Sunita Dhavale
Sunita Dhavale
Verified email at
Cited by
Cited by
A survey on log anomaly detection using deep learning
RB Yadav, PS Kumar, SV Dhavale
2020 8th International Conference on Reliability, Infocom Technologies and …, 2020
Corona-Nidaan: lightweight deep convolutional neural network for chest X-Ray based COVID-19 infection detection
M Chakraborty, SV Dhavale, J Ingole
Applied Intelligence 51 (5), 3026-3043, 2021
Control Flow Graph Based Multiclass Malware Detection Using Bi-normal Separation.
A Kapoor, S Dhavale
Defence Science Journal 66 (2), 2016
DIAT-RadHARNet: A lightweight DCNN for radar based classification of human suspicious activities
M Chakraborty, HC Kumawat, SV Dhavale
IEEE Transactions on Instrumentation and Measurement 71, 1-10, 2022
DIAT-μSAT: Small aerial targets’ micro-Doppler signatures and their classification using CNN
HC Kumawat, M Chakraborty, AAB Raj, SV Dhavale
IEEE Geoscience and Remote Sensing Letters 19, 1-5, 2021
DIAT-μ RadHAR (micro-Doppler signature dataset) & μ RadNet (a lightweight DCNN)—For human suspicious activity recognition
M Chakraborty, HC Kumawat, SV Dhavale, AAB Raj
IEEE Sensors Journal 22 (7), 6851-6858, 2022
DWT and DCT based robust iris feature extraction and recognition algorithm for biometric personal identification
SV Dhavale
International journal of computer applications 40 (7), 33-37, 2012
Application of DNN for radar micro-doppler signature-based human suspicious activity recognition
M Chakraborty, HC Kumawat, SV Dhavale
Pattern Recognition Letters 162, 1-6, 2022
Two phase static analysis technique for Android malware detection
PM Kate, SV Dhavale
Proceedings of the Third International Symposium on Women in Computing and …, 2015
Overview of information flow tracking techniques based on taint analysis for android
B Lokhande, S Dhavale
2014 International Conference on Computing for Sustainable Global …, 2014
A survey on machine learning-based ransomware detection
N Rani, SV Dhavale, A Singh, A Mehra
Proceedings of the Seventh International Conference on Mathematics and …, 2022
A review of passive forensic techniques for detection of copy-move attacks on digital videos
S Sharma, SV Dhavale
2016 3rd International conference on advanced computing and communication …, 2016
Video forensics in temporal domain using machine learning techniques
S Jaiswal, S Dhavale
International Journal of Computer Network and Information Security 5 (9), 58, 2013
Insider threat detection using deep learning: A review
M Raut, S Dhavale, A Singh, A Mehra
2020 3rd International Conference on Intelligent Sustainable Systems (ICISS …, 2020
Two-stream mid-level fusion network for human activity detection
M Chakraborty, A Pramanick, S Vikrant Dhavale
International Conference on Innovative Computing and Communications …, 2020
Lossless audio watermarking based on the alpha statistic modulation
SV Dhavale, RS Deodhar, LM Patnaik
The International Journal of Multimedia & Its Applications 4 (4), 109, 2012
Robust iris recognition based on statistical properties of Walsh Hadamard transform domain
SV Dhavale
International Journal of Computer Science Issues (IJCSI) 9 (1), 118, 2012
Walsh Hadamard transform based robust blind watermarking for digital audio copyright protection
SV Dhavale, RS Deodhar, LM Patnaik
Computational Intelligence and Information Technology: First International …, 2011
A comparison of pre-trained word embeddings for sentiment analysis using deep learning
P Santosh Kumar, RB Yadav, SV Dhavale
International Conference on Innovative Computing and Communications …, 2021
Advance image based spam detection and filtering techniques, IGI Global
SV Dhavale
The system can't perform the operation now. Try again later.
Articles 1–20