A survey on log anomaly detection using deep learning RB Yadav, PS Kumar, SV Dhavale 2020 8th International Conference on Reliability, Infocom Technologies and …, 2020 | 55 | 2020 |
Corona-Nidaan: lightweight deep convolutional neural network for chest X-Ray based COVID-19 infection detection M Chakraborty, SV Dhavale, J Ingole Applied Intelligence 51 (5), 3026-3043, 2021 | 52 | 2021 |
Control flow graph based multiclass malware detection using bi-normal separation A Kapoor, S Dhavale Defence Science Journal 66 (2), 138-145, 2016 | 44 | 2016 |
DIAT-μSAT: Small aerial targets’ micro-Doppler signatures and their classification using CNN HC Kumawat, M Chakraborty, AAB Raj, SV Dhavale IEEE Geoscience and Remote Sensing Letters 19, 1-5, 2021 | 41 | 2021 |
DIAT-RadHARNet: A lightweight DCNN for radar based classification of human suspicious activities M Chakraborty, HC Kumawat, SV Dhavale IEEE Transactions on Instrumentation and Measurement 71, 1-10, 2022 | 40 | 2022 |
DIAT-μ RadHAR (micro-doppler signature dataset) & μ RadNet (a lightweight DCNN)—For human suspicious activity recognition M Chakraborty, HC Kumawat, SV Dhavale, AAB Raj IEEE Sensors Journal 22 (7), 6851-6858, 2022 | 34 | 2022 |
Application of DNN for radar micro-doppler signature-based human suspicious activity recognition M Chakraborty, HC Kumawat, SV Dhavale Pattern Recognition Letters 162, 1-6, 2022 | 27 | 2022 |
A survey on machine learning-based ransomware detection N Rani, SV Dhavale, A Singh, A Mehra Proceedings of the Seventh International Conference on Mathematics and …, 2022 | 23 | 2022 |
DWT and DCT based robust iris feature extraction and recognition algorithm for biometric personal identification SV Dhavale International journal of computer applications 40 (7), 33-37, 2012 | 22 | 2012 |
Overview of information flow tracking techniques based on taint analysis for android B Lokhande, S Dhavale 2014 International Conference on Computing for Sustainable Global …, 2014 | 20 | 2014 |
Two phase static analysis technique for Android malware detection PM Kate, SV Dhavale Proceedings of the Third International Symposium on Women in Computing and …, 2015 | 18 | 2015 |
Insider threat detection using deep learning: A review M Raut, S Dhavale, A Singh, A Mehra 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS …, 2020 | 15 | 2020 |
A review of passive forensic techniques for detection of copy-move attacks on digital videos S Sharma, SV Dhavale 2016 3rd International conference on advanced computing and communication …, 2016 | 15 | 2016 |
Video forensics in temporal domain using machine learning techniques S Jaiswal, S Dhavale International Journal of Computer Network and Information Security 5 (9), 58, 2013 | 13 | 2013 |
Leveraging machine learning for ransomware detection N Rani, SV Dhavale arXiv preprint arXiv:2206.01919, 2022 | 10 | 2022 |
A comparison of pre-trained word embeddings for sentiment analysis using deep learning P Santosh Kumar, RB Yadav, SV Dhavale International Conference on Innovative Computing and Communications …, 2021 | 10 | 2021 |
Advance image based spam detection and filtering techniques, IGI Global SV Dhavale | 9* | 2017 |
Real-time image based weapon detection using YOLO algorithms M Gali, S Dhavale, S Kumar International Conference on Advances in Computing and Data Sciences, 173-185, 2022 | 8 | 2022 |
Two-stream mid-level fusion network for human activity detection M Chakraborty, A Pramanick, S Vikrant Dhavale International Conference on Innovative Computing and Communications …, 2020 | 8 | 2020 |
Performance analysis of inception-v2 and Yolov3-based human activity recognition in videos T Mustafa, S Dhavale, MM Kuber SN Computer Science 1, 1-7, 2020 | 8 | 2020 |