Depth-wise separable convolutions and multi-level pooling for an efficient spatial CNN-based steganalysis R Zhang, F Zhu, J Liu, G Liu IEEE Transactions on Information Forensics and Security 15, 1138-1150, 2019 | 234 | 2019 |
Invisible steganography via generative adversarial networks R Zhang, S Dong, J Liu Multimedia tools and applications 78 (7), 8559-8575, 2019 | 191 | 2019 |
Analysis of current steganography tools: classifications & features M Chen, R Zhang, X Niu, Y Yang 2006 International Conference on Intelligent Information Hiding and …, 2006 | 122 | 2006 |
Developing superior alleles of yield genes in rice by artificial mutagenesis using the CRISPR/Cas9 system L Huang, R Zhang, G Huang, Y Li, G Melaku, S Zhang, H Chen, Y Zhao, ... The Crop Journal 6 (5), 475-481, 2018 | 86 | 2018 |
An Android malware detection method based on AndroidManifest file X Li, J Liu, Y Huo, R Zhang, Y Yao 2016 4th International Conference on Cloud Computing and Intelligence …, 2016 | 44 | 2016 |
Efficient feature learning and multi-size image steganalysis based on CNN R Zhang, F Zhu, J Liu, G Liu arXiv preprint arXiv:1807.11428, 2018 | 42 | 2018 |
A high capacity reversible data hiding scheme for encrypted covers based on histogram shifting R Zhang, C Lu, J Liu Journal of Information Security and Applications 47, 199-207, 2019 | 31 | 2019 |
Constructing APT attack scenarios based on intrusion kill chain and fuzzy clustering R Zhang, Y Huo, J Liu, F Weng Security and Communication Networks 2017, 2017 | 29 | 2017 |
Topic-aware neural linguistic steganography based on knowledge graphs Y Li, J Zhang, Z Yang, R Zhang ACM/IMS Transactions on Data Science 2 (2), 1-13, 2021 | 22 | 2021 |
The associations between meeting 24‐hour movement guidelines and adiposity in Asian Adolescents: The Asia‐Fit Study SS Hui, R Zhang, K Suzuki, H Naito, G Balasekaran, JK Song, SY Park, ... Scandinavian journal of medicine & science in sports 31 (3), 763-771, 2021 | 22 | 2021 |
Analysis of message attacks in aviation data-link communication R Zhang, G Liu, J Liu, JP Nees IEEE Access 6, 455-463, 2017 | 21 | 2017 |
Multi-step attack scenarios mining based on neural network and Bayesian network attack graph J Liu, B Liu, R Zhang, C Wang Artificial Intelligence and Security: 5th International Conference, ICAIS …, 2019 | 15 | 2019 |
Relation classification via BERT with piecewise convolution and focal loss J Liu, X Duan, R Zhang, Y Sun, L Guan, B Lin Plos one 16 (9), e0257092, 2021 | 14 | 2021 |
Phishing sites detection based on Url Correlation Y Xue, Y Li, Y Yao, X Zhao, J Liu, R Zhang 2016 4th International Conference on Cloud Computing and Intelligence …, 2016 | 14 | 2016 |
A video watermarking algorithm of H. 264/AVC for content authentication W Zhang, R Zhang, X Liu, C Wu, X Niu Journal of Networks 7 (8), 1150, 2012 | 14 | 2012 |
A two-stage generative adversarial networks with semantic content constraints for adversarial example generation J Liu, Y Tian, R Zhang, Y Sun, C Wang IEEE Access 8, 205766-205777, 2020 | 13 | 2020 |
A fully reversible data hiding scheme in encrypted images based on homomorphic encryption and pixel prediction J Liu, K Zhao, R Zhang Circuits, Systems, and Signal Processing 39 (7), 3532-3552, 2020 | 13 | 2020 |
Dynamic data integrity auditing for secure outsourcing in the cloud J Wei, R Zhang, J Liu, J Li, X Niu, Y Yao Concurrency and Computation: Practice and Experience 29 (12), e4096, 2017 | 13 | 2017 |
Efficient dynamic replicated data possession checking in distributed cloud storage systems J Wei, J Liu, R Zhang, X Niu International Journal of Distributed Sensor Networks 12 (1), 1894713, 2016 | 13 | 2016 |
Sustainable quality control mechanism of heavy truck production process for Plant-wide production process H Guo, R Zhang, Y Zhu, T Qu, M Zou, X Chen, Y Ren, Z He International Journal of Production Research 58 (24), 7548-7564, 2020 | 12 | 2020 |