Research Interests
Machine Learning, Artificial Intelligence, Behavioral Biometrics, Cybersecurity, Data Science and Big Data Analytics
Education
- Ph.D., Computer Science, Pace University, New York City, NY, USA
- M.S., Electrical Engineering (Major in Telecommunication Engineering), Blekinge Institute of Technology, Karlskrona, Sweden
- M.S., Computer Science (Major in Security Engineering), Blekinge Institute of Technology, Karlskrona, Sweden
- B.S., Computer Science & Engineering, International Islamic University Chittagong, Bangladesh
Professional Experience
- Associate Professor, Rider University, New Jersey, USA, 2024 - Present
- Assistant Professor II, Rider University, New Jersey, USA, 2021 - 2024
- Assistant Professor I, Rider University, New Jersey, USA, 2018 - 2021
- Assistant Professor, Caldwell University, New Jersey, USA, 2016 – 2018
- Adjunct Professor, Rowan University, New Jersey, USA, 2016 - 2018
- Adjunct Assistant Professor, Pace University, New York, USA, 2016
- Adjunct Professor, County College of Morris, New Jersey, USA, 2016
- Graduate Research Assistant, Pace University, New York, USA, 2015
- Lecturer, Chittagong Veterinary and Animal Sciences University, Bangladesh, 2010 - 2012
- Lecturer and Coordinator, International Islamic University Chittagong, Bangladesh, 2009 - 2010
Honors, Awards & Grants
- Co-PI, NSF 22-588 2023; Improving Undergraduate STEM Education: Computing in Undergraduate Education. Project Title: Collaborative Research, CUE-T: Broadening Participation in Computing via Active Learning Strategies in Multi-Institution Online Synchronous Learning Environments. Grant Amount: $220,000. Grant Period: 06/01/2023 - 05/31/2027
- Best Presenter Award - IEEE CCWC 2022 Conference, 2022
- Best Paper Award - IEEE IEMTRONICS 2021 Conference, 2021
- Online Course Development Grant - Rider University, 2019
- Best Paper Award - IEEE UEMCON 2018 Conference, 2018
- Best Paper Award - IEEE UEMCON 2017 Conference, 2017
- Professional Development Grant - Caldwell University, 2017
- Graduate Assistantship Award - Pace University, 2015
Selected Presentations & Invited Talks
- “Analysis of Various Machine Learning Models in Detecting Credit Card Fraud Activities”, CVCI 2024 Conference, Bangkok, Thailand, January 2024
- “Biometrics: The Future of Security”, BHP 307 Guest Speech, Rider University, NJ, USA, April 2023
- “Analysis of Housing Market to Predict Home Price”, ICECCME 2023 Conference, Tenerife, Spain, July 2023
- “Access Control, Biometrics, and The Future” IVSP 2023 Conference, Singapore, March 2023
- “Network Packet Sniffing and Defense”, IEEE CCWC 2023 Conference, Las Vegas, NV, USA, March 2023
- “Access Control, Biometrics, and the Future” St. John’s University, Staten Island, NY, USA, March 2022
- “Applications of Machine Learning Tools in Genomics: A Review”, Smart Computing and Communication Conference, Birmingham, UK, October 2019
- “POHMM/SVM: A Hybrid Approach for Keystroke Biometric User Authentication”, IEEE RCAR Conference, Kandima, Maldives, August 2018
- “Computer Security Using Keystroke Biometrics”, BRAC University, Dhaka, Bangladesh, July 2018
- “Keystroke Biometric studies with Hidden Markov Model and Its Extension on Short Fixed-Text Input”, IEEE UEMCON Conference, Columbia University, NY, October 2017
- “Impact of Cyber-Attacks on Critical Infrastructure”, IEEE HPSC Conference, New York City, NY, April 2016
- “Authentication and Identification Methods Used in Keystroke Biometric Systems”, IEEE BigDataSecurity Symposium, New York City, NY, August 2015
- “Hidden Markov Models in Keystroke Dynamics”, Research Day, Pace University, NY, April 2015
Publications
Book:
- Security Issues in Wireless Technologies: Bluetooth, MANET and WiMAX. Biswas, K., Ali, M. L., and Sultana, R., 2011. VDM Verlag, Dr. Muller Aktiengesellschaft & Co. KG. ISBN-10: 9783639374988. ISBN-13: 978-3639374988
Refereed Journal Publications:
- A Systematic Review on Deep-Learning-Based Phishing Email Detection. Thakur, K., Ali, M. L., Obaidat, M. A., and Kamruzzaman, A., 2023. Electronics, 12(21): 4545. DOI: https://doi.org/10.3390/electronics12214545
- A Hybrid Method for Keystroke Biometric User Identification. Ali, M. L., Thakur, K., and Obaidat, M. A., 2022. Electronics, 11(17): 2782. DOI: https://doi.org/10.3390/electronics11172782
- Analysis of Fake News Detection Using Machine Learning and Accuracy. Measures Narayanan, S., Goldstein, A., Ali, M. L., and Narasareddygari, M. R., 2022. International Journal of Management and Applied Science (IJMAS), 8(8), pp. 11-18. https://www.iraj.in/journal/journal file/journal pdf/14-855-167032217911-18.pdf
- Cloud Computing Security Threats and Solutions. Henry, S. D. and Ali, M. L., 2017. I-Manager’s Journal on Cloud Computing (JCC), 4(2), pp. 1-8. DOI: https://doi.org/10.26634/jcc.4.2.14249
- Cloud Computing and its Security Issues. Thakur, K., Tao, L.,Wang, T., and Ali, M. L., 2017. Application and Theory of Computer Technology, 2(1), pp. 1-10.
- Keystroke Biometric Systems for User Authentication. Ali, M. L., Tappert, C. C., Qiu, M., and Monaco, J. V., 2016. Journal of Signal Processing Systems (JSPS, Springer, 88, pp. 175-190. ISSN Print: 1939-8018. DOI: https://doi.org/10.1007/s11265-016-1114-9
- User Authentication and Identification using Neural Network. Ali, M. L., Thakur, K., and Tappert, C. C., 2015. I-Managers Journal On Pattern Recognition(JPR), 2(2), pp. 28-39. ISSN Print: 2349-7912. DOI : https://doi.org/10.26634/jpr.2.2.3567
- Developing Virtual Residential Area using Virtual Reality Modeling Language and Virtual Reality Tools. Ali, M. L., 2015. International Journal of Engineering Research & Technology (IJERT), 4(4). ISSN (Online) : 2278-0181. DOI: http://dx.doi.org/10.17577/IJERTV4IS040778
Refereed Conference Publications:
- Machine Learning Algorithms for Diabetes Diagnosis Prediction. Zambrana, A., Fanek, L., Carrera, P. S., Ali, M. L., and Narasareddygari, M. R. In Proceedings of the 2024 6th International Conference on Image, Video and Signal Processing (IVSP 2024), Kawasaki, Japan, March 14-16, 2024, DOI: https://doi.org/10.1145/3655755.3655781
- Analysis of Various Machine Learning Models in Detecting Credit Card Fraud Activities. Ali, M. L., Ampojwala, A.R., Sudugu, D.R., Marousis, J., Guerrier, T., and Narasared- dygari, M. R. In Proceedings of the 2024 5th International Conference Computer Vision and Computational Intelligence (CVCI 2024), Bangkok, Thailand, January 29-21, 2024
- Fruits Detections Using Single Shot MultiBox Detector. Ali, M. L., Keller, C., and Huang, M. In 2023 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure (BSCI 23), July 10 – 14, 2023, Melbourne, VIC, Australia, pp. 140-144 DOI: https://doi.org/10.1145/3594556.3594619
- Analysis of Housing Market to Predict Home Price. Ali, M. L., Magrini, D., Cangelosi, M., and Ribeiro, D. In 2023 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME 2023) , Tenerife, Canary Islands, Spain , July 19 – 21, 2023. DOI: 10.1109/ICECCME57830.2023.10253192
- A Comprehensive Review of Wireless Security Protocols and Encryption Applications. Thakur, H. H., Hayajneh, A. A., Thakur, K., Kamruzzaman, A., and Ali, M. L., In 2023 IEEE World AI IoT Congress (AIIoT), Seattle, WA, USA, June 7 – 10, 2023, pp. 0373-0379. DOI: 10.1109/AIIoT58121.2023.10174571
- Machine Learning Models for Histopathological Breast Cancer Image Classification. Haines, S., Eaton, E., and Ali, M. L., In 2023 IEEE World AI IoT Congress (AIIoT), Seattle, WA, USA, June 7 – 10, 2023, pp. 0036-0041. DOI: 10.1109/AIIoT58121.2023.10174304
- Access Control, Biometrics, and the Future. Ali, M. L., Schmeelk, S., and Qiu, M. In Proceedings of the 2023 5th International Conference on Image, Video and Signal Processing (IVSP 2023), Singapore, Singapore, 2023, pp. 10-17. DOI: https://doi.org/10.1145/3591156.3591158
- Social Engineering Incidents and Preventions. Kamruzzaman, Thakur, K., Ismat, S., Ali, M. L., Huang, K., and Thakur, H. N. In 2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 2023, pp. 0499-0503. DOI: 10.1109/CCWC57344.2023.10099202
- Network Packet Sniffing and Defense. Ali, M. L., Ismat, S., Thakur, K., Kamruzzaman, Lue, Z., and Thakur, H. N., In 2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 2023, pp. 0499-0503. DOI: 10.1109/CCWC57344.2023.10099148
- An Evaluation of IoT DDoS Cryptojacking Malware and Mirai Botnet. Borys, A., Kamruzzaman, A., Thakur, H. H., Brickley, J. C., Ali, M. L., and Thakur, K., In 2022 IEEE World AI IoT Congress (AIIoT), Seattle, WA, USA, 2022, pp. 725-729. DOI: 10.1109/AIIoT54504.2022.9817163
- A Machine Learning Approach for the Early Detection of Dementia. Broman, S., OHara, E., and Ali, M. L., In 2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Toronto, ON, Canada, 2022, pp. 1-6. DOI: 10.1109/IEMTRONICS55184.2022.9795717
- The Impact of Purchasing Cyber Insurance on the Enhancement of Operational Cyber Risk Mitigation of U.S. Banks - A Case Study. Watson, T. F., Thakur, K., and Ali, M. L., In 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 2022, pp. 0709-0715. DOI: 10.1109/CCWC54503.2022.9720791 (Best Presenter Award)
- Top Reported Data Security Risks in the Age of COVID-19. Schmeelk, S., Thakur, K., Ali, M. L., Dragos, D. M., Al-Hayajneh, A. Pramana, B. R., In 2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA, 2021, pp. 0204-0208. DOI: 10.1109/UEMCON53757.2021.9666573
- Applications of Cryptography in Database: A Review. Xu, H., Thakur, K., Kamruzzaman, A. S., and Ali, M. L., In 2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Toronto, ON, Canada, 2021, pp. 1-6. DOI: 10.1109/IEMTRONICS52119.2021.9422663 (Best Paper Award)
- Multi-Agent Based Distributed Dynamic State Estimation Algorithm for Smart Grid Integrating Intermittent Electric Vehicles. Rana, M. M., Abdelhadi, A., Ali, M. L., and Daowud, A., In 2021 IEEE International Systems Conference (SysCon), Vancouver, BC, Canada, 2021, pp. 1-5. DOI: 10.1109/SysCon48628.2021.9478342
- Creating and Using Secure Software. Asadoorian, A., Alberto, M., and Ali, M. L., In 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA, 2020, pp. 0786-0792. DOI: 0.1109/UEMCON51285.2020.9298046
- Potential Development on Cyberattack and Prospect Analysis for Cybersecurity. Li, L., Thakur, K., and Ali, M. L., In 2020 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Vancouver, BC, Canada, 2020, pp. 1-6. DOI: 10.1109/IEMTRONICS51293.2020.9216374
- A Review of Data Privacy Techniques for Wireless Body Area Networks in Telemedicine. Gorbach, V., Ali, M. L., and Thakur, K., In 2020 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Vancouver, BC, Canada, 2020, pp. 1 - 6. DOI: 10.1109/IEMTRONICS51293.2020.9216361
- DASC: A Privacy-Protected Data Access System with Cache Mechanism for Smartphones. Dai, W., Chen, L., Wu, A., and Ali, M. L., In 2020 The 29th Wireless and Optical Communications Conference (WOCC 2020), Newark, NJ, USA, 2020, pp. 1-6. DOI: 10.1109/WOCC48579.2020.9114939
- Applications of Machine Learning Tools in Genomics: A Review. Fracasso, J. L. and Ali, M. L., 2019. In: Qiu, M. (eds) Smart Computing and Communication. SmartCom 2019. Lecture Notes in Computer Science, Volume 11910, Springer, Cham. Online ISBN: 978-3-030-34139-8. DOI: https://doi.org/10.1007/978-3-030-34139-8 33
- Security Considerations for the Development of Secure Software Systems. Ruggieri, M., Hsu, T. -T., and Ali, M. L., In 2019 the 10th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA, 2019, pp. 1187-1193. DOI: 10.1109/UEMCON47517.2019.8993081
- Challenges of Cyber Security and the Emerging Trends. Ali, M. L., Thakur, K., and Atobatele, B., In Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure (BSCI 2019), Auckland, New Zealand, 2019, pp. 107-112. DOI: 10.1145/3327960.3332393
- Concerns and Security for Hashing Passwords. Herrera, J. and Ali, M. L., In 2018 the 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA, 2018, pp. 861-865. DOI: 10.1109/UEMCON.2018.8796720 (Best Paper Award)
- POHMM/SVM: A Hybrid Approach for Keystroke Biometric User Authentication. Ali, M. L. and Tappert, C. C., In 2018 IEEE International Conference on Real-time Computing and Robotics (RCAR), Kandima, Maldives, 2018, pp. 612-617. DOI: 10.1109/RCAR.2018.8621746
- Keystroke Biometric studies with Hidden Markov Model and Its Extension on Short Fixed-Text Input. Ali, M. L., Monaco, J. V., and Tappert, C. C., In 2017 the 8th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA, 2017, pp. 258-264. DOI: 10.1109/UEMCON.2017.8249041 (Best Paper Award)
- Connectivity, Traffic Flow and Applied Statistics in Cyber Security. Thakur, K., Ali, M. L., Kopecky, S., Kamruzzaman, A., and Tao, L., In 2016 IEEE International Conference on Smart Cloud (SmartCloud), New York, NY, USA, 2016, pp. 295-300. DOI: 10.1109/SmartCloud.2016.29
- Keystroke Biometric User Verification Using Hidden Markov Model. Ali, M. L., Thakur, K., Tappert, C. C., and Qiu, M., In 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud), Beijing, China, 2016, pp. 204-209. DOI: 10.1109/CSCloud.2016.23
- An Analysis of Information Security Event Managers. Thakur, K., Kopecky, S., Nuseir, M., Ali, M. L., and Qiu, M., In 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud), Beijing, China, 2016, pp. 210-215. DOI: 10.1109/CSCloud.2016.19
- Impact Of Cyber-Attacks On Critical Infrastructure. Thakur, K., Ali, M. L., Jiang, N., and Qiu, M., In 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), New York, NY, USA, 2016, pp. 183-186. DOI: 10.1109/BigDataSecurity-HPSC-IDS.2016.22
- Information Security Policy for E- Commerce in Saudi Arabia. Thakur, K., Ali, M. L., Gai, K., and Qiu, M., In 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), New York, NY, USA, 2016, pp. 187-190. DOI: 10.1109/BigDataSecurity-HPSC-IDS.2016.14
- An Investigation on Cyber Security Threats and Security Models. Thakur, K., Qiu, M., Gai, K., and Ali, M. L., In 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud 2015), New York, NY, USA, 2015, pp. 307-311. DOI: 10.1109/CSCloud.2015.71
- Spoofing Key-Press Latencies with a Generative Keystroke Dynamics Model. Monaco, J. V., Ali, M. L., and Tappert, C. C., In 2015 IEEE 7th International Conference on Biometrics: Theory, Applications and Systems (BTAS 2015), Arlington, VA, USA, 2015, pp. 1-8. DOI: 10.1109/BTAS.2015.7358795
- Authentication and Identification Methods Used in Keystroke Biometric Systems. Ali, M. L., Tappert, C. C., Qiu, M., and Monaco, J. V., In 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems, New York, NY, USA, 2015, pp. 1424-1429. DOI: 10.1109/HPCC-CSS-ICESS.2015.66
- Online Electronic Bill Payment by Post-Paid Card Using Virtual Banking Concept. Hossain, M. M., Motakabber, S. A. M., Islam, M. T., and Ali, M. L., In 2005 8th International Conference on Computer and Information Technology (ICCIT), Islamic University of Technology (IUT), Dhaka, Bangladesh. DOI:10.13140/2.1.2648.7361
Internal Conference Proceedings & Technical Reports:
- Keystroke Biometric Authentication on Short Numeric Input on Mobile Devices. Ali, M. L., Goldberg, J. G., Guzman, J., Huang, W., Manuele, A., and Patel, H., 2016, In Proceedings of Student-Faculty Research Day, Pace University, New York, USA
- A Comparison of Several Classifiers for Movie Review Sentiment Analysis. Locklear, H., Ali, M. L., Cotoranu, A., Altowayan, A., and Haughton, S., 2016, In Proceedings of Student-Faculty Research Day, Pace University, New York, USA
- A Survey of Classification Methods Used in Keystroke Biometric Systems. Ali, M. L., Tappert, C. C., and Qiu, M., 2015, In Proceedings of Student-Faculty Research Day, Pace University, New York, USA
- Hidden Markov Models in Keystroke Dynamics. Ali, M. L., Monaco, V., and Tappert, C. C., 2015, In Proceedings of Student-Faculty Research Day, Pace University, New York, USA
- Phylogenetic Tree Visualization: Challenges and Solutions. Ali, M. L. and Cha, S-H., 2015, In Proceedings of Student-Faculty Research Day, Pace University, New York, USA
- Algorithm and Implementation of the Blog-Post Supervision Process. Biswas, K., Ali, M. L., and Harun, S. A. M., 2010. arXiv preprint, arXiv:1006.4542
- Security Threats in Mobile Ad Hoc Network. Biswas, K. and Ali, M. L., 2007. Master Thesis, Blekinge Institute of Technology, Karlskrona, Sweden