Follow
Sunita Dhavale
Sunita Dhavale
Verified email at diat.ac.in
Title
Cited by
Cited by
Year
Control Flow Graph Based Multiclass Malware Detection Using Bi-normal Separation.
A Kapoor, S Dhavale
Defence Science Journal 66 (2), 2016
392016
Corona-Nidaan: lightweight deep convolutional neural network for chest X-Ray based COVID-19 infection detection
M Chakraborty, SV Dhavale, J Ingole
Applied Intelligence 51 (5), 3026-3043, 2021
382021
A survey on log anomaly detection using deep learning
RB Yadav, PS Kumar, SV Dhavale
2020 8th International Conference on Reliability, Infocom Technologies and …, 2020
322020
DWT and DCT based robust iris feature extraction and recognition algorithm for biometric personal identification
SV Dhavale
International journal of computer applications 40 (7), 33-37, 2012
232012
DIAT-RadHARNet: A lightweight DCNN for radar based classification of human suspicious activities
M Chakraborty, HC Kumawat, SV Dhavale
IEEE Transactions on Instrumentation and Measurement 71, 1-10, 2022
202022
DIAT-μSAT: Small aerial targets’ micro-Doppler signatures and their classification using CNN
HC Kumawat, M Chakraborty, AAB Raj, SV Dhavale
IEEE Geoscience and Remote Sensing Letters 19, 1-5, 2021
202021
Two phase static analysis technique for android malware detection
PM Kate, SV Dhavale
Proceedings of the Third International Symposium on Women in Computing and …, 2015
182015
Overview of information flow tracking techniques based on taint analysis for android
B Lokhande, S Dhavale
2014 International Conference on Computing for Sustainable Global …, 2014
182014
DIAT-μ RadHAR (micro-Doppler signature dataset) & μ RadNet (a lightweight DCNN)—For human suspicious activity recognition
M Chakraborty, HC Kumawat, SV Dhavale, AAB Raj
IEEE Sensors Journal 22 (7), 6851-6858, 2022
172022
Application of DNN for radar micro-doppler signature-based human suspicious activity recognition
M Chakraborty, HC Kumawat, SV Dhavale
Pattern Recognition Letters 162, 1-6, 2022
112022
A review of passive forensic techniques for detection of copy-move attacks on digital videos
S Sharma, SV Dhavale
2016 3rd International conference on advanced computing and communication …, 2016
112016
Video forensics in temporal domain using machine learning techniques
S Jaiswal, S Dhavale
International Journal of Computer Network and Information Security 5 (9), 58, 2013
92013
Lossless audio watermarking based on the alpha statistic modulation
SV Dhavale, RS Deodhar, LM Patnaik
The International Journal of Multimedia & Its Applications 4 (4), 109, 2012
82012
Robust iris recognition based on statistical properties of Walsh Hadamard transform domain
SV Dhavale
International Journal of Computer Science Issues (IJCSI) 9 (1), 118, 2012
82012
Walsh Hadamard transform based robust blind watermarking for digital audio copyright protection
SV Dhavale, RS Deodhar, LM Patnaik
Computational Intelligence and Information Technology: First International …, 2011
82011
A Survey on Machine Learning-Based Ransomware Detection
N Rani, SV Dhavale, A Singh, A Mehra
Proceedings of the Seventh International Conference on Mathematics and …, 2022
72022
A comparison of pre-trained word embeddings for sentiment analysis using deep learning
P Santosh Kumar, RB Yadav, SV Dhavale
International Conference on Innovative Computing and Communications …, 2021
72021
Two-stream mid-level fusion network for human activity detection
M Chakraborty, A Pramanick, S Vikrant Dhavale
International Conference on Innovative Computing and Communications …, 2020
72020
Analysis of SIFT and SURF features for copy-move image forgery detection
WCN Kaura, S Dhavale
2017 International Conference on Innovations in Information, Embedded and …, 2017
62017
Advance image based spam detection and filtering techniques, IGI Global
SV Dhavale
6*2017
The system can't perform the operation now. Try again later.
Articles 1–20