Headshot of Adrian Shuai Li
Adrian Shuai Li (China)

I research artificial intelligence (AI) and cybersecurity at Purdue University.

NDSS Paper: Revisiting Concept Drift in Windows Malware Detection: Adaptation to Real Drifted Malware with Minimal Samples

Headshot of Al Majid Zunquti
Almajd Zunquti (Saudi Arabia)

I research cybersecurity at University of Southern California’s Information Sciences Institute with Professor Mirkovic, focusing on how tech security impacts real people.

Headshot of Ayushi Sharma
Ayushi Sharma (US)

I’m a Purdue ECE PhD student researching memory-safe languages, ML security, and supply chain risks while hacking CTFs and reverse engineering systems.

NDSS Paper: VeriBin: Adaptive Verification of Patches at the Binary Level

Headshot of Christopher Ellie
Christopher Ellis (US)

I research networking vulnerabilities and privacy tech as a PhD candidate at Ohio State University while leading teams to tackle tough security challenges.

NDSS Paper: Deanonymizing Device Identities via Side-channel Attacks in Exclusive-use IoTs & Mitigation

Headshot of Connor Everett
Connor Everett Glosner (US)

As a research assistant at Purdue University, I examine how hardware initialization hands off control to operating systems, hunting for security gaps in these critical transitions.

NDSS Paper: FUZZUER: Enabling Fuzzing of UEFI Interfaces on EDK-2

Headshot of Derin Cayir
Derin Cayir (Turkey)

I’m a computer science PhD student at Florida International University researching machine learning applications for XR security and privacy.

NDSS Paper: Speak Up, I’m Listening: Extracting Speech from Zero-Permission VR Sensors

Headshot of Dzung Pham
Dzung Pham (US)

I’m a PhD student at University of Massachusetts Amherst researching privacy-preserving AI/ML systems, focusing on secure on-device language models under Professor Houmansadr.

NDSS Paper: RAIFLE: Reconstruction Attacks on Interaction-based Federated Learning with Adversarial Data Manipulation

Headshot of Jialiang Dong
Jialiang Dong (Australia)

I’m a cybersecurity PhD candidate at University of New South Wales researching supply chain security and AI-powered defenses, with past work on adversarial AI attacks.

NDSS Paper: Enhancing Security in Third-Party Library Reuse – Comprehensive Detection of 1-day Vulnerability through Code Patch Analysis

Jian Cui (US)

I research AI-driven cybersecurity at Indiana University Bloomington, hunting threats from social media to blockchain while now securing chatbots against emerging attacks.

NDSS Paper: Tweezers: A Framework for Security Event Detection via Event Attribution-centric Tweet Embedding

A green square
Joonkyo Jung (Korea)

I research GPU driver security at Yonsei University, developing fuzzing techniques to boost reliability.

NDSS Paper: Moneta: Ex-Vivo GPU Driver Fuzzing by Recalling In-Vivo Execution States

Headshot of Jung-Woo Chang
Jung-Woo Chang (Korea)

My research at UC San Diego focuses on uncovering security vulnerabilities in next-generation systems and designing robust defenses to protect against adversarial attacks.

NDSS Paper: Magmaw: Modality-Agnostic Adversarial Attacks on Machine Learning-Based Wireless Communication Systems

Headshot of Kaiyuan Zhang
Kaiyuan Zhang (China)

As a PhD student at Purdue University, my research interests focus on security and privacy in machine learning, recently in safe and responsible large language models.

NDSS Paper: CENSOR: Defense Against Gradient Inversion via Orthogonal Subspace Bayesian Sampling

Headshot of Keyan Guo
Keyan Guo (US)

My research at University at Buffalo thrives on merging diverse perspectives to tackle real-world cyber challenges in innovative ways.

NDSS Paper: I know what you MEME! Understanding and Detecting Harmful Memes with Multimodal Large Language Models

Headshot of Maryam Abbasihafshejani
Maryam Abbasihafshejani (US)

My primary research at the University of Texas at San Antonio focuses on generative AI security and spiking neural network security.

NDSS Paper: VoiceRadar: Voice Deepfake Detection using Micro-Frequency and Compositional Analysis

Headshot of Maryam Rostamipoor
Maryam Rostamipoor (US)

I research cloud security at Stony Brook’s Hexlab, building tools like KubeKeeper and LeakLess to harden Kubernetes and serverless platforms against modern threats.

NDSS Paper: LeakLess: Selective Data Protection against Memory Leakage Attacks for Serverless Platforms

Headshot of Qiyang Song
Qiyang Song (China)

I research cloud security at Stony Brook’s Hexlab, building tools like KubeKeeper and LeakLess to harden Kubernetes and serverless platforms against modern threats.

NDSS Paper: Silence False Alarms: Identifying Anti-Reentrancy Patterns on Ethereum to Refine Smart Contract Reentrancy Detection

Headshot of Robbie Dumitru
Robbie Dumitru (Australia)

As a PhD student at Ruhr University Bochum and the University of Adelaide, I research hardware security across two continents, analyzing side-channel vulnerabilities in semiconductors and USB connections through my dual background in electrical engineering and computer science.

NDSS Paper: On Borrowed Time – Preventing Static Side-Channel Analysis

Headshot of Runze Zhang
Runze Zhang (US)

My research at the Georgia Institute of Technology aims to dismantle large-scale threats through innovative computational approaches.

NDSS Papper: Hitchhiking Vaccine: Enhancing Botnet Remediation With Remote Code Deployment Reuse

Headshot of Ruyi Ding
Ruyi Ding (US)

I research AI security at Northeastern University, using hardware techniques like side-channel analysis to strengthen neural network privacy and robustness for real-world applications

NDSS Paper: Probe-Me-Not: Protecting Pre-trained Encoders from Malicious Probing

Headshot of Sena Sahin
Sena Sahin (US)

I research human-centered cybersecurity at Georgia Tech, studying how both professionals and everyday users make security decisions to bridge the gap between theory and real-world practice.

NDSS Paper: Was This You? Investigating the Design Considerations for Suspicious Login Notifications

Headshot of Shushang Wen
Shushang Wen (China)

As a PhD student at the University of Science and Technology of China, my research interests lie in email security, public key infrastructure, and transparency.

NDSS Paper: Automatic Insecurity: Exploring Email Auto-configuration in the Wild

Headshot of TianDong
TianDong (China)

My research at Shanghai Jiao Tong University focuses on the intersection of computer security, machine learning, and cryptography, with a particular emphasis on addressing emerging threats in artificial intelligence and edge computing.

NDSS Paper: The Philosopher’s Stone: Trojaning Plugins of Large Language Models

Headshot of Vishnu Asutosh Dasu
Vishnu Asutosh Dasu (US)

I research trustworthy machine learning at Penn State, drawing from my industry experience in applied cryptography and hardware security to build robust AI systems for real-world applications.

NDSS Paper: Privacy-Preserving Data Deduplication for Enhancing Federated Learning of Language Models

Headshot of Weili Wang
Weili Wang (China)

I design confidential computing systems at Duke University, using trusted execution environments and formal methods to build verifiably secure cloud infrastructures

NDSS Paper: WAVEN: WebAssembly Memory Virtualization for Enclaves

Headshot of Xiangmin Shen
Xiangmin Shen (China)

As a PhD candidate at Northwestern University, my research interests broadly include system security and security measurement.

NDSS Paper: Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion Detection

Headshot of Xiangyu Guo
Xiangyu Guo (China)

I build security tools at University of Toronto, from web crawlers to REST API fuzzers, making web services safer so people can use them without worrying about hacks.

NDSS Paper: EvoCrawl: Exploring Web Application Code and State using Evolutionary Search

Headshot of Xiaochen Zhu
Xiaochen Zhu (US)

I research machine learning privacy at MIT, hunting vulnerabilities in algorithms while designing protocols to keep data secure

NDSS Paper: Passive Inference Attacks on Split Learning via Adversarial Regularization

Headshot of Xuanji Meng
Xuanji Meng (China)

I push the boundaries of blockchain security at Tsinghua University, developing zero-knowledge proofs and distributed cryptography to make decentralized systems both private and trustworthy.

NDSS Paper: Rondo: Scalable and Reconfiguration-Friendly Randomness Beacon

Headshot of Yan Pang
Yan Pang (United States)

I research trustworthy machine learning at University of Virginia, working to make AI systems more reliable while collaborating with curious minds across disciplines.

NDSS Paper: Towards Understanding Unsafe Video Generation

Disclaimer: The Internet Society reserves the sole right to decide if an applicant proposal meets the eligibility requirements.