![]() |
个人信息Personal Information
教授
博士生导师
硕士生导师
性别:女
毕业院校:大连理工大学
学位:博士
所在单位:软件学院、国际信息与软件学院
学科:计算机应用技术
联系方式:yaolin@dlut.edu.cn
电子邮箱:yaolin@dlut.edu.cn
扫描关注
- [61]Yao, Lin, Kang, Shang, Pengfei, Wu, Guowei, GW (reprint author), Dalian Univ Technol, Sch Software, Dalian 116620, Peoples R China..Protecting the sink location privacy in wireless sensor networks[J],PERSONAL AND UBIQUITOUS COMPUTING,2013,17(5,SI):883-893
- [62]姚琳, 吴国伟.Guaranteeing Fault-Tolerant Requirement Load Balancing Scheme Based on VM Migration[J],The Computer Journal,2013,1(1):1-8
- [63]Yao, Lin, Zou, Xiaocheng, Deng, Jing, Suthaharan, Shan.PeB: Periodic Broadcast for Information Distribution in Large Wireless Networks[A],2013,4440-4445
- [64]吴国伟, 姚琳, 许真珍, 王巍.A Fuzzy-based Trust Management in WSNs[J],Journal of Internet Services and Information Security,2013,3(3/4):124-135
- [65]姚琳, 吴国伟.Protecting source-location privacy based on multirings in wireless[J],CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE,2013,7(21):1-14
- [66]Lin, Chi, Wu, Guowei, Xia, Feng, Li, Mingchu, Yao, Lin, Pei, Zhongyi, GW (reprint author), Dalian Univ Technol, Sch Software, Dalian, Peoples R China..Energy efficient ant colony algorithms for data aggregation in wireless sensor networks[J],JOURNAL OF COMPUTER AND SYSTEM SCIENCES,2012,78(6,SI):1686-1702
- [67]Yao, Lin, Lin, Chi, Liu, Guangya, Deng, Fangyu, Wu, Guowei.Location Anonymity Based on Fake Queries in Continuous Location-based Services[A],2012,375-382
- [68]Lin C., Wu G., Yao L., Liu Z..A combined clustering scheme for protecting location privacy and query privacy in pervasive envir...[A],2012,943-948
- [69]Yao, Lin, Wu, Guowei, Wang, Jia, Xia, Feng, Lin, Chi, Guojun, F (reprint author), Dalian Univ Technol, Sch Software, Dalian 116620, Peoples R China..A Clustering K-Anonymity Scheme for Location Privacy Preservation[J],IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS,2012,E95D(1):134-142
- [70]姚琳, 吴国伟.Protecting the Sink Location Privacy in Wireless Sensor Networks[J],Personal and Ubiquitous Computing,2012,4:1-11
- [71]Wu, G., Ren, J., Yao, L., Xu, Z., G (reprint author), Dalian Univ Technol, Sch Software, Dalian 116620, Peoples R China..ITFBS: adaptive intrusion-tolerant scheme for body sensor networks in smart space applications[J],IET COMMUNICATIONS,2011,5(17):2509-2517
- [72]Lin C., Yao L., Liu Z., Chen X., Li M., Wu G..A selfish node preventive real time fault tolerant routing protocol for WSNs[A],2011,330-337
- [73]Yao, Lin, Liu, Bing, Xia, Feng, Wu, Guo-Wei, Lin, Qiang, F (reprint author), Dalian Univ Technol, Sch Software, Dalian 116620, Peoples R China..A Group Key Management Protocol Based on Weight-Balanced 2-3 Tree for Wireless Sensor Networks[J],INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL,2011,14(10):3261-3278
- [74]Yao, Lin, Kong, Xiangwei, Wu, Guowei, Lin, Chi, Fan, Qingna, L (reprint author), Dalian Univ Technol, Sch Elect & Informat Engn, Dalian 116024, Peoples R China..Tree-based Multicast Key Management in ubiquitous computing environment[J],INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING,2011,8(1-2,SI):27-35
- [75]吴国伟, 夏锋, 姚琳.A Game Theoretic Approach for Interuser Interference Reduction in Body Sensor Networks[J],International Journal of Distributed Sensor Networks,2011,6(1):14-22
- [76]Wu G., Zhu Y., Zhang Y., Yao L., Xia F., Xia, F., School of Software, Dalian University of Technology, Dalian 116620, China, email: fxia@ieee.org.A hop-by-hop cross-layer congestion control scheme for wireless sensor networks[J],Journal of Software,2011,6(12 SPEC. ISSUE):2434-2440
- [77]姚琳, 吴国伟.A Biometric Key Establishment Protocol for Body Area Networks[J],International Journal of Distributed Sensor Networks,2011,1(1):1-10
- [78]Wu, Guowei, Lu, Dongze, Xia, Feng, Yao, Lin, F (reprint author), Dalian Univ Technol, Sch Software, Dalian 116620, Peoples R China..A FAULT-TOLERANT EMERGENCY-AWARE ACCESS CONTROL SCHEME FOR CYBER-PHYSICAL SYSTEMS[J],INFORMATION TECHNOLOGY AND CONTROL,2011,40(1):29-40
- [79]Lv Z., Xia F., Yao L., Chen Z., Wu G..iCare: A mobile health monitoring system for the elderly[A],2010,699-705
- [80]Yao L., Lin C., Kong X., Xia F., Wu G..A clustering-based location privacy protection scheme for pervasive computing[A],2010,719-726