Alert button
Picture for Naeem Seliya

Naeem Seliya

Alert button

Using Deep Learning to Detecting Deepfakes

Add code
Bookmark button
Alert button
Jul 27, 2022
Jacob Mallet, Rushit Dave, Naeem Seliya, Mounika Vanamala

Figure 1 for Using Deep Learning to Detecting Deepfakes
Figure 2 for Using Deep Learning to Detecting Deepfakes
Figure 3 for Using Deep Learning to Detecting Deepfakes
Figure 4 for Using Deep Learning to Detecting Deepfakes
Viaarxiv icon

Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication

Add code
Bookmark button
Alert button
May 26, 2022
Nyle Siddiqui, Rushit Dave, Naeem Seliya, Mounika Vanamala

Figure 1 for Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication
Figure 2 for Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication
Figure 3 for Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication
Figure 4 for Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication
Viaarxiv icon

Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning

Add code
Bookmark button
Alert button
May 07, 2022
Laura Pryor, Jacob Mallet, Rushit Dave, Naeem Seliya, Mounika Vanamala, Evelyn Sowells Boone

Figure 1 for Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning
Figure 2 for Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning
Figure 3 for Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning
Figure 4 for Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning
Viaarxiv icon

A Close Look into Human Activity Recognition Models using Deep Learning

Add code
Bookmark button
Alert button
Apr 26, 2022
Wei Zhong Tee, Rushit Dave, Naeem Seliya, Mounika Vanamala

Figure 1 for A Close Look into Human Activity Recognition Models using Deep Learning
Figure 2 for A Close Look into Human Activity Recognition Models using Deep Learning
Figure 3 for A Close Look into Human Activity Recognition Models using Deep Learning
Figure 4 for A Close Look into Human Activity Recognition Models using Deep Learning
Viaarxiv icon

Human Activity Recognition models using Limited Consumer Device Sensors and Machine Learning

Add code
Bookmark button
Alert button
Jan 21, 2022
Rushit Dave, Naeem Seliya, Mounika Vanamala, Wei Tee

Figure 1 for Human Activity Recognition models using Limited Consumer Device Sensors and Machine Learning
Figure 2 for Human Activity Recognition models using Limited Consumer Device Sensors and Machine Learning
Figure 3 for Human Activity Recognition models using Limited Consumer Device Sensors and Machine Learning
Figure 4 for Human Activity Recognition models using Limited Consumer Device Sensors and Machine Learning
Viaarxiv icon

Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning

Add code
Bookmark button
Alert button
Jan 21, 2022
Rushit Dave, Naeem Seliya, Laura Pryor, Mounika Vanamala, Evelyn Sowells, Jacob mallet

Figure 1 for Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning
Figure 2 for Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning
Figure 3 for Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning
Figure 4 for Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning
Viaarxiv icon

A Modern Analysis of Aging Machine Learning Based IoT Cybersecurity Methods

Add code
Bookmark button
Alert button
Oct 15, 2021
Sam Strecker, Rushit Dave, Nyle Siddiqui, Naeem Seliya

Figure 1 for A Modern Analysis of Aging Machine Learning Based IoT Cybersecurity Methods
Figure 2 for A Modern Analysis of Aging Machine Learning Based IoT Cybersecurity Methods
Figure 3 for A Modern Analysis of Aging Machine Learning Based IoT Cybersecurity Methods
Figure 4 for A Modern Analysis of Aging Machine Learning Based IoT Cybersecurity Methods
Viaarxiv icon

Named Entity Recognition in Unstructured Medical Text Documents

Add code
Bookmark button
Alert button
Oct 15, 2021
Cole Pearson, Naeem Seliya, Rushit Dave

Figure 1 for Named Entity Recognition in Unstructured Medical Text Documents
Figure 2 for Named Entity Recognition in Unstructured Medical Text Documents
Viaarxiv icon

Continuous Authentication Using Mouse Movements, Machine Learning, and Minecraft

Add code
Bookmark button
Alert button
Oct 15, 2021
Nyle Siddiqui, Rushit Dave, Naeem Seliya

Figure 1 for Continuous Authentication Using Mouse Movements, Machine Learning, and Minecraft
Figure 2 for Continuous Authentication Using Mouse Movements, Machine Learning, and Minecraft
Figure 3 for Continuous Authentication Using Mouse Movements, Machine Learning, and Minecraft
Figure 4 for Continuous Authentication Using Mouse Movements, Machine Learning, and Minecraft
Viaarxiv icon

Machine Learning: Challenges, Limitations, and Compatibility for Audio Restoration Processes

Add code
Bookmark button
Alert button
Sep 06, 2021
Owen Casey, Rushit Dave, Naeem Seliya, Evelyn R Sowells Boone

Figure 1 for Machine Learning: Challenges, Limitations, and Compatibility for Audio Restoration Processes
Figure 2 for Machine Learning: Challenges, Limitations, and Compatibility for Audio Restoration Processes
Figure 3 for Machine Learning: Challenges, Limitations, and Compatibility for Audio Restoration Processes
Viaarxiv icon