Folgen
Sunita Dhavale
Sunita Dhavale
Bestätigte E-Mail-Adresse bei diat.ac.in
Titel
Zitiert von
Zitiert von
Jahr
A survey on log anomaly detection using deep learning
RB Yadav, PS Kumar, SV Dhavale
2020 8th International Conference on Reliability, Infocom Technologies and …, 2020
612020
Corona-Nidaan: lightweight deep convolutional neural network for chest X-Ray based COVID-19 infection detection
M Chakraborty, SV Dhavale, J Ingole
Applied Intelligence 51 (5), 3026-3043, 2021
532021
DIAT-μSAT: Small aerial targets’ micro-Doppler signatures and their classification using CNN
HC Kumawat, M Chakraborty, AAB Raj, SV Dhavale
IEEE Geoscience and Remote Sensing Letters 19, 1-5, 2021
462021
DIAT-RadHARNet: A lightweight DCNN for radar based classification of human suspicious activities
M Chakraborty, HC Kumawat, SV Dhavale
IEEE Transactions on Instrumentation and Measurement 71, 1-10, 2022
442022
Control flow graph based multiclass malware detection using bi-normal separation
A Kapoor, S Dhavale
Defence Science Journal 66 (2), 138-145, 2016
432016
DIAT-μ RadHAR (micro-doppler signature dataset) & μ RadNet (a lightweight DCNN)—For human suspicious activity recognition
M Chakraborty, HC Kumawat, SV Dhavale, AAB Raj
IEEE Sensors Journal 22 (7), 6851-6858, 2022
372022
Application of DNN for radar micro-doppler signature-based human suspicious activity recognition
M Chakraborty, HC Kumawat, SV Dhavale
Pattern Recognition Letters 162, 1-6, 2022
312022
A survey on machine learning-based ransomware detection
N Rani, SV Dhavale, A Singh, A Mehra
Proceedings of the Seventh International Conference on Mathematics and …, 2022
242022
DWT and DCT based robust iris feature extraction and recognition algorithm for biometric personal identification
SV Dhavale
International journal of computer applications 40 (7), 33-37, 2012
222012
Overview of information flow tracking techniques based on taint analysis for android
B Lokhande, S Dhavale
2014 International Conference on Computing for Sustainable Global …, 2014
202014
Insider threat detection using deep learning: A review
M Raut, S Dhavale, A Singh, A Mehra
2020 3rd international conference on intelligent sustainable systems (ICISS …, 2020
182020
Two phase static analysis technique for Android malware detection
PM Kate, SV Dhavale
Proceedings of the Third International Symposium on Women in Computing and …, 2015
182015
A review of passive forensic techniques for detection of copy-move attacks on digital videos
S Sharma, SV Dhavale
2016 3rd International conference on advanced computing and communication …, 2016
152016
Video forensics in temporal domain using machine learning techniques
S Jaiswal, S Dhavale
International Journal of Computer Network and Information Security 5 (9), 58, 2013
132013
Leveraging machine learning for ransomware detection
N Rani, SV Dhavale
arXiv preprint arXiv:2206.01919, 2022
122022
A comparison of pre-trained word embeddings for sentiment analysis using deep learning
P Santosh Kumar, RB Yadav, SV Dhavale
International Conference on Innovative Computing and Communications …, 2021
122021
Advance image based spam detection and filtering techniques, IGI Global
SV Dhavale
10*2017
Real-time image based weapon detection using YOLO algorithms
M Gali, S Dhavale, S Kumar
International Conference on Advances in Computing and Data Sciences, 173-185, 2022
92022
Two-stream mid-level fusion network for human activity detection
M Chakraborty, A Pramanick, S Vikrant Dhavale
International Conference on Innovative Computing and Communications …, 2020
92020
C-asft: convolutional neural networks-based anti-spam filtering technique
S Dhavale
Proceeding of International Conference on Computational Science and …, 2020
92020
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20