Lin Yao

Orcid: 0000-0001-8138-6045

Affiliations:
  • Dalian University of Technology, International School of Information Science and Engineering, Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province, Dalian, China
  • Dalian University of Technology, School of Software, Dalian, China


According to our database1, Lin Yao authored at least 79 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Utility-aware Privacy Perturbation for Training Data.
ACM Trans. Knowl. Discov. Data, May, 2024

More Modalities Mean Better: Vessel Target Recognition and Localization Through Symbiotic Transformer and Multiview Regression.
IEEE Trans. Geosci. Remote. Sens., 2024

A Utility-Aware Anonymization Model for Multiple Sensitive Attributes Based on Association Concealment.
IEEE Trans. Dependable Secur. Comput., 2024

Hybrid aggregation for federated learning under blockchain framework.
Comput. Commun., 2024

2023
A Privacy-Preserving Hybrid Range Search Scheme Over Encrypted Electronic Medical Data in IoT Systems.
IEEE Internet Things J., September, 2023

Scan-free verifiable public-key searchable encryption supporting efficient user updates in distributed systems.
J. Inf. Secur. Appl., May, 2023

Detection of Cache Pollution Attack Based on Ensemble Learning in ICN-Based VANET.
IEEE Trans. Dependable Secur. Comput., 2023

Detection of Cache Pollution Attack Based on Federated Learning in Ultra-Dense Network.
Comput. Secur., 2023

2022
A Cooperative Caching Scheme for VCCN With Mobility Prediction and Consistent Hashing.
IEEE Trans. Intell. Transp. Syst., 2022

Privacy Preservation for Trajectory Publication Based on Differential Privacy.
ACM Trans. Intell. Syst. Technol., 2022

Exploiting Non-Cooperative Game Against Cache Pollution Attack in Vehicular Content Centric Network.
IEEE Trans. Dependable Secur. Comput., 2022

EAFS: An Efficient, Accurate, and Forward Secure Searchable Encryption Scheme Supporting Range Search.
IEEE Syst. J., 2022

GAN-based Differential Privacy Trajectory Data Publishing with Sensitive Label.
Proceedings of the 8th International Conference on Big Data Computing and Communications, 2022

2021
Cooperative Caching in Vehicular Content Centric Network Based on Social Attributes and Mobility.
IEEE Trans. Mob. Comput., 2021

Detection and Defense of Cache Pollution Based on Popularity Prediction in Named Data Networking.
IEEE Trans. Dependable Secur. Comput., 2021

Sensitive Label Privacy Preservation with Anatomization for Data Publishing.
IEEE Trans. Dependable Secur. Comput., 2021

Sensitive attribute privacy preservation of trajectory data publishing based on l-diversity.
Distributed Parallel Databases, 2021

New Dynamic Switch Migration Technique Based on Deep Q-learning.
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021

2020
Detection and Defense of Cache Pollution Attacks Using Clustering in Named Data Networks.
IEEE Trans. Dependable Secur. Comput., 2020

2019
Dynamic switch migration with noncooperative game towards control plane scalability in SDN.
Int. J. Commun. Syst., 2019

Popularity Prediction Caching Using Hidden Markov Model for Vehicular Content Centric Networks.
Proceedings of the 20th IEEE International Conference on Mobile Data Management, 2019

Publishing Sensitive Trajectory Data Under Enhanced l-Diversity Model.
Proceedings of the 20th IEEE International Conference on Mobile Data Management, 2019

QoS-Aware Proactive Data Replication for Big Data Analytics in Edge Clouds.
Proceedings of the 48th International Conference on Parallel Processing, 2019

LSTM-Based Detection for Timing Attacks in Named Data Network.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
A Cooperative Caching Scheme Based on Mobility Prediction in Vehicular Content Centric Networks.
IEEE Trans. Veh. Technol., 2018

V2X Routing in a VANET Based on the Hidden Markov Model.
IEEE Trans. Intell. Transp. Syst., 2018

ESLD: An efficient and secure link discovery scheme for software-defined networking.
Int. J. Commun. Syst., 2018

FMD: A DoS mitigation scheme based on flow migration in software-defined networking.
Int. J. Commun. Syst., 2018

CFR: A cooperative link failure recovery scheme in software-defined networks.
Int. J. Commun. Syst., 2018

DoS Mitigation Mechanism Based on Non-Cooperative Repeated Game for SDN.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018

The Community Characteristic Based Controller Deployment Strategy for SDNs.
Proceedings of the IEEE Global Communications Conference, 2018

A QoS and Cost Aware Fault Tolerant Scheme Insult-Controller SDNs.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Preserving the Relationship Privacy of the published social-network data based on Compressive Sensing.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

2016
Secure Routing Based on Social Similarity in Opportunistic Networks.
IEEE Trans. Wirel. Commun., 2016

MREA: a minimum resource expenditure node capture attack in wireless sensor networks.
Secur. Commun. Networks, 2016

An anonymous authentication scheme in data-link layer for VANETs.
Int. J. Ad Hoc Ubiquitous Comput., 2016

Link Prediction Based on Common-Neighbors for Dynamic Social Network.
Proceedings of the 7th International Conference on Ambient Systems, 2016

Pollution Attack Resistance Dissemination in VANETs Based on Network Coding.
Proceedings of the 7th International Conference on Ambient Systems, 2016

2015
Maximizing destructiveness of node capture attack in wireless sensor networks.
J. Supercomput., 2015

Protecting source-location privacy based on multirings in wireless sensor networks.
Concurr. Comput. Pract. Exp., 2015

A-CACHE: An anchor-based public key caching scheme in large wireless networks.
Comput. Networks, 2015

A Trust Routing for Multimedia Social Networks.
Comput. J., 2015

Performance Evaluation in WSNs Based on Max-Plus and Time-Domain Stochastic Network Calculus.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Multi-node Renewable Algorithm Based on Charging Range in Large-Scale Wireless Sensor Network.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Compromising Ad-Hoc Networks by Attacking Weakly Connected Dominating Set.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

2014
SOS: a secure social-aware credit-based stimulating mechanism for BikeNet.
Int. J. Ad Hoc Ubiquitous Comput., 2014

An efficient wormhole attack detection method in wireless sensor networks.
Comput. Sci. Inf. Syst., 2014

Guaranteeing Fault-Tolerant Requirement Load Balancing Scheme Based on VM Migration.
Comput. J., 2014

2013
Protecting the sink location privacy in wireless sensor networks.
Pers. Ubiquitous Comput., 2013

A sensitive data aggregation scheme for body sensor networks based on data hiding.
Pers. Ubiquitous Comput., 2013

Enhancing Efficiency of Node Compromise Attacks in Vehicular Ad-hoc Networks Using Connected Dominating Set.
Mob. Networks Appl., 2013

A Fuzzy-based Trust Management in WSNs.
J. Internet Serv. Inf. Secur., 2013

A Secure Social-Aware Incentive Scheme for Delay Tolerant Networks.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Biometrics-based Data Link Layer Anonymous Authentication in VANETs.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

2012
Energy efficient ant colony algorithms for data aggregation in wireless sensor networks.
J. Comput. Syst. Sci., 2012

A Clustering K-Anonymity Scheme for Location Privacy Preservation.
IEICE Trans. Inf. Syst., 2012

A Group Key Management Protocol Based on Weight-Balanced 2-3 Tree for Wireless Sensor Networks
CoRR, 2012

A Combined Clustering Scheme for Protecting Location Privacy and Query Privacy in Pervasive Environments.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Location Anonymity Based on Fake Queries in Continuous Location-Based Services.
Proceedings of the Seventh International Conference on Availability, 2012

2011
A Hop-by-hop Cross-layer Congestion Control Scheme for Wireless Sensor Networks.
J. Softw., 2011

A Fault-Tolerant Emergency-Aware Access Control Scheme for Cyber-Physical Systems.
Inf. Technol. Control., 2011

A Biometric Key Establishment Protocol for Body Area Networks.
Int. J. Distributed Sens. Networks, 2011

A Game Theoretic Approach for Interuser Interference Reduction in Body Sensor Networks.
Int. J. Distributed Sens. Networks, 2011

Tree-based Multicast Key Management in ubiquitous computing environment.
Int. J. Ad Hoc Ubiquitous Comput., 2011

ITFBS: adaptive intrusion-tolerant scheme for body sensor networks in smart space applications.
IET Commun., 2011

A Selfish Node Preventive Real Time Fault Tolerant Routing Protocol for WSNs.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011

2010
Dynamical Jumping Real-Time Fault-Tolerant Routing Protocol for Wireless Sensor Networks.
Sensors, 2010

Decentralized Inter-User Interference Suppression in Body Sensor Networks with Non-cooperative Game
CoRR, 2010

Localization Technologies for Indoor Human Tracking
CoRR, 2010

An inter-domain authentication scheme for pervasive computing environment.
Comput. Math. Appl., 2010

Prediction-based Data Transmission for Energy Conservation in Wireless Body Sensors.
Proceedings of the 5th Annual International Conference on Wireless Internet, 2010

An ECG-Based Signal Key Establishment Protocol in Body Area Networks.
Proceedings of the Symposia and Workshops on Ubiquitous, 2010

DISG: Decentralized Inter-user Interference Suppression in Body Sensor Networks with Non-cooperative Game.
Proceedings of the Symposia and Workshops on Ubiquitous, 2010

A Clustering-Based Location Privacy Protection Scheme for Pervasive Computing.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

A Group-Based Mobile Agent Routing Protocol for Multitype Wireless Sensor Networks.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

iCare: A Mobile Health Monitoring System for the Elderly.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

2008
A Task-Role Based Access Control Model with Multi-Constraints.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

2007
A Low Complexity Intrusion Detection Algorithm.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

2004
A New WCET Estimation Algorithm Based on Instruction Cache and Prefetching Combined Model.
Proceedings of the Embedded Software and Systems, First International Conference, 2004


  Loading...