Publications

Journal Articles: Total 20
Selected list: 
    2 journals under review
  1. N. Aljohani, J. Shelton, and K. Roy , " A secure one time password protocol scheme, " International Journal of Information Privacy, Security and Integrity, 2017. Accepted.
  2. J. Shelton, J. Jenkins, and K. Roy , " Extending disposable feature templates for mitigating replay attacks, " International Journal of Information Privacy, Security and Integrity, 2017. Accepted.
  3. K. Roy, J. Shelton, and A. Esterline , " A Brief Survey on Multispectral Iris Recognition ," International Journal of Applied Pattern Recognition, 2016. Accepted.
  4. K. Roy, J. Shelton, B. O'Connor, and M. Kamel, "Multibiometric System using fuzzy level set and GEFE," IET Biometrics, 2014. Accepted.
  5. K. Roy, B. O'Connor, and M. Kamel, "Multibiometric system using level set, modified LBP and random forest," International Journal on Image and Graphics,2014. Published by World Scientific. Accepted.   
  6. K. Roy, P. Bhattacharya, and C. Y. Suen, “Iris segmentation using variational level set method,” Republished in a Virtual Special Issue-Celebrating the Breadth of Biometrics Research (Biometrics 2014), Elsevier Pattern Recognition, 2014. This article has been selected as one of the top 25 biometric articles published by Elsevier so far.
  7. K. Roy, P. Bhattacharya, and C. Y. Suen, “Iris segmentation using game theory,” Signal, Image and Video Processing Journal, Springer-Verlag, vol. 6, no. 2, pp. 301-315, 2012.
  8. K. Roy, P. Bhattacharya, and C. Y. Suen, “Iris segmentation using variational level set method,” Optics and Lasers in Engineering, Elsevier, vol. 49, no. 4, pp. 578-588, 2010. DOI:10.1016/j.optlaseng.2010.09.011.
  9. K. Roy, P. Bhattacharya, and C. Y. Suen, “Iris recognition using shape guided approach and game theory,” Pattern Analysis and Applications, Springer-Verlag, vol. 14, no. 4, pp. 329-348, 2011. DOI: 10.1007/s10044-011-0229-7.
  10. K. Roy, P. Bhattacharya, and C. Y. Suen, “Towards nonideal iris recognition based on level set method, genetic algorithms and adaptive asymmetrical SVMs,” Engineering Applications of Artificial Intelligence, Elsevier, vol. 24, no. 3, pp. 458-475, 2011.
  11. K. Roy and P. Bhattacharya, “Improvement of iris recognition performance using region-based active contour model,” International Journal of Pattern Recognition and Artificial Intelligence (IJPRAI), vol. 24, no. 8, pp. 1209-1236, 2010, Published by World Scientific.
  12. K. Roy, and P. Bhattacharya, “Iris recognition using genetic algorithms and asymmetrical SVMs,” Machine Graphics & Vision Journal, Published by Institute of Computer Science, Polish Academy of Sciences, vol. 19, no. 1, pp. 1-30, 2009. 
  13. K. Roy and P. Bhattacharya, “Optimal features subset selection and classification for iris recognition,” EURASIP Journal on Image and Video Processing. vol. 2008, Article ID 743103, 20 pages, 2008. doi:10.1155/2008/743103. (Springer open access journal)

 

Book Chapters:
  1. J. Mason, C. Kelley, K. Roy , and A. Esterline, " An Evaluation of User Movement Data; IEA-AIE 2018, Data science, privacy, and security Track, Montreal, Canada, June 25-28, 2018, Proceedings will be Published in Springer LNAI. Accepted. 
  2. A. Hamoud, A. Alwehaibi, K. Roy , and Marwan Bikdash1, " Classifying Political Tweets Using Naïve Bayes and Support Vector Machines; IEA-AIE 2018, Data science, privacy, and security Track, Montreal, Canada, June 25-28, 2018, Proceedings will be Published in Springer LNAI. Accepted. 
  3. P. Chatterjee, K. Roy , ANK Zaman, and A. Esterline, " Anti-spoofing Approach using Deep Convolutional Neural Network ; IEA-AIE 2018, Data science, privacy, and security Track, Montreal, Canada, June 25-28, 2018, Proceedings will be Published in Springer LNAI. Accepted. 
  4. J. Shelton,  J. Jenkins, K. Roy ," Palm Print Identification and Verification using a Genetic-based Feature Extraction Technique " 13th International Conference on Image Analysis and Recognition (ICIAR'16),Póvoa de Varzim, July 13-15, 2016, Portugal. Proceedings to be appeared in Springer Lecture Note Series in Computer Science (LNCS). Accepted. 
  5. N. Aljohani,  F. Ahmad, K. Roy, and J. Shelton " Multibiometric system using game theory " 12th International Conference on Image Analysis and Recognition (ICIAR'15),Nigara Falls, Canada. Proceedings to be appeared in Springer Lecture Note Series in Computer Science (LNCS). Accepted. 
  6. P. Arias,  J. Shelton, K. Roy, G. Dozier, and F. Ahmad " Micro Genetic and Evolutionary Feature Extraction: An Exploratory Data Analysis Approach for multispectral iris recognition " 12th International Conference on Image Analysis and Recognition (ICIAR'15),Nigara Falls, Canada. Proceedings to be appeared in Springer Lecture Note Series in Computer Science (LNCS). Accepted. 
  7. F. Ahmad, K.Roy, and K. Popplewell, Multispectral Iris Recognition Using Patch Based Game Theory," 11th International Conference on Image Analysis and Recognition (ICIAR'14), 2014 Portugal. Accepted. Proceedings to be appeared in Springer Lecture Note Series in Computer Science (LNCS).
  8. K. Roy and P. Bhattacharya, "Iris Recognition Based on Genetic Algorithms and Multi-Class Gaussian Mixture Model," 12th International Workshop on Combinatorial Image Analysis (IWCIA’2008), Buffalo, New York, April 2008. Appeared as a Chapter of the Book Titled "Image Analysis - From Theory to Applications" (ed. R. P. Barneva and V. E. Brimkov), pp. 103-112. Publisher: Research Publishing, 2008. ISBN 978-981-08-0228-8. Presentation Type: Oral. 
  9. K. Roy and P. Bhattacharya, "Optimal Features Selection for Iris Recognition", 12th International Workshop on Combinatorial Image Analysis (IWCIA’2008), Buffalo, New York, April 2008. Appeared as a Chapter of the Book Titled "Image Analysis - From Theory to Applications" (ed. R. P. Barneva and V. E. Brimkov), pp. 113-124. Publisher: Research Publishing, 2008. ISBN 978-981-08-0228-8.Presentation Type: Oral.  


Conference/Workshop/Symposium: Total 75 [Year 2001-Present]

Selected List
  1. A. Dobson, S. Althubiti, K. Roy , X. Yuan, and J. Xu, " Performance Evaluation of Machine Learning Algorithms in Apache Spark for Intrusion Detection, " International Telecommunication Networks and Applications Conference, 21-23 November 2018, University of New South Wales, Sydney, Australia.Proceedings will be published in IEEE Explorer. Accepted.
  2. S. Althubiti, and K. Roy , " LSTM for Anomaly-Based Network Intrusion Detection," International Telecommunication Networks and Applications Conference, 21-23 November 2018, University of New South Wales, Sydney, Australia, Proceedings will be published in IEEE Explorer. Accepted.
  3. D. Gunn, K. Roy , and K. Bryant, " Simulated Cloud Authentication Based on Touch Dynamics with SVM, " IEEE Symposium on Computational Intelligence in Cyber Security, Nov 18-21, Bangaluru, India.Accepted.
  4. W. Leingang, D. Gunn, J. Kim, X. Yuan, K. Roy , " Active Authentication Using Touch Dynamics, " IEEE Southeastcon 2018, Apr 19-23, Tampa, Florida.Accepted.
  5. D. Hooks, X. Yuan, K. Roy , A. Esterline, and J. Hernandez, " Applying Artificial Immune System for Intrusion Detection, " IEEE BigDataService 2018, Mar 26-29, Germany.Accepted.
  6. C. Rise, J. Singh,J. Shelton, R. Dave, J. Jenkins, and K. Roy , " Palm Print Authentication on a Cloud Platform, " IEEE International Conference on Advances in Big Data, Computing and Data Communication Systems (icABCD 2018, Durban, South Africa, 6-7 August 2018.Accepted.
  7. P. Arias, C. Kelley, J. Mason, K. Roy ,and K. Bryant, " An Analysis of User Movement Classification; International Conference on Digital Signal Processing, Tokyo, Japan, Feb 25-27, 2018, Proceedings will be Published in ACM. Accepted. 
  8. J. Spencer,D. Lawrence, K. Roy , P. Chatterjee, A. Esterline and J. Kim, " Presentation Attack Detection using Convolutional Neural Networks and Local Binary Patterns; First International Conference on Pattern Recognition and Artificial Intelligence, Montreal, Canada, May 14-17, 2018. Accepted. 
  9. A. Hailemichael,  S. Gebreyohannes, A. Karimoddini, K. Roy , and A.Homaifar, " Development of a Generic and Configurable Fuzzy Logic Systems Library for Real-Time Control Applications using an Object-oriented Approach " IRC 2018- IEEE International Conference on Robotic Computing, CA, Jan 31-Feb 2, 2018. Accepted. 
  10. N. Aljohani,  J. Shelton, K. Roy , " Continuous Authentication on Smartphones Using Artificial Immune System " Modern AI and Cognitive Science Conference, 2017. Accepted. 
  11. R. Dellana, and K. Roy , " Performance of Feature-Based Texture Classifiers Versus Convolutional Neural Network Under Sparse Training Data, " IEEE SoutheastCon 2017, Charlotte, NC. Accepted. 
  12. D. Patel, K. Roy ,and X. Yuan, " Analyzing Network Traffic Data Using Hive Queries, " IEEE SoutheastCon 2017, Charlotte, NC. Accepted. 
  13. J. Jenkins, J.Shelton, and K. Roy , " One-time Password for Biometric Systems: Disposable Feature Templates, " IEEE SoutheastCon 2017, Charlotte, NC. Accepted. 
  14. M. McDaniel, E. Sloan, S. Day, J. Mayes, W. Nick, K. Roy , and A. Esterline, " Situation-Based Ontologies for a Computational Framework for Identity Focusing on Crime Scenes," CogSIMA 2017, Savannah, GA. Accepted. 
  15. F. Ahmad, J. Shelton, and K. Roy , " Multispectral iris recognition based on group selection and game theory, " SPIE 2017 (Defense + Security) Symposium, Anaheim, CA. Accepted. 
  16. R. Dellana, and K. Roy , " Data Augmentation in CNN-based Periocular Authentication " The 6th IEEE International Conference on Information Communication and Management (ICICM 2016). Accepted. [Received excellent paper award]
  17. J. Jenkins, J. Shelton, and K. Roy , " A Comparison of Genetic Based Extraction Methods for Periocular Recognition " The 6th IEEE International Conference on Information Communication and Management (ICICM 2016). Accepted. 
  18. N. Aljohani, J. Shelton, K. Roy and A. Esterline, " Robust Password System Based on Dynamic Factors " The 6th IEEE International Conference on Information Communication and Management (ICICM 2016). Accepted. 
  19. Y. Lee, W. Hetchiliy, J. Shelton, D. Gunn, K. Roy , A. Esterline, and X. Yuan, " Touch Based Active User Authentication using Deep Belief Networks and Random Forests " The 6th IEEE International Conference on Information Communication and Management (ICICM 2016). Accepted. 
  20. P. Chopade, J. Zhan, K. Roy and K. Flurchick, " Real-time large-scale big data networks analytics and visualization architecture " The 12th IEEE International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT 2015), Oct 19-20, 2015, Melville, NY, pp 1-6. 
  21. J. Shelton,  K. Roy, J. Brown and G. Dozier, " Micro-dimensional feature extraction for multispectral iris recognition " IEEE SoutheastCon 2016, March 30 - April 3, Norfolk VA. Accepted. 
  22. J. Shelton,  J. Jenkins, K. Roy, , and A. Sumner, " Genetic based Local Ternary Pattern Feature Extraction for Mitigating Replay Attacks " IEEE SoutheastCon 2016, March 30 - April 3, Norfolk VA. Accepted. 
  23. J. Jenkins,  J. Bloch, W. Nick and K. Roy, ,and A. Esterline, " Author Identification using Sequential Minimal Optimization " IEEE SoutheastCon 2016, March 30 - April 3, Norfolk VA. Accepted. 
  24. Y. Rao Bachupally,  X. Yuan, and K. Roy, , " Network Security Analysis Using Big Data Technology " IEEE SoutheastCon 2016, March 30 - April 3, Norfolk VA. Accepted. 
  25. P. Arias,  J. Shelton, K. Roy , G. Dozier and F. Ahmad, " Multispectral iris recognition using GEFE " Modern AI and Cognitive Science Conference, 2015. Accepted. 
  26. F. Ahmad, K.Roy,J. Shelton, B. O'Connor, A. Esterline, and G. Dozier, "Face Recognition Using Game Theory" 7th ICMLC 2015. Accepted.  [Received the best oral presentation award, Extended version appeared in a Journal]
  27. J. Shelton, K. Roy, F. Ahmad, B. O’Connor, "Iris Recognition Using Level Set and hGEFE," IEEE SMC 2014, San Diego, CA. (Oral) Accepted.
  28. K. Popplewell, K. Roy, F. Ahmad, and J. Shelton, "Multispectral Iris Recognition Utilizing Hough Transform and Modified LBP," IEEE SMC 2014, San Diego, CA. (Oral) Accepted.
  29. S. Ainala, and K. Roy, "Study of body fat density," National Consortium for Data Science (NCDS), 2014. Accepted.
  30. B. O’Connor, K. Roy, and G. Dozier, “Iris recognition using distance regularized level set method and modified LBP,” International conference on communication systems and computational intelligence (CCSCI 2014), Accepted for or publication. Proceedings to be appeared in Springer Lecture Note Series in Computer Science (LNCS). [Received Best Oral Paper Award, Extended Version Appeared in a Journal ]
  31. H. Williams, J. Carter, W. Campbell, K. Roy, and G. Dozier, “Genetic & evolutionary feature selection for author identification of HTML associated with malware,” International Conference on Machine Learning and Computing (ICMLC 2014). Accepted for publication.
  32. K.Roy, "Iris Recognition using Region-Based Active Contour Model and Modified LBP", IEEE Conference on SMC, Manchester, UK, 2013. Accepted for publication.
  33. K. Roy and M.S. Kamel,  "Facial Expression Recognition using Game Theory" 5th INNS IAPR TC3 GIRPR International Workshop on Artificial Neural Networks in Pattern Recognition (ANNPR 2012), Trento, Italy. Accepted. Proceedings to be appeared in Springer Lecture Note Series in Artificial Intelligence (LNAI). 
  34. K. Roy and M.S. Kamel,  "Facial Expression Recognition using Game Theory and Particle Swarm Optimization"  6th International Conference on Computer Vision and Graphics (ICCVG'12), Poland. Accepted. Proceedings to be appeared in Springer Lecture Note Series in Computer Science (LNCS). 
  35. K. Roy and M.S. Kamel,  "Multibiometric System Using Distance Regularized Level Set Method and Particle Swarm Optimization"  6th International Conference on Computer Vision and Graphics (ICCVG'12), Poland. Accepted. Proceedings to be appeared in Springer Lecture Note Series in Computer Science (LNCS). [This paper combines iris, palmprint and fingerprint biometrics]
  36. K. Roy and M.S. Kamel, "Multibiometric System Using Level Set Method and Particle Swarm Optimization"  8th International Conference on Image Analysis and Recognition (ICIAR'12), Portugal. Accepted. Proceedings to be appeared in Springer Lecture Note Series in Computer Science (LNCS). [This paper combines iris, face and gait biometrics]
  37. K. Roy, P. Bhattacharya, and C. Y. Suen, "Recognition of unideal iris images using region-based active contour model and game theory' 17th International Conference on Image Processing (ICIP 2010), Hong Kong, Sept 26-29, 2010. Accepted for publication.
  38. K. Roy, P. Bhattacharya, and C. Y. Suen, “Unideal iris segmentation using game theory” 20th IAPR IEEE International Conference on Pattern Recognition (ICPR’2010), Istanbul, Aug 23-26, 2010: Accepted for publication. (Oral Paper acceptance rate is 17%)
  39. K. Roy, C. Y. Suen, and P. Bhattacharya and, "Unideal iris segmentation using region-based active contour model" 7th International Conference on Image Analysis and Recognition (ICIAR'10), Portugal. Accepted. Proceedings to be appeared in Springer Lecture Note Series in Computer Science (LNCS).
  40. K. Roy and P. Bhattacharya, "Variational level set method and game theory applied for nonideal iris recognition," 16th IEEE International Conference on Image Processing (ICIP'09), pp. 2721 - 2724,  Cairo, Egypt, Nov. 7-11, 2009. Print ISBN: 978-1-4244-5653-6. E-ISBN : 978-1-4244-5655-0.
  41. K. Roy and P. Bhattacharya, “Noncooperative Iris Recognition based on Level Set Method and Game Theory,” 7th International Conference on Computer Vision Systems (ICVS'09), Liège, Belgium, Oct. 13-15, 2009. Accepted. Proceedings to be appeared in Springer Lecture Note Series in Computer Science (LNCS).
  42. K. Roy and P. Bhattacharya, “Iris Recognition in Nonideal Situations,” 12th Information Security Conference (ISC'09), Pisa, Italy, Sept 7-9 2009. Accepted. Proceedings to be appeared in Springer Lecture Note Series in Computer Science (LNCS).
  43. K. Roy and P. Bhattacharya, “Level Set Approaches and Adaptive Asymmetrical SVMs Applied for Nonideal Iris Recognition,” 6th International Conference on Image Analysis and Recognition (ICIAR'09), Canada. Accepted. Proceedings to be appeared in Springer Lecture Note Series in Computer Science (LNCS).
  44. K. Roy and Prabir Bhattacharya, "Iris Recognition based on Variational Level Set method in Noisy Situations", 4th IEEE International Conference on Internet Technology and Secured Transactions (ICITST-2009) in London, UK, November 9-122009. Accepted.
  45. A. Mondal, K. Roy and Prabir Bhattacharya, "Secure Biometric System for Accessing Home Appliances via Internet", 4th IEEE International Conference on Internet Technology and Secured Transactions (ICITST-2009) in London, UK, November 9-122009. Accepted.
  46. A. Mondal, K. Roy and Prabir Bhattacharya, "Secure and Simplified Access to Home Appliance using Iris Recognition", IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications (CIB 2009), Nashville, Tennessee 37214, USA, 2009. Accepted.
  47. K. Roy and P. Bhattacharya, "Adaptive Asymmetrical SVM and Genetic Algorithms Based Iris Recognition",  19th IAPR IEEE International Conference on Pattern Recognition (ICPR'2008), Tampa, Florida, USA, December 8-11, 2008. Accepted. Presentation Type: Oral.  (Oral Paper acceptance rate is 18%)
  48. K. Roy and P. Bhattacharya, “Improving Feature Subset Selection using Genetic Algorithms for Iris Recognition”, 3rd International Workshop on Artificial Neural Networks in Pattern Recognition (ANNPR'08), Pierre & Marie Curie University, Paris, France, July 2-4, 2008. Proceedings appeared in the Springer Lecture Note Series in Artificial Intelligence (LNAI), vol. 5064/2008, pp. 292-304 (2008). Presentation Type: Oral.
  49. K. Roy and P. Bhattacharya, “Optimal Features Subset Selection using Genetic Algorithms for Iris Recognition”, 5th International Conference on Image Analysis and Recognition (ICIAR'08), Portugal, June 25-27, 2008. Proceedings Appeared in the Springer Lecture Note Series in Computer Science (LNCS), vol. 5112, pp. 894-904 (2008).Presentation Type: Oral. 
  50. K. Roy and P. Bhattacharya, “Application of multi-objective genetic algorithm and asymmetrical SVM to improve the reliability of an iris recognition system” IEEE conference on Systems, Man, and Cybernetics (SMC’2007), Oct. 7-10, 2007, Montreal, Canada. Vol. 4. Pages 1952-1957. Presentation Type: Oral.
  51. K. Roy and P. Bhattacharya, ”Iris recognition using collarette boundary localization and asymmetrical SVM” in International conference on image analysis and recognition (ICIAR’2007), Montreal, Canada, Aug. 22-24, 2007, Proceedings appeared in the Springer Lecture Note Series in Computer Science (LNCS), vol. 4633 Pages 854-865.Presentation Type: Oral.
  52. K. Roy and P. Bhattacharya, ”Multi-objective genetic algorithm and asymmetrical SVM for efficient iris recognition” International conference on image analysis and processing (ICIAP’2007), Sept. 10-14, 2007, Modena, Italy. Pages 3-8 IEEE Computer Society Press. Presentation Type: Oral.
  53. K. Roy and P. Bhattacharya ”An Iris Recognition Method based on Zigzag Collarette Area and Asymmetrical Support Vector Machines”, in IEEE conference on Systems, Man, and Cybernetics (SMC’2006), 8-11 October, 2006, Taiwan. Pages 861-865. Presentation Type: Oral.
  54. K. Roy and P. Bhattacharya, “Iris Recognition with Support Vector Machine,” IAPR International Conference on Biometric Authentication (ICBA'2006), Hong Kong, January 2006. Proceedings appeared in the Springer Lecture Note Series in Computer Science (LNCS), vol. 3882. Pages 486-492.Presentation Type: Poster.
  55. K. Roy and P. Bhattacharya, “An Improved Iris Recognition System using Zigzag Collarette Area and Support Vector Machine” in XXIII International Biometric Conferences (IBC’2006), 16-21 July, 2006, Quebec, Canada. Presentation Type: Oral.

Theses
  1. Title: "Recognition of nonideal iris images using shape guided approach and game theory", PhD thesis, Dept. of Computer Science, Concordia University, Montreal, QC, Canada. [Nominated for Governor's General Gold Medal of Canada]
  2. Title: “Iris Recognition using support vector machines”, Master’s thesis, Dept. of Computer Science, Concordia University, Montreal, QC, Canada.
  3. Title: “An approach to implement the speech recognition system using artificial neural network”, Master’s Thesis, Dept. of Computer Science and Technology, University of Rajshahi, Rajshahi, Bangladesh.