dblp: Ru Zhang
https://dblp.org/pid/80/446.html
dblp person page RSS feedFri, 13 Dec 2024 19:10:04 +0100en-USdaily1released under the CC0 1.0 licensedblp@dagstuhl.de (dblp team)dblp@dagstuhl.de (dblp team)Computers/Computer_Science/Publications/Bibliographieshttp://www.rssboard.org/rss-specificationhttps://dblp.org/img/logo.144x51.pngdblp: Ru Zhanghttps://dblp.org/pid/80/446.html14451Hyperscale data analysis oriented optimization mechanisms for higher education management systems platforms with evolutionary intelligence.https://doi.org/10.1016/j.asoc.2024.111460Ru Zhang, Zihan Meng, Hongli Wang, Tianhe Liu, Guan Wang, Lu Zheng, Cong Wang: Hyperscale data analysis oriented optimization mechanisms for higher education management systems platforms with evolutionary intelligence.Appl. Soft Comput.155: 111460 (2024)]]>https://dblp.org/rec/journals/asc/ZhangMWLWZW24Mon, 01 Jan 2024 00:00:00 +0100MvMRL: a multi-view molecular representation learning method for molecular property prediction.https://doi.org/10.1093/bib/bbae298Ru Zhang, Yanmei Lin, Yijia Wu, Lei Deng, Hao Zhang, Mingzhi Liao, Yuzhong Peng: MvMRL: a multi-view molecular representation learning method for molecular property prediction.Briefings Bioinform.25(4) (2024)]]>https://dblp.org/rec/journals/bib/ZhangLWDZLP24Mon, 01 Jan 2024 00:00:00 +0100Robust 3D phase retrieval via compressed support detection from snapshot diffraction pattern.https://doi.org/10.1016/j.compbiomed.2024.108644Cheng Zhang, Liru Zhang, Ru Zhang, Mingsheng Chen, Sui Wei: Robust 3D phase retrieval via compressed support detection from snapshot diffraction pattern.Comput. Biol. Medicine177: 108644 (2024)]]>https://dblp.org/rec/journals/cbm/ZhangZZCW24Mon, 01 Jan 2024 00:00:00 +0100An exact solution method for seru scheduling problems considering past-sequence-dependent setup time and adjustment activities.https://doi.org/10.1504/IJADS.2024.137008Ru Zhang, Zhe Zhang, Xiaoling Song, Yong Yin: An exact solution method for seru scheduling problems considering past-sequence-dependent setup time and adjustment activities.Int. J. Appl. Decis. Sci.17(2): 156-181 (2024)]]>https://dblp.org/rec/journals/ijads/ZhangZSY24Mon, 01 Jan 2024 00:00:00 +0100Research on multi-center assisted diagnosis of ASD based on multimodal feature fusion.https://doi.org/10.1002/ima.23110Ru Zhang, Fangmin Sheng, Lei Wang, Weiming Zeng: Research on multi-center assisted diagnosis of ASD based on multimodal feature fusion.Int. J. Imaging Syst. Technol.34(3) (2024)]]>https://dblp.org/rec/journals/imst/ZhangSWZ24Mon, 01 Jan 2024 00:00:00 +0100Spatio-temporal coherent snapshot compressed imaging with time-varying composite phase masks.https://doi.org/10.1016/j.sigpro.2023.109358Cheng Zhang, Ru Zhang, Liru Zhang, Mingsheng Chen, Hong Cheng, Chuan Shen, Quanbin Zhang, Sui Wei: Spatio-temporal coherent snapshot compressed imaging with time-varying composite phase masks.Signal Process.218: 109358 (2024)]]>https://dblp.org/rec/journals/sigpro/ZhangZZCCSZW24Mon, 01 Jan 2024 00:00:00 +0100A Semantic Controllable Long Text Steganography Framework Based on LLM Prompt Engineering and Knowledge Graph.https://doi.org/10.1109/LSP.2024.3456636Yihao Li, Ru Zhang, Jianyi Liu, Qi Lei: A Semantic Controllable Long Text Steganography Framework Based on LLM Prompt Engineering and Knowledge Graph.IEEE Signal Process. Lett.31: 2610-2614 (2024)]]>https://dblp.org/rec/journals/spl/LiZLL24Mon, 01 Jan 2024 00:00:00 +0100Semantic-Aware UAV Swarm Coordination in the Metaverse: A Reputation-Based Incentive Mechanism.https://doi.org/10.1109/TMC.2024.3438152Jiaqi Xu, Haipeng Yao, Ru Zhang, Tianle Mai, Shan Huang, Zehui Xiong, Dusit Niyato: Semantic-Aware UAV Swarm Coordination in the Metaverse: A Reputation-Based Incentive Mechanism.IEEE Trans. Mob. Comput.23(12): 13821-13833 (2024)]]>https://dblp.org/rec/journals/tmc/XuYZMHXN24Sun, 01 Dec 2024 00:00:00 +0100Generative Image Steganography Based on Guidance Feature Distribution.https://doi.org/10.1145/3625297Youqiang Sun, Jianyi Liu, Ru Zhang: Generative Image Steganography Based on Guidance Feature Distribution.ACM Trans. Multim. Comput. Commun. Appl.20(11): 336:1-336:18 (2024)]]>https://dblp.org/rec/journals/tomccap/SunLZ24Fri, 01 Nov 2024 00:00:00 +0100Federated Learning Powered Semantic Communication for UAV Swarm Cooperation.https://doi.org/10.1109/MWC.005.2300147Jiaqi Xu, Haipeng Yao, Ru Zhang, Tianle Mai, Shan Huang, Song Guo: Federated Learning Powered Semantic Communication for UAV Swarm Cooperation.IEEE Wirel. Commun.31(4): 140-146 (2024)]]>https://dblp.org/rec/journals/wc/XuYZMHG24Thu, 01 Aug 2024 01:00:00 +0200Research on Personalized Hybrid Recommendation System for English Word Learning.https://doi.org/10.1007/978-3-031-64312-5_33Jianwei Li, Mingrui Xu, Yuyao Zhou, Ru Zhang: Research on Personalized Hybrid Recommendation System for English Word Learning.AIED Companion (2)2024: 275-282]]>https://dblp.org/rec/conf/aied/LiXZZ24Mon, 01 Jan 2024 00:00:00 +0100An Enhanced Prompt-Based LLM Reasoning Scheme via Knowledge Graph-Integrated Collaboration.https://doi.org/10.1007/978-3-031-72344-5_17Yihao Li, Ru Zhang, Jianyi Liu: An Enhanced Prompt-Based LLM Reasoning Scheme via Knowledge Graph-Integrated Collaboration.ICANN (5)2024: 251-265]]>https://dblp.org/rec/conf/icann/LiZL24Mon, 01 Jan 2024 00:00:00 +0100Controllable Semantic Linguistic Steganography via Summarization Generation.https://doi.org/10.1109/ICASSP48485.2024.10447545Ruifan Zhang, Jianyi Liu, Ru Zhang: Controllable Semantic Linguistic Steganography via Summarization Generation.ICASSP2024: 4560-4564]]>https://dblp.org/rec/conf/icassp/ZhangLZ24bMon, 01 Jan 2024 00:00:00 +0100Multi-Grained Multimodal Interaction Network for Sentiment Analysis.https://doi.org/10.1109/ICASSP48485.2024.10446351Lingyong Fang, Gongshen Liu, Ru Zhang: Multi-Grained Multimodal Interaction Network for Sentiment Analysis.ICASSP2024: 7730-7734]]>https://dblp.org/rec/conf/icassp/FangLZ24Mon, 01 Jan 2024 00:00:00 +0100The Continuum Hypothesis Implies the Existence of Non-principal Arithmetical Ultrafilters - A Coq Formal Verification.https://doi.org/10.1007/978-981-96-0617-7_15Guowei Dou, Si Chen, Wensheng Yu, Ru Zhang: The Continuum Hypothesis Implies the Existence of Non-principal Arithmetical Ultrafilters - A Coq Formal Verification.ICFEM2024: 257-277]]>https://dblp.org/rec/conf/icfem/DouCYZ24Mon, 01 Jan 2024 00:00:00 +0100An Images Regeneration Method for CG Anti-Forensics Based on Sensor Device Trace.https://doi.org/10.1109/ICME57554.2024.10688125Yihong Lu, Jianyi Liu, Ru Zhang: An Images Regeneration Method for CG Anti-Forensics Based on Sensor Device Trace.ICME2024: 1-6]]>https://dblp.org/rec/conf/icmcs/LuLZ24Mon, 01 Jan 2024 00:00:00 +0100Attack Behavior Extraction Based on Heterogeneous Threat Intelligence Graphs and Data Augmentation.https://doi.org/10.1109/IJCNN60899.2024.10650068Jingwen Li, Ru Zhang, Jianyi Liu: Attack Behavior Extraction Based on Heterogeneous Threat Intelligence Graphs and Data Augmentation.IJCNN2024: 1-9]]>https://dblp.org/rec/conf/ijcnn/LiZL24Mon, 01 Jan 2024 00:00:00 +0100LLsM: Generative Linguistic Steganography with Large Language Model.https://doi.org/10.48550/arXiv.2401.15656Yihao Wang, Ruiqi Song, Ru Zhang, Jianyi Liu, Lingxiao Li: LLsM: Generative Linguistic Steganography with Large Language Model.CoRRabs/2401.15656 (2024)]]>https://dblp.org/rec/journals/corr/abs-2401-15656Mon, 01 Jan 2024 00:00:00 +0100An Enhanced Prompt-Based LLM Reasoning Scheme via Knowledge Graph-Integrated Collaboration.https://doi.org/10.48550/arXiv.2402.04978Yihao Li, Ru Zhang, Jianyi Liu, Gongshen Liu: An Enhanced Prompt-Based LLM Reasoning Scheme via Knowledge Graph-Integrated Collaboration.CoRRabs/2402.04978 (2024)]]>https://dblp.org/rec/journals/corr/abs-2402-04978Mon, 01 Jan 2024 00:00:00 +0100Linguistic Steganalysis via LLMs: Two Modes for Efficient Detection of Strongly Concealed Stego.https://doi.org/10.48550/arXiv.2406.04218Yifan Tang, Yihao Wang, Ru Zhang, Jianyi Liu: Linguistic Steganalysis via LLMs: Two Modes for Efficient Detection of Strongly Concealed Stego.CoRRabs/2406.04218 (2024)]]>https://dblp.org/rec/journals/corr/abs-2406-04218Mon, 01 Jan 2024 00:00:00 +0100Pseudo-label Based Domain Adaptation for Zero-Shot Text Steganalysis.https://doi.org/10.48550/arXiv.2406.18565Yufei Luo, Zhen Yang, Ru Zhang, Jianyi Liu: Pseudo-label Based Domain Adaptation for Zero-Shot Text Steganalysis.CoRRabs/2406.18565 (2024)]]>https://dblp.org/rec/journals/corr/abs-2406-18565Mon, 01 Jan 2024 00:00:00 +0100LICM: Effective and Efficient Long Interest Chain Modeling for News Recommendation.https://doi.org/10.48550/arXiv.2408.00859Zhen Yang, Wenhui Wang, Tao Qi, Peng Zhang, Tianyun Zhang, Ru Zhang, Jianyi Liu, Yongfeng Huang: LICM: Effective and Efficient Long Interest Chain Modeling for News Recommendation.CoRRabs/2408.00859 (2024)]]>https://dblp.org/rec/journals/corr/abs-2408-00859Mon, 01 Jan 2024 00:00:00 +0100Current Status and Trends in Image Anti-Forensics Research: A Bibliometric Analysis.https://doi.org/10.48550/arXiv.2408.11365Yihong Lu, Jianyi Liu, Ru Zhang: Current Status and Trends in Image Anti-Forensics Research: A Bibliometric Analysis.CoRRabs/2408.11365 (2024)]]>https://dblp.org/rec/journals/corr/abs-2408-11365Mon, 01 Jan 2024 00:00:00 +0100State-of-the-art Advances of Deep-learning Linguistic Steganalysis Research.https://doi.org/10.48550/arXiv.2409.01780Yihao Wang, Ru Zhang, Yifan Tang, Jianyi Liu: State-of-the-art Advances of Deep-learning Linguistic Steganalysis Research.CoRRabs/2409.01780 (2024)]]>https://dblp.org/rec/journals/corr/abs-2409-01780Mon, 01 Jan 2024 00:00:00 +0100HybridFlow: A Flexible and Efficient RLHF Framework.https://doi.org/10.48550/arXiv.2409.19256Guangming Sheng, Chi Zhang, Zilingfeng Ye, Xibin Wu, Wang Zhang, Ru Zhang, Yanghua Peng, Haibin Lin, Chuan Wu: HybridFlow: A Flexible and Efficient RLHF Framework.CoRRabs/2409.19256 (2024)]]>https://dblp.org/rec/journals/corr/abs-2409-19256Mon, 01 Jan 2024 00:00:00 +0100Large capacity generative image steganography via image style transfer and feature-wise deep fusion.https://doi.org/10.1007/s10489-023-04993-8Youqiang Sun, Jianyi Liu, Ru Zhang: Large capacity generative image steganography via image style transfer and feature-wise deep fusion.Appl. Intell.53(23): 28675-28693 (2023)]]>https://dblp.org/rec/journals/apin/SunLZ23Fri, 01 Dec 2023 00:00:00 +0100Evolutionary machine learning builds smart education big data platform: Data-driven higher education.https://doi.org/10.1016/j.asoc.2023.110114Lu Zheng, Cong Wang, Xue Chen, Yihang Song, Zihan Meng, Ru Zhang: Evolutionary machine learning builds smart education big data platform: Data-driven higher education.Appl. Soft Comput.136: 110114 (2023)]]>https://dblp.org/rec/journals/asc/ZhengWCSMZ23Wed, 01 Mar 2023 00:00:00 +0100Intelligent analysis system of college students' employment and entrepreneurship situation: Big data and artificial intelligence-driven approach.https://doi.org/10.1016/j.compeleceng.2023.108823Huan Yu, Ru Zhang, Cheonshik Kim: Intelligent analysis system of college students' employment and entrepreneurship situation: Big data and artificial intelligence-driven approach.Comput. Electr. Eng.110: 108823 (2023)]]>https://dblp.org/rec/journals/cee/YuZK23Fri, 01 Sep 2023 01:00:00 +0200Reformulation and exact solution method for seru scheduling problem with learning effect and job deterioration.https://doi.org/10.1504/IJADS.2023.133228Ru Zhang, Zhe Zhang, Xue Gong, Yong Yin: Reformulation and exact solution method for seru scheduling problem with learning effect and job deterioration.Int. J. Appl. Decis. Sci.16(5): 613-645 (2023)]]>https://dblp.org/rec/journals/ijads/ZhangZGY23Sun, 01 Jan 2023 00:00:00 +0100Consumer behaviour data mining of social e-commerce platform based on improved spectral clustering algorithm.https://doi.org/10.1504/IJWBC.2023.134862Ru Zhang: Consumer behaviour data mining of social e-commerce platform based on improved spectral clustering algorithm.Int. J. Web Based Communities19(4): 291-304 (2023)]]>https://dblp.org/rec/journals/ijwbc/Zhang23aSun, 01 Jan 2023 00:00:00 +0100Web of science-based virtual brand communities: a bibliometric review between 2000 and 2020.https://doi.org/10.1108/INTR-11-2021-0800Jian Zheng, Renjing Liu, Xingju Zhong, Ru Zhang: Web of science-based virtual brand communities: a bibliometric review between 2000 and 2020.Internet Res.33(2): 606-637 (2023)]]>https://dblp.org/rec/journals/intr/ZhengLZZ23Sun, 01 Jan 2023 00:00:00 +0100V-A3tS: A rapid text steganalysis method based on position information and variable parameter multi-head self-attention controlled by length.https://doi.org/10.1016/j.jisa.2023.103512Yihao Wang, Ru Zhang, Jianyi Liu: V-A3tS: A rapid text steganalysis method based on position information and variable parameter multi-head self-attention controlled by length.J. Inf. Secur. Appl.75: 103512 (2023)]]>https://dblp.org/rec/journals/istr/WangZL23Thu, 01 Jun 2023 01:00:00 +0200MCW: A Generalizable Deepfake Detection Method for Few-Shot Learning.https://doi.org/10.3390/s23218763Lei Guan, Fan Liu, Ru Zhang, Jianyi Liu, Yifan Tang: MCW: A Generalizable Deepfake Detection Method for Few-Shot Learning.Sensors23(21): 8763 (2023)]]>https://dblp.org/rec/journals/sensors/GuanLZLT23Sun, 01 Oct 2023 01:00:00 +0200ConLBS: An Attack Investigation Approach Using Contrastive Learning with Behavior Sequence.https://doi.org/10.3390/s23249881Jiawei Li, Ru Zhang, Jianyi Liu: ConLBS: An Attack Investigation Approach Using Contrastive Learning with Behavior Sequence.Sensors23(24): 9881 (2023)]]>https://dblp.org/rec/journals/sensors/LiZL23aFri, 01 Dec 2023 00:00:00 +0100Linguistic Steganalysis by Enhancing and Integrating Local and Global Features.https://doi.org/10.1109/LSP.2023.3238283Qiong Xu, Ru Zhang, Jianyi Liu: Linguistic Steganalysis by Enhancing and Integrating Local and Global Features.IEEE Signal Process. Lett.30: 16-20 (2023)]]>https://dblp.org/rec/journals/spl/XuZL23Sun, 01 Jan 2023 00:00:00 +0100RLS-DTS: Reinforcement-Learning Linguistic Steganalysis in Distribution-Transformed Scenario.https://doi.org/10.1109/LSP.2023.3310380Yihao Wang, Ru Zhang, Jianyi Liu: RLS-DTS: Reinforcement-Learning Linguistic Steganalysis in Distribution-Transformed Scenario.IEEE Signal Process. Lett.30: 1232-1236 (2023)]]>https://dblp.org/rec/journals/spl/WangZL23Sun, 01 Jan 2023 00:00:00 +0100T-GraphDTA: A Drug-Target Binding Affinity Prediction Framework Based on Protein Pre-training Model and Hybrid Graph Neural Network.https://doi.org/10.1007/978-981-97-0903-8_12Yijia Wu, Yanmei Lin, Yuzhong Peng, Ru Zhang, Li Cai: T-GraphDTA: A Drug-Target Binding Affinity Prediction Framework Based on Protein Pre-training Model and Hybrid Graph Neural Network.ICAI (1)2023: 113-123]]>https://dblp.org/rec/conf/icai4/WuLPZC23Sun, 01 Jan 2023 00:00:00 +0100A Robust Generative Image Steganography Method based on Guidance Features in Image Synthesis.https://doi.org/10.1109/ICME55011.2023.00018Youqiang Sun, Jianyi Liu, Ru Zhang: A Robust Generative Image Steganography Method based on Guidance Features in Image Synthesis.ICME2023: 55-60]]>https://dblp.org/rec/conf/icmcs/SunLZ23Sun, 01 Jan 2023 00:00:00 +0100Neural Linguistic Steganography with Controllable Security.https://doi.org/10.1109/IJCNN54540.2023.10191218Tianhe Lu, Gongshen Liu, Ru Zhang, Tianjie Ju: Neural Linguistic Steganography with Controllable Security.IJCNN2023: 1-8]]>https://dblp.org/rec/conf/ijcnn/LuLZJ23Sun, 01 Jan 2023 00:00:00 +0100Robust Secret Data Hiding for Transformer-based Neural Machine Translation.https://doi.org/10.1109/IJCNN54540.2023.10191984Tianhe Lu, Gongshen Liu, Ru Zhang, Peixuan Li, Tianjie Ju: Robust Secret Data Hiding for Transformer-based Neural Machine Translation.IJCNN2023: 1-8]]>https://dblp.org/rec/conf/ijcnn/LuLZLJ23Sun, 01 Jan 2023 00:00:00 +0100How Older Adults' Moments Sharing in SNS Contributes to Their Subjective Well-Being?https://doi.org/10.1007/978-3-031-32299-0_13Ru Zhang, Wenlong Liu, Yi Jiang, Shenghui Sang: How Older Adults' Moments Sharing in SNS Contributes to Their Subjective Well-Being?WHICEB (1)2023: 143-155]]>https://dblp.org/rec/conf/whiceb/ZhangLJS23Sun, 01 Jan 2023 00:00:00 +0100UP4LS: User Profile Constructed by Multiple Attributes for Enhancing Linguistic Steganalysis.https://doi.org/10.48550/arXiv.2311.01775Yihao Wang, Ruiqi Song, Ru Zhang, Jianyi Liu: UP4LS: User Profile Constructed by Multiple Attributes for Enhancing Linguistic Steganalysis.CoRRabs/2311.01775 (2023)]]>https://dblp.org/rec/journals/corr/abs-2311-01775Sun, 01 Jan 2023 00:00:00 +0100Integration of multi-omics technologies for crop improvement: Status and prospects.https://doi.org/10.3389/fbinf.2022.1027457Ru Zhang, Cuiping Zhang, Chengyu Yu, Jungang Dong, Jihong Hu: Integration of multi-omics technologies for crop improvement: Status and prospects.Frontiers Bioinform.2 (2022)]]>https://dblp.org/rec/journals/fbinf/ZhangZYDH22Sat, 01 Jan 2022 00:00:00 +0100Degree Conditions for Completely Independent Spanning Trees of Bipartite Graphs.https://doi.org/10.1007/s00373-022-02585-wJun Yuan, Ru Zhang, Aixia Liu: Degree Conditions for Completely Independent Spanning Trees of Bipartite Graphs.Graphs Comb.38(6): 179 (2022)]]>https://dblp.org/rec/journals/gc/YuanZL22Sat, 01 Jan 2022 00:00:00 +0100Two statistical traffic features for certain APT group identification.https://doi.org/10.1016/j.jisa.2022.103207Jianyi Liu, Ying Liu, Jingwen Li, Wenxin Sun, Jie Cheng, Ru Zhang, Xingjie Huang, Jin Pang: Two statistical traffic features for certain APT group identification.J. Inf. Secur. Appl.67: 103207 (2022)]]>https://dblp.org/rec/journals/istr/LiuLLSCZHP22Sat, 01 Jan 2022 00:00:00 +0100A social commerce purchasing decision model with trust network and item review information.https://doi.org/10.1016/j.knosys.2021.107628Tong Wu, Ru Zhang, Xinwang Liu, Fang Liu, Yi Ding: A social commerce purchasing decision model with trust network and item review information.Knowl. Based Syst.235: 107628 (2022)]]>https://dblp.org/rec/journals/kbs/WuZLLD22Sat, 01 Jan 2022 00:00:00 +0100Faithful quantum entanglement purification and concentration using heralded high-fidelity parity-check detectors based on quantum-dot-microcavity systems.https://doi.org/10.1007/s11128-021-03371-yPan-pan Yin, Cong Cao, Yu-Hong Han, Ling Fan, Ru Zhang: Faithful quantum entanglement purification and concentration using heralded high-fidelity parity-check detectors based on quantum-dot-microcavity systems.Quantum Inf. Process.21(1): 17 (2022)]]>https://dblp.org/rec/journals/qip/YinCHFZ22Sat, 01 Jan 2022 00:00:00 +0100Linguistic Steganalysis Merging Semantic and Statistical Features.https://doi.org/10.1109/LSP.2022.3212630Shengnan Guo, Jianyi Liu, Zhongliang Yang, Weike You, Ru Zhang: Linguistic Steganalysis Merging Semantic and Statistical Features.IEEE Signal Process. Lett.29: 2128-2132 (2022)]]>https://dblp.org/rec/journals/spl/GuoLYYZ22Sat, 01 Jan 2022 00:00:00 +0100A Robust Deepfake Video Detection Method based on Continuous Frame Face-swapping.https://doi.org/10.1109/AIIPCC57291.2022.00048Dazhuang Liu, Zhen Yang, Ru Zhang, Jianyi Liu: A Robust Deepfake Video Detection Method based on Continuous Frame Face-swapping.AIIPCC2022: 188-191]]>https://dblp.org/rec/conf/aiipcc/LiuYZL22Sat, 01 Jan 2022 00:00:00 +0100Distant Supervised Relation Extraction Based on Sentence-Level Attention with Relation Alignment.https://doi.org/10.1007/978-3-031-06794-5_12Jing Li, Xingjie Huang, Yating Gao, Jianyi Liu, Ru Zhang, Jinmeng Zhao: Distant Supervised Relation Extraction Based on Sentence-Level Attention with Relation Alignment.ICAIS (1)2022: 142-152]]>https://dblp.org/rec/conf/icccsec/LiHGLZZ22Sat, 01 Jan 2022 00:00:00 +0100A CNN Based Visual Audio Steganography Model.https://doi.org/10.1007/978-3-031-06794-5_35Ru Zhang, Hao Dong, Zhen Yang, Wenbo Ying, Jianyi Liu: A CNN Based Visual Audio Steganography Model.ICAIS (1)2022: 431-442]]>https://dblp.org/rec/conf/icccsec/ZhangDYYL22Sat, 01 Jan 2022 00:00:00 +0100An encrypted traffic classification method based on contrastive learning.https://doi.org/10.1145/3571662.3571678Siyuan Tian, Yating Gao, Guoquan Yuan, Ru Zhang, Jinmeng Zhao, Song Zhang: An encrypted traffic classification method based on contrastive learning.ICCIP2022: 101-105]]>https://dblp.org/rec/conf/iccip/TianGYZZZ22Sat, 01 Jan 2022 00:00:00 +0100Sense-aware BERT and Multi-task Fine-tuning for Multimodal Sentiment Analysis.https://doi.org/10.1109/IJCNN55064.2022.9892116Lingyong Fang, Gongshen Liu, Ru Zhang: Sense-aware BERT and Multi-task Fine-tuning for Multimodal Sentiment Analysis.IJCNN2022: 1-8]]>https://dblp.org/rec/conf/ijcnn/FangLZ22Sat, 01 Jan 2022 00:00:00 +0100T-GRU: conTextual Gated Recurrent Unit model for high quality Linguistic Steganography.https://doi.org/10.1109/WIFS55849.2022.9975301Zhen Yang, Zihan Xu, Ru Zhang, Yongfeng Huang: T-GRU: conTextual Gated Recurrent Unit model for high quality Linguistic Steganography.WIFS2022: 1-6]]>https://dblp.org/rec/conf/wifs/YangXZH22Sat, 01 Jan 2022 00:00:00 +0100Chinese Short Text Entity Linking Model Based on PET.https://doi.org/10.1145/3568364.3568378Xiaofan Yan, Jie Cheng, Ru Zhang, Jiahui Wei, Liandong Chen, Kai Cheng: Chinese Short Text Entity Linking Model Based on PET.WSSE2022: 87-92]]>https://dblp.org/rec/conf/wsse/YanCZWCC22Sat, 01 Jan 2022 00:00:00 +0100LogKernel A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering.https://doi.org/10.48550/arXiv.2208.08820Jiawei Li, Ru Zhang, Jianyi Liu, Gongshen Liu: LogKernel A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering.CoRRabs/2208.08820 (2022)]]>https://dblp.org/rec/journals/corr/abs-2208-08820Sat, 01 Jan 2022 00:00:00 +0100The prognosis prediction significance of Hounsfield unit value for stroke patients treated by intravenous thrombolysis.https://doi.org/10.1186/s12880-021-00592-6Zhengqi Zhu, Ru Zhang, Kaixuan Ren, Ruochen Cong, Xiangyang Zhu, Li Zhu, Tianle Wang: The prognosis prediction significance of Hounsfield unit value for stroke patients treated by intravenous thrombolysis.BMC Medical Imaging21(1): 62 (2021)]]>https://dblp.org/rec/journals/bmcmi/ZhuZRCZZW21Fri, 01 Jan 2021 00:00:00 +0100A video steganalysis method based on coding cost variation.https://doi.org/10.1177/1550147721992730Jianyi Liu, Cong Zhang, Ru Zhang, Yi Li, Jie Cheng: A video steganalysis method based on coding cost variation.Int. J. Distributed Sens. Networks17(2): 155014772199273 (2021)]]>https://dblp.org/rec/journals/ijdsn/LiuZZLC21Fri, 01 Jan 2021 00:00:00 +0100Quantum secure multi-party summation protocol based on blind matrix and quantum Fourier transform.https://doi.org/10.1007/s11128-021-03183-0Xin Yi, Cong Cao, Ling Fan, Ru Zhang: Quantum secure multi-party summation protocol based on blind matrix and quantum Fourier transform.Quantum Inf. Process.20(7): 1-20 (2021)]]>https://dblp.org/rec/journals/qip/YiCFZ21Fri, 01 Jan 2021 00:00:00 +0100Topic-aware Neural Linguistic Steganography Based on Knowledge Graphs.https://doi.org/10.1145/3418598Yamin Li, Jun Zhang, Zhongliang Yang, Ru Zhang: Topic-aware Neural Linguistic Steganography Based on Knowledge Graphs.Trans. Data Sci.2(2): 10:1-10:13 (2021)]]>https://dblp.org/rec/journals/tdasci/LiZYZ21Fri, 01 Jan 2021 00:00:00 +0100User Experience for Multi-Device Ecosystems: Challenges and Opportunities.https://doi.org/10.1145/3411763.3441325Ru Zhang, Yuanchun Shi, Björn W. Schuller, Elisabeth André, Sharon L. Oviatt, Aaron Quigley, Nicolai Marquardt, Ilhan Aslan, Ran Ju: User Experience for Multi-Device Ecosystems: Challenges and Opportunities.CHI Extended Abstracts2021: 111:1-111:5]]>https://dblp.org/rec/conf/chi/ZhangSSAOQMAJ21Fri, 01 Jan 2021 00:00:00 +0100A Reversible Digital Watermarking Algorithm Based on Medical Images via Threshold Segmentation and Contrast Enhancement.https://doi.org/10.1007/978-3-030-87358-5_55Jin Pang, Xingjie Huang, Ru Zhang, Jianyi Liu, Yue Wang, Youqiang Sun: A Reversible Digital Watermarking Algorithm Based on Medical Images via Threshold Segmentation and Contrast Enhancement.ICIG (2)2021: 675-690]]>https://dblp.org/rec/conf/icig/PangHZLWS21Fri, 01 Jan 2021 00:00:00 +0100Carrier Robust Reversible Watermark Model Based on Image Block Chain Authentication.https://doi.org/10.1007/978-3-030-87355-4_59Yating Gao, Ru Zhang, Xianxu Li, Jianyi Liu, Kaifeng Zhao, Xue Cheng: Carrier Robust Reversible Watermark Model Based on Image Block Chain Authentication.ICIG (1)2021: 712-724]]>https://dblp.org/rec/conf/icig/GaoZLLZC21Fri, 01 Jan 2021 00:00:00 +0100A Controllable Image Steganography with Chaos and User Key.https://doi.org/10.1007/978-3-030-87355-4_65Jianyi Liu, Yuhan Wang, Zhen Yang, Ruifan Zhang, Ru Zhang: A Controllable Image Steganography with Chaos and User Key.ICIG (1)2021: 785-797]]>https://dblp.org/rec/conf/icig/LiuWYZZ21Fri, 01 Jan 2021 00:00:00 +0100Research on Energy Saving Mechanism of NB-IoT Based on eDRX.https://doi.org/10.1109/VTC2021-Spring51267.2021.9449020Errong Pei, Ru Zhang, Yun Li: Research on Energy Saving Mechanism of NB-IoT Based on eDRX.VTC Spring2021: 1-6]]>https://dblp.org/rec/conf/vtc/PeiZL21aFri, 01 Jan 2021 00:00:00 +0100A Two-Stage Generative Adversarial Networks With Semantic Content Constraints for Adversarial Example Generation.https://doi.org/10.1109/ACCESS.2020.3037329Jianyi Liu, Yu Tian, Ru Zhang, Youqiang Sun, Chan Wang: A Two-Stage Generative Adversarial Networks With Semantic Content Constraints for Adversarial Example Generation.IEEE Access8: 205766-205777 (2020)]]>https://dblp.org/rec/journals/access/LiuTZSW20Wed, 01 Jan 2020 00:00:00 +0100A "User-Knowledge-Product" Co-Creation Cyberspace Model for Product Innovation.https://doi.org/10.1155/2020/7190169Yu Wang, Jiacong Wu, Ru Zhang, Sara Shafiee, Cheng Li: A "User-Knowledge-Product" Co-Creation Cyberspace Model for Product Innovation.Complex.2020: 7190169:1-7190169:20 (2020)]]>https://dblp.org/rec/journals/complexity/WangWZSL20Wed, 01 Jan 2020 00:00:00 +0100A Fully Reversible Data Hiding Scheme in Encrypted Images Based on Homomorphic Encryption and Pixel Prediction.https://doi.org/10.1007/s00034-019-01321-9Jianyi Liu, Kaifeng Zhao, Ru Zhang: A Fully Reversible Data Hiding Scheme in Encrypted Images Based on Homomorphic Encryption and Pixel Prediction.Circuits Syst. Signal Process.39(7): 3532-3552 (2020)]]>https://dblp.org/rec/journals/cssp/LiuZZ20Wed, 01 Jan 2020 00:00:00 +0100Sustainable quality control mechanism of heavy truck production process for Plant-wide production process.https://doi.org/10.1080/00207543.2020.1844918Hongfei Guo, Ru Zhang, Yingxin Zhu, Ting Qu, Min Zou, Xiangyue Chen, Yaping Ren, Zhihui He: Sustainable quality control mechanism of heavy truck production process for Plant-wide production process.Int. J. Prod. Res.58(24): 7548-7564 (2020)]]>https://dblp.org/rec/journals/ijpr/GuoZZQZCRH20Wed, 01 Jan 2020 00:00:00 +0100Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Steganalysis.https://doi.org/10.1109/TIFS.2019.2936913Ru Zhang, Feng Zhu, Jianyi Liu, Gongshen Liu: Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Steganalysis.IEEE Trans. Inf. Forensics Secur.15: 1138-1150 (2020)]]>https://dblp.org/rec/journals/tifs/ZhangZLL20Wed, 01 Jan 2020 00:00:00 +0100An empirical study on program failures of deep learning jobs.https://doi.org/10.1145/3377811.3380362Ru Zhang, Wencong Xiao, Hongyu Zhang, Yu Liu, Haoxiang Lin, Mao Yang: An empirical study on program failures of deep learning jobs.ICSE2020: 1159-1170]]>https://dblp.org/rec/conf/icse/ZhangXZLLY20Wed, 01 Jan 2020 00:00:00 +0100DUES-Adapt: Exploring Distributed User Experience With Neural UI Adaptation.https://doi.org/10.1145/3379336.3381464Ran Ju, Xingchen Zhou, Bo Xu, Weiqing Liang, Wanyi Yang, Yuan Cao, Eryan Zhang, Ronggen Li, Yinghao Li, Ning Ding, Li Li, Ru Zhang, Dongliang Liu: DUES-Adapt: Exploring Distributed User Experience With Neural UI Adaptation.IUI Companion2020: 91-92]]>https://dblp.org/rec/conf/iui/JuZXLYCZLLDLZL20Wed, 01 Jan 2020 00:00:00 +0100Enhancing the interoperability between deep learning frameworks by model conversion.https://doi.org/10.1145/3368089.3417051Yu Liu, Cheng Chen, Ru Zhang, Tingting Qin, Xiang Ji, Haoxiang Lin, Mao Yang: Enhancing the interoperability between deep learning frameworks by model conversion.ESEC/SIGSOFT FSE2020: 1320-1330]]>https://dblp.org/rec/conf/sigsoft/LiuCZQJLY20Wed, 01 Jan 2020 00:00:00 +0100Constructing feature variation coefficients to evaluate feature learning capabilities of convolutional layers in steganographic detection algorithms of spatial domain.https://arxiv.org/abs/2010.10140Ru Zhang, Sheng Zou, Jianyi Liu, Bingjie Lin, Dazhuang Liu: Constructing feature variation coefficients to evaluate feature learning capabilities of convolutional layers in steganographic detection algorithms of spatial domain.CoRRabs/2010.10140 (2020)]]>https://dblp.org/rec/journals/corr/abs-2010-10140Wed, 01 Jan 2020 00:00:00 +0100Construction of Two Statistical Anomaly Features for Small-Sample APT Attack Traffic Classification.https://arxiv.org/abs/2010.13978Ru Zhang, Wenxin Sun, Jianyi Liu, Jingwen Li, Guan Lei, Han Guo: Construction of Two Statistical Anomaly Features for Small-Sample APT Attack Traffic Classification.CoRRabs/2010.13978 (2020)]]>https://dblp.org/rec/journals/corr/abs-2010-13978Wed, 01 Jan 2020 00:00:00 +0100A high capacity reversible data hiding scheme for encrypted covers based on histogram shifting.https://doi.org/10.1016/j.jisa.2019.05.005Ru Zhang, Chunjing Lu, Jianyi Liu: A high capacity reversible data hiding scheme for encrypted covers based on histogram shifting.J. Inf. Secur. Appl.47: 199-207 (2019)]]>https://dblp.org/rec/journals/istr/ZhangLL19Tue, 01 Jan 2019 00:00:00 +0100A Sequential Design Approach for Calibrating Dynamic Computer Simulators.https://doi.org/10.1137/18M1224544Ru Zhang, C. Devon Lin, Pritam Ranjan: A Sequential Design Approach for Calibrating Dynamic Computer Simulators.SIAM/ASA J. Uncertain. Quantification7(4): 1245-1274 (2019)]]>https://dblp.org/rec/journals/juq/ZhangLR19Tue, 01 Jan 2019 00:00:00 +0100Invisible steganography via generative adversarial networks.https://doi.org/10.1007/s11042-018-6951-zRu Zhang, Shiqi Dong, Jianyi Liu: Invisible steganography via generative adversarial networks.Multim. Tools Appl.78(7): 8559-8575 (2019)]]>https://dblp.org/rec/journals/mta/ZhangDL19Tue, 01 Jan 2019 00:00:00 +0100Multi-step Attack Scenarios Mining Based on Neural Network and Bayesian Network Attack Graph.https://doi.org/10.1007/978-3-030-24265-7_6Jianyi Liu, Bowen Liu, Ru Zhang, Cong Wang: Multi-step Attack Scenarios Mining Based on Neural Network and Bayesian Network Attack Graph.ICAIS (2)2019: 62-74]]>https://dblp.org/rec/conf/icccsec/LiuLZW19Tue, 01 Jan 2019 00:00:00 +0100Using Downward-Looking Lidar to Detect and Track Traffic.https://doi.org/10.1109/IECON.2019.8927012Haiyang Qiu, Sicong Zhu, Hangbin Wu, Hui Wang, Ru Zhang: Using Downward-Looking Lidar to Detect and Track Traffic.IECON2019: 6297-6302]]>https://dblp.org/rec/conf/iecon/QiuZWWZ19Tue, 01 Jan 2019 00:00:00 +0100Analysis of Message Attacks in Aviation Data-Link Communication.https://doi.org/10.1109/ACCESS.2017.2767059Ru Zhang, Gongshen Liu, Jianyi Liu, Jan P. Nees: Analysis of Message Attacks in Aviation Data-Link Communication.IEEE Access6: 455-463 (2018)]]>https://dblp.org/rec/journals/access/ZhangLLN18Mon, 01 Jan 2018 00:00:00 +0100Modified PSO algorithms with "Request and Reset" for leak source localization using multiple robots.https://doi.org/10.1016/j.neucom.2018.02.078Yuting Yan, Ru Zhang, Ji Wang, Juming Li: Modified PSO algorithms with "Request and Reset" for leak source localization using multiple robots.Neurocomputing292: 82-90 (2018)]]>https://dblp.org/rec/journals/ijon/YanZWL18Mon, 01 Jan 2018 00:00:00 +0100Temperature Compensation of Elasto-Magneto-Electric (EME) Sensors in Cable Force Monitoring Using BP Neural Network.https://doi.org/10.3390/s18072176Ru Zhang, Yuanfeng Duan, Yang Zhao, Xuan He: Temperature Compensation of Elasto-Magneto-Electric (EME) Sensors in Cable Force Monitoring Using BP Neural Network.Sensors18(7): 2176 (2018)]]>https://dblp.org/rec/journals/sensors/ZhangDZH18Mon, 01 Jan 2018 00:00:00 +0100Hotspots Trends and Spatio-Temporal Distributions for an Investigative in the Field of Chinese Educational Technology.https://doi.org/10.1109/GEOINFORMATICS.2018.8557196Yantao Han, Ru Zhang, Yang Yang: Hotspots Trends and Spatio-Temporal Distributions for an Investigative in the Field of Chinese Educational Technology.Geoinformatics2018: 1-5]]>https://dblp.org/rec/conf/geoinformatics/HanZY18Mon, 01 Jan 2018 00:00:00 +0100Network Security Situation Assessment Approach Based on Attack-Defense Stochastic Game Model.https://doi.org/10.1007/978-3-030-00012-7_15Jianyi Liu, Fangyu Weng, Ru Zhang, Yunbiao Guo: Network Security Situation Assessment Approach Based on Attack-Defense Stochastic Game Model.ICCCS (3)2018: 161-173]]>https://dblp.org/rec/conf/icccsec/LiuWZG18Mon, 01 Jan 2018 00:00:00 +0100An Image Steganography Algorithm Based on Pixel Block Difference and Variable Modulus Function.https://doi.org/10.1007/978-3-030-03748-2_5Yu Yang, Ru Zhang, Jianyi Liu, Yuhan Wang, Fuhong Huang: An Image Steganography Algorithm Based on Pixel Block Difference and Variable Modulus Function.IIH-MSP (2)2018: 36-43]]>https://dblp.org/rec/conf/iih-msp/YangZLWH18Mon, 01 Jan 2018 00:00:00 +0100Attack Pattern Mining Algorithm Based on Fuzzy Clustering and Sequence Pattern from Security Log.https://doi.org/10.1007/978-3-030-03748-2_6Jianyi Liu, Keyi Li, Yang Li, Ru Zhang, Xi Duan: Attack Pattern Mining Algorithm Based on Fuzzy Clustering and Sequence Pattern from Security Log.IIH-MSP (2)2018: 44-52]]>https://dblp.org/rec/conf/iih-msp/LiuLLZD18Mon, 01 Jan 2018 00:00:00 +0100Invisible Steganography via Generative Adversarial Network.http://arxiv.org/abs/1807.08571Shiqi Dong, Ru Zhang, Jianyi Liu: Invisible Steganography via Generative Adversarial Network.CoRRabs/1807.08571 (2018)]]>https://dblp.org/rec/journals/corr/abs-1807-08571Mon, 01 Jan 2018 00:00:00 +0100Efficient feature learning and multi-size image steganalysis based on CNN.http://arxiv.org/abs/1807.11428Ru Zhang, Feng Zhu, Jianyi Liu, Gongshen Liu: Efficient feature learning and multi-size image steganalysis based on CNN.CoRRabs/1807.11428 (2018)]]>https://dblp.org/rec/journals/corr/abs-1807-11428Mon, 01 Jan 2018 00:00:00 +0100Dynamic data integrity auditing for secure outsourcing in the cloud.https://doi.org/10.1002/cpe.4096Jinxia Wei, Ru Zhang, Jianyi Liu, Jing Li, Xinxin Niu, Yuangang Yao: Dynamic data integrity auditing for secure outsourcing in the cloud.Concurr. Comput. Pract. Exp.29(12) (2017)]]>https://dblp.org/rec/journals/concurrency/WeiZLLNY17Sun, 01 Jan 2017 00:00:00 +0100Efficient data possession-checking protocol with deduplication in cloud.https://doi.org/10.1177/1550147717727461Jinxia Wei, Xinxin Niu, Ru Zhang, Jianyi Liu, Yuangang Yao: Efficient data possession-checking protocol with deduplication in cloud.Int. J. Distributed Sens. Networks13(8) (2017)]]>https://dblp.org/rec/journals/ijdsn/WeiNZLY17Sun, 01 Jan 2017 00:00:00 +0100Robust video watermarking algorithm for H.264/AVC based on JND model.https://doi.org/10.3837/tiis.2017.05.024Weiwei Zhang, Xin Li, Yuzhao Zhang, Ru Zhang, Lixin Zheng: Robust video watermarking algorithm for H.264/AVC based on JND model.KSII Trans. Internet Inf. Syst.11(5): 2741-2761 (2017)]]>https://dblp.org/rec/journals/itiis/ZhangLZZZ17Sun, 01 Jan 2017 00:00:00 +0100Efficient entanglement concentration of arbitrary unknown less-entangled three-atom W states via photonic Faraday rotation in cavity QED.https://doi.org/10.1007/s11128-017-1549-3Cong Cao, Ling Fan, Xi Chen, Yuwen Duan, Tie-Jun Wang, Ru Zhang, Chuan Wang: Efficient entanglement concentration of arbitrary unknown less-entangled three-atom W states via photonic Faraday rotation in cavity QED.Quantum Inf. Process.16(4): 98 (2017)]]>https://dblp.org/rec/journals/qip/CaoFCDWZW17Sun, 01 Jan 2017 00:00:00 +0100Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering.https://doi.org/10.1155/2017/7536381Ru Zhang, Yanyu Huo, Jianyi Liu, Fangyu Weng: Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering.Secur. Commun. Networks2017: 7536381:1-7536381:9 (2017)]]>https://dblp.org/rec/journals/scn/ZhangHLW17Sun, 01 Jan 2017 00:00:00 +0100Optimal full-duplex relay selection for physical layer security in cooperative wireless networks.https://doi.org/10.1109/ICCChina.2017.8330327Ru Zhang, Fang Liu, Yuanan Liu: Optimal full-duplex relay selection for physical layer security in cooperative wireless networks.ICCC2017: 1-6]]>https://dblp.org/rec/conf/iccchina/ZhangLL17Sun, 01 Jan 2017 00:00:00 +0100A Steganography Algorithm Based on MP3 Linbits Bit of Huffman Codeword.https://doi.org/10.1007/978-3-319-63859-1_22Ru Zhang, Jianyi Liu, Feng Zhu: A Steganography Algorithm Based on MP3 Linbits Bit of Huffman Codeword.IIH-MSP (2)2017: 169-176]]>https://dblp.org/rec/conf/iih-msp/ZhangLZ17Sun, 01 Jan 2017 00:00:00 +0100Attack pattern mining algorithm based on security log.https://doi.org/10.1109/ISI.2017.8004918Keyi Li, Yang Li, Jianyi Liu, Ru Zhang, Xi Duan: Attack pattern mining algorithm based on security log.ISI2017: 205]]>https://dblp.org/rec/conf/isi/LiLLZD17Sun, 01 Jan 2017 00:00:00 +0100Efficient Dynamic Replicated Data Possession Checking in Distributed Cloud Storage Systems.https://doi.org/10.1155/2016/1894713Jinxia Wei, Jianyi Liu, Ru Zhang, Xinxin Niu: Efficient Dynamic Replicated Data Possession Checking in Distributed Cloud Storage Systems.Int. J. Distributed Sens. Networks12(1): 1894713:1-1894713:11 (2016)]]>https://dblp.org/rec/journals/ijdsn/WeiLZN16Fri, 01 Jan 2016 00:00:00 +0100An attack pattern mining algorithm based on fuzzy logic and sequence pattern.https://doi.org/10.1109/CCIS.2016.7790260Yang Li, Ying Xue, Yuangang Yao, Xianghui Zhao, Jianyi Liu, Ru Zhang: An attack pattern mining algorithm based on fuzzy logic and sequence pattern.CCIS2016: 234-238]]>https://dblp.org/rec/conf/ccis/LiXYZLZ16Fri, 01 Jan 2016 00:00:00 +0100An Android malware detection method based on AndroidManifest file.https://doi.org/10.1109/CCIS.2016.7790261Xiang Li, Jianyi Liu, Yanyu Huo, Ru Zhang, Yuangang Yao: An Android malware detection method based on AndroidManifest file.CCIS2016: 239-243]]>https://dblp.org/rec/conf/ccis/LiLHZY16Fri, 01 Jan 2016 00:00:00 +0100Phishing sites detection based on Url Correlation.https://doi.org/10.1109/CCIS.2016.7790262Ying Xue, Yang Li, Yuangang Yao, Xianghui Zhao, Jianyi Liu, Ru Zhang: Phishing sites detection based on Url Correlation.CCIS2016: 244-248]]>https://dblp.org/rec/conf/ccis/XueLYZLZ16Fri, 01 Jan 2016 00:00:00 +0100Efficiently secure multiparty computation based on homomorphic encryption.https://doi.org/10.1109/CCIS.2016.7790281Yuangang Yao, Jinxia Wei, Jianyi Liu, Ru Zhang: Efficiently secure multiparty computation based on homomorphic encryption.CCIS2016: 343-349]]>https://dblp.org/rec/conf/ccis/YaoWLZ16Fri, 01 Jan 2016 00:00:00 +0100Detecting False Information of Social Network in Big Data.https://doi.org/10.1007/978-3-319-59288-6_65Yi Xu, Furong Li, Jianyi Liu, Ru Zhang, Yuangang Yao, Dongfang Zhang: Detecting False Information of Social Network in Big Data.CollaborateCom2016: 642-651]]>https://dblp.org/rec/conf/colcom/XuLLZYZ16Fri, 01 Jan 2016 00:00:00 +0100Privacy preservation based on rotation perturbation in weighted social networks.https://doi.org/10.1109/ISCIT.2016.7751622Furong Li, Ru Zhang, Yi Xu, Jianyi Liu, Juan Li: Privacy preservation based on rotation perturbation in weighted social networks.ISCIT2016: 206-211]]>https://dblp.org/rec/conf/iscit/LiZXLL16Fri, 01 Jan 2016 00:00:00 +0100Testing Contextuality in Cyclic Psychophysical Systems of High Ranks.https://doi.org/10.1007/978-3-319-52289-0_12Ru Zhang, Ehtibar N. Dzhafarov: Testing Contextuality in Cyclic Psychophysical Systems of High Ranks.QI2016: 151-162]]>https://dblp.org/rec/conf/qi/ZhangD16Fri, 01 Jan 2016 00:00:00 +0100Defense Strategy of Network Security based on Dynamic Classification.https://doi.org/10.3837/tiis.2015.12.021Jinxia Wei, Ru Zhang, Jianyi Liu, Xinxin Niu, Yixian Yang: Defense Strategy of Network Security based on Dynamic Classification.KSII Trans. Internet Inf. Syst.9(12): 5116-5134 (2015)]]>https://dblp.org/rec/journals/itiis/WeiZLNY15Thu, 01 Jan 2015 00:00:00 +0100Efficient multipartite entanglement concentration protocol for nitrogen-vacancy center and microresonator coupled systems.https://doi.org/10.1007/s11128-015-0924-1Cong Cao, Hao Ding, Yin Li, Tie-Jun Wang, Si-Chen Mi, Ru Zhang, Chuan Wang: Efficient multipartite entanglement concentration protocol for nitrogen-vacancy center and microresonator coupled systems.Quantum Inf. Process.14(4): 1265-1277 (2015)]]>https://dblp.org/rec/journals/qip/CaoDLWMZW15Thu, 01 Jan 2015 00:00:00 +0100An improved algorithm for community discovery in social networks based on label propagation.https://doi.org/10.1109/FSKD.2015.7382165Ru Zhang, Zongwei Ren: An improved algorithm for community discovery in social networks based on label propagation.FSKD2015: 1493-1497]]>https://dblp.org/rec/conf/fskd/ZhangR15Thu, 01 Jan 2015 00:00:00 +0100Hamiltonian cycle embedding for fault tolerance in balanced hypercubes.https://doi.org/10.1016/j.amc.2014.07.015Rong-Xia Hao, Ru Zhang, Yan-Quan Feng, Jin-Xin Zhou: Hamiltonian cycle embedding for fault tolerance in balanced hypercubes.Appl. Math. Comput.244: 447-456 (2014)]]>https://dblp.org/rec/journals/amc/HaoZFZ14Wed, 01 Jan 2014 00:00:00 +0100Nonlocal entanglement concentration of separate nitrogen-vacancy centers coupling to microtoroidal resonators.https://doi.org/10.26421/QIC14.1-2-6Chuan Wang, Yong Zhang, Ming Lei, Guang-Sheng Jin, Hai-Qiang Ma, Ru Zhang: Nonlocal entanglement concentration of separate nitrogen-vacancy centers coupling to microtoroidal resonators.Quantum Inf. Comput.14(1-2): 107-121 (2014)]]>https://dblp.org/rec/journals/qic/WangZLJMZ14Wed, 01 Jan 2014 00:00:00 +0100Smart Elasto-Magneto-Electric (EME) Sensors for Stress Monitoring of Steel Cables: Design Theory and Experimental Validation.https://doi.org/10.3390/s140813644Ru Zhang, Yuanfeng Duan, Siu Wing Or, Yang Zhao: Smart Elasto-Magneto-Electric (EME) Sensors for Stress Monitoring of Steel Cables: Design Theory and Experimental Validation.Sensors14(8): 13644-13660 (2014)]]>https://dblp.org/rec/journals/sensors/ZhangDOZ14Wed, 01 Jan 2014 00:00:00 +0100IBC-Based Entity Authentication Protocols for Federated Cloud Systems.https://doi.org/10.3837/tiis.2013.05.020Chenlei Cao, Ru Zhang, Mengyi Zhang, Yixian Yang: IBC-Based Entity Authentication Protocols for Federated Cloud Systems.KSII Trans. Internet Inf. Syst.7(5): 1291-1312 (2013)]]>https://dblp.org/rec/journals/itiis/CaoZZY13Tue, 01 Jan 2013 00:00:00 +0100Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation.https://doi.org/10.4304/jmm.8.2.161-167Hai-yang Ding, Yajian Zhou, Yixian Yang, Ru Zhang: Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation.J. Multim.8(2): 161-167 (2013)]]>https://dblp.org/rec/journals/jmm2/DingZYZ13Tue, 01 Jan 2013 00:00:00 +0100Multipartite electronic entanglement purification using quantum-dot spin and microcavity system.https://doi.org/10.1007/s11128-012-0397-4Chuan Wang, Ru Zhang, Yong Zhang, Hai-Qiang Ma: Multipartite electronic entanglement purification using quantum-dot spin and microcavity system.Quantum Inf. Process.12(1): 525-536 (2013)]]>https://dblp.org/rec/journals/qip/WangZZM13Tue, 01 Jan 2013 00:00:00 +0100Cone-beam computed tomography study of root and canal morphology of mandibular premolars in a western Chinese population.https://doi.org/10.1186/1471-2342-12-18Xuan Yu, Bin Guo, Ke-Zeng Li, Ru Zhang, Yuan-Yuan Tian, Hu Wang, Tao Hu: Cone-beam computed tomography study of root and canal morphology of mandibular premolars in a western Chinese population.BMC Medical Imaging12: 18 (2012)]]>https://dblp.org/rec/journals/bmcmi/YuGLZTWD12Sun, 01 Jan 2012 00:00:00 +0100A Video Watermarking Algorithm of H.264/AVC for Content Authentication.https://doi.org/10.4304/jnw.7.8.1150-1154Weiwei Zhang, Ru Zhang, Xianyi Liu, Chunhua Wu, Xinxin Niu: A Video Watermarking Algorithm of H.264/AVC for Content Authentication.J. Networks7(8): 1150-1154 (2012)]]>https://dblp.org/rec/journals/jnw/ZhangZLWN12Sun, 01 Jan 2012 00:00:00 +0100Controlled remote state preparation of arbitrary two and three qubit states via the Brown state.https://doi.org/10.1007/s11128-011-0326-yXiu-Bo Chen, Song-Ya Ma, Yuan Su, Ru Zhang, Yi-Xian Yang: Controlled remote state preparation of arbitrary two and three qubit states via the Brown state.Quantum Inf. Process.11(6): 1653-1667 (2012)]]>https://dblp.org/rec/journals/qip/ChenMSZY12Sun, 01 Jan 2012 00:00:00 +0100The effect of a manual instrumentation technique on five types of premolar root canal geometry assessed by microcomputed tomography and three-dimensional reconstruction.https://doi.org/10.1186/1471-2342-11-14Ke-Zeng Li, Yuan Gao, Ru Zhang, Tao Hu, Bin Guo: The effect of a manual instrumentation technique on five types of premolar root canal geometry assessed by microcomputed tomography and three-dimensional reconstruction.BMC Medical Imaging11: 14 (2011)]]>https://dblp.org/rec/journals/bmcmi/LiGZHG11Sat, 01 Jan 2011 00:00:00 +0100Research of Spatial Domain Image Digital Watermarking Payload.https://doi.org/10.1155/2011/502748Jiafa Mao, Ru Zhang, Xinxin Niu, Yixian Yang, Linna Zhou: Research of Spatial Domain Image Digital Watermarking Payload.EURASIP J. Inf. Secur.2011 (2011)]]>https://dblp.org/rec/journals/ejisec/MaoZNYZ11Sat, 01 Jan 2011 00:00:00 +0100Intelligent green production of raw materials in ceramic technology of choice.https://doi.org/10.1109/EMEIT.2011.6023238Ru Zhang, ChangHu Chen: Intelligent green production of raw materials in ceramic technology of choice.EMEIT2011: 897-900]]>https://dblp.org/rec/conf/emeit/ZhangC11Sat, 01 Jan 2011 00:00:00 +0100Wavelet neural network based intelligent assessment of ceramic green technology research.https://doi.org/10.1109/EMEIT.2011.6023239Ru Zhang, ChangHu Chen: Wavelet neural network based intelligent assessment of ceramic green technology research.EMEIT2011: 901-904]]>https://dblp.org/rec/conf/emeit/ZhangC11aSat, 01 Jan 2011 00:00:00 +0100A Modified AES Algorithm for the Platform of Smartphone.https://doi.org/10.1109/CASoN.2010.172Shurui Liang, Jie Liu, Ru Zhang, Cong Wang: A Modified AES Algorithm for the Platform of Smartphone.CASoN2010: 749-752]]>https://dblp.org/rec/conf/cason/LiangLZW10Fri, 01 Jan 2010 00:00:00 +0100Steganalysis of LSB Matching in Gray Images Based on Regional Correlation Analysis.https://doi.org/10.1109/CSIE.2009.577Ming Chen, Fan-fan Liu, Ru Zhang, Xinxin Niu, Yixian Yang: Steganalysis of LSB Matching in Gray Images Based on Regional Correlation Analysis.CSIE (6)2009: 490-494]]>https://dblp.org/rec/conf/csie/ChenLZNY09Thu, 01 Jan 2009 00:00:00 +0100Improved EMD Steganography with Great Embedding Rate and High Embedding Efficiency.https://doi.org/10.1109/IIH-MSP.2009.290Zhiguo Qu, Yu Fu, Xinxin Niu, Yixian Yang, Ru Zhang: Improved EMD Steganography with Great Embedding Rate and High Embedding Efficiency.IIH-MSP2009: 348-352]]>https://dblp.org/rec/conf/iih-msp/QuFNYZ09Thu, 01 Jan 2009 00:00:00 +0100Research of nano-material doped fiber in SBS slow light system.https://doi.org/10.1109/NEMS.2009.5068737Ru Zhang, Ying Zhang, Peilin Lang, Yuwen Duan: Research of nano-material doped fiber in SBS slow light system.NEMS2009: 980-982]]>https://dblp.org/rec/conf/nems/ZhangZLD09Thu, 01 Jan 2009 00:00:00 +0100Flat suppercontinuum generation in the inner cladding fiber with InP nano thin film.https://doi.org/10.1109/NEMS.2009.5068741Yuwen Duan, Ru Zhang, Peilin Lang, Ying Zhang: Flat suppercontinuum generation in the inner cladding fiber with InP nano thin film.NEMS2009: 996-999]]>https://dblp.org/rec/conf/nems/DuanZLZ09Thu, 01 Jan 2009 00:00:00 +0100Knowledge Acquisition and Representation of the General Auxiliary Diagnosis System for Common Disease of Animal.https://doi.org/10.1007/978-1-4419-0211-5_18Jianhua Xiao, Hongbin Wang, Ru Zhang, Peixian Luan, Lin Li, Danning Xu: Knowledge Acquisition and Representation of the General Auxiliary Diagnosis System for Common Disease of Animal.CCTA (2)2008: 947-952]]>https://dblp.org/rec/conf/ifip12/XiaoWZLLX08Tue, 01 Jan 2008 00:00:00 +0100The Development of a General Auxiliary Diagnosis System for Common Disease of Animal.https://doi.org/10.1007/978-1-4419-0211-5_19Jianhua Xiao, Hongbin Wang, Ru Zhang, Peixian Luan, Lin Li, Danning Xu: The Development of a General Auxiliary Diagnosis System for Common Disease of Animal.CCTA (2)2008: 953-958]]>https://dblp.org/rec/conf/ifip12/XiaoWZLLX08aTue, 01 Jan 2008 00:00:00 +0100The Relationship between Monthdisease incidence Rate and climatic factor of Classical Swine Fever.https://doi.org/10.1007/978-1-4419-0211-5_20Hongbin Wang, Danning Xu, Jianhua Xiao, Ru Zhang, Jing Dong: The Relationship between Monthdisease incidence Rate and climatic factor of Classical Swine Fever.CCTA (2)2008: 959-966]]>https://dblp.org/rec/conf/ifip12/WangXXZD08Tue, 01 Jan 2008 00:00:00 +0100One Prediction Model Based on BP Neural Network for Newcastle Disease.https://doi.org/10.1007/978-1-4419-0211-5_49Hongbin Wang, Duqiang Gong, Jianhua Xiao, Ru Zhang, Lin Li: One Prediction Model Based on BP Neural Network for Newcastle Disease.CCTA (2)2008: 1209-1216]]>https://dblp.org/rec/conf/ifip12/WangGXZL08Tue, 01 Jan 2008 00:00:00 +0100A New Watermarking Protocol of Copyright Protection.https://doi.org/10.1109/IIH-MSP.2006.264960Ru Zhang, Xiao-gang Yu, Linna Zhou, Hong-peng Li: A New Watermarking Protocol of Copyright Protection.IIH-MSP2006: 83-88]]>https://dblp.org/rec/conf/iih-msp/ZhangYZL06Sun, 01 Jan 2006 00:00:00 +0100Analysis of Current Steganography Tools: Classifications & Features.https://doi.org/10.1109/IIH-MSP.2006.265023Ming Chen, Ru Zhang, Xinxin Niu, Yixian Yang: Analysis of Current Steganography Tools: Classifications & Features.IIH-MSP2006: 384-387]]>https://dblp.org/rec/conf/iih-msp/ChenZNY06Sun, 01 Jan 2006 00:00:00 +0100Flame Image of Pint-Sized Power Plant's Boiler Denoising Using Wavelet-Domain HMT Models.https://doi.org/10.1007/11538356_94Chunguang Ji, Ru Zhang, Shitao Wen, Shiyong Li: Flame Image of Pint-Sized Power Plant's Boiler Denoising Using Wavelet-Domain HMT Models.ICIC (2)2005: 910-919]]>https://dblp.org/rec/conf/icic/JiZWL05Sat, 01 Jan 2005 00:00:00 +0100