« RETURN TO DIRECTORY

Kaushik Roy

Professor/Chair

North Carolina Agricultural and Technical State University
Google Scholar

College
College of Engineering

Department
Computer Science

Contact
Martin Complex 311
Education
Ph.D.Computer Science / Concordia University
M.S.Computer Science / Concordia University
M.S.Computer Science & Technology / University of Rajshahi
B.S.Computer Science & Technology / University of Rajshahi

Bio

Dr. Kaushik Roy is a Professor and Chair in the Department of Computer Science at North Carolina A&T State University (NCAT). Dr. Roy holds a Jefferson-Pilot/Ron McNair Endowed Chair position in the Department of Computer Science. Dr. Roy has been the PI/Co-PI on $23M (as a PI $14M) in research grants funded by the National Science Foundation (NSF), Department of Defense (DoD), National Security Agency (NSA), Department of Energy (DoE), and CISCO Systems. His current research is heavily focused on cybersecurity, cyber identity, biometrics, machine learning (deep learning), computer vision, NLP, and big data analytics. He has over 190 publications, including 54 journal articles. Dr. Roy is a director of the Center for Cyber Defense (CCD)(A National Center of Academic Excellence in Cybersecurity (NCAE-C), CAE-R and CAE-CD). Dr. Roy directs the Center for Trustworthy AI. Dr. Roy also directs the Cyber Defense and AI lab.
For further information, please visit his homepage: https://kaushikroy.github.io

Research Interests

Cybersecurity, Cyber Identity and Biometrics, IoT, Cyber-Physical Systems, Gen AI and Large Language Models, Computer Vision, AI and Machine Learning, and Big Data.

External URL

https://kaushikroy.github.io

Recent Publications

  • Roger Davis, Jinsheng Xu, Kaushik Roy (2024). (Classifying malware traffic using images and deep convolutional neural network). IEEE Access.
  • Abdulrahman Alrajhi, Kaushik Roy, Letu Qingge, James Kribs (2023). (Detection of Road Condition Defects Using Multiple Sensors and IoT Technology: A Review). (IEEE Open Journal of Intelligent Transportation Systems) IEEE.
  • Swetha Chittam, Balakrishna Gokaraju, Zhigang Xu, Jagannathan Sankar, Kaushik Roy (2021). (Big Data Mining and Classification of Intelligent Material Science Data Using Machine Learning). (18) 11, pp. 8596. Applied Sciences.
  • D. Gunn, Z. Liu, R. Dave, X Yuan, Kaushik Roy (2020). (Active cloud authentication based on touch dynamics with distributed TensorFlow). International Journal of Computational Intelligence and Applications.
  • C Kelley, J. Mason, A. Esterline, Kaushik Roy (2020). (An empirical evaluation of user movement data on smartphone). International Journal of Computational Intelligence and Applications.
  • Niraj Thapa, Meenal Chaudhari, Sean McManus , Kaushik Roy, Robert Newman, Hiroto Saigo, Dukka KC (2020). (DeepSuccinylSite: a deep learning based approach for protein succinylation site prediction). (63) 21, BMC Bioinformatics.
  • Hussam AL barakati, NIraj Thapa, Saigo Hiroto, Kaushik Roy, Robert Newman, Dukka KC (2020). (RF-MaloSite and DL-Malosite: Methods based on random forest and deep learning to identify malonylation sites). 18, pp. 852-860. Computational and Structural Biotechnology Journal.
  • Janelle Mason, Prosenjit Chatterjee, Kaushik Roy, Albert Esterline (2019). (A Framework to Identify People in Unstructured Environments Incorporating Biometrics). (Security, Privacy, and Anonymity in Computation, Communication, and Storage) pp. 65-75. Springer International Publishing.
  • Christopher Kelley, Janelle Mason, Albert Esterline, Kaushik Roy (2019). (An Empirical Evaluation of User Movement Data on Smartphones). (04) 18, pp. 1950025. International Journal of Computational Intelligence and Applications.
  • Sultan Almalki, Prosenjit Chatterjee, Kaushik Roy (2019). (Continuous Authentication Using Mouse Clickstream Data Analysis). (Security, Privacy, and Anonymity in Computation, Communication, and Storage) pp. 76-85. Springer International Publishing.
  • Rushit Dave, Evelyn R Sowells Boone, Kaushik Roy (2019). (Efficient Data Privacy and Security in Autonomous Cars). (1) 7, pp. 31-36. Journal of Computer Sciences and Applications.
  • Melodee Montgomery, Prosenjit Chatterjee, John Jenkins, Kaushik Roy (2019). (Touch Analysis: An Empirical Evaluation of Machine Learning Classification Algorithms on Touch Data). (Security, Privacy, and Anonymity in Computation, Communication, and Storage) pp. 147-156. Springer International Publishing.
  • Janelle Mason, Christopher Kelley, Bisoye Olaleye, Albert Esterline, Kaushik Roy (2018). (An Evaluation of User Movement Data). (Lecture Notes in Computer Science) pp. 729-735. Springer International Publishing.
  • Ahmed Hamoud, Ali Alwehaibi, Kaushik Roy, Marwan Bikdash (2018). (Classifying Political Tweets Using Naïve Bayes and Support Vector Machines). (Lecture Notes in Computer Science) pp. 736-744. Springer International Publishing.
  • Nawaf Aljohani, Joseph Shelton, Kaushik Roy (2017). (A secure one time password protocol schema). (2) 3, International Journal of Information Privacy, Security and Integrity.
  • Joseph Shelton, John Jenkins, Kaushik Roy (2017). (Extending disposable feature templates for mitigating replay attacks). (2) 3, International Journal of Information Privacy, Security and Integrity.
  • Foysal Ahmad, Kaushik Roy, Brian O'Connor, Joseph Shelton, Pablo Arias, Albert Esterline, Gerry Dozier (2015). (Face recognition utilizing patch based game theory). (4) 5, pp. 5. International Journal of Machine Learning and Computing.
  • Kaushik Roy, Prabir Bhattacharya, Ching Suen (2014). (Iris segmentation using variational level set method). Virtual Special Issue-Celebrating the Breadth of Biometrics Research (Biometrics 2014) Republished.
  • Kaushik Roy, Brian O'Connor, Mohamed Kamel (2014). (Multibiometric system using level set, modified LBP and random forest). (3) 14, pp. 19. International Journal of Image and Graphics.
  • Brian O’Connor, Kaushik Roy (2013). (Facial Recognition using Modified Local Binary Pattern and Random Forest). International Journal.
  • Kaushik Roy, Mohamed Kamel (2012). (Facial expression recognition using game theory). (Artificial Neural Networks in Pattern Recognition) pp. 139–150. Springer.
  • Kaushik Roy, Prabir Bhattacharya, Ching Suen (2012). (Iris segmentation using game theory). (2) 6, pp. 301–315. Signal, Image and Video Processing.
  • Kaushik Roy, Mohamed Kamel (2012). (Multibiometric system using level set method and particle swarm optimization). (Image Analysis and Recognition) pp. 20–29. Springer.
  • Kaushik Roy, Prabir Bhattacharya, Ching Suen (2011). (Iris segmentation using variational level set method). (4) 49, pp. 578–588. Optics and Lasers in Engineering.
  • Kaushik Roy, Prabir Bhattacharya, Ching Suen (2011). (Towards nonideal iris recognition based on level set method, genetic algorithms and adaptive asymmetrical SVMs). (3) 24, pp. 458–475. Engineering Applications of Artificial Intelligence.
  • Kaushik Roy, Prabir Bhattacharya (2010). (Improvement of iris recognition performance using region-based active contours, genetic algorithms and SVMs). (08) 24, pp. 1209–1236. International Journal of Pattern Recognition and Artificial Intelligence.
  • Kaushik Roy, Prabir Bhattacharya (2010). (Iris recognition using genetic algorithms and asymmetrical SVMs). (1) 19, pp. 33–62. Machine Graphics & Vision International Journal.
  • Kaushik Roy, Prabir Bhattacharya, Ching Suen (2010). (Unideal iris segmentation using region-based active contour model). (Image Analysis and Recognition) pp. 256–265. Springer.
  • Kaushik Roy, Prabir Bhattacharya (2009). (Iris recognition in nonideal situations). (Information Security) pp. 143–150. Springer.
  • Kaushik Roy, Prabir Bhattacharya (2009). (Level set approaches and adaptive asymmetrical SVMs applied for nonideal iris recognition). (Image Analysis and Recognition) pp. 418–428. Springer.
  • Kaushik Roy, Prabir Bhattacharya (2009). (Nonideal iris recognition using level set approach and coalitional game theory). (Computer Vision Systems) pp. 394–402. Springer.
  • Kaushik Roy, Prabir Bhattacharya (2009). (Variational level set method and game theory applied for nonideal iris recognition). pp. 2721–2724. Proc. Int. Conf. on Image Process (ICIP).
  • Kaushik Roy, Prabir Bhattacharya (2008). (Improving features subset selection using genetic algorithms for iris recognition). (Artificial Neural Networks in Pattern Recognition) pp. 292–304. Springer.
  • Kaushik Roy, Prabir Bhattacharya (2008). (Iris Recognition: A Machine Learning Approach). VDM Verlag.
  • Kaushik Roy, Prabir Bhattacharya (2008). (Optimal features subset selection using genetic algorithms for iris recognition). (Image Analysis and Recognition) pp. 894–904. Springer.
  • Kaushik Roy, Prabir Bhattacharya (2007). (Iris recognition based on zigzag collarette region and asymmetrical support vector machines). (Image Analysis and Recognition) pp. 854–865. Springer.
  • Kaushik Roy, Prabir Bhattacharya (2005). (Iris recognition with support vector machines). (Advances in Biometrics) pp. 486–492. Springer.
  • Kaushik Roy, Dipankar Das, M Ali (2002). (Development of the speech recognition system using artificial neural network). Proc. 5th international conference on computer and information technology (ICCIT02).
  • Foysal Ahmad, Kaushik Roy, Brian O’Connor, Joseph Shelton, Gerry Dozier, Ian Dworkin (Fly Wing Biometrics Using Modified Local Binary Pattern, SVMs and Random Forest).
  • Henry Williams, Joi Carter, Willie Campbell, Kaushik Roy, Gerry Dozier (Genetic & Evolutionary Feature Selection for Author Identification of HTML Associated with Malware).
  • Brian O’Connor, Kaushik Roy, Joseph Shelton, Gerry Dozier (Iris Recognition Using Fuzzy Level Set and GEFE).
  • Joseph Shelton, Kaushik Roy, Brian O’Connor, Gerry Dozier (Mitigating Iris-Based Replay Attacks).
  • Xiaohong Yuan, Kaushik Roy, Albert Esterline (Using a Long Short-Term Memory Recurrent Neural Network (LSTM-RNN) to Classify Network Attacks,). (5) 11, Information Journal, Special Issue on Machine Learning for Cyber-Security.