
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Palm Print Authentication on a Cloud Platform
Joseph Shelton, Christopher Rice, Jasmeet Singh, et al.
(2018), pp. 1-6
Closed Access | Times Cited: 32
Joseph Shelton, Christopher Rice, Jasmeet Singh, et al.
(2018), pp. 1-6
Closed Access | Times Cited: 32
Showing 1-25 of 32 citing articles:
Applications of Recurrent Neural Network for Biometric Authentication & Anomaly Detection
Joseph Ackerson, Rushit Dave, Naeem Seliya
Information (2021) Vol. 12, Iss. 7, pp. 272-272
Open Access | Times Cited: 62
Joseph Ackerson, Rushit Dave, Naeem Seliya
Information (2021) Vol. 12, Iss. 7, pp. 272-272
Open Access | Times Cited: 62
User Authentication Schemes Using Machine Learning Methods—A Review
Nyle Siddiqui, Laura Pryor, Rushit Dave
Algorithms for intelligent systems (2021), pp. 703-723
Closed Access | Times Cited: 45
Nyle Siddiqui, Laura Pryor, Rushit Dave
Algorithms for intelligent systems (2021), pp. 703-723
Closed Access | Times Cited: 45
An Analysis of IoT Cyber Security Driven by Machine Learning
Sam Strecker, Willem Van Haaften, Rushit Dave
Algorithms for intelligent systems (2021), pp. 725-753
Closed Access | Times Cited: 32
Sam Strecker, Willem Van Haaften, Rushit Dave
Algorithms for intelligent systems (2021), pp. 725-753
Closed Access | Times Cited: 32
Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning
Jacob Mallet, Laura Pryor, Rushit Dave, et al.
2022 Asia Conference on Algorithms, Computing and Machine Learning (CACML) (2022)
Open Access | Times Cited: 26
Jacob Mallet, Laura Pryor, Rushit Dave, et al.
2022 Asia Conference on Algorithms, Computing and Machine Learning (CACML) (2022)
Open Access | Times Cited: 26
Using Machine Learning for Dynamic Authentication in Telehealth: A Tutorial
Seyed Mehdi Hazrati Fard, Fayez Gebali, Mohammad Mamun
Sensors (2022) Vol. 22, Iss. 19, pp. 7655-7655
Open Access | Times Cited: 25
Seyed Mehdi Hazrati Fard, Fayez Gebali, Mohammad Mamun
Sensors (2022) Vol. 22, Iss. 19, pp. 7655-7655
Open Access | Times Cited: 25
A Close Look into Human Activity Recognition Models using Deep Learning
Wei Zhong Tee, Rushit Dave, Jim Seliya, et al.
(2022), pp. 201-206
Open Access | Times Cited: 24
Wei Zhong Tee, Rushit Dave, Jim Seliya, et al.
(2022), pp. 201-206
Open Access | Times Cited: 24
An Examination on Implementation of Deep Fake in Images Through Deep Learning
Abhilash Kumar Saxena, Raja Praveen K N
(2022), pp. 1-7
Closed Access | Times Cited: 18
Abhilash Kumar Saxena, Raja Praveen K N
(2022), pp. 1-7
Closed Access | Times Cited: 18
Deepfake Detection Analyzing Hybrid Dataset Utilizing CNN and SVM
Jacob Mallet, Laura Pryor, Rushit Dave, et al.
(2023), pp. 7-11
Open Access | Times Cited: 10
Jacob Mallet, Laura Pryor, Rushit Dave, et al.
(2023), pp. 7-11
Open Access | Times Cited: 10
Using Deep Learning to Detecting Deepfakes
Jacob Mallet, Rushit Dave, Naeem Seliya, et al.
(2022), pp. 1-5
Open Access | Times Cited: 17
Jacob Mallet, Rushit Dave, Naeem Seliya, et al.
(2022), pp. 1-5
Open Access | Times Cited: 17
Machine Learning Algorithms In User Authentication Schemes
Laura Pryor, Rushit Dave, Jim Seliya, et al.
2021 International Conference on Electrical, Computer and Energy Technologies (ICECET) (2021), pp. 1-6
Open Access | Times Cited: 20
Laura Pryor, Rushit Dave, Jim Seliya, et al.
2021 International Conference on Electrical, Computer and Energy Technologies (ICECET) (2021), pp. 1-6
Open Access | Times Cited: 20
Continuous User Authentication Using Mouse Dynamics, Machine Learning, and Minecraft
Nyle Siddiqui, Rushit Dave, Naeem Seliya
2021 International Conference on Electrical, Computer and Energy Technologies (ICECET) (2021), pp. 1-6
Closed Access | Times Cited: 20
Nyle Siddiqui, Rushit Dave, Naeem Seliya
2021 International Conference on Electrical, Computer and Energy Technologies (ICECET) (2021), pp. 1-6
Closed Access | Times Cited: 20
Human Activity Recognition models using Limited Consumer Device Sensors and Machine Learning
Wei Zhong Tee, Rushit Dave, Naeem Seliya, et al.
2022 Asia Conference on Algorithms, Computing and Machine Learning (CACML) (2022)
Open Access | Times Cited: 15
Wei Zhong Tee, Rushit Dave, Naeem Seliya, et al.
2022 Asia Conference on Algorithms, Computing and Machine Learning (CACML) (2022)
Open Access | Times Cited: 15
A Robust Framework for Deep Learning Approaches to Facial Emotion Recognition and Evaluation
Nyle Siddiqui, Thomas Reither, Rushit Dave, et al.
2022 Asia Conference on Algorithms, Computing and Machine Learning (CACML) (2022), pp. 68-73
Open Access | Times Cited: 14
Nyle Siddiqui, Thomas Reither, Rushit Dave, et al.
2022 Asia Conference on Algorithms, Computing and Machine Learning (CACML) (2022), pp. 68-73
Open Access | Times Cited: 14
Information Security Methods—Modern Research Directions
Alexander Shelupanov, Oleg Evsyutin, Антон Конев, et al.
Symmetry (2019) Vol. 11, Iss. 2, pp. 150-150
Open Access | Times Cited: 24
Alexander Shelupanov, Oleg Evsyutin, Антон Конев, et al.
Symmetry (2019) Vol. 11, Iss. 2, pp. 150-150
Open Access | Times Cited: 24
Hybrid Deepfake Detection Utilizing MLP and LSTM
Jacob Mallet, Natalie Krueger, Rushit Dave, et al.
(2023), pp. 1-5
Open Access | Times Cited: 7
Jacob Mallet, Natalie Krueger, Rushit Dave, et al.
(2023), pp. 1-5
Open Access | Times Cited: 7
Application of Machine Learning-Based Pattern Recognition in IoT Devices: Review
Zachary Menter, Wei Zhong Tee, Rushit Dave
Algorithms for intelligent systems (2021), pp. 669-689
Open Access | Times Cited: 14
Zachary Menter, Wei Zhong Tee, Rushit Dave
Algorithms for intelligent systems (2021), pp. 669-689
Open Access | Times Cited: 14
Your Identity is Your Behavior - Continuous User Authentication based on Machine Learning and Touch Dynamics
Brendan Pelto, Mounika Vanamala, Rushit Dave
(2023), pp. 1-6
Open Access | Times Cited: 5
Brendan Pelto, Mounika Vanamala, Rushit Dave
(2023), pp. 1-6
Open Access | Times Cited: 5
Continuous User Authentication Using Machine Learning and Multi-finger Mobile Touch Dynamics with a Novel Dataset
Zach DeRidder, Nyle Siddiqui, Thomas Reither, et al.
(2022), pp. 42-46
Open Access | Times Cited: 9
Zach DeRidder, Nyle Siddiqui, Thomas Reither, et al.
(2022), pp. 42-46
Open Access | Times Cited: 9
Enhanced Model for Medical Image Data Security Using Machine Learning
S. Karthiyayini, Jeniffer John Simon Christopher, I. Sheik Arafat, et al.
SN Computer Science (2024) Vol. 5, Iss. 8
Closed Access | Times Cited: 1
S. Karthiyayini, Jeniffer John Simon Christopher, I. Sheik Arafat, et al.
SN Computer Science (2024) Vol. 5, Iss. 8
Closed Access | Times Cited: 1
Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning
Laura Pryor, Jacob Mallet, Rushit Dave, et al.
Computer and Information Science (2022) Vol. 15, Iss. 3, pp. 1-1
Open Access | Times Cited: 7
Laura Pryor, Jacob Mallet, Rushit Dave, et al.
Computer and Information Science (2022) Vol. 15, Iss. 3, pp. 1-1
Open Access | Times Cited: 7
Named Entity Recognition in Unstructured Medical Text Documents
Cole Pearson, Naeem Seliya, Rushit Dave
2021 International Conference on Electrical, Computer and Energy Technologies (ICECET) (2021), pp. 1-6
Open Access | Times Cited: 9
Cole Pearson, Naeem Seliya, Rushit Dave
2021 International Conference on Electrical, Computer and Energy Technologies (ICECET) (2021), pp. 1-6
Open Access | Times Cited: 9
Deepfake Detection Analyzing Hybrid Dataset Utilizing CNN and SVM
Rushit Dave, Mounika vanamala
(2023)
Open Access | Times Cited: 2
Rushit Dave, Mounika vanamala
(2023)
Open Access | Times Cited: 2
From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics
Rushit Dave, Marcho Handoko, Rashid Ali, et al.
International Journal of Computer Science and Information Technology (2024) Vol. 16, Iss. 1, pp. 29-44
Open Access
Rushit Dave, Marcho Handoko, Rashid Ali, et al.
International Journal of Computer Science and Information Technology (2024) Vol. 16, Iss. 1, pp. 29-44
Open Access
Applications of Recurrent Neural Network for Biometric Authentication & Anomaly Detection
Joseph M. Ackerson, Rushit Dave, Jim Seliya
arXiv (Cornell University) (2021)
Closed Access | Times Cited: 4
Joseph M. Ackerson, Rushit Dave, Jim Seliya
arXiv (Cornell University) (2021)
Closed Access | Times Cited: 4
Machine Learning: Challenges, Limitations, and Compatibility for Audio Restoration Processes
Owen Casey, Rushit Dave, Naeem Seliya, et al.
(2021) Vol. 3, pp. 27-32
Open Access | Times Cited: 2
Owen Casey, Rushit Dave, Naeem Seliya, et al.
(2021) Vol. 3, pp. 27-32
Open Access | Times Cited: 2