Moving Beyond the Crypto-Currency Success of Blockchain: A Systematic Survey MS Ahmad, SM Shah Scalable Computing: Practice and Experience 22 (3), 321-346, 2021 | 12 | 2021 |
Unsupervised ensemble based deep learning approach for attack detection in IoT network M Shahnawaz Ahmad, S Mehraj Shah Concurrency and Computation: Practice and Experience 34 (27), e7338, 2022 | 9 | 2022 |
Supervised Machine Learning Approaches for Attack Detection in the IoT Network MS Ahmad, SM Shah Internet of Things and Its Applications: Select Proceedings of ICIA 2020, 247, 2022 | 8 | 2022 |
Mitigating Malicious Insider Attacks in the Internet of Things using Supervised Machine Learning Techniques MS Ahmad, SM Shah Scalable Computing: Practice and Experience 22 (1), 13-28, 2021 | 8 | 2021 |
Machine Learning and Metaheuristics Algorithms, and Applications: Second Symposium, SoMMA 2020, Chennai, India, October 14–17, 2020, Revised Selected Papers SM Thampi, S Piramuthu, KC Li, S Berretti, M Wozniak, D Singh Springer Nature, 2021 | 8 | 2021 |
Previous messages provide the key to achieve shannon capacity in a wiretap channel SM Shah, S Parameswaran, V Sharma 2013 IEEE International Conference on Communications Workshops (ICC), 697-701, 2013 | 8 | 2013 |
Achievable secrecy sum-rate in a fading mac-wt with power control and without csi of eavesdropper SM Shah, V Kumar, V Sharma 2012 International Conference on Signal Processing and Communications (SPCOM …, 2012 | 8 | 2012 |
Resource allocation in fading multiple access wiretap channel via game theoretic learning SM Shah, AK Chaitanya, V Sharma 2016 Information Theory and Applications Workshop (ITA), 1-7, 2016 | 7 | 2016 |
On secrecy above secrecy capacity R Rajesh, SM Shah, V Sharma 2012 IEEE International Conference on Communication Systems (ICCS), 70-74, 2012 | 7 | 2012 |
Achieving Shannon capacity region as secrecy rate region in a multiple access wiretap channel SM Shah, V Sharma 2015 IEEE Wireless Communications and Networking Conference (WCNC), 759-764, 2015 | 4 | 2015 |
Secure energy efficiency: Power allocation and outage analysis for SWIPT-in-DAS based IoT A Bulla, SM Shah ICT Express 8 (2), 179-182, 2022 | 3 | 2022 |
Enhancing secrecy rates in a wiretap channel SM Shah, V Sharma Digital Communications and Networks 6 (1), 129-135, 2020 | 3 | 2020 |
Internet of Things and Its Applications PK Garg, L Sharma From Visual Surveillance to Internet of Things, 29-40, 2019 | 3 | 2019 |
A low complexity binary-weighted energy disaggregation framework for residential electricity consumption N ul Islam, SM Shah Energy and Buildings 298, 113553, 2023 | 2 | 2023 |
A binary weight-based energy disaggregation framework for residential electricity consumption NU Islam, SM Shah 2022 IEEE 10th Power India International Conference (PIICON), 1-6, 2022 | 2 | 2022 |
Outage analysis of energy efficiency in a finite-element-IRS aided communication system A Bulla, SM Shah Physical Communication 54, 101776, 2022 | 2 | 2022 |
Secrecy Rate Region Enhancement in Multiple Access Wiretap Channel SM Shah Journal of Telecommunications and Information Technology 10 (2), 14-25, 2022 | 2 | 2022 |
Achieving shannon capacity in a wiretap channel via previous messages SM Shah, V Sharma arXiv preprint arXiv:1404.5701, 3498-3508, 2014 | 2 | 2014 |
Modelling Energy Consumption of Domestic Households via Supervised and Unsupervised Learning: A Case Study SM Shah Machine Learning and Metaheuristics Algorithms, and Applications: Second …, 2021 | 1 | 2021 |
Optimal rotation angle for finite constellation over additive white Gaussian noise multiple access wiretap channel SM Shah, R Riyaz, TM Wani, A Ashraf, SF Naz IET Communications 14 (21), 3845-3852, 2020 | 1 | 2020 |