![]() |
个人信息Personal Information
教授
博士生导师
硕士生导师
主要任职:Dean of School of Software
性别:男
毕业院校:哈尔滨工程大学
学位:博士
所在单位:软件学院、国际信息与软件学院
学科:软件工程. 计算机应用技术
联系方式:wgwdut@dlut.edu.cn
电子邮箱:wgwdut@dlut.edu.cn
扫描关注
- [61]Yu, Chang Wu, Xin, Qin, Chilamkurti, Naveen, Jiang, Shengming, Makki, S. Kami, Wu, Guowei, CW (reprint author), Chung Hua Univ, Dept Comp Sci & Informat Engn, 707, Sect 2, Wufu Rd, Hsinchu 300, Taiwan..Algorithm and Theory for Robust Wireless Sensor Networks 2014[J],INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS,2015,11(8)
- [62]Wu, Guowei, Yao, Lin, Wang, Jie.Performance Evaluation in WSNs Based on Max-Plus and Time-Domain Stochastic Network Calculus[A],2015,1:475-482
- [63]Lin, Chi, Wu, Guowei, Yu, Chang Wu, Yao, Lin, C (reprint author), Dalian Univ Technol, Sch Software, Dalian, Peoples R China..Maximizing destructiveness of node capture attack in wireless sensor networks[J],JOURNAL OF SUPERCOMPUTING,2015,71(8):3181-3212
- [64]Yao, Lin, Deng, Jing, Wang, Jie, Wu, Guowei, J (reprint author), Univ N Carolina, Dept Comp Sci, Greensboro, NC 27412 USA..A-CACHE: An anchor-based public key caching scheme in large wireless networks[J],COMPUTER NETWORKS,2015,87:78-88
- [65]Wu, Guowei, Lin, Chi, Li, Ying, Yao, Lin, Chen, Ailun.A Multi-node Renewable Algorithm Based on Charging Range in Large-scale Wireless Sensor Network[A],2015,94-100
- [66]Lin, Chi, Wu, Guowei, Yim, Kangbin, Yao, Lin, Hou, Gang.Compromising Ad-hoc Networks by Attacking Weakly Connected Dominating Set[A],2015,213-220
- [67]Lin, Chi, Wu, Guowei, Pirozmand, Poria, C (reprint author), Dalian Univ Technol, Sch Software, Rd 8, Dalian 116620, Peoples R China..GTRF: A Game Theory Approach for Regulating Node Behavior in Real-Time Wireless Sensor Networks[J],SENSORS,2015,15(6):12932-12958
- [68]Wu, Guowei, Liu, Zuosong, Yao, Lin, Deng, Jing, Wang, Jie, L (reprint author), Dalian Univ Technol, Sch Software, Dalian 116023, Peoples R China..A Trust Routing for Multimedia Social Networks[J],COMPUTER JOURNAL,2015,58(4):688-699
- [69]吴国伟, 姚琳.Performance Evaluation in WSNs Based on Max-Plus and Time-Domain Stochastic Network Caculus[A],2015,475-482
- [70]林驰, 孙伟峰, 吴国伟.Protecting privacy for big data in body sensor networks: A differential privacy approach[A],2015
- [71]Wu, Guowei, Du, Zhuang, Jung, Taeyoung, Fiore, Ugo, Yim, Kangbin, Hu, Yibo, K (reprint author), Soonchunhyang Univ, Dept Informat Secur Engn, Asan, South Korea..A dynamic trust model exploiting the time slice in WSNs[J],SOFT COMPUTING,2014,18(9):1829-1840
- [72]Wu, Guowei, Chen, Xiaojie, Yao, Lin, Lee, Youngjun, Yim, Kangbin, GW (reprint author), Dalian Univ Technol, Sch Software, Dalian 116620, Peoples R China..An Efficient Wormhole Attack Detection Method in Wireless Sensor Networks[J],COMPUTER SCIENCE AND INFORMATION SYSTEMS,2014,11(3,SI):1127-1141
- [73]Pirozmand, Poria, Jedari, Behrouz, Wu, Guowei, Xia, Feng, F (reprint author), Dalian Univ Technol, Sch Software, Dalian 116620, Peoples R China..Human mobility in opportunistic networks: Characteristics, models and prediction methods[J],JOURNAL OF NETWORK AND COMPUTER APPLICATIONS,2014,42(,SI):45-58
- [74]Yao, Lin, Wu, Guowei, Ren, Jiankang, Zhu, Yanwei, Li, Ying, GW (reprint author), Dalian Univ Technol, Sch Software Technol, Dalian 116620, Peoples R China..Guaranteeing Fault-Tolerant Requirement Load Balancing Scheme Based on VM Migration[J],COMPUTER JOURNAL,2014,57(2):225-232
- [75]Wu, Guowei, Lin, Chi, Zhao, Jianfei, Zhang, Yuan, Wang, Jia, Yao, Lin, L (reprint author), Dalian Univ Technol, Sch Software, Dalian 116600, Peoples R China..SOS: a secure social-aware credit-based stimulating mechanism for BikeNet[J],INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING,2014,16(2,SI):113-124
- [76]Lin, Chi, Xia, Feng, Yao, Lin, Wu, Guowei, C (reprint author), Dalian Univ Technol, Sch Software Technol, Dalian, Peoples R China..Enhancing Efficiency of Node Compromise Attacks in Vehicular Ad-hoc Networks Using Connected Do...[J],MOBILE NETWORKS & APPLICATIONS,2013,18(6):908-922
- [77]Lin, Chi, Wu, Guowei, GW (reprint author), Dalian Univ Technol, Sch Software Technol, Dalian, Peoples R China..Enhancing the attacking efficiency of the node capture attack in WSN: a matrix approach[J],JOURNAL OF SUPERCOMPUTING,2013,66(2):989-1007
- [78]Ren, Jiankang, Wu, Guowei, Yao, Lin, GW (reprint author), Dalian Univ Technol, Sch Software, Dalian 116620, Peoples R China..A sensitive data aggregation scheme for body sensor networks based on data hiding[J],PERSONAL AND UBIQUITOUS COMPUTING,2013,17(7,SI):1317-1329
- [79]Wu, Guowei, Wang, Jia, Yao, Lin, Lin, Chi.A Secure Social-aware Incentive Scheme for Delay Tolerant Networks[A],2013,813-820
- [80]Wu, Guowei, Ren, Jiankang, Lin, Chi, Li, Ying.Partitioned Fixed-priority Real-time Scheduling Based on Dependent Task-Split on Multicore Plat...[A],2013,1257-1264