A systematic analysis of enhancing cyber security using deep learning for cyber physical systems

S Gaba, I Budhiraja, V Kumar, S Martha, J Khurmi… - IEEE …, 2024 - ieeexplore.ieee.org
In this current era, cyber-physical systems (CPSs) have gained concentrated consideration
in various fields because of their emergent applications. Though the robust dependence on …

A comprehensive survey on IRS-assisted NOMA-based 6G wireless network: Design perspectives, challenges and future directions

D Sarkar, SS Yadav, V Pal, N Kumar… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The propagation environment was uncontrollable in first-generation to fifth-generation (5G)
wireless technologies. This behavior of the wireless propagation environment is one of the …

[HTML][HTML] Federated reinforcement learning based task offloading approach for MEC-assisted WBAN-enabled IoMT

P Consul, I Budhiraja, R Arora, S Garg, BJ Choi… - Alexandria Engineering …, 2024 - Elsevier
The exponential proliferation of wearable medical apparatus and healthcare information
within the framework of the Internet of Medical Things (IoMT) introduces supplementary …

A hybrid secure resource allocation and trajectory optimization approach for mobile edge computing using federated learning based on WEB 3.0

P Consul, I Budhiraja, D Garg - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The use of unmanned aerial vehicles (UAVs) in Internet-of-Things (IoT) has grown, but
security for UAV communications still a challenge due to the distributed nature of line-of …

Computation rate maximization for SCMA-aided edge computing in IoT networks: A multi-agent reinforcement learning approach

P Liu, K An, J Lei, Y Sun, W Liu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Integrating sparse code multiple access (SCMA) and mobile edge computing (MEC) into the
Internet of Things (IoT) networks can enable efficient connectivity and timely computation for …

Energy maximization for wireless powered communication enabled IoT devices with NOMA underlaying solar powered UAV using federated reinforcement learning …

A Jabbari, H Khan, S Duraibi, I Budhiraja… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) depends primarily on low-cost wireless sensors with limited
energy capacity to allow pervasive monitoring and intelligent control. Nevertheless …

Deep reinforcement learning based rate enhancement scheme for RIS assisted mobile users underlaying UAV

N Joshi, I Budhiraja, D Garg, S Garg, BJ Choi… - Alexandria Engineering …, 2024 - Elsevier
The fifth generation (5G) network enabled communication between devices has emerged as
a state-of-the-art technology. In the era of proliferating smart devices and intelligent wireless …

Incremental RBF-based cross-tier interference mitigation for resource-constrained dense IoT networks in 5G communication system

O Alruwaili, J Logeshwaran, Y Natarajan, MA Alrowaily… - Heliyon, 2024 - cell.com
The deployment of resource-constrained and densely distributed Internet of Things (IoT)
devices poses significant challenges for 5G communication systems due to the increased …

Sum-Rate Maximization for D2D-Enabled UAV Networks With Seamless Coverage Constraint

X Liu, B Yang, J Liu, L **an, X Jiang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
This article investigates sum-rate maximization while achieving seamless coverage with the
minimum number of unmanned aerial vehicles (UAVs) in a device-to-device (D2D)-enabled …

Quantum computing integrated patterns for real-time cryptography in assorted domains

S Nagpal, S Gaba, I Budhiraja, M Sharma… - IEEE …, 2024 - ieeexplore.ieee.org
Quantum computers use quantum-mechanical phenomena for knowledge manipulation and
depend on quantum bits or qubits. A qubit can be created in several different ways, and out …