A comprehensive survey on IRS-assisted NOMA-based 6G wireless network: Design perspectives, challenges and future directions

D Sarkar, SS Yadav, V Pal, N Kumar… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The propagation environment was uncontrollable in first-generation to fifth-generation (5G)
wireless technologies. This behavior of the wireless propagation environment is one of the …

A systematic analysis of enhancing cyber security using deep learning for cyber physical systems

S Gaba, I Budhiraja, V Kumar, S Martha, J Khurmi… - IEEE …, 2024 - ieeexplore.ieee.org
In this current era, cyber-physical systems (CPSs) have gained concentrated consideration
in various fields because of their emergent applications. Though the robust dependence on …

[HTML][HTML] Federated reinforcement learning based task offloading approach for MEC-assisted WBAN-enabled IoMT

P Consul, I Budhiraja, R Arora, S Garg, BJ Choi… - Alexandria Engineering …, 2024 - Elsevier
The exponential proliferation of wearable medical apparatus and healthcare information
within the framework of the Internet of Medical Things (IoMT) introduces supplementary …

Computation Rate Maximization for SCMA-Aided Edge Computing in IoT Networks: A Multi-Agent Reinforcement Learning Approach

P Liu, K An, J Lei, Y Sun, W Liu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Integrating sparse code multiple access (SCMA) and mobile edge computing (MEC) into the
Internet of Things (IoT) networks can enable efficient connectivity and timely computation for …

Sum-Rate Maximization for D2D-Enabled UAV Networks With Seamless Coverage Constraint

X Liu, B Yang, J Liu, L **an, X Jiang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
This article investigates sum-rate maximization while achieving seamless coverage with the
minimum number of unmanned aerial vehicles (UAVs) in a device-to-device (D2D)-enabled …

A hybrid secure resource allocation and trajectory optimization approach for mobile edge computing using federated learning based on WEB 3.0

P Consul, I Budhiraja, D Garg - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The use of unmanned aerial vehicles (UAVs) in Internet-of-Things (IoT) has grown, but
security for UAV communications still a challenge due to the distributed nature of line-of …

Deep reinforcement learning based rate enhancement scheme for RIS assisted mobile users underlaying UAV

N Joshi, I Budhiraja, D Garg, S Garg, BJ Choi… - Alexandria Engineering …, 2024 - Elsevier
The fifth generation (5G) network enabled communication between devices has emerged as
a state-of-the-art technology. In the era of proliferating smart devices and intelligent wireless …

Joint traffic admission, resource allocation and mode selection protocol for NOMA-based D2D users underlaying cellular network for 5G and beyond networks

I Budhiraja, N Kumar, S Tyagi, A Bansal… - … on Network Science …, 2024 - ieeexplore.ieee.org
Device-to-device (D2D) communications offload the data traffic from the cellular network and
improve spectral and energy efficiency. Non-orthogonal multiple access (NOMA) is an …

[HTML][HTML] Multiagent deep reinforcement learning based Energy efficient resource management scheme for RIS assisted D2D users in 6G-aided smart cities …

V Vishnoi, I Budhiraja, D Garg, S Garg, BJ Choi… - Alexandria Engineering …, 2025 - Elsevier
Device-to-device communication (D2D-C) is one of the promising technologies for the sixth-
generation (6G) environment. This is because it enhances end-user throughput, energy …

Incremental RBF-based cross-tier interference mitigation for resource-constrained dense IoT networks in 5G communication system

O Alruwaili, J Logeshwaran, Y Natarajan, MA Alrowaily… - Heliyon, 2024 - cell.com
The deployment of resource-constrained and densely distributed Internet of Things (IoT)
devices poses significant challenges for 5G communication systems due to the increased …