Na Ruan

Orcid: 0000-0002-7673-9843

According to our database1, Na Ruan authored at least 50 papers between 2011 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A General Quantitative Analysis Framework for Attacks in Blockchain.
IEEE/ACM Trans. Netw., April, 2023

Deep multi-locality convolutional neural network for DDoS detection in smart home IoT.
Int. J. Inf. Comput. Secur., 2023

Temporal Gradient Inversion Attacks with Robust Optimization.
CoRR, 2023

Steal from Collaboration: Spy Attack by a Dishonest Party in Vertical Federated Learning.
Proceedings of the Applied Cryptography and Network Security, 2023

2022
Adversarial Representation Sharing: A Quantitative and Secure Collaborative Learning Framework.
CoRR, 2022

Secure Collaboration Between Consortiums in Permissioned Blockchains.
Proceedings of the Provable and Practical Security, 2022

2021
MSOM: Efficient Mechanism for Defense against DDoS Attacks in VANET.
Wirel. Commun. Mob. Comput., 2021

Improving the Efficiency and Robustness of Deepfakes Detection Through Precise Geometric Features.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

ALRS: An Adversarial Noise Based Privacy-Preserving Data Sharing Mechanism.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
Ursa: Robust Performance for <i>Nakamoto</i> Consensus with Self-adaptive Throughput.
ACM Trans. Internet Techn., 2020

Revealing Your Mobile Password via WiFi Signals: Attacks and Countermeasures.
IEEE Trans. Mob. Comput., 2020

WiFind: Driver Fatigue Detection with Fine-Grained Wi-Fi Signal Features.
IEEE Trans. Big Data, 2020

Securing Cooperative Adaptive Cruise Control in Vehicular Platoons via Cooperative Message Authentication.
IEICE Trans. Inf. Syst., 2020

Label Smoothing and Adversarial Robustness.
CoRR, 2020

GADM: Manual fake review detection for O2O commercial platforms.
Comput. Secur., 2020

How to Model the Bribery Attack: A Practical Quantification Method in Blockchain.
Proceedings of the Computer Security - ESORICS 2020, 2020

Rational Manager in Bitcoin Mining Pool: Dynamic Strategies to Gain Extra Rewards.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Time-Sync Video Tag Extraction Using Semantic Association Graph.
ACM Trans. Knowl. Discov. Data, 2019

FraudJudger: Real-World Data Oriented Fraud Detection on Digital Payment Platforms.
CoRR, 2019

Catfish Effect Between Internal and External Attackers: Being Semi-honest is Helpful.
CoRR, 2019

Cooperative Fraud Detection Model With Privacy-Preserving in Real CDR Datasets.
IEEE Access, 2019

Ethereum Analysis via Node Clustering.
Proceedings of the Network and System Security - 13th International Conference, 2019

FraudJudger: Fraud Detection on Digital Payment Platforms with Fewer Labels.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

A Robust Throughput Scheme for Bitcoin Network without Block Reward.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

2018
Pseudonym Inference in Cooperative Vehicular Traffic Scenarios.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

SpamTracer: Manual Fake Review Detection for O2O Commercial Platforms by Using Geolocation Features.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
Privacy-Preserving Selective Aggregation of Online User Behavior Data.
IEEE Trans. Computers, 2017

A novel broadcast authentication protocol for internet of vehicles.
Peer-to-Peer Netw. Appl., 2017

SPFM: Scalable and Privacy-Preserving Friend Matching in Mobile Cloud.
IEEE Internet Things J., 2017

Detect and Prevent SIP Flooding Attacks in VoLTE by Utilizing a Two-Tier PFilter Design.
IEICE Trans. Inf. Syst., 2017

On the Strategy and Behavior of Bitcoin Mining with N-attackers.
IACR Cryptol. ePrint Arch., 2017

Detect SIP Flooding Attacks in VoLTE by Utilizing and Compressing Counting Bloom Filter.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Privacy-Preserving Fraud Detection via Cooperative Mobile Carriers with Improved Accuracy.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017

Crowdsourced time-sync video tagging using semantic association graph.
Proceedings of the 2017 IEEE International Conference on Multimedia and Expo, 2017

2016
Automatic Detection of SIP-Aware Attacks on VoLTE Device.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

Privacy-Preserving Mining of Association Rules for Horizontally Distributed Databases Based on FP-Tree.
Proceedings of the Information Security Practice and Experience, 2016

Toward Optimal DoS-Resistant Authentication in Crowdsensing Networks via Evolutionary Game.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

Efficient and secure message authentication in cooperative driving: A game-theoretic approach.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

A Traffic Based Lightweight Attack Detection Scheme for VoLTE.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Who Moved My Cheese: Towards Automatic and Fine-Grained Classification and Modeling Ad Network.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
De-anonymizing social networks: Using user interest as a side-channel.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

SmartSec: Secret sharing-based location-aware privacy enhancement in smart devices.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

A Differentially Private Selective Aggregation Scheme for Online User Behavior Analysis.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
A Paralleling Broadcast Authentication Protocol for Sparse RSUs in Internet of Vehicles.
Proceedings of the 10th International Conference on Mobile Ad-hoc and Sensor Networks, 2014

Efficient and enhanced broadcast authentication protocols based on multilevel μTESLA.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

2012
Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network.
J. Networks, 2012

Elliptic curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs.
J. Inf. Process., 2012

2011
Performance Analysis of Key Management Schemes in Wireless Sensor Network Using Analytic Hierarchy Process.
Proceedings of the IEEE 10th International Conference on Trust, 2011

A generic evaluation method for key management schemes in wireless sensor network.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011


  Loading...