Search Results for author: Mounika Vanamala

Found 11 papers, 1 papers with code

Software Repositories and Machine Learning Research in Cyber Security

no code implementations1 Nov 2023 Mounika Vanamala, Keith Bryant, Alex Caravella

In today's rapidly evolving technological landscape and advanced software development, the rise in cyber security attacks has become a pressing concern.

Your Identity is Your Behavior -- Continuous User Authentication based on Machine Learning and Touch Dynamics

no code implementations24 Apr 2023 Brendan Pelto, Mounika Vanamala, Rushit Dave

The results of the research showed that all three algorithms were able to effectively classify users based on their individual touch dynamics, with accuracy ranging from 80% to 95%.

Leveraging Deep Learning Approaches for Deepfake Detection: A Review

no code implementations4 Apr 2023 Aniruddha Tiwari, Rushit Dave, Mounika Vanamala

Conspicuous progression in the field of machine learning and deep learning have led the jump of highly realistic fake media, these media oftentimes referred as deepfakes.

DeepFake Detection Face Swapping

Machine Learning Based Approach to Recommend MITRE ATT&CK Framework for Software Requirements and Design Specifications

no code implementations10 Feb 2023 Nicholas Lasky, Benjamin Hallis, Mounika Vanamala, Rushit Dave, Jim Seliya

In this paper, we use machine learning algorithms to map requirements to the MITRE ATT&CK database and determine the accuracy of each mapping depending on the data split.

Decision Making

Using Deep Learning to Detecting Deepfakes

no code implementations27 Jul 2022 Jacob mallet, Rushit Dave, Naeem Seliya, Mounika Vanamala

This study looks at various deepfake detection models that use deep learning algorithms to combat this looming threat.

DeepFake Detection Face Swapping +1

Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication

1 code implementation26 May 2022 Nyle Siddiqui, Rushit Dave, Naeem Seliya, Mounika Vanamala

Static authentication methods, like passwords, grow increasingly weak with advancements in technology and attack strategies.

Multi-class Classification

Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning

no code implementations7 May 2022 Laura Pryor, Jacob mallet, Rushit Dave, Naeem Seliya, Mounika Vanamala, Evelyn Sowells Boone

In this study, we aim to contribute to the research being done on behavioral biometrics by creating and evaluating a user authentication scheme using behavioral biometrics.

BIG-bench Machine Learning

A Close Look into Human Activity Recognition Models using Deep Learning

no code implementations26 Apr 2022 Wei Zhong Tee, Rushit Dave, Naeem Seliya, Mounika Vanamala

Human activity recognition using deep learning techniques has become increasing popular because of its high effectivity with recognizing complex tasks, as well as being relatively low in costs compared to more traditional machine learning techniques.

Human Activity Recognition

Human Activity Recognition models using Limited Consumer Device Sensors and Machine Learning

no code implementations21 Jan 2022 Rushit Dave, Naeem Seliya, Mounika Vanamala, Wei Tee

Results show promise for models trained strictly using limited sensor data collected from only smartphones and smartwatches coupled with traditional machine learning concepts and algorithms.

BIG-bench Machine Learning Human Activity Recognition

Cannot find the paper you are looking for? You can Submit a new open access paper.