Sevinc Bayram

Sevinc Bayram
  • PhD
  • Researcher at Hitachi Europe Ltd

About

33
Publications
21,102
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,417
Citations
Current institution
Hitachi Europe Ltd
Current position
  • Researcher

Publications

Publications (33)
Article
Full-text available
Recently, we reported oligoadenylate synthetase 1 (OAS1) contributed to the risk of Alzheimer’s disease, by its enrichment in transcriptional networks expressed by microglia. However, the function of OAS1 within microglia was not known. Using genotyping from 1313 individuals with sporadic Alzheimer’s disease and 1234 control individuals, we confirm...
Preprint
Full-text available
Genome-wide association studies of late-onset Alzheimer's disease (AD) have highlighted the importance of variants associated with genes expressed by the innate immune system in determining risk for AD. Recently, we and others have shown that genes associated with variants that confer risk for AD are significantly enriched in transcriptional networ...
Article
Full-text available
Genome-wide association studies have reported that, amongst other microglial genes, variants in TREM2 can profoundly increase the incidence of developing Alzheimer's disease (ad). We have investigated the role of TREM2 in primary microglial cultures from wild type mice by using siRNA to decrease Trem2 expression, and in parallel from knock-in mice...
Article
Full-text available
Genome-wide association studies of late-onset Alzheimer’s disease risk have previously identified genes primarily expressed in microglia that form a transcriptional network. Using transgenic mouse models of amyloid deposition we previously showed that many of the mouse orthologues of these risk genes are co-expressed and associated with amyloid pat...
Preprint
Full-text available
Genetic analysis of late-onset Alzheimer’s disease risk has previously identified a network of largely microglial genes that form a transcriptional network. In transgenic mouse models of amyloid deposition we have previously shown that the expression of many of the mouse orthologs of these genes are co-ordinately up-regulated by amyloid deposition....
Article
Full-text available
Genetic analysis of late-onset Alzheimer's disease risk has previously identified a network of largely microglial genes that form a transcriptional network. In transgenic mouse models of amyloid deposition we have previously shown that the expression of many of the mouse orthologs of these genes are co-ordinately up-regulated by amyloid deposition....
Article
Full-text available
Detecting and treating Alzheimer’s disease, before cognitive deficits occur, has become the health challenge of our time. The earliest known event in Alzheimer’s disease is rising Aβ. Previous studies have suggested that effects on synaptic transmission may precede plaque deposition. Here we report how relative levels of different soluble Aβ peptid...
Article
Full-text available
Detecting and treating Alzheimer's disease, before cognitive deficits occur, has become the health challenge of our time. The earliest known event in Alzheimer's disease is rising amyloid-β. Previous studies have suggested that effects on synaptic transmission may precede plaque deposition. Here we report how relative levels of different soluble am...
Article
Full-text available
View largeDownload slide Understanding the earliest changes in Alzheimer’s disease may help in the prevention of cognitive impairment. In a transgenic mouse model, Cummings et al. show that synaptic changes occur shortly after soluble amyloid-β levels become measurable, and before the rapid increases in total Aβ and Aβ42:Aβ40 that lead to detectab...
Article
Full-text available
The photo response non-uniformity noise associated with an imaging sensor has been shown to be a unique and persistent identifier that can be treated as the sensor's digital fingerprint. The method for attributing an image to a particular camera, however, is not suitable for source identification due to efficiency considerations, which is a one-to-...
Conference Paper
Full-text available
As image source attribution techniques have become significantly sophisticated and are now becoming commonplace, there is a growing need for capabilities to anonymize images and videos. Focusing on the photo response non-uniformity noise pattern based sensor fingerprinting technique, this work evaluates the effectiveness of well-established seam ca...
Patent
Several promising techniques have been recently proposed to bind an image or video to its source acquisition device. These techniques have been intensively studied to address performance issues, but the computational efficiency aspect has not been given due consideration. Considering very large databases, the efficiency of the sensor fingerprint ba...
Article
Full-text available
It is now established that photo-response nonuniformity noise pattern can be reliably used as a fingerprint to identify an image sensor. The large size and random nature of sensor fingerprints, however, make them inconvenient to store. Further, associated fingerprint matching method can be computationally expensive, especially for applications that...
Article
To study the characteristics of unintentional muscle activities in clinical EEG, and to develop a high-throughput method to reduce them for better revealing drug or biological effects on EEG. Two clinical EEG datasets are involved. Pure muscle signals are extracted from EEG using Independent Component Analysis (ICA) for studying their characteristi...
Article
After a review of the ocular artifact reduction literature, a high-throughput method designed to reduce the ocular artifacts in multichannel continuous EEG recordings acquired at clinical EEG laboratories worldwide is proposed. The proposed method belongs to the category of component-based methods, and does not rely on any electrooculography (EOG)...
Conference Paper
Full-text available
Several promising techniques have been recently proposed to bind an image or video to its source acquisition device. These techniques have been intensively studied to address performance issues, but the computational efficiency aspect has not been given due consideration. Considering very large databases, in this paper, we focus on the efficiency o...
Conference Paper
Full-text available
Copy-move forgery is a specific type of image tampering, where a part of the image is copied and pasted on another part of the same image. In this paper, we propose a new approach for detecting copy-move forgery in digital images, which is considerably more robust to lossy compression, scaling and rotation type of manipulations. Also, to improve th...
Article
We utilize traces of demosaicing operation in digital cameras to identify the source camera-model of a digital image. To identify demosaicing artifacts associated with different camera-models, we employ two methods and define a set of image characteristics which are used as features in designing classifiers that distinguish between digital camera-m...
Conference Paper
Full-text available
We introduce a new video copy detection scheme to complement existing content-based techniques. The idea of our scheme is based on the fact that visual media possess unique characteristics that can be used to link a media to its source. Proposed scheme attempts to detect duplicate and modified copies of a video primarily based on peculiarities of i...
Conference Paper
Full-text available
In a novel method for identifying the source camera of a digital image is proposed. The method is based on first extracting imaging sensor's pattern noise from many images and later verifying its presence in a given image through a correlative procedure. In this paper, we investigate the performance of this method in a more realistic setting and pr...
Conference Paper
Discrimination of computer generated images from real images is becoming more and more important. In this paper, we propose the use of new features to distinguish computer generated images from real images. The proposed features are based on the differences in the acquisition process of images. More specifically, traces of demosaicking and chromati...
Article
Full-text available
Techniques and methodologies for validating the authenticity of digital images and testing for the presence of doctoring and manipulation operations on them has recently attracted attention. We review three categories of forensic features and discuss the design of classifiers between doctored and original images. The performance of classifiers with...
Conference Paper
Full-text available
In an earlier work [4], we proposed a technique for identifying digital camera models based on trace evidence left by their proprietary interpolation algorithms. This work improves on our previous approach by incorporating methods to better detect interpolation artifacts in smooth image parts. To identify the source camera model of a digital image,...
Conference Paper
Full-text available
In this work, we focus our interest on blind source camera identification problem by extending our results in the direction of M. Kharrazi et al. (2004). The interpolation in the color surface of an image due to the use of a color filter array (CFA) forms the basis of the paper. We propose to identify the source camera of an image based on traces o...
Article
Full-text available
Since extremely powerful technologies are now available to generate and process digital images, there is a concomitant need for developing techniques to distinguish the original images from the altered ones, the genuine ones from the doctored ones. In this paper we focus on this problem and propose a method based on the neighbor bit planes of the i...
Conference Paper
Full-text available
In this paper we present a framework for digital image forensics. Based on the assumptions that some processing operations must be done on the image before it is doctored and an expected measurable distortion after processing an image, we design classifiers that discriminates between original and processed images. We propose a novel way of measurin...
Article
Full-text available
The idea of using traces of interpolation algorithms, deployed by a digital camera, as an identifier in the source camera-model identification problem has been initially studied in [2]. In this work, we improve our previous approach by incorporating methods to better detect the interpolation artifacts in smooth image parts. To identify the source c...
Article
Full-text available
Copy-move forgery is a specific type of image tampering where a part of the image is copied and pasted on another part gen- erally to conceal unwanted portions of the image. Hence, the goal in detection of copy-move forgeries is to detect image areas that are same or extremely similar. In this paper, we re- view several methods proposed to achieve...

Network

Cited By