Kaushik Roy

Orcid: 0000-0002-9026-5322

Affiliations:
  • North Carolina State University, Raleigh, NC, USA


According to our database1, Kaushik Roy authored at least 83 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
FL-IDS: Federated Learning-Based Intrusion Detection System Using Edge Devices for Transportation IoT.
IEEE Access, 2024

2023
Is iterative feature selection technique efficient enough? A comparative performance analysis of RFECV feature selection technique in ransomware classification using SHAP.
Discov. Internet Things, December, 2023

Anomaly-based intrusion detection system for IoT application.
Discov. Internet Things, December, 2023

Machine learning based fileless malware traffic classification using image visualization.
Cybersecur., December, 2023

A Descriptive Study of Webpage Designs for Posting Privacy Policies for Different-Sized US Hospitals to Create an Assessment Framework.
Future Internet, March, 2023

Presentation attack detection: an analysis of spoofing in the wild (SiW) dataset using deep learning models.
Discov. Artif. Intell., 2023

Presentation Attack Detection using Convolutional Neural Networks and Local Binary Patterns.
CoRR, 2023

Fairness in Visual Clustering: A Novel Transformer Clustering Approach.
CoRR, 2023

Online Decentralized Multi-Agents Meta-Learning With Byzantine Resiliency.
IEEE Access, 2023

Anomaly-Based Intrusion on IoT Networks Using AIGAN-a Generative Adversarial Network.
IEEE Access, 2023

A Survey on Bias Mitigation in Federated Learning.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2023

Supervised and Unsupervised Learning Techniques Utilizing Malware Datasets.
Proceedings of the IEEE 2nd International Conference on AI in Cybersecurity, 2023

2022
Non-volume preserving-based fusion to group-level emotion recognition on crowd videos.
Pattern Recognit., 2022

Sentence subjectivity analysis of a political and ideological debate dataset using LSTM and BiLSTM with attention and GRU models.
J. King Saud Univ. Comput. Inf. Sci., 2022

A study of the performance of embedding methods for Arabic short-text sentiment analysis using deep learning approaches.
J. King Saud Univ. Comput. Inf. Sci., 2022

Examining Gender Bias of Convolutional Neural Networks via Facial Recognition.
Future Internet, 2022

A Comparative Performance Analysis of Explainable Machine Learning Models With And Without RFECV Feature Selection Technique Towards Ransomware Classification.
CoRR, 2022

Interpretable Machine Learning for Detection and Classification of Ransomware Families Based on API Calls.
CoRR, 2022

Correction: DeepSuccinylSite: a deep learning based approach for protein succinylation site prediction.
BMC Bioinform., 2022

Machine Learning Algorithms and Frameworks in Ransomware Detection.
IEEE Access, 2022

Face Authentication from Masked Face Images Using Deep Learning on Periocular Biometrics.
Proceedings of the Advances and Trends in Artificial Intelligence. Theory and Practices in Artificial Intelligence, 2022

Deepfake Detection Using CNN Trained on Eye Region.
Proceedings of the Advances and Trends in Artificial Intelligence. Theory and Practices in Artificial Intelligence, 2022

Intrusion-Based Attack Detection Using Machine Learning Techniques for Connected Autonomous Vehicle.
Proceedings of the Advances and Trends in Artificial Intelligence. Theory and Practices in Artificial Intelligence, 2022

Machine Learning Techniques to Predict Real Time Thermal Comfort, Preference, Acceptability, and Sensation for Automation of HVAC Temperature.
Proceedings of the Advances and Trends in Artificial Intelligence. Theory and Practices in Artificial Intelligence, 2022

Performance Benchmark of Machine Learning-Based Methodology for Swahili News Article Categorization.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022

IoT to Structured Data (IoT2SD): A Big Data Information Extraction Framework.
Proceedings of the 1st International Conference on AI in Cybersecurity, 2022

2021
Using Embedded Feature Selection and CNN for Classification on CCD-INID-V1 - A New IoT Dataset.
Sensors, 2021

Face Recognition Using Popular Deep Net Architectures: A Brief Comparative Study.
Future Internet, 2021

A Study of Gender Bias in Face Presentation Attack and Its Mitigation.
Future Internet, 2021

Website Privacy Notification for the Visually Impaired.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2021

Evaluation of Gender Bias in Facial Recognition with Traditional Machine Learning Algorithms.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2021

Authentication Based on Touch Patterns Using an Artificial Immune System.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2021

Semi-Supervised Self Training to Assess the Credibility of Tweets.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

A Survey on Skeleton-Based Activity Recognition using Graph Convolutional Networks (GCN).
Proceedings of the 12th International Symposium on Image and Signal Processing and Analysis, 2021

Implementing a network intrusion detection system using semi-supervised support vector machine and random forest.
Proceedings of the ACM SE '21: 2021 ACM Southeast Conference, 2021

2020
DeepSuccinylSite: a deep learning based approach for protein succinylation site prediction.
BMC Bioinform., April, 2020

Using a Long Short-Term Memory Recurrent Neural Network (LSTM-RNN) to Classify Network Attacks.
Inf., 2020

Comparison of Machine Learning and Deep Learning Models for Network Intrusion Detection Systems.
Future Internet, 2020

An Investigation of Biometric Authentication in the Healthcare Environment.
Array, 2020

Using deep learning techniques and genetic-based feature extraction for presentation attack mitigation.
Array, 2020

DeepFake Detection on Publicly Available Datasets using Modified AlexNet.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020

Identifying Panic Triggers from Disaster-Related Tweets.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

Machine Learning Algorithms for Preventing IoT Cybersecurity Attacks.
Proceedings of the Intelligent Systems and Applications, 2020

US Traffic Sign Recognition Using CNNs.
Proceedings of the Intelligent Systems and Applications, 2020

Evaluation of Local Binary Pattern Algorithm for User Authentication with Face Biometric.
Proceedings of the 19th IEEE International Conference on Machine Learning and Applications, 2020

Vec2Face: Unveil Human Faces From Their Blackbox Features in Face Recognition.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

Anomaly Based Intrusion Detection for IoT with Machine Learning.
Proceedings of the 49th IEEE Applied Imagery Pattern Recognition Workshop, 2020

DeepFakes Detection in Videos using Feature Engineering Techniques in Deep Learning Convolution Neural Network Frameworks.
Proceedings of the 49th IEEE Applied Imagery Pattern Recognition Workshop, 2020

2019
An Empirical Evaluation of User Movement Data on Smartphones.
Int. J. Comput. Intell. Appl., 2019

Touch-Based Active Cloud Authentication Using Traditional Machine Learning and LSTM on a Distributed Tensorflow Framework.
Int. J. Comput. Intell. Appl., 2019

Touch Analysis: An Empirical Evaluation of Machine Learning Classification Algorithms on Touch Data.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

A Framework to Identify People in Unstructured Environments Incorporating Biometrics.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

Presentation Attack Detection Using Wavelet Transform and Deep Residual Neural Net.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

Continuous Authentication Using Mouse Clickstream Data Analysis.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

Comparing Learning-Based Methods for Identifying Disaster-Related Tweets.
Proceedings of the 18th IEEE International Conference On Machine Learning And Applications, 2019

Deep Learning Approach for U.S. Traffic Sign Recognition.
Proceedings of the 2019 3rd International Conference on Deep Learning Technologies, 2019

2018
Simulated Cloud Authentication Based on Touch Dynamics with SVM.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2018

Performance Evaluation of Machine Learning Algorithms in Apache Spark for Intrusion Detection.
Proceedings of the 28th International Telecommunication Networks and Applications Conference, 2018

Development of a Generic and Configurable Fuzzy Logic Systems Library for Real-Time Control Applications Using an Object-Oriented Approach.
Proceedings of the Second IEEE International Conference on Robotic Computing, 2018

An Evaluation of User Movement Data.
Proceedings of the Recent Trends and Future Technology in Applied Intelligence, 2018

Classifying Political Tweets Using Naïve Bayes and Support Vector Machines.
Proceedings of the Recent Trends and Future Technology in Applied Intelligence, 2018

Anti-spoofing Approach Using Deep Convolutional Neural Network.
Proceedings of the Recent Trends and Future Technology in Applied Intelligence, 2018

Comparison of Pre-Trained Word Vectors for Arabic Text Classification Using Deep Learning Approach.
Proceedings of the 17th IEEE International Conference on Machine Learning and Applications, 2018

Classification of User Movement Data.
Proceedings of the 2nd International Conference on Digital Signal Processing, 2018

Applying Artificial Immune System for Intrusion Detection.
Proceedings of the Fourth IEEE International Conference on Big Data Computing Service and Applications, 2018

2017
Extending disposable feature templates for mitigating replay attacks.
Int. J. Inf. Priv. Secur. Integr., 2017

A secure one time password protocol schema.
Int. J. Inf. Priv. Secur. Integr., 2017

Continuous Authentication on Smartphones Using An Artificial Immune System.
Proceedings of the 28th Modern Artificial Intelligence and Cognitive Science Conference 2017, 2017

Situation-based ontologies for a computational framework for identity focusing on crime scenes.
Proceedings of the IEEE Conference on Cognitive and Computational Aspects of Situation Management, 2017

2016
A brief survey on multispectral iris recognition.
Int. J. Appl. Pattern Recognit., 2016

Palm Print Identification and Verification Using a Genetic-Based Feature Extraction Technique.
Proceedings of the Image Analysis and Recognition - 13th International Conference, 2016

2015
Multibiometric system using fuzzy level set, and genetic and evolutionary feature extraction.
IET Biom., 2015

Multispectral Recognition Using Genetic and Evolutionary Feature Extraction.
Proceedings of the 26th Modern AI and Cognitive Science Conference 2015, 2015

Micro Genetic and Evolutionary Feature Extraction: An Exploratory Data Analysis Approach for Multispectral Iris Recognition.
Proceedings of the Image Analysis and Recognition - 12th International Conference, 2015

Mutibiometric System Based on Game Theory.
Proceedings of the Image Analysis and Recognition - 12th International Conference, 2015

2014
Multibiometric System Using Level Set, Modified LBP and Random Forest.
Int. J. Image Graph., 2014

Iris recognition using Level Set and hGEFE.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

Multispectral iris recognition utilizing hough transform and modified LBP.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

Multispectral Iris Recognition Using Patch Based Game Theory.
Proceedings of the Image Analysis and Recognition - 11th International Conference, 2014

2012
Multibiometric System Using Level Set Method and Particle Swarm Optimization.
Proceedings of the Image Analysis and Recognition - 9th International Conference, 2012

Multibiometric System Using Distance Regularized Level Set Method and Particle Swarm Optimization.
Proceedings of the Computer Vision and Graphics - International Conference, 2012

Facial Expression Recognition Using Game Theory and Particle Swarm Optimization.
Proceedings of the Computer Vision and Graphics - International Conference, 2012

Facial Expression Recognition Using Game Theory.
Proceedings of the Artificial Neural Networks in Pattern Recognition, 2012


  Loading...