Rushit Dave
YOU?
Author Swipe
View article: Decoding Sentiment: How Machine Learning Maps Emotions Across Domains
Decoding Sentiment: How Machine Learning Maps Emotions Across Domains Open
View article: Comparative Research in Sentiment Analysis Using Machine Learning Technique
Comparative Research in Sentiment Analysis Using Machine Learning Technique Open
View article: Machine Learning for Identifying Harmful Online Behavior: A Cyberbullying Overview
Machine Learning for Identifying Harmful Online Behavior: A Cyberbullying Overview Open
View article: AI-Based Home Security System
AI-Based Home Security System Open
Home security is of paramount importance in today's world, where we rely more on technology, home security is crucial. Using technology to make homes safer and easier to control from anywhere is important. Home security is important for th…
View article: From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics
From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics Open
In the realm of computer security, the importance of efficient and reliable user authentication methods has become increasingly critical. This paper examines the potential of mouse movement dynamics as a consistent metric for continuous au…
View article: Your device may know you better than you know yourself -- continuous authentication on novel dataset using machine learning
Your device may know you better than you know yourself -- continuous authentication on novel dataset using machine learning Open
This research aims to further understanding in the field of continuous authentication using behavioral biometrics. We are contributing a novel dataset that encompasses the gesture data of 15 users playing Minecraft with a Samsung Tablet, e…
View article: Your Device May Know You Better Than You Know Yourself-Continuous Authentication on Novel Dataset using Machine Learning
Your Device May Know You Better Than You Know Yourself-Continuous Authentication on Novel Dataset using Machine Learning Open
This research aims to further understanding in the field of continuous authentication using behavioural biometrics. We are contributing a novel dataset that encompasses the gesture data of 15 users playing Minecraft with a Samsung Tablet, …
View article: From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics
From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics Open
In the realm of computer security, the importance of efficient and reliable user authentication methods has become increasingly critical. This paper examines the potential of mouse movement dynamics as a consistent metric for continuous au…
View article: The Effects of IDS/IPS Placement on Big Data Systems in Geo‑Distributed Wide Area Networks
The Effects of IDS/IPS Placement on Big Data Systems in Geo‑Distributed Wide Area Networks Open
View article: Recent Advancements in the Field of Deepfake Detection
Recent Advancements in the Field of Deepfake Detection Open
A deepfake is a photo or video of a person whose image has been digitally altered or partially replaced with an image of someone else. Deepfakes have the potential to cause a variety of problems and are often used maliciously. A common usa…
View article: Recent Advancements in the Field of Deepfake Detection
Recent Advancements in the Field of Deepfake Detection Open
A deepfake is a photo or video of a person whose image has been digitally altered or partially replaced with an image of someone else. Deepfakes have the potential to cause a variety of problems and are often used maliciously. A common usa…
View article: Recent Advancements In The Field Of Deepfake Detection
Recent Advancements In The Field Of Deepfake Detection Open
A deepfake is a photo or video of a person whose image has been digitally altered or partially replaced with an image of someone else. Deepfakes have the potential to cause a variety of problems and are often used maliciously. A common usa…
View article: Leveraging Deep Learning Techniques to Obtain Efficacious Segmentation Results
Leveraging Deep Learning Techniques to Obtain Efficacious Segmentation Results Open
Image segmentation is a critical task in the field of computer vision. In the past, traditional segmentation algorithms were frequently used to tackle this problem but had various shortcomings. However, the advent of deep learning has revo…
View article: Your Identity is Your Behavior -- Continuous User Authentication based on Machine Learning and Touch Dynamics
Your Identity is Your Behavior -- Continuous User Authentication based on Machine Learning and Touch Dynamics Open
The aim of this research paper is to look into the use of continuous authentication with mobile touch dynamics, using three different algorithms: Neural Network, Extreme Gradient Boosting, and Support Vector Machine. Mobile devices are con…
View article: Hybrid Deepfake Detection Utilizing MLP and LSTM
Hybrid Deepfake Detection Utilizing MLP and LSTM Open
The growing reliance of society on social media for authentic information has done nothing but increase over the past years. This has only raised the potential consequences of the spread of misinformation. One of the growing methods in pop…
View article: Leveraging Deep Learning Approaches for Deepfake Detection: A Review
Leveraging Deep Learning Approaches for Deepfake Detection: A Review Open
Conspicuous progression in the field of machine learning and deep learning have led the jump of highly realistic fake media, these media oftentimes referred as deepfakes. Deepfakes are fabricated media which are generated by sophisticated …
View article: Deepfake Detection Analyzing Hybrid Dataset Utilizing CNN and SVM
Deepfake Detection Analyzing Hybrid Dataset Utilizing CNN and SVM Open
Social media is currently being used by many individuals online as a major source of information. However, not all information shared online is true, even photos and videos can be doctored. Deepfakes have recently risen with the rise of te…
View article: Deepfake Detection Analyzing Hybrid Dataset Utilizing CNN and SVM
Deepfake Detection Analyzing Hybrid Dataset Utilizing CNN and SVM Open
Social media is currently being used by many individuals online as a major source of information. However, not all information shared online is true, even photos and videos can be doctored. Deepfakes have recently risen with the rise of te…
View article: Machine Learning Based Approach to Recommend MITRE ATT&CK Framework for Software Requirements and Design Specifications
Machine Learning Based Approach to Recommend MITRE ATT&CK Framework for Software Requirements and Design Specifications Open
Engineering more secure software has become a critical challenge in the cyber world. It is very important to develop methodologies, techniques, and tools for developing secure software. To develop secure software, software developers need …
View article: Deepfake Detection Analyzing Hybrid Dataset Utilizing CNN and SVM
Deepfake Detection Analyzing Hybrid Dataset Utilizing CNN and SVM Open
Social media is currently being used by many individuals online as a major source of information. However, not all information shared online is true, even photos and videos can be doctored. Deepfakes have recently risen with the rise of te…
View article: Next-Generation Intrusion Detection and Prevention System Performance in Distributed Big Data Network Security Architectures
Next-Generation Intrusion Detection and Prevention System Performance in Distributed Big Data Network Security Architectures Open
Big data systems are expanding to support the rapidly growing needs of massive scale data analytics. To safeguard user data, the design and placement of cybersecurity systems is also evolving as organizations to increase their big data por…
View article: Using Deep Learning to Detecting Deepfakes
Using Deep Learning to Detecting Deepfakes Open
In the recent years, social media has grown to become a major source of information for many online users. This has given rise to the spread of misinformation through deepfakes. Deepfakes are videos or images that replace one persons face …
View article: Continuous User Authentication Using Machine Learning and Multi-Finger Mobile Touch Dynamics with a Novel Dataset
Continuous User Authentication Using Machine Learning and Multi-Finger Mobile Touch Dynamics with a Novel Dataset Open
As technology grows and evolves rapidly, it is increasingly clear that mobile devices are more commonly used for sensitive matters than ever before. A need to authenticate users continuously is sought after as a single-factor or multi fact…
View article: Mitigating Presentation Attack using DCGAN and Deep CNN
Mitigating Presentation Attack using DCGAN and Deep CNN Open
Biometric based authentication is currently playing an essential role over conventional authentication system; however, the risk of presentation attacks subsequently rising. Our research aims at identifying the areas where presentation att…
View article: Machine learning Applications of Data Security and Privacy A Systemic Review
Machine learning Applications of Data Security and Privacy A Systemic Review Open
With the present day trends in technology, greater and more human beings rely on their non-public devices to preserve their sensitive information. Concurrently, the environment in which these devices are linked have grown to develop to…
View article: Machine learning Applications of Data Security and Privacy A Systemic Review
Machine learning Applications of Data Security and Privacy A Systemic Review Open
With the present day trends in technology, greater and more human beings rely on their non-public devices to preserve their sensitive information. Concurrently, the environment in which these devices are linked have grown to develop to…
View article: Machine learning Applications of Data Security and Privacy A Systemic Review
Machine learning Applications of Data Security and Privacy A Systemic Review Open
<p><em>With the latest developments in technology, extra and extra human beings depend on their private gadgets to keep their touchy information. Concurrently, the surroundings in which these gadgets are linked have grown to gr…
View article: Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication
Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication Open
Static authentication methods, like passwords, grow increasingly weak with advancements in technology and attack strategies. Continuous authentication has been proposed as a solution, in which users who have gained access to an account are…
View article: Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning
Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning Open
The amount of secure data being stored on mobile devices has grown immensely in recent years. However, the security measures protecting this data have stayed static, with few improvements being done to the vulnerabilities of current authen…