Sung-Hyuk Cha

E-mail: scha@pace.edu

Personal Website: Click Here

School/College: Seidenberg School of Computer Science and Information Systems
Department(s): Computer Science NY
Primary Location: Goldstein Academic Center 318

Office Hours: (Fall 2014)
Monday
10:30AM-1:30PM
Tuesday, Thursday
2:20PM-3:20PM

Office Phone:
+1 (212) 346-1253

Fax Phone: 914-773-3533

Secondary Location: 163 William Street

Education

PhD, State University of New York at Buffalo, 2001

Computer Science

MS, Rutgers University, 1996

Computer Science

BS, Rutgers University, 1994

Computer Science

Scheduled Courses

Fall 2014:
  • CS 113: Mathematical Structures for CS
  • CS 655: Pattern Recognition

View All Courses Taught
  • CIS 101: Cmptrs & Environmental Science
  • CIS 101: Computers & Social Rspnsblty
  • CIS 101: Forensic Computing
  • CIS 101: Urban Environment
  • CIS 102: Prblm Solving Using LEGO Rbtcs
  • CIT 312: Introduction to Programming I
  • CIT 314: Introduction to Programming II
  • CS 113: Mathematical Structures for CS
  • CS 121: Computer Programming I
  • CS 122: Computer Programming II
  • CS 241: Data Structures/Algorithms
  • CS 241: Data Structures/Algorithms I
  • CS 325: Introduction to Data Mining
  • CS 361: Programming Lang/Implementatn
  • CS 397: Topic: Intro to Data Mining
  • CS 397: Topic: Robotics
  • CS 600: Indpndnt Study in Grad CS
  • CS 606: Fndmntl Cmptr Sci II with Java
  • CS 608: Algorithms & Computing Theory
  • CS 619: Data Mining
  • CS 631: Intro to Pattern Recognition
  • CS 631: Topic: Data Mining
  • CS 655: Pattern Recognition
  • DCS 860: Tpcs in Emrgng Cmptr Tchnlgs
  • DCS 861: Topics in Data Mining
  • DCS 861: Tpc in Emerging Cmptr Tech II
  • DCS 891: Research Seminar
  • DCS 891: Research Seminar VI
  • DCS 990: Dissertation for DPS in Cmptng
  • DCS 991: Dssrttn for DPS in Cmptg II
  • IS 613: Database Management Systems
  • IS 664: Database Programming
  • IT 300: Computer Security Overview
  • IT 308: Computer Forensics
  • IT 605: Database Management Systems
  • IT 634: Introduction to Data Mining
  • IT 638: Intro to Pattern Recognition
  • IT 664: Computer and Internet Forensic
  • MAT 104: Finite Mathematics
  • MAT 117: Elementary Statistics
  • Research Interests

    Document Analysis; Pattern Recognition & Machine Intelligence & Data Mining; Distance Measures & Pattern Matching Algorithm;

    Awards and Honors

    • Center for Community Outreach, - Faculty Leadership Award

    PROFESSIONAL MEMBERSHIPS

    • AAAI (Assoc. for the Advancement of Artificial Intelligence) [Member]
    • IEEE [Member]
    • IEEE, Computer Society [Member]
    • IGS [Member]
    • IS&T [Member]
    • Korean PACS Society [Member]
    • Pattern Recognition Society [Member]
    • SPIE [Member]

    Contract, Grants, and Sponsored Research

    • Tappert, C. & Grossman, F. (2013, September). Continual computer-usage behavioral biometric authentication. DARPA , Federal , $500,000.00 . Not Funded,This proposal is aimed at developing a behavioral biometric system to continually authenticate users of DoD desktop computers and users of mobile devices.
    • Tappert, C. & Cha, S. (2013, September). Behavioral biometric authentication system for online test-takers. Google Research Awards , Private , $40,000.00 . Not Funded,The 2008 federal legislation of the Higher Education Opportunity Act (HEOA) requires institutions of higher learning to make greater access control efforts for the purposes of assuring that students of record are those actually accessing the systems and taking exams in online courses by adopting identification technologies as they become more ubiquitous. To meet these needs we propose combining keystroke and stylometry information in developing a robust biometric system to authenticate online test takers.
    • Tappert, C. & Villani, M. (2010, September). Keystroke biometric system. DARPA (DARPA-BAA-10-36) - subcontract under Telcordia , Federal , $1,000,000.00 . Not Funded,Extend Pace University's robust keystroke biometric system for long-text input. The system has user-identification and user-authentication Internet applications that are of increasing importance as the population of application participants continues to grow.
    • Tappert, C. & Grossman, F. (2012, July). Continual computer-usage behavioral biometric authentication. DARPA (BAA-12-06) , Federal , $500,000.00 . Not Funded,This proposal is aimed at developing a behavioral biometric system to continually authenticate users of Department of Defense (DoD) desktop computers.
    • Tappert, C. & Grossman, F. (2012, July). Innovative biometric authentication for smartphones. NineSigma , Private , $500,000.00 . Not Funded,Face+Voiceprint+Signature+Keystroke Biometrics
    • Tappert, C. & Cha, S. (2011, September). Keystroke-stylometry biometric system for test-taker authentication. Google , Private , $35,000.00 . Not Funded,The recent federal legislation of the Higher Education Opportunity Act (HEOA) requires institutions of higher learning to make greater access control efforts for the purposes of assuring that students of record are those actually accessing the systems and taking exams in online courses by adopting identification technologies as they become more ubiquitous. To meet these needs we propose to combine keystroke and stylometry information in developing a robust biometric system to authenticate online test takers.
    • Tappert, C. & Stix, A. (2007, September). Using research and projects to develop tablet pc applications . Microsot , Private , $80,000.00 . Not Funded,We propose a research and project-development-infrastructure approach to facilitate the use and effective integration of the Tablet PC into undergraduate courses, primarily CIS 101 (Introduction to Computing), a core course of the Pace University Curriculum taken by all undergraduate students.

    Publications

    • Kim, S. & Tappert, C. (2014, March). A correlation method for handling infrequent data in keystroke biometric systems.
    • Monaco, J. V. & Tappert, C. (2013, September). behavioral biometric verification of student identity in online course assessment and authentication of authors in literary works.
    • Bakelman, N. & Tappert, C. (2013, August). keystroke biometric studies on password and numeric keypad input.
    • Monaco, J. V. & Tappert, C. (2013, August). recent advances in the development of a long-text-input keystroke biometric authentication system for arbitrary text input.
    • Cha, S. (2012). A distance between distributions with special topologies of cost matrices. Journal of Pattern Recognition Research (JPRR),. Vol 7 (Issue 1) , pages pp 1-25.
    • Cha, S. (2012). On complete and size balanced k-ary tree integer sequences. International Journal of Applied Mathematics and Informatics. Vol 6 (Issue 2) , pages pp67-75 .
    • Monaco, J. V. & Tappert, C. (2012, August). developing a keystroke biometric system for continual authentication of computer users.
    • Bakelman, N. & Tappert, C. (2012, May 1). Continual keystroke biometric authentication on short bursts of keyboard input.
    • Mitchell, C. & Cha, S. (2012, May 1). Radix selection algorithm for the k order statistic.
    • Nwosisi, C. & Lipsitz, E. (2011, October (4th Quarter/Autumn) 1). Predicting deep venous thrombosis using binary decision trees.
    • Cha, S. (2011, May 1). On the k-ary tree combinatronics. Vol 284
    • Cha, S. (2011, February 1). Computing parity of combinatorial functions. Vol 281
    • Cha, S. (2011, January (1st Quarter/Winter) 1). Recursive algorithm for generating partitions of an integer. Vol 280
    • Tappert, C. & Zack, R. (2010, December 31). A keystroke biometric system for long-text input.
    • Choi, S. & Tappert, C. (2010, December 31). A survey of binary similarity and distance measures.
    • Tappert, C. & Cha, S. (2010, December 31). Keystroke biometric identification and authentication on long-text input.
    • Nwosisi, C. & Lipsitz, E. (2010, November 1). Constructing binary decision trees for predicting deep venous thrombosis.
    • Zack, R. & Cha, S. (2010, September 1). Performance of a long-text-input keystroke biometric authentication system using an improved k-nearest-neighbor classification method.
    • Zack, R. & Cha, S. (2010, September 1). Performance of a long-text-input keystroke biometric authentication system using an improved k-nearest-neighbor classification method. Vol 276
    • Cha, S. & Tappert, C. (2010, July (3rd Quarter/Summer) 1). Roc curves for multivariate biometric matching models.
    • Burke, A. & Athanasopoulos, D. (2010, May 1). Forensic evidence management information systems (femis).
    • Tappert, C. & Cha, S. (2009, December 31). Keystroke biometric identification and authentication on long-text input.
    • Zack, R. & Warren, M. (2009, November 1). Obtaining biometric roc curves from a non-parametric classifier in a long-text-input keystroke authentication study. Vol 268

    PRESENTATIONS

    • Cha, S. (2012, October). a International Conference on Computer Science and Applications. On parity based divide and conquer recursive functions. San Francisco
    • Cha, S. (2012, October). International Conference on Computer Science and Applications. Taxonomy and nomenclature of preferential voting methods. San Francisco
    • Monaco, J. & Tappert, C. (2012, August). European Intel & Security Informatics. Developing a keystroke biometric system for continual authentication of computer users. Odense, Denmark,
    • Bakelman, N. & Tappert, C. (2012, May). Pace CSIS Research Day .  continual keystroke biometric authentication on short bursts of keyboard input.
    • Mitchell, C. & Cha, S. (2012, May). Pace CSIS Research Day M. Radix selection algorithm for the k order statistic.
    • Cha, S. (2012, January). American Conference on Applied Mathematics. On integer sequences derived from balanced k-ary trees. Cambridge, MA
    • Stewart, J. C. & Tappert, C. (2011, October). Int. Joint Conf. Biometrics. An investigation of keystroke and stylometry traits. Washington DC
    • Cha, S. (2006, May 1). CSIS Student/Faculty Research Day. Assessing the discriminatory power of biometric verifiers.
    • Cha, S. & Simone, J. (2006, May 1). CSIS Student/Faculty Research Day. Keystroke biometric recognition on long-text input under ideal and application-oriented conditions.
    • Cha, S. & Simone, J. (2006, May 1). CSIS Student/Faculty Research Day. Keystroke biometric recognition on long-text input: a feasibility study.
    • Cha, S. & Abrams, C. (2006, May 1). CSIS Student/Faculty Research Day. Shape matching with ordered boundary points using a least-cost diagonal method.
    • Cha, S. (2005, November 1). High Technology Crime Investigation Association Conference - Northeast. Security-related research and projects in csis at pace university.
    • Cha, S. (2005, September 1). International Conference on Image Analysis and Recognition - ICIAR 2005. 2005 conference. Toronto, Canada,
    • Cha, S. & Lee, Y. (2005, September 1). International Conference on Image Analysis and Recognition - ICIAR 2005. On the individuality of the iris biometric. Toronto, Canada,
    • Cha, S. & Yoon, S. (2005, August 1). The 6th International Conference on Document Analysis and Recognition - ICDAR. On binary similarity measures for handwritten character recognition. Seoul, Korea,
    • Cha, S. & Choi, S. (2005, August 1). The 6th International Conference on Document Analysis and Recognition - ICDAR. Writer profiling using handwriting copybook styles. Seoul, Korea,
    • Cha, S. & Choi, S. (2005, August 1). The 8th International Conference on Document Analysis and Recognition. On binary similarity measures for handwritten character recognition.
    • Cha, S. (2005, August 1). The 8th International Conference on Document Analysis and Recognition. Writer profiling using handwriting copybook styles.
    • Cha, S. & Gibbons, M. (2005, July 1). Audio- and Video-based Biometric Person Authentication Conference. Biometric identification generalizability.
    • Cha, S. & Hanson, V. (2005, July 1). The 11th Annual International Conference on Human-Computer Interaction. Common chatroom abbreviations speed pen computing.
    • Cha, S. (2005, July 1). The 9th World Multi-Conference on Systemics, Cybernetics and Informatics. 2005 conference.
    • Cha, S. (2005, July 1). The 9th World Multi-Conference on Systemics, Cybernetics and Informatics. Combining multiple iris biometric verifiers.
    • Cha, S. & Lee, Y. (2005, July 1). The 9th World Multiconference on Systemics, Cybernetics and Informatics - WMSCI 2005. Combining multiple iris biometric verifiers.
    • Cha, S. & Yoon, S. (2005, July 1). The 9th World Multiconference on Systemics, Cybernetics and Informatics - WMSCI 2005. Integrating heterogeneous features for iris biometric authentication.
    • Cha, S. & Ahmed, B. U. (2005, July 1). The 9th World Multiconference on Systemics, Cybernetics and Informatics - WMSCI 2005. Nationality identification from names using n-gram based cumulative frequency addition.
    • Cha, S. & Gibbons, M. (2005, June 27). Multiconference in Computer Science and Computer Engineering/Machine Learning; Models, Technologies and Applications (MCSCE/MLMTA). Analyzing open biometric identification systems. Las Vegas, NV
    • Cha, S. & Gargano, M. L. (2005, June 27). Multiconference in Computer Science and Computer Engineering/Machine Learning; Models, Technologies and Applications (MCSCE/MLMTA). Applying artificial intelligence techniques to problems of incomplete information: optimizing bidding in the game of bridge. Las Vegas, NV
    • Cha, S. & Nwana, N. (2005, June 27). Multiconference in Computer Science and Computer Engineering/Machine Learning; Models, Technologies and Applications (MCSCE/MLMTA). Applying keystroke biometrics for user verification and identification. Las Vegas, NV
    • Cha, S. & Bishop, G. (2005, June 27). Multiconference in Computer Science and Computer Engineering/Machine Learning; Models, Technologies and Applications (MCSCE/MLMTA). Identification of pottery shapes and schools using image retrieval techniques. Las Vegas, NV
    • Cha, S. & Manfredi, M. (2005, June 1). 12th Annual Conference of the International Graphonomics Society. Similarity-based copybook style analysis using pseudo-online handwriting.
    • Cha, S. & Bishop, G. (2005, June 1). Multiconference in Computer Science and Computer Engineering/Conference on Imaging Science, Systems and Technology. Identification of pottery shapes and schools using image retrieval techniques.
    • Cha, S. (2005, June 1). Multiconference in Computer Science and Computer Engineering/International Conference of Artificial Intelligence. 2005 conference.
    • Cha, S. & Gargano, M. L. (2005, June 1). Multiconference in Computer Science and Computer Engineering/International Conference of Artificial Intelligence. Applying artificial intelligence techniques to problems of incomplete information: optimizing bidding in the game of bridge.
    • Cha, S. & Bishop, G. (2005, May 1). CSIS Student/Faculty Research Day. A greek pottery shape and school identification and classification system using image retrieval techniques.
    • Cha, S. & Gargano, M. L. (2005, May 1). CSIS Student/Faculty Research Day. Applying artificial intelligence techniques to problems of incomplete information: optimizing bidding in the game of bridge.
    • Cha, S. & Ahmed, B. U. (2005, May 1). CSIS Student/Faculty Research Day. Detection of foreign entities in native text using n-gram cumulative frequency addition.
    • Cha, S. & Manfredi, M. (2005, May 1). CSIS Student/Faculty Research Day. Handwriting copybook style analysis of pseudo-online data.
    • Cha, S. & Nwana, N. (2005, May 1). CSIS Student/Faculty Research Day. Long-text keystroke biometric applications over the internet.
    • Cha, S. & Gibbons, M. (2005, May 1). CSIS Student/Faculty Research Day. On evaluating open biometric identification systems.
    • Cha, S. & Gargano, M. L. (2005, May 1). CSIS Student/Faculty Research Day. Semantic geometric features: a preliminary investigation of automobile identification.
    • Cha, S. & Gattani, A. (2005, May 1). The 2005 Electro/Information Technology Conference - EIT 2005. Computer assisted visual interactive recognition (caviar) technology.
    • Cha, S. & Gargano, M. L. (2005, April 11). International Association for Pattern Recognition Technical Committee #15 (IAPR-TC-15) Workshop on Graph-based Representations in Pattern Recognition. A vascular network growth estimation algorithm using random graphs. Poitiers, France,
    • Cha, S. (2005, April 1). CSAM Seminar in Computer Science - April 2005. Biometric authentication: is it science?. Montclair State University, Montclair, NJ
    • Cha, S. & Gargano, M. L. (2005, April 1). Proceedings of the International Association for Pattern Recognition Technical Committee #15 (IAPR-TC-15). A vascular network growth estimation algorithm using random graphs. Workshop on Graph-based Representations in Pattern Recognition
    • Cha, S. & Bishop, G. (2005, March 1). Computer Applications in Archaeology - 2005. Automated pottery fragment classifier for archaeological studies.
    • Cha, S. & Yoon, S. (2005, January 1). Electronic Imaging Conference - Image and Video Communications and Processing 2005. Computer-assisted handwriting style identification in questioned document examination.
    • Cha, S. & Lombardi, T. (2005, January 1). Electronic Imaging Conference - Image and Video Communications and Processing 2005. Lightweight image retrieval system for paintings.
    • Cha, S. & Yoon, S. (2005, January 1). Investigative Image Processing III - Electronic Imaging 2005. Computer-assisted handwriting style identification in questioned document examination. San Jose, CA
    • Cha, S. & Lombardi, T. (2005, January 1). Investigative Image Processing III - Electronic Imaging 2005. Lightweight impage retrieval system for paintings. San Jose, CA
    • Cha, S. & Stuart, I. (2004, May 1). CSIS Student/Faculty Research Day. A neural network classifier for junk e-mail.
    • Tao, L. & Gargano, M. L. (2004, May 1). CSIS Student/Faculty Research Day. Ant colonies, self-organizing maps, and a hybrid classification model.
    • Cha, S. & Trilok, N. (2004, May 1). CSIS Student/Faculty Research Day. Establishing the uniqueness of the human voice for security applications.
    • Cha, S. & Hart, E. K. (2004, May 1). CSIS Student/Faculty Research Day. Interactive flag identification using a fuzzy neural technique.
    • Cha, S. & Ahmed, B. U. (2004, May 1). CSIS Student/Faculty Research Day. Language identification from text using n-gram based cumulative frequency addition.
    • Cha, S. & Hanson, V. (2004, May 1). CSIS Student/Faculty Research Day. Use of chatroom abbreviations and shorthand symbols in pen computing.
    • Cha, S. & Choi, S. (2004, May 1). CSIS Student/Faculty Research Day. Use of histogram distances in iris authentication.
    • Cha, S. (2004, March 1). International Multiconference in Computer Science and Computer Engineering.
    • Cha, S. (2003, December 9). CSIS Student/Faculty Research Day. Emerging computer applications to multidisciplinary security issues. Pace University
    • Cha, S. (2003, December 1). CSIS Faculty Research Day. Computer vision techniques for security. Pace University
    • Cha, S. (2003, November 2). IGS. Scottsdale, AZ
    • Cha, S. (2003, November 1). CIRCUIT Research Seminar. Artificial intelligence & pattern recognition. Pace University, Pleasantville, NY
    • Cha, S. (2003, May 1). CSIS Research Day. Iconic reporting system. Pace University, New York, NY
    • Cha, S. (2003, March 1). Second Westchester-Rockland Junior Science and Humanities Symposium. Purchase, NY
    • Cha, S. (2003, February 1). ICDAR. Edinburgh, Scotland
    • Cha, S. (2003, January 1). ECSE. Use of distance measures in pattern recognition. Rensselaer Polytechnic Institute, Troy, NY
    • Cha, S. (2003, January 1). Electronic Imaging, Storage and Retrieval for Media Databases. Santa Clara, CA
    • Cha, S. (2002, December 1). IEEE MSE. Newport Beach, CA
    • Cha, S. (2002, October 1). CENPARMI - Centre for Pattern Recognition and Machine Intelligence. Biometrics. Concordia University, Montreal, Canada
    • Cha, S. (2002, September 1). ACM Mobile Commerce. Atlanta, GA
    • Cha, S. (2002, August 1). Eighth IWFHR. Niagara-on-the-Lake, Canada
    • Cha, S. (2002, August 1). Eighth IWFHR. Niagara-on-the-Lake, Canada
    • Cha, S. (2002, June 1). KAIST AIPR Lab. Taejon, Korea
    • Cha, S. (2002, May 1). CSIS Research Day. Pace University, New York, NY
    • Cha, S. (2002, April 1). MASPLAS. White Plains, NY
    • Cha, S. (2002, March 1). CAM Research Day.
    • Cha, S. (2002, March 1). CAM Research Day. New York, NY
    • Cha, S. (2001, September 1). 6th International Conference on Document Analysis and Recognition. "establishing handwriting individuality using pattern recognition techniques," "apriori algorithm for sub-category classification analysis of handwriting," and "individuality of handwriting". Seattle, WA
    • Cha, S. (2001, May 1). CSIS Research Day.
    • Cha, S. (2001, February 1). HVCET.

    Department Service

    • Pace University, Computer Science & Information Systems [Pervasive Computing Lab]
    • Pace University, Computer Science & Information Systems [Robotics Lab]

    College Service

    • Pace University, Computer Science & Information Systems [Other]
      Desc: Member of the Cirriculum Committee