Na Ruan
Orcid: 0000-0002-7673-9843
According to our database1,
Na Ruan
authored at least 53 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
From the Perspective of Prototypes: A Privacy-Preserving Personalized Federated Learning Framework.
Proceedings of the Information Security Practice and Experience, 2024
Client-Free Federated Unlearning via Training Reconstruction with Anchor Subspace Calibration.
Proceedings of the IEEE International Conference on Acoustics, 2024
FXChain: A Multi-consortium Permissioned Blockchain with Flexible Privacy-Preserving Strategies.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
IEEE/ACM Trans. Netw., April, 2023
Deep multi-locality convolutional neural network for DDoS detection in smart home IoT.
Int. J. Inf. Comput. Secur., 2023
Steal from Collaboration: Spy Attack by a Dishonest Party in Vertical Federated Learning.
Proceedings of the Applied Cryptography and Network Security, 2023
2022
Adversarial Representation Sharing: A Quantitative and Secure Collaborative Learning Framework.
CoRR, 2022
Proceedings of the Provable and Practical Security, 2022
2021
Wirel. Commun. Mob. Comput., 2021
Improving the Efficiency and Robustness of Deepfakes Detection Through Precise Geometric Features.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
Ursa: Robust Performance for <i>Nakamoto</i> Consensus with Self-adaptive Throughput.
ACM Trans. Internet Techn., 2020
IEEE Trans. Mob. Comput., 2020
IEEE Trans. Big Data, 2020
Securing Cooperative Adaptive Cruise Control in Vehicular Platoons via Cooperative Message Authentication.
IEICE Trans. Inf. Syst., 2020
Comput. Secur., 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
ACM Trans. Knowl. Discov. Data, 2019
CoRR, 2019
Catfish Effect Between Internal and External Attackers: Being Semi-honest is Helpful.
CoRR, 2019
IEEE Access, 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
SpamTracer: Manual Fake Review Detection for O2O Commercial Platforms by Using Geolocation Features.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
2017
IEEE Trans. Computers, 2017
Peer-to-Peer Netw. Appl., 2017
IEEE Internet Things J., 2017
Detect and Prevent SIP Flooding Attacks in VoLTE by Utilizing a Two-Tier PFilter Design.
IEICE Trans. Inf. Syst., 2017
IACR Cryptol. ePrint Arch., 2017
Detect SIP Flooding Attacks in VoLTE by Utilizing and Compressing Counting Bloom Filter.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
Privacy-Preserving Fraud Detection via Cooperative Mobile Carriers with Improved Accuracy.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017
Proceedings of the 2017 IEEE International Conference on Multimedia and Expo, 2017
2016
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016
Privacy-Preserving Mining of Association Rules for Horizontally Distributed Databases Based on FP-Tree.
Proceedings of the Information Security Practice and Experience, 2016
Toward Optimal DoS-Resistant Authentication in Crowdsensing Networks via Evolutionary Game.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016
Efficient and secure message authentication in cooperative driving: A game-theoretic approach.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Who Moved My Cheese: Towards Automatic and Fine-Grained Classification and Modeling Ad Network.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015
A Differentially Private Selective Aggregation Scheme for Online User Behavior Analysis.
Proceedings of the 2015 IEEE Global Communications Conference, 2015
2014
A Paralleling Broadcast Authentication Protocol for Sparse RSUs in Internet of Vehicles.
Proceedings of the 10th International Conference on Mobile Ad-hoc and Sensor Networks, 2014
Efficient and enhanced broadcast authentication protocols based on multilevel μTESLA.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014
2012
Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network.
J. Networks, 2012
Elliptic curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs.
J. Inf. Process., 2012
2011
Performance Analysis of Key Management Schemes in Wireless Sensor Network Using Analytic Hierarchy Process.
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011