Ru Zhang

Orcid: 0000-0001-6641-3236

According to our database1, Ru Zhang authored at least 129 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Federated Learning Powered Semantic Communication for UAV Swarm Cooperation.
IEEE Wirel. Commun., August, 2024

A Semantic Controllable Long Text Steganography Framework Based on LLM Prompt Engineering and Knowledge Graph.
IEEE Signal Process. Lett., 2024

Spatio-temporal coherent snapshot compressed imaging with time-varying composite phase masks.
Signal Process., 2024

An exact solution method for <i>seru</i> scheduling problems considering past-sequence-dependent setup time and adjustment activities.
Int. J. Appl. Decis. Sci., 2024

HybridFlow: A Flexible and Efficient RLHF Framework.
CoRR, 2024

State-of-the-art Advances of Deep-learning Linguistic Steganalysis Research.
CoRR, 2024

Current Status and Trends in Image Anti-Forensics Research: A Bibliometric Analysis.
CoRR, 2024

LICM: Effective and Efficient Long Interest Chain Modeling for News Recommendation.
CoRR, 2024

Pseudo-label Based Domain Adaptation for Zero-Shot Text Steganalysis.
CoRR, 2024

Linguistic Steganalysis via LLMs: Two Modes for Efficient Detection of Strongly Concealed Stego.
CoRR, 2024

An Enhanced Prompt-Based LLM Reasoning Scheme via Knowledge Graph-Integrated Collaboration.
CoRR, 2024

LLsM: Generative Linguistic Steganography with Large Language Model.
CoRR, 2024

Robust 3D phase retrieval via compressed support detection from snapshot diffraction pattern.
Comput. Biol. Medicine, 2024

MvMRL: a multi-view molecular representation learning method for molecular property prediction.
Briefings Bioinform., 2024

Hyperscale data analysis oriented optimization mechanisms for higher education management systems platforms with evolutionary intelligence.
Appl. Soft Comput., 2024

Attack Behavior Extraction Based on Heterogeneous Threat Intelligence Graphs and Data Augmentation.
Proceedings of the International Joint Conference on Neural Networks, 2024

An Images Regeneration Method for CG Anti-Forensics Based on Sensor Device Trace.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024

Controllable Semantic Linguistic Steganography via Summarization Generation.
Proceedings of the IEEE International Conference on Acoustics, 2024

Multi-Grained Multimodal Interaction Network for Sentiment Analysis.
Proceedings of the IEEE International Conference on Acoustics, 2024

An Enhanced Prompt-Based LLM Reasoning Scheme via Knowledge Graph-Integrated Collaboration.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2024, 2024

Research on Personalized Hybrid Recommendation System for English Word Learning.
Proceedings of the Artificial Intelligence in Education. Posters and Late Breaking Results, Workshops and Tutorials, Industry and Innovation Tracks, Practitioners, Doctoral Consortium and Blue Sky, 2024

2023
ConLBS: An Attack Investigation Approach Using Contrastive Learning with Behavior Sequence.
Sensors, December, 2023

Large capacity generative image steganography via image style transfer and feature-wise deep fusion.
Appl. Intell., December, 2023

MCW: A Generalizable Deepfake Detection Method for Few-Shot Learning.
Sensors, October, 2023

Intelligent analysis system of college students' employment and entrepreneurship situation: Big data and artificial intelligence-driven approach.
Comput. Electr. Eng., September, 2023

V-A3tS: A rapid text steganalysis method based on position information and variable parameter multi-head self-attention controlled by length.
J. Inf. Secur. Appl., June, 2023

Evolutionary machine learning builds smart education big data platform: Data-driven higher education.
Appl. Soft Comput., March, 2023

Linguistic Steganalysis by Enhancing and Integrating Local and Global Features.
IEEE Signal Process. Lett., 2023

RLS-DTS: Reinforcement-Learning Linguistic Steganalysis in Distribution-Transformed Scenario.
IEEE Signal Process. Lett., 2023

Web of science-based virtual brand communities: a bibliometric review between 2000 and 2020.
Internet Res., 2023

Consumer behaviour data mining of social e-commerce platform based on improved spectral clustering algorithm.
Int. J. Web Based Communities, 2023

Reformulation and exact solution method for <i>seru</i> scheduling problem with learning effect and job deterioration.
Int. J. Appl. Decis. Sci., 2023

UP4LS: User Profile Constructed by Multiple Attributes for Enhancing Linguistic Steganalysis.
CoRR, 2023

How Older Adults' Moments Sharing in SNS Contributes to Their Subjective Well-Being?
Proceedings of the E-Business. Digital Empowerment for an Intelligent Future, 2023

Robust Secret Data Hiding for Transformer-based Neural Machine Translation.
Proceedings of the International Joint Conference on Neural Networks, 2023

Neural Linguistic Steganography with Controllable Security.
Proceedings of the International Joint Conference on Neural Networks, 2023

A Robust Generative Image Steganography Method based on Guidance Features in Image Synthesis.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

T-GraphDTA: A Drug-Target Binding Affinity Prediction Framework Based on Protein Pre-training Model and Hybrid Graph Neural Network.
Proceedings of the Applied Intelligence - First International Conference, 2023

2022
Linguistic Steganalysis Merging Semantic and Statistical Features.
IEEE Signal Process. Lett., 2022

Faithful quantum entanglement purification and concentration using heralded high-fidelity parity-check detectors based on quantum-dot-microcavity systems.
Quantum Inf. Process., 2022

A social commerce purchasing decision model with trust network and item review information.
Knowl. Based Syst., 2022

Two statistical traffic features for certain APT group identification.
J. Inf. Secur. Appl., 2022

Degree Conditions for Completely Independent Spanning Trees of Bipartite Graphs.
Graphs Comb., 2022

Integration of multi-omics technologies for crop improvement: Status and prospects.
Frontiers Bioinform., 2022

LogKernel A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering.
CoRR, 2022

Chinese Short Text Entity Linking Model Based on PET.
Proceedings of the 4th World Symposium on Software Engineering, 2022

T-GRU: conTextual Gated Recurrent Unit model for high quality Linguistic Steganography.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022

Sense-aware BERT and Multi-task Fine-tuning for Multimodal Sentiment Analysis.
Proceedings of the International Joint Conference on Neural Networks, 2022

An encrypted traffic classification method based on contrastive learning.
Proceedings of the 8th International Conference on Communication and Information Processing, 2022

A CNN Based Visual Audio Steganography Model.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

Distant Supervised Relation Extraction Based on Sentence-Level Attention with Relation Alignment.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

A Robust Deepfake Video Detection Method based on Continuous Frame Face-swapping.
Proceedings of the International Conference on Artificial Intelligence, 2022

2021
Topic-aware Neural Linguistic Steganography Based on Knowledge Graphs.
Trans. Data Sci., 2021

Quantum secure multi-party summation protocol based on blind matrix and quantum Fourier transform.
Quantum Inf. Process., 2021

A video steganalysis method based on coding cost variation.
Int. J. Distributed Sens. Networks, 2021

The prognosis prediction significance of Hounsfield unit value for stroke patients treated by intravenous thrombolysis.
BMC Medical Imaging, 2021

Research on Energy Saving Mechanism of NB-IoT Based on eDRX.
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021

A Reversible Digital Watermarking Algorithm Based on Medical Images via Threshold Segmentation and Contrast Enhancement.
Proceedings of the Image and Graphics - 11th International Conference, 2021

A Controllable Image Steganography with Chaos and User Key.
Proceedings of the Image and Graphics - 11th International Conference, 2021

Carrier Robust Reversible Watermark Model Based on Image Block Chain Authentication.
Proceedings of the Image and Graphics - 11th International Conference, 2021

User Experience for Multi-Device Ecosystems: Challenges and Opportunities.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

2020
Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Steganalysis.
IEEE Trans. Inf. Forensics Secur., 2020

Sustainable quality control mechanism of heavy truck production process for Plant-wide production process.
Int. J. Prod. Res., 2020

A Fully Reversible Data Hiding Scheme in Encrypted Images Based on Homomorphic Encryption and Pixel Prediction.
Circuits Syst. Signal Process., 2020

Construction of Two Statistical Anomaly Features for Small-Sample APT Attack Traffic Classification.
CoRR, 2020

Constructing feature variation coefficients to evaluate feature learning capabilities of convolutional layers in steganographic detection algorithms of spatial domain.
CoRR, 2020

A "User-Knowledge-Product" Co-Creation Cyberspace Model for Product Innovation.
Complex., 2020

A Two-Stage Generative Adversarial Networks With Semantic Content Constraints for Adversarial Example Generation.
IEEE Access, 2020

Enhancing the interoperability between deep learning frameworks by model conversion.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

DUES-Adapt: Exploring Distributed User Experience With Neural UI Adaptation.
Proceedings of the IUI '20: 25th International Conference on Intelligent User Interfaces, 2020

An empirical study on program failures of deep learning jobs.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

2019
Invisible steganography via generative adversarial networks.
Multim. Tools Appl., 2019

A Sequential Design Approach for Calibrating Dynamic Computer Simulators.
SIAM/ASA J. Uncertain. Quantification, 2019

A high capacity reversible data hiding scheme for encrypted covers based on histogram shifting.
J. Inf. Secur. Appl., 2019

Using Downward-Looking Lidar to Detect and Track Traffic.
Proceedings of the IECON 2019, 2019

Multi-step Attack Scenarios Mining Based on Neural Network and Bayesian Network Attack Graph.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

2018
Temperature Compensation of Elasto-Magneto-Electric (EME) Sensors in Cable Force Monitoring Using BP Neural Network.
Sensors, 2018

Modified PSO algorithms with "Request and Reset" for leak source localization using multiple robots.
Neurocomputing, 2018

Efficient feature learning and multi-size image steganalysis based on CNN.
CoRR, 2018

Invisible Steganography via Generative Adversarial Network.
CoRR, 2018

Analysis of Message Attacks in Aviation Data-Link Communication.
IEEE Access, 2018

An Image Steganography Algorithm Based on Pixel Block Difference and Variable Modulus Function.
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018

Attack Pattern Mining Algorithm Based on Fuzzy Clustering and Sequence Pattern from Security Log.
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018

Network Security Situation Assessment Approach Based on Attack-Defense Stochastic Game Model.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Hotspots Trends and Spatio-Temporal Distributions for an Investigative in the Field of Chinese Educational Technology.
Proceedings of the 26th International Conference on Geoinformatics, 2018

2017
Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering.
Secur. Commun. Networks, 2017

Efficient entanglement concentration of arbitrary unknown less-entangled three-atom W states via photonic Faraday rotation in cavity QED.
Quantum Inf. Process., 2017

Robust video watermarking algorithm for H.264/AVC based on JND model.
KSII Trans. Internet Inf. Syst., 2017

Efficient data possession-checking protocol with deduplication in cloud.
Int. J. Distributed Sens. Networks, 2017

Dynamic data integrity auditing for secure outsourcing in the cloud.
Concurr. Comput. Pract. Exp., 2017

Attack pattern mining algorithm based on security log.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

A Steganography Algorithm Based on MP3 Linbits Bit of Huffman Codeword.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017

Optimal full-duplex relay selection for physical layer security in cooperative wireless networks.
Proceedings of the 2017 IEEE/CIC International Conference on Communications in China, 2017

2016
Efficient Dynamic Replicated Data Possession Checking in Distributed Cloud Storage Systems.
Int. J. Distributed Sens. Networks, 2016

Testing Contextuality in Cyclic Psychophysical Systems of High Ranks.
Proceedings of the Quantum Interaction - 10th International Conference, 2016

Privacy preservation based on rotation perturbation in weighted social networks.
Proceedings of the 16th International Symposium on Communications and Information Technologies, 2016

Detecting False Information of Social Network in Big Data.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016

Efficiently secure multiparty computation based on homomorphic encryption.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

Phishing sites detection based on Url Correlation.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

An attack pattern mining algorithm based on fuzzy logic and sequence pattern.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

An Android malware detection method based on AndroidManifest file.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

2015
Efficient multipartite entanglement concentration protocol for nitrogen-vacancy center and microresonator coupled systems.
Quantum Inf. Process., 2015

Defense Strategy of Network Security based on Dynamic Classification.
KSII Trans. Internet Inf. Syst., 2015

An improved algorithm for community discovery in social networks based on label propagation.
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015

2014
Smart Elasto-Magneto-Electric (EME) Sensors for Stress Monitoring of Steel Cables: Design Theory and Experimental Validation.
Sensors, 2014

Nonlocal entanglement concentration of separate nitrogen-vacancy centers coupling to microtoroidal resonators.
Quantum Inf. Comput., 2014

Hamiltonian cycle embedding for fault tolerance in balanced hypercubes.
Appl. Math. Comput., 2014

2013
Multipartite electronic entanglement purification using quantum-dot spin and microcavity system.
Quantum Inf. Process., 2013

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation.
J. Multim., 2013

IBC-Based Entity Authentication Protocols for Federated Cloud Systems.
KSII Trans. Internet Inf. Syst., 2013

2012
Controlled remote state preparation of arbitrary two and three qubit states via the Brown state.
Quantum Inf. Process., 2012

A Video Watermarking Algorithm of H.264/AVC for Content Authentication.
J. Networks, 2012

Cone-beam computed tomography study of root and canal morphology of mandibular premolars in a western Chinese population.
BMC Medical Imaging, 2012

2011
Research of Spatial Domain Image Digital Watermarking Payload.
EURASIP J. Inf. Secur., 2011

The effect of a manual instrumentation technique on five types of premolar root canal geometry assessed by microcomputed tomography and three-dimensional reconstruction.
BMC Medical Imaging, 2011

Wavelet neural network based intelligent assessment of ceramic green technology research.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

Intelligent green production of raw materials in ceramic technology of choice.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

2010
A Modified AES Algorithm for the Platform of Smartphone.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2010

2009
Research of nano-material doped fiber in SBS slow light system.
Proceedings of the 4th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2009

Flat suppercontinuum generation in the inner cladding fiber with InP nano thin film.
Proceedings of the 4th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2009

Improved EMD Steganography with Great Embedding Rate and High Embedding Efficiency.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Steganalysis of LSB Matching in Gray Images Based on Regional Correlation Analysis.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
The Development of a General Auxiliary Diagnosis System for Common Disease of Animal.
Proceedings of the Computer and Computing Technologies in Agriculture II, Volume 2, 2008

Knowledge Acquisition and Representation of the General Auxiliary Diagnosis System for Common Disease of Animal.
Proceedings of the Computer and Computing Technologies in Agriculture II, Volume 2, 2008

The Relationship between Monthdisease incidence Rate and climatic factor of Classical Swine Fever.
Proceedings of the Computer and Computing Technologies in Agriculture II, Volume 2, 2008

One Prediction Model Based on BP Neural Network for Newcastle Disease.
Proceedings of the Computer and Computing Technologies in Agriculture II, Volume 2, 2008

2006
A New Watermarking Protocol of Copyright Protection.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Analysis of Current Steganography Tools: Classifications & Features.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

2005
Flame Image of Pint-Sized Power Plant's Boiler Denoising Using Wavelet-Domain HMT Models.
Proceedings of the Advances in Intelligent Computing, 2005


  Loading...