photo

Na Ruan

Associate Professor, Ph.D
Shanghai Jiao Tong University

About Me

Department of Computer Science and Engineering
Shanghai Jiao Tong University

Office: SEIEE 3-527
800 Dongchuan Road, Minhang District
Shanghai 200240, P.R. China

Email: naruan@cs.sjtu.edu.cn / naruan@sjtu.edu.cn / ruannana@gmail.com

I am looking for self-motivated students who are strongly committed to research,
If you are interested in Security and Privacy, Network and Big Data, feel free to send me your CV.

Interests

  • Security and Privacy
  • Network and Big Data

Courses


  1. EE357 (IEEE) Computer Network
  2. MA115 (SEIEE) Discrete Mathematics
  3. CS902 (SEIEE) Thinking and Approach of Programming
  4. CS101 (Zhiyuan College) Introduction to Computer Science
  5. P033501 (CS Master) Computer Network

Papers


    *Corresponding author
  1. Jikun Chen,Hongbin Chen,Ruoyu Deng,Na Ruan*,Yao Liu,Chao Liu,Chunhua Su,ALRS-An Adversarial Noise Based Data Sharing Mechanism for Privacy Protecting,The 26th Australasian Conference on Information Security and Privacy (ACISP2021). New
  2. Zekun Sun, Yujie Han, Zeyu Hua, Na Ruan*, Weijia Jia, Improving the Efficiency and Robustness of Deepfakes Detection through Precise Geometric Features, IEEE Conference on Computer Vision and Pattern Recognition (CVPR,CCF-A), virtual, 2021.New
  3. 刘汉卿, 阮娜*,区块链中攻击方式的研究. 计算机学报, 2021年第4期. (CCF-A) New
  4. 阮娜,刘汉卿,斯雪明,采用工作量证明共识机制的区块链中挖矿攻击者间的鲶鱼效应,计算机学报, 2021年第1期。 (CCF-A) New
  5. Na Ruan, Dongli Zhou, Weijia Jia, Ursa: Robust Performance for Nakamoto Consensus with Self-adaptive Throughput, ACM Transactions on Internet Technology (ACM TOIT), 2020. (CCF-B)
  6. Hanyi Sun, Na Ruan*, Chunhua Su . How to Model the Bribery Attack: A Practical Quantification Method in Blockchain. European Symposium on Research in Computer Security(ESORICS 2020, CCF-B,accept ration 19%, 72 in 366), 2020.
  7. Feifan Yu, Na Ruan*, Siyuan Cheng. Rational Manager in Bitcoin Mining Pool: Dynamic Strategies to Gain Extra Rewards. The 15th ACM Asia Conference on Computer and Communications Security (ACM AsiaCCS, CCF-C, accept ration 21%, 67 in 308), 2020.
  8. Na Ruan, Chunhua Su, Chi Xie, Weijia Jia, Securing Cooperative Adaptive Cruise Control in Vehicular Platoons via Cooperative Message Authentication, IEICE Transactions on Information and Systems (SCI), 2020.
  9. Ruoyu Deng, Na Ruan*, Guangsheng Zhang, Xiaohu Zhang. FraudJudger: Fraud Detection on Digital Payment Platforms with Fewer Labels. 21st International Conference on Information and Communications Security (ICICS, Beijing, China, 2019. Download
  10. Hanyi Sun, Na Ruan*, Hanqing Liu. Ethereum Analysis via Node Clustering. International Conference on Network and System Security (NSS), Sapporo, Japan, 2019. Download
  11. Dongli Zhou, Na Ruan* Weijia Jia . A Robust Throughput Scheme for Bitcoin Network without Block Reward. The 21th IEEE International Conference on High Performance Computing and Communications (HPCC, CCF-C), Zhangjiajie, China, 2019. Download
  12. Na Ruan, Ruoyu Deng, Chunhua Su. GADM: Manual Fake Review Detection for O2O Commercial Platforms. Computers & Security (COSE, CCF-B), 2019. Download
  13. Na Ruan, Zhikun Wei, Jienan Liu. Cooperative Fraud Detection Model With Privacy-Preserving in Real CDR Datasets. IEEE Access (SCI), 2019. Download
  14. Wenmian Yang, Weijia Jia, Kun Wang, Na Ruan, Wenyuan Gao. Time-sync Video Tag Extraction Using Semantic Association Graph. ACM Transactions on Knowledge Discovery from Data (TKDD, CCF-B), 2019. Download
  15. Haojin Zhu, Yan Meng, Xiaohui Liang, Yao Liu, Na Ruan. Revealing Your Mobile Password via WiFi Signals: Attacks and Countermeasures. IEEE Transactions on Mobile Computing (CCF-A, SCI), 2019. Download
  16. Ruoyu Deng, Na Ruan*, Ruidong Jin, Yu Lu, Weijia Jia, Chuhua Su, Dandan Xu. SpamTracer: Manual Fake Review Detection for O2O Commercial Platforms by Using Geolocation Features. International Conference on Information Security and Cryptology (Inscrypt, CACR-C), Fuzhou, China, 2018. Download
  17. Hanqing Liu, Na Ruan*, Rongtian Du, Weijia Jia. On the Strategy and Behavior of Bitcoin Mining with N-attackers. Asia Conference on Computer and Communications Security (ACM AsiaCCS, CCF-C, Accept ration 19%, 62 in 310), Seoul, Korean, 2018. Download
  18. Xu Chu, Na Ruan*, Ming Li, Weijia Jia. Pseudonym Inference in Cooperative Vehicular Traffic Scenarios. The IEEE Conference on Communications and Network Security (IEEE CNS), Beijing, China, 2018. Download
  19. Weijia Jia, Hongjian Peng, Na Ruan*, Zhiqing Tang, Wei Zhao. WiFind: Driver fatigue detection with fine-grained Wi-Fi signal features. IEEE Transactions on Big Data (SCI), 2018. Download
  20. Wenmian Yang, Na Ruan*, Wenyuan Gao, Kun Wang, Wensheng Ran, Weijia Jia. Crowdsourced Time-sync Video Tagging using Semantic Association Graph. IEEE International Conference on Multimedia and Expo (ICME, CCF-B), Hongkong, China, 2017. Download
  21. Mingli Wu,Na Ruan*, Shiheng Ma, Haojin Zhu, Weijia Jia, Qingshui Xue, Songyang Wu. Detect SIP Flooding Attacks in VoLTE by Utilizing and Compressing Counting Bloom Filter. International Conference on Wireless Algorithms, Systems, and Applications (WASA, Best Paper Runner-up Award), Guilin, China, 2017. Download
  22. Wenyan Yao, Na Ruan*, Feifan Yu, Weijia Jia, Haojin Zhu. Privacy-Preserving Fraud Detection via Cooperative Mobile Carriers with Improved Accuracy. Annual IEEE International Conference on Sensing, Communication, and Networking (IEEE SECON, CCF-B), San Diego, USA, 2017. Download
  23. Na Ruan, Mingli Wu, Shiheng Ma, Haojin Zhu, Weijia Jia. Detect and Prevent SIP Flooding Attacks in VoLTE by Utilizing a Two-Tier PFilter Design. IEICE Transactions on Information and Systems (SCI/EI), 2017. Download
  24. Jiafa Liu, Junyi Li, Huaxin Li, Haojin Zhu, Na Ruan, Di Ma. Who Moved My Cheese: Towards Automatic and Fine-grained Classification and Modeling Ad Network. IEEE Global Communications Conference (IEEE GLOBECOM, CCF-C), Washington, DC USA, 2016. Download
  25. Na Ruan, Qi Hu, Lei Gao, Haojin Zhu, Qingshui Xue, Weijia Jia. A Traffic Based Lightweight Attack Detection Scheme for VoLTE. IEEE Global Communications Conference (IEEE GLOBECOM, CCF-C), Washington, DC USA, 2016. Download
  26. Yaoan Jin, Chunhua Su, Na Ruan*, Weijia Jia. Privacy-Preserving Mining of Association Rules for Horizontally Distributed Databases Based on FP-tree. International Conference on Information Security Practice and Experience (ISPEC, CACR-C), Zhangjiajie, China, 2016. Download
  27. Mengyuan Li, Yan Meng, Junyi Liu, Haojin Zhu, Xiaohui Liang, Yao Liu, Na Ruan. When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals. ACM SIGSAC Conference on Computer and Communications Security (ACM CCS, Accepting rate 16.5%, CCF-A), Vienna, Austria, 2016. Download
  28. Na Ruan, Lei Gao, Haojin Zhu, Weijia Jia, Xiang Li, Qi Hu. Toward Optimal DoS-Resistant Authentication in Crowdsensing Networks via Evolutionary Game. International Conference on Distributed Computing Systems (ICDCS, Accepting rate 17.6%, CCF-B), Kyoto, Japan, 2016. Download
  29. Lei Gao, Na Ruan*, Haojin Zhu. Efficient and Secure Message Authentication in Cooperative Driving: A Game-Theoretic Approach. IEEE International Conference on Communications (IEEE ICC, CCF-C), Kuala Lumpur, Malaysia, 2016. Download
  30. Jianwei Qian, Fudong Qiu, Fan Wu, Na Ruan, Guihai Chen, Shaojie Tang. Privacy-Preserving Selective Aggregation of Online User Behavior Data. IEEE Transactions on Computers (SCI, CCF-A), 2016. Download
  31. Na Ruan, Mengyuan Li, Jie Li. A Novel Broadcast Authentication Protocol for Internet of Vehicles.Peer-to-Peer Networking and Applications (CCF-C), 2016. Download
  32. Mengyuan Li, Na Ruan*, QiYang Qian, Haojin Zhu, Le Yu. SPFM: Scalable and Privacy-preserving Friend Matching in Mobile Cloud. IEEE Internet of Things Journal (SCI, JCR-1), 2016. Download
  33. Jianwei Qian, Fudong Qiu, Fan Wu, Na Ruan, Guihai Chen, Shaojie Tang. A Differentially Private Selective Aggregation Scheme for Online User Behavior Analysis. IEEE Global Communications Conference (IEEE Globecom, CCF-C), San Diego, CA, USA, 2015. Download
  34. Ben Bett, Xiaokuan Zhang, Mengyuan Li, Qiyang Qian, Na Ruan, Haojin Zhu. SmartSec: Secret Sharing-based Location-aware Privacy Enhancement in Smart Devices. IEEE/CIC International Conference on Communications in China (IEEE ICCC), Shenzhen, China, 2015. Download
  35. Shuying Lai, Huaxin Li, Haojin Zhu, Na Ruan. De-anonymizing Social Networks: Using User Interest as a side-channel. IEEE/CIC International Conference on Communications in China (IEEE ICCC), Shenzhen, China, 2015. Download
  36. Mengyuan Li, Na Ruan*, Haojin Zhu, Jie Li, Xiang Li. A Paralleling Broadcast Authentication Protocol for sparse RSUs in Internet of Vehicles. International Conference on Mobile Ad-hoc and Sensor Networks (MSN), Maui, HI, USA, 2014. Download
  37. Xiang Li, Na Ruan*, Fan Wu, Jie Li, Mengyuan Li. Efficient and Enhanced Broadcast Authentication Protocols based on Multilevel uTESLA. IEEE International Performance Computing and Communications Conference (IPCCC, CCF-C), Austin, Texas, USA, 2014. Download
  38. Na Ruan, Yoshiaki Hori. DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of Things. International Conference on Selected Topics in Mobile and Wireless Networking (iCOST), Avignon, France, 2012. Download
  39. Na Ruan, Takashi Nishide, Yoshiaki Hori. Elliptic Curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs. Information Processing Society of Japan (IPSJ), 2012. Download
  40. Na Ruan, Yizhi Ren, Yoshiaki Hori, Kouchi Sakurai. Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network. Journal of Networks, 2012. Download
  41. Na Ruan, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai. Performance Analysis of Key Management Schemes in Wireless Sensor Network Using Analytic Hierarchy Process. IEEE International Conference on Trust, Security and Privacy in Computing and Communications, (IEEE TrustCom), Changsha, China, 2011. Download
  42. Na Ruan, Takashi Nishide, Yoshiaki Hori. Threshold ElGamal-based Key Management scheme for distributed RSUs in VANET. International Conference on Selected Topics in Mobile and Wireless Networking (iCOST, in conjunction with WiMOB 2011.) Shanghai, China, 2011. Download
  43. Na Ruan, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai. A Generic Evaluation Method for Key Management Schemes in Wireless Sensor Network. International Conference on Ubiquitous Information Management and Communication (ICUIMC, Student grant award), Seoul, Korean, 2011. Download

Books


  1. Minyi Guo, Yuting Chen, Chao Li, Na Ruan, Chentao Wu . Cloud Computing Principle and Practice《云计算原理与实践》. China Machine Press, 400,000 words, Publish time 2017-03, 2017.
  2. Na Ruan, Yu Long, Weidong Liu, Lei Zhang . Translate Computer Science Theory for the Information Age (《信息时代的计算机科学理论》). Shanghai Jiao Tong University Press, 500,000 words, ISBN 9787313111098, Publish time 2014-06, 2014.

Domestic Conference


  1. Na Ruan, Takashi Nishide, Yoshiaki Hori. A key management scheme against compromised RSU in VANET. The 64th Joint Conference of Electrical and Electronics Engineers in Kyushu, (JCEEE-Kyushu), Saga, Japan, 2011.
  2. Na Ruan, Yizhi Ren, Yoshiaki Hori, Kouchi Sakurai. Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network. (階層分析法を使用した無線センサネットワークにおける鍵管理方式の分析). The 2011 Symposium on Cryptography and Information Security (SCIS), Kobe, Japan, 2011.
  3. Na Ruan, Yizhi Ren, Yoshiaki Hori, Kouchi Sakurai. An Evaluation Method for Key Management Schemes in WSN. The 63rd Joint Conference of Electrical and Electronics Engineers in Kyushu (JCEEE-Kyushu), Fukuoka, Japan, 2010.

Research


  1. Cooperation Security and Privacy Protection in the Internet of Vehicles based on the Adaptive Cruise System
    Sponsor: National Natural Science Foundation Committee Youth Project
    Duration: 2018-01 - 2020-12
    Principal Investigator: Na Ruan
  2. Big Data Application Model of Mobile Service Provide
    Sponsor: Institute of China Unicom
    Duration: 2017-01 - 2019-12
    Principal Investigator: Na Ruan
  3. Data Security in Crowd Sensing System under the Background of Big Data Ministry of Public Security of P.R.C
    Duration: 2016-08 - 2018-08
    Principal Investigator: Na Ruan
  4. Research on the Construction of Software Defined Network Component Security Defense Machanism under the Background of Big Data National Natural Science Foundation Committee Project
    Duration: 2016-01 - 2019-12
    Principal Investigator: Na Ruan
  5. The Large-scale Human-Machine-Entity Object Cooperative Sensing and Association
    Sponsor: National Natural Science Foundation Committee Key Project
    Duration: 2016-01 - 2020-12
    Co-Principal Investigator: Na Ruan
  6. Research on Bothway Authentication Technique in Broadcasting and TV Network
    Sponsor: The State Administration of Press,Publication,Radio,Film and Television of the P.R.C
    Duration: 2015-02 - 2016-02
    Co-Principal Investigator: Na Ruan
  7. Encryption Strategy based on the Importance Evaluation of Mobile Communication Contents
    Sponsor: China Computer Federation
    Duration:2014-10 - 2015-10
    Principal Investigator: Na Ruan (2014 Anniversary CCF-Tencent Science Research Fund Awarder,17⁄152)
  8. Research on the Improvement of TESLA Broadcasting Authentication Protocol Considering the Demand of Isomeric Vehicle Sensor Network
    Sponsor: Shanghai Jiao Tong University Youth Teacher Start Fund
    Duration: 2013-06 - 2016-12
    Principal Investigator: Na Ruan

Membership


  1. Member of Association for Computing Machinery (ACM)
  2. Member of Institute of Electrical and Electronics Engineers (IEEE)
  3. Member of Chinese Association of Cryptologic Research (CACR)
  4. Member of Information Processing Society of Japan (IPSJ)
  5. Committee Member of China Computer Federation-Technical Committee on Block Chain (CCF TCBC)
  6. Committee Member of China Computer Federation-Network and Data Communications (CCF TCCOMM)

Technical Program Committee (TPC)


  1. IEEE GLOBECOM
  2. IEEE ICC
  3. IEEE ICCC
  4. IEEE ISPEC
  5. IEEE WASA
  6. ACM NSS

Peer Referee


  1. IEEE Trans. on Dependable & Secure Computing
  2. KSII Trans. on Internet & Info. Systems
  3. Chinese Journal of Computers
  4. SCIENCE CHINA Info. Sciences
  5. PPNA
  6. ESORICS

Members


Doctor


photo

Chaohao Fu

2nd year (Co-supervised)
Adversarial Examples
Forgery Detection

Paper:
photo

Zekun Sun

1st year
Data Security

Paper:



Master


photo

Hanqing Liu

3th year
Blockchain

Paper:
  1. Ethereum Analysis via Node Clustering
  2. On the Strategy and Behavior of Bitcoin Mining with N-attackers
photo

Hanyi Sun

2nd year
Blockchain

Paper:
  1. Ethereum Analysis via Node Clustering
photo

Dongli Zhou

3th year
Blockchain

Paper:
  1. A Robust Throughput Scheme for Bitcoin Network without Block Reward
photo

Ruoyu Deng

3th year
Data Security and Privacy

Paper:
  1. SpamTracer: Manual Fake Review Detection for O2O Commercial Platforms by Using Geolocation Features
photo

Feifan Yu

3th year
Blockchain
Information Security
Network Security

Paper:
  1. Privacy-Preserving Fraud Detection via Cooperative Mobile Carriers with Improved Accuracy
photo

Hongbin Chen

1st year
Security and Privacy in Artificial intelligence

Paper:
photo

Jikun Chen

1st year
Adversarial Learning

Paper:



Undergraduate


photo

Zeyu Hua

3th year
Facial Forensics

Paper:
photo

Bingjie Tu

3th year
Data Security and Privacy

Paper:



Graduated


photo

Xu Chu

Master, graduated in 2019
Vehicle Platooning

Paper:
  1. Pseudonym Inference in Cooperative Vehicular Traffic Scenarios
photo

Mingli Wu

Master, graduated in 2018
Network Security
Smartphone Privacy

Paper:
  1. Detect and Prevent SIP Flooding Attacks in VoLTE by Utilizing a Two-Tier PFilter Design
  2. Detect SIP Flooding Attacks in VoLTE by Utilizing and Compressing Counting Bloom Filter
photo

Jingyu Cui

Master @ Georgia Institute of Technology
Vehicle Platooning
Machine Learning

Paper:
photo

Yuxin Ding

Bachelor, graduated in 2019
Internet of Vehicles

Paper:
photo

Ruidong Jin

Bachelor, graduate in 2018 and Master in Tokyo Institute of Technology
Artificial Intelligence
Spamming Detection

Paper:
  1. Ruoyu Deng, Na Ruan*, Ruidong Jin, Yu Lu, Weijia Jia, Chunhua Su and Dandan Xu. “SpamTracer: Manual Fake Review Detection for O2O Commercial Platforms by Using Geolocation Features,” Inscrypt 2018, Dec 14-17, 2018, Fuzhou, China.
photo

Yao'an Jin

Master @ Osaka University
Cyber Security
Cryptography
Security Application

Paper:
  1. Jin Y, Su C, Na R, Jia W, et al. Privacy-Preserving Mining of Association Rules for Horizontally Distributed Databases Based on FP-Tree[M]// Information Security Practice and Experience. Springer International Publishing, 2016.
photo

Xingyang Liu

Bachelor, graduated in 2018
Privacy Preservation
Data Mining

Paper:
photo

Weiyi Li

Bachelor, graduated in 2019
Internet of Vehicles

Paper:
photo

Yu Lu

Bachelor, graduated in 2019
Spamming Detection

Paper:
  1. Ruoyu Deng, Na Ruan*, Ruidong Jin, Yu Lu, Weijia Jia, Chunhua Su and Dandan Xu. “SpamTracer: Manual Fake Review Detection for O2O Commercial Platforms by Using Geolocation Features,” Inscrypt 2018, Dec 14-17, 2018, Fuzhou, China.
photo

Chengliang Si

Bachelor, graduated in 2019
Data Mining
Computer Security

Paper:
photo

Zhikun Wei

Bachelor, graduated in 2018
Privacy and Data Security in Artificial Intelligence

Paper:
photo

Weijie Yuan

Bachelor, graduated in 2019
Big Data and Privacy in the Internet of Vehicles

Paper:
photo

Changzhao Zhu

Bachelor, graduated in 2019
The Bribing Attacker in Blockchain

Paper: