Leon Reznik Headshot

Leon Reznik

Professor

Department of Computer Science
Golisano College of Computing and Information Sciences

585-475-7210
Office Location
Office Mailing Address
Department of Computer Science, RIT 102 Lomb Memorial Drive Rochester NY 14623 USA

Leon Reznik

Professor

Department of Computer Science
Golisano College of Computing and Information Sciences

Education

Degree of Electronics, Leningrad Institute of Aeronautical Construction (Russia); MS, St. Petersburg Aircraft Academy (Russia); Ph.D., St. Petersburg Polytechnic Institute (Russia)

Bio

Leon Reznik is a Professor of Computer Science (primary affiliation) and Computing Security (secondary affiliation) at the Rochester Institute of Technology. He is an author of the textbook 'Fuzzy Controllers' (Elsevier-Butterworth-Heinemann, Oxford, 1997) and an editor of 'Fuzzy System Design: Social and Engineering Applications' (Physica Verlag, 1998), 'Soft Computing in Measurement and Information Acquisition' (Springer, 2003), 'Advancing Computing and Information Sciences' (Cary Graphic Arts Press, 2005). Dr. Reznik's research concentrates on study and development of intelligent computing systems for control, power engineering and computer networks, sensor networks and systems as well as cybersecurity. His current research interests include intelligent data analytics; data quality and security evaluation and assurance; intelligent intrusion detection in cyber-physical systems; cognitive sensor networks and systems.

585-475-7210

Personal Links
Areas of Expertise

Select Scholarship

Journal Paper
Heyman, Andrew, et al. "Fuzzy System Design for Security and Environment Control Applications." International Journal of Uncertainty, Fuzziness, and Knowledge Based Systems 23. Suppl. 1 (2015): 43-56. Print.
K., Semenov,, Reznik L., and Solopchenko G. "Fuzzy Intervals Application for Software Metrological Certification in Measurement and Information Systems." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 23. Suppl. 1 (2015): 95-104. Print.
Reznik, Leon and Sergey Lyshevski. "Data Quality Indicators Composition and Calculus: Engineering and Information Systems Approaches." Sensors & Transducers 185. 2 (2015): 140-148. Print.
Yampolskiy, Roman V., et al. "Resource Awareness in Computational iItelligence." International Journal of Advanced Intelligence Paradigms 3. 3/4 (2011): 305-322. Print.
Timms, G. P., et al. "Automated Data Quality Assessment of Marine Sensors." Sensors 10. 11 (2011): 9589-9602. Print.
Reznik, Leon, Greg Von Pless, and Tayeb Al Karim. "Distributed Neural Networks for Signal Change Detection: On the Way to Cognition in Sensor Networks." IEEE Sensors Journal 11. 3 (2011): 791-798. Print.
Published Conference Proceedings
Weiss, Richard, et al. "Trust Evaluation in Mobile Devices: An Empirical Study." Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15), Helsinki, Finland, 20-22 August, 2015. Ed. UNKNOWN. HELSINKI, FINLAND: IEEE COMPUTER SOCIETY, Print.
Lyshevski, S.E, Leon Reznik, and et al. "Estimates and Measures of Data Communication and processing in Nanoscaled Classical and Quantum Physical Systems." Proceedings of the 2014 IEEE 14th International Conference on Nanotechnology (IEEE-NANO). Ed. Unknown. Toronto, Canada, ON: IEEE, 2014. Print.
Reznik, L. and S.E. Lyshevsky. "Data Quality and Security Evaluation Tool for Nanoscale Sensors." Proceedings of the SECURWARE 2014, The Eighth International Conference on Emerging Security Information, Systems and Technologies. Ed. Unknown. Lisbon, Portugal: n.p., 2014. Print.
Reznik, Leon, et al. "Security of Computer Use Practice: The Case of Ordinary Users Survey." Proceedings of the 6th Annual Symposium on Information Assurance (ASIA 11), Albany, NY, June 7-8, 2011. Ed. Sanjay Goel. Albany, NY: ASIA, 2011. Print.
Invited Keynote/Presentation
Reznik, L. "From Big Data to Quality Data: What is the Emerging Sensor and Network Technology Going to Deliver Next?" The Eighth International Conference on Sensor Technologies and Applications SENSORCOMM 2014. IARIA. Lisbon, Portugal. 20 Nov. 2014. Keynote Speech.
Reznik, L. "Information Privacy: Does it Really matter?" SECURWARE 2014, The Eighth International Conference on Emerging Security Information, Systems and Technologies. IARIA. Lisbon, Portugal. 19 Nov. 2014. Address.
Published Article
Solopchenko, Gennady N., Konstantin K. Semenov, Vladik Kreinovich,and Leon Reznik. “Measurement’s Result and its Error as Fuzzy Variables: Background and Perspectives.” 9th International Symposium on Measurement Technology and Intelligent Instruments, 2010. 487-491. Print. *
Timms, G.P., P.A. de Souza, and L. Reznik. “Automated Assessment of Data Quality in Marine Sensor Networks.” OCEANS 2010 IEEE, 2010. 1-5. Print.
Yudanov, D., M. Shaaban, R. Melton, and L. Reznik. “GPU-based Simulation of Spiking Neural Networks with Real-time Performance High Accuracy.” 2010 International Joint Conference on Neural Networks (IJCNN 2010), 18-23 July 2010. 2143-2150. Print. " 

Currently Teaching

CSCI-532
3 Credits
The course will introduce students to the application of intelligent methodologies in computer security and information assurance systems design. It will review different application areas such as intrusion detection and monitoring systems, access control and biological authentication, firewall structure and design. The students will be required to implement a course project on design of a particular security tool with an application of an artificial intelligence methodology and to undertake its performance analysis. Students cannot take and receive credit for this course if they have credit for CSCI-735.
CSCI-630
3 Credits
An introduction to the theories and algorithms used to create artificial intelligence (AI) systems. Topics include search algorithms, logic, planning, machine learning, and applications from areas such as computer vision, robotics, and natural language processing. Programming assignments and oral/written summaries of research papers are required.
CSCI-735
3 Credits
The course will introduce students to the application of intelligent methodologies applications in computer security and information assurance system design. It will review different application areas such as intrusion detection and monitoring systems, access control and biological authentication, firewall structure and design. The students will be required to implement a course project on design of a particular security tool with an application of an artificial intelligence methodology and to undertake research and analysis of artificial intelligence applications in computer security.
CSCI-788
3 Credits
Project capstone of the master's degree program. Students select from a set of possible projects and confirm that they have a project adviser. Students enroll in a required colloquium component that meets weekly, during which they present information, related to their projects. Projects culminate with delivery of a final report and participation in a poster session open to the public.