Kavuri Satheesh | Cryptography | Best Researcher Award

Dr. Kavuri Satheesh | Cryptography | Best Researcher Award

Vasireddy Venkatadri International Technological University | India 

Dr. Kavuri K. S. V. A. Satheesh is an accomplished academician and researcher with over two decades of experience in the field of computer science and engineering. His passion for teaching and research has led to significant contributions in cloud computing, blockchain technology, and network security. He has consistently demonstrated excellence in both teaching and research, publishing numerous papers in reputed journals and participating in conferences.

Publication Profile 

Scopus

Google Scholar

Educational Background 

He holds a Ph.D. in Computer Science and Engineering, along with postgraduate and undergraduate degrees in computer science. Additionally, he completed an M.Tech. in Computer Science and Engineering, establishing a strong academic foundation that supports his teaching and research expertise.

Professional Experience 

With a career spanning more than 25 years, he has served in various academic roles ranging from Lecturer to Professor in reputed engineering institutions. His responsibilities have included mentoring postgraduate and engineering students, delivering lectures on advanced computer science topics, and guiding research projects.

Research Interests 

His primary research interests lie in cloud computing, blockchain technology, and network security. He has explored innovative solutions to enhance security in cloud environments and developed models for authentication, encryption, and secure data management. His work also extends to artificial intelligence, machine learning, and their integration with secure computing models.

Awards and Honors 

He has published extensively in SCI and Scopus-indexed journals, authored a book on network and system security, and contributed chapters to reputed publications. Additionally, he holds patents related to cryptographic systems and data security techniques, reflecting his commitment to technological innovation and applied research.

Research Skills 

Dr. Satheesh possesses strong expertise in encryption models, secure authentication systems, data access control, and cryptographic techniques for cloud environments. His technical skills span programming languages, algorithm design, and security protocol development. He has also participated in several faculty development programs and advanced workshops on machine learning, blockchain, and cloud computing.

Publications 

  1. Title: Data authentication and integrity verification techniques for trusted/untrusted cloud servers
    Citations: 20
    Year: 2014

  2. Title: Resource allocation method using scheduling methods for parallel data processing in cloud
    Citations: 16
    Year: 2012

  3. Title: An improved integrated hash and attributed based encryption model on high dimensional data in cloud environment
    Citations: 9
    Year: 2017

  4. Title: A Novel Hardware Parameters Based Cloud Data Encryption and Decryption Against Un-Authorized Users
    Citations: 5
    Year: 2016

  5. Title: Cryptographic access control schemes in cloud storage services
    Citations: 5
    Year: 2015

Conclusion 

Dr. Kavuri K. S. V. A. Satheesh is a dedicated educator and researcher committed to advancing knowledge in computer science and engineering. His extensive teaching experience, impactful research, and innovative contributions to security in cloud and distributed systems underscore his suitability for academic leadership and research-driven roles in higher education and industry collaborations.

Yi Sun | Information Security | Best Researcher Award

Dr. Yi Sun | Information Security | Best Researcher Award

Associate Professor at Beijing University of Posts and Telecommunications, China

Dr. Yi Sun is an Associate Professor at the School of Computer Science (National Pilot Software Engineering School), Beijing University of Posts and Telecommunications, China. She is a prominent researcher in the field of information security with a focus on cryptography, secure multi-party computation, blockchain, and big data security. With a strong presence in international collaborations, over 150 journal publications, 170+ patent applications, and numerous honors, Dr. Sun has established herself as a global leader in cybersecurity and privacy computing.

Publication Profile 

Scopus

Educational Background 🎓

  • Ph.D. in Computer Science
    Institution: State Key Laboratory of Network and Switching Technology, Beijing University of Posts and Telecommunications
    Graduation Date: June 2015

Professional Experience 💼

  • Associate Professor
    School of Computer Science, Beijing University of Posts and Telecommunications (Since July 2015)

    • Oversees national and international research and industry projects (100+ including National 863, Key R&D, and enterprise-funded).

    • Editorial roles in reputed journals and reviewer for SCI-indexed publications.

    • Active participation in organizing and chairing major international conferences such as IEEE GLOBECOM, ICME, DSC, CAIML, CNCIS, ICAIIC, etc.

Research Interests 🔬

  • Cryptography

  • Network Security

  • Secure Multi-party Computation

  • Blockchain Technology

  • Big Data Security

  • Privacy-Preserving Computation

  • RISC-V Processor Security

Awards and Honors🏆✨

  • Top 10 Pioneers of Privacy Computing (2022)

  • Excellent Scientific Research Teacher, Ministry of Education’s Class B Laboratory

  • Excellent Instructor, 7th China International “Internet+” Innovation and Entrepreneurship Competition (2021)

  • Outstanding Instructor, C4 Network Technology Challenge (2023)

  • Excellent Paper, 2023 “Academic Achievements in Frontier IoT in the Capital”

  • 4 ESI Highly Cited Papers

  • Multiple honors for academic and research excellence

Conclusion🌟

Dr. Yi Sun’s career is marked by groundbreaking research, high-impact publications, and international collaboration. Her work in information security has led to real-world applications in secure computing and microarchitecture protection. Through her extensive publication record, editorial contributions, and successful leadership in over 100 research and industrial projects, she has played a critical role in shaping the future of cybersecurity technologies. Dr. Sun’s achievements and accolades make her a highly deserving candidate for the Best Researcher Award.

Publications 📚

📄 Article:
Title: ADPF: Anti-inference differentially private protocol for federated learning
👨‍🔬 Authors: Zhao, Zirun; Lin, Zhaowen; Sun, Yi
📚 Journal: Computer Networks
📅 Year: 2025
🔢 Citations: 0


📄 Article:
Title: A combined side-channel and transient execution attack scheme on RISC-V processors
👨‍🔬 Authors: Dong, Renhai; Cui, Baojiang; Sun, Yi; Yang, Jun
📚 Journal: Computers and Security
📅 Year: 2025
🔢 Citations: 0


📄 Article:
Title: Improved twin support vector machine algorithm and applications in classification problems
👨‍🔬 Authors: Sun, Yi; Wang, Zhouyang
📚 Journal: China Communications
📅 Year: 2024
🔢 Citations: 0


📄 Article:
Title: AdaDpFed: A Differentially Private Federated Learning Algorithm with Adaptive Noise on Non-IID Data
👨‍🔬 Authors: Zhao, Zirun; Sun, Yi; Bashir, Ali Kashif; Lin, Zhaowen
📚 Journal: IEEE Transactions on Consumer Electronics
📅 Year: 2024
🔢 Citations: 7


📄 Article:
Title: BTIDEC: A Novel Detection Scheme for CPU Security of Consumer Electronics
👨‍🔬 Authors: Dong, Renhai; Cui, Baojiang; Sun, Yi; Yang, Jun
📚 Journal: IEEE Transactions on Consumer Electronics
📅 Year: 2024
🔢 Citations: 0


📄 Article:
Title: Ins Finder: A Practical CPU Undocumented Instruction Detection Framework
👨‍🔬 Authors: Dong, Renhai; Cui, Baojiang; Sun, Yi; Yang, Jun
📚 Journal: Journal of Circuits, Systems and Computers
📅 Year: 2024
🔢 Citations: 0


📄 Article:
Title: KeyLight: Intelligent Traffic Signal Control Method Based on Improved Graph Neural Network
👨‍🔬 Authors: Sun, Yi; Lin, Kaixiang; Bashir, Ali Kashif
📚 Journal: IEEE Transactions on Consumer Electronics
📅 Year: 2024
🔢 Citations: 6


Touhid Bhuiyan | Cybersecurity | Outstanding Scientist Award

Prof. Dr. Touhid Bhuiyan | Cybersecurity | Outstanding Scientist Award

Professor at Washington University of Science and Technology, United States

Dr. T. Bhuiyan is a distinguished academic and consultant in Cyber Security, with extensive experience in teaching, research, and industry. His contributions span several continents and include a wealth of publications and keynotes, focusing on the transformative role of technology in education and security. 🌍🔐📖

Publication Profile : 

Orcid

 

🎓 Educational Background :

Dr. T. Bhuiyan is a seasoned professional in Cyber Security, Software Engineering, and Databases, with over 27 years of experience in teaching and research across the USA, Australia, and Bangladesh. He holds a PhD in Computer Science from Queensland University of Technology, Australia, along with an MSc from The American University in London and a BSc (Hons) in Computing & Information Systems from the University of London. His education is complemented by numerous certifications, including Certified Information System Auditor (CISA) and Certified Ethical Hacker (CEH).

💼 Professional Experience :

In his professional journey, Dr. Bhuiyan has served as a Professor of Cyber Security at Washington University of Science and Technology, and previously held leadership roles at Daffodil International University and Polytechnic Institute Australia. His consulting experience includes a significant role as a National Consultant for Cyber Security with the UNDP and the Government of Bangladesh, where he led initiatives to enhance cyber security measures for government portals. Dr. Bhuiyan has delivered keynote speeches at international conferences and has authored multiple influential publications, including books on intelligent recommendation systems and cyber security. His research interests lie at the intersection of information security, trust management, and e-Learning, exploring how technology can enhance educational practices and health informatics.

📚 Research Interests : 

🔍 Information Security
🌐 Social Networks
🔒 Trust Management
💻 Database Management
🏥 e-Health
📚 e-Learning

📝 Publication Top Notes :

  1. Hossain, M.A., Rahman, M.Z., Bhuiyan, T., Moni, M.A. (2024). Identification of Biomarkers and Molecular Pathways Implicated in Smoking and COVID-19 Associated Lung Cancer Using Bioinformatics and Machine Learning Approaches. International Journal of Environmental Research and Public Health, 21(11), 1392.
  2. Hanip, A., Sarower, A.H., Bhuiyan, T. (2024). The Transformative Role of Generative AI in Education: Challenges and Opportunities for Enhancing Student Learning and Assessment Through Mass Integration. International Journal of Advanced Research in Engineering and Technology, 15(5), 161-175.
  3. Mahmud, A., Sarower, A.H., Sohel, A., Assaduzzaman, M., Bhuiyan, T. (2024). Adoption of ChatGPT by university students for academic purposes: Partial least square, artificial neural network, deep neural network and classification algorithms approach. Array, 21, 100339.
  4. Zannah, T.B., Abdulla-Hil-Kafi, M., Sheakh, M.A., Hasan, M.Z., Shuva, T.F., Bhuiyan, T., Rahman, M.T., Khan, R.T., Kaiser, M.S., Whaiduzzaman, M. (2024). Bayesian Optimized Machine Learning Model for Automated Eye Disease Classification from Fundus Images. Computation, 12(190).
  5. Bishshash, P., Nirob, M.A.S., Shikder, M.H., Sarower, M.A.H., Bhuiyan, T., Noori, S.R.H. (2024). A Comprehensive Cotton Leaf Disease Dataset for Enhanced Detection and Classification. Data in Brief, 57, 110913.
  6. Tamal, M.A., Islam, M.K., Bhuiyan, T., Sattar, A., Prince, N.U. (2024). Unveiling suspicious phishing attacks: enhancing detection with an optimal feature vectorization algorithm and supervised machine learning. Frontiers in Computer Science, 6, 1428013.
  7. Tamal, M.A., Islam, M.K., Bhuiyan, T., Sattar, A. (2024). Dataset of suspicious phishing URL detection. Frontiers in Computer Science, 6, 1308634.
  8. Sholi, R.T., Sarker, …, Bhuiyan, T., Shakil, S.M.K.A., Ahmed, M.F. (2024). Application of Computer Vision and Mobile Systems in Education: A Systematic Review. International Journal of Interactive Mobile Technologies, 18(1), 168-187.
  9. Ahad, M.T., Li, Y., Song, B., Bhuiyan, T. (2023). Comparison of CNN-based deep learning architectures for rice diseases classification. Artificial Intelligence in Agriculture, 9(1), 22-35.
  10. Basar, M.A., Hosen, M.F., Paul, B.K., …, Bhuiyan, T. (2023). Identification of drug and protein-protein interaction network among stress and depression: A bioinformatics approach. Informatics in Medicine Unlocked, 37, 101174.
  11. Paul, S.G., Saha, A., Arefin, M.S., Bhuiyan, T., …, Moni, M.A. (2023). A Comprehensive Review of Green Computing: Past, Present, and Future Research. IEEE Access, 11, 87445-87494.
  12. Sarker, S., Arefin, M.S., Kowsher, M., Bhuiyan, T., Dhar, P.K., Kwon, O.J. (2022). A Comprehensive Review on Big Data for Industries: Challenges and Opportunities. IEEE Access, 11, 744-769.
  13. Asaduzzaman, S., Rehana, H., Bhuiyan, T., Eid, M.M.A., Rashed, A.N.Z. (2022). Extremely high birefringent slotted core umbrella-shaped photonic crystal fiber in terahertz regime. Applied Physics B, 128(148).
  14. Bhuiyan, T. (2022). Transitioning from education to work during the 4th Industrial Revolution. AIB Review, 7, Adelaide, Australia.
  15. Ali, M.N.B., Saudi, M.M., Bhuiyan, T., Ahmad, A.B., Islam, M.N. (2021). NIPSA Intrusion Classification. Journal of Engineering Science and Technology, 16(4), 3534-3547.