Huizhi Tang | Communication Engineering | Best Researcher Award

Dr. Huizhi Tang | Communication Engineering | Best Researcher Award

Dr at Donghua University, China

šŸŒŸ Huizhi Tang is a dedicated PhD student in Information and Communication Engineering at Donghua University, specializing in routing protocols for flying ad hoc networks and privacy protection for vehicle ad hoc networks.Ā  She holds a Masterā€™s degree in Information Science and Technology from Donghua University and a Bachelorā€™s degree in Communications Engineering from Huaibei Normal University.Ā  Known for her hardworking and responsible nature, Huizhi thrives in team environments and enjoys exploring new fields and traveling. She is passionate about developing innovative communication solutions, particularly in the fields of drone and vehicle networks. šŸŒ

 

Profile

Scopus

Education šŸŽ“

Ā Huizhi Tang completed her Bachelor’s degree in Communications Engineering from Huaibei Normal University (2017-2021).Ā  She then pursued a Master’s degree in Information Science and Technology with a focus on image processing for drones at Donghua University (2021-2022).Ā  Currently, she is in the second year of her PhD in Information and Communication Engineering at Donghua University, focusing on routing protocols for flying ad hoc networks.

Experience šŸ§‘ā€šŸ«

Huizhi Tang interned at Sensing Future Technology Co., Ltd., working on hardware welding and testing for a radar speed measurement project during her school internship.Ā  Her experience has equipped her with practical skills in the field of communications and hardware testing. She is currently focused on her PhD research, working to advance routing protocols for flying ad hoc networks.

Awards and Honors šŸ†

Huizhi has earned several accolades, including the provincial first prize in the “Datang Cup” during the 7th National Mobile Communication 5G Technology Competition.Ā  She also won provincial third prizes in both the “The First Anhui Provincial College Student Transportation Science and Technology Competition” and the “National College Student Electronic Technology Competition” (Excellence Award).Ā  Huizhi received an Excellence Award in the National Undergraduate Mathematical Modeling Competition and the “Start-up Automation Cup.” She holds a utility model patent for “An anti-fall buffer device for elevators.”

Research Focus šŸ”

Ā Huizhiā€™s research focuses on routing protocols for flying ad hoc networks, with an emphasis on optimizing communication in dynamic environments.Ā  Her work also explores privacy protection for vehicle ad hoc networks.Ā  She has contributed articles to prestigious journals, including “Vehicular Communications” and IEEE journals on intelligent transportation systems and IoT.Ā  Her research aims to enhance communication efficiency and security in ad hoc networks, particularly for drones and vehicles.

Conclusion āœ…

Huizhi Tang is a promising and capable researcher with a strong academic foundation, a track record of high-quality publications, and innovative research in key areas of modern communication networks. Her research on flying ad hoc networks and vehicle-to-infrastructure communication is timely and impactful. With her achievements in national competitions and her published works, she has demonstrated both academic excellence and practical application. By expanding her research visibility through more international collaborations and high-impact publications, and focusing on real-world implementations of her research, Huizhi has the potential to become a recognized leader in the field of information and communication engineering. She is a strong contender for the Best Researcher Award, given her academic excellence, awards, and innovative contributions.

 

Publications šŸ“š

  • “Blockchain-based Secure Routing Algorithm with Accumulating Trust in VANETs”
    • Conference Paper in Procedia Computer Science
    • Volume: 224, Pages 44ā€“51
    • Year: 2023
    • Authors: Liu, M.; Tang, H.; Li, D.
    • Citations: 1

 

  • “Research on Siamese Object Tracking Algorithm Based on Knowledge Distillation in Marine Environment”
    • Article in IEEE Access
    • Volume: 11, Pages 50781ā€“50793
    • Year: 2023
    • Authors: Zhang, Y.; Lin, Q.; Tang, H.; Li, Y.
    • Citations: 1

 

Abhisek Banerjee | Cybersecurity | Best Researcher Award

Mr. Abhisek Banerjee | Cybersecurity | Best Researcher Award

Mr at Indian Institute of Information Technology India

Abhisek Banerjee is a Lead Technical Architect with over 19 years of IT experience, specializing in AI, Cloud Security, Digital Transformation, and Application Integration. He is currently a PhD scholar at the Indian Institute of Information Technology, Kalyani, focusing on Gen AI-based security solutions. With deep expertise in cloud platforms (Oracle Cloud, AWS, Azure), he has led numerous enterprise-level digital transformation projects, integrating cutting-edge technologies like Langchain, Hugging Face, TensorFlow, and Keras to drive business innovation. His work emphasizes enhancing operational efficiency, securing data, and mitigating security vulnerabilities in multi-cloud environments.

Profile

Scopus

 

Education šŸŽ“

PhD (Pursuing) ā€“ Indian Institute of Information Technology, Kalyani, India. ME (IT – Software Engineering) ā€“ Jadavpur University, 2005, 81.6%. BTech (Electronics & Telecom Engineering) ā€“ University of Kalyani, 2003, 81.4%. Higher Secondary (12th) ā€“ R.K.M.V.C.College, Rahara [WBBHSC], 1999, 85%.; Secondary (10th) ā€“ R.K.M. Boysā€™ Home High School, Rahara [WBBSE], 1997, 90.3%

Experience šŸ§‘ā€šŸ«

With over 19 years of experience, Abhisek Banerjee has handled large-scale digital transformation initiatives, focusing on multi-cloud environments (Oracle Cloud, AWS, Azure). He has led projects in application modernization, data integration, and cloud security, architecting solutions using cutting-edge technologies such as Langchain, Hugging Face, TensorFlow, and Keras. He has engineered seamless data integration frameworks, API-led connectivity, and cloud-native security solutions, ensuring compliance and data protection. Additionally, Abhisek has worked on the design of microservices, DevOps automation, and advanced machine learning models for cloud security. His contributions include deploying robust data privacy measures and threat detection frameworks across cloud platforms.

Awards and Honors šŸ†

Research Excellence Award (GEU, DDN) in 2015 for outstanding research contributions. Early Career Research Award from the Science and Engineering Research Board (SERB), 2017. DST Travel Grant (2012) to attend an international conference in Pittsburgh, USA. Best Paper Presentation Award at TriboIndia-2023 Conference, NIT Srinagar. GUCOST and DTE Funding for workshops on cloud technologies and security. Membership in the International Association of Advanced Materials (IAAM) for five years.

Research Focus šŸ”

Abhisek’s research focuses on cloud security vulnerabilities, with a specific interest in the detection and remediation of covert malware attacks using machine learning and deep learning techniques. His work integrates Generative AI, CNN, Vision Transformer, and GAN models to address threats like steganography-based backdoor attacks in cloud environments. By utilizing Computer Vision techniques and AI-driven models, he aims to develop intelligent security solutions that can proactively identify and neutralize security threats. Abhisek’s current projects involve training custom AI models for threat detection and deploying them within multi-cloud architectures to ensure data integrity and privacy. His research has the potential to revolutionize cybersecurity strategies in cloud and IoT ecosystems.

Conclusion āœ…

This individual demonstrates significant research excellence, particularly in Metallurgical & Materials Engineering, with notable contributions recognized by both national and international bodies. Their impressive list of awards, research experience, and funding achievements make them a strong contender for the Best Researcher Award. By expanding their research collaborations, improving visibility in high-impact journals, and engaging more publicly in research discourse, they can further enhance their profile and continue making substantial contributions to their field.

Publications šŸ“š

  • “A Study on Multivariable Process Control Using Message Passing Across Embedded Controllers”
    • Journal: ISA Transactions
    • Volume: 46(2), Pages 247ā€“253
    • Year: 2007
    • Authors: Das, M.; Banerjee, A.; Ghosh, R.; Chandra, A.K.; Gupta, A.
    • Citations: 6

 

  • “A Study on Hardware-in-Loop Simulation with Embedded Controllers Using TCP/IP and UDP”
    • Conference: 3rd International Conference on Computing, Communications and Control Technologies (CCCT 2005)
    • Volume: 3, Pages 103ā€“108
    • Year: 2005
    • Authors: Banerjee, A.; Das, M.; Ghosh, R.; Balasubramanian, R.; Gupta, A.
    • Citations: 1

 

Xian Guo | Cryptography | Best Researcher Award

Prof. Xian Guo | Cryptography | Best Researcher Award

Professor at Lanzhou University of Technology, China

Guo Xian (éƒ­ę˜¾) is an Associate Professor at Lanzhou University of Technology, China. Guo specializes in computer science and control theory. With a career spanning over two decades, he has contributed significantly to mobile ad hoc networks, security protocols, and intelligent systems. Guo has published numerous papers in renowned journals and participated in multiple international conferences, establishing himself as a key figure in his field. He is also an active member of the Association for Computing Machinery (ACM) and the China Computer Federation (CCF).

Profile

Scopus

Education šŸŽ“

Guo Xian holds a Ph.D. in Control Theory and Control Engineering from Lanzhou University of Technology (2011), where he researched secure routing in mobile ad hoc networks. He earned his Master’s in Computer Science from the same university (2009), focusing on secure routing protocols for mobile networks. Guoā€™s academic journey began at Northwest Normal University, where he received his Bachelor’s in Mathematics (1997).

Experience šŸ§‘ā€šŸ«

Since 2013, Guo Xian has been an Associate Professor at Lanzhou University of Technology, where he teaches and conducts research in computer science. Prior to this, he worked at Lanzhou University of Arts and Science (formerly Gansu Union University) for over 15 years, developing expertise in secure routing protocols and mobile network security. His academic career has also involved supervising graduate students and contributing to research projects in security mechanisms and network design.

Awards and Honors šŸ†

Guo Xian is a member of the Association for Computing Machinery (ACM) and the China Computer Federation (CCF). He has been recognized for his contributions to computer science and secure network research. Notably, his work has been published in leading journals, and he has received several accolades for his research on secure routing protocols. His expertise continues to be recognized both domestically and internationally.

Research Focus šŸ”

Guo Xian’s research interests lie in mobile ad hoc networks (MANETs), security protocols, and intelligent systems. His work focuses on developing secure routing techniques for mobile networks, content-based systems, and privacy-aware forwarding mechanisms. Guo has also explored the integration of blockchain with software-defined networking, contributing significantly to the field’s security and privacy. His ongoing research continues to shape future advancements in these areas.

Conclusion šŸ“

Dr. Guo Xian is a highly accomplished researcher with significant contributions to network security, privacy-preserving techniques, and secure routing protocols. His deep expertise and consistent publication record make him a strong contender for the Best Researcher Award. By further expanding his interdisciplinary reach and fostering international collaborations, Dr. Xian could enhance his research’s global impact and recognition.

Publications šŸ“š

  • “Blockchain-cloud privacy-enhanced distributed industrial data trading based on verifiable credentials”
    • Authors: Fang, J., Feng, T., Guo, X., Ma, R., Lu, Y.
    • Journal: Journal of Cloud Computing, 2024, 13(1), 30
    • DOI: 10.1186/s13677-024-00306-6
    • Citations: 4

 

  • “DBCPCA: Double-layer blockchain-assisted conditional privacy-preserving cross-domain authentication for VANETs”
    • Authors: Guo, X., Lu, X., Jiang, Y., Fang, J., Zhang, D.
    • Journal: Ad Hoc Networks, 2024, 163, 103600
    • Citations: 0

 

  • “A Privacy-preserving Self-Sovereign Identity Scheme for Vehicular Ad hoc Networks”
    • Authors: Guo, X., Yuan, J., Feng, T., Fang, J., Wang, J.
    • Journal: Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2024, 46(7), pp. 2783ā€“2792
    • Citations: 0

 

  • “A Practical and UC-Secure Decentralized Key Management and Authentication Scheme Based on Blockchain for VNDN”
    • Authors: Guo, X., Almadhehagi, S., Feng, T., Jiang, Y., Fang, J.
    • Journal: Computer Science and Information Systems, 2024, 21(3), pp. 725ā€“757
    • Citations: 0

 

  • “Privacy-Preserving k-Nearest Neighbor Classification over Malicious Participants in Outsourced Cloud Environments”
    • Authors: Guo, X., Li, Y., Jiang, Y., Wang, J., Fang, J.
    • Journal: Cryptography, 2023, 7(4), 59
    • Citations: 0

 

  • “Privacy preserving multi-classification LR scheme for data quality”
    • Authors: Laicheng, C., Wentao, W., Tao, F., Xian, G.
    • Journal: Xi’an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2023, 50(5), pp. 188ā€“198
    • Citations: 0

 

  • “CPPABK: Conditional privacy-preserving authentication scheme for VANETs based on the key derivation algorithm”
    • Authors: Wang, Y., Guo, X.
    • Journal: International Journal of Security and Networks, 2023, 18(4), pp. 199ā€“212
    • Citations: 0

 

  • “An intelligent zero trust secure framework for software defined networking”
    • Authors: Guo, X., Xian, H., Feng, T., Jiang, Y., Zhang, D.
    • Journal: PeerJ Computer Science, 2023, 9, e1674
    • Citations: 0

 

  • “Homomorphic Encryption Based Privacy-Aware Intelligent Forwarding Mechanism for NDN-VANET”
    • Authors: Guo, X., Wang, B., Jiang, Y., Zhang, D., Cao, L.
    • Journal: Computer Science and Information Systems, 2023, 29(1)
    • Citations: 1

 

  • “Efficient privacy-protection scheme for distributed machine learning against collusion attack”
    • Authors: Cao, L., Wu, Q., Wu, R., Guo, X.
    • Journal: Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2022, 50(5), pp. 39ā€“45
    • Citations: 0

 

Manish Singh | Cryptography | Young Scientist Award

Mr. Manish Singh | Cryptography | Young Scientist Award

šŸ‘Øā€šŸ«Profile Summary

Experienced Cyber Security Engineer with proficiency in multiple programming languages and technologies. Certified in CEHv12, CISSP-19, CCNA, A+, N+, RHCSA, and more. Skilled in forensic examination, penetration testing, and network security. Recognized for achievements including top rankings on TryHackMe and certification in eJPT and Fortinet NSE 3. Currently pursuing a Master’s in Computer Applications with a solid foundation in Computer Science. Strong leadership abilities and adept at making informed decisions in dynamic environments.

šŸŒ Professional Profiles

 

Ā Technical SkillsšŸ› ļø

Programming Languages: C, C++, Java, IOT (Arduino, PI, NodeMCU), Web Technologies: HTML5, CSS, Bootstrap, JS, PHP, React, Node.js, ASP.Net, MySQL, CodeIgniter, Other Technologies: Hadoop, Blockchain, VA-PT, Git, GitHub, SQL, PL-SQL, No-SQL, SEO, AWS, Azure, Platforms: Windows, Linux, Red Hat Linux, Windows Server, Fedora, Cloudera

SUMMARY šŸ“

Highly skilled Cyber Security Engineer with expertise in a wide range of programming languages and technologies. Certified in various cybersecurity domains including CEHv12, CISSP-19, CCNA, A+, N+, RHCSA, and more. Proven ability to adapt to dynamic environments, make informed decisions, and manage time effectively. Experienced in leadership roles with strong attention to detail.

Ā Internships šŸ’¼

Cyber Security & Digital Forensics Intern Cyber Secured India CSI | Mumbai, IN Marchā€™23 – Present Conducted forensic examination of electronic devices and digital storage mediums. Utilized tools like MAGNET and Wireshark for forensic analysis. Worked on digital realistic labs of PortSwigger & EC Council. Cyber Security Remote Intern MasterCard NY | New York, US May ā€™23 – Present Conducted penetration testing, malware analysis, and network security tasks. Hands-on experience in vulnerability assessment and social engineering.

Achievements šŸ†

Ranked in the top 1% on TryHackMe in August ā€™23. Recognized as an Active Security Researcher by MS & eCERT India in July ā€™23. Achieved Google Local Guide level 8 in July ā€™23. Certified in eJPT and Fortinet NSE 3 in July ā€™23.

Education šŸŽ“

Masters in Computer Applications MCA Lovely Professional University | Punjab, IN Aug ā€™22 – Present CGPA: 8.1 Bachelor in Computer Applications BCA Uttarakhand Open University | Haldwani, IN July ā€™18 ā€“ Apr ā€˜21 Percentage: 75 Diploma in Computer Applications DCA FACT Education Solution Pvt. Ltd | Uttarakhand, IN May ā€™17 ā€“ Apr ā€™18 Grade: A Diploma in Cyber Security Engineering GICSP Global Institute of Cyber Technology GICT (a UPES Unit) | Dehradun, IN May ā€™17 ā€“ Dec ā€™18 Grade: A+

Ā Projects & PatentsšŸ’”

Developed a Dedicated University Management System with MCQ Addons using Web Technologies and CodeIgniter. Created a Bus Reservation Management System using C++. Conducted research on IoT, AI & LiDAR Technology based Patients & Copyrights.

Power Skills āš”

  • Adaptability
  • Detail Orientation
  • Decision Making
  • Time Management
  • Leadership

šŸ“šTop Noted Publication

    1. Targeting Lipoxygenase Enzyme by Flavonoids from Tadehagi triquetrum: a Combined In Silico and In Vitro Approach
      • Authors: Singh, V., Jubie, S., Jupudi, S., Singh, R., Singh, M.P.
      • Year: 2022

     

    1. Pharmacodynamic Stance of Phytoconstituents as a Gastric Ulcer Protective Mechanism: An Overview
      • Authors: Singh, M.P., Chawla, V., Kaushik, D., Chawla, P.A., Sisodia, S.S.
      • Year: 2022

     

    1. Wound healing activity of Terminalia bellerica Roxb. And gallic acid in experimentally induced diabetic animals
      • Authors: Singh, M.P., Gupta, A., Sisodia, S.S.
      • Year: 2020

     

    1. HPTLC analysis with the effect of bacopa monnieri, evolvulus alsinoides and tinospora cordifolia against scopolamine-induced amnesic rats
      • Authors: Gupta, A., Singh, M.P., Sisodia, S.S.
      • Year: 2020

     

    1. Qualitative analysis of gallic acid by HPLC method in different extracts of Terminalia bellerica Roxb. Fruit
      • Authors: Pal Singh, M., Gupta, A., Singh Sisodia, S.
      • Year: 2019

     

    1. Wound healing activity of the whole plant of Momordica charantia Linn. in rats
      • Authors: Singh, M.P., Sarangdevot, Y.S., Sisodia, S.S.
      • Year: 2018