default search action
Na Ruan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Na Ruan, Jikun Chen, Tu Huang, Zekun Sun, Jie Li:
Fool Attackers by Imperceptible Noise: A Privacy-Preserving Adversarial Representation Mechanism for Collaborative Learning. IEEE Trans. Mob. Comput. 23(12): 11839-11852 (2024) - [c33]Zenan Lou, Na Ruan, Yuxiang Cai:
FXChain: A Multi-consortium Permissioned Blockchain with Flexible Privacy-Preserving Strategies. ACISP (3) 2024: 24-43 - [c32]Chaohao Fu, Weijia Jia, Na Ruan:
Client-Free Federated Unlearning via Training Reconstruction with Anchor Subspace Calibration. ICASSP 2024: 9281-9285 - [c31]Liwei Liu, Zijian Liu, Na Ruan:
From the Perspective of Prototypes: A Privacy-Preserving Personalized Federated Learning Framework. ISPEC 2024: 222-239 - [c30]Chaohao Fu, Yun Zhou, Na Ruan:
Preserving Individual User's Right to Be Forgotten in Enterprise-Level Federated Learning. PRICAI (2) 2024: 141-147 - 2023
- [j17]Mohammed Almehdhar, Mohammed M. Abdelsamea, Na Ruan:
Deep multi-locality convolutional neural network for DDoS detection in smart home IoT. Int. J. Inf. Comput. Secur. 22(3/4): 453-474 (2023) - [j16]Na Ruan, Hanyi Sun, Zenan Lou, Jie Li:
A General Quantitative Analysis Framework for Attacks in Blockchain. IEEE/ACM Trans. Netw. 31(2): 664-679 (2023) - [c29]Hongbin Chen, Chaohao Fu, Na Ruan:
Steal from Collaboration: Spy Attack by a Dishonest Party in Vertical Federated Learning. ACNS (1) 2023: 583-604 - [i8]Bowen Li, Hanlin Gu, Ruoxin Chen, Jie Li, Chentao Wu, Na Ruan, Xueming Si, Lixin Fan:
Temporal Gradient Inversion Attacks with Robust Optimization. CoRR abs/2306.07883 (2023) - 2022
- [c28]Juzheng Huang, Qiang Tang, Chunhua Su, Na Ruan:
Secure Collaboration Between Consortiums in Permissioned Blockchains. ProvSec 2022: 228-245 - [i7]Jikun Chen, Feng Qiang, Na Ruan:
Adversarial Representation Sharing: A Quantitative and Secure Collaborative Learning Framework. CoRR abs/2203.14299 (2022) - 2021
- [j15]Mohammed Al-Mehdhara, Na Ruan:
MSOM: Efficient Mechanism for Defense against DDoS Attacks in VANET. Wirel. Commun. Mob. Comput. 2021: 8891758:1-8891758:17 (2021) - [c27]Jikun Chen, Ruoyu Deng, Hongbin Chen, Na Ruan, Yao Liu, Chao Liu, Chunhua Su:
ALRS: An Adversarial Noise Based Privacy-Preserving Data Sharing Mechanism. ACISP 2021: 490-509 - [c26]Zekun Sun, Yujie Han, Zeyu Hua, Na Ruan, Weijia Jia:
Improving the Efficiency and Robustness of Deepfakes Detection Through Precise Geometric Features. CVPR 2021: 3609-3618 - [i6]Zekun Sun, Yujie Han, Zeyu Hua, Na Ruan, Weijia Jia:
Improving the Efficiency and Robustness of Deepfakes Detection through Precise Geometric Features. CoRR abs/2104.04480 (2021) - 2020
- [j14]Na Ruan, Ruoyu Deng, Chunhua Su:
GADM: Manual fake review detection for O2O commercial platforms. Comput. Secur. 88 (2020) - [j13]Na Ruan, Chunhua Su, Chi Xie:
Securing Cooperative Adaptive Cruise Control in Vehicular Platoons via Cooperative Message Authentication. IEICE Trans. Inf. Syst. 103-D(2): 256-264 (2020) - [j12]Weijia Jia, Hongjian Peng, Na Ruan, Zhiqing Tang, Wei Zhao:
WiFind: Driver Fatigue Detection with Fine-Grained Wi-Fi Signal Features. IEEE Trans. Big Data 6(2): 269-282 (2020) - [j11]Yan Meng, Jinlei Li, Haojin Zhu, Xiaohui Liang, Yao Liu, Na Ruan:
Revealing Your Mobile Password via WiFi Signals: Attacks and Countermeasures. IEEE Trans. Mob. Comput. 19(2): 432-449 (2020) - [j10]Na Ruan, Dongli Zhou, Weijia Jia:
Ursa: Robust Performance for Nakamoto Consensus with Self-adaptive Throughput. ACM Trans. Internet Techn. 20(4): 41:1-41:26 (2020) - [c25]Feifan Yu, Na Ruan, Siyuan Cheng:
Rational Manager in Bitcoin Mining Pool: Dynamic Strategies to Gain Extra Rewards. AsiaCCS 2020: 572-583 - [c24]Hanyi Sun, Na Ruan, Chunhua Su:
How to Model the Bribery Attack: A Practical Quantification Method in Blockchain. ESORICS (2) 2020: 569-589 - [i5]Chaohao Fu, Hongbin Chen, Na Ruan, Weijia Jia:
Label Smoothing and Adversarial Robustness. CoRR abs/2009.08233 (2020)
2010 – 2019
- 2019
- [j9]Na Ruan, Zhikun Wei, Jienan Liu:
Cooperative Fraud Detection Model With Privacy-Preserving in Real CDR Datasets. IEEE Access 7: 115261-115272 (2019) - [j8]Wenmian Yang, Kun Wang, Na Ruan, Wenyuan Gao, Weijia Jia, Wei Zhao, Nan Liu, Yunyong Zhang:
Time-Sync Video Tag Extraction Using Semantic Association Graph. ACM Trans. Knowl. Discov. Data 13(4): 37:1-37:24 (2019) - [c23]Dongli Zhou, Na Ruan, Weijia Jia:
A Robust Throughput Scheme for Bitcoin Network without Block Reward. HPCC/SmartCity/DSS 2019: 706-713 - [c22]Ruoyu Deng, Na Ruan, Guangsheng Zhang, Xiaohu Zhang:
FraudJudger: Fraud Detection on Digital Payment Platforms with Fewer Labels. ICICS 2019: 569-583 - [c21]Hanyi Sun, Na Ruan, Hanqing Liu:
Ethereum Analysis via Node Clustering. NSS 2019: 114-129 - [i4]Wenmian Yang, Kun Wang, Na Ruan, Wenyuan Gao, Weijia Jia, Wei Zhao, Nan Liu, Yunyong Zhang:
Time-sync Video Tag Extraction Using Semantic Association Graph. CoRR abs/1905.01053 (2019) - [i3]Hanqing Liu, Na Ruan, Joseph K. Liu:
Catfish Effect Between Internal and External Attackers: Being Semi-honest is Helpful. CoRR abs/1907.03720 (2019) - [i2]Ruoyu Deng, Na Ruan:
FraudJudger: Real-World Data Oriented Fraud Detection on Digital Payment Platforms. CoRR abs/1909.02398 (2019) - 2018
- [c20]Hanqing Liu, Na Ruan, Rongtian Du, Weijia Jia:
On the Strategy and Behavior of Bitcoin Mining with N-attackers. AsiaCCS 2018: 357-368 - [c19]Ruoyu Deng, Na Ruan, Ruidong Jin, Yu Lu, Weijia Jia, Chunhua Su, Dandan Xu:
SpamTracer: Manual Fake Review Detection for O2O Commercial Platforms by Using Geolocation Features. Inscrypt 2018: 384-403 - [c18]Xu Chu, Na Ruan, Ming Li, Weijia Jia:
Pseudonym Inference in Cooperative Vehicular Traffic Scenarios. CNS 2018: 1-9 - 2017
- [j7]Na Ruan, Mingli Wu, Shiheng Ma, Haojin Zhu, Weijia Jia, Songyang Wu:
Detect and Prevent SIP Flooding Attacks in VoLTE by Utilizing a Two-Tier PFilter Design. IEICE Trans. Inf. Syst. 100-D(10): 2287-2294 (2017) - [j6]Mengyuan Li, Na Ruan, Qiyang Qian, Haojin Zhu, Xiaohui Liang, Le Yu:
SPFM: Scalable and Privacy-Preserving Friend Matching in Mobile Cloud. IEEE Internet Things J. 4(2): 583-591 (2017) - [j5]Na Ruan, Mengyuan Li, Jie Li:
A novel broadcast authentication protocol for internet of vehicles. Peer-to-Peer Netw. Appl. 10(6): 1331-1343 (2017) - [j4]Jianwei Qian, Fudong Qiu, Fan Wu, Na Ruan, Guihai Chen, Shaojie Tang:
Privacy-Preserving Selective Aggregation of Online User Behavior Data. IEEE Trans. Computers 66(2): 326-338 (2017) - [c17]Wenmian Yang, Na Ruan, Wenyuan Gao, Kun Wang, Wensheng Ran, Weijia Jia:
Crowdsourced time-sync video tagging using semantic association graph. ICME 2017: 547-552 - [c16]Wenyan Yao, Na Ruan, Feifan Yu, Weijia Jia, Haojin Zhu:
Privacy-Preserving Fraud Detection via Cooperative Mobile Carriers with Improved Accuracy. SECON 2017: 1-9 - [c15]Mingli Wu, Na Ruan, Shiheng Ma, Haojin Zhu, Weijia Jia, Qingshui Xue, Songyang Wu:
Detect SIP Flooding Attacks in VoLTE by Utilizing and Compressing Counting Bloom Filter. WASA 2017: 124-135 - [i1]Hanqing Liu, Na Ruan, Rongtian Du, Weijia Jia:
On the Strategy and Behavior of Bitcoin Mining with N-attackers. IACR Cryptol. ePrint Arch. 2017: 1255 (2017) - 2016
- [c14]Mengyuan Li, Yan Meng, Junyi Liu, Haojin Zhu, Xiaohui Liang, Yao Liu, Na Ruan:
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals. CCS 2016: 1068-1079 - [c13]Jiafa Liu, Junyi Liu, Huaxin Li, Haojin Zhu, Na Ruan, Di Ma:
Who Moved My Cheese: Towards Automatic and Fine-Grained Classification and Modeling Ad Network. GLOBECOM 2016: 1-6 - [c12]Na Ruan, Qi Hu, Lei Gao, Haojin Zhu, Qingshui Xue, Weijia Jia, Jingyu Cui:
A Traffic Based Lightweight Attack Detection Scheme for VoLTE. GLOBECOM 2016: 1-6 - [c11]Lei Gao, Na Ruan, Haojin Zhu:
Efficient and secure message authentication in cooperative driving: A game-theoretic approach. ICC 2016: 1-6 - [c10]Na Ruan, Lei Gao, Haojin Zhu, Weijia Jia, Xiang Li, Qi Hu:
Toward Optimal DoS-Resistant Authentication in Crowdsensing Networks via Evolutionary Game. ICDCS 2016: 364-373 - [c9]Yaoan Jin, Chunhua Su, Na Ruan, Weijia Jia:
Privacy-Preserving Mining of Association Rules for Horizontally Distributed Databases Based on FP-Tree. ISPEC 2016: 300-314 - [c8]Shen Zhang, Lu Zhou, Mingli Wu, Zhushou Tang, Na Ruan, Haojin Zhu:
Automatic Detection of SIP-Aware Attacks on VoLTE Device. VTC Fall 2016: 1-5 - 2015
- [c7]Jianwei Qian, Fudong Qiu, Fan Wu, Na Ruan, Guihai Chen, Shaojie Tang:
A Differentially Private Selective Aggregation Scheme for Online User Behavior Analysis. GLOBECOM 2015: 1-6 - [c6]Bett Ben Chirchir, Xiaokuan Zhang, Mengyuan Li, Qiyang Qian, Na Ruan, Haojin Zhu:
SmartSec: Secret sharing-based location-aware privacy enhancement in smart devices. ICCC 2015: 1-6 - [c5]Shuying Lai, Huaxin Li, Haojin Zhu, Na Ruan:
De-anonymizing social networks: Using user interest as a side-channel. ICCC 2015: 1-5 - 2014
- [c4]Xiang Li, Na Ruan, Fan Wu, Jie Li, Mengyuan Li:
Efficient and enhanced broadcast authentication protocols based on multilevel μTESLA. IPCCC 2014: 1-8 - [c3]Mengyuan Li, Na Ruan, Haojin Zhu, Jie Li, Xiang Li:
A Paralleling Broadcast Authentication Protocol for Sparse RSUs in Internet of Vehicles. MSN 2014: 58-65 - 2012
- [j3]Na Ruan, Takashi Nishide, Yoshiaki Hori:
Elliptic curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs. Inf. Media Technol. 7(4): 1588-1595 (2012) - [j2]Ruan Na, Takashi Nishide, Yoshiaki Hori:
Elliptic curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs. J. Inf. Process. 20(4): 846-853 (2012) - [j1]Ruan Na, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai:
Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network. J. Networks 7(1): 88-100 (2012) - 2011
- [c2]Ruan Na, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai:
A generic evaluation method for key management schemes in wireless sensor network. ICUIMC 2011: 55 - [c1]Na Ruan, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai:
Performance Analysis of Key Management Schemes in Wireless Sensor Network Using Analytic Hierarchy Process. TrustCom 2011: 1739-1744
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-08 01:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint