default search action
Ishan Budhiraja
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [c36]Prakhar Consul, Ishan Budhiraja, Deepak Garg, Sachin Sharma, Ammar Muthanna:
Deep Reinforcement Learning Based Resource Allocation Method in Future Wireless Networks with Blockchain Assisted MEC Network. WoWMoM 2025: 289-294 - 2024
- [j35]Shivani Gaba, Ishan Budhiraja, Vimal Kumar, Sheshikala Martha, Jebreel Khurmi, Akansha Singh, Krishna Kant Singh, Sameh S. Askar, Mohamed Abouhawwash:
A Systematic Analysis of Enhancing Cyber Security Using Deep Learning for Cyber Physical Systems. IEEE Access 12: 6017-6035 (2024) - [j34]Shally Nagpal, Shivani Gaba, Ishan Budhiraja, Meenakshi Sharma, Akansha Singh, Krishna Kant Singh, S. S. Aksar, Mohamed Abouhawwash, Celestine Iwendi:
Quantum Computing Integrated Patterns for Real-Time Cryptography in Assorted Domains. IEEE Access 12: 132317-132331 (2024) - [j33]Shivani Gaba, Ishan Budhiraja, Vimal Kumar, Sahil Garg, Mohammad Mehedi Hassan:
An innovative multi-agent approach for robust cyber-physical systems using vertical federated learning. Ad Hoc Networks 163: 103578 (2024) - [j32]Prakhar Consul, Ishan Budhiraja, Deepak Garg, Sahil Garg, Mohammad Mehedi Hassan, Azzedine Boukerche:
Towards an optimal 3-D design and deployment of 6G UAVs for interference mitigation under terrestrial networks. Ad Hoc Networks 164: 103612 (2024) - [j31]Prakhar Consul, Ishan Budhiraja, Deepak Garg:
A Hybrid Secure Resource Allocation and Trajectory Optimization Approach for Mobile Edge Computing Using Federated Learning Based on WEB 3.0. IEEE Trans. Consumer Electron. 70(1): 1167-1179 (2024) - [j30]Prakhar Consul, Ishan Budhiraja, Deepak Garg, Neeraj Kumar, Ramendra Singh, Ahmad S. Almogren:
A Hybrid Task Offloading and Resource Allocation Approach for Digital Twin-Empowered UAV-Assisted MEC Network Using Federated Reinforcement Learning for Future Wireless Network. IEEE Trans. Consumer Electron. 70(1): 3120-3130 (2024) - [j29]Abdoh M. A. Jabbari, Haneef Khan, Salahaldeen Duraibi, Ishan Budhiraja, Suneet K. Gupta, Marwan Omar:
Energy Maximization for Wireless Powered Communication Enabled IoT Devices With NOMA Underlaying Solar Powered UAV Using Federated Reinforcement Learning for 6G Networks. IEEE Trans. Consumer Electron. 70(1): 3926-3939 (2024) - [j28]Ashima Yadav, Shivani Gaba, Haneef Khan, Ishan Budhiraja, Akansha Singh, Krishna Kant Singh:
ETMA: Efficient Transformer-Based Multilevel Attention Framework for Multimodal Fake News Detection. IEEE Trans. Comput. Soc. Syst. 11(4): 5015-5027 (2024) - [j27]Ishan Budhiraja, Neeraj Kumar, Deepak Garg, Mohsen Guizani, Georges Kaddoum:
Joint Traffic Admission, Resource Allocation and Mode Selection Protocol for NOMA-Based D2D Users Underlaying Cellular Network for 5G and Beyond Networks. IEEE Trans. Netw. Sci. Eng. 11(5): 4371-4383 (2024) - [j26]Prakhar Consul, Ishan Budhiraja, Deepak Garg, Sahil Garg, Georges Kaddoum, Mohammad Mehedi Hassan:
SFL-TUM: Energy efficient SFRL method for large scale AI model's task offloading in UAV-assisted MEC networks. Veh. Commun. 48: 100790 (2024) - [c35]Pronaya Bhattacharya, Aparna Kumari, Ishan Budhiraja, Sudeep Tanwar:
MetaEd: Metaverse-Assisted Virtual Classroom and Content Generation Framework Underlying 5G. ICC Workshops 2024: 25-30 - [c34]Pronaya Bhattacharya, Aparna Kumari, Sudeep Tanwar, Ishan Budhiraja, Sahil Patel, Joel J. P. C. Rodrigues:
Quant-Jack: Quantum Machine Learning to Detect Cryptojacking Attacks in IIoT Networks. ICC Workshops 2024: 865-870 - [c33]Shivani Gaba, Ishan Budhiraja, Vimal Kumar:
Improving Security and Privacy in Advanced Federated Learning Environments for Cyber-Physical Systems. ICC Workshops 2024: 1822-1827 - [c32]Sumran Talreja, Abhay Bindle, Vimal Kumar, Ishan Budhiraja, Pronaya Bhattacharya:
Security Strengthen and Detection of Deepfake Videos and Images Using Deep Learning Techniques. ICC Workshops 2024: 1834-1839 - [c31]Deepak Gupta, Ishan Budhiraja, Rajat Chaudhary, Neeraj Kumar:
Parameterize Deep Q Network for Backscattering Data Capture with Multiple UAVs. ICC 2024: 4536-4541 - [c30]Anjum Mohd Aslam, Aditya Bhardwaj, Rajat Chaudhary, Ishan Budhiraja:
A Cooperative Game Approach for Multi-lane Merging Decision-making Algorithm for CAVs. ICDCN 2024: 274-279 - [c29]Shivam Chaudhary, Anushka Nehra, Ishan Budhiraja, Rajat Chaudhary, Abhay Bansal:
STAR-RIS Based Resource Scheduling and Mode Selection for Drone Assisted 5G Communications. INFOCOM (Workshops) 2024: 1-6 - 2023
- [j25]Shivani Gaba, Haneef Khan, Khalid J. Almalki, Abdoh M. A. Jabbari, Ishan Budhiraja, Vimal Kumar, Akansha Singh, Krishna Kant Singh, Sameh S. Askar, Mohamed Abouhawwash:
Holochain: An Agent-Centric Distributed Hash Table Security in Smart IoT Applications. IEEE Access 11: 81205-81223 (2023) - [j24]Deepanshi, Ishan Budhiraja, Deepak Garg, Neeraj Kumar, Rohit Sharma:
A comprehensive review on variants of SARS-CoVs-2: Challenges, solutions and open issues. Comput. Commun. 197: 34-51 (2023) - [j23]Deepanshi, Ishan Budhiraja, Deepak Garg, Neeraj Kumar:
Choquet integral based deep learning model for COVID-19 diagnosis using eXplainable AI for NG-IoT models. Comput. Commun. 212: 227-238 (2023) - [j22]Anjum Mohd Aslam, Rajat Chaudhary, Aditya Bhardwaj, Ishan Budhiraja, Neeraj Kumar, Sherali Zeadally:
Metaverse for 6G and Beyond: The Next Revolution and Deployment Challenges. IEEE Internet Things Mag. 6(1): 32-39 (2023) - [j21]Ahmed Barnawi, Shivani Gaba, Anna Alphy, Abdoh M. A. Jabbari, Ishan Budhiraja, Vimal Kumar, Neeraj Kumar:
A systematic analysis of deep learning methods and potential attacks in internet-of-things surfaces. Neural Comput. Appl. 35(25): 18293-18308 (2023) - [j20]Ishan Budhiraja, Neeraj Kumar, Himanshu Sharma, Mohamed Elhoseny, Yahya Lakys, Joel J. P. C. Rodrigues:
Latency-Energy Tradeoff in Connected Autonomous Vehicles: A Deep Reinforcement Learning Scheme. IEEE Trans. Intell. Transp. Syst. 24(11): 13296-13308 (2023) - [j19]Himanshu Sharma, Neeraj Kumar, Ishan Budhiraja, Ahmed Barnawi:
Secrecy Rate Maximization in THz-Aided Heterogeneous Networks: A Deep Reinforcement Learning Approach. IEEE Trans. Veh. Technol. 72(10): 13490-13505 (2023) - [j18]Vineet Vishnoi, Ishan Budhiraja, Suneet K. Gupta, Neeraj Kumar:
A Deep Reinforcement Learning Scheme for Sum Rate and Fairness Maximization Among D2D Pairs Underlaying Cellular Network With NOMA. IEEE Trans. Veh. Technol. 72(10): 13506-13522 (2023) - [c28]Malik Zaib Alam, Asif Ali Khan, Adeel Ahmad, Haneef Khan, Mohammad Rafeek Khan, Ishan Budhiraja, Nagendra Yasmani:
Investigation of Cloud Forensic Incidents in Cloud Architecture for 6G Networks. ANTS 2023: 1-6 - [c27]Varun Kumar, Ishan Budhiraja, Akansha Singh, Rajat Chaudhary, Srinivas Aluvala:
Energy-Efficient THz NOMA-Enabled Small Cells Underlaying Macrocell Using Reinforcement Learning. ANTS 2023: 1-6 - [c26]Shams Tabrez Siddiqui, Mohammad Shahid Kamal, Khalid Ali Qidwai, Md Imran Alam, Haneef Khan, Malik Zaib Alam, Ishan Budhiraja, Sandeep Chintham:
Uncovering Network Vulnerabilities and Conducting Digital Forensics Analysis for IoT Device Security in 6G. ANTS 2023: 1-6 - [c25]Vineet Vishnoi, Ishan Budhiraja, Suneet K. Gupta, Neeraj Joshi, Anushka Nehra, Haneef Khan:
Deep Reinforcement Learning Based Energy Efficiency Maximization Scheme for Uplink NOMA Enabled D2D Users. GLOBECOM 2023: 4728-4734 - [c24]Shivani Gaba, Anushka Nehra, Ishan Budhiraja, Vimal Kumar, Aaisha Makkar:
An Optimized Approach for Intrusion Detection in Internet of Softwarized Things. ICC Workshops 2023: 648-653 - [c23]Madhuri Gupta, Deepika Pantola, Deepanshi, Ishan Budhiraja, Rajat Chaudhary:
P-HrDPS: Security-Aware Heart Disorder Prediction Support Model Using Ensemble Learning Technique. ICC Workshops 2023: 654-659 - [c22]Anushka Nehra, Prakhar Consul, Ishan Budhiraja, Gagandeep Kaur, Nidal Nasser, Muhammad Imran:
Federated Learning Based Trajectory Optimization for UAV Enabled MEC. ICC 2023: 1640-1645 - [c21]Vineet Vishnoi, Prakhar Consul, Ishan Budhiraja, Suneet K. Gupta, Neeraj Kumar:
Deep Reinforcement Learning Based Energy Consumption Minimization for Intelligent Reflecting Surfaces Assisted D2D Users Underlaying UAV Network. INFOCOM Workshops 2023: 1-6 - [c20]Deepanshi, Namo Jain, Prakhar Consul, Ishan Budhiraja, Deepak Garg:
Compressed Deep Learning Models with XAI for COVID-19 Detection Using CXR Images. RTIP2R (2) 2023: 54-66 - [c19]Jai Jain, Vansh Dubey, Lakshit Sama, Vimal Kumar, Simarpreet Singh, Ishan Budhiraja, Ruchika Arora:
Fake News Investigation Using Ensemble Machine Learning Techniques. RTIP2R (1) 2023: 89-100 - [c18]Vimal Kumar, Priyam Srivastava, Ashay Dwivedi, Ishan Budhiraja, Debjani Ghosh, Vikas Goyal, Ruchika Arora:
Large-Language-Models (LLM)-Based AI Chatbots: Architecture, In-Depth Analysis and Their Performance Evaluation. RTIP2R (2) 2023: 237-249 - [c17]Aditya Bhardwaj, Rajat Chaudhary, Anjum Mohd Aslam, Ishan Budhiraja:
Blockchain-based Robust SDN Framework for Digital Twin-Enabled IoT Networks. VTC Fall 2023: 1-6 - [c16]Shivam Chaudhary, Rajat Chaudhary, Ishan Budhiraja, Aditya Bhardwaj, Anushka Nehra, Sheshikala Martha:
Improving the Transmission Power of UAVs with Intelligent Reflecting Surfaces in V2X. VTC Fall 2023: 1-6 - 2022
- [j17]Shivani Gaba, Ishan Budhiraja, Vimal Kumar, Sahil Garg, Georges Kaddoum, Mohammad Mehedi Hassan:
A federated calibration scheme for convolutional neural networks: Models, applications and challenges. Comput. Commun. 192: 144-162 (2022) - [j16]Ahmed Barnawi, Neeraj Kumar, Ishan Budhiraja, Krishan Kumar, Amal Almansour, Bander A. Alzahrani:
Deep reinforcement learning based trajectory optimization for magnetometer-mounted UAV to landmine detection. Comput. Commun. 195: 441-450 (2022) - [j15]Ahmed Barnawi, Ishan Budhiraja, Krishan Kumar, Neeraj Kumar, Bander A. Alzahrani, Amal Almansour, Adeeb Noor:
A comprehensive review on landmine detection using deep learning techniques in 5G environment: open issues and challenges. Neural Comput. Appl. 34(24): 21657-21676 (2022) - [j14]Ishan Budhiraja, Neeraj Kumar, Sudhanshu Tyagi:
ISHU: Interference Reduction Scheme for D2D Mobile Groups Using Uplink NOMA. IEEE Trans. Mob. Comput. 21(9): 3208-3224 (2022) - [c15]Prity Rani, Vimal Kumar, Ishan Budhiraja, Atul Rathi, Sonal Kukreja:
Deploying Electronic Voting System Use-case on Ethereum Public Blockchain. ANTS 2022: 1-6 - [c14]Ishan Budhiraja, Vineet Vishnoi, Neeraj Kumar, Deepak Garg, Sudhanshu Tyagi:
Energy-Efficient Optimization Scheme for RIS-Assisted Communication Underlaying UAV with NOMA. ICC 2022: 1-6 - [c13]Shivani Gaba, Ishan Budhiraja, Aaisha Makkar, Deepak Garg:
Machine Learning for Detecting Security Attacks on Blockchain using Software Defined Networking. ICC Workshops 2022: 260-264 - [c12]Himanshu Sharma, Ishan Budhiraja, Neeraj Kumar, Rajkumar Tekchandani:
Secrecy Rate Maximization for THz-Enabled Femto Edge Users using Deep Reinforcement Learning in 6G. INFOCOM Workshops 2022: 1-6 - [c11]Prakhar Consul, Ishan Budhiraja, Rajat Chaudhary, Neeraj Kumar:
Security Reassessing in UAV-Assisted Cyber-Physical Systems Based on Federated Learning. MILCOM 2022: 61-65 - [c10]Himanshu Sharma, Ishan Budhiraja, Prakhar Consul, Neeraj Kumar, Deepak Garg, Liang Zhao, Lie Liu:
Federated learning based energy efficient scheme for MEC with NOMA underlaying UAV. DroneCom@MobiCom 2022: 73-78 - [c9]Rahul Nijhawan, Manya Juneja, Namneet Kaur, Ashima Yadav, Ishan Budhiraja:
Automated Deep Learning Based Approach for Albinism Detection. RTIP2R 2022: 272-281 - [c8]Shivani Gaba, Ishan Budhiraja, Vimal Kumar, Aaisha Makkar:
Federated Learning Based Secured Computational Offloading in Cyber-Physical IoST Systems. RTIP2R 2022: 344-355 - [c7]Prakhar Consul, Ishan Budhiraja, Rajat Chaudhary, Deepak Garg:
FLBCPS: Federated Learning based Secured Computation Offloading in Blockchain-Assisted Cyber-Physical Systems. UCC 2022: 412-417 - [i1]Ashima Yadav, Shivani Gaba, Ishan Budhiraja, Neeraj Kumar:
ETMA: Efficient Transformer Based Multilevel Attention framework for Multimodal Fake News Detection. CoRR abs/2206.07331 (2022) - 2021
- [j13]Ishan Budhiraja, Neeraj Kumar, Sudhanshu Tyagi, Sudeep Tanwar, Zhu Han, Md. Jalil Piran, Doug Young Suh:
A Systematic Review on NOMA Variants for 5G and Beyond. IEEE Access 9: 85573-85644 (2021) - [j12]Ishan Budhiraja, Neeraj Kumar, Sudhanshu Tyagi:
Deep-Reinforcement-Learning-Based Proportional Fair Scheduling Control Scheme for Underlay D2D Communication. IEEE Internet Things J. 8(5): 3143-3156 (2021) - [j11]Ishan Budhiraja, Neeraj Kumar, Sudhanshu Tyagi, Sudeep Tanwar, Mohammad S. Obaidat:
URJA: Usage Jammer as a Resource Allocation for Secure Transmission in a CR-NOMA-Based 5G Femtocell System. IEEE Syst. J. 15(2): 1776-1785 (2021) - [j10]Ishan Budhiraja, Neeraj Kumar, Sudhanshu Tyagi:
Cross-Layer Interference Management Scheme for D2D Mobile Users Using NOMA. IEEE Syst. J. 15(2): 3109-3120 (2021) - [j9]Ishan Budhiraja, Neeraj Kumar, Sudhanshu Tyagi:
Energy-Delay Tradeoff Scheme for NOMA-Based D2D Groups With WPCNs. IEEE Syst. J. 15(4): 4768-4779 (2021) - [j8]Ishan Budhiraja, Neeraj Kumar, Sudhanshu Tyagi, Sudeep Tanwar:
Energy Consumption Minimization Scheme for NOMA-Based Mobile Edge Computation Networks Underlaying UAV. IEEE Syst. J. 15(4): 5724-5733 (2021) - [j7]Ishan Budhiraja, Neeraj Kumar, Sudhanshu Tyagi, Sudeep Tanwar, Mohsen Guizani:
SWIPT-Enabled D2D Communication Underlaying NOMA-Based Cellular Networks in Imperfect CSI. IEEE Trans. Veh. Technol. 70(1): 692-699 (2021) - [j6]Ishan Budhiraja, Neeraj Kumar, Sudhanshu Tyagi, Sudeep Tanwar, Zhu Han:
An Energy Efficient Scheme for WPCN-NOMA Based Device-to-Device Communication. IEEE Trans. Veh. Technol. 70(11): 11935-11948 (2021) - [c6]Ishan Budhiraja, Rajesh Gupta, Neeraj Kumar, Sudhanshu Tyagi, Sudeep Tanwar, Joel J. P. C. Rodrigues:
Interference Mitigation and Secrecy Ensured for NOMA-Based D2D Communications Under Imperfect CSI. ICC 2021: 1-6 - 2020
- [j5]Ishan Budhiraja, Neeraj Kumar, Sudhanshu Tyagi, Sudeep Tanwar, Mohsen Guizani:
An Energy-Efficient Resource Allocation Scheme for SWIPT-NOMA Based Femtocells Users With Imperfect CSI. IEEE Trans. Veh. Technol. 69(7): 7790-7805 (2020) - [c5]Ishan Budhiraja, Neeraj Kumar, Sudhanshu Tyagi, Quoc-Viet Pham, Sudeep Tanwar:
Energy Efficient Mode Selection Scheme for Wireless Powered D2D Communications with NOMA Underlaying UAV. INFOCOM Workshops 2020: 877-882 - [c4]Ishan Budhiraja, Neeraj Kumar, Mamoun Alazab, Sudhanshu Tyagi, Sudeep Tanwar, Gaurav Srivastava:
Energy management scheme for wireless powered D2D users with NOMA underlaying full duplex UAV. DroneCom@MobiCom 2020: 7-12
2010 – 2019
- 2019
- [j4]Ishan Budhiraja, Sudhanshu Tyagi, Sudeep Tanwar, Neeraj Kumar, Joel J. P. C. Rodrigues:
Tactile Internet for Smart Communities in 5G: An Insight for NOMA-Based Solutions. IEEE Trans. Ind. Informatics 15(5): 3104-3112 (2019) - [j3]Ishan Budhiraja, Sudhanshu Tyagi, Sudeep Tanwar, Neeraj Kumar, Joel J. P. C. Rodrigues:
DIYA: Tactile Internet Driven Delay Assessment NOMA-Based Scheme for D2D Communication. IEEE Trans. Ind. Informatics 15(12): 6354-6366 (2019) - [j2]Ishan Budhiraja, Sudhanshu Tyagi, Sudeep Tanwar, Neeraj Kumar, Mohsen Guizani:
Cross Layer NOMA Interference Mitigation for Femtocell Users in 5G Environment. IEEE Trans. Veh. Technol. 68(5): 4721-4733 (2019) - [j1]Sudeep Tanwar, Sudhanshu Tyagi, Ishan Budhiraja, Neeraj Kumar:
Tactile Internet for Autonomous Vehicles: Latency and Reliability Analysis. IEEE Wirel. Commun. 26(4): 66-72 (2019) - [c3]Ishan Budhiraja, Sudhanshu Tyagi, Sudeep Tanwar, Neeraj Kumar, Nadra Guizani:
Subchannel Assignment for SWIPT-NOMA based HetNet with Imperfect Channel State Information. IWCMC 2019: 842-847 - 2018
- [c2]Ishan Budhiraja, Sudhanshu Tyagi, Sudeep Tanwar, Neeraj Kumar, Mohsen Guizani:
CR-NOMA Based Interference Mitigation Scheme for 5G Femtocells Users. GLOBECOM 2018: 1-6 - [c1]Vinay Rishiwal, Omkar Singh, Sudeep Tanwar, Sudhanshu Tyagi, Ishan Budhiraja, Neeraj Kumar, Mohammad S. Obaidat:
Base Station Oriented Multi Route Diversity Protocol for Wireless Sensor Networks. GLOBECOM Workshops 2018: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint