbrella domain, covering Virtual Reality (VR), Augmented Reality (AR) and Mixed Reality (MR), giving rise to human-machine interactions. This intersection sees diverse applications...
Technological interventions are becoming commonplace in everyday vehicles. But utilization of biosignals that can enhance the overall driving experience is still limited. Microsleep is one such issue that needs intervention, owing to the difficulty in its detection and social acceptance of using wearable BCI devices during transit. Microsleep is a...
Various Distributed Ledger Technologies (DLTs), such as Blockchain, have evolved significantly in recent years. These technologies provide a robust and effective solution for providing confidentiality, integrity, non-repudiation, authentication and transparency. While Blockchain has many advantages, it has various limitations as well, such as compl...
This project is aimed at developing Artificial Intelligence and Blockchain Enabled Secure and Scalable Frameworks for Online Healthcare Applications. The Junior Research Fellow (JRF) would get an opportunity to be guided by the project investigators during his tenure. The candidate would work in the BITS IoT Lab (https://bitsiotlab.com/). He would...
Unmanned Aerial Vehicles, popularly known as UAVs, have been used in many applications in the recent past. UAV's have also been recently used to provide Security as a Service (SECaaS). SECaaS involves technical solutions like anti-virus and anti-spam software, firewalls, using secure operating systems, etc. UAV's are resource-constrained entities,...
This paper presents performance enhancement of Si 3 N 4-gate Ion-Sensitive Field-Effect Transistor (ISFET) based pH sensor using Machine Learning (ML) techniques [1]. A robust SPICE macromodel is developed using experimental data which incorporates intrinsic temperature and temporal characteristics of the device, which is further used in sensor rea...
We are seeing a growth in the number of connected vehicles in Vehicular Ad-hoc Networks (VANETs) to achieve the goal of Intelligent Transportation System (ITS). This is leading to a connected vehicular network scenario with vehicles continuously broadcasting data to other vehicles on the road and the roadside network infrastructure. The presence of...
The Internet of Things (IoT) connects millions of computing devices and has set a stage for future technology where industrial use cases like smart cities and smart houses will operate with minimal human intervention. IoT's cross-domain amalgamations with emergent technologies like 5G and blockchain affects human life. Hence, increase in reliance o...
There is a rapid increase in the adoption of emerging technologies like the Internet of Things (IoT), Unmanned Aerial Vehicles (UAV), Internet of Underground Things (IoUT), Data analytics in the agriculture domain to meet the increased food demand to cater to the increasing population. Agriculture 4.0 is set to revolutionize agriculture productivit...
The number of vehicles is increasing at a very high rate throughout the globe. It reached 1 billion in 2010, in 2020 it was around 1.5 billion and experts say this could reach up to 2-2.5 billion by 2050. A large part of these vehicles will be electrically driven and connected to a vehicular network. Rapid advancements in vehicular technology and c...
Edge Computing, is a technological game changer that has the ability to connect millions of sensors and provide services at the device end. The broad vision of Edge Computing integrates storage, processing, monitoring and control of operations in the Edge of the network. Though Edge Computing provides end-to-end connectivity, speeds up operation an...