关注
Sunita Dhavale
Sunita Dhavale
在 diat.ac.in 的电子邮件经过验证
标题
引用次数
引用次数
年份
A survey on log anomaly detection using deep learning
RB Yadav, PS Kumar, SV Dhavale
2020 8th International Conference on Reliability, Infocom Technologies and …, 2020
552020
Corona-Nidaan: lightweight deep convolutional neural network for chest X-Ray based COVID-19 infection detection
M Chakraborty, SV Dhavale, J Ingole
Applied Intelligence 51 (5), 3026-3043, 2021
522021
Control flow graph based multiclass malware detection using bi-normal separation
A Kapoor, S Dhavale
Defence Science Journal 66 (2), 138-145, 2016
442016
DIAT-μSAT: Small aerial targets’ micro-Doppler signatures and their classification using CNN
HC Kumawat, M Chakraborty, AAB Raj, SV Dhavale
IEEE Geoscience and Remote Sensing Letters 19, 1-5, 2021
412021
DIAT-RadHARNet: A lightweight DCNN for radar based classification of human suspicious activities
M Chakraborty, HC Kumawat, SV Dhavale
IEEE Transactions on Instrumentation and Measurement 71, 1-10, 2022
402022
DIAT-μ RadHAR (micro-doppler signature dataset) & μ RadNet (a lightweight DCNN)—For human suspicious activity recognition
M Chakraborty, HC Kumawat, SV Dhavale, AAB Raj
IEEE Sensors Journal 22 (7), 6851-6858, 2022
342022
Application of DNN for radar micro-doppler signature-based human suspicious activity recognition
M Chakraborty, HC Kumawat, SV Dhavale
Pattern Recognition Letters 162, 1-6, 2022
272022
A survey on machine learning-based ransomware detection
N Rani, SV Dhavale, A Singh, A Mehra
Proceedings of the Seventh International Conference on Mathematics and …, 2022
232022
DWT and DCT based robust iris feature extraction and recognition algorithm for biometric personal identification
SV Dhavale
International journal of computer applications 40 (7), 33-37, 2012
222012
Overview of information flow tracking techniques based on taint analysis for android
B Lokhande, S Dhavale
2014 International Conference on Computing for Sustainable Global …, 2014
202014
Two phase static analysis technique for Android malware detection
PM Kate, SV Dhavale
Proceedings of the Third International Symposium on Women in Computing and …, 2015
182015
Insider threat detection using deep learning: A review
M Raut, S Dhavale, A Singh, A Mehra
2020 3rd International Conference on Intelligent Sustainable Systems (ICISS …, 2020
152020
A review of passive forensic techniques for detection of copy-move attacks on digital videos
S Sharma, SV Dhavale
2016 3rd International conference on advanced computing and communication …, 2016
152016
Video forensics in temporal domain using machine learning techniques
S Jaiswal, S Dhavale
International Journal of Computer Network and Information Security 5 (9), 58, 2013
132013
Leveraging machine learning for ransomware detection
N Rani, SV Dhavale
arXiv preprint arXiv:2206.01919, 2022
102022
A comparison of pre-trained word embeddings for sentiment analysis using deep learning
P Santosh Kumar, RB Yadav, SV Dhavale
International Conference on Innovative Computing and Communications …, 2021
102021
Advance image based spam detection and filtering techniques, IGI Global
SV Dhavale
9*2017
Real-time image based weapon detection using YOLO algorithms
M Gali, S Dhavale, S Kumar
International Conference on Advances in Computing and Data Sciences, 173-185, 2022
82022
Two-stream mid-level fusion network for human activity detection
M Chakraborty, A Pramanick, S Vikrant Dhavale
International Conference on Innovative Computing and Communications …, 2020
82020
Performance analysis of inception-v2 and Yolov3-based human activity recognition in videos
T Mustafa, S Dhavale, MM Kuber
SN Computer Science 1, 1-7, 2020
82020
系统目前无法执行此操作,请稍后再试。
文章 1–20