About
33
Publications
21,102
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,417
Citations
Introduction
Skills and Expertise
Current institution
Hitachi Europe Ltd
Current position
- Researcher
Publications
Publications (33)
Recently, we reported oligoadenylate synthetase 1 (OAS1) contributed to the risk of Alzheimer’s disease, by its enrichment in transcriptional networks expressed by microglia. However, the function of OAS1 within microglia was not known.
Using genotyping from 1313 individuals with sporadic Alzheimer’s disease and 1234 control individuals, we confirm...
Genome-wide association studies of late-onset Alzheimer's disease (AD) have highlighted the importance of variants associated with genes expressed by the innate immune system in determining risk for AD. Recently, we and others have shown that genes associated with variants that confer risk for AD are significantly enriched in transcriptional networ...
Genome-wide association studies have reported that, amongst other microglial genes, variants in TREM2 can profoundly increase the incidence of developing Alzheimer's disease (ad). We have investigated the role of TREM2 in primary microglial cultures from wild type mice by using siRNA to decrease Trem2 expression, and in parallel from knock-in mice...
Genome-wide association studies of late-onset Alzheimer’s disease risk have previously identified genes primarily expressed in microglia that form a transcriptional network. Using transgenic mouse models of amyloid deposition we previously showed that many of the mouse orthologues of these risk genes are co-expressed and associated with amyloid pat...
Genetic analysis of late-onset Alzheimer’s disease risk has previously identified a network of largely microglial genes that form a transcriptional network. In transgenic mouse models of amyloid deposition we have previously shown that the expression of many of the mouse orthologs of these genes are co-ordinately up-regulated by amyloid deposition....
Genetic analysis of late-onset Alzheimer's disease risk has previously identified a network of largely microglial genes that form a transcriptional network. In transgenic mouse models of amyloid deposition we have previously shown that the expression of many of the mouse orthologs of these genes are co-ordinately up-regulated by amyloid deposition....
Detecting and treating Alzheimer’s disease, before cognitive deficits occur, has become the health challenge of our time. The earliest known event in Alzheimer’s disease is rising Aβ. Previous studies have suggested that effects on synaptic transmission may precede plaque deposition. Here we report how relative levels of different soluble Aβ peptid...
Detecting and treating Alzheimer's disease, before cognitive deficits occur, has become the health challenge of our time. The earliest known event in Alzheimer's disease is rising amyloid-β. Previous studies have suggested that effects on synaptic transmission may precede plaque deposition. Here we report how relative levels of different soluble am...
View largeDownload slide
Understanding the earliest changes in Alzheimer’s disease may help in the prevention of cognitive impairment. In a transgenic mouse model, Cummings et al. show that synaptic changes occur shortly after soluble amyloid-β levels become measurable, and before the rapid increases in total Aβ and Aβ42:Aβ40 that lead to detectab...
The photo response non-uniformity noise associated with an imaging sensor has been shown to be a unique and persistent identifier that can be treated as the sensor's digital fingerprint. The method for attributing an image to a particular camera, however, is not suitable for source identification due to efficiency considerations, which is a one-to-...
As image source attribution techniques have become significantly sophisticated and are now becoming commonplace, there is a growing need for capabilities to anonymize images and videos. Focusing on the photo response non-uniformity noise pattern based sensor fingerprinting technique, this work evaluates the effectiveness of well-established seam ca...
Several promising techniques have been recently proposed to bind an image or video to its source acquisition device. These techniques have been intensively studied to address performance issues, but the computational efficiency aspect has not been given due consideration. Considering very large databases, the efficiency of the sensor fingerprint ba...
It is now established that photo-response nonuniformity noise pattern can be reliably used as a fingerprint to identify an image sensor. The large size and random nature of sensor fingerprints, however, make them inconvenient to store. Further, associated fingerprint matching method can be computationally expensive, especially for applications that...
To study the characteristics of unintentional muscle activities in clinical EEG, and to develop a high-throughput method to reduce them for better revealing drug or biological effects on EEG.
Two clinical EEG datasets are involved. Pure muscle signals are extracted from EEG using Independent Component Analysis (ICA) for studying their characteristi...
After a review of the ocular artifact reduction literature, a high-throughput method designed to reduce the ocular artifacts in multichannel continuous EEG recordings acquired at clinical EEG laboratories worldwide is proposed. The proposed method belongs to the category of component-based methods, and does not rely on any electrooculography (EOG)...
Several promising techniques have been recently proposed to bind an image or video to its source acquisition device. These techniques have been intensively studied to address performance issues, but the computational efficiency aspect has not been given due consideration. Considering very large databases, in this paper, we focus on the efficiency o...
Copy-move forgery is a specific type of image tampering, where a part of the image is copied and pasted on another part of the same image. In this paper, we propose a new approach for detecting copy-move forgery in digital images, which is considerably more robust to lossy compression, scaling and rotation type of manipulations. Also, to improve th...
We utilize traces of demosaicing operation in digital cameras to identify the source camera-model of a digital image. To identify demosaicing artifacts associated with different camera-models, we employ two methods and define a set of image characteristics which are used as features in designing classifiers that distinguish between digital camera-m...
We introduce a new video copy detection scheme to complement existing content-based techniques. The idea of our scheme is based on the fact that visual media possess unique characteristics that can be used to link a media to its source. Proposed scheme attempts to detect duplicate and modified copies of a video primarily based on peculiarities of i...
In a novel method for identifying the source camera of a digital image is proposed. The method is based on first extracting imaging sensor's pattern noise from many images and later verifying its presence in a given image through a correlative procedure. In this paper, we investigate the performance of this method in a more realistic setting and pr...
Discrimination of computer generated images from real images is becoming more and more important. In this paper, we propose the use of new features to distinguish computer generated images from real images. The proposed features are based on the differences in the acquisition process of images. More specifically, traces of demosaicking and chromati...
Techniques and methodologies for validating the authenticity of digital images and testing for the presence of doctoring and manipulation operations on them has recently attracted attention. We review three categories of forensic features and discuss the design of classifiers between doctored and original images. The performance of classifiers with...
In an earlier work [4], we proposed a technique for identifying digital camera models based on trace evidence left by their proprietary interpolation
algorithms. This work improves on our previous approach by incorporating methods to better detect interpolation artifacts
in smooth image parts. To identify the source camera model of a digital image,...
In this work, we focus our interest on blind source camera identification problem by extending our results in the direction of M. Kharrazi et al. (2004). The interpolation in the color surface of an image due to the use of a color filter array (CFA) forms the basis of the paper. We propose to identify the source camera of an image based on traces o...
Since extremely powerful technologies are now available to generate and process digital images, there is a concomitant need for developing techniques to distinguish the original images from the altered ones, the genuine ones from the doctored ones. In this paper we focus on this problem and propose a method based on the neighbor bit planes of the i...
In this paper we present a framework for digital image forensics. Based on the assumptions that some processing operations must be done on the image before it is doctored and an expected measurable distortion after processing an image, we design classifiers that discriminates between original and processed images. We propose a novel way of measurin...
The idea of using traces of interpolation algorithms, deployed by a digital camera, as an identifier in the source camera-model identification problem has been initially studied in [2]. In this work, we improve our previous approach by incorporating methods to better detect the interpolation artifacts in smooth image parts. To identify the source c...
Copy-move forgery is a specific type of image tampering where a part of the image is copied and pasted on another part gen- erally to conceal unwanted portions of the image. Hence, the goal in detection of copy-move forgeries is to detect image areas that are same or extremely similar. In this paper, we re- view several methods proposed to achieve...