Research Interests
Machine Learning, Artificial Intelligence, Behavioral Biometrics, Cybersecurity, Data Science and Big Data Analytics
Education
- Ph.D., Computer Science, Pace University, New York City, NY, USA
- M.S., Electrical Engineering (Major in Telecommunication Engineering), Blekinge Institute of Technology, Karlskrona, Sweden
- M.S., Computer Science (Major in Security Engineering), Blekinge Institute of Technology, Karlskrona, Sweden
- B.S., Computer Science & Engineering, International Islamic University Chittagong, Bangladesh
Professional Experience
- Associate Professor, 小优视频, New Jersey, USA, 2024 - Present
- Assistant Professor II, 小优视频, New Jersey, USA, 2021 - 2024
- Assistant Professor I, 小优视频, New Jersey, USA, 2018 - 2021
- Assistant Professor, Caldwell University, New Jersey, USA, 2016 鈥 2018
- Adjunct Professor, Rowan University, New Jersey, USA, 2016 - 2018
- Adjunct Assistant Professor, Pace University, New York, USA, 2016
- Adjunct Professor, County College of Morris, New Jersey, USA, 2016
- Graduate Research Assistant, Pace University, New York, USA, 2015
- Lecturer, Chittagong Veterinary and Animal Sciences University, Bangladesh, 2010 - 2012
- Lecturer and Coordinator, International Islamic University Chittagong, Bangladesh, 2009 - 2010
Honors, Awards & Grants
- Co-PI, NSF 22-588 2023; Improving Undergraduate STEM Education: Computing in Undergraduate Education. Project Title: Collaborative Research, CUE-T: Broadening Participation in Computing via Active Learning Strategies in Multi-Institution Online Synchronous Learning Environments. Grant Amount: $220,000. Grant Period: 06/01/2023 - 05/31/2027
- Best Presenter Award - IEEE CCWC 2022 Conference, 2022
- Best Paper Award - IEEE IEMTRONICS 2021 Conference, 2021
- Online Course Development Grant - 小优视频, 2019
- Best Paper Award - IEEE UEMCON 2018 Conference, 2018
- Best Paper Award - IEEE UEMCON 2017 Conference, 2017
- Professional Development Grant - Caldwell University, 2017
- Graduate Assistantship Award - Pace University, 2015
Selected Presentations & Invited Talks
- 鈥淎nalysis of Various Machine Learning Models in Detecting Credit Card Fraud Activities鈥, CVCI 2024 Conference, Bangkok, Thailand, January 2024
- 鈥淏iometrics: The Future of Security鈥, BHP 307 Guest Speech, 小优视频, NJ, USA, April 2023
- 鈥淎nalysis of Housing Market to Predict Home Price鈥, ICECCME 2023 Conference, Tenerife, Spain, July 2023
- 鈥淎ccess Control, Biometrics, and The Future鈥 IVSP 2023 Conference, Singapore, March 2023
- 鈥淣etwork Packet Sniffing and Defense鈥, IEEE CCWC 2023 Conference, Las Vegas, NV, USA, March 2023
- 鈥淎ccess Control, Biometrics, and the Future鈥 St. John鈥檚 University, Staten Island, NY, USA, March 2022
- 鈥淎pplications of Machine Learning Tools in Genomics: A Review鈥, Smart Computing and Communication Conference, Birmingham, UK, October 2019
- 鈥淧OHMM/SVM: A Hybrid Approach for Keystroke Biometric User Authentication鈥, IEEE RCAR Conference, Kandima, Maldives, August 2018
- 鈥淐omputer Security Using Keystroke Biometrics鈥, BRAC University, Dhaka, Bangladesh, July 2018
- 鈥淜eystroke Biometric studies with Hidden Markov Model and Its Extension on Short Fixed-Text Input鈥, IEEE UEMCON Conference, Columbia University, NY, October 2017
- 鈥淚mpact of Cyber-Attacks on Critical Infrastructure鈥, IEEE HPSC Conference, New York City, NY, April 2016
- 鈥淎uthentication and Identification Methods Used in Keystroke Biometric Systems鈥, IEEE BigDataSecurity Symposium, New York City, NY, August 2015
- 鈥淗idden Markov Models in Keystroke Dynamics鈥, Research Day, Pace University, NY, April 2015
Publications
Book:
- Security Issues in Wireless Technologies: Bluetooth, MANET and WiMAX. Biswas, K., Ali, M. L., and Sultana, R., 2011. VDM Verlag, Dr. Muller Aktiengesellschaft & Co. KG. ISBN-10: 9783639374988. ISBN-13: 978-3639374988
Refereed Journal Publications:
- A Systematic Review on Deep-Learning-Based Phishing Email Detection. Thakur, K., Ali, M. L., Obaidat, M. A., and Kamruzzaman, A., 2023. Electronics, 12(21): 4545. DOI:
- A Hybrid Method for Keystroke Biometric User Identification. Ali, M. L., Thakur, K., and Obaidat, M. A., 2022. Electronics, 11(17): 2782. DOI:
- Analysis of Fake News Detection Using Machine Learning and Accuracy. Measures Narayanan, S., Goldstein, A., Ali, M. L., and Narasareddygari, M. R., 2022. International Journal of Management and Applied Science (IJMAS), 8(8), pp. 11-18.
- Cloud Computing Security Threats and Solutions. Henry, S. D. and Ali, M. L., 2017. I-Manager鈥檚 Journal on Cloud Computing (JCC), 4(2), pp. 1-8. DOI:
- Cloud Computing and its Security Issues. Thakur, K., Tao, L.,Wang, T., and Ali, M. L., 2017. Application and Theory of Computer Technology, 2(1), pp. 1-10.
- Keystroke Biometric Systems for User Authentication. Ali, M. L., Tappert, C. C., Qiu, M., and Monaco, J. V., 2016. Journal of Signal Processing Systems (JSPS, Springer, 88, pp. 175-190. ISSN Print: 1939-8018. DOI:
- User Authentication and Identification using Neural Network. Ali, M. L., Thakur, K., and Tappert, C. C., 2015. I-Managers Journal On Pattern Recognition(JPR), 2(2), pp. 28-39. ISSN Print: 2349-7912. DOI :
- Developing Virtual Residential Area using Virtual Reality Modeling Language and Virtual Reality Tools. Ali, M. L., 2015. International Journal of Engineering Research & Technology (IJERT), 4(4). ISSN (Online) : 2278-0181. DOI:
Refereed Conference Publications:
- Machine Learning Algorithms for Diabetes Diagnosis Prediction. Zambrana, A., Fanek, L., Carrera, P. S., Ali, M. L., and Narasareddygari, M. R. In Proceedings of the 2024 6th International Conference on Image, Video and Signal Processing (IVSP 2024), Kawasaki, Japan, March 14-16, 2024, DOI:
- Analysis of Various Machine Learning Models in Detecting Credit Card Fraud Activities. Ali, M. L., Ampojwala, A.R., Sudugu, D.R., Marousis, J., Guerrier, T., and Narasared- dygari, M. R. In Proceedings of the 2024 5th International Conference Computer Vision and Computational Intelligence (CVCI 2024), Bangkok, Thailand, January 29-21, 2024
- Fruits Detections Using Single Shot MultiBox Detector. Ali, M. L., Keller, C., and Huang, M. In 2023 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure (BSCI 23), July 10 鈥 14, 2023, Melbourne, VIC, Australia, pp. 140-144 DOI:
- Analysis of Housing Market to Predict Home Price. Ali, M. L., Magrini, D., Cangelosi, M., and Ribeiro, D. In 2023 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME 2023) , Tenerife, Canary Islands, Spain , July 19 鈥 21, 2023. DOI: 10.1109/ICECCME57830.2023.10253192
- A Comprehensive Review of Wireless Security Protocols and Encryption Applications. Thakur, H. H., Hayajneh, A. A., Thakur, K., Kamruzzaman, A., and Ali, M. L., In 2023 IEEE World AI IoT Congress (AIIoT), Seattle, WA, USA, June 7 鈥 10, 2023, pp. 0373-0379. DOI: 10.1109/AIIoT58121.2023.10174571
- Machine Learning Models for Histopathological Breast Cancer Image Classification. Haines, S., Eaton, E., and Ali, M. L., In 2023 IEEE World AI IoT Congress (AIIoT), Seattle, WA, USA, June 7 鈥 10, 2023, pp. 0036-0041. DOI: 10.1109/AIIoT58121.2023.10174304
- Access Control, Biometrics, and the Future. Ali, M. L., Schmeelk, S., and Qiu, M. In Proceedings of the 2023 5th International Conference on Image, Video and Signal Processing (IVSP 2023), Singapore, Singapore, 2023, pp. 10-17. DOI:
- Social Engineering Incidents and Preventions. Kamruzzaman, Thakur, K., Ismat, S., Ali, M. L., Huang, K., and Thakur, H. N. In 2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 2023, pp. 0499-0503. DOI: 10.1109/CCWC57344.2023.10099202
- Network Packet Sniffing and Defense. Ali, M. L., Ismat, S., Thakur, K., Kamruzzaman, Lue, Z., and Thakur, H. N., In 2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 2023, pp. 0499-0503. DOI: 10.1109/CCWC57344.2023.10099148
- An Evaluation of IoT DDoS Cryptojacking Malware and Mirai Botnet. Borys, A., Kamruzzaman, A., Thakur, H. H., Brickley, J. C., Ali, M. L., and Thakur, K., In 2022 IEEE World AI IoT Congress (AIIoT), Seattle, WA, USA, 2022, pp. 725-729. DOI: 10.1109/AIIoT54504.2022.9817163
- A Machine Learning Approach for the Early Detection of Dementia. Broman, S., OHara, E., and Ali, M. L., In 2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Toronto, ON, Canada, 2022, pp. 1-6. DOI: 10.1109/IEMTRONICS55184.2022.9795717
- The Impact of Purchasing Cyber Insurance on the Enhancement of Operational Cyber Risk Mitigation of U.S. Banks - A Case Study. Watson, T. F., Thakur, K., and Ali, M. L., In 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 2022, pp. 0709-0715. DOI: 10.1109/CCWC54503.2022.9720791 (Best Presenter Award)
- Top Reported Data Security Risks in the Age of COVID-19. Schmeelk, S., Thakur, K., Ali, M. L., Dragos, D. M., Al-Hayajneh, A. Pramana, B. R., In 2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA, 2021, pp. 0204-0208. DOI: 10.1109/UEMCON53757.2021.9666573
- Applications of Cryptography in Database: A Review. Xu, H., Thakur, K., Kamruzzaman, A. S., and Ali, M. L., In 2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Toronto, ON, Canada, 2021, pp. 1-6. DOI: 10.1109/IEMTRONICS52119.2021.9422663 (Best Paper Award)
- Multi-Agent Based Distributed Dynamic State Estimation Algorithm for Smart Grid Integrating Intermittent Electric Vehicles. Rana, M. M., Abdelhadi, A., Ali, M. L., and Daowud, A., In 2021 IEEE International Systems Conference (SysCon), Vancouver, BC, Canada, 2021, pp. 1-5. DOI: 10.1109/SysCon48628.2021.9478342
- Creating and Using Secure Software. Asadoorian, A., Alberto, M., and Ali, M. L., In 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA, 2020, pp. 0786-0792. DOI: 0.1109/UEMCON51285.2020.9298046
- Potential Development on Cyberattack and Prospect Analysis for Cybersecurity. Li, L., Thakur, K., and Ali, M. L., In 2020 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Vancouver, BC, Canada, 2020, pp. 1-6. DOI: 10.1109/IEMTRONICS51293.2020.9216374
- A Review of Data Privacy Techniques for Wireless Body Area Networks in Telemedicine. Gorbach, V., Ali, M. L., and Thakur, K., In 2020 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Vancouver, BC, Canada, 2020, pp. 1 - 6. DOI: 10.1109/IEMTRONICS51293.2020.9216361
- DASC: A Privacy-Protected Data Access System with Cache Mechanism for Smartphones. Dai, W., Chen, L., Wu, A., and Ali, M. L., In 2020 The 29th Wireless and Optical Communications Conference (WOCC 2020), Newark, NJ, USA, 2020, pp. 1-6. DOI: 10.1109/WOCC48579.2020.9114939
- Applications of Machine Learning Tools in Genomics: A Review. Fracasso, J. L. and Ali, M. L., 2019. In: Qiu, M. (eds) Smart Computing and Communication. SmartCom 2019. Lecture Notes in Computer Science, Volume 11910, Springer, Cham. Online ISBN: 978-3-030-34139-8. DOI:
- Security Considerations for the Development of Secure Software Systems. Ruggieri, M., Hsu, T. -T., and Ali, M. L., In 2019 the 10th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA, 2019, pp. 1187-1193. DOI: 10.1109/UEMCON47517.2019.8993081
- Challenges of Cyber Security and the Emerging Trends. Ali, M. L., Thakur, K., and Atobatele, B., In Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure (BSCI 2019), Auckland, New Zealand, 2019, pp. 107-112. DOI: 10.1145/3327960.3332393
- Concerns and Security for Hashing Passwords. Herrera, J. and Ali, M. L., In 2018 the 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA, 2018, pp. 861-865. DOI: 10.1109/UEMCON.2018.8796720 (Best Paper Award)
- POHMM/SVM: A Hybrid Approach for Keystroke Biometric User Authentication. Ali, M. L. and Tappert, C. C., In 2018 IEEE International Conference on Real-time Computing and Robotics (RCAR), Kandima, Maldives, 2018, pp. 612-617. DOI: 10.1109/RCAR.2018.8621746
- Keystroke Biometric studies with Hidden Markov Model and Its Extension on Short Fixed-Text Input. Ali, M. L., Monaco, J. V., and Tappert, C. C., In 2017 the 8th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA, 2017, pp. 258-264. DOI: 10.1109/UEMCON.2017.8249041 (Best Paper Award)
- Connectivity, Traffic Flow and Applied Statistics in Cyber Security. Thakur, K., Ali, M. L., Kopecky, S., Kamruzzaman, A., and Tao, L., In 2016 IEEE International Conference on Smart Cloud (SmartCloud), New York, NY, USA, 2016, pp. 295-300. DOI: 10.1109/SmartCloud.2016.29
- Keystroke Biometric User Verification Using Hidden Markov Model. Ali, M. L., Thakur, K., Tappert, C. C., and Qiu, M., In 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud), Beijing, China, 2016, pp. 204-209. DOI: 10.1109/CSCloud.2016.23
- An Analysis of Information Security Event Managers. Thakur, K., Kopecky, S., Nuseir, M., Ali, M. L., and Qiu, M., In 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud), Beijing, China, 2016, pp. 210-215. DOI: 10.1109/CSCloud.2016.19
- Impact Of Cyber-Attacks On Critical Infrastructure. Thakur, K., Ali, M. L., Jiang, N., and Qiu, M., In 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), New York, NY, USA, 2016, pp. 183-186. DOI: 10.1109/BigDataSecurity-HPSC-IDS.2016.22
- Information Security Policy for E- Commerce in Saudi Arabia. Thakur, K., Ali, M. L., Gai, K., and Qiu, M., In 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), New York, NY, USA, 2016, pp. 187-190. DOI: 10.1109/BigDataSecurity-HPSC-IDS.2016.14
- An Investigation on Cyber Security Threats and Security Models. Thakur, K., Qiu, M., Gai, K., and Ali, M. L., In 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud 2015), New York, NY, USA, 2015, pp. 307-311. DOI: 10.1109/CSCloud.2015.71
- Spoofing Key-Press Latencies with a Generative Keystroke Dynamics Model. Monaco, J. V., Ali, M. L., and Tappert, C. C., In 2015 IEEE 7th International Conference on Biometrics: Theory, Applications and Systems (BTAS 2015), Arlington, VA, USA, 2015, pp. 1-8. DOI: 10.1109/BTAS.2015.7358795
- Authentication and Identification Methods Used in Keystroke Biometric Systems. Ali, M. L., Tappert, C. C., Qiu, M., and Monaco, J. V., In 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems, New York, NY, USA, 2015, pp. 1424-1429. DOI: 10.1109/HPCC-CSS-ICESS.2015.66
- Online Electronic Bill Payment by Post-Paid Card Using Virtual Banking Concept. Hossain, M. M., Motakabber, S. A. M., Islam, M. T., and Ali, M. L., In 2005 8th International Conference on Computer and Information Technology (ICCIT), Islamic University of Technology (IUT), Dhaka, Bangladesh. DOI:10.13140/2.1.2648.7361
Internal Conference Proceedings & Technical Reports:
- Keystroke Biometric Authentication on Short Numeric Input on Mobile Devices. Ali, M. L., Goldberg, J. G., Guzman, J., Huang, W., Manuele, A., and Patel, H., 2016, In Proceedings of Student-Faculty Research Day, Pace University, New York, USA
- A Comparison of Several Classifiers for Movie Review Sentiment Analysis. Locklear, H., Ali, M. L., Cotoranu, A., Altowayan, A., and Haughton, S., 2016, In Proceedings of Student-Faculty Research Day, Pace University, New York, USA
- A Survey of Classification Methods Used in Keystroke Biometric Systems. Ali, M. L., Tappert, C. C., and Qiu, M., 2015, In Proceedings of Student-Faculty Research Day, Pace University, New York, USA
- Hidden Markov Models in Keystroke Dynamics. Ali, M. L., Monaco, V., and Tappert, C. C., 2015, In Proceedings of Student-Faculty Research Day, Pace University, New York, USA
- Phylogenetic Tree Visualization: Challenges and Solutions. Ali, M. L. and Cha, S-H., 2015, In Proceedings of Student-Faculty Research Day, Pace University, New York, USA
- Algorithm and Implementation of the Blog-Post Supervision Process. Biswas, K., Ali, M. L., and Harun, S. A. M., 2010. arXiv preprint, arXiv:1006.4542
- Security Threats in Mobile Ad Hoc Network. Biswas, K. and Ali, M. L., 2007. Master Thesis, Blekinge Institute of Technology, Karlskrona, Sweden