Applications of recurrent neural network for biometric authentication & anomaly detection

JM Ackerson, R Dave, N Seliya - Information, 2021 - mdpi.com
Recurrent Neural Networks are powerful machine learning frameworks that allow for data to
be saved and referenced in a temporal sequence. This opens many new possibilities in …

Using machine learning for dynamic authentication in telehealth: A tutorial

M Hazratifard, F Gebali, M Mamun - Sensors, 2022 - mdpi.com
Telehealth systems have evolved into more prevalent services that can serve people in
remote locations and at their homes via smart devices and 5G systems. Protecting the …

A digital mask to safeguard patient privacy

Y Yang, J Lyu, R Wang, Q Wen, L Zhao, W Chen, S Bi… - Nature medicine, 2022 - nature.com
The storage of facial images in medical records poses privacy risks due to the sensitive
nature of the personal biometric information that can be extracted from such images. To …

User authentication schemes using machine learning methods—a review

N Siddiqui, L Pryor, R Dave - Proceedings of International Conference on …, 2021 - Springer
With the recent advancements in technology, more and more people rely on their personal
devices to store their sensitive information. Concurrently, the environment in which these …

A modern analysis of aging machine learning based IOT cybersecurity methods

S Strecker, R Dave, N Siddiqui, N Seliya - arXiv preprint arXiv:2110.07832, 2021 - arxiv.org
Modern scientific advancements often contribute to the introduction and refinement of never-
before-seen technologies. This can be quite the task for humans to maintain and monitor …

Hold on and swipe: a touch-movement based continuous authentication schema based on machine learning

J Mallet, L Pryor, R Dave, N Seliya… - … Asia Conference on …, 2022 - ieeexplore.ieee.org
In recent years, the amount of secure information being stored on mobile devices has grown
exponentially. However, current security schemas for mobile devices such as physiological …

An analysis of IoT cyber security driven by machine learning

S Strecker, W Van Haaften, R Dave - Proceedings of International …, 2021 - Springer
Since the beginning of the Internet of Things (IoT), the number of IoT devices connected to
the Internet has grown rapidly. However, many IoT devices lack the security standards that …

A close look into human activity recognition models using deep learning

WZ Tee, R Dave, J Seliya… - 2022 3rd International …, 2022 - ieeexplore.ieee.org
Human activity recognition using deep learning techniques has become increasing popular
because of its high effectivity with recognizing complex tasks, as well as being relatively low …

Role of authentication factors in Fin-tech mobile transaction security

HU Khan, M Sohail, S Nazir, T Hussain, B Shah, F Ali - Journal of Big Data, 2023 - Springer
Fin-Tech is the merging of finance and technology, to be considered a key term for
technology-based financial operations and money transactions as far as Fin-Tech is …

Deep learning algorithms based fingerprint authentication: systematic literature review

H Chiroma - Journal of Artificial Intelligence and Systems, 2021 - iecscience.org
Deep Learning algorithms (DL) have been applied in different domains such as computer
vision, image detection, robotics and speech processing, in most cases, DL demonstrated …