Associate Professor, Department of Computer Science&Engineering,Shanghai Jiaotong University
Verified email at - Homepage
Cited by
Cited by
When CSI meets public WiFi: inferring your mobile phone password via WiFi signals
M Li, Y Meng, J Liu, H Zhu, X Liang, Y Liu, N Ruan
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
WiFind: Driver fatigue detection with fine-grained Wi-Fi signal features
W Jia, H Peng, N Ruan, Z Tang, W Zhao
IEEE Transactions on Big Data 6 (2), 269-282, 2018
DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of Things
N Ruan, Y Hori
2012 International Conference on Selected Topics in Mobile and Wireless …, 2012
On the strategy and behavior of bitcoin mining with n-attackers
H Liu, N Ruan, R Du, W Jia
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
Privacy-preserving selective aggregation of online user behavior data
J Qian, F Qiu, F Wu, N Ruan, G Chen, S Tang
IEEE transactions on computers 66 (2), 326-338, 2016
Improving the efficiency and robustness of deepfakes detection through precise geometric features
Z Sun, Y Han, Z Hua, N Ruan, W Jia
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021
SPFM: Scalable and privacy-preserving friend matching in mobile cloud
M Li, N Ruan, QY Qian, H Zhu, X Liang, L Yu
IEEE Internet of Things Journal 4 (2), 583-591, 2016
Toward optimal dos-resistant authentication in crowdsensing networks via evolutionary game
N Ruan, L Gao, H Zhu, W Jia, X Li, Q Hu
2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016
Crowdsourced time-sync video tagging using semantic association graph
W Yang, N Ruan, W Gao, K Wang, W Ran, W Jia
2017 IEEE International Conference on Multimedia and Expo (ICME), 547-552, 2017
Ethereum analysis via node clustering
H Sun, N Ruan, H Liu
International Conference on Network and System Security, 114-129, 2019
GADM: Manual fake review detection for O2O commercial platforms
N Ruan, R Deng, C Su
Computers & Security 88, 101657, 2020
Efficient and enhanced broadcast authentication protocols based on multilevel μTESLA
X Li, N Ruan, F Wu, J Li, M Li
2014 IEEE 33rd International Performance Computing and Communications …, 2014
Revealing your mobile password via WiFi signals: Attacks and countermeasures
Y Meng, J Li, H Zhu, X Liang, Y Liu, N Ruan
IEEE Transactions on Mobile Computing 19 (2), 432-449, 2019
A novel broadcast authentication protocol for internet of vehicles
N Ruan, M Li, J Li
Peer-to-Peer Networking and Applications 10 (6), 1331-1343, 2017
Label smoothing and adversarial robustness
C Fu, H Chen, N Ruan, W Jia
arXiv preprint arXiv:2009.08233, 2020
How to model the bribery attack: A practical quantification method in blockchain
H Sun, N Ruan, C Su
European Symposium on Research in Computer Security, 569-589, 2020
Cooperative Fraud detection model with privacy-preserving in real CDR datasets
N Ruan, Z Wei, J Liu
IEEE Access 7, 115261-115272, 2019
SpamTracer: manual fake review detection for O2O commercial platforms by using geolocation features
R Deng, N Ruan, R Jin, Y Lu, W Jia, C Su, D Xu
International Conference on Information Security and Cryptology, 384-403, 2018
Efficient and secure message authentication in cooperative driving: A game-theoretic approach
L Gao, N Ruan, H Zhu
2016 IEEE International Conference on Communications (ICC), 1-6, 2016
Elliptic curve ElGamal threshold-based key management scheme against compromise of distributed RSUs for VANETs
N Ruan, T Nishide, Y Hori
Information and Media Technologies 7 (4), 1588-1595, 2012
The system can't perform the operation now. Try again later.
Articles 1–20