default search action
Ruoyu Zhao
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Shimin Li, Ruoyu Zhao, Qingxiao Guan, Junxin Chen, Yushu Zhang:
A 3D model encryption method supporting adaptive visual effects after decryption. Adv. Eng. Informatics 59: 102319 (2024) - [j22]Ruoyu Zhao, Yushu Zhang, Shimin Li, Wenying Wen, Shuang Yi, Rushi Lan:
3D mesh encryption with differentiated visual effect and high efficiency based on chaotic system. Expert Syst. Appl. 238(Part E): 122140 (2024) - [j21]Dezhi An, Dawei Hao, Jun Lu, Jun Mou, Ruoyu Zhao, Yushu Zhang:
Exploiting Size-Compatible-Match Block Technique for Arbitrary-Size Thumbnail-Preserving Encryption. IEEE Internet Things J. 11(10): 17357-17371 (2024) - [j20]Jun Lu, Jiaxin Zhang, Dezhi An, Dawei Hao, Xiaokai Ren, Ruoyu Zhao:
A low-time-consumption image encryption combining 2D parametric Pascal matrix chaotic system and elementary operation. J. King Saud Univ. Comput. Inf. Sci. 36(8): 102169 (2024) - [j19]Junhao Ji, Ruoyu Zhao, Tao Wang, Youwen Zhu:
Utility-Enhanced Image Obfuscation With Block Differential Privacy. IEEE Signal Process. Lett. 31: 2135-2139 (2024) - [j18]Ruoyu Zhao, Wenying Wen, Youwen Zhu, Rushi Lan:
A Consumer-Oriented Image Transformation Scheme With a Secret Key for Privacy Protection. IEEE Signal Process. Lett. 31: 2280-2284 (2024) - [j17]Yongming Zhang, Ruoyu Zhao, Yushu Zhang, Shuang Yi, Rushi Lan:
Visually Semantics-Aware Color Image Encryption Based on Cross-Plane Substitution and Permutation. IEEE Trans. Ind. Informatics 20(8): 10576-10586 (2024) - [j16]Ruoyu Zhao, Yushu Zhang, Wenying Wen, Rushi Lan, Yong Xiang:
E-TPE: Efficient Thumbnail-Preserving Encryption for Privacy Protection in Visual Sensor Networks. ACM Trans. Sens. Networks 20(4): 88:1-88:26 (2024) - [c7]Wei Wu, Qingnan Fan, Shuai Qin, Hong Gu, Ruoyu Zhao, Antoni B. Chan:
FreeDiff: Progressive Frequency Truncation for Image Editing with Diffusion Models. ECCV (5) 2024: 194-209 - [c6]Yuang Shi, Ruoyu Zhao, Simone Gasparini, Géraldine Morin, Wei Tsang Ooi:
Volumetric Video Compression Through Neural-based Representation. MMVE@MMSys 2024: 85-91 - [i8]Ruoyu Zhao, Qingnan Fan, Fei Kou, Shuai Qin, Hong Gu, Wei Wu, Pengcheng Xu, Mingrui Zhu, Nannan Wang, Xinbo Gao:
InstructBrush: Learning Attention-based Instruction Optimization for Image Editing. CoRR abs/2403.18660 (2024) - [i7]Wei Wu, Qingnan Fan, Shuai Qin, Hong Gu, Ruoyu Zhao, Antoni B. Chan:
FreeDiff: Progressive Frequency Truncation for Image Editing with Diffusion Models. CoRR abs/2404.11895 (2024) - [i6]Yan Zhong, Ruoyu Zhao, Chao Wang, Qinghai Guo, Jianguo Zhang, Zhichao Lu, Luziwei Leng:
SPikE-SSM: A Sparse, Precise, and Efficient Spiking State Space Model for Long Sequences Learning. CoRR abs/2410.17268 (2024) - 2023
- [j15]Tao Wang, Yushu Zhang, Ruoyu Zhao:
Face Database Protection via Beautification with Chaotic Systems. Entropy 25(4): 566 (2023) - [j14]Dezhi An, Dawei Hao, Ruoyu Zhao, Shengcai Zhang, Jun Lu, Yushu Zhang:
Visually semantic-preserving and people-oriented color image encryption based on cross-plane thumbnail preservation. Expert Syst. Appl. 233: 120931 (2023) - [j13]Ruoyu Zhao, Yushu Zhang, Rushi Lan, Zhongyun Hua, Yong Xiang:
Heterogeneous and Customized Cost-Efficient Reversible Image Degradation for Green IoT. IEEE Internet Things J. 10(3): 2630-2645 (2023) - [j12]Dezhi An, Dawei Hao, Ruoyu Zhao, Jun Lu, Yan Li, Yushu Zhang:
A novel color image privacy-preserving method: Combining breadth and depth visual encryption with chaotic system. J. King Saud Univ. Comput. Inf. Sci. 35(2): 576-589 (2023) - [j11]Tao Wang, Yushu Zhang, Ruoyu Zhao, Wenying Wen, Rushi Lan:
Identifiable Face Privacy Protection via Virtual Identity Transformation. IEEE Signal Process. Lett. 30: 773-777 (2023) - [j10]Wentao Zhou, Yushu Zhang, Ruoyu Zhao, Shuang Yi, Rushi Lan:
Adversarial Thumbnail-Preserving Transformation for Facial Images Based on GAN. IEEE Signal Process. Lett. 30: 1147-1151 (2023) - [j9]Yushu Zhang, Tao Wang, Ruoyu Zhao, Wenying Wen, Youwen Zhu:
RAPP: Reversible Privacy Preservation for Various Face Attributes. IEEE Trans. Inf. Forensics Secur. 18: 3074-3087 (2023) - [j8]Yushu Zhang, Wentao Zhou, Ruoyu Zhao, Xinpeng Zhang, Xiaochun Cao:
F-TPE: Flexible Thumbnail-Preserving Encryption Based on Multi-Pixel Sum-Preserving Encryption. IEEE Trans. Multim. 25: 5877-5891 (2023) - [c5]Ye Zhuo, Zerui Liu, Deming Meng, Pan Hu, Wenhao Song, Yunxiang Wang, Ruoyu Zhao, Tse-Hsien Ou, Sushmit Hossain, Alyna Xinxia Tang, J. Joshua Yang, Wei Wu:
Early Prevention of Heart Attacks Using Memristor-Based Machine Learning and Surface Enhanced Raman Spectroscopy with Collapsible Nanofinger. MetroXRAINE 2023: 1122-1127 - [i5]Ruoyu Zhao, Mingrui Zhu, Xiaoyu Wang, Nannan Wang:
Few-shot Face Image Translation via GAN Prior Distillation. CoRR abs/2301.12257 (2023) - [i4]Ruoyu Zhao, Yushu Zhang, Tao Wang, Wenying Wen, Yong Xiang, Xiaochun Cao:
Visual Content Privacy Protection: A Survey. CoRR abs/2303.16552 (2023) - [i3]Tao Wang, Yushu Zhang, Shuren Qi, Ruoyu Zhao, Zhihua Xia, Jian Weng:
Security and Privacy on Generative Data in AIGC: A Survey. CoRR abs/2309.09435 (2023) - [i2]Ruoyu Zhao, Mingrui Zhu, Shiyin Dong, Nannan Wang, Xinbo Gao:
CatVersion: Concatenating Embeddings for Diffusion-Based Text-to-Image Personalization. CoRR abs/2311.14631 (2023) - 2022
- [j7]Ruoyu Zhao, Yushu Zhang, Yu Nan, Wenying Wen, Xiuli Chai, Rushi Lan:
Primitively visually meaningful image encryption: A new paradigm. Inf. Sci. 613: 628-648 (2022) - [j6]Ye Zhu, Ruoyu Zhao, Yushu Zhang, Xiangli Xiao, Rushi Lan, Yong Xiang:
Noise-free thumbnail-preserving image encryption based on MSB prediction. Inf. Sci. 617: 395-415 (2022) - [j5]Yongming Zhang, Ruoyu Zhao, Yushu Zhang, Rushi Lan, Xiuli Chai:
High-efficiency and visual-usability image encryption based on thumbnail preserving and chaotic system. J. King Saud Univ. Comput. Inf. Sci. 34(6 Part A): 2993-3010 (2022) - [j4]Xi Ye, Yushu Zhang, Ruoyu Zhao, Rushi Lan, Yong Xiang:
PRA-TPE: Perfectly Recoverable Approximate Thumbnail-Preserving Image Encryption. J. Vis. Commun. Image Represent. 87: 103589 (2022) - [j3]Yushu Zhang, Ruoyu Zhao, Xiangli Xiao, Rushi Lan, Zhe Liu, Xinpeng Zhang:
HF-TPE: High-Fidelity Thumbnail- Preserving Encryption. IEEE Trans. Circuits Syst. Video Technol. 32(3): 947-961 (2022) - [i1]Ruoyu Zhao, Yushu Zhang, Youwen Zhu, Rushi Lan, Zhongyun Hua:
Metaverse: Security and Privacy Concerns. CoRR abs/2203.03854 (2022) - 2021
- [j2]Ruoyu Zhao, Yushu Zhang, Xiangli Xiao, Xi Ye, Rushi Lan:
TPE2: Three-Pixel Exact Thumbnail-Preserving Image Encryption. Signal Process. 183: 108019 (2021) - [c4]Ruoyu Zhao:
Bandit-Enhanced Graph Collaborative Filtering via Graph Reconstruction. BigCom 2021: 156-163 - [c3]Linli Xu, Sijie Teng, Ruoyu Zhao, Junliang Guo, Chi Xiao, Deqiang Jiang, Bo Ren:
Hierarchical Multi-label Text Classification with Horizontal and Vertical Category Correlations. EMNLP (1) 2021: 2459-2468 - 2020
- [j1]David Ding, Yichen Lu, Ruoyu Zhao, Xin Liu, Chawina De-Eknamkul, Chi Ren, Armaghan Mehrsa, Takaki Komiyama, Duygu Kuzum:
Evaluation of Durability of Transparent Graphene Electrodes Fabricated on Different Flexible Substrates for Chronic In Vivo Experiments. IEEE Trans. Biomed. Eng. 67(11): 3203-3210 (2020) - [c2]Xin Sheng, Linli Xu, Junliang Guo, Jingchang Liu, Ruoyu Zhao, Yinlong Xu:
IntroVNMT: An Introspective Model for Variational Neural Machine Translation. AAAI 2020: 8830-8837
2010 – 2019
- 2019
- [c1]Xin Liu, Chi Ren, Yichen Lu, Ryoma Hattori, Yuhan Shi, Ruoyu Zhao, David Ding, Takaki Komiyama, Duygu Kuzum:
Decoding ECoG High Gamma Power from Cellular Calcium Response using Transparent Graphene Microelectrodes. NER 2019: 710-713
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint