Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Beta amyloid (A beta) accumulation is the earliest pathological marker of Alzheimer's disease (AD), but early AD pathology also affects white matter (WM) integrity. We performed a cross-sectional study including 44 subjects (23 healthy controls and 21 mild ...
A large body of research has focused on adversarial attacks which require to modify all input features with small l2- or l∞-norms. In this paper we instead focus on query-efficient sparse attacks in the black-box setting. Our versatile framework, Sparse-RS ...
HMMs have been the one of the first models to be applied for sign recognition and have become the baseline models due to their success in modeling sequential and multivariate data. Despite the extensive use of HMMs for sign recognition, determining the HMM ...
Due to its convenience, biometric authentication, especial face authentication, has become increasingly mainstream and thus is now a prime target for attackers. Presentation attacks and face morphing are typical types of attack. Previous research has shown ...
A method of analyzing human pulmonary X-rays using a few software procedures to process the images will be presented. Photographs of the lungs were investigated and images of the arteries were illustrated, successfully extracting the shadows due to the rib ...
In a typical face recognition pipeline, the task ofthe face detector is to localize the face region. However, the facedetector localizes regions that look like a face, irrespective of theliveliness of the face, which makes the entire system susceptible to ...
In this chapter we give an overview of spoofing attacks and spoofing counter-measures for face recognition systems, in particular in a verification sce- nario. We focus on 2D and 3D attacks to Visible Spectrum systems (VIS), as well as Near Infrared (NIR) ...
Neurofilament light chain (NfL) has been demonstrated to correlate with multiple sclerosis disease severity as well as treatment response. Nevertheless, additional serum biomarkers are still needed to better differentiate disease activity from disease prog ...
Morphing attacks is a threat to biometric systems where the biometric reference in an identity document can be altered. This form of attack presents an important issue in applications relying on identity documents such as border security or access control. ...
Venise et son architecture appartiennent à une réalité suspendue entre les époques. Si l’on fait abstraction du nombre alarmant de touristes, lorsqu’on explore les ruelles labyrinthiques, lorsqu’on admire d’un vaporetto les palais qui s’affichent sur le Ca ...