Vishal Sharma

Orcid: 0000-0001-7470-6506

Affiliations:
  • Queen's University Belfast, UK
  • Soonchunhyang University, Department of Information Security Engineering, Asan, South Korea (former)
  • Singapore University of Technology and Design (former)
  • Thapar University, Computer Science and Engineering Department, Punjab, India (former)


According to our database1, Vishal Sharma authored at least 136 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Quantum Deep Reinforcement Learning for Dynamic Resource Allocation in Mobile Edge Computing-Based IoT Systems.
IEEE Trans. Wirel. Commun., June, 2024

Artificial intelligence-powered decentralized framework for Internet of Things in Healthcare 4.0.
Trans. Emerg. Telecommun. Technol., April, 2024

SQL injection attack: Detection, prioritization & prevention.
J. Inf. Secur. Appl., 2024

What-if Analysis Framework for Digital Twins in 6G Wireless Network Management.
CoRR, 2024

Accelerating scalable manufacturing models with Discrete Event Simulation as-a-service.
Proceedings of the 2024 9th International Conference on Fog and Mobile Edge Computing (FMEC), 2024

2023
Sustainable and Round-Optimized Group Authenticated Key Exchange in Vehicle Communication.
IEEE Trans. Intell. Transp. Syst., December, 2023

Digital Twin for Open RAN: Toward Intelligent and Resilient 6G Radio Access Networks.
IEEE Commun. Mag., November, 2023

Post-Quantum Adversarial Modeling: A User's Perspective.
Computer, August, 2023

Secrecy Performance Analysis of Heterogeneous Networks With Unreliable Wireless Backhaul and Imperfect Channel Estimation.
IEEE Trans. Veh. Technol., July, 2023

Multi-Tier GPU Virtualization for Deep Learning in Cloud-Edge Systems.
IEEE Trans. Parallel Distributed Syst., July, 2023

From Digital Twin to Metaverse: The Role of 6G Ultra-Reliable and Low-Latency Communications with Multi-Tier Computing.
IEEE Wirel. Commun., June, 2023

Privacy-Aware Laser Wireless Power Transfer for Aerial Multi-Access Edge Computing: A Colonel Blotto Game Approach.
IEEE Internet Things J., April, 2023

$Q$-Learning Aided Intelligent Routing With Maximum Utility in Cognitive UAV Swarm for Emergency Communications.
IEEE Trans. Veh. Technol., March, 2023

Abusive adversarial agents and attack strategies in cyber-physical systems.
CAAI Trans. Intell. Technol., March, 2023

Blockchain-Based Privacy Preservation Scheme for Misbehavior Detection in Lightweight IoMT Devices.
IEEE J. Biomed. Health Informatics, February, 2023

Quantum Deep Reinforcement Learning for 6G Mobile Edge Computing-based IoT Systems.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

Joint Computation and Communication Resource Allocation for Unmanned Aerial Vehicle NOMA Systems.
Proceedings of the 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , 2023

2022
Optimal and Privacy-Aware Resource Management in Artificial Intelligence of Things Using Osmotic Computing.
IEEE Trans. Ind. Informatics, 2022

URLLC Edge Networks With Joint Optimal User Association, Task Offloading and Resource Allocation: A Digital Twin Approach.
IEEE Trans. Commun., 2022

AI-Driven Aeronautical Ad Hoc Networks for 6G Wireless: Challenges, Opportunities, and the Road Ahead.
Sensors, 2022

Digital Twin for 6G: Taxonomy, Research Challenges, and the Road Ahead.
IEEE Open J. Commun. Soc., 2022

RIS-Assisted UAV Communications for IoT With Wireless Power Transfer Using Deep Reinforcement Learning.
IEEE J. Sel. Top. Signal Process., 2022

MoTH: Mobile Terminal Handover Security Protocol for HUB Switching Based on 5G and Beyond (5GB) P2MP Backhaul Environment.
IEEE Internet Things J., 2022

Functional Security and Trust in Ultra-Connected 6G Ecosystem.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2022

ZKBdf: A ZKBoo-based Quantum-Secure Verifiable Delay Function with Prover-secret.
IACR Cryptol. ePrint Arch., 2022

Reinshard: An Optimally Sharded Dual-Blockchain for Concurrency Resolution.
Distributed Ledger Technol. Res. Pract., 2022

A lightweight D2D security protocol with request-forecasting for next-generation mobile networks.
Connect. Sci., 2022

Abusive Adversaries in 5G and Beyond IoT.
IEEE Consumer Electron. Mag., 2022

Machine Learning-Based Digital Twin for Predictive Modeling in Wind Turbines.
IEEE Access, 2022

Discrete Event Simulation in Cloud-Edge Manufacturing Environments: Performance, Energy and Cost Trade-offs.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

Digital Twin Empowered Ultra-Reliable and Low-Latency Communications-based Edge Networks in Industrial IoT Environment.
Proceedings of the IEEE International Conference on Communications, 2022

A Wearable-based Preventive Model To Promote Oral Health Through Personalized Notification.
Proceedings of the 44th Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2022

Evaluating Blockchain Protocols with Abusive Modeling.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Threats and Corrective Measures for IoT Security with Observance of Cybercrime: A Survey.
Wirel. Commun. Mob. Comput., 2021

Control Over Skies: Survivability, Coverage, and Mobility Laws for Hierarchical Aerial Base Stations.
IEEE Pervasive Comput., 2021

Post-Quantum VRF and its Applications in Future-Proof Blockchain System.
CoRR, 2021

Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs.
Sci. China Inf. Sci., 2021

A Formally Verified Security Scheme for Inter-gNB-DU Handover in 5G Vehicle-to-Everything.
IEEE Access, 2021

Performance Investigation of NOMA Versus OMA Techniques for mmWave Massive MIMO Communications.
IEEE Access, 2021

A Resource-Blockchain Framework for Safeguarding IoT.
Proceedings of the Mobile Internet Security - 5th International Symposium, 2021

Quantum Computing Threat Modelling on a Generic CPS Setup.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021

2020
Spectral Efficiency Optimization for Next Generation NOMA-Enabled IoT Networks.
IEEE Trans. Veh. Technol., 2020

Efficient Deployment with Throughput Maximization for UAVs Communication Networks.
Sensors, 2020

Security of 5G-V2X: Technologies, Standardization, and Research Directions.
IEEE Netw., 2020

SFFS-SVM based prostate carcinoma diagnosis in DCE-MRI via ACM segmentation.
Multidimens. Syst. Signal Process., 2020

A Multifaceted Vigilare System for Intelligent Transportation Services in Smart Cities.
IEEE Internet Things Mag., 2020

A New Green Prospective of Non-orthogonal Multiple Access (NOMA) for 5G.
Inf., 2020

Efficient data management and control over WSNs using SDN-enabled aerial networks.
Int. J. Commun. Syst., 2020

Safeguarding unmanned aerial systems: an approach for identifying malicious aerial nodes.
IET Commun., 2020

Osmotic computing-based service migration and resource scheduling in Mobile Augmented Reality Networks (MARN).
Future Gener. Comput. Syst., 2020

Human Arthritis Analysis in Fog Computing Environment Using Bayesian Network Classifier and Thread Protocol.
IEEE Consumer Electron. Mag., 2020

Preserving Data Privacy via Federated Learning: Challenges and Solutions.
IEEE Consumer Electron. Mag., 2020

Security, Privacy and Trust for Smart Mobile- Internet of Things (M-IoT): A Survey.
IEEE Access, 2020

Realizing a Stacking Generalization Model to Improve the Prediction Accuracy of Major Depressive Disorder in Adults.
IEEE Access, 2020

SGF-MD: Behavior Rule Specification-Based Distributed Misbehavior Detection of Embedded IoT Devices in a Closed-Loop Smart Greenhouse Farming System.
IEEE Access, 2020

Quality-aware trajectory planning of cellular connected UAVs.
Proceedings of the DroneCom '20: Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, 2020

Right-of-Stake: Deterministic and Fair Blockchain Leader Election with Hidden Leader.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020

Privacy-Aware Wireless Power Transfer for Aerial Computation Offloading via Colonel Blotto Game.
Proceedings of the IEEE Globecom Workshops, 2020

2019
Secure Computation on 4G/5G Enabled Internet-of-Things.
Wirel. Commun. Mob. Comput., 2019

Neural-Blockchain-Based Ultrareliable Caching for Edge-Enabled UAV Networks.
IEEE Trans. Ind. Informatics, 2019

Special Issue "Internet of Things for Smart Homes".
Sensors, 2019

Reduction of Artefacts in JPEG-XR Compressed Images.
Sensors, 2019

MIH-SPFP: MIH-based secure cross-layer handover protocol for Fast Proxy Mobile IPv6-IoT networks.
J. Netw. Comput. Appl., 2019

DROpS: A demand response optimization scheme in SDN-enabled smart energy ecosystem.
Inf. Sci., 2019

EFF-FAS: enhanced fruit fly optimisation based search and tracking by flying ad hoc swarm.
Int. J. Ad Hoc Ubiquitous Comput., 2019

UAVs assisted queue scheduling in ground ad hoc networks.
Int. J. Ad Hoc Ubiquitous Comput., 2019

An Energy-Efficient Transaction Model for the Blockchain-Enabled Internet of Vehicles (IoV).
IEEE Commun. Lett., 2019

AIM: Activation increment minimization strategy for preventing bad information diffusion in OSNs.
Future Gener. Comput. Syst., 2019

Cooperative trust relaying and privacy preservation via edge-crowdsourcing in social Internet of Things.
Future Gener. Comput. Syst., 2019

Extension of MIH for FPMIPv6 (EMIH-FPMIPv6) to support optimized heterogeneous handover.
Future Gener. Comput. Syst., 2019

A Survey on the Security and the Evolution of Osmotic and Catalytic Computing for 5G Networks.
CoRR, 2019

An optimal security management framework for backhaul-aware 5G-Vehicle to Everything (V2X).
CoRR, 2019

Security of 5G-V2X: Technologies, Standardization and Research Directions.
CoRR, 2019

Security, Privacy and Trust for Smart Mobile-Internet of Things (M-IoT): A Survey.
CoRR, 2019

Control over Skies: Survivability, Coverage and Mobility Laws for Hierarchical Aerial Base Stations.
CoRR, 2019

Sustainable and secure trajectories for the military Internet of Drones (IoD) through an efficient Medium Access Control (MAC) protocol.
Comput. Electr. Eng., 2019

BRIoT: Behavior Rule Specification-Based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems.
IEEE Access, 2019

Secure and Reliable Resource Allocation and Caching in Aerial-Terrestrial Cloud Networks (ATCNs).
IEEE Access, 2019

Cell Coverage Analysis of a Low Altitude Aerial Base Station in Wind Perturbations.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

2018
NHAD: Neuro-Fuzzy Based Horizontal Anomaly Detection in Online Social Networks.
IEEE Trans. Knowl. Data Eng., 2018

HMADSO: a novel hill Myna and desert Sparrow optimization algorithm for cooperative rendezvous and task allocation in FANETs.
Soft Comput., 2018

An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System.
Sensors, 2018

Dissimilarity Metric Based on Local Neighboring Information and Genetic Programming for Data Dissemination in Vehicular Ad Hoc Networks (VANETs).
Sensors, 2018

On the positioning likelihood of UAVs in 5G networks.
Phys. Commun., 2018

Three-tier neural model for service provisioning over collaborative flying ad hoc networks.
Neural Comput. Appl., 2018

Security of 5G-Mobile Backhaul Networks: A Survey.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018

Secure and efficient protocol for fast handover in 5G mobile Xhaul networks.
J. Netw. Comput. Appl., 2018

A Survey on the Security of Pervasive Online Social Networks (POSNs).
J. Internet Serv. Inf. Secur., 2018

OFFRP: optimised fruit fly based routing protocol with congestion control for UAVs guided ad hoc networks.
Int. J. Ad Hoc Ubiquitous Comput., 2018

Security management for backhaul-aware 5G-V2X.
CoRR, 2018

Internet of Drones (IoD): Threats, Vulnerability, and Security Perspectives.
CoRR, 2018

Self-enforcing Game Theory-based Resource Allocation for LoRaWAN Assisted Public Safety Communications.
CoRR, 2018

A framework for mitigating zero-day attacks in IoT.
CoRR, 2018

QoS-Aware Routing in Wireless Networks Using Aerial Vehicles.
CoRR, 2018

Resource-based mobility management for video users in 5G using catalytic computing.
Comput. Commun., 2018

DPTR: Distributed priority tree-based routing protocol for FANETs.
Comput. Commun., 2018

Secure and Energy-Efficient Handover in Fog Networks Using Blockchain-Based DMM.
IEEE Commun. Mag., 2018

On-Demand Ultra-Dense Cloud Drone Networks: Opportunities, Challenges and Benefits.
IEEE Commun. Mag., 2018

Secure and Efficient Context-Aware Localization of Drones in Urban Scenarios.
IEEE Commun. Mag., 2018

Forecasting yield by integrating agrarian factors and machine learning models: A survey.
Comput. Electron. Agric., 2018

Behavior and Vulnerability Assessment of Drones-Enabled Industrial Internet of Things (IIoT).
IEEE Access, 2018

On IoT Misbehavior Detection in Cyber Physical Systems.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

Misbehavior Detection of Embedded IoT Devices in Medical Cyber Physical Systems.
Proceedings of the Third IEEE/ACM International Conference on Connected Health: Applications, 2018

2017
Efficient cooperative relaying in flying ad hoc networks using fuzzy-bee colony optimization.
J. Supercomput., 2017

G-FANET: an ambient network formation between ground and flying ad hoc networks.
Telecommun. Syst., 2017

A Consensus Framework for Reliability and Mitigation of Zero-Day Attacks in IoT.
Secur. Commun. Networks, 2017

Efficient Management and Fast Handovers in Software Defined Wireless Networks Using UAVs.
IEEE Netw., 2017

SACA: Self-Aware Communication Architecture for IoT Using Mobile Fog Servers.
Mob. Inf. Syst., 2017

Energy efficient device discovery for reliable communication in 5G-based IoT and BSNs using unmanned aerial vehicles.
J. Netw. Comput. Appl., 2017

Intelligent deployment of UAVs in 5G heterogeneous communication environment for improved coverage.
J. Netw. Comput. Appl., 2017

Driver behaviour detection and vehicle rating using multi-UAV coordinated vehicular networks.
J. Comput. Syst. Sci., 2017

QUAT-DEM: Quaternion-DEMATEL based neural model for mutual coordination between UAVs.
Inf. Sci., 2017

Teredo tunneling-based secure transmission between UAVs and ground ad hoc networks.
Int. J. Commun. Syst., 2017

A hybrid NSCT domain image watermarking scheme.
EURASIP J. Image Video Process., 2017

Managing Service-Heterogeneity using Osmotic Computing.
CoRR, 2017

Extension of MIH to Support FPMIPv6 for Optimized Heterogeneous Handover.
CoRR, 2017

Cooperative frameworks and network models for flying ad hoc networks: a survey.
Concurr. Comput. Pract. Exp., 2017

Secure and Efficient Protocol for Route Optimization in PMIPv6-Based Smart Home IoT Networks.
IEEE Access, 2017

Computational Offloading for Efficient Trust Management in Pervasive Online Social Networks Using Osmotic Computing.
IEEE Access, 2017

ISMA: Intelligent Sensing Model for Anomalies Detection in Cross Platform OSNs With a Case Study on IoT.
IEEE Access, 2017

Opportunistic-Harvesting: RF Wireless Power Transfer Scheme for Multiple Access Relays System.
IEEE Access, 2017

Wireless Information and Power Transfer: Issues, Advances, and Challenges.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

An SDN-Based Secure Mobility Model for UAV-Ground Communications.
Proceedings of the Mobile Internet Security - Second International Symposium, 2017

An Overview of 802.21a-2012 and Its Incorporation into IoT-Fog Networks Using Osmotic Framework.
Proceedings of the IoT as a Service - Third International Conference, 2017

Fuzzy-Based Protocol for Secure Remote Diagnosis of IoT Devices in 5G Networks.
Proceedings of the IoT as a Service - Third International Conference, 2017

Socializing Drones for Inter-Service Operability in Ultra-Dense Wireless Networks using Blockchain.
Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30, 2017

2016
Energy Efficient Data Dissemination in Multi-UAV Coordinated Wireless Sensor Networks.
Mob. Inf. Syst., 2016

PEER: Proximity-Based Energy-Efficient Routing Algorithm for Wireless Sensor Networks.
J. Internet Serv. Inf. Secur., 2016

UAVs Assisted Delay Optimization in Heterogeneous Wireless Networks.
IEEE Commun. Lett., 2016

UAV-Assisted Heterogeneous Networks for Capacity Enhancement.
IEEE Commun. Lett., 2016

Estimation-Based Queue Scheduling Model to Improve QoS for End Users in MANETs.
Comput. Informatics, 2016

2015
Topological Broadcasting Using Parameter Sensitivity-Based Logical Proximity Graphs in Coordinated Ground-Flying Ad Hoc Networks.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015

A Cooperative Network Framework for Multi-UAV Guided Ground Ad Hoc Networks.
J. Intell. Robotic Syst., 2015

Self-Healing Neural Model for Stabilization Against Failures Over Networked UAVs.
IEEE Commun. Lett., 2015

2011
Dead State Recovery Based Power Optimization Routing Protocol for MANETs (DSPO).
Proceedings of the High Performance Architecture and Grid Computing, 2011


  Loading...