Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
In a typical face recognition pipeline, the task ofthe face detector is to localize the face region. However, the facedetector localizes regions that look like a face, irrespective of theliveliness of the face, which makes the entire system susceptible to ...
A method of analyzing human pulmonary X-rays using a few software procedures to process the images will be presented. Photographs of the lungs were investigated and images of the arteries were illustrated, successfully extracting the shadows due to the rib ...
Beta amyloid (A beta) accumulation is the earliest pathological marker of Alzheimer's disease (AD), but early AD pathology also affects white matter (WM) integrity. We performed a cross-sectional study including 44 subjects (23 healthy controls and 21 mild ...
HMMs have been the one of the first models to be applied for sign recognition and have become the baseline models due to their success in modeling sequential and multivariate data. Despite the extensive use of HMMs for sign recognition, determining the HMM ...
Due to its convenience, biometric authentication, especial face authentication, has become increasingly mainstream and thus is now a prime target for attackers. Presentation attacks and face morphing are typical types of attack. Previous research has shown ...
A large body of research has focused on adversarial attacks which require to modify all input features with small l2- or l∞-norms. In this paper we instead focus on query-efficient sparse attacks in the black-box setting. Our versatile framework, Sparse-RS ...
In this chapter we give an overview of spoofing attacks and spoofing counter-measures for face recognition systems, in particular in a verification sce- nario. We focus on 2D and 3D attacks to Visible Spectrum systems (VIS), as well as Near Infrared (NIR) ...
Morphing attacks is a threat to biometric systems where the biometric reference in an identity document can be altered. This form of attack presents an important issue in applications relying on identity documents such as border security or access control. ...
Venise et son architecture appartiennent à une réalité suspendue entre les époques. Si l’on fait abstraction du nombre alarmant de touristes, lorsqu’on explore les ruelles labyrinthiques, lorsqu’on admire d’un vaporetto les palais qui s’affichent sur le Ca ...
Neurofilament light chain (NfL) has been demonstrated to correlate with multiple sclerosis disease severity as well as treatment response. Nevertheless, additional serum biomarkers are still needed to better differentiate disease activity from disease prog ...