Mr. Yifan Zhang | Cybersecurity | Best Researcher Award

Mr. Yifan Zhang | Cybersecurity | Best Researcher Award

Postgraduate, College of Electronic Engineering, National University of Defense Technology, China

Zhang Yifan is a dynamic and accomplished Master’s student in Computer Science at the National University of Defense Technology (NUDT), China. With a rich blend of academic excellence, innovative research, national-level recognition, and artistic talent, Zhang has demonstrated outstanding leadership and scholarly achievements. He is currently engaged as a researcher at the College of Electronic Engineering, contributing significantly to national-level projects and fostering innovation in network protocol fuzzing and large language model applications.

Publication Profile

ORCID

Education Background 🎓

Zhang Yifan is pursuing a Master’s degree in Computer Science from NUDT. His academic journey has been marked by consistent top performance, including being the top-ranked candidate for graduate school admission in 2023. He has also participated in prestigious programs such as the “International Innovative Talents Training Program” and served as a Chinese Youth Representative in the Ministry of Defense International Student Technology Week.

Professional Experience 💼

Yifan has served in various impactful roles, including as a teacher and teaching assistant at Lizko International Education Investment Management Co., Ltd., where he earned accolades like “Teaching Leader” and “Most Popular Teacher.” Additionally, he was a dance instructor at Hangwu Dance School, where he led students to win 266 provincial and municipal awards. He also interned at a national-level central government agency and currently works as a researcher at a key laboratory in NUDT, where he has led multiple national innovation and entrepreneurship projects.

Awards and Honors 🏆

Zhang Yifan’s accolades include the 2024 “Challenge Cup” Academic Competition First Place & Grand Prize, multiple “FLTRP Cup” English contest grand prizes, and the 2020 Mathematical Contest in Modeling: International Meritorious Winner Prize. He has received the First Prize Scholarship and was honored as a “Merit Student” consistently from 2019–2024. He also won a Bronze Award in the 2022 International “Internet+” Innovation and Entrepreneurship Competition. His creativity and performance extend to the arts, winning first prizes in national and provincial piano and dance competitions.

Research Focus 🔬

Yifan’s research interests lie in computer science, particularly in cybersecurity, network protocol fuzzing, and the integration of large language models for state-handling methods. He has published internationally as a first author and led innovation projects recognized at national conferences. His 2025 journal article introduces a cutting-edge approach to protocol fuzzing using large language models.

Conclusion 🌟

Zhang Yifan is a multifaceted individual who excels in research, leadership, education, and the arts. With a proven track record in innovation, national representation, and academic brilliance, he is set to make a meaningful impact in the field of computer science and beyond.

📚 Publication Top Note

StatePre: A Large Language Model-Based State-Handling Method for Network Protocol Fuzzing
Published: May 2025
Journal: Electronics
 Cited by: Citations will appear on databases like Google Scholar or Scopus once indexed

Assoc. Prof. Dr. Waleed Almuseelem | Information Security | Best Researcher Award

Assoc. Prof. Dr. Waleed Almuseelem | Information Security | Best Researcher Award

University of Tabuk, Saudi Arabia

Dr. Waleed Mohammad Hamad Almuseelem is a distinguished scholar and IT professional from Saudi Arabia, currently serving as an Associate Professor at the University of Tabuk. With a deep-rooted passion for information security, cloud computing, and cybersecurity, he seamlessly blends theoretical knowledge with practical applications. Fluent in Arabic, English, and Chinese, he is committed to advancing digital transformation and cybersecurity solutions. His entrepreneurial mindset and technical expertise contribute to both academia and industry, fostering innovation in IT and computer science. 🌍💻

Publication Profile

🎓 Academic Background

Dr. Almuseelem earned his Ph.D. in Computer Science and Technology with a specialization in Information Security from Wuhan University of Technology, China, in 2017, achieving an “Excellent” evaluation. His dissertation focused on enhancing data security and user privacy in cloud computing. Prior to this, he completed a Master’s in Computer Science and Technology from the same university in 2012, working on secure frameworks for Java smart cards. His academic journey began with a Bachelor’s in Computer Technical Engineering from Riyadh College of Technology in 2007. 📚🎓

💼 Professional Experience

With over 15 years of experience, Dr. Almuseelem has played significant roles in academia and industry. Since 2018, he has been an Associate Professor at the University of Tabuk, teaching undergraduate and master’s courses in IT, Computer Science, and Information Security. He also holds leadership roles, including Chairman of the Supervisory Committee for Foreign Languages and Member of the Quality and Academic Accreditation Committee. Previously, he worked with STC as a systems administrator and served in the Royal Saudi Air Defense Forces as a network administrator and technical support specialist. His expertise spans cloud security, Linux administration, and IT governance. 🏢💡

🏆 Awards and Honors

Dr. Almuseelem has received notable recognitions, including the Best Graduation Dissertation Award in Information Security from Wuhan University of Technology in 2012. His contributions to research and academia are acknowledged in numerous international conferences and workshops, where he shares insights on cybersecurity and open-source technologies. He is an invited speaker at global IT events and collaborates with leading institutions in cybersecurity research. 🏅🌟

🔬 Research Focus

Dr. Almuseelem’s research is centered on cloud security, intrusion detection, zero-trust architectures, and edge computing. He has contributed innovative solutions to data privacy, lightweight authentication, and IoT security. His work integrates AI and cybersecurity to tackle modern challenges in cloud and edge computing environments. Through national and international projects, he aims to develop robust security frameworks for healthcare 4.0, industrial IoT, and enterprise networks. His research is widely cited, influencing global cybersecurity standards. 🔍🛡️

🔗 Top Publications

Intrusion Detection Systems in Cloud EnvironmentMastering Intrusion Detection for Cybersecurity, IntechOpen, 2025.

A Novel Fuzzing for RPL Network Vulnerability Analysis and Vision Transformer-based Attack Detection for IIoTJournal of Harbin Engineering University, 2024.

Continuous and Mutual Lightweight Authentication for Zero-Trust Architecture-Based Security Framework in Cloud-Edge Computing-Based Healthcare 4.0Journal of Theoretical and Applied Information Technology, 2023.

Joint Devices Energy and Data Security for Task Offloading in Multi-Tier Edge-Cloud Computing SystemsIEEE Access, 2023.

Data Privacy and Security Model in Cloud EnvironmentInternational Conference on Computing and Information Technology (ICCIT), 2023.

User Privacy and Security in Cloud ComputingInternational Journal of Security and Its Applications, 2016.

Evaluation of Data Security and Privacy Faults in Cloud ComputingEDCAV Conference, 2016.

Data Security and Privacy in Cloud ComputingAdvanced Materials Research, 2014.

📢 Conclusion

Dr. Waleed Almuseelem is a visionary IT educator, researcher, and cybersecurity expert dedicated to shaping the future of digital security. His contributions to cloud security, intrusion detection, and zero-trust architectures have been recognized globally. Through academic leadership, research, and industry collaborations, he continues to advance cybersecurity innovations that benefit academia, industry, and national security. 🚀

Zongbao Jiang | Cybersecurity | Best Researcher Award

Mr. Zongbao Jiang | Cybersecurity | Best Researcher Award

Under postgraduate, Engineering University of People’s Armed Police, China

📘 Zongbao Jiang is an emerging researcher specializing in computer technology at the Engineering University of People’s Armed Police. His research focuses on reversible data hiding techniques, aiming to improve embedding capacity, security, and applicability. Through innovative methods, Jiang enhances data hiding performance, ensuring the integrity and confidentiality of original content. Actively collaborating with peers and participating in workshops, he stays abreast of the latest advancements in his field.

Profile

Scopus

 

🎓 Education:

Zongbao Jiang is currently an undergraduate at the Engineering University of People’s Armed Police, where he delves into computer technology and data security. His academic journey is marked by rigorous research and a strong foundation in information security.

💼 Experience:

Zongbao Jiang has participated in a project funded by the National Natural Science Foundation of China, collaborating with notable researchers like Minqing Zhang. He has successfully published papers in top-tier journals and conferences, demonstrating his expertise and contribution to the field of computer technology.

🔬 Research Interests:

Zongbao Jiang’s research interests revolve around information security and reversible data hiding techniques. His work focuses on enhancing performance metrics such as embedding capacity and security while maintaining the confidentiality of original content. Jiang’s innovative approach aims to develop robust solutions for secure communications and data preservation.

🏆 Awards:

Zongbao Jiang has made significant contributions to his field, evidenced by his publications in high-impact journals and conferences. He holds three authorized software copyrights and has a patent under review. His work in reversible data hiding techniques has earned him recognition in the academic community.

Publications

Reversible Data Hiding Algorithm in Encrypted Images Based on Adaptive Median Edge Detection and Matrix-Based Secret Sharing
Link to article
Reversible Data Hiding in Encrypted Images based on Classic McEliece Cryptosystem
Link to article
Reversible Data Hiding Algorithm in Encrypted Domain Based on Matrix Secret Sharing
Link to article