Ru Zhang
Orcid: 0000-0001-6641-3236Affiliations:
- Beijing University of Posts and Telecommunications, Beijing, China
According to our database1,
Ru Zhang authored at least 60 papers
between 2006 and 2026.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2026
TASDF-Stega: High Capacity Secure Text-Audio Joint Steganography Using Diffusion Latent Space.
IEEE Signal Process. Lett., 2026
Aggregated text steganalysis toward social network based on efficient multi-perspective feature fusion.
Knowl. Based Syst., 2026
User profile constructed by multiple attributes for optimizing linguistic steganalysis in social networks.
Expert Syst. Appl., 2026
Robust generative image steganography based on makeup transfer and feature-wise depth fusion for social networks.
Digit. Signal Process., 2026
Proceedings of the Fortieth AAAI Conference on Artificial Intelligence, 2026
2025
Beyond Fixed Anchors: Precisely Erasing Concepts with Sibling Exclusive Counterparts.
CoRR, October, 2025
NCV: A Node-Wise Consistency Verification Approach for Low-Cost Structured Error Localization in LLM Reasoning.
CoRR, October, 2025
Consensus Entropy: Harnessing Multi-VLM Agreement for Self-Verifying and Self-Improving OCR.
CoRR, April, 2025
Toward Copyright Integrity and Verifiability via Multi-Bit Watermarking for Intelligent Transportation Systems.
CoRR, February, 2025
CoRR, January, 2025
IEEE Trans. Inf. Forensics Secur., 2025
Linguistic Steganalysis via Text Dual Attention Fusing Statistical and Multi-Layer Semantic Features.
IEEE Signal Process. Lett., 2025
IEEE Signal Process. Lett., 2025
Linguistic Steganalysis via LLMs: Two Modes for Efficient Detection of Strongly Concealed Stego.
IEEE Signal Process. Lett., 2025
Intell. Data Anal., 2025
Dynamically allocated interval-based generative linguistic steganography with roulette wheel.
Appl. Soft Comput., 2025
Clustering-Driven Pseudo-Labeling in Source-Free Domain Adaptation for Linguistic Steganalysis.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2025
2024
ACM Trans. Multim. Comput. Commun. Appl., November, 2024
A Semantic Controllable Long Text Steganography Framework Based on LLM Prompt Engineering and Knowledge Graph.
IEEE Signal Process. Lett., 2024
CoRR, 2024
An Enhanced Prompt-Based LLM Reasoning Scheme via Knowledge Graph-Integrated Collaboration.
CoRR, 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
2023
ConLBS: An Attack Investigation Approach Using Contrastive Learning with Behavior Sequence.
Sensors, December, 2023
Large capacity generative image steganography via image style transfer and feature-wise deep fusion.
Appl. Intell., December, 2023
Sensors, October, 2023
V-A3tS: A rapid text steganalysis method based on position information and variable parameter multi-head self-attention controlled by length.
J. Inf. Secur. Appl., June, 2023
IEEE Signal Process. Lett., 2023
RLS-DTS: Reinforcement-Learning Linguistic Steganalysis in Distribution-Transformed Scenario.
IEEE Signal Process. Lett., 2023
UP4LS: User Profile Constructed by Multiple Attributes for Enhancing Linguistic Steganalysis.
CoRR, 2023
Proceedings of the International Joint Conference on Neural Networks, 2023
Proceedings of the International Joint Conference on Neural Networks, 2023
2022
IEEE Signal Process. Lett., 2022
J. Inf. Secur. Appl., 2022
LogKernel A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering.
CoRR, 2022
Proceedings of the 4th World Symposium on Software Engineering, 2022
T-GRU: conTextual Gated Recurrent Unit model for high quality Linguistic Steganography.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022
Proceedings of the International Joint Conference on Neural Networks, 2022
Proceedings of the 8th International Conference on Communication and Information Processing, 2022
Proceedings of the International Conference on Artificial Intelligence, 2022
2021
Proceedings of the Image and Graphics - 11th International Conference, 2021
2020
Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Steganalysis.
IEEE Trans. Inf. Forensics Secur., 2020
A Fully Reversible Data Hiding Scheme in Encrypted Images Based on Homomorphic Encryption and Pixel Prediction.
Circuits Syst. Signal Process., 2020
A Two-Stage Generative Adversarial Networks With Semantic Content Constraints for Adversarial Example Generation.
IEEE Access, 2020
2019
Multim. Tools Appl., 2019
A high capacity reversible data hiding scheme for encrypted covers based on histogram shifting.
J. Inf. Secur. Appl., 2019
2018
CoRR, 2018
2017
Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering.
Secur. Commun. Networks, 2017
Int. J. Distributed Sens. Networks, 2017
Concurr. Comput. Pract. Exp., 2017
2016
Efficient Dynamic Replicated Data Possession Checking in Distributed Cloud Storage Systems.
Int. J. Distributed Sens. Networks, 2016
2015
KSII Trans. Internet Inf. Syst., 2015
2013
Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation.
J. Multim., 2013
KSII Trans. Internet Inf. Syst., 2013
2011
EURASIP J. Inf. Secur., 2011
2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009
2006
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006