default search action
Rushit Dave
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i27]Rushit Dave, Marcho Handoko, Ali Rashid, Cole Schoenbauer:
From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics. CoRR abs/2403.03828 (2024) - [i26]Pedro Gomes do Nascimento, Pidge Witiak, Tucker MacCallum, Zachary Winterfeldt, Rushit Dave:
Your device may know you better than you know yourself - continuous authentication on novel dataset using machine learning. CoRR abs/2403.03832 (2024) - 2023
- [j5]Sara Kokal, Mounika Vanamala, Rushit Dave:
Deep Learning and Machine Learning, Better Together Than Apart: A Review on Biometrics Mobile Authentication. J. Cybersecur. Priv. 3(2): 227-258 (2023) - [c7]Jacob Mallet, Laura Pryor, Rushit Dave, Mounika Vanamala:
Deepfake Detection Analyzing Hybrid Dataset Utilizing CNN and SVM. ISMSI 2023: 7-11 - [c6]Aniruddha Tiwari, Rushit Dave, Mounika Vanamala:
Leveraging Deep Learning Approaches for Deepfake Detection: A Review. ISMSI 2023: 12-19 - [i25]Nicholas Lasky, Benjamin Hallis, Mounika Vanamala, Rushit Dave, Jim Seliya:
Machine Learning Based Approach to Recommend MITRE ATT&CK Framework for Software Requirements and Design Specifications. CoRR abs/2302.05530 (2023) - [i24]Jacob Mallet, Laura Pryor, Rushit Dave, Mounika Vanamala:
Deepfake Detection Analyzing Hybrid Dataset Utilizing CNN and SVM. CoRR abs/2302.10280 (2023) - [i23]Aniruddha Tiwari, Rushit Dave, Mounika Vanamala:
Leveraging Deep Learning Approaches for Deepfake Detection: A Review. CoRR abs/2304.01908 (2023) - [i22]Jacob Mallet, Natalie Krueger, Mounika Vanamala, Rushit Dave:
Hybrid Deepfake Detection Utilizing MLP and LSTM. CoRR abs/2304.14504 (2023) - [i21]Brendan Pelto, Mounika Vanamala, Rushit Dave:
Your Identity is Your Behavior - Continuous User Authentication based on Machine Learning and Touch Dynamics. CoRR abs/2305.09482 (2023) - [i20]Natalie Krueger, Mounika Vanamala, Rushit Dave:
Recent Advancements In The Field Of Deepfake Detection. CoRR abs/2308.05563 (2023) - 2022
- [j4]Nyle Siddiqui, Rushit Dave, Mounika Vanamala, Naeem Seliya:
Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication. Mach. Learn. Knowl. Extr. 4(2): 502-518 (2022) - [c5]Nyle Siddiqui, Thomas Reither, Rushit Dave, Dylan Black, Tyler Bauer, Mitchell Hanson:
A Robust Framework for Deep Learning Approaches to Facial Emotion Recognition and Evaluation. CACML 2022: 68-73 - [c4]Jacob Mallet, Laura Pryor, Rushit Dave, Naeem Seliya, Mounika Vanamala, Evelyn R. Sowells Boone:
Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning. CACML 2022: 442-447 - [c3]Wei Zhong Tee, Rushit Dave, Naeem Seliya, Mounika Vanamala:
Human Activity Recognition models using Limited Consumer Device Sensors and Machine Learning. CACML 2022: 456-461 - [c2]Wei Zhong Tee, Rushit Dave, Jim Seliya, Mounika Vanamala:
A Close Look into Human Activity Recognition Models using Deep Learning. CNIOT 2022: 201-206 - [c1]Sara Kokal, Laura Pryor, Rushit Dave:
Exploration of Machine Learning Classification Models Used for Behavioral Biometrics Authentication. ICCTA 2022: 176-182 - [i19]Rushit Dave, Naeem Seliya, Laura Pryor, Mounika Vanamala, Evelyn R. Sowells Boone, Jacob Mallet:
Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning. CoRR abs/2201.08564 (2022) - [i18]Rushit Dave, Naeem Seliya, Mounika Vanamala, Wei Tee:
Human Activity Recognition models using Limited Consumer Device Sensors and Machine Learning. CoRR abs/2201.08565 (2022) - [i17]Nyle Siddiqui, Rushit Dave, Tyler Bauer, Thomas Reither, Dylan Black, Mitchell Hanson:
A Robust Framework for Deep Learning Approaches to Facial Emotion Recognition and Evaluation. CoRR abs/2201.12705 (2022) - [i16]Zachary Menter, Wei Tee, Rushit Dave:
Application of Machine Learning-Based Pattern Recognition in IoT Devices: Review. CoRR abs/2202.02456 (2022) - [i15]Sara Kokal, Laura Pryor, Rushit Dave:
Exploration of Machine Learning Classification Models Used for Behavioral Biometrics Authentication. CoRR abs/2204.09088 (2022) - [i14]Wei Zhong Tee, Rushit Dave, Naeem Seliya, Mounika Vanamala:
A Close Look into Human Activity Recognition Models using Deep Learning. CoRR abs/2204.13589 (2022) - [i13]Laura Pryor, Jacob Mallet, Rushit Dave, Naeem Seliya, Mounika Vanamala, Evelyn R. Sowells Boone:
Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning. CoRR abs/2205.08371 (2022) - [i12]Nyle Siddiqui, Rushit Dave, Naeem Seliya, Mounika Vanamala:
Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication. CoRR abs/2205.13646 (2022) - [i11]Nyle Siddiqui, Rushit Dave:
Mitigating Presentation Attack using DCGAN and Deep CNN. CoRR abs/2207.00161 (2022) - [i10]Jacob Mallet, Rushit Dave, Naeem Seliya, Mounika Vanamala:
Using Deep Learning to Detecting Deepfakes. CoRR abs/2207.13644 (2022) - [i9]Zachary Deridder, Nyle Siddiqui, Thomas Reither, Rushit Dave, Brendan Pelto, Naeem Seliya, Mounika Vanamala:
Continuous User Authentication Using Machine Learning and Multi-Finger Mobile Touch Dynamics with a Novel Dataset. CoRR abs/2207.13648 (2022) - 2021
- [j3]Joseph M. Ackerson, Rushit Dave, Naeem Seliya:
Applications of Recurrent Neural Network for Biometric Authentication & Anomaly Detection. Inf. 12(7): 272 (2021) - [i8]Owen Casey, Rushit Dave, Naeem Seliya, Evelyn R. Sowells Boone:
Machine Learning: Challenges, Limitations, and Compatibility for Audio Restoration Processes. CoRR abs/2109.02692 (2021) - [i7]Rushit Dave:
IoT Security and Authentication schemes Based on Machine Learning: Review. CoRR abs/2109.02695 (2021) - [i6]Joseph M. Ackerson, Rushit Dave, Jim Seliya:
Applications of Recurrent Neural Network for Biometric Authentication & Anomaly Detection. CoRR abs/2109.05701 (2021) - [i5]Laura Pryor, Rushit Dave, Naeem Seliya, Evelyn R. Sowells Boone:
Machine Learning Algorithms In User Authentication Schemes. CoRR abs/2110.07826 (2021) - [i4]Sam Strecker, Rushit Dave, Nyle Siddiqui, Naeem Seliya:
A Modern Analysis of Aging Machine Learning Based IoT Cybersecurity Methods. CoRR abs/2110.07832 (2021) - [i3]Nyle Siddiqui, Rushit Dave, Naeem Seliya:
Continuous Authentication Using Mouse Movements, Machine Learning, and Minecraft. CoRR abs/2110.11080 (2021) - [i2]Cole Pearson, Naeem Seliya, Rushit Dave:
Named Entity Recognition in Unstructured Medical Text Documents. CoRR abs/2110.15732 (2021) - [i1]Rushit Dave, Naeem Seliya, Nyle Siddiqui:
The Benefits of Edge Computing in Healthcare, Smart Cities, and IoT. CoRR abs/2112.01250 (2021) - 2020
- [j2]Janelle C. Mason, Rushit Dave, Prosenjit Chatterjee, Ieschecia Graham-Allen, Albert C. Esterline, Kaushik Roy:
An Investigation of Biometric Authentication in the Healthcare Environment. Array 8: 100042 (2020)
2010 – 2019
- 2019
- [j1]Dylan J. Gunn, Zhipeng Liu, Rushit Dave, Xiaohong Yuan, Kaushik Roy:
Touch-Based Active Cloud Authentication Using Traditional Machine Learning and LSTM on a Distributed Tensorflow Framework. Int. J. Comput. Intell. Appl. 18(4): 1950022:1-1950022:16 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:14 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint