Login / Signup
Na Ruan
ORCID
Publication Activity (10 Years)
Years Active: 2011-2024
Publications (10 Years): 49
Top Topics
Cooperative
Authentication Protocol
Fraud Detection
Lightweight
Top Venues
CoRR
GLOBECOM
IEICE Trans. Inf. Syst.
AsiaCCS
</>
Publications
</>
Chaohao Fu
,
Weijia Jia
,
Na Ruan
Client-Free Federated Unlearning via Training Reconstruction with Anchor Subspace Calibration.
ICASSP
(2024)
Zenan Lou
,
Na Ruan
,
Yuxiang Cai
FXChain: A Multi-consortium Permissioned Blockchain with Flexible Privacy-Preserving Strategies.
ACISP (3)
(2024)
Hongbin Chen
,
Chaohao Fu
,
Na Ruan
Steal from Collaboration: Spy Attack by a Dishonest Party in Vertical Federated Learning.
ACNS (1)
(2023)
Mohammed Almehdhar
,
Mohammed M. Abdelsamea
,
Na Ruan
Deep multi-locality convolutional neural network for DDoS detection in smart home IoT.
Int. J. Inf. Comput. Secur.
22 (3/4) (2023)
Bowen Li
,
Hanlin Gu
,
Ruoxin Chen
,
Jie Li
,
Chentao Wu
,
Na Ruan
,
Xueming Si
,
Lixin Fan
Temporal Gradient Inversion Attacks with Robust Optimization.
CoRR
(2023)
Na Ruan
,
Hanyi Sun
,
Zenan Lou
,
Jie Li
A General Quantitative Analysis Framework for Attacks in Blockchain.
IEEE/ACM Trans. Netw.
31 (2) (2023)
Jikun Chen
,
Feng Qiang
,
Na Ruan
Adversarial Representation Sharing: A Quantitative and Secure Collaborative Learning Framework.
CoRR
(2022)
Juzheng Huang
,
Qiang Tang
,
Chunhua Su
,
Na Ruan
Secure Collaboration Between Consortiums in Permissioned Blockchains.
ProvSec
(2022)
Mohammed Al-Mehdhara
,
Na Ruan
MSOM: Efficient Mechanism for Defense against DDoS Attacks in VANET.
Wirel. Commun. Mob. Comput.
2021 (2021)
Zekun Sun
,
Yujie Han
,
Zeyu Hua
,
Na Ruan
,
Weijia Jia
Improving the Efficiency and Robustness of Deepfakes Detection through Precise Geometric Features.
CoRR
(2021)
Zekun Sun
,
Yujie Han
,
Zeyu Hua
,
Na Ruan
,
Weijia Jia
Improving the Efficiency and Robustness of Deepfakes Detection Through Precise Geometric Features.
CVPR
(2021)
Jikun Chen
,
Ruoyu Deng
,
Hongbin Chen
,
Na Ruan
,
Yao Liu
,
Chao Liu
,
Chunhua Su
ALRS: An Adversarial Noise Based Privacy-Preserving Data Sharing Mechanism.
ACISP
(2021)
Feifan Yu
,
Na Ruan
,
Siyuan Cheng
Rational Manager in Bitcoin Mining Pool: Dynamic Strategies to Gain Extra Rewards.
AsiaCCS
(2020)
Na Ruan
,
Dongli Zhou
,
Weijia Jia
Consensus with Self-adaptive Throughput.
ACM Trans. Internet Techn.
20 (4) (2020)
Weijia Jia
,
Hongjian Peng
,
Na Ruan
,
Zhiqing Tang
,
Wei Zhao
WiFind: Driver Fatigue Detection with Fine-Grained Wi-Fi Signal Features.
IEEE Trans. Big Data
6 (2) (2020)
Yan Meng
,
Jinlei Li
,
Haojin Zhu
,
Xiaohui Liang
,
Yao Liu
,
Na Ruan
Revealing Your Mobile Password via WiFi Signals: Attacks and Countermeasures.
IEEE Trans. Mob. Comput.
19 (2) (2020)
Hanyi Sun
,
Na Ruan
,
Chunhua Su
How to Model the Bribery Attack: A Practical Quantification Method in Blockchain.
ESORICS (2)
(2020)
Na Ruan
,
Chunhua Su
,
Chi Xie
Securing Cooperative Adaptive Cruise Control in Vehicular Platoons via Cooperative Message Authentication.
IEICE Trans. Inf. Syst.
(2) (2020)
Chaohao Fu
,
Hongbin Chen
,
Na Ruan
,
Weijia Jia
Label Smoothing and Adversarial Robustness.
CoRR
(2020)
Na Ruan
,
Ruoyu Deng
,
Chunhua Su
GADM: Manual fake review detection for O2O commercial platforms.
Comput. Secur.
88 (2020)
Wenmain Yang
,
Kun Wang
,
Na Ruan
,
Wenyuan Gao
,
Weijia Jia
,
Wei Zhao
,
Nan Liu
,
Yunyong Zhang
Time-Sync Video Tag Extraction Using Semantic Association Graph.
ACM Trans. Knowl. Discov. Data
13 (4) (2019)
Dongli Zhou
,
Na Ruan
,
Weijia Jia
A Robust Throughput Scheme for Bitcoin Network without Block Reward.
HPCC/SmartCity/DSS
(2019)
Na Ruan
,
Zhikun Wei
,
Jienan Liu
Cooperative Fraud Detection Model With Privacy-Preserving in Real CDR Datasets.
IEEE Access
7 (2019)
Ruoyu Deng
,
Na Ruan
FraudJudger: Real-World Data Oriented Fraud Detection on Digital Payment Platforms.
CoRR
(2019)
Hanqing Liu
,
Na Ruan
,
Joseph K. Liu
Catfish Effect Between Internal and External Attackers: Being Semi-honest is Helpful.
CoRR
(2019)
Ruoyu Deng
,
Na Ruan
,
Guangsheng Zhang
,
Xiaohu Zhang
FraudJudger: Fraud Detection on Digital Payment Platforms with Fewer Labels.
ICICS
(2019)
Wenmian Yang
,
Kun Wang
,
Na Ruan
,
Wenyuan Gao
,
Weijia Jia
,
Wei Zhao
,
Nan Liu
,
Yunyong Zhang
Time-sync Video Tag Extraction Using Semantic Association Graph.
CoRR
(2019)
Hanyi Sun
,
Na Ruan
,
Hanqing Liu
Ethereum Analysis via Node Clustering.
NSS
(2019)
Ruoyu Deng
,
Na Ruan
,
Ruidong Jin
,
Yu Lu
,
Weijia Jia
,
Chunhua Su
,
Dandan Xu
SpamTracer: Manual Fake Review Detection for O2O Commercial Platforms by Using Geolocation Features.
Inscrypt
(2018)
Hanqing Liu
,
Na Ruan
,
Rongtian Du
,
Weijia Jia
On the Strategy and Behavior of Bitcoin Mining with N-attackers.
AsiaCCS
(2018)
Xu Chu
,
Na Ruan
,
Ming Li
,
Weijia Jia
Pseudonym Inference in Cooperative Vehicular Traffic Scenarios.
CNS
(2018)
Na Ruan
,
Mingli Wu
,
Shiheng Ma
,
Haojin Zhu
,
Weijia Jia
,
Songyang Wu
Detect and Prevent SIP Flooding Attacks in VoLTE by Utilizing a Two-Tier PFilter Design.
IEICE Trans. Inf. Syst.
(10) (2017)
Jianwei Qian
,
Fudong Qiu
,
Fan Wu
,
Na Ruan
,
Guihai Chen
,
Shaojie Tang
Privacy-Preserving Selective Aggregation of Online User Behavior Data.
IEEE Trans. Computers
66 (2) (2017)
Wenyan Yao
,
Na Ruan
,
Feifan Yu
,
Weijia Jia
,
Haojin Zhu
Privacy-Preserving Fraud Detection via Cooperative Mobile Carriers with Improved Accuracy.
SECON
(2017)
Na Ruan
,
Mengyuan Li
,
Jie Li
A novel broadcast authentication protocol for internet of vehicles.
Peer-to-Peer Netw. Appl.
10 (6) (2017)
Mengyuan Li
,
Na Ruan
,
Qiyang Qian
,
Haojin Zhu
,
Xiaohui Liang
,
Le Yu
SPFM: Scalable and Privacy-Preserving Friend Matching in Mobile Cloud.
IEEE Internet Things J.
4 (2) (2017)
Mingli Wu
,
Na Ruan
,
Shiheng Ma
,
Haojin Zhu
,
Weijia Jia
,
Qingshui Xue
,
Songyang Wu
Detect SIP Flooding Attacks in VoLTE by Utilizing and Compressing Counting Bloom Filter.
WASA
(2017)
Wenmian Yang
,
Na Ruan
,
Wenyuan Gao
,
Kun Wang
,
Wensheng Ran
,
Weijia Jia
Crowdsourced time-sync video tagging using semantic association graph.
ICME
(2017)
Hanqing Liu
,
Na Ruan
,
Rongtian Du
,
Weijia Jia
On the Strategy and Behavior of Bitcoin Mining with N-attackers.
IACR Cryptol. ePrint Arch.
2017 (2017)
Jiafa Liu
,
Junyi Liu
,
Huaxin Li
,
Haojin Zhu
,
Na Ruan
,
Di Ma
Who Moved My Cheese: Towards Automatic and Fine-Grained Classification and Modeling Ad Network.
GLOBECOM
(2016)
Na Ruan
,
Qi Hu
,
Lei Gao
,
Haojin Zhu
,
Qingshui Xue
,
Weijia Jia
,
Jingyu Cui
A Traffic Based Lightweight Attack Detection Scheme for VoLTE.
GLOBECOM
(2016)
Shen Zhang
,
Lu Zhou
,
Mingli Wu
,
Zhushou Tang
,
Na Ruan
,
Haojin Zhu
Automatic Detection of SIP-Aware Attacks on VoLTE Device.
VTC Fall
(2016)
Mengyuan Li
,
Yan Meng
,
Junyi Liu
,
Haojin Zhu
,
Xiaohui Liang
,
Yao Liu
,
Na Ruan
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals.
CCS
(2016)
Lei Gao
,
Na Ruan
,
Haojin Zhu
Efficient and secure message authentication in cooperative driving: A game-theoretic approach.
ICC
(2016)
Na Ruan
,
Lei Gao
,
Haojin Zhu
,
Weijia Jia
,
Xiang Li
,
Qi Hu
Toward Optimal DoS-Resistant Authentication in Crowdsensing Networks via Evolutionary Game.
ICDCS
(2016)
Yaoan Jin
,
Chunhua Su
,
Na Ruan
,
Weijia Jia
Privacy-Preserving Mining of Association Rules for Horizontally Distributed Databases Based on FP-Tree.
ISPEC
(2016)
Shuying Lai
,
Huaxin Li
,
Haojin Zhu
,
Na Ruan
De-anonymizing social networks: Using user interest as a side-channel.
ICCC
(2015)
Bett Ben Chirchir
,
Xiaokuan Zhang
,
Mengyuan Li
,
Qiyang Qian
,
Na Ruan
,
Haojin Zhu
SmartSec: Secret sharing-based location-aware privacy enhancement in smart devices.
ICCC
(2015)
Jianwei Qian
,
Fudong Qiu
,
Fan Wu
,
Na Ruan
,
Guihai Chen
,
Shaojie Tang
A Differentially Private Selective Aggregation Scheme for Online User Behavior Analysis.
GLOBECOM
(2015)
Xiang Li
,
Na Ruan
,
Fan Wu
,
Jie Li
,
Mengyuan Li
Efficient and enhanced broadcast authentication protocols based on multilevel μTESLA.
IPCCC
(2014)
Mengyuan Li
,
Na Ruan
,
Haojin Zhu
,
Jie Li
,
Xiang Li
A Paralleling Broadcast Authentication Protocol for Sparse RSUs in Internet of Vehicles.
MSN
(2014)
Na Ruan
,
Takashi Nishide
,
Yoshiaki Hori
Elliptic curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs.
Inf. Media Technol.
7 (4) (2012)
Na Ruan
,
Yizhi Ren
,
Yoshiaki Hori
,
Kouichi Sakurai
Performance Analysis of Key Management Schemes in Wireless Sensor Network Using Analytic Hierarchy Process.
TrustCom
(2011)