Lei Ding

ORCID: 0000-0002-1534-6237
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cognitive Radio Networks and Spectrum Sensing
  • Cooperative Communication and Network Coding
  • Adversarial Robustness in Machine Learning
  • Advanced MIMO Systems Optimization
  • Network Security and Intrusion Detection
  • Wireless Communication Networks Research
  • Quantum Information and Cryptography
  • Advanced Malware Detection Techniques
  • Quantum Computing Algorithms and Architecture
  • Advanced Wireless Network Optimization
  • Digital Media Forensic Detection
  • Embedded Systems and FPGA Design
  • Full-Duplex Wireless Communications
  • Wireless Networks and Protocols
  • Atmospheric aerosols and clouds
  • Peer-to-Peer Network Technologies
  • Meteorological Phenomena and Simulations
  • Data Stream Mining Techniques
  • Precipitation Measurement and Analysis
  • Remote Sensing in Agriculture
  • Caching and Content Delivery
  • Advanced Computational Techniques and Applications
  • Spam and Phishing Detection
  • Quantum Mechanics and Applications
  • Software System Performance and Reliability

American University
2020-2024

Civil Aviation University of China
2021

Accenture (United States)
2018-2020

Beijing University of Posts and Telecommunications
2014-2019

University of Chinese Academy of Sciences
2019

Southwest Jiaotong University
2019

Guangdong University of Technology
2018

Intelligent Automation (United States)
2012-2015

University at Buffalo, State University of New York
2009-2015

Shandong University
2011

Throughput maximization is one of the main challenges in cognitive radio <i xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">ad hoc</i> networks, where availability local spectrum resources may change from time to and hop by hop. For this reason, a cross-layer opportunistic access dynamic routing algorithm for networks proposed, which called spectrum-allocation (ROSA) algorithm. Through control actions, ROSA aims maximize network throughput performing...

10.1109/tvt.2010.2045403 article EN IEEE Transactions on Vehicular Technology 2010-03-16

This article examines the changing demographics of China, with particular attention paid to effect one‐child policy in relation long‐term care older people. It also current state health for Long‐term stays characterize hospital care. Most geriatric syndromes are less common hospitalized people (e.g., delirium, falls), but some polypharmacy) more common. A high volume patients and brief targeted visits outpatient Nursing homes exist relatively fewer than most developed countries. Geriatric...

10.1111/j.1532-5415.2007.01273.x article EN Journal of the American Geriatrics Society 2007-06-19

Throughput maximization is one of the main challenges in cognitive radio ad hoc networks, where local spectrum resources may change from time to and hop-by-hop. For this reason, a cross-layer opportunistic access dynamic routing algorithm for networks proposed, called ROSA (ROuting Spectrum Allocation algorithm). Through control actions, aims at maximizing network throughput by performing joint routing, allocation, scheduling, transmit power control. Specifically, dynamically allocates...

10.1145/1641804.1641810 article EN 2009-10-26

Throughput maximization is one of the main challenges in cognitive radio ad hoc networks, where availability local spectrum resources may change from time to and hop-by-hop. Cooperative transmission exploits spatial diversity without multiple antennas at each node increase capacity with reliability guarantees. This idea particularly attractive wireless environments due diverse channel quality limited energy bandwidth resources. With cooperation, source relay cooperatively transmit data...

10.1109/secon.2010.5508267 article EN 2010-06-01

DeepFake represents a category of face-swapping attacks that leverage machine learning models such as autoen-coders or generative adversarial networks. Although the concept is not new, its recent technical advances make fake content (e.g., images, videos) imperceptible to Humans. Various detection techniques for have been explored. These methods, however, are passive measures against DeepFakes they mitigation strategies after high-quality generated. This work aims take an offensive measure...

10.1109/ijcnn52387.2021.9533868 article EN 2022 International Joint Conference on Neural Networks (IJCNN) 2021-07-18

Deep neural networks (DNNs) have become the essential components for various commercialized machine learning services, such as Machine Learning a Service (MLaaS). Recent studies show that services face severe privacy threats - well-trained DNNs owned by MLaaS providers can be stolen through public APIs, namely model stealing attacks. However, most existing works undervalued impact of attacks, where successful attack has to acquire confidential training data or auxiliary regarding victim DNN....

10.1109/tetci.2022.3147508 article EN publisher-specific-oa IEEE Transactions on Emerging Topics in Computational Intelligence 2022-03-03

The problem of optimal resource allocation to share high-quality multimedia content in cognitive ad hoc networks with cooperative relays is addressed this paper. Cooperative transmission a promising technique increase the capacity wireless links by exploiting spatial diversity without multiple antennas at each node. However, mainstream research field focuses on optimizing physical layer performance measures, little consideration for application-specific and network-wide measures. In paper,...

10.1109/icc.2011.5962936 article EN 2011-06-01

We consider a secondary multi-hop cognitive radio network with decentralized control that operates cognitively to coexist primary users. propose new spread-spectrum management paradigm, in which, unlike mainstream dynamic spectrum access research, digital waveforms are designed occupy the entire available spectrum, and adaptively track interference profile at receiver maximize link capacity while avoiding In this context, we study problem of maximizing throughput through joint routing...

10.1109/twc.2013.100213.120545 article EN IEEE Transactions on Wireless Communications 2013-10-22

Cybersecurity risk assessment is an important means of effective response to network attacks on industrial control systems. However, cybersecurity process susceptible subjective and objective effects. To solve this problem, paper introduced method based fuzzy theory Attack-Defense Tree model probability technology, applied it airport automatic fuel supply system. Firstly, was established the potential threat system deployed security equipment. Secondly, interval attack path calculated using...

10.3233/jifs-201126 article EN Journal of Intelligent & Fuzzy Systems 2021-04-09

To systematically understand the effects of vulnerabilities introduced by AI/ML-enabled Army Multi-domain Operations, we provide an overview characterization ML attacks with emphasis on black-box vs. white-box attacks. We then study a system and attack model for MDO applications services, introduce roles stakeholders in this system. show, various scenarios under different knowledges deployed system, how peer adversaries can employ deceptive techniques to defeat algorithms, should be designed...

10.1117/12.2548798 article EN 2020-05-19

Audio adversarial examples (AEs) have posed significant security challenges to real-world speaker recognition systems.Most black-box attacks still require certain information from the model be effective (e.g., keeping probing and requiring knowledge of similarity scores).This work aims push practicality by minimizing attacker's about a target model.Although it is not feasible for an attacker succeed with completely zero knowledge, we assume that only knows short (or few seconds) speech...

10.14722/ndss.2024.24545 article EN 2024-01-01

A cognitive radio network with decentralized control (i.e., a ad hoc network) is considered in this demonstration. The demo implements and localized algorithm for through put maximization joint routing interference-avoiding waveform selection. adapts to time-varying traffic demands, interference profile, topology locally maximize the achievable data rate while avoiding harmful co-located primary or secondary users. prototype based on cross-layer protocol stack implemented Python, which...

10.1109/secon.2010.5508221 article EN 2010-06-01

Three-dimensional (3D) cloud retrievals are critical for understanding their impact on climate and other applications such as aviation safety, weather prediction, remote sensing. However, obtaining high-resolution accurate vertical representation of clouds remains unsolved due to the limitations imposed by satellite instrumentation, viewing conditions, complexity dynamics. Cloud masks essential comprehending various properties, but deriving 3D from 2D imagery data is a challenging task. To...

10.1109/tgrs.2023.3329649 article EN IEEE Transactions on Geoscience and Remote Sensing 2023-01-01

SUMMARY This paper studies the fairness among primary users (PUs) and secondary (SUs) for resource allocation in cognitive radio systems. We propose a novel co‐opetition strategy based on Kalai–Smorodinsky bargaining solution to balance system efficiency users. The formulates spectrum sharing problem as nonlinear integral sum utility maximization subject set of constraints describing PUs SUs. Then, we solve by proposing heuristical method that consists four steps: multi‐PU competition, PU's...

10.1002/dac.2553 article EN International Journal of Communication Systems 2013-04-25

Smart home devices have brought us many benefits such as advanced security, convenience, and entertainment. However, these also made unintended consequences like giving ultimate power for devices' owners over their intimate partners in the same household which might lead to tech-facilitated domestic abuse (tech-abuse) recent research has shown. In this paper, we systematize findings on tech-abuse smart homes. We show that Intimate Partner Violence (IPV) homes is more effective less risky...

10.1109/trustcom50675.2020.00184 article EN 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 2020-12-01

We propose a Cognitive Radio nEtworking ArchiTecture (CREATE) with joint cross-layer design of routing and dynamic spectrum allocation that balances the throughput-delay trade-offs under realistic physical channel effects. Dynamic is implemented by integrating spectrum-aware backpressure-like algorithm shortest-path to improve both average delay achievable throughput hard deadline constraints. CREATE supports adaptability establishing asynchronous negotiation coordination channels instead...

10.1109/milcom.2013.283 article EN 2013-11-01

The problem of throughput maximization in a cognitive radio network with decentralized control (i.e., ad hoc network) is considered this paper. First, and localized algorithms for through joint routing interference-avoiding waveform selection are proposed, based on nonlinear optimization framework. proposed adapt to time-varying traffic demands, interference profile, topology locally maximize the achievable data rate while avoiding harmful co-located primary or secondary users. Second,...

10.1109/milcom.2010.5680156 article EN 2010-10-01

As a latest immune algorithm, dendritic cell algorithm (DCA) has been successfully applied into the abnormal detection. First, this paper reviewed research progress of DCA from following aspects: signal extraction technology, processing decision method for load anomaly judgment, and application DCA. Next, corresponding solving thoughts main problems existing in were proposed paper. Finally, future trends presented

10.4304/jsw.8.8.2087-2094 article EN Journal of Software 2013-07-27

While machine learning based spam detectors have proven useful, spammers are to bypass the by modifying their email content. Adversarial attacks on models been observed in domains such as image classification. Applying adversarial attack algorithms craft emails evade detectors, however, has limitations. Such generate perturbations feature space. Different from data, translating space text formats, emails, changes effectiveness of perturbations. It can reduce success rate case detection. In...

10.1145/3457340.3458302 article EN 2021-05-24

Machine learning-based spam detection models learn from a set of labeled training data and detect emails after the phase. We study class vulnerabilities such models, where attack can manipulate trained model to misclassify maliciously crafted at However, very often feature extraction methods make it difficult translate change in space that textual email space. This paper proposes new method making guided changes text by taking advantage findings generated adversarial examples purposely...

10.1109/icaa52185.2022.00019 article EN 2022-03-01

Precipitation type is a key parameter used for better retrieval of precipitation characteristics as well to understand the cloud–convection–precipitation coupling processes. Ice crystals and water droplets inherently exhibit different in regimes (e.g., convection, stratiform), which reflect on satellite remote sensing measurements that help us distinguish them. The Global Measurement (GPM) Core Observatory’s microwave imager (GMI) dual-frequency radar (DPR) together provide ample information...

10.3390/rs14153631 article EN cc-by Remote Sensing 2022-07-29

A hierarchical clustering P2P network model based on user interest is presented in this paper to improve search efficiency. The routers the are abstracted as activated peer node, and routing table constructed depict character of cluster. divided into different subnets according their character, corresponding topological structure build. strategy proposed above mention method. simulation results show that compared with traditional algorithm cluster method can form more rapidly, gain...

10.4304/jsw.8.5.1262-1267 article EN Journal of Software 2013-04-27
Coming Soon ...