Dr. Bhaskar Ghosh

ASSISTANT PROFESSOR OF COMPUTER AND INFORMATION SCIENCE

Areas of Expertise

Artificial Intelligence, Computer Vision, Generative Adversarial Networks, Machine Learning,

EDUCATION HISTORY

  • B.Tech-West Bengal University of Technology
  • MS-University of Louisiana at Lafayette
  • PHD-University of Louisiana at Lafayette

RESEARCH INTERESTS

  • Generative Adversarial Networks
  • Artificial Intelligence
  • Machine Learning
  • Neural Networks
  • Computer Vision
  • Cybersecurity

PUBLICATIONS

  • B. Ghosh, I. K. Dutta, M. Totaro, and M. Bayoumi, “A survey on the progression and Performance of Generative Adversarial Networks” 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)
  • B. Ghosh, I. K. Dutta, A. H. Carlson, and M. Totaro, “Mathematical Modeling and Prediction of Neural Network Training based on RC Circuits” 2020 IEEE International Symposium on Networks, Computers and Communications (ISNCC)  
  • B. Ghosh, I. K. Dutta, A. H. Carlson, and M. Totaro, “An Empirical Analysis of Generative Adversarial Network Training Times with Varying Batch Sizes” 2020  The 11th IEEE Annual Ubiquitous Computing, Electronics and Mobile Communication Conference
  • B. Ghosh, I. K. Dutta, S. Khare, A. H. Carlson, and M. Totaro, “Isomorphic Cipher Reduction” 2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEEE IEMCON)
  • I. K. Dutta, B. Ghosh, A. H. Carlson, and M. Bayoumi, “Generative Adversarial Networks in Security: A Survey” 2020  The 11th IEEE Annual Ubiquitous Computing, Electronics and Mobile Communication Conference
  • I. K. Dutta, B. Ghosh, A. H. Carlson, and M. Bayoumi, “Lightweight Polymorphic Encryption for the Data Associated with Constrained Internet of Things Devices” 2020 IEEE 6th World Forum on Internet of Things (WF-IoT)
  • I. K. Dutta, B. Ghosh, and M. Bayoumi, “Lightweight Cryptography for Internet of Insecure Things : A Survey” 2019 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC)
  • A. H. Carlson, B. Ghosh, I. K. Dutta, S. Khare, and M. Totaro, “ Key Space Reduction Using Isomorphs” 2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEEE IEMCON)
  • A. H. Carlson, B. Ghosh, I. K. Dutta, S. Khare, and M. Totaro, “Modeling Polymorphic Ciphers” 2021 The 4th IEEE International Symposium on
    Future Cyber Security Technologies (FCST 2021)
  • A. H. Carlson, G. Gang, T. Gang, B. Ghosh, and I. K. Dutta, “ Evaluating True Cryptographic Key Space Size” 2021 The 12th IEEE Annual Ubiquitous Computing, Electronics and Mobile Communication Conference
  • S. Khare, B. Ghosh, I. K. Dutta, A. H. Carlson, and M. Totaro, “Space Selection and Abstraction in Set Theoretic Estimation” 2021 Public Key Cryptography
  • S. Khare, B. Ghosh, I. K. Dutta, A. H. Carlson, and M. Totaro, “Space Selection and Abstraction in Set Theoretic Estimation” 2021 Public Key Cryptography
  • A. K. M. Rubaiyat Reza Habib, E. Elijah Akpan, B. Ghosh and I. K. Dutta, "Techniques to Detect Fake Profiles on Social Media Using the New Age Algorithms - A Survey," 2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 2024, pp. 0329-0335, doi:10.1109/CCWC60891.2024.10427620.
  • D. Thompson, P. Padgett, T. C. Johnson and B. Ghosh, "PyroScan: Wildfire Behavior Prediction System using Unmanned Aerial Vehicles (UAV)," 2024 IEEE World AI IoT Congress (AIIoT), Seattle, WA, USA, 2024, pp. 199-204, doi: 10.1109/AIIoT61789.2024.10578978.

Recently Taught Courses

  • COMS 1011 - PROGRAMMING I LAB
  • COMS 1013 - PROGRAMMING I
  • COMS 3163 - WEB PROGRAMMING
  • COMS 3213 - ALGORITHM DESIGN AND ANALYSIS
  • COMS 4033 - INFO SYSTEMS ANALYSIS & DESIGN
  • COMS 4043 - SYS ANALYSIS/DESIGN II
  • COMS 4913 - CAPSTONE I
  • CSEC 4153 - HUMAN FACTORS IN CYBERSECURITY