Dr. Shuhao Shen | Cybersecurity | Best Researcher Award

Shuhao Shen | Cybersecurity | Best Researcher Award

Shuhao Shen, Huazhong University of Science and Technology, China

Shuhao Shen is a dedicated Ph.D. student in Cyberspace Security at Huazhong University of Science and Technology (HUST) 🎓. As a member of Professor Cai Fu’s team, he focuses on cutting-edge areas such as binary vulnerability detection, graph neural networks (GNNs), and large language model (LLM) applications 🤖. Shuhao ranks in the top 25% of his Ph.D. cohort and previously ranked 12th during his undergraduate studies. He has contributed to national-level cybersecurity projects and collaborated with QiAnXin Group on binary component analysis 🛡️. Known for his diligence, curiosity, and adaptability, Shuhao aspires to lead in cybersecurity innovation 🚀.

Professional profile :

Orcid

Suitability for Best Researcher Award :

Shuhao Shen is a promising Ph.D. researcher at Huazhong University of Science and Technology (HUST), actively contributing to the fields of binary vulnerability detection, graph neural networks (GNNs), and large language model (LLM) applications. His work addresses some of the most pressing challenges in cybersecurity, including the secure analysis of binary components—an area critical to national infrastructure and digital defense. His academic performance, demonstrated by being in the top 25% of his Ph.D. cohort and previously ranking 12th in his undergraduate class, reflects consistent excellence and intellectual rigor.

Education & Experience :

🎓 Ph.D. in Cyberspace Security — Huazhong University of Science and Technology (HUST)
📍 Wuhan, China | ⏳ Sep 2023 – Jun 2028 (Expected)

  • 🧑‍🏫 Under Prof. Cai Fu’s supervision

  • 🏅 Top 25% in academic ranking

  • 🎖️ First-Class Academic Scholarship (2023)

🎓 Bachelor’s in Cyberspace Security — HUST
📍 Wuhan, China | ⏳ Sep 2020 – Jun 2024 (Expected)

  • 🏅 Ranked 12th in major

  • 🏆 Honors: Outstanding Student Cadre, Excellent Communist Youth League Cadre

💼 Algorithm Engineer Intern — Wuhan CGCL Lab
📍 Wuhan, China | ⏳ Jul 2023 – Dec 2024

  • 🔍 Focus on graph neural networks and binary vulnerability detection

  • 🤝 Collaboration with QiAnXin Group and national-level LLM projects

Professional Development :

Shuhao Shen has developed strong skills in Python 🐍 and C++ 💻, mastering deep learning frameworks and tools like LangChain and vLLM for large model deployment. He’s proficient with vulnerability detection tools such as angr 🛠️ and IDA Pro 🧠, allowing him to design efficient rule-based and AI-assisted detection schemes. His hands-on experience includes publishing in the Journal of Systems and Software and contributing to significant projects involving binary analysis 🔬, function embedding, and open-source component recognition 🧩. Shuhao’s balanced skill set and real-world project exposure position him for continued growth in advanced cybersecurity development 🔐.

Research Focus :

Shuhao Shen’s research is centered on cyberspace security 🔐, particularly in binary vulnerability detection, graph neural networks (GNNs) 🌐, and large language models (LLMs) 🤖 for software analysis. His recent work includes utilizing angr and IDA Pro for binary feature extraction and applying function embeddings for open-source component detection in C/C++ binaries 🧩. He is actively exploring the intersection of machine learning and cybersecurity, aiming to create intelligent, automated vulnerability detection systems 🔍. His research aligns with next-generation software supply chain protection, secure development environments, and AI-augmented security tools 🚀.

Awards & Honors :

🏆 National First Prize – Undergraduate Innovation and Entrepreneurship Program (Nov 2023)
🎖️ First-Class Academic Scholarship – HUST (2023)
🎓 Outstanding Student Cadre – HUST
📣 Excellent Communist Youth League Cadre – HUST

Publication Top Notes : 

TitleBinCoFer: Three-stage purification for effective C/C++ binary third-party library detection

Author: Shuhao Shen
Publication Type: Journal article
Citation (placeholder): Shen, S. (Year). BinCoFer: Three-stage purification for effective C/C++ binary third-party library detection. Journal Name, Volume(Issue), pages. DOI

Conclusion :

Shuhao Shen demonstrates the research depth, technical innovation, and real-world impact that align perfectly with the goals of the Best Researcher Award. His advanced work in cybersecurity, particularly in leveraging AI to tackle binary vulnerabilities, is not only timely but also critical in an era of escalating digital threats. Given his contributions to both academic and industrial spheres, Shuhao is well-positioned to become a future leader in cybersecurity research, making him a highly deserving candidate for this recognition.

Assoc. Prof. Dr. Muharrem Tuncay Gençoğlu | Cybersecurity | Best Researcher Award

Assoc. Prof. Dr. Muharrem Tuncay Gençoğlu | Cybersecurity | Best Researcher Award

Assoc. Prof. Dr. Muharrem Tuncay Gençoğlu | Fırat University | Turkey

📌 Assoc. Prof. Dr. Muharrem Tuncay Gençoğlu is a distinguished researcher in Applied Mathematics, Cryptology, and Cybersecurity. He holds dual PhDs—one in Applied Mathematics from Fırat University (Türkiye) and another in Cryptology from Vector Sciences Academy (Azerbaijan). With expertise in cybersecurity, cryptographic systems, and artificial intelligence, he has worked with institutions like Fırat University, National Defense University, and Ahmet Yesevi University. His research spans random number generation, blockchain, and quantum computing, and he has published extensively in international journals. A member of multiple prestigious associations, he is actively involved in COST projects and TÜBİTAK-funded research.

Professional Profile:

Google Scholar

Suitability for Best Researcher Award

Assoc. Prof. Dr. Muharrem Tuncay Gençoğlu is a highly deserving candidate for the Best Researcher Award due to his groundbreaking contributions to Applied Mathematics, Cryptology, and Cybersecurity. His dual PhDs and extensive work with academic and defense institutions highlight his expertise and leadership in these critical fields.

Education & Experience

  • Ph.D. in Applied Mathematics – Fırat University (2013)
  • Ph.D. in Cryptology – Vector Sciences Academy, Azerbaijan
  • M.Sc. in Applied Mathematics – Fırat University (1995)
  • B.Sc. in Mathematics – Fırat University (1992)
  • B.Sc. in Mathematical Engineering – Istanbul Technical University (1997)
  • B.Sc. in Computer Engineering – Texas A&M University (2017)
  • International Relations (English, Ongoing) – Anadolu University
  • Senior Associate Professor – Fırat University (2015-Present)
  • Lecturer & Researcher – National Defense University (2017-Present)
  • Lecturer – Ahmet Yesevi University
  • Postdoctoral Researcher – Technical University of Berlin (2014)
  • Head of Department & Teacher – Private Sector (1988-2004)
  • Chairman of the Board – TEB Eğitim Hizmetleri (2004-2010)

Professional Development

📚 Dr. Gençoğlu has actively contributed to cybersecurity, cryptographic modeling, and artificial intelligence. He has received specialized training in ISO 27001 Information Security, Cyber-Terrorism, and Cyber Defense. As an academic advisor, he has guided over 50 master’s theses, including current research on cryptocurrency analysis using deep learning. He has led major TÜBİTAK-funded projects and is a member of international research groups like COST Actions. His collaborations with global cybersecurity organizations showcase his dedication to strengthening data security and cryptographic resilience.

Research Focus

🔬 Dr. Gençoğlu’s research spans applied mathematics, cybersecurity, cryptology, and artificial intelligence. His TÜBİTAK 1002 project explored random number generation through chemical reactions, a crucial innovation in cryptographic security 🔢. His work in blockchain, quantum cryptography, and network security addresses threat modeling, privacy preservation, and cyber intelligence 🔐. As a principal investigator in CHIST-ERA Distributed Systems, he contributes to privacy-enhancing cryptographic techniques. His contributions in COST Actions on mathematical modeling, quantum networks, and biological computation further cement his role as a leader in future-proof cryptographic systems.

Awards & Honors

🏆 Awards & Recognitions:

  • TÜBİTAK 1002 Grant – Project on Random Number Generation using Chemical Reactions 🏅
  • COST Action Leadership – Contributions to CA18232, CA21109, CA21169 🌍
  • Researcher in Distributed AI LabTechnical University of Berlin (2014) 🤖
  • ISO 27001 Information Security Certification – IRCA-IPC 🛡️
  • Cybersecurity & Cyber-Terrorism Certifications – Various Institutions 🔓

Publication Top Notes:

  • 🔬 Use of quantum differential equations in sonic processesApplied Mathematics and Nonlinear Sciences,  (Cited by: 62)
  • 🔐 Importance of Cryptography in Information SecurityIOSR Journal of Computer Engineering (IOSR-JCE),  (Cited by: 43)
  • 🧠 Numerical simulations to the nonlinear model of interpersonal relationships with time fractional derivativeAIP Conference Proceedings,  (Cited by: 43)
  • 🔓 Cryptanalysis of a new method of cryptography using Laplace transform hyperbolic functionsCommunications in Mathematics and Applications,  (Cited by: 24)
  • 🔢 Use of integral transform in cryptologyScience and Engineering Journal of Fırat University,  (Cited by: 18)
  • 🏫 Ortaokul öğrencilerinin bilgi güvenliği farkındalığıSavunma Bilimleri Dergisi,  (Cited by: 10)