My main research lies in utilising evolutionary computation techniques, particularly genetic programming, to effectively and efficiently tackle challenging problems in computer vision and pattern recognition, such as feature detection, feature extraction, feature construction, image classification, object recognition; and applying transfer learning, domain adaptation, and one-shot learning techniques for image analysis. Furthermore, I am interested in utilising machine learning techniques to tackle problems in cybersecurity and network security, such as ransomware detection and classification, spam detection and phishing website detection.
- Feature Manipulation,
- Pattern Recognition,
- Computer Vision,
- Evolutionary Algorithms,
- Artificial Neural Networks, and
- Data Mining and Machine Learning.
More details can be found on my Personal website including:
- A list of selected publications;
- Professional activities;
- Teaching and Supervision; and
Harith Al-Sahaf received the B.Sc. degree in computer science from Baghdad University (Iraq), in 2005. He joined the Victoria University of Wellington (VUW), (New Zealand) in July 2007 where he received his MCompSc and PhD degrees in Computer Science in 2010 and 2017, respectively. In October 2016, he has joined the School of Engineering and Computer Science, VUW as a Post-doctoral Research Fellow and as a full-time lecturer since September 2018. His current research interests include evolutionary computation, particularly genetic programming, computer vision, pattern recognition, evolutionary cybersecurity, machine learning, feature manipulation including feature detection, selection, extraction and construction, transfer learning, domain adaptation, one-shot learning, and image understanding. %He is a member of the IEEE CIS ETTC Task Force on Evolutionary Computer Vision and Image Processing, the IEEE CIS ETTC Task Force on Evolutionary Computation for Feature Selection and Construction, the IEEE CIS ISATC Task Force on Evolutionary Deep Learning and Applications, and the IEEE CIC ISATC Task Force on Intelligent Systems for Cybersecurity of IoT.