When CSI meets public WiFi: Inferring your mobile phone password via WiFi signals M Li, Y Meng, J Liu, H Zhu, X Liang, Y Liu, N Ruan Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 223 | 2016 |
Improving the efficiency and robustness of deepfakes detection through precise geometric features Z Sun, Y Han, Z Hua, N Ruan, W Jia Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021 | 141 | 2021 |
WiFind: Driver fatigue detection with fine-grained Wi-Fi signal features W Jia, H Peng, N Ruan, Z Tang, W Zhao IEEE Transactions on Big Data 6 (2), 269-282, 2018 | 71 | 2018 |
DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of Things N Ruan, Y Hori 2012 International Conference on Selected Topics in Mobile and Wireless …, 2012 | 52 | 2012 |
On the strategy and behavior of bitcoin mining with n-attackers H Liu, N Ruan, R Du, W Jia Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 45 | 2018 |
Revealing your mobile password via WiFi signals: Attacks and countermeasures Y Meng, J Li, H Zhu, X Liang, Y Liu, N Ruan IEEE Transactions on Mobile Computing 19 (2), 432-449, 2019 | 38 | 2019 |
Privacy-preserving selective aggregation of online user behavior data J Qian, F Qiu, F Wu, N Ruan, G Chen, S Tang IEEE transactions on computers 66 (2), 326-338, 2016 | 38 | 2016 |
Ethereum analysis via node clustering H Sun, N Ruan, H Liu Network and System Security: 13th International Conference, NSS 2019 …, 2019 | 34 | 2019 |
SPFM: Scalable and privacy-preserving friend matching in mobile cloud M Li, N Ruan, QY Qian, H Zhu, X Liang, L Yu IEEE Internet of Things Journal 4 (2), 583-591, 2016 | 30 | 2016 |
GADM: Manual fake review detection for O2O commercial platforms N Ruan, R Deng, C Su Computers & Security 88, 101657, 2020 | 28 | 2020 |
Crowdsourced time-sync video tagging using semantic association graph W Yang, N Ruan, W Gao, K Wang, W Ran, W Jia 2017 IEEE International Conference on Multimedia and Expo (ICME), 547-552, 2017 | 28 | 2017 |
Toward optimal dos-resistant authentication in crowdsensing networks via evolutionary game N Ruan, L Gao, H Zhu, W Jia, X Li, Q Hu 2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016 | 28 | 2016 |
How to model the bribery attack: A practical quantification method in blockchain H Sun, N Ruan, C Su Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020 | 26 | 2020 |
Efficient and enhanced broadcast authentication protocols based on multilevel μTESLA X Li, N Ruan, F Wu, J Li, M Li 2014 IEEE 33rd International Performance Computing and Communications …, 2014 | 21 | 2014 |
Label smoothing and adversarial robustness C Fu, H Chen, N Ruan, W Jia arXiv preprint arXiv:2009.08233, 2020 | 15 | 2020 |
MSOM: efficient mechanism for defense against DDoS attacks in VANET M Al-Mehdhara, N Ruan Wireless Communications and Mobile Computing 2021 (1), 8891758, 2021 | 13 | 2021 |
A robust throughput scheme for bitcoin network without block reward D Zhou, N Ruan, W Jia 2019 IEEE 21st International Conference on High Performance Computing and …, 2019 | 13 | 2019 |
A novel broadcast authentication protocol for internet of vehicles N Ruan, M Li, J Li Peer-to-Peer Networking and Applications 10, 1331-1343, 2017 | 13 | 2017 |
Time-sync video tag extraction using semantic association graph W Yang, K Wang, N Ruan, W Gao, W Jia, W Zhao, N Liu, Y Zhang ACM Transactions on Knowledge Discovery from Data (TKDD) 13 (4), 1-24, 2019 | 10 | 2019 |
Elliptic curve ElGamal threshold-based key management scheme against compromise of distributed RSUs for VANETs N Ruan, T Nishide, Y Hori Information and Media Technologies 7 (4), 1588-1595, 2012 | 10 | 2012 |