a headshot of Adam Ayuba Salisu
Adam Ayuba Salisu (Ghana)

I am a student specializing in cybersecurity and digital forensics, currently based in the United States. My research focuses on securing digital environments and protecting the integrity of digital evidence, particularly in the context of emerging technologies such as artificial intelligence.

I am passionate about advancing techniques that prevent the manipulation of digital evidence and ensure findings remain authentic and trustworthy, driven by a commitment to truth and justice.

headshot of Avinash Awasthi
Avinash Awasthi (India)

I am a final-year master’s student in Computer Science and Information Security at Malaviya National Institute of Technology (MNIT) Jaipur, India, where I conduct research in the Future Intelligence and Cyber Security (FICS) Lab.

My research lies at the intersection of AI for security and security for AI, with a focus on adversarial machine learning, intrusion detection, and trustworthy federated and split learning for IoT, 5G/6G, and cyber-physical systems. I work on designing resilient and efficient AI-driven security solutions for decentralized, real-world deployments, where robustness and practicality are equally important.

headshot of Bereket Teklew Kibret
Bereket Teklew Kibret (Ethiopia)

I am a master’s researcher in Computer Engineering at Addis Ababa Science and Technology University (AASTU). In 2025, I was selected as an International Telecommunication Union (ITU) AI for Good Scholar and contributed to the development of a use case on applying AI to enhance the security and climate resilience of 5G/6G networks, published in the ITU AI for Good Innovate for Impact 2025 report.

With a background in electrical engineering and communications, my research focuses on explainable AI for lightweight network intrusion detection.

a headshot of Chenang Li
Chenang Li (US)

I am a second-year PhD student at the University of California, Irvine, where I conduct research at the intersection of machine learning and secret-share based multiparty computation. My work is driven by an interest in privacy-preserving collaboration in AI systems and in applying machine learning to solve critical security challenges. Currently, my projects focus on enabling collaborative, secure machine learning, specifically focusing on the training and inference of sensitive datasets to ensure data privacy.

Outside of my research, I enjoy staying active through badminton and learning tennis.

a headshot of Constance Nyaradzo Nyamuzibwa
Constance Nyaradzo Nyamuzibwa (Zimbabwe)

I am a Computer Science undergraduate at the Harare Institute of Technology and a software development intern at Shelter Zimbabwe, where I build practical digital tools to address community needs.

I am the founder of the #DigitalSkills4Her initiative under the Millennium Fellowship, which provides technology skills training for women in Zimbabwe. I am also beginning research on lightweight, privacy-aware security frameworks through my project, SentinelLite. My work is driven by a commitment to bridging digital divides in access, skills, and security, and to bringing perspectives from emerging economies into global cybersecurity conversations.

a headshot of Ebuka Chinaechetam Nkoro
Ebuka Chinaechetam Nkoro (US)

I am a PhD student at Towson University in Maryland, USA, where my research focuses on the trustworthiness and security of large language models (LLMs). My work examines prompt injection attacks and develops defense mechanisms to prevent malicious manipulation of AI systems.

My background combines academic research with practical experience in online safety and threat intelligence. I earned a master’s degree in South Korea, where I worked on cybersecurity challenges in the Metaverse. I also served as a threat analyst at Chainlabs, tracking illicit cryptocurrency flows to help improve the security of digital financial systems.

a headshot of Ehsan Khodayarseresht
Ehsan Khodayarseresht (Canada)

I am a PhD candidate in cybersecurity at Concordia University in Montreal, Canada. My research focuses on software vulnerability exploitation, attack technique analysis, and Internet of things (IoT) forensics.

With a background in software engineering and applied security, including experience in cloud and distributed systems, my work has contributed to peer-reviewed research on cloud energy optimization, IoT forensic reconstruction, and systematic mapping between vulnerabilities and attack techniques.

Outside of my academic work, I enjoy going to the gym and playing video games.

a headshot of Enrique Francisco Sobrados Burgos
Enrique Francisco Sobrados Burgos (US)

I am a PhD student in Computer Science at the University of New Mexico, where my research focuses on security and privacy vulnerabilities in networked systems. My current work examines how configuration practices and insecure protocols affect user safety in commercial VPN services.

With a background in cybersecurity, I lead the University of New Mexico Caoture the flag (CTF) team. Through both research and practice, I am motivated by continuous learning, personal growth, and the opportunity to support and mentor others in the security community.

a headshot of Jennifer Vander Loop
Jennifer Vander Loop (US)

I am a PhD student at DePaul University in Chicago and a researcher in the Actionable Cybersecurity & Accessibility Lab (ACAL). My research focuses on human-centered cybersecurity, examining how individuals respond to phishing, social engineering, misinformation, and emerging AI-enabled deceptive practices such as voice cloning.

Through this work, I aim to inform the design of effective, people-centered interventions that improve online safety and trust, particularly for individuals and communities disproportionately targeted by deceptive technologies.

a headshot of Jiawen Shi
Jiawen Shi (China)

I am a final-year PhD candidate at Huazhong University of Science and Technology, where my research focuses on AI security, with particular emphasis on prompt injection attacks in large language model (LLM) applications. Prompt injection occurs when malicious instructions are embedded in external inputs such as documents or webpages causing models to deviate from their intended behavior.

My work examines how these vulnerabilities can be exploited in real-world settings and aims to help developers better understand, assess, and mitigate security risks when deploying AI systems.

In my spare time, I enjoy playing badminton.

a headshot of
Komal Kumari
Komal Kumari (US)

I am a PhD candidate in Computer Science at the New Jersey Institute of Technology, where my research focuses on privacy-preserving techniques for secure cloud data operations. My work addresses Internet security challenges using information-theoretic approaches, including secret-sharing protocols for database queries and access control mechanisms that protect users from untrusted cloud infrastructure.

I have published at venues such as Very Large Data Bases Conference (VLDB), International Conference on Distributed Computing Systems (ICDCS), and Cyber Security, Cryptology, and Machine Learning Symposium (CSCML). My research aims to enable practical, deployment-ready solutions that enhance the privacy and security of sensitive data for Internet users.

a headshot of KPATI Amélé Jeudida Médarde
KPATI Amélé Jeudida Médarde (Benin)

I am a cybersecurity analyst based in Benin, specializing in securing digital infrastructures through network security, incident response, and digital investigation. My work involves protecting systems, analyzing threats, and supporting IT defense operations across a range of environments.

I completed a master’s degree in cybersecurity and cloud computing at EPITECH Benin. I have two years of professional experience from Cybastion, where I contributed to Security Operations Center (SOC) and Computer Security Incident Response Team (CSIRT) operations, security audits, web security testing, and the protection of critical and industrial networks.

a headshot of Madaraka Marco
Madaraka Marco (Tanzania)

I am a computer network and information security engineering graduate and the founder of MTANDAO POINT, a community-based initiative that provides affordable Internet access in underserved areas. My work focuses on secure network design, community networking, and advancing digital inclusion.

My background spans networking, cybersecurity, and applied artificial intelligence, with a strong interest in leveraging locally driven technologies to address real social challenges. I am particularly motivated to build secure, sustainable connectivity solutions that empower communities.

a headshot of Ramsha Anwar
Ramsha Anwar (US)

I am a first-year PhD student in computer science at the University of New Mexico. My research focuses on the privacy and security implications of healthcare applications, where I investigate the protection of sensitive data collected through smartwatches and medical questionnaires. Broadly, I am interested in the security of end-user technologies and their intersection with policy. I am driven by the belief that with the right effort, technology can be made both safe and accessible to everyone.

Outside of my research, I have a deep interest in the social sciences, particularly history and political science. I enjoy exploring these subjects through various media to broaden my perspective on the world.

a headshot of Seonghun Son
Seonghun Son (South Korea)

I am a PhD candidate in Electrical and Computer Engineering at Iowa State University and a research intern at the Seagate Research Group. My research focuses on identifying security vulnerabilities in modern and emerging computing systems.

My work leverages side-channel analysis, system-level profiling, cryptography, trusted execution environment integrated designs, and AI-driven defenses to strengthen privacy and trust in real-world applications.

Outside of my research, I enjoy running and watching movies and television series.

a headshot of Stijn Pletinckx
Stijn Pletinckx (US)

I am a fourth-year PhD candidate in Computer Science at the University of California, Santa Barbara, originally from Belgium. Prior to UCSB, I earned my Bachelor’s and Master’s degrees in Computer Science from Delft University of Technology in the Netherlands, and I am originally from Belgium.

My research lies at the intersection of network security and Internet measurement, with additional focus on web security. Through empirical analysis, my work aims to characterize the Internet security landscape and develop automated vulnerability analysis techniques to assess and improve the security of Internet-scale systems.

a headshot of Wang Qi
Wang Qi (China)

I am a PhD student at Tsinghua University, where I work in the Network and Information Security Lab. My research focuses on practical security challenges on the Internet, with an emphasis on understanding how real-world systems fail and how they can be made more secure.

My work involves analyzing network protocols, experimenting with attacks and defenses, and translating research ideas into tools and publications that can be adopted by the broader community. I bring a background that combines academic research with hands-on experience from cybersecurity competitions, and I am a member of the Redbud CTF team at Tsinghua.

a headshot of Xinshu Ma
Xinshu Ma (UK)

I am a final-year PhD candidate at the University of Edinburgh, where my research focuses on network security, particularly in datacenter and cloud communications. My work explores high-performance Transport Layer Security (TLS) and other transport-layer encryption mechanisms for secure and efficient networking.

In addition to cloud networking security, I have worked on privacy-enhancing technologies and blockchain systems. I am passionate about applying cryptographic techniques to strengthen network security and about translating theoretical designs into practical, real-world systems.

In my free time, I enjoy movie nights, with The Shawshank Redemption as a long-time favorite.

a headshot of Ye Wang
Ye Wang (China)

I am a PhD candidate in Computer Science at the University of Kansas. My research focuses on the security and privacy of sensor-driven and cyber-physical systems, with particular attention to the interaction between physical and digital environments.

My background includes Bachelor’s and Master’s degrees in Electrical Engineering from Beihang University, research at the Institute of Information Engineering, Chinese Academy of Sciences, where I studied the security of physical communication channels. My work examines sensor spoofing, covert and side-channel attacks, and defenses against the misuse of AI-powered perception systems.

a headshot of Yiluo Wei
Yiluo Wei (China)

I am a PhD candidate at The Hong Kong University of Science and Technology (Guangzhou). My research lies at the intersection of computer systems and computational social science, with a focus on the Web.

Using measurement-based methods, I study how Web infrastructures and social dynamics evolve and how these changes introduce risks related to safety, fairness, and resilience. I value authenticity and exploration in my research approach, and many of my projects are shaped by personal curiosity and observations drawn from everyday experiences.

a headshot of Yonatan Gizachew Achamyeleh
Yonatan Gizachew Achamyeleh (US)

I am a PhD candidate in Computer Engineering at the University of California, Irvine, where my research focuses on the security of cyber-physical and embodied AI systems. I am particularly interested in applying binary analysis and machine learning techniques to security problems.

My work investigates emerging attack surfaces, including acoustic side channels, sensor spoofing, and hardware Trojans, and develops learning-based frameworks for security analysis and defense.

a headshot of Yuntao Du
Yuntao Du (US)

I am a PhD student in Computer Science at Purdue University, where I work with Professor Ninghui Li on data privacy and trustworthy machine learning. My recent research focuses on developing safe and privacy-preserving large language models.

Outside of my research, I enjoy hiking in state parks and experimenting with skiing and racing.

a headshot of Zhen Huang
Zhen Huang (China)

I am a PhD student at Shanghai Jiao Tong University, where my research focuses on confidential computing, including remote attestation and confidential AI. My work aims to ensure end-to-end integrity for applications in Trusted Execution Environments (TEEs) and to design runtime systems with enhanced verifiability.

I earned my bachelor’s degree in the ACM Honors Class at Shanghai Jiao Tong University and previously served as a research intern under the guidance of Prof. Dawn Song.

a headshot of Zichuan Li
Zichuan Li (US)

I am a PhD student in Computer Science at the University of Illinois Urbana–Champaign, where my research focuses on the intersection of artificial intelligence and security. I am particularly interested in identifying security threats in AI agents and in leveraging AI techniques to automatically discover logical vulnerabilities in complex systems.

In addition to my research, I enjoy building AI agents and exploring their practical applications. Outside the lab, I enjoy watching animated films, playing video games, swimming, and practicing film photography.

Disclaimer: The Internet Society reserves the sole right to decide if an applicant proposal meets the eligibility requirements.