Md Shafaeat Hossain
Morrill Hall 117A
Phone: 203 - 392 - 5868
|Monday||3:15 pm - 4:45 pm|
|Tuesday||1:30 pm - 3:15 pm|
|Thursday||1:30 pm - 3: 15 pm|
- CSC 235 Web and Database Development
- CSC 321 Algorithm Design & Analysis
- CSC 590 Thesis I: Proposal Development
- CSC 591 Thesis II: Thesis Completion
- HON 494 CSC Departmental Honors
- CSC 481 Artificial Intelligence
- CSC 581 Computational Intelligence
- CSC 555 Principles of Information Security
- CSC 477 Data Mining
- CSC 545 Advanced Database Systems
- CSC 540 Database Systems
- CSC 335 Database Management Systems
- CSC 212 Data Structures
- CSC 200 Information Management and Productivity Software
- CSC 153 Computer Programming II
- CSC 499 Independent Study and Research
- CSC 495 CSC Departmental Honors
PhD in Computational Analysis and Modeling
Louisiana Tech University
MS in Computer Science
Louisiana Tech University
MS in Mathematics
Louisiana Tech University
MS in Computer Science and Engineering
University of Dhaka
B.Sc. (Honors) in Computer Science and Engineering
University of Dhaka
Machine Learning, Smartphone Security, Cyber-behavioral authentication, Multi-biometric verification, and Computer Vision.
- Md S. Hossain (PI), SCSU Graduate Studies Graduate Assistantship (GSGA), 2018-2019, $12000.00.
- Md S. Hossain (PI), SCSU Graduate Studies Graduate Assistantship (GSGA), 2017-2018, $3000.00.
- Md S. Hossain (PI), "On Enhancing Multi-biometric Security Systems", sponsored by CSU-AAUP Research Grant, 2017-2018, $3339.00.
- Md S. Hossain (PI), "Verifier Order Selection in Serial Fusion Based Multi-biometric Verification System", Sponsored by SCSU Minority Recruitment & Retention Committee Grant, November 2016 – August 2017, $2000.00.
- Md S. Hossain (PI), "Serial Fusion based Biometric Verification," Sponsored by SCSU Faculty Creative Activity Research Grant, June 2016 - May 2017, $2,500.00.
- Md S. Hossain (PI), SCSU Graduate Studies Graduate Assistantship (GSGA), 2016-2017, $6000.00.
- Md S. Hossain (PI), Lisa Lancor (Co-PI), "Continuous User Authentication on Smartphones," Sponsored by SCSU Faculty Creative Activity Research Grant, June 2015 - May 2016, $2,500.00.
- Md S. Hossain (PI), "On Enhancing Biometric Security Systems," Sponsored by SCSU Research/Creative Activity Reassigned Time, January 2016 - June 2016.
Peer Reviewed Journal Papers
- Md S. Hossain, Jundong Chen, and Khandaker Rahman. On enhancing serial fusion based multi-biometric verification system. In Applied Intelligence, page 1-10, August, 2018.
- Md S. Hossain, Khandaker A. Rahman, Md. Hasanuzzaman, Md A. Bhuyian, and H. Ueno. Video Image Clustering Based on Human Face and Shirt Color. In International Journal of Image and Graphics (IJIG), 10(1), page 1-19, January 2010.
- Khandaker A. Rahman, Md S. Hossain, Md A. Bhuyian, Tao Zhang, Md Hasanuzzaman, and H. Ueno, Optimized Mask Selection for Person Identification and Camera Distance Measurement based on Interocular Distance. In Journal of Computer Engineering Research, 1(2), page 29-42, April 2010.
Peer Reviewed Conference Papers
- Khandaker Rahman, Dustyn Tubbs, and Md S. Hossain, "Movement Pattern Based Authentication for Smart Mobile Devices", in proceedings of the IEEE 17th International Conference on Machine Learning and Applications (ICMLA), Orlando, FL, USA, December, 2018
- Jundong Chen, Md S. Hossain, Matthias Brust and Naomi Johnson. A Game Theoretic Analysis of the Twitter Follow-Unfollow Mechanism. In Proceeding of the 9th Conference on Decision and Game Theory for Security (GameSec), Seattle, WA, USA, October 2018.
- Md S. Hossain, Jundong Chen, and Khandaker Rahman. An Enhanced Architecture for Serial Fusion based Multi-biometric Verification System. In Proceedings of the IEEE International Symposium on Networks, Computers and Communications (ISNCC), Rome, Italy, June 2018.
- Jundong Chen, He Li, Zeju Wu, and Md S. Hossain. Sentiment Analysis of the Correlation between Regular Tweets and Retweets. In Proceedings of the IEEE International Symposium on Network Computing and Applications (NCA), Cambridge, MA, October 2017.
- Md S. Hossain, Khandaker A. Rahman. An Empirical Study on Verifier Order Selection in Serial Fusion Based Multi-biometric Verification System. In: Advances in Artificial Intelligence: From Theory to Practice (IEA/AIE— International Conference on Industrial, Engineering, Other Applications of Applied Intelligent Systems, Arras, France, June 2017). Lecture Notes in Computer Science, vol 10350. Springer, Cham.
- Mohamed A. Rilvan, Kolby I. Lacy, Md S. Hossain, Bing Wang. User Authentication and Identification on Smartphones by Incorporating Capacitive Touchscreen. In Proceedings of IEEE International Performance Computing and Communications Conference (IPCCC), Las Vegas, NV, December 2016.
- Tudor Boran, John Voss, Md S. Hossain. Authorship Categorization of Public Domain Literature. In Proceedings of IEEE Ubiquitous Computing, Electronics, and Mobile Communication Conference (UEMCON), New York City, NY, October 2016.
- Md S. Hossain. On Finding Appropriate Reject Region in Serial Fusion based Biometric Verification. In Proceedings of IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), San Diego, CA, March 2016.
- Khandaker A. Rahman, Ryan Moormann, Danielle Dierich, Md S. Hossain, Continuous User Verification via Mouse Activities . In Proceedings of 8th IEEE International Conference on Multimedia Communications, Services and Security, Poland, November 2015.
- Md S. Hossain, Kiran S. Balagani, and Vir V. Phoha. On Controlling the Genuine Reject Rate in Multi-stage Biometric Verification System. In Computer Vision and Pattern Recognition Workshop (CVPRW), Portland, OR, June 2013.
- Md S. Hossain, Kiran S. Balagani, and Vir V. Phoha. New Impostor Score Based Rejection Methods for Continuous Keystroke Verification with Weak Templates. In Proceedings of IEEE Fifth International Conference on Biometrics: Theory, Applications, and Systems (BTAS 2012), Washington DC, September 2012.
- Md S. Hossain, Khandaker A. Rahman, Md Hasanuzzaman, and Vir V. Phoha. A Simple and Efficient Video Image Clustering Algorithm for Person Specific Query and Image Retrieval. In Proc. of International Conference on Internet Multimedia Computing and Service, China, November 2009.
- Khandaker A. Rahman, Md S. Hossain, Md. A. Bhuyian, Tao Zhang, Md Hasanuzzaman, and H. Ueno. Eye-Distance Based Mask Selection for Person Identification. In Proc. of International Conference on Multimedia and Ubiquitous Engineering (MUE 2009), China, June 2009.
- Khandaker Abir Rahman, Md S. Hossain, Md. A. Bhuyian, Tao Zhang, Md Hasanuzzaman, and H. Ueno. Person to Camera Distance Measurement Based on Eye-Distance. In Proc. of International Conference on Multimedia and Ubiquitous Engineering (MUE 2009), China, June 2009.
Research in Progress
Continuous User Authentication on Smartphones
To ensure high security on smartphones, it is necessary to increase the level of authentication beyond the standard point-of-entry technique. To this end, we plan to develop a user authentication scheme based on behavioral biometrics, which continuously authenticates users during phone usage rather than simply at the beginning of a session. Specifically, we will be using keystroke dynamics (how a user types on a keypad), touch screen dynamics (how a user interacts with the touch screen (finger pressure, finger tip size, etc.), physics of the device (how a user carries/holds a phone), and linguistic profiling (how a user writes vocabulary and text) to authenticate a user.
Smartphone Security using Body Parts and Voice
To strengthen the user authentication in Smartphone, we plan to develop a biometric authentication system which uses the capacitive sensor of touchscreen and voice recorder of a smartphone. While capacitive fingerprint scanners which are integrated in recent mobile phones require high quality and expensive sensors, our methodology focus on the touchscreen as the image sensor. Using the touchscreen we can scan users’ body parts, such as ears, palms, and fists. We also incorporate voice recorders to improve the user identification when the user places the touchscreen on his ear to accept an incoming phone call.
Enhancing Multi-biometric Security Systems
Multi-biometric verification systems can be classified into two categories: (1) parallel fusion based and (2) serial fusion based. Though a parallel fusion based system gives high accuracy, its applicability is questionable in many real world applications because of its longer verification time. In contrast, serial fusion can take less time to give a verification decision and thus can provide user convenience. Hence, a serial fusion based system can be a good trade-off between user convenience and accuracy. However, these systems have been poorly investigated. Hence, we plan to investigate these systems and develop a new serial fusion based verification scheme.
- Muhamet Martinaj
- Jedrik Chao
- Richard Wandell
- Michael Peal
- Leran Wang
- John C. Dogan
- Dylan Gosselin