An investigation of biometric authentication in the healthcare environment J Mason, R Dave, P Chatterjee, I Graham-Allen, A Esterline, K Roy Array 8, 100042, 2020 | 66 | 2020 |
Applications of recurrent neural network for biometric authentication & anomaly detection JM Ackerson, R Dave, N Seliya Information 12 (7), 272, 2021 | 55 | 2021 |
User Authentication Schemes Using Machine Learning Methods-A Review N Siddiqui, L Pryor, R Dave Algorithms for Intelligent Systems, 703-723, 2021 | 38 | 2021 |
Touch-based active cloud authentication using traditional machine learning and LSTM on a distributed tensorflow framework DJ Gunn, Z Liu, R Dave, X Yuan, K Roy International Journal of Computational Intelligence and Applications 18 (04 …, 2019 | 38 | 2019 |
An Analysis of IoT Cyber Security Driven by Machine Learning S Strecker, W Van Haaften, R Dave Algorithms for Intelligent Systems, 725-753, 2021 | 36 | 2021 |
Palm print authentication on a cloud platform J Shelton, C Rice, J Singh, J Jenkins, R Dave, K Roy, S Chakraborty 2018 International Conference on Advances in Big Data, Computing and Data …, 2018 | 31 | 2018 |
A Modern Analysis of Aging Machine Learning Based IoT Cybersecurity Methods S Strecker, R Dave, N Siddiqui, N Seliya Journal of computer sciences and applications 9 (1), 16-22, 2021 | 29 | 2021 |
Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication NS Rushit Dave, Naeem Seliya, Mounika Vanamala MDPI Machine Learning and Knowledge Extraction 4 (2), 502-518, 2022 | 28* | 2022 |
Hold on and swipe: a touch-movement based continuous authentication schema based on machine learning J Mallet, L Pryor, R Dave, N Seliya, M Vanamala, E Sowells-Boone 2022 Asia Conference on Algorithms, Computing and Machine Learning (CACML …, 2022 | 25 | 2022 |
The Benefits of Edge Computing in Healthcare, Smart Cities, and IoT R Dave, N Seliya, N Siddiqui Journal of Computer Sciences and Applications, 9 (1), 23-34, 2021 | 20 | 2021 |
Efficient Data privacy and security in autonomous cars RD Evelyn R sowells Boone, Kaushik Roy Journal of computer sciences and applications 7 (1), 31-36, 2019 | 20 | 2019 |
Continuous User Authentication Using Mouse Dynamics, Machine Learning, and Minecraft N Siddiqui, R Dave, N Seliya 2021 International Conference on Electrical, Computer and Energy …, 2021 | 19 | 2021 |
Machine learning algorithms in user authentication schemes L Pryor, R Dave, J Seliya, ES Boone 2021 International Conference on Electrical, Computer and Energy …, 2021 | 19 | 2021 |
Human Activity Recognition models using Limited Consumer Device Sensors and Machine Learning WZ Tee, R Dave, N Seliya, M Vanamala 2022 Asia Conference on Algorithms, Computing and Machine Learning (CACML …, 2022 | 16 | 2022 |
Using deep learning to detecting deepfakes J Mallet, R Dave, N Seliya, M Vanamala 2022 9th International Conference on Soft Computing & Machine Intelligence …, 2022 | 15 | 2022 |
A close look into human activity recognition models using deep learning WZ Tee, R Dave, J Seliya, M Vanamala 2022 3rd International Conference on Computing, Networks and Internet of …, 2022 | 14 | 2022 |
A robust framework for deep learning approaches to facial emotion recognition and evaluation N Siddiqui, T Reither, R Dave, D Black, T Bauer, M Hanson 2022 Asia Conference on Algorithms, Computing and Machine Learning (CACML …, 2022 | 13 | 2022 |
Application of machine learning-based pattern recognition in iot devices Z Menter, WZ Tee, R Dave Proceedings of International Conference on Communication and Computational …, 2021 | 12 | 2021 |
Continuous User Authentication Using Machine Learning and Multi-Finger Mobile Touch Dynamics with a Novel Dataset Z DeRidder, N Siddiqui, T Reither, R Dave, B Pelto, M Vanamala, ... 2022 9th International Conference on Soft Computing & Machine Intelligence …, 2022 | 11 | 2022 |
Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning RD L Pryor, J Mallet Computer and Information Science 15 (3), 2022 | 10* | 2022 |