Kyung-Hyune Rhee | Information Security | Best Researcher Award

Prof. Dr. Kyung-Hyune Rhee | Information Security | Best Researcher Award

Professor Emeritus at Pukyong National University, South Sudan

Professor Kyung-Hyune Rhee is a renowned academic and researcher in computer engineering, specializing in information security and blockchain applications. As Professor Emeritus at Pukyong National University, he has led critical advancements in cybersecurity, policy development, and technology education in South Korea. With a strong foundation in scientific research and government advisory roles, Professor Rhee has made substantial contributions to both academia and national cyber policy.

Publication Profile 

Scopus

Educational Background 🎓

  • Master of Science (M.S.), KAIST (Korea Advanced Institute of Science and Technology)

  • Doctor of Philosophy (Ph.D.), KAIST (Korea Advanced Institute of Science and Technology)

Professional Experience 💼

Current Positions

  • Professor, Department of IT Convergence and Application Engineering, Pukyong National University

  • Committee Member, ISMS/ISMS-P Certification

  • Evaluation Member, National Cyber Security Center

  • Advisory Member, Southeast Information Security Support Center

  • Member, Busan Metropolitan City Special Committee on the 4th Industrial Revolution

  • Advisory Member, Defense Security Research Institute

  • Policy Advisor, Korea Multimedia Society

  • Expert Member, Future Security Forum

Former Positions

  • President, Korea Institute of Information Security and Cryptology

  • Non-Executive Director, Korea Education and Research Information Service

  • Committee Member, Busan Metropolitan City Information Committee

  • Dean of Academic Affairs, CPSC (Philippine-based Intergovernmental Organization)

  • Director, Information & Computing Center, Pukyong National University

  • Visiting Professor, University of California, Irvine

  • Senior Researcher, Electronics and Telecommunications Research Institute (ETRI)

Research Interests 🔬

  • Computer Engineering

  • Information Security

  • Blockchain Applications

  • Cybersecurity Policy and Certification

  • Cryptographic Protocols and Network Security

Awards and Honors🏆✨

  • July 2015: Commendation from the Minister of Science, ICT and Future Planning (for strengthening cybersecurity capabilities)

  • November 2018: Commendation from the Minister of the Interior and Safety (for contributions to security certification)

  • July 2021: Order of Service Merit (Geunjeong Medal) – awarded on Information Security Day

Conclusion🌟

Professor Kyung-Hyune Rhee has established himself as a pivotal figure in South Korea’s digital transformation, particularly in the development of national cybersecurity strategies and the integration of blockchain technologies. His extensive academic output—over 450 research papers, 25+ books, and 20 patents—reflects a career dedicated to both scientific excellence and public service. With ongoing influence through advisory roles and policy development, he continues to contribute significantly to the global information security community.

Publications 📚

  1. 🧩 Hyperledger Fabric-Powered Network Slicing Handover Authentication
     I.T., Etienne Igugu Tshisekedi · M., Firdaus Muhammad · C.N.Z., Latt Cho Nwe Zin · S., Noh Siwan · K., Rhee Kyunghyune
     📚 Information Systems Frontiers, 2024
     🔗 0 Citations


  2. 🧠 Transparent and Accountable Training Data Sharing in Decentralized Machine Learning Systems
     S., Noh Siwan · K., Rhee Kyunghyune
     📚 Computers, Materials and Continua, 2024
     🔗 0 Citations


  3. 🔒 A Blockchain-Based Auditable Semi-Asynchronous Federated Learning for Heterogeneous Clients
     Q., Zhuohao Qian · M., Firdaus Muhammad · S., Noh Siwan · K., Rhee Kyunghyune
     📚 IEEE Access, 2023
     🔗 3 Citations


  4. 🚗 A Blockchain-Assisted Distributed Edge Intelligence for Privacy-Preserving Vehicular Networks
     M., Firdaus Muhammad · H.T., Larasati Harashta Tatimma · K., Rhee Kyunghyune
     📚 Computers, Materials and Continua, 2023
     🔗 4 Citations


  5. 🤖 Personalized Federated Learning for Heterogeneous Data: A Distributed Edge Clustering Approach
     M., Firdaus Muhammad · S., Noh Siwan · Z., Qian Zhuohao · H.T., Larasati Harashta Tatimma · K., Rhee Kyunghyune
     📚 Mathematical Biosciences and Engineering, 2023
     🔗 7 Citations


  6. 💬 Commentary: Integrated Blockchain–Deep Learning Approach for Analyzing the Electronic Health Records Recommender System
     S., Noh Siwan · M., Firdaus Muhammad · K., Rhee Kyunghyune
     📚 Note (Open Access)
     🔗 0 Citations


  7. 🏥 Secure Federated Learning with Blockchain and Homomorphic Encryption for Healthcare Data Sharing
     M., Firdaus Muhammad · K., Rhee Kyunghyune
     🔗 0 Citations


  8. 👥 Towards Trustworthy Collaborative Healthcare Data Sharing
     M., Firdaus Muhammad · K., Rhee Kyunghyune
     🔗 3 Citations


  9. 🧾 A Blockchain-Based CCP Data Integrity Auditing Protocol for Smart HACCP
     S., Noh Siwan · M., Firdaus Muhammad · Z., Qian Zhuohao · K., Rhee Kyunghyune
     🔗 1 Citation


  10. 🧠 BPFL: Blockchain-Enabled Distributed Edge Cluster for Personalized Federated Learning
     M., Firdaus Muhammad · S., Noh Siwan · Z., Qian Zhuohao · K., Rhee Kyunghyune
     🔗 6 Citations


 

 

 

 

Stefano Galantucci | Cybersecurity | Best Researcher Award

Dr. Stefano Galantucci | Cybersecurity | Best Researcher Award

Adjunct Professor (Lecturer) at University of Bari Aldo Moro, Italy

Dr. Stefano Galantucci is a cybersecurity researcher and academic affiliated with the University of Bari Aldo Moro, Italy. Born on October 28, 1996, he holds a Ph.D. in Computer Science and specializes in network security, cryptography, malware detection, and firewall optimization. With extensive experience in teaching, research, and publication, Dr. Galantucci is an active contributor to both academic and applied cybersecurity communities.

Publication Profile 

Scopus

Orcid

Educational Background 🎓

  • 2024 – Ph.D. in Computer Science,
    University of Bari Aldo Moro
    – XXXVIth cycle, focus on cybersecurity and computer science research.

  • 2020 – Master’s Degree (MSc) in Cybersecurity,
    University of Bari “Aldo Moro”
    – Graduated cum laude with honors and special mention by the commission.

  • 2018 – Bachelor’s Degree (BSc) in Computer Science,
    University of Bari “Aldo Moro”
    – Graduated cum laude.

Professional Experience 💼

  • 2024–Present – Research Fellow,
    University of Bari Aldo Moro
    – Working on the FAIR project.

  • 2023–Present – Examination Board Member,
    University of Bari Aldo Moro
    – Courses: Biometric Systems, Application Security, Computer Architecture & OS.

  • 2023 – Adjunct Professor (CyberChallenge Course),
    University of Bari Aldo Moro
    – Taught Cryptography and Hardware Security (24 hours, 2 ECTS).

  • 2022–Present – Adjunct Professor of Cryptography,
    MSc in Cybersecurity, University of Bari Aldo Moro
    – 6 ECTS (62 hours).

  • 2021–Present – Member, ISLab Research Group,
    University of Bari Aldo Moro
    – Cybersecurity contact person.

Research Interests 🔬

  • Cryptography and hardware security

  • Malware detection and classification

  • Network intrusion detection (NIDS)

  • Firewall policy optimization

  • Anomaly detection and AI-driven threat detection

  • DevSecOps and secure software development practices

  • Blockchain analysis

  • Adversarial neural networks in security (e.g., GANs)

Awards and Honors🏆✨

  • Special mention by the MSc degree commission (2020)

  • Full marks and honors in both MSc and BSc degrees

Conclusion🌟

Dr. Stefano Galantucci is a dynamic and accomplished researcher in the field of cybersecurity, with a strong academic background, diverse teaching experience, and a rich portfolio of high-impact publications. His work bridges theoretical foundations and real-world applications, particularly in cryptography, malware detection, and network defense systems. A respected member of the research community, Dr. Galantucci actively contributes to scientific progress through both his scholarly output and his involvement in peer review for top-tier journals. With his growing influence and commitment to innovation, he stands out as a promising leader in the evolving landscape of cybersecurity research.

Publications 📚

  • 🔐 CARIOCA: Prioritizing the Use of IoC by Threats Assessment Shared on the MISP Platform
    📘 International Journal of Information Security, 2025-04
    [DOI: 10.1007/s10207-025-01006-2]
    👥 Piero Delvecchio, Stefano Galantucci, Andrea Iannacone, Giuseppe Pirlo


  • 🧮 FOBICS: Assessing Project Security Level through a Metrics Framework that Evaluates DevSecOps Performance
    📘 Information and Software Technology, 2025-02
    [DOI: 10.1016/j.infsof.2024.107605]
    👥 Alessandro Caniglia, Vincenzo Dentamaro, Stefano Galantucci, Donato Impedovo


  • 🛡️ PROGESI: A PROxy Grammar to Enhance Web Application Firewall for SQL Injection Prevention
    📘 IEEE Access, 2024
    [DOI: 10.1109/ACCESS.2024.3438092]
    👥 Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo


  • 🌐 Automatic Decision Tree-Based NIDPS Ruleset Generation for DoS/DDoS Attacks
    📘 Journal of Information Security and Applications, 2024-05
    [DOI: 10.1016/j.jisa.2024.103736]
    👥 Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo


  • 🧬 YAMME: A YAra-byte-signatures Metamorphic Mutation Engine
    📘 IEEE Transactions on Information Forensics and Security, 2023
    [DOI: 10.1109/TIFS.2023.3294059]
    👥 Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo


  • 🧠 Comparing Deep Learning and Shallow Learning Techniques for API Calls Malware Prediction
    📘 Applied Sciences, 2022-02
    [DOI: 10.3390/app12031645]
    👥 Angelo Cannarile, Vincenzo Dentamaro, Stefano Galantucci, Andrea Iannacone, Donato Impedovo, Giuseppe Pirlo


  • 💰 BACH: A Tool for Analyzing Blockchain Transactions Using Address Clustering Heuristics
    📘 Information, 2024-09-26
    [DOI: 10.3390/info15100589]
    👥 Michele Caringella, Francesco Violante, Francesco De Lucci, Stefano Galantucci, Matteo Costantini


  • 🔑 One Time User Key: A User-Based Secret Sharing XOR-ed Model for Multiple User Cryptography
    📘 IEEE Access, 2021
    [DOI: 10.1109/ACCESS.2021.3124637]
    👥 Stefano Galantucci, Donato Impedovo, Giuseppe Pirlo


  • 📉 Combining Unsupervised Approaches for Near Real-Time Network Traffic Anomaly Detection
    📘 Applied Sciences, 2022-02
    [DOI: 10.3390/app12031759]
    👥 Francesco Carrera, Vincenzo Dentamaro, Stefano Galantucci, Andrea Iannacone, Donato Impedovo, Giuseppe Pirlo


  • 📈 Ensemble Consensus: An Unsupervised Algorithm for Anomaly Detection in Network Security Data
    📄 CEUR Workshop Proceedings, 2021
    👥 Vincenzo Dentamaro, V.N. Convertini, Stefano Galantucci, P. Giglio, T. Palmisano, Giuseppe Pirlo


  • 🧭 A Case Study of Navigation System Assistance with Safety Purposes in the Context of Covid-19
    📘 Lecture Notes in Computer Science, 2021
    [DOI: 10.1007/978-3-030-85607-6_35]
    👥 Galantucci, S.; Giglio, P.; Dentamaro, V.; Pirlo, G.


  • 🔥 Firewall Optimization: An Innovative Two-Stage Algorithm to Optimize Firewall Rule Ordering
    📘 Computers & Security, 2023-11
    [DOI: 10.1016/j.cose.2023.103423]
    👥 Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo


Yi Sun | Information Security | Best Researcher Award

Dr. Yi Sun | Information Security | Best Researcher Award

Associate Professor at Beijing University of Posts and Telecommunications, China

Dr. Yi Sun is an Associate Professor at the School of Computer Science (National Pilot Software Engineering School), Beijing University of Posts and Telecommunications, China. She is a prominent researcher in the field of information security with a focus on cryptography, secure multi-party computation, blockchain, and big data security. With a strong presence in international collaborations, over 150 journal publications, 170+ patent applications, and numerous honors, Dr. Sun has established herself as a global leader in cybersecurity and privacy computing.

Publication Profile 

Scopus

Educational Background 🎓

  • Ph.D. in Computer Science
    Institution: State Key Laboratory of Network and Switching Technology, Beijing University of Posts and Telecommunications
    Graduation Date: June 2015

Professional Experience 💼

  • Associate Professor
    School of Computer Science, Beijing University of Posts and Telecommunications (Since July 2015)

    • Oversees national and international research and industry projects (100+ including National 863, Key R&D, and enterprise-funded).

    • Editorial roles in reputed journals and reviewer for SCI-indexed publications.

    • Active participation in organizing and chairing major international conferences such as IEEE GLOBECOM, ICME, DSC, CAIML, CNCIS, ICAIIC, etc.

Research Interests 🔬

  • Cryptography

  • Network Security

  • Secure Multi-party Computation

  • Blockchain Technology

  • Big Data Security

  • Privacy-Preserving Computation

  • RISC-V Processor Security

Awards and Honors🏆✨

  • Top 10 Pioneers of Privacy Computing (2022)

  • Excellent Scientific Research Teacher, Ministry of Education’s Class B Laboratory

  • Excellent Instructor, 7th China International “Internet+” Innovation and Entrepreneurship Competition (2021)

  • Outstanding Instructor, C4 Network Technology Challenge (2023)

  • Excellent Paper, 2023 “Academic Achievements in Frontier IoT in the Capital”

  • 4 ESI Highly Cited Papers

  • Multiple honors for academic and research excellence

Conclusion🌟

Dr. Yi Sun’s career is marked by groundbreaking research, high-impact publications, and international collaboration. Her work in information security has led to real-world applications in secure computing and microarchitecture protection. Through her extensive publication record, editorial contributions, and successful leadership in over 100 research and industrial projects, she has played a critical role in shaping the future of cybersecurity technologies. Dr. Sun’s achievements and accolades make her a highly deserving candidate for the Best Researcher Award.

Publications 📚

📄 Article:
Title: ADPF: Anti-inference differentially private protocol for federated learning
👨‍🔬 Authors: Zhao, Zirun; Lin, Zhaowen; Sun, Yi
📚 Journal: Computer Networks
📅 Year: 2025
🔢 Citations: 0


📄 Article:
Title: A combined side-channel and transient execution attack scheme on RISC-V processors
👨‍🔬 Authors: Dong, Renhai; Cui, Baojiang; Sun, Yi; Yang, Jun
📚 Journal: Computers and Security
📅 Year: 2025
🔢 Citations: 0


📄 Article:
Title: Improved twin support vector machine algorithm and applications in classification problems
👨‍🔬 Authors: Sun, Yi; Wang, Zhouyang
📚 Journal: China Communications
📅 Year: 2024
🔢 Citations: 0


📄 Article:
Title: AdaDpFed: A Differentially Private Federated Learning Algorithm with Adaptive Noise on Non-IID Data
👨‍🔬 Authors: Zhao, Zirun; Sun, Yi; Bashir, Ali Kashif; Lin, Zhaowen
📚 Journal: IEEE Transactions on Consumer Electronics
📅 Year: 2024
🔢 Citations: 7


📄 Article:
Title: BTIDEC: A Novel Detection Scheme for CPU Security of Consumer Electronics
👨‍🔬 Authors: Dong, Renhai; Cui, Baojiang; Sun, Yi; Yang, Jun
📚 Journal: IEEE Transactions on Consumer Electronics
📅 Year: 2024
🔢 Citations: 0


📄 Article:
Title: Ins Finder: A Practical CPU Undocumented Instruction Detection Framework
👨‍🔬 Authors: Dong, Renhai; Cui, Baojiang; Sun, Yi; Yang, Jun
📚 Journal: Journal of Circuits, Systems and Computers
📅 Year: 2024
🔢 Citations: 0


📄 Article:
Title: KeyLight: Intelligent Traffic Signal Control Method Based on Improved Graph Neural Network
👨‍🔬 Authors: Sun, Yi; Lin, Kaixiang; Bashir, Ali Kashif
📚 Journal: IEEE Transactions on Consumer Electronics
📅 Year: 2024
🔢 Citations: 6


Touhid Bhuiyan | Cybersecurity | Outstanding Scientist Award

Prof. Dr. Touhid Bhuiyan | Cybersecurity | Outstanding Scientist Award

Professor at Washington University of Science and Technology, United States

Dr. T. Bhuiyan is a distinguished academic and consultant in Cyber Security, with extensive experience in teaching, research, and industry. His contributions span several continents and include a wealth of publications and keynotes, focusing on the transformative role of technology in education and security. 🌍🔐📖

Publication Profile : 

Orcid

 

🎓 Educational Background :

Dr. T. Bhuiyan is a seasoned professional in Cyber Security, Software Engineering, and Databases, with over 27 years of experience in teaching and research across the USA, Australia, and Bangladesh. He holds a PhD in Computer Science from Queensland University of Technology, Australia, along with an MSc from The American University in London and a BSc (Hons) in Computing & Information Systems from the University of London. His education is complemented by numerous certifications, including Certified Information System Auditor (CISA) and Certified Ethical Hacker (CEH).

💼 Professional Experience :

In his professional journey, Dr. Bhuiyan has served as a Professor of Cyber Security at Washington University of Science and Technology, and previously held leadership roles at Daffodil International University and Polytechnic Institute Australia. His consulting experience includes a significant role as a National Consultant for Cyber Security with the UNDP and the Government of Bangladesh, where he led initiatives to enhance cyber security measures for government portals. Dr. Bhuiyan has delivered keynote speeches at international conferences and has authored multiple influential publications, including books on intelligent recommendation systems and cyber security. His research interests lie at the intersection of information security, trust management, and e-Learning, exploring how technology can enhance educational practices and health informatics.

📚 Research Interests : 

🔍 Information Security
🌐 Social Networks
🔒 Trust Management
💻 Database Management
🏥 e-Health
📚 e-Learning

📝 Publication Top Notes :

  1. Hossain, M.A., Rahman, M.Z., Bhuiyan, T., Moni, M.A. (2024). Identification of Biomarkers and Molecular Pathways Implicated in Smoking and COVID-19 Associated Lung Cancer Using Bioinformatics and Machine Learning Approaches. International Journal of Environmental Research and Public Health, 21(11), 1392.
  2. Hanip, A., Sarower, A.H., Bhuiyan, T. (2024). The Transformative Role of Generative AI in Education: Challenges and Opportunities for Enhancing Student Learning and Assessment Through Mass Integration. International Journal of Advanced Research in Engineering and Technology, 15(5), 161-175.
  3. Mahmud, A., Sarower, A.H., Sohel, A., Assaduzzaman, M., Bhuiyan, T. (2024). Adoption of ChatGPT by university students for academic purposes: Partial least square, artificial neural network, deep neural network and classification algorithms approach. Array, 21, 100339.
  4. Zannah, T.B., Abdulla-Hil-Kafi, M., Sheakh, M.A., Hasan, M.Z., Shuva, T.F., Bhuiyan, T., Rahman, M.T., Khan, R.T., Kaiser, M.S., Whaiduzzaman, M. (2024). Bayesian Optimized Machine Learning Model for Automated Eye Disease Classification from Fundus Images. Computation, 12(190).
  5. Bishshash, P., Nirob, M.A.S., Shikder, M.H., Sarower, M.A.H., Bhuiyan, T., Noori, S.R.H. (2024). A Comprehensive Cotton Leaf Disease Dataset for Enhanced Detection and Classification. Data in Brief, 57, 110913.
  6. Tamal, M.A., Islam, M.K., Bhuiyan, T., Sattar, A., Prince, N.U. (2024). Unveiling suspicious phishing attacks: enhancing detection with an optimal feature vectorization algorithm and supervised machine learning. Frontiers in Computer Science, 6, 1428013.
  7. Tamal, M.A., Islam, M.K., Bhuiyan, T., Sattar, A. (2024). Dataset of suspicious phishing URL detection. Frontiers in Computer Science, 6, 1308634.
  8. Sholi, R.T., Sarker, …, Bhuiyan, T., Shakil, S.M.K.A., Ahmed, M.F. (2024). Application of Computer Vision and Mobile Systems in Education: A Systematic Review. International Journal of Interactive Mobile Technologies, 18(1), 168-187.
  9. Ahad, M.T., Li, Y., Song, B., Bhuiyan, T. (2023). Comparison of CNN-based deep learning architectures for rice diseases classification. Artificial Intelligence in Agriculture, 9(1), 22-35.
  10. Basar, M.A., Hosen, M.F., Paul, B.K., …, Bhuiyan, T. (2023). Identification of drug and protein-protein interaction network among stress and depression: A bioinformatics approach. Informatics in Medicine Unlocked, 37, 101174.
  11. Paul, S.G., Saha, A., Arefin, M.S., Bhuiyan, T., …, Moni, M.A. (2023). A Comprehensive Review of Green Computing: Past, Present, and Future Research. IEEE Access, 11, 87445-87494.
  12. Sarker, S., Arefin, M.S., Kowsher, M., Bhuiyan, T., Dhar, P.K., Kwon, O.J. (2022). A Comprehensive Review on Big Data for Industries: Challenges and Opportunities. IEEE Access, 11, 744-769.
  13. Asaduzzaman, S., Rehana, H., Bhuiyan, T., Eid, M.M.A., Rashed, A.N.Z. (2022). Extremely high birefringent slotted core umbrella-shaped photonic crystal fiber in terahertz regime. Applied Physics B, 128(148).
  14. Bhuiyan, T. (2022). Transitioning from education to work during the 4th Industrial Revolution. AIB Review, 7, Adelaide, Australia.
  15. Ali, M.N.B., Saudi, M.M., Bhuiyan, T., Ahmad, A.B., Islam, M.N. (2021). NIPSA Intrusion Classification. Journal of Engineering Science and Technology, 16(4), 3534-3547.

 

 

 

 

Negalign Wake Hundera | Cybersecurity | Best Researcher Award

Assist. Prof. Dr. Negalign Wake Hundera | Cybersecurity | Best Researcher Award

Postdoctoral Researcher of Zhejiang Normal University, China

Dr. Negalign Wake Hundera is a seasoned researcher and educator with a Ph.D. in Software Engineering and extensive experience in network security and IoT technologies. His career reflects a strong commitment to advancing research and teaching in technology-driven fields. With a proven track record in publishing, guiding students, and leading technical teams, he is now seeking opportunities to further his research and contribute to innovative projects in academia or industry. 🌍🔐💻📚

Publication Profile : 

Scopus

🎓 Educational Background :

Negalign Wake Hundera completed his Ph.D. in Software Engineering at the University of Electronic Science and Technology of China (UESTC), Chengdu, in June 2021, under the guidance of Prof. Hu Xiong. Prior to this, he earned an M.Sc. in Computer Science and Technology from UESTC in 2016 and a Bachelor’s degree in Information Technology from Jimma University, Ethiopia, in 2009.

💼 Professional Experience :

Negalign’s professional journey spans roles in academia and industry. He has served as a Postdoctoral Research Fellow at Zhejiang Normal University, Jinhua, China, from August 2022 to August 2024, contributing to high-impact journals and guiding students through their research projects. Before this, he was an Assistant Professor and Lecturer at Wolkite University, Ethiopia, where he not only taught but also led significant projects related to ICT infrastructure and network security. He has also held a leadership position as the Information Communication and Network Infrastructure Team Leader at Wolkite University, overseeing the development and management of the institution’s network infrastructure.

📚 Research Interests : 

Negalign’s research focuses on several cutting-edge areas including network security, public key cryptography, information security, IoT, wireless sensor networks, cloud computing, deep learning, real-time object detection, vehicular networks, and UAV networks. His work aims to apply these technologies in practical fields such as healthcare, intelligent transportation systems, smart agriculture, and cybersecurity.

📝 Publication Top Notes :

  1. Hundera, N. W., Aftab, M. U., Mesfin, D., Xu, H., & Zhu, X. (2024). An efficient heterogeneous online/offline anonymous certificateless signcryption with proxy re-encryption for Internet of Vehicles. Vehicular Communications, 49, 100811. [Open Access]
  2. Hundera, N. W., Shumeng, W., Mesfin, D., Xu, H., & Zhu, X. (2024). An efficient online/offline heterogeneous proxy signcryption for secure communication in UAV networks. Journal of King Saud University – Computer and Information Sciences, 36(5), 102044. [Open Access]
  3. Leka, H. L., Fengli, Z., Kenea, A. T., Tohye, T. G., Tegene, A. T., & Hundera, N. W. (2023). PSO-Based Ensemble Meta-Learning Approach for Cloud Virtual Machine Resource Usage Prediction. Symmetry, 15(3), 613. [Open Access]
  4. Tohye, T. G., Qin, Z., Leka, H. L., & Hundera, N. W. (2023). Glaucoma Detection Using Convolutional Neural Network (CNN). In Proceedings of the 20th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP 2023).
  5. Assefa, A. A., Tian, W., Hundera, N. W., & Aftab, M. U. (2022). Crowd Density Estimation in Spatial and Temporal Distortion Environment Using Parallel Multi-Size Receptive Fields and Stack Ensemble Meta-Learning. Symmetry, 14(10), 2159. [Open Access]
  6. Hundera, N. W., Jin, C., Geressu, D. M., Olanrewaju, O. A., & Xiong, H. (2022). Proxy-based public-key cryptosystem for secure and efficient IoT-based cloud data sharing in the smart city. Multimedia Tools and Applications, 81(21), 29673–29697.
  7. Hundera, N. W., Jin, C., Aftab, M. U., Mesfin, D., & Kumar, S. (2021). Secure outsourced attribute-based signcryption for cloud-based Internet of Vehicles in a smart city. Annales des Telecommunications/Annals of Telecommunications, 76(9-10), 605–616.
  8. Leka, H. L., Fengli, Z., Kenea, A. T., Atandoh, P., & Hundera, N. W. (2021). A Hybrid CNN-LSTM Model for Virtual Machine Workload Forecasting in Cloud Data Center. In Proceedings of the 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP 2021), 474–478.
  9. Hundera, N. W., Mei, Q., Xiong, H., & Geressu, D. M. (2020). A secure and efficient identity-based proxy signcryption in cloud data sharing. KSII Transactions on Internet and Information Systems, 14(1), 455–472.
  10. Oluwasanmi, A., Akeem, S., Jehoaida, J., Baagere, E., Qin, Z., & Hundera, N. W. (2019). Sequential multi-kernel convolutional recurrent network for sentiment classification. In Proceedings of the IEEE International Conference on Software Engineering and Service Sciences (ICSESS), 129–133.