Alert button
Picture for Rushit Dave

Rushit Dave

Alert button

Your device may know you better than you know yourself -- continuous authentication on novel dataset using machine learning

Add code
Bookmark button
Alert button
Mar 06, 2024
Pedro Gomes do Nascimento, Pidge Witiak, Tucker MacCallum, Zachary Winterfeldt, Rushit Dave

Figure 1 for Your device may know you better than you know yourself -- continuous authentication on novel dataset using machine learning
Figure 2 for Your device may know you better than you know yourself -- continuous authentication on novel dataset using machine learning
Figure 3 for Your device may know you better than you know yourself -- continuous authentication on novel dataset using machine learning
Figure 4 for Your device may know you better than you know yourself -- continuous authentication on novel dataset using machine learning
Viaarxiv icon

From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics

Add code
Bookmark button
Alert button
Mar 06, 2024
Rushit Dave, Marcho Handoko, Ali Rashid, Cole Schoenbauer

Figure 1 for From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics
Figure 2 for From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics
Figure 3 for From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics
Figure 4 for From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics
Viaarxiv icon

Hybrid Deepfake Detection Utilizing MLP and LSTM

Add code
Bookmark button
Alert button
Apr 21, 2023
Jacob Mallet, Natalie Krueger, Mounika Vanamala, Rushit Dave

Figure 1 for Hybrid Deepfake Detection Utilizing MLP and LSTM
Figure 2 for Hybrid Deepfake Detection Utilizing MLP and LSTM
Figure 3 for Hybrid Deepfake Detection Utilizing MLP and LSTM
Figure 4 for Hybrid Deepfake Detection Utilizing MLP and LSTM
Viaarxiv icon

Leveraging Deep Learning Approaches for Deepfake Detection: A Review

Add code
Bookmark button
Alert button
Apr 04, 2023
Aniruddha Tiwari, Rushit Dave, Mounika Vanamala

Figure 1 for Leveraging Deep Learning Approaches for Deepfake Detection: A Review
Figure 2 for Leveraging Deep Learning Approaches for Deepfake Detection: A Review
Figure 3 for Leveraging Deep Learning Approaches for Deepfake Detection: A Review
Figure 4 for Leveraging Deep Learning Approaches for Deepfake Detection: A Review
Viaarxiv icon

Machine Learning Based Approach to Recommend MITRE ATT&CK Framework for Software Requirements and Design Specifications

Add code
Bookmark button
Alert button
Feb 10, 2023
Nicholas Lasky, Benjamin Hallis, Mounika Vanamala, Rushit Dave, Jim Seliya

Figure 1 for Machine Learning Based Approach to Recommend MITRE ATT&CK Framework for Software Requirements and Design Specifications
Figure 2 for Machine Learning Based Approach to Recommend MITRE ATT&CK Framework for Software Requirements and Design Specifications
Figure 3 for Machine Learning Based Approach to Recommend MITRE ATT&CK Framework for Software Requirements and Design Specifications
Figure 4 for Machine Learning Based Approach to Recommend MITRE ATT&CK Framework for Software Requirements and Design Specifications
Viaarxiv icon

Using Deep Learning to Detecting Deepfakes

Add code
Bookmark button
Alert button
Jul 27, 2022
Jacob Mallet, Rushit Dave, Naeem Seliya, Mounika Vanamala

Figure 1 for Using Deep Learning to Detecting Deepfakes
Figure 2 for Using Deep Learning to Detecting Deepfakes
Figure 3 for Using Deep Learning to Detecting Deepfakes
Figure 4 for Using Deep Learning to Detecting Deepfakes
Viaarxiv icon

Mitigating Presentation Attack using DCGAN and Deep CNN

Add code
Bookmark button
Alert button
Jun 22, 2022
Nyle Siddiqui, Rushit Dave

Figure 1 for Mitigating Presentation Attack using DCGAN and Deep CNN
Figure 2 for Mitigating Presentation Attack using DCGAN and Deep CNN
Figure 3 for Mitigating Presentation Attack using DCGAN and Deep CNN
Figure 4 for Mitigating Presentation Attack using DCGAN and Deep CNN
Viaarxiv icon

Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication

Add code
Bookmark button
Alert button
May 26, 2022
Nyle Siddiqui, Rushit Dave, Naeem Seliya, Mounika Vanamala

Figure 1 for Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication
Figure 2 for Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication
Figure 3 for Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication
Figure 4 for Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication
Viaarxiv icon

Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning

Add code
Bookmark button
Alert button
May 07, 2022
Laura Pryor, Jacob Mallet, Rushit Dave, Naeem Seliya, Mounika Vanamala, Evelyn Sowells Boone

Figure 1 for Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning
Figure 2 for Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning
Figure 3 for Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning
Figure 4 for Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning
Viaarxiv icon

A Close Look into Human Activity Recognition Models using Deep Learning

Add code
Bookmark button
Alert button
Apr 26, 2022
Wei Zhong Tee, Rushit Dave, Naeem Seliya, Mounika Vanamala

Figure 1 for A Close Look into Human Activity Recognition Models using Deep Learning
Figure 2 for A Close Look into Human Activity Recognition Models using Deep Learning
Figure 3 for A Close Look into Human Activity Recognition Models using Deep Learning
Figure 4 for A Close Look into Human Activity Recognition Models using Deep Learning
Viaarxiv icon