Follow
Rushit Dave
Title
Cited by
Cited by
Year
An investigation of biometric authentication in the healthcare environment
J Mason, R Dave, P Chatterjee, I Graham-Allen, A Esterline, K Roy
Array 8, 100042, 2020
662020
Applications of recurrent neural network for biometric authentication & anomaly detection
JM Ackerson, R Dave, N Seliya
Information 12 (7), 272, 2021
552021
User Authentication Schemes Using Machine Learning Methods-A Review
N Siddiqui, L Pryor, R Dave
Algorithms for Intelligent Systems, 703-723, 2021
382021
Touch-based active cloud authentication using traditional machine learning and LSTM on a distributed tensorflow framework
DJ Gunn, Z Liu, R Dave, X Yuan, K Roy
International Journal of Computational Intelligence and Applications 18 (04 …, 2019
382019
An Analysis of IoT Cyber Security Driven by Machine Learning
S Strecker, W Van Haaften, R Dave
Algorithms for Intelligent Systems, 725-753, 2021
362021
Palm print authentication on a cloud platform
J Shelton, C Rice, J Singh, J Jenkins, R Dave, K Roy, S Chakraborty
2018 International Conference on Advances in Big Data, Computing and Data …, 2018
312018
A Modern Analysis of Aging Machine Learning Based IoT Cybersecurity Methods
S Strecker, R Dave, N Siddiqui, N Seliya
Journal of computer sciences and applications 9 (1), 16-22, 2021
292021
Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication
NS Rushit Dave, Naeem Seliya, Mounika Vanamala
MDPI Machine Learning and Knowledge Extraction 4 (2), 502-518, 2022
28*2022
Hold on and swipe: a touch-movement based continuous authentication schema based on machine learning
J Mallet, L Pryor, R Dave, N Seliya, M Vanamala, E Sowells-Boone
2022 Asia Conference on Algorithms, Computing and Machine Learning (CACML …, 2022
252022
The Benefits of Edge Computing in Healthcare, Smart Cities, and IoT
R Dave, N Seliya, N Siddiqui
Journal of Computer Sciences and Applications, 9 (1), 23-34, 2021
202021
Efficient Data privacy and security in autonomous cars
RD Evelyn R sowells Boone, Kaushik Roy
Journal of computer sciences and applications 7 (1), 31-36, 2019
202019
Continuous User Authentication Using Mouse Dynamics, Machine Learning, and Minecraft
N Siddiqui, R Dave, N Seliya
2021 International Conference on Electrical, Computer and Energy …, 2021
192021
Machine learning algorithms in user authentication schemes
L Pryor, R Dave, J Seliya, ES Boone
2021 International Conference on Electrical, Computer and Energy …, 2021
192021
Human Activity Recognition models using Limited Consumer Device Sensors and Machine Learning
WZ Tee, R Dave, N Seliya, M Vanamala
2022 Asia Conference on Algorithms, Computing and Machine Learning (CACML …, 2022
162022
Using deep learning to detecting deepfakes
J Mallet, R Dave, N Seliya, M Vanamala
2022 9th International Conference on Soft Computing & Machine Intelligence …, 2022
152022
A close look into human activity recognition models using deep learning
WZ Tee, R Dave, J Seliya, M Vanamala
2022 3rd International Conference on Computing, Networks and Internet of …, 2022
142022
A robust framework for deep learning approaches to facial emotion recognition and evaluation
N Siddiqui, T Reither, R Dave, D Black, T Bauer, M Hanson
2022 Asia Conference on Algorithms, Computing and Machine Learning (CACML …, 2022
132022
Application of machine learning-based pattern recognition in iot devices
Z Menter, WZ Tee, R Dave
Proceedings of International Conference on Communication and Computational …, 2021
122021
Continuous User Authentication Using Machine Learning and Multi-Finger Mobile Touch Dynamics with a Novel Dataset
Z DeRidder, N Siddiqui, T Reither, R Dave, B Pelto, M Vanamala, ...
2022 9th International Conference on Soft Computing & Machine Intelligence …, 2022
112022
Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning
RD L Pryor, J Mallet
Computer and Information Science 15 (3), 2022
10*2022
The system can't perform the operation now. Try again later.
Articles 1–20