![]() |
个人信息Personal Information
教授
博士生导师
硕士生导师
主要任职:Dean of School of Software
性别:男
毕业院校:哈尔滨工程大学
学位:博士
所在单位:软件学院、国际信息与软件学院
学科:软件工程. 计算机应用技术
联系方式:wgwdut@dlut.edu.cn
电子邮箱:wgwdut@dlut.edu.cn
扫描关注
- [81]Yao, Lin, Wu, Guowei, Yim, Kangbin, Miao, Jingwei, Deng, Fangyu, Jing, Lin, Chi.Biometrics-based Data Link Layer Anonymous Authentication in VANETs[A],2013,182-187
- [82]Yao, Lin, Kang, Shang, Pengfei, Wu, Guowei, GW (reprint author), Dalian Univ Technol, Sch Software, Dalian 116620, Peoples R China..Protecting the sink location privacy in wireless sensor networks[J],PERSONAL AND UBIQUITOUS COMPUTING,2013,17(5,SI):883-893
- [83]Wu, Guowei, Chen, Xiaojie, Obaidat, Mohammad S., Lin, Chi, MS (reprint author), Monmouth Univ, W Long Branch, Dept Comp Sci, Long Branch, NJ 07764 USA..A high efficient node capture attack algorithm in wireless sensor network based on route minimu...[J],SECURITY AND COMMUNICATION NETWORKS,2013,6(2):230-238
- [84]吴国伟.Partitioned Fixed-Priority Real-time Scheduling Based on Dependent Task-Split on Multicore Platfo...[A],2013
- [85]姚琳, 吴国伟.Guaranteeing Fault-Tolerant Requirement Load Balancing Scheme Based on VM Migration[J],The Computer Journal,2013,1(1):1-8
- [86]姚琳, 吴国伟.Protecting source-location privacy based on multirings in wireless[J],CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE,2013,7(21):1-14
- [87]吴国伟, 姚琳, 许真珍, 王巍.A Fuzzy-based Trust Management in WSNs[J],Journal of Internet Services and Information Security,2013,3(3/4):124-135
- [88]Lin, Chi, Pei, Zhongyi, Wu, Guowei, Xia, Feng, Li, Mingchu, Yao, Lin, GW (reprint author), Dalian Univ Technol, Sch Software, Dalian, Peoples R China..Energy efficient ant colony algorithms for data aggregation in wireless sensor networks[J],JOURNAL OF COMPUTER AND SYSTEM SCIENCES,2012,78(6,SI):1686-1702
- [89]Yao, Lin, Lin, Chi, Liu, Guangya, Deng, Fangyu, Wu, Guowei.Location Anonymity Based on Fake Queries in Continuous Location-based Services[A],2012,375-382
- [90]Ding, Baozeng, Wu, Yanjun, He, Yeping, Tian, Shuo, Guan, Bei, Guowei.Return-Oriented Programming Attack on the Xen Hypervisor[A],2012,479-484
- [91]Lin C., Wu G., Yao L., Liu Z..A combined clustering scheme for protecting location privacy and query privacy in pervasive envir...[A],2012,943-948
- [92]Qiu T., Wang W., Xia F., Wu G., Zhou Y., Xia, F., School of Software, Dalian University of Technology, Dalian, China, email: f.xia@ieee.org.A failure self-recovery strategy with balanced energy consumption for wireless ad hoc networks[J],Journal of Computers,2012,7(1):116-123
- [93]Wu G., Xu Z., Ren J., Xia Q., Xu, Z., School of Software, Dalian University of Technology, Dalian, China, email: eggerxu@gmail.com.An energy-aware multi-core scheduler based on generalized tit-for-tat cooperative Game[J],Journal of Computers,2012,7(1):106-115
- [94]吴国伟.A high efficient node capture attack algorithm in wireless sensor network based on route minimum ...[J],Security and Communication Networks,2012,6(2):230-238
- [95]吴国伟.A sensitive data aggregation scheme for body sensor networks based on data hiding[J],Personal and Ubiquitous Computing,2012,16(5):1-13
- [96]姚琳, 吴国伟.Protecting the Sink Location Privacy in Wireless Sensor Networks[J],Personal and Ubiquitous Computing,2012,4:1-11
- [97]Yao, Lin, Wu, Guowei, Wang, Jia, Xia, Feng, Lin, Chi, Guojun, F (reprint author), Dalian Univ Technol, Sch Software, Dalian 116620, Peoples R China..A Clustering K-Anonymity Scheme for Location Privacy Preservation[J],IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS,2012,E95D(1):134-142
- [98]Wu, G., Xu, Z., Yao, L., Ren, J., G (reprint author), Dalian Univ Technol, Sch Software, Dalian 116620, Peoples R China..ITFBS: adaptive intrusion-tolerant scheme for body sensor networks in smart space applications[J],IET COMMUNICATIONS,2011,5(17):2509-2517
- [99]Lin C., Wu G., Li M., Chen X., Liu Z., Yao L..A selfish node preventive real time fault tolerant routing protocol for WSNs[A],2011,330-337
- [100]姚琳, 孙伟峰, 吴国伟, 王佳, 尚鹏飞.计算机网络教学模式探讨[J],计算机教育,2011,19:70-73