Rushit Dave

Orcid: 0009-0000-2638-3204

According to our database1, Rushit Dave authored at least 32 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Your device may know you better than you know yourself - continuous authentication on novel dataset using machine learning.
CoRR, 2024

From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics.
CoRR, 2024

2023
Deep Learning and Machine Learning, Better Together Than Apart: A Review on Biometrics Mobile Authentication.
J. Cybersecur. Priv., June, 2023

Recent Advancements In The Field Of Deepfake Detection.
CoRR, 2023

Your Identity is Your Behavior - Continuous User Authentication based on Machine Learning and Touch Dynamics.
CoRR, 2023

Hybrid Deepfake Detection Utilizing MLP and LSTM.
CoRR, 2023

Machine Learning Based Approach to Recommend MITRE ATT&CK Framework for Software Requirements and Design Specifications.
CoRR, 2023

Leveraging Deep Learning Approaches for Deepfake Detection: A Review.
Proceedings of the ISMSI 2023: Proceedings of the 7th International Conference on Intelligent Systems, 2023

Deepfake Detection Analyzing Hybrid Dataset Utilizing CNN and SVM.
Proceedings of the ISMSI 2023: Proceedings of the 7th International Conference on Intelligent Systems, 2023

2022
Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication.
Mach. Learn. Knowl. Extr., 2022

Continuous User Authentication Using Machine Learning and Multi-Finger Mobile Touch Dynamics with a Novel Dataset.
CoRR, 2022

Using Deep Learning to Detecting Deepfakes.
CoRR, 2022

Mitigating Presentation Attack using DCGAN and Deep CNN.
CoRR, 2022

Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning.
CoRR, 2022

A Close Look into Human Activity Recognition Models using Deep Learning.
CoRR, 2022

Application of Machine Learning-Based Pattern Recognition in IoT Devices: Review.
CoRR, 2022

Exploration of Machine Learning Classification Models Used for Behavioral Biometrics Authentication.
Proceedings of the ICCTA 2022: 8th International Conference on Computer Technology Applications, Kapfenberg, Austria, May 12, 2022

A Close Look into Human Activity Recognition Models using Deep Learning.
Proceedings of the 3rd International Conference on Computing, 2022

Human Activity Recognition models using Limited Consumer Device Sensors and Machine Learning.
Proceedings of the Asia Conference on Algorithms, Computing and Machine Learning, 2022

A Robust Framework for Deep Learning Approaches to Facial Emotion Recognition and Evaluation.
Proceedings of the Asia Conference on Algorithms, Computing and Machine Learning, 2022

Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning.
Proceedings of the Asia Conference on Algorithms, Computing and Machine Learning, 2022

2021
Applications of Recurrent Neural Network for Biometric Authentication & Anomaly Detection.
Inf., 2021

The Benefits of Edge Computing in Healthcare, Smart Cities, and IoT.
CoRR, 2021

Named Entity Recognition in Unstructured Medical Text Documents.
CoRR, 2021

Continuous Authentication Using Mouse Movements, Machine Learning, and Minecraft.
CoRR, 2021

A Modern Analysis of Aging Machine Learning Based IoT Cybersecurity Methods.
CoRR, 2021

Machine Learning Algorithms In User Authentication Schemes.
CoRR, 2021

Applications of Recurrent Neural Network for Biometric Authentication & Anomaly Detection.
CoRR, 2021

IoT Security and Authentication schemes Based on Machine Learning: Review.
CoRR, 2021

Machine Learning: Challenges, Limitations, and Compatibility for Audio Restoration Processes.
CoRR, 2021

2020
An Investigation of Biometric Authentication in the Healthcare Environment.
Array, 2020

2019
Touch-Based Active Cloud Authentication Using Traditional Machine Learning and LSTM on a Distributed Tensorflow Framework.
Int. J. Comput. Intell. Appl., 2019


  Loading...