Lei Ding

Orcid: 0000-0001-8480-4628

Affiliations:
  • Guangzhou University, School of Electronics and Communication Engineering, School of Cyber Security, China
  • Information Center of the Civil Aviation Administration of China, Beijing, China (2021-2022)


According to our database1, Lei Ding authored at least 11 papers between 2021 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
A Tree-Based Scheme to Assess the Safety and Security for Industrial Control Systems.
IEEE Trans. Dependable Secur. Comput., 2025

Secure color image encryption algorithm for face recognition using Zaslavsky and Arnold cat maps with binary bit-plane decomposition.
Inf. Sci., 2025

Complicated Imbalanced and Overlapped Data Oversampling Approach via Hypersphere Coverage and Adaptive Differential Evolution for Anomaly Detection of Industrial Internet of Things.
IEEE Internet Things J., 2025

Acceleration offloading for differential privacy protection based on federated learning in edge intelligent controllers.
Future Gener. Comput. Syst., 2025

2024
A Span-based Multivariate Information-aware Embedding Network for joint relational triplet extraction of threat intelligence.
Knowl. Based Syst., 2024

A hybrid sampling method for highly imbalanced and overlapped data classification with complex distribution.
Inf. Sci., 2024

An Efficient Anomaly Detection Method for Industrial Control Systems: Deep Convolutional Autoencoding Transformer Network.
Int. J. Intell. Syst., 2024

CWMAGAN-GP-Based Oversampling Technique for Intrusion Detection.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

2023
GAN-SR Anomaly Detection Model Based on Imbalanced Data.
IEICE Trans. Inf. Syst., July, 2023

2022
Cybersecurity Risk Assessment of Industrial Control Systems Based on Order-α Divergence Measures Under an Interval-Valued Intuitionistic Fuzzy Environment.
IEEE Access, 2022

2021
Cybersecurity risk assessment method of ICS based on attack-defense tree model.
J. Intell. Fuzzy Syst., 2021


  Loading...