Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
The vulnerability of face recognition systems to presentation attacks has limited their application in security-critical scenarios. Automatic methods of detecting such malicious attempts are essential for the safe use of facial recognition technology. Alth ...
Morphing attacks is a threat to biometric systems where the biometric reference in an identity document can be altered. This form of attack presents an important issue in applications relying on identity documents such as border security or access control. ...
With face-recognition (FR) increasingly replacing fingerprint sensors for user-authentication on mobile devices, presentation attacks (PA) have emerged as the single most significant hurdle for manufacturers of FR systems. Current machine-learning based pr ...
A growing number of studies have focused on identifying cognitive processes that are modulated by interoceptive signals. Here we investigated whether interoception affects self-processing, by assessing changes in self-voice perception as a function of resp ...
Building occupants are continuously exposed to multiple indoor environmental stimuli, including thermal, visual, acoustic, and air quality related factors. Moreover, personal and contextual aspects can be regarded as additional domains influencing occupant ...
In a typical face recognition pipeline, the task ofthe face detector is to localize the face region. However, the facedetector localizes regions that look like a face, irrespective of theliveliness of the face, which makes the entire system susceptible to ...
We propose a deep neural network based image-to-image translation for domain adaptation, which aims at finding translations between image domains. Despite recent GAN based methods showing promising results in image-to-image translation, they are prone to f ...
While several research studies have focused on analyzing human behavior and, in particular, emotional signals from visual data, the problem of synthesizing face video sequences with specific attributes (e.g. age, facial expressions) received much less atte ...
The extremely high recognition accuracy achieved by modern, convolutional neural network (CNN) based face recognition (FR) systems has contributed significantly to the adoption of such systems in a variety of applications, from mundane activities like unlo ...
Inspired by the prominent theory suggesting that auditory-verbal hallucinations (AVH) - the sensation of hearing voices without present speakers - arise as misattribution of inner speech towards external agents, my thesis revolved around self-voice percept ...