| A survey on log anomaly detection using deep learning RB Yadav, PS Kumar, SV Dhavale 2020 8th international conference on reliability, infocom technologies and …, 2020 | 88 | 2020 |
| DIAT-μSAT: Small aerial targets’ micro-Doppler signatures and their classification using CNN HC Kumawat, M Chakraborty, AAB Raj, SV Dhavale IEEE Geoscience and Remote Sensing Letters 19, 1-5, 2021 | 79 | 2021 |
| DIAT-RadHARNet: A lightweight DCNN for radar based classification of human suspicious activities M Chakraborty, HC Kumawat, SV Dhavale IEEE Transactions on Instrumentation and Measurement 71, 1-10, 2022 | 72 | 2022 |
| Corona-Nidaan: lightweight deep convolutional neural network for chest X-Ray based COVID-19 infection detection M Chakraborty, SV Dhavale, J Ingole Applied Intelligence 51 (5), 3026-3043, 2021 | 67 | 2021 |
| DIAT-μ RadHAR (micro-Doppler signature dataset) & μ RadNet (a lightweight DCNN)—For human suspicious activity recognition M Chakraborty, HC Kumawat, SV Dhavale, AAB Raj IEEE Sensors Journal 22 (7), 6851-6858, 2022 | 56 | 2022 |
| Application of DNN for radar micro-doppler signature-based human suspicious activity recognition M Chakraborty, HC Kumawat, SV Dhavale Pattern Recognition Letters 162, 1-6, 2022 | 53 | 2022 |
| Control Flow Graph Based Multiclass Malware Detection Using Bi-normal Separation. A Kapoor, S Dhavale Defence Science Journal 66 (2), 2016 | 46 | 2016 |
| Insider threat detection using deep learning: A review M Raut, S Dhavale, A Singh, A Mehra 2020 3rd international conference on intelligent sustainable systems (ICISS …, 2020 | 38 | 2020 |
| A survey on machine learning-based ransomware detection N Rani, SV Dhavale, A Singh, A Mehra Proceedings of the Seventh International Conference on Mathematics and …, 2022 | 35 | 2022 |
| A review of passive forensic techniques for detection of copy-move attacks on digital videos S Sharma, SV Dhavale 2016 3rd International conference on advanced computing and communication …, 2016 | 23 | 2016 |
| Two phase static analysis technique for Android malware detection PM Kate, SV Dhavale Proceedings of the Third International Symposium on Women in Computing and …, 2015 | 22 | 2015 |
| Overview of information flow tracking techniques based on taint analysis for android B Lokhande, S Dhavale 2014 International Conference on Computing for Sustainable Global …, 2014 | 22 | 2014 |
| DWT and DCT based robust iris feature extraction and recognition algorithm for biometric personal identification SV Dhavale International journal of computer applications 40 (7), 33-37, 2012 | 22 | 2012 |
| Leveraging machine learning for ransomware detection N Rani, SV Dhavale arXiv preprint arXiv:2206.01919, 2022 | 17 | 2022 |
| A comparison of pre-trained word embeddings for sentiment analysis using deep learning P Santosh Kumar, RB Yadav, SV Dhavale International Conference on Innovative Computing and Communications …, 2020 | 16 | 2020 |
| Video forensics in temporal domain using machine learning techniques S Jaiswal, S Dhavale International Journal of Computer Network and Information Security 5 (9), 58, 2013 | 16 | 2013 |
| Real-time image based weapon detection using YOLO algorithms M Gali, S Dhavale, S Kumar International Conference on Advances in Computing and Data Sciences, 173-185, 2022 | 15 | 2022 |
| Performance analysis of YOLO algorithms for real-time crowd counting A Ranjan, N Pathare, S Dhavale, S Kumar 2022 2nd Asian conference on innovation in technology (ASIANCON), 1-8, 2022 | 12 | 2022 |
| Advance image based spam detection and filtering techniques, IGI Global SV Dhavale | 12* | 2017 |
| Two-stream mid-level fusion network for human activity detection M Chakraborty, A Pramanick, S Vikrant Dhavale International Conference on Innovative Computing and Communications …, 2020 | 11 | 2020 |