Mar. 25, 2026
A graphic of a boat sailing across the globe with a cyber shield at its front.

Whether it’s a fire or a flood, a ship’s crew can only rely on itself and its training in emergencies at sea. The same is true for crews facing digital threats on oil tankers, cargo ships, and other commercial vessels.

New cybersecurity research from the Georgia Institute of Technology, however, revealed that crews aboard commercial vessels were often not adequately prepared to manage cyberattacks effectively due to systemic training gaps.

The findings are based on interviews conducted by researchers with more than 20 officer-level mariners to assess the maritime industry’s readiness to handle cybersecurity attacks at sea.

"Historically, cybersecurity research has focused heavily on cyber-physical systems like cars, factories, and industrial plants, but ships have largely been overlooked,” said Anna Raymaker, Ph.D. student and lead researcher.

“That gap is concerning when more than 90% of the world’s goods travel by sea. Recent incidents, from GPS spoofing to ships linked to subsea cable disruptions, show that maritime systems are increasingly part of the global cyber threat landscape.”

The researchers proposed four practical strategies to strengthen maritime cyber defenses and close the training gaps. Their findings were presented recently at the ACM SIGSAC Conference on Computer and Communications Security (CCS).

1. Make Cybersecurity Training Actually Maritime

Many of those interviewed for the study described current cybersecurity training as “boilerplate” — generic modules that don’t reflect real shipboard risks. 

Researchers recommend:

  • Role-specific instruction: Navigation officers should learn to detect and identify GPS spoofing. Engineers should focus on vulnerabilities in remotely monitored systems.
  • Bridging IT and Operational Technology: Crews need to understand how attacks on IT systems can trigger physical consequences in operational technology — including collisions, groundings, or explosions.
  • Hands-on delivery: Replace passive PowerPoints with drills and in-person exercises that build muscle memory.
  • Accessible standards: Training must account for the wide range of educational backgrounds across crews and be standardized across ranks.
2. Move Beyond “Call IT”

At sea, crews can’t simply escalate a cyber incident to a shore-based IT department and wait. Operational resilience requires onboard readiness.

Researchers recommend:

  • Vessel-specific response plans: Ships need clear, actionable protocols for threats such as AIS jamming or radar manipulation.
  • Military-style drills: Adopting MCON (Emission Control) exercises — used by the U.S. Military Sealift Command — can train crews to operate safely without electronic systems.
  • Stronger connectivity controls: High-bandwidth satellite systems like Starlink introduce new risks. Clear policies and network segregation are essential to prevent new entry points for attackers.
Related Article: When GPS lies at sea: How electronic warfare is threatening ships and their crews by Anna Raymaker
3. Create Unified, Ship-Specific Regulations

Maritime cybersecurity regulations are often reactive and fragmented. Researchers argue the industry needs a cohesive, domain-specific framework.

Key recommendations include:

  • A unified global model: Like the energy sector’s NERC CIP standards, a maritime framework could mandate baseline controls such as encryption, network segmentation, and anonymous incident reporting.
  • Rules built for real crews: Regulations designed for large naval operations don’t translate well to smaller merchant or research vessels. Standards must reflect actual shipboard conditions.
  • Future-proofing requirements: Autonomous ships and remotely operated vessels expand the cyber-physical attack surface. Regulations must proactively address these emerging technologies.
4. Invest in Maritime-Specific Cyber Research

Finally, the researchers stress that long-term resilience requires deeper technical research focused on maritime systems.

Priority areas include:

  • Real-time intrusion detection systems tailored to shipboard protocols.
  • Proactive security risk assessments of interconnected onboard systems.
  • Cyber-physical modeling to better understand cascading failures in complex maritime environments.
The Bottom Line

Cyber threats at sea are no longer hypothetical. Mariners report real-world incidents ranging from GPS spoofing to ransomware that disrupts global trade.

“Through our interviews with mariners, I saw firsthand how much dedication and pride they take in their work,” said Raymaker. “Our goal is for this research to serve as a call to action for researchers, policymakers, and industry to invest more attention in maritime cybersecurity and support the people who risk their lives every day to keep global trade, food, and energy moving."

A Sea of Cyber Threats: Maritime Cybersecurity from the Perspective of Mariners was presented at CCS 2025. It was written by Raymaker and her colleagues, Ph.D. students Akshaya Kumar, Miuyin Yong Wong, and Ryan Pickren; Research Scientist Animesh Chhotaray, Associate Professor Frank Li, Associate Professor Saman Zonouz, and Georgia Tech Provost and Executive Vice President for Academic Affairs Raheem Beyah.

News Contact

John Popham

Communications Officer II School of Cybersecurity and Privacy 

Mar. 18, 2026
A new cohort of computing students has been named Squarepoint Foundation scholars.

A new cohort of computing students has been named Squarepoint Foundation scholars.

Five Georgia Tech computer science (CS) students have been named Squarepoint Foundation Scholars, receiving merit- and need-based scholarships for their undergraduate studies. The Squarepoint Foundation is providing $100,000 to fund the awards, which offer $10,000 per year for two years to rising third-year students. 

Now in its second year of supporting the College of Computing, the Squarepoint Foundation continues to expand opportunities, enabling students to focus fully on their studies and pursue activities outside the classroom.  

A selection committee led by Mary Hudachek-Buswell, interim chair of the School of Computing Instruction (SCI), chose this year’s cohort.  

“These students exemplify the curiosity, talent, and determination we strive to cultivate in computer science,” Hudachek-Buswell said. “The Squarepoint Foundation Scholarships will give them the opportunity to focus fully on their studies while pursuing research and projects that have the potential to make a real-world impact.” 

The scholars have demonstrated strong leadership across campus, with all five serving as teaching assistants (TAs) and earning faculty honors. The cohort is also engaged in research and study abroad opportunities. 

Founded in 2021, the Squarepoint Foundation supports STEM education and research while partnering with organizations worldwide to expand opportunity and access.  

“We are proud to continue our partnership with Georgia Tech, as we extend our support to a number of students working towards achieving their academic goals,” said Allison Henry, Squarepoint Foundation manager.  

“The Squarepoint Foundation aims to increase access to education, ensuring that all individuals have the opportunity to pursue the degree of their choice, no matter their circumstances. We wish these talented students the best of luck as they undertake their studies and recognize them for their hard work and dedication to the STEM field."

Meet the Scholars

Maria Cymbalyuk 

Cymbalyuk studies Cybersecurity and Information Internetwork threads, focusing on how technical systems shape who is protected or exposed in digital environments. She’s interested in supporting public defenders and improving access to justice through technology. 

“This scholarship made this semester feel less financially stressful and more like I can focus on building the skills and experiences I care about,” Cymbalyuk said. “I want to use my skills to build tools and do research that supports public interest organizations.” 

Marziah Islam 

Islam concentrates on the People and Intelligence threads, exploring how humans interact with technology. She is developing a sign-language learning mobile app through a Vertically Integrated Project and hopes to build accessible, reliable systems in healthcare technology.  

“I am fascinated by the intersection of humans and computing, and I want to design technology that better supports real people,” Islam said. 

Sahadev Bharath 

Bharath studies Architecture and Information Internetworks threads, with interests in low-level programming, operating systems, and large-scale systems. He plans to begin his career in software engineering, focusing on distributed systems and AI infrastructure.  

“Coming from India, being able to afford out-of-state tuition has been a challenge. This scholarship relieves financial stress and gives me more time to focus on my academics and career,” Bharath said. 

“I am passionate about teaching and sharing my knowledge with fellow students. Being a TA has been extremely fulfilling and motivates me to continue contributing to education.” 

Joie Yeung 

Yeung studies Information Internetworks and Intelligence threads, with a focus on data and artificial intelligence. She has received the President’s Volunteer Service Award for completing more than 100 service hours in one year. In addition to pursuing a career in software engineering, she is passionate about mentoring younger girls and addressing the gender gap in STEM.  

“I want to create meaningful and impactful technology while giving back to my communities. I also aim to show younger girls that they can succeed in computing despite the gender gap,” Yeung said. 

Jun Hong Wang 

Wang studies system architecture and intelligence with a minor in mathematics, concentrating on computer architecture and low-level optimization. He is considering careers in software engineering, research, or entrepreneurship at the intersection of hardware and software.  

“I’m especially interested in how hardware and software intersect, and I hope to use my work to create solutions that are meaningful and helpful for the world,” Wang said. 

The scholarships offer vital support as these students keep advancing research, leadership, and influence in computing. 

News Contact

Emily Smith
College of Computing
Georgia Tech

Mar. 12, 2026
Group of people at Georgia Tech/Sandia MOU signing

Photo by Alicia Bustillos from Sandia National Laboratories

Since 2020, Georgia Tech has partnered with Sandia National Laboratories, a federally funded research and development center focused on national security. In February, the two institutions renewed their collaboration with a new Memorandum of Understanding (MOU), reaffirming a relationship that has already strengthened research capabilities on both sides.

The partnership has driven progress in areas ranging from hypersonics to bioscience, while also deepening institutional ties beyond research. Joint faculty appointments — such as Anirban Mazumdar, who holds roles at both Sandia and the George W. Woodruff School of Mechanical Engineering — demonstrate how closely the organizations work together. The collaboration has also expanded student talent pipelines, providing more avenues for Georgia Tech students to pursue careers at the national lab.

“At its core, this partnership is about people,” said Tim Lieuwen, executive vice president for Research at Georgia Tech. “Sandia and Georgia Tech share a commitment to discovery and developing the talent, creativity, and collaboration our nation needs.”

The renewed MOU, he said, “strengthens connections between our researchers, opens new doors for our students, and builds meaningful career pathways into national service. When our communities work together to address national priorities, we not only accelerate technological advances — we expand opportunities for the people who will shape the future of our nation’s security.”

Under the new MOU, Sandia and Georgia Tech will focus on integrated research across key national security‑aligned areas, including secure artificial intelligence and computing, quantum technologies, critical minerals, advanced manufacturing, energy and grid resilience, and hypersonics. The partnership emphasizes connecting manufacturing, computation, and systems approaches directly to national security applications.

“Together, we have been solving new and unprecedented challenges in science and engineering, and now we have a great opportunity to develop this partnership,” said Dan Sinars, Sandia’s deputy chief research officer. “Our research benefits both national security and national prosperity, and keeps the country at the forefront of the world.”

With this strengthened connection, the partners aim to grow their shared research footprint through increased funding, publications, and faculty-led startups. Over the long term, Georgia Tech intends to become one of Sandia’s top hiring pipelines, ensuring that talent developed through joint research continues into national security careers.

History of the Partnership

The Institute’s collaboration with Sandia began in the mid‑2010s, when the labs selected Georgia Tech as one of its partner institutions. The first MOU, signed in 2015, formalized the relationship and outlined initial technical focus areas. 

In 2018, George White, executive director of strategic partnerships, and Olof Westerstahl,  senior director strategic initiatives in the Office of Corporate Engagement, helped expand the partnership. They launched “Sandia Day,” an event designed to introduce Georgia Tech faculty to Sandia researchers and spark new collaborations. By 2020, the organizations signed a second MOU that expanded the partnership’s technical focus areas to include energy and grid security, materials and nanotechnology, advanced electronics, advanced manufacturing, advanced computing, cyber and information security, bioscience, hypersonics, quantum information science, and engineering sciences.

The results have been substantial. Since 2018, Sandia has sponsored $35 million in research collaborations with Georgia Tech. Researchers from both institutions have co-authored 450 publications since 2016. Research activity continues to accelerate, with $1.6 million in new contracts in the past year alone. As of August 2025, Sandia employs 325 Georgia Tech alumni — a testament to the impact of the growing talent pipeline.

“We view our work with Sandia as the model for engagement with other national labs,” said White. “With the new MOU, we will continue to grow the Sandia partnership. I would like to see our footprint double in scope in the next five years.”

 

News Contact

Tess Malone, Senior Research Writer/Editor

tess.malone@gatech.edu

Feb. 25, 2026
A graphic showing an AI model in an outstretched hand.

Artificial intelligence (AI) systems power everything from chatbots to security cameras, yet many of the most advanced models operate as “black boxes.” Companies can use them, but outsiders can’t see how they were built, where they came from, or whether they contain hidden flaws.

This lack of transparency creates real risks. A model could contain security vulnerabilities or hidden backdoors. It could also be a lightly modified version of an open-source system — repackaged in violation of its license — with no easy way to prove it.

Researchers at the Georgia Institute of Technology have developed a new framework, ZEN, to help solve this problem. The tool can recover a model’s unique “fingerprint” directly from its memory, allowing experts to trace its origins and reconstruct how it was assembled.

“Analyzing a proprietary AI model without identifying where it came from and how it is constructed is like trying to fix a car engine with the hood welded shut,” said David Oygenblik, a Ph.D. student at Georgia Tech and the study’s lead author.

“ZEN not only X-rays the engine but also provides the complete wiring diagram.”

ZEN works by taking a snapshot of a running AI system and extracting information about both its mathematical structure and the code that defines it. It compares that fingerprint against a database of known open-source models to determine the system’s origin.

If it finds a match, ZEN identifies the exact changes and generates software patches that allow investigators to recreate a working replica of the proprietary model for testing.

That capability has major implications for both security and intellectual property protection.

“With ZEN, a security analyst can finally test a black-box model for hidden backdoors, and a company can gather concrete evidence to prove its software license was infringed,” Oygenblik said.

To evaluate the system, the research team tested ZEN on 21 state-of-the-art AI models, including Llama 3, YOLOv10, and other well-known systems.

ZEN correctly traced every customized model back to its original open-source foundation — achieving 100% attribution accuracy. Even when models had been heavily modified — differing by more than 83% from their original versions — ZEN successfully identified the changes and enabled full reconstruction for security testing.

The researchers will present their findings at the 2026 Network and Distributed System Security (NDSS) Symposium. The paper, Achieving Zen: Combining Mathematical and Programmatic Deep Learning Model Representations for Attribution and Reuse, was authored by Oygenblik, master’s student Dinko Dermendzhiev, Ph.D. students Filippos Sofias, Mingxuan Yao, Haichuan Xu, and Runze Zhang, post-doctorate scholars Jeman Park, and Amit Kumar Sikder, as well as Associate Professor Brendan Saltaformaggio.

News Contact

John Popham

Communications Officer II School of Cybersecurity and Privacy 

Feb. 02, 2026
Top executives from Atlanta's venture capital community participated in the College of Computing's first VC summit, held on Jan. 21.

Top executives from Atlanta's venture capital community participated in the College of Computing's first VC summit, held on Jan. 21. Photo by Terence Rushin/GT Computing

The College of Computing is forging new relationships with Atlanta’s venture capital community to advance entrepreneurial opportunities for students.

Nearly two dozen venture capital (VC) leaders based in Atlanta and the Southeast participated in a half-day summit at the College on Jan. 21.

Co-hosts Dean of Computing Vivek Sarkar and Noro-Moseley Partners General Partner Alan Taetle organized the invitation-only summit. Their goals were to:

  • Showcase the College’s research strengths and entrepreneurial culture
  • Deepen connections between academic innovation and startups
  • Explore opportunities for collaboration, commercialization, and startup growth

The summit’s guest list included founders, partners, and leaders from VC firms. Many of these firms focus on early-stage startups in SaaS, fintech, cybersecurity, and other emerging technology markets.

Research With Commercial Impact

Sarkar outlined the College of Computing’s academic mission and research priorities during his opening remarks. He emphasized the College’s role in advancing innovation in cybersecurity, artificial intelligence (AI), and other emerging research areas.

“One of the College’s strategic pillars is what I call ‘X to the power of Computing’,” Sarkar said. “Look at any discipline or industry X to see where they're innovating and where their advances are being made, and that’s where Computing meets that discipline.”

Along with remarks from the dean, the summit featured presentations highlighting Georgia Tech’s entrepreneurial ecosystem and College-led research initiatives with strong commercialization potential.

Expanding Support for Student Founders

Jen Whitlow leads Community Partnerships at Fusen, a global platform for student founders created by Atlanta philanthropist Christopher W. Klaus. She described Klaus’s support for student entrepreneurship, including GT Computing’s annual Klaus Startup Challenge. In 2025, Klaus awarded five winning teams $150,000 each to cover startup costs.

Whitlow also updated guests on Klaus’s commitment, announced in May 2025, to covering the incorporation costs for any graduating student who aspires to launch a startup.

“More than 600 graduates from last year’s Spring and Fall Commencements have accepted the gift, and more than 225 recent graduates have completed their incorporation to date,” Whitlow said. She added that a second cohort of Fall 2025 graduates is being processed over the next few weeks.

Offering an enterprise-level view, CREATE-X Rahul Saxena presented recent updates to commercialization at Georgia Tech and efforts to streamline entrepreneurial processes.

Saxena emphasized the launch of Velocity Startups, an accelerator that provides the resources and infrastructure student startups need to bring their innovations to market.

Building the Pipeline From Research to Startup

Following these updates, GT Computing faculty delivered lightning-round presentations highlighting the College’s research strengths in AI, cybersecurity, and high-performance computing.

“The tighter the local investing community is with Georgia Tech, the better off both are,” said Taetle, who has been a member of the College’s Advisory Board for more than 20 years.

“It’s critical in this super-competitive world that we do everything that we can to support this fantastic university.”

Taetle added that the summit was part of a broader effort to strengthen the College’s entrepreneurial pipeline.

“There are some really big ideas here, which could turn into really big companies,” he said. “We’ve made some great strides on the commercialization front, but we still have that opportunity and challenge in front of us.”

The afternoon concluded with a discussion of next steps and engagement opportunities, led by Sarkar and Jason Zwang, GT Computing’s senior director of development. The discussion focused on research partnership opportunities, startup formation, and student involvement.

Zwang emphasized the importance of investing in Atlanta’s innovation ecosystem, citing the city’s strong fundamentals and pro-growth climate for entrepreneurship.

“This gives us a unique opportunity to start working more closely with the local VC community, and it’s also great for our students,” Zwang said.

Sarkar agreed, saying, “There’s no downside for students to get involved in a startup. It might take off and be a bonanza. If not, the experience makes you a more competitive hire because of the breadth of experience you gain at a startup.”

To foster these opportunities for students, Zwang said that a key priority is to establish earlier, more intentional connections among students, startups, and investors.

“This is a pivotal moment,” he said. “We can determine how to connect students with the VC and startup community earlier and ensure these investors remain involved with the College.”

College leaders said the summit underscored Computing’s commitment to fostering an entrepreneurial culture and to building lasting relationships that can help accelerate the real-world impact of its research beyond the Institute.

“Georgia Tech is a force multiplier for entrepreneurship,” said Sarkar. “We’re here to change the world. We want to inspire a culture of bold, big entrepreneurial thinking, and look forward to the next steps that will follow this VC summit.”

News Contact

Ben Snedeker, Senior Communications Manager

Georgia Tech College of Computing

Jan. 27, 2026
A car's side view mirror with a alert in the center of the mirror.

A newly discovered vulnerability could allow cybercriminals to silently hijack the artificial intelligence (AI) systems in self-driving cars, raising concerns about the security of autonomous systems increasingly used on public roads.

 Georgia Tech cybersecurity researchers discovered the vulnerability, dubbed VillainNet, and found it can remain dormant in a self-driving vehicle’s AI system until triggered by specific conditions.

Once triggered, VillainNet is almost certain to succeed, giving attackers control of the targeted vehicle.

The research finds that attackers could program almost any action within a self-driving vehicle’s AI super network to trigger VillainNet. In one possible scenario, it could be triggered when a self-driving taxi’s AI responds to rainfall and changing road conditions.

Once in control, hackers could hold the passengers hostage and threaten to crash the taxi.

The researchers discovered this new backdoor attack threat in the AI super networks that power autonomous driving systems. 

“Super networks are designed to be the Swiss Army knife of AI, swapping out tools, or in this case sub networks, as needed for the task at hand," said David Oygenblik, Ph.D. student at Georgia Tech and the lead researcher on the project. 

"However, we found that an adversary can exploit this by attacking just one of those tiny tools. The attack remains completely dormant until that specific subnetwork is used, effectively hiding across billions of other benign configurations." 

This backdoor attack is nearly guaranteed to work, according to Oygenblik. This blind spot is nearly undetectable with current tools and can impact any autonomous vehicle that runs on AI. It can also be hidden at any stage of development and include billions of scenarios.

“With VillainNet, the attacker forces defenders to find a single needle in a haystack that can be as large as 10 quintillion straws," said Oygenblik. 

"Our work is a call to action for the security community. As AI systems become more complex and adaptive, we must develop new defenses capable of addressing these novel, hyper-targeted threats." 

The hypothetical fix to the problem was to add security measures to the super networks. These networks contain billions of specialized subnetworks that can be activated on the fly, but Oygenblik wanted to see what would happen if he attacked a single subnetwork tool.

In experiments, the VillainNet attack proved highly effective. It achieved a 99% success rate when activated while remaining invisible throughout the AI system. 

The research also shows that detecting a VillainNet backdoor would require 66x more computing power and time to verify the AI system is safe. This challenge dramatically expands the search space for attack detection and is not feasible, according to the researchers.

The project was presented at the ACM Conference on Computer and Communications Security (CCS) in October 2025. The paper, VillainNet: Targeted Poisoning Attacks Against SuperNets Along the Accuracy-Latency Pareto Frontier, was co-authored by Oygenblik, master's students Abhinav Vemulapalli and Animesh Agrawal, Ph.D. student Debopam Sanyal, Associate Professor Alexey Tumanov, and Associate Professor Brendan Saltaformaggio

News Contact

John Popham
Communications Officer II 
School of Cybersecurity and Privacy

 

Jan. 05, 2026
Two Georgia Tech researchers looking at a biomedical chip.

University research drives U.S. innovation, and Georgia Institute of Technology is leading the way.  

The latest Higher Education Research and Development (HERD) Survey from the National Science Foundation (NSF) places Georgia Tech as No. 2 nationally for federally sponsored research expenditures in 2024. This is Georgia Tech’s highest-ever ranking from the NSF HERD survey and a 70% increase over the Institute's 2019 numbers.  

In total expenditures from all externally funded dollars (including the federal government, foundations, industry, etc.), Georgia Tech is ranked at No. 6.  

Tech remains ranked No. 1 among universities without a medical school — a major accomplishment, as medical schools account for a quarter of all research expenditures nationally. 

“Georgia Tech’s rise to No. 2 in federally sponsored research expenditures reflects the extraordinary talent and commitment of our faculty, staff, students, and partners. This achievement demonstrates the confidence federal agencies have in our ability to deliver transformative research that addresses the nation’s most critical challenges,” said Tim Lieuwen, executive vice president for Research.   

Overall, the state of Georgia maintained its No. 8 position in university research and development, and for the first time, the state topped the $4 billion mark in research expenditures. Georgia Tech provides $1.5 billion, the largest state university contribution. In the last five years, federal funding for higher education research in the state of Georgia has grown an astounding 46% — 10 points higher than the U.S. rate. 

Lieuwen said, “Georgia Tech is proud to lead the state in research contributions, helping Georgia surpass the $4 billion mark for the first time. Our work doesn’t just advance knowledge — it saves lives, creates jobs, and strengthens national security. This growth reflects our commitment to drive innovation that benefits Georgia, our country, and the world.” 

About the NSF HERD Survey 

The NSF HERD Survey is an annual census of U.S. colleges and universities that expended at least $150,000 in separately accounted for research and development (R&D) in the fiscal year. The survey collects information on R&D expenditures by field of research and source of funds and also gathers information on types of research, expenses, and headcounts of R&D personnel. 

About Georgia Tech's Research Enterprise 

The research enterprise at Georgia Tech is led by the Executive Vice President for Research, Tim Lieuwen, and directs a portfolio of research, development, and sponsored activities. This includes leadership of the Georgia Tech Research Institute (GTRI), the Enterprise Innovation Institute, 11 interdisciplinary research institutes (IRIs), Office of Commercialization, Office of Corporate Engagement, plus research centers, and related research administrative support units. Georgia Tech routinely ranks among the top U.S. universities in volume of research conducted.

News Contact

Angela Ayers
Assistant Vice President of Research Communications
Georgia Tech

Nov. 20, 2025
Three Georgia Tech researchers working together in the lab on cancer research

Georgia Institute of Technology has been ranked 7th in the world in the 2026 Times Higher Education Interdisciplinary Science Rankings, in association with Schmidt Science Fellows. This designation underscores Georgia Tech’s leadership in research that solves global challenges. 

“Interdisciplinary research is at the heart of Georgia Tech’s mission,” said Tim Lieuwen, executive vice president for Research. “Our faculty, students, and research teams work across disciplines to create transformative solutions in areas such as healthcare, energy, advanced manufacturing, and artificial intelligence. This ranking reflects the strength of our collaborative culture and the impact of our research on society.” 

As a top R1 research university, Georgia Tech is shaping the future of basic and applied research by pursuing inventive solutions to the world’s most pressing problems. Whether discovering cancer treatments or developing new methods to power our communities, work at the Institute focuses on improving the human condition.  

Teams from all seven Georgia Tech colleges, 11 interdisciplinary research institutes, the Georgia Tech Research Institute, Enterprise Innovation Institute, and hundreds of research labs and centers work together to transform ideas into real results.

News Contact

Angela Ayers

Nov. 10, 2025
Fan Zhang, Assistant Professor of Mechanical Engineering at Georgia Tech

Fan Zhang, Assistant Professor of Mechanical Engineering at Georgia Tech

Fan Zhang, an assistant professor in the George W. Woodruff School of Mechanical Engineering’s Nuclear and Radiological Engineering and Medical Physics (NREMP) program, has been named to the American Nuclear Society’s (ANS) 40 Under 40 list.

The list, published in the November issue of Nuclear News magazine, recognizes early career professionals who have made significant contributions to the nuclear field and are poised to shape its future. The 40 honorees are featured in a special section highlighting their accomplishments, leadership, and impact on the industry.

Zhang said the ANS recognition is both meaningful and motivating.

“It’s a humbling reminder that the work I’m passionate about—making nuclear systems safer, more efficient, and more secure—matters to the broader community,” she said. “It motivates me to give back and keep mentoring and inspiring the next generation and make a global impact.”

Zhang directs the Intelligence for Advanced Nuclear (iFAN) Lab, where her research primarily focuses on nuclear cybersecurity, robotics, anomaly detection, digital twin, machine learning and artificial intelligence.

“We create solutions to make nuclear systems safer, more efficient and secure,” she said.

Read Full Story on the ME Newspage

News Contact

Tracie Troha
Communications Officer, Georgia Tech

Sep. 12, 2025
Professor Jun Ueda with a student in his lab

Professor Jun Ueda with a student in his lab

Robotic systems are currently deployed in sectors ranging from industrial manufacturing to healthcare to agriculture, adding benefits in production times, patient outcomes, and yields. This trend towards greater automation and human robot collaborative work environments, while providing great opportunities, also highlights a critical gap in cybersecurity research. These systems rely on network communication to coordinate movement, meaning that security breaches could result in the robot acting in ways that may endanger people and property.

Current cybersecurity approaches have been shown to be insufficient in blocking sophisticated attacks aimed at networked robotic motion-control systems.

To address this gap, Jun Ueda, Professor and ASME Fellow in the George W. Woodruff School of Mechanical Engineering at Georgia Tech, has been awarded approximately $700,000 by the National Science Foundation to establish methods to enhance cybersecurity for networked motion-control system. The research will focus on the unique geometric vulnerabilities in networked robotic systems and stealthy false data injection attacks that exploit geometric coordinate transformations to maintain mathematical consistency in robotic dynamics while altering physical world behavior.

Using an interdisciplinary approach that will combine research methodology from system dynamics, control, communication, differential geometry and cybersecurity engineering, Ueda hopes to establish new mathematical tools for analyzing robotic security and develop safer networked robotic systems that successfully repel system intrusion, manipulation attacks, and attacks that mislead operators. 

 

Christa M. Ernst
Research Communications Program Manager
Klaus Advance Computing Building 1120E | 266 Ferst Drive | Atlanta GA | 30332
Topic Expertise: Robotics | Data Sciences | Semiconductor Design & Fab
christa.ernst@research.gatech.edu

 

This article refers to NSF Program Foundational Research in Robotics (FRR) Award # 2112793 
A Geometric Approach for Generalized Encrypted Control of Networked Dynamical Systems

News Contact

Christa M. Ernst
Research Communications Program Manager
Klaus Advance Computing Building 1120E | 266 Ferst Drive | Atlanta GA | 30332
Topic Expertise: Robotics | Data Sciences | Semiconductor Design & Fab
christa.ernst@research.gatech.edu
Subscribe to Cybersecurity