Publications

Journal Articles: Total 60
Selected list: 
  1. W. Hill, Y. Acquaah, J. Mason, D. Limbrick, S. Teixeira-Poit. C. Coates and K. Roy "DDoS in SDN: A review of open datasets, attack detection, and mitigation techniques and frameworks, " Discover Applied Sciences, 2024, Springer (Impact Factor: 2.8).
  2. J. Jenkins, and K. Roy "Exploring Deep Convolutional Generative Adversarial Networks (DCGAN) in Biometric Systems: A Survey Study, " Discover AI, 2024, Springer.
  3. M. Bhavsar, Y. Bekele, K. Roy , J. Kelly, and D. LImbrick " FL-IDS: Federated Learning-Based Intrusion Detection System Using Edge Devices for Transportation IoT, " IEEE Access, 2024 (Impact factor:3.9).
  4. R. Davis, K. Roy , and J. Xu " Classifying malware traffic using images and deep convolutional neural network, " IEEE Access, 2024 (Impact factor:3.9), Accepted.
  5. A. Hoenig, K. Roy , Y. Acquaah, S. Yi and S. Desai " Explainable AI for Cyber-Physical Systems: Issues and Challenges, " IEEE Access, 2024 (Impact factor:3.9), Accepted.
  6. F. Demmese, A. Neupane, S. Khorsandroo, M. Wang, and K. Roy , and Y. Fu, " Machine Learning Based Fileless Malware Traffic Classification Using Image Visualization " Cybersecurity, Springer, 2023. (5-Year Impact Factor: 4.8).
  7. R. Mowri, M. Siddula and K. Roy ," Is your feature selection technique efficient enough?: A comparative performance analysis of RFECV feature Selection technique in Ransomware Classification Using SHAP " Discover IoT. Springer Nature, 2023.
  8. Z. Liu, X. Yuan, J. Xu, and K. Roy ," Anomaly-based Intrusion on IoT networks using AIGAN - a Generative Adversarial Network " IEEE Access, 2023 (Impact factor:3.476).
  9. N. Thapa, M. Chaudhury and K. Roy ," Presentation Attack Detection: An Analysis of Spoofing in the Wild (SiW) dataset using Deep Learning Models " Discover AI. Springer Nature, 2023.
  10. O. Odeyomi, B. Ude, and K. Roy ," Online Decentralized Multi-Agents Meta-Learning With Byzantine Resiliency " IEEE Access, 2023 (Impact factor:3.476).
  11. N. Guo, L. Qingge, Y. Huang, P. Yang, K. Roy , and Y. Li, " Blind image quality assessment via multi-perspective consistency " International Journal of Intelligent Systems, Wiley, 2023 (Impact factor:8.993).
  12. M. Bhavsar, K. Roy,, J. Kelly, and O. Odeyomi, " Anomaly-based Intrusion Detection System for IoT Application " Discover IoT. Springer Nature, 2023.
  13. Y. Acquaah, B. Gokaraju, and K. Roy, " Occupancy and Thermal Preference-Based HVAC Control Strategy Using Multi-Sensor Network " IEEE Sensors, 2023. (Impact Factor: 4.325, CiteScore:6.1) DOI: 10.1109/JSEN.2023.3264474.
  14. A. Alrajhi, L. Qingge, J. Kribs, and K. Roy, " Detection of Road Condition Defects Using Multiple Sensors and IoT Technology: A Review" IEEE Open Journal of Intelligent Transportation Systems, 2023.
  15. R. Mowri, M. Siddula, and K. Roy, " A Comparative Performance Analysis of Explainable Machine Learning Models With And Without RFECV Feature Selection Technique Towards Ransomware Classification" Cryptography and Security, 2022.Preprint.
  16. K. Schnell, K. Roy, and M. Siddula " A Descriptive Study of Webpage Designs for Posting Privacy Policies for Different-Sized US Hospitals to Create an Assessment Framework" Future Internet, 2023. (Cite Score: 5.4)
  17. T. Gwyn, and K. Roy, " Examining Gender Bias of Convolutional Neural Networks via Facial Recognition" Future Internet, 2022.Accepted. (Cite Score: 5.4)
  18. D. Smith, S. Khorsandroo, and K. Roy, " Machine Learning Algorithms and Frameworks in Ransomware Detection" IEEE Access, 2022. (Impact Factor: 3.476)
  19. A. Hamoud, A. Hoenig, and K. Roy, " Sentence Subjectivity Analysis of a Political and Ideological Debate Dataset Using LSTM and BiLSTM with Attention and GRU Models" Computer and Information Sciences, Elsevier, 2022.Accepted. (Impact Factor: 8.8, Cite Score: 11.9)
  20. K. Quach, N. Le, C. Duong, I. Jalatar, K. Roy, and K. Luu " Non-Volume Preserving-based Feature Fusion Approach to Group-Level Expression Recognition on Crowd Videos." Pattern Recognition,2022.Accepted. (Impact Factor: 7.74, Cite Score: 15.7)
  21. S. Chittam, B. Gokaraju, Z. Xu, J. Sankar,and K. Roy, " Big Data Mining and Classification of Intelligent Material Science Data using Machine Learning." Applied Sciences,2021.Accepted. (Impact Factor: 2.679, Cite Score: 3.0)
  22. N. Alshareef, X. Yuan, K. Roy , and M. Atay " A Study of Gender Bias in Face Presentation Attack and Its Mitigation." Future Internet,2021.Accepted. (Cite Score: 4.10)
  23. N. Thapa, Z. Liu, A. Shaver and K. Roy ,A. Esterline, and B. Gokaraju " Secure Cyber Defense: An Analysis of Network Intrusion-based Dataset CCD-IDSv1 with Machine Learning and Deep Learning Models," Electronics, 2021 ,Accepted. (Impact Factor: 2.397, Cite Score: 2.7)
  24. A. AlWehaibi, M. Bikdash, M. Albogmi and K. Roy ," A Study of the Performance of Embedding Methods for Arabic Short-Text Sentiment Analysis Using Deep Learning Approaches,"Journal of King Saud University - Computer and Information Sciences,Elsevier ,2021,Accepted. (Impact Factor: 13.473, Cite Score: 10.1)
  25. Z. Liu, N. Thapa, A. Shaver, K. Roy , M. Siddula, X. Yuan, and A. Yu, " Using Embedded Feature Selection and CNN for Classification on CCD-INID-V1-a new IoT dataset," Sensors,2021.Accepted. (Impact Factor: 3.576, Cite Score: 5.8)
  26. S. Almalki, N. Assery, and K. Roy, " An Empirical Evaluation of Online Continuous Authentication and Anomaly Detection Using Mouse Clickstream Data Analysis," Applied Sciences,2021.Accepted. (Impact Factor: 2.679, Cite Score: 3.0)
  27. T. Gwyn, K. Roy , M. Atay," Face Recognition using Popular Deep Net Architectures: A Brief Comparative Study," Future Internet,2021.Accepted. (Cite Score: 4.10)
  28. N. Thapa, M. Chaudhari, A. Iannetta, C. White, K. Roy , R. Newman, L.,Hicks and Dukka KC," A deep learning based approach for prediction of Chlamydomonas reinhardtii phosphorylation sites," Scientific Reports, A Springer Nature Journal, 2021.Accepted. (Impact Factor: 3.99)
  29. N. Assery, X. Yuan, X. Qu, K. Roy, A. Sultan and K. Roy " Evaluating Disaster-Related Tweet Credibility using Content-Based and User-Based Features, " Information Discovery and Delivery, 2021, Accepted.(CiteScore:2.2)
  30. N. Thapa, Z. Liu, B. Gokaraju, D. KC and K. Roy " Comparison of Machine Learning and Deep Learning models for Network Intrusion Detection Systems, " Future Internet 2020, Accepted. (CiteScore:4.10)
  31. J. Mason, P. Chatterjee, R. Dave, K. Roy , and A. Esterline " An Investigation of Biometric Authentication in the Healthcare Environment, " Array Elsevier,2020, Accepted.
  32. M. Chaudhari, N. Thapa, K. Roy , R. Newman, H. Saigo, and Dukka KC, "DeepRMethylSite: A Deep Learning based approach for Prediction of Arginine Methylation sites in Proteins," Molecular Omics, 2020.Accepted. (Impact Factor: 3.743)
  33. J. Jenkins, J. Shelton, and K. Roy " Using Deep Learning Techniques and Genetic-based Feature Extraction for Presentation Attack Mitigation, " Array Elsevier, 2020.
  34. S. Muhuri, P. Chatterjee, X. Yuan, K. Roy ,and A. Esterline, " Using a Long Short-Term Memory Recurrent Neural Network (LSTM-RNN) to Classify Network Attacks, " Information Journal, Special Issue on Machine Learning for Cyber-Security, vol. 11, no. 5, 2020. (CiteScore: 3.0)
  35. H. AlBarakati, D. KC, N. Thapa, H. Saigo, N. Newman, and K. Roy ," RF-MaloSite and DL-Malosite: Methods based on Random Forest and Deep Learning to identify malonylation sites," Computational and Structural Biotechnology Journal, 2020.Accepted. (Impact Factor: 7.271, Cite Score: 5.1)
  36. N. Thapa, M. Chaudhari, S. McManus, K. Roy , R. Newman, H. Saigo, and Dukka KC, "DeepSuccinylSite: a deep learning based approach for protein succinylation site prediction," BMC Bioinformatics, 2019.Accepted. (Impact Factor:3.2)
  37. D. Gunn, Z.Liu, R. Dave, X. Yuan and K. Roy , " Touch-Based Active Cloud Authentication Using Traditional Machine Learning and LSTM on a Distributed Tensorflow Framework, " International Journal of Computational Intelligence and Applications(IJCIA),2019, World Scientific Publishing. Accepted.
  38. C. Kelley, J.Mason, A. Esterline, and K. Roy , " An Empirical Evaluation of User Movement Data on Smartphones, " International Journal of Computational Intelligence and Applications(IJCIA),2019, World Scientific Publishing. Accepted.
  39. N. Aljohani, J. Shelton, and K. Roy , " A secure one time password protocol scheme, " International Journal of Information Privacy, Security and Integrity, 2017. Accepted.
  40. J. Shelton, J. Jenkins, and K. Roy , " Extending disposable feature templates for mitigating replay attacks, " International Journal of Information Privacy, Security and Integrity, 2017. Accepted.
  41. K. Roy, J. Shelton, and A. Esterline , " A Brief Survey on Multispectral Iris Recognition ," International Journal of Applied Pattern Recognition, 2016. Accepted.
  42. K. Roy, J. Shelton, B. O'Connor, and M. Kamel, "Multibiometric System using fuzzy level set and GEFE," IET Biometrics, 2014. (Impact Factor: 1.8, Cite Score:5.0) Accepted.
  43. K. Roy, B. O'Connor, and M. Kamel, "Multibiometric system using level set, modified LBP and random forest," International Journal on Image and Graphics,2014. Published by World Scientific. Accepted.   
  44. K. Roy, P. Bhattacharya, and C. Y. Suen, “Iris segmentation using variational level set method,” Republished in a Virtual Special Issue-Celebrating the Breadth of Biometrics Research (Biometrics 2014), Elsevier Pattern Recognition, 2014. This article has been selected as one of the top 25 biometric articles published by Elsevier so far.(Impact Score: 4.2, CiteScore: 8.2)
  45. K. Roy, P. Bhattacharya, and C. Y. Suen, “Iris segmentation using game theory,” Signal, Image and Video Processing Journal, Springer-Verlag, vol. 6, no. 2, pp. 301-315, 2012.(Impact Score: 1.79)
  46. K. Roy, P. Bhattacharya, and C. Y. Suen, “Iris segmentation using variational level set method,” Optics and Lasers in Engineering, Elsevier, vol. 49, no. 4, pp. 578-588, 2010. DOI:10.1016/j.optlaseng.2010.09.011.(Impact Score: 4.2, CiteScore: 8.2)
  47. K. Roy, P. Bhattacharya, and C. Y.Suen, “Iris recognition using shape guided approach and game theory,” Pattern Analysis and Applications, Springer-Verlag, vol. 14, no. 4, pp. 329-348, 2011. DOI: 10.1007/s10044-011-0229-7.(Impact Factor: 1.5)
  48. K. Roy, P. Bhattacharya, and C. Y.Suen, “Towards nonideal iris recognition based on level set method, genetic algorithms and adaptive asymmetrical SVMs,” Engineering Applications of Artificial Intelligence, Elsevier, vol. 24, no. 3, pp. 458-475, 2011.(Impact Score: 4.2, CiteScore: 8.0)
  49. K. Roy and P. Bhattacharya, “Improvement of iris recognition performance using region-based active contour model,” International Journal of Pattern Recognition and Artificial Intelligence (IJPRAI), vol. 24, no. 8, pp. 1209-1236, 2010, Published by World Scientific.(Impact Score: 1.3)
  50. K. Roy, and P. Bhattacharya, “Iris recognition using genetic algorithms and asymmetrical SVMs,” Machine Graphics & Vision Journal, Published by Institute of Computer Science, Polish Academy of Sciences, vol. 19, no. 1, pp. 1-30, 2009. 
  51. K. Roy and P. Bhattacharya, “Optimal features subset selection and classification for iris recognition,” EURASIP Journal on Image and Video Processing. vol. 2008, Article ID 743103, 20 pages, 2008. doi:10.1155/2008/743103. (Springer open access journal) (Impact Factor: 1.8)

 

Book Chapters:
  1. D. Xie, E. Nuakoh, P. Chatterjee, A. Ghattan, K. Edoh, K. Roy , " Traffic Sign Recognition for Self-Driving Cars with Deep Learning",Advanced Machine Learning Technologies and Applications (AMLTA-2020)Jaipur, India, Feb 13-15, 2020, Proceedings will be Published in Springer LNCS. Accepted. 
  2. A. Deeb, K. Roy ,and K. Edoh, " Drone-based Face Recognition using Deep Learning",Advanced Machine Learning Technologies and Applications (AMLTA-2020)Jaipur, India, Feb 13-15, 2020, Proceedings will be Published in Springer LNCS. Accepted. 
  3. T. Danner, P. Chatterjee, and K. Roy ," A Deep Learning Technique to Countermeasure Video Based Presentation Attacks",Advanced Machine Learning Technologies and Applications (AMLTA-2020)Jaipur, India, Feb 13-15, 2020, Proceedings will be Published in Springer LNCS. Accepted. 
  4. J. Mason, C. Kelley, K. Roy , and A. Esterline, " An Evaluation of User Movement Data", IEA-AIE 2018, Data science, privacy, and security Track, Montreal, Canada, June 25-28, 2018, Proceedings Published in Springer LNAI. 
  5. A. Hamoud, A. Alwehaibi, K. Roy , and Marwan Bikdash1, " Classifying Political Tweets Using Naïve Bayes and Support Vector Machines", IEA-AIE 2018, Data science, privacy, and security Track, Montreal, Canada, June 25-28, 2018, Proceedings Published in Springer LNAI. Accepted. 
  6. P. Chatterjee, K. Roy , ANK Zaman, and A. Esterline, " Anti-spoofing Approach using Deep Convolutional Neural Network", IEA-AIE 2018, Data science, privacy, and security Track, Montreal, Canada, June 25-28, 2018, Proceedings Published in Springer LNAI. Accepted. 
  7. J. Shelton,  J. Jenkins, K. Roy ," Palm Print Identification and Verification using a Genetic-based Feature Extraction Technique " 13th International Conference on Image Analysis and Recognition (ICIAR'16),Póvoa de Varzim, July 13-15, 2016, Portugal. Proceedings appeared in Springer Lecture Note Series in Computer Science (LNCS). Accepted. 
  8. N. Aljohani,  F. Ahmad, K. Roy, and J. Shelton " Multibiometric system using game theory " 12th International Conference on Image Analysis and Recognition (ICIAR'15),Nigara Falls, Canada. Proceedings to be appeared in Springer Lecture Note Series in Computer Science (LNCS).  
  9. P. Arias,  J. Shelton, K. Roy, G. Dozier, and F. Ahmad " Micro Genetic and Evolutionary Feature Extraction: An Exploratory Data Analysis Approach for multispectral iris recognition " 12th International Conference on Image Analysis and Recognition (ICIAR'15),Nigara Falls, Canada. Proceedings appeared in Springer Lecture Note Series in Computer Science (LNCS).  
  10. F. Ahmad, K.Roy, and K. Popplewell, Multispectral Iris Recognition Using Patch Based Game Theory," 11th International Conference on Image Analysis and Recognition (ICIAR'14), 2014 Portugal. Proceedings appeared in Springer Lecture Note Series in Computer Science (LNCS).
  11. K. Roy and P. Bhattacharya, "Iris Recognition Based on Genetic Algorithms and Multi-Class Gaussian Mixture Model," 12th International Workshop on Combinatorial Image Analysis (IWCIA’2008), Buffalo, New York, April 2008. Appeared as a Chapter of the Book Titled "Image Analysis - From Theory to Applications" (ed. R. P. Barneva and V. E. Brimkov), pp. 103-112. Publisher: Research Publishing, 2008. ISBN 978-981-08-0228-8. Presentation Type: Oral. 
  12. K. Roy and P. Bhattacharya, "Optimal Features Selection for Iris Recognition", 12th International Workshop on Combinatorial Image Analysis (IWCIA’2008), Buffalo, New York, April 2008. Appeared as a Chapter of the Book Titled "Image Analysis - From Theory to Applications" (ed. R. P. Barneva and V. E. Brimkov), pp. 113-124. Publisher: Research Publishing, 2008. ISBN 978-981-08-0228-8.Presentation Type: Oral.  


Conference/Workshop/Symposium: Total 145 [Year 2001-Present]

Selected List
  1. A. Jackson, M. Camila Gaitan-Cardenas, K. Roy , B. Aldrich, and J. Mason, " Explainable Machine Learning based Intrusion Detection Systems for IoT, " The 25th International Conference on Internet Computing & IoT, July 22-25, 2024; Las Vegas, USA, Springer Nature.
  2. Q. Holliman, R. Davis, J. Xu, and K. Roy , " Classifying Network Traffic using Images and Deep Convolutional, " The 26th International Conference on Artificial Intelligence, July 22-25, 2024; Las Vegas, USA, Springer Nature.
  3. G. Taylor, D. Johnson, and K. Roy , " Federated Threat Detection within Intelligence Sharing Organizations While Maintaining Privacy, " The 26th International Conference on Artificial Intelligence, July 22-25, 2024; Las Vegas, USA, Springer Nature.
  4. J. Vaughn, Y. Takyiwaa Acquaah, K. Roy , " Anomaly Detection in Cyber-physical systems based on Genetic Algorithm with Dynamic Thresholding Detection, " 2024 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD), Aug 1-2, 2024, IEEE explorer .
  5. D. Machooka, X. Yuan, K. Roy , and G. Chen, " Comparison of LSTM and MLP trained under Differential Privacy for Intrusion Detection, " 2024 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD), Aug 1-2, 2024, IEEE explorer
  6. A. Patel, K. Roy , and M. Bhavsar, " Trustworthy AI for Cyber-Physical Systems--Cyber Defense for Connected and Autonomous Vehicles, " 2024 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD), Aug 1-2, 2024, IEEE explorer
  7. S. Dasgupta, J. Mason, X. Yuan, O. Odeyomi and K. Roy ," Enhancing Deepfake Detection using SE Block Attention with CNN, " 2024 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD), Aug 1-2, 2024, IEEE explorer
  8. A. Roy Chowdhury, H. Moradi, M. Siddula, M. Bhavsar and K. Roy ," Towards Attention Mechanism in Detecting Botnet Attacks for IoT Devices, " 2024 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD), Aug 1-2, 2024, IEEE explorer
  9. D. Johnson and K. Roy ," Generating a distributed network attack dataset based on weather station IoT Cyber Physical Systems, " 2024 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD), Aug 1-2, 2024, IEEE explorer
  10. S. Sanaullah, K. Roy , U. Rückert and T. Jungeblut, " Selection of Optimal Neural Model using Spiking Neural Network for Edge Computing, " 44th IEEE International Conference on Distributed Computing Systems, 23 July - 26 July, 2024, Jersey City, New Jersey, USA.
  11. Y. Acquaah, and K. Roy , " Exploration of Ensemble Methods for Cyber Attack Detection in Cyber-Physical Systems, " 20th International Conference on Artificial Intelligence Applications and Innovations, Ionian University, Corfu, Greece, June 27-30, 2024, SPRINGER IFIP AICT Series.
  12. M. Alam, Y. Acquaah, and K. Roy , " Image-Based Human Action Recognition with Transfer Learning using Grad-CAM for Visualization, " 20th International Conference on Artificial Intelligence Applications and Innovations, Ionian University, Corfu, Greece, June 27-30, 2024, SPRINGER IFIP AICT Series.
  13. J. Jenkins, and K. Roy , " Using DCGANs and HOG+Patch-based CNN for Face Spoofing Mitigation, " 20th International Conference on Artificial Intelligence Applications and Innovations, Ionian University, Corfu, Greece, June 27-30, 2024, SPRINGER IFIP AICT Series.
  14. Sanaullah, Amanullah, K. Roy ,J. Lee, S. Chul-Jun and T. Jungeblut, " A Hybrid Spiking-Convolutional Neural Network Approach for Advancing High-Quality Image Inpainting, " International Conference on Computer Vision (ICCV) 2023.
  15. P. Dave, X. Yuan, M. Siddula, and K. Roy , " Detection of Cyberbullying in GIF using AI, " Intelligent Systems Conference (IntelliSys), September 5-6, 2024, Amsterdam, 2024.
  16. S. Nukala, X. Yuan, K. Roy , and O. Odeyomi " Face Recognition for Blurry Images using Deep Learning, " 2024 4th International Conference on Computer Communication and Artificial Intelligence (CCAI), Xi'an, China, 2024.
  17. A. Zaman, K. Kunku and K. Roy , " Ransomware Detection and Classification using Machine Learning, " 2023 IEEE Symposium Series on Computational Intelligence, Computational Intelligence in Cyber Security (CICS), Mexico City, Mexico, Dec 5-8.
  18. A. Singh and K. Roy , " BLB-GAFS: An Efficient, Multi-Objective Genetic Algorithm Based Feature Selection Method for Intrusion Detection Systems, " 2023 IEEE Symposium Series on Computational Intelligence, Computational Intelligence in Cyber Security (CICS), Mexico City, Mexico, Dec 5-8.
  19. B. Ude, O. Odeyomi, K. Roy , and X. Yuan, " A Survey on Bias Mitigation in Federated Learning, " 2023 IEEE Symposium Series on Computational Intelligence, Computational Intelligence in Cyber Security (CICS), Mexico City, Mexico, Dec 5-8.
  20. Sanaullah, Amanullah, K. Roy ,J. Lee, S. Chul-Jun and Thorsten Jungeblut " A Hybrid Spiking-Convolutional Neural Network Approach for Advancing Machine Learning Models, " Northern Lights Deep Learning Conference 2024 (NLDL), Norway.
  21. S. Sayyafzadeh, H. Chi, W. Xu, and K. Roy , " BERT-Based Sentiment Forensics Analysis for Intrusion Detection, " International Conference on Machine Learning and Applications (ICMLA), 2023.
  22. Sanaullah, Amanullah, K. Roy , J. Lee, S. Chul-Jun and Thorsten Jungeblut, " A Hybrid Spiking-Convolutional Neural Network Approach for Advancing High-Quality Image Inpainting, " International Conference on Computer Vision (ICCV) 2023.
  23. O. Odeyomi, A. Smith, A. Whitmore, and K. Roy , " Personalized Online Federated Learning With Differential Privacy in Constrained Environments: A Meta-Learning Approach, " 2023 IEEE Global Communications Conference: Communication & Information Systems Security.
  24. U. Nannuri, K. Roy , J. Xu, T. Gwyn, and B. Govan, " Identifying Fake and Real Images by Using Masked Face Periocular Region, " The 25th Int'l Conf on Artificial Intelligence, 2023, Las Vegas, USA. IEEE
  25. B. Prakash Reddy Banda, B. Govan, K. Roy and K. Bryant, " Malware detection using Explainable ML models based on Feature Extraction using API calls, " The 2023 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD), SA.
  26. M. Gaitan, M. Abdelsalam, and K. Roy ," Explainable AI-based Intrusion Detection Systems for Cloud and IoT, " The 32nd International Conference on Computer Communications and Networks (ICCCN 2023), Honolulu, HI, USA.
  27. D. Johnson, X. Yuan, and K. Roy ," Using Ensemble Convolutional Neural Network To Detect Deepfakes Using Periocular Data, " Intelligent Systems Conference (IntelliSys) 2023, Amsterdam, Springer.
  28. S. Akintade, S. Kim, and K. Roy ," Explaining Machine Learning-Based Feature Selection of Intrusion Detection Systems with Gradient Boosting Methods, " 19th International Conference on Artificial Intelligence Applications and Innovations, 2023, Spain, Springer.
  29. X. Yuan, J. Hernandez, R. Dejournett, J. Bowser, and K. Roy ," A Comparison of Deep Learning Models for Periocular Region Based Authentication, " Intelligent Systems Conference (IntelliSys) 2023, Springer 2023, Amsterdam.
  30. D. Smith, S. Khorsandroo, and K. Roy ," Supervised and Unsupervised Learning Techniques Utilizing Malware Datasets, " 2nd International Conference on AI in Cybersecurity (ICAIC), University of Houston, Houston, Texas, USA 2023.
  31. R. Mowri, M. Siddula, and K. Roy ," Application of Explainable Machine Learning in Detecting and Classifying Ransomware Families Based on API Call Analysis, " Cryptography and Security. arXiv:2210.11235 [cs.CR]. Preprint 2022.
  32. S. Little, A. Alhamoud, and K. Roy ," Performance Benchmark of Machine Learning-Based Methodology for Swahili News Article Categorization, " 21st International Conference on Machine Learning and Applications(ICMLA 2022), 2022.
  33. K. Marsh, C. Wallace, J. Hernandez, R. Dejournett, X. Yuan, and K. Roy ," Authentication Based on Periocular Biometrics and Skin Tone, " KSU Proceedings on Cybersecurity Education, Research and Practice, 2022.
  34. S. Chesney and K. Roy ," MQTT Intrusion Detection via Traditional Machine Learning and Deep Learning Techniques, " 2022 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD). Proceedings will be published in IEEE explorer
  35. J. Hernandez, R. Dejournett, U. Nannuri, T. Gwyn, X. Yuan, and K. Roy , " Face Authentication from Masked Face Images Using Deep Learning on Periocular Biometrics," 35th International Conference on Industrial, Engineering & Other Applications of Applied Intelligent Systems, 2022. Japan. Proceedings will be published in Springer.
  36. M. Bhavsar, Z. Liu, K. Roy , J. Kelly, and B. Gokaraju " Intrusion based attack detection using machine learning techniques for connected autonomous vehicle, " 35th International Conference on Industrial, Engineering & Other Applications of Applied Intelligent Systems, 2022. Japan. Proceedings will be published in Springer.
  37. Y. Acquaah, B. Gokaraju, K. Roy and R. Tesiero " Machine Learning Techniques to predict real time Thermal Comfort, Preference, Acceptability, and sensation, " 35th International Conference on Industrial, Engineering & Other Applications of Applied Intelligent Systems, 2022. Japan. Proceedings will be published in Springer.
  38. D. Johnson, T. Gwyn, L. Qingge and K. Roy " Deepfake Detection Using Multitask Cascaded Neural Network, " 35th International Conference on Industrial, Engineering & Other Applications of Applied Intelligent Systems, 2022. Japan. Proceedings will be published in Springer.
  39. T. Ojo, H. Chi, J. Elliston and K. Roy " Secondhand Smart IoT Devices Data Recovery and Digital Investigation, " IEEE SoutheastCon 2022. March 31-April 2, Mobile, AL, USA.
  40. K. Schnell and K. Roy " Website Privacy Notification for the Visually Impaired, " 2021 IEEE Symposium on Computational Intelligence in Cybersecurity (CICS 2021),Orlando, FL.
  41. M. Atay, H. Gipson, T.Gwyn and, K. Roy " Evaluation of Gender Bias in Facial Recognition with Traditional Machine Learning Algorithms, " 2021 IEEE Symposium on Computational Intelligence in Cybersecurity (CICS 2021),Orlando, FL.
  42. N. Aljohani, J. Shelton and, K. Roy " Authentication Based on Touch Patterns Using an Artificial Immune System, " 2021 IEEE Symposium on Computational Intelligence in Cybersecurity (CICS 2021),Orlando, FL.
  43. M. Fanuel, X. Yuan, L. Qingge, H. Kim and K. Roy , " A Survey on Skeleton-Based Activity Recognition using Graph Convolutional Networks (GCN," 12th Int'l Symposium on Image and Signal Processing (ISPA 2011), 13-15 September 2021, Zagreb, Croatia. Accepted.
  44. Leyu Gao, Sandeep Shah, N. Assery, X. Yuan, X. Qu, and K. Roy , " Semi-Supervised Self Training to Assess the Credibility of Tweets," The 14th IEEE International Symposium on Social Computing and Networking (IEEE SocialCom 2021), England, October 1-3, New York, USA. Accepted.
  45. S. Shah, P. Muhuri, X. Yuan, K. Roy and P. Chatterjee, " Implementing a Network Intrusion Detection System using Semi-Supervised Support Vector Machine and Random Forest," ACM Southeast (ACMSE) conference, 2021.
  46. M. Vanamala, J. Gilmore, X. Yuan, and K. Roy , " Recommending Attack Patterns for Software Requirements" The 2020 International Conference on Computational Science and Computational Intelligence (CSCI'20: December 16-18, 2020, Las Vegas, USA).
  47. N. Assery, X. Yuan, X. Qu, S. Almalki, and K. Roy , " Identifying Panic Triggers from Disaster-Related Tweets," 13th IEEE International Symposium on Social Computing and Networking (SocialCom-2020), England, UK, 17-19 December 2020.
  48. C. Duong, T. Truong, K. Quach, H. Bui, K. Roy and Khoa Luu, " Vec2Face: Unveil Human Faces from their Blackbox Features in Face Recognition," IEEE Conference on Computer Vision and Pattern Recognition 2020,
  49. T. Gwyn, M. Atay,K. Roy and A. Esterline, " Evaluation of Local Binary Pattern Algorithm for User Authentication with Face Biometric," 19th IEEE International Conference on Machine Learning and Applications 2020,
  50. D. Xie, P. Chatterjee, S. Liu, K. Roy and Edoh Kossi " DeepFake Detection on Publicly Available Datasets using Modified AlexNet, " 2020 IEEE Symposium on Computational Intelligence in Cybersecurity (CICS 2020),
  51. A. Shaver,Z. Liu, N. Thapa, K. Roy , and B. Gokaraju, " Improving Anomaly Based Intrusion Detection System for IoT by Exploring Multi-Class Machine Learning Techniques, " IEEE Applied Imagery Pattern Recognition workshop,
  52. S. Burroughs,K. Roy , and B. Gokaraju, " DeepFakes Detection in Videos using Feature Engineering Techniques in Deep Learning Convolution Neural Network Frameworks, " IEEE Applied Imagery Pattern Recognition workshop,
  53. S. Burroughs,K. Roy ,B. Gokaraju, and Khoa Luu, " Detection Analysis of DeepFake Technology by Reverse Engineering Approach (DREA) of Feature Matching, " International Conference on Machine Intelligence and Smart Systems 2020 (MISS-2K20. Papers will be published by Springer in Algorithm for Intelligent System (AIS) book series.
  54. Z. Liu, A. Shaver, N. Thapa, X.Yuan,and K. Roy , " Anomaly Detection on IoT Network Intrusion Using Machine Learning, " 2020 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD).
  55. M. Vanamala, K. Roy , and X. Yuan, " Topic Modeling and Classification of CVE Database, " 2020 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD).Accepted.
  56. S. Chesney,K. Roy , and S. Khorsandroo, " Machine Learning Algorithms for Preventing IoT Cybersecurity Attacks," Intelligent Systems Conference (IntelliSys) Amsterdam, Netherlands,Sept 3-4, 2020 Springer LNCS
  57. S. Brown,K. Roy , and X.Yuan, " Traffic Sign Recognition using CNNs and HOG," Intelligent Systems Conference (IntelliSys) Amsterdam, Netherlands,Sept 3-4, 2020 Springer LNCS Accepted.
  58. S. Aljbali,and K. Roy , " Anomaly detection using bidirectional LSTM," Intelligent Systems Conference (IntelliSys) Amsterdam, Netherlands,Sept 3-4, 2020 Springer LNCS Accepted.
  59. N. Assery, S. Almalki, X. Yuan, X.Qu,K. Roy , " Comparing Learning-Based Methods for Identifying Disaster-Related Tweets, " 18th IEEE International Conference on Machine Learning and Applications (ICMLA 2019),December 16-19, Boca Raton, Florida, USA.
  60. E. Nuakoh, K. Roy , X. Yuan, and A. Esterline " Deep Learning Approach for U.S. Traffic Sign Recognition, " The 3rd International Conference on Deep Learning Technologies, July 5-7, 2019, Xiamen, China. Proceedings to be published in ACM.
  61. S. Almanki, P. Chatterjee and K. Roy " Continuous authentication using mouse clickstream data analysis, " The 9th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2019) Atlanta, USA, July 14-17, 2019. Springer, LNCS.
  62. M. Montgomery, P. Chatterjee, K. Roy " Touch Analysis: An Empirical Evaluation of Machine Learning Classification Algorithms on Touch Data, " SpaCCS 2019 The 12th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS 2019), Atlanta, Georgia, USA, July 14-17, 2019. Springer, LNCS.
  63. J. Mason, P. Chatterjee, K. Roy ,and A. Esterline " A framework to identify people in unstructured environments incorporating biometrics, " The 9th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2019) Atlanta, USA, July 14-17, 2019. Springer, LNCS.
  64. P. Chatterjee, A. Yalchin, J. Shelton, K. Roy ,X. Yuan, and E. Kossi " Presentation Attack detection using Wavelet Transform and Deep Residual Neural Net, " The 9th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2019) Atlanta, USA, July 14-17, 2019. Springer, LNCS.
  65. N. Shi, X. Yuan, J. Hernandez, K. Roy , and A. Esterline, " Self-learning Semi-supervised Machine Learning for Network Intrusion Detection, " The 2018 International Conference on Computational Science and Computational Intelligence (CSCI'18: December 13-15, 2018, Las Vegas, USA, Cyber Warfare, Cyber Defense, & Cyber Security (CSCI-ISCW)Track, Proceedings will be published in IEEE Explorer.
  66. A. Alwehaibi, and K. Roy , " Comparison of Pre-trained Word Vectors for Arabic Text Classification using Deep Learning Approach, " IEEE 17th International Conference on Machine Learning and Applications ICMLA 2018, Florida, USA, 17-20 December.
  67. A. Dobson, S. Althubiti, K. Roy , X. Yuan, and J. Xu, " Performance Evaluation of Machine Learning Algorithms in Apache Spark for Intrusion Detection, " International Telecommunication Networks and Applications Conference, 21-23 November 2018, University of New South Wales, Sydney, Australia.Proceedings will be published in IEEE Explorer.
  68. S. Althubiti, and K. Roy , " LSTM for Anomaly-Based Network Intrusion Detection," International Telecommunication Networks and Applications Conference, 21-23 November 2018, University of New South Wales, Sydney, Australia, Proceedings will be published in IEEE Explorer.
  69. D. Gunn, K. Roy , and K. Bryant, " Simulated Cloud Authentication Based on Touch Dynamics with SVM, " IEEE Symposium on Computational Intelligence in Cyber Security, Nov 18-21, Bangaluru, India.
  70. W. Leingang, D. Gunn, J. Kim, X. Yuan, K. Roy , " Active Authentication Using Touch Dynamics, " IEEE Southeastcon 2018, Apr 19-23, Tampa, Florida.
  71. D. Hooks, X. Yuan, K. Roy , A. Esterline, and J. Hernandez, " Applying Artificial Immune System for Intrusion Detection, " IEEE BigDataService 2018, Mar 26-29, Germany.
  72. C. Rise, J. Singh,J. Shelton, R. Dave, J. Jenkins, and K. Roy , " Palm Print Authentication on a Cloud Platform, " IEEE International Conference on Advances in Big Data, Computing and Data Communication Systems (icABCD 2018, Durban, South Africa, 6-7 August 2018.
  73. P. Arias, C. Kelley, J. Mason, K. Roy ,and K. Bryant, " An Analysis of User Movement Classification; International Conference on Digital Signal Processing, Tokyo, Japan, Feb 25-27, 2018, Proceedings will be Published in ACM.  
  74. J. Spencer,D. Lawrence, K. Roy , P. Chatterjee, A. Esterline and J. Kim, " Presentation Attack Detection using Convolutional Neural Networks and Local Binary Patterns; First International Conference on Pattern Recognition and Artificial Intelligence, Montreal, Canada, May 14-17, 2018.  
  75. A. Hailemichael,  S. Gebreyohannes, A. Karimoddini, K. Roy , and A.Homaifar, " Development of a Generic and Configurable Fuzzy Logic Systems Library for Real-Time Control Applications using an Object-oriented Approach " IRC 2018- IEEE International Conference on Robotic Computing, CA, Jan 31-Feb 2, 2018.  
  76. N. Aljohani,  J. Shelton, K. Roy , " Continuous Authentication on Smartphones Using Artificial Immune System " Modern AI and Cognitive Science Conference, 2017.  
  77. R. Dellana, and K. Roy , " Performance of Feature-Based Texture Classifiers Versus Convolutional Neural Network Under Sparse Training Data, " IEEE SoutheastCon 2017, Charlotte, NC.  
  78. D. Patel, K. Roy ,and X. Yuan, " Analyzing Network Traffic Data Using Hive Queries, " IEEE SoutheastCon 2017, Charlotte, NC. Accepted. 
  79. J. Jenkins, J.Shelton, and K. Roy , " One-time Password for Biometric Systems: Disposable Feature Templates, " IEEE SoutheastCon 2017, Charlotte, NC.  
  80. M. McDaniel, E. Sloan, S. Day, J. Mayes, W. Nick, K. Roy , and A. Esterline, " Situation-Based Ontologies for a Computational Framework for Identity Focusing on Crime Scenes," CogSIMA 2017, Savannah, GA.  
  81. F. Ahmad, J. Shelton, and K. Roy , " Multispectral iris recognition based on group selection and game theory, " SPIE 2017 (Defense + Security) Symposium, Anaheim, CA.  
  82. R. Dellana, and K. Roy , " Data Augmentation in CNN-based Periocular Authentication " The 6th IEEE International Conference on Information Communication and Management (ICICM 2016).  [Received excellent paper award]
  83. J. Jenkins, J. Shelton, and K. Roy , " A Comparison of Genetic Based Extraction Methods for Periocular Recognition " The 6th IEEE International Conference on Information Communication and Management (ICICM 2016).  
  84. N. Aljohani, J. Shelton, K. Roy and A. Esterline, " Robust Password System Based on Dynamic Factors " The 6th IEEE International Conference on Information Communication and Management (ICICM 2016). 
  85. Y. Lee, W. Hetchiliy, J. Shelton, D. Gunn, K. Roy , A. Esterline, and X. Yuan, " Touch Based Active User Authentication using Deep Belief Networks and Random Forests " The 6th IEEE International Conference on Information Communication and Management (ICICM 2016). 
  86. P. Chopade, J. Zhan, K. Roy and K. Flurchick, " Real-time large-scale big data networks analytics and visualization architecture " The 12th IEEE International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT 2015), Oct 19-20, 2015, Melville, NY, pp 1-6. 
  87. J. Shelton,  K. Roy, J. Brown and G. Dozier, " Micro-dimensional feature extraction for multispectral iris recognition " IEEE SoutheastCon 2016, March 30 - April 3, Norfolk VA.  
  88. J. Shelton,  J. Jenkins, K. Roy, , and A. Sumner, " Genetic based Local Ternary Pattern Feature Extraction for Mitigating Replay Attacks " IEEE SoutheastCon 2016, March 30 - April 3, Norfolk VA.  
  89. J. Jenkins,  J. Bloch, W. Nick and K. Roy, ,and A. Esterline, " Author Identification using Sequential Minimal Optimization " IEEE SoutheastCon 2016, March 30 - April 3, Norfolk VA.  
  90. Y. Rao Bachupally,  X. Yuan, and K. Roy, , " Network Security Analysis Using Big Data Technology " IEEE SoutheastCon 2016, March 30 - April 3, Norfolk VA.  
  91. P. Arias,  J. Shelton, K. Roy , G. Dozier and F. Ahmad, " Multispectral iris recognition using GEFE " Modern AI and Cognitive Science Conference, 2015.  
  92. F. Ahmad, K.Roy,J. Shelton, B. O'Connor, A. Esterline, and G. Dozier, "Face Recognition Using Game Theory" 7th ICMLC 2015. Accepted.  [Received the best oral presentation award, Extended version appeared in a Journal]
  93. J. Shelton, K. Roy, F. Ahmad, B. O’Connor, "Iris Recognition Using Level Set and hGEFE," IEEE SMC 2014, San Diego, CA.
  94. K. Popplewell, K. Roy, F. Ahmad, and J. Shelton, "Multispectral Iris Recognition Utilizing Hough Transform and Modified LBP," IEEE SMC 2014, San Diego, CA.
  95. S. Ainala, and K. Roy, "Study of body fat density," National Consortium for Data Science (NCDS), 2014.
  96. B. O’Connor, K. Roy, and G. Dozier, “Iris recognition using distance regularized level set method and modified LBP,” International conference on communication systems and computational intelligence (CCSCI 2014), Proceedings to be appeared in Springer Lecture Note Series in Computer Science (LNCS). [Received Best Oral Paper Award, Extended Version Appeared in a Journal ]
  97. H. Williams, J. Carter, W. Campbell, K. Roy, and G. Dozier, “Genetic & evolutionary feature selection for author identification of HTML associated with malware,” International Conference on Machine Learning and Computing (ICMLC 2014).
  98. K.Roy, "Iris Recognition using Region-Based Active Contour Model and Modified LBP", IEEE Conference on SMC, Manchester, UK, 2013. Accepted for publication.
  99. K. Roy and M.S. Kamel,  "Facial Expression Recognition using Game Theory" 5th INNS IAPR TC3 GIRPR International Workshop on Artificial Neural Networks in Pattern Recognition (ANNPR 2012), Trento, Italy.  Proceedings appeared in Springer Lecture Note Series in Artificial Intelligence (LNAI). 
  100. K. Roy and M.S. Kamel,  "Facial Expression Recognition using Game Theory and Particle Swarm Optimization"  6th International Conference on Computer Vision and Graphics (ICCVG'12), Poland.  Proceedings appeared in Springer Lecture Note Series in Computer Science (LNCS). 
  101. K. Roy and M.S. Kamel,  "Multibiometric System Using Distance Regularized Level Set Method and Particle Swarm Optimization"  6th International Conference on Computer Vision and Graphics (ICCVG'12), Poland.  Proceedings Springer Lecture Note Series in Computer Science (LNCS). [This paper combines iris, palmprint and fingerprint biometrics]
  102. K. Roy and M.S. Kamel, "Multibiometric System Using Level Set Method and Particle Swarm Optimization"  8th International Conference on Image Analysis and Recognition (ICIAR'12), Portugal. Proceedings appeared in Springer Lecture Note Series in Computer Science (LNCS). [This paper combines iris, face and gait biometrics]
  103. K. Roy, P. Bhattacharya, and C. Y. Suen, "Recognition of unideal iris images using region-based active contour model and game theory' 17th International Conference on Image Processing (ICIP 2010), Hong Kong, Sept 26-29, 2010.
  104. K. Roy, P. Bhattacharya, and C. Y. Suen, “Unideal iris segmentation using game theory” 20th IAPR IEEE International Conference on Pattern Recognition (ICPR’2010), Istanbul, Aug 23-26, 2010: (Oral Paper acceptance rate is 17%)
  105. K. Roy, C. Y. Suen, and P. Bhattacharya and, "Unideal iris segmentation using region-based active contour model" 7th International Conference on Image Analysis and Recognition (ICIAR'10), Portugal. Proceedings appeared in Springer Lecture Note Series in Computer Science (LNCS).
  106. K. Roy and P. Bhattacharya, "Variational level set method and game theory applied for nonideal iris recognition," 16th IEEE International Conference on Image Processing (ICIP'09), pp. 2721 - 2724,  Cairo, Egypt, Nov. 7-11, 2009. Print ISBN: 978-1-4244-5653-6. E-ISBN : 978-1-4244-5655-0.
  107. K. Roy and P. Bhattacharya, “Noncooperative Iris Recognition based on Level Set Method and Game Theory,” 7th International Conference on Computer Vision Systems (ICVS'09), Liège, Belgium, Oct. 13-15, 2009. Proceedings appeared in Springer Lecture Note Series in Computer Science (LNCS).
  108. K. Roy and P. Bhattacharya, “Iris Recognition in Nonideal Situations,” 12th Information Security Conference (ISC'09), Pisa, Italy, Sept 7-9 2009. Proceedings appeared in Springer Lecture Note Series in Computer Science (LNCS).
  109. K. Roy and P. Bhattacharya, “Level Set Approaches and Adaptive Asymmetrical SVMs Applied for Nonideal Iris Recognition,” 6th International Conference on Image Analysis and Recognition (ICIAR'09), Canada. Proceedings appeared in Springer Lecture Note Series in Computer Science (LNCS).
  110. K. Roy and Prabir Bhattacharya, "Iris Recognition based on Variational Level Set method in Noisy Situations", 4th IEEE International Conference on Internet Technology and Secured Transactions (ICITST-2009) in London, UK, November 9-122009.
  111. A. Mondal, K. Roy and Prabir Bhattacharya, "Secure Biometric System for Accessing Home Appliances via Internet", 4th IEEE International Conference on Internet Technology and Secured Transactions (ICITST-2009) in London, UK, November 9-122009.
  112. A. Mondal, K. Roy and Prabir Bhattacharya, "Secure and Simplified Access to Home Appliance using Iris Recognition", IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications (CIB 2009), Nashville, Tennessee 37214, USA, 2009.
  113. K. Roy and P. Bhattacharya, "Adaptive Asymmetrical SVM and Genetic Algorithms Based Iris Recognition",  19th IAPR IEEE International Conference on Pattern Recognition (ICPR'2008), Tampa, Florida, USA, December 8-11, 2008. Presentation Type: Oral.  (Oral Paper acceptance rate is 18%)
  114. K. Roy and P. Bhattacharya, “Improving Feature Subset Selection using Genetic Algorithms for Iris Recognition”, 3rd International Workshop on Artificial Neural Networks in Pattern Recognition (ANNPR'08), Pierre & Marie Curie University, Paris, France, July 2-4, 2008. Proceedings appeared in the Springer Lecture Note Series in Artificial Intelligence (LNAI), vol. 5064/2008, pp. 292-304 (2008). Presentation Type: Oral.
  115. K. Roy and P. Bhattacharya, “Optimal Features Subset Selection using Genetic Algorithms for Iris Recognition”, 5th International Conference on Image Analysis and Recognition (ICIAR'08), Portugal, June 25-27, 2008. Proceedings Appeared in the Springer Lecture Note Series in Computer Science (LNCS), vol. 5112, pp. 894-904 (2008).Presentation Type: Oral. 
  116. K. Roy and P. Bhattacharya, “Application of multi-objective genetic algorithm and asymmetrical SVM to improve the reliability of an iris recognition system” IEEE conference on Systems, Man, and Cybernetics (SMC’2007), Oct. 7-10, 2007, Montreal, Canada. Vol. 4. Pages 1952-1957. Presentation Type: Oral.
  117. K. Roy and P. Bhattacharya, ”Iris recognition using collarette boundary localization and asymmetrical SVM” in International conference on image analysis and recognition (ICIAR’2007), Montreal, Canada, Aug. 22-24, 2007, Proceedings appeared in the Springer Lecture Note Series in Computer Science (LNCS), vol. 4633 Pages 854-865.Presentation Type: Oral.
  118. K. Roy and P. Bhattacharya, ”Multi-objective genetic algorithm and asymmetrical SVM for efficient iris recognition” International conference on image analysis and processing (ICIAP’2007), Sept. 10-14, 2007, Modena, Italy. Pages 3-8 IEEE Computer Society Press. Presentation Type: Oral.
  119. K. Roy and P. Bhattacharya ”An Iris Recognition Method based on Zigzag Collarette Area and Asymmetrical Support Vector Machines”, in IEEE conference on Systems, Man, and Cybernetics (SMC’2006), 8-11 October, 2006, Taiwan. Pages 861-865. Presentation Type: Oral.
  120. K. Roy and P. Bhattacharya, “Iris Recognition with Support Vector Machine,” IAPR International Conference on Biometric Authentication (ICBA'2006), Hong Kong, January 2006. Proceedings appeared in the Springer Lecture Note Series in Computer Science (LNCS), vol. 3882. Pages 486-492.Presentation Type: Poster.
  121. K. Roy and P. Bhattacharya, “An Improved Iris Recognition System using Zigzag Collarette Area and Support Vector Machine” in XXIII International Biometric Conferences (IBC’2006), 16-21 July, 2006, Quebec, Canada. Presentation Type: Oral.

Theses
  1. Title: "Recognition of nonideal iris images using shape guided approach and game theory", PhD thesis, Dept. of Computer Science, Concordia University, Montreal, QC, Canada. [Nominated for Governor's General Gold Medal of Canada]
  2. Title: “Iris Recognition using support vector machines”, Master’s thesis, Dept. of Computer Science, Concordia University, Montreal, QC, Canada.
  3. Title: “An approach to implement the speech recognition system using artificial neural network”, Master’s Thesis, Dept. of Computer Science and Technology, University of Rajshahi, Rajshahi, Bangladesh.