Yi Sun | Information Security | Best Researcher Award

Dr. Yi Sun | Information Security | Best Researcher Award

Associate Professor at Beijing University of Posts and Telecommunications, China

Dr. Yi Sun is an Associate Professor at the School of Computer Science (National Pilot Software Engineering School), Beijing University of Posts and Telecommunications, China. She is a prominent researcher in the field of information security with a focus on cryptography, secure multi-party computation, blockchain, and big data security. With a strong presence in international collaborations, over 150 journal publications, 170+ patent applications, and numerous honors, Dr. Sun has established herself as a global leader in cybersecurity and privacy computing.

Publication ProfileΒ 

Scopus

Educational Background πŸŽ“

  • Ph.D. in Computer Science
    Institution: State Key Laboratory of Network and Switching Technology, Beijing University of Posts and Telecommunications
    Graduation Date: June 2015

Professional Experience πŸ’Ό

  • Associate Professor
    School of Computer Science, Beijing University of Posts and Telecommunications (Since July 2015)

    • Oversees national and international research and industry projects (100+ including National 863, Key R&D, and enterprise-funded).

    • Editorial roles in reputed journals and reviewer for SCI-indexed publications.

    • Active participation in organizing and chairing major international conferences such as IEEE GLOBECOM, ICME, DSC, CAIML, CNCIS, ICAIIC, etc.

Research Interests πŸ”¬

  • Cryptography

  • Network Security

  • Secure Multi-party Computation

  • Blockchain Technology

  • Big Data Security

  • Privacy-Preserving Computation

  • RISC-V Processor Security

Awards and HonorsπŸ†βœ¨

  • Top 10 Pioneers of Privacy Computing (2022)

  • Excellent Scientific Research Teacher, Ministry of Education’s Class B Laboratory

  • Excellent Instructor, 7th China International “Internet+” Innovation and Entrepreneurship Competition (2021)

  • Outstanding Instructor, C4 Network Technology Challenge (2023)

  • Excellent Paper, 2023 β€œAcademic Achievements in Frontier IoT in the Capital”

  • 4 ESI Highly Cited Papers

  • Multiple honors for academic and research excellence

Conclusion🌟

Dr. Yi Sun’s career is marked by groundbreaking research, high-impact publications, and international collaboration. Her work in information security has led to real-world applications in secure computing and microarchitecture protection. Through her extensive publication record, editorial contributions, and successful leadership in over 100 research and industrial projects, she has played a critical role in shaping the future of cybersecurity technologies. Dr. Sun’s achievements and accolades make her a highly deserving candidate for the Best Researcher Award.

Publications πŸ“š

πŸ“„ Article:
Title: ADPF: Anti-inference differentially private protocol for federated learning
πŸ‘¨β€πŸ”¬ Authors: Zhao, Zirun; Lin, Zhaowen; Sun, Yi
πŸ“š Journal: Computer Networks
πŸ“… Year: 2025
πŸ”’ Citations: 0


πŸ“„ Article:
Title: A combined side-channel and transient execution attack scheme on RISC-V processors
πŸ‘¨β€πŸ”¬ Authors: Dong, Renhai; Cui, Baojiang; Sun, Yi; Yang, Jun
πŸ“š Journal: Computers and Security
πŸ“… Year: 2025
πŸ”’ Citations: 0


πŸ“„ Article:
Title: Improved twin support vector machine algorithm and applications in classification problems
πŸ‘¨β€πŸ”¬ Authors: Sun, Yi; Wang, Zhouyang
πŸ“š Journal: China Communications
πŸ“… Year: 2024
πŸ”’ Citations: 0


πŸ“„ Article:
Title: AdaDpFed: A Differentially Private Federated Learning Algorithm with Adaptive Noise on Non-IID Data
πŸ‘¨β€πŸ”¬ Authors: Zhao, Zirun; Sun, Yi; Bashir, Ali Kashif; Lin, Zhaowen
πŸ“š Journal: IEEE Transactions on Consumer Electronics
πŸ“… Year: 2024
πŸ”’ Citations: 7


πŸ“„ Article:
Title: BTIDEC: A Novel Detection Scheme for CPU Security of Consumer Electronics
πŸ‘¨β€πŸ”¬ Authors: Dong, Renhai; Cui, Baojiang; Sun, Yi; Yang, Jun
πŸ“š Journal: IEEE Transactions on Consumer Electronics
πŸ“… Year: 2024
πŸ”’ Citations: 0


πŸ“„ Article:
Title: Ins Finder: A Practical CPU Undocumented Instruction Detection Framework
πŸ‘¨β€πŸ”¬ Authors: Dong, Renhai; Cui, Baojiang; Sun, Yi; Yang, Jun
πŸ“š Journal: Journal of Circuits, Systems and Computers
πŸ“… Year: 2024
πŸ”’ Citations: 0


πŸ“„ Article:
Title: KeyLight: Intelligent Traffic Signal Control Method Based on Improved Graph Neural Network
πŸ‘¨β€πŸ”¬ Authors: Sun, Yi; Lin, Kaixiang; Bashir, Ali Kashif
πŸ“š Journal: IEEE Transactions on Consumer Electronics
πŸ“… Year: 2024
πŸ”’ Citations: 6


Negalign Wake Hundera | Cybersecurity | Best Researcher Award

Assist. Prof. Dr. Negalign Wake Hundera | Cybersecurity | Best Researcher Award

Postdoctoral Researcher of Zhejiang Normal University, China

Dr. Negalign Wake Hundera is a seasoned researcher and educator with a Ph.D. in Software Engineering and extensive experience in network security and IoT technologies. His career reflects a strong commitment to advancing research and teaching in technology-driven fields. With a proven track record in publishing, guiding students, and leading technical teams, he is now seeking opportunities to further his research and contribute to innovative projects in academia or industry. πŸŒπŸ”πŸ’»πŸ“š

Publication Profile :Β 

Scopus

πŸŽ“ Educational Background :

Negalign Wake Hundera completed his Ph.D. in Software Engineering at the University of Electronic Science and Technology of China (UESTC), Chengdu, in June 2021, under the guidance of Prof. Hu Xiong. Prior to this, he earned an M.Sc. in Computer Science and Technology from UESTC in 2016 and a Bachelor’s degree in Information Technology from Jimma University, Ethiopia, in 2009.

πŸ’Ό Professional Experience :

Negalign’s professional journey spans roles in academia and industry. He has served as a Postdoctoral Research Fellow at Zhejiang Normal University, Jinhua, China, from August 2022 to August 2024, contributing to high-impact journals and guiding students through their research projects. Before this, he was an Assistant Professor and Lecturer at Wolkite University, Ethiopia, where he not only taught but also led significant projects related to ICT infrastructure and network security. He has also held a leadership position as the Information Communication and Network Infrastructure Team Leader at Wolkite University, overseeing the development and management of the institution’s network infrastructure.

πŸ“š Research Interests :Β 

Negalign’s research focuses on several cutting-edge areas including network security, public key cryptography, information security, IoT, wireless sensor networks, cloud computing, deep learning, real-time object detection, vehicular networks, and UAV networks. His work aims to apply these technologies in practical fields such as healthcare, intelligent transportation systems, smart agriculture, and cybersecurity.

πŸ“ Publication Top Notes :

  1. Hundera, N. W., Aftab, M. U., Mesfin, D., Xu, H., & Zhu, X. (2024). An efficient heterogeneous online/offline anonymous certificateless signcryption with proxy re-encryption for Internet of Vehicles. Vehicular Communications, 49, 100811. [Open Access]
  2. Hundera, N. W., Shumeng, W., Mesfin, D., Xu, H., & Zhu, X. (2024). An efficient online/offline heterogeneous proxy signcryption for secure communication in UAV networks. Journal of King Saud University – Computer and Information Sciences, 36(5), 102044. [Open Access]
  3. Leka, H. L., Fengli, Z., Kenea, A. T., Tohye, T. G., Tegene, A. T., & Hundera, N. W. (2023). PSO-Based Ensemble Meta-Learning Approach for Cloud Virtual Machine Resource Usage Prediction. Symmetry, 15(3), 613. [Open Access]
  4. Tohye, T. G., Qin, Z., Leka, H. L., & Hundera, N. W. (2023). Glaucoma Detection Using Convolutional Neural Network (CNN). In Proceedings of the 20th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP 2023).
  5. Assefa, A. A., Tian, W., Hundera, N. W., & Aftab, M. U. (2022). Crowd Density Estimation in Spatial and Temporal Distortion Environment Using Parallel Multi-Size Receptive Fields and Stack Ensemble Meta-Learning. Symmetry, 14(10), 2159. [Open Access]
  6. Hundera, N. W., Jin, C., Geressu, D. M., Olanrewaju, O. A., & Xiong, H. (2022). Proxy-based public-key cryptosystem for secure and efficient IoT-based cloud data sharing in the smart city. Multimedia Tools and Applications, 81(21), 29673–29697.
  7. Hundera, N. W., Jin, C., Aftab, M. U., Mesfin, D., & Kumar, S. (2021). Secure outsourced attribute-based signcryption for cloud-based Internet of Vehicles in a smart city. Annales des Telecommunications/Annals of Telecommunications, 76(9-10), 605–616.
  8. Leka, H. L., Fengli, Z., Kenea, A. T., Atandoh, P., & Hundera, N. W. (2021). A Hybrid CNN-LSTM Model for Virtual Machine Workload Forecasting in Cloud Data Center. In Proceedings of the 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP 2021), 474–478.
  9. Hundera, N. W., Mei, Q., Xiong, H., & Geressu, D. M. (2020). A secure and efficient identity-based proxy signcryption in cloud data sharing. KSII Transactions on Internet and Information Systems, 14(1), 455–472.
  10. Oluwasanmi, A., Akeem, S., Jehoaida, J., Baagere, E., Qin, Z., & Hundera, N. W. (2019). Sequential multi-kernel convolutional recurrent network for sentiment classification. In Proceedings of the IEEE International Conference on Software Engineering and Service Sciences (ICSESS), 129–133.