Shuai Deng | Data security governance | Best Researcher Award

Mr. Shuai Deng – Data security governance – Best Researcher Award

Alignment with Award Category

Dr. Deng’s research clearly aligns with both the Best Researcher Award and Excellence in Innovation categories. His integration of artificial intelligence, system dynamics, and evolutionary game theory into real-world industrial and logistical challenges exemplifies the innovative and impactful spirit that these awards seek to recognize.

Hunan Institute of Technology | China

Profile
Orcid
Scopus

🎓Early Academic Pursuits 

Education and Training

Dr. Deng Shuai’s academic journey began with a profound interest in systems engineering and logistics management. He earned his Ph.D. in Logistics and Supply Chain Management from Central China Normal University in 2018, where he was immersed in advanced theories and applications of logistics systems, particularly those integrating information technology and optimization techniques. His doctoral research laid a strong foundation in intelligent decision-making and reinforced his commitment to addressing real-world industrial problems through academic inquiry.

💼Professional Endeavors 

Academic Positions

Currently serving as an Associate Professor at the School of Safety and Management Engineering, Hunan Institute of Technology, Dr. Deng has consistently expanded his research and teaching portfolios. He is highly regarded for developing hybrid intelligent decision systems tailored for logistics and manufacturing operations. Dr. Deng’s use of simulation tools such as NetLogo, AnyLogic, Vensim PLE, and MATLAB has enabled scalable solutions for demand forecasting, distribution path optimization, and simulation-driven governance frameworks. In his role, he has contributed to both undergraduate and postgraduate curriculum development, mentoring students and junior researchers, and fostering a dynamic academic environment that encourages interdisciplinary collaboration.

📚Contributions and Research Focus on Data security governance

Dr. Deng’s research focuses on the intersection of data security, supply chain governance, and intelligent optimization algorithms. He has led pioneering studies that integrate reinforcement learning, deep learning, and evolutionary game theory to tackle challenges in multi-scale system simulation and collaborative supply chain management. Notably, his work on RFID-enabled green supply chains addresses the crucial aspect of information leakage—a topic of growing importance in data governance. His simulation-driven approaches to collaborative behavior modeling and privacy-preserving interaction design have positioned him as a leading scholar in the field of cyber-physical logistics systems. Through more than 10 influential publications, including seven SCI/SSCI indexed articles, Dr. Deng has demonstrated academic rigor and innovation. His recent contributions in journals like Scientific Reports, Complex & Intelligent Systems, and Discrete Dynamics in Nature and Society reflect his commitment to bridging the gap between theoretical research and industrial application.

🏆Accolades and Recognition 

Dr. Deng has earned widespread recognition for his scholarly excellence and practical innovations. He has been a consistent contributor to international conferences and was featured in IEEE publications for his heuristic-based system defense strategies. His patent-pending “Smart Logistics Path Planning Module” exemplifies his forward-thinking approach and has attracted interest from logistics technology companies. In addition, his collaborative projects have been supported by several national and provincial research funds in China, further validating the impact and relevance of his research.

🌍 Impact and Influence 

Community Impact

Beyond academia, Dr. Deng’s work has had measurable influence in the development of smarter logistics networks and governance strategies for distributed systems. His models have improved operational efficiencies for logistics providers and informed policy decisions in industrial safety and supply chain risk management. Moreover, his teaching and mentorship have inspired a new generation of engineers and researchers to pursue challenges in data security, intelligent logistics, and systems simulation with a balance of technical precision and ethical responsibility.

🔮Legacy and Future Contributions 

Dr. Deng envisions a future where data governance is not just a compliance checkbox but a strategic pillar in resilient supply chains and digital infrastructure. He is currently expanding his research on multi-agent reinforcement learning to enhance real-time decision-making in dynamic environments. His legacy lies in his integrative approach—merging theory with simulation, and optimization with practical governance applications. Dr. Deng continues to build collaborations across disciplines, aiming to influence national and international frameworks for sustainable and secure industrial operations.

Conclusion

Dr. Deng Shuai’s academic and professional journey exemplifies a rare blend of deep technical expertise, visionary thinking, and impactful execution. With a career rooted in logistics systems, enriched by simulation tools, and aimed at advancing data security governance, he remains a thought leader driving the next frontier of intelligent decision systems. Whether optimizing emergency-response mechanisms or securing digital assets in supply chains, Dr. Deng’s work is helping reshape how industries think about safety, efficiency, and resilience—leaving a legacy of innovation and scholarly distinction.

📚Publications

An improved information entropy for the integrated emergency-defence system capability evaluation

 Authors: W., Shi, Wei, S., Deng, Shuai, S., Li, Shuanglin

Journals: International Journal of Automation and Control

 

Fang Ren | information science | Best Researcher Award

Dr. Fang Ren – information science – Best Researcher Award

Alignment with Award Category

Fang’s accomplishments align perfectly with the goals of the Oncology Award, as his contributions to the cybersecurity field have profound implications for the healthcare industry. In particular, his work on medical image authentication and secure transmission of health data addresses critical issues in the protection of patient information. As the healthcare sector becomes increasingly reliant on digital systems, Fang’s innovations in cryptography will play a significant role in safeguarding patient privacy and ensuring the integrity of medical data.

 

Xi’an University of Posts and Telecommunications | China

Profile

Scopus

Orcid

🎓Early Academic Pursuits 

Education and Training

Ren Fang’s academic journey began with a strong foundation in the field of computer science and mathematics. He completed his Bachelor’s degree in Computer Applications from Xidian University in December 2002. His pursuit of knowledge and passion for cryptography led him to a Master’s degree in Basic Mathematics from Northwestern University in 2007. Fang’s academic curiosity then took him to Xidian University, where he earned his PhD in Cryptography in 2012. These formative years laid the groundwork for his future contributions to the field of cybersecurity and cryptography.

💼Professional Endeavors 

Academic Positions

Fang’s professional career has been closely aligned with academia and research. Since 2012, he has been an integral part of Xi’an University of Posts and Telecommunications, where he holds the position of Associate Professor in the School of Cyberspace Security. His work as an educator and researcher in the Department of Communication and Information Engineering has had a profound impact on the academic community. Between 2012 and 2019, he served as a Lecturer and Associate Professor before transitioning to his current role in 2019. Throughout his career, Fang has been dedicated to advancing the field of cryptography, focusing on algorithms that improve security in cyberspace.

📚Contributions and Research Focus on information science

Fang’s research primarily revolves around cryptography, information security, and cybersecurity, specifically focusing on public key cryptography algorithms, digital signature algorithms, and data encryption methods. His work on enhancing the security of public key cryptography has led to significant advancements in the protection of sensitive data across various digital platforms. He has contributed to the development of new code-based linkable threshold ring signature schemes, symmetric information hiding schemes, and digital signature algorithms based on QC-LDPC codes. His contributions are not only theoretical but have practical applications as well. For example, his research into public key cryptography has been implemented in real-world projects, such as those funded by the Shaanxi Provincial Department of Science and Technology. His work in the development of a digital signature algorithm based on checksum decoding problems was funded in part by this department and successfully completed in 2022. Fang’s contributions to the field are recognized through his numerous journal articles, conference papers, and patents, including work on medical image authentication and information hiding.

🏆Accolades and Recognition 

Fang has received recognition both from academic institutions and the broader scientific community for his contributions to cryptography and information security. His work has earned him several academic awards, including the Shaanxi Provincial Department of Education Natural Science Research Award. His significant contributions have also been recognized through several patents, including those related to medical image authentication and dynamic distributed certificate management schemes. Additionally, Fang’s research has led to published papers in prestigious journals such as Wireless Communications and Mobile Computing, Journal of Information Science and Engineering, and IET Information Security.

🌍 Impact and Influence 

Community Impact

Ren Fang’s work has had a far-reaching impact on the cybersecurity and cryptography fields. His innovative research on digital signature algorithms and encryption schemes has contributed to making communication networks more secure. Additionally, his work on information hiding and image authentication has practical applications in industries such as healthcare and digital media, where data security is paramount. His teaching efforts at Xi’an University of Posts and Telecommunications have nurtured a generation of researchers and practitioners who are now advancing the field further.

 

🔮Legacy and Future Contributions 

Looking ahead, Fang’s research is poised to continue shaping the future of cybersecurity and cryptography. As cyber threats evolve, the need for more advanced security measures grows, and Fang’s ongoing work in cryptographic algorithm development is integral to meeting these challenges. His legacy will be defined not only by his publications and patents but also by the research he inspires and the professionals he mentors. His future contributions are expected to be at the forefront of securing digital communication, protecting sensitive data, and tackling emerging challenges in cybersecurity.

Conclusion

Ren Fang’s academic achievements, professional endeavors, and research contributions demonstrate his unwavering commitment to advancing the field of cryptography and information security. His impactful research, coupled with his role as an educator, positions him as a leading figure in the cybersecurity landscape. Fang’s legacy will undoubtedly continue to influence the evolution of secure communication systems, particularly in the healthcare industry. As cybersecurity challenges grow in complexity, Fang’s work will remain essential in providing innovative solutions to ensure data privacy and security across all sectors

📚Publications

  • Image analysis by fractional-order weighted spherical Bessel-Fourier moments

    Authors: T., Yang, Tengfei, Z., Liu, Zhiquan, J., Guo, Jingjing, F., Ren, Fang, T., Wang, Teng

    Journals: Pattern Recognition, 2025

    Reversible data hiding scheme in encrypted images based on homomorphic encryption and pixel value ordering

    Authors: F., Ren, Fang, Y., Hao, Yanli, K., Pang, Kexin, Z., Wu, Ziyi

    Journals: Multimedia Tools and Applications, 2024

    Data Hiding and Authentication Scheme for Medical Images Using Double POB

    Authors: F., Ren, Fang, X., Shi, Xuan, E., Tang, Enya, M., Zeng, Mengmeng

    Journals: Applied Sciences (Switzerland), 2024