Search Results for author: Rushit Dave

Found 20 papers, 1 papers with code

From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics

no code implementations6 Mar 2024 Rushit Dave, Marcho Handoko, Ali Rashid, Cole Schoenbauer

This research contributes to the ongoing efforts to enhance computer security and highlights the potential of leveraging user behavior, specifically mouse dynamics, in developing robust authentication systems.

Computer Security

Your Identity is Your Behavior -- Continuous User Authentication based on Machine Learning and Touch Dynamics

no code implementations24 Apr 2023 Brendan Pelto, Mounika Vanamala, Rushit Dave

The results of the research showed that all three algorithms were able to effectively classify users based on their individual touch dynamics, with accuracy ranging from 80% to 95%.

Leveraging Deep Learning Approaches for Deepfake Detection: A Review

no code implementations4 Apr 2023 Aniruddha Tiwari, Rushit Dave, Mounika Vanamala

Conspicuous progression in the field of machine learning and deep learning have led the jump of highly realistic fake media, these media oftentimes referred as deepfakes.

DeepFake Detection Face Swapping

Machine Learning Based Approach to Recommend MITRE ATT&CK Framework for Software Requirements and Design Specifications

no code implementations10 Feb 2023 Nicholas Lasky, Benjamin Hallis, Mounika Vanamala, Rushit Dave, Jim Seliya

In this paper, we use machine learning algorithms to map requirements to the MITRE ATT&CK database and determine the accuracy of each mapping depending on the data split.

Decision Making

Using Deep Learning to Detecting Deepfakes

no code implementations27 Jul 2022 Jacob mallet, Rushit Dave, Naeem Seliya, Mounika Vanamala

This study looks at various deepfake detection models that use deep learning algorithms to combat this looming threat.

DeepFake Detection Face Swapping +1

Mitigating Presentation Attack using DCGAN and Deep CNN

no code implementations22 Jun 2022 Nyle Siddiqui, Rushit Dave

For MICHE-I [2] and VISOB [3] datasets, we achieved the test accuracies of 95% and 96% respectively.

Image Generation

Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication

1 code implementation26 May 2022 Nyle Siddiqui, Rushit Dave, Naeem Seliya, Mounika Vanamala

Static authentication methods, like passwords, grow increasingly weak with advancements in technology and attack strategies.

Multi-class Classification

Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning

no code implementations7 May 2022 Laura Pryor, Jacob mallet, Rushit Dave, Naeem Seliya, Mounika Vanamala, Evelyn Sowells Boone

In this study, we aim to contribute to the research being done on behavioral biometrics by creating and evaluating a user authentication scheme using behavioral biometrics.

BIG-bench Machine Learning

A Close Look into Human Activity Recognition Models using Deep Learning

no code implementations26 Apr 2022 Wei Zhong Tee, Rushit Dave, Naeem Seliya, Mounika Vanamala

Human activity recognition using deep learning techniques has become increasing popular because of its high effectivity with recognizing complex tasks, as well as being relatively low in costs compared to more traditional machine learning techniques.

Human Activity Recognition

A Robust Framework for Deep Learning Approaches to Facial Emotion Recognition and Evaluation

no code implementations30 Jan 2022 Nyle Siddiqui, Rushit Dave, Tyler Bauer, Thomas Reither, Dylan Black, Mitchell Hanson

A lightweight convolutional neural network is trained on the AffectNet dataset a large variable dataset for facial emotion recognition and a web application is developed and deployed with our proposed framework as a proof of concept.

Emotion Classification Facial Emotion Recognition

Human Activity Recognition models using Limited Consumer Device Sensors and Machine Learning

no code implementations21 Jan 2022 Rushit Dave, Naeem Seliya, Mounika Vanamala, Wei Tee

Results show promise for models trained strictly using limited sensor data collected from only smartphones and smartwatches coupled with traditional machine learning concepts and algorithms.

BIG-bench Machine Learning Human Activity Recognition

Application of Machine Learning-Based Pattern Recognition in IoT Devices: Review

no code implementations10 Jan 2022 Zachary Menter, Wei Tee, Rushit Dave

The Internet of things (IoT) is a rapidly advancing area of technology that has quickly become more widespread in recent years.

BIG-bench Machine Learning

A Modern Analysis of Aging Machine Learning Based IoT Cybersecurity Methods

no code implementations15 Oct 2021 Sam Strecker, Rushit Dave, Nyle Siddiqui, Naeem Seliya

This study examines the effectiveness of three distinct Internet of Things cyber security algorithms currently used in industry today for malware and intrusion detection: Random Forest (RF), Support-Vector Machine (SVM), and K-Nearest Neighbor (KNN).

BIG-bench Machine Learning Intrusion Detection +1

Named Entity Recognition in Unstructured Medical Text Documents

no code implementations15 Oct 2021 Cole Pearson, Naeem Seliya, Rushit Dave

Physicians provide expert opinion to legal courts on the medical state of patients, including determining if a patient is likely to have permanent or non-permanent injuries or ailments.

De-identification named-entity-recognition +2

Cannot find the paper you are looking for? You can Submit a new open access paper.