Associate Professor, Department of Computer Science&Engineering,Shanghai Jiaotong University
Verified email at - Homepage
Cited by
Cited by
When CSI meets public WiFi: inferring your mobile phone password via WiFi signals
M Li, Y Meng, J Liu, H Zhu, X Liang, Y Liu, N Ruan
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
Improving the efficiency and robustness of deepfakes detection through precise geometric features
Z Sun, Y Han, Z Hua, N Ruan, W Jia
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021
WiFind: Driver fatigue detection with fine-grained Wi-Fi signal features
W Jia, H Peng, N Ruan, Z Tang, W Zhao
IEEE Transactions on Big Data 6 (2), 269-282, 2018
DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of Things
N Ruan, Y Hori
2012 International Conference on Selected Topics in Mobile and Wireless …, 2012
On the strategy and behavior of bitcoin mining with n-attackers
H Liu, N Ruan, R Du, W Jia
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
Privacy-preserving selective aggregation of online user behavior data
J Qian, F Qiu, F Wu, N Ruan, G Chen, S Tang
IEEE transactions on computers 66 (2), 326-338, 2016
Revealing your mobile password via WiFi signals: Attacks and countermeasures
Y Meng, J Li, H Zhu, X Liang, Y Liu, N Ruan
IEEE Transactions on Mobile Computing 19 (2), 432-449, 2019
Ethereum analysis via node clustering
H Sun, N Ruan, H Liu
Network and System Security: 13th International Conference, NSS 2019 …, 2019
SPFM: Scalable and privacy-preserving friend matching in mobile cloud
M Li, N Ruan, QY Qian, H Zhu, X Liang, L Yu
IEEE Internet of Things Journal 4 (2), 583-591, 2016
Toward optimal dos-resistant authentication in crowdsensing networks via evolutionary game
N Ruan, L Gao, H Zhu, W Jia, X Li, Q Hu
2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016
Crowdsourced time-sync video tagging using semantic association graph
W Yang, N Ruan, W Gao, K Wang, W Ran, W Jia
2017 IEEE International Conference on Multimedia and Expo (ICME), 547-552, 2017
How to model the bribery attack: A practical quantification method in blockchain
H Sun, N Ruan, C Su
Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020
GADM: Manual fake review detection for O2O commercial platforms
N Ruan, R Deng, C Su
Computers & Security 88, 101657, 2020
Efficient and enhanced broadcast authentication protocols based on multilevel μTESLA
X Li, N Ruan, F Wu, J Li, M Li
2014 IEEE 33rd International Performance Computing and Communications …, 2014
Label smoothing and adversarial robustness
C Fu, H Chen, N Ruan, W Jia
arXiv preprint arXiv:2009.08233, 2020
A novel broadcast authentication protocol for internet of vehicles
N Ruan, M Li, J Li
Peer-to-Peer Networking and Applications 10, 1331-1343, 2017
A robust throughput scheme for bitcoin network without block reward
D Zhou, N Ruan, W Jia
2019 IEEE 21st International Conference on High Performance Computing and …, 2019
Time-sync video tag extraction using semantic association graph
W Yang, K Wang, N Ruan, W Gao, W Jia, W Zhao, N Liu, Y Zhang
ACM Transactions on Knowledge Discovery from Data (TKDD) 13 (4), 1-24, 2019
Cooperative Fraud detection model with privacy-preserving in real CDR datasets
N Ruan, Z Wei, J Liu
IEEE Access 7, 115261-115272, 2019
SpamTracer: manual fake review detection for O2O commercial platforms by using geolocation features
R Deng, N Ruan, R Jin, Y Lu, W Jia, C Su, D Xu
Information Security and Cryptology: 14th International Conference, Inscrypt …, 2019
The system can't perform the operation now. Try again later.
Articles 1–20