Stefano Galantucci | Cybersecurity | Best Researcher Award

Dr. Stefano Galantucci | Cybersecurity | Best Researcher Award

Adjunct Professor (Lecturer) at University of Bari Aldo Moro, Italy

Dr. Stefano Galantucci is a cybersecurity researcher and academic affiliated with the University of Bari Aldo Moro, Italy. Born on October 28, 1996, he holds a Ph.D. in Computer Science and specializes in network security, cryptography, malware detection, and firewall optimization. With extensive experience in teaching, research, and publication, Dr. Galantucci is an active contributor to both academic and applied cybersecurity communities.

Publication Profileย 

Scopus

Orcid

Educational Background ๐ŸŽ“

  • 2024 โ€“ Ph.D. in Computer Science,
    University of Bari Aldo Moro
    โ€“ XXXVIth cycle, focus on cybersecurity and computer science research.

  • 2020 โ€“ Masterโ€™s Degree (MSc) in Cybersecurity,
    University of Bari “Aldo Moro”
    โ€“ Graduated cum laude with honors and special mention by the commission.

  • 2018 โ€“ Bachelorโ€™s Degree (BSc) in Computer Science,
    University of Bari “Aldo Moro”
    โ€“ Graduated cum laude.

Professional Experience ๐Ÿ’ผ

  • 2024โ€“Present โ€“ Research Fellow,
    University of Bari Aldo Moro
    โ€“ Working on the FAIR project.

  • 2023โ€“Present โ€“ Examination Board Member,
    University of Bari Aldo Moro
    โ€“ Courses: Biometric Systems, Application Security, Computer Architecture & OS.

  • 2023 โ€“ Adjunct Professor (CyberChallenge Course),
    University of Bari Aldo Moro
    โ€“ Taught Cryptography and Hardware Security (24 hours, 2 ECTS).

  • 2022โ€“Present โ€“ Adjunct Professor of Cryptography,
    MSc in Cybersecurity, University of Bari Aldo Moro
    โ€“ 6 ECTS (62 hours).

  • 2021โ€“Present โ€“ Member, ISLab Research Group,
    University of Bari Aldo Moro
    โ€“ Cybersecurity contact person.

Research Interests ๐Ÿ”ฌ

  • Cryptography and hardware security

  • Malware detection and classification

  • Network intrusion detection (NIDS)

  • Firewall policy optimization

  • Anomaly detection and AI-driven threat detection

  • DevSecOps and secure software development practices

  • Blockchain analysis

  • Adversarial neural networks in security (e.g., GANs)

Awards and Honors๐Ÿ†โœจ

  • Special mention by the MSc degree commission (2020)

  • Full marks and honors in both MSc and BSc degrees

Conclusion๐ŸŒŸ

Dr. Stefano Galantucci is a dynamic and accomplished researcher in the field of cybersecurity, with a strong academic background, diverse teaching experience, and a rich portfolio of high-impact publications. His work bridges theoretical foundations and real-world applications, particularly in cryptography, malware detection, and network defense systems. A respected member of the research community, Dr. Galantucci actively contributes to scientific progress through both his scholarly output and his involvement in peer review for top-tier journals. With his growing influence and commitment to innovation, he stands out as a promising leader in the evolving landscape of cybersecurity research.

Publications ๐Ÿ“š

  • ๐Ÿ” CARIOCA: Prioritizing the Use of IoC by Threats Assessment Shared on the MISP Platform
    ๐Ÿ“˜ International Journal of Information Security, 2025-04
    [DOI: 10.1007/s10207-025-01006-2]
    ๐Ÿ‘ฅ Piero Delvecchio, Stefano Galantucci, Andrea Iannacone, Giuseppe Pirlo


  • ๐Ÿงฎ FOBICS: Assessing Project Security Level through a Metrics Framework that Evaluates DevSecOps Performance
    ๐Ÿ“˜ Information and Software Technology, 2025-02
    [DOI: 10.1016/j.infsof.2024.107605]
    ๐Ÿ‘ฅ Alessandro Caniglia, Vincenzo Dentamaro, Stefano Galantucci, Donato Impedovo


  • ๐Ÿ›ก๏ธ PROGESI: A PROxy Grammar to Enhance Web Application Firewall for SQL Injection Prevention
    ๐Ÿ“˜ IEEE Access, 2024
    [DOI: 10.1109/ACCESS.2024.3438092]
    ๐Ÿ‘ฅ Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo


  • ๐ŸŒ Automatic Decision Tree-Based NIDPS Ruleset Generation for DoS/DDoS Attacks
    ๐Ÿ“˜ Journal of Information Security and Applications, 2024-05
    [DOI: 10.1016/j.jisa.2024.103736]
    ๐Ÿ‘ฅ Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo


  • ๐Ÿงฌ YAMME: A YAra-byte-signatures Metamorphic Mutation Engine
    ๐Ÿ“˜ IEEE Transactions on Information Forensics and Security, 2023
    [DOI: 10.1109/TIFS.2023.3294059]
    ๐Ÿ‘ฅ Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo


  • ๐Ÿง  Comparing Deep Learning and Shallow Learning Techniques for API Calls Malware Prediction
    ๐Ÿ“˜ Applied Sciences, 2022-02
    [DOI: 10.3390/app12031645]
    ๐Ÿ‘ฅ Angelo Cannarile, Vincenzo Dentamaro, Stefano Galantucci, Andrea Iannacone, Donato Impedovo, Giuseppe Pirlo


  • ๐Ÿ’ฐ BACH: A Tool for Analyzing Blockchain Transactions Using Address Clustering Heuristics
    ๐Ÿ“˜ Information, 2024-09-26
    [DOI: 10.3390/info15100589]
    ๐Ÿ‘ฅ Michele Caringella, Francesco Violante, Francesco De Lucci, Stefano Galantucci, Matteo Costantini


  • ๐Ÿ”‘ One Time User Key: A User-Based Secret Sharing XOR-ed Model for Multiple User Cryptography
    ๐Ÿ“˜ IEEE Access, 2021
    [DOI: 10.1109/ACCESS.2021.3124637]
    ๐Ÿ‘ฅ Stefano Galantucci, Donato Impedovo, Giuseppe Pirlo


  • ๐Ÿ“‰ Combining Unsupervised Approaches for Near Real-Time Network Traffic Anomaly Detection
    ๐Ÿ“˜ Applied Sciences, 2022-02
    [DOI: 10.3390/app12031759]
    ๐Ÿ‘ฅ Francesco Carrera, Vincenzo Dentamaro, Stefano Galantucci, Andrea Iannacone, Donato Impedovo, Giuseppe Pirlo


  • ๐Ÿ“ˆ Ensemble Consensus: An Unsupervised Algorithm for Anomaly Detection in Network Security Data
    ๐Ÿ“„ CEUR Workshop Proceedings, 2021
    ๐Ÿ‘ฅ Vincenzo Dentamaro, V.N. Convertini, Stefano Galantucci, P. Giglio, T. Palmisano, Giuseppe Pirlo


  • ๐Ÿงญ A Case Study of Navigation System Assistance with Safety Purposes in the Context of Covid-19
    ๐Ÿ“˜ Lecture Notes in Computer Science, 2021
    [DOI: 10.1007/978-3-030-85607-6_35]
    ๐Ÿ‘ฅ Galantucci, S.; Giglio, P.; Dentamaro, V.; Pirlo, G.


  • ๐Ÿ”ฅ Firewall Optimization: An Innovative Two-Stage Algorithm to Optimize Firewall Rule Ordering
    ๐Ÿ“˜ Computers & Security, 2023-11
    [DOI: 10.1016/j.cose.2023.103423]
    ๐Ÿ‘ฅ Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo


Yi Sun | Information Security | Best Researcher Award

Dr. Yi Sun | Information Security | Best Researcher Award

Associate Professor at Beijing University of Posts and Telecommunications, China

Dr. Yi Sun is an Associate Professor at the School of Computer Science (National Pilot Software Engineering School), Beijing University of Posts and Telecommunications, China. She is a prominent researcher in the field of information security with a focus on cryptography, secure multi-party computation, blockchain, and big data security. With a strong presence in international collaborations, over 150 journal publications, 170+ patent applications, and numerous honors, Dr. Sun has established herself as a global leader in cybersecurity and privacy computing.

Publication Profileย 

Scopus

Educational Background ๐ŸŽ“

  • Ph.D. in Computer Science
    Institution: State Key Laboratory of Network and Switching Technology, Beijing University of Posts and Telecommunications
    Graduation Date: June 2015

Professional Experience ๐Ÿ’ผ

  • Associate Professor
    School of Computer Science, Beijing University of Posts and Telecommunications (Since July 2015)

    • Oversees national and international research and industry projects (100+ including National 863, Key R&D, and enterprise-funded).

    • Editorial roles in reputed journals and reviewer for SCI-indexed publications.

    • Active participation in organizing and chairing major international conferences such as IEEE GLOBECOM, ICME, DSC, CAIML, CNCIS, ICAIIC, etc.

Research Interests ๐Ÿ”ฌ

  • Cryptography

  • Network Security

  • Secure Multi-party Computation

  • Blockchain Technology

  • Big Data Security

  • Privacy-Preserving Computation

  • RISC-V Processor Security

Awards and Honors๐Ÿ†โœจ

  • Top 10 Pioneers of Privacy Computing (2022)

  • Excellent Scientific Research Teacher, Ministry of Educationโ€™s Class B Laboratory

  • Excellent Instructor, 7th China International “Internet+” Innovation and Entrepreneurship Competition (2021)

  • Outstanding Instructor, C4 Network Technology Challenge (2023)

  • Excellent Paper, 2023 โ€œAcademic Achievements in Frontier IoT in the Capitalโ€

  • 4 ESI Highly Cited Papers

  • Multiple honors for academic and research excellence

Conclusion๐ŸŒŸ

Dr. Yi Sunโ€™s career is marked by groundbreaking research, high-impact publications, and international collaboration. Her work in information security has led to real-world applications in secure computing and microarchitecture protection. Through her extensive publication record, editorial contributions, and successful leadership in over 100 research and industrial projects, she has played a critical role in shaping the future of cybersecurity technologies. Dr. Sun’s achievements and accolades make her a highly deserving candidate for the Best Researcher Award.

Publications ๐Ÿ“š

๐Ÿ“„ Article:
Title: ADPF: Anti-inference differentially private protocol for federated learning
๐Ÿ‘จโ€๐Ÿ”ฌ Authors: Zhao, Zirun; Lin, Zhaowen; Sun, Yi
๐Ÿ“š Journal: Computer Networks
๐Ÿ“… Year: 2025
๐Ÿ”ข Citations: 0


๐Ÿ“„ Article:
Title: A combined side-channel and transient execution attack scheme on RISC-V processors
๐Ÿ‘จโ€๐Ÿ”ฌ Authors: Dong, Renhai; Cui, Baojiang; Sun, Yi; Yang, Jun
๐Ÿ“š Journal: Computers and Security
๐Ÿ“… Year: 2025
๐Ÿ”ข Citations: 0


๐Ÿ“„ Article:
Title: Improved twin support vector machine algorithm and applications in classification problems
๐Ÿ‘จโ€๐Ÿ”ฌ Authors: Sun, Yi; Wang, Zhouyang
๐Ÿ“š Journal: China Communications
๐Ÿ“… Year: 2024
๐Ÿ”ข Citations: 0


๐Ÿ“„ Article:
Title: AdaDpFed: A Differentially Private Federated Learning Algorithm with Adaptive Noise on Non-IID Data
๐Ÿ‘จโ€๐Ÿ”ฌ Authors: Zhao, Zirun; Sun, Yi; Bashir, Ali Kashif; Lin, Zhaowen
๐Ÿ“š Journal: IEEE Transactions on Consumer Electronics
๐Ÿ“… Year: 2024
๐Ÿ”ข Citations: 7


๐Ÿ“„ Article:
Title: BTIDEC: A Novel Detection Scheme for CPU Security of Consumer Electronics
๐Ÿ‘จโ€๐Ÿ”ฌ Authors: Dong, Renhai; Cui, Baojiang; Sun, Yi; Yang, Jun
๐Ÿ“š Journal: IEEE Transactions on Consumer Electronics
๐Ÿ“… Year: 2024
๐Ÿ”ข Citations: 0


๐Ÿ“„ Article:
Title: Ins Finder: A Practical CPU Undocumented Instruction Detection Framework
๐Ÿ‘จโ€๐Ÿ”ฌ Authors: Dong, Renhai; Cui, Baojiang; Sun, Yi; Yang, Jun
๐Ÿ“š Journal: Journal of Circuits, Systems and Computers
๐Ÿ“… Year: 2024
๐Ÿ”ข Citations: 0


๐Ÿ“„ Article:
Title: KeyLight: Intelligent Traffic Signal Control Method Based on Improved Graph Neural Network
๐Ÿ‘จโ€๐Ÿ”ฌ Authors: Sun, Yi; Lin, Kaixiang; Bashir, Ali Kashif
๐Ÿ“š Journal: IEEE Transactions on Consumer Electronics
๐Ÿ“… Year: 2024
๐Ÿ”ข Citations: 6