Regularized super-resolution of brain MRI
Avraham Ben-Ezra, Hayit Greenspan, et al.
ISBI 2009
The article introduces a new type of an authentication technique denoted as memory-memory (M2). A core component of M2 is its ability to collect and populate a voice profile database and use it to perform the verification process. The method relies on a database that includes voice profiles in the form of audio recordings of individuals; the profiles are interconnected based on known relationships between people such that relationships can be used to determine which voice profiles to select to test a person’s knowledge of the identity of the people in the recordings (e.g., their names, their relation to each other). Combining widely known concepts (e.g., humans are superior to computers in processing voices and computers are superior to humans in handling data) expects to significantly enhance existing authentication methods (e.g., passwords, biometrics-based).
Avraham Ben-Ezra, Hayit Greenspan, et al.
ISBI 2009
Shreyas Fadnavis, Amit Dhurandhar, et al.
ML4H 2022
Niamh Aspell, Abigail Goldsteen, et al.
Frontiers in Digital Health
Tiziana Mordasini, Alessandro Curioni, et al.
ChemBioChem