Ru Zhang

According to our database1, Ru Zhang authored at least 53 papers between 2005 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Invisible steganography via generative adversarial networks.
Multimedia Tools Appl., 2019

A high capacity reversible data hiding scheme for encrypted covers based on histogram shifting.
J. Inf. Sec. Appl., 2019

Multi-step Attack Scenarios Mining Based on Neural Network and Bayesian Network Attack Graph.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

2018
Temperature Compensation of Elasto-Magneto-Electric (EME) Sensors in Cable Force Monitoring Using BP Neural Network.
Sensors, 2018

Modified PSO algorithms with "Request and Reset" for leak source localization using multiple robots.
Neurocomputing, 2018

Efficient feature learning and multi-size image steganalysis based on CNN.
CoRR, 2018

Invisible Steganography via Generative Adversarial Network.
CoRR, 2018

Analysis of Message Attacks in Aviation Data-Link Communication.
IEEE Access, 2018

Network Security Situation Assessment Approach Based on Attack-Defense Stochastic Game Model.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Hotspots Trends and Spatio-Temporal Distributions for an Investigative in the Field of Chinese Educational Technology.
Proceedings of the 26th International Conference on Geoinformatics, 2018

2017
Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering.
Security and Communication Networks, 2017

Efficient entanglement concentration of arbitrary unknown less-entangled three-atom W states via photonic Faraday rotation in cavity QED.
Quantum Information Processing, 2017

Robust video watermarking algorithm for H.264/AVC based on JND model.
TIIS, 2017

Efficient data possession-checking protocol with deduplication in cloud.
IJDSN, 2017

Dynamic data integrity auditing for secure outsourcing in the cloud.
Concurrency and Computation: Practice and Experience, 2017

Attack pattern mining algorithm based on security log.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

Optimal full-duplex relay selection for physical layer security in cooperative wireless networks.
Proceedings of the 2017 IEEE/CIC International Conference on Communications in China, 2017

2016
Efficient Dynamic Replicated Data Possession Checking in Distributed Cloud Storage Systems.
IJDSN, 2016

Testing Contextuality in Cyclic Psychophysical Systems of High Ranks.
Proceedings of the Quantum Interaction - 10th International Conference, 2016

Privacy preservation based on rotation perturbation in weighted social networks.
Proceedings of the 16th International Symposium on Communications and Information Technologies, 2016

Detecting False Information of Social Network in Big Data.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016

Efficiently secure multiparty computation based on homomorphic encryption.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

Phishing sites detection based on Url Correlation.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

An attack pattern mining algorithm based on fuzzy logic and sequence pattern.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

An Android malware detection method based on AndroidManifest file.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

2015
Efficient multipartite entanglement concentration protocol for nitrogen-vacancy center and microresonator coupled systems.
Quantum Information Processing, 2015

Defense Strategy of Network Security based on Dynamic Classification.
TIIS, 2015

An improved algorithm for community discovery in social networks based on label propagation.
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015

2014
Smart Elasto-Magneto-Electric (EME) Sensors for Stress Monitoring of Steel Cables: Design Theory and Experimental Validation.
Sensors, 2014

Nonlocal entanglement concentration of separate nitrogen-vacancy centers coupling to microtoroidal resonators.
Quantum Information & Computation, 2014

Hamiltonian cycle embedding for fault tolerance in balanced hypercubes.
Applied Mathematics and Computation, 2014

2013
Multipartite electronic entanglement purification using quantum-dot spin and microcavity system.
Quantum Information Processing, 2013

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation.
Journal of Multimedia, 2013

IBC-Based Entity Authentication Protocols for Federated Cloud Systems.
TIIS, 2013

2012
Controlled remote state preparation of arbitrary two and three qubit states via the Brown state.
Quantum Information Processing, 2012

A Video Watermarking Algorithm of H.264/AVC for Content Authentication.
JNW, 2012

Cone-beam computed tomography study of root and canal morphology of mandibular premolars in a western Chinese population.
BMC Medical Imaging, 2012

2011
Research of Spatial Domain Image Digital Watermarking Payload.
EURASIP J. Information Security, 2011

The effect of a manual instrumentation technique on five types of premolar root canal geometry assessed by microcomputed tomography and three-dimensional reconstruction.
BMC Medical Imaging, 2011

Wavelet neural network based intelligent assessment of ceramic green technology research.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

Intelligent green production of raw materials in ceramic technology of choice.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

2010
A Modified AES Algorithm for the Platform of Smartphone.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2010

2009
Research of nano-material doped fiber in SBS slow light system.
Proceedings of the 4th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2009

Flat suppercontinuum generation in the inner cladding fiber with InP nano thin film.
Proceedings of the 4th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2009

Improved EMD Steganography with Great Embedding Rate and High Embedding Efficiency.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Steganalysis of LSB Matching in Gray Images Based on Regional Correlation Analysis.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
The Development of a General Auxiliary Diagnosis System for Common Disease of Animal.
Proceedings of the Computer and Computing Technologies in Agriculture II, Volume 2, 2008

Knowledge Acquisition and Representation of the General Auxiliary Diagnosis System for Common Disease of Animal.
Proceedings of the Computer and Computing Technologies in Agriculture II, Volume 2, 2008

The Relationship between Monthdisease incidence Rate and climatic factor of Classical Swine Fever.
Proceedings of the Computer and Computing Technologies in Agriculture II, Volume 2, 2008

One Prediction Model Based on BP Neural Network for Newcastle Disease.
Proceedings of the Computer and Computing Technologies in Agriculture II, Volume 2, 2008

2006
A New Watermarking Protocol of Copyright Protection.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Analysis of Current Steganography Tools: Classifications & Features.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

2005
Flame Image of Pint-Sized Power Plant's Boiler Denoising Using Wavelet-Domain HMT Models.
Proceedings of the Advances in Intelligent Computing, 2005


  Loading...