Ru Zhang

Orcid: 0000-0001-6641-3236

Affiliations:
  • Beijing University of Posts and Telecommunications, Beijing, China


According to our database1, Ru Zhang authored at least 60 papers between 2006 and 2026.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

Online presence:

On csauthors.net:

Bibliography

2026
TASDF-Stega: High Capacity Secure Text-Audio Joint Steganography Using Diffusion Latent Space.
IEEE Signal Process. Lett., 2026

Aggregated text steganalysis toward social network based on efficient multi-perspective feature fusion.
Knowl. Based Syst., 2026

User profile constructed by multiple attributes for optimizing linguistic steganalysis in social networks.
Expert Syst. Appl., 2026

Robust generative image steganography based on makeup transfer and feature-wise depth fusion for social networks.
Digit. Signal Process., 2026

VLA-Adapter: An Effective Paradigm for Tiny-Scale Vision-Language-Action Model.
Proceedings of the Fortieth AAAI Conference on Artificial Intelligence, 2026

2025
Beyond Fixed Anchors: Precisely Erasing Concepts with Sibling Exclusive Counterparts.
CoRR, October, 2025

NCV: A Node-Wise Consistency Verification Approach for Low-Cost Structured Error Localization in LLM Reasoning.
CoRR, October, 2025

Consensus Entropy: Harnessing Multi-VLM Agreement for Self-Verifying and Self-Improving OCR.
CoRR, April, 2025

Toward Copyright Integrity and Verifiability via Multi-Bit Watermarking for Intelligent Transportation Systems.
CoRR, February, 2025

U-GIFT: Uncertainty-Guided Firewall for Toxic Speech in Few-Shot Scenario.
CoRR, January, 2025

Class-Aware Adversarial Unsupervised Domain Adaptation for Linguistic Steganalysis.
IEEE Trans. Inf. Forensics Secur., 2025

Linguistic Steganalysis via Text Dual Attention Fusing Statistical and Multi-Layer Semantic Features.
IEEE Signal Process. Lett., 2025

Multi-Classification of Linguistic Steganography Driven by Large Language Models.
IEEE Signal Process. Lett., 2025

Linguistic Steganalysis via LLMs: Two Modes for Efficient Detection of Strongly Concealed Stego.
IEEE Signal Process. Lett., 2025

Bilingual generated text detection through semantic and statistical analysis.
Intell. Data Anal., 2025

Dynamically allocated interval-based generative linguistic steganography with roulette wheel.
Appl. Soft Comput., 2025

Clustering-Driven Pseudo-Labeling in Source-Free Domain Adaptation for Linguistic Steganalysis.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2025

2024
Generative Image Steganography Based on Guidance Feature Distribution.
ACM Trans. Multim. Comput. Commun. Appl., November, 2024

A Semantic Controllable Long Text Steganography Framework Based on LLM Prompt Engineering and Knowledge Graph.
IEEE Signal Process. Lett., 2024

State-of-the-art Advances of Deep-learning Linguistic Steganalysis Research.
CoRR, 2024

An Enhanced Prompt-Based LLM Reasoning Scheme via Knowledge Graph-Integrated Collaboration.
CoRR, 2024

LLsM: Generative Linguistic Steganography with Large Language Model.
CoRR, 2024

Multi-Grained Multimodal Interaction Network for Sentiment Analysis.
Proceedings of the IEEE International Conference on Acoustics, 2024

2023
ConLBS: An Attack Investigation Approach Using Contrastive Learning with Behavior Sequence.
Sensors, December, 2023

Large capacity generative image steganography via image style transfer and feature-wise deep fusion.
Appl. Intell., December, 2023

MCW: A Generalizable Deepfake Detection Method for Few-Shot Learning.
Sensors, October, 2023

V-A3tS: A rapid text steganalysis method based on position information and variable parameter multi-head self-attention controlled by length.
J. Inf. Secur. Appl., June, 2023

Linguistic Steganalysis by Enhancing and Integrating Local and Global Features.
IEEE Signal Process. Lett., 2023

RLS-DTS: Reinforcement-Learning Linguistic Steganalysis in Distribution-Transformed Scenario.
IEEE Signal Process. Lett., 2023

UP4LS: User Profile Constructed by Multiple Attributes for Enhancing Linguistic Steganalysis.
CoRR, 2023

Robust Secret Data Hiding for Transformer-based Neural Machine Translation.
Proceedings of the International Joint Conference on Neural Networks, 2023

Neural Linguistic Steganography with Controllable Security.
Proceedings of the International Joint Conference on Neural Networks, 2023

2022
Linguistic Steganalysis Merging Semantic and Statistical Features.
IEEE Signal Process. Lett., 2022

Two statistical traffic features for certain APT group identification.
J. Inf. Secur. Appl., 2022

LogKernel A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering.
CoRR, 2022

Chinese Short Text Entity Linking Model Based on PET.
Proceedings of the 4th World Symposium on Software Engineering, 2022

T-GRU: conTextual Gated Recurrent Unit model for high quality Linguistic Steganography.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022

Sense-aware BERT and Multi-task Fine-tuning for Multimodal Sentiment Analysis.
Proceedings of the International Joint Conference on Neural Networks, 2022

An encrypted traffic classification method based on contrastive learning.
Proceedings of the 8th International Conference on Communication and Information Processing, 2022

A Robust Deepfake Video Detection Method based on Continuous Frame Face-swapping.
Proceedings of the International Conference on Artificial Intelligence, 2022

2021
Carrier Robust Reversible Watermark Model Based on Image Block Chain Authentication.
Proceedings of the Image and Graphics - 11th International Conference, 2021

2020
Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Steganalysis.
IEEE Trans. Inf. Forensics Secur., 2020

A Fully Reversible Data Hiding Scheme in Encrypted Images Based on Homomorphic Encryption and Pixel Prediction.
Circuits Syst. Signal Process., 2020

A Two-Stage Generative Adversarial Networks With Semantic Content Constraints for Adversarial Example Generation.
IEEE Access, 2020

2019
Invisible steganography via generative adversarial networks.
Multim. Tools Appl., 2019

A high capacity reversible data hiding scheme for encrypted covers based on histogram shifting.
J. Inf. Secur. Appl., 2019

2018
Efficient feature learning and multi-size image steganalysis based on CNN.
CoRR, 2018

Analysis of Message Attacks in Aviation Data-Link Communication.
IEEE Access, 2018

2017
Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering.
Secur. Commun. Networks, 2017

Efficient data possession-checking protocol with deduplication in cloud.
Int. J. Distributed Sens. Networks, 2017

Dynamic data integrity auditing for secure outsourcing in the cloud.
Concurr. Comput. Pract. Exp., 2017

2016
Efficient Dynamic Replicated Data Possession Checking in Distributed Cloud Storage Systems.
Int. J. Distributed Sens. Networks, 2016

2015
Defense Strategy of Network Security based on Dynamic Classification.
KSII Trans. Internet Inf. Syst., 2015

2013
Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation.
J. Multim., 2013

IBC-Based Entity Authentication Protocols for Federated Cloud Systems.
KSII Trans. Internet Inf. Syst., 2013

2011
Research of Spatial Domain Image Digital Watermarking Payload.
EURASIP J. Inf. Secur., 2011

2009
Improved EMD Steganography with Great Embedding Rate and High Embedding Efficiency.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Steganalysis of LSB Matching in Gray Images Based on Regional Correlation Analysis.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2006
A New Watermarking Protocol of Copyright Protection.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Analysis of Current Steganography Tools: Classifications & Features.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006


  Loading...