Yi Sun | Information Security | Best Researcher Award

Dr. Yi Sun | Information Security | Best Researcher Award

Associate Professor at Beijing University of Posts and Telecommunications, China

Dr. Yi Sun is an Associate Professor at the School of Computer Science (National Pilot Software Engineering School), Beijing University of Posts and Telecommunications, China. She is a prominent researcher in the field of information security with a focus on cryptography, secure multi-party computation, blockchain, and big data security. With a strong presence in international collaborations, over 150 journal publications, 170+ patent applications, and numerous honors, Dr. Sun has established herself as a global leader in cybersecurity and privacy computing.

Publication ProfileΒ 

Scopus

Educational Background πŸŽ“

  • Ph.D. in Computer Science
    Institution: State Key Laboratory of Network and Switching Technology, Beijing University of Posts and Telecommunications
    Graduation Date: June 2015

Professional Experience πŸ’Ό

  • Associate Professor
    School of Computer Science, Beijing University of Posts and Telecommunications (Since July 2015)

    • Oversees national and international research and industry projects (100+ including National 863, Key R&D, and enterprise-funded).

    • Editorial roles in reputed journals and reviewer for SCI-indexed publications.

    • Active participation in organizing and chairing major international conferences such as IEEE GLOBECOM, ICME, DSC, CAIML, CNCIS, ICAIIC, etc.

Research Interests πŸ”¬

  • Cryptography

  • Network Security

  • Secure Multi-party Computation

  • Blockchain Technology

  • Big Data Security

  • Privacy-Preserving Computation

  • RISC-V Processor Security

Awards and HonorsπŸ†βœ¨

  • Top 10 Pioneers of Privacy Computing (2022)

  • Excellent Scientific Research Teacher, Ministry of Education’s Class B Laboratory

  • Excellent Instructor, 7th China International “Internet+” Innovation and Entrepreneurship Competition (2021)

  • Outstanding Instructor, C4 Network Technology Challenge (2023)

  • Excellent Paper, 2023 β€œAcademic Achievements in Frontier IoT in the Capital”

  • 4 ESI Highly Cited Papers

  • Multiple honors for academic and research excellence

Conclusion🌟

Dr. Yi Sun’s career is marked by groundbreaking research, high-impact publications, and international collaboration. Her work in information security has led to real-world applications in secure computing and microarchitecture protection. Through her extensive publication record, editorial contributions, and successful leadership in over 100 research and industrial projects, she has played a critical role in shaping the future of cybersecurity technologies. Dr. Sun’s achievements and accolades make her a highly deserving candidate for the Best Researcher Award.

Publications πŸ“š

πŸ“„ Article:
Title: ADPF: Anti-inference differentially private protocol for federated learning
πŸ‘¨β€πŸ”¬ Authors: Zhao, Zirun; Lin, Zhaowen; Sun, Yi
πŸ“š Journal: Computer Networks
πŸ“… Year: 2025
πŸ”’ Citations: 0


πŸ“„ Article:
Title: A combined side-channel and transient execution attack scheme on RISC-V processors
πŸ‘¨β€πŸ”¬ Authors: Dong, Renhai; Cui, Baojiang; Sun, Yi; Yang, Jun
πŸ“š Journal: Computers and Security
πŸ“… Year: 2025
πŸ”’ Citations: 0


πŸ“„ Article:
Title: Improved twin support vector machine algorithm and applications in classification problems
πŸ‘¨β€πŸ”¬ Authors: Sun, Yi; Wang, Zhouyang
πŸ“š Journal: China Communications
πŸ“… Year: 2024
πŸ”’ Citations: 0


πŸ“„ Article:
Title: AdaDpFed: A Differentially Private Federated Learning Algorithm with Adaptive Noise on Non-IID Data
πŸ‘¨β€πŸ”¬ Authors: Zhao, Zirun; Sun, Yi; Bashir, Ali Kashif; Lin, Zhaowen
πŸ“š Journal: IEEE Transactions on Consumer Electronics
πŸ“… Year: 2024
πŸ”’ Citations: 7


πŸ“„ Article:
Title: BTIDEC: A Novel Detection Scheme for CPU Security of Consumer Electronics
πŸ‘¨β€πŸ”¬ Authors: Dong, Renhai; Cui, Baojiang; Sun, Yi; Yang, Jun
πŸ“š Journal: IEEE Transactions on Consumer Electronics
πŸ“… Year: 2024
πŸ”’ Citations: 0


πŸ“„ Article:
Title: Ins Finder: A Practical CPU Undocumented Instruction Detection Framework
πŸ‘¨β€πŸ”¬ Authors: Dong, Renhai; Cui, Baojiang; Sun, Yi; Yang, Jun
πŸ“š Journal: Journal of Circuits, Systems and Computers
πŸ“… Year: 2024
πŸ”’ Citations: 0


πŸ“„ Article:
Title: KeyLight: Intelligent Traffic Signal Control Method Based on Improved Graph Neural Network
πŸ‘¨β€πŸ”¬ Authors: Sun, Yi; Lin, Kaixiang; Bashir, Ali Kashif
πŸ“š Journal: IEEE Transactions on Consumer Electronics
πŸ“… Year: 2024
πŸ”’ Citations: 6


Touhid Bhuiyan | Cybersecurity | Outstanding Scientist Award

Prof. Dr. Touhid Bhuiyan | Cybersecurity | Outstanding Scientist Award

Professor at Washington University of Science and Technology, United States

Dr. T. Bhuiyan is a distinguished academic and consultant in Cyber Security, with extensive experience in teaching, research, and industry. His contributions span several continents and include a wealth of publications and keynotes, focusing on the transformative role of technology in education and security. πŸŒπŸ”πŸ“–

Publication Profile :Β 

Orcid

 

πŸŽ“ Educational Background :

Dr. T. Bhuiyan is a seasoned professional in Cyber Security, Software Engineering, and Databases, with over 27 years of experience in teaching and research across the USA, Australia, and Bangladesh. He holds a PhD in Computer Science from Queensland University of Technology, Australia, along with an MSc from The American University in London and a BSc (Hons) in Computing & Information Systems from the University of London. His education is complemented by numerous certifications, including Certified Information System Auditor (CISA) and Certified Ethical Hacker (CEH).

πŸ’Ό Professional Experience :

In his professional journey, Dr. Bhuiyan has served as a Professor of Cyber Security at Washington University of Science and Technology, and previously held leadership roles at Daffodil International University and Polytechnic Institute Australia. His consulting experience includes a significant role as a National Consultant for Cyber Security with the UNDP and the Government of Bangladesh, where he led initiatives to enhance cyber security measures for government portals. Dr. Bhuiyan has delivered keynote speeches at international conferences and has authored multiple influential publications, including books on intelligent recommendation systems and cyber security. His research interests lie at the intersection of information security, trust management, and e-Learning, exploring how technology can enhance educational practices and health informatics.

πŸ“š Research Interests :Β 

πŸ” Information Security
🌐 Social Networks
πŸ”’ Trust Management
πŸ’» Database Management
πŸ₯ e-Health
πŸ“š e-Learning

πŸ“ Publication Top Notes :

  1. Hossain, M.A., Rahman, M.Z., Bhuiyan, T., Moni, M.A. (2024). Identification of Biomarkers and Molecular Pathways Implicated in Smoking and COVID-19 Associated Lung Cancer Using Bioinformatics and Machine Learning Approaches. International Journal of Environmental Research and Public Health, 21(11), 1392.
  2. Hanip, A., Sarower, A.H., Bhuiyan, T. (2024). The Transformative Role of Generative AI in Education: Challenges and Opportunities for Enhancing Student Learning and Assessment Through Mass Integration. International Journal of Advanced Research in Engineering and Technology, 15(5), 161-175.
  3. Mahmud, A., Sarower, A.H., Sohel, A., Assaduzzaman, M., Bhuiyan, T. (2024). Adoption of ChatGPT by university students for academic purposes: Partial least square, artificial neural network, deep neural network and classification algorithms approach. Array, 21, 100339.
  4. Zannah, T.B., Abdulla-Hil-Kafi, M., Sheakh, M.A., Hasan, M.Z., Shuva, T.F., Bhuiyan, T., Rahman, M.T., Khan, R.T., Kaiser, M.S., Whaiduzzaman, M. (2024). Bayesian Optimized Machine Learning Model for Automated Eye Disease Classification from Fundus Images. Computation, 12(190).
  5. Bishshash, P., Nirob, M.A.S., Shikder, M.H., Sarower, M.A.H., Bhuiyan, T., Noori, S.R.H. (2024). A Comprehensive Cotton Leaf Disease Dataset for Enhanced Detection and Classification. Data in Brief, 57, 110913.
  6. Tamal, M.A., Islam, M.K., Bhuiyan, T., Sattar, A., Prince, N.U. (2024). Unveiling suspicious phishing attacks: enhancing detection with an optimal feature vectorization algorithm and supervised machine learning. Frontiers in Computer Science, 6, 1428013.
  7. Tamal, M.A., Islam, M.K., Bhuiyan, T., Sattar, A. (2024). Dataset of suspicious phishing URL detection. Frontiers in Computer Science, 6, 1308634.
  8. Sholi, R.T., Sarker, …, Bhuiyan, T., Shakil, S.M.K.A., Ahmed, M.F. (2024). Application of Computer Vision and Mobile Systems in Education: A Systematic Review. International Journal of Interactive Mobile Technologies, 18(1), 168-187.
  9. Ahad, M.T., Li, Y., Song, B., Bhuiyan, T. (2023). Comparison of CNN-based deep learning architectures for rice diseases classification. Artificial Intelligence in Agriculture, 9(1), 22-35.
  10. Basar, M.A., Hosen, M.F., Paul, B.K., …, Bhuiyan, T. (2023). Identification of drug and protein-protein interaction network among stress and depression: A bioinformatics approach. Informatics in Medicine Unlocked, 37, 101174.
  11. Paul, S.G., Saha, A., Arefin, M.S., Bhuiyan, T., …, Moni, M.A. (2023). A Comprehensive Review of Green Computing: Past, Present, and Future Research. IEEE Access, 11, 87445-87494.
  12. Sarker, S., Arefin, M.S., Kowsher, M., Bhuiyan, T., Dhar, P.K., Kwon, O.J. (2022). A Comprehensive Review on Big Data for Industries: Challenges and Opportunities. IEEE Access, 11, 744-769.
  13. Asaduzzaman, S., Rehana, H., Bhuiyan, T., Eid, M.M.A., Rashed, A.N.Z. (2022). Extremely high birefringent slotted core umbrella-shaped photonic crystal fiber in terahertz regime. Applied Physics B, 128(148).
  14. Bhuiyan, T. (2022). Transitioning from education to work during the 4th Industrial Revolution. AIB Review, 7, Adelaide, Australia.
  15. Ali, M.N.B., Saudi, M.M., Bhuiyan, T., Ahmad, A.B., Islam, M.N. (2021). NIPSA Intrusion Classification. Journal of Engineering Science and Technology, 16(4), 3534-3547.