Publications
PAPERS BASED ON WORK DONE IN IUST AND NIT SRINAGAR (UNDER THE BANNER OF COMMUNICATION CONTROL AND LEARNING LAB)
Book Chapters
Bulla, Aaqib, and Shahid M. Shah. "Physical Layer Security for Energy-Efficient IoT with Information and Power Transfer." In Security and Privacy in the Internet of Things, pp. 37-50. Chapman and Hall/CRC, 2020.
Journal Publications:
N. Islam, and Shahid Mehraj Shah, "A Low Complexity Binary-Weighted Energy Disaggregation Framework for Residential Electricity Consumption", Energy and Buildings (2023)
Shahnawaz Ahmad, Mir, and Shahid Mehraj Shah. "Unsupervised ensemble based deep learning approach for attack detection in IoT network." Concurrency and Computation: Practice and Experience 34, no. 27 (2022): e7338.
Bulla, Aaqib, and Shahid M. Shah. "Outage Analysis of Energy Efficiency in a Finite-Element-IRS Aided Communication System." Physical Communication, no. 54 (October 2022)
Shah, Shahid Mehraj. "Secrecy Rate Region Enhancement in Multiple Access Wiretap Channel." Journal of Telecommunications and Information Technology 2 (2022).
Bulla, Aaqib, and Shahid M. Shah. "Secure energy efficiency: Power allocation and outage analysis for SWIPT-in-DAS based IoT." ICT Express 8, no. 2 (2022): 179-182.
Ahmad, Mir Shahnawaz, and Shahid Mehraj Shah. "Moving Beyond the Crypto-Currency Success of Blockchain: A Systematic Survey." Scalable Computing: Practice and Experience 22, no. 3 (2021): 321-346.
Ahmad, Mir Shahnawaz, and Shahid Mehraj Shah. "Mitigating Malicious Insider Attacks in the Internet of Things using Supervised Machine Learning Techniques." Scalable Computing: Practice and Experience 22, no. 1 (2021): 13-28.
Shah, Shahid Mehraj, Rufaidah Riyaz, Taiba Majid Wani, Arieb Ashraf, and Syed Farah Naz. "Optimal rotation angle for finite constellation over additive white Gaussian noise multiple access wiretap channel." IET Communications 14, no. 21 (2020): 3845-3852.
Conference publications:
Rashid, B., M. Haddad, and Shahid M. Shah. "Bayesian Game Formulation of Power Allocation in Multiple Access Wiretap Channel with Incomplete CSI." Accepted for IEEE National Conference on Communication (NCC), Feb 28-Mar 01, 2024, IIT Madras [arXiv preprint arXiv:2306.09209 (2023).]
Hussain, A., Asrar, Saqib, N., & Shahid M Shah . "Achievable Rates for Finite Alphabet Constellation Over Non-Gaussian Noise Channel", Accepted for International Conference on 6G Communications Networking and Signal Processing (SGCNSP), December 27-30,2023, Singapore.
Shahid M Shah, Nassar, F., Haddad, M., & Khan, M. Z. A. "Deep Neural Network based secure-energy efficient power allocation in an Interference Network", Accepted for Fifth International Conference on Computing and Network Communications (CoCoNet’23), Bangalore, December 18-20, 2023 Springer.
Yousuf, S., Raut, R., & Shahid M Shah, "Deep ResNet Based Classification of Long Tailed Data with Renyi Entropy as Loss Function", Accepted for Fifth International Conference on Computing and Network Communications (CoCoNet’23) , Bangalore, December 18-20, 2023. Springer.
Showkat, Shifa, Zahid Bashir Dar, and Shahid Mehraj Shah. "Achievable Sum-rate of variants of QAM over Gaussian Multiple Access Channel with and without security." arXiv preprint arXiv:2308.11405 (2023). Accepted for publication in IEEE International Conference on Signal Processing and Computer Vision (SPCV-2023).
Hussayn, Faheem, and Shahid M. Shah. "Parametric entropy based Cluster Centriod Initialization for k-means clustering of various Image datasets." Accepted for publication in IEEE International Conference on Signal Processing and Computer Vision (SPCV-2023) arXiv preprint arXiv:2308.07705 (2023).
Nida Ul Islam and Shahid Mehraj Shah. "A binary weight-based energy disaggregation framework for residential electricity consumption." In Proceedings of the 2022 IEEE 10th Power India International Conference (PIICON)
Haddad, Majed, Piotr Wiecek, Oussama Habachi, Samir M. Perlaza, and Shahid Mehraj Shah. "Fair Iterative Water-Filling Game for Multiple Access Channels." In Proceedings of the 25th International ACM Conference on Modeling Analysis and Simulation of Wireless and Mobile Systems, pp. 125-132. 2022.
Bulla, Aaqib, and Shahid Mehraj Shah "Energy-Efficient Power Allocation for Secure SWIPT in IoT-DAS Using Fractional Optimization." Internet of Things and Its Applications. Springer, Singapore, 2022. 85-96.
Ahmad, Mir Shahnawaz, and Shahid Mehraj Shah. "Supervised machine learning approaches for attack detection in the IoT network." Internet of Things and Its Applications. Springer, Singapore, 2022. 247-260.
Shah, Shahid Mehraj. "Modelling Energy Consumption of Domestic Households via Supervised and Unsupervised Learning: A Case Study." In Symposium on Machine Learning and Metaheuristics Algorithms, and Applications, pp. 157-171. Springer, Singapore, 2021.
Dyuthi, Sristi Ram, and Shahid Mehraj Shah. "Activity Modeling of Individuals in Domestic Households Using Fuzzy Logic." In Symposium on Machine Learning and Metaheuristics Algorithms, and Applications, pp. 73-87. Springer, Singapore, 2021.
Pre-NIT Publications (Based on PhD Work)
Conference Publications
1) Shahid M. Shah, Vireshwar Kumar, Vinod Sharma , "Achievable Secrecy Sum-Rate in a Fading MAC-WT with Power Control and without CSI of Eavesdropper" , proceedings of IEEE International conference on Signal Processing and COMmunications-2012 (SPCOM 2012).
2) R. Rajesh, Shahid M Shah, Vinod Sharma, " On Secrecy above the Secrecy Capacity", Proceedings of IEEE ICCS 2012, Singapore.
3) Shahid M. Shah, Parmeswaram S, Vinod Sharma, " Previous Messages provide the key to achieve Shannon Capacity in a Wiretap Channel" , Proceedings of IEEE ICC'13 - Workshop InfSec, Budapest, Hungary, June 2013.
4) Shahid M Shah, Vinod Sharma, "Achieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel", Accepted for IEEE WCNC 2015, New Orleans, USA. (Available in Arxiv: http://arxiv.org/pdf/1410.8794v1.pdf )
5) Shahid M Shah, Krishna Chaitanya A, Vinod Sharma, "Resource Allocation in Fading Multiple Access Wiretap Channel via Game Theoretic Learning", presented at 2016 Information Theory and Applications (ITA) Workshop, Scripps Seaside Forum, La Jolla, San Diego, , USA , January 31 - February 5, 2016 (Invited paper) (Link to proceedings catalog)
Journal Publications
1) Shahid M Shah, Krishna Chaitanya A, Vinod Sharma, "Resource allocation in fading MAC via Algorithmic Game Theory: with and without security", EURASIP Journal of Wireless communication and networking, DOI:10.1186/s13638-017-0901-8, 26 June, 2017 (Impact factor: 1.529)
2) Shahid M Shah, Vinod Sharma, "Enhancing Secrecy Rates in a wiretap channel", accepted for publication in Elsevier Journal Digital Communication and Networking, preprint available at http://arxiv.org/pdf/1505.01374.pdf
Book Chapter
Patents and Patent Applications