OCT 2022
|
|
|
|
Fair Iterative Water-Filling Game for Multiple Access Channels
|
M. Haddad, P. Wiecek, O. Habachi, S. M Perlaza, Shahid M Shah, "Fair Iterative Water-Filling Game for Multiple Access Channels", ACM 25th International Conference on Modeling, Analysis
and Simulation of Wireless and Mobile Systems (MSWiM), October 24th - 28th, 2022
Montreal, Canada (Acceptance rate: 21%)
|
OCT 2021
|
|
|
|
LSTM and CNN Neural Net Based prediction in time series data from smart meters
|
Shahid M Shah, A. Anand, N. Islam, R. Junaid, "LSTM and CNN Neural Net Based prediction in time series data from smart meters", accepted for International Conference on Mathematical Sciences (ICMS-2021), NIT Surat.
|
DEC 2020
|
|
|
|
Supervised Machine Learning Approaches for Attack Detection in the IoT Network
|
Mir Shahnawaz, Shahid M Shah, "Supervised Machine Learning Approaches for Attack Detection in the IoT Network", Accepted for International Conference on IoT and its Applications (ICIA-2020), December 2020
|
DEC 2020
|
|
|
|
Energy Efficient Power Allocation for Secure SWIPT in IoT-DAS using Fractional Optimization
|
Aaqib Bulla, Shahid M Shah, "Energy Efficient Power Allocation for Secure SWIPT in IoT-DAS using Fractional Optimization", Accepted for International Conference on IoT and its Applications (ICIA-2020), December 2020
|
OCT 2020
|
|
|
|
Modelling energy consumption of domestic households via supervised and unsupervised learning: A Case Study
|
Shahid M Shah, "Modelling energy consumption of domestic households via supervised and unsupervised learning: A Case Study",Second Symposium on Machine Learning and Metaheuristics Algorithms, and Applications (SoMMA'20) .
|
OCT 2020
|
|
|
|
Activity Modeling of individuals in domestic households using fuzzy logic
|
Sristi Dyuthi , Shahid M Shah, "Activity Modeling of individuals in domestic households using fuzzy logic", Second Symposium on Machine Learning and Metaheuristics Algorithms, and Applications (SoMMA'20) .
|
JAN 2016
|
|
|
|
Resource allocation in fading multiple access wiretap channel via game theoretic learning.
|
Shahid Mehraj Shah, A Krishna Chaitanya, Vinod Sharma, "Resource allocation in fading multiple access wiretap channel via game theoretic learning.", IEEE Information Theory and Applications Workshop (ITA 2016), Scripps Seaside Forum, La Jolla, San Diego, USA
|
MAR 2015
|
|
|
|
Achieving shannon capacity region as secrecy rate region in a multiple access wiretap channel
|
Shahid Mehraj Shah, Vinod Sharma, "Achieving shannon capacity region as secrecy rate region in a multiple access wiretap channel", IEEE WCNC, New Orleans, USA.
|
JUN 2013
|
|
|
|
Previous messages provide the key to achieve shannon capacity in a wiretap channel
|
Shahid Mehraj Shah, S Parameswaran, Vinod Sharma, "Previous messages provide the key to achieve shannon capacity in a wiretap channel", IEEE International Conference on Communication (ICC), Budapest, Hungary.
|
NOV 2012
|
|
|
|
On secrecy above secrecy capacity
|
R Rajesh, Shahid Mehraj Shah, Vinod Sharma, "On secrecy above secrecy capacity", IEEE ICCS, Singapore
|
JUL 2012
|
|
|
|
Achievable secrecy sum-rate in a fading mac-wt with power control and without csi of eavesdropper
|
Achievable secrecy sum-rate in a fading mac-wt with power control and without csi of eavesdropper
|