Applications of recurrent neural network for biometric authentication & anomaly detection

JM Ackerson, R Dave, N Seliya - Information, 2021 - mdpi.com
Recurrent Neural Networks are powerful machine learning frameworks that allow for data to
be saved and referenced in a temporal sequence. This opens many new possibilities in …

Using machine learning for dynamic authentication in telehealth: A tutorial

M Hazratifard, F Gebali, M Mamun - Sensors, 2022 - mdpi.com
Telehealth systems have evolved into more prevalent services that can serve people in
remote locations and at their homes via smart devices and 5G systems. Protecting the …

Machine and deep learning applications to mouse dynamics for continuous user authentication

N Siddiqui, R Dave, M Vanamala, N Seliya - Machine Learning and …, 2022 - mdpi.com
Static authentication methods, like passwords, grow increasingly weak with advancements
in technology and attack strategies. Continuous authentication has been proposed as a …

A modern analysis of aging machine learning based IOT cybersecurity methods

S Strecker, R Dave, N Siddiqui, N Seliya - arxiv preprint arxiv:2110.07832, 2021 - arxiv.org
Modern scientific advancements often contribute to the introduction and refinement of never-
before-seen technologies. This can be quite the task for humans to maintain and monitor …

Hold on and swipe: a touch-movement based continuous authentication schema based on machine learning

J Mallet, L Pryor, R Dave, N Seliya… - … Asia Conference on …, 2022 - ieeexplore.ieee.org
In recent years, the amount of secure information being stored on mobile devices has grown
exponentially. However, current security schemas for mobile devices such as physiological …

Your battery is a blast! safeguarding against counterfeit batteries with authentication

F Marchiori, M Conti - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Lithium-ion (Li-ion) batteries are the primary power source in various applications due to
their high energy and power density. Their market was estimated to be up to 48 billion US …

A close look into human activity recognition models using deep learning

WZ Tee, R Dave, J Seliya… - 2022 3rd International …, 2022 - ieeexplore.ieee.org
Human activity recognition using deep learning techniques has become increasing popular
because of its high effectivity with recognizing complex tasks, as well as being relatively low …

Deep Learning and Machine Learning, Better Together Than Apart: A Review on Biometrics Mobile Authentication

S Kokal, M Vanamala, R Dave - Journal of Cybersecurity and Privacy, 2023 - mdpi.com
Throughout the past several decades, mobile devices have evolved in capability and
popularity at growing rates while improvement in security has fallen behind. As smartphones …

Using deep learning to detecting deepfakes

J Mallet, R Dave, N Seliya… - 2022 9th International …, 2022 - ieeexplore.ieee.org
In the recent years, social media has grown to become a major source of information for
many online users. This has given rise to the spread of misinformation through deepfakes …

Machine learning algorithms in user authentication schemes

L Pryor, R Dave, J Seliya… - … Conference on Electrical …, 2021 - ieeexplore.ieee.org
In the past two decades, the number of mobile products being created by companies has
grown exponentially. However, although these devices are constantly being upgraded with …