no code implementations • 27 Jul 2022 • Jacob mallet, Rushit Dave, Naeem Seliya, Mounika Vanamala
This study looks at various deepfake detection models that use deep learning algorithms to combat this looming threat.
1 code implementation • 26 May 2022 • Nyle Siddiqui, Rushit Dave, Naeem Seliya, Mounika Vanamala
Static authentication methods, like passwords, grow increasingly weak with advancements in technology and attack strategies.
no code implementations • 7 May 2022 • Laura Pryor, Jacob mallet, Rushit Dave, Naeem Seliya, Mounika Vanamala, Evelyn Sowells Boone
In this study, we aim to contribute to the research being done on behavioral biometrics by creating and evaluating a user authentication scheme using behavioral biometrics.
no code implementations • 26 Apr 2022 • Wei Zhong Tee, Rushit Dave, Naeem Seliya, Mounika Vanamala
Human activity recognition using deep learning techniques has become increasing popular because of its high effectivity with recognizing complex tasks, as well as being relatively low in costs compared to more traditional machine learning techniques.
no code implementations • 21 Jan 2022 • Rushit Dave, Naeem Seliya, Mounika Vanamala, Wei Tee
Results show promise for models trained strictly using limited sensor data collected from only smartphones and smartwatches coupled with traditional machine learning concepts and algorithms.
no code implementations • 21 Jan 2022 • Rushit Dave, Naeem Seliya, Laura Pryor, Mounika Vanamala, Evelyn Sowells, Jacob mallet
In recent years the amount of secure information being stored on mobile devices has grown exponentially.
no code implementations • 15 Oct 2021 • Nyle Siddiqui, Rushit Dave, Naeem Seliya
Mouse dynamics has grown in popularity as a novel irreproducible behavioral biometric.
no code implementations • 15 Oct 2021 • Cole Pearson, Naeem Seliya, Rushit Dave
Physicians provide expert opinion to legal courts on the medical state of patients, including determining if a patient is likely to have permanent or non-permanent injuries or ailments.
no code implementations • 15 Oct 2021 • Sam Strecker, Rushit Dave, Nyle Siddiqui, Naeem Seliya
This study examines the effectiveness of three distinct Internet of Things cyber security algorithms currently used in industry today for malware and intrusion detection: Random Forest (RF), Support-Vector Machine (SVM), and K-Nearest Neighbor (KNN).
no code implementations • 6 Sep 2021 • Owen Casey, Rushit Dave, Naeem Seliya, Evelyn R Sowells Boone
In this paper machine learning networks are explored for their use in restoring degraded and compressed speech audio.
BIG-bench Machine Learning Generative Adversarial Network +1