shahidshah@nitsri.net
7889519497
Department of ECE, Old Building, 1st Floor, Room No. 7, NIT Srinagar, Hazratbal

Dr.Shahid Mehraj Shah

Assistant Professor

Information Theory, Wireless Communication, Machine Learning, Game Theory, Physical Layer Security, Cyber Physical Systems

Education

Degree Institute CGPA Year Subject Description
Ph. D. 2017 IISc Bangalore ECE
B.TECH 2008 NIT Srinagar ECE

Publications Journal

Month-Year Authors Paper Title Volume PageNo DOI Impact Factor Type Journal Name
OCT 2022 A.Bulla, Shahid M Shah, "Outage Analysis of Energy Efficiency in a Finite-Element-IRS Aided Communication System", October 2022, Physical Communication (SCI)
OCT 2022 M. S. Ahmad, Shahid M Shah, "Unsupervised Ensemble Based Deep Learning Approach for Attack Detection in IoT Network", concurrency and Computation: Practice and Experience (Wiley, SCI), October, 2022
JUN 2022 Shahid M Shah, "Secrecy Rate Region Enhancement in Multiple Access Wiretap Channel", Journal of Telecommunications and Information Technology, June 2022
JUN 2022 M. Haddad, P. Wiecek, O. Habachi, S. M Perlaza, Shahid M Shah, "FEAT: Fair Coordinated Iterative Water-Filling Algorithm", available in Arxiv, submitted to IEEE Transactions on Wireless Communication
SEP 2021 A. Bulla, Shahid M Shah, "Secure energy efficiency: Power allocation and outage analysis for SWIPT-in-DAS based IoT", Elsevier ICT Express, September, 2021
MAR 2021 M. S. Ahmad, and Shahid M Shah. "Mitigating Malicious Insider Attacks in the Internet of Things using Supervised Machine Learning Techniques." Scalable Computing: Practice and Experience 22, no. 1 (2021): 13-28.
DEC 2020 Shahid M Shah, Rufaidah Bhat, Taiba Wani, Arieb Ashraf, Syed Farah Naz, " Optimal Rotation Angle for Finite Constellation over AWGN Multiple Access Wiretap Channel ", Accepted for IET Communications
MAR 2018 Shahid M Shah, Vinod Sharma, "Enhancing Secrecy Rates in a wiretap channel", Digital Communications and Networks, Elsevier
DEC 2017 Shahid M Shah, Krishna Chaitanya A, Vinod Sharma, "Resource allocation in a MAC with and without security via game theoretic learning", EURASIP Journal on Wireless Communications and Networking, Nature Publishing Group

Publications Conference

Month-year Authors Type Identifier Title Conference Name
OCT 2022 Fair Iterative Water-Filling Game for Multiple Access Channels M. Haddad, P. Wiecek, O. Habachi, S. M Perlaza, Shahid M Shah, "Fair Iterative Water-Filling Game for Multiple Access Channels", ACM 25th International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM), October 24th - 28th, 2022 Montreal, Canada (Acceptance rate: 21%)
OCT 2021 LSTM and CNN Neural Net Based prediction in time series data from smart meters Shahid M Shah, A. Anand, N. Islam, R. Junaid, "LSTM and CNN Neural Net Based prediction in time series data from smart meters", accepted for International Conference on Mathematical Sciences (ICMS-2021), NIT Surat.
DEC 2020 Supervised Machine Learning Approaches for Attack Detection in the IoT Network Mir Shahnawaz, Shahid M Shah, "Supervised Machine Learning Approaches for Attack Detection in the IoT Network", Accepted for International Conference on IoT and its Applications (ICIA-2020), December 2020
DEC 2020 Energy Efficient Power Allocation for Secure SWIPT in IoT-DAS using Fractional Optimization Aaqib Bulla, Shahid M Shah, "Energy Efficient Power Allocation for Secure SWIPT in IoT-DAS using Fractional Optimization", Accepted for International Conference on IoT and its Applications (ICIA-2020), December 2020
OCT 2020 Modelling energy consumption of domestic households via supervised and unsupervised learning: A Case Study Shahid M Shah, "Modelling energy consumption of domestic households via supervised and unsupervised learning: A Case Study",Second Symposium on Machine Learning and Metaheuristics Algorithms, and Applications (SoMMA'20) .
OCT 2020 Activity Modeling of individuals in domestic households using fuzzy logic Sristi Dyuthi , Shahid M Shah, "Activity Modeling of individuals in domestic households using fuzzy logic", Second Symposium on Machine Learning and Metaheuristics Algorithms, and Applications (SoMMA'20) .
JAN 2016 Resource allocation in fading multiple access wiretap channel via game theoretic learning. Shahid Mehraj Shah, A Krishna Chaitanya, Vinod Sharma, "Resource allocation in fading multiple access wiretap channel via game theoretic learning.", IEEE Information Theory and Applications Workshop (ITA 2016), Scripps Seaside Forum, La Jolla, San Diego, USA
MAR 2015 Achieving shannon capacity region as secrecy rate region in a multiple access wiretap channel Shahid Mehraj Shah, Vinod Sharma, "Achieving shannon capacity region as secrecy rate region in a multiple access wiretap channel", IEEE WCNC, New Orleans, USA.
JUN 2013 Previous messages provide the key to achieve shannon capacity in a wiretap channel Shahid Mehraj Shah, S Parameswaran, Vinod Sharma, "Previous messages provide the key to achieve shannon capacity in a wiretap channel", IEEE International Conference on Communication (ICC), Budapest, Hungary.
NOV 2012 On secrecy above secrecy capacity R Rajesh, Shahid Mehraj Shah, Vinod Sharma, "On secrecy above secrecy capacity", IEEE ICCS, Singapore
JUL 2012 Achievable secrecy sum-rate in a fading mac-wt with power control and without csi of eavesdropper Achievable secrecy sum-rate in a fading mac-wt with power control and without csi of eavesdropper

Book Published

  • Aaqib Bulla, Shahid M Shah, " Physical Layer Security for Energy Efficient IoT with Information and Power Transfer ", accepted as chapter for upcoming Book Security and Privacy in the Internet of Things , CRC Taylor & Francis Publishers, December 2020 , 2020

Professional Qualifications / Membership

Society/Orgnisation Prof Membership/Fellowship From Date To Date
IEEE 01-03-2012 03-02-2015