Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Na Ruan
@article{DBLP:journals/ijics/AlmehdharAR23, author = {Mohammed Almehdhar and Mohammed M. Abdelsamea and Na Ruan}, title = {Deep multi-locality convolutional neural network for DDoS detection in smart home IoT}, journal = {Int. J. Inf. Comput. Secur.}, volume = {22}, number = {3/4}, pages = {453--474}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.135902}, doi = {10.1504/IJICS.2023.135902}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/AlmehdharAR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/RuanSLL23, author = {Na Ruan and Hanyi Sun and Zenan Lou and Jie Li}, title = {A General Quantitative Analysis Framework for Attacks in Blockchain}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {31}, number = {2}, pages = {664--679}, year = {2023}, url = {https://doi.org/10.1109/TNET.2022.3201493}, doi = {10.1109/TNET.2022.3201493}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/RuanSLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ChenFR23, author = {Hongbin Chen and Chaohao Fu and Na Ruan}, editor = {Mehdi Tibouchi and Xiaofeng Wang}, title = {Steal from Collaboration: Spy Attack by a Dishonest Party in Vertical Federated Learning}, booktitle = {Applied Cryptography and Network Security - 21st International Conference, {ACNS} 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13905}, pages = {583--604}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-33488-7\_22}, doi = {10.1007/978-3-031-33488-7\_22}, timestamp = {Fri, 02 Jun 2023 14:41:32 +0200}, biburl = {https://dblp.org/rec/conf/acns/ChenFR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-07883, author = {Bowen Li and Hanlin Gu and Ruoxin Chen and Jie Li and Chentao Wu and Na Ruan and Xueming Si and Lixin Fan}, title = {Temporal Gradient Inversion Attacks with Robust Optimization}, journal = {CoRR}, volume = {abs/2306.07883}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.07883}, doi = {10.48550/ARXIV.2306.07883}, eprinttype = {arXiv}, eprint = {2306.07883}, timestamp = {Sat, 17 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-07883.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/HuangTSR22, author = {Juzheng Huang and Qiang Tang and Chunhua Su and Na Ruan}, editor = {Chunpeng Ge and Fuchun Guo}, title = {Secure Collaboration Between Consortiums in Permissioned Blockchains}, booktitle = {Provable and Practical Security - 16th International Conference, ProvSec 2022, Nanjing, China, November 11-12, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13600}, pages = {228--245}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-20917-8\_16}, doi = {10.1007/978-3-031-20917-8\_16}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/HuangTSR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-14299, author = {Jikun Chen and Feng Qiang and Na Ruan}, title = {Adversarial Representation Sharing: {A} Quantitative and Secure Collaborative Learning Framework}, journal = {CoRR}, volume = {abs/2203.14299}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.14299}, doi = {10.48550/ARXIV.2203.14299}, eprinttype = {arXiv}, eprint = {2203.14299}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-14299.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/Al-MehdharaR21, author = {Mohammed Al{-}Mehdhara and Na Ruan}, title = {{MSOM:} Efficient Mechanism for Defense against DDoS Attacks in {VANET}}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2021}, pages = {8891758:1--8891758:17}, year = {2021}, url = {https://doi.org/10.1155/2021/8891758}, doi = {10.1155/2021/8891758}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/Al-MehdharaR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChenDCRLLS21, author = {Jikun Chen and Ruoyu Deng and Hongbin Chen and Na Ruan and Yao Liu and Chao Liu and Chunhua Su}, editor = {Joonsang Baek and Sushmita Ruj}, title = {{ALRS:} An Adversarial Noise Based Privacy-Preserving Data Sharing Mechanism}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {490--509}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_25}, doi = {10.1007/978-3-030-90567-5\_25}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ChenDCRLLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/SunHHR021, author = {Zekun Sun and Yujie Han and Zeyu Hua and Na Ruan and Weijia Jia}, title = {Improving the Efficiency and Robustness of Deepfakes Detection Through Precise Geometric Features}, booktitle = {{IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR} 2021, virtual, June 19-25, 2021}, pages = {3609--3618}, publisher = {Computer Vision Foundation / {IEEE}}, year = {2021}, url = {https://openaccess.thecvf.com/content/CVPR2021/html/Sun\_Improving\_the\_Efficiency\_and\_Robustness\_of\_Deepfakes\_Detection\_Through\_Precise\_CVPR\_2021\_paper.html}, doi = {10.1109/CVPR46437.2021.00361}, timestamp = {Mon, 18 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/SunHHR021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-04480, author = {Zekun Sun and Yujie Han and Zeyu Hua and Na Ruan and Weijia Jia}, title = {Improving the Efficiency and Robustness of Deepfakes Detection through Precise Geometric Features}, journal = {CoRR}, volume = {abs/2104.04480}, year = {2021}, url = {https://arxiv.org/abs/2104.04480}, eprinttype = {arXiv}, eprint = {2104.04480}, timestamp = {Tue, 13 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-04480.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RuanDS20, author = {Na Ruan and Ruoyu Deng and Chunhua Su}, title = {{GADM:} Manual fake review detection for {O2O} commercial platforms}, journal = {Comput. Secur.}, volume = {88}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2019.101657}, doi = {10.1016/J.COSE.2019.101657}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RuanDS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/RuanSX20, author = {Na Ruan and Chunhua Su and Chi Xie}, title = {Securing Cooperative Adaptive Cruise Control in Vehicular Platoons via Cooperative Message Authentication}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {103-D}, number = {2}, pages = {256--264}, year = {2020}, url = {http://search.ieice.org/bin/summary.php?id=e103-d\_2\_256}, doi = {10.1587/TRANSINF.2019INP0010}, timestamp = {Mon, 06 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/RuanSX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tbd/JiaPRTZ20, author = {Weijia Jia and Hongjian Peng and Na Ruan and Zhiqing Tang and Wei Zhao}, title = {WiFind: Driver Fatigue Detection with Fine-Grained Wi-Fi Signal Features}, journal = {{IEEE} Trans. Big Data}, volume = {6}, number = {2}, pages = {269--282}, year = {2020}, url = {https://doi.org/10.1109/TBDATA.2018.2848969}, doi = {10.1109/TBDATA.2018.2848969}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tbd/JiaPRTZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/MengLZLLR20, author = {Yan Meng and Jinlei Li and Haojin Zhu and Xiaohui Liang and Yao Liu and Na Ruan}, title = {Revealing Your Mobile Password via WiFi Signals: Attacks and Countermeasures}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {19}, number = {2}, pages = {432--449}, year = {2020}, url = {https://doi.org/10.1109/TMC.2019.2893338}, doi = {10.1109/TMC.2019.2893338}, timestamp = {Mon, 27 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/MengLZLLR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/RuanZJ20, author = {Na Ruan and Dongli Zhou and Weijia Jia}, title = {Ursa: Robust Performance for \emph{Nakamoto} Consensus with Self-adaptive Throughput}, journal = {{ACM} Trans. Internet Techn.}, volume = {20}, number = {4}, pages = {41:1--41:26}, year = {2020}, url = {https://doi.org/10.1145/3412341}, doi = {10.1145/3412341}, timestamp = {Tue, 08 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toit/RuanZJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YuR020, author = {Feifan Yu and Na Ruan and Siyuan Cheng}, editor = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Guofei Gu and Giuseppe Ateniese}, title = {Rational Manager in Bitcoin Mining Pool: Dynamic Strategies to Gain Extra Rewards}, booktitle = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020}, pages = {572--583}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3320269.3384754}, doi = {10.1145/3320269.3384754}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YuR020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SunRS20, author = {Hanyi Sun and Na Ruan and Chunhua Su}, editor = {Liqun Chen and Ninghui Li and Kaitai Liang and Steve A. Schneider}, title = {How to Model the Bribery Attack: {A} Practical Quantification Method in Blockchain}, booktitle = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12309}, pages = {569--589}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59013-0\_28}, doi = {10.1007/978-3-030-59013-0\_28}, timestamp = {Fri, 02 Jul 2021 20:12:27 +0200}, biburl = {https://dblp.org/rec/conf/esorics/SunRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-08233, author = {Chaohao Fu and Hongbin Chen and Na Ruan and Weijia Jia}, title = {Label Smoothing and Adversarial Robustness}, journal = {CoRR}, volume = {abs/2009.08233}, year = {2020}, url = {https://arxiv.org/abs/2009.08233}, eprinttype = {arXiv}, eprint = {2009.08233}, timestamp = {Wed, 25 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-08233.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/RuanWL19, author = {Na Ruan and Zhikun Wei and Jienan Liu}, title = {Cooperative Fraud Detection Model With Privacy-Preserving in Real {CDR} Datasets}, journal = {{IEEE} Access}, volume = {7}, pages = {115261--115272}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2935759}, doi = {10.1109/ACCESS.2019.2935759}, timestamp = {Sat, 12 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/RuanWL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkdd/YangWRGJZLZ19, author = {Wenmian Yang and Kun Wang and Na Ruan and Wenyuan Gao and Weijia Jia and Wei Zhao and Nan Liu and Yunyong Zhang}, title = {Time-Sync Video Tag Extraction Using Semantic Association Graph}, journal = {{ACM} Trans. Knowl. Discov. Data}, volume = {13}, number = {4}, pages = {37:1--37:24}, year = {2019}, url = {https://doi.org/10.1145/3332932}, doi = {10.1145/3332932}, timestamp = {Sat, 25 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkdd/YangWRGJZLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/ZhouRJ19, author = {Dongli Zhou and Na Ruan and Weijia Jia}, editor = {Zheng Xiao and Laurence T. Yang and Pavan Balaji and Tao Li and Keqin Li and Albert Y. Zomaya}, title = {A Robust Throughput Scheme for Bitcoin Network without Block Reward}, booktitle = {21st {IEEE} International Conference on High Performance Computing and Communications; 17th {IEEE} International Conference on Smart City; 5th {IEEE} International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2019, Zhangjiajie, China, August 10-12, 2019}, pages = {706--713}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/HPCC/SmartCity/DSS.2019.00105}, doi = {10.1109/HPCC/SMARTCITY/DSS.2019.00105}, timestamp = {Fri, 19 Nov 2021 12:28:04 +0100}, biburl = {https://dblp.org/rec/conf/hpcc/ZhouRJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/DengRZZ19, author = {Ruoyu Deng and Na Ruan and Guangsheng Zhang and Xiaohu Zhang}, editor = {Jianying Zhou and Xiapu Luo and Qingni Shen and Zhen Xu}, title = {FraudJudger: Fraud Detection on Digital Payment Platforms with Fewer Labels}, booktitle = {Information and Communications Security - 21st International Conference, {ICICS} 2019, Beijing, China, December 15-17, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11999}, pages = {569--583}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41579-2\_33}, doi = {10.1007/978-3-030-41579-2\_33}, timestamp = {Mon, 02 Mar 2020 17:19:02 +0100}, biburl = {https://dblp.org/rec/conf/icics/DengRZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/SunRL19, author = {Hanyi Sun and Na Ruan and Hanqing Liu}, editor = {Joseph K. Liu and Xinyi Huang}, title = {Ethereum Analysis via Node Clustering}, booktitle = {Network and System Security - 13th International Conference, {NSS} 2019, Sapporo, Japan, December 15-18, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11928}, pages = {114--129}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36938-5\_7}, doi = {10.1007/978-3-030-36938-5\_7}, timestamp = {Wed, 17 Aug 2022 14:30:35 +0200}, biburl = {https://dblp.org/rec/conf/nss/SunRL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-01053, author = {Wenmian Yang and Kun Wang and Na Ruan and Wenyuan Gao and Weijia Jia and Wei Zhao and Nan Liu and Yunyong Zhang}, title = {Time-sync Video Tag Extraction Using Semantic Association Graph}, journal = {CoRR}, volume = {abs/1905.01053}, year = {2019}, url = {http://arxiv.org/abs/1905.01053}, eprinttype = {arXiv}, eprint = {1905.01053}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-01053.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-03720, author = {Hanqing Liu and Na Ruan and Joseph K. Liu}, title = {Catfish Effect Between Internal and External Attackers: Being Semi-honest is Helpful}, journal = {CoRR}, volume = {abs/1907.03720}, year = {2019}, url = {http://arxiv.org/abs/1907.03720}, eprinttype = {arXiv}, eprint = {1907.03720}, timestamp = {Wed, 17 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-03720.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-02398, author = {Ruoyu Deng and Na Ruan}, title = {FraudJudger: Real-World Data Oriented Fraud Detection on Digital Payment Platforms}, journal = {CoRR}, volume = {abs/1909.02398}, year = {2019}, url = {http://arxiv.org/abs/1909.02398}, eprinttype = {arXiv}, eprint = {1909.02398}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-02398.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuRDJ18, author = {Hanqing Liu and Na Ruan and Rongtian Du and Weijia Jia}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {On the Strategy and Behavior of Bitcoin Mining with N-attackers}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {357--368}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196512}, doi = {10.1145/3196494.3196512}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiuRDJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/DengRJLJSX18, author = {Ruoyu Deng and Na Ruan and Ruidong Jin and Yu Lu and Weijia Jia and Chunhua Su and Dandan Xu}, editor = {Fuchun Guo and Xinyi Huang and Moti Yung}, title = {SpamTracer: Manual Fake Review Detection for {O2O} Commercial Platforms by Using Geolocation Features}, booktitle = {Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11449}, pages = {384--403}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-14234-6\_21}, doi = {10.1007/978-3-030-14234-6\_21}, timestamp = {Thu, 14 Jul 2022 16:21:07 +0200}, biburl = {https://dblp.org/rec/conf/cisc/DengRJLJSX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChuRLJ18, author = {Xu Chu and Na Ruan and Ming Li and Weijia Jia}, title = {Pseudonym Inference in Cooperative Vehicular Traffic Scenarios}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433132}, doi = {10.1109/CNS.2018.8433132}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ChuRLJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/RuanWMZJW17, author = {Na Ruan and Mingli Wu and Shiheng Ma and Haojin Zhu and Weijia Jia and Songyang Wu}, title = {Detect and Prevent {SIP} Flooding Attacks in VoLTE by Utilizing a Two-Tier PFilter Design}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {100-D}, number = {10}, pages = {2287--2294}, year = {2017}, url = {https://doi.org/10.1587/transinf.2016INP0023}, doi = {10.1587/TRANSINF.2016INP0023}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/RuanWMZJW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiRQZLY17, author = {Mengyuan Li and Na Ruan and Qiyang Qian and Haojin Zhu and Xiaohui Liang and Le Yu}, title = {{SPFM:} Scalable and Privacy-Preserving Friend Matching in Mobile Cloud}, journal = {{IEEE} Internet Things J.}, volume = {4}, number = {2}, pages = {583--591}, year = {2017}, url = {https://doi.org/10.1109/JIOT.2016.2582780}, doi = {10.1109/JIOT.2016.2582780}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/LiRQZLY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/RuanLL17, author = {Na Ruan and Mengyuan Li and Jie Li}, title = {A novel broadcast authentication protocol for internet of vehicles}, journal = {Peer-to-Peer Netw. Appl.}, volume = {10}, number = {6}, pages = {1331--1343}, year = {2017}, url = {https://doi.org/10.1007/s12083-016-0493-9}, doi = {10.1007/S12083-016-0493-9}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/RuanLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/QianQWRCT17, author = {Jianwei Qian and Fudong Qiu and Fan Wu and Na Ruan and Guihai Chen and Shaojie Tang}, title = {Privacy-Preserving Selective Aggregation of Online User Behavior Data}, journal = {{IEEE} Trans. Computers}, volume = {66}, number = {2}, pages = {326--338}, year = {2017}, url = {https://doi.org/10.1109/TC.2016.2595562}, doi = {10.1109/TC.2016.2595562}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/QianQWRCT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/YangRGWRJ17, author = {Wenmian Yang and Na Ruan and Wenyuan Gao and Kun Wang and Wensheng Ran and Weijia Jia}, title = {Crowdsourced time-sync video tagging using semantic association graph}, booktitle = {2017 {IEEE} International Conference on Multimedia and Expo, {ICME} 2017, Hong Kong, China, July 10-14, 2017}, pages = {547--552}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICME.2017.8019364}, doi = {10.1109/ICME.2017.8019364}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/YangRGWRJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secon/YaoRYJZ17, author = {Wenyan Yao and Na Ruan and Feifan Yu and Weijia Jia and Haojin Zhu}, title = {Privacy-Preserving Fraud Detection via Cooperative Mobile Carriers with Improved Accuracy}, booktitle = {14th Annual {IEEE} International Conference on Sensing, Communication, and Networking, {SECON} 2017, San Diego, CA, USA, June 12-14, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/SAHCN.2017.7964943}, doi = {10.1109/SAHCN.2017.7964943}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secon/YaoRYJZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/WuRMZJXW17, author = {Mingli Wu and Na Ruan and Shiheng Ma and Haojin Zhu and Weijia Jia and Qingshui Xue and Songyang Wu}, editor = {Liran Ma and Abdallah Khreishah and Yan Zhang and Mingyuan Yan}, title = {Detect {SIP} Flooding Attacks in VoLTE by Utilizing and Compressing Counting Bloom Filter}, booktitle = {Wireless Algorithms, Systems, and Applications - 12th International Conference, {WASA} 2017, Guilin, China, June 19-21, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10251}, pages = {124--135}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60033-8\_12}, doi = {10.1007/978-3-319-60033-8\_12}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wasa/WuRMZJXW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuRDJ17, author = {Hanqing Liu and Na Ruan and Rongtian Du and Weijia Jia}, title = {On the Strategy and Behavior of Bitcoin Mining with N-attackers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1255}, year = {2017}, url = {http://eprint.iacr.org/2017/1255}, timestamp = {Tue, 24 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LiuRDJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiMLZLLR16, author = {Mengyuan Li and Yan Meng and Junyi Liu and Haojin Zhu and Xiaohui Liang and Yao Liu and Na Ruan}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {When {CSI} Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1068--1079}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978397}, doi = {10.1145/2976749.2978397}, timestamp = {Mon, 27 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiMLZLLR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/LiuLLZRM16, author = {Jiafa Liu and Junyi Liu and Huaxin Li and Haojin Zhu and Na Ruan and Di Ma}, title = {Who Moved My Cheese: Towards Automatic and Fine-Grained Classification and Modeling Ad Network}, booktitle = {2016 {IEEE} Global Communications Conference, {GLOBECOM} 2016, Washington, DC, USA, December 4-8, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/GLOCOM.2016.7842384}, doi = {10.1109/GLOCOM.2016.7842384}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/LiuLLZRM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/RuanHGZXJC16, author = {Na Ruan and Qi Hu and Lei Gao and Haojin Zhu and Qingshui Xue and Weijia Jia and Jingyu Cui}, title = {A Traffic Based Lightweight Attack Detection Scheme for VoLTE}, booktitle = {2016 {IEEE} Global Communications Conference, {GLOBECOM} 2016, Washington, DC, USA, December 4-8, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/GLOCOM.2016.7841555}, doi = {10.1109/GLOCOM.2016.7841555}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/RuanHGZXJC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/GaoRZ16, author = {Lei Gao and Na Ruan and Haojin Zhu}, title = {Efficient and secure message authentication in cooperative driving: {A} game-theoretic approach}, booktitle = {2016 {IEEE} International Conference on Communications, {ICC} 2016, Kuala Lumpur, Malaysia, May 22-27, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICC.2016.7510673}, doi = {10.1109/ICC.2016.7510673}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/GaoRZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/RuanGZJLH16, author = {Na Ruan and Lei Gao and Haojin Zhu and Weijia Jia and Xiang Li and Qi Hu}, title = {Toward Optimal DoS-Resistant Authentication in Crowdsensing Networks via Evolutionary Game}, booktitle = {36th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2016, Nara, Japan, June 27-30, 2016}, pages = {364--373}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICDCS.2016.66}, doi = {10.1109/ICDCS.2016.66}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/RuanGZJLH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/JinSRJ16, author = {Yaoan Jin and Chunhua Su and Na Ruan and Weijia Jia}, editor = {Feng Bao and Liqun Chen and Robert H. Deng and Guojun Wang}, title = {Privacy-Preserving Mining of Association Rules for Horizontally Distributed Databases Based on FP-Tree}, booktitle = {Information Security Practice and Experience - 12th International Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10060}, pages = {300--314}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49151-6\_21}, doi = {10.1007/978-3-319-49151-6\_21}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/JinSRJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/ZhangZWTRZ16, author = {Shen Zhang and Lu Zhou and Mingli Wu and Zhushou Tang and Na Ruan and Haojin Zhu}, title = {Automatic Detection of SIP-Aware Attacks on VoLTE Device}, booktitle = {{IEEE} 84th Vehicular Technology Conference, {VTC} Fall 2016, Montreal, QC, Canada, September 18-21, 2016}, pages = {1--5}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/VTCFall.2016.7880916}, doi = {10.1109/VTCFALL.2016.7880916}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vtc/ZhangZWTRZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/QianQWRCT15, author = {Jianwei Qian and Fudong Qiu and Fan Wu and Na Ruan and Guihai Chen and Shaojie Tang}, title = {A Differentially Private Selective Aggregation Scheme for Online User Behavior Analysis}, booktitle = {2015 {IEEE} Global Communications Conference, {GLOBECOM} 2015, San Diego, CA, USA, December 6-10, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/GLOCOM.2014.7416968}, doi = {10.1109/GLOCOM.2014.7416968}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/QianQWRCT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccchina/ChirchirZLQRZ15, author = {Bett Ben Chirchir and Xiaokuan Zhang and Mengyuan Li and Qiyang Qian and Na Ruan and Haojin Zhu}, title = {SmartSec: Secret sharing-based location-aware privacy enhancement in smart devices}, booktitle = {2015 {IEEE/CIC} International Conference on Communications in China, {ICCC} 2015, Shenzhen, China, November 2-4, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICCChina.2015.7448631}, doi = {10.1109/ICCCHINA.2015.7448631}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccchina/ChirchirZLQRZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccchina/LaiLZR15, author = {Shuying Lai and Huaxin Li and Haojin Zhu and Na Ruan}, title = {De-anonymizing social networks: Using user interest as a side-channel}, booktitle = {2015 {IEEE/CIC} International Conference on Communications in China, {ICCC} 2015, Shenzhen, China, November 2-4, 2015}, pages = {1--5}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICCChina.2015.7448638}, doi = {10.1109/ICCCHINA.2015.7448638}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccchina/LaiLZR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipccc/LiRWLL14, author = {Xiang Li and Na Ruan and Fan Wu and Jie Li and Mengyuan Li}, title = {Efficient and enhanced broadcast authentication protocols based on multilevel {\(\mu\)}TESLA}, booktitle = {{IEEE} 33rd International Performance Computing and Communications Conference, {IPCCC} 2014, Austin, TX, USA, December 5-7, 2014}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/PCCC.2014.7017109}, doi = {10.1109/PCCC.2014.7017109}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipccc/LiRWLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msn/LiRZLL14, author = {Mengyuan Li and Na Ruan and Haojin Zhu and Jie Li and Xiang Li}, title = {A Paralleling Broadcast Authentication Protocol for Sparse RSUs in Internet of Vehicles}, booktitle = {10th International Conference on Mobile Ad-hoc and Sensor Networks, {MSN} 2014, Maui, HI, USA, December 19-21, 2014}, pages = {58--65}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/MSN.2014.15}, doi = {10.1109/MSN.2014.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/msn/LiRZLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/NaNH12, author = {Ruan Na and Takashi Nishide and Yoshiaki Hori}, title = {Elliptic curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs}, journal = {J. Inf. Process.}, volume = {20}, number = {4}, pages = {846--853}, year = {2012}, url = {https://doi.org/10.2197/ipsjjip.20.846}, doi = {10.2197/IPSJJIP.20.846}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/NaNH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/NaRHS12, author = {Ruan Na and Yizhi Ren and Yoshiaki Hori and Kouichi Sakurai}, title = {Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network}, journal = {J. Networks}, volume = {7}, number = {1}, pages = {88--100}, year = {2012}, url = {https://doi.org/10.4304/jnw.7.1.88-100}, doi = {10.4304/JNW.7.1.88-100}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/NaRHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icuimc/NaRHS11, author = {Ruan Na and Yizhi Ren and Yoshiaki Hori and Kouichi Sakurai}, editor = {Suk{-}Han Lee and Lajos Hanzo and Min Young Chung and Sang{-}Won Lee and Kwangsu Cho}, title = {A generic evaluation method for key management schemes in wireless sensor network}, booktitle = {Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, {ICUIMC} 2011, Seoul, Republic of Korea, February 21 - 23, 2011}, pages = {55}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1968613.1968680}, doi = {10.1145/1968613.1968680}, timestamp = {Thu, 23 May 2019 16:33:14 +0200}, biburl = {https://dblp.org/rec/conf/icuimc/NaRHS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RuanRHS11, author = {Na Ruan and Yizhi Ren and Yoshiaki Hori and Kouichi Sakurai}, title = {Performance Analysis of Key Management Schemes in Wireless Sensor Network Using Analytic Hierarchy Process}, booktitle = {{IEEE} 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011}, pages = {1739--1744}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/TrustCom.2011.243}, doi = {10.1109/TRUSTCOM.2011.243}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/RuanRHS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.