Xian Guo | Cryptography | Best Researcher Award

Prof. Xian Guo | Cryptography | Best Researcher Award

Professor at Lanzhou University of Technology, China

Guo Xian (éƒ­ę˜¾) is an Associate Professor at Lanzhou University of Technology, China. Guo specializes in computer science and control theory. With a career spanning over two decades, he has contributed significantly to mobile ad hoc networks, security protocols, and intelligent systems. Guo has published numerous papers in renowned journals and participated in multiple international conferences, establishing himself as a key figure in his field. He is also an active member of the Association for Computing Machinery (ACM) and the China Computer Federation (CCF).

Profile

Scopus

Education šŸŽ“

Guo Xian holds a Ph.D. in Control Theory and Control Engineering from Lanzhou University of Technology (2011), where he researched secure routing in mobile ad hoc networks. He earned his Master’s in Computer Science from the same university (2009), focusing on secure routing protocols for mobile networks. Guoā€™s academic journey began at Northwest Normal University, where he received his Bachelor’s in Mathematics (1997).

Experience šŸ§‘ā€šŸ«

Since 2013, Guo Xian has been an Associate Professor at Lanzhou University of Technology, where he teaches and conducts research in computer science. Prior to this, he worked at Lanzhou University of Arts and Science (formerly Gansu Union University) for over 15 years, developing expertise in secure routing protocols and mobile network security. His academic career has also involved supervising graduate students and contributing to research projects in security mechanisms and network design.

Awards and Honors šŸ†

Guo Xian is a member of the Association for Computing Machinery (ACM) and the China Computer Federation (CCF). He has been recognized for his contributions to computer science and secure network research. Notably, his work has been published in leading journals, and he has received several accolades for his research on secure routing protocols. His expertise continues to be recognized both domestically and internationally.

Research Focus šŸ”

Guo Xian’s research interests lie in mobile ad hoc networks (MANETs), security protocols, and intelligent systems. His work focuses on developing secure routing techniques for mobile networks, content-based systems, and privacy-aware forwarding mechanisms. Guo has also explored the integration of blockchain with software-defined networking, contributing significantly to the field’s security and privacy. His ongoing research continues to shape future advancements in these areas.

Conclusion šŸ“

Dr. Guo Xian is a highly accomplished researcher with significant contributions to network security, privacy-preserving techniques, and secure routing protocols. His deep expertise and consistent publication record make him a strong contender for the Best Researcher Award. By further expanding his interdisciplinary reach and fostering international collaborations, Dr. Xian could enhance his research’s global impact and recognition.

Publications šŸ“š

  • “Blockchain-cloud privacy-enhanced distributed industrial data trading based on verifiable credentials”
    • Authors: Fang, J., Feng, T., Guo, X., Ma, R., Lu, Y.
    • Journal: Journal of Cloud Computing, 2024, 13(1), 30
    • DOI: 10.1186/s13677-024-00306-6
    • Citations: 4

 

  • “DBCPCA: Double-layer blockchain-assisted conditional privacy-preserving cross-domain authentication for VANETs”
    • Authors: Guo, X., Lu, X., Jiang, Y., Fang, J., Zhang, D.
    • Journal: Ad Hoc Networks, 2024, 163, 103600
    • Citations: 0

 

  • “A Privacy-preserving Self-Sovereign Identity Scheme for Vehicular Ad hoc Networks”
    • Authors: Guo, X., Yuan, J., Feng, T., Fang, J., Wang, J.
    • Journal: Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2024, 46(7), pp. 2783ā€“2792
    • Citations: 0

 

  • “A Practical and UC-Secure Decentralized Key Management and Authentication Scheme Based on Blockchain for VNDN”
    • Authors: Guo, X., Almadhehagi, S., Feng, T., Jiang, Y., Fang, J.
    • Journal: Computer Science and Information Systems, 2024, 21(3), pp. 725ā€“757
    • Citations: 0

 

  • “Privacy-Preserving k-Nearest Neighbor Classification over Malicious Participants in Outsourced Cloud Environments”
    • Authors: Guo, X., Li, Y., Jiang, Y., Wang, J., Fang, J.
    • Journal: Cryptography, 2023, 7(4), 59
    • Citations: 0

 

  • “Privacy preserving multi-classification LR scheme for data quality”
    • Authors: Laicheng, C., Wentao, W., Tao, F., Xian, G.
    • Journal: Xi’an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2023, 50(5), pp. 188ā€“198
    • Citations: 0

 

  • “CPPABK: Conditional privacy-preserving authentication scheme for VANETs based on the key derivation algorithm”
    • Authors: Wang, Y., Guo, X.
    • Journal: International Journal of Security and Networks, 2023, 18(4), pp. 199ā€“212
    • Citations: 0

 

  • “An intelligent zero trust secure framework for software defined networking”
    • Authors: Guo, X., Xian, H., Feng, T., Jiang, Y., Zhang, D.
    • Journal: PeerJ Computer Science, 2023, 9, e1674
    • Citations: 0

 

  • “Homomorphic Encryption Based Privacy-Aware Intelligent Forwarding Mechanism for NDN-VANET”
    • Authors: Guo, X., Wang, B., Jiang, Y., Zhang, D., Cao, L.
    • Journal: Computer Science and Information Systems, 2023, 29(1)
    • Citations: 1

 

  • “Efficient privacy-protection scheme for distributed machine learning against collusion attack”
    • Authors: Cao, L., Wu, Q., Wu, R., Guo, X.
    • Journal: Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2022, 50(5), pp. 39ā€“45
    • Citations: 0

 

Surjit Paul | Information Systems Security | Young Scientist Award

Mr. Surjit Paul | Information Systems Security | Best Researcher Award

Mr. Surjit Paul is a dedicated and research-oriented academic professional currently pursuing a Ph.D. at the Vinod Gupta School of Management, IIT Kharagpur. With a strong background in computer science and a focus on information security breaches and their impact on firm performance, Mr. Surjit Paul has a proven track record of excellence in both teaching and research. Holding an M.Tech from NIT Jamshedpur and an MCA from Biju Patnaik University, Mr. Surjit Paul is an accomplished educator, currently serving as an Assistant Professor at ARKA JAIN University. Proficient in a range of programming languages and research methodologies, Dr. [Your Name] is committed to advancing knowledge in cybersecurity, social media analytics, and website accessibility.

Profile

Scholar

šŸŽÆ Objective

Highly motivated, focused, and research-oriented approach to teaching and learning to achieve the desired goals of the organization. Always eager to learn new tools and technologies required to excel in the current learning environment.

šŸŽ“ Education

Ph.D. (Pursuing) Vinod Gupta School of Management (VGSoM), Indian Institute of Technology Kharagpur, Thesis Title: ā€œInformation Security Breach Incidents and Firmsā€™ Performanceā€, Supervisor: Prof. Saini Das, Assistant Professor, VGSoM, IIT Kharagpur. M.Tech CSE, 2017 National Institute of Technology Jamshedpur, CGPA: 9.35, Thesis Title: ā€œDesign a Quantum Secure Authentication Protocol for Entity Authenticationā€, Supervisors: Prof. Sanjay Kumar & Prof. R.R Suman. M.C.A, 2014, Biju Patnaik University of Technology Odisha, Rourkela, CGPA: 9.06. B.Sc IT (Hons), 2010, Ranchi University, Ranchi, Percentage: 78.58%. 12th Science, 2007, Jharkhand Academic Council (JAC) Ranchi, Percentage: 65.80%. 10th, 2005, Jharkhand Academic Council (JAC) Ranchi, Percentage: 76.40%

šŸ† Awards & Achievements

Best Researcher Award by SCIENCE FATHER, UGC-JRF/NET Computer Science & Applications, 2015, GATE (Computer Science & Information Technology), 2014, M.Tech (Computer Science & Engineering) Branch Topper, MCA Branch Topper

šŸ‘Øā€šŸ« Experience

Teaching & Research Experience

Assistant Professor, Dept. of Computer Science & IT, School of Engineering and IT, ARKA JAIN University Jharkhand (August 2023 – Present). Ph.D. Researcher, Vinod Gupta School of Management, IIT Kharagpur (July 2017 – Present)

Industry Experience

Summer Intern, Indian Institute of Management Indore (July – September 2016). Java Programmer, Napasoft Jamshedpur (Vendor of TATA STEEL LTD. Jamshedpur) (November 2010 – July 2011)

šŸ”¬ Research Interests

  • Cyber Security
  • Information Security & Stock Market Impact
  • Social Media Analytics
  • Accessibility & Usability

šŸ’» Research Techniques/Computer Skills

  • Accessibility, usability, security, and privacy analysis of websites
  • Social media analytics, sentiment & emotion analysis, and topic modeling
  • Event study methodology
  • Meta-analysis

šŸ› ļø Software & Tools

  • Python, Java, C, C++, R
  • SAP ABAP
  • Web Technology
  • MS-Office
  • Achecker, Sortsite, PENTEST, Wireshark

Publications Top Notes šŸ“

  • Accessibility and usability analysis of Indian e-government websites
    • Authors: S. Paul, S. Das
    • Journal: Universal Access in the Information Society
    • Volume: 19
    • Issue: 4
    • Pages: 949-957
    • Year: 2020
    • Citations: 48
    • This article analyzes the accessibility and usability of Indian e-government websites, highlighting the challenges and areas for improvement.

 

  • Investigating information dissemination and citizen engagement through government social media during the COVID-19 crisis
    • Authors: S. Paul, S. Das
    • Journal: Online Information Review
    • Volume: 47
    • Issue: 2
    • Pages: 316-332
    • Year: 2023
    • Citations: 12
    • This study examines how government social media channels disseminated information and engaged with citizens during the COVID-19 pandemic.

 

  • A novel initial basic feasible solution method for Transportation problem
    • Author: S. Paul
    • Journal: International Journal of Advanced Research in Computer Science
    • Volume: 9
    • Issue: 1
    • Pages: 0
    • Year: 2018
    • Citations: 9
    • This article proposes a new method for finding the initial basic feasible solution for transportation problems.

 

  • Real-Time Multimodal Biometric User Authentication for Web Application Access in Wireless LAN
    • Authors: S. Kumar, S. Paul, D.K. Shaw
    • Journal: Journal of Computer Science
    • Volume: 13
    • Issue: 12
    • Pages: 680-693
    • Year: 2017
    • Citations: 5
    • This study presents a real-time multimodal biometric authentication system for secure access to web applications over wireless LAN.

 

  • Communication in vehicular cloud network using ns-3
    • Authors: S. Kumar, S. Paul, A.K. Amar
    • Journal: International Journal of Control Theory and Applications
    • Volume: 10
    • Year: 2017
    • Citations: 4
    • This paper discusses communication protocols in vehicular cloud networks using the ns-3 network simulator.

 

  • A Quantum Secure Entity Authentication Protocol Design for Network Security
    • Authors: S. Paul, S. Kumar, R.R. Suman
    • Publication: Research Anthology on Advancements in Quantum Technology
    • Pages: 289-301
    • Year: 2021
    • Citations: 3
    • This article designs a quantum secure entity authentication protocol aimed at enhancing network security.

 

  • A Quantum Secure Entity Authentication Protocol Design for Network Security
    • Authors: S. Paul, S. Kumar, R.R. Suman
    • Journal: International Journal of Information Security and Privacy
    • Volume: 13
    • Issue: 4
    • Pages: 1-11
    • Year: 2019
    • Citations: 3
    • This paper provides a detailed analysis and design of a quantum secure entity authentication protocol for network security.

 

  • Comparative Analysis of Various PPP Authentication Protocols
    • Authors: S. Paul, S. Kumar
    • Journal: International Journal of Innovative Research in Computer and Communication Engineering
    • Year: 2017
    • Citations: 3
    • This study compares different Point-to-Point Protocol (PPP) authentication methods.

 

  • Design and Modeling of Real Time Multimodal Biometric Authentication System
    • Authors: S. Kumar, S. Paul, D.K. Shaw
    • Journal: Journal of Computer Science (Accepted)
    • Year: 2017
    • Citations: 2
    • This article discusses the design and modeling of a real-time multimodal biometric authentication system.