Khandaker Abir Rahman

Professor of Computer Science & Information Systems

Department of Computer Science and Information Systems

Science Engineering & Technology

Academic and Student Affairs


SVSU Main Campus

Science East 177

989-964-2528

krahman@svsu.edu

Biography

I graduated with PhD in Computational Analysis and Modeling (2013) from Louisiana Tech University, Ruston, USA. Prior that, I received MS and BSc in Computer Science and Engineering from University of Dhaka, Bangladesh in 2008 and 2006 respectively. I received MS in Mathematics (2011) and MS in Computer Science (2013) from Louisiana Tech University. Before joining SVSU in 2013, I was working as a research assistant between March, 2009 to February, 2013 at Center for Secure Cyberspace at Louisiana Tech University.

My research interests include detecting and mitigating cyber-behavioral anomalies, behavioral biometrics, machine learning, knowledge discovery from data, image processing and human activity detection from video. I am a senior member of IEEE and ACM.

Education

Doctor of Philosophy
Louisiana Tech Univ

Master of Science
Louisiana Tech Univ

Master of Science
Louisiana Tech Univ

Research

Citation count: 201 (as of September 2, 2022). Google Scholar link: https://scholar.google.com/citations?user=2ri1FcUAAAAJ&hl=en

Journal Publications

  1. M. S. Hossain, J. Chen, and K. A. Rahman, “On Error Reduction by the Symmetric Rejection Method in Multi-Stage Biometric Verification Systems” in Springer Journal of Pattern Analysis and Applications, ISSN: 1433-7541 (print), 1433-755X (online), 2022. Impact Factor: 2.307
  2. M. S. Hossain, J. Chen, and K. A. Rahman, “On Enhancing Serial Fusion based Multi-biometric Verification System” in International Journal of Research on Intelligent Systems for Real Life Complex Problems. ISSN: 0924-669X (print), 1573-7497 (online), Volume: 48, Issue: 12 (2018), pp. 4824-4833. URL: http://link.springer.com/article/10.1007/s10489-018-1257-4
  3. K. A. Rahman, K. S. Balagani, and V. V. Phoha, “Snoop-forge-replay Attacks on Continuous Verification with Keystrokes”, in IEEE Transactions on Information Forensics and Security (TIFS), Volume: 8, Issue: 3 (2013), pp. 528-541 . URL: http://ieeexplore.ieee.org/document/6425469/?reload=true
  4. M. S. Hossain, K. A. Rahman, M. Hasanuzzaman, M. A. Bhuiyan, and H. Ueno, “Video Image Clustering Based on Human Face and Shirt Color”, International Journal of Image and Graphics (IJIG), Volume: 10, Issue: 1 (2010) pp. 1-19. URL: http://www.worldscientific.com/doi/abs/10.1142/S0219467810003639
  5. K. A. Rahman, M. S. Hossain, M. A. Bhuiyan, T. Zhang, M. Hasanuzzaman, and H. Ueno, “Optimized Mask Selection For Person Identification And Camera Distance Measurement Based On Interocular Distance”, International Journal of Computer Engineering Research (IJCER), Volume 1, Issue: 2 (2010), pp. 28-42.
  6. A. Kabir, K. A. Rahman, M. R. Hasan, and S. Pervin, “Comparative Analysis of LMS and RLS Algorithms in Noise Cancellation”, The University of Dhaka Journal of Science, Volume: 56, Issue: 2 (2008) pp. 237-242.

Conference Proceedings

  1. K. Mullen, A. Mukherjee, and K. A. Rahman, “Typing Gesture for One-time Authentication Using Smart Wearable” presented in the Springer International Conference of Advanced Computational Applications of Geometric Algebra (ICACGA), October 1 - 5, 2022, Denver, Colorado, USA. Full manuscript will be available in Springer Lecture Notes in Computer Science (LNCS) Series.
  2. J. G. Maes, K. A. Rahman, “Smartwatch Multifactor Authentication for Keyboard based Methods” in the IEEE International Telecommunications Conference, ITC, July 26-28, 2022, Egypt. Full manuscript will be available in IEEE Digital Library.
  3. K. A. Rahman, K. Mullen, and A. Mukherjee, “Gesturing with Smart Wearables: An Alternate Way to User Authentication” in 19th Springer International Conference on Information Technology: New Generations (ITNG), April 10 - 13, 2022, Las Vegas (Online), USA. Full manuscript is available in Springer Lecture Notes in Computer Science (LNCS) Series. URL: https://link.springer.com/chapter/10.1007/978-3-030-97652-1_17
  4. A. K. Dipongkor, M. S. Islam, H. Kayesh, M. S. Hossain, A. Anwar, K. A. Rahman, and I. Razzak, “DAAB: Deep Authorship Attribution in Bengali”, in International Joint Conference on Neural Network (IJCNN 2021), July 18 – 22, 2021, Chicago, USA.
  5. K. A. Rahman, N. Alam, J. Musarrat, A. Madarapu, and M. S. Hossain, Smartwatch Dynamics: A Novel Modality and Solution to Attacks on Cyber-behavioral Biometrics for Continuous Verification?, in IEEE International Symposium on Networks, Computers, and Communications (ISNCC 2020), October 19 - 20, 2020, Montreal, Canada. URL: https://ieeexplore.ieee.org/document/9297226
  6. M. S. Hossain, C. Haberfeld, K. Yuan, J. Chen, K. A. Rahman, I. Hussain, “Continuous Authentication Using Creative Writing”, in IEEE International Symposium on Networks, Computers, and Communications (ISNCC 2020), October 19 - 20, 2020, Montreal, Canada. URL: https://ieeexplore.ieee.org/document/9297312
  7. K. A. Rahman, D. Neupane, A. Zaiter, and M. S. Hossain, “Web User Authentication Using Chosen Word Keystroke Dynamics” in 18th IEEE International Conference on Machine Learning and Applications (ICMLA), December 16 - 19, 2019, Boca Raton, Florida, USA. Proceedings will soon be available in IEEE Explore Digital Library.
  8. K. A. Rahman, D. J. Tubbs, and M. S. Hossain, “Movement Pattern Based Authentication for Smart Mobile Devices” in 17th IEEE International Conference on Machine Learning and Applications (ICMLA), December 17-20, 2018, Orlando, USA. URL: https://ieeexplore.ieee.org/document/8614197
  9. M. S. Hossain, K. A. Rahman and J. Chen,  “An Enhanced Architecture for Serial Fusion based Multi-biometric Verification System” accepted for presentation in International Symposium on Networks, Computer and Communications, ISNCC 2018, Rome, Italy.
  10. K. A. Rahman, and Joseph Maes, “How Discernible Human Impromptu Behavior is When Unlocking Smartphone?”, in 20th International Conference on Computer and Information Technology (ICCIT), Dhaka Bangladesh, December 22-24, 2017. URL: https://ieeexplore.ieee.org/document/8281788/
  11. M. S. Hossain and K. A. Rahman, “An Empirical Study on Verifier Order Selection in Serial Fusion Based Multi-biometric Verification System”, in 30th International Conference on Industrial, Engineering, Other Applications of Applied Intelligent Systems, Arras, France, June 27-30, 2017. Full manuscript is available in Springer Lecture Notes in Computer Science (LNCS) Series. https://link.springer.com/chapter/10.1007/978-3-319-60042-0_29
  12. B. A. Anima, M. Jasim, K. A. Rahman, A. Rulapaugh and Md Hasanuzzaman “User Authentication from Mouse Movement Data using SVM Classifier”, in 15th International Conference on Cryptology and Network Security, Milan, Italy. November 14-16, 2016. https://link.springer.com/chapter/10.1007/978-3-319-48965-0_47
  13. K. A. Rahman, Ryan Moormann, Danielle Dierich, and Md. Shafaeat Hossain, “Continuous User Verification via Mouse Activities”, in 8th International Conference on Multimedia Communications, Services and Security (MCSS), Krakow, Poland, November 24, 2015. URL: https://link.springer.com/chapter/10.1007/978-3-319-26404-2_14
  14. Dustyn Tubbs and K. A. Rahman, “Facial Expression Analysis as a Means for Additional Biometric Security in Recognition Systems”, in 8th International Conference on Multimedia Communications, Services and Security (MCSS) in Krakow, Poland on November 24, 2015. URL: https://link.springer.com/chapter/10.1007/978-3-319-26404-2_9
  15. Dustyn Tubbs and K. A. Rahman, “Mitigating Facial Recognition Attacks: A Brief Overview of Offensive and Defensive System Methods", in Annual Conference of Michigan Space Grant Consortium (MSGC), University of Michigan at Ann Arbor, October 31, 2015.
  16. K. A. Rahman, Ryan Moormann, and Danielle Dierich, “Authenticating Computer Users from Mouse Activities”, Annual Conference of Michigan Academy of Science, Arts, and Letters, Michigan, March 2015.
  17. K. A. Rahman, D. Dierich, and R. Moormann,Proposing a Novel Defense Mechanism to Spoof Attacks Targeting Keystroke Dynamics based Cyber-behavioral Biometric Systems”, 13th Annual Security Conference, Las Vegas, May 2014.
  18. K. A. Rahman, “A study on defending synthetic spoof attacks against keystroke dynamics based continuous verification systems”, Annual Conference of Michigan Academy of Science, Arts, and Letters, Michigan, 2014.
  19. K. A. Rahman, K. S. Balagani, and V. V. Phoha, “Making Impostor Pass Rates Meaningless: A Case of Snoop-forge-replay Attack on Continuous Cyber-behavioral Verification with Keystrokes”, Computer Vision and Pattern Recognition Workshop (CVPRW), Colorado Springs, USA, 2011. URL: http://ieeexplore.ieee.org/document/5981729/ 
  20. K. A. Rahman, K. S. Balagani, V. V. Phoha, and C. Okoye, “Movement Speed and Camera Distance Measurement for Human Motion Detection based on Interocular Distance”, 2nd Cyberspace Research Workshop, Shreveport, USA, 2009.
  21. K. A. Rahman, M. S. Hossain, M. A. Bhuiyan, T. Zhang, M. Hasanuzzaman, and H. Ueno, “Person to Camera Distance Measurement Based on Eye-Distance”, Third IEEE International Conference on Multimedia and Ubiquitous Engineering, Qingdao, China, 2009. http://ieeexplore.ieee.org/document/5319035/ 
  22. K. A. Rahman, M. S. Hossain, M. A. Bhuiyan, T. Zhang, M. Hasanuzzaman, and H. Ueno, “Eye-Distance Based Mask Selection for Person Identification”, Third IEEE International Conference on Multimedia and Ubiquitous Engineering, Qingdao, China, 2009. URL: http://ieeexplore.ieee.org/document/5319038/ 
  23. M. S. Hossain, K. A. Rahman, M. Hasanuzzaman, and V. V. Phoha, "A Simple and Efficient Video Image Clustering Algorithm for Person Specific Query and Image Retrieval," in ACM ICIMCS, Kunming, China, November 23-25, 2009. URL: http://dl.acm.org/citation.cfm?id=1734628

Research Posters (peer-reviewed)

  1. Abdulrahman Zaiter and K. A. Rahman,Analysis on San Francisco Fire Department Dispatch Calls”, 2019 Fall Conference of Michigan Space Grant Consortium, Ann Arbor, October 2019.
  2. Joseph Maes and K. A. Rahman, “Creating Georeference Maps in GPS Denied Areas Through UAS”, 2017 Fall Conference of Michigan Space Grant Consortium, Ann Arbor, October, 2014.
  3. Joseph Maes and K. A. Rahman, “Creating Georeference Maps in GPS Denied Areas Through UAS”, 2017 National Conference on Undergraduate Research, Memphis, TN, April 6-8, 2017. URL: https://ncurdb.cur.org/ncur2017/search/display_ncur.aspx?id=101665
  4. D. J. Tubbs and K. A. Rahman, “Exploring Movement-Pattern Based Authentication for Mobile Platforms”, 23rd USENIX Security Symposium 2014, San Diego, CA, August, 2014.
  5. D. J. Tubbs, K. A. Rahman, and C. Brown, “Integrating Facial Expression in Facial Recognition Systems”, 2014 Fall Conference of Michigan Space Grant Consortium, Ann Arbor, October, 2014.

Works of Creativity

Reviewer

  • 2023 International Joint Conference on Neural Networks (IJCNN). IJCNN is the premier conference in the respective fields.
  • Elsevier Journal of Computers and Security, 2022. Impact Factor: 3.579
  • 2022 IEEE 9th International; Conference of Electronics, technologies, of Information and Telecommunications, Tunisia, 2022.
  • IEICE Transactions on Information and Systems, 2021.
  • Michigan Space Grant Consortium (MSGC): reviewed 25 grants applications under different categories for 2021 - 2022 grant cycle.
  • Elsevier Journal of Computers and Security, 2020. Impact Factor: 3.579
  • Springer Journal of Artificial Life and Robotics, 2020.
  • 10th International Conference on Electronics, Communications, and Networks (CECNet 2020), Seoul, South Korea, October 25-28, 2020.
  • Michigan Space Grant Consortium (MSGC): reviewed 25 grants applications under different categories for 2020 - 2021 grant cycle.
  • IEEE Transactions on Information Forensics and Security, 2019. Impact Factor: 4.332.
  • IEEE Access Journal, 2019. Impact Factor: 4.098.
  • International Conference on Engineering and Technology (ICIET), Bangladesh, 2019.
  • IEEE Transactions on Information Forensics and Security (TIFS), 2018. Impact Factor: 4.098.
  • Elsevier Journal of Computers and Security, 2017.
  • 3rd IEEE International Conference on Multimedia Big Data (IEEE BigMM), April 19-21, 2017, California, USA.
  • Journal of Artificial Life and Robotics, Springer, Japan, 2017. Impact Factor: 2.27.
  • 11th International Conference on Emerging Security Information, Systems and Technologies, September 10 - 14, 2017 - Rome, Italy.
  • International Conference on Information Security and Digital Forensics (ISDF), Greece, 2014

Community Engagement

Advisor:

1. Saginaw Valley Cricket at SVSU

2. Bangladeshi Student Association at SVSU

 

Leadership

  • Board member, Michigan Space Grant Consortium (MSGC).
  • Chairing the department of CSIS from May 2018 to April 2022.
  • Graduate Program Coordinator- Master of Computer Science and Information Systems (MS-CSIS) at SVSU.
  • Search committee member (appointed by Provost) for hiring Dean of School of Science, Engineering and Technology at SVSU during 2018-2019.
  • Search Committee Chair for CSIS faculty hiring in 2018 and 2017. Member of Search Committee in 2016 and 2015.
  • Faculty Evaluation Committee member in 2021, 2019, 2018, 2017 and 2016.
  • Coach: SVSU's computer programming teams (SVSU Red and SVSU White) for ACM International Collegiate Programming Contest (ICPC) 

Honors and Awards

International and regional Awards:

  • Awarded with the Ted and Ruth Braun Fellowship 2023 – 2025 for conducting research on securing user authentication for vision-impaired population.
  • Awarded with ACM (Association of Computing Machinery) Senior Member rank in April 2021. Less than 3% of total members (nearly 100,000) receive this globally acknowledged and respected distinction. I was one of the 70 recipients worldwide in the first quarter of 2021. 246 winners were worldwide in 2020. (Source: https://awards.acm.org/senior-members/award-winners)
  • Elevated to IEEE (Institute of Electrical and Electronics Engineers) Senior Member rank, April 2021. Around 10% of more than 400,000 members receive this elevation.

Research Grants:

- Michigan Space Grant Consortium, MSGC (a NASA funded program) Faculty Fellowship for Undergraduate Research 2021 – 2022 on behalf of my student Kristina Mullen

- Michigan Space Grant Consortium, MSGC (a NASA funded program) Affiliate Rep – Admin Support Grant of $1500 for each year - 2018, 2019, 2020, 2021.

- SVSU Faculty Research Grant 2020 - 2021

- SVSU Faculty Research Grant 2017 - 2018

- Michigan Space Grant Consortium (NASA funded project) grant 2016-2017 on behalf of my student Joseph Maes

- SVSU Student Research Grant 2016-2017 on behalf of my student Joseph Maes

- The Herbert H. and Grace A. Dow Foundation Grant 2015 - 2016

Affiliations

Member: 

1. Senior Member - Association of Computing Machinery (ACM).

2. Senior Member - Institute of Electrical and Electronics Engineers (IEEE).

Office Hours

Tuesday
  • 11:00 AM - 12:00 PM