Roja D | Cyber Threat | Best Researcher Award

Mrs. Roja D | Cyber Threat | Best Researcher Award

Assistant Professor at Chalapathi Institute of Technology, India

Mrs. Dasthavejula Roja is an Assistant Professor in the Department of Computer Science and Engineering (Data Science) at Chalapathi Institute of Technology, Mothadaka, Andhra Pradesh, India. With over 5 years of academic experience, she is known for her commitment to excellence in teaching and mentoring, as well as her active participation in research and professional development. She is currently pursuing her Ph.D. in Computer Science and Engineering at The Glocal University, Saharanpur, Delhi.

Publication Profile 

Google Scholar

Educational Background 🎓

  • Ph.D. (Pursuing) in Computer Science and Engineering
    The Glocal University (Deemed to be University), Saharanpur, Delhi

  • M.Tech in Computer Science and Engineering
    Chebrolu Engineering College, JNTUK, Kakinada – First Class with Distinction (July 2018)

  • B.Tech in Computer Science and Engineering
    PNC & Vijay Institute of Engineering and Technology, JNTUH, Hyderabad – First Class (May 2015)

Professional Experience 💼

Mrs. Dasthavejula Roja is currently serving as an Assistant Professor in the Department of Computer Science and Engineering (Data Science) at Chalapathi Institute of Technology, Mothadaka, since March 2021. In this role, she has been actively involved in teaching core subjects such as C Programming, Machine Learning, Cloud Computing, Blockchain Technology, Operating Systems, Software Project Management, and more. She has also contributed significantly to institutional development by coordinating and mentoring students during hackathons, and playing a key role as an NBA (National Board of Accreditation) member responsible for documentation and criteria fulfillment.

Prior to her current position, she worked as an Assistant Professor at PNC & Vijay Institute of Engineering and Technology (PNCVIET) from August 2018 to February 2021. During her tenure there, she contributed to undergraduate teaching, curriculum development, and student mentoring, establishing a strong foundation in technical education and pedagogy. With a cumulative teaching experience of over 5 years, she has demonstrated consistent dedication to academic excellence, innovation in teaching methodologies, and active participation in co-curricular initiatives.

Research Interests 🔬

  • Cybersecurity and Intrusion Detection

  • Internet of Things (IoT)

  • Cloud and Distributed Computing

  • Blockchain Technology

  • Deep Learning and AI

  • Smart Agriculture and Yield Prediction Models

  • Learning Analytics

Awards and Honors🏆✨

  • Best Faculty Award – Chalapathi Institute of Technology (2023–2024)

  • Multiple Certificates of Appreciation from NPTEL (Evangelist, Mentor, Discipline, Believer Star)

  • Educator Mentor Award by AICTE Internship (EDUSKILLS)

  • Celonis Educator – EDUSKILLS

  • Ratified as Assistant Professor by JNTUK, Kakinada (2022)

Memberships

  • IAENG: 294814

  • IAAC: FRTJQC-CE000874

  • ISOC (Internet Society): 2249916

  • IFERP: PM51493806

Conclusion🌟

Mrs. Dasthavejula Roja is a dedicated and forward-thinking academician with a passion for research, innovation, and continuous learning. Her involvement in high-impact research, extensive NPTEL certifications, and accolades from national organizations reflect her dynamic engagement in both teaching and professional development. She aims to contribute significantly to the fields of data science, cybersecurity, and smart agriculture through academic research and collaborative initiatives.

Publications 📚

📚 Credit Investigation and Comprehensive Risk Management System based on Big Data Analytics in Commercial Banking
👥 M. Venkateswara Rao, S.S. Vellela, V. Reddy, N. Vullam, K.B. Sk, D. Roja
📅 2023 | 🏛️ 9th International Conference on Advanced Computing and Communication
🔢 Cited by: 125


📚 Multi-agent Personalized Recommendation System in E-commerce Based on User
👥 N. Vullam, S.S. Vellela, V. Reddy, M.V. Rao, K.B. Sk, D. Roja
📅 2023 | 🏛️ 2nd International Conference on Applied Artificial Intelligence and Computing
🔢 Cited by: 111


📚 Prediction and Classification of Alzheimer’s Disease Using Machine Learning Techniques in 3D MR Images
👥 K.N. Rao, B.R. Gandhi, M.V. Rao, S. Javvadi, S.S. Vellela, S.K. Basha
📅 2023 | 🏛️ International Conference on Sustainable Computing and Smart Systems
🔢 Cited by: 96


📚 Coronary Heart Disease Prediction and Classification Using Hybrid Machine Learning Algorithms
👥 K.B. Sk, D. Roja, S.S. Priya, L. Dalavi, S.S. Vellela, V. Reddy
📅 2023 | 🏛️ International Conference on Innovative Data Communication Technologies
🔢 Cited by: 79


📚 Multi-Class Skin Diseases Classification with Color and Texture Features Using Convolution Neural Network
👥 S.S. Vellela, D. Roja, C. Sowjanya, K.B. Sk, L. Dalavai, K.K. Kumar
📅 2023 | 🏛️ 6th International Conference on Contemporary Computing and Informatics
🔢 Cited by: 70


📚 Design and Implementation of an Integrated IoT Blockchain Framework for Drone Communication
👥 S.S. Priya, S.S. Vellela, V. Reddy, S. Javvadi, K.B. Sk, D. Roja
📅 2023 | 🏛️ 3rd International Conference on Intelligent Technologies (CONIT)
🔢 Cited by: 66


📚 A Cloud-based Smart IoT Platform for Personalized Healthcare Data Gathering and Monitoring System
👥 S.S. Vellela, V.L. Reddy, D. Roja, G.R. Rao, K.B. Sk, K.K. Kumar
📅 2023 | 🏛️ 3rd Asian Conference on Innovation in Technology (ASIANCON)
🔢 Cited by: 63


📚 An Enhancing Network Security: A Stacked Ensemble Intrusion Detection System for Effective Threat Mitigation
👥 N. Vullam, D. Roja, N.M. Rao, S.S. Vellela, L.R. Vuyyuru, K.K. Kumar
📅 2023 | 🏛️ 3rd International Conference on Innovative Mechanisms for Industry Applications
🔢 Cited by: 57


📚 Cloud-hosted Concept-Hierarchy Flex-based Infringement Checking System
👥 S.S. Vellela, K. Basha Sk, K. Yakubreddy
📅 2023 | 🏛️ International Advanced Research Journal in Science, Engineering and Technology
🔢 Cited by: 56


📚 Prediction and Analysis Using a Hybrid Model for Stock Market
👥 N. Vullam, K. Yakubreddy, S.S. Vellela, K.B. Sk, V. Reddy, S.S. Priya
📅 2023 | 🏛️ 3rd International Conference on Intelligent Technologies (CONIT)
🔢 Cited by: 53


Kyung-Hyune Rhee | Information Security | Best Researcher Award

Prof. Dr. Kyung-Hyune Rhee | Information Security | Best Researcher Award

Professor Emeritus at Pukyong National University, South Sudan

Professor Kyung-Hyune Rhee is a renowned academic and researcher in computer engineering, specializing in information security and blockchain applications. As Professor Emeritus at Pukyong National University, he has led critical advancements in cybersecurity, policy development, and technology education in South Korea. With a strong foundation in scientific research and government advisory roles, Professor Rhee has made substantial contributions to both academia and national cyber policy.

Publication Profile 

Scopus

Educational Background 🎓

  • Master of Science (M.S.), KAIST (Korea Advanced Institute of Science and Technology)

  • Doctor of Philosophy (Ph.D.), KAIST (Korea Advanced Institute of Science and Technology)

Professional Experience 💼

Current Positions

  • Professor, Department of IT Convergence and Application Engineering, Pukyong National University

  • Committee Member, ISMS/ISMS-P Certification

  • Evaluation Member, National Cyber Security Center

  • Advisory Member, Southeast Information Security Support Center

  • Member, Busan Metropolitan City Special Committee on the 4th Industrial Revolution

  • Advisory Member, Defense Security Research Institute

  • Policy Advisor, Korea Multimedia Society

  • Expert Member, Future Security Forum

Former Positions

  • President, Korea Institute of Information Security and Cryptology

  • Non-Executive Director, Korea Education and Research Information Service

  • Committee Member, Busan Metropolitan City Information Committee

  • Dean of Academic Affairs, CPSC (Philippine-based Intergovernmental Organization)

  • Director, Information & Computing Center, Pukyong National University

  • Visiting Professor, University of California, Irvine

  • Senior Researcher, Electronics and Telecommunications Research Institute (ETRI)

Research Interests 🔬

  • Computer Engineering

  • Information Security

  • Blockchain Applications

  • Cybersecurity Policy and Certification

  • Cryptographic Protocols and Network Security

Awards and Honors🏆✨

  • July 2015: Commendation from the Minister of Science, ICT and Future Planning (for strengthening cybersecurity capabilities)

  • November 2018: Commendation from the Minister of the Interior and Safety (for contributions to security certification)

  • July 2021: Order of Service Merit (Geunjeong Medal) – awarded on Information Security Day

Conclusion🌟

Professor Kyung-Hyune Rhee has established himself as a pivotal figure in South Korea’s digital transformation, particularly in the development of national cybersecurity strategies and the integration of blockchain technologies. His extensive academic output—over 450 research papers, 25+ books, and 20 patents—reflects a career dedicated to both scientific excellence and public service. With ongoing influence through advisory roles and policy development, he continues to contribute significantly to the global information security community.

Publications 📚

  1. 🧩 Hyperledger Fabric-Powered Network Slicing Handover Authentication
     I.T., Etienne Igugu Tshisekedi · M., Firdaus Muhammad · C.N.Z., Latt Cho Nwe Zin · S., Noh Siwan · K., Rhee Kyunghyune
    📚 Information Systems Frontiers, 2024
    🔗 0 Citations


  2. 🧠 Transparent and Accountable Training Data Sharing in Decentralized Machine Learning Systems
     S., Noh Siwan · K., Rhee Kyunghyune
    📚 Computers, Materials and Continua, 2024
    🔗 0 Citations


  3. 🔒 A Blockchain-Based Auditable Semi-Asynchronous Federated Learning for Heterogeneous Clients
     Q., Zhuohao Qian · M., Firdaus Muhammad · S., Noh Siwan · K., Rhee Kyunghyune
    📚 IEEE Access, 2023
    🔗 3 Citations


  4. 🚗 A Blockchain-Assisted Distributed Edge Intelligence for Privacy-Preserving Vehicular Networks
     M., Firdaus Muhammad · H.T., Larasati Harashta Tatimma · K., Rhee Kyunghyune
    📚 Computers, Materials and Continua, 2023
    🔗 4 Citations


  5. 🤖 Personalized Federated Learning for Heterogeneous Data: A Distributed Edge Clustering Approach
     M., Firdaus Muhammad · S., Noh Siwan · Z., Qian Zhuohao · H.T., Larasati Harashta Tatimma · K., Rhee Kyunghyune
    📚 Mathematical Biosciences and Engineering, 2023
    🔗 7 Citations


  6. 💬 Commentary: Integrated Blockchain–Deep Learning Approach for Analyzing the Electronic Health Records Recommender System
     S., Noh Siwan · M., Firdaus Muhammad · K., Rhee Kyunghyune
    📚 Note (Open Access)
    🔗 0 Citations


  7. 🏥 Secure Federated Learning with Blockchain and Homomorphic Encryption for Healthcare Data Sharing
     M., Firdaus Muhammad · K., Rhee Kyunghyune
    🔗 0 Citations


  8. 👥 Towards Trustworthy Collaborative Healthcare Data Sharing
     M., Firdaus Muhammad · K., Rhee Kyunghyune
    🔗 3 Citations


  9. 🧾 A Blockchain-Based CCP Data Integrity Auditing Protocol for Smart HACCP
     S., Noh Siwan · M., Firdaus Muhammad · Z., Qian Zhuohao · K., Rhee Kyunghyune
    🔗 1 Citation


  10. 🧠 BPFL: Blockchain-Enabled Distributed Edge Cluster for Personalized Federated Learning
     M., Firdaus Muhammad · S., Noh Siwan · Z., Qian Zhuohao · K., Rhee Kyunghyune
    🔗 6 Citations


 

 

 

 

Stefano Galantucci | Cybersecurity | Best Researcher Award

Dr. Stefano Galantucci | Cybersecurity | Best Researcher Award

Adjunct Professor (Lecturer) at University of Bari Aldo Moro, Italy

Dr. Stefano Galantucci is a cybersecurity researcher and academic affiliated with the University of Bari Aldo Moro, Italy. Born on October 28, 1996, he holds a Ph.D. in Computer Science and specializes in network security, cryptography, malware detection, and firewall optimization. With extensive experience in teaching, research, and publication, Dr. Galantucci is an active contributor to both academic and applied cybersecurity communities.

Publication Profile 

Scopus

Orcid

Educational Background 🎓

  • 2024 – Ph.D. in Computer Science,
    University of Bari Aldo Moro
    – XXXVIth cycle, focus on cybersecurity and computer science research.

  • 2020 – Master’s Degree (MSc) in Cybersecurity,
    University of Bari “Aldo Moro”
    – Graduated cum laude with honors and special mention by the commission.

  • 2018 – Bachelor’s Degree (BSc) in Computer Science,
    University of Bari “Aldo Moro”
    – Graduated cum laude.

Professional Experience 💼

  • 2024–Present – Research Fellow,
    University of Bari Aldo Moro
    – Working on the FAIR project.

  • 2023–Present – Examination Board Member,
    University of Bari Aldo Moro
    – Courses: Biometric Systems, Application Security, Computer Architecture & OS.

  • 2023 – Adjunct Professor (CyberChallenge Course),
    University of Bari Aldo Moro
    – Taught Cryptography and Hardware Security (24 hours, 2 ECTS).

  • 2022–Present – Adjunct Professor of Cryptography,
    MSc in Cybersecurity, University of Bari Aldo Moro
    – 6 ECTS (62 hours).

  • 2021–Present – Member, ISLab Research Group,
    University of Bari Aldo Moro
    – Cybersecurity contact person.

Research Interests 🔬

  • Cryptography and hardware security

  • Malware detection and classification

  • Network intrusion detection (NIDS)

  • Firewall policy optimization

  • Anomaly detection and AI-driven threat detection

  • DevSecOps and secure software development practices

  • Blockchain analysis

  • Adversarial neural networks in security (e.g., GANs)

Awards and Honors🏆✨

  • Special mention by the MSc degree commission (2020)

  • Full marks and honors in both MSc and BSc degrees

Conclusion🌟

Dr. Stefano Galantucci is a dynamic and accomplished researcher in the field of cybersecurity, with a strong academic background, diverse teaching experience, and a rich portfolio of high-impact publications. His work bridges theoretical foundations and real-world applications, particularly in cryptography, malware detection, and network defense systems. A respected member of the research community, Dr. Galantucci actively contributes to scientific progress through both his scholarly output and his involvement in peer review for top-tier journals. With his growing influence and commitment to innovation, he stands out as a promising leader in the evolving landscape of cybersecurity research.

Publications 📚

  • 🔐 CARIOCA: Prioritizing the Use of IoC by Threats Assessment Shared on the MISP Platform
    📘 International Journal of Information Security, 2025-04
    [DOI: 10.1007/s10207-025-01006-2]
    👥 Piero Delvecchio, Stefano Galantucci, Andrea Iannacone, Giuseppe Pirlo


  • 🧮 FOBICS: Assessing Project Security Level through a Metrics Framework that Evaluates DevSecOps Performance
    📘 Information and Software Technology, 2025-02
    [DOI: 10.1016/j.infsof.2024.107605]
    👥 Alessandro Caniglia, Vincenzo Dentamaro, Stefano Galantucci, Donato Impedovo


  • 🛡️ PROGESI: A PROxy Grammar to Enhance Web Application Firewall for SQL Injection Prevention
    📘 IEEE Access, 2024
    [DOI: 10.1109/ACCESS.2024.3438092]
    👥 Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo


  • 🌐 Automatic Decision Tree-Based NIDPS Ruleset Generation for DoS/DDoS Attacks
    📘 Journal of Information Security and Applications, 2024-05
    [DOI: 10.1016/j.jisa.2024.103736]
    👥 Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo


  • 🧬 YAMME: A YAra-byte-signatures Metamorphic Mutation Engine
    📘 IEEE Transactions on Information Forensics and Security, 2023
    [DOI: 10.1109/TIFS.2023.3294059]
    👥 Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo


  • 🧠 Comparing Deep Learning and Shallow Learning Techniques for API Calls Malware Prediction
    📘 Applied Sciences, 2022-02
    [DOI: 10.3390/app12031645]
    👥 Angelo Cannarile, Vincenzo Dentamaro, Stefano Galantucci, Andrea Iannacone, Donato Impedovo, Giuseppe Pirlo


  • 💰 BACH: A Tool for Analyzing Blockchain Transactions Using Address Clustering Heuristics
    📘 Information, 2024-09-26
    [DOI: 10.3390/info15100589]
    👥 Michele Caringella, Francesco Violante, Francesco De Lucci, Stefano Galantucci, Matteo Costantini


  • 🔑 One Time User Key: A User-Based Secret Sharing XOR-ed Model for Multiple User Cryptography
    📘 IEEE Access, 2021
    [DOI: 10.1109/ACCESS.2021.3124637]
    👥 Stefano Galantucci, Donato Impedovo, Giuseppe Pirlo


  • 📉 Combining Unsupervised Approaches for Near Real-Time Network Traffic Anomaly Detection
    📘 Applied Sciences, 2022-02
    [DOI: 10.3390/app12031759]
    👥 Francesco Carrera, Vincenzo Dentamaro, Stefano Galantucci, Andrea Iannacone, Donato Impedovo, Giuseppe Pirlo


  • 📈 Ensemble Consensus: An Unsupervised Algorithm for Anomaly Detection in Network Security Data
    📄 CEUR Workshop Proceedings, 2021
    👥 Vincenzo Dentamaro, V.N. Convertini, Stefano Galantucci, P. Giglio, T. Palmisano, Giuseppe Pirlo


  • 🧭 A Case Study of Navigation System Assistance with Safety Purposes in the Context of Covid-19
    📘 Lecture Notes in Computer Science, 2021
    [DOI: 10.1007/978-3-030-85607-6_35]
    👥 Galantucci, S.; Giglio, P.; Dentamaro, V.; Pirlo, G.


  • 🔥 Firewall Optimization: An Innovative Two-Stage Algorithm to Optimize Firewall Rule Ordering
    📘 Computers & Security, 2023-11
    [DOI: 10.1016/j.cose.2023.103423]
    👥 Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo


Yi Sun | Information Security | Best Researcher Award

Dr. Yi Sun | Information Security | Best Researcher Award

Associate Professor at Beijing University of Posts and Telecommunications, China

Dr. Yi Sun is an Associate Professor at the School of Computer Science (National Pilot Software Engineering School), Beijing University of Posts and Telecommunications, China. She is a prominent researcher in the field of information security with a focus on cryptography, secure multi-party computation, blockchain, and big data security. With a strong presence in international collaborations, over 150 journal publications, 170+ patent applications, and numerous honors, Dr. Sun has established herself as a global leader in cybersecurity and privacy computing.

Publication Profile 

Scopus

Educational Background 🎓

  • Ph.D. in Computer Science
    Institution: State Key Laboratory of Network and Switching Technology, Beijing University of Posts and Telecommunications
    Graduation Date: June 2015

Professional Experience 💼

  • Associate Professor
    School of Computer Science, Beijing University of Posts and Telecommunications (Since July 2015)

    • Oversees national and international research and industry projects (100+ including National 863, Key R&D, and enterprise-funded).

    • Editorial roles in reputed journals and reviewer for SCI-indexed publications.

    • Active participation in organizing and chairing major international conferences such as IEEE GLOBECOM, ICME, DSC, CAIML, CNCIS, ICAIIC, etc.

Research Interests 🔬

  • Cryptography

  • Network Security

  • Secure Multi-party Computation

  • Blockchain Technology

  • Big Data Security

  • Privacy-Preserving Computation

  • RISC-V Processor Security

Awards and Honors🏆✨

  • Top 10 Pioneers of Privacy Computing (2022)

  • Excellent Scientific Research Teacher, Ministry of Education’s Class B Laboratory

  • Excellent Instructor, 7th China International “Internet+” Innovation and Entrepreneurship Competition (2021)

  • Outstanding Instructor, C4 Network Technology Challenge (2023)

  • Excellent Paper, 2023 “Academic Achievements in Frontier IoT in the Capital”

  • 4 ESI Highly Cited Papers

  • Multiple honors for academic and research excellence

Conclusion🌟

Dr. Yi Sun’s career is marked by groundbreaking research, high-impact publications, and international collaboration. Her work in information security has led to real-world applications in secure computing and microarchitecture protection. Through her extensive publication record, editorial contributions, and successful leadership in over 100 research and industrial projects, she has played a critical role in shaping the future of cybersecurity technologies. Dr. Sun’s achievements and accolades make her a highly deserving candidate for the Best Researcher Award.

Publications 📚

📄 Article:
Title: ADPF: Anti-inference differentially private protocol for federated learning
👨‍🔬 Authors: Zhao, Zirun; Lin, Zhaowen; Sun, Yi
📚 Journal: Computer Networks
📅 Year: 2025
🔢 Citations: 0


📄 Article:
Title: A combined side-channel and transient execution attack scheme on RISC-V processors
👨‍🔬 Authors: Dong, Renhai; Cui, Baojiang; Sun, Yi; Yang, Jun
📚 Journal: Computers and Security
📅 Year: 2025
🔢 Citations: 0


📄 Article:
Title: Improved twin support vector machine algorithm and applications in classification problems
👨‍🔬 Authors: Sun, Yi; Wang, Zhouyang
📚 Journal: China Communications
📅 Year: 2024
🔢 Citations: 0


📄 Article:
Title: AdaDpFed: A Differentially Private Federated Learning Algorithm with Adaptive Noise on Non-IID Data
👨‍🔬 Authors: Zhao, Zirun; Sun, Yi; Bashir, Ali Kashif; Lin, Zhaowen
📚 Journal: IEEE Transactions on Consumer Electronics
📅 Year: 2024
🔢 Citations: 7


📄 Article:
Title: BTIDEC: A Novel Detection Scheme for CPU Security of Consumer Electronics
👨‍🔬 Authors: Dong, Renhai; Cui, Baojiang; Sun, Yi; Yang, Jun
📚 Journal: IEEE Transactions on Consumer Electronics
📅 Year: 2024
🔢 Citations: 0


📄 Article:
Title: Ins Finder: A Practical CPU Undocumented Instruction Detection Framework
👨‍🔬 Authors: Dong, Renhai; Cui, Baojiang; Sun, Yi; Yang, Jun
📚 Journal: Journal of Circuits, Systems and Computers
📅 Year: 2024
🔢 Citations: 0


📄 Article:
Title: KeyLight: Intelligent Traffic Signal Control Method Based on Improved Graph Neural Network
👨‍🔬 Authors: Sun, Yi; Lin, Kaixiang; Bashir, Ali Kashif
📚 Journal: IEEE Transactions on Consumer Electronics
📅 Year: 2024
🔢 Citations: 6


Zhu Yongsheng | Data Privacy Protection | Best Researcher Award

Mr. Zhu Yongsheng | Data Privacy Protection | Best Researcher Award

Research Fellow at China Academy of Railway Sciences Corporation Limited, China

Yongsheng Zhu is a Research Fellow at China Academy of Railway Sciences Corporation Limited and a Ph.D. candidate in Engineering at Beijing Jiaotong University. With a robust background in railway information network architecture and cybersecurity defense technology, he is at the forefront of research focused on data security governance and personal information protection. He is a member of the cybersecurity expert database of China Railway Group. Yongsheng has contributed significantly to the field through various national and industry-specific projects, publications, and patents, earning recognition for his work in intelligent railway transportation and cybersecurity. 🚆🔐📚

Publication Profile : 

Scopus

Educational Background 🎓

  • Ph.D. in Engineering (Pursuing) at Beijing Jiaotong University, focusing on railway information networks and cybersecurity.
  • Master’s in Engineering (Details pending)
  • Bachelor’s in Engineering (Details pending)

Professional Experience 💼

Yongsheng Zhu currently serves as a Research Fellow at China Academy of Railway Sciences Corporation Limited. In this role, he has presided over and participated in more than 10 national and China Railway Group scientific research projects. His work primarily revolves around the security and privacy of railway communication networks. He has also contributed to major industry projects, including a systematic major project of China State Railway Group Corporation Limited. His expertise extends to guiding and advancing national cybersecurity policies, particularly in the context of IoT, federated learning, and AI-powered railway systems. 🚆💻🛡️

Research Interests 🔬

Yongsheng’s research interests focus on network data security, privacy protection, and cybersecurity defenses within the railway industry. His work involves cutting-edge topics such as federated learning, AI model security, and blockchain-enabled trust mechanisms. He is particularly interested in the development of privacy-preserving AI models, secure communication protocols for intelligent transportation systems, and the governance of data privacy in large-scale networks. 🔒📡🤖

Publications 📚

  • Zhu, Y., Liu, C., et al. (2024). Privacy-Preserving Large-Scale AI Models for Intelligent Railway Transportation Systems: Hierarchical Poisoning Attacks and Defenses in Federated Learning. Computer Modeling in Engineering & Sciences, 141(2), 1305-1325.

  • Zhu, Y., Cao, H., Cai, B., Wang, W., et al. (2023). Defending Privacy Inference Attacks to Federated Learning for Intelligent IoT with Parameter Compression. Security and Communication Networks, Vol. 2023.

  • Feng, Y., Zhong, Z., Sun, X., Wang, L., Lu, Y., & Zhu, Y. (2023). Blockchain-Enabled Zero Trust-Based Authentication Scheme for Railway Communication Networks. Journal of Cloud Computing, 12.

 

 

 

Qasem Abu Al-Haija | Defensive Security | Best Researcher Award

Dr. Qasem Abu Al-Haija | Defensive Security | Best Researcher Award

Department of Cybersecurity at Jordan University of Science and Technology, Jordan

🔍 Dr. Qasem S. Abu Al-Haija is an accomplished educator and researcher in the field of cybersecurity and IoT. With a passion for developing intelligent detection systems and efficient cryptographic methods, he strives to advance the landscape of technology. 🌐✨ His commitment to teaching and mentoring the next generation of engineers is matched only by his dedication to impactful research. 📚🔒

Publication Profile : 

Scopus

🎓 Educational Background :

Dr. Qasem S. Abu Al-Haija holds a PhD in Computer and Information Systems Engineering from Tennessee State University (2020) with a perfect GPA of 4.00. His dissertation focused on intelligent IoT attack detection using non-traditional machine learning methods. He also earned a Master’s degree in Computer Engineering from Jordan University of Science and Technology (2009), specializing in efficient algorithms for ECC cryptography, and a Bachelor’s degree in Electrical and Computer Engineering from Mu’tah University (2005).

💼 Professional Experience :

Dr. Abu Al-Haija is currently an Assistant Professor in the Department of Cybersecurity at Jordan University of Science and Technology, where he conducts research in AI and cybersecurity. Previously, he held similar positions at Princess Sumaya University for Technology and the University of Petra, teaching various cybersecurity and data science courses. His extensive experience includes postdoctoral research at Tennessee State University and a lecturer role at King Faisal University, where he taught numerous engineering courses and supervised many capstone projects. Throughout his career, he has contributed to various funded research projects and has actively engaged in academic committees and training programs.

📚 Research Interests : 

His research interests encompass machine learning, cybersecurity, IoT/CPS modeling, and embedded systems, aiming to enhance the security and efficiency of interconnected systems.

📝 Publication Top Notes :

  • Q. Abu Al-Haija, M. Al Fayoumi, “An intelligent identification and classification system for malicious uniform resource locators (URLs),” Neural Computing and Applications (NCAA), Springer, 2023.
  • Q. Abu Al-Haija, M. AlOhaly, M. Odeh, “A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning Approach,” Sensors, MDPI, 2023.
  • Q. Abu Al-Haija, A. Al Badawi, “High-performance intrusion detection system for networked UAVs via deep learning,” Neural Computing and Applications (NCAA), Springer, 2022.
  • Q. Abu Al-Haija, A. Al Badawi, “Boost-Defense for Resilient IoT Networks: A Head-to-Toe Approach,” Expert Systems, Wiley, 2022.
  • Q. Abu Al-Haija, “Top-Down Machine Learning Based Architecture for Cyberattacks Identification and Classification in IoT Communication Networks,” Frontiers in Big Data: Cybersecurity and Privacy, Frontiers, 2022.
  • Q. Abu Al-Haija, M. Krichen, W. Abu Elhaija, “Machine-Learning-Based Darknet Traffic Detection System for IoT Applications,” Electronics, MDPI, Vol. 11(4), 2022.
  • S. Zidi, A. Mihoub, S. Qaisar, M. Krichen, Q. Abu Al-Haija, “Theft detection dataset for benchmarking and machine learning based classification in a smart grid environment,” Journal of King Saud University-Computer and Information Sciences, Elsevier, In Press, 2022.
  • Altamimi, S., Abu Al-Haija, Q. “Maximizing intrusion detection efficiency for IoT networks using extreme learning machine,” Discover Internet of Things, 2024, 4(1), 5. [Open access]
  • Alsulami, A.A., Abu Al-Haija, Q., Alturki, B., Alghamdi, B., Alsemmeari, R.A. “Exploring the efficacy of GRU model in classifying the signal to noise ratio of microgrid model,” Scientific Reports, 2024, 14(1), 15591. [Open access]
  • Abu Al-Haija, Q., Altamimi, S., AlWadi, M. “Analysis of Extreme Learning Machines (ELMs) for intelligent intrusion detection systems: A survey,” Expert Systems with Applications, 2024, 253, 124317. [Review]
  • Al-Fayoumi, M., Alhijawi, B., Al-Haija, Q.A., Armoush, R. “XAI-PhD: Fortifying Trust of Phishing URL Detection Empowered by Shapley Additive Explanations,” International Journal of Online and Biomedical Engineering, 2024, 20(11), pp. 80–101.
  • Khalil, M., Al-Haija, Q.A. “Ethical machine learning for internet of things network,” in Ethical Artificial Intelligence in Power Electronics, 2024, pp. 12–20. [Book Chapter]
  • Al-Haija, Q.A. “Preface,” in Smart and Agile Cybersecurity for IoT and IIoT Environments, 2024, pp. viii–xii. [Editorial]
  • Ayyad, W.R., Al-Haija, Q.A., Al-Masri, H.M.K. “Human factors in cybersecurity,” in Smart and Agile Cybersecurity for IoT and IIoT Environments, 2024, pp. 235–256. [Book Chapter]
  • Al-Haija, Q.A. Smart and Agile Cybersecurity for IoT and IIoT Environments, 2024, pp. 1–397. [Book]
  • Al-Tamimi, S.A., Al-Haija, Q.A. “Supply chain security, technological advancements, and future trends,” in Smart and Agile Cybersecurity for IoT and IIoT Environments, 2024, pp. 211–234. [Book Chapter]
  • Saif, A., Al-Haija, Q.A. “Artificial Intelligence (AI)-powered internet of things (IoT): Smartening Up IoT,” in Future Communication Systems Using Artificial Intelligence, Internet of Things and Data Science, 2024, pp. 18–29. [Book Chapter]