BibTeX records: Na Ruan

download as .bib file

@article{DBLP:journals/ijics/AlmehdharAR23,
  author       = {Mohammed Almehdhar and
                  Mohammed M. Abdelsamea and
                  Na Ruan},
  title        = {Deep multi-locality convolutional neural network for DDoS detection
                  in smart home IoT},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {22},
  number       = {3/4},
  pages        = {453--474},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.135902},
  doi          = {10.1504/IJICS.2023.135902},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/AlmehdharAR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/RuanSLL23,
  author       = {Na Ruan and
                  Hanyi Sun and
                  Zenan Lou and
                  Jie Li},
  title        = {A General Quantitative Analysis Framework for Attacks in Blockchain},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {31},
  number       = {2},
  pages        = {664--679},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNET.2022.3201493},
  doi          = {10.1109/TNET.2022.3201493},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/RuanSLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ChenFR23,
  author       = {Hongbin Chen and
                  Chaohao Fu and
                  Na Ruan},
  editor       = {Mehdi Tibouchi and
                  Xiaofeng Wang},
  title        = {Steal from Collaboration: Spy Attack by a Dishonest Party in Vertical
                  Federated Learning},
  booktitle    = {Applied Cryptography and Network Security - 21st International Conference,
                  {ACNS} 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13905},
  pages        = {583--604},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-33488-7\_22},
  doi          = {10.1007/978-3-031-33488-7\_22},
  timestamp    = {Fri, 02 Jun 2023 14:41:32 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ChenFR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-07883,
  author       = {Bowen Li and
                  Hanlin Gu and
                  Ruoxin Chen and
                  Jie Li and
                  Chentao Wu and
                  Na Ruan and
                  Xueming Si and
                  Lixin Fan},
  title        = {Temporal Gradient Inversion Attacks with Robust Optimization},
  journal      = {CoRR},
  volume       = {abs/2306.07883},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.07883},
  doi          = {10.48550/ARXIV.2306.07883},
  eprinttype    = {arXiv},
  eprint       = {2306.07883},
  timestamp    = {Sat, 17 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-07883.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/HuangTSR22,
  author       = {Juzheng Huang and
                  Qiang Tang and
                  Chunhua Su and
                  Na Ruan},
  editor       = {Chunpeng Ge and
                  Fuchun Guo},
  title        = {Secure Collaboration Between Consortiums in Permissioned Blockchains},
  booktitle    = {Provable and Practical Security - 16th International Conference, ProvSec
                  2022, Nanjing, China, November 11-12, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13600},
  pages        = {228--245},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-20917-8\_16},
  doi          = {10.1007/978-3-031-20917-8\_16},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/HuangTSR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-14299,
  author       = {Jikun Chen and
                  Feng Qiang and
                  Na Ruan},
  title        = {Adversarial Representation Sharing: {A} Quantitative and Secure Collaborative
                  Learning Framework},
  journal      = {CoRR},
  volume       = {abs/2203.14299},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.14299},
  doi          = {10.48550/ARXIV.2203.14299},
  eprinttype    = {arXiv},
  eprint       = {2203.14299},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-14299.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/Al-MehdharaR21,
  author       = {Mohammed Al{-}Mehdhara and
                  Na Ruan},
  title        = {{MSOM:} Efficient Mechanism for Defense against DDoS Attacks in {VANET}},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2021},
  pages        = {8891758:1--8891758:17},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/8891758},
  doi          = {10.1155/2021/8891758},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/Al-MehdharaR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChenDCRLLS21,
  author       = {Jikun Chen and
                  Ruoyu Deng and
                  Hongbin Chen and
                  Na Ruan and
                  Yao Liu and
                  Chao Liu and
                  Chunhua Su},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {{ALRS:} An Adversarial Noise Based Privacy-Preserving Data Sharing
                  Mechanism},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {490--509},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_25},
  doi          = {10.1007/978-3-030-90567-5\_25},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ChenDCRLLS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/SunHHR021,
  author       = {Zekun Sun and
                  Yujie Han and
                  Zeyu Hua and
                  Na Ruan and
                  Weijia Jia},
  title        = {Improving the Efficiency and Robustness of Deepfakes Detection Through
                  Precise Geometric Features},
  booktitle    = {{IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR}
                  2021, virtual, June 19-25, 2021},
  pages        = {3609--3618},
  publisher    = {Computer Vision Foundation / {IEEE}},
  year         = {2021},
  url          = {https://openaccess.thecvf.com/content/CVPR2021/html/Sun\_Improving\_the\_Efficiency\_and\_Robustness\_of\_Deepfakes\_Detection\_Through\_Precise\_CVPR\_2021\_paper.html},
  doi          = {10.1109/CVPR46437.2021.00361},
  timestamp    = {Mon, 18 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cvpr/SunHHR021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-04480,
  author       = {Zekun Sun and
                  Yujie Han and
                  Zeyu Hua and
                  Na Ruan and
                  Weijia Jia},
  title        = {Improving the Efficiency and Robustness of Deepfakes Detection through
                  Precise Geometric Features},
  journal      = {CoRR},
  volume       = {abs/2104.04480},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.04480},
  eprinttype    = {arXiv},
  eprint       = {2104.04480},
  timestamp    = {Tue, 13 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-04480.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RuanDS20,
  author       = {Na Ruan and
                  Ruoyu Deng and
                  Chunhua Su},
  title        = {{GADM:} Manual fake review detection for {O2O} commercial platforms},
  journal      = {Comput. Secur.},
  volume       = {88},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2019.101657},
  doi          = {10.1016/J.COSE.2019.101657},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RuanDS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/RuanSX20,
  author       = {Na Ruan and
                  Chunhua Su and
                  Chi Xie},
  title        = {Securing Cooperative Adaptive Cruise Control in Vehicular Platoons
                  via Cooperative Message Authentication},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {103-D},
  number       = {2},
  pages        = {256--264},
  year         = {2020},
  url          = {http://search.ieice.org/bin/summary.php?id=e103-d\_2\_256},
  doi          = {10.1587/TRANSINF.2019INP0010},
  timestamp    = {Mon, 06 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/RuanSX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tbd/JiaPRTZ20,
  author       = {Weijia Jia and
                  Hongjian Peng and
                  Na Ruan and
                  Zhiqing Tang and
                  Wei Zhao},
  title        = {WiFind: Driver Fatigue Detection with Fine-Grained Wi-Fi Signal Features},
  journal      = {{IEEE} Trans. Big Data},
  volume       = {6},
  number       = {2},
  pages        = {269--282},
  year         = {2020},
  url          = {https://doi.org/10.1109/TBDATA.2018.2848969},
  doi          = {10.1109/TBDATA.2018.2848969},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tbd/JiaPRTZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/MengLZLLR20,
  author       = {Yan Meng and
                  Jinlei Li and
                  Haojin Zhu and
                  Xiaohui Liang and
                  Yao Liu and
                  Na Ruan},
  title        = {Revealing Your Mobile Password via WiFi Signals: Attacks and Countermeasures},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {19},
  number       = {2},
  pages        = {432--449},
  year         = {2020},
  url          = {https://doi.org/10.1109/TMC.2019.2893338},
  doi          = {10.1109/TMC.2019.2893338},
  timestamp    = {Mon, 27 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/MengLZLLR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/RuanZJ20,
  author       = {Na Ruan and
                  Dongli Zhou and
                  Weijia Jia},
  title        = {Ursa: Robust Performance for \emph{Nakamoto} Consensus with Self-adaptive
                  Throughput},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {20},
  number       = {4},
  pages        = {41:1--41:26},
  year         = {2020},
  url          = {https://doi.org/10.1145/3412341},
  doi          = {10.1145/3412341},
  timestamp    = {Tue, 08 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toit/RuanZJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YuR020,
  author       = {Feifan Yu and
                  Na Ruan and
                  Siyuan Cheng},
  editor       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh and
                  Guofei Gu and
                  Giuseppe Ateniese},
  title        = {Rational Manager in Bitcoin Mining Pool: Dynamic Strategies to Gain
                  Extra Rewards},
  booktitle    = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications
                  Security, Taipei, Taiwan, October 5-9, 2020},
  pages        = {572--583},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3320269.3384754},
  doi          = {10.1145/3320269.3384754},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YuR020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SunRS20,
  author       = {Hanyi Sun and
                  Na Ruan and
                  Chunhua Su},
  editor       = {Liqun Chen and
                  Ninghui Li and
                  Kaitai Liang and
                  Steve A. Schneider},
  title        = {How to Model the Bribery Attack: {A} Practical Quantification Method
                  in Blockchain},
  booktitle    = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research
                  in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18,
                  2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12309},
  pages        = {569--589},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59013-0\_28},
  doi          = {10.1007/978-3-030-59013-0\_28},
  timestamp    = {Fri, 02 Jul 2021 20:12:27 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/SunRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-08233,
  author       = {Chaohao Fu and
                  Hongbin Chen and
                  Na Ruan and
                  Weijia Jia},
  title        = {Label Smoothing and Adversarial Robustness},
  journal      = {CoRR},
  volume       = {abs/2009.08233},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.08233},
  eprinttype    = {arXiv},
  eprint       = {2009.08233},
  timestamp    = {Wed, 25 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-08233.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/RuanWL19,
  author       = {Na Ruan and
                  Zhikun Wei and
                  Jienan Liu},
  title        = {Cooperative Fraud Detection Model With Privacy-Preserving in Real
                  {CDR} Datasets},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {115261--115272},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2935759},
  doi          = {10.1109/ACCESS.2019.2935759},
  timestamp    = {Sat, 12 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/RuanWL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkdd/YangWRGJZLZ19,
  author       = {Wenmian Yang and
                  Kun Wang and
                  Na Ruan and
                  Wenyuan Gao and
                  Weijia Jia and
                  Wei Zhao and
                  Nan Liu and
                  Yunyong Zhang},
  title        = {Time-Sync Video Tag Extraction Using Semantic Association Graph},
  journal      = {{ACM} Trans. Knowl. Discov. Data},
  volume       = {13},
  number       = {4},
  pages        = {37:1--37:24},
  year         = {2019},
  url          = {https://doi.org/10.1145/3332932},
  doi          = {10.1145/3332932},
  timestamp    = {Sat, 25 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkdd/YangWRGJZLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/ZhouRJ19,
  author       = {Dongli Zhou and
                  Na Ruan and
                  Weijia Jia},
  editor       = {Zheng Xiao and
                  Laurence T. Yang and
                  Pavan Balaji and
                  Tao Li and
                  Keqin Li and
                  Albert Y. Zomaya},
  title        = {A Robust Throughput Scheme for Bitcoin Network without Block Reward},
  booktitle    = {21st {IEEE} International Conference on High Performance Computing
                  and Communications; 17th {IEEE} International Conference on Smart
                  City; 5th {IEEE} International Conference on Data Science and Systems,
                  HPCC/SmartCity/DSS 2019, Zhangjiajie, China, August 10-12, 2019},
  pages        = {706--713},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/HPCC/SmartCity/DSS.2019.00105},
  doi          = {10.1109/HPCC/SMARTCITY/DSS.2019.00105},
  timestamp    = {Fri, 19 Nov 2021 12:28:04 +0100},
  biburl       = {https://dblp.org/rec/conf/hpcc/ZhouRJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/DengRZZ19,
  author       = {Ruoyu Deng and
                  Na Ruan and
                  Guangsheng Zhang and
                  Xiaohu Zhang},
  editor       = {Jianying Zhou and
                  Xiapu Luo and
                  Qingni Shen and
                  Zhen Xu},
  title        = {FraudJudger: Fraud Detection on Digital Payment Platforms with Fewer
                  Labels},
  booktitle    = {Information and Communications Security - 21st International Conference,
                  {ICICS} 2019, Beijing, China, December 15-17, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11999},
  pages        = {569--583},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41579-2\_33},
  doi          = {10.1007/978-3-030-41579-2\_33},
  timestamp    = {Mon, 02 Mar 2020 17:19:02 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/DengRZZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/SunRL19,
  author       = {Hanyi Sun and
                  Na Ruan and
                  Hanqing Liu},
  editor       = {Joseph K. Liu and
                  Xinyi Huang},
  title        = {Ethereum Analysis via Node Clustering},
  booktitle    = {Network and System Security - 13th International Conference, {NSS}
                  2019, Sapporo, Japan, December 15-18, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11928},
  pages        = {114--129},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36938-5\_7},
  doi          = {10.1007/978-3-030-36938-5\_7},
  timestamp    = {Wed, 17 Aug 2022 14:30:35 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/SunRL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-01053,
  author       = {Wenmian Yang and
                  Kun Wang and
                  Na Ruan and
                  Wenyuan Gao and
                  Weijia Jia and
                  Wei Zhao and
                  Nan Liu and
                  Yunyong Zhang},
  title        = {Time-sync Video Tag Extraction Using Semantic Association Graph},
  journal      = {CoRR},
  volume       = {abs/1905.01053},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.01053},
  eprinttype    = {arXiv},
  eprint       = {1905.01053},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-01053.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-03720,
  author       = {Hanqing Liu and
                  Na Ruan and
                  Joseph K. Liu},
  title        = {Catfish Effect Between Internal and External Attackers: Being Semi-honest
                  is Helpful},
  journal      = {CoRR},
  volume       = {abs/1907.03720},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.03720},
  eprinttype    = {arXiv},
  eprint       = {1907.03720},
  timestamp    = {Wed, 17 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-03720.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-02398,
  author       = {Ruoyu Deng and
                  Na Ruan},
  title        = {FraudJudger: Real-World Data Oriented Fraud Detection on Digital Payment
                  Platforms},
  journal      = {CoRR},
  volume       = {abs/1909.02398},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.02398},
  eprinttype    = {arXiv},
  eprint       = {1909.02398},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-02398.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiuRDJ18,
  author       = {Hanqing Liu and
                  Na Ruan and
                  Rongtian Du and
                  Weijia Jia},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {On the Strategy and Behavior of Bitcoin Mining with N-attackers},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {357--368},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196512},
  doi          = {10.1145/3196494.3196512},
  timestamp    = {Fri, 20 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiuRDJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/DengRJLJSX18,
  author       = {Ruoyu Deng and
                  Na Ruan and
                  Ruidong Jin and
                  Yu Lu and
                  Weijia Jia and
                  Chunhua Su and
                  Dandan Xu},
  editor       = {Fuchun Guo and
                  Xinyi Huang and
                  Moti Yung},
  title        = {SpamTracer: Manual Fake Review Detection for {O2O} Commercial Platforms
                  by Using Geolocation Features},
  booktitle    = {Information Security and Cryptology - 14th International Conference,
                  Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11449},
  pages        = {384--403},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-14234-6\_21},
  doi          = {10.1007/978-3-030-14234-6\_21},
  timestamp    = {Thu, 14 Jul 2022 16:21:07 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/DengRJLJSX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChuRLJ18,
  author       = {Xu Chu and
                  Na Ruan and
                  Ming Li and
                  Weijia Jia},
  title        = {Pseudonym Inference in Cooperative Vehicular Traffic Scenarios},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433132},
  doi          = {10.1109/CNS.2018.8433132},
  timestamp    = {Fri, 20 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ChuRLJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/RuanWMZJW17,
  author       = {Na Ruan and
                  Mingli Wu and
                  Shiheng Ma and
                  Haojin Zhu and
                  Weijia Jia and
                  Songyang Wu},
  title        = {Detect and Prevent {SIP} Flooding Attacks in VoLTE by Utilizing a
                  Two-Tier PFilter Design},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {100-D},
  number       = {10},
  pages        = {2287--2294},
  year         = {2017},
  url          = {https://doi.org/10.1587/transinf.2016INP0023},
  doi          = {10.1587/TRANSINF.2016INP0023},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/RuanWMZJW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiRQZLY17,
  author       = {Mengyuan Li and
                  Na Ruan and
                  Qiyang Qian and
                  Haojin Zhu and
                  Xiaohui Liang and
                  Le Yu},
  title        = {{SPFM:} Scalable and Privacy-Preserving Friend Matching in Mobile
                  Cloud},
  journal      = {{IEEE} Internet Things J.},
  volume       = {4},
  number       = {2},
  pages        = {583--591},
  year         = {2017},
  url          = {https://doi.org/10.1109/JIOT.2016.2582780},
  doi          = {10.1109/JIOT.2016.2582780},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/LiRQZLY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/RuanLL17,
  author       = {Na Ruan and
                  Mengyuan Li and
                  Jie Li},
  title        = {A novel broadcast authentication protocol for internet of vehicles},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {10},
  number       = {6},
  pages        = {1331--1343},
  year         = {2017},
  url          = {https://doi.org/10.1007/s12083-016-0493-9},
  doi          = {10.1007/S12083-016-0493-9},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/RuanLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/QianQWRCT17,
  author       = {Jianwei Qian and
                  Fudong Qiu and
                  Fan Wu and
                  Na Ruan and
                  Guihai Chen and
                  Shaojie Tang},
  title        = {Privacy-Preserving Selective Aggregation of Online User Behavior Data},
  journal      = {{IEEE} Trans. Computers},
  volume       = {66},
  number       = {2},
  pages        = {326--338},
  year         = {2017},
  url          = {https://doi.org/10.1109/TC.2016.2595562},
  doi          = {10.1109/TC.2016.2595562},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/QianQWRCT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/YangRGWRJ17,
  author       = {Wenmian Yang and
                  Na Ruan and
                  Wenyuan Gao and
                  Kun Wang and
                  Wensheng Ran and
                  Weijia Jia},
  title        = {Crowdsourced time-sync video tagging using semantic association graph},
  booktitle    = {2017 {IEEE} International Conference on Multimedia and Expo, {ICME}
                  2017, Hong Kong, China, July 10-14, 2017},
  pages        = {547--552},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICME.2017.8019364},
  doi          = {10.1109/ICME.2017.8019364},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icmcs/YangRGWRJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secon/YaoRYJZ17,
  author       = {Wenyan Yao and
                  Na Ruan and
                  Feifan Yu and
                  Weijia Jia and
                  Haojin Zhu},
  title        = {Privacy-Preserving Fraud Detection via Cooperative Mobile Carriers
                  with Improved Accuracy},
  booktitle    = {14th Annual {IEEE} International Conference on Sensing, Communication,
                  and Networking, {SECON} 2017, San Diego, CA, USA, June 12-14, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/SAHCN.2017.7964943},
  doi          = {10.1109/SAHCN.2017.7964943},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secon/YaoRYJZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wasa/WuRMZJXW17,
  author       = {Mingli Wu and
                  Na Ruan and
                  Shiheng Ma and
                  Haojin Zhu and
                  Weijia Jia and
                  Qingshui Xue and
                  Songyang Wu},
  editor       = {Liran Ma and
                  Abdallah Khreishah and
                  Yan Zhang and
                  Mingyuan Yan},
  title        = {Detect {SIP} Flooding Attacks in VoLTE by Utilizing and Compressing
                  Counting Bloom Filter},
  booktitle    = {Wireless Algorithms, Systems, and Applications - 12th International
                  Conference, {WASA} 2017, Guilin, China, June 19-21, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10251},
  pages        = {124--135},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60033-8\_12},
  doi          = {10.1007/978-3-319-60033-8\_12},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wasa/WuRMZJXW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuRDJ17,
  author       = {Hanqing Liu and
                  Na Ruan and
                  Rongtian Du and
                  Weijia Jia},
  title        = {On the Strategy and Behavior of Bitcoin Mining with N-attackers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1255},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1255},
  timestamp    = {Tue, 24 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuRDJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiMLZLLR16,
  author       = {Mengyuan Li and
                  Yan Meng and
                  Junyi Liu and
                  Haojin Zhu and
                  Xiaohui Liang and
                  Yao Liu and
                  Na Ruan},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {When {CSI} Meets Public WiFi: Inferring Your Mobile Phone Password
                  via WiFi Signals},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1068--1079},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978397},
  doi          = {10.1145/2976749.2978397},
  timestamp    = {Mon, 27 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiMLZLLR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/LiuLLZRM16,
  author       = {Jiafa Liu and
                  Junyi Liu and
                  Huaxin Li and
                  Haojin Zhu and
                  Na Ruan and
                  Di Ma},
  title        = {Who Moved My Cheese: Towards Automatic and Fine-Grained Classification
                  and Modeling Ad Network},
  booktitle    = {2016 {IEEE} Global Communications Conference, {GLOBECOM} 2016, Washington,
                  DC, USA, December 4-8, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/GLOCOM.2016.7842384},
  doi          = {10.1109/GLOCOM.2016.7842384},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/LiuLLZRM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/RuanHGZXJC16,
  author       = {Na Ruan and
                  Qi Hu and
                  Lei Gao and
                  Haojin Zhu and
                  Qingshui Xue and
                  Weijia Jia and
                  Jingyu Cui},
  title        = {A Traffic Based Lightweight Attack Detection Scheme for VoLTE},
  booktitle    = {2016 {IEEE} Global Communications Conference, {GLOBECOM} 2016, Washington,
                  DC, USA, December 4-8, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/GLOCOM.2016.7841555},
  doi          = {10.1109/GLOCOM.2016.7841555},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/RuanHGZXJC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/GaoRZ16,
  author       = {Lei Gao and
                  Na Ruan and
                  Haojin Zhu},
  title        = {Efficient and secure message authentication in cooperative driving:
                  {A} game-theoretic approach},
  booktitle    = {2016 {IEEE} International Conference on Communications, {ICC} 2016,
                  Kuala Lumpur, Malaysia, May 22-27, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICC.2016.7510673},
  doi          = {10.1109/ICC.2016.7510673},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/GaoRZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/RuanGZJLH16,
  author       = {Na Ruan and
                  Lei Gao and
                  Haojin Zhu and
                  Weijia Jia and
                  Xiang Li and
                  Qi Hu},
  title        = {Toward Optimal DoS-Resistant Authentication in Crowdsensing Networks
                  via Evolutionary Game},
  booktitle    = {36th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2016, Nara, Japan, June 27-30, 2016},
  pages        = {364--373},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICDCS.2016.66},
  doi          = {10.1109/ICDCS.2016.66},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/RuanGZJLH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/JinSRJ16,
  author       = {Yaoan Jin and
                  Chunhua Su and
                  Na Ruan and
                  Weijia Jia},
  editor       = {Feng Bao and
                  Liqun Chen and
                  Robert H. Deng and
                  Guojun Wang},
  title        = {Privacy-Preserving Mining of Association Rules for Horizontally Distributed
                  Databases Based on FP-Tree},
  booktitle    = {Information Security Practice and Experience - 12th International
                  Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10060},
  pages        = {300--314},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49151-6\_21},
  doi          = {10.1007/978-3-319-49151-6\_21},
  timestamp    = {Fri, 20 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/JinSRJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/ZhangZWTRZ16,
  author       = {Shen Zhang and
                  Lu Zhou and
                  Mingli Wu and
                  Zhushou Tang and
                  Na Ruan and
                  Haojin Zhu},
  title        = {Automatic Detection of SIP-Aware Attacks on VoLTE Device},
  booktitle    = {{IEEE} 84th Vehicular Technology Conference, {VTC} Fall 2016, Montreal,
                  QC, Canada, September 18-21, 2016},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/VTCFall.2016.7880916},
  doi          = {10.1109/VTCFALL.2016.7880916},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/ZhangZWTRZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/QianQWRCT15,
  author       = {Jianwei Qian and
                  Fudong Qiu and
                  Fan Wu and
                  Na Ruan and
                  Guihai Chen and
                  Shaojie Tang},
  title        = {A Differentially Private Selective Aggregation Scheme for Online User
                  Behavior Analysis},
  booktitle    = {2015 {IEEE} Global Communications Conference, {GLOBECOM} 2015, San
                  Diego, CA, USA, December 6-10, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/GLOCOM.2014.7416968},
  doi          = {10.1109/GLOCOM.2014.7416968},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/QianQWRCT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccchina/ChirchirZLQRZ15,
  author       = {Bett Ben Chirchir and
                  Xiaokuan Zhang and
                  Mengyuan Li and
                  Qiyang Qian and
                  Na Ruan and
                  Haojin Zhu},
  title        = {SmartSec: Secret sharing-based location-aware privacy enhancement
                  in smart devices},
  booktitle    = {2015 {IEEE/CIC} International Conference on Communications in China,
                  {ICCC} 2015, Shenzhen, China, November 2-4, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICCChina.2015.7448631},
  doi          = {10.1109/ICCCHINA.2015.7448631},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccchina/ChirchirZLQRZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccchina/LaiLZR15,
  author       = {Shuying Lai and
                  Huaxin Li and
                  Haojin Zhu and
                  Na Ruan},
  title        = {De-anonymizing social networks: Using user interest as a side-channel},
  booktitle    = {2015 {IEEE/CIC} International Conference on Communications in China,
                  {ICCC} 2015, Shenzhen, China, November 2-4, 2015},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICCChina.2015.7448638},
  doi          = {10.1109/ICCCHINA.2015.7448638},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccchina/LaiLZR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipccc/LiRWLL14,
  author       = {Xiang Li and
                  Na Ruan and
                  Fan Wu and
                  Jie Li and
                  Mengyuan Li},
  title        = {Efficient and enhanced broadcast authentication protocols based on
                  multilevel {\(\mu\)}TESLA},
  booktitle    = {{IEEE} 33rd International Performance Computing and Communications
                  Conference, {IPCCC} 2014, Austin, TX, USA, December 5-7, 2014},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/PCCC.2014.7017109},
  doi          = {10.1109/PCCC.2014.7017109},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipccc/LiRWLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msn/LiRZLL14,
  author       = {Mengyuan Li and
                  Na Ruan and
                  Haojin Zhu and
                  Jie Li and
                  Xiang Li},
  title        = {A Paralleling Broadcast Authentication Protocol for Sparse RSUs in
                  Internet of Vehicles},
  booktitle    = {10th International Conference on Mobile Ad-hoc and Sensor Networks,
                  {MSN} 2014, Maui, HI, USA, December 19-21, 2014},
  pages        = {58--65},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSN.2014.15},
  doi          = {10.1109/MSN.2014.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/msn/LiRZLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/NaNH12,
  author       = {Ruan Na and
                  Takashi Nishide and
                  Yoshiaki Hori},
  title        = {Elliptic curve ElGamal Threshold-based Key Management Scheme against
                  Compromise of Distributed RSUs for VANETs},
  journal      = {J. Inf. Process.},
  volume       = {20},
  number       = {4},
  pages        = {846--853},
  year         = {2012},
  url          = {https://doi.org/10.2197/ipsjjip.20.846},
  doi          = {10.2197/IPSJJIP.20.846},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/NaNH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/NaRHS12,
  author       = {Ruan Na and
                  Yizhi Ren and
                  Yoshiaki Hori and
                  Kouichi Sakurai},
  title        = {Analytic Hierarchy Process aided Key Management Schemes Evaluation
                  in Wireless Sensor Network},
  journal      = {J. Networks},
  volume       = {7},
  number       = {1},
  pages        = {88--100},
  year         = {2012},
  url          = {https://doi.org/10.4304/jnw.7.1.88-100},
  doi          = {10.4304/JNW.7.1.88-100},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/NaRHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icuimc/NaRHS11,
  author       = {Ruan Na and
                  Yizhi Ren and
                  Yoshiaki Hori and
                  Kouichi Sakurai},
  editor       = {Suk{-}Han Lee and
                  Lajos Hanzo and
                  Min Young Chung and
                  Sang{-}Won Lee and
                  Kwangsu Cho},
  title        = {A generic evaluation method for key management schemes in wireless
                  sensor network},
  booktitle    = {Proceedings of the 5th International Conference on Ubiquitous Information
                  Management and Communication, {ICUIMC} 2011, Seoul, Republic of Korea,
                  February 21 - 23, 2011},
  pages        = {55},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1968613.1968680},
  doi          = {10.1145/1968613.1968680},
  timestamp    = {Thu, 23 May 2019 16:33:14 +0200},
  biburl       = {https://dblp.org/rec/conf/icuimc/NaRHS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RuanRHS11,
  author       = {Na Ruan and
                  Yizhi Ren and
                  Yoshiaki Hori and
                  Kouichi Sakurai},
  title        = {Performance Analysis of Key Management Schemes in Wireless Sensor
                  Network Using Analytic Hierarchy Process},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1739--1744},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.243},
  doi          = {10.1109/TRUSTCOM.2011.243},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/RuanRHS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics