Dr. James Henrydoss

I am a Ph.D. graduate from the Computer Science Department advised by professor Dr. Terrance E. Boult. I also worked as a research assistant at the Vision And Security Technology (VAST) lab at the University of Colorado at Colorado Springs (UCCS). My research work lies at the intersection of network security and machine learning.


PhD: Engineering and Security, University of Colorado at Colorado Springs, CO.

MS: Software Engineering, University of Maryland University College, MD.

MBA: Troy (Alabama) State University, Troy, AL.

BE: Bharathiar University, Coimbatore, India.

Email: jhenrydo@uccs.edu; james.henrydoss@gmail.com

Ph.D. dissertation: Open-Set Intrusion Recognition System using Extreme Value Machine.

I have developed an Open-Set Recognition (OSR) based machine learning object detection system that can identify unknown security incursions. As a part of this work, I have developed a new state-of-the-art open-set based machine learning classifiers, Clustering-enabled Extreme Value Machine (C-EVM), and Faster-Extreme Value Machine (F-EVM) that are yielding better and faster prediction performances in an open-set environment. These newly developed models are useful in deploying machine learning-based intrusion detection systems and can be used for computer vision recognition applications.

I have research interests in the following areas: Machine Learning and network security, computer vision, and pattern recognition and mobile computing (LTE and 5G), cloud and wireless security.

My focus is to develop new machine learning algorithms for object recognition using Open-Set Recognition (OSR) models for network security and computer vision applications.


  1. Henrydoss, S. Cruz, ChunChun Li, M. Gunther and T. E. Boult, “Enhancing Open-Set Recognition Using Clustering-enabled Extreme Value Machine (C-EVM),” IEEE Conference on BigData2020 (IEEE-BigData2020), Atlanta, GA, Dec 20-21, 2020 (Accepted).
  2. E. Boult, S. Cruz, A. R. Dhamija, M. Gunther, J. Henrydoss, and W. J. Scheirer, “Learning and the unknown: Surveying steps toward open world recognition, ” In Proceedings of the AAAI Conference on Artificial Intelligence, vol. 33, pp. 9801-9807. 2019.
  3. Henrydoss, S. Cruz, E. M. Rudd, M. Gunther and T. E. Boult, “Incremental Open Set Intrusion Recognition using Extreme Value Machine,” IEEE Conference on Machine Learning Applications (ICMLA-2017), Cancun, Mexico, Dec 18-21, 2017.
  4. Henrydoss and T. E. Boult, “Critical Security Review and Study of DDoS attacks on LTE Mobile Network,” IEEE Asia Pacific Wireless Mobile Conference (APWiMob) Bali, Indonesia 2014, Aug 28-31. (13 citations)
  5. Henrydoss and T. E. Boult, “NFV/SDN Architecture and Security Aspects,” A Tutorial Presentation, IEEE Asia Pacific Wireless Mobile Conference (APWiMob) Bali, Indonesia 2014, Aug 28-31.
  6. Ayodele, J. Henrydoss, W. Scheirer, and T. E. Boult, “Study of Malware Threats Faced by the Typical Email User,” The 4th International Conference on Network Security & APPLICATIONS (CNSA-2011) Volume 196, 2011, pp 513-525.
  7. Henry (James Henrydoss) and M. Kori, “DECT based rural radio local loop for developing countries,” 1996 IEEE International Conference on Personal Wireless Communications Proceedings and Exhibition. Future Access, Feb 21, 1996, New Delhi, India. (10 Patent Citations) https://ieeexplore.ieee.org/abstract/document/493325
  8. Henrydoss and M. Kori, “Rural Wireless Networks using Time Division Multiple Access with Point-to-Multipoint (TDMA-PMP),” IEEE International Conference on Personal Wireless Communications, Bangalore, India 1994.

Industry Experience: Strong industry experience in mobile software development and wireless networking. AT&T Mobility Lab Integration, Cingular Wireless, VeriSign, Fujitsu Consulting, Bellsouth and C-DOT as Wireless software and systems developer.