default search action
Ru Zhang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j58]Ru Zhang, Zihan Meng, Hongli Wang, Tianhe Liu, Guan Wang, Lu Zheng, Cong Wang:
Hyperscale data analysis oriented optimization mechanisms for higher education management systems platforms with evolutionary intelligence. Appl. Soft Comput. 155: 111460 (2024) - [j57]Ru Zhang, Yanmei Lin, Yijia Wu, Lei Deng, Hao Zhang, Mingzhi Liao, Yuzhong Peng:
MvMRL: a multi-view molecular representation learning method for molecular property prediction. Briefings Bioinform. 25(4) (2024) - [j56]Cheng Zhang, Liru Zhang, Ru Zhang, Mingsheng Chen, Sui Wei:
Robust 3D phase retrieval via compressed support detection from snapshot diffraction pattern. Comput. Biol. Medicine 177: 108644 (2024) - [j55]Ru Zhang, Zhe Zhang, Xiaoling Song, Yong Yin:
An exact solution method for seru scheduling problems considering past-sequence-dependent setup time and adjustment activities. Int. J. Appl. Decis. Sci. 17(2): 156-181 (2024) - [j54]Cheng Zhang, Ru Zhang, Liru Zhang, Mingsheng Chen, Hong Cheng, Chuan Shen, Quanbin Zhang, Sui Wei:
Spatio-temporal coherent snapshot compressed imaging with time-varying composite phase masks. Signal Process. 218: 109358 (2024) - [j53]Yihao Li, Ru Zhang, Jianyi Liu, Qi Lei:
A Semantic Controllable Long Text Steganography Framework Based on LLM Prompt Engineering and Knowledge Graph. IEEE Signal Process. Lett. 31: 2610-2614 (2024) - [j52]Jiaqi Xu, Haipeng Yao, Ru Zhang, Tianle Mai, Shan Huang, Song Guo:
Federated Learning Powered Semantic Communication for UAV Swarm Cooperation. IEEE Wirel. Commun. 31(4): 140-146 (2024) - [c57]Jianwei Li, Mingrui Xu, Yuyao Zhou, Ru Zhang:
Research on Personalized Hybrid Recommendation System for English Word Learning. AIED Companion (2) 2024: 275-282 - [c56]Yihao Li, Ru Zhang, Jianyi Liu:
An Enhanced Prompt-Based LLM Reasoning Scheme via Knowledge Graph-Integrated Collaboration. ICANN (5) 2024: 251-265 - [c55]Ruifan Zhang, Jianyi Liu, Ru Zhang:
Controllable Semantic Linguistic Steganography via Summarization Generation. ICASSP 2024: 4560-4564 - [c54]Lingyong Fang, Gongshen Liu, Ru Zhang:
Multi-Grained Multimodal Interaction Network for Sentiment Analysis. ICASSP 2024: 7730-7734 - [c53]Yihong Lu, Jianyi Liu, Ru Zhang:
An Images Regeneration Method for CG Anti-Forensics Based on Sensor Device Trace. ICME 2024: 1-6 - [c52]Jingwen Li, Ru Zhang, Jianyi Liu:
Attack Behavior Extraction Based on Heterogeneous Threat Intelligence Graphs and Data Augmentation. IJCNN 2024: 1-9 - [i14]Yihao Wang, Ruiqi Song, Ru Zhang, Jianyi Liu, Lingxiao Li:
LLsM: Generative Linguistic Steganography with Large Language Model. CoRR abs/2401.15656 (2024) - [i13]Yihao Li, Ru Zhang, Jianyi Liu, Gongshen Liu:
An Enhanced Prompt-Based LLM Reasoning Scheme via Knowledge Graph-Integrated Collaboration. CoRR abs/2402.04978 (2024) - [i12]Yifan Tang, Yihao Wang, Ru Zhang, Jianyi Liu:
Linguistic Steganalysis via LLMs: Two Modes for Efficient Detection of Strongly Concealed Stego. CoRR abs/2406.04218 (2024) - [i11]Yufei Luo, Zhen Yang, Ru Zhang, Jianyi Liu:
Pseudo-label Based Domain Adaptation for Zero-Shot Text Steganalysis. CoRR abs/2406.18565 (2024) - [i10]Zhen Yang, Wenhui Wang, Tao Qi, Peng Zhang, Tianyun Zhang, Ru Zhang, Jianyi Liu, Yongfeng Huang:
LICM: Effective and Efficient Long Interest Chain Modeling for News Recommendation. CoRR abs/2408.00859 (2024) - [i9]Yihong Lu, Jianyi Liu, Ru Zhang:
Current Status and Trends in Image Anti-Forensics Research: A Bibliometric Analysis. CoRR abs/2408.11365 (2024) - [i8]Yihao Wang, Ru Zhang, Yifan Tang, Jianyi Liu:
State-of-the-art Advances of Deep-learning Linguistic Steganalysis Research. CoRR abs/2409.01780 (2024) - [i7]Guangming Sheng, Chi Zhang, Zilingfeng Ye, Xibin Wu, Wang Zhang, Ru Zhang, Yanghua Peng, Haibin Lin, Chuan Wu:
HybridFlow: A Flexible and Efficient RLHF Framework. CoRR abs/2409.19256 (2024) - 2023
- [j51]Youqiang Sun, Jianyi Liu, Ru Zhang:
Large capacity generative image steganography via image style transfer and feature-wise deep fusion. Appl. Intell. 53(23): 28675-28693 (2023) - [j50]Lu Zheng, Cong Wang, Xue Chen, Yihang Song, Zihan Meng, Ru Zhang:
Evolutionary machine learning builds smart education big data platform: Data-driven higher education. Appl. Soft Comput. 136: 110114 (2023) - [j49]Huan Yu, Ru Zhang, Cheonshik Kim:
Intelligent analysis system of college students' employment and entrepreneurship situation: Big data and artificial intelligence-driven approach. Comput. Electr. Eng. 110: 108823 (2023) - [j48]Ru Zhang, Zhe Zhang, Xue Gong, Yong Yin:
Reformulation and exact solution method for seru scheduling problem with learning effect and job deterioration. Int. J. Appl. Decis. Sci. 16(5): 613-645 (2023) - [j47]Ru Zhang:
Consumer behaviour data mining of social e-commerce platform based on improved spectral clustering algorithm. Int. J. Web Based Communities 19(4): 291-304 (2023) - [j46]Jian Zheng, Renjing Liu, Xingju Zhong, Ru Zhang:
Web of science-based virtual brand communities: a bibliometric review between 2000 and 2020. Internet Res. 33(2): 606-637 (2023) - [j45]Yihao Wang, Ru Zhang, Jianyi Liu:
V-A3tS: A rapid text steganalysis method based on position information and variable parameter multi-head self-attention controlled by length. J. Inf. Secur. Appl. 75: 103512 (2023) - [j44]Lei Guan, Fan Liu, Ru Zhang, Jianyi Liu, Yifan Tang:
MCW: A Generalizable Deepfake Detection Method for Few-Shot Learning. Sensors 23(21): 8763 (2023) - [j43]Jiawei Li, Ru Zhang, Jianyi Liu:
ConLBS: An Attack Investigation Approach Using Contrastive Learning with Behavior Sequence. Sensors 23(24): 9881 (2023) - [j42]Qiong Xu, Ru Zhang, Jianyi Liu:
Linguistic Steganalysis by Enhancing and Integrating Local and Global Features. IEEE Signal Process. Lett. 30: 16-20 (2023) - [j41]Yihao Wang, Ru Zhang, Jianyi Liu:
RLS-DTS: Reinforcement-Learning Linguistic Steganalysis in Distribution-Transformed Scenario. IEEE Signal Process. Lett. 30: 1232-1236 (2023) - [c51]Yijia Wu, Yanmei Lin, Yuzhong Peng, Ru Zhang, Li Cai:
T-GraphDTA: A Drug-Target Binding Affinity Prediction Framework Based on Protein Pre-training Model and Hybrid Graph Neural Network. ICAI (1) 2023: 113-123 - [c50]Youqiang Sun, Jianyi Liu, Ru Zhang:
A Robust Generative Image Steganography Method based on Guidance Features in Image Synthesis. ICME 2023: 55-60 - [c49]Tianhe Lu, Gongshen Liu, Ru Zhang, Tianjie Ju:
Neural Linguistic Steganography with Controllable Security. IJCNN 2023: 1-8 - [c48]Tianhe Lu, Gongshen Liu, Ru Zhang, Peixuan Li, Tianjie Ju:
Robust Secret Data Hiding for Transformer-based Neural Machine Translation. IJCNN 2023: 1-8 - [c47]Ru Zhang, Wenlong Liu, Yi Jiang, Shenghui Sang:
How Older Adults' Moments Sharing in SNS Contributes to Their Subjective Well-Being? WHICEB (1) 2023: 143-155 - [i6]Yihao Wang, Ruiqi Song, Ru Zhang, Jianyi Liu:
UP4LS: User Profile Constructed by Multiple Attributes for Enhancing Linguistic Steganalysis. CoRR abs/2311.01775 (2023) - 2022
- [j40]Ru Zhang, Cuiping Zhang, Chengyu Yu, Jungang Dong, Jihong Hu:
Integration of multi-omics technologies for crop improvement: Status and prospects. Frontiers Bioinform. 2 (2022) - [j39]Jun Yuan, Ru Zhang, Aixia Liu:
Degree Conditions for Completely Independent Spanning Trees of Bipartite Graphs. Graphs Comb. 38(6): 179 (2022) - [j38]Jianyi Liu, Ying Liu, Jingwen Li, Wenxin Sun, Jie Cheng, Ru Zhang, Xingjie Huang, Jin Pang:
Two statistical traffic features for certain APT group identification. J. Inf. Secur. Appl. 67: 103207 (2022) - [j37]Tong Wu, Ru Zhang, Xinwang Liu, Fang Liu, Yi Ding:
A social commerce purchasing decision model with trust network and item review information. Knowl. Based Syst. 235: 107628 (2022) - [j36]Pan-pan Yin, Cong Cao, Yu-Hong Han, Ling Fan, Ru Zhang:
Faithful quantum entanglement purification and concentration using heralded high-fidelity parity-check detectors based on quantum-dot-microcavity systems. Quantum Inf. Process. 21(1): 17 (2022) - [j35]Shengnan Guo, Jianyi Liu, Zhongliang Yang, Weike You, Ru Zhang:
Linguistic Steganalysis Merging Semantic and Statistical Features. IEEE Signal Process. Lett. 29: 2128-2132 (2022) - [c46]Dazhuang Liu, Zhen Yang, Ru Zhang, Jianyi Liu:
A Robust Deepfake Video Detection Method based on Continuous Frame Face-swapping. AIIPCC 2022: 188-191 - [c45]Jing Li, Xingjie Huang, Yating Gao, Jianyi Liu, Ru Zhang, Jinmeng Zhao:
Distant Supervised Relation Extraction Based on Sentence-Level Attention with Relation Alignment. ICAIS (1) 2022: 142-152 - [c44]Ru Zhang, Hao Dong, Zhen Yang, Wenbo Ying, Jianyi Liu:
A CNN Based Visual Audio Steganography Model. ICAIS (1) 2022: 431-442 - [c43]Siyuan Tian, Yating Gao, Guoquan Yuan, Ru Zhang, Jinmeng Zhao, Song Zhang:
An encrypted traffic classification method based on contrastive learning. ICCIP 2022: 101-105 - [c42]Lingyong Fang, Gongshen Liu, Ru Zhang:
Sense-aware BERT and Multi-task Fine-tuning for Multimodal Sentiment Analysis. IJCNN 2022: 1-8 - [c41]Zhen Yang, Zihan Xu, Ru Zhang, Yongfeng Huang:
T-GRU: conTextual Gated Recurrent Unit model for high quality Linguistic Steganography. WIFS 2022: 1-6 - [c40]Xiaofan Yan, Jie Cheng, Ru Zhang, Jiahui Wei, Liandong Chen, Kai Cheng:
Chinese Short Text Entity Linking Model Based on PET. WSSE 2022: 87-92 - [i5]Jiawei Li, Ru Zhang, Jianyi Liu, Gongshen Liu:
LogKernel A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering. CoRR abs/2208.08820 (2022) - 2021
- [j34]Zhengqi Zhu, Ru Zhang, Kaixuan Ren, Ruochen Cong, Xiangyang Zhu, Li Zhu, Tianle Wang:
The prognosis prediction significance of Hounsfield unit value for stroke patients treated by intravenous thrombolysis. BMC Medical Imaging 21(1): 62 (2021) - [j33]Jianyi Liu, Cong Zhang, Ru Zhang, Yi Li, Jie Cheng:
A video steganalysis method based on coding cost variation. Int. J. Distributed Sens. Networks 17(2): 155014772199273 (2021) - [j32]Xin Yi, Cong Cao, Ling Fan, Ru Zhang:
Quantum secure multi-party summation protocol based on blind matrix and quantum Fourier transform. Quantum Inf. Process. 20(7): 1-20 (2021) - [j31]Yamin Li, Jun Zhang, Zhongliang Yang, Ru Zhang:
Topic-aware Neural Linguistic Steganography Based on Knowledge Graphs. Trans. Data Sci. 2(2): 10:1-10:13 (2021) - [c39]Ru Zhang, Yuanchun Shi, Björn W. Schuller, Elisabeth André, Sharon L. Oviatt, Aaron Quigley, Nicolai Marquardt, Ilhan Aslan, Ran Ju:
User Experience for Multi-Device Ecosystems: Challenges and Opportunities. CHI Extended Abstracts 2021: 111:1-111:5 - [c38]Jin Pang, Xingjie Huang, Ru Zhang, Jianyi Liu, Yue Wang, Youqiang Sun:
A Reversible Digital Watermarking Algorithm Based on Medical Images via Threshold Segmentation and Contrast Enhancement. ICIG (2) 2021: 675-690 - [c37]Yating Gao, Ru Zhang, Xianxu Li, Jianyi Liu, Kaifeng Zhao, Xue Cheng:
Carrier Robust Reversible Watermark Model Based on Image Block Chain Authentication. ICIG (1) 2021: 712-724 - [c36]Jianyi Liu, Yuhan Wang, Zhen Yang, Ruifan Zhang, Ru Zhang:
A Controllable Image Steganography with Chaos and User Key. ICIG (1) 2021: 785-797 - [c35]Errong Pei, Ru Zhang, Yun Li:
Research on Energy Saving Mechanism of NB-IoT Based on eDRX. VTC Spring 2021: 1-6 - 2020
- [j30]Jianyi Liu, Yu Tian, Ru Zhang, Youqiang Sun, Chan Wang:
A Two-Stage Generative Adversarial Networks With Semantic Content Constraints for Adversarial Example Generation. IEEE Access 8: 205766-205777 (2020) - [j29]Yu Wang, Jiacong Wu, Ru Zhang, Sara Shafiee, Cheng Li:
A "User-Knowledge-Product" Co-Creation Cyberspace Model for Product Innovation. Complex. 2020: 7190169:1-7190169:20 (2020) - [j28]Jianyi Liu, Kaifeng Zhao, Ru Zhang:
A Fully Reversible Data Hiding Scheme in Encrypted Images Based on Homomorphic Encryption and Pixel Prediction. Circuits Syst. Signal Process. 39(7): 3532-3552 (2020) - [j27]Hongfei Guo, Ru Zhang, Yingxin Zhu, Ting Qu, Min Zou, Xiangyue Chen, Yaping Ren, Zhihui He:
Sustainable quality control mechanism of heavy truck production process for Plant-wide production process. Int. J. Prod. Res. 58(24): 7548-7564 (2020) - [j26]Ru Zhang, Feng Zhu, Jianyi Liu, Gongshen Liu:
Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Steganalysis. IEEE Trans. Inf. Forensics Secur. 15: 1138-1150 (2020) - [c34]Ru Zhang, Wencong Xiao, Hongyu Zhang, Yu Liu, Haoxiang Lin, Mao Yang:
An empirical study on program failures of deep learning jobs. ICSE 2020: 1159-1170 - [c33]Ran Ju, Xingchen Zhou, Bo Xu, Weiqing Liang, Wanyi Yang, Yuan Cao, Eryan Zhang, Ronggen Li, Yinghao Li, Ning Ding, Li Li, Ru Zhang, Dongliang Liu:
DUES-Adapt: Exploring Distributed User Experience With Neural UI Adaptation. IUI Companion 2020: 91-92 - [c32]Yu Liu, Cheng Chen, Ru Zhang, Tingting Qin, Xiang Ji, Haoxiang Lin, Mao Yang:
Enhancing the interoperability between deep learning frameworks by model conversion. ESEC/SIGSOFT FSE 2020: 1320-1330 - [i4]Ru Zhang, Sheng Zou, Jianyi Liu, Bingjie Lin, Dazhuang Liu:
Constructing feature variation coefficients to evaluate feature learning capabilities of convolutional layers in steganographic detection algorithms of spatial domain. CoRR abs/2010.10140 (2020) - [i3]Ru Zhang, Wenxin Sun, Jianyi Liu, Jingwen Li, Guan Lei, Han Guo:
Construction of Two Statistical Anomaly Features for Small-Sample APT Attack Traffic Classification. CoRR abs/2010.13978 (2020)
2010 – 2019
- 2019
- [j25]Ru Zhang, Chunjing Lu, Jianyi Liu:
A high capacity reversible data hiding scheme for encrypted covers based on histogram shifting. J. Inf. Secur. Appl. 47: 199-207 (2019) - [j24]Ru Zhang, C. Devon Lin, Pritam Ranjan:
A Sequential Design Approach for Calibrating Dynamic Computer Simulators. SIAM/ASA J. Uncertain. Quantification 7(4): 1245-1274 (2019) - [j23]Ru Zhang, Shiqi Dong, Jianyi Liu:
Invisible steganography via generative adversarial networks. Multim. Tools Appl. 78(7): 8559-8575 (2019) - [c31]Jianyi Liu, Bowen Liu, Ru Zhang, Cong Wang:
Multi-step Attack Scenarios Mining Based on Neural Network and Bayesian Network Attack Graph. ICAIS (2) 2019: 62-74 - [c30]Haiyang Qiu, Sicong Zhu, Hangbin Wu, Hui Wang, Ru Zhang:
Using Downward-Looking Lidar to Detect and Track Traffic. IECON 2019: 6297-6302 - 2018
- [j22]Ru Zhang, Gongshen Liu, Jianyi Liu, Jan P. Nees:
Analysis of Message Attacks in Aviation Data-Link Communication. IEEE Access 6: 455-463 (2018) - [j21]Yuting Yan, Ru Zhang, Ji Wang, Juming Li:
Modified PSO algorithms with "Request and Reset" for leak source localization using multiple robots. Neurocomputing 292: 82-90 (2018) - [j20]Ru Zhang, Yuanfeng Duan, Yang Zhao, Xuan He:
Temperature Compensation of Elasto-Magneto-Electric (EME) Sensors in Cable Force Monitoring Using BP Neural Network. Sensors 18(7): 2176 (2018) - [c29]Yantao Han, Ru Zhang, Yang Yang:
Hotspots Trends and Spatio-Temporal Distributions for an Investigative in the Field of Chinese Educational Technology. Geoinformatics 2018: 1-5 - [c28]Jianyi Liu, Fangyu Weng, Ru Zhang, Yunbiao Guo:
Network Security Situation Assessment Approach Based on Attack-Defense Stochastic Game Model. ICCCS (3) 2018: 161-173 - [c27]Yu Yang, Ru Zhang, Jianyi Liu, Yuhan Wang, Fuhong Huang:
An Image Steganography Algorithm Based on Pixel Block Difference and Variable Modulus Function. IIH-MSP (2) 2018: 36-43 - [c26]Jianyi Liu, Keyi Li, Yang Li, Ru Zhang, Xi Duan:
Attack Pattern Mining Algorithm Based on Fuzzy Clustering and Sequence Pattern from Security Log. IIH-MSP (2) 2018: 44-52 - [i2]Shiqi Dong, Ru Zhang, Jianyi Liu:
Invisible Steganography via Generative Adversarial Network. CoRR abs/1807.08571 (2018) - [i1]Ru Zhang, Feng Zhu, Jianyi Liu, Gongshen Liu:
Efficient feature learning and multi-size image steganalysis based on CNN. CoRR abs/1807.11428 (2018) - 2017
- [j19]Jinxia Wei, Ru Zhang, Jianyi Liu, Jing Li, Xinxin Niu, Yuangang Yao:
Dynamic data integrity auditing for secure outsourcing in the cloud. Concurr. Comput. Pract. Exp. 29(12) (2017) - [j18]Jinxia Wei, Xinxin Niu, Ru Zhang, Jianyi Liu, Yuangang Yao:
Efficient data possession-checking protocol with deduplication in cloud. Int. J. Distributed Sens. Networks 13(8) (2017) - [j17]Weiwei Zhang, Xin Li, Yuzhao Zhang, Ru Zhang, Lixin Zheng:
Robust video watermarking algorithm for H.264/AVC based on JND model. KSII Trans. Internet Inf. Syst. 11(5): 2741-2761 (2017) - [j16]Cong Cao, Ling Fan, Xi Chen, Yuwen Duan, Tie-Jun Wang, Ru Zhang, Chuan Wang:
Efficient entanglement concentration of arbitrary unknown less-entangled three-atom W states via photonic Faraday rotation in cavity QED. Quantum Inf. Process. 16(4): 98 (2017) - [j15]Ru Zhang, Yanyu Huo, Jianyi Liu, Fangyu Weng:
Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering. Secur. Commun. Networks 2017: 7536381:1-7536381:9 (2017) - [c25]Ru Zhang, Fang Liu, Yuanan Liu:
Optimal full-duplex relay selection for physical layer security in cooperative wireless networks. ICCC 2017: 1-6 - [c24]Ru Zhang, Jianyi Liu, Feng Zhu:
A Steganography Algorithm Based on MP3 Linbits Bit of Huffman Codeword. IIH-MSP (2) 2017: 169-176 - [c23]Keyi Li, Yang Li, Jianyi Liu, Ru Zhang, Xi Duan:
Attack pattern mining algorithm based on security log. ISI 2017: 205 - 2016
- [j14]Jinxia Wei, Jianyi Liu, Ru Zhang, Xinxin Niu:
Efficient Dynamic Replicated Data Possession Checking in Distributed Cloud Storage Systems. Int. J. Distributed Sens. Networks 12(1): 1894713:1-1894713:11 (2016) - [c22]Yang Li, Ying Xue, Yuangang Yao, Xianghui Zhao, Jianyi Liu, Ru Zhang:
An attack pattern mining algorithm based on fuzzy logic and sequence pattern. CCIS 2016: 234-238 - [c21]Xiang Li, Jianyi Liu, Yanyu Huo, Ru Zhang, Yuangang Yao:
An Android malware detection method based on AndroidManifest file. CCIS 2016: 239-243 - [c20]Ying Xue, Yang Li, Yuangang Yao, Xianghui Zhao, Jianyi Liu, Ru Zhang:
Phishing sites detection based on Url Correlation. CCIS 2016: 244-248 - [c19]Yuangang Yao, Jinxia Wei, Jianyi Liu, Ru Zhang:
Efficiently secure multiparty computation based on homomorphic encryption. CCIS 2016: 343-349 - [c18]Yi Xu, Furong Li, Jianyi Liu, Ru Zhang, Yuangang Yao, Dongfang Zhang:
Detecting False Information of Social Network in Big Data. CollaborateCom 2016: 642-651 - [c17]Furong Li, Ru Zhang, Yi Xu, Jianyi Liu, Juan Li:
Privacy preservation based on rotation perturbation in weighted social networks. ISCIT 2016: 206-211 - [c16]Ru Zhang, Ehtibar N. Dzhafarov:
Testing Contextuality in Cyclic Psychophysical Systems of High Ranks. QI 2016: 151-162 - 2015
- [j13]Jinxia Wei, Ru Zhang, Jianyi Liu, Xinxin Niu, Yixian Yang:
Defense Strategy of Network Security based on Dynamic Classification. KSII Trans. Internet Inf. Syst. 9(12): 5116-5134 (2015) - [j12]Cong Cao, Hao Ding, Yin Li, Tie-Jun Wang, Si-Chen Mi, Ru Zhang, Chuan Wang:
Efficient multipartite entanglement concentration protocol for nitrogen-vacancy center and microresonator coupled systems. Quantum Inf. Process. 14(4): 1265-1277 (2015) - [c15]Ru Zhang, Zongwei Ren:
An improved algorithm for community discovery in social networks based on label propagation. FSKD 2015: 1493-1497 - 2014
- [j11]Rong-Xia Hao, Ru Zhang, Yan-Quan Feng, Jin-Xin Zhou:
Hamiltonian cycle embedding for fault tolerance in balanced hypercubes. Appl. Math. Comput. 244: 447-456 (2014) - [j10]Chuan Wang, Yong Zhang, Ming Lei, Guang-Sheng Jin, Hai-Qiang Ma, Ru Zhang:
Nonlocal entanglement concentration of separate nitrogen-vacancy centers coupling to microtoroidal resonators. Quantum Inf. Comput. 14(1-2): 107-121 (2014) - [j9]Ru Zhang, Yuanfeng Duan, Siu Wing Or, Yang Zhao:
Smart Elasto-Magneto-Electric (EME) Sensors for Stress Monitoring of Steel Cables: Design Theory and Experimental Validation. Sensors 14(8): 13644-13660 (2014) - 2013
- [j8]Chenlei Cao, Ru Zhang, Mengyi Zhang, Yixian Yang:
IBC-Based Entity Authentication Protocols for Federated Cloud Systems. KSII Trans. Internet Inf. Syst. 7(5): 1291-1312 (2013) - [j7]Hai-yang Ding, Yajian Zhou, Yixian Yang, Ru Zhang:
Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation. J. Multim. 8(2): 161-167 (2013) - [j6]Chuan Wang, Ru Zhang, Yong Zhang, Hai-Qiang Ma:
Multipartite electronic entanglement purification using quantum-dot spin and microcavity system. Quantum Inf. Process. 12(1): 525-536 (2013) - 2012
- [j5]Xuan Yu, Bin Guo, Ke-Zeng Li, Ru Zhang, Yuan-Yuan Tian, Hu Wang, Tao Hu:
Cone-beam computed tomography study of root and canal morphology of mandibular premolars in a western Chinese population. BMC Medical Imaging 12: 18 (2012) - [j4]Weiwei Zhang, Ru Zhang, Xianyi Liu, Chunhua Wu, Xinxin Niu:
A Video Watermarking Algorithm of H.264/AVC for Content Authentication. J. Networks 7(8): 1150-1154 (2012) - [j3]Xiu-Bo Chen, Song-Ya Ma, Yuan Su, Ru Zhang, Yi-Xian Yang:
Controlled remote state preparation of arbitrary two and three qubit states via the Brown state. Quantum Inf. Process. 11(6): 1653-1667 (2012) - 2011
- [j2]Ke-Zeng Li, Yuan Gao, Ru Zhang, Tao Hu, Bin Guo:
The effect of a manual instrumentation technique on five types of premolar root canal geometry assessed by microcomputed tomography and three-dimensional reconstruction. BMC Medical Imaging 11: 14 (2011) - [j1]Jiafa Mao, Ru Zhang, Xinxin Niu, Yixian Yang, Linna Zhou:
Research of Spatial Domain Image Digital Watermarking Payload. EURASIP J. Inf. Secur. 2011 (2011) - [c14]Ru Zhang, ChangHu Chen:
Intelligent green production of raw materials in ceramic technology of choice. EMEIT 2011: 897-900 - [c13]Ru Zhang, ChangHu Chen:
Wavelet neural network based intelligent assessment of ceramic green technology research. EMEIT 2011: 901-904 - 2010
- [c12]Shurui Liang, Jie Liu, Ru Zhang, Cong Wang:
A Modified AES Algorithm for the Platform of Smartphone. CASoN 2010: 749-752
2000 – 2009
- 2009
- [c11]Ming Chen, Fan-fan Liu, Ru Zhang, Xinxin Niu, Yixian Yang:
Steganalysis of LSB Matching in Gray Images Based on Regional Correlation Analysis. CSIE (6) 2009: 490-494 - [c10]Zhiguo Qu, Yu Fu, Xinxin Niu, Yixian Yang, Ru Zhang:
Improved EMD Steganography with Great Embedding Rate and High Embedding Efficiency. IIH-MSP 2009: 348-352 - [c9]Ru Zhang, Ying Zhang, Peilin Lang, Yuwen Duan:
Research of nano-material doped fiber in SBS slow light system. NEMS 2009: 980-982 - [c8]Yuwen Duan, Ru Zhang, Peilin Lang, Ying Zhang:
Flat suppercontinuum generation in the inner cladding fiber with InP nano thin film. NEMS 2009: 996-999 - 2008
- [c7]Jianhua Xiao, Hongbin Wang, Ru Zhang, Peixian Luan, Lin Li, Danning Xu:
Knowledge Acquisition and Representation of the General Auxiliary Diagnosis System for Common Disease of Animal. CCTA (2) 2008: 947-952 - [c6]Jianhua Xiao, Hongbin Wang, Ru Zhang, Peixian Luan, Lin Li, Danning Xu:
The Development of a General Auxiliary Diagnosis System for Common Disease of Animal. CCTA (2) 2008: 953-958 - [c5]Hongbin Wang, Danning Xu, Jianhua Xiao, Ru Zhang, Jing Dong:
The Relationship between Monthdisease incidence Rate and climatic factor of Classical Swine Fever. CCTA (2) 2008: 959-966 - [c4]Hongbin Wang, Duqiang Gong, Jianhua Xiao, Ru Zhang, Lin Li:
One Prediction Model Based on BP Neural Network for Newcastle Disease. CCTA (2) 2008: 1209-1216 - 2006
- [c3]Ru Zhang, Xiao-gang Yu, Linna Zhou, Hong-peng Li:
A New Watermarking Protocol of Copyright Protection. IIH-MSP 2006: 83-88 - [c2]Ming Chen, Ru Zhang, Xinxin Niu, Yixian Yang:
Analysis of Current Steganography Tools: Classifications & Features. IIH-MSP 2006: 384-387 - 2005
- [c1]Chunguang Ji, Ru Zhang, Shitao Wen, Shiyong Li:
Flame Image of Pint-Sized Power Plant's Boiler Denoising Using Wavelet-Domain HMT Models. ICIC (2) 2005: 910-919
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint