-
Attacking Motion Planners Using Adversarial Perception Errors
Authors:
Jonathan Sadeghi,
Nicholas A. Lord,
John Redford,
Romain Mueller
Abstract:
Autonomous driving (AD) systems are often built and tested in a modular fashion, where the performance of different modules is measured using task-specific metrics. These metrics should be chosen so as to capture the downstream impact of each module and the performance of the system as a whole. For example, high perception quality should enable prediction and planning to be performed safely. Even…
▽ More
Autonomous driving (AD) systems are often built and tested in a modular fashion, where the performance of different modules is measured using task-specific metrics. These metrics should be chosen so as to capture the downstream impact of each module and the performance of the system as a whole. For example, high perception quality should enable prediction and planning to be performed safely. Even though this is true in general, we show here that it is possible to construct planner inputs that score very highly on various perception quality metrics but still lead to planning failures. In an analogy to adversarial attacks on image classifiers, we call such inputs \textbf{adversarial perception errors} and show they can be systematically constructed using a simple boundary-attack algorithm. We demonstrate the effectiveness of this algorithm by finding attacks for two different black-box planners in several urban and highway driving scenarios using the CARLA simulator. Finally, we analyse the properties of these attacks and show that they are isolated in the input space of the planner, and discuss their implications for AD system deployment and testing.
△ Less
Submitted 21 November, 2023;
originally announced November 2023.
-
London quantum-secured metro network
Authors:
Andrew Lord,
Robert Woodward,
Shinya Murai,
Hideaki Sato,
James Dynes,
Paul Wright,
Catherine White,
Russell Davey,
Mark Wilkinson,
Piers Clinton-Tarestad,
Ian Hawkins,
Kristopher Farrington,
Andrew Shields
Abstract:
We describe a London Quantum-Secured Metro Network using Quantum Key Distribution between three London nodes together with customer access tails. The commercially- eady solution is fully integrated into the BT network and on-boarded its first customer.
We describe a London Quantum-Secured Metro Network using Quantum Key Distribution between three London nodes together with customer access tails. The commercially- eady solution is fully integrated into the BT network and on-boarded its first customer.
△ Less
Submitted 22 May, 2023;
originally announced May 2023.
-
AI-enabled exploration of Instagram profiles predicts soft skills and personality traits to empower hiring decisions
Authors:
Mercedeh Harirchian,
Fereshteh Amin,
Saeed Rouhani,
Aref Aligholipour,
Vahid Amiri Lord
Abstract:
It does not matter whether it is a job interview with Tech Giants, Wall Street firms, or a small startup; all candidates want to demonstrate their best selves or even present themselves better than they really are. Meanwhile, recruiters want to know the candidates' authentic selves and detect soft skills that prove an expert candidate would be a great fit in any company. Recruiters worldwide usual…
▽ More
It does not matter whether it is a job interview with Tech Giants, Wall Street firms, or a small startup; all candidates want to demonstrate their best selves or even present themselves better than they really are. Meanwhile, recruiters want to know the candidates' authentic selves and detect soft skills that prove an expert candidate would be a great fit in any company. Recruiters worldwide usually struggle to find employees with the highest level of these skills. Digital footprints can assist recruiters in this process by providing candidates' unique set of online activities, while social media delivers one of the largest digital footprints to track people. In this study, for the first time, we show that a wide range of behavioral competencies consisting of 16 in-demand soft skills can be automatically predicted from Instagram profiles based on the following lists and other quantitative features using machine learning algorithms. We also provide predictions on Big Five personality traits. Models were built based on a sample of 400 Iranian volunteer users who answered an online questionnaire and provided their Instagram usernames which allowed us to crawl the public profiles. We applied several machine learning algorithms to the uniformed data. Deep learning models mostly outperformed by demonstrating 70% and 69% average Accuracy in two-level and three-level classifications respectively. Creating a large pool of people with the highest level of soft skills, and making more accurate evaluations of job candidates is possible with the application of AI on social media user-generated data.
△ Less
Submitted 24 December, 2022; v1 submitted 14 December, 2022;
originally announced December 2022.
-
Attacking deep networks with surrogate-based adversarial black-box methods is easy
Authors:
Nicholas A. Lord,
Romain Mueller,
Luca Bertinetto
Abstract:
A recent line of work on black-box adversarial attacks has revived the use of transfer from surrogate models by integrating it into query-based search. However, we find that existing approaches of this type underperform their potential, and can be overly complicated besides. Here, we provide a short and simple algorithm which achieves state-of-the-art results through a search which uses the surrog…
▽ More
A recent line of work on black-box adversarial attacks has revived the use of transfer from surrogate models by integrating it into query-based search. However, we find that existing approaches of this type underperform their potential, and can be overly complicated besides. Here, we provide a short and simple algorithm which achieves state-of-the-art results through a search which uses the surrogate network's class-score gradients, with no need for other priors or heuristics. The guiding assumption of the algorithm is that the studied networks are in a fundamental sense learning similar functions, and that a transfer attack from one to the other should thus be fairly "easy". This assumption is validated by the extremely low query counts and failure rates achieved: e.g. an untargeted attack on a VGG-16 ImageNet network using a ResNet-152 as the surrogate yields a median query count of 6 at a success rate of 99.9%. Code is available at https://github.com/fiveai/GFCS.
△ Less
Submitted 16 March, 2022;
originally announced March 2022.
-
Influence of Cooling on Quantum Network Deployment
Authors:
Tobias Schaich,
Vasileios Karavias,
Max Sich,
Scott Dufferwiel,
Mike Payne,
Andrew Lord
Abstract:
Superconducting detectors for quantum key distribution require expensive cooling but have advantageous detection properties. A linear programming algorithm and heuristic for network cooling placement are proposed and validated. Co-locating cooled detectors provides cost-effective solutions even when cooling costs exceed the equipment cost of multiple links.
Superconducting detectors for quantum key distribution require expensive cooling but have advantageous detection properties. A linear programming algorithm and heuristic for network cooling placement are proposed and validated. Co-locating cooled detectors provides cost-effective solutions even when cooling costs exceed the equipment cost of multiple links.
△ Less
Submitted 28 October, 2021;
originally announced October 2021.
-
Quantum Technologies in the Telecommunications Industry
Authors:
Vicente Martin,
Juan Pedro Brito,
Carmen Escribano,
Marco Menchetti,
Catherine White,
Andrew Lord,
Felix Wissel,
Matthias Gunkel,
Paulette Gavignet,
Naveena Genay,
Olivier Le Moult,
Carlos Abellán,
Antonio Manzalini,
Antonio Pastor-Perales,
Victor López,
Diego López
Abstract:
Quantum based technologies have been fundamental in our world. After producing the laser and the transistor, the devices that have shaped our modern information society, the possibilities enabled by the ability to create and manipulate individual quantum states opens the door to a second quantum revolution. In this paper we explore the possibilities that these new technologies bring to the Telecom…
▽ More
Quantum based technologies have been fundamental in our world. After producing the laser and the transistor, the devices that have shaped our modern information society, the possibilities enabled by the ability to create and manipulate individual quantum states opens the door to a second quantum revolution. In this paper we explore the possibilities that these new technologies bring to the Telecommu-nications industry
△ Less
Submitted 28 July, 2021;
originally announced July 2021.
-
Reducing Network Cooling Cost Using Twin-Field Quantum Key Distribution
Authors:
Vasileios Karavias,
Andrew Lord,
Mike Payne
Abstract:
Improving the rates and distances over which quantum secure keys are generated is a major challenge. New source and detector hardware can improve key rates significantly, however it can require expensive cooling. We show that Twin Field Quantum Key Distribution (TF QKD) has an advantageous topology allowing the localisation of cooled detectors. This setup for a quantum network allows a fully conne…
▽ More
Improving the rates and distances over which quantum secure keys are generated is a major challenge. New source and detector hardware can improve key rates significantly, however it can require expensive cooling. We show that Twin Field Quantum Key Distribution (TF QKD) has an advantageous topology allowing the localisation of cooled detectors. This setup for a quantum network allows a fully connected network solution, i.e. one where every connection has non zero key rates, in a box with sides of length up to 110km with just 4 cooled nodes, while Decoy state BB84 is only capable of up to 80km with 40 cooled nodes, and 50km if no nodes are cooled. The average key rate in the network of the localised, cooled TF QKD is more than 30 times greater than the uncooled Decoy BB84 solution and 0.9 those of cooled Decoy BB84. To reduce the cost of the network further, switches can be used in the network. These switches have losses ranging between 1 to 2dB. Adding these losses to the model shows further the advantages of TF-QKD in a network. Decoy BB84 is only able to generate fully connected solutions up to 20km if all nodes are cooled for a 40 node network for 1dB losses. In comparison, using TF QKD,70km networks are possible with just 4 cooling locations for the same losses. The simulation shows the significant benefits in using TF QKD in a switched network, and suggests that further work in this direction is necessary.
△ Less
Submitted 14 July, 2021; v1 submitted 6 July, 2021;
originally announced July 2021.
-
5G Network Slicing with QKD and Quantum-Safe Security
Authors:
Paul Wright,
Catherine White,
Ryan C. Parker,
Jean-Sébastien Pegon,
Marco Menchetti,
Joseph Pearse,
Arash Bahrami,
Anastasia Moroz,
Adrian Wonfor,
Richard V. Penty,
Timothy P. Spiller,
Andrew Lord
Abstract:
We demonstrate how the 5G network slicing model can be extended to address data security requirements. In this work we demonstrate two different slice configurations, with different encryption requirements, representing two diverse use-cases for 5G networking: namely, an enterprise application hosted at a metro network site, and a content delivery network. We create a modified software-defined net…
▽ More
We demonstrate how the 5G network slicing model can be extended to address data security requirements. In this work we demonstrate two different slice configurations, with different encryption requirements, representing two diverse use-cases for 5G networking: namely, an enterprise application hosted at a metro network site, and a content delivery network. We create a modified software-defined networking (SDN) orchestrator which calculates and provisions network slices according to the requirements, including encryption backed by quantum key distribution (QKD), or other methods. Slices are automatically provisioned by SDN orchestration of network resources, allowing selection of encrypted links as appropriate, including those which use standard Diffie-Hellman key exchange, QKD and quantum-resistant algorithms (QRAs), as well as no encryption at all. We show that the set-up and tear-down times of the network slices takes of the order of 1-2 minutes, which is an order of magnitude improvement over manually provisioning a link today.
△ Less
Submitted 8 January, 2021; v1 submitted 7 July, 2020;
originally announced July 2020.
-
Making Better Mistakes: Leveraging Class Hierarchies with Deep Networks
Authors:
Luca Bertinetto,
Romain Mueller,
Konstantinos Tertikas,
Sina Samangooei,
Nicholas A. Lord
Abstract:
Deep neural networks have improved image classification dramatically over the past decade, but have done so by focusing on performance measures that treat all classes other than the ground truth as equally wrong. This has led to a situation in which mistakes are less likely to be made than before, but are equally likely to be absurd or catastrophic when they do occur. Past works have recognised an…
▽ More
Deep neural networks have improved image classification dramatically over the past decade, but have done so by focusing on performance measures that treat all classes other than the ground truth as equally wrong. This has led to a situation in which mistakes are less likely to be made than before, but are equally likely to be absurd or catastrophic when they do occur. Past works have recognised and tried to address this issue of mistake severity, often by using graph distances in class hierarchies, but this has largely been neglected since the advent of the current deep learning era in computer vision. In this paper, we aim to renew interest in this problem by reviewing past approaches and proposing two simple modifications of the cross-entropy loss which outperform the prior art under several metrics on two large datasets with complex class hierarchies: tieredImageNet and iNaturalist'19.
△ Less
Submitted 12 June, 2020; v1 submitted 19 December, 2019;
originally announced December 2019.
-
The dichotomy of distributed and centralized control: METRO-HAUL, when control planes collide for 5G networks
Authors:
D. King,
A. Farrel,
Emiko Nishida-King,
R. Casellas,
L. Velasco,
R. Nejabati,
A. Lord
Abstract:
Automating the provisioning of 5G services, deployed over a heterogeneous infrastructure (in terms of domains, technologies, and management platforms), remains a complex task, yet driven by the constant need to provide end-to-end connections at network slices at reducing costs and service deployment time. At the same time, such services are increasingly conceived around interconnected functions an…
▽ More
Automating the provisioning of 5G services, deployed over a heterogeneous infrastructure (in terms of domains, technologies, and management platforms), remains a complex task, yet driven by the constant need to provide end-to-end connections at network slices at reducing costs and service deployment time. At the same time, such services are increasingly conceived around interconnected functions and require allocation of computing, storage, and networking resources.
The METRO-HAUL 5G research initiative acknowledges the need for automation and strives to develop an orchestration platform for services and resources that extends, integrates, and builds on top of existing approaches, macroscopically adopting Transport Software Defined Networking principles, and leveraging the programmability and open control of Transport SDN.
△ Less
Submitted 20 June, 2019;
originally announced June 2019.
-
Real-Time RGB-D Camera Pose Estimation in Novel Scenes using a Relocalisation Cascade
Authors:
Tommaso Cavallari,
Stuart Golodetz,
Nicholas A. Lord,
Julien Valentin,
Victor A. Prisacariu,
Luigi Di Stefano,
Philip H. S. Torr
Abstract:
Camera pose estimation is an important problem in computer vision. Common techniques either match the current image against keyframes with known poses, directly regress the pose, or establish correspondences between keypoints in the image and points in the scene to estimate the pose. In recent years, regression forests have become a popular alternative to establish such correspondences. They achie…
▽ More
Camera pose estimation is an important problem in computer vision. Common techniques either match the current image against keyframes with known poses, directly regress the pose, or establish correspondences between keypoints in the image and points in the scene to estimate the pose. In recent years, regression forests have become a popular alternative to establish such correspondences. They achieve accurate results, but have traditionally needed to be trained offline on the target scene, preventing relocalisation in new environments. Recently, we showed how to circumvent this limitation by adapting a pre-trained forest to a new scene on the fly. The adapted forests achieved relocalisation performance that was on par with that of offline forests, and our approach was able to estimate the camera pose in close to real time. In this paper, we present an extension of this work that achieves significantly better relocalisation performance whilst running fully in real time. To achieve this, we make several changes to the original approach: (i) instead of accepting the camera pose hypothesis without question, we make it possible to score the final few hypotheses using a geometric approach and select the most promising; (ii) we chain several instantiations of our relocaliser together in a cascade, allowing us to try faster but less accurate relocalisation first, only falling back to slower, more accurate relocalisation as necessary; and (iii) we tune the parameters of our cascade to achieve effective overall performance. These changes allow us to significantly improve upon the performance our original state-of-the-art method was able to achieve on the well-known 7-Scenes and Stanford 4 Scenes benchmarks. As additional contributions, we present a way of visualising the internal behaviour of our forests and show how to entirely circumvent the need to pre-train a forest on a generic scene.
△ Less
Submitted 2 July, 2019; v1 submitted 29 October, 2018;
originally announced October 2018.
-
With Friends Like These, Who Needs Adversaries?
Authors:
Saumya Jetley,
Nicholas A. Lord,
Philip H. S. Torr
Abstract:
The vulnerability of deep image classification networks to adversarial attack is now well known, but less well understood. Via a novel experimental analysis, we illustrate some facts about deep convolutional networks for image classification that shed new light on their behaviour and how it connects to the problem of adversaries. In short, the celebrated performance of these networks and their vul…
▽ More
The vulnerability of deep image classification networks to adversarial attack is now well known, but less well understood. Via a novel experimental analysis, we illustrate some facts about deep convolutional networks for image classification that shed new light on their behaviour and how it connects to the problem of adversaries. In short, the celebrated performance of these networks and their vulnerability to adversarial attack are simply two sides of the same coin: the input image-space directions along which the networks are most vulnerable to attack are the same directions which they use to achieve their classification performance in the first place. We develop this result in two main steps. The first uncovers the fact that classes tend to be associated with specific image-space directions. This is shown by an examination of the class-score outputs of nets as functions of 1D movements along these directions. This provides a novel perspective on the existence of universal adversarial perturbations. The second is a clear demonstration of the tight coupling between classification performance and vulnerability to adversarial attack within the spaces spanned by these directions. Thus, our analysis resolves the apparent contradiction between accuracy and vulnerability. It provides a new perspective on much of the prior art and reveals profound implications for efforts to construct neural nets that are both accurate and robust to adversarial attack.
△ Less
Submitted 8 January, 2019; v1 submitted 11 July, 2018;
originally announced July 2018.
-
Learn To Pay Attention
Authors:
Saumya Jetley,
Nicholas A. Lord,
Namhoon Lee,
Philip H. S. Torr
Abstract:
We propose an end-to-end-trainable attention module for convolutional neural network (CNN) architectures built for image classification. The module takes as input the 2D feature vector maps which form the intermediate representations of the input image at different stages in the CNN pipeline, and outputs a 2D matrix of scores for each map. Standard CNN architectures are modified through the incorp…
▽ More
We propose an end-to-end-trainable attention module for convolutional neural network (CNN) architectures built for image classification. The module takes as input the 2D feature vector maps which form the intermediate representations of the input image at different stages in the CNN pipeline, and outputs a 2D matrix of scores for each map. Standard CNN architectures are modified through the incorporation of this module, and trained under the constraint that a convex combination of the intermediate 2D feature vectors, as parameterised by the score matrices, must \textit{alone} be used for classification. Incentivised to amplify the relevant and suppress the irrelevant or misleading, the scores thus assume the role of attention values. Our experimental observations provide clear evidence to this effect: the learned attention maps neatly highlight the regions of interest while suppressing background clutter. Consequently, the proposed function is able to bootstrap standard CNN architectures for the task of image classification, demonstrating superior generalisation over 6 unseen benchmark datasets. When binarised, our attention maps outperform other CNN-based attention maps, traditional saliency maps, and top object proposals for weakly supervised segmentation as demonstrated on the Object Discovery dataset. We also demonstrate improved robustness against the fast gradient sign method of adversarial attack.
△ Less
Submitted 26 April, 2018; v1 submitted 6 April, 2018;
originally announced April 2018.
-
Experimental Demonstration of DDoS Mitigation over a Quantum Key Distribution (QKD) Network Using Software Defined Networking (SDN)
Authors:
Emilio Hugues-Salas,
Foteini Ntavou,
Yanni Ou,
Jake. E. Kennard,
Catherine White,
Dimitrios Gkounis,
Konstantinos Nikolovgenis,
George Kanellos,
Christopher Erven,
Andrew Lord,
Reza Nejabati,
Dimitra Simeonidou
Abstract:
We experimentally demonstrate, for the first time, DDoS mitigation of QKD-based networks utilizing a software defined network application. Successful quantum-secured link allocation is achieved after a DDoS attack based on real-time monitoring of quantum parameters
We experimentally demonstrate, for the first time, DDoS mitigation of QKD-based networks utilizing a software defined network application. Successful quantum-secured link allocation is achieved after a DDoS attack based on real-time monitoring of quantum parameters
△ Less
Submitted 16 February, 2018; v1 submitted 15 February, 2018;
originally announced February 2018.
-
Collaborative Large-Scale Dense 3D Reconstruction with Online Inter-Agent Pose Optimisation
Authors:
Stuart Golodetz,
Tommaso Cavallari,
Nicholas A Lord,
Victor A Prisacariu,
David W Murray,
Philip H S Torr
Abstract:
Reconstructing dense, volumetric models of real-world 3D scenes is important for many tasks, but capturing large scenes can take significant time, and the risk of transient changes to the scene goes up as the capture time increases. These are good reasons to want instead to capture several smaller sub-scenes that can be joined to make the whole scene. Achieving this has traditionally been difficul…
▽ More
Reconstructing dense, volumetric models of real-world 3D scenes is important for many tasks, but capturing large scenes can take significant time, and the risk of transient changes to the scene goes up as the capture time increases. These are good reasons to want instead to capture several smaller sub-scenes that can be joined to make the whole scene. Achieving this has traditionally been difficult: joining sub-scenes that may never have been viewed from the same angle requires a high-quality camera relocaliser that can cope with novel poses, and tracking drift in each sub-scene can prevent them from being joined to make a consistent overall scene. Recent advances, however, have significantly improved our ability to capture medium-sized sub-scenes with little to no tracking drift: real-time globally consistent reconstruction systems can close loops and re-integrate the scene surface on the fly, whilst new visual-inertial odometry approaches can significantly reduce tracking drift during live reconstruction. Moreover, high-quality regression forest-based relocalisers have recently been made more practical by the introduction of a method to allow them to be trained and used online. In this paper, we leverage these advances to present what to our knowledge is the first system to allow multiple users to collaborate interactively to reconstruct dense, voxel-based models of whole buildings using only consumer-grade hardware, a task that has traditionally been both time-consuming and dependent on the availability of specialised hardware. Using our system, an entire house or lab can be reconstructed in under half an hour and at a far lower cost than was previously possible.
△ Less
Submitted 2 July, 2019; v1 submitted 25 January, 2018;
originally announced January 2018.
-
On-the-Fly Adaptation of Regression Forests for Online Camera Relocalisation
Authors:
Tommaso Cavallari,
Stuart Golodetz,
Nicholas A. Lord,
Julien Valentin,
Luigi Di Stefano,
Philip H. S. Torr
Abstract:
Camera relocalisation is an important problem in computer vision, with applications in simultaneous localisation and map**, virtual/augmented reality and navigation. Common techniques either match the current image against keyframes with known poses coming from a tracker, or establish 2D-to-3D correspondences between keypoints in the current image and points in the scene in order to estimate the…
▽ More
Camera relocalisation is an important problem in computer vision, with applications in simultaneous localisation and map**, virtual/augmented reality and navigation. Common techniques either match the current image against keyframes with known poses coming from a tracker, or establish 2D-to-3D correspondences between keypoints in the current image and points in the scene in order to estimate the camera pose. Recently, regression forests have become a popular alternative to establish such correspondences. They achieve accurate results, but must be trained offline on the target scene, preventing relocalisation in new environments. In this paper, we show how to circumvent this limitation by adapting a pre-trained forest to a new scene on the fly. Our adapted forests achieve relocalisation performance that is on par with that of offline forests, and our approach runs in under 150ms, making it desirable for real-time systems that require online relocalisation.
△ Less
Submitted 26 June, 2017; v1 submitted 9 February, 2017;
originally announced February 2017.
-
First Experimental Demonstration of Secure NFV Orchestration over an SDN-Controlled Optical Network with Time-Shared Quantum Key Distribution Resources
Authors:
Alejandro Aguado,
Emilio Hugues-Salas,
Paul Anthony Haigh,
Jaume Marhuenda,
Alasdair B. Price,
Philip Sibson,
Jake E. Kennard,
Christopher Erven,
John G. Rarity,
Mark G. Thompson,
Andrew Lord,
Reza Nejabati,
Dimitra Simeonidou
Abstract:
We demonstrate, for the first time, a secure optical network architecture that combines NFV orchestration and SDN control with quantum key distribution (QKD) technology. A novel time-shared QKD network design is presented as a cost-effective solution for practical networks.
We demonstrate, for the first time, a secure optical network architecture that combines NFV orchestration and SDN control with quantum key distribution (QKD) technology. A novel time-shared QKD network design is presented as a cost-effective solution for practical networks.
△ Less
Submitted 21 April, 2016; v1 submitted 20 April, 2016;
originally announced April 2016.
-
The Organisation of the Elderly Connectome
Authors:
Alistair Perry,
Wei Wen,
Anton Lord,
Anbupalam Thalamuthu,
Perminder Sachdev,
Michael Breakspear
Abstract:
Investigations of the human connectome have elucidated core features of adult structural networks, particularly the crucial role of hub-regions. However, little is known regarding network organisation of the healthy elderly connectome, a crucial prelude to the systematic study of neurodegenerative disorders. Here, whole-brain probabilistic tractography was performed on high-angular diffusion-weigh…
▽ More
Investigations of the human connectome have elucidated core features of adult structural networks, particularly the crucial role of hub-regions. However, little is known regarding network organisation of the healthy elderly connectome, a crucial prelude to the systematic study of neurodegenerative disorders. Here, whole-brain probabilistic tractography was performed on high-angular diffusion-weighted images acquired from 115 healthy elderly subjects, whom were 76 to 94 years old. Structural networks were reconstructed between 512 cortical and subcortical brain regions. We sought to investigate the architectural features of hub-regions, as well as left-right asymmetries, and sexual dimorphisms. We observed that the topology of hub-regions is consistent with adult connectomic data, and more importantly, their architectural features reflect their ongoing vital role in network communication. We also found substantial sexual dimorphisms, with females exhibiting stronger inter-hemispheric connections between cingulate and prefrontal cortices. Lastly, we demonstrate intriguing left-lateralized subnetworks consistent with the neural circuitry specialised for language and executive functions, while rightward subnetworks were dominant in visual and visuospatial streams. These findings provide insights into healthy brain ageing and provide a benchmark for the study of neurodegenerative disorders such as Alzheimers disease and Frontotemporal Dementia.
△ Less
Submitted 13 December, 2015; v1 submitted 19 February, 2015;
originally announced February 2015.