photo

Na Ruan

Associate Professor, Ph.D
Shanghai Jiao Tong University
Assistant Director, SJTU Center of Blockchain

About Me

阮娜,上海交通大学副教授,博士生导师,隐私计算与智能安全实验室负责人,校区块链研究中心主任助理,无锡区块链高等研究中心副主任。日本九州大学博士,澳洲莫纳什大学访问学者,中国计算机学会(CCF)高级会员,CCF 区块链专委会执行委员,《网络空间安全学报》青年编委;上海交通大学晨星优秀青年学者获得者。主要从事网络安全与数据隐私、区块链、人工智能安全等方面研究。发表论文50余篇,合著学术专著2项,申请及授权专利10余项,主持国家自然科学基金项目,科技部重点研发课题,上海科委科技创新行动计划项目,教育部-华为产学研协同育人项目,国家电网总部科技项目课题,中国计算机学会腾讯犀牛鸟基金,无锡市产研院先导预研项目等多项纵横向课题共计20余项。获CCF推荐会议WASA2017最佳论文入围奖,指导学生获CCF&ATEC2023全国大学生区块链安全技术与创新应用竞赛一等奖。

Office: SEIEE 3-527
800 Dongchuan Road, Minhang District
Shanghai 200240, P.R. China

Email: naruan@cs.sjtu.edu.cn / naruan@sjtu.edu.cn / ruannana@gmail.com

I am looking for self-motivated students who are strongly committed to research,
If you are interested in Security and Privacy, Blockchain and Big Data, feel free to send me your CV.

Interests

  • Security and Privacy
  • Network and Big Data
  • Blockchain

Courses


  1. CS3611 (IEEE) Computer Network
  2. EE357 (IEEE) Computer Network
  3. MA115 (SEIEE) Discrete Mathematics
  4. CS902 (SEIEE) Thinking and Approach of Programming
  5. CS101 (Zhiyuan College) Introduction to Computer Science
  6. P033501 (CS Master) Computer Network

Papers


    *Corresponding author
  1. Zenan Lou, Na Ruan*. FXChain: a multi-consortium blockchain with flexible privacy-preserving strategies, The 29th Australasian Conference on Information Security and Privacy (ACISP2024),Sydney, Australia. New
  2. Chaohao Fu, Weijia Jia,Na Ruan*. Client-free federated unlearning via training reconstruction with anchor subspace calibration (ICASSP 2024,CCF-B),Seoul,Korea. New
  3. Hongbin Chen, Chaohao Fu, Na Ruan*. Steal from Collaboration: Spy Attack by a Dishonest Party in Vertical Federated Learning. 21st International Conference on Applied Cryptography and Network Security (ACNS 2023),Kyoto,Japan.
  4. Na Ruan*, Hanyi Sun, Zenan Lou, Jie Li. A General Quantitative Analysis Framework for Attacks in Blockchain. IEEE/ACM Transactions on Networking, 2022. (CCF-A)
  5. Huang Juzheng, Qiang Tang, Chunhua Su, Na Ruan*. Secure Collaboration between Consortiums in Permissioned Blockchains.The 16th International Conference on Provable and Practical Security (ProvSec 2022)
  6. Mohammed almehdhar, Mohammed M. Abdelsamea, and Na Ruan*. Deep multi-locality convolutional neural network for DDoS detection in smart home IoT. Int. J. of Information and Computer Security (IJICS), 2022.
  7. Jikun Chen,Hongbin Chen,Ruoyu Deng,Na Ruan*,Yao Liu,Chao Liu,Chunhua Su,ALRS-An Adversarial Noise Based Data Sharing Mechanism for Privacy Protecting,The 26th Australasian Conference on Information Security and Privacy (ACISP2021).
  8. Zekun Sun, Yujie Han, Zeyu Hua, Na Ruan*, Weijia Jia, Improving the Efficiency and Robustness of Deepfakes Detection through Precise Geometric Features, IEEE Conference on Computer Vision and Pattern Recognition (CVPR,CCF-A), 2021.
  9. 刘汉卿, 阮娜*,区块链中攻击方式的研究. 计算机学报, 2021年第4期. (CCF-A)
  10. 阮娜,刘汉卿,斯雪明,采用工作量证明共识机制的区块链中挖矿攻击者间的鲶鱼效应,计算机学报, 2021年第1期。 (CCF-A)
  11. Na Ruan, Dongli Zhou, Weijia Jia, Ursa: Robust Performance for Nakamoto Consensus with Self-adaptive Throughput, ACM Transactions on Internet Technology (ACM TOIT), 2020. (CCF-B)
  12. Hanyi Sun, Na Ruan*, Chunhua Su . How to Model the Bribery Attack: A Practical Quantification Method in Blockchain. European Symposium on Research in Computer Security(ESORICS 2020, CCF-B,accept ration 19%, 72 in 366), 2020.
  13. Feifan Yu, Na Ruan*, Siyuan Cheng. Rational Manager in Bitcoin Mining Pool: Dynamic Strategies to Gain Extra Rewards. The 15th ACM Asia Conference on Computer and Communications Security (ACM AsiaCCS, accept ration 21%, 67 in 308), 2020.
  14. Na Ruan, Chunhua Su, Chi Xie, Weijia Jia, Securing Cooperative Adaptive Cruise Control in Vehicular Platoons via Cooperative Message Authentication, IEICE Transactions on Information and Systems (SCI), 2020.
  15. Ruoyu Deng, Na Ruan*, Guangsheng Zhang, Xiaohu Zhang. FraudJudger: Fraud Detection on Digital Payment Platforms with Fewer Labels. 21st International Conference on Information and Communications Security (ICICS, Beijing, China, 2019. Download
  16. Hanyi Sun, Na Ruan*, Hanqing Liu. Ethereum Analysis via Node Clustering. International Conference on Network and System Security (NSS), Sapporo, Japan, 2019. Download
  17. Dongli Zhou, Na Ruan* Weijia Jia . A Robust Throughput Scheme for Bitcoin Network without Block Reward. The 21th IEEE International Conference on High Performance Computing and Communications (HPCC, ), Zhangjiajie, China, 2019. Download
  18. Na Ruan, Ruoyu Deng, Chunhua Su. GADM: Manual Fake Review Detection for O2O Commercial Platforms. Computers & Security (COSE, CCF-B), 2019. Download
  19. Na Ruan, Zhikun Wei, Jienan Liu. Cooperative Fraud Detection Model With Privacy-Preserving in Real CDR Datasets. IEEE Access (SCI), 2019. Download
  20. Wenmian Yang, Weijia Jia, Kun Wang, Na Ruan, Wenyuan Gao. Time-sync Video Tag Extraction Using Semantic Association Graph. ACM Transactions on Knowledge Discovery from Data (TKDD, CCF-B), 2019. Download
  21. Haojin Zhu, Yan Meng, Xiaohui Liang, Yao Liu, Na Ruan. Revealing Your Mobile Password via WiFi Signals: Attacks and Countermeasures. IEEE Transactions on Mobile Computing (CCF-A, SCI), 2019. Download
  22. Ruoyu Deng, Na Ruan*, Ruidong Jin, Yu Lu, Weijia Jia, Chuhua Su, Dandan Xu. SpamTracer: Manual Fake Review Detection for O2O Commercial Platforms by Using Geolocation Features. International Conference on Information Security and Cryptology (Inscrypt), Fuzhou, China, 2018. Download
  23. Hanqing Liu, Na Ruan*, Rongtian Du, Weijia Jia. On the Strategy and Behavior of Bitcoin Mining with N-attackers. Asia Conference on Computer and Communications Security (ACM AsiaCCS, Accept ration 19%, 62 in 310), Seoul, Korean, 2018. Download
  24. Xu Chu, Na Ruan*, Ming Li, Weijia Jia. Pseudonym Inference in Cooperative Vehicular Traffic Scenarios. The IEEE Conference on Communications and Network Security (IEEE CNS), Beijing, China, 2018. Download
  25. Weijia Jia, Hongjian Peng, Na Ruan*, Zhiqing Tang, Wei Zhao. WiFind: Driver fatigue detection with fine-grained Wi-Fi signal features. IEEE Transactions on Big Data (SCI), 2018. Download
  26. Wenmian Yang, Na Ruan*, Wenyuan Gao, Kun Wang, Wensheng Ran, Weijia Jia. Crowdsourced Time-sync Video Tagging using Semantic Association Graph. IEEE International Conference on Multimedia and Expo (ICME, CCF-B), Hongkong, China, 2017. Download
  27. Mingli Wu,Na Ruan*, Shiheng Ma, Haojin Zhu, Weijia Jia, Qingshui Xue, Songyang Wu. Detect SIP Flooding Attacks in VoLTE by Utilizing and Compressing Counting Bloom Filter. International Conference on Wireless Algorithms, Systems, and Applications (WASA, Best Paper Runner-up Award), Guilin, China, 2017. Download
  28. Wenyan Yao, Na Ruan*, Feifan Yu, Weijia Jia, Haojin Zhu. Privacy-Preserving Fraud Detection via Cooperative Mobile Carriers with Improved Accuracy. Annual IEEE International Conference on Sensing, Communication, and Networking (IEEE SECON, CCF-B), San Diego, USA, 2017. Download
  29. Na Ruan, Mingli Wu, Shiheng Ma, Haojin Zhu, Weijia Jia. Detect and Prevent SIP Flooding Attacks in VoLTE by Utilizing a Two-Tier PFilter Design. IEICE Transactions on Information and Systems (SCI/EI), 2017. Download
  30. Jiafa Liu, Junyi Li, Huaxin Li, Haojin Zhu, Na Ruan, Di Ma. Who Moved My Cheese: Towards Automatic and Fine-grained Classification and Modeling Ad Network. IEEE Global Communications Conference (IEEE GLOBECOM), Washington, DC USA, 2016. Download
  31. Na Ruan, Qi Hu, Lei Gao, Haojin Zhu, Qingshui Xue, Weijia Jia. A Traffic Based Lightweight Attack Detection Scheme for VoLTE. IEEE Global Communications Conference (IEEE GLOBECOM), Washington, DC USA, 2016. Download
  32. Yaoan Jin, Chunhua Su, Na Ruan*, Weijia Jia. Privacy-Preserving Mining of Association Rules for Horizontally Distributed Databases Based on FP-tree. International Conference on Information Security Practice and Experience (ISPEC), Zhangjiajie, China, 2016. Download
  33. Mengyuan Li, Yan Meng, Junyi Liu, Haojin Zhu, Xiaohui Liang, Yao Liu, Na Ruan. When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals. ACM SIGSAC Conference on Computer and Communications Security (ACM CCS, Accepting rate 16.5%, CCF-A), Vienna, Austria, 2016. Download
  34. Na Ruan, Lei Gao, Haojin Zhu, Weijia Jia, Xiang Li, Qi Hu. Toward Optimal DoS-Resistant Authentication in Crowdsensing Networks via Evolutionary Game. International Conference on Distributed Computing Systems (ICDCS, Accepting rate 17.6%, CCF-B), Kyoto, Japan, 2016. Download
  35. Lei Gao, Na Ruan*, Haojin Zhu. Efficient and Secure Message Authentication in Cooperative Driving: A Game-Theoretic Approach. IEEE International Conference on Communications (IEEE ICC), Kuala Lumpur, Malaysia, 2016. Download
  36. Jianwei Qian, Fudong Qiu, Fan Wu, Na Ruan, Guihai Chen, Shaojie Tang. Privacy-Preserving Selective Aggregation of Online User Behavior Data. IEEE Transactions on Computers (SCI, CCF-A), 2016. Download
  37. Na Ruan, Mengyuan Li, Jie Li. A Novel Broadcast Authentication Protocol for Internet of Vehicles.Peer-to-Peer Networking and Applications (PPNA), 2016. Download
  38. Mengyuan Li, Na Ruan*, QiYang Qian, Haojin Zhu, Le Yu. SPFM: Scalable and Privacy-preserving Friend Matching in Mobile Cloud. IEEE Internet of Things Journal (SCI, JCR-1), 2016. Download
  39. Jianwei Qian, Fudong Qiu, Fan Wu, Na Ruan, Guihai Chen, Shaojie Tang. A Differentially Private Selective Aggregation Scheme for Online User Behavior Analysis. IEEE Global Communications Conference (IEEE Globecom), San Diego, CA, USA, 2015. Download
  40. Ben Bett, Xiaokuan Zhang, Mengyuan Li, Qiyang Qian, Na Ruan, Haojin Zhu. SmartSec: Secret Sharing-based Location-aware Privacy Enhancement in Smart Devices. IEEE/CIC International Conference on Communications in China (IEEE ICCC), Shenzhen, China, 2015. Download
  41. Shuying Lai, Huaxin Li, Haojin Zhu, Na Ruan. De-anonymizing Social Networks: Using User Interest as a side-channel. IEEE/CIC International Conference on Communications in China (IEEE ICCC), Shenzhen, China, 2015. Download
  42. Mengyuan Li, Na Ruan*, Haojin Zhu, Jie Li, Xiang Li. A Paralleling Broadcast Authentication Protocol for sparse RSUs in Internet of Vehicles. International Conference on Mobile Ad-hoc and Sensor Networks (MSN), Maui, HI, USA, 2014. Download
  43. Xiang Li, Na Ruan*, Fan Wu, Jie Li, Mengyuan Li. Efficient and Enhanced Broadcast Authentication Protocols based on Multilevel uTESLA. IEEE International Performance Computing and Communications Conference (IPCCC), Austin, Texas, USA, 2014. Download
  44. Na Ruan, Yoshiaki Hori. DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of Things. International Conference on Selected Topics in Mobile and Wireless Networking (iCOST), Avignon, France, 2012. Download
  45. Na Ruan, Takashi Nishide, Yoshiaki Hori. Elliptic Curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs. Information Processing Society of Japan (IPSJ), 2012. Download
  46. Na Ruan, Yizhi Ren, Yoshiaki Hori, Kouchi Sakurai. Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network. Journal of Networks, 2012. Download
  47. Na Ruan, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai. Performance Analysis of Key Management Schemes in Wireless Sensor Network Using Analytic Hierarchy Process. IEEE International Conference on Trust, Security and Privacy in Computing and Communications, (IEEE TrustCom), Changsha, China, 2011. Download
  48. Na Ruan, Takashi Nishide, Yoshiaki Hori. Threshold ElGamal-based Key Management scheme for distributed RSUs in VANET. International Conference on Selected Topics in Mobile and Wireless Networking (iCOST, in conjunction with WiMOB 2011.) Shanghai, China, 2011. Download
  49. Na Ruan, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai. A Generic Evaluation Method for Key Management Schemes in Wireless Sensor Network. International Conference on Ubiquitous Information Management and Communication (ICUIMC, Student grant award), Seoul, Korean, 2011. Download

Books


  1. Minyi Guo, Yuting Chen, Chao Li, Na Ruan, Chentao Wu . Cloud Computing Principle and Practice《云计算原理与实践》. China Machine Press, 400,000 words, Publish time 2017-03, 2017.
  2. Na Ruan, Yu Long, Weidong Liu, Lei Zhang . Translate Computer Science Theory for the Information Age (《信息时代的计算机科学理论》). Shanghai Jiao Tong University Press, 500,000 words, ISBN 9787313111098, Publish time 2014-06, 2014.

Domestic Conference


  1. Na Ruan, Takashi Nishide, Yoshiaki Hori. A key management scheme against compromised RSU in VANET. The 64th Joint Conference of Electrical and Electronics Engineers in Kyushu, (JCEEE-Kyushu), Saga, Japan, 2011.
  2. Na Ruan, Yizhi Ren, Yoshiaki Hori, Kouchi Sakurai. Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network. (階層分析法を使用した無線センサネットワークにおける鍵管理方式の分析). The 2011 Symposium on Cryptography and Information Security (SCIS), Kobe, Japan, 2011.
  3. Na Ruan, Yizhi Ren, Yoshiaki Hori, Kouchi Sakurai. An Evaluation Method for Key Management Schemes in WSN. The 63rd Joint Conference of Electrical and Electronics Engineers in Kyushu (JCEEE-Kyushu), Fukuoka, Japan, 2010.

Research


  1. 基于网络行为模式分析的虚拟货币账户去匿名化技术研究 New
    Sponsor: 国家科技部重点研发计划课题,119万
    Duration: 2023-12 - 2026-11
    负责人
  2. 面向多层次的区块链漏洞挖掘技术研究 New
    Sponsor: 上海科委科技创新行动计划项目,200万
    Duration: 2023-12 - 2025-11
    负责人
  3. 面向分布式分散资源聚合互动的可信交易关键技术研究及应用 New
    Sponsor: 国网总部科技项目课题,110万
    Duration: 2023-12 - 2025-11
    负责人
  4. 面向电力能源体系的区块链软硬件协同关键技术与设备研制 New
    Sponsor: 无锡市产业创新研究院项目,100万
    Duration: 2024-01 - 2024-12
    负责人
  5. 基于自适应巡航系统的车联网中合作安全与隐私保护研究
    Sponsor: 国家自然科学基金委员会青年基金,25万
    Duration: 2018-01 - 2020-12
    负责人
  6. Encryption Strategy based on the Importance Evaluation of Mobile Communication Contents
    Sponsor: CCF-腾讯犀牛鸟科研基金项目 (2014 Anniversary CCF-Tencent Science Research Fund Awarder,17⁄152)
    Duration:2014-10 - 2015-10
    负责人

Membership


  1. Member of Association for Computing Machinery (ACM)
  2. Member of Institute of Electrical and Electronics Engineers (IEEE)
  3. Member of Chinese Association of Cryptologic Research (CACR)
  4. Member of Information Processing Society of Japan (IPSJ)
  5. Committee Member of China Computer Federation-Technical Committee on Block Chain (CCF TCBC)
  6. Committee Member of China Computer Federation-Network and Data Communications (CCF TCCOMM)

Peer Referee


  1. Transactions on Information Forensics & Security
  2. IEEE Trans. on Dependable & Secure Computing
  3. KSII Trans. on Internet & Info. Systems
  4. Chinese Journal of Computers
  5. SCIENCE CHINA Info. Sciences
  6. PPNA
  7. ESORICS

Members


Doctor


photo

Chaohao Fu

2nd year (Co-supervised)
Adversarial Examples
Forgery Detection

Paper:
photo

Zekun Sun

1st year
Data Security

Paper:



Master


photo

Hongbin Chen

3th year
Security and Privacy in Artificial intelligence

Paper:
photo

Jikun Chen

3th year
Adversarial Learning

Paper:
photo

Zhao Lu

2nd year
Blockchain

Paper:
photo

Zenan Lou

2nd year
Blockchain

Paper:
photo

Xunzhi Chen

1st year
Blockchain

Paper:
  1. Privacy-Preserving Fraud Detection via Cooperative Mobile Carriers with Improved Accuracy
photo

Jianghui Zhai

1st year
Blockchain

Paper:
photo

Zijian Liu

1st year
AI Security

Paper:



Undergraduate


photo

Jiaye Li

4th year
Multi-Target Learning

Paper:
photo

Xiangyu Shen

4th year
Data privacy

Paper:
photo

Zhiqiang Ma

3th year
Data Security and Privacy

Paper:



Graduated


photo

Xu Chu

Master, graduated in 2019
Vehicle Platooning

Paper:
  1. Pseudonym Inference in Cooperative Vehicular Traffic Scenarios
photo

Mingli Wu

Master, graduated in 2018
Network Security
Smartphone Privacy

Paper:
  1. Detect and Prevent SIP Flooding Attacks in VoLTE by Utilizing a Two-Tier PFilter Design
  2. Detect SIP Flooding Attacks in VoLTE by Utilizing and Compressing Counting Bloom Filter
photo

Jingyu Cui

Master @ Georgia Institute of Technology
Vehicle Platooning
Machine Learning

Paper:
photo

Yuxin Ding

Bachelor, graduated in 2019
Internet of Vehicles

Paper:
photo

Ruidong Jin

Bachelor, graduate in 2018 and Master in Tokyo Institute of Technology
Artificial Intelligence
Spamming Detection

Paper:
  1. Ruoyu Deng, Na Ruan*, Ruidong Jin, Yu Lu, Weijia Jia, Chunhua Su and Dandan Xu. “SpamTracer: Manual Fake Review Detection for O2O Commercial Platforms by Using Geolocation Features,” Inscrypt 2018, Dec 14-17, 2018, Fuzhou, China.
photo

Yao'an Jin

Master @ Osaka University
Cyber Security
Cryptography
Security Application

Paper:
  1. Jin Y, Su C, Na R, Jia W, et al. Privacy-Preserving Mining of Association Rules for Horizontally Distributed Databases Based on FP-Tree[M]// Information Security Practice and Experience. Springer International Publishing, 2016.
photo

Xingyang Liu

Bachelor, graduated in 2018
Privacy Preservation
Data Mining

Paper:
photo

Weiyi Li

Bachelor, graduated in 2019
Internet of Vehicles

Paper:
photo

Yu Lu

Bachelor, graduated in 2019
Spamming Detection

Paper:
  1. Ruoyu Deng, Na Ruan*, Ruidong Jin, Yu Lu, Weijia Jia, Chunhua Su and Dandan Xu. “SpamTracer: Manual Fake Review Detection for O2O Commercial Platforms by Using Geolocation Features,” Inscrypt 2018, Dec 14-17, 2018, Fuzhou, China.
photo

Chengliang Si

Bachelor, graduated in 2019
Data Mining
Computer Security

Paper:
photo

Zhikun Wei

Bachelor, graduated in 2018
Privacy and Data Security in Artificial Intelligence

Paper:
photo

Weijie Yuan

Bachelor, graduated in 2019
Big Data and Privacy in the Internet of Vehicles

Paper:
photo

Changzhao Zhu

Bachelor, graduated in 2019
The Bribing Attacker in Blockchain

Paper:
photo

Hanqing Liu

3th year
Blockchain

Paper:
  1. Ethereum Analysis via Node Clustering
  2. On the Strategy and Behavior of Bitcoin Mining with N-attackers
photo

Hanyi Sun

2nd year
Blockchain

Paper:
  1. Ethereum Analysis via Node Clustering
photo

Dongli Zhou

3th year
Blockchain

Paper:
  1. A Robust Throughput Scheme for Bitcoin Network without Block Reward
photo

Ruoyu Deng

3th year
Data Security and Privacy

Paper:
  1. SpamTracer: Manual Fake Review Detection for O2O Commercial Platforms by Using Geolocation Features
photo

Feifan Yu

3th year
Blockchain
Information Security
Network Security

Paper:
  1. Privacy-Preserving Fraud Detection via Cooperative Mobile Carriers with Improved Accuracy
photo

Zeyu Hua

3th year
Facial Forensics

Paper:
photo

Bingjie Tu

3th year
Data Security and Privacy

Paper: