Go to the top


View publications on Google Scholar.

  • Ceker, Hayreddin, Jun Zhuang, Shambhu Upadhyaya, Quang Duy La, and Boon-Hee Soong. "Deception-based game theoretical approach to mitigate DoS attacks." The Seventh Conference on Decision and Game Theory for Security (Gamesec), 2016.
  • Sun, Yan, Hayreddin Ceker, Shambhu Upadhyaya. "Shared Keystroke Dataset for Continuous Authentication." Eight IEEE International Workshop on Information Forensics and Security (WIFS) 2016.
  • Ceker, Hayreddin, and Shambhu Upadhyaya. "Adaptive techniques for intra-user variability in keystroke dynamics." Eight IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS), 2016.
  • Ceker, Hayreddin, and Shambhu Upadhyaya. "User authentication with keystroke dynamics in long-text data." Eight IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS), 2016.
  • Ceker, Hayreddin, and Shambhu Upadhyaya. "Enhanced recognition of keystroke dynamics using Gaussian mixture models." Military Communications Conference, MILCOM 2015-2015 IEEE. IEEE, 2015.
  • Gunes, Mehmet Hadi, Murat Yuksel, and Hayreddin Ceker. "A blind processing framework to facilitate openness in smart grid communications." Computer Networks 86 (2015): 14-26.
  • Ryfe, David, Donica Mensing, Hayreddin Ceker, and Mehmet Gunes. "Popularity is not the same thing as influence: a study of the bay area news system." Journal of the international symposium of online journalism (# ISOJ). Vol. 2. No. 2. 2012.

Research Interests

  • I have been working on Continuous Authentication in Behavioral Biometrics using Machine Learning Techniques to continuously monitor and authenticate the user transparently in front of a computer or while using a smartphone, as part of my dissertation under supervision of my adviser Prof. Shambhu Upadhyaya.

    While physiological biometrics refer to physical measurements of the human body, such as fingerprint, face, hand geometry and iris; behavioral biometrics relate to the specific behavior of a human (user) while performing a task, such as walking, talking, typing. In my research, I utilize typing characteristics of users and differentiate them from the way they type on the keyboard.
  • Behavioral Biometrics: Keystroke dynamics is one of the efficient and inexpensive techniques that can authenticate computer users in the background while the user is actively working at the terminal. Typing characteristics have been shown to be distinctive enough to distinguish a computer user from another because of the unique timing of keystrokes that each individual performs during typing.
  • Active Authentication: The active authentication paradigm suggests that a system should be able to recognize and continuously verify the identity of a user. For an active authentication mechanism, a system should authenticate a user unobtrusively and transparently in a continuous manner.
  • Transfer Learning: We want to transfer previously acquired knowledge to a different domain in the context of keystroke dynamics. The objective is to authenticate an enrolled user under different environmental conditions with the least amount of re-training. If the user moves to different conditions and types at a different time, the knowledge acquired from previous sessions is transferred via parameters that contain classifier information. Hence, the system can learn the updated profile faster by integrating the parameters, and recognize the latest typing pattern efficiently.


CSIT 461 - Introduction to AI and Knowledge Engineering

Overview of artificial intelligence tools and techniques; searching methods; applications of AI: game playing, expert systems and knowledge-based systems; components of a knowledge-based system; knowledge acquisition, representation, and formalization; numerical and symbolic processing; information theoretic and decision theoretic algorithms; inference engine; machine learning; reasoning and explanation; basic concepts and major issues of knowledge engineering; current tools and techniques for analysis, design, development of the knowledge based systems; applications in robotics, medical diagnosis, smart decision systems, etc.

Fall 2016

CSIT 201 - Computer Security and Ethics

Introduces desktop, internet, and network security issues and how they interact with the ethical values of individuals, organizations, and society. Includes methods of avoiding, detecting, and analyzing network intrusions as well as the ethics related to computer security and privacy.

Fall 2016

CSIT 121 - Computer Science I

Hands-on exposure to the following major topics: Problem solving, algorithm design and development, structure of the program, top-down design and functional decomposition, debugging, elementary data types, expressions, I/O functions and formats, repetition and control structures, user-defined functions, pass by value, pass by reference, built-in functions, arrays, strings.

Fall 2016

CSE 562 - Database Systems

The basic design principles of systems managing very large databases are discussed. Topics will include: database design, data models, integrity constraints, query languages, database file organization, indexing, query processing and optimization, transaction processing. Students will implement one or more modules of a prototype database system.

Summer 2016


Hayreddin Çeker
2140 Fenton Hall
Fredonia, NY 14063
hayreddi at buffalo.edu
ceker at fredonia.edu