Na Ruan

972 total citations
45 papers, 614 citations indexed

About

Na Ruan is a scholar working on Computer Networks and Communications, Artificial Intelligence and Information Systems. According to data from OpenAlex, Na Ruan has authored 45 papers receiving a total of 614 indexed citations (citations by other indexed papers that have themselves been cited), including 19 papers in Computer Networks and Communications, 18 papers in Artificial Intelligence and 17 papers in Information Systems. Recurrent topics in Na Ruan's work include Privacy-Preserving Technologies in Data (11 papers), Internet Traffic Analysis and Secure E-voting (9 papers) and Security in Wireless Sensor Networks (9 papers). Na Ruan is often cited by papers focused on Privacy-Preserving Technologies in Data (11 papers), Internet Traffic Analysis and Secure E-voting (9 papers) and Security in Wireless Sensor Networks (9 papers). Na Ruan collaborates with scholars based in China, Japan and United States. Na Ruan's co-authors include Weijia Jia, Haojin Zhu, Xiaohui Liang, Zekun Sun, Yan Meng, Yao Liu, Yujie Han, Mengyuan Li, Junyi Liu and Yoshiaki Hori and has published in prestigious journals such as IEEE Access, IEEE Transactions on Computers and IEEE Internet of Things Journal.

In The Last Decade

Na Ruan

41 papers receiving 602 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Na Ruan China 14 213 201 165 161 158 45 614
Kebin Liu China 14 215 1.0× 244 1.2× 186 1.1× 87 0.5× 220 1.4× 27 694
Hon Cheung Australia 14 161 0.8× 377 1.9× 92 0.6× 127 0.8× 178 1.1× 31 627
Yan Meng China 10 374 1.8× 275 1.4× 82 0.5× 220 1.4× 190 1.2× 48 774
Miao Hu China 14 168 0.8× 281 1.4× 257 1.6× 108 0.7× 152 1.0× 66 679
Tawfik Al-Hadhrami United Kingdom 16 214 1.0× 202 1.0× 128 0.8× 184 1.1× 235 1.5× 54 837
Athanasios Kakarountas Greece 14 337 1.6× 171 0.9× 209 1.3× 217 1.3× 120 0.8× 112 781
Bo-Jhang Ho United States 9 469 2.2× 101 0.5× 161 1.0× 82 0.5× 130 0.8× 15 777
Eve M. Schooler United States 15 212 1.0× 506 2.5× 84 0.5× 154 1.0× 128 0.8× 41 747
Marco Morana Italy 15 251 1.2× 257 1.3× 356 2.2× 215 1.3× 100 0.6× 48 778
Hannan Xiao United Kingdom 14 135 0.6× 531 2.6× 62 0.4× 209 1.3× 140 0.9× 61 814

Countries citing papers authored by Na Ruan

Since Specialization
Citations

This map shows the geographic impact of Na Ruan's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Na Ruan with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Na Ruan more than expected).

Fields of papers citing papers by Na Ruan

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Na Ruan. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Na Ruan. The network helps show where Na Ruan may publish in the future.

Co-authorship network of co-authors of Na Ruan

This figure shows the co-authorship network connecting the top 25 collaborators of Na Ruan. A scholar is included among the top collaborators of Na Ruan based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Na Ruan. Na Ruan is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Chen, Hongbin, et al.. (2025). Privacy for Free: Spy Attack in Vertical Federated Learning by Both Active and Passive Parties. IEEE Transactions on Information Forensics and Security. 20. 2550–2563. 1 indexed citations
2.
Sun, Zekun, Na Ruan, & Jianhua Li. (2025). DDL: Effective and Comprehensible Interpretation Framework for Diverse Deepfake Detectors. IEEE Transactions on Information Forensics and Security. 20. 3601–3615. 2 indexed citations
3.
Gu, Hanlin, Ruoxin Chen, Jie Li, et al.. (2025). Temporal Gradient Inversion Attacks With Robust Optimization. IEEE Transactions on Dependable and Secure Computing. 22(4). 3383–3397. 2 indexed citations
4.
Ruan, Na, et al.. (2022). A General Quantitative Analysis Framework for Attacks in Blockchain. IEEE/ACM Transactions on Networking. 31(2). 664–679. 3 indexed citations
5.
Sun, Zekun, et al.. (2021). Improving the Efficiency and Robustness of Deepfakes Detection through Precise Geometric Features. 3608–3617. 120 indexed citations
6.
Ruan, Na, et al.. (2020). Ursa. ACM Transactions on Internet Technology. 20(4). 1–26. 3 indexed citations
7.
Ruan, Na, et al.. (2019). Cooperative Fraud Detection Model With Privacy-Preserving in Real CDR Datasets. IEEE Access. 7. 115261–115272. 4 indexed citations
8.
Ruan, Na, et al.. (2019). A Robust Throughput Scheme for Bitcoin Network without Block Reward. 2018. 706–713. 4 indexed citations
9.
Jia, Weijia, et al.. (2018). WiFind: Driver Fatigue Detection with Fine-Grained Wi-Fi Signal Features. IEEE Transactions on Big Data. 6(2). 269–282. 44 indexed citations
10.
Ruan, Na, et al.. (2018). On the Strategy and Behavior of Bitcoin Mining with N-attackers. 357–368. 23 indexed citations
11.
Yao, Wenyan, Na Ruan, Feifan Yu, Weijia Jia, & Haojin Zhu. (2017). Privacy-Preserving Fraud Detection via Cooperative Mobile Carriers with Improved Accuracy. 3. 1–9. 2 indexed citations
12.
Ruan, Na, Mengyuan Li, & Jie Li. (2016). A novel broadcast authentication protocol for internet of vehicles. Peer-to-Peer Networking and Applications. 10(6). 1331–1343. 17 indexed citations
13.
Gao, Lei, Na Ruan, & Haojin Zhu. (2016). Efficient and secure message authentication in cooperative driving: A game-theoretic approach. 8 indexed citations
14.
Wu, Mingli, et al.. (2016). Automatic Detection of SIP-Aware Attacks on VoLTE Device. 8. 1–5. 5 indexed citations
15.
Li, Mengyuan, Yan Meng, Junyi Liu, et al.. (2016). When CSI Meets Public WiFi. 1068–1079. 142 indexed citations
16.
Ruan, Na, Qi Hu, Lei Gao, et al.. (2016). A Traffic Based Lightweight Attack Detection Scheme for VoLTE. 1–6. 5 indexed citations
17.
Lai, Shuying, Huaxin Li, Haojin Zhu, & Na Ruan. (2015). De-anonymizing social networks: Using user interest as a side-channel. 1–5. 6 indexed citations
18.
Li, Xiang, Na Ruan, Fan Wu, Jie Li, & Mengyuan Li. (2014). Efficient and enhanced broadcast authentication protocols based on multilevel μTESLA. 14 indexed citations
19.
Ruan, Na, Takashi Nishide, & Yoshiaki Hori. (2012). Elliptic curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs. Journal of Information Processing. 20(4). 846–853. 4 indexed citations
20.
Ruan, Na, Yizhi Ren, Yoshiaki Hori, & Kouichi Sakurai. (2011). Performance Analysis of Key Management Schemes in Wireless Sensor Network Using Analytic Hierarchy Process. 1739–1744. 3 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026