Search Results for author: Naeem Seliya

Found 10 papers, 1 papers with code

Using Deep Learning to Detecting Deepfakes

no code implementations27 Jul 2022 Jacob mallet, Rushit Dave, Naeem Seliya, Mounika Vanamala

This study looks at various deepfake detection models that use deep learning algorithms to combat this looming threat.

DeepFake Detection Face Swapping +1

Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication

1 code implementation26 May 2022 Nyle Siddiqui, Rushit Dave, Naeem Seliya, Mounika Vanamala

Static authentication methods, like passwords, grow increasingly weak with advancements in technology and attack strategies.

Multi-class Classification

Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning

no code implementations7 May 2022 Laura Pryor, Jacob mallet, Rushit Dave, Naeem Seliya, Mounika Vanamala, Evelyn Sowells Boone

In this study, we aim to contribute to the research being done on behavioral biometrics by creating and evaluating a user authentication scheme using behavioral biometrics.

BIG-bench Machine Learning

A Close Look into Human Activity Recognition Models using Deep Learning

no code implementations26 Apr 2022 Wei Zhong Tee, Rushit Dave, Naeem Seliya, Mounika Vanamala

Human activity recognition using deep learning techniques has become increasing popular because of its high effectivity with recognizing complex tasks, as well as being relatively low in costs compared to more traditional machine learning techniques.

Human Activity Recognition

Human Activity Recognition models using Limited Consumer Device Sensors and Machine Learning

no code implementations21 Jan 2022 Rushit Dave, Naeem Seliya, Mounika Vanamala, Wei Tee

Results show promise for models trained strictly using limited sensor data collected from only smartphones and smartwatches coupled with traditional machine learning concepts and algorithms.

BIG-bench Machine Learning Human Activity Recognition

Named Entity Recognition in Unstructured Medical Text Documents

no code implementations15 Oct 2021 Cole Pearson, Naeem Seliya, Rushit Dave

Physicians provide expert opinion to legal courts on the medical state of patients, including determining if a patient is likely to have permanent or non-permanent injuries or ailments.

De-identification named-entity-recognition +2

A Modern Analysis of Aging Machine Learning Based IoT Cybersecurity Methods

no code implementations15 Oct 2021 Sam Strecker, Rushit Dave, Nyle Siddiqui, Naeem Seliya

This study examines the effectiveness of three distinct Internet of Things cyber security algorithms currently used in industry today for malware and intrusion detection: Random Forest (RF), Support-Vector Machine (SVM), and K-Nearest Neighbor (KNN).

BIG-bench Machine Learning Intrusion Detection +1

Cannot find the paper you are looking for? You can Submit a new open access paper.