Qutaiba Alasad | Computer Engineering Security | Best Researcher Award

Assoc. Prof. Dr. Qutaiba Alasad | Computer Engineering Security | Best Researcher Award

Cybersecurity, previously at University of Central Florida in USA and now at Tikrit University in Iraq

Qutaiba Abdullah Hasan Alasad is an Associate Professor and Head of the Department of Control and Computer Engineering at the University of Tikrit, Iraq. With a Ph.D. in Computer Engineering from the University of Central Florida (UCF), USA, he has developed expertise in hardware security, particularly in the areas of logic encryption, obfuscation techniques, and secure design for emerging devices. His research work focuses on enhancing hardware protection, preventing side-channel attacks, and leveraging memory computing for secure and high-performance systems. He has also been involved in various presentations and has earned several prestigious awards for his contributions to computer engineering and cybersecurity. 📚🔒

Publication Profile

Google Scholar

Education

Dr. Alasad completed his Ph.D. in Computer Engineering from the University of Central Florida (UCF) in 2020, with a perfect GPA of 4.0/4.0. His dissertation, titled “Provably Trustworthy and Secure Hardware Design with Low Overhead,” was supervised by Prof. Yuan Jiann-Shiun. He also holds an M.Sc. in Computer Engineering from the University of Mosul, Iraq, where he designed a math pipeline processor using VHDL and implemented it on Spartan-3E. 🎓🇮🇶

Experience

Dr. Alasad has served in various prestigious positions, including the Head of the Department at the University of Tikrit’s College of Petroleum and Minerals Engineering and Dean of the College of Petroleum Systems Control Engineering. He was also involved in several roles at the University of Central Florida, where he worked under the supervision of Prof. Jiann-Shiun Yuan. His vast experience spans over teaching, research, and administrative roles. 💼👨‍🏫

Awards and Honors

Dr. Alasad has received several notable recognitions, including a Travel Award from the ICCD Conference in 2017 and a complimentary annual membership from Gabriele Kotsis, President of the ACM journal, in 2020. He has presented his research at various symposiums, covering topics such as Internet of Things (IoT) applications and power electronics systems simulation. 🏅🌍

Research Focus

Dr. Alasad’s research interests are centered around hardware security, particularly logic encryption and obfuscation techniques, side-channel attack prevention, and the application of emerging devices to enhance hardware security. He is also focused on designing secure memory systems using ReRAM and creating high-performance machine learning accelerators. Additionally, his work on big data security and cybersecurity protection based on machine learning is highly impactful in the domain. 🔐💻

Conclusion

Qutaiba Alasad’s interdisciplinary expertise and contributions to hardware security, especially in the realm of logic encryption and emerging devices, position him as a leader in the field. His academic achievements, coupled with his extensive work in cybersecurity, make him a prominent figure in the engineering community. 🏆👨‍💻

Publications

Design a Pipelined Math Processor, Doubling Its Speed and Implementing It on FPGA

Al-Rafidain Engineering Journal (AREJ), Volume 22, Issue 4, Pages 131-148, 2014

Cited by: 10+

E2LEMI: Energy-Efficient Logic Encryption Using Multiplexer Insertion

Electronics, vol. 6, issue 1, 2017

Cited by: 50+

Logic Locking Using Hybrid CMOS and Emerging SiNW FETs

Electronics, vol. 6, issue 3, 2017

Cited by: 30+

Ultra-Low-Power Design and Hardware Security Using Emerging Technologies for Internet of Things

Electronics, vol. 6, issue 3, 2017

Cited by: 40+

Logic Obfuscation against IC Reverse Engineering Attacks with Low Overhead

ACM Trans. TODAES, 2020

Cited by: 75+

Resilient and Secure Hardware Devices Using ASL

ACM journal on emerging technologies in computing systems, 2021

Cited by: 20+

Multi-Tier 3D IC Physical Design with Analytical Quadratic Partitioning Algorithm Using 2D P&R Tool

Electronics, 2021

Cited by: 15+

Mitigation of Black-Box Attacks on Intrusion Detection Systems-Based ML

MDPI Computers, 2022

Cited by: 25+

Jiang Zhou | Data Security | Best Researcher Award

Mr. Jiang Zhou | Data Security | Best Researcher Award

Associate Professor, Institute of Information Engineering, Chinese Academy of Sciences, China

👨‍🏫 Dr. Jiang Zhou is an Associate Professor at the Institute of Information Engineering, Chinese Academy of Sciences and the University of Chinese Academy of Sciences. He earned his Ph.D. from the same institution in 2014 and was a visiting scholar at Texas Tech University from 2015 to 2018. Dr. Zhou’s research focuses on data storage security, privacy computing, and distributed computing, with over 40 publications and numerous contributions to high-performance computing. He actively contributes to several major research projects and serves as a reviewer for leading journals. Dr. Zhou is a member of the IEEE and CCF.

Publication Profile

Google Scholar

Strengths for the Award:

  1. Prolific Publication Record: Jiang Zhou has published over 40 papers in prestigious journals and conferences, with 10 journal publications, 5 of which are SCI-indexed. This demonstrates a solid research foundation, especially in the field of data storage security and privacy computing.
  2. Strong Research Impact: His h-index of 11, with 193 citations since 2019 and a total of 271 citations, showcases the relevance and influence of his research in the academic community.
  3. Project Leadership: He has led significant projects, including the National Natural Science Foundation of China (NSFC) and the Strategic Priority Research Program of the Chinese Academy of Sciences, highlighting his ability to secure and manage high-profile research initiatives.
  4. Innovative Contributions: His work on developing distributed file systems (CFS), data distribution algorithms (SUORA and PRS), secure cloud storage systems, and insider threat detection methods like Log2Graph and LAAEB has direct practical implications, especially in enhancing data security for large organizations like China Mobile.
  5. International Collaboration: His collaboration with Prof. Yong Chen at Texas Tech University, along with his role as a visiting scholar, indicates his global research engagement and his ability to contribute to international projects on data-intensive scalable computing.
  6. Industry Relevance: His research has applications in industry, particularly through projects such as secure cloud storage systems and insider threat detection used by China Mobile, which further amplifies the real-world impact of his work.
  7. Professional Involvement: As an active member of the IEEE and CCF and a reviewer for high-impact journals such as TPDS, TC, and TOS, Zhou is well-integrated within the academic and professional communities, further supporting his candidacy.

Areas for Improvement:

  1. Broader Impact and Outreach: While Zhou has made notable technical contributions, greater emphasis on community outreach or public dissemination of research might improve his profile for broader recognition. Engaging more in public talks, conferences, or workshops would further solidify his reputation as a leader in his field.
  2. Patents and Consultancy: Although he has 2 patents published or in progress, focusing more on technology transfer, commercialization of his innovations, or further collaboration with industry could enhance the practical applications of his research. He currently has limited consultancy or industry collaborations beyond academia.
  3. Cross-disciplinary Work: Expanding his research into adjacent fields such as AI or machine learning, and exploring interdisciplinary collaborations could position him more strongly as a cutting-edge researcher.

 

Education

🎓 Jiang Zhou received his Ph.D. in Computer Science from the University of Chinese Academy of Sciences in 2014. His academic journey includes a visiting scholar stint at Texas Tech University, where he contributed to large-scale projects on high-performance computing and data storage. His strong educational foundation has been pivotal in driving forward his research in data security and distributed systems.

Experience

💼 Dr. Zhou holds the position of Associate Professor at the Institute of Information Engineering, Chinese Academy of Sciences. His academic career is marked by extensive involvement in cutting-edge research, particularly in data security and storage. From 2015 to 2018, he served as a visiting scholar at Texas Tech University, where he collaborated on several key projects related to scalable computing instruments for high-performance computing. He has led significant national research initiatives, including the National Natural Science Foundation of China.

Research Focus

🔬 Dr. Zhou’s research interests lie in file and storage systems, data security, parallel computing, and insider threat detection. He has made impactful contributions in optimizing I/O operations, enhancing metadata services, and improving data availability and security in large-scale distributed systems. His work has introduced innovative data distribution algorithms and insider threat detection techniques that are widely recognized in the computing community.

Awards and Honors

🏆 Throughout his academic career, Dr. Zhou has been recognized for his contributions to data storage and security. He has successfully led several national research projects and collaborated on international initiatives. His research output has earned him an esteemed reputation in the field, particularly with regard to his contributions to distributed computing and storage optimization.

Publications Top Notes

📚 Dr. Zhou has published over 40 peer-reviewed papers, including highly cited works in renowned journals such as TPDS, TC, and TSC. His top 5 SCI-indexed publications include groundbreaking research on distributed file systems, insider threat detection, and data security. His work is consistently cited, with over 271 citations to date. Below are some of his notable publications:

“Secure Data Distribution in Heterogeneous Storage Systems” (2023) – IEEE Transactions on Computers (TC), cited by 10 articles. Link

“Insider Threat Detection Using Log2Graph” (2022) – Journal of Computer Security (JCS), cited by 15 articles. Link

“High-Performance Distributed Metadata Services on Hadoop” (2021) – IEEE Transactions on Parallel and Distributed Systems (TPDS), cited by 20 articles. Link

“PRIME: A Scalable Data Management System for Cloud” (2020) – Journal of Parallel and Distributed Computing (JPDC), cited by 12 articles. Link

“Confidential Computing: Challenges and Solutions” (2019) – Computer & Security (COSE), cited by 18 articles. Link

Conclusion:

Jiang Zhou is a highly qualified candidate for the Best Researcher Award, given his strong academic contributions, leadership in impactful projects, and tangible real-world applications of his research. His innovations in data storage security, distributed systems, and insider threat detection make him an exceptional contender. Focusing more on cross-disciplinary work, commercialization, and outreach could enhance his profile even further, but overall, his current achievements are commendable and align well with the expectations of a Best Researcher Award recipient.