photo

Na Ruan

Associate Professor, Ph.D
Shanghai Jiao Tong University
Assistant Director, SJTU Center of Blockchain

About Me

阮娜,上海交通大学副教授,博士生导师,隐私计算与智能安全实验室负责人,校区块链研究中心主任助理,无锡区块链高等研究中心副主任。日本九州大学博士,澳洲莫纳什大学访问学者,中国计算机学会(CCF)高级会员,CCF 区块链专委会执行委员,《网络空间安全学报》青年编委;上海交通大学晨星优秀青年学者获得者。主要从事网络安全与数据隐私、区块链、人工智能安全等方面研究。发表论文50余篇,合著学术专著2项,申请及授权专利10余项,主持科技部重点研发项目课题,国家自然科学基金项目,上海科委科技创新行动计划项目,教育部-华为产学研协同育人项目,国家电网总部科技项目课题,中国计算机学会腾讯犀牛鸟基金,无锡市产研院先导预研项目等国家、省部级课题共计20余项。获CCF推荐会议WASA2017最佳论文入围奖,指导学生获CCF&ATEC2023全国大学生区块链安全技术与创新应用竞赛一等奖。
Na Ruan received the B.E. and M. E. degree from China University of Mining&Technology, Xu Zhou, China in 2007 and 2010 respectively. She received the Dr. Eng. Degree from Kyushu University, Fukuoka, Japan in 2012. She is with Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai, China where she is an associate professor. She was a visiting researcher in Monash University, Melbourne, Australia. Her current research interests are in blockchain, AI security and data privacy. She serves as guest editors for many IEEE journals and transactions. She has also served on the program committees for several international conferences.

Office: SEIEE 3-527
800 Dongchuan Road, Minhang District
Shanghai 200240, P.R. China

Email: naruan@cs.sjtu.edu.cn / naruan@sjtu.edu.cn / ruannana@gmail.com

I am looking for self-motivated students who are strongly committed to research,
If you are interested in Security and Privacy, Blockchain and AI Security, feel free to send me your CV.

Interests

  • Blockchain
  • Network Security and Data Privacy
  • AI Security

Courses


  1. CS3611 (IEEE) Computer Network
  2. EE357 (IEEE) Computer Network
  3. MA115 (SEIEE) Discrete Mathematics
  4. CS902 (SEIEE) Thinking and Approach of Programming
  5. CS101 (Zhiyuan College) Introduction to Computer Science
  6. P033501 (CS Master) Computer Network

Papers


    *Corresponding author
  1. [TMC24] Na Ruan*, Jikun Chen, Tu Huang, Zekun Sun, Jie Li. Fool Attackers by Imperceptible Noise: A Privacy-Preserving Adversarial Representation Mechanism for Collaborative Learning. IEEE Transactions on Mobile Computing, 2024, To Appear. (TMC, CCF-A) New
  2. [ICASSP24] Chaohao Fu, Weijia Jia,Na Ruan*. Client-free federated unlearning via training reconstruction with anchor subspace calibration (ICASSP 2024,CCF-B),Seoul,Korea. New
  3. [ToN22] Na Ruan*, Hanyi Sun, Zenan Lou, Jie Li. A General Quantitative Analysis Framework for Attacks in Blockchain. IEEE/ACM Transactions on Networking, 2022. (ToN, CCF-A)
  4. [CVPR21] Zekun Sun, Yujie Han, Zeyu Hua, Na Ruan*, Weijia Jia, Improving the Efficiency and Robustness of Deepfakes Detection through Precise Geometric Features, IEEE Conference on Computer Vision and Pattern Recognition (CVPR,CCF-A), 2021.
  5. [计算机学报21] 刘汉卿, 阮娜*,区块链中攻击方式的研究. 计算机学报, 2021年第4期. (CCF-A)
  6. [计算机学报21] 阮娜,刘汉卿,斯雪明,采用工作量证明共识机制的区块链中挖矿攻击者间的鲶鱼效应,计算机学报, 2021年第1期。 (CCF-A)
  7. [TOIT20] Na Ruan, Dongli Zhou, Weijia Jia, Ursa: Robust Performance for Nakamoto Consensus with Self-adaptive Throughput, ACM Transactions on Internet Technology (ACM TOIT), 2020. (CCF-B)
  8. [Esorics20] Hanyi Sun, Na Ruan*, Chunhua Su . How to Model the Bribery Attack: A Practical Quantification Method in Blockchain. European Symposium on Research in Computer Security(ESORICS 2020, CCF-B,accept ration 19%, 72 in 366), 2020.
  9. [COSE19] Na Ruan, Ruoyu Deng, Chunhua Su. GADM: Manual Fake Review Detection for O2O Commercial Platforms. Computers & Security (COSE, CCF-B), 2019. Download
  10. [TKDD19] Wenmian Yang, Weijia Jia, Kun Wang, Na Ruan, Wenyuan Gao. Time-sync Video Tag Extraction Using Semantic Association Graph. ACM Transactions on Knowledge Discovery from Data (TKDD, CCF-B), 2019. Download
  11. [TMC19] Haojin Zhu, Yan Meng, Xiaohui Liang, Yao Liu, Na Ruan. Revealing Your Mobile Password via WiFi Signals: Attacks and Countermeasures. IEEE Transactions on Mobile Computing (CCF-A, SCI), 2019. Download
  12. [TBD18] Weijia Jia, Hongjian Peng, Na Ruan*, Zhiqing Tang, Wei Zhao. WiFind: Driver fatigue detection with fine-grained Wi-Fi signal features. IEEE Transactions on Big Data (SCI), 2018. Download
  13. [ICME17]Wenmian Yang, Na Ruan*, Wenyuan Gao, Kun Wang, Wensheng Ran, Weijia Jia. Crowdsourced Time-sync Video Tagging using Semantic Association Graph. IEEE International Conference on Multimedia and Expo (ICME, CCF-B), Hongkong, China, 2017. Download
  14. [WASA17-BPR Award]Mingli Wu,Na Ruan*, Shiheng Ma, Haojin Zhu, Weijia Jia, Qingshui Xue, Songyang Wu. Detect SIP Flooding Attacks in VoLTE by Utilizing and Compressing Counting Bloom Filter. International Conference on Wireless Algorithms, Systems, and Applications (WASA, Best Paper Runner-up Award), Guilin, China, 2017. Download
  15. [SECON17] Wenyan Yao, Na Ruan*, Feifan Yu, Weijia Jia, Haojin Zhu. Privacy-Preserving Fraud Detection via Cooperative Mobile Carriers with Improved Accuracy. Annual IEEE International Conference on Sensing, Communication, and Networking (IEEE SECON, CCF-B), San Diego, USA, 2017. Download
  16. [CCS16] Mengyuan Li, Yan Meng, Junyi Liu, Haojin Zhu, Xiaohui Liang, Yao Liu, Na Ruan. When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals. ACM SIGSAC Conference on Computer and Communications Security (ACM CCS, Accepting rate 16.5%, CCF-A), Vienna, Austria, 2016. Download
  17. [ICDCS16] Na Ruan, Lei Gao, Haojin Zhu, Weijia Jia, Xiang Li, Qi Hu. Toward Optimal DoS-Resistant Authentication in Crowdsensing Networks via Evolutionary Game. International Conference on Distributed Computing Systems (ICDCS, Accepting rate 17.6%, CCF-B), Kyoto, Japan, 2016. Download
  18. [TC16] Jianwei Qian, Fudong Qiu, Fan Wu, Na Ruan, Guihai Chen, Shaojie Tang. Privacy-Preserving Selective Aggregation of Online User Behavior Data. IEEE Transactions on Computers (SCI, CCF-A), 2016. Download
  19. [IOTJ16] Mengyuan Li, Na Ruan*, QiYang Qian, Haojin Zhu, Le Yu. SPFM: Scalable and Privacy-preserving Friend Matching in Mobile Cloud. IEEE Internet of Things Journal (SCI, JCR-1), 2016. Download
  20. Zenan Lou, Na Ruan*. FXChain: a multi-consortium blockchain with flexible privacy-preserving strategies, The 29th Australasian Conference on Information Security and Privacy (ACISP2024),Sydney, Australia. New
  21. Hongbin Chen, Chaohao Fu, Na Ruan*. Steal from Collaboration: Spy Attack by a Dishonest Party in Vertical Federated Learning. 21st International Conference on Applied Cryptography and Network Security (ACNS 2023),Kyoto,Japan.
  22. Huang Juzheng, Qiang Tang, Chunhua Su, Na Ruan*. Secure Collaboration between Consortiums in Permissioned Blockchains.The 16th International Conference on Provable and Practical Security (ProvSec 2022)
  23. Mohammed almehdhar, Mohammed M. Abdelsamea, and Na Ruan*. Deep multi-locality convolutional neural network for DDoS detection in smart home IoT. Int. J. of Information and Computer Security (IJICS), 2022.
  24. Jikun Chen,Hongbin Chen,Ruoyu Deng,Na Ruan*,Yao Liu,Chao Liu,Chunhua Su,ALRS-An Adversarial Noise Based Data Sharing Mechanism for Privacy Protecting,The 26th Australasian Conference on Information Security and Privacy (ACISP2021).
  25. Feifan Yu, Na Ruan*, Siyuan Cheng. Rational Manager in Bitcoin Mining Pool: Dynamic Strategies to Gain Extra Rewards. The 15th ACM Asia Conference on Computer and Communications Security (ACM AsiaCCS, accept ration 21%, 67 in 308), 2020.
  26. Na Ruan, Chunhua Su, Chi Xie, Weijia Jia, Securing Cooperative Adaptive Cruise Control in Vehicular Platoons via Cooperative Message Authentication, IEICE Transactions on Information and Systems (SCI), 2020.
  27. Ruoyu Deng, Na Ruan*, Guangsheng Zhang, Xiaohu Zhang. FraudJudger: Fraud Detection on Digital Payment Platforms with Fewer Labels. 21st International Conference on Information and Communications Security (ICICS, Beijing, China, 2019. Download
  28. Hanyi Sun, Na Ruan*, Hanqing Liu. Ethereum Analysis via Node Clustering. International Conference on Network and System Security (NSS), Sapporo, Japan, 2019. Download
  29. Dongli Zhou, Na Ruan* Weijia Jia . A Robust Throughput Scheme for Bitcoin Network without Block Reward. The 21th IEEE International Conference on High Performance Computing and Communications (HPCC ), Zhangjiajie, China, 2019. Download
  30. Na Ruan, Zhikun Wei, Jienan Liu. Cooperative Fraud Detection Model With Privacy-Preserving in Real CDR Datasets. IEEE Access (SCI), 2019. Download
  31. Ruoyu Deng, Na Ruan*, Ruidong Jin, Yu Lu, Weijia Jia, Chuhua Su, Dandan Xu. SpamTracer: Manual Fake Review Detection for O2O Commercial Platforms by Using Geolocation Features. International Conference on Information Security and Cryptology (Inscrypt), Fuzhou, China, 2018. Download
  32. Hanqing Liu, Na Ruan*, Rongtian Du, Weijia Jia. On the Strategy and Behavior of Bitcoin Mining with N-attackers. Asia Conference on Computer and Communications Security (ACM AsiaCCS, Accept ration 19%, 62 in 310), Seoul, Korean, 2018. Download
  33. Xu Chu, Na Ruan*, Ming Li, Weijia Jia. Pseudonym Inference in Cooperative Vehicular Traffic Scenarios. The IEEE Conference on Communications and Network Security (IEEE CNS), Beijing, China, 2018. Download
  34. Na Ruan, Mingli Wu, Shiheng Ma, Haojin Zhu, Weijia Jia. Detect and Prevent SIP Flooding Attacks in VoLTE by Utilizing a Two-Tier PFilter Design. IEICE Transactions on Information and Systems (SCI/EI), 2017. Download
  35. Jiafa Liu, Junyi Li, Huaxin Li, Haojin Zhu, Na Ruan, Di Ma. Who Moved My Cheese: Towards Automatic and Fine-grained Classification and Modeling Ad Network. IEEE Global Communications Conference (IEEE GLOBECOM), Washington, DC USA, 2016. Download
  36. Na Ruan, Qi Hu, Lei Gao, Haojin Zhu, Qingshui Xue, Weijia Jia. A Traffic Based Lightweight Attack Detection Scheme for VoLTE. IEEE Global Communications Conference (IEEE GLOBECOM), Washington, DC USA, 2016. Download
  37. Yaoan Jin, Chunhua Su, Na Ruan*, Weijia Jia. Privacy-Preserving Mining of Association Rules for Horizontally Distributed Databases Based on FP-tree. International Conference on Information Security Practice and Experience (ISPEC), Zhangjiajie, China, 2016. Download
  38. Lei Gao, Na Ruan*, Haojin Zhu. Efficient and Secure Message Authentication in Cooperative Driving: A Game-Theoretic Approach. IEEE International Conference on Communications (IEEE ICC), Kuala Lumpur, Malaysia, 2016. Download
  39. Na Ruan, Mengyuan Li, Jie Li. A Novel Broadcast Authentication Protocol for Internet of Vehicles.Peer-to-Peer Networking and Applications (PPNA), 2016. Download
  40. Jianwei Qian, Fudong Qiu, Fan Wu, Na Ruan, Guihai Chen, Shaojie Tang. A Differentially Private Selective Aggregation Scheme for Online User Behavior Analysis. IEEE Global Communications Conference (IEEE Globecom), San Diego, CA, USA, 2015. Download
  41. Ben Bett, Xiaokuan Zhang, Mengyuan Li, Qiyang Qian, Na Ruan, Haojin Zhu. SmartSec: Secret Sharing-based Location-aware Privacy Enhancement in Smart Devices. IEEE/CIC International Conference on Communications in China (IEEE ICCC), Shenzhen, China, 2015. Download
  42. Shuying Lai, Huaxin Li, Haojin Zhu, Na Ruan. De-anonymizing Social Networks: Using User Interest as a side-channel. IEEE/CIC International Conference on Communications in China (IEEE ICCC), Shenzhen, China, 2015. Download
  43. Mengyuan Li, Na Ruan*, Haojin Zhu, Jie Li, Xiang Li. A Paralleling Broadcast Authentication Protocol for sparse RSUs in Internet of Vehicles. International Conference on Mobile Ad-hoc and Sensor Networks (MSN), Maui, HI, USA, 2014. Download
  44. Xiang Li, Na Ruan*, Fan Wu, Jie Li, Mengyuan Li. Efficient and Enhanced Broadcast Authentication Protocols based on Multilevel uTESLA. IEEE International Performance Computing and Communications Conference (IPCCC), Austin, Texas, USA, 2014. Download
  45. Na Ruan, Yoshiaki Hori. DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of Things. International Conference on Selected Topics in Mobile and Wireless Networking (iCOST), Avignon, France, 2012. Download
  46. Na Ruan, Takashi Nishide, Yoshiaki Hori. Elliptic Curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs. Information Processing Society of Japan (IPSJ), 2012. Download
  47. Na Ruan, Yizhi Ren, Yoshiaki Hori, Kouchi Sakurai. Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network. Journal of Networks, 2012. Download
  48. Na Ruan, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai. Performance Analysis of Key Management Schemes in Wireless Sensor Network Using Analytic Hierarchy Process. IEEE International Conference on Trust, Security and Privacy in Computing and Communications, (IEEE TrustCom), Changsha, China, 2011. Download
  49. Na Ruan, Takashi Nishide, Yoshiaki Hori. Threshold ElGamal-based Key Management scheme for distributed RSUs in VANET. International Conference on Selected Topics in Mobile and Wireless Networking (iCOST, in conjunction with WiMOB 2011.) Shanghai, China, 2011. Download
  50. Na Ruan, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai. A Generic Evaluation Method for Key Management Schemes in Wireless Sensor Network. International Conference on Ubiquitous Information Management and Communication (ICUIMC, Student grant award), Seoul, Korean, 2011. Download
  51. >>>More>>>

Books


  1. 过敏意, 吴晨涛, 李超, 阮娜, 陈雨亭.《云计算原理与实践》. 机械工业出版社, 400,000字, 出版时间 2017-03.
  2. 阮娜, 龙宇, 刘卫东, 张磊. 《信息时代的计算机科学理论》(Computer Science Theory for the Information Age 中文版). 上海交通大学出版社, 500,000 字, ISBN 9787313111098, 出版时间 2014-06.

Domestic Conference


  1. 论坛联合主席,“区块链与数据安全关键技术论坛”,大湾区计算机创新技术大会(第一届),2023.
  2. 引导嘉宾,“数据要素流通-区块链信任的能与不能”,中国计算机学会青年计算机科技论坛,CCF YOCSEF济南2023.
  3. 特邀报告,“Web3.0安全溯源关键技术研究”,中国软件大会区块链可靠性分析论坛,2023.
  4. 特邀报告,“新型网络安全挑战与机遇”,中国图像图形学会“人工智能与安全”前沿讲习班(IGAL18),2021.
  5. 特邀报告,“区块链解决多方联合学习中安全问题探索”,中国区块链技术产业发展峰会2020
  6. 特邀报告,“区块链中若干攻击方式的研究”,中国区块链技术大会(CCF CBC 2018)
  7. 研究报告. “階層分析法を使用した無線センサネットワークにおける鍵管理方式の分析”. The Symposium on Cryptography and Information Security (SCIS), Kobe, Japan, 2011.

Research


  1. 主持,国家科技部重点研发计划项目课题,基于网络行为模式分析的虚拟货币账户去匿名化技术研究,119万,2023-12 - 2026-11 New
  2. 主持,上海科委科技创新行动计划项目,面向多层次的区块链漏洞挖掘技术研究,200万,2023-12 - 2025-11 New
  3. 主持,国网总部科技项目课题,面向分布式分散资源聚合互动的可信交易关键技术研究及应用,110万,2023-12 - 2025-11 New
  4. 主持,无锡市产业创新研究院项目,面向电力能源体系的区块链软硬件协同关键技术与设备研制,100万,2024-01 - 2024-12 New
  5. 主持,国家自然科学基金委员会青年基金,基于自适应巡航系统的车联网中合作安全与隐私保护研究,25万,2018-01 - 2020-12
  6. 主持,中国联合网络通信有限公司研究院横向项目,100万,2017-2018
  7. 主持,奇虎360有限公司横向项目,60万,2019-2020
  8. 主持,CCF-腾讯犀牛鸟科研基金项目 (2014, 17⁄152),Encryption Strategy based on the Importance Evaluation of Mobile Communication Contents,2014-10 - 2015-10

Membership


  1. Member of Association for Computing Machinery (ACM)
  2. Member of Institute of Electrical and Electronics Engineers (IEEE)
  3. Member of Chinese Association of Cryptologic Research (CACR)
  4. Member of Information Processing Society of Japan (IPSJ)
  5. Committee Member of China Computer Federation-Technical Committee on Block Chain (CCF TCBC)
  6. Committee Member of China Computer Federation-Network and Data Communications (CCF TCCOMM)

Academic


  1. Reviewer, Transactions on Information Forensics & Security
  2. Reviewer, IEEE Trans. on Dependable & Secure Computing
  3. Reviewer, Chinese Journal of Computers
  4. Reviewer, SCIENCE CHINA Info. Sciences
  5. Reviewer,ESORICS
  6. Organizing Chair, NSS2019
  7. Guest Editor, Blockchains

Members


Doctor


photo

Chaohao Fu

2nd year (Co-supervised)
Adversarial Examples
Forgery Detection

Paper:
  1. ICASSP24
photo

Zekun Sun

1st year
Data Security

Paper:
  1. CVPR21



Master


photo

Hongbin Chen

3th year
Security and Privacy in Artificial intelligence

Paper:
photo

Jikun Chen

3th year
Adversarial Learning

Paper:
photo

Zhao Lu

2nd year
Blockchain

Paper:
photo

Zenan Lou

2nd year
Blockchain

Paper:
photo

Xunzhi Chen

1st year
Blockchain

Paper:
  1. Privacy-Preserving Fraud Detection via Cooperative Mobile Carriers with Improved Accuracy
photo

Jianghui Zhai

1st year
Blockchain

Paper:
photo

Zijian Liu

1st year
AI Security

Paper:



Undergraduate


photo

Jiaye Li

4th year
Multi-Target Learning

Paper:
photo

Xiangyu Shen

4th year
Data privacy

Paper:
photo

Zhiqiang Ma

3th year
Data Security and Privacy

Paper:



Graduated


photo

Xu Chu

Master, graduated in 2019
Vehicle Platooning

Paper:
  1. Pseudonym Inference in Cooperative Vehicular Traffic Scenarios
photo

Mingli Wu

Master, graduated in 2018
Network Security
Smartphone Privacy

Paper:
  1. Detect and Prevent SIP Flooding Attacks in VoLTE by Utilizing a Two-Tier PFilter Design
  2. Detect SIP Flooding Attacks in VoLTE by Utilizing and Compressing Counting Bloom Filter
photo

Jingyu Cui

Master @ Georgia Institute of Technology
Vehicle Platooning
Machine Learning

Paper:
photo

Yuxin Ding

Bachelor, graduated in 2019
Internet of Vehicles

Paper:
photo

Ruidong Jin

Bachelor, graduate in 2018 and Master in Tokyo Institute of Technology
Artificial Intelligence
Spamming Detection

Paper:
  1. Ruoyu Deng, Na Ruan*, Ruidong Jin, Yu Lu, Weijia Jia, Chunhua Su and Dandan Xu. “SpamTracer: Manual Fake Review Detection for O2O Commercial Platforms by Using Geolocation Features,” Inscrypt 2018, Dec 14-17, 2018, Fuzhou, China.
photo

Yao'an Jin

Master @ Osaka University
Cyber Security
Cryptography
Security Application

Paper:
  1. Jin Y, Su C, Na R, Jia W, et al. Privacy-Preserving Mining of Association Rules for Horizontally Distributed Databases Based on FP-Tree[M]// Information Security Practice and Experience. Springer International Publishing, 2016.
photo

Xingyang Liu

Bachelor, graduated in 2018
Privacy Preservation
Data Mining

Paper:
photo

Weiyi Li

Bachelor, graduated in 2019
Internet of Vehicles

Paper:
photo

Yu Lu

Bachelor, graduated in 2019
Spamming Detection

Paper:
  1. Ruoyu Deng, Na Ruan*, Ruidong Jin, Yu Lu, Weijia Jia, Chunhua Su and Dandan Xu. “SpamTracer: Manual Fake Review Detection for O2O Commercial Platforms by Using Geolocation Features,” Inscrypt 2018, Dec 14-17, 2018, Fuzhou, China.
photo

Chengliang Si

Bachelor, graduated in 2019
Data Mining
Computer Security

Paper:
photo

Zhikun Wei

Bachelor, graduated in 2018
Privacy and Data Security in Artificial Intelligence

Paper:
photo

Weijie Yuan

Bachelor, graduated in 2019
Big Data and Privacy in the Internet of Vehicles

Paper:
photo

Changzhao Zhu

Bachelor, graduated in 2019
The Bribing Attacker in Blockchain

Paper:
photo

Hanqing Liu

3th year
Blockchain

Paper:
  1. Ethereum Analysis via Node Clustering
  2. On the Strategy and Behavior of Bitcoin Mining with N-attackers
photo

Hanyi Sun

2nd year
Blockchain

Paper:
  1. Ethereum Analysis via Node Clustering
photo

Dongli Zhou

3th year
Blockchain

Paper:
  1. A Robust Throughput Scheme for Bitcoin Network without Block Reward
photo

Ruoyu Deng

3th year
Data Security and Privacy

Paper:
  1. SpamTracer: Manual Fake Review Detection for O2O Commercial Platforms by Using Geolocation Features
photo

Feifan Yu

3th year
Blockchain
Information Security
Network Security

Paper:
  1. Privacy-Preserving Fraud Detection via Cooperative Mobile Carriers with Improved Accuracy
photo

Zeyu Hua

3th year
Facial Forensics

Paper:
photo

Bingjie Tu

3th year
Data Security and Privacy

Paper: