default search action
Ann Dooms
Person information
- affiliation: Vrije Universiteit Brussel, Belgium
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Willy Carlos Tchuitcheu, Tan Lu, Ann Dooms:
Table representation learning using heterogeneous graph embedding. Pattern Recognit. 156: 110734 (2024) - 2021
- [j10]Tan Lu, Ann Dooms:
Probabilistic homogeneity for document image segmentation. Pattern Recognit. 109: 107591 (2021) - [j9]Tan Lu, Ann Dooms:
Bayesian damage recognition in document images based on a joint global and local homogeneity model. Pattern Recognit. 118: 108034 (2021) - [c19]Wouter Castryck, Ann Dooms, Carlo Emerencia, Alexander Lemmens:
A Fusion Algorithm for Solving the Hidden Shift Problem in Finite Abelian Groups. PQCrypto 2021: 133-153 - [i5]Wouter Castryck, Ann Dooms, Carlo Emerencia, Alexander Lemmens:
A fusion algorithm for solving the hidden shift problem in finite abelian groups. IACR Cryptol. ePrint Arch. 2021: 562 (2021) - 2020
- [c18]Tan Lu, Ann Dooms:
A Novel Contractive GAN Model for a Unified Approach Towards Blind Quality Assessment of Images from Heterogeneous Sources. ISVC (1) 2020: 27-38
2010 – 2019
- 2019
- [c17]Regis Loeb, Timothy Verstraeten, Ann Nowé, Ann Dooms:
Privacy Preserving Reinforcement Learning over Distributed Datasets. BNAIC/BENELEARN 2019 - [c16]Tan Lu, Ann Dooms:
A Deep Transfer Learning Approach to Document Image Quality Assessment. ICDAR 2019: 1372-1377 - 2018
- [j8]Gábor Fodor, Peter Schelkens, Ann Dooms:
Fingerprinting Codes Under the Weak Marking Assumption. IEEE Trans. Inf. Forensics Secur. 13(6): 1495-1508 (2018) - [c15]Tan Lu, Ann Dooms:
Towards Physical Distortion Identification and Removal in Document Images. EUVIP 2018: 1-6 - [c14]Ruben de Smet, Ann Dooms, An Braeken, Jo Pierson:
Glycos: The Basis for a Peer-to-Peer, Private Online Social Network. Privacy and Identity Management 2018: 123-136 - [i4]Diego Chialva, Ann Dooms:
Conditionals in Homomorphic Encryption and Machine Learning Applications. CoRR abs/1810.12380 (2018) - [i3]Diego Chialva, Ann Dooms:
Conditionals in Homomorphic Encryption and Machine Learning Applications. IACR Cryptol. ePrint Arch. 2018: 1032 (2018) - 2017
- [j7]Gábor Fodor, Bruno Cornelis, Rujie Yin, Ann Dooms, Ingrid Daubechies:
Cradle Removal in X-Ray Images of Panel Paintings. Image Process. Line 7: 23-42 (2017) - [j6]Adriaan Barri, Ann Dooms:
Data-Driven Modules for Objective Visual Quality Assessment Focusing on Benchmarking and SLAs. IEEE J. Sel. Top. Signal Process. 11(1): 196-205 (2017) - 2015
- [j5]Aleksandra Pizurica, Ljiljana Platisa, Tijana Ruzic, Bruno Cornelis, Ann Dooms, Maximiliaan Martens, Hélène Dubois, Bart Devolder, Marc De Mey, Ingrid Daubechies:
Digital Image Processing of The Ghent Altarpiece: Supporting the painting's study and conservation treatment. IEEE Signal Process. Mag. 32(4): 112-122 (2015) - [c13]Colas Schretter, Jianyong Sun, Shaun Bundervoet, Ann Dooms, Peter Schelkens, Catarina de Brito Carvalho, Pieter Slagmolen, Jan D'hooge:
Continuous ultrasound speckle tracking with Gaussian mixtures. EMBC 2015: 129-132 - 2014
- [j4]Adriaan Barri, Ann Dooms, Bart Jansen, Peter Schelkens:
A Locally Adaptive System for the Fusion of Objective Quality Measures. IEEE Trans. Image Process. 23(6): 2446-2458 (2014) - [c12]Adriaan Barri, Ann Dooms, Peter Schelkens:
Interactive demonstrations of the locally adaptive fusion for combining objective quality measures. ICIP 2014: 2180-2182 - [i2]Laurent Jacques, Christophe De Vleeschouwer, Yannick Boursier, Prasad Sudhakar, C. De Mol, Aleksandra Pizurica, Sandrine Anthoine, Pierre Vandergheynst, Pascal Frossard, Cagdas Bilen, Srdan Kitic, Nancy Bertin, Rémi Gribonval, Nicolas Boumal, Bamdev Mishra, Pierre-Antoine Absil, Rodolphe Sepulchre, Shaun Bundervoet, Colas Schretter, Ann Dooms, Peter Schelkens, Olivier Chabiron, François Malgouyres, Jean-Yves Tourneret, Nicolas Dobigeon, Pierre Chainais, Cédric Richard, Bruno Cornelis, Ingrid Daubechies, David B. Dunson, Marie Danková, Pavel Rajmic, Kévin Degraux, Valerio Cambareri, Bert Geelen, Gauthier Lafruit, Gianluca Setti, Jean-François Determe, Jérôme Louveaux, François Horlin, Angélique Drémeau, Patrick Héas, Cédric Herzet, Vincent Duval, Gabriel Peyré, Alhussein Fawzi, Mike E. Davies, Nicolas Gillis, Stephen A. Vavasis, Charles Soussen, Luc Le Magoarou, Jingwei Liang, Jalal Fadili, Antoine Liutkus, David Martina, Sylvain Gigan, Laurent Daudet, Mauro Maggioni, Stanislav Minsker, Nate Strawn, C. Mory, Fred Maurice Ngolè Mboula, Jean-Luc Starck, Ignace Loris, Samuel Vaiter, Mohammad Golbabaee, Dejan Vukobratovic:
Proceedings of the second "international Traveling Workshop on Interactions between Sparse models and Technology" (iTWIST'14). CoRR abs/1410.0719 (2014) - 2013
- [j3]Bruno Cornelis, Tijana Ruzic, E. Gezels, Ann Dooms, Aleksandra Pizurica, Ljiljana Platisa, Jan Cornelis, Maximiliaan Martens, Marc De Mey, Ingrid Daubechies:
Crack detection and inpainting for virtual restoration of paintings: The case of the Ghent Altarpiece. Signal Process. 93(3): 605-619 (2013) - [j2]Andras Boho, Glenn Van Wallendael, Ann Dooms, Jan De Cock, Geert Braeckman, Peter Schelkens, Bart Preneel, Rik Van de Walle:
End-To-End Security for Video Distribution: The Combination of Encryption, Watermarking, and Video Adaptation. IEEE Signal Process. Mag. 30(2): 97-107 (2013) - [c11]Bruno Cornelis, Yun Yang, Joshua T. Vogelstein, Ann Dooms, Ingrid Daubechies, David B. Dunson:
Bayesian crack detection in ultra high resolution multimodal images of paintings. DSP 2013: 1-8 - [i1]Bruno Cornelis, Yun Yang, Joshua T. Vogelstein, Ann Dooms, Ingrid Daubechies, David B. Dunson:
Bayesian crack detection in ultra high resolution multimodal images of paintings. CoRR abs/1304.5894 (2013) - 2012
- [j1]Bruno Cornelis, Ann Dooms, Jan Cornelis, Peter Schelkens:
Digital canvas removal in paintings. Signal Process. 92(4): 1166-1171 (2012) - [c10]Li Weng, Geert Braeckman, Ann Dooms, Bart Preneel, Peter Schelkens:
Robust Image Content Authentication with Tamper Location. ICME 2012: 380-385 - [c9]Li Weng, Rony Darazi, Bart Preneel, Benoît Macq, Ann Dooms:
Robust Image Content Authentication Using Perceptual Hashing and Watermarking. PCM 2012: 315-326 - 2011
- [c8]Tijana Ruzic, Bruno Cornelis, Ljiljana Platisa, Aleksandra Pizurica, Ann Dooms, Wilfried Philips, Maximiliaan Martens, Marc De Mey, Ingrid Daubechies:
Virtual Restoration of the Ghent Altarpiece Using Crack Detection and Inpainting. ACIVS 2011: 417-428 - [c7]Bruno Cornelis, Ann Dooms, Jan Cornelis, Frederik Leen, Peter Schelkens:
Digital painting analysis, at the cross section of engineering, mathematics and culture. EUSIPCO 2011: 1254-1258 - [c6]Ljiljana Platisa, Bruno Cornelis, Tijana Ruzic, Aleksandra Pizurica, Ann Dooms, Maximiliaan Martens, Marc De Mey, Ingrid Daubechies:
Spatiogram features to characterize pearls in paintings. ICIP 2011: 801-804 - [c5]Dieter Bardyn, Johann A. Briffa, Ann Dooms, Peter Schelkens:
Forensic data hiding optimized for JPEG 2000. ISCAS 2011: 2657-2660 - 2010
- [c4]Dieter Bardyn, Philippe Belet, Tim Dams, Ann Dooms, Peter Schelkens:
Feature point based image watermarking with insertions, deletions, and substitution codes. Media Forensics and Security 2010: 75410A
2000 – 2009
- 2009
- [c3]Philippe Belet, Tim Dams, Dieter Bardyn, Ann Dooms:
Comparison of perceptual shaping techniques for digital image watermarking. DPS 2009: 1-6 - [c2]L. Verstrepen, T. Meesters, Tim Dams, Ann Dooms, Dieter Bardyn:
Circular Spatial improved watermark embedding using a new Global SIFT synchronization scheme. DPS 2009: 1-8 - [c1]Dieter Bardyn, Ann Dooms, Tim Dams, Peter Schelkens:
Comparative Study of Wavelet Based Lattice QIM Techniques and Robustness against AWGN and JPEG Attacks. IWDW 2009: 39-53
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint