![]() |
个人信息Personal Information
教授
博士生导师
硕士生导师
性别:女
毕业院校:大连理工大学
学位:博士
所在单位:软件学院、国际信息与软件学院
学科:计算机应用技术
联系方式:yaolin@dlut.edu.cn
电子邮箱:yaolin@dlut.edu.cn
扫描关注
- [41]姚琳, Man, Yanmao, Huang, Zhong, Deng, Jing, Wang, Xin.Secure Routing Based on Social Similarity in Opportunistic Networks[J],IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS,2016,15(1):594-605
- [42]Yao, Lin, Wang, Luning, Pan, Lv, Kai.Link Prediction Based on Common-Neighbors for Dynamic Social Network[A],2016,83:82-89
- [43]Wu, Guowei, Wang, Jie, Yongchuan, Yao, Lin.Pollution Attack Resistance Dissemination in VANETs Based on Network Coding[A],2016,83:131-138
- [44]Yao, Lin, Yim, Kangbin, Lin, Chi, Wu, Guowei, Jung, Taeyoung, K (reprint author), Soonchunhyang Univ, Dept Informat Secur Engn, Asan 336745, South Korea..An anonymous authentication scheme in data-link layer for VANETs[J],INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING,2016,22(1):1-13
- [45]吴国伟, 姚琳.Pollution Attack Resistance Dissemination in VANETs Based on[A],2016
- [46]Yao, Lin, Deng, Fangyu, Jing, Wu, Guowei, Kang, GW (reprint author), Dalian Univ Technol, Sch Software, Dalian 116620, Peoples R China..Protecting source-location privacy based on multirings in wireless sensor networks[J],CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE,2015,27(15,SI):3863-3876
- [47]Wu, Guowei, Wang, Jie, Yao, Lin.Performance Evaluation in WSNs Based on Max-Plus and Time-Domain Stochastic Network Calculus[A],2015,1:475-482
- [48]Lin, Chi, Yao, Lin, Yu, Chang Wu, Wu, Guowei, C (reprint author), Dalian Univ Technol, Sch Software, Dalian, Peoples R China..Maximizing destructiveness of node capture attack in wireless sensor networks[J],JOURNAL OF SUPERCOMPUTING,2015,71(8):3181-3212
- [49]Yao, Lin, Deng, Jing, Wang, Jie, Wu, Guowei, J (reprint author), Univ N Carolina, Dept Comp Sci, Greensboro, NC 27412 USA..A-CACHE: An anchor-based public key caching scheme in large wireless networks[J],COMPUTER NETWORKS,2015,87:78-88
- [50]Lin, Chi, Wu, Guowei, Yim, Kangbin, Yao, Lin, Hou, Gang.Compromising Ad-hoc Networks by Attacking Weakly Connected Dominating Set[A],2015,213-220
- [51]Wu, Guowei, Lin, Chi, Li, Ying, Yao, Lin, Chen, Ailun.A Multi-node Renewable Algorithm Based on Charging Range in Large-scale Wireless Sensor Network[A],2015,94-100
- [52]Wu, Guowei, Liu, Zuosong, Yao, Lin, Deng, Jing, Wang, Jie, L (reprint author), Dalian Univ Technol, Sch Software, Dalian 116023, Peoples R China..A Trust Routing for Multimedia Social Networks[J],COMPUTER JOURNAL,2015,58(4):688-699
- [53]吴国伟, 姚琳.Performance Evaluation in WSNs Based on Max-Plus and Time-Domain Stochastic Network Caculus[A],2015,475-482
- [54]Wu, Guowei, Chen, Xiaojie, Yao, Lin, Lee, Youngjun, Yim, Kangbin, GW (reprint author), Dalian Univ Technol, Sch Software, Dalian 116620, Peoples R China..An Efficient Wormhole Attack Detection Method in Wireless Sensor Networks[J],COMPUTER SCIENCE AND INFORMATION SYSTEMS,2014,11(3,SI):1127-1141
- [55]Yao, Lin, Wu, Guowei, Ren, Jiankang, Zhu, Yanwei, Li, Ying, GW (reprint author), Dalian Univ Technol, Sch Software Technol, Dalian 116620, Peoples R China..Guaranteeing Fault-Tolerant Requirement Load Balancing Scheme Based on VM Migration[J],COMPUTER JOURNAL,2014,57(2):225-232
- [56]Wu, Guowei, Zhang, Yuan, Zhao, Jianfei, Lin, Chi, Yao, Lin, Wang, Jia, L (reprint author), Dalian Univ Technol, Sch Software, Dalian 116600, Peoples R China..SOS: a secure social-aware credit-based stimulating mechanism for BikeNet[J],INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING,2014,16(2,SI):113-124
- [57]Lin, Chi, Wu, Guowei, Xia, Feng, Yao, Lin, C (reprint author), Dalian Univ Technol, Sch Software Technol, Dalian, Peoples R China..Enhancing Efficiency of Node Compromise Attacks in Vehicular Ad-hoc Networks Using Connected Do...[J],MOBILE NETWORKS & APPLICATIONS,2013,18(6):908-922
- [58]Ren, Jiankang, Wu, Guowei, Yao, Lin.A sensitive data aggregation scheme for body sensor networks based on data hiding[J],PERSONAL AND UBIQUITOUS COMPUTING,2013,17(7,SI):1317-1329
- [59]Wu, Guowei, Wang, Jia, Yao, Lin, Lin, Chi.A Secure Social-aware Incentive Scheme for Delay Tolerant Networks[A],2013,813-820
- [60]Yao, Lin, Wu, Guowei, Yim, Kangbin, Miao, Jingwei, Deng, Fangyu, Jing, Lin, Chi.Biometrics-based Data Link Layer Anonymous Authentication in VANETs[A],2013,182-187