Chingfang Hsu | Computer Science | Women Researcher Award

Dr. Chingfang Hsu | Computer Science | Women Researcher Award

 PROFESSOR, CENTRAL CHINA NORMAL UNIVERSITY, China

Dr. Chingfang Hsu is a distinguished Professor at Central China Normal University in China. With expertise in cybersecurity and authentication protocols, Dr. Hsu has contributed significantly to the field. One of his notable works is the development of the PRLAP-IoD, a PUF-based Robust and Lightweight Authentication Protocol for Internet of Drones. This innovative protocol enhances security measures for drone networks, ensuring robust protection against unauthorized access and cyber threats. Dr. Hsu’s research not only advances the realm of cybersecurity but also promotes safe and secure operations within the burgeoning domain of drone technology. 🌐🔒🛡️

Profile

Scopus

Education

From September 2010 to March 2013, I served as a Postdoctoral Research Fellow at the School of Management, Huazhong University of Science and Technology. Prior to that, I completed my Ph.D. in Computer Science from the School of Computer Science & Technology at the same university from September 2006 to June 2010. Building upon my academic journey, I obtained my Master of Science in Computer Science from the School of Computer Science & Technology, Huazhong University of Science and Technology, from September 2004 to June 2006. My educational journey commenced with a Bachelor of Science in Computer Science from the Physics School at Central China Normal University from September 1995 to June 1999. 🎓💻📚

EXperience

Since 2023, I’ve had the honor of serving as a Professor at the Computer School of Central China Normal University, contributing to the academic and research endeavors in the field. Prior to this, I broadened my horizons as a Visiting Scholar at the University of Missouri-Kansas, USA, from 2015 to 2016, immersing myself in a diverse academic environment. My journey at Central China Normal University began in 2013, where I held the position of Associate Professor at the Computer School until 2023, actively engaging in teaching and research activities. Additionally, from 1999 to 2004, I dedicated myself to shaping young minds as a Physical Teacher in a High School setting. 🎓💼🌐

Research Interests

She specializes in computer networks and information management, focusing on protocol design and its applications. Her current research interests encompass computer network architectures, algorithm and protocol design, and information management in cloud computing, big data, and group communications. Additionally, she is actively involved in research on coding techniques and formal analysis of network protocols. With a keen eye for innovation and a passion for advancing the field, she continuously explores new avenues to enhance network efficiency and security. 🖥️📡🔒

Awards

🏆 With a trailblazing career marked by numerous accolades, she has consistently excelled in academia and research. Notable achievements include the selection of her work “Key Information Security Issues and Research in Artificial Intelligence and Smart Learning” into the Hubei Provincial Laboratory Highlights Scientific and Technological Achievements Database in 2023. Her academic journey began with a full scholarship for five years at Huazhong University of Technology and Science, where she later earned recognition as an Excellent Graduate Student in 2005 and received the Excellent Paper Award in 2009. Her exemplary contributions extended to post-doctoral research, earning her the title of Excellent Post-doctorate in 2011. 🌟🎓

Publications Top Notes

PRLAP-IoD: A PUF-based Robust and Lightweight Authentication Protocol for Internet of Drones” (2024) – 1 Citation 📜

Ideal dynamic threshold Multi-secret data sharing in smart environments for sustainable cities” (2023) – 1 Citation 📚

Three-Factor Anonymous Authentication and Key Agreement Based on Fuzzy Biological Extraction for Industrial Internet of Things” (2023) – 4 Citations 📘

A Practical Lightweight Anonymous Authentication and Key Establishment Scheme for Resource-Asymmetric Smart Environments” (2023) – 2 Citations 📝

Information-theoretic secure rational secret sharing in asynchronous networks for untrusted cloud environments” (2022) – 2 Citations 📊