Book

1.Minyi Guo, Yuting Chen, Chao Li, Na Ruan, Chentao Wu . Cloud Computing Principle and Practice《云计算原理与实践》. China Machine Press, 400,000 words, Publish time 2017-03, 2017.
2.Na Ruan, Yu Long, Weidong Liu, Lei Zhang . Translate Computer Science Theory for the Information Age (《信息时代的计算机科学理论》). Shanghai Jiao Tong University Press, 500,000 words, ISBN 9787313111098, Publish time 2014-06, 2014.

Jounal

2020

1.Na Ruan, Chunhua Su, Chi Xie, Weijia Jia, Securing Cooperative Adaptive Cruise Control in Vehicular Platoons via Cooperative Message Authentication, IEICE Transactions on Information and Systems (SCI), to appear, 2020.

2019

2.Na Ruan, Ruoyu Deng, Chunhua Su. GADM: Manual Fake Review Detection for O2O Commercial Platforms. Computers & Security (COSE, CCF-B), 2019.
3.Na Ruan, Zhikun Wei, Jienan Liu. Cooperative Fraud Detection Model With Privacy-Preserving in Real CDR Datasets. IEEE Access (SCI), 2019.
4.Wenmian Yang, Weijia Jia, Kun Wang, Na Ruan, Wenyuan Gao. Time-sync Video Tag Extraction Using Semantic Association Graph. ACM Transactions on Knowledge Discovery from Data (TKDD, CCF-B), 2019.
5.Haojin Zhu, Yan Meng, Xiaohui Liang, Yao Liu, Na Ruan. Revealing Your Mobile Password via WiFi Signals: Attacks and Countermeasures. IEEE Transactions on Mobile Computing (CCF-A, SCI), 2019.

2018 and before

6.Weijia Jia, Hongjian Peng, Na Ruan*, Zhiqing Tang, Wei Zhao. WiFind: Driver fatigue detection with fine-grained Wi-Fi signal features. IEEE Transactions on Big Data (SCI, *Corresponding author), 2018.
7. Na Ruan, Mingli Wu, Shiheng Ma, Haojin Zhu, Weijia Jia. Detect and Prevent SIP Flooding Attacks in VoLTE by Utilizing a Two-Tier PFilter Design. IEICE Transactions on Information and Systems (SCI/EI), 2017.
8. Jianwei Qian, Fudong Qiu, Fan Wu, Na Ruan, Guihai Chen, Shaojie Tang. Privacy-Preserving Selective Aggregation of Online User Behavior Data. IEEE Transactions on Computers (SCI, CCF-A), 2016.
9. Na Ruan, Mengyuan Li, Jie Li. A Novel Broadcast Authentication Protocol for Internet of Vehicles.Peer-to-Peer Networking and Applications (CCF-C), 2016.
10. Mengyuan Li, Na Ruan*, QiYang Qian, Haojin Zhu, Le Yu. SPFM: Scalable and Privacy-preserving Friend Matching in Mobile Cloud. IEEE Internet of Things Journal (SCI, JCR-1, *Corresponding author), 2016.
11. Na Ruan, Takashi Nishide, Yoshiaki Hori. Elliptic Curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs. Information Processing Society of Japan (IPSJ), 2012.
12. Na Ruan, Yizhi Ren, Yoshiaki Hori, Kouchi Sakurai. Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network. Journal of Networks, 2012.

Conference

2019

1.Ruoyu Deng, Na Ruan*, Guangsheng Zhang, Xiaohu Zhang. FraudJudger: Fraud Detection on Digital Payment Platforms with Fewer Labels. 21st International Conference on Information and Communications Security (ICICS, Beijing, China, 2019. *Corresponding author.
2.Hanyi Sun, Na Ruan*, Hanqing Liu. Ethereum Analysis via Node Clustering. International Conference on Network and System Security (NSS), Sapporo, Japan, 2019. *Corresponding author.
3.Dongli Zhou, Na Ruan* Weijia Jia . A Robust Throughput Scheme for Bitcoin Network without Block Reward. The 21th IEEE International Conference on High Performance Computing and Communications (HPCC, CCF-C), Zhangjiajie, China, 2019. *Corresponding author

2018

4.Ruoyu Deng, Na Ruan*, Ruidong Jin, Yu Lu, Weijia Jia, Chuhua Su, Dandan Xu. SpamTracer: Manual Fake Review Detection for O2O Commercial Platforms by Using Geolocation Features. International Conference on Information Security and Cryptology (Inscrypt, CACR-C), Fuzhou, China, 2018. *Corresponding author
5.Hanqing Liu, Na Ruan*, Rongtian Du, Weijia Jia. On the Strategy and Behavior of Bitcoin Mining with N-attackers. Asia Conference on Computer and Communications Security (ACM AsiaCCS, CCF-C, Accept ration 19%, 62 in 310), Seoul, Korean, 2018. *Corresponding author
6.Xu Chu, Na Ruan*, Ming Li, Weijia Jia. Pseudonym Inference in Cooperative Vehicular Traffic Scenarios. The IEEE Conference on Communications and Network Security (IEEE CNS), Beijing, China, 2018. *Corresponding author

2017

7.Wenmian Yang, Na Ruan*, Wenyuan Gao, Kun Wang, Wensheng Ran, Weijia Jia. Crowdsourced Time-sync Video Tagging using Semantic Association Graph. IEEE International Conference on Multimedia and Expo (ICME, CCF-B), Hongkong, China, 2017. *Corresponding author
8.Mingli Wu,Na Ruan*, Shiheng Ma, Haojin Zhu, Weijia Jia, Qingshui Xue, Songyang Wu. Detect SIP Flooding Attacks in VoLTE by Utilizing and Compressing Counting Bloom Filter. International Conference on Wireless Algorithms, Systems, and Applications (WASA, Best Paper Runner-up Award), Guilin, China, 2017. *Corresponding author
9.Wenyan Yao, Na Ruan*, Feifan Yu, Weijia Jia, Haojin Zhu. Privacy-Preserving Fraud Detection via Cooperative Mobile Carriers with Improved Accuracy. Annual IEEE International Conference on Sensing, Communication, and Networking (IEEE SECON, CCF-B), San Diego, USA, 2017. *Corresponding author

2016

10.Jiafa Liu, Junyi Li, Huaxin Li, Haojin Zhu, Na Ruan, Di Ma. Who Moved My Cheese: Towards Automatic and Fine-grained Classification and Modeling Ad Network. IEEE Global Communications Conference (IEEE GLOBECOM, CCF-C), Washington, DC USA, 2016.
11.Na Ruan, Qi Hu, Lei Gao, Haojin Zhu, Qingshui Xue, Weijia Jia. A Traffic Based Lightweight Attack Detection Scheme for VoLTE. IEEE Global Communications Conference (IEEE GLOBECOM, CCF-C), Washington, DC USA, 2016.
12.Yaoan Jin, Chunhua Su, Na Ruan*, Weijia Jia. Privacy-Preserving Mining of Association Rules for Horizontally Distributed Databases Based on FP-tree. International Conference on Information Security Practice and Experience (ISPEC, CACR-C), Zhangjiajie, China, 2016. *Corresponding author
13.Mengyuan Li, Yan Meng, Junyi Liu, Haojin Zhu, Xiaohui Liang, Yao Liu, Na Ruan. When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals. ACM SIGSAC Conference on Computer and Communications Security (ACM CCS, Accepting rate 16.5%, CCF-A), Vienna, Austria, 2016.
14.Na Ruan, Lei Gao, Haojin Zhu, Weijia Jia, Xiang Li, Qi Hu. Toward Optimal DoS-Resistant Authentication in Crowdsensing Networks via Evolutionary Game. International Conference on Distributed Computing Systems (ICDCS, Accepting rate 17.6%, CCF-B), Kyoto, Japan, 2016.
15.Lei Gao, Na Ruan*, Haojin Zhu. Efficient and Secure Message Authentication in Cooperative Driving: A Game-Theoretic Approach. IEEE International Conference on Communications (IEEE ICC, CCF-C), Kuala Lumpur, Malaysia, 2016. *Corresponding author

2015

16.Jianwei Qian, Fudong Qiu, Fan Wu, Na Ruan, Guihai Chen, Shaojie Tang. A Differentially Private Selective Aggregation Scheme for Online User Behavior Analysis. IEEE Global Communications Conference (IEEE Globecom, CCF-C), San Diego, CA, USA, 2015.
17.Ben Bett, Xiaokuan Zhang, Mengyuan Li, Qiyang Qian, Na Ruan, Haojin Zhu. SmartSec: Secret Sharing-based Location-aware Privacy Enhancement in Smart Devices. IEEE/CIC International Conference on Communications in China (IEEE ICCC), Shenzhen, China, 2015.
18.Shuying Lai, Huaxin Li, Haojin Zhu, Na Ruan. De-anonymizing Social Networks: Using User Interest as a side-channel. IEEE/CIC International Conference on Communications in China (IEEE ICCC), Shenzhen, China, 2015.

2014 and before

19.Mengyuan Li, Na Ruan*, Haojin Zhu, Jie Li, Xiang Li. A Paralleling Broadcast Authentication Protocol for sparse RSUs in Internet of Vehicles. International Conference on Mobile Ad-hoc and Sensor Networks (MSN), Maui, HI, USA, 2014. *Corresponding author
20.Xiang Li, Na Ruan*, Fan Wu, Jie Li, Mengyuan Li. Efficient and Enhanced Broadcast Authentication Protocols based on Multilevel uTESLA. IEEE International Performance Computing and Communications Conference (IPCCC, CCF-C), Austin, Texas, USA, 2014. *Corresponding author
21.Na Ruan, Yoshiaki Hori. DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of Things. International Conference on Selected Topics in Mobile and Wireless Networking (iCOST), Avignon, France, 2012.
22.Na Ruan, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai. Performance Analysis of Key Management Schemes in Wireless Sensor Network Using Analytic Hierarchy Process. IEEE International Conference on Trust, Security and Privacy in Computing and Communications, (IEEE TrustCom), Changsha, China, 2011.
23.Na Ruan, Takashi Nishide, Yoshiaki Hori. Threshold ElGamal-based Key Management scheme for distributed RSUs in VANET. International Conference on Selected Topics in Mobile and Wireless Networking (iCOST, in conjunction with WiMOB 2011.) Shanghai, China, 2011.
24.Na Ruan, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai. A Generic Evaluation Method for Key Management Schemes in Wireless Sensor Network. International Conference on Ubiquitous Information Management and Communication (ICUIMC, Student grant award), Seoul, Korean, 2011.

Domestic Conference

1.Na Ruan, Takashi Nishide, Yoshiaki Hori. A key management scheme against compromised RSU in VANET. The 64th Joint Conference of Electrical and Electronics Engineers in Kyushu, (JCEEE-Kyushu), Saga, Japan, 2011.
2.Na Ruan, Yizhi Ren, Yoshiaki Hori, Kouchi Sakurai. Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network. (階層分析法を使用した無線センサネットワークにおける鍵管理方式の分析). The 2011 Symposium on Cryptography and Information Security (SCIS), Kobe, Japan, 2011.
3.Na Ruan, Yizhi Ren, Yoshiaki Hori, Kouchi Sakurai. An Evaluation Method for Key Management Schemes in WSN. The 63rd Joint Conference of Electrical and Electronics Engineers in Kyushu (JCEEE-Kyushu), Fukuoka, Japan, 2010.