Network and Distributed System Security (NDSS) Fellowship > 2026 Fellows
2026 Fellows

Adam Ayuba Salisu (Ghana)
I am a student specializing in cybersecurity and digital forensics, currently based in the United States. My research focuses on securing digital environments and protecting the integrity of digital evidence, particularly in the context of emerging technologies such as artificial intelligence.
I am passionate about advancing techniques that prevent the manipulation of digital evidence and ensure findings remain authentic and trustworthy, driven by a commitment to truth and justice.
Beyond my technical studies, I am actively developing my leadership and communication skills through public speaking and professional development programs. I believe that stepping outside one’s comfort zone is essential for both personal and professional growth.

Avinash Awasthi (India)
I am a final-year master’s student in Computer Science and Information Security at Malaviya National Institute of Technology (MNIT) Jaipur, India, where I conduct research in the Future Intelligence and Cyber Security (FICS) Lab.
My research lies at the intersection of AI for security and security for AI, with a focus on adversarial machine learning, intrusion detection, and trustworthy federated and split learning for IoT, 5G/6G, and cyber-physical systems. I work on designing resilient and efficient AI-driven security solutions for decentralized, real-world deployments, where robustness and practicality are equally important.
In my free time, I enjoy swimming and exploring thoughtfully crafted digital narratives through films and web series.

Bereket Teklew Kibret (Ethiopia)
I am a master’s researcher in Computer Engineering at Addis Ababa Science and Technology University (AASTU). In 2025, I was selected as an International Telecommunication Union (ITU) AI for Good Scholar and contributed to the development of a use case on applying AI to enhance the security and climate resilience of 5G/6G networks, published in the ITU AI for Good Innovate for Impact 2025 report.
With a background in electrical engineering and communications, my research focuses on explainable AI for lightweight network intrusion detection.
I am motivated by the belief that secure and reliable network access is foundational to equitable and sustainable development.
Outside of my academic work, I enjoy exploring new foods, listening to music, and hiking in nature.

Chenang Li (US)
I am a second-year PhD student at the University of California, Irvine, where I conduct research at the intersection of machine learning and secret-share based multiparty computation. My work is driven by an interest in privacy-preserving collaboration in AI systems and in applying machine learning to solve critical security challenges. Currently, my projects focus on enabling collaborative, secure machine learning, specifically focusing on the training and inference of sensitive datasets to ensure data privacy.
Outside of my research, I enjoy staying active through badminton and learning tennis.

Constance Nyaradzo Nyamuzibwa (Zimbabwe)
I am a Computer Science undergraduate at the Harare Institute of Technology and a software development intern at Shelter Zimbabwe, where I build practical digital tools to address community needs.
I am the founder of the #DigitalSkills4Her initiative under the Millennium Fellowship, which provides technology skills training for women in Zimbabwe. I am also beginning research on lightweight, privacy-aware security frameworks through my project, SentinelLite. My work is driven by a commitment to bridging digital divides in access, skills, and security, and to bringing perspectives from emerging economies into global cybersecurity conversations.
Outside of my studies and work, I enjoy organizing community workshops, hiking, and exploring how storytelling can make technology more inclusive.

Ebuka Chinaechetam Nkoro (US)
I am a PhD student at Towson University in Maryland, USA, where my research focuses on the trustworthiness and security of large language models (LLMs). My work examines prompt injection attacks and develops defense mechanisms to prevent malicious manipulation of AI systems.
My background combines academic research with practical experience in online safety and threat intelligence. I earned a master’s degree in South Korea, where I worked on cybersecurity challenges in the Metaverse. I also served as a threat analyst at Chainlabs, tracking illicit cryptocurrency flows to help improve the security of digital financial systems.
I am motivated by the belief that security is a prerequisite for an innovative and equitable Internet. Outside of my research, I enjoy following my favorite football team, Chelsea, and learning about new cultures.

Ehsan Khodayarseresht (Canada)
I am a PhD candidate in cybersecurity at Concordia University in Montreal, Canada. My research focuses on software vulnerability exploitation, attack technique analysis, and Internet of things (IoT) forensics.
With a background in software engineering and applied security, including experience in cloud and distributed systems, my work has contributed to peer-reviewed research on cloud energy optimization, IoT forensic reconstruction, and systematic mapping between vulnerabilities and attack techniques.
Outside of my academic work, I enjoy going to the gym and playing video games.

Enrique Francisco Sobrados Burgos (US)
I am a PhD student in Computer Science at the University of New Mexico, where my research focuses on security and privacy vulnerabilities in networked systems. My current work examines how configuration practices and insecure protocols affect user safety in commercial VPN services.
With a background in cybersecurity, I lead the University of New Mexico Caoture the flag (CTF) team. Through both research and practice, I am motivated by continuous learning, personal growth, and the opportunity to support and mentor others in the security community.
Outside of my academic work, I enjoy playing sports, listening to podcasts, watching television series, and practicing security challenges on Hack the Box.

Jennifer Vander Loop (US)
I am a PhD student at DePaul University in Chicago and a researcher in the Actionable Cybersecurity & Accessibility Lab (ACAL). My research focuses on human-centered cybersecurity, examining how individuals respond to phishing, social engineering, misinformation, and emerging AI-enabled deceptive practices such as voice cloning.
Through this work, I aim to inform the design of effective, people-centered interventions that improve online safety and trust, particularly for individuals and communities disproportionately targeted by deceptive technologies.
Alongside my research, I am actively involved in cybersecurity organizations that support student development and community building.
In my free time, I volunteer at a local animal shelter and enjoy watching baseball and spending time with my dogs.

Jiawen Shi (China)
I am a final-year PhD candidate at Huazhong University of Science and Technology, where my research focuses on AI security, with particular emphasis on prompt injection attacks in large language model (LLM) applications. Prompt injection occurs when malicious instructions are embedded in external inputs such as documents or webpages causing models to deviate from their intended behavior.
My work examines how these vulnerabilities can be exploited in real-world settings and aims to help developers better understand, assess, and mitigate security risks when deploying AI systems.
In my spare time, I enjoy playing badminton.

Komal Kumari (US)
I am a PhD candidate in Computer Science at the New Jersey Institute of Technology, where my research focuses on privacy-preserving techniques for secure cloud data operations. My work addresses Internet security challenges using information-theoretic approaches, including secret-sharing protocols for database queries and access control mechanisms that protect users from untrusted cloud infrastructure.
I have published at venues such as Very Large Data Bases Conference (VLDB), International Conference on Distributed Computing Systems (ICDCS), and Cyber Security, Cryptology, and Machine Learning Symposium (CSCML). My research aims to enable practical, deployment-ready solutions that enhance the privacy and security of sensitive data for Internet users.

KPATI Amélé Jeudida Médarde (Benin)
I am a cybersecurity analyst based in Benin, specializing in securing digital infrastructures through network security, incident response, and digital investigation. My work involves protecting systems, analyzing threats, and supporting IT defense operations across a range of environments.
I completed a master’s degree in cybersecurity and cloud computing at EPITECH Benin. I have two years of professional experience from Cybastion, where I contributed to Security Operations Center (SOC) and Computer Security Incident Response Team (CSIRT) operations, security audits, web security testing, and the protection of critical and industrial networks.
I am actively engaged in the Internet community, focusing on Domain Name System (DNS), security awareness, and capacity building. I believe that knowledge sharing is essential to building a sustainable and trustworthy Internet.
Away from my work, I enjoy learning new things, traveling, discovering new places, and listening to music.

Madaraka Marco (Tanzania)
I am a computer network and information security engineering graduate and the founder of MTANDAO POINT, a community-based initiative that provides affordable Internet access in underserved areas. My work focuses on secure network design, community networking, and advancing digital inclusion.
My background spans networking, cybersecurity, and applied artificial intelligence, with a strong interest in leveraging locally driven technologies to address real social challenges. I am particularly motivated to build secure, sustainable connectivity solutions that empower communities.
In my free time, I enjoy reading, writing about technology and social issues, and mentoring young technology enthusiasts.

Ramsha Anwar (US)
I am a first-year PhD student in computer science at the University of New Mexico. My research focuses on the privacy and security implications of healthcare applications, where I investigate the protection of sensitive data collected through smartwatches and medical questionnaires. Broadly, I am interested in the security of end-user technologies and their intersection with policy. I am driven by the belief that with the right effort, technology can be made both safe and accessible to everyone.
Outside of my research, I have a deep interest in the social sciences, particularly history and political science. I enjoy exploring these subjects through various media to broaden my perspective on the world.

Seonghun Son (South Korea)
I am a PhD candidate in Electrical and Computer Engineering at Iowa State University and a research intern at the Seagate Research Group. My research focuses on identifying security vulnerabilities in modern and emerging computing systems.
My work leverages side-channel analysis, system-level profiling, cryptography, trusted execution environment integrated designs, and AI-driven defenses to strengthen privacy and trust in real-world applications.
Outside of my research, I enjoy running and watching movies and television series.

Stijn Pletinckx (US)
I am a fourth-year PhD candidate in Computer Science at the University of California, Santa Barbara, originally from Belgium. Prior to UCSB, I earned my Bachelor’s and Master’s degrees in Computer Science from Delft University of Technology in the Netherlands, and I am originally from Belgium.
My research lies at the intersection of network security and Internet measurement, with additional focus on web security. Through empirical analysis, my work aims to characterize the Internet security landscape and develop automated vulnerability analysis techniques to assess and improve the security of Internet-scale systems.

Wang Qi (China)
I am a PhD student at Tsinghua University, where I work in the Network and Information Security Lab. My research focuses on practical security challenges on the Internet, with an emphasis on understanding how real-world systems fail and how they can be made more secure.
My work involves analyzing network protocols, experimenting with attacks and defenses, and translating research ideas into tools and publications that can be adopted by the broader community. I bring a background that combines academic research with hands-on experience from cybersecurity competitions, and I am a member of the Redbud CTF team at Tsinghua.
Outside of my research, I enjoy traveling and exploring new places, often with a camera in hand to capture the landscapes and cities I visit.

Xinshu Ma (UK)
I am a final-year PhD candidate at the University of Edinburgh, where my research focuses on network security, particularly in datacenter and cloud communications. My work explores high-performance Transport Layer Security (TLS) and other transport-layer encryption mechanisms for secure and efficient networking.
In addition to cloud networking security, I have worked on privacy-enhancing technologies and blockchain systems. I am passionate about applying cryptographic techniques to strengthen network security and about translating theoretical designs into practical, real-world systems.
In my free time, I enjoy movie nights, with The Shawshank Redemption as a long-time favorite.

Ye Wang (China)
I am a PhD candidate in Computer Science at the University of Kansas. My research focuses on the security and privacy of sensor-driven and cyber-physical systems, with particular attention to the interaction between physical and digital environments.
My background includes Bachelor’s and Master’s degrees in Electrical Engineering from Beihang University, research at the Institute of Information Engineering, Chinese Academy of Sciences, where I studied the security of physical communication channels. My work examines sensor spoofing, covert and side-channel attacks, and defenses against the misuse of AI-powered perception systems.
Outside of my academic work, I enjoy exploring natural landscapes, participating in sports, and engaging with films, musicals, theater, and video games.

Yiluo Wei (China)
I am a PhD candidate at The Hong Kong University of Science and Technology (Guangzhou). My research lies at the intersection of computer systems and computational social science, with a focus on the Web.
Using measurement-based methods, I study how Web infrastructures and social dynamics evolve and how these changes introduce risks related to safety, fairness, and resilience. I value authenticity and exploration in my research approach, and many of my projects are shaped by personal curiosity and observations drawn from everyday experiences.

Yonatan Gizachew Achamyeleh (US)
I am a PhD candidate in Computer Engineering at the University of California, Irvine, where my research focuses on the security of cyber-physical and embodied AI systems. I am particularly interested in applying binary analysis and machine learning techniques to security problems.
My work investigates emerging attack surfaces, including acoustic side channels, sensor spoofing, and hardware Trojans, and develops learning-based frameworks for security analysis and defense.
I am motivated by understanding how complex systems fail in practice and by building approaches that improve the real-world security of deployed systems.
I enjoy research at the intersection of hardware, software, and machine learning, especially where it leads to practical impact.

Yuntao Du (US)
I am a PhD student in Computer Science at Purdue University, where I work with Professor Ninghui Li on data privacy and trustworthy machine learning. My recent research focuses on developing safe and privacy-preserving large language models.
Outside of my research, I enjoy hiking in state parks and experimenting with skiing and racing.

Zhen Huang (China)
I am a PhD student at Shanghai Jiao Tong University, where my research focuses on confidential computing, including remote attestation and confidential AI. My work aims to ensure end-to-end integrity for applications in Trusted Execution Environments (TEEs) and to design runtime systems with enhanced verifiability.
I earned my bachelor’s degree in the ACM Honors Class at Shanghai Jiao Tong University and previously served as a research intern under the guidance of Prof. Dawn Song.
Outside of my research, I enjoy tending to my plants and playing the piano.

Zichuan Li (US)
I am a PhD student in Computer Science at the University of Illinois Urbana–Champaign, where my research focuses on the intersection of artificial intelligence and security. I am particularly interested in identifying security threats in AI agents and in leveraging AI techniques to automatically discover logical vulnerabilities in complex systems.
In addition to my research, I enjoy building AI agents and exploring their practical applications. Outside the lab, I enjoy watching animated films, playing video games, swimming, and practicing film photography.
Disclaimer: The Internet Society reserves the sole right to decide if an applicant proposal meets the eligibility requirements.
Leading image: © Wes Hardaker