Alert button
Picture for Rushit Dave

Rushit Dave

Alert button

Hybrid Deepfake Detection Utilizing MLP and LSTM

Apr 21, 2023
Jacob Mallet, Natalie Krueger, Mounika Vanamala, Rushit Dave

Figure 1 for Hybrid Deepfake Detection Utilizing MLP and LSTM
Figure 2 for Hybrid Deepfake Detection Utilizing MLP and LSTM
Figure 3 for Hybrid Deepfake Detection Utilizing MLP and LSTM
Figure 4 for Hybrid Deepfake Detection Utilizing MLP and LSTM
Viaarxiv icon

Leveraging Deep Learning Approaches for Deepfake Detection: A Review

Apr 04, 2023
Aniruddha Tiwari, Rushit Dave, Mounika Vanamala

Figure 1 for Leveraging Deep Learning Approaches for Deepfake Detection: A Review
Figure 2 for Leveraging Deep Learning Approaches for Deepfake Detection: A Review
Figure 3 for Leveraging Deep Learning Approaches for Deepfake Detection: A Review
Figure 4 for Leveraging Deep Learning Approaches for Deepfake Detection: A Review
Viaarxiv icon

Machine Learning Based Approach to Recommend MITRE ATT&CK Framework for Software Requirements and Design Specifications

Feb 10, 2023
Nicholas Lasky, Benjamin Hallis, Mounika Vanamala, Rushit Dave, Jim Seliya

Figure 1 for Machine Learning Based Approach to Recommend MITRE ATT&CK Framework for Software Requirements and Design Specifications
Figure 2 for Machine Learning Based Approach to Recommend MITRE ATT&CK Framework for Software Requirements and Design Specifications
Figure 3 for Machine Learning Based Approach to Recommend MITRE ATT&CK Framework for Software Requirements and Design Specifications
Figure 4 for Machine Learning Based Approach to Recommend MITRE ATT&CK Framework for Software Requirements and Design Specifications
Viaarxiv icon

Using Deep Learning to Detecting Deepfakes

Jul 27, 2022
Jacob Mallet, Rushit Dave, Naeem Seliya, Mounika Vanamala

Figure 1 for Using Deep Learning to Detecting Deepfakes
Figure 2 for Using Deep Learning to Detecting Deepfakes
Figure 3 for Using Deep Learning to Detecting Deepfakes
Figure 4 for Using Deep Learning to Detecting Deepfakes
Viaarxiv icon

Mitigating Presentation Attack using DCGAN and Deep CNN

Jun 22, 2022
Nyle Siddiqui, Rushit Dave

Figure 1 for Mitigating Presentation Attack using DCGAN and Deep CNN
Figure 2 for Mitigating Presentation Attack using DCGAN and Deep CNN
Figure 3 for Mitigating Presentation Attack using DCGAN and Deep CNN
Figure 4 for Mitigating Presentation Attack using DCGAN and Deep CNN
Viaarxiv icon

Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication

May 26, 2022
Nyle Siddiqui, Rushit Dave, Naeem Seliya, Mounika Vanamala

Figure 1 for Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication
Figure 2 for Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication
Figure 3 for Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication
Figure 4 for Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication
Viaarxiv icon

Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning

May 07, 2022
Laura Pryor, Jacob Mallet, Rushit Dave, Naeem Seliya, Mounika Vanamala, Evelyn Sowells Boone

Figure 1 for Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning
Figure 2 for Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning
Figure 3 for Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning
Figure 4 for Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning
Viaarxiv icon

A Close Look into Human Activity Recognition Models using Deep Learning

Apr 26, 2022
Wei Zhong Tee, Rushit Dave, Naeem Seliya, Mounika Vanamala

Figure 1 for A Close Look into Human Activity Recognition Models using Deep Learning
Figure 2 for A Close Look into Human Activity Recognition Models using Deep Learning
Figure 3 for A Close Look into Human Activity Recognition Models using Deep Learning
Figure 4 for A Close Look into Human Activity Recognition Models using Deep Learning
Viaarxiv icon

Exploration of Machine Learning Classification Models Used for Behavioral Biometrics Authentication

Apr 19, 2022
Sara Kokal, Laura Pryor, Rushit Dave

Figure 1 for Exploration of Machine Learning Classification Models Used for Behavioral Biometrics Authentication
Figure 2 for Exploration of Machine Learning Classification Models Used for Behavioral Biometrics Authentication
Figure 3 for Exploration of Machine Learning Classification Models Used for Behavioral Biometrics Authentication
Figure 4 for Exploration of Machine Learning Classification Models Used for Behavioral Biometrics Authentication
Viaarxiv icon

A Robust Framework for Deep Learning Approaches to Facial Emotion Recognition and Evaluation

Jan 30, 2022
Nyle Siddiqui, Rushit Dave, Tyler Bauer, Thomas Reither, Dylan Black, Mitchell Hanson

Figure 1 for A Robust Framework for Deep Learning Approaches to Facial Emotion Recognition and Evaluation
Figure 2 for A Robust Framework for Deep Learning Approaches to Facial Emotion Recognition and Evaluation
Figure 3 for A Robust Framework for Deep Learning Approaches to Facial Emotion Recognition and Evaluation
Figure 4 for A Robust Framework for Deep Learning Approaches to Facial Emotion Recognition and Evaluation
Viaarxiv icon