Picture for Rushit Dave

Rushit Dave

Your device may know you better than you know yourself -- continuous authentication on novel dataset using machine learning

Add code
Mar 06, 2024
Figure 1 for Your device may know you better than you know yourself -- continuous authentication on novel dataset using machine learning
Figure 2 for Your device may know you better than you know yourself -- continuous authentication on novel dataset using machine learning
Figure 3 for Your device may know you better than you know yourself -- continuous authentication on novel dataset using machine learning
Figure 4 for Your device may know you better than you know yourself -- continuous authentication on novel dataset using machine learning
Viaarxiv icon

From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics

Add code
Mar 06, 2024
Figure 1 for From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics
Figure 2 for From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics
Figure 3 for From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics
Figure 4 for From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics
Viaarxiv icon

Hybrid Deepfake Detection Utilizing MLP and LSTM

Add code
Apr 21, 2023
Figure 1 for Hybrid Deepfake Detection Utilizing MLP and LSTM
Figure 2 for Hybrid Deepfake Detection Utilizing MLP and LSTM
Figure 3 for Hybrid Deepfake Detection Utilizing MLP and LSTM
Figure 4 for Hybrid Deepfake Detection Utilizing MLP and LSTM
Viaarxiv icon

Leveraging Deep Learning Approaches for Deepfake Detection: A Review

Add code
Apr 04, 2023
Figure 1 for Leveraging Deep Learning Approaches for Deepfake Detection: A Review
Figure 2 for Leveraging Deep Learning Approaches for Deepfake Detection: A Review
Figure 3 for Leveraging Deep Learning Approaches for Deepfake Detection: A Review
Figure 4 for Leveraging Deep Learning Approaches for Deepfake Detection: A Review
Viaarxiv icon

Machine Learning Based Approach to Recommend MITRE ATT&CK Framework for Software Requirements and Design Specifications

Add code
Feb 10, 2023
Figure 1 for Machine Learning Based Approach to Recommend MITRE ATT&CK Framework for Software Requirements and Design Specifications
Figure 2 for Machine Learning Based Approach to Recommend MITRE ATT&CK Framework for Software Requirements and Design Specifications
Figure 3 for Machine Learning Based Approach to Recommend MITRE ATT&CK Framework for Software Requirements and Design Specifications
Figure 4 for Machine Learning Based Approach to Recommend MITRE ATT&CK Framework for Software Requirements and Design Specifications
Viaarxiv icon

Using Deep Learning to Detecting Deepfakes

Add code
Jul 27, 2022
Figure 1 for Using Deep Learning to Detecting Deepfakes
Figure 2 for Using Deep Learning to Detecting Deepfakes
Figure 3 for Using Deep Learning to Detecting Deepfakes
Figure 4 for Using Deep Learning to Detecting Deepfakes
Viaarxiv icon

Mitigating Presentation Attack using DCGAN and Deep CNN

Add code
Jun 22, 2022
Figure 1 for Mitigating Presentation Attack using DCGAN and Deep CNN
Figure 2 for Mitigating Presentation Attack using DCGAN and Deep CNN
Figure 3 for Mitigating Presentation Attack using DCGAN and Deep CNN
Figure 4 for Mitigating Presentation Attack using DCGAN and Deep CNN
Viaarxiv icon

Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication

Add code
May 26, 2022
Figure 1 for Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication
Figure 2 for Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication
Figure 3 for Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication
Figure 4 for Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication
Viaarxiv icon

Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning

Add code
May 07, 2022
Figure 1 for Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning
Figure 2 for Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning
Figure 3 for Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning
Figure 4 for Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning
Viaarxiv icon

A Close Look into Human Activity Recognition Models using Deep Learning

Add code
Apr 26, 2022
Figure 1 for A Close Look into Human Activity Recognition Models using Deep Learning
Figure 2 for A Close Look into Human Activity Recognition Models using Deep Learning
Figure 3 for A Close Look into Human Activity Recognition Models using Deep Learning
Figure 4 for A Close Look into Human Activity Recognition Models using Deep Learning
Viaarxiv icon