NIKHIL SHARMA

@hmritm.ac.in

ASSISTANT PROFESSOR AND COMPUTER SCIENCE AND ENGINEERING DEPARTMENT
HMR ITM DELHI



                    

https://researchid.co/nikhil_sharma

EDUCATION

Ambedkar Institute of Advanced Communication Technologies and Research: Geeta Colony, Delhi, INDIA

RESEARCH INTERESTS

WIRELESS SENSOR NETWORKS, IoT, BLOCKCHAIN

40

Scopus Publications

1118

Scholar Citations

21

Scholar h-index

34

Scholar i10-index

Scopus Publications

  • Data Extraction and Visualization of Form-Like Documents
    Dipti Pawade, Darshan Satra, Vishal Salgond, Param Shendekar, Nikhil Sharma, and Avani Sakhapara

    Springer Nature Singapore

  • iTeach: A User-Friendly Learning Management System
    Nikhil Sharma, Shakti Singh, Shivansh Tyagi, Siddhant Manchanda, and Achal Kaushik

    Springer International Publishing

  • Driver Drowsiness Detection and Traffic Sign Recognition System
    Ruchi Pandey, Priyansha Bhasin, Saahil Popli, Mayank Sharma, and Nikhil Sharma

    Springer Nature Singapore

  • Role of Artificial Intelligence in Object Detection: A Review
    Aradhya Singh Bisht, Amit Kumar Jha, Abhinav Sachdeva, and Nikhil Sharma

    IEEE
    Over the last 20 years, the field of object detection has seen a remarkable progress been made. In its 20-year history, this literature review not only goes through some landmark detectors (e.g., VJ detector, HOG detector, DPM, Faster-RCNN, YOLO, SSD, and others), key technologies, speed up methods, detection applications, datasets, and metrics, but also the 28 difficulties currently faced by the community are being discussed and further enhancement and continuation of these detectors are also discussed. We had shallow trainable structures and Handcrafted features which are the fundamentals of conventional object identification systems. With the spontaneous advancement of deep learning technology, additional effective tools are now competent of learning semantic, high-level, and deeper characteristics. In this study, deep learning-based object detection system has been reviewed. We also go through a few specific tasks, such as prominent item detection, face identification, and pedestrian detection.

  • Evolution From Industry 1.0 to Industry 5.0
    Aeshita Mathur, Ameesha Dabas, and Nikhil Sharma

    IEEE
    The industrial revolution is characterized by a shift in methods from agricultural, pastoral, and handicraft economies to the one that is dominated by production industries. The Industrial Revolution brought a significant transformation from economies that were initially based on agriculture to the one that is now dominated by large-scale industries. The Industrial Revolution was first used for Britain’s economic development in 1760 by Arnold Toynbee. It broadly applies to economic transformation rather than a period of time. The primary characteristics of an industrial revolution are technological, cultural, and socioeconomic. During the first industrial revolution, a transition to manufacturing processes using steam and water took place. Electrical technology was primarily used in the second industrial revolution to increase production. The third industrial revolution came with IT and electronics, wherein the main focus was on automation in production. The fourth industrial revolution was to provide customization using AI. The fifth industrial revolution focuses on providing personalization and a human touch to manufacturing methods. Industry 5.0 is sometimes seen as anti-industrial because of its personalization involving the human touch. This paper has done a systematic analysis of the five industrial revolutions.

  • Idea, Architecture and Applications of 5G enabled IoMT Systems for Smart Health Care System
    Sadhana Tiwari and Neha Sharma

    The Electrochemical Society
    The health sector is one of the important sectors of the Indian economy. The average expenditure on smart healthcare can be saved using the smart healthcare systems. Using Smart Healthcare System, death rate can be reduced and life span can be increased. Smart healthcare includes eHealth, mHealth services, smart home services, electronic database, and intelligent medical devices. Use of IoT based smart healthcare systems is increasing rapidly for disease diagnosis, patient’s treatment, and better quality of life. However, it produces a massive amount of data from different applications. It is the need of an hour to process and monitor real time data remotely with accuracy. As there are some limitations of IoT in healthcare like the massive amount of data generated, data security/privacy concerns, and more. This issue can be resolved by 5G technology. It has the capability to tackle the large amount of data with minimum delay and fulfills the requirement, such as high bandwidth, ultra-low latency, and ultra-high energy efficiency. Both 5G and IoT have great utility in the health sector. This research paper presents components, architecture, and applications of 5G enabled Internet of Medical Things (IoMT). This paper also covers how the 5G enabled IoMT supports the smart healthcare system and comparison of available wireless communication technologies for 5G enabled IoT. Requirements and technologies involved in 5G enabled IoMT Systems are presented along with their impact.

  • Applicability of ML-IoT in Smart Healthcare Systems: Challenges, Solutions Future Direction
    Nikhil Sharma and Prashant Giridhar Shambharkar

    IEEE
    In today's world, as population is at high peak and due to changing life style of people, individuals are suffering from various chronic disease. With shift towards modern methodology, involvement of human efforts has decreased, as know a day's people need to finish particular amount of task within few hours and with less effort. No doubt technology has made less intervention of human but it has certain limitations too. Due to less physical involvement, humans are more prone to diseases. Internet of things (IoT) plays a very crucial role in health care sector. Using various sensors, it become possible to trace the medical health condition of the human, and a message can be forwarded to nearby hospitals which helps the patients with ease. In this paper, three different diseases like heart disease, diabetes and novel COVID-19 are discussed where different machine learning algorithms are reviewed with involvement of IoT sensors.

  • Bio-signal data sharing security through watermarking: a technical survey
    N. Sharma, A. Anand, and A. K. Singh

    Springer Science and Business Media LLC
    Due to smart healthcare systems highly connected information and communications technologies, sensitive medical information and records are easily transmitted over the networks. However, stealing of healthcare data is increasing crime every day to greatly impact on financial loss. In order to this, researchers are developing various cost-effective bio-signal based data hiding techniques for smart healthcare applications. In this paper, we first introduce various aspects of data hiding along with major properties, generic embedding and extraction process, and recent applications. This survey provides a comprehensive survey on data hiding techniques, and their new trends for solving new challenges in real-world applications. Then, we survey the various notable bio-signal based data hiding techniques. The summary of some notable techniques in terms of their objective, type of data hiding, methodology and database used, performance metrics, important features, and limitations are also presented in tabular form. At the end, we discuss the major issues and research directions to explore the promising areas for future research.

  • Integration of blockchain and IoT (B-IoT): Architecture, solutions, & future research direction
    Vikash Kumar Aggarwal, Nikhil Sharma, Ila Kaushik, Bharat Bhushan, and Himanshu

    IOP Publishing

  • Blockchain Technology for Industry 4.0 Applications: Issues, Challenges and Future Research Directions
    Himanshu, Rishu Rana, Nikhil Sharma, Ila Kaushik, and Bharat Bhushan

    CRC Press

  • Securing Biometric Framework with Cryptanalysis
    Abhishek Goel, Siddharth Gautam, Nitin Tyagi, Nikhil Sharma, and Martin Sagayam

    Wiley

  • An Integrated Approach of Blockchain & Big Data in Health Care Sector


  • Attacks and Security Measures in Wireless Sensor Network
    Nikhil Sharma, Ila Kaushik, Vikash Kumar Agarwal, Bharat Bhushan, and Aditya Khamparia

    Wiley

  • Applicability of Blockchain Technology in Healthcare Industry: Applications, Challenges, and Solutions
    Nikhil Sharma, Bharat Bhushan, Ila Kaushik, and Narayan C. Debnath

    Springer International Publishing

  • A green 6G network era: Architecture and propitious technologies
    Sukriti Goyal, Nikhil Sharma, Ila Kaushik, Bharat Bhushan, and Nitin Kumar

    Springer Singapore

  • IoT Enabled Technology in Secured Healthcare: Applications, Challenges and Future Directions
    Sukriti Goyal, Nikhil Sharma, Bharat Bhushan, Achyut Shankar, and Martin Sagayam

    Springer International Publishing

  • Depression anatomy using combinational deep neural network
    Apeksha Rustagi, Chinkit Manchanda, Nikhil Sharma, and Ila Kaushik

    Springer Singapore
    Depression is a temperament syndrome that causes a tenacious emotion of wretchedness and loss of interest in any activity. It is a supreme root of mental illness, which has established the growth in the risk of early death and economic burden to a country. Traditional clinical analysis procedures are subjective, complex and need considerable contribution of professionals. The turn of the century saw incredible progress in using deep learning for medical diagnosis. Though, prediction and implementation of mental state can be remarkably hard. In this paper, we present Combinational Deep Neural Network (CDNN) for automated depression detection with facial images and text data using amalgamation of Convolutional Neural Network (CNN) and Recurrent Neural Network (RNN). Thereafter, combining the prediction scores of both CNN and RNN model and level of depression is decided on the basis of the range of the predefined depression-level scores. Simulation outcomes based on real-field channel measurements show that the proposed model can significantly predict depression with superior performance.

  • Transaction privacy preservations for blockchain technology
    Bharat Bhushan and Nikhil Sharma

    Springer Singapore
    Blockchain is defined as a technology comprising of logic unit of work done in form of transactions where any read or write operation can be carried out and stored in form of blocks where any financial accounts can be accessed by different servers. This is widely used technology due to its tremendous applicability such as independent verification without the involvement of any third party, no alteration or deletion of data, use of cryptography for secure financial accounts, sequential recording of transactions, pure transparent process of transaction. Blockchain follows both private and public type of architecture. In public model, anyone can read and write while in private only authorized users have the access. Security plays a vital role where secure transactions are to be carried out. Main principles of security such as confidentiality which implies the secrecy of send message, integrity which implies the consistency of send and received message and availability which implies information required must be available for reference, which must be preserved in any security-based model. In order to reduce the impact of attacks, various security algorithms such as cryptography, ring signature, Non-interactive Zero- Knowledge Proof, CryptoNote and Monero, Homomorphic Cryptosystem system are introduced in the paper.

  • Security issues & seclusion in bitcoin system
    Depender Kumar Soni, Harbhajan Sharma, Bharat Bhushan, Nikhil Sharma, and Ila Kaushik

    IEEE
    In the dawn of crypto-currencies the most talked currency is Bitcoin. Bitcoin is widely flourished digital currency and an exchange trading commodity implementing peer-to-peer payment network. No central athourity exists in Bitcoin. The users in network or pool of bitcoin need not to use real names, rather they use pseudo names for managing and verifying transactions. Due to the use of pseudo names bitcoin is apprehended to provide anonymity. However, the most transparent payment network is what bitcoin is. Here all the transactions are publicly open. To furnish wholeness and put a stop to double-spending, Blockchain is used, which actually works as a ledger for management of Bitcoins. Blockchain can be misused to monitor flow of bitcoins among multiple transactions. When data from external sources is amalgamated with insinuation acquired from the Blockchain, it may result to reveal user’s identity and profile. In this way the activity of user may be traced to an extent to fraud that user. Along with the popularity of Bitcoins the number of adversarial attacks has also gain pace. All these activities are meant to exploit anonymity and privacy in Bitcoin. These acivities result in loss of bitcoins and unlawful profit to attackers. Here in this paper we tried to present analysis of major attacks such as malicious attack, greater than 52% attacks and block withholding attack. Also this paper aims to present analysis and improvements in Bitcoin’s anonymity and privacy.

  • Importunity evolution of IoT for 5G
    Anas Ahmad, Bharat Bhushan, Nikhil Sharma, Ila Kaushik, and Saurabh Arora

    IEEE
    This With the ever-growing demand of high internet connectivity and ease of life Internet of Things in 5G has become the need of the hour as it has been the most sort out topic for researchers. The 4G industry has brought a revolution with it in the field of internet connectivity but is quite not enough for advanced IoT device demands and challenges. The upgrade in wireless communication is much needed for a much brighter and advanced future. The 5G will bring better Quality of Service, reliability and scalability to the IoT industry. In this paper we have discussed about the security issues and attacks that can affect working of Internet of Things. We have also explained in detail about the architecture of the 5G IoT system. That is why we have highlighted some of the major application and security aspects of 5G IoT.

  • Evolution of 5G wireless network in IoT
    Saurabh Arora, Nikhil Sharma, Bharat Bhushan, Ila Kaushik, and Anas Ahmad

    IEEE
    The fundamental feature of internet of things (IoT) is to integrate the sensing technology along with the technology of radio frequency identification and port these technology on the devices produced now-a-days. As of now the IoT has been facing many issues like poor security measures, high maintenance cost and least reliable. So, there is a need of new emerging technology like 5G which could resolve all these issues. 5G has the capability to introduce features like ultra-dense network support, high reliability with world class security measure. Which make the production of new devices with advance technology highly cost effective. So, in this paper we are going to discuss about what were the IoT based devices were facing before the introduction of emerging technology like 5G and how will be able to resolve out all those issues. Lastly, we will discuss how 5G along with IoT could bring a revolution in the existing technology.

  • IoE: A boon threat to the mankind
    Apeksha Rustagi, Chinkit Manchanda, and Nikhil Sharma

    IEEE
    Internet of Everything (IoE), the unified conjugate and autonomous coordination of enormous numeral of computing fundamentals and sensors, lifeless and alive beings, progressions and information through the Internet infrastructure. This turns data into actions that generate new abilities, richer skills, and extraordinary economic opportunity for industries, people and nations. Adopting these new technologies gives relaxation in daily life but comes with some issues like protecting the privacy and securing the information of users. This paper is written for the motive to understand and explain the fact that every element comes with two faces: positive as well as negative. The latest ongoing technology of IoE is likewise. The paper consists of the explanation of IoE and IoT technologies and the major differences among them along with the luxuries and comforts provided by the IoE despite of all the threats and challenges it has faced and is facing till now. The future scope and expectations from the IoE based devices are mentioned while concluding this paper.

  • Security challenges controls in cyber physical system
    Rajat Rathi, Nikhil Sharma, Chinkit Manchanda, Bharat Bhushan, and Moksh Grover

    IEEE
    With the exponential growth of technology within few decades the possibility of smart cities has also increased with an advanced production of fresh services for health, transport, business, education, energy distribution, social activity. As a result, Cyber Physical System (CPS) can prove itself very helpful in the adaptation of projects and applications of smart cities. But with this new security issues have been generated. In this Paper we study the CPS from three perspectives I.e. from security perspective, component perspective and CPS perspective for smart grids and smart cars. The paper then outlines the CPS, CPS models and communication in the CPS. With the increasing number of fresh services, the data is increasing at a very fast pace and this data may lead to the security issues like security attacks and protection from those attacks. The paper may also provide a research agenda for the future.

  • Precedence & issues of IoT based on edge computing
    Sukriti Goyal, Nikhil Sharma, Ila Kaushik, Bharat Bhushan, and Abhijeet Kumar

    IEEE
    In the network of IoT, a huge amount of data is frequently generated, major messages through complicated networks serving device-to-device communications are swapped and also, sensitive smart world frameworks are controlled and monitored by thousands of gadgets and sensors. To extenuate the acceleration of overcrowding of resources in the network, as an approach edge computing, has risen as a modern approach to resolve requirements of confined computing as well as IoT. In this paper, a brief introduction of Internet of Things and edge computing is discussed which consists of general concepts of IoT and its components, basic introduction of edge computing, and structure of edge computing. After that, fundamental concepts of cloud computing, edge computing and IoT are introduced by comparing their features with each other and a structure of IoT based on edge computing is also illustrated with a slight introduction of the architecture of both the edge computing and IoT. Moreover, the advantages of using the technology of edge computing to assist the technology of IoT are provided as well as the efficiency of integrating these two technologies together is demonstrated. Then, the issues like security and privacy, advanced communication etc. related to combination of IoT and edge computing system are discussed and finally, the conclusion of the paper is presented. So, basically, in this paper, an extensive survey is conducted to analyze how the usage of edge computing progresses the performance of systems of IoT. The performance of edge computing is studied by comparing delay of network, occupation of bandwidth, power utilization, and many other characteristics.

  • Producing energy using blind man stick
    Depender Kumar Soni, Nikhil Sharma, Ila Kaushik, and Bharat Bhushan

    IEEE
    We all are familiar with the problems a blind person faces while performing several daily life activities. These problems are generally related to walking on roads, walking on ramps, movement in staircases, looking for path in crowded streets and market places and many other situations. Of course, many of us come ahead to help them by guiding their way, but sometimes it becomes a matter of self-respect, or say, the person is not willing to take help from others or even it is possible that nobody may be available to help. Think of a situation when a blind person is alone and an Electronic Travel Aid Stick suddenly stops working due to a completely discharged battery system. This paper aims to build a device that can generate that much amount of energy that is required to run the electronic systems efficiently so that it can prevent visually impaired people from suffering in difficult situations.

RECENT SCHOLAR PUBLICATIONS

  • IoT and Big Data Analytics for Smart Healthcare 4.0 Applications
    A Malik, V Parihar, K Purohit, AKM Bahalul Haque, N Sharma, ...
    International Conference on Intelligence Science, 469-479 2023

  • Artificial Intelligence driven Intrusion Detection Framework for the Internet of Medical Things
    PG Shambharkar, N Sharma
    2023

  • Evolution From Industry 1.0 to Industry 5.0
    A Mathur, A Dabas, N Sharma
    2022 4th International Conference on Advances in Computing, Communication 2022

  • Role of artificial intelligence in object detection: a review
    AS Bisht, AK Jha, A Sachdeva, N Sharma
    2022 4th international conference on advances in computing, communication 2022

  • Driver drowsiness detection and traffic sign recognition system
    R Pandey, P Bhasin, S Popli, M Sharma, N Sharma
    Emerging Technologies in Data Mining and Information Security: Proceedings 2022

  • An Integrated Approach of Blockchain & Big Data in Health Care Sector
    N Tyagi, B Bhushan, S Gautam, N Sharma, S Kumar
    Applications of Machine Learning in Big-Data Analytics and Cloud Computing 2022

  • Cryptocurrency Revolution: Bitcoin Time Forecasting & Blockchain Anomaly Detection
    N Sharma, I Kaushik, B Bhushan, CK Dixit
    Blockchain Technology in Healthcare Applications, 61-85 2022

  • Applicability of ML-IoT in smart healthcare systems: Challenges, solutions & future direction
    N Sharma, PG Shambharkar
    2022 International Conference on Computer Communication and Informatics 2022

  • Prevailing privacy and security technologies in smart cities
    T Varshney, R Singh, AK Rai, N Sharma, B Bhushan
    Proceedings of the International Conference on Innovative Computing 2021

  • IntelliAssistant–AI based Personal Assistant
    H Buddhiraja, N Sharma
    Proceedings of the International Conference on Innovative Computing 2021

  • Applicability of machine learning algorithms for intelligent farming
    B Verma, N Sharma, I Kaushik, B Bhushan
    Advanced soft computing techniques in data science, IoT and cloud computing 2021

  • Blockchain Technology for Industry 4.0 Applications: Issues, Challenges and Future Research Directions
    R Rana, N Sharma, I Kaushik, B Bhushan
    Big Data Analysis for Green Computing, 147-171 2021

  • 10 Blockchain Technology
    RR Himanshu, N Sharma, I Kaushik, B Bhushan
    Big Data Analysis for Green Computing: Concepts and Applications, 147 2021

  • Applicability of blockchain technology in healthcare industry: applications, challenges, and solutions
    N Sharma, B Bhushan, I Kaushik, NC Debnath
    Efficient Data Handling for Massive Internet of Medical Things: Healthcare 2021

  • Industrial revolution: blockchain as a wave for industry 4.0 and IIoT
    S Goyal, N Sharma, I Kaushik, B Bhushan
    Advances in computing communications and informatics, 108-130 2021

  • Blockchain-based cultivating ideas for growth: A New AGRONOMICS PERSPECTIVE
    BS Vishakha, N Sharma, B Bhushan, I Kaushik
    Advances in Computing Communications and Informatics, 195-219 2021

  • Performance evaluation using different routing protocols in MANETs
    I Kaushik, N Sharma, B Bhushan, S Gautam
    Integration of WSNs into internet of things, 101-120 2021

  • Securing biometric framework with cryptanalysis
    A Goel, S Gautam, N Tyagi, N Sharma, M Sagayam
    Intelligent Data Analytics for Terror Threat Prediction: Architectures 2021

  • Attacks and security measures in wireless sensor network
    N Sharma, I Kaushik, VK Agarwal, B Bhushan, A Khamparia
    Intelligent Data Analytics for Terror Threat Prediction: Architectures 2021

  • Integration of blockchain and IoT (B-IoT): architecture, solutions, & future research direction
    VK Aggarwal, N Sharma, I Kaushik, B Bhushan
    IOP conference series: materials science and engineering 1022 (1), 012103 2021

MOST CITED SCHOLAR PUBLICATIONS

  • IoT enabled technology in secured healthcare: applications, challenges and future directions
    S Goyal, N Sharma, B Bhushan, A Shankar, M Sagayam
    Cognitive Internet of Medical Things for Smart Healthcare: Services and 2021
    Citations: 117

  • Evolution of iot to iiot: Applications & challenges
    H Jaidka, N Sharma, R Singh
    Proceedings of the international conference on innovative computing 2020
    Citations: 92

  • Architectural model of security threats & theircountermeasures in iot
    T Varshney, N Sharma, I Kaushik, B Bhushan
    2019 international conference on computing, communication, and intelligent 2019
    Citations: 84

  • Applicability of industrial IoT in diversified sectors: evolution, applications and challenges
    R Sethi, B Bhushan, N Sharma, R Kumar, I Kaushik
    Multimedia technologies in the Internet of Things environment, 45-67 2021
    Citations: 66

  • Evolution of IoT & data analytics using deep learning
    R Tiwari, N Sharma, I Kaushik, A Tiwari, B Bhushan
    2019 international conference on computing, communication, and intelligent 2019
    Citations: 53

  • Authentication & encryption based security services in blockchain technology
    T Varshney, N Sharma, I Kaushik, B Bhushan
    2019 International Conference on Computing, Communication, and Intelligent 2019
    Citations: 44

  • Applicability of WSN and biometric models in the field of healthcare
    N Sharma, I Kaushik, B Bhushan, S Gautam, A Khamparia
    Deep Learning Strategies for Security Enhancement in Wireless Sensor 2020
    Citations: 43

  • Comfy smart home using IoT
    S Jadon, A Choudhary, H Saini, U Dua, N Sharma, I Kaushik
    Proceedings of the International Conference on Innovative Computing 2020
    Citations: 31

  • Analysis of various machine learning algorithm for cardiac pulse prediction
    M Harjani, M Grover, N Sharma, I Kaushik
    2019 International Conference on Computing, Communication, and Intelligent 2019
    Citations: 28

  • Blockchain as a solution for security attacks in named data networking of things
    S Goyal, N Sharma, I Kaushik, B Bhushan
    Security and privacy issues in IoT devices and sensor networks, 211-243 2021
    Citations: 27

  • Black hole attack and its security measure in wireless sensors networks
    I Kaushik, N Sharma
    Handbook of wireless sensor networks: issues and challenges in current 2020
    Citations: 27

  • IoE: A boon & threat to the mankind
    A Rustagi, C Manchanda, N Sharma
    2020 IEEE 9th International Conference on Communication Systems and Network 2020
    Citations: 26

  • Traffic density investigation & road accident analysis in India using deep learning
    C Manchanda, R Rathi, N Sharma
    2019 international conference on computing, communication, and intelligent 2019
    Citations: 26

  • Security countermeasures in web based application
    A Sharma, A Singh, N Sharma, I Kaushik, B Bhushan
    2019 2nd International Conference on Intelligent Computing, Instrumentation 2019
    Citations: 26

  • Taxonomy of attacks on web based applications
    A Singh, A Sharma, N Sharma, I Kaushik, B Bhushan
    2019 2nd International Conference on Intelligent Computing, Instrumentation 2019
    Citations: 26

  • Transaction privacy preservations for blockchain technology
    B Bhushan, N Sharma
    International Conference on Innovative Computing and Communications 2021
    Citations: 22

  • Neoteric security and privacy sanctuary technologies in smart cities
    C Manchanda, N Sharma, R Rathi, B Bhushan, M Grover
    2020 IEEE 9th international conference on Communication Systems and Network 2020
    Citations: 22

  • Intrusion detection and security system for blackhole attack
    I Kaushik, N Sharma, N Singh
    2019 2nd International Conference on Signal Processing and Communication 2019
    Citations: 22

  • Integration of blockchain and IoT (B-IoT): architecture, solutions, & future research direction
    VK Aggarwal, N Sharma, I Kaushik, B Bhushan
    IOP conference series: materials science and engineering 1022 (1), 012103 2021
    Citations: 21

  • Network layers threats & its countermeasures in WSNs
    V Pruthi, K Mittal, N Sharma, I Kaushik
    2019 International Conference on Computing, Communication, and Intelligent 2019
    Citations: 21

RESEARCH OUTPUTS (PATENTS, SOFTWARE, PUBLICATIONS, PRODUCTS)

1. Prediction Analysis Techniques of Data Mining: A Review. SSRN Electronic Journal. doi: 10.2139/
2. Privacy Issues & Security Techniques in Big Data. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/
3. Evolution of IoT & Data Analytics using Deep Learning. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/
4. Authentication & Encryption Based Security Services in Blockchain Technology. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/
5. Architectural Model of Security Threats & their Countermeasures in IoT. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/
6.Traffic Density Investigation & Road Accident Analysis in India using Deep Learning. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/
7. Traffic control using V-2-V Based Method using Reinforcement Learning. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/
8. Network Layers Threats & its Countermeasures in WSNs. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/
9. Analysis of Various Machine Learning Algorithm for Cardiac Pulse Prediction. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/
10. Intrusion Detection and Security System for Blackhole Attack. 2019 2nd International Conference on Signal Processing and Communication (ICSPC). doi: 10.1109/
11. Performance Measurement Using Different Shortest Path Techniques in Wireless Sensor Network. 2019 2nd International Conference on Signal Processing and Communication (ICSPC). doi: 10.1109/
12. Black Hole Attack and Its Security Measure in Wireless Sensors Networks. Advances in Intelligent Systems and Computing Handbook of Wireless Sensor Networks: Issues and Challenges in Current Scenarios, 401–416. doi: 10.1007/978-3-030-40305-8_20
13. Security Countermeasures in Web Based Application. 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). doi: 10.1109/
14. Taxonomy of Attacks on Web Based Applications. 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). doi: 10.1109/
15. Comfy Smart Home using IoT. SSRN Electronic Journal. doi: 10.2139/
16. Evaluation of Accidental Death Records Using Hybrid Genetic Algorithm. SSRN Electronic Journal. doi: 10.2139/
17. Evolution of IoT to IIoT: Applications & Challenges. SSRN Electronic Journal. doi:10.2139/
18. Producing Energy Using Blind Man Stick. 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT). doi:10.1109/
19. Importunity & Evolution of IoT for 5G. 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT). doi:10.1109/
20. Neoteric Security and Privacy Sanctuary Technologies in Smart Cities. 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT). doi:10.1109/
21. IoE: A Boon & Threat to the Mankind. 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT). doi:10.1109/
22. Evolution of 5G Wireless Network in IoT. 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT). doi:10.1109/
23. Precedence & Issues of IoT based on Edge Computing. 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT). doi:10.1109/
24. Security Challenges & Controls in Cyber Physical System. 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT). doi:10.1109/