default search action
Lin Yao 0001
Person information
- affiliation: Dalian University of Technology, International School of Information Science and Engineering, Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province, Dalian, China
- affiliation: Dalian University of Technology, School of Software, Dalian, China
Other persons with the same name
- Lin Yao — disambiguation page
- Lin Yao 0002 — Zhejiang University, School of Medicine, Department of Neurobiology, Affiliated Mental Health Center and Hangzhou Seventh People's Hospital, Hangzhou, China (and 4 more)
- Lin Yao 0003 — 360 AI Research, Beijing, China (and 1 more)
- Lin Yao 0004 — Harbin Institute of Technology, School of Software, Harbin, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j47]Xinjiao Li, Guowei Wu, Lin Yao, Shisong Geng:
Hybrid aggregation for federated learning under blockchain framework. Comput. Commun. 225: 311-323 (2024) - [j46]Lin Yao, Xue Wang, Haibo Hu, Guowei Wu:
A Utility-Aware Anonymization Model for Multiple Sensitive Attributes Based on Association Concealment. IEEE Trans. Dependable Secur. Comput. 21(4): 2045-2056 (2024) - [j45]Shipei Liu, Xiaoya Fan, Guowei Wu, Lin Yao, Shisong Geng:
More Modalities Mean Better: Vessel Target Recognition and Localization Through Symbiotic Transformer and Multiview Regression. IEEE Trans. Geosci. Remote. Sens. 62: 1-12 (2024) - [j44]Xinjiao Li, Guowei Wu, Lin Yao, Zhaolong Zheng, Shisong Geng:
Utility-aware Privacy Perturbation for Training Data. ACM Trans. Knowl. Discov. Data 18(4): 103:1-103:21 (2024) - [c31]Zhenyu Chen, Lin Yao, Guowei Wu, Shisong Geng:
Enhancing Privacy in Big Data Publishing: η-Inference Model. ADMA (6) 2024: 254-268 - 2023
- [j43]Lin Yao, Jia Li, Jing Deng, Guowei Wu:
Detection of Cache Pollution Attack Based on Federated Learning in Ultra-Dense Network. Comput. Secur. 124: 102965 (2023) - [j42]Pengxu Tian, Cheng Guo, Kim-Kwang Raymond Choo, Xinyu Tang, Lin Yao:
A Privacy-Preserving Hybrid Range Search Scheme Over Encrypted Electronic Medical Data in IoT Systems. IEEE Internet Things J. 10(17): 15314-15324 (2023) - [j41]Pengxu Tian, Cheng Guo, Yingmo Jie, Yining Liu, Lin Yao:
Scan-free verifiable public-key searchable encryption supporting efficient user updates in distributed systems. J. Inf. Secur. Appl. 74: 103471 (2023) - [j40]Lin Yao, Zhaolong Zheng, Xin Wang, Yujie Zeng, Guowei Wu:
Detection of Cache Pollution Attack Based on Ensemble Learning in ICN-Based VANET. IEEE Trans. Dependable Secur. Comput. 20(4): 3287-3298 (2023) - 2022
- [j39]Pengxu Tian, Cheng Guo, Kim-Kwang Raymond Choo, Yining Liu, Long Li, Lin Yao:
EAFS: An Efficient, Accurate, and Forward Secure Searchable Encryption Scheme Supporting Range Search. IEEE Syst. J. 16(2): 3450-3460 (2022) - [j38]Lin Yao, Zhenyu Chen, Haipeng Dai, Guowei Wu:
Exploiting Non-Cooperative Game Against Cache Pollution Attack in Vehicular Content Centric Network. IEEE Trans. Dependable Secur. Comput. 19(6): 3873-3886 (2022) - [j37]Lin Yao, Zhenyu Chen, Haibo Hu, Guowei Wu, Bin Wu:
Privacy Preservation for Trajectory Publication Based on Differential Privacy. ACM Trans. Intell. Syst. Technol. 13(3): 42:1-42:21 (2022) - [j36]Lin Yao, Xiaoying Xu, Jing Deng, Guowei Wu, Zhaoyang Li:
A Cooperative Caching Scheme for VCCN With Mobility Prediction and Consistent Hashing. IEEE Trans. Intell. Transp. Syst. 23(11): 20230-20242 (2022) - [c30]Lin Yao, Yu Zhang, Zhaolong Zheng, Guowei Wu:
GAN-based Differential Privacy Trajectory Data Publishing with Sensitive Label. BigCom 2022: 112-119 - 2021
- [j35]Lin Yao, Zhenyu Chen, Haibo Hu, Guowei Wu, Bin Wu:
Sensitive attribute privacy preservation of trajectory data publishing based on l-diversity. Distributed Parallel Databases 39(3): 785-811 (2021) - [j34]Lin Yao, Zhenyu Chen, Xin Wang, Dong Liu, Guowei Wu:
Sensitive Label Privacy Preservation with Anatomization for Data Publishing. IEEE Trans. Dependable Secur. Comput. 18(2): 904-917 (2021) - [j33]Lin Yao, Yujie Zeng, Xin Wang, Ailun Chen, Guowei Wu:
Detection and Defense of Cache Pollution Based on Popularity Prediction in Named Data Networking. IEEE Trans. Dependable Secur. Comput. 18(6): 2848-2860 (2021) - [j32]Lin Yao, Yuqi Wang, Xin Wang, Guowei Wu:
Cooperative Caching in Vehicular Content Centric Network Based on Social Attributes and Mobility. IEEE Trans. Mob. Comput. 20(2): 391-402 (2021) - [c29]Lin Yao, Jia Li, Guowei Wu, Bin Wu:
New Dynamic Switch Migration Technique Based on Deep Q-learning. EUC 2021: 125-130 - 2020
- [j31]Lin Yao, Zhenzhen Fan, Jing Deng, Xin Fan, Guowei Wu:
Detection and Defense of Cache Pollution Attacks Using Clustering in Named Data Networks. IEEE Trans. Dependable Secur. Comput. 17(6): 1310-1321 (2020)
2010 – 2019
- 2019
- [j30]Guowei Wu, Jinlei Wang, Mohammad S. Obaidat, Lin Yao, Kuei-Fang Hsiao:
Dynamic switch migration with noncooperative game towards control plane scalability in SDN. Int. J. Commun. Syst. 32(7) (2019) - [c28]Lin Yao, Binyao Jiang, Jing Deng, Mohammad S. Obaidat:
LSTM-Based Detection for Timing Attacks in Named Data Network. GLOBECOM 2019: 1-6 - [c27]Qiufen Xia, Luyao Bai, Weifa Liang, Zichuan Xu, Lin Yao, Lei Wang:
QoS-Aware Proactive Data Replication for Big Data Analytics in Edge Clouds. ICPP Workshops 2019: 26:1-26:10 - [c26]Lin Yao, Xinyu Wang, Xin Wang, Haibo Hu, Guowei Wu:
Publishing Sensitive Trajectory Data Under Enhanced l-Diversity Model. MDM 2019: 160-169 - [c25]Lin Yao, Yuqi Wang, Qiufen Xia, Rui Xu:
Popularity Prediction Caching Using Hidden Markov Model for Vehicular Content Centric Networks. MDM 2019: 533-538 - [c24]Yuwei Jia, Kun Chao, Xinzhou Cheng, Lexi Xu, Xueqing Zhao, Lin Yao:
Telecom Big Data Based Precise User Classification Scheme. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1517-1520 - 2018
- [j29]Pengpeng Wu, Lin Yao, Chi Lin, Guowei Wu, Mohammad S. Obaidat:
FMD: A DoS mitigation scheme based on flow migration in software-defined networking. Int. J. Commun. Syst. 31(9) (2018) - [j28]Likun Wang, Lin Yao, Zichuan Xu, Guowei Wu, Mohammad S. Obaidat:
CFR: A cooperative link failure recovery scheme in software-defined networks. Int. J. Commun. Syst. 31(10) (2018) - [j27]Xin Zhao, Lin Yao, Guowei Wu:
ESLD: An efficient and secure link discovery scheme for software-defined networking. Int. J. Commun. Syst. 31(10) (2018) - [j26]Lin Yao, Jie Wang, Xin Wang, Ailun Chen, Yuqi Wang:
V2X Routing in a VANET Based on the Hidden Markov Model. IEEE Trans. Intell. Transp. Syst. 19(3): 889-899 (2018) - [j25]Lin Yao, Ailun Chen, Jing Deng, Jianbang Wang, Guowei Wu:
A Cooperative Caching Scheme Based on Mobility Prediction in Vehicular Content Centric Networks. IEEE Trans. Veh. Technol. 67(6): 5435-5444 (2018) - [c23]Guowei Wu, Likun Wang, Zichuan Xu, Lin Yao, Mohammad S. Obaidat:
A QoS and Cost Aware Fault Tolerant Scheme Insult-Controller SDNs. GLOBECOM 2018: 1-6 - [c22]Lin Yao, Xin Zhao, Guowei Wu, Mohammad S. Obaidat:
The Community Characteristic Based Controller Deployment Strategy for SDNs. GLOBECOM 2018: 1-6 - [c21]Guowei Wu, Zhaoxin Li, Lin Yao:
DoS Mitigation Mechanism Based on Non-Cooperative Repeated Game for SDN. ICPADS 2018: 612-619 - 2017
- [c20]Lin Yao, Dong Liu, Xin Wang, Guowei Wu:
Preserving the Relationship Privacy of the published social-network data based on Compressive Sensing. IWQoS 2017: 1-10 - 2016
- [j24]Lin Yao, Chi Lin, Guowei Wu, Taeyoung Jung, Kangbin Yim:
An anonymous authentication scheme in data-link layer for VANETs. Int. J. Ad Hoc Ubiquitous Comput. 22(1): 1-13 (2016) - [j23]Chi Lin, Tie Qiu, Mohammad S. Obaidat, Chang-Wu Yu, Lin Yao, Guowei Wu:
MREA: a minimum resource expenditure node capture attack in wireless sensor networks. Secur. Commun. Networks 9(18): 5502-5517 (2016) - [j22]Lin Yao, Yanmao Man, Zhong Huang, Jing Deng, Xin Wang:
Secure Routing Based on Social Similarity in Opportunistic Networks. IEEE Trans. Wirel. Commun. 15(1): 594-605 (2016) - [c19]Lin Yao, Luning Wang, Lv Pan, Kai Yao:
Link Prediction Based on Common-Neighbors for Dynamic Social Network. ANT/SEIT 2016: 82-89 - [c18]Guowei Wu, Jie Wang, Yongchuan Wang, Lin Yao:
Pollution Attack Resistance Dissemination in VANETs Based on Network Coding. ANT/SEIT 2016: 131-138 - 2015
- [j21]Guowei Wu, Zuosong Liu, Lin Yao, Jing Deng, Jie Wang:
A Trust Routing for Multimedia Social Networks. Comput. J. 58(4): 688-699 (2015) - [j20]Lin Yao, Jing Deng, Jie Wang, Guowei Wu:
A-CACHE: An anchor-based public key caching scheme in large wireless networks. Comput. Networks 87: 78-88 (2015) - [j19]Lin Yao, Lin Kang, Fangyu Deng, Jing Deng, Guowei Wu:
Protecting source-location privacy based on multirings in wireless sensor networks. Concurr. Comput. Pract. Exp. 27(15): 3863-3876 (2015) - [j18]Chi Lin, Guowei Wu, Chang-Wu Yu, Lin Yao:
Maximizing destructiveness of node capture attack in wireless sensor networks. J. Supercomput. 71(8): 3181-3212 (2015) - [c17]Guowei Wu, Chi Lin, Ying Li, Lin Yao, Ailun Chen:
A Multi-node Renewable Algorithm Based on Charging Range in Large-Scale Wireless Sensor Network. IMIS 2015: 94-100 - [c16]Chi Lin, Guowei Wu, Kangbin Yim, Lin Yao, Gang Hou:
Compromising Ad-Hoc Networks by Attacking Weakly Connected Dominating Set. IMIS 2015: 213-220 - [c15]Guowei Wu, Jie Wang, Lin Yao:
Performance Evaluation in WSNs Based on Max-Plus and Time-Domain Stochastic Network Calculus. TrustCom/BigDataSE/ISPA (1) 2015: 475-482 - 2014
- [j17]Lin Yao, Guowei Wu, Jiankang Ren, Yanwei Zhu, Ying Li:
Guaranteeing Fault-Tolerant Requirement Load Balancing Scheme Based on VM Migration. Comput. J. 57(2): 225-232 (2014) - [j16]Guowei Wu, Xiaojie Chen, Lin Yao, Youngjun Lee, Kangbin Yim:
An efficient wormhole attack detection method in wireless sensor networks. Comput. Sci. Inf. Syst. 11(3): 1127-1141 (2014) - [j15]Guowei Wu, Jia Wang, Lin Yao, Chi Lin, Jianfei Zhao, Yuan Zhang:
SOS: a secure social-aware credit-based stimulating mechanism for BikeNet. Int. J. Ad Hoc Ubiquitous Comput. 16(2): 113-124 (2014) - 2013
- [j14]Guowei Wu, Zuosong Liu, Lin Yao, Zhenzhen Xu, Wei Wang:
A Fuzzy-based Trust Management in WSNs. J. Internet Serv. Inf. Secur. 3(3/4): 124-135 (2013) - [j13]Chi Lin, Guowei Wu, Feng Xia, Lin Yao:
Enhancing Efficiency of Node Compromise Attacks in Vehicular Ad-hoc Networks Using Connected Dominating Set. Mob. Networks Appl. 18(6): 908-922 (2013) - [j12]Lin Yao, Lin Kang, Pengfei Shang, Guowei Wu:
Protecting the sink location privacy in wireless sensor networks. Pers. Ubiquitous Comput. 17(5): 883-893 (2013) - [j11]Jiankang Ren, Guowei Wu, Lin Yao:
A sensitive data aggregation scheme for body sensor networks based on data hiding. Pers. Ubiquitous Comput. 17(7): 1317-1329 (2013) - [c14]Lin Yao, Chi Lin, Jing Deng, Fangyu Deng, Jingwei Miao, Kangbin Yim, Guowei Wu:
Biometrics-based Data Link Layer Anonymous Authentication in VANETs. IMIS 2013: 182-187 - [c13]Guowei Wu, Jia Wang, Lin Yao, Chi Lin:
A Secure Social-Aware Incentive Scheme for Delay Tolerant Networks. TrustCom/ISPA/IUCC 2013: 813-820 - 2012
- [j10]Lin Yao, Guowei Wu, Jia Wang, Feng Xia, Chi Lin, Guojun Wang:
A Clustering K-Anonymity Scheme for Location Privacy Preservation. IEICE Trans. Inf. Syst. 95-D(1): 134-142 (2012) - [j9]Chi Lin, Guowei Wu, Feng Xia, Mingchu Li, Lin Yao, Zhongyi Pei:
Energy efficient ant colony algorithms for data aggregation in wireless sensor networks. J. Comput. Syst. Sci. 78(6): 1686-1702 (2012) - [c12]Lin Yao, Chi Lin, Guangya Liu, Fangyu Deng, Guowei Wu:
Location Anonymity Based on Fake Queries in Continuous Location-Based Services. ARES 2012: 375-382 - [c11]Chi Lin, Guowei Wu, Lin Yao, Zuosong Liu:
A Combined Clustering Scheme for Protecting Location Privacy and Query Privacy in Pervasive Environments. TrustCom 2012: 943-948 - [i10]Chi Lin, Guowei Wu, Feng Xia, Mingchu Li, Lin Yao, Zhongyi Pei:
Energy Efficient Ant Colony Algorithms for Data Aggregation in Wireless Sensor Networks. CoRR abs/1201.0119 (2012) - [i9]Guowei Wu, Dongze Lu, Feng Xia, Lin Yao:
A Fault-Tolerant Emergency-Aware Access Control Scheme for Cyber-Physical Systems. CoRR abs/1201.0205 (2012) - [i8]Guowei Wu, Feng Xia, Lin Yao, Yan Zhang, Yanwei Zhu:
A Hop-by-hop Cross-layer Congestion Control Scheme for Wireless Sensor Networks. CoRR abs/1201.0207 (2012) - [i7]Lin Yao, Bing Liu, Feng Xia, Guowei Wu, Qiang Lin:
A Group Key Management Protocol Based on Weight-Balanced 2-3 Tree for Wireless Sensor Networks. CoRR abs/1205.1465 (2012) - 2011
- [j8]Guowei Wu, Jiankang Ren, Lin Yao, Zichuan Xu:
ITFBS: adaptive intrusion-tolerant scheme for body sensor networks in smart space applications. IET Commun. 5(17): 2509-2517 (2011) - [j7]Lin Yao, Xiangwei Kong, Guowei Wu, Chi Lin, Qingna Fan:
Tree-based Multicast Key Management in ubiquitous computing environment. Int. J. Ad Hoc Ubiquitous Comput. 8(1/2): 27-35 (2011) - [j6]Guowei Wu, Jiankang Ren, Feng Xia, Lin Yao, Zichuan Xu, Pengfei Shang:
A Game Theoretic Approach for Interuser Interference Reduction in Body Sensor Networks. Int. J. Distributed Sens. Networks 7(1) (2011) - [j5]Lin Yao, Bing Liu, Guowei Wu, Kai Yao, Jia Wang:
A Biometric Key Establishment Protocol for Body Area Networks. Int. J. Distributed Sens. Networks 7(1) (2011) - [j4]Guowei Wu, Dongze Lu, Feng Xia, Lin Yao:
A Fault-Tolerant Emergency-Aware Access Control Scheme for Cyber-Physical Systems. Inf. Technol. Control. 40(1): 29-40 (2011) - [j3]Guowei Wu, Feng Xia, Lin Yao, Yan Zhang, Yanwei Zhu:
A Hop-by-hop Cross-layer Congestion Control Scheme for Wireless Sensor Networks. J. Softw. 6(12): 2434-2440 (2011) - [c10]Chi Lin, Guowei Wu, Mingchu Li, Xiaojie Chen, Zuosong Liu, Lin Yao:
A Selfish Node Preventive Real Time Fault Tolerant Routing Protocol for WSNs. iThings/CPSCom 2011: 330-337 - 2010
- [j2]Lin Yao, Lei Wang, Xiangwei Kong, Guowei Wu, Feng Xia:
An inter-domain authentication scheme for pervasive computing environment. Comput. Math. Appl. 60(2): 234-244 (2010) - [j1]Guowei Wu, Chi Lin, Feng Xia, Lin Yao, He Zhang, Bing Liu:
Dynamical Jumping Real-Time Fault-Tolerant Routing Protocol for Wireless Sensor Networks. Sensors 10(3): 2416-2437 (2010) - [c9]Guowei Wu, Heqian Li, Lin Yao:
A Group-Based Mobile Agent Routing Protocol for Multitype Wireless Sensor Networks. GreenCom/CPSCom 2010: 42-49 - [c8]Ziyu Lv, Feng Xia, Guowei Wu, Lin Yao, Zhikui Chen:
iCare: A Mobile Health Monitoring System for the Elderly. GreenCom/CPSCom 2010: 699-705 - [c7]Lin Yao, Chi Lin, Xiangwei Kong, Feng Xia, Guowei Wu:
A Clustering-Based Location Privacy Protection Scheme for Pervasive Computing. GreenCom/CPSCom 2010: 719-726 - [c6]Lin Yao, Bing Liu, Kai Yao, Guowei Wu, Jia Wang:
An ECG-Based Signal Key Establishment Protocol in Body Area Networks. UIC/ATC Workshops 2010: 233-238 - [c5]Guowei Wu, Jiankang Ren, Feng Xia, Lin Yao, Zichuan Xu:
DISG: Decentralized Inter-user Interference Suppression in Body Sensor Networks with Non-cooperative Game. UIC/ATC Workshops 2010: 256-261 - [c4]Feng Xia, Zhenzhen Xu, Lin Yao, Weifeng Sun, Mingchu Li:
Prediction-based Data Transmission for Energy Conservation in Wireless Body Sensors. WICON 2010: 1-9 - [i6]Zhang Da, Feng Xia, Zhuo Yang, Lin Yao, Wenhong Zhao:
Localization Technologies for Indoor Human Tracking. CoRR abs/1003.1833 (2010) - [i5]Guowei Wu, Chi Lin, Feng Xia, Lin Yao, He Zhang, Bing Liu:
Dynamical Jumping Real-Time Fault-Tolerant Routing Protocol for Wireless Sensor Networks. CoRR abs/1004.2322 (2010) - [i4]Guowei Wu, Jiankang Ren, Feng Xia, Lin Yao, Zichuan Xu:
Decentralized Inter-User Interference Suppression in Body Sensor Networks with Non-cooperative Game. CoRR abs/1011.3092 (2010) - [i3]Lin Yao, Chi Lin, Xiangwei Kong, Feng Xia, Guowei Wu:
A Clustering-based Location Privacy Protection Scheme for Pervasive Computing. CoRR abs/1011.3098 (2010) - [i2]Ziyu Lv, Feng Xia, Guowei Wu, Lin Yao, Zhikui Chen:
iCare: A Mobile Health Monitoring System for the Elderly. CoRR abs/1011.3852 (2010)
2000 – 2009
- 2009
- [i1]Feng Xia, Zhenzhen Xu, Lin Yao, Weifeng Sun, Mingchu Li:
Prediction-Based Data Transmission for Energy Conservation in Wireless Body Sensors. CoRR abs/0912.2430 (2009) - 2008
- [c3]Lin Yao, Xiangwei Kong, Zichuan Xu:
A Task-Role Based Access Control Model with Multi-Constraints. NCM (1) 2008: 137-143 - 2007
- [c2]Lin Yao, Kai Yao:
A Low Complexity Intrusion Detection Algorithm. International Conference on Computational Science (3) 2007: 461-464 - 2004
- [c1]Guowei Wu, Lin Yao:
A New WCET Estimation Algorithm Based on Instruction Cache and Prefetching Combined Model. ICESS 2004: 557-562
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-27 00:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint