Ruoyu Zhao

946 total citations
46 papers, 579 citations indexed

About

Ruoyu Zhao is a scholar working on Computer Vision and Pattern Recognition, Artificial Intelligence and Signal Processing. According to data from OpenAlex, Ruoyu Zhao has authored 46 papers receiving a total of 579 indexed citations (citations by other indexed papers that have themselves been cited), including 32 papers in Computer Vision and Pattern Recognition, 18 papers in Artificial Intelligence and 7 papers in Signal Processing. Recurrent topics in Ruoyu Zhao's work include Advanced Steganography and Watermarking Techniques (21 papers), Chaos-based Image/Signal Encryption (20 papers) and Cryptography and Data Security (8 papers). Ruoyu Zhao is often cited by papers focused on Advanced Steganography and Watermarking Techniques (21 papers), Chaos-based Image/Signal Encryption (20 papers) and Cryptography and Data Security (8 papers). Ruoyu Zhao collaborates with scholars based in China, Australia and Hong Kong. Ruoyu Zhao's co-authors include Yushu Zhang, Rushi Lan, Xiangli Xiao, Xinpeng Zhang, Wenying Wen, Youwen Zhu, Zhongyun Hua, Yong Xiang, Tao Wang and Zhe Liu and has published in prestigious journals such as SHILAP Revista de lepidopterología, Journal of Cleaner Production and IEEE Transactions on Image Processing.

In The Last Decade

Ruoyu Zhao

39 papers receiving 570 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Ruoyu Zhao China 14 390 154 99 67 44 46 579
Sofia Tsekeridou Greece 12 460 1.2× 87 0.6× 227 2.3× 36 0.5× 30 0.7× 51 616
Sun‐Young Lee South Korea 10 150 0.4× 103 0.7× 116 1.2× 105 1.6× 23 0.5× 51 344
Nazir A. Loan India 13 884 2.3× 130 0.8× 105 1.1× 110 1.6× 33 0.8× 17 1.0k
Mukund Narasimhan United States 10 84 0.2× 159 1.0× 39 0.4× 49 0.7× 39 0.9× 14 272
Jennifer Gillenwater United States 10 115 0.3× 492 3.2× 41 0.4× 96 1.4× 33 0.8× 19 622
Krishna Kummamuru India 10 150 0.4× 306 2.0× 96 1.0× 160 2.4× 27 0.6× 21 433
Ke Yuan China 8 342 0.9× 191 1.2× 15 0.2× 64 1.0× 113 2.6× 35 502
Gadi Aleksandrowicz Israel 5 89 0.2× 211 1.4× 13 0.1× 63 0.9× 32 0.7× 10 366
Ayman M. Abdalla Jordan 9 113 0.3× 63 0.4× 29 0.3× 19 0.3× 30 0.7× 37 236
Young‐Chang Hou Taiwan 10 636 1.6× 111 0.7× 41 0.4× 36 0.5× 35 0.8× 20 686

Countries citing papers authored by Ruoyu Zhao

Since Specialization
Citations

This map shows the geographic impact of Ruoyu Zhao's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Ruoyu Zhao with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Ruoyu Zhao more than expected).

Fields of papers citing papers by Ruoyu Zhao

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Ruoyu Zhao. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Ruoyu Zhao. The network helps show where Ruoyu Zhao may publish in the future.

Co-authorship network of co-authors of Ruoyu Zhao

This figure shows the co-authorship network connecting the top 25 collaborators of Ruoyu Zhao. A scholar is included among the top collaborators of Ruoyu Zhao based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Ruoyu Zhao. Ruoyu Zhao is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Lu, Jun, et al.. (2025). Multiple-image encryption algorithm based on a new 3D hyperchaotic map and Whac-A-Mole scrambling model. Expert Systems with Applications. 290. 128393–128393. 4 indexed citations
2.
Zhao, Ruoyu, Xiantao Jiang, F. Richard Yu, et al.. (2025). Leveraging Cross-Attention Transformer and Multifeature Fusion for Cross-Linguistic Speech Emotion Recognition. IEEE Internet of Things Journal. 12(23). 50653–50664.
3.
Zhao, Ruoyu, et al.. (2025). Privacy-Preserving Image Retrieval Based on Thumbnail-Preserving Visual Features. IEEE Transactions on Circuits and Systems for Video Technology. 35(8). 7719–7731.
4.
Zhao, Ruoyu, Yushu Zhang, Rushi Lan, et al.. (2025). All Roads Lead to Rome: Achieving 3D Object Encryption Through 2D Image Encryption Methods. IEEE Transactions on Image Processing. 34. 1075–1089. 2 indexed citations
5.
Zhao, Ruoyu, et al.. (2025). CTD-inpainting: Towards the Coherence of Text-driven Inpainting with Blended Diffusion. Information Fusion. 122. 103163–103163.
6.
He, Bo, Hongqian Zhang, & Ruoyu Zhao. (2025). SDEGCN: Syntactic dependency enhanced and integrated graph convolutional network for aspect-based sentiment analysis. Journal of Computational Science. 92. 102732–102732.
7.
Lu, Jun, et al.. (2024). Text visualization encryption based on coordinate substitution and chaotic system. Chaos Solitons & Fractals. 184. 115001–115001. 6 indexed citations
8.
Zhao, Ruoyu, et al.. (2024). A blockchain system supporting cross-border data protection and consistency verification in unified global carbon emissions trading framework. Journal of Cleaner Production. 448. 141693–141693. 10 indexed citations
9.
Lu, Jun, et al.. (2024). A low-time-consumption image encryption combining 2D parametric Pascal matrix chaotic system and elementary operation. Journal of King Saud University - Computer and Information Sciences. 36(8). 102169–102169. 9 indexed citations
10.
Zhao, Ruoyu, Yushu Zhang, Wenying Wen, et al.. (2024). PR3: Reversible and Usability-Enhanced Visual Privacy Protection via Thumbnail Preservation and Data Hiding. IEEE Transactions on Big Data. 11(1). 59–73. 4 indexed citations
11.
He, Bo, et al.. (2024). Cold-Start Product Recommendation Method Based on GAE. 13(3). 8–15.
12.
Wang, Tao, Yushu Zhang, Shuren Qi, et al.. (2024). Security and Privacy on Generative Data in AIGC: A Survey. ACM Computing Surveys. 57(4). 1–34. 25 indexed citations
13.
Zhao, Ruoyu, Yushu Zhang, Tao Wang, et al.. (2024). Visual Content Privacy Protection: A Survey. ACM Computing Surveys. 57(5). 1–36. 9 indexed citations
14.
Zhao, Ruoyu, et al.. (2024). Reversible image resolution degradation supporting privacy protection and usability management in the cloud for smart cities. Expert Systems with Applications. 265. 125851–125851. 1 indexed citations
15.
He, Bo, et al.. (2024). CABiLSTM-BERT: Aspect-based sentiment analysis model based on deep implicit feature extraction. Knowledge-Based Systems. 309. 112782–112782. 10 indexed citations
16.
Zhao, Ruoyu, Yushu Zhang, Shimin Li, et al.. (2023). 3D mesh encryption with differentiated visual effect and high efficiency based on chaotic system. Expert Systems with Applications. 238. 122140–122140. 7 indexed citations
17.
Zhao, Ruoyu, et al.. (2023). 云存储图像缩略图保持的加密研究进展. Journal of Image and Graphics. 28(3). 645–665. 1 indexed citations
18.
Zhao, Ruoyu, Yushu Zhang, Youwen Zhu, Rushi Lan, & Zhongyun Hua. (2023). Metaverse: Security and Privacy Concerns. SHILAP Revista de lepidopterología. 3(2). 93–99. 61 indexed citations
19.
Zhang, Yongming, Yongming Zhang, Ruoyu Zhao, et al.. (2022). High-efficiency and visual-usability image encryption based on thumbnail preserving and chaotic system. Journal of King Saud University - Computer and Information Sciences. 34(6). 2993–3010. 33 indexed citations
20.
Zhang, Yushu, et al.. (2022). F-TPE: Flexible Thumbnail-Preserving Encryption Based on Multi-Pixel Sum-Preserving Encryption. IEEE Transactions on Multimedia. 25. 5877–5891. 46 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026