


default search action
Ru Zhang 0002
Person information
- affiliation: Beijing University of Posts and Telecommunications, Beijing, China
Other persons with the same name
- Ru Zhang — disambiguation page
- Ru Zhang 0001
— Nanning University, Nanning, Guangxi, China - Ru Zhang 0003
— Shanghai Maritime University, Shanghai, China - Ru Zhang 0004
— Jinan University, Zhuhai, China - Ru Zhang 0005
— Zhejiang University City College, Hangzhou, China - Ru Zhang 0006
— ByteDance, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j34]Youqiang Sun
, Jianyi Liu
, Ru Zhang
, Yeqing Ren
:
Robust generative image steganography based on makeup transfer and feature-wise depth fusion for social networks. Digit. Signal Process. 169: 105714 (2026)
[j33]Yihao Wang
, Ruiqi Song
, Lingxiao Li
, Yifan Tang
, Ru Zhang
, Jianyi Liu
:
User profile constructed by multiple attributes for optimizing linguistic steganalysis in social networks. Expert Syst. Appl. 297: 129311 (2026)
[j32]Qiong Xu
, Ru Zhang, Jianyi Liu
, Yongfeng Huang
:
Aggregated text steganalysis toward social network based on efficient multi-perspective feature fusion. Knowl. Based Syst. 334: 115129 (2026)
[j31]Zhen Yang
, Yelei Wang
, Yufei Luo
, Xin Xu
, Ru Zhang
:
TASDF-Stega: High Capacity Secure Text-Audio Joint Steganography Using Diffusion Latent Space. IEEE Signal Process. Lett. 33: 723-727 (2026)
[c15]Yihao Wang, Pengxiang Ding, Lingxiao Li, Can Cui, Zirui Ge, Xinyang Tong, Wenxuan Song, Han Zhao, Wei Zhao, Pengxu Hou, Siteng Huang, Yifan Tang, Wenhui Wang, Ru Zhang, Jianyi Liu, Donglin Wang:
VLA-Adapter: An Effective Paradigm for Tiny-Scale Vision-Language-Action Model. AAAI 2026: 18638-18646- 2025
[j30]Yihao Wang
, Ruiqi Song
, Lingxiao Li
, Ru Zhang
, Jianyi Liu
:
Dynamically allocated interval-based generative linguistic steganography with roulette wheel. Appl. Soft Comput. 176: 113101 (2025)
[j29]Chenxi Min
, Ru Zhang
, Jianyi Liu:
Bilingual generated text detection through semantic and statistical analysis. Intell. Data Anal. 29(5): 1248-1260 (2025)
[j28]Yifan Tang
, Yihao Wang
, Ru Zhang
, Jianyi Liu
:
Linguistic Steganalysis via LLMs: Two Modes for Efficient Detection of Strongly Concealed Stego. IEEE Signal Process. Lett. 32: 541-545 (2025)
[j27]Zhen Yang
, Zihan Xu
, Xin Xu, Zhongliang Yang
, Ru Zhang
:
Linguistic Steganalysis via Text Dual Attention Fusing Statistical and Multi-Layer Semantic Features. IEEE Signal Process. Lett. 32: 1371-1375 (2025)
[j26]Jie Wang
, Yihao Wang
, Yihao Li
, Ru Zhang
, Jianyi Liu
:
Multi-Classification of Linguistic Steganography Driven by Large Language Models. IEEE Signal Process. Lett. 32: 1440-1444 (2025)
[j25]Zhen Yang
, Yufei Luo
, Jinshuai Yang
, Xin Xu
, Ru Zhang
, Yongfeng Huang
:
Class-Aware Adversarial Unsupervised Domain Adaptation for Linguistic Steganalysis. IEEE Trans. Inf. Forensics Secur. 20: 5181-5194 (2025)
[c14]Yufei Luo
, Zhen Yang
, Xin Xu
, Yelei Wang
, Ru Zhang
, Yongfeng Huang
:
Clustering-Driven Pseudo-Labeling in Source-Free Domain Adaptation for Linguistic Steganalysis. IH&MMSec 2025: 153-163
[i13]Jiaxin Song, Xinyu Wang, Yihao Wang, Yifan Tang, Ru Zhang, Jianyi Liu, Gongshen Liu:
U-GIFT: Uncertainty-Guided Firewall for Toxic Speech in Few-Shot Scenario. CoRR abs/2501.00907 (2025)
[i12]Yihao Wang, Lingxiao Li, Yifan Tang, Ru Zhang, Jianyi Liu:
Toward Copyright Integrity and Verifiability via Multi-Bit Watermarking for Intelligent Transportation Systems. CoRR abs/2502.05425 (2025)
[i11]Yulong Zhang, Tianyi Liang, Xinyue Huang, Erfei Cui, Xu Guo, Pei Chu, Chenhui Li, Ru Zhang, Wenhai Wang, Gongshen Liu:
Consensus Entropy: Harnessing Multi-VLM Agreement for Self-Verifying and Self-Improving OCR. CoRR abs/2504.11101 (2025)
[i10]Yihao Wang, Pengxiang Ding, Lingxiao Li, Can Cui, Zirui Ge, Xinyang Tong, Wenxuan Song, Han Zhao, Wei Zhao, Pengxu Hou, Siteng Huang, Yifan Tang, Wenhui Wang, Ru Zhang, Jianyi Liu, Donglin Wang:
VLA-Adapter: An Effective Paradigm for Tiny-Scale Vision-Language-Action Model. CoRR abs/2509.09372 (2025)
[i9]Yulong Zhang, Li Wang, Wei Du, Peilin Li, Yuqin Dai Zhiyuan Zhao, Lingyong Fang, Ziniu Liu, Ru Zhang, Huijia Zhu, Gongshen Liu:
NCV: A Node-Wise Consistency Verification Approach for Low-Cost Structured Error Localization in LLM Reasoning. CoRR abs/2510.02816 (2025)
[i8]Tong Zhang, Ru Zhang, Jianyi Liu, Zhen Yang, Gongshen Liu:
Beyond Fixed Anchors: Precisely Erasing Concepts with Sibling Exclusive Counterparts. CoRR abs/2510.16342 (2025)- 2024
[j24]Yihao Li
, Ru Zhang
, Jianyi Liu
, Qi Lei:
A Semantic Controllable Long Text Steganography Framework Based on LLM Prompt Engineering and Knowledge Graph. IEEE Signal Process. Lett. 31: 2610-2614 (2024)
[j23]Youqiang Sun
, Jianyi Liu
, Ru Zhang
:
Generative Image Steganography Based on Guidance Feature Distribution. ACM Trans. Multim. Comput. Commun. Appl. 20(11): 336:1-336:18 (2024)
[c13]Lingyong Fang, Gongshen Liu, Ru Zhang:
Multi-Grained Multimodal Interaction Network for Sentiment Analysis. ICASSP 2024: 7730-7734
[i7]Yihao Wang, Ruiqi Song, Ru Zhang, Jianyi Liu, Lingxiao Li:
LLsM: Generative Linguistic Steganography with Large Language Model. CoRR abs/2401.15656 (2024)
[i6]Yihao Li, Ru Zhang, Jianyi Liu, Gongshen Liu:
An Enhanced Prompt-Based LLM Reasoning Scheme via Knowledge Graph-Integrated Collaboration. CoRR abs/2402.04978 (2024)
[i5]Yifan Tang, Yihao Wang, Ru Zhang, Jianyi Liu:
Linguistic Steganalysis via LLMs: Two Modes for Efficient Detection of Strongly Concealed Stego. CoRR abs/2406.04218 (2024)
[i4]Yihao Wang, Ru Zhang, Yifan Tang, Jianyi Liu:
State-of-the-art Advances of Deep-learning Linguistic Steganalysis Research. CoRR abs/2409.01780 (2024)- 2023
[j22]Youqiang Sun, Jianyi Liu
, Ru Zhang
:
Large capacity generative image steganography via image style transfer and feature-wise deep fusion. Appl. Intell. 53(23): 28675-28693 (2023)
[j21]Yihao Wang
, Ru Zhang
, Jianyi Liu:
V-A3tS: A rapid text steganalysis method based on position information and variable parameter multi-head self-attention controlled by length. J. Inf. Secur. Appl. 75: 103512 (2023)
[j20]Lei Guan, Fan Liu, Ru Zhang
, Jianyi Liu, Yifan Tang
:
MCW: A Generalizable Deepfake Detection Method for Few-Shot Learning. Sensors 23(21): 8763 (2023)
[j19]Jiawei Li
, Ru Zhang
, Jianyi Liu:
ConLBS: An Attack Investigation Approach Using Contrastive Learning with Behavior Sequence. Sensors 23(24): 9881 (2023)
[j18]Qiong Xu
, Ru Zhang
, Jianyi Liu
:
Linguistic Steganalysis by Enhancing and Integrating Local and Global Features. IEEE Signal Process. Lett. 30: 16-20 (2023)
[j17]Yihao Wang
, Ru Zhang
, Jianyi Liu:
RLS-DTS: Reinforcement-Learning Linguistic Steganalysis in Distribution-Transformed Scenario. IEEE Signal Process. Lett. 30: 1232-1236 (2023)
[c12]Tianhe Lu
, Gongshen Liu, Ru Zhang, Tianjie Ju:
Neural Linguistic Steganography with Controllable Security. IJCNN 2023: 1-8
[c11]Tianhe Lu
, Gongshen Liu, Ru Zhang, Peixuan Li, Tianjie Ju:
Robust Secret Data Hiding for Transformer-based Neural Machine Translation. IJCNN 2023: 1-8
[i3]Yihao Wang, Ruiqi Song, Ru Zhang, Jianyi Liu:
UP4LS: User Profile Constructed by Multiple Attributes for Enhancing Linguistic Steganalysis. CoRR abs/2311.01775 (2023)- 2022
[j16]Jianyi Liu, Ying Liu, Jingwen Li, Wenxin Sun, Jie Cheng, Ru Zhang
, Xingjie Huang, Jin Pang:
Two statistical traffic features for certain APT group identification. J. Inf. Secur. Appl. 67: 103207 (2022)
[j15]Shengnan Guo
, Jianyi Liu
, Zhongliang Yang
, Weike You, Ru Zhang
:
Linguistic Steganalysis Merging Semantic and Statistical Features. IEEE Signal Process. Lett. 29: 2128-2132 (2022)
[c10]Dazhuang Liu, Zhen Yang, Ru Zhang, Jianyi Liu:
A Robust Deepfake Video Detection Method based on Continuous Frame Face-swapping. AIIPCC 2022: 188-191
[c9]Siyuan Tian
, Yating Gao
, Guoquan Yuan
, Ru Zhang
, Jinmeng Zhao
, Song Zhang
:
An encrypted traffic classification method based on contrastive learning. ICCIP 2022: 101-105
[c8]Lingyong Fang, Gongshen Liu, Ru Zhang:
Sense-aware BERT and Multi-task Fine-tuning for Multimodal Sentiment Analysis. IJCNN 2022: 1-8
[c7]Zhen Yang, Zihan Xu, Ru Zhang, Yongfeng Huang:
T-GRU: conTextual Gated Recurrent Unit model for high quality Linguistic Steganography. WIFS 2022: 1-6
[c6]Xiaofan Yan
, Jie Cheng
, Ru Zhang
, Jiahui Wei
, Liandong Chen
, Kai Cheng
:
Chinese Short Text Entity Linking Model Based on PET. WSSE 2022: 87-92
[i2]Jiawei Li, Ru Zhang, Jianyi Liu, Gongshen Liu:
LogKernel A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering. CoRR abs/2208.08820 (2022)- 2021
[c5]Yating Gao, Ru Zhang, Xianxu Li, Jianyi Liu, Kaifeng Zhao, Xue Cheng:
Carrier Robust Reversible Watermark Model Based on Image Block Chain Authentication. ICIG (1) 2021: 712-724- 2020
[j14]Jianyi Liu
, Yu Tian, Ru Zhang
, Youqiang Sun
, Chan Wang:
A Two-Stage Generative Adversarial Networks With Semantic Content Constraints for Adversarial Example Generation. IEEE Access 8: 205766-205777 (2020)
[j13]Jianyi Liu, Kaifeng Zhao
, Ru Zhang
:
A Fully Reversible Data Hiding Scheme in Encrypted Images Based on Homomorphic Encryption and Pixel Prediction. Circuits Syst. Signal Process. 39(7): 3532-3552 (2020)
[j12]Ru Zhang
, Feng Zhu, Jianyi Liu, Gongshen Liu:
Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Steganalysis. IEEE Trans. Inf. Forensics Secur. 15: 1138-1150 (2020)
2010 – 2019
- 2019
[j11]Ru Zhang
, Chunjing Lu, Jianyi Liu:
A high capacity reversible data hiding scheme for encrypted covers based on histogram shifting. J. Inf. Secur. Appl. 47: 199-207 (2019)
[j10]Ru Zhang
, Shiqi Dong, Jianyi Liu:
Invisible steganography via generative adversarial networks. Multim. Tools Appl. 78(7): 8559-8575 (2019)- 2018
[j9]Ru Zhang
, Gongshen Liu, Jianyi Liu, Jan P. Nees:
Analysis of Message Attacks in Aviation Data-Link Communication. IEEE Access 6: 455-463 (2018)
[i1]Ru Zhang, Feng Zhu, Jianyi Liu, Gongshen Liu:
Efficient feature learning and multi-size image steganalysis based on CNN. CoRR abs/1807.11428 (2018)- 2017
[j8]Jinxia Wei
, Ru Zhang
, Jianyi Liu, Jing Li, Xinxin Niu, Yuangang Yao:
Dynamic data integrity auditing for secure outsourcing in the cloud. Concurr. Comput. Pract. Exp. 29(12) (2017)
[j7]Jinxia Wei, Xinxin Niu, Ru Zhang
, Jianyi Liu, Yuangang Yao:
Efficient data possession-checking protocol with deduplication in cloud. Int. J. Distributed Sens. Networks 13(8) (2017)
[j6]Ru Zhang
, Yanyu Huo, Jianyi Liu
, Fangyu Weng:
Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering. Secur. Commun. Networks 2017: 7536381:1-7536381:9 (2017)- 2016
[j5]Jinxia Wei, Jianyi Liu, Ru Zhang
, Xinxin Niu:
Efficient Dynamic Replicated Data Possession Checking in Distributed Cloud Storage Systems. Int. J. Distributed Sens. Networks 12(1): 1894713:1-1894713:11 (2016)- 2015
[j4]Jinxia Wei, Ru Zhang
, Jianyi Liu, Xinxin Niu, Yixian Yang:
Defense Strategy of Network Security based on Dynamic Classification. KSII Trans. Internet Inf. Syst. 9(12): 5116-5134 (2015)- 2013
[j3]Chenlei Cao, Ru Zhang, Mengyi Zhang, Yixian Yang:
IBC-Based Entity Authentication Protocols for Federated Cloud Systems. KSII Trans. Internet Inf. Syst. 7(5): 1291-1312 (2013)
[j2]Hai-yang Ding, Yajian Zhou, Yixian Yang, Ru Zhang:
Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation. J. Multim. 8(2): 161-167 (2013)- 2011
[j1]Jiafa Mao, Ru Zhang, Xinxin Niu, Yixian Yang, Linna Zhou:
Research of Spatial Domain Image Digital Watermarking Payload. EURASIP J. Inf. Secur. 2011 (2011)
2000 – 2009
- 2009
[c4]Ming Chen, Fan-fan Liu, Ru Zhang, Xinxin Niu, Yixian Yang:
Steganalysis of LSB Matching in Gray Images Based on Regional Correlation Analysis. CSIE (6) 2009: 490-494
[c3]Zhiguo Qu, Yu Fu, Xinxin Niu, Yixian Yang, Ru Zhang:
Improved EMD Steganography with Great Embedding Rate and High Embedding Efficiency. IIH-MSP 2009: 348-352- 2006
[c2]Ru Zhang, Xiao-gang Yu, Linna Zhou, Hong-peng Li:
A New Watermarking Protocol of Copyright Protection. IIH-MSP 2006: 83-88
[c1]Ming Chen, Ru Zhang, Xinxin Niu, Yixian Yang:
Analysis of Current Steganography Tools: Classifications & Features. IIH-MSP 2006: 384-387
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-04-12 23:40 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







