An investigation of biometric authentication in the healthcare environment J Mason, R Dave, P Chatterjee, I Graham-Allen, A Esterline, K Roy Array 8, 100042, 2020 | 92 | 2020 |
Applications of recurrent neural network for biometric authentication & anomaly detection JM Ackerson, R Dave, N Seliya Information 12 (7), 272, 2021 | 79 | 2021 |
Leveraging deep learning techniques to obtain efficacious segmentation results J Purohit, R Dave Archives of Advanced Engineering Science 1 (1), 11-26, 2023 | 52 | 2023 |
User authentication schemes using machine learning methods—a review N Siddiqui, L Pryor, R Dave Proceedings of International Conference on Communication and Computational …, 2021 | 46 | 2021 |
An analysis of IoT cyber security driven by machine learning S Strecker, W Van Haaften, R Dave Proceedings of International Conference on Communication and Computational …, 2021 | 42 | 2021 |
Machine and deep learning applications to mouse dynamics for continuous user authentication N Siddiqui, R Dave, M Vanamala, N Seliya Machine Learning and Knowledge Extraction 4 (2), 502-518, 2022 | 41 | 2022 |
Touch-based active cloud authentication using traditional machine learning and LSTM on a distributed tensorflow framework DJ Gunn, Z Liu, R Dave, X Yuan, K Roy International Journal of Computational Intelligence and Applications 18 (04 …, 2019 | 41 | 2019 |
A modern analysis of aging machine learning based IOT cybersecurity methods S Strecker, R Dave, N Siddiqui, N Seliya arXiv preprint arXiv:2110.07832, 2021 | 39 | 2021 |
Hold on and swipe: a touch-movement based continuous authentication schema based on machine learning J Mallet, L Pryor, R Dave, N Seliya, M Vanamala, E Sowells-Boone 2022 Asia Conference on Algorithms, Computing and Machine Learning (CACML …, 2022 | 32 | 2022 |
Palm print authentication on a cloud platform J Shelton, C Rice, J Singh, J Jenkins, R Dave, K Roy, S Chakraborty 2018 International Conference on Advances in Big Data, Computing and Data …, 2018 | 32 | 2018 |
The benefits of edge computing in healthcare, smart cities, and IoT R Dave, N Seliya, N Siddiqui arXiv preprint arXiv:2112.01250, 2021 | 31 | 2021 |
A close look into human activity recognition models using deep learning WZ Tee, R Dave, J Seliya, M Vanamala 2022 3rd International Conference on Computing, Networks and Internet of …, 2022 | 26 | 2022 |
Efficient data privacy and security in autonomous cars R Dave, ES Boone, K Roy Journal of Computer Sciences and Applications 7 (1), 31-36, 2019 | 25 | 2019 |
Continuous user authentication using mouse dynamics, machine learning, and minecraft N Siddiqui, R Dave, N Seliya 2021 International Conference on Electrical, Computer and Energy …, 2021 | 24 | 2021 |
Machine learning algorithms in user authentication schemes L Pryor, R Dave, J Seliya, ES Boone 2021 International Conference on Electrical, Computer and Energy …, 2021 | 23 | 2021 |
Human activity recognition models using limited consumer device sensors and machine learning WZ Tee, R Dave, N Seliya, M Vanamala 2022 Asia Conference on Algorithms, Computing and Machine Learning (CACML …, 2022 | 20 | 2022 |
Deep Learning and Machine Learning, Better Together Than Apart: A Review on Biometrics Mobile Authentication S Kokal, M Vanamala, R Dave Journal of Cybersecurity and Privacy 3 (2), 227-258, 2023 | 19 | 2023 |
Using deep learning to detecting deepfakes J Mallet, R Dave, N Seliya, M Vanamala 2022 9th International Conference on Soft Computing & Machine Intelligence …, 2022 | 19 | 2022 |
Named entity recognition in unstructured medical text documents C Pearson, N Seliya, R Dave 2021 International conference on electrical, computer and energy …, 2021 | 18 | 2021 |
Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning L Pryor, J Mallet, R Dave, N Seliya, M Vanamala, ES Boone arXiv preprint arXiv:2205.08371, 2022 | 16 | 2022 |