Publications

UCCS VAST Lab Publications  

Journal and Selective Conf. Pubs.

  1. Rudd, Ethan M and Gunther, Manuel and Dhamija, Akshay R and Kateb, Faris A and Boult, Terrance E.  “What’s Hiding in My Deep Features?” 2018. [Bibtex]
  2. Henrydoss, James and Cruz, Steve and Rudd, Ethan M and Boult, Terrance E and others  “Incremental Open Set Intrusion Recognition Using Extreme Value Machine” 2017. [Bibtex]
  3. Dhamija, Svati and Boult, Terranee E.  “Automated mood-aware engagement prediction” 2017. [Bibtex]
  4. Rozsa, Andras and Gunther, Manuel and Rudd, Ethan M and Boult, Terrance E. “Facial attributes: Accuracy and adversarial robustness” 2017. [Bibtex]
  5. Rozsa, Andras and Gunther, Manuel and Boult, Terranee E “LOTS about attacking deep features” arXiv preprint arXiv:1611.06179v4. 2017. [Bibtex]
  6. Gunther, Manuel and Rozsa, Andras and Boult, Terranee E “AFFACT: Alignment-free facial attribute classification technique” arXiv preprint arXiv:1611.06158v2. 2017. [Bibtex]
  7. Rozsa, Andras and Gunther, Manuel and Boult, Terrance E. “Adversarial Robustness: Softmax versus Openmax” arXiv preprint arXiv:1708.01697v1. 2017. [Bibtex]
  8. Dhamija, Svati and Boult, Terrance E. “Exploring Contextual Engagement for Trauma Recovery” 2017. [Bibtex]
  9. Bradley, Chloe and Boult, Terrance E and Ventura, Jonathan. “Cross-Modal Facial Attribute Recognition with Geometric Features” 2017. [Bibtex]
  10. Gunther, Manuel and Cruz, Steve and Rudd, Ethan M and Boult, Terrance E. “Toward open-set face recognition” 2017. [Bibtex]
  11. Cruz, Steve and Coleman, Cora and Rudd, Ethan M and Boult, Terrance E. “Open Set Intrusion Recognition for Fine-Grained Attack Categorization” arXiv preprint arXiv:1703.02244v1. 2017. [Bibtex]
  12. Alzhrani, Khudran and  Rudd, Ethan M. and Chow, C. Edward and Boult, Terrance E. “Automated U.S Diplomatic Cables Security Classification: Topic Model Pruning vs. Classification Based on Clusters” arXiv preprint arXiv:1703.02248v1. 2017. [Bibtex]
  13. Gunther, Manuel and Rozsa, Andras and Boult, Terrance E. “On the Robustness of Deep Neural Networks“. appeared IEEE SPM Nov 2017.
  14. Gunther, Manuel and Rozsa, Andras and Boult, Terrance E. “Towards Robust Deep Neural Networks with BANG“. arXiv preprint arXiv:1612.00138. 2016. [Bibtex]
  15. Gunther, Manuel and Rozsa, Andras and Boult, Terrance E. “AFFACT-Alignment Free Facial Attribute Classification Technique“. arXiv preprint arXiv:1611.06158. 2016. [Bibtex]
  16. Rozsa, Andras and Gunther, Manuel and Boult, Terrance E. “Exploring LOTS in Deep Neural Networks“. arXiv preprint arXiv:1611.06179. 2016. [Bibtex]
  17. Alzhrani, Khudran and Rudd, Ethan M and Boult, Terrance E and Chow, C Edward. “Automated Big Text Security Classification“. arXiv preprint arXiv:1610.06856. 2016. [Bibtex]
  18. Rozsa, Andras and Gunther, Manuel and Boult, Terrance E. “Are Accuracy and Robustness Correlated?“. arXiv preprint arXiv:1610.04563. 2016. [Bibtex]
  19. Graese, Abigail and Rozsa, Andras and Boult, Terrance E. “Assessing Threat of Adversarial Examples on Deep Neural Networks“. arXiv preprint arXiv:1610.04256. 2016. [Bibtex]
  20. White, Richard and George, Randy and Boult, Terrance and Chow, C Edward. “Apples to Apples: RAMCAP and Emerging Threats to Lifeline Infrastructure.“. Homeland Security Affairs. 2016. [Bibtex]
  21. White, Richard and Burkhart, Aaron and George, Randy and Boult, Terrance and Chow, Edward. “Towards comparable cross-sector risk analyses: A re-examination of the Risk Analysis and Management for Critical Asset Protection (RAMCAP) methodology“. International Journal of Critical Infrastructure Protection. 2016. [Bibtex]
  22. Rozsa, Andras and Gunther, Manuel and Rudd, Ethan M and Boult, Terrance E. “Are Facial Attributes Adversarially Robust?“. arXiv preprint arXiv:1605.05411. 2016. [Bibtex]
  23. Rudd, Ethan M and Gunther, Manuel and Boult, Terrance E. “PARAPH: Presentation Attack Rejection by Analyzing Polarization Hypotheses“. arXiv preprint arXiv:1605.03124. 2016. [Bibtex]
  24. Rudd, Ethan M and Boult, Terrance E. “CALIPER: Continuous Authentication Layered with Integrated PKI Encoding Recognition“. arXiv preprint arXiv:1605.03116. 2016. [Bibtex]
  25. Rozsa, Andras and Rudd, Ethan M and Boult, Terrance E. “Adversarial Diversity and Hard Positive Generation“. arXiv preprint arXiv:1605.01775. 2016. [Bibtex]
  26. Rudd, Ethan and Gunther, Manuel and Boult, Terrance. “MOON: A Mixed Objective Optimization Network for the Recognition of Facial Attributes“. arXiv preprint arXiv:1603.07027. 2016. [Bibtex]
  27. Rudd, Ethan and Rozsa, Andras and Gunther, Manuel and Boult, Terrance. “A Survey of Stealth Malware: Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions“. arXiv preprint arXiv:1603.06028. 2016. [Bibtex]
  28. Alsaadi, Fawaz E and Boult, Terrance E. “Furthering fingerprint-based authentication: Introducing the true-neighbor template“. 2016 IEEE Winter Conference on Applications of Computer Vision (WACV):1–7. 2016. [Bibtex]
  29. White, Richard and Burkhart, Aaron and Boult, Terrance and Chow, Edward. “Towards a Comparable Cross-Sector Risk Analysis: RAMCAP Revisited“. International Conference on Critical Infrastructure Protection:221–237. 2016. [Bibtex]
  30. Alsaadi, Fawaz E and Boult, Terrance E. “Perpetuating Biometrics for Authentication“. Information Technology: New Generations: 161–176. 2016. [Bibtex]
  31. Bendale, Abhijit and Boult, Terrance. “Towards Open Set Deep Networks“. arXiv preprint arXiv:1511.06233. 2015. [Bibtex]
  32. Ayodele, Anthony O and Rao, Jia and Boult, Terrance E. “Performance Measurement and Interference Profiling in Multi-tenant Clouds“.  IEEE 8th International Conference on Cloud Computing: 941-949. 2015. [Bibtex]
  33. Rudd, Ethan M and Jain, Lalit P and Scheirer, Walter J and Boult, Terrance E. “The extreme value machine“. arXiv preprint arXiv:1506.06112. 2015. [Bibtex]
  34. Rozsa, Andras and Glock, Albert E and Boult Terrance E.”Genetic algorithm attack on a minutiae-based fingerprint authentication and protected template fingerprint systems“. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops: 100-108. 2015. [Bibtex]
  35. Bendale, Abhijit and Boult, Terrance. “Towards open world recognition“.Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition: 1893-1902. 2015. [Bibtex]
  36. W. Scheirer, L. Jain, & T.E. Boult (2014). “ Probability models for open set recognition“. IEEE Transactions on Pattern Analysis and Machine Intelligence, TPAMI 36(11), November 2014.
  37. Richard White, Terrance Boult, and Edward Chow. “A computational asset vulnerability model for the strategic protection of the critical infrastructure.” International Journal of Critical Infrastructure Protection 7.3 (2014): 167-177.
  38. Lalit P. Jain, Walter J. Scheirer, Terrance E. Boult, “Multi-Class Open Set Recognition Using Probability of Inclusion,” Proceedings of the European Conference on Computer Vision (ECCV), Springer International Publishing, 393-409. September 2014.
  39. Walter J. Scheirer, Michael Wilber, Michael Eckmann, Terrance E. Boult, “Good Recognition is Non-metric,” Pattern Recognition, August 2014.
  40. Michael Wilber, Ethan Rudd, Brian Heflin, Yui Man Lui & T.E. Boult, “ Exemplar Codes for Facial Attributes and Tattoo Recognition“, IEEE Winter conference on Applications of Computer Vision, March 2014.
  41. P. F. Felzenszwalb, T. E. Boult, D. A., Forsyth, & P. Fua, (2013). TPAMI CVPR Special Section. IEEE Transactions on Pattern Analysis and Machine Intelligence, 35(12), 2819-2820.
  42. Archana Sapkota and Terrance E. Boult, “Large Scale Unconstrained Open Set Face Database”, IEEE Int. Conf. Biometrics Theory, Application and Systems (BTAS) 2013.
  43. Archana Sapkota, R. Gopalan, E. Zavesky, and T.E. Boult, “Appearance, Context and Co-occurrence Ensembles for Identity Recognition in Personal Photo Collections”, IEEE Int. Conf. Biometrics Theory, Application and Systems (BTAS) 2013.
  44. Abdullah A. Albahdal, Hamdan Alzahrani, Lalit Prithviraj Jain, and Terrance E. Boult, “Trusted BWI: Privacy and Trust Enhanced Biometric Web Identities”, IEEE Int. Conf. Biometrics Theory, Application and Systems (BTAS) 2013.
  45. R.C. Johnson, T. E. Boult and W.J. Scheirer ” Voice Authentication Using Short Phrases: Examining Accuracy, Security and Privacy Issues”, IEEE Int. Conf. Biometrics Theory, Application and Systems (BTAS) 2013.
  46. Archana Sapkota and Terrance E. Boult, “ GRAB: Generalized Region Assigned to Binary“, EURASIP Journal on Image and Video Processing, special issue on Local Binary Pattern (LBP)-based image and Video Analysis, 2013.
  47. Walter J. Scheirer, Anderson Rocha, Archana Sapkota, Terrance E. Boult, Towards Open Set Recognition IEEE Transactions on Pattern Analysis and Machine Intelligence (T-PAMI), July 2013.
  48. Walter J. Scheirer, Neeraj Kumar, Peter N. Belhumeur, Terrance E. Boult, “Multi-Attribute Spaces: Calibration for Attribute Fusion and Similarity Search,” Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), June 2012.
  49. Walter J. Scheirer, Anderson Rocha, Jonathan Parris, Terrance E. Boult, “Learning for Meta-Recognition,” IEEE Transactions on Information Forensics and Security (T-IFS), August 2012.
  50. Walter J. Scheirer, Anderson Rocha, Ross J. Micheals, Terrance E. Boult, “Meta-Recognition: The Theory and Practice of Recognition Score Analysis,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 33, no. 8, pp. 1689-1695, Mar. 2011,   doi:10.1109/TPAMI.2011.54     Bibtex     Preprint
  51. A. Rocha, W. Scheirer, T. Boult and S. Goldenstein “Vision of the Unseen: Current Trends and Challenges in Digital Image and Video Forensics” ACM Computing Surveys, Oct 2011.
  52. Walter J. Scheirer, Neeraj Kumar, Karl Ricanek, Terrance E. Boult, Peter N. Belhumeur, “Fusing with Context: a Bayesian Approach to Combining Descriptive Attributes,” Proceedings of the IEEE International Joint Conference on Biometrics (IJCB), October 2011.
  53. Jon Parris, Michael Wilber, Brian Heflin, Ham Rara, Ahmed El-barkouky, Aly Farag, Javier Movellan, Anonymous, Modesto Castrilon-Sanatana, Javier Lorenzo-Navarro, Mohammad Nayeem Teli, Sebastien Marcel, Cosmin Atanasoaei, and Terry Boult. “Face and Eye Detection on Hard Datasets”, Proceedings of IEEE International Joint Conference on Biometrics (IJCB 2011), October, 2011
  54. T.Zhang and T.E. Boult, Realistic Stereo Error Models and Finite Optimal Stereo Baselines, IEEE Workshop on Applications of Computer Vision, Jan 2011.
  55. W. Scheirer, W. Bishop and T. Boult “Beyond PKI: The Biocyptographic Key Infrastructure,” IEEE Workshop on Information Forensics and Security, Dec 2010.
  56. A. Bendale and T. Boult, id-Privacy in Large Scale Biometric Systems, IEEE Workshop on Information Forensics and Security, Dec 2010.
  57. W. Scheirer, A. Rocha,, R. Micheals and T. Boult “Robust Fusion: Extreme Value Theory for Recognition Score Normalization” European Conference on Computer Vison, Springer LNSC 6313, pp481-495, Sept 2010.
  58. T. E. Boult, A. T. Chamillard, R. Lewis, N. Polok, G. Stock, D. Wortman “Innovations in University Education in Innovation: Moving Beyond the B.S.” Journal of Innovation Science, Vol 1, Num. 4, pp 167-178, Feb. 2010
  59. B. Heflin, W Scheirer, and T.E. Boult, “Correcting rolling-shutter distortion of CMOS sensors using facial feature detection”, IEEE Int. Conf. on Biometrics: Theory Applications and Systems (BTAS), 2010
  60. B Parks. and T.E. Boult., “ Top-down facilitation of multistage decisions for face recognition “, IEEE Int. Conf. on Biometrics: Theory Applications and Systems (BTAS), 2010
  61. VN Iyer, WJ Scheirer and TE Boult, “Face system evaluation toolkit: Recognition is harder than it seems”, IEEE Int. Conf. on Biometrics: Theory Applications and Systems (BTAS), 2010
  62. W. Scheirer, A. Rocha, B. Heflin, and T. Boult, “Difficult Detection: A Comparison of Two Different Approaches to Eye Detection for Unconstrained Environments,” the Third IEEE Int. Conf. on Biometrics: Theory, Applications, and Systems (BTAS 2009), Sept. 2009, Washington, D.C.
  63. W. J. Scheirer and T. E. Boult, “Bipartite Biotokens: Definition, Implementation, and Analysis”, the International Conference on Biometrics, June 2009
  64. W. Scheirer and T. Boult, “A Fusion-Based Approach to Enhancing Multi-Modal Biometric Recognition System Failure Prediction and Overall Performance”, IEEE Int. Conf. on Biometrics Theory Application and Systems, 2008.
  65. W. Scheirer and T. Boult, “Bio-Cryptographic Protocols with Bipartite Biotokens”, IEEE Biometrics Research Symposium at the Biometrics Consortium Conference, Sept 2008.
  66. Gang Zheng, Chia-Jiu Wang, and Terrance E. Boult, Application of Projective Invariants in Hand Geometry Biometrics IEEE Transactions on Information Forensics and Security (TIFS), Vol. 2, No. 4, December 2007. DOI 10.1109/TIFS.2007.908239
  67. Xiaobo Zhou , Dennis Ippoliti, Terrance Boult “Hop-count based probabilistic packet dropping: Congestion mitigation with loss differentiation” Computer Communications, Volume 30, Issue 18, 10 December 2007, Pages 3859-3869
  68. W. J. Scheirer and T. E. Boult, “Cracking Fuzzy Vaults and Biometric Encryption”, IEEE Biometrics Research Symposium at the National Biometrics Consortium Conference, Sept. 2007.
  69. T.E. Boult, W.J. Scheirer and R. Woodworth, “Revocable Fingerprint Biotokens: Accuracy and Security Analysis”, IEEE Conf. on Computer Vision and Pattern Recognition, June 2007.
  70. T. Zhang, T.E. Boult, and R.C. Johnson “Two thresholds are better than one”, IEEE CVPR Workshops, Seventh Workshop on Visual Surveillance, June 2007.
  71. Shree K. Nayar, Vlad Branzoi, Terrance E. Boult: Programmable Imaging: Towards a Flexible Camera. International Journal of Computer Vision 70(1): 7-22 2007.
  72. X. Zhou, D. Ippoli, T. Boult, “HPPD: A Hop-Count Probabilistic Packet Dropper,” IEEE International Conference on Communications, 2006.
  73. T. E. Boult, “Robust distance measures for face recognition supporting revocable biometric tokens”, IEEE Conf. on Face and Gesture, April 2006.
  74. M.J. Zukoski, T. Boult and T. Iyriboz, “A novel approach to medical image compression”, Int. J. Bioinformatics Research and Applications, pages 89-103, Vol. 2, No. 1, 2006,
  75. T.P. Ripokia and T.E. Boult, “Classification Enhancement via Biometric Pattern Perturbation”. IAPR Conference on Audio- and Video-based Biometric Person Authentication, (AVBPA Springer Lecture Notes in Computer Science 3546) pp850-859, July 2005.
  76. W. Li, X. Gao, Y. Zhu, V. Ramesh & T.E. Boult, “On the Small Sample Performance of Boosted Classifiers” IEEE Conf. on Computer Vision and Pattern Recognition, Page(s):574 – 581 vol. 2., June 2005
  77. S. K. Nayar, P. N. Belhumeur and T. E. Boult, “Lighting Sensitive Displays”, ACM Transactions on Graphics (TOG), Volume 23, Issue 4, 963 – 979, 2004
  78. S. K. Nayar, V. Branzoi T. E. Boult, “Programmable Imaging using a Digital Micro-mirror Array” IEEE Conf. on Computer Vision and Pattern Recognition, June 2004. Winner: Best paper Award
  79. Li Yu, Terrance E. Boult, “Understanding Images of Graphical User Interfaces: A New Approach to Activity Recognition for Visual Surveillance,” Second IEEE Workshop on Event Mining, in conjunction with IEEE CVPR04.
  80. Binglong Xie, Visvanathan Ramesh and Terrance Boult. “Sudden illumination change detection using order consistency”, Image and Vision Computing Volume 22, Issue 2 , 1 February 2004, Pages 117-125.
  81. T.E. Boult, X. Gao, R. Micheals, and M. Eckmann, “ Omni-directional Visual Surveillance” Image and Vision Computing Volume 22, Issue 7 , 1 July 2004, Pages 515-534
  82. Binglong Xie, D. Comaniciu, V. Ramesh, M. Simon and T.Boult “Component Fusion for Face Detection in the Presence of Heteroscedastic Noise” Pattern Recognition, Proceeding of the 25th DAGM Symposium, Magdeburg, Germany, September 10-12, 2003, Springer Lecture Notes in Computer Science Volume 2781 / 2003, pp. 434-441.

Other Refereed Publications


  1. Abhijit Bendale & T.E. Boult, Reliable Posterior Probability Estimation for Streaming Face Recognition, IEEE CVPR Workshop on Biometric 2014.
  2. James Henrydoss, and Terry Boult. “Critical security review and study of DDoS attacks on LTE mobile network.” Wireless and Mobile, 2014 IEEE Asia Pacific Conference on. IEEE, 2014.
  3. Abdullah Albahdal an Terrance Boult, “Biocryptographic Secure Socket Layer (BSSL)”, Academy of Science and Engineering (ASE), USA 2014, 2014-06-16
  4. Albahdal, A. A., & Boult, T. E. (2014, April). Problems and Promises of Using the Cloud and Biometrics. In Information Technology: New Generations (ITNG), 2014 11th International Conference on (pp. 293-300). IEEE.
  5. Alsolami, F., & Boult, T. E. (2014, April). CloudStash: Using Secret-Sharing Scheme to Secure Data, Not Keys, in Multi-clouds. In Information Technology: New Generations (ITNG), 2014 11th International Conference on (pp. 315-320). IEEE.
  6. R.C. Johnson and T. E. Boult ” With Vaulted Voice Verification My Voice Is My Key”, IEEE Conference on Technologies for Homeland Security (HST ’13), 2013.
  7. Lalit Jain, Michael J. Wilber and T.E. Boult, “Issues in rotational (non-)invariance and image preprocessing,” Proc. IEEE CVPR Workshop on Biometrics, (CVPRW 2013), June 2013.
  8. Walter J Scheirer, Neeraj Kumar, Vijay N Iyer, Peter N Belhumeur, Terrance E Boult “How reliable are your visual attributes?” SPIE Defense, Security, and Sensing 87120Q-87120Q-12, May 2013.
  9. R.C. Johnson, Walter J Scheirer and Terrance E Boult “Secure voice-based authentication for mobile devices: vaulted voice verification.” SPIE Defense, Security, and Sensing. International Society for Optics and Photonics, 2013.
  10. Michael J. Wilber, Walter J. Scheirer, Phil Leitner, Brian Heflin, James Zott, Daniel Reinke, David Delaney, Terrance E. Boult, “Animal Recognition in the Mojave Desert: Vision Tools for Field Biologists,” Proc. IEEE Workshop on the Applications of Computer Vision (WACV), Jan 2013. Best Paper Award
  11. Brian Heflin, Walter J. Scheirer, Terrance E. Boult, “Detecting and Classifying Scars, Marks, and Tattoos Found in the Wild” The IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS), Sept 2012.
  12. M. Wilber, Brian Heflin, Walter J. Scheirer, Terrance E. Boult, “PRIVV: Private Remote Iris-authentication with Vaulted Verification”, IEEE Workshop on Biometrics at IEEE Computer Vision and Pattern Recognition Workshops, June 2012.
  13. Archana Sapkota, Terrance E Boult, Context-Patch for Difficult Face Recognition, Inter. Conf. on Biometrics, 2012
  14. Brian Heflin, Walter J. Scheirer, Terrance E. Boult, “For Your Eyes Only” Proceedings of the IEEE Workshop on the Applications of Computer Vision (WACV), January 2012.
  15. Michael Wilber and Terrance E. Boult, “Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification S2V3 , IEEE Workshop on Applications of Computer Vision, Jan 2012.
  16. Anthony Ayodele,James Henrydoss,Walter Schrier,T.E. Boult, “Study of Malware Threats Faced by the Typical Email User”, in The Second International workshop on Communications Security & Information Assurance (CSIA 2011), Springer LNCS 2011.
  17. A. Sapkota, B. Parks, W. Scheirer, and T. Boult, “FACE-GRAB: Face Recognition with General Region Assigned to Binary Operator”, in Proc. of the IEEE Computer Society Workshop of Biometrics, June 2010, San Francisco, CA.
  18. V. Iyer, S. Kirkbride, B. Parks, W. Scheirer, and T. Boult, “A Taxonomy of Face Models for System Evaluation,” IEEE Workshop on Analysis and Modeling of Faces and Gestures (AMFG 2010), June, 2010, San Francisco, CA.
  19. B. Heflin, B. Parks, W. Scheirer, T. Boult. Single Image Deblurring for a Real-time Face Recognition System. IEEE Industrial Electronics Conference (IECON 2010), November 2010, Phoenix, AZ
  20. W. Scheirer, A. Rocha, B. Heflin, and T. Boult, “Difficult Detection: A Comparison of Two Different Approaches to Eye Detection for Unconstrained Environments,” presented at the Third IEEE International Conference on Biometrics: Theory, Applications, and Systems (BTAS 2009), September 2009, Washington, D.C.
  21. T. Boult and W. Scheirer, “Long Range Facial Image Acquisition and Quality,” in M. Tistarelli, S. Li and R. Chellappa, editors, Biometrics for Surveillance and Security. Springer-Verlag, 2009.
  22. Walter J. Scheirer, Abhijit Bendale and Terrance E. Boult, Predicting Biometric Facial Recognition Failure with Similarity Surfaces and Support Vector Machines, IEEE Computer Society Workshop on Biometrics 2008
  23. Michael Eckmann and Terrance Boult, Spatio-Temporal Consistency and Distributivity as Qualities of Features, IEEE Workshop on Visual Localization for Mobile Platforms, June 2008.
  24. W. Scheirer, R. White, and T. Boult, “Privacy Enhancement via Adaptive Cryptographic Embedding,” National Homeland Defense Foundation’s Emerging Technology Day, October 2008, Colorado Springs, CO.
  25. T. E. Boult “Beyond the BS, Teaching Innovation”, National Collegiate Inventors And Innovators Alliance, National Conference, 2008.
  26. T.E. Boult, W.J.Scheirer and R. Woodworth, “FAAD: Face at a Distance”, SPIE Defense and Security Symposium, Orlando FL, April 2008
  27. T.E. Boult and R. Woodworth, “Privacy and Security Enhancements in Biometrics”, Advances in Biometrics: Sensors, Algorithms and Systems, N. Ratha and V. Govindaraju editors. Springer. 2007.
  28. T. E. Boult and J. Haefner “Beyond The Bachelor Of Science”, American Society for Engineering Education, 2007.
  29. R.J. Micheals and T. E. Boult, “Improving Variance Estimation in Biometric Systems”, IEEE Workshop on Biometrics, June 2007.
  30. Li Yu and T. E. Boult, “Systems issues in Distributed Multi-modal Surveillance”, in Multi-modal Surveillance: Sensors, Algorithms and Systems , Z. Zhu and T. Huang editors, Artech Publishers, 2007.
  31. A. Chattopadhyay and T. E. Boult, “PrivacyCam: A Privacy Preserving Camera using uClinux on the Blackfin DSP”, Third IEEE Workshop on Embedded Vision Systems, June 2007
  32. Binglong Xie, Visvanathan Ramesh, Ying Zhu Terry Boult “On Channel Reliability Measure Training for Multi-Camera Face Recognition” IEEE Workshop on the Application of Computer Vision, Feb 2007.
  33. A. Viswanathan and T. Boult, “Power Conservation in ZigBee Networks using Temporal Control” , IEEE Int. Symposium on Wireless and Pervasive Computing, Jan 2007.
  34. Alison Brown, Peter Brown, Jacob Griesbach, Terry Boult, A Wireless GPS Wristwatch Tracking Solution Proceedings of SDR Forum 2006, Orlando, FL, November 2006
  35. B. Xie, T. Boult, V. Ramesh, Y. Zhu, “Multi-Camera Face Recognition by Reliability-Based Selection“, IEEE Conference on Computational Intelligence for Homeland Security and Personal Safety, October 2006.
  36. Terrance E. Boult, R.C. Johnson, Tracy Pietre, R. Woodworth, Tao Zhang A Decade of Networked Intelligent Video Surveillance , ACM Workshop on Distributed Camera Systems, 2006.
  37. T. E. Boult, “PICO: Privacy through Invertible Cryptographic Obscuration”, IEEE/NSF Workshop on Computer Vision for Interactive and Intelligent Environments, Nov 11, 2005.
  38. T.E. Boult, “Ultra-wide field of view face recognition”, Biometric Symposium Sept. 2005.
  39. G. Zheng, T.E. Boult,C.-J. Wang, “Projective Invariant Hand Geometry: An overview”, Biometric Symposium, Sept. 2005.
  40. Weiliang Li, X. Gao and T.E. Boult, “ Predicting Biometric System Failure“, IEEE Conference on Computational Intelligence for Homeland Security and Personal Safety, March 2005.
  41. Biometrics and Privacy Issues, presentation at NIST Personal Identity Verification Workshop.
  42. G. Zheng C.J. Wang and T.E.Boult “Personal Identification by Cross Ratios of Finger Features , IAPR workshop on Biometrics Challenges from Theory to Practice, August. 2004
  43. T. Riopka and T. Boult “The Eyes have it” , ACM Workshop on Biometric Methods and Applications, Nov. 2003
  44. Yu Li and T. Boult “Understanding Images of Graphical User Interfaces: A new approach to activity recognition for visual surveillance”, ACM UIST 2003, (Doctoral Symposium and poster presentation) Oct 2003.
  45. T. Boult “Geo-spatial Active Visual Surveillance on Wireless Networks” IEEE Applied Imagery Pattern Recognition (AIPR) Workshop, October 2003.
Other Publications2


  1. Alzahrani, H., & Boult, T. E. (2014, May). Remote authentication using vaulted fingerprint verification. In SPIE Defense+ Security (pp. 90750K-90750K). International Society for Optics and Photonics.
  2. R.C. Johnson W. Scheirer, and T. Boult, Secure voice based authentication for mobile devices: vaulted voice verification, SPIE Conference on Biometric and Surveillance Technology for Human and Activity Identification X, May 2, 2013.
  3. W. Scheirer, A. Rocha, T. Boult, and S. Goldenstein, “ The Unseen Challenge Data Sets,” Invited Paper, First IEEE Workitorial on Vision of the Unseen, June 2008, Anchorage, AK.
  4. T. Boult, W. Scheirer and R. Woodworth, “FAAD: Face at a Distance,” presented at the SPIE Defense and Security Symposium, March 2008, Orlando FL.
  5. Alison Brown, Jacob Griesbach, Bruce Bockius, and Terry Boult GPS Tracking Location-Based Service Using Wristwatch GeoZigBee Sensors Proceedings of the ION National Technical Meeting 2007, San Diego, CA, Jan. 2007
  6. T. L. Vogelsong, T. E. Boult, D. W. Gardner, R. Woodworth, R. C. Johnson, and B. Heflin, “24/7 Security System: 60 FPS Color EMCCD Camera with Integral Human Recognition”, SPIE Defense Symposium: Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense VII, April 2007.
  7. Alison Brown, Peter Brown and Jacob Griesbach, Terrence E. Boult GeoZigBee: A Wireless GPS Wristwatch Tracking Solution Proceedings of ION GNSS 2006, Fort Worth, Texas, September 2006