Na Ruan
Home
Publications
Persons
Research
Teaching
Activities
Contact
Publications
Type
Conference paper
Journal article
Book
Domestic Conference Paper
Date
2019
2018
2017
2016
2015
2014
2012
2011
2010
Hanyi Sun
,
Na Ruan
,
Hanqing Liu
.
Ethereum Analysis via Node Clustering
. International Conference on Network and System Security(NSS), 2019.
PDF
Cite
Na Ruan
,
Zhikun Wei
,
Jienan Liu
.
Cooperative Fraud Detection Model With Privacy-Preserving in Real CDR Datasets
. IEEE Access, 2019.
PDF
Cite
Dongli Zhou
,
Na Ruan
,
Weijia Jia
.
A Robust Throughput Scheme for Bitcoin Network without Block Reward
. The 21th IEEE International Conference on High Performance Computing and Communications (CCF-C), 2019.
Cite
Wenmian Yang
,
Weijia Jia
,
Kun Wang
,
Na Ruan
,
Wenyuan Gao
.
Time-sync Video Tag Extraction Using Semantic Association Graph
. Transactions on Knowledge Discovery from Data (CCF-B), 2019.
PDF
Cite
Haojin Zhu
,
Yan Meng
,
Xiaohui Liang
,
Yao Liu
,
Na Ruan
.
Revealing Your Mobile Password via WiFi Signals: Attacks and Countermeasures
. IEEE Transactions on Mobile Computing (CCF-A, to appear), 2019.
PDF
Cite
Ruoyu Deng
,
Na Ruan
,
Ruidong Jin
,
Yu Lu
,
Weijia Jia
,
Chuhua Su
,
Dandan Xu
.
SpamTracer: Manual Fake Review Detection for O2O Commercial Platforms by Using Geolocation Features
. International Conference on Information Security and Cryptology(Inscrypt), 2018.
PDF
Cite
Weijia Jia
,
Hongjian Peng
,
Na Ruan
,
Zhiqing Tang
,
Wei Zhao
.
WiFind: Driver fatigue detection with fine-grained Wi-Fi signal features
. IEEE Transactions on Big Data, 2018.
PDF
Cite
Hanqing Liu
,
Na Ruan
,
Rongtian Du
,
Weijia Jia
.
On the Strategy and Behavior of Bitcoin Mining with N-attackers
. Asia Conference on Computer and Communications Security(AsiaCCS) (CCF-C) (Accept ration 19%, 62 in 310), 2018.
PDF
Cite
Xu Chu
,
Na Ruan
,
Ming Li
,
Weijia Jia
.
Pseudonym Inference in Cooperative Vehicular Traffic Scenarios
. The IEEE Conference on Communications and Network Security(CNS), 2018.
PDF
Cite
Na Ruan
,
Mingli Wu
,
Shiheng Ma
,
Haojin Zhu
,
Weijia Jia,
.
Detect and Prevent SIP Flooding Attacks in VoLTE by Utilizing a Two-Tier PFilter Design
. IEICE TRANSACTIONS on Information and Systems (SCI/EI), 2017.
PDF
Cite
Wenmian Yang
,
Na Ruan
,
Wenyuan Gao
,
Kun Wang
,
Wensheng Ran
,
Weijia Jia
.
Crowdsourced Time-sync Video Tagging using Semantic Association Graph
. IEEE International Conference on Multimedia and Expo (ICME) (CCF-B), 2017.
PDF
Cite
Mingli Wu
,
Na Ruan
,
Shiheng Ma
,
Haojin Zhu
,
Weijia Jia
,
Qingshui Xue
,
Songyang Wu
.
Detect SIP Flooding Attacks in VoLTE by Utilizing and Compressing Counting Bloom Filter
. International Conference on Wireless Algorithms, Systems, and Applications(WASA) (Best Paper Runner-up Award), 2017.
PDF
Cite
Wenyan Yao
,
Na Ruan
,
Feifan Yu
,
Weijia Jia
,
Haojin Zhu
.
Privacy-Preserving Fraud Detection via Cooperative Mobile Carriers with Improved Accuracy
. Annual IEEE International Conference on Sensing, Communication, and Networking(SECON) (CCF-B), 2017.
PDF
Cite
Minyi Guo
,
Yuting Chen
,
Chao Li
,
Na Ruan
,
Chentao Wu
.
Cloud Computing Principle and Practice
. China Machine Press, 400,000 words, Publish time 2017-03, 2017.
Jiafa Liu
,
Junyi Li
,
Huaxin Li
,
Haojin Zhu
,
Na Ruan
,
Di Ma
.
Who Moved My Cheese: Towards Automatic and Fine-grained Classification and Modeling Ad Network
. IEEE Global Communications Conference(GLOBECOM) (CCF-C), 2016.
PDF
Cite
Na Ruan
,
Qi Hu
,
Lei Gao
,
Haojin Zhu
,
Qingshui Xue
,
Weijia Jia
.
A Traffic Based Lightweight Attack Detection Scheme for VoLTE
. IEEE Global Communications Conference (GLOBECOM) (CCF-C), 2016.
PDF
Cite
Jianwei Qian
,
Fudong Qiu
,
Fan Wu
,
Na Ruan
,
Guihai Chen
,
Shaojie Tang
.
Privacy-Preserving Selective Aggregation of Online User Behavior Data
. IEEE Transactions on Computers (TC) (CCF A), 2016.
PDF
Cite
Yaoan Jin
,
Chunhua Su
,
Na Ruan
,
Weijia Jia
.
Privacy-Preserving Mining of Association Rules for Horizontally Distributed Databases Based on FP-tree
. International Conference on Information Security Practice and Experience(ISPEC), 2016.
PDF
Cite
Na Ruan
,
Mengyuan Li
,
Jie Li,
.
A Novel Broadcast Authentication Protocol for Internet of Vehicles
. Peer-to-Peer Networking and Applications, 2016.
PDF
Cite
Mengyuan Li
,
Yan Meng
,
Junyi Liu
,
Haojin Zhu
,
Xiaohui Liang
,
Yao Liu
,
Na Ruan
.
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals
. ACM SIGSAC Conference on Computer and Communications Security(CCS) (Accepting rate 16.5%, CCF-A), 2016.
PDF
Cite
Mengyuan Li
,
Na Ruan
,
QiYang Qian
,
Haojin Zhu
,
Le Yu
.
SPFM: Scalable and Privacy-preserving Friend Matching in Mobile Cloud
. IEEE Internet of Things Journal, 2016.
PDF
Cite
Na Ruan
,
Lei Gao
,
Haojin Zhu
,
Weijia Jia
,
Xiang Li
,
Qi Hu
.
Toward Optimal DoS-Resistant Authentication in Crowdsensing Networks via Evolutionary Game
. International Conference on Distributed Computing Systems(ICDS) (Accepting rate 17.6%, CCF-B), 2016.
PDF
Cite
Lei Gao
,
Na Ruan
,
Haojin Zhu
.
Efficient and Secure Message Authentication in Cooperative Driving: A Game-Theoretic Approach
. IEEE International Conference on Communications(ICC) (CCF-C), 2016.
PDF
Cite
ianwei Qian
,
Fudong Qiu
,
Fan Wu
,
Na Ruan
,
Guihai Chen
,
Shaojie Tang
.
A Differentially Private Selective Aggregation Scheme for Online User Behavior Analysis
. IEEE Global Communications Conference (CCF-C), 2015.
PDF
Cite
Ben Bett
,
Xiaokuan Zhang
,
Mengyuan Li
,
Qiyang Qian
,
Na Ruan
,
Haojin Zhu
.
SmartSec: Secret Sharing-based Location-aware Privacy Enhancement in Smart Devices
. IEEE/CIC International Conference on Communications in China(ICCC), 2015.
PDF
Cite
Shuying Lai
,
Huaxin Li
,
Haojin Zhu
,
Na Ruan
.
De-anonymizing Social Networks: Using User Interest as a side-channel
. IEEE/CIC International Conference on Communications in China(ICCC), 2015.
PDF
Cite
Mengyuan Li
,
Na Ruan
,
Haojin Zhu
,
Jie Li
,
Xiang Li
.
A Paralleling Broadcast Authentication Protocol for sparse RSUs in Internet of Vehicles
. International Conference on Mobile Ad-hoc and Sensor Networks(MSN), 2014.
PDF
Cite
Xiang Li
,
Na Ruan
,
Fan Wu
,
Jie Li
,
Mengyuan Li
.
Efficient and Enhanced Broadcast Authentication Protocols based on Multilevel uTESLA
. IEEE International Performance Computing and Communications Conference(IPCCC) (CCF-C), 2014.
PDF
Cite
Na Ruan
,
Yu Long
,
Weidong Liu
,
Lei Zhang
.
Translate Computer Science Theory for the Information Age (Chinese Version)
. Shanghai Jiao Tong Unversity Press, 500,000 words, ISBN 9787313111098, Publish time 2014-06, 2014.
Na Ruan
,
Takashi Nishide
,
Yoshiaki Hori
.
Elliptic Curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs
. Information and Media Technologies, 2012.
PDF
Cite
Na Ruan
,
Yoshiaki Hori
.
DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of Things
. International Conference on Selected Topics in Mobile and Wireless Networking(iCOST), 2012.
PDF
Cite
Na Ruan
,
Yizhi Ren
,
Yoshiaki Hori
,
Kouchi Sakurai
.
Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network
. Journal of networks, 2012.
PDF
Cite
Na Ruan
,
Yizhi Ren
,
Yoshiaki Hori
,
Kouichi Sakurai
.
Performance Analysis of Key Management Schemes in Wireless Sensor Network Using Analytic Hierarchy Process
. IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2011.
PDF
Cite
Na Ruan
,
Takashi Nishide
,
Yoshiaki Hori
.
Threshold ElGamal-based Key Management scheme for distributed RSUs in VANET
. iCOST2011, in conjunction with WiMOB 2011, 2011.
PDF
Cite
Na Ruan
,
Takashi Nishide
,
Yoshiaki Hori
.
A key management scheme against compromised RSU in VANET
. The 64th Joint Conference of Electrical and Electronics Engineers in Kyushu, 2011.
Na Ruan
,
Yizhi Ren
,
Yoshiaki Hori
,
Kouichi Sakurai
.
A Generic Evaluation Method for Key Management Schemes in Wireless Sensor Network
. International Conference on Ubiquitous Information Management and Communication(ICUIMC) (Student grant award), 2011.
PDF
Cite
Na Ruan
,
Yizhi Ren
,
Yoshiaki Hori
,
Kouchi Sakurai
.
Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network
. The 2011 Symposium on Cryptography and Information Security, 2011.
Na Ruan
,
Yizhi Ren
,
Yoshiaki Hori
,
Kouchi Sakurai
.
An Evaluation Method for Key Management Schemes in WSN
. The 63rd Joint Conference of Electrical and Electronics Engineers in Kyushu, 2010.
Cite
Cite
×