Picture for Naeem Seliya

Naeem Seliya

Using Deep Learning to Detecting Deepfakes

Add code
Jul 27, 2022
Figure 1 for Using Deep Learning to Detecting Deepfakes
Figure 2 for Using Deep Learning to Detecting Deepfakes
Figure 3 for Using Deep Learning to Detecting Deepfakes
Figure 4 for Using Deep Learning to Detecting Deepfakes
Viaarxiv icon

Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication

Add code
May 26, 2022
Figure 1 for Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication
Figure 2 for Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication
Figure 3 for Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication
Figure 4 for Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication
Viaarxiv icon

Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning

Add code
May 07, 2022
Figure 1 for Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning
Figure 2 for Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning
Figure 3 for Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning
Figure 4 for Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning
Viaarxiv icon

A Close Look into Human Activity Recognition Models using Deep Learning

Add code
Apr 26, 2022
Figure 1 for A Close Look into Human Activity Recognition Models using Deep Learning
Figure 2 for A Close Look into Human Activity Recognition Models using Deep Learning
Figure 3 for A Close Look into Human Activity Recognition Models using Deep Learning
Figure 4 for A Close Look into Human Activity Recognition Models using Deep Learning
Viaarxiv icon

Human Activity Recognition models using Limited Consumer Device Sensors and Machine Learning

Add code
Jan 21, 2022
Figure 1 for Human Activity Recognition models using Limited Consumer Device Sensors and Machine Learning
Figure 2 for Human Activity Recognition models using Limited Consumer Device Sensors and Machine Learning
Figure 3 for Human Activity Recognition models using Limited Consumer Device Sensors and Machine Learning
Figure 4 for Human Activity Recognition models using Limited Consumer Device Sensors and Machine Learning
Viaarxiv icon

Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning

Add code
Jan 21, 2022
Figure 1 for Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning
Figure 2 for Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning
Figure 3 for Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning
Figure 4 for Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning
Viaarxiv icon

A Modern Analysis of Aging Machine Learning Based IoT Cybersecurity Methods

Add code
Oct 15, 2021
Figure 1 for A Modern Analysis of Aging Machine Learning Based IoT Cybersecurity Methods
Figure 2 for A Modern Analysis of Aging Machine Learning Based IoT Cybersecurity Methods
Figure 3 for A Modern Analysis of Aging Machine Learning Based IoT Cybersecurity Methods
Figure 4 for A Modern Analysis of Aging Machine Learning Based IoT Cybersecurity Methods
Viaarxiv icon

Named Entity Recognition in Unstructured Medical Text Documents

Add code
Oct 15, 2021
Figure 1 for Named Entity Recognition in Unstructured Medical Text Documents
Figure 2 for Named Entity Recognition in Unstructured Medical Text Documents
Viaarxiv icon

Continuous Authentication Using Mouse Movements, Machine Learning, and Minecraft

Add code
Oct 15, 2021
Figure 1 for Continuous Authentication Using Mouse Movements, Machine Learning, and Minecraft
Figure 2 for Continuous Authentication Using Mouse Movements, Machine Learning, and Minecraft
Figure 3 for Continuous Authentication Using Mouse Movements, Machine Learning, and Minecraft
Figure 4 for Continuous Authentication Using Mouse Movements, Machine Learning, and Minecraft
Viaarxiv icon

Machine Learning: Challenges, Limitations, and Compatibility for Audio Restoration Processes

Add code
Sep 06, 2021
Figure 1 for Machine Learning: Challenges, Limitations, and Compatibility for Audio Restoration Processes
Figure 2 for Machine Learning: Challenges, Limitations, and Compatibility for Audio Restoration Processes
Figure 3 for Machine Learning: Challenges, Limitations, and Compatibility for Audio Restoration Processes
Viaarxiv icon