no code implementations • 6 Mar 2024 • Pedro Gomes do Nascimento, Pidge Witiak, Tucker MacCallum, Zachary Winterfeldt, Rushit Dave
This research aims to further understanding in the field of continuous authentication using behavioral biometrics.
no code implementations • 6 Mar 2024 • Rushit Dave, Marcho Handoko, Ali Rashid, Cole Schoenbauer
This research contributes to the ongoing efforts to enhance computer security and highlights the potential of leveraging user behavior, specifically mouse dynamics, in developing robust authentication systems.
no code implementations • 24 Apr 2023 • Brendan Pelto, Mounika Vanamala, Rushit Dave
The results of the research showed that all three algorithms were able to effectively classify users based on their individual touch dynamics, with accuracy ranging from 80% to 95%.
no code implementations • 4 Apr 2023 • Aniruddha Tiwari, Rushit Dave, Mounika Vanamala
Conspicuous progression in the field of machine learning and deep learning have led the jump of highly realistic fake media, these media oftentimes referred as deepfakes.
no code implementations • 10 Feb 2023 • Nicholas Lasky, Benjamin Hallis, Mounika Vanamala, Rushit Dave, Jim Seliya
In this paper, we use machine learning algorithms to map requirements to the MITRE ATT&CK database and determine the accuracy of each mapping depending on the data split.
no code implementations • 27 Jan 2023 • Jacob mallet, Laura Pryor, Rushit Dave, Mounika Vanamala
Social media is currently being used by many individuals online as a major source of information.
no code implementations • 27 Jul 2022 • Jacob mallet, Rushit Dave, Naeem Seliya, Mounika Vanamala
This study looks at various deepfake detection models that use deep learning algorithms to combat this looming threat.
no code implementations • 22 Jun 2022 • Nyle Siddiqui, Rushit Dave
For MICHE-I [2] and VISOB [3] datasets, we achieved the test accuracies of 95% and 96% respectively.
1 code implementation • 26 May 2022 • Nyle Siddiqui, Rushit Dave, Naeem Seliya, Mounika Vanamala
Static authentication methods, like passwords, grow increasingly weak with advancements in technology and attack strategies.
no code implementations • 7 May 2022 • Laura Pryor, Jacob mallet, Rushit Dave, Naeem Seliya, Mounika Vanamala, Evelyn Sowells Boone
In this study, we aim to contribute to the research being done on behavioral biometrics by creating and evaluating a user authentication scheme using behavioral biometrics.
no code implementations • 26 Apr 2022 • Wei Zhong Tee, Rushit Dave, Naeem Seliya, Mounika Vanamala
Human activity recognition using deep learning techniques has become increasing popular because of its high effectivity with recognizing complex tasks, as well as being relatively low in costs compared to more traditional machine learning techniques.
no code implementations • 19 Apr 2022 • Sara Kokal, Laura Pryor, Rushit Dave
Mobile devices have been manufactured and enhanced at growing rates in the past decades.
no code implementations • 30 Jan 2022 • Nyle Siddiqui, Rushit Dave, Tyler Bauer, Thomas Reither, Dylan Black, Mitchell Hanson
A lightweight convolutional neural network is trained on the AffectNet dataset a large variable dataset for facial emotion recognition and a web application is developed and deployed with our proposed framework as a proof of concept.
no code implementations • 21 Jan 2022 • Rushit Dave, Naeem Seliya, Laura Pryor, Mounika Vanamala, Evelyn Sowells, Jacob mallet
In recent years the amount of secure information being stored on mobile devices has grown exponentially.
no code implementations • 21 Jan 2022 • Rushit Dave, Naeem Seliya, Mounika Vanamala, Wei Tee
Results show promise for models trained strictly using limited sensor data collected from only smartphones and smartwatches coupled with traditional machine learning concepts and algorithms.
no code implementations • 10 Jan 2022 • Zachary Menter, Wei Tee, Rushit Dave
The Internet of things (IoT) is a rapidly advancing area of technology that has quickly become more widespread in recent years.
no code implementations • 15 Oct 2021 • Nyle Siddiqui, Rushit Dave, Naeem Seliya
Mouse dynamics has grown in popularity as a novel irreproducible behavioral biometric.
no code implementations • 15 Oct 2021 • Sam Strecker, Rushit Dave, Nyle Siddiqui, Naeem Seliya
This study examines the effectiveness of three distinct Internet of Things cyber security algorithms currently used in industry today for malware and intrusion detection: Random Forest (RF), Support-Vector Machine (SVM), and K-Nearest Neighbor (KNN).
no code implementations • 15 Oct 2021 • Cole Pearson, Naeem Seliya, Rushit Dave
Physicians provide expert opinion to legal courts on the medical state of patients, including determining if a patient is likely to have permanent or non-permanent injuries or ailments.
no code implementations • 6 Sep 2021 • Owen Casey, Rushit Dave, Naeem Seliya, Evelyn R Sowells Boone
In this paper machine learning networks are explored for their use in restoring degraded and compressed speech audio.
BIG-bench Machine Learning Generative Adversarial Network +1