{"689263":{"#nid":"689263","#data":{"type":"news","title":"Transformer Explainer Shows How AI is More Math than Human","body":[{"value":"\u003Cp\u003EWhile people use search engines, chatbots, and generative artificial intelligence tools every day, most don\u2019t know how they work. This sets unrealistic expectations for AI and leads to misuse. It also slows progress toward building new AI applications.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EGeorgia Tech researchers are making AI easier to understand through their work on Transformer Explainer. The free, online tool shows non-experts how ChatGPT, Claude, and other large language models (LLMs) process language.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022https:\/\/poloclub.github.io\/transformer-explainer\/\u0022\u003ETransformer Explainer\u003C\/a\u003E is easy to use and runs on any web browser. It quickly went viral after its debut, reaching 150,000 users in its first three months. More than 563,000 people worldwide have used the tool so far.\u003C\/p\u003E\u003Cp\u003EGlobal interest in Transformer Explainer continues when the team presents the tool at the 2026 Conference on Human Factors in Computing Systems (\u003Ca href=\u0022https:\/\/chi2026.acm.org\/\u0022\u003ECHI 2026\u003C\/a\u003E). CHI, the world\u2019s most prestigious conference on human-computer interaction, will take place in Barcelona, April 13-17.\u003C\/p\u003E\u003Cp\u003E[\u003Ca href=\u0022https:\/\/sites.gatech.edu\/research\/chi-2026\/\u0022\u003ERelated: GT @ CHI 2026\u003C\/a\u003E]\u003C\/p\u003E\u003Cp\u003E\u201cThere are moments when LLMs can seem almost like a person with their own will and personality, and that misperception has real consequences. For example, there have been cases where teenagers have made poor decisions based on conversations with LLMs,\u201d said Ph.D. student\u0026nbsp;\u003Ca href=\u0022https:\/\/aereeeee.github.io\/\u0022\u003EAeree Cho\u003C\/a\u003E.\u003C\/p\u003E\u003Cp\u003E\u201cUnderstanding that an LLM is fundamentally a model that predicts the probability distribution of the next token helps users avoid taking its outputs as absolute. What you put in shapes what comes out, and that understanding helps people engage with AI more carefully and critically.\u201d\u003C\/p\u003E\u003Cp\u003EA transformer is a neural network architecture that changes data input sequence into an output. Text, audio, and images are forms of processed data, which is why transformers are common in generative AI models. They do this by learning context and tracking mathematical relationships between sequence components.\u003C\/p\u003E\u003Cp\u003ETransformer Explainer demystifies how transformers work. The platform uses visualization and interaction to show, step by step, how text flows through a model and produces predictions.\u003C\/p\u003E\u003Cp\u003EUsing this approach, Transformer Explainer impacts the AI landscape in four main ways:\u003C\/p\u003E\u003Cul\u003E\u003Cli\u003EIt counters hype and misconceptions surrounding AI by showing how transformers work.\u003C\/li\u003E\u003Cli\u003EIt improves AI literacy among users by removing technical barriers and lowering the entry for learning about AI.\u003C\/li\u003E\u003Cli\u003EIt expands AI education by helping instructors teach AI mechanisms without extensive setup or computing resources.\u003C\/li\u003E\u003Cli\u003EIt influences future development of AI tools and educational techniques by providing a blueprint for interpretable AI systems.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp\u003E\u201cWhen I first learned about transformers, I felt overwhelmed. A transformer model has many parts, each with its own complex math. Existing resources typically present all this information at once, making it difficult to see how everything fits together,\u201d said\u0026nbsp;\u003Ca href=\u0022https:\/\/gracekimcy.github.io\/\u0022\u003EGrace Kim\u003C\/a\u003E, a dual B.S.\/M.S. computer science student.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cBy leveraging interactive visualization, we use levels of abstraction to first show the big picture of the entire model. Then users click into individual parts to reveal the underlying details and math. This way, Transformer Explainer makes learning far less intimidating.\u201d\u003C\/p\u003E\u003Cp\u003EMany users don\u2019t know what transformers are or how they work. The Georgia Tech team found that people often misunderstand AI. Some label AI with human-like characteristics, such as creativity. Others even describe it as working like magic.\u003C\/p\u003E\u003Cp\u003EFurthermore, barriers make it hard for students interested in transformers to start learning. Tutorials tend to be too technical and overwhelm beginners with math and code. While visualization tools exist, these often target more advanced AI experts.\u003C\/p\u003E\u003Cp\u003ETransformer Explainer overcomes these obstacles through its interactive, user-focused platform. It runs a familiar GPT model directly in any web browser, requiring no installation or special hardware.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EUsers can enter their own text and watch the model predict the next word in real time. Sankey-style diagrams show how information moves through embeddings, attention heads, and transformer blocks.\u003C\/p\u003E\u003Cp\u003EThe platform also lets users switch between high-level concepts and detailed math. By adjusting temperature settings, users can see how randomness affects predictions. This reveals how probabilities drive AI outputs, rather than creativity.\u003C\/p\u003E\u003Cp\u003E\u201cMillions of people around the world interact with transformer-driven AI. We believe that it is crucial to bridge the gap between day-to-day user experience and the models\u0027 technical reality, ensuring these tools are not misinterpreted as human-like or seen as sentient,\u201d said Ph.D. student\u0026nbsp;\u003Ca href=\u0022https:\/\/www.alexkarpekov.com\/\u0022\u003EAlex Karpekov\u003C\/a\u003E.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cExplaining the architecture helps users recognize that language generated by models is a product of computation, leading to a more grounded engagement with the technology.\u201d\u0026nbsp;\u003C\/p\u003E\u003Cp\u003ECho, Karpekov, and Kim led the development of Transformer Explainer. Ph.D. students\u0026nbsp;\u003Ca href=\u0022https:\/\/alechelbling.com\/\u0022\u003EAlec Helbling\u003C\/a\u003E,\u0026nbsp;\u003Ca href=\u0022https:\/\/seongmin.xyz\/\u0022\u003ESeongmin Lee\u003C\/a\u003E,\u0026nbsp;\u003Ca href=\u0022https:\/\/bhoov.com\/\u0022\u003EBen Hoover\u003C\/a\u003E, and alumni\u0026nbsp;\u003Ca href=\u0022https:\/\/zijie.wang\/\u0022\u003EZijie (Jay) Wang\u003C\/a\u003E (Ph.D. ML-CSE 2024) and \u003Ca href=\u0022https:\/\/minsuk.com\/\u0022\u003EMinsuk Kahng\u003C\/a\u003E (Ph.D. CS-CSE 2019) assisted on the project.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EProfessor\u0026nbsp;\u003Ca href=\u0022https:\/\/poloclub.github.io\/polochau\/\u0022\u003EPolo Chau\u003C\/a\u003E supervised the group and their work. His lab focuses on data science, human-centered AI, and visualization for social good.\u003C\/p\u003E\u003Cp\u003EAcceptance at CHI 2026 stems from the team winning the best poster award at the 2024 IEEE Visualization Conference. This recognition from one of the top venues in visualization research highlights Transformer Explainer\u2019s effectiveness in teaching how transformers work.\u003C\/p\u003E\u003Cp\u003E\u201cTransformer Explainer has reached over half a million learners worldwide,\u201d said Chau, a faculty member in the School of Computational Science and Engineering.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cI\u0027m thrilled to see it extend Georgia Tech\u0027s mission of expanding access to higher education, now to anyone with a web browser.\u201d\u003C\/p\u003E","summary":"","format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EWhile people use search engines, chatbots, and generative artificial intelligence tools every day, most don\u2019t know how they work. This sets unrealistic expectations for AI and leads to misuse. It also slows progress toward building new AI applications.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EGeorgia Tech researchers are making AI easier to understand through their work on Transformer Explainer. The free, online tool shows non-experts how ChatGPT, Claude, and other large language models (LLMs) process language.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022https:\/\/poloclub.github.io\/transformer-explainer\/\u0022\u003ETransformer Explainer\u003C\/a\u003E is easy to use and runs on any web browser. It quickly went viral after its debut, reaching 150,000 users in its first three months. More than 563,000 people worldwide have used the tool so far.\u003C\/p\u003E\u003Cp\u003EGlobal interest in Transformer Explainer continues when the team presents the tool at the 2026 Conference on Human Factors in Computing Systems (\u003Ca href=\u0022https:\/\/chi2026.acm.org\/\u0022\u003ECHI 2026\u003C\/a\u003E). CHI, the world\u2019s most prestigious conference on human-computer interaction, will take place in Barcelona, April 13-17.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Georgia Tech researchers are making AI easier to understand through their work on Transformer Explainer. The free, online tool shows non-experts how ChatGPT, Claude, and other large language models (LLMs) process language, improving AI literacy."}],"uid":"36319","created_gmt":"2026-03-31 16:42:57","changed_gmt":"2026-04-17 18:58:09","author":"Bryant Wine","boilerplate_text":"","field_publication":"","field_article_url":"","location":"Atlanta, GA","dateline":{"date":"2026-03-31T00:00:00-04:00","iso_date":"2026-03-31T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"679798":{"id":"679798","type":"image","title":"Transformer-Explainer-Head-Image.jpg","body":null,"created":"1774975392","gmt_created":"2026-03-31 16:43:12","changed":"1774975392","gmt_changed":"2026-03-31 16:43:12","alt":"CHI 2026 Transformer Explainer","file":{"fid":"264002","name":"Transformer-Explainer-Head-Image.jpg","image_path":"\/sites\/default\/files\/2026\/03\/31\/Transformer-Explainer-Head-Image.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/2026\/03\/31\/Transformer-Explainer-Head-Image.jpg","mime":"image\/jpeg","size":120484,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/2026\/03\/31\/Transformer-Explainer-Head-Image.jpg?itok=eryBAi-R"}},"679799":{"id":"679799","type":"image","title":"Transformer-Explainer-Text-Image.jpg","body":null,"created":"1774975428","gmt_created":"2026-03-31 16:43:48","changed":"1774975428","gmt_changed":"2026-03-31 16:43:48","alt":"CHI 2026 Transformer Explainer","file":{"fid":"264003","name":"Transformer-Explainer-Text-Image.jpg","image_path":"\/sites\/default\/files\/2026\/03\/31\/Transformer-Explainer-Text-Image.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/2026\/03\/31\/Transformer-Explainer-Text-Image.jpg","mime":"image\/jpeg","size":69012,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/2026\/03\/31\/Transformer-Explainer-Text-Image.jpg?itok=0B-WDInX"}}},"media_ids":["679798","679799"],"related_links":[{"url":"https:\/\/www.cc.gatech.edu\/news\/transformer-explainer-shows-how-ai-more-math-human","title":"Transformer Explainer Shows How AI is More Math than Human"}],"groups":[{"id":"47223","name":"College of Computing"},{"id":"1188","name":"Research Horizons"},{"id":"50877","name":"School of Computational Science and Engineering"}],"categories":[{"id":"130","name":"Alumni"},{"id":"194606","name":"Artificial Intelligence"},{"id":"153","name":"Computer Science\/Information Technology and Security"},{"id":"135","name":"Research"},{"id":"134","name":"Student and Faculty"},{"id":"8862","name":"Student Research"}],"keywords":[{"id":"654","name":"College of Computing"},{"id":"166983","name":"School of Computational Science and Engineering"},{"id":"187915","name":"go-researchnews"},{"id":"9153","name":"Research Horizons"},{"id":"10199","name":"Daily Digest"},{"id":"181991","name":"Georgia Tech News Center"},{"id":"170447","name":"Institute for Data Engineering and Science"},{"id":"176858","name":"machine learning center"},{"id":"9167","name":"machine learning"},{"id":"187812","name":"artificial intelligence (AI)"},{"id":"14646","name":"human-computer interaction"},{"id":"192863","name":"go-ai"},{"id":"194384","name":"Tech AI"}],"core_research_areas":[{"id":"193655","name":"Artificial Intelligence at Georgia Tech"},{"id":"39431","name":"Data Engineering and Science"},{"id":"39501","name":"People and Technology"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003EBryant Wine, Communications Officer\u003Cbr\u003E\u003Ca href=\u0022mailto:bryant.wine@cc.gatech.edu\u0022\u003Ebryant.wine@cc.gatech.edu\u003C\/a\u003E\u003C\/p\u003E","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}},"689428":{"#nid":"689428","#data":{"type":"news","title":"Researchers Build AI Tutor Grounded in Course Materials","body":[{"value":"\u003Cp\u003EAs students increasingly turn to artificial intelligence (AI) to help with coursework, some worry that their learning could be compromised. Georgia Tech researchers are working to counter this potential decline with an AI tool they hope will promote learning rather than hinder it.\u0026nbsp;\u0026nbsp;\u003C\/p\u003E\u003Cp\u003ETokenSmith is a citation-supported large language model (LLM) tutor that can be hosted locally on a user\u2019s personal computer. The tutor only provides answers based on course materials, such as the textbook or lecture slides.\u0026nbsp;\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EAssociate Professor \u003Ca href=\u0022https:\/\/faculty.cc.gatech.edu\/~jarulraj\/\u0022\u003E\u003Cstrong\u003EJoy Arulraj\u003C\/strong\u003E\u003C\/a\u003E began the project with support from the \u003Ca href=\u0022https:\/\/research.gatech.edu\/c21u-announces-inaugural-bill-kent-ai-higher-education-fellows\u0022\u003E\u003Cstrong\u003EBill Kent Family Foundation AI in Higher Education Faculty Fellowship\u003C\/strong\u003E\u003C\/a\u003E last year. The fellowship, led by Georgia Tech\u2019s Center for 21st Century Universities, supports faculty projects exploring innovative and ethical uses of AI in teaching.\u0026nbsp;\u0026nbsp;\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EArulraj has enlisted assistant professors \u003Ca href=\u0022https:\/\/kexinrong.github.io\/\u0022\u003E\u003Cstrong\u003EKexin Rong\u003C\/strong\u003E\u003C\/a\u003E and \u003Ca href=\u0022https:\/\/steve.mussmann.us\/\u0022\u003E\u003Cstrong\u003ESteve Mussmann\u003C\/strong\u003E\u003C\/a\u003E to help build TokenSmith.\u0026nbsp;\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EMussmann said TokenSmith is a synergistic blend of a database system and a machine learning system. The model stores textbooks, textbook annotations by course staff, common questions and answers, a learning state of the student, and student feedback in a structured database system. However, machine learning plays a key role in the answer generation as well as adapting the system to the student, course staff guidance, and user feedback.\u003C\/p\u003E\u003Cp\u003E\u0022What excites me most is demonstrating how data-driven ML and principled database systems design can reinforce each other \u2014 one providing adaptability and flexibility, the other providing structure and traceability \u2014 in a way that benefits students,\u0022 Mussmann said.\u003C\/p\u003E\u003Cp\u003EKeeping the model local has been an important focus of the project. The team wanted to create an AI tutor that helps students learn from their class resources rather than just giving answers. With each response, TokenSmith cites the origin of the answer in the provided documents.\u0026nbsp;\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cOne problem with LLMs is that they can hallucinate and provide wrong answers, but in this controlled environment, we can add these guardrails to make sure it\u2019s actually helpful in an educational setting,\u201d Rong said.\u0026nbsp;\u0026nbsp;\u003C\/p\u003E\u003Cp\u003ERong said she feels that students often undervalue textbooks, and she hopes TokenSmith can motivate students to make better use of them.\u202f\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cTextbooks can sometimes be daunting, but maybe if we combine them with the model, students might be more willing to read a paragraph or page in the textbook, and that could help clarify something for them,\u201d she said.\u0026nbsp;\u0026nbsp;\u003C\/p\u003E\u003Cp\u003ERunning the model locally is more cost-effective and helps preserve the user\u2019s privacy. But running the new tool locally comes with technical challenges.\u0026nbsp;\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EOne challenge with creating the model is speed. Since it is a locally based model, TokenSmith depends solely on the user\u2019s computer memory. \u0026nbsp;Tests have also shown that the tutor currently struggles to answer more complex questions.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cWe are interested in pushing the boundaries of these local models so that they give students good answers and also run fast enough to keep students engaged,\u201d Arulraj said.\u0026nbsp;\u0026nbsp;\u003C\/p\u003E","summary":"","format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003ETokenSmith is a citation-supported large language model (LLM) tutor that can be hosted locally on a user\u2019s personal computer. The tutor only provides answers based on course materials, such as the textbook or lecture slides.\u0026nbsp;\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EAssociate Professor \u003Ca href=\u0022https:\/\/faculty.cc.gatech.edu\/~jarulraj\/\u0022\u003E\u003Cstrong\u003EJoy Arulraj\u003C\/strong\u003E\u003C\/a\u003E began the project with support from the \u003Ca href=\u0022https:\/\/research.gatech.edu\/c21u-announces-inaugural-bill-kent-ai-higher-education-fellows\u0022\u003E\u003Cstrong\u003EBill Kent Family Foundation AI in Higher Education Faculty Fellowship\u003C\/strong\u003E\u003C\/a\u003E last year. The fellowship, led by Georgia Tech\u2019s Center for 21st Century Universities, supports faculty projects exploring innovative and ethical uses of AI in teaching.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"TokenSmith is a citation-supported large language model (LLM) tutor that can be hosted locally on a user\u2019s personal computer. The tutor only provides answers based on course materials, such as the textbook or lecture slides.  "}],"uid":"36532","created_gmt":"2026-04-02 20:25:02","changed_gmt":"2026-04-02 20:30:36","author":"Morgan Usry","boilerplate_text":"","field_publication":"","field_article_url":"","location":"Atlanta, GA","dateline":{"date":"2026-04-02T00:00:00-04:00","iso_date":"2026-04-02T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"679842":{"id":"679842","type":"image","title":"AI-Tutor-Image.jpg.jpeg","body":null,"created":"1775161510","gmt_created":"2026-04-02 20:25:10","changed":"1775161510","gmt_changed":"2026-04-02 20:25:10","alt":"Graphic showing the researchers in front of a computer screen","file":{"fid":"264048","name":"AI-Tutor-Image.jpg.jpeg","image_path":"\/sites\/default\/files\/2026\/04\/02\/AI-Tutor-Image.jpg.jpeg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/2026\/04\/02\/AI-Tutor-Image.jpg.jpeg","mime":"image\/jpeg","size":321180,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/2026\/04\/02\/AI-Tutor-Image.jpg.jpeg?itok=yDJdQ838"}}},"media_ids":["679842"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"1188","name":"Research Horizons"},{"id":"50875","name":"School of Computer Science"}],"categories":[{"id":"194606","name":"Artificial Intelligence"},{"id":"153","name":"Computer Science\/Information Technology and Security"},{"id":"42911","name":"Education"},{"id":"135","name":"Research"}],"keywords":[{"id":"193860","name":"Artifical Intelligence"},{"id":"192863","name":"go-ai"},{"id":"194701","name":"go-resarchnews"},{"id":"9153","name":"Research Horizons"},{"id":"10199","name":"Daily Digest"},{"id":"194394","name":"AI in Education"}],"core_research_areas":[{"id":"193655","name":"Artificial Intelligence at Georgia Tech"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003EMorgan Usry, Communications Officer\u003C\/p\u003E","format":"limited_html"}],"email":["morgan.usry@cc.gatech.edu"],"slides":[],"orientation":[],"userdata":""}},"689256":{"#nid":"689256","#data":{"type":"news","title":"New Study Shows Explainability is a Must for Older Adults to Trust AI","body":[{"value":"\u003Cp\u003EVoice-activated, conversational artificial intelligence (AI) agents must provide clear explanations for their suggestions, or older adults aren\u2019t likely to trust them.\u003C\/p\u003E\u003Cp\u003EThat\u2019s one of the main findings from a study by AI Caring on what older adults expect from explainable AI (XAI).\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022https:\/\/ai-caring.org\/\u0022\u003E\u003Cstrong\u003EAI Caring\u003C\/strong\u003E\u003C\/a\u003E is one of three AI Institutions led by Georgia Tech and funded by the National Science Foundation (NSF). The institution supports AI research that benefits older adults and their caregivers.\u003C\/p\u003E\u003Cp\u003ENiharika Mathur, a Ph.D. candidate in the School of Interactive Computing, was the lead author of a paper based on the study. The paper will be presented in April at the \u003Ca href=\u0022https:\/\/chi2026.acm.org\/\u0022\u003E\u003Cstrong\u003E2026 ACM Conference on Human Factors in Computing Systems (CHI) in Barcelona\u003C\/strong\u003E\u003C\/a\u003E.\u003C\/p\u003E\u003Cp\u003EMathur worked with the \u003Ca href=\u0022https:\/\/empowerment.emory.edu\/\u0022\u003E\u003Cstrong\u003ECognitive Empowerment Program at Emory University\u003C\/strong\u003E\u003C\/a\u003E to interview 23 older adults who live alone and use voice-activated AI assistants like Amazon\u2019s Alexa and Google Home.\u003C\/p\u003E\u003Cp\u003EMany of them told her they feel excluded from the design of these products.\u003C\/p\u003E\u003Cp\u003E\u201cThe assumption is that all people want interactions the same way and across all kinds of situations, but that isn\u2019t true,\u201d Mathur said. \u201cHow older people use AI and what they want from it are different from what younger people prefer.\u201d\u003C\/p\u003E\u003Cp\u003EOne example she gave is that young people tend to be informal when talking with AI. Older people, on the other hand, talk to the agent like they would a person.\u003C\/p\u003E\u003Cp\u003E\u201cIf Older adults are talking to their family members about Alexa, they usually refer to Alexa as \u2018she\u2019 instead of \u2018it,\u2019\u201d Mathur said. \u201cThey tend to humanize these systems a lot more than young people.\u201d\u003C\/p\u003E\u003Ch4\u003E\u003Cstrong\u003EGood Explanations\u003C\/strong\u003E\u003C\/h4\u003E\u003Cp\u003EThe study evaluated AI explanations that drew information from four sources of data:\u003C\/p\u003E\u003Cul\u003E\u003Cli\u003EUser history (past conversations with the agent)\u003C\/li\u003E\u003Cli\u003EEnvironmental data (indoor temperature or the weather forecast)\u003C\/li\u003E\u003Cli\u003EActivity data (how much time a user spends in different areas of the home)\u003C\/li\u003E\u003Cli\u003EInternal reasoning (mathematical probabilities and likely outcomes)\u003C\/li\u003E\u003C\/ul\u003E\u003Cp\u003EMathur said older users trust the agent more when it bases its explanations on data from the first three sources. However, internal reasoning creates skepticism.\u003C\/p\u003E\u003Cp\u003EInternal reasoning means the AI doesn\u2019t have enough data from the other sources to give an explanation. It provides a percentage to reflect its confidence based on what it knows.\u003C\/p\u003E\u003Cp\u003E\u201cThe overwhelming response was negative toward confidence scores,\u201d Mathur said. \u201cIf the AI says it\u2019s 92% confident, older adults want to know what that\u2019s based on.\u201d\u003C\/p\u003E\u003Cp\u003EThis is another example that Mathur said points to generational preferences.\u003C\/p\u003E\u003Cp\u003E\u201cThere\u2019s a lot of explainable AI research that shows younger people like to see numbers in explanations, and they also tend to rely too much on explanations that contain numerical confidence. Older adults are the opposite. It makes them trust it less.\u201d\u003C\/p\u003E\u003Ch4\u003E\u003Cstrong\u003EKnowing the Context\u003C\/strong\u003E\u003C\/h4\u003E\u003Cp\u003EMathur said that AI agents interacting with older adults should serve a dual purpose. They should provide users with companionship and support independence while reducing the caretaking burden often placed on family members.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003ESome studies have shown that engineers have tended to favor caretakers in the design of these tools. They prioritize daily tasks and routines, leaving some older adults to feel like they are merely a box to be checked.\u003C\/p\u003E\u003Cp\u003EShe discovered that in urgent situations, older users prefer the AI to be straightforward, while in casual settings, they desire more conversation.\u003C\/p\u003E\u003Cp\u003E\u201cHow people interact with technological systems is grounded in what the stakes of the situation are,\u201d she said. \u201cIf it had anything to do with their immediate sense of safety, they did not want conversational elaboration. They want the AI to be very direct and factual.\u201d\u003C\/p\u003E\u003Ch4\u003E\u003Cstrong\u003ENot Just Checking Boxes\u003C\/strong\u003E\u003C\/h4\u003E\u003Cp\u003EMathur said AI agents that interact with older adults are ideally constructed with a dual purpose. They should provide companionship and autonomy for the users while alleviating the burden of caretaking that is often placed on their family members.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003ESome studies have shown that engineers have strayed toward favoring caretakers in the design of these tools. They prioritize daily tasks and routines, leaving some older adults to feel like they are a box to be checked.\u003C\/p\u003E\u003Cp\u003E\u201cThey\u2019re not being thought of as consumers,\u201d Mathur said. \u201cA lot of products are being made for them but not with them.\u201d\u003C\/p\u003E\u003Cp\u003EShe also said psychological well-being is one of the most important outcomes these tools should produce.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EShowing older adults that they are listened to can significantly help in gaining their trust. Some interviewees told Mathur they want agents who are deliberate about understanding their preferences and don\u2019t dismiss their questions.\u003C\/p\u003E\u003Cp\u003EMeeting these needs reduces the likelihood of protesting and creating conflict with family members.\u003C\/p\u003E\u003Cp\u003E\u201cIt highlights just how important well-designed explanations are,\u201d she said. \u201cWe must go beyond a transparency checklist.\u201d\u003C\/p\u003E","summary":"","format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EAn AI Caring study led by Georgia Tech researchers shows that older adults are more likely to trust conversational AI systems that provide them with clear explanations for their decision-making. The study also shows that including older adults more in the design process benefits their well-being and reduces the caretaking burden of family members\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"A Georgia Tech study finds older adults are more likely to trust voice-activated AI systems when those systems clearly explain how and why they make decisions."}],"uid":"36530","created_gmt":"2026-03-31 14:01:07","changed_gmt":"2026-03-31 14:04:59","author":"Nathan Deen","boilerplate_text":"","field_publication":"","field_article_url":"","location":"Atlanta, GA","dateline":{"date":"2026-03-31T00:00:00-04:00","iso_date":"2026-03-31T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"679796":{"id":"679796","type":"image","title":"0A6A0355.jpg","body":null,"created":"1774965687","gmt_created":"2026-03-31 14:01:27","changed":"1774965687","gmt_changed":"2026-03-31 14:01:27","alt":"An older couple sitting on a couch as a man helps them use Amazon\u0027s Alexa","file":{"fid":"263999","name":"0A6A0355.jpg","image_path":"\/sites\/default\/files\/2026\/03\/31\/0A6A0355.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/2026\/03\/31\/0A6A0355.jpg","mime":"image\/jpeg","size":171883,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/2026\/03\/31\/0A6A0355.jpg?itok=t62aVqXD"}}},"media_ids":["679796"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"1188","name":"Research Horizons"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[{"id":"194606","name":"Artificial Intelligence"},{"id":"153","name":"Computer Science\/Information Technology and Security"},{"id":"135","name":"Research"}],"keywords":[{"id":"192863","name":"go-ai"},{"id":"187915","name":"go-researchnews"},{"id":"9153","name":"Research Horizons"},{"id":"193860","name":"Artifical Intelligence"},{"id":"187812","name":"artificial intelligence (AI)"},{"id":"14342","name":"older adults"},{"id":"148721","name":"Amazon Alexa"}],"core_research_areas":[{"id":"193655","name":"Artificial Intelligence at Georgia Tech"},{"id":"39501","name":"People and Technology"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"689250":{"#nid":"689250","#data":{"type":"news","title":"Researchers Look to Bolster Technology Support for Menopause","body":[{"value":"\u003Cp\u003EWomen in need of supportive maternal and menstrual healthcare in patriarchal societies have increasingly found outlets for disclosure in online communities.\u003C\/p\u003E\u003Cp\u003EThat support, however, begins to disappear in these restrictive cultures once women reach menopause, according to new research from Georgia Tech\u003C\/p\u003E\u003Cp\u003ENaveena Karusala, an assistant professor in Georgia Tech\u2019s School of Interactive Computing, and master\u2019s student Umme Ammara are working toward improving existing technologies and designing new ones for a demographic they believe has been neglected.\u003C\/p\u003E\u003Cp\u003EKarusala and Ammara co-authored a paper based on a study they conducted with women in urban Pakistan experiencing menopause.\u003C\/p\u003E\u003Cp\u003E\u201cWomen\u2019s health is understudied in general, but menopause is more neglected than other women\u2019s health issues,\u201d Karusala said. \u201cOur choice to focus on menopause is motivated by expanding how we holistically think about women\u2019s well-being across their lifespan.\u201d\u003C\/p\u003E\u003Cp\u003EKarusala and Ammara will present their paper in April at the 2026 ACM Conference on Human Factors in Computing Systems (CHI) in Barcelona.\u003C\/p\u003E\u003Ch4\u003E\u003Cstrong\u003EMasking Symptoms\u003C\/strong\u003E\u003C\/h4\u003E\u003Cp\u003EMenopause is diagnosed after 12 consecutive months without a period, vaginal bleeding, or spotting. The transition to menopause, called perimenopause, usually happens over two to eight years.\u003C\/p\u003E\u003Cp\u003EHormone changes may cause symptoms such as irregular periods, vaginal dryness, hot flashes, night sweats, trouble sleeping, mood swings, and brain fog.\u003C\/p\u003E\u003Cp\u003EThese symptoms can be debilitating in some cases and affect daily life. However, Ammara said women are pressured to remain silent, maintain appearances, and regulate their emotions to meet social expectations.\u003C\/p\u003E\u003Cp\u003E\u201cUnderstanding menopause is important because a woman would be experiencing all these symptoms, and people will not understand those as actual symptoms,\u201d Ammara said. \u201cThere\u2019s been resistance to the idea of the medicalization of menopause. People don\u2019t view it as an illness, but as a life transition and something that happens naturally.\u201d\u003C\/p\u003E\u003Ch4\u003E\u003Cstrong\u003EFeeling Isolated\u003C\/strong\u003E\u003C\/h4\u003E\u003Cp\u003EThe women interviewed by Karusala and Ammara either stayed at home full-time or were part of the workforce.\u003C\/p\u003E\u003Cp\u003EThe researchers discovered that trusted family members might be the only sources women who stay at home and do not work turn to for disclosure.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cWomen at home have the flexibility to take breaks or work at their own pace, so a lot of their experience is shaped by the emotional barriers they face,\u201d Ammara said.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cThat could come from their husbands and family members. Some are supportive and some are not. They might weaponize it and use that term against them, or they might dismiss what they\u2019re going through.\u201d\u003C\/p\u003E\u003Cp\u003EAmmara said it might be easier for women in the workforce to confide in their coworkers, but explaining to an employer that they need sick leave for menopause symptoms can be intimidating.\u003C\/p\u003E\u003Cp\u003EEven in online communities that have enabled women to anonymously share their health experiences, menopause is seldom discussed.\u003C\/p\u003E\u003Ch4\u003E\u003Cstrong\u003ERaising Awareness\u003C\/strong\u003E\u003C\/h4\u003E\u003Cp\u003EKarusala and Ammara argue in their paper that a public health approach could be the most effective way to spark conversation about menopause in a patriarchal culture in which technology use varies.\u003C\/p\u003E\u003Cp\u003EThey said the challenge in implementing technologies geared toward menopause support is that the condition isn\u2019t well understood in public. Improving maternal health, for example, is easier to promote within these societies because of the general understanding that motherhood is important.\u003C\/p\u003E\u003Cp\u003E\u201cThere must be an existing infrastructure to build on,\u201d Karusala said. \u201cFor example, menstrual and maternal health are taught in schools and regularly discussed in primary care. Cultural and social meaning and importance are placed on motherhood.\u003C\/p\u003E\u003Cp\u003E\u201cA lot of that doesn\u2019t exist for menopause. Primary care doctors are unprepared to talk about menopause compared to other health issues.\u201d\u003C\/p\u003E\u003Ch4\u003E\u003Cstrong\u003EDesign Solutions\u003C\/strong\u003E\u003C\/h4\u003E\u003Cp\u003EAmmara said that the most effective way for technologies to make an impact on women going through menopause is to directly address systemic power structures around women\u2019s health within Pakistani culture.\u003C\/p\u003E\u003Cp\u003EIt can start with the husbands.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cFraming the issue for husbands to understand menopause should be at the forefront of designing technology solutions,\u201d she said.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cIn Islamic contexts, we suggest using faith-based framings. This has been proposed for maternal health in prior works that draw on Islamic principles to engage expectant fathers in providing care and support. Framing it around religious responsibility to involve men in the journey can also be done for menopause.\u201d\u003C\/p\u003E","summary":"","format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EGeorgia Tech assistant professor Naveena Karusala and master\u0027s student Umme Ammara are researching how to improve existing technologies and design new ones to better support women experiencing menopause. Their work is based on a study conducted with women in urban Pakistan, where patriarchal social norms pressure women to stay silent about menopause symptoms and limit their ability to seek support, even in online communities that have otherwise helped women discuss other health issues\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Georgia Tech researchers are looking at how technology can better support women experiencing menopause in urban Pakistan, where patriarchal norms leave them largely isolated and without resources for managing their symptoms."}],"uid":"36530","created_gmt":"2026-03-31 12:09:13","changed_gmt":"2026-03-31 13:18:07","author":"Nathan Deen","boilerplate_text":"","field_publication":"","field_article_url":"","location":"Atlanta, GA","dateline":{"date":"2026-03-30T00:00:00-04:00","iso_date":"2026-03-30T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"679788":{"id":"679788","type":"image","title":"Ammara-Umme_86A2210.jpg","body":null,"created":"1774958961","gmt_created":"2026-03-31 12:09:21","changed":"1774958961","gmt_changed":"2026-03-31 12:09:21","alt":"Umme Ammar sits in a booth with laptop in front of her","file":{"fid":"263990","name":"Ammara-Umme_86A2210.jpg","image_path":"\/sites\/default\/files\/2026\/03\/31\/Ammara-Umme_86A2210.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/2026\/03\/31\/Ammara-Umme_86A2210.jpg","mime":"image\/jpeg","size":95810,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/2026\/03\/31\/Ammara-Umme_86A2210.jpg?itok=7jqYXbcn"}}},"media_ids":["679788"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"1188","name":"Research Horizons"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"},{"id":"135","name":"Research"}],"keywords":[{"id":"8900","name":"women\u0027s history month"},{"id":"187915","name":"go-researchnews"},{"id":"9153","name":"Research Horizons"},{"id":"3543","name":"women\u0027s health"},{"id":"171911","name":"women of pakistan"}],"core_research_areas":[{"id":"39501","name":"People and Technology"}],"news_room_topics":[{"id":"71891","name":"Health and Medicine"}],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003E\u003Ca href=\u0022mailto:ndeen6@gatech.edu\u0022\u003ENathan Deen\u003C\/a\u003E\u003Cbr\u003ECollege of Computing\u003Cbr\u003EGeorgia Tech\u003C\/p\u003E","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}},"689175":{"#nid":"689175","#data":{"type":"news","title":"Tech Swarms into Athens for Clean, Old-Fashioned Computing","body":[{"value":"\u003Cp\u003EThe in-state rivalry between the Yellow Jackets and the Bulldogs usually heats up when Georgia Tech visits the University of Georgia. However, one Saturday last month, the focus shifted from competition to collaboration.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EThe Georgia Scientific Computing Symposium (GSCS) held its annual meeting on February 21 in Athens. Since 2009, the event has hosted researchers from across the Peach State to showcase homegrown advances in scientific computing.\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022https:\/\/haoningwu.github.io\/GSCS2026.html\u0022\u003EThe symposium\u003C\/a\u003E highlighted Georgia\u2019s reputation as a computing innovation hub. People from around the world come to Georgia universities to lead computing research. By advancing science, engineering, medicine, and technology, their work improves communities at home and abroad.\u003C\/p\u003E\u003Cp\u003EFaculty and students from Georgia Tech, UGA, Georgia State University, and Emory University presented at the symposium. Georgia Tech participants came from the colleges of Computing, Engineering, and Sciences.\u003C\/p\u003E\u003Cp\u003EThis year\u2019s organizers agreed to meet in Atlanta for the 2027 symposium. Georgia Tech\u2019s \u003Ca href=\u0022https:\/\/cse.gatech.edu\/\u0022\u003ESchool of Computational Science and Engineering (CSE)\u003C\/a\u003E will host the 19th GSCS.\u003C\/p\u003E\u003Cp\u003E\u201cFrom healthcare to computer chip design, scientific computing underpins many of the technological advances we see in our lives,\u201d said Professor\u0026nbsp;\u003Ca href=\u0022https:\/\/faculty.cc.gatech.edu\/~echow\/\u0022\u003EEdmond Chow\u003C\/a\u003E, associate chair of the School of CSE.\u003C\/p\u003E\u003Cp\u003E\u201cScientific computing provides the mathematical models, simulations, and data\u2011driven tools that make modern innovation possible. It allows people to analyze complex systems, test ideas virtually before building them, and make faster, more accurate decisions across nearly every sector of society.\u201d\u003C\/p\u003E\u003Cp\u003EProfessor\u0026nbsp;\u003Ca href=\u0022https:\/\/hmzhou.math.gatech.edu\/\u0022\u003EHaomin Zhou\u003C\/a\u003E and Assistant Professor\u0026nbsp;\u003Ca href=\u0022https:\/\/itshelenxu.github.io\/\u0022\u003EHelen Xu\u003C\/a\u003E delivered two of the symposium\u2019s five plenary talks.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EZhou presented a new method for solving the Schr\u00f6dinger equation, a landmark equation in quantum mechanics. Drawing inspiration from the mathematics used in generative artificial intelligence models, his approach develops an algorithm that more effectively simulates waves, particle motion, and other physical systems.\u003C\/p\u003E\u003Cp\u003EXu focused on improving how computers move and organize data during complex calculations. Her work uses \u201ccache-friendly\u201d layouts that help computers access data more efficiently, boosting performance for scientific and engineering applications.\u003C\/p\u003E\u003Cp\u003E\u201cSpeaking at GSCS was a great opportunity,\u201d Xu said. \u201cThe symposium fostered connections within the scientific computing community and gave us a chance to share exciting research.\u201d\u003C\/p\u003E\u003Cp\u003EThe symposium showcased student work through a poster blitz and a poster session. During the blitz, 36 students each had one minute to introduce their research to the full audience. They then shared more details about their research during the poster session.\u003C\/p\u003E\u003Cp\u003EThe student projects showed the range of fields supported by scientific computing. The session also provided attendees with an opportunity to connect and expand their professional networks, helping grow the field\u2019s future impact.\u003C\/p\u003E\u003Cp\u003E\u201cAs an aerospace engineer by training and aspiring computational scientist, GSCS gave me the platform to network with other researchers in the field while showcasing my own research,\u201d said M.S. student \u003Cstrong\u003EKashvi Mundra\u003C\/strong\u003E.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cI was able to connect with scientists across different disciplines whose work intersects with my own in unexpected ways. Those conversations pushed my thinking beyond my own lab\u0027s perspective, helping me see my work on physics-informed machine learning for inverse problems in a broader scientific computing context.\u201d\u003C\/p\u003E\u003Cp\u003EGeorgia Tech students who presented posters included:\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EAbir Haque\u003C\/strong\u003E (CSE), \u003Cem\u003EMassively Parallel Random Phase Approximation Correlation Energy via Lanczos Quadrature\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EAntonio Varagnolo\u003C\/strong\u003E (CSE), \u003Cem\u003EPhysics-Enhanced Deep Surrogates for the Phonon Boltzmann Transport Equation\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EBen Burns\u003C\/strong\u003E (CSE), \u003Cem\u003EInfinite-Dimensional Stein Variational Inference with Derivative-Informed Neural Operators\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EBen Wilfong\u003C\/strong\u003E (CSE), \u003Cem\u003EShocks without Shock Capturing; Compressible Flow at 1 quadrillion Degrees of Freedom without Loss of Accuracy\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EDaniel Vickers\u003C\/strong\u003E (CSE), \u003Cem\u003EHighly-Parallel Fluid-Solid Interactions for Compressible Flows\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EEric Fowler\u003C\/strong\u003E (CSE), \u003Cem\u003EHigh-Performance Tensor Contractions in Computational Chemistry\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EHaoran Yan\u003C\/strong\u003E (Math), \u003Cem\u003EUnderstanding Denoising Autoencoders through the Manifold Hypothesis: A Geometric Perspective\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EKashvi Mundra\u003C\/strong\u003E (CSE), \u003Cem\u003EAutoregressive Multifidelity Neural Surrogate Modeling under Scarce Data Regimes\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003ESebasti\u00e1n Guti\u00e9rrez Hern\u00e1ndez\u003C\/strong\u003E (Math\/CSE), \u003Cem\u003EPDPO: Parametric Density Path Optimization\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EVivian Zhang\u003C\/strong\u003E (AE), \u003Cem\u003EMultifidelity Operator Inference: Non-Intrusive Reduced Order Modeling from Scarce Data\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EXian Mae Hadia\u003C\/strong\u003E (CSE), \u003Cem\u003EData Efficiency of Surrogate Models: Learning Physics Data from Full Field Data vs. Inductive Bias from Approximate PDE Solvers\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EXiangming Huang\u003C\/strong\u003E (CSE), \u003Cem\u003ENeural Operator Accelerated Evolutionary Strategies for PDE-Constraint Optimization\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EZhaiming Shen\u003C\/strong\u003E (Math), \u003Cem\u003EUnderstanding In-Context Learning on Structured Manifolds: Bridging Attention to Kernel Methods\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EZhongjie Shi\u003C\/strong\u003E (Math), \u003Cem\u003ETowards Understanding Generalization in DP-GD: A Case Study in Training Two-Layer CNNs\u003C\/em\u003E\u003C\/p\u003E","summary":"","format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EThe in-state rivalry between the Yellow Jackets and the Bulldogs usually heats up when Georgia Tech visits the University of Georgia. However, one Saturday last month, the focus shifted from competition to collaboration.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EThe Georgia Scientific Computing Symposium (GSCS) held its annual meeting on February 21 in Athens. Since 2009, the event has hosted researchers from across the Peach State to showcase homegrown advances in scientific computing.\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022https:\/\/haoningwu.github.io\/GSCS2026.html\u0022\u003EThe symposium\u003C\/a\u003E highlighted Georgia\u2019s reputation as a computing innovation hub. People from around the world come to Georgia universities to lead computing research. By advancing science, engineering, medicine, and technology, their work improves communities at home and abroad.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Researchers from universities across Georgia, including Georgia Tech, set aside rivalry to collaborate at the 2026 Georgia Scientific Computing Symposium, highlighting the state\u2019s growing role as a hub for innovation in scientific computing."}],"uid":"36319","created_gmt":"2026-03-25 13:04:13","changed_gmt":"2026-03-25 19:41:06","author":"Bryant Wine","boilerplate_text":"","field_publication":"","field_article_url":"","location":"Atlanta, GA","dateline":{"date":"2026-03-25T00:00:00-04:00","iso_date":"2026-03-25T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"679732":{"id":"679732","type":"image","title":"GSCS-2026-Head-Image.jpeg","body":null,"created":"1774443866","gmt_created":"2026-03-25 13:04:26","changed":"1774443866","gmt_changed":"2026-03-25 13:04:26","alt":"2026 Georgia Scientific Computing Symposium","file":{"fid":"263927","name":"GSCS-2026-Head-Image.jpeg","image_path":"\/sites\/default\/files\/2026\/03\/25\/GSCS-2026-Head-Image.jpeg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/2026\/03\/25\/GSCS-2026-Head-Image.jpeg","mime":"image\/jpeg","size":217081,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/2026\/03\/25\/GSCS-2026-Head-Image.jpeg?itok=2Vs3GesS"}},"679733":{"id":"679733","type":"image","title":"Kashvi-Mundra-Poster.jpeg","body":null,"created":"1774443901","gmt_created":"2026-03-25 13:05:01","changed":"1774443901","gmt_changed":"2026-03-25 13:05:01","alt":"2026 Georgia Scientific Computing Symposium","file":{"fid":"263928","name":"Kashvi-Mundra-Poster.jpeg","image_path":"\/sites\/default\/files\/2026\/03\/25\/Kashvi-Mundra-Poster.jpeg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/2026\/03\/25\/Kashvi-Mundra-Poster.jpeg","mime":"image\/jpeg","size":84134,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/2026\/03\/25\/Kashvi-Mundra-Poster.jpeg?itok=i7BjGyOA"}}},"media_ids":["679732","679733"],"related_links":[{"url":"https:\/\/www.cc.gatech.edu\/news\/tech-swarms-athens-clean-old-fashioned-computing","title":"Tech Swarms into Athens for Clean, Old-Fashioned Computing"}],"groups":[{"id":"47223","name":"College of Computing"},{"id":"1188","name":"Research Horizons"},{"id":"50877","name":"School of Computational Science and Engineering"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"},{"id":"145","name":"Engineering"},{"id":"135","name":"Research"},{"id":"194611","name":"State Impact"},{"id":"8862","name":"Student Research"}],"keywords":[{"id":"654","name":"College of Computing"},{"id":"166983","name":"School of Computational Science and Engineering"},{"id":"9153","name":"Research Horizons"},{"id":"187915","name":"go-researchnews"},{"id":"181991","name":"Georgia Tech News Center"},{"id":"10199","name":"Daily Digest"},{"id":"168681","name":"scientific computing"},{"id":"194970","name":"2026 Georgia Scientific Computing Symposium"}],"core_research_areas":[{"id":"39431","name":"Data Engineering and Science"},{"id":"39541","name":"Systems"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003EBryant Wine, Communications Officer\u003Cbr\u003E\u003Ca href=\u0022mailto:bryant.wine@cc.gatech.edu\u0022\u003Ebryant.wine@cc.gatech.edu\u003C\/a\u003E\u003C\/p\u003E","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}},"689185":{"#nid":"689185","#data":{"type":"news","title":"Researchers Find Training Gaps Impacting Maritime Cybersecurity Readiness","body":[{"value":"\u003Cp\u003EWhether it\u2019s a fire or a flood, a ship\u2019s crew can only rely on itself and its training in emergencies at sea. The same is true for crews facing digital threats on oil tankers, cargo ships, and other commercial vessels.\u003C\/p\u003E\u003Cp\u003ENew cybersecurity research from the Georgia Institute of Technology, however, revealed that crews aboard commercial vessels were often not adequately prepared to manage cyberattacks effectively due to systemic training gaps.\u003C\/p\u003E\u003Cp\u003EThe findings are based on interviews conducted by researchers with more than 20 officer-level mariners to assess the maritime industry\u2019s readiness to handle cybersecurity attacks at sea.\u003C\/p\u003E\u003Cp\u003E\u0022Historically, cybersecurity research has focused heavily on cyber-physical systems like cars, factories, and industrial plants, but ships have largely been overlooked,\u201d said \u003Ca href=\u0022https:\/\/annaraymaker.dad\/\u0022\u003E\u003Cstrong\u003EAnna Raymaker\u003C\/strong\u003E\u003C\/a\u003E, Ph.D. student and lead researcher.\u003C\/p\u003E\u003Cp\u003E\u201cThat gap is concerning when more than 90% of the world\u2019s goods travel by sea. Recent incidents, from GPS spoofing to ships linked to subsea cable disruptions, show that maritime systems are increasingly part of the global cyber threat landscape.\u201d\u003C\/p\u003E\u003Cp\u003EThe researchers proposed four practical strategies to strengthen maritime cyber defenses and close the training gaps. Their findings were presented recently at the \u003Ca href=\u0022https:\/\/www.sigsac.org\/ccs\/CCS2025\/call-for-papers\/\u0022\u003EACM SIGSAC Conference on Computer and Communications Security (CCS).\u003C\/a\u003E\u003C\/p\u003E\u003Ch6\u003E1. Make Cybersecurity Training Actually Maritime\u003C\/h6\u003E\u003Cp\u003EMany of those interviewed for the study described current cybersecurity training as \u201cboilerplate\u201d \u2014 generic modules that don\u2019t reflect real shipboard risks.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EResearchers recommend:\u003C\/p\u003E\u003Cul\u003E\u003Cli\u003ERole-specific instruction: Navigation officers should learn to detect and identify GPS spoofing. Engineers should focus on vulnerabilities in remotely monitored systems.\u003C\/li\u003E\u003Cli\u003EBridging IT and Operational Technology: Crews need to understand how attacks on IT systems can trigger physical consequences in operational technology \u2014 including collisions, groundings, or explosions.\u003C\/li\u003E\u003Cli\u003EHands-on delivery: Replace passive PowerPoints with drills and in-person exercises that build muscle memory.\u003C\/li\u003E\u003Cli\u003EAccessible standards: Training must account for the wide range of educational backgrounds across crews and be standardized across ranks.\u003C\/li\u003E\u003C\/ul\u003E\u003Ch6\u003E2. Move Beyond \u201cCall IT\u201d\u003C\/h6\u003E\u003Cp\u003EAt sea, crews can\u2019t simply escalate a cyber incident to a shore-based IT department and wait. Operational resilience requires onboard readiness.\u003C\/p\u003E\u003Cp\u003EResearchers recommend:\u003C\/p\u003E\u003Cul\u003E\u003Cli\u003EVessel-specific response plans: Ships need clear, actionable protocols for threats such as AIS jamming or radar manipulation.\u003C\/li\u003E\u003Cli\u003EMilitary-style drills: Adopting MCON (Emission Control) exercises \u2014 used by the U.S. Military Sealift Command \u2014 can train crews to operate safely without electronic systems.\u003C\/li\u003E\u003Cli\u003EStronger connectivity controls: High-bandwidth satellite systems like Starlink introduce new risks. Clear policies and network segregation are essential to prevent new entry points for attackers.\u003C\/li\u003E\u003C\/ul\u003E\u003Cblockquote\u003E\u003Ch6\u003ERelated Article: \u003Ca href=\u0022https:\/\/theconversation.com\/when-gps-lies-at-sea-how-electronic-warfare-is-threatening-ships-and-their-crews-278181\u0022\u003E\u003Cstrong\u003EWhen GPS lies at sea: How electronic warfare is threatening ships and their\u0026nbsp;crews\u003C\/strong\u003E\u003C\/a\u003E\u003Cstrong\u003E by Anna Raymaker\u003C\/strong\u003E\u003C\/h6\u003E\u003C\/blockquote\u003E\u003Ch6\u003E3. Create Unified, Ship-Specific Regulations\u003C\/h6\u003E\u003Cp\u003EMaritime cybersecurity regulations are often reactive and fragmented. Researchers argue the industry needs a cohesive, domain-specific framework.\u003C\/p\u003E\u003Cp\u003EKey recommendations include:\u003C\/p\u003E\u003Cul\u003E\u003Cli\u003EA unified global model: Like the energy sector\u2019s NERC CIP standards, a maritime framework could mandate baseline controls such as encryption, network segmentation, and anonymous incident reporting.\u003C\/li\u003E\u003Cli\u003ERules built for real crews: Regulations designed for large naval operations don\u2019t translate well to smaller merchant or research vessels. Standards must reflect actual shipboard conditions.\u003C\/li\u003E\u003Cli\u003EFuture-proofing requirements: Autonomous ships and remotely operated vessels expand the cyber-physical attack surface. Regulations must proactively address these emerging technologies.\u003C\/li\u003E\u003C\/ul\u003E\u003Ch6\u003E4. Invest in Maritime-Specific Cyber Research\u003C\/h6\u003E\u003Cp\u003EFinally, the researchers stress that long-term resilience requires deeper technical research focused on maritime systems.\u003C\/p\u003E\u003Cp\u003EPriority areas include:\u003C\/p\u003E\u003Cul\u003E\u003Cli\u003EReal-time intrusion detection systems tailored to shipboard protocols.\u003C\/li\u003E\u003Cli\u003EProactive security risk assessments of interconnected onboard systems.\u003C\/li\u003E\u003Cli\u003ECyber-physical modeling to better understand cascading failures in complex maritime environments.\u003C\/li\u003E\u003C\/ul\u003E\u003Ch6\u003EThe Bottom Line\u003C\/h6\u003E\u003Cp\u003ECyber threats at sea are no longer hypothetical. Mariners report real-world incidents ranging from GPS spoofing to ransomware that disrupts global trade.\u003C\/p\u003E\u003Cp\u003E\u201cThrough our interviews with mariners, I saw firsthand how much dedication and pride they take in their work,\u201d said Raymaker. \u201cOur goal is for this research to serve as a call to action for researchers, policymakers, and industry to invest more attention in maritime cybersecurity and support the people who risk their lives every day to keep global trade, food, and energy moving.\u0022\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022https:\/\/dl.acm.org\/doi\/10.1145\/3719027.3744816\u0022\u003E\u003Cem\u003EA Sea of Cyber Threats: Maritime Cybersecurity from the Perspective of Mariners\u003C\/em\u003E\u003C\/a\u003E\u003Cem\u003E\u0026nbsp;\u003C\/em\u003Ewas presented at CCS 2025. It was written by Raymaker and her colleagues, Ph.D. students \u003Cstrong\u003EAkshaya Kumar\u003C\/strong\u003E, \u003Cstrong\u003EMiuyin Yong Wong\u003C\/strong\u003E, and \u003Cstrong\u003ERyan Pickren\u003C\/strong\u003E; Research Scientist \u003Cstrong\u003EAnimesh Chhotaray\u003C\/strong\u003E, Associate Professor \u003Cstrong\u003EFrank Li,\u003C\/strong\u003E Associate Professor \u003Cstrong\u003ESaman Zonouz\u003C\/strong\u003E, and Georgia Tech Provost and Executive Vice President for Academic Affairs \u003Cstrong\u003ERaheem Beyah\u003C\/strong\u003E.\u003C\/p\u003E","summary":"","format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EResearch from the Georgia Institute of Technology shows that commercial ship crews are often unprepared for cyberattacks due to inadequate, generic training, despite rising threats like GPS spoofing and ransomware. Because ships must handle incidents independently at sea, researchers recommend more practical, maritime-specific training, stronger onboard response plans, unified global cybersecurity regulations, and increased investment in ship-focused cyber research. These steps are critical to protecting maritime operations, which carry over 90% of global trade.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Research from the Georgia Institute of Technology shows that commercial ship crews are often unprepared for cyberattacks due to inadequate, generic training, despite rising threats like GPS spoofing and ransomware."}],"uid":"36253","created_gmt":"2026-03-25 16:47:20","changed_gmt":"2026-03-25 18:01:30","author":"John Popham","boilerplate_text":"","field_publication":"","field_article_url":"","location":"Atlanta, GA","dateline":{"date":"2026-03-25T00:00:00-04:00","iso_date":"2026-03-25T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"679738":{"id":"679738","type":"image","title":"Cyber Navy","body":null,"created":"1774461240","gmt_created":"2026-03-25 17:54:00","changed":"1774461240","gmt_changed":"2026-03-25 17:54:00","alt":"A graphic of a boat sailing across the globe with a cyber shield at its front. ","file":{"fid":"263933","name":"AdobeStock_1936842040.jpeg","image_path":"\/sites\/default\/files\/2026\/03\/25\/AdobeStock_1936842040.jpeg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/2026\/03\/25\/AdobeStock_1936842040.jpeg","mime":"image\/jpeg","size":50518,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/2026\/03\/25\/AdobeStock_1936842040.jpeg?itok=CQWC0YmI"}}},"media_ids":["679738"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"1188","name":"Research Horizons"},{"id":"660367","name":"School of Cybersecurity and Privacy"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"},{"id":"145","name":"Engineering"},{"id":"135","name":"Research"},{"id":"8862","name":"Student Research"}],"keywords":[{"id":"187915","name":"go-researchnews"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"},{"id":"39461","name":"Manufacturing, Trade, and Logistics"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003EJohn Popham\u003C\/p\u003E\u003Cp\u003ECommunications Officer II\u0026nbsp;School of Cybersecurity and Privacy\u0026nbsp;\u003C\/p\u003E","format":"limited_html"}],"email":["jpopham3@gatech.edu"],"slides":[],"orientation":[],"userdata":""}},"687586":{"#nid":"687586","#data":{"type":"news","title":"AI Tool Turns Disaster Zones Into Living Classrooms","body":[{"value":"\u003Cp\u003EAn AI-powered tool is changing how researchers study disasters and how students learn from them.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EIn the \u003Ca href=\u0022https:\/\/atlas.gatech.edu\/index.cfm?FuseAction=Programs.ViewProgramAngular\u0026amp;id=10139\u0022\u003E\u003Cstrong\u003EInternational Disaster Reconnaissance (IDR) course\u003C\/strong\u003E\u003C\/a\u003E, students now use \u003Ca href=\u0022https:\/\/www.filio.io\/\u0022\u003E\u003Cem\u003E\u003Cstrong\u003EFilio\u003C\/strong\u003E\u003C\/em\u003E\u003C\/a\u003E, a platform built by School of Computing Instruction Senior Lecturer \u003Cstrong\u003EMax Mahdi Roozbahani\u003C\/strong\u003E, to capture immersive 360\u00b0 media, photos, and video that transform real disaster sites in India and Nepal into living digital classrooms.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EOffered by the School of Civil and Environmental Engineering and taught by IDR director and Regents\u2019 Professor \u003Cstrong\u003EDavid Frost\u003C\/strong\u003E, the course pairs traditional fieldwork with Roozbahani\u2019s expertise in immersive technology and data-driven learning, transforming on-the-ground observations into reusable, interactive educational resources.\u0026nbsp;\u003C\/p\u003E\u003Ch4\u003E\u003Cstrong\u003EHow Computing Can Capture Data\u0026nbsp;\u003C\/strong\u003E\u003C\/h4\u003E\u003Cp\u003EDisasters are not only physical events; they are also information events, Roozbahani says. Effective response and long-term resilience depend on the ability to observe, record, and communicate critical data under pressure. Georgia Tech\u2019s IDR course pairs structured on-campus preparation with international field experiences, enabling students to study the cascading effects of major disasters, including how local building practices, governance, and culture shape damage and recovery.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cWhen students step into a disaster zone, they learn quickly that resilience is a systems problem: physical, social, and informational. Our job in computing is to help them capture and reason about that system responsibly,\u201d Roozbahani said.\u0026nbsp;\u003C\/p\u003E\u003Ch4\u003E\u003Cstrong\u003ELearning from the 2025 Himalayas Expedition\u0026nbsp;\u003C\/strong\u003E\u003C\/h4\u003E\u003Cp\u003EDuring spring break last year, the cohort traveled along the Teesta River corridor in Sikkim, India. The region is shaped by steep terrain, fast-moving water, and critical infrastructure in narrow valleys.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EThe visit followed the October 2023 glacial lake outburst flood from South Lhonak Lake, which destroyed the Teesta III hydropower dam and impacted downstream towns, including Dikchu and Rangpo. Field stops across India included Lachung, Chungthang, Dikchu, Rangpo, Gangtok, and New Delhi.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EStudents explored both upstream and downstream consequences.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EUpstream, the team examined how steep terrain and river confinement amplify flood forces, creating cascading risks for infrastructure. Using Filio\u2019s interactive 360\u00b0 media, students captured conditions in Lachung and Chungthang, allowing viewers to explore the landscape through a \u003Ca href=\u0022https:\/\/app.filio.io\/photo-viewer?src=https:\/\/visual.filio.io\/f-67d1cabeb82b05102bf91a4c\/_d6LpRAkr0ymi1OqCtGeAYrXo8xBGTJmACPN0SGXP50QlCE8FLR-f-67da18bc11c485642674bf73_=s0-photo-r0\u0026amp;rotation=0\u0026amp;type=360\u0022\u003E\u003Cstrong\u003E360\u00b0 photo\u003C\/strong\u003E\u003C\/a\u003E and \u003Ca href=\u0022https:\/\/app.filio.io\/video-viewer?src=https:\/\/visual.filio.io\/f-67d1cabeb82b05102bf91a4c\/_IX5yWxXjRjtueg1qeGFhV62K8GDhLlarQ6uFC9g4zkjIl7rCM3-f-67dcd50f11c485642674d269_=s0-video\u0026amp;rotation=0\u0026amp;type=360\u0022\u003E\u003Cstrong\u003E360\u00b0 video\u003C\/strong\u003E\u003C\/a\u003E that reveal how topography and river dynamics intensify disaster impacts.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EThey studied community-scale effects downstream, including damaged buildings, disrupted access, and prolonged recovery timelines.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003ERangpo offered a glimpse of recovery in motion, with materials staged for rebuilding bridges and roads essential to commerce and emergency response.\u003C\/p\u003E\u003Cdiv\u003E\u003Ch4\u003E\u003Cstrong\u003EUsing Immersive Media as a Learning Tool\u0026nbsp;\u003C\/strong\u003E\u003C\/h4\u003E\u003Cp\u003EStudents documented their field experience using \u003Cem\u003EFilio\u003C\/em\u003E, an AI-powered visual reporting platform developed by Roozbahani through Georgia Tech\u2019s \u003Ca href=\u0022https:\/\/create-x.gatech.edu\/\u0022\u003E\u003Cstrong\u003ECREATE-X\u003C\/strong\u003E\u003C\/a\u003E ecosystem. Filio captures high-resolution photos, video, and 360\u00b0 immersive media, preserving both the facts and the context of disaster sites; what the site felt like, what was lost, and what communities prioritized in recovery.\u0026nbsp;\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cA 360\u00b0 capture lets students return months later and ask better questions. That second look is where learning accelerates,\u201d Roozbahani said.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003ESupported by alumni and faculty mentors, including Tech alumnus \u003Cstrong\u003EChris Klaus\u003C\/strong\u003E and Georgia Tech mentor \u003Cstrong\u003EBill Higginbotham\u003C\/strong\u003E, the platform is evolving into a reusable educational library for future courses on immersive technology, responsible AI, and global resilience.\u0026nbsp;\u003C\/p\u003E\u003Ch4\u003E\u003Cstrong\u003EKathmandu: The Context of Culture\u0026nbsp;\u003C\/strong\u003E\u003C\/h4\u003E\u003Cp\u003EThe course concluded in Kathmandu, Nepal, where students examined how heritage, governance, and the everyday use of public space shape resilience.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EThrough Filio\u2019s immersive documentation \u2014 including a \u003Ca href=\u0022https:\/\/app.filio.io\/photo-viewer?src=https:\/\/visual.filio.io\/f-67d1cafeb82b05102bf91a4d\/_n2OFrWLzHNcdTkMl6uD9j0tSrOPybGLZccsNcarj8vwZaZIbuu-f-67dedf3f11c485642674d820_=s0-photo-r0\u0026amp;rotation=0\u0026amp;type=360\u0022\u003E\u003Cstrong\u003E360\u00b0 photo\u003C\/strong\u003E\u003C\/a\u003E and \u003Ca href=\u0022https:\/\/app.filio.io\/video-viewer?src=https:\/\/visual.filio.io\/f-67d1cafeb82b05102bf91a4d\/_CD25dUToZ6BgfmfrayfHHtsThQGJIQWu82xqmzSy884UXHnbEB-f-67dd5a9b11c485642674d302_=s0-video\u0026amp;rotation=0\u0026amp;type=360\u0022\u003E\u003Cstrong\u003E360\u00b0 video\u003C\/strong\u003E\u003C\/a\u003E from Kathmandu \u2014 the focus broadened from hazard impacts to cultural context, highlighting how recovery is not only about rebuilding structures, but also about preserving identity, memory, and community.\u003C\/p\u003E\u003Ch4\u003E\u003Cstrong\u003ELooking Ahead: A Growing Resource for All Students\u0026nbsp;\u003C\/strong\u003E\u003C\/h4\u003E\u003Cp\u003EFrost and Roozbahani envision the IDR immersive media library as a reusable resource for students even when they cannot travel, supporting future courses on immersive technology, responsible AI, and global resilience. Spring 2026 cohorts will continue to build on this foundation by documenting, analyzing, and sharing insights that can improve education and real-world disaster response.\u0026nbsp;\u003C\/p\u003E\u003C\/div\u003E","summary":"","format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EAn AI-powered tool is changing how researchers study disasters and how students learn from them.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EIn the \u003Ca href=\u0022https:\/\/atlas.gatech.edu\/index.cfm?FuseAction=Programs.ViewProgramAngular\u0026amp;id=10139\u0022\u003E\u003Cstrong\u003EInternational Disaster Reconnaissance (IDR) course\u003C\/strong\u003E\u003C\/a\u003E, students now use \u003Ca href=\u0022https:\/\/www.filio.io\/\u0022\u003E\u003Cem\u003E\u003Cstrong\u003EFilio\u003C\/strong\u003E\u003C\/em\u003E\u003C\/a\u003E, a platform built by School of Computing Instruction Senior Lecturer \u003Cstrong\u003EMax Mahdi Roozbahani\u003C\/strong\u003E, to capture immersive 360\u00b0 media, photos, and video that transform real disaster sites in India and Nepal into living digital classrooms.\u0026nbsp;\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"An AI-powered tool is changing how researchers study disasters and how students learn from them. "}],"uid":"36613","created_gmt":"2026-01-22 15:11:14","changed_gmt":"2026-03-20 12:54:39","author":"Emily Smith","boilerplate_text":"","field_publication":"","field_article_url":"","location":"Atlanta, GA","dateline":{"date":"2026-01-22T00:00:00-05:00","iso_date":"2026-01-22T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"hg_media":{"679052":{"id":"679052","type":"image","title":"1-IDR-Spring-2025---Lachung---Chungthang03182025.jpg","body":"\u003Cp\u003E\u003Cem\u003EStudents visited Lachung and Chungthang in Sikkim, India. Upstream in the Teesta Valley, students examined how steep terrain and river confinement amplify flood forces and how failures can cascade across an entire corridor of infrastructure.\u0026nbsp;\u003C\/em\u003E\u003Cbr\u003E\u0026nbsp;\u003C\/p\u003E","created":"1769095217","gmt_created":"2026-01-22 15:20:17","changed":"1769095217","gmt_changed":"2026-01-22 15:20:17","alt":"Students visited Lachung and Chungthang in Sikkim, India. Upstream in the Teesta Valley, students examined how steep terrain and river confinement amplify flood forces and how failures can cascade across an entire corridor of infrastructure. ","file":{"fid":"263164","name":"1-IDR-Spring-2025---Lachung---Chungthang03182025.jpg","image_path":"\/sites\/default\/files\/2026\/01\/22\/1-IDR-Spring-2025---Lachung---Chungthang03182025.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/2026\/01\/22\/1-IDR-Spring-2025---Lachung---Chungthang03182025.jpg","mime":"image\/jpeg","size":1897568,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/2026\/01\/22\/1-IDR-Spring-2025---Lachung---Chungthang03182025.jpg?itok=zDRmcY2d"}},"679053":{"id":"679053","type":"image","title":"2-IDR-Spring-2025---Dikchu03172025.jpg","body":"\u003Cp\u003E\u003Cem\u003EDownstream in the town Dikchu in Sikkim, India, the class focused on community-scale consequences: damaged buildings, disrupted access, and long recovery timelines.\u003C\/em\u003E\u003Cbr\u003E\u0026nbsp;\u003C\/p\u003E","created":"1769095217","gmt_created":"2026-01-22 15:20:17","changed":"1769095217","gmt_changed":"2026-01-22 15:20:17","alt":"Downstream in the town Dikchu in Sikkim, India, the class focused on community-scale consequences: damaged buildings, disrupted access, and long recovery timelines.","file":{"fid":"263165","name":"2-IDR-Spring-2025---Dikchu03172025.jpg","image_path":"\/sites\/default\/files\/2026\/01\/22\/2-IDR-Spring-2025---Dikchu03172025.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/2026\/01\/22\/2-IDR-Spring-2025---Dikchu03172025.jpg","mime":"image\/jpeg","size":543269,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/2026\/01\/22\/2-IDR-Spring-2025---Dikchu03172025.jpg?itok=vdI7egUR"}},"679054":{"id":"679054","type":"image","title":"3-IDR-Spring-2025---Rangpo03162025.jpg","body":"\u003Cp\u003E\u003Cem\u003ERangpo in Sikkim, India offered a view of recovery in motion such as materials staged for rebuilding near bridges and roads that keep commerce and emergency response moving.\u003C\/em\u003E\u003Cbr\u003E\u0026nbsp;\u003C\/p\u003E","created":"1769095217","gmt_created":"2026-01-22 15:20:17","changed":"1769095217","gmt_changed":"2026-01-22 15:20:17","alt":"Rangpo in Sikkim, India offered a view of recovery in motion such as materials staged for rebuilding near bridges and roads that keep commerce and emergency response moving.","file":{"fid":"263166","name":"3-IDR-Spring-2025---Rangpo03162025.jpg","image_path":"\/sites\/default\/files\/2026\/01\/22\/3-IDR-Spring-2025---Rangpo03162025.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/2026\/01\/22\/3-IDR-Spring-2025---Rangpo03162025.jpg","mime":"image\/jpeg","size":1479166,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/2026\/01\/22\/3-IDR-Spring-2025---Rangpo03162025.jpg?itok=MuIfiKjX"}},"679055":{"id":"679055","type":"image","title":"4-IDR-Spring-2025---Kathmandu--Nepal03212025.jpg","body":"\u003Cp\u003E\u003Cem\u003EIn Kathmandu Valley, Nepal, the course broadened from hazard impacts to cultural context, exploring how heritage, governance, and everyday use of public space shape resilience.\u003C\/em\u003E\u003Cbr\u003E\u0026nbsp;\u003C\/p\u003E","created":"1769095217","gmt_created":"2026-01-22 15:20:17","changed":"1769095217","gmt_changed":"2026-01-22 15:20:17","alt":"In Kathmandu Valley, Nepal, the course broadened from hazard impacts to cultural context, exploring how heritage, governance, and everyday use of public space shape resilience.","file":{"fid":"263167","name":"4-IDR-Spring-2025---Kathmandu--Nepal03212025.jpg","image_path":"\/sites\/default\/files\/2026\/01\/22\/4-IDR-Spring-2025---Kathmandu--Nepal03212025.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/2026\/01\/22\/4-IDR-Spring-2025---Kathmandu--Nepal03212025.jpg","mime":"image\/jpeg","size":2316531,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/2026\/01\/22\/4-IDR-Spring-2025---Kathmandu--Nepal03212025.jpg?itok=KBCQfvza"}},"679056":{"id":"679056","type":"image","title":"cover-photo.jpg","body":"\u003Cp\u003E\u003Cem\u003ESchool of Civil and Environmental Engineering students captured 360 media, using Filio, to study disaster sites in India and Nepal. Photos provided by Roozbahani.\u0026nbsp;\u003C\/em\u003E\u003Cbr\u003E\u0026nbsp;\u003C\/p\u003E","created":"1769095217","gmt_created":"2026-01-22 15:20:17","changed":"1769095217","gmt_changed":"2026-01-22 15:20:17","alt":"School of Civil and Environmental Engineering students captured 360 media, using Filio, to study disaster sites in India and Nepal. Photos provided by Roozbahani. ","file":{"fid":"263168","name":"cover-photo.jpg","image_path":"\/sites\/default\/files\/2026\/01\/22\/cover-photo.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/2026\/01\/22\/cover-photo.jpg","mime":"image\/jpeg","size":833758,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/2026\/01\/22\/cover-photo.jpg?itok=jiNPLFL8"}}},"media_ids":["679052","679053","679054","679055","679056"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"1188","name":"Research Horizons"},{"id":"660374","name":"School of Computing Instruction"}],"categories":[{"id":"194606","name":"Artificial Intelligence"},{"id":"142","name":"City Planning, Transportation, and Urban Growth"},{"id":"42901","name":"Community"},{"id":"42911","name":"Education"},{"id":"145","name":"Engineering"},{"id":"154","name":"Environment"},{"id":"135","name":"Research"},{"id":"134","name":"Student and Faculty"},{"id":"8862","name":"Student Research"}],"keywords":[{"id":"654","name":"College of Computing"},{"id":"193866","name":"school of computing instruction"},{"id":"172752","name":"Georgia Tech School of Civil and Environmental Engineering"}],"core_research_areas":[{"id":"193655","name":"Artificial Intelligence at Georgia Tech"}],"news_room_topics":[{"id":"71881","name":"Science and Technology"}],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003E\u003Ca href=\u0022mailto:emily.smith@cc.gatech.edu\u0022\u003EEmily Smith\u003C\/a\u003E\u003Cbr\u003ECollege of Computing\u003Cbr\u003EGeorgia Tech\u003C\/p\u003E","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}},"688391":{"#nid":"688391","#data":{"type":"news","title":"Robot Pollinator Could Produce More, Better Crops for Indoor Farms","body":[{"value":"\u003Cp\u003EA new robot could solve one of the biggest challenges facing indoor farmers: manual pollination.\u003C\/p\u003E\u003Cp\u003EIndoor farms, also known as vertical farms, are popular among agricultural researchers and are expanding across the agricultural industry. Some benefits they have over outdoor farms include:\u003C\/p\u003E\u003Cul\u003E\u003Cli\u003EYear-round production of food crops\u003C\/li\u003E\u003Cli\u003ELess water and land requirements\u003C\/li\u003E\u003Cli\u003ENot needing pesticides\u003C\/li\u003E\u003Cli\u003EReducing carbon emissions from shipping\u003C\/li\u003E\u003Cli\u003EReducing food waste\u003C\/li\u003E\u003C\/ul\u003E\u003Cp\u003EAdditionally,\u0026nbsp;\u003Ca href=\u0022https:\/\/www.agritecture.com\/blog\/2021\/7\/20\/5-ways-vertical-farming-is-improving-nutrition\u0022\u003E\u003Cstrong\u003Esome studies\u003C\/strong\u003E\u003C\/a\u003E indicate that indoor farms produce more nutritious food for urban communities.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EHowever, these farms are often inaccessible to birds, bees, and other natural pollinators, leaving the pollination process to humans. The tedious process must be completed by hand for each flower to ensure the indoor crop flourishes.\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022https:\/\/research.gatech.edu\/people\/ai-ping-hu\u0022\u003E\u003Cstrong\u003EAi-Ping Hu\u003C\/strong\u003E\u003C\/a\u003E, a principal research engineer at the Georgia Tech Research Institute (GTRI), has spent years exploring methods to efficiently pollinate flowering plants and food crops in indoor farms to find a way to efficiently pollinate flower plants and food crops in indoor farms.\u003C\/p\u003E\u003Cp\u003EHu,\u0026nbsp;\u003Ca href=\u0022https:\/\/research.gatech.edu\/people\/shreyas-kousik\u0022\u003E\u003Cstrong\u003EAssistant Professor Shreyas Kousik of the George W. Woodruff School of Mechanical Engineering\u003C\/strong\u003E\u003C\/a\u003E, and a rotating group of student interns have developed a robot prototype that may be up to the task.\u003C\/p\u003E\u003Cp\u003EThe robot can efficiently pollinate plants that have both male and female reproductive parts. These plants only require pollen to be transferred from one part to the other rather than externally from another flower.\u003C\/p\u003E\u003Cp\u003ENatural pollinators perform this task outdoors, but Hu said indoor farmers often use a paintbrush or electric tootbrush to ensure these flowers are pollinated.\u0026nbsp;\u003C\/p\u003E\u003Ch4\u003E\u003Cstrong\u003EKnowing the Pose\u003C\/strong\u003E\u003C\/h4\u003E\u003Cp\u003EAn early challenge the research team addressed was teaching the robot to identify the \u201cpose\u201d of each flower. Pose refers to a flower\u2019s orientation, shape, and symmetry. Knowing these details ensures precise delivery of the pollen to maximize reproductive success.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cIt\u2019s crucial to know exactly which way the flowers are facing,\u201d Hu said.\u003C\/p\u003E\u003Cp\u003E\u201cYou want to approach the flower from the front because that\u2019s where all the biological structures are. Knowing the pose tells you where the stem is. Our device grasps the stem and shakes it to dislodge the pollen.\u003C\/p\u003E\u003Cp\u003E\u201cEvery flower is going to have its own pose, and you need to know what that is within at least 10 degrees.\u201d\u003C\/p\u003E\u003Ch4\u003E\u003Cstrong\u003EComputer Vision Breakthrough\u003C\/strong\u003E\u003C\/h4\u003E\u003Cp\u003E\u003Cstrong\u003EHarsh Muriki\u003C\/strong\u003E is a robotics master\u2019s student at Georgia Tech\u2019s School of Interactive Computing, who used computer vision to solve the pose problem while interning for Hu and GTRI.\u003C\/p\u003E\u003Cp\u003EMuriki attached a camera to a FarmBot to capture images of strawberry plants from dozens of angles in a small garden in front of Georgia Tech\u2019s Food Processing Technology Building. The\u0026nbsp;\u003Ca href=\u0022https:\/\/farm.bot\/?srsltid=AfmBOoqh1Z8vSs3WflZisgw5DsOUSo8shD4VtY0Y8_VmVpVyt0Iwalxo\u0022\u003E\u003Cstrong\u003EFarmBot\u003C\/strong\u003E\u003C\/a\u003E is an XYZ-axis robot that waters and sprays pesticides on outdoor gardens, though it is not capable of pollination.\u003C\/p\u003E\u003Cp\u003E\u201cWe reconstruct the images of the flower into a 3D model and use a technique that converts the 3D model into multiple 2D images with depth information,\u201d Muriki said. \u201cThis enables us to send them to object detectors.\u201d\u003C\/p\u003E\u003Cp\u003EMuriki said he used a real-time object detection system called YOLO (You Only Look Once) to classify objects. YOLO is known for identifying and classifying objects in a single pass.\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EVed Sengupta\u003C\/strong\u003E, a computer engineering major who interned with Muriki, fine-tuned the algorithms that converted 3D images into 2D.\u003C\/p\u003E\u003Cp\u003E\u201cThis was a crucial part of making robot pollination possible,\u201d Sengupta said. \u201cThere is a big gap between 3D and 2D image processing.\u003C\/p\u003E\u003Cp\u003E\u201cThere\u2019s not a lot of data on the internet for 3D object detection, but there\u2019s a ton for 2D. We were able to get great results from the converted images, and I think any sector of technology can take advantage of that.\u201d\u003C\/p\u003E\u003Cp\u003ESengupta, Muriki, and Hu co-authored a paper about their work that was accepted to the 2025 International Conference on Robotics and Automation (ICRA) in Atlanta.\u003C\/p\u003E\u003Ch4\u003E\u003Cstrong\u003EMeasuring Success\u003C\/strong\u003E\u003C\/h4\u003E\u003Cp\u003EThe pollination robot, built in Kousik\u2019s Safe Robotics Lab, is now in the prototype phase.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EHu said the robot can do more than pollinate. It can also analyze each flower to determine how well it was pollinated and whether the chances for reproduction are high.\u003C\/p\u003E\u003Cp\u003E\u201cIt has an additional capability of microscopic inspection,\u201d Hu said. \u201cIt\u2019s the first device we know of that provides visual feedback on how well a flower was pollinated.\u201d\u003C\/p\u003E\u003Cp\u003EFor more information about the robot, visit the\u0026nbsp;\u003Ca href=\u0022https:\/\/saferoboticslab.me.gatech.edu\/research\/towards-robotic-pollination\/\u0022\u003E\u003Cstrong\u003ESafe Robotics Lab project page\u003C\/strong\u003E\u003C\/a\u003E.\u003C\/p\u003E","summary":"","format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EManual pollination is one of the biggest challenges for indoor farmers. These farms are often inaccessible to birds, bees, and other natural pollinators, leaving the pollination process to humans. The tedious process must be completed by hand for each flower to ensure the indoor crop flourishes.\u003C\/p\u003E\u003Cp\u003EA Georgia Tech research led by Ai-Ping Hu and Shreyas Kousik team is working to solve that. A robot they\u0027ve developed can efficiently pollinate plants that have both male and female reproductive parts. These plants only require pollen to be transferred from one part to the other rather than externally from another flower.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"A research team that expands GTRI, the College of Engineering, and the College of Computing have developed a robot capable of pollinating flowers in indoor farms."}],"uid":"36530","created_gmt":"2026-02-19 18:58:12","changed_gmt":"2026-03-20 12:54:01","author":"Nathan Deen","boilerplate_text":"","field_publication":"","field_article_url":"","location":"Atlanta, GA","dateline":{"date":"2026-02-19T00:00:00-05:00","iso_date":"2026-02-19T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"hg_media":{"679370":{"id":"679370","type":"image","title":"Harsh-Muriki_86A0006.jpg","body":null,"created":"1771527500","gmt_created":"2026-02-19 18:58:20","changed":"1771527500","gmt_changed":"2026-02-19 18:58:20","alt":"Harsh Muriki","file":{"fid":"263520","name":"Harsh-Muriki_86A0006.jpg","image_path":"\/sites\/default\/files\/2026\/02\/19\/Harsh-Muriki_86A0006.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/2026\/02\/19\/Harsh-Muriki_86A0006.jpg","mime":"image\/jpeg","size":140654,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/2026\/02\/19\/Harsh-Muriki_86A0006.jpg?itok=rd0rv1Yt"}}},"media_ids":["679370"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"1188","name":"Research Horizons"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[{"id":"194606","name":"Artificial Intelligence"},{"id":"153","name":"Computer Science\/Information Technology and Security"},{"id":"145","name":"Engineering"},{"id":"135","name":"Research"},{"id":"152","name":"Robotics"}],"keywords":[{"id":"9153","name":"Research Horizons"},{"id":"187991","name":"go-robotics"},{"id":"192863","name":"go-ai"},{"id":"11506","name":"computer vision"},{"id":"180840","name":"computer vision systems"},{"id":"669","name":"agriculture"},{"id":"194392","name":"AI in Agriculture"},{"id":"170254","name":"urban gardening"},{"id":"94111","name":"farming"},{"id":"14913","name":"urban farming"},{"id":"23911","name":"bees"},{"id":"6660","name":"flowers"},{"id":"187915","name":"go-researchnews"}],"core_research_areas":[{"id":"193655","name":"Artificial Intelligence at Georgia Tech"},{"id":"193653","name":"Georgia Tech Research Institute"},{"id":"39521","name":"Robotics"}],"news_room_topics":[{"id":"71911","name":"Earth and Environment"}],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003E\u003Ca href=\u0022mailto:ndeen6@gatech.edu\u0022\u003ENathan Deen\u003C\/a\u003E\u003Cbr\u003ECollege of Computing\u003Cbr\u003EGeorgia Tech\u003C\/p\u003E","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}},"688487":{"#nid":"688487","#data":{"type":"news","title":"New Study Could Show How TikTok\u2019s Algorithm Affects Youth Mental Health","body":[{"value":"\u003Cdiv\u003E\u003Cdiv\u003E\u003Cp\u003EMeta CEO Mark Zuckerberg\u0026nbsp;\u003Ca href=\u0022https:\/\/www.latimes.com\/california\/story\/2026-02-18\/mark-zuckerberg-tesimony-la-social-media-trial?utm_source=chatgpt.com\u0022\u003E\u003Cstrong\u003Etook the witness stand\u003C\/strong\u003E\u003C\/a\u003E last week in Los Angeles County Superior Court to defend his company from accusations that social media harms children.\u003C\/p\u003E\u003Cp\u003EA lawsuit filed by a 20-year-old plaintiff alleges Instagram and other social media apps are designed to make young users addicted to their platforms.\u003C\/p\u003E\u003Cp\u003EMeanwhile, social media experts believe the algorithms that drive content on these platforms play a role in hooking users and keeping them scrolling for extensive periods of time.\u003C\/p\u003E\u003Cp\u003EA new study led by Georgia Tech might confirm this suspicion.\u003C\/p\u003E\u003Cp\u003EUsing recently acquired data from more than 10,000 adolescent users,\u0026nbsp;\u003Ca href=\u0022http:\/\/www.munmund.net\/\u0022\u003E\u003Cstrong\u003EMunmun De Choudhury\u003C\/strong\u003E\u003C\/a\u003E will audit TikTok\u2019s recommendation algorithm and study its impact on young people\u2019s behavior and mental health.\u003C\/p\u003E\u003Cp\u003EDe Choudhury is leading a multi-institutional research team on a four-year, $1.7 million grant from the Huo Family Foundation.\u003C\/p\u003E\u003Cp\u003E\u201cWe hope to learn the different types of negative exposures that young people experience when using TikTok,\u201d De Choudhury said. \u201cThis can help us characterize what they\u2019re watching and build computational methods to understand the consumption behaviors of these participants and how they\u2019re affected by the algorithm.\u201d\u003C\/p\u003E\u003Cp\u003EDe Choudhury, a professor in Georgia Tech\u2019s School of Interactive Computing, is collaborating with Amy Orben, a professor at the University of Cambridge, and Homa Hosseinmardi, an assistant professor at UCLA, on the project.\u003C\/p\u003E\u003Cp\u003ESocial media platforms have become increasingly reluctant to share their data in recent years, posing a challenge for researchers like De Choudhury.\u003C\/p\u003E\u003Cp\u003E\u201cWe can\u2019t do the type of studies we did 10 years ago with X (formerly Twitter) because the API is much more restrictive,\u201d she said. \u201cThere are limited ways to programmatically access people\u2019s data now.\u003C\/p\u003E\u003Cp\u003E\u201cWe must go through a tedious, manual process to get around declining access to social media data. This data-gathering process is essential given the sensitive nature of mental health research. You want data that is shared with consent.\u201d\u003C\/p\u003E\u003Cp\u003EOrben collected TikTok data from more than 10,000 young people in the UK who consented to provide their personal data archives in accordance with the European Union\u2019s General Data Protection Regulation (GDPR).\u003C\/p\u003E\u003Cp\u003EThe collected data includes watch histories, which De Choudhury said distinguishes this research from other social media studies that focus on what users post.\u003C\/p\u003E\u003Cp\u003E\u201cWe don\u2019t understand passive social media consumption very well, so we hope to close that gap and learn what that looks like,\u201d she said. \u201cThat could complement or contrast what we know about people\u2019s active engagement on these platforms. Is what they\u2019re consuming directly related to what they\u2019re posting? How does passive consumption affect young people\u2019s mental health?\u201d\u003C\/p\u003E\u003Cp\u003EA clearer picture of how algorithm-based content affects young people could result in design interventions to minimize negative effects. De Choudhury said studying data from young people is critical because it\u2019s not too late to steer them away from unhealthy behavioral patterns.\u003C\/p\u003E\u003Cp\u003E\u201cSome of the earliest signs or symptoms of mental health conditions appear in adolescence,\u201d she said. \u201cIf appropriate care and support are provided, maybe it\u2019s possible to prevent these symptoms from becoming full-blown in the future.\u201d\u003C\/p\u003E\u003Ch4\u003E\u003Cstrong\u003EBeyond TikTok\u003C\/strong\u003E\u003C\/h4\u003E\u003Cp\u003EWhat the research team learns about TikTok could also provide broader insight into other social media platforms.\u003C\/p\u003E\u003Cp\u003ETikTok has been influential in how social media platforms display video content. Competitors like Instagram and X modeled their video presentation after TikTok\u2019s, which can easily lead to doomscrolling.\u003C\/p\u003E\u003Cp\u003E\u201cOur hope is that our findings can be generalized, with the caveat the data we have is exclusively from TikTok,\u201d De Choudhury said. \u201cOther platforms have similar video-sharing and consumption features where the video automatically plays from one to the next. We hope what we learn from TikTok will be applicable to people\u2019s activities elsewhere, though it will require future work beyond this project to draw concrete conclusions.\u201d\u003C\/p\u003E\u003Ch4\u003E\u003Cstrong\u003ESimulating Feeds with AI\u003C\/strong\u003E\u003C\/h4\u003E\u003Cp\u003EDe Choudhury said an additional part of the study will be using artificial intelligence (AI) to simulate video feeds.\u003C\/p\u003E\u003Cp\u003EIn 2024, Hosseinmardi led a study at the University of Pennsylvania on YouTube\u2019s recommendation algorithm and used bots that either followed or ignored the recommendations.\u003C\/p\u003E\u003Cp\u003EDe Choudhury said they will use a similar method for TikTok.\u003C\/p\u003E\u003Cp\u003E\u201cThe feeds will be realistic but generated by AI to see the potential pathways to consumption rabbit holes,\u201d she said. \u201cThis should give us some insight into how algorithms influence the negative and positive exposures people might be having on TikTok.\u201d\u003C\/p\u003E\u003Ch4\u003E\u003Cstrong\u003EFoundation Expands Reach\u003C\/strong\u003E\u003C\/h4\u003E\u003Cp\u003EBased in the UK and established in 2009, the Huo Family Foundation supports community education initiatives in the UK, the U.S., and China.\u003C\/p\u003E\u003Cp\u003EThe organization announced in January its launch of the Huo Family Foundation Science Programme.\u0026nbsp;\u003Ca href=\u0022https:\/\/huofamilyfoundation.org\/news\/updates\/huo-family-foundation-awards-17-6m-for-groundbreaking-research\/\u0022\u003E\u003Cstrong\u003EThe new program is committing $17.6 million to fund 20 new multi-year research grants\u003C\/strong\u003E\u003C\/a\u003E that explore the impact of digital technology on the brain development, social behavior, and mental health of young people.\u003C\/p\u003E\u003Cp\u003E\u201cDigital technology is profoundly shaping childhood and young adulthood, yet there is limited causal evidence of its effects,\u201d\u0026nbsp;said Yan Huo, founder of the Huo Family Foundation, in a press release.\u0026nbsp;\u201cWe are proud to support exceptional researchers advancing vital scientific understanding.\u201d\u003C\/p\u003E\u003C\/div\u003E\u003C\/div\u003E","summary":"","format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cdiv\u003E\u003Cdiv dir=\u0022ltr\u0022\u003E\u003Cp\u003ELed by Georgia Tech professor Munmun De Choudhury, a multi-institutional research team is launching a $1.7 million study to examine how TikTok\u2019s recommendation algorithm influences the mental health of adolescent users. The project focuses on passive consumption by analyzing the watch histories of over 10,000 young participants and using AI to simulate content \u0022rabbit holes.\u0022 By identifying patterns of negative exposure, the researchers aim to develop design interventions that can steer teenagers away from unhealthy behavioral patterns and support early mental health care.\u003C\/p\u003E\u003C\/div\u003E\u003C\/div\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"A Georgia Tech-led research team is conducting a multi-year study using data from more than 10,000 adolescents to investigate how TikTok\u2019s recommendation algorithm and passive content consumption impact youth mental health."}],"uid":"36530","created_gmt":"2026-02-24 14:29:28","changed_gmt":"2026-03-20 12:52:52","author":"Nathan Deen","boilerplate_text":"","field_publication":"","field_article_url":"","location":"Atlanta, GA","dateline":{"date":"2026-02-24T00:00:00-05:00","iso_date":"2026-02-24T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"hg_media":{"679406":{"id":"679406","type":"image","title":"208A9267-2.jpg","body":null,"created":"1771943377","gmt_created":"2026-02-24 14:29:37","changed":"1771943377","gmt_changed":"2026-02-24 14:29:37","alt":"Munmun De Choudhury","file":{"fid":"263567","name":"208A9267-2.jpg","image_path":"\/sites\/default\/files\/2026\/02\/24\/208A9267-2.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/2026\/02\/24\/208A9267-2.jpg","mime":"image\/jpeg","size":104533,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/2026\/02\/24\/208A9267-2.jpg?itok=3fEZjVVt"}}},"media_ids":["679406"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"1188","name":"Research Horizons"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[{"id":"194606","name":"Artificial Intelligence"},{"id":"153","name":"Computer Science\/Information Technology and Security"},{"id":"143","name":"Digital Media and Entertainment"},{"id":"135","name":"Research"}],"keywords":[{"id":"187915","name":"go-researchnews"},{"id":"9153","name":"Research Horizons"},{"id":"167543","name":"social media"},{"id":"190947","name":"tiktok"},{"id":"10343","name":"mental health"},{"id":"10824","name":"Children And Adolescents"},{"id":"5660","name":"algorithms"}],"core_research_areas":[{"id":"39501","name":"People and Technology"}],"news_room_topics":[{"id":"71901","name":"Society and Culture"}],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"688516":{"#nid":"688516","#data":{"type":"news","title":" Is This Your AI? Researchers Crack AI Blackbox","body":[{"value":"\u003Cdiv\u003E\u003Cdiv\u003E\u003Cp\u003EArtificial intelligence (AI) systems power everything from chatbots to security cameras, yet many of the most advanced models operate as \u201cblack boxes.\u201d Companies can use them, but outsiders can\u2019t see how they were built, where they came from, or whether they contain hidden flaws.\u003C\/p\u003E\u003Cp\u003EThis lack of transparency creates real risks. A model could contain security vulnerabilities or hidden backdoors. It could also be a lightly modified version of an open-source system \u2014 repackaged in violation of its license \u2014 with no easy way to prove it.\u003C\/p\u003E\u003Cp\u003EResearchers at the Georgia Institute of Technology have developed a new framework, ZEN, to help solve this problem. The tool can recover a model\u2019s unique \u201cfingerprint\u201d directly from its memory, allowing experts to trace its origins and reconstruct how it was assembled.\u003C\/p\u003E\u003Cp\u003E\u201cAnalyzing a proprietary AI model without identifying where it came from and how it is constructed is like trying to fix a car engine with the hood welded shut,\u201d said \u003Ca href=\u0022https:\/\/davidoygenblik.github.io\/\u0022\u003E\u003Cstrong\u003EDavid Oygenblik\u003C\/strong\u003E\u003C\/a\u003E, a Ph.D. student at Georgia Tech and the study\u2019s lead author.\u003C\/p\u003E\u003Cp\u003E\u201cZEN not only X-rays the engine but also provides the complete wiring diagram.\u201d\u003C\/p\u003E\u003Cp\u003EZEN works by taking a snapshot of a running AI system and extracting information about both its mathematical structure and the code that defines it. It compares that fingerprint against a database of known open-source models to determine the system\u2019s origin.\u003C\/p\u003E\u003Cp\u003EIf it finds a match, ZEN identifies the exact changes and generates software patches that allow investigators to recreate a working replica of the proprietary model for testing.\u003C\/p\u003E\u003Cp\u003EThat capability has major implications for both security and intellectual property protection.\u003C\/p\u003E\u003Cp\u003E\u201cWith ZEN, a security analyst can finally test a black-box model for hidden backdoors, and a company can gather concrete evidence to prove its software license was infringed,\u201d Oygenblik said.\u003C\/p\u003E\u003Cp\u003ETo evaluate the system, the research team tested ZEN on 21 state-of-the-art AI models, including Llama 3, YOLOv10, and other well-known systems.\u003C\/p\u003E\u003Cp\u003EZEN correctly traced every customized model back to its original open-source foundation \u2014 achieving 100% attribution accuracy. Even when models had been heavily modified \u2014 differing by more than 83% from their original versions \u2014 ZEN successfully identified the changes and enabled full reconstruction for security testing.\u003C\/p\u003E\u003Cp\u003EThe researchers will present their findings at the 2026 \u003Ca href=\u0022https:\/\/www.ndss-symposium.org\/\u0022\u003ENetwork and Distributed System Security (NDSS) Symposium\u003C\/a\u003E. The paper, \u003Ca href=\u0022https:\/\/www.ndss-symposium.org\/ndss-paper\/achieving-zen-combining-mathematical-and-programmatic-deep-learning-model-representations-for-attribution-and-reuse\/\u0022\u003E\u003Cem\u003EAchieving Zen: Combining Mathematical and Programmatic Deep Learning Model Representations for Attribution and Reuse\u003C\/em\u003E\u003C\/a\u003E, was authored by Oygenblik, master\u2019s student \u003Cstrong\u003EDinko Dermendzhiev\u003C\/strong\u003E, Ph.D. students \u003Cstrong\u003EFilippos Sofias\u003C\/strong\u003E, \u003Cstrong\u003EMingxuan Yao\u003C\/strong\u003E, \u003Cstrong\u003EHaichuan Xu\u003C\/strong\u003E, and \u003Cstrong\u003ERunze Zhang\u003C\/strong\u003E, post-doctorate scholars \u003Cstrong\u003EJeman Park\u003C\/strong\u003E, and \u003Cstrong\u003EAmit Kumar Sikder\u003C\/strong\u003E, as well as Associate Professor \u003Cstrong\u003EBrendan Saltaformaggio\u003C\/strong\u003E.\u003C\/p\u003E\u003C\/div\u003E\u003C\/div\u003E","summary":"","format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cdiv\u003E\u003Cdiv\u003E\u003Cdiv\u003E\u003Cdiv\u003E\u003Cdiv\u003E\u003Cdiv\u003E\u003Cp\u003EResearchers have developed a technique to identify the origins of proprietary \u201cblack-box\u201d AI models, even when their internal structure and training data are hidden. Because many commercial AI systems cannot be externally inspected, it is difficult to detect security vulnerabilities, intellectual property theft, licensing violations, or trace a model\u2019s lineage. The new approach enables researchers to attribute models, determine whether one was derived from another, and identify potential misuse of protected data. By improving transparency and enabling verification of model provenance, the work strengthens accountability and trust in AI systems.\u003C\/p\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/div\u003E\u003C\/div\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Researchers have developed a technique to identify the origins of proprietary \u201cblack-box\u201d AI models, even when their internal structure and training data are hidden."}],"uid":"36253","created_gmt":"2026-02-25 17:33:20","changed_gmt":"2026-03-20 12:52:42","author":"John Popham","boilerplate_text":"","field_publication":"","field_article_url":"","location":"Atlanta, GA","dateline":{"date":"2026-02-25T00:00:00-05:00","iso_date":"2026-02-25T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"hg_media":{"679429":{"id":"679429","type":"image","title":"Is-this-your-AI.jpg","body":null,"created":"1772040810","gmt_created":"2026-02-25 17:33:30","changed":"1772040810","gmt_changed":"2026-02-25 17:33:30","alt":"A graphic showing an AI model in an outstretched hand. ","file":{"fid":"263592","name":"Is-this-your-AI.jpg","image_path":"\/sites\/default\/files\/2026\/02\/25\/Is-this-your-AI.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/2026\/02\/25\/Is-this-your-AI.jpg","mime":"image\/jpeg","size":1346270,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/2026\/02\/25\/Is-this-your-AI.jpg?itok=ehbGALRW"}}},"media_ids":["679429"],"related_links":[{"url":"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2026-s1628-paper.pdf","title":"Read the Paper"}],"groups":[{"id":"47223","name":"College of Computing"},{"id":"1188","name":"Research Horizons"},{"id":"660367","name":"School of Cybersecurity and Privacy"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"},{"id":"135","name":"Research"}],"keywords":[{"id":"2835","name":"ai"},{"id":"193860","name":"Artifical Intelligence"},{"id":"192863","name":"go-ai"},{"id":"365","name":"Research"},{"id":"187915","name":"go-researchnews"}],"core_research_areas":[{"id":"193655","name":"Artificial Intelligence at Georgia Tech"},{"id":"145171","name":"Cybersecurity"}],"news_room_topics":[{"id":"71881","name":"Science and Technology"}],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003EJohn Popham\u003C\/p\u003E\u003Cp\u003ECommunications Officer II\u0026nbsp;School of Cybersecurity and Privacy\u0026nbsp;\u003C\/p\u003E","format":"limited_html"}],"email":["jpopham3@gatech.edu"],"slides":[],"orientation":[],"userdata":""}},"688223":{"#nid":"688223","#data":{"type":"news","title":"Department of Energy Award to Power Nuclear Research With Machine Learning","body":[{"value":"\u003Cp\u003EThe future of clean energy depends on algorithms as much as it does atoms.\u003C\/p\u003E\u003Cp\u003EGeorgia Tech\u2019s\u0026nbsp;\u003Ca href=\u0022https:\/\/cse.gatech.edu\/people\/qi-tang\u0022\u003E\u003Cstrong\u003EQi Tang\u003C\/strong\u003E\u003C\/a\u003E is building machine learning (ML) models to accelerate nuclear fusion research, making it more affordable and more accurate. Backed by a grant from the U.S. Department of Energy (DOE), Tang\u2019s work brings clean, sustainable energy closer to reality.\u003C\/p\u003E\u003Cp\u003ETang has received an\u0026nbsp;\u003Ca href=\u0022https:\/\/science.osti.gov\/early-career\u0022\u003E\u003Cstrong\u003EEarly Career Research Program (ECRP) award\u003C\/strong\u003E\u003C\/a\u003E from the DOE Office of Science. The grant supports Tang with $875,000 disbursed over five years to craft ML and data processing tools that help scientists analyze massive datasets from nuclear experiments and simulations.\u003C\/p\u003E\u003Cp\u003ETang is the first faculty member from Georgia Tech\u2019s College of Computing and School of Computational Science and Engineering (CSE) to receive the ECRP. He is the seventh Georgia Tech researcher to earn the award and the only GT awardee among this year\u2019s 99 recipients.\u003C\/p\u003E\u003Cp\u003EMore than a milestone, the award reflects a shift in how nuclear research is done. Today, progress depends on computing and data science as much as on physics and engineering.\u003C\/p\u003E\u003Cp\u003E\u201cI am honored and excited to receive the ECRP award through DOE\u2019s Advanced Scientific Computing Research program, an organization I care about deeply,\u201d said Tang, an assistant professor in the School of CSE.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cI am grateful to my former colleagues at Los Alamos National Laboratory and collaborators at other national laboratories, including Lawrence Livermore, Sandia, and Argonne. I am also thankful for my Ph.D. students at Georgia Tech, whose dedication and creativity make this award possible.\u201d\u003C\/p\u003E\u003Cp\u003E[Related:\u0026nbsp;\u003Ca href=\u0022https:\/\/www.cc.gatech.edu\/news\/new-faculty-applies-high-performance-computing-scientific-machine-learning-interests-studies\u0022\u003E\u003Cstrong\u003ENew Faculty Applies High-Performance Computing, Scientific Machine Learning Interests to Studies in Plasma Physics\u003C\/strong\u003E\u003C\/a\u003E]\u003C\/p\u003E\u003Cp\u003EA problem in nuclear research is that fusion simulations are challenging to understand and use. These simulations generate enormous datasets that are too large to store, move, and analyze efficiently.\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022https:\/\/pamspublic.science.energy.gov\/WebPAMSExternal\/Interface\/Common\/ViewPublicAbstract.aspx?rv=a756f612-3409-44b8-89ea-7421bf0840e5\u0026amp;rtc=24\u0026amp;PRoleId=10\u0022\u003E\u003Cstrong\u003EIn his ECRP proposal to DOE\u003C\/strong\u003E\u003C\/a\u003E, Tang introduced new ML methods to improve the analysis and storage of particle data.\u003C\/p\u003E\u003Cp\u003ETang\u2019s approach balances shrinking data so it is easier to store and transfer while preserving the most important scientific features. His multiscale ML models are informed by physics, so the reduced data still reflects how fusion systems really behave.\u003C\/p\u003E\u003Cp\u003EWith Tang\u2019s research, scientists can run larger, more realistic fusion models and analyze results more quickly. This accelerates progress toward practical fusion energy.\u003C\/p\u003E\u003Cp\u003E\u201cIn contrast to generic black-box-type compression tools, we aim at preserving the intrinsic structures of the particle dataset during the data reduction processes,\u201d Tang said.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cTaking this approach, we can meet our goal of achieving high-fidelity preservation of critical physics with minimum loss of information.\u201d\u003C\/p\u003E\u003Cp\u003EComputing is essential in modern research because of the amount of data produced and captured from experiments and simulations. In the era of exascale supercomputers, data movement is a greater bottleneck than actual computation.\u003C\/p\u003E\u003Cp\u003EDOE operates three of the world\u2019s four exascale supercomputers. These machines can calculate one quintillion (a billion billion) operations per second.\u003C\/p\u003E\u003Cp\u003EThe exascale era began in 2022 with the launch of Frontier at Oak Ridge National Laboratory. Aurora followed in 2023 at Argonne National Laboratory. El Capitan arrived in 2024 at Lawrence Livermore National Laboratory.\u003C\/p\u003E\u003Cp\u003EWith Tang\u2019s data reduction approaches, all of DOE\u2019s supercomputers spend more time on science and less time waiting for data transfers.\u003C\/p\u003E\u003Cp\u003E\u201cQi\u2019s work in computational plasma physics and nuclear fusion modeling has been groundbreaking,\u201d said \u003Cstrong\u003EHaesun Park\u003C\/strong\u003E, Regents\u2019 Professor and Chair of the School of CSE.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cWe are proud of Qi and what this award means for him, Georgia Tech, and the Department of Energy toward leveraging computation to solve challenges in science and engineering, such as sustainable energy.\u0022\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Ch6\u003E\u003Cstrong\u003EPrevious Georgia Tech recipients of DOE Early Career Research Program awards include:\u003C\/strong\u003E\u003C\/h6\u003E\u003Cp\u003E\u003Ca href=\u0022https:\/\/www.gatech.edu\/news\/2024\/09\/26\/doe-recognizes-georgia-tech-researchers-prestigious-early-career-awards\u0022\u003E\u003Cstrong\u003EItamar Kimchi\u003C\/strong\u003E\u003C\/a\u003E, assistant professor, School of Physics\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022https:\/\/www.gatech.edu\/news\/2024\/09\/26\/doe-recognizes-georgia-tech-researchers-prestigious-early-career-awards\u0022\u003E\u003Cstrong\u003ESourabh Saha\u003C\/strong\u003E\u003C\/a\u003E, assistant professor, George W. Woodruff School of Mechanical Engineering\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022https:\/\/cos.gatech.edu\/news\/wenjing-liao-awarded-doe-early-career-award-model-simplification-deep-learning\u0022\u003E\u003Cstrong\u003EWenjing Lao\u003C\/strong\u003E\u003C\/a\u003E, associate professor, School of Mathematics\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022https:\/\/chbe.gatech.edu\/news\/2018\/06\/professor-lively-receives-does-early-career-award\u0022\u003E\u003Cstrong\u003ERyan Lively\u003C\/strong\u003E\u003C\/a\u003E, Thomas C. DeLoach Professor, School of Chemical \u0026amp; Biomolecular Engineering\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022https:\/\/www.mse.gatech.edu\/people\/josh-kacher\u0022\u003E\u003Cstrong\u003EJosh Kacher\u003C\/strong\u003E\u003C\/a\u003E, associate professor, School of Materials Science and Engineering\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022https:\/\/khabar.com\/community-newsmakers\/devesh-ranjan-receives-early-career-award-from-u-s-department-of-energy\/\u0022\u003E\u003Cstrong\u003EDevesh Ranjan\u003C\/strong\u003E\u003C\/a\u003E, Eugene C. Gwaltney Jr. School Chair and professor, Woodruff School of Mechanical Engineering\u003C\/p\u003E","summary":"","format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EGeorgia Tech\u2019s\u0026nbsp;\u003Ca href=\u0022https:\/\/cse.gatech.edu\/people\/qi-tang\u0022\u003EQi Tang\u003C\/a\u003E is building machine learning (ML) models to accelerate nuclear fusion research, making it more affordable and more accurate. Backed by a grant from the U.S. Department of Energy (DOE), Tang\u2019s work brings clean, sustainable energy closer to reality.\u003C\/p\u003E\u003Cp\u003ETang has received an\u0026nbsp;\u003Ca href=\u0022https:\/\/science.osti.gov\/early-career\u0022\u003EEarly Career Research Program (ECRP) award\u003C\/a\u003E from the DOE Office of Science. The grant supports Tang with $875,000 disbursed over five years to craft ML and data processing tools that help scientists analyze massive datasets from nuclear experiments and simulations.\u003C\/p\u003E\u003Cp\u003ETang is the first faculty member from Georgia Tech\u2019s College of Computing and School of Computational Science and Engineering (CSE) to receive the ECRP. He is the seventh Georgia Tech researcher to earn the award and the only GT awardee among this year\u2019s 99 recipients.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Georgia Tech\u0027s Qi Tang has received an Early Career Research Program award from the Department of Energy\u0027s Office of Science. The $875,000 grant supports Tang for five years to craft ML tools that analyze data from nuclear experiments and simulations. "}],"uid":"36319","created_gmt":"2026-02-12 15:11:55","changed_gmt":"2026-03-20 12:52:31","author":"Bryant Wine","boilerplate_text":"","field_publication":"","field_article_url":"","location":"Atlanta, GA","dateline":{"date":"2026-02-12T00:00:00-05:00","iso_date":"2026-02-12T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"hg_media":{"679267":{"id":"679267","type":"image","title":"Qi-TangStory-Cover.jpg","body":null,"created":"1770909124","gmt_created":"2026-02-12 15:12:04","changed":"1770909124","gmt_changed":"2026-02-12 15:12:04","alt":"DOE ECRP Qi Tang","file":{"fid":"263400","name":"Qi-TangStory-Cover.jpg","image_path":"\/sites\/default\/files\/2026\/02\/12\/Qi-TangStory-Cover.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/2026\/02\/12\/Qi-TangStory-Cover.jpg","mime":"image\/jpeg","size":125283,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/2026\/02\/12\/Qi-TangStory-Cover.jpg?itok=mPLUykJZ"}}},"media_ids":["679267"],"related_links":[{"url":"https:\/\/www.cc.gatech.edu\/news\/department-energy-award-power-nuclear-research-machine-learning","title":"Department of Energy Award to Power Nuclear Research with Machine Learning"}],"groups":[{"id":"47223","name":"College of Computing"},{"id":"1188","name":"Research Horizons"},{"id":"50877","name":"School of Computational Science and Engineering"}],"categories":[{"id":"194606","name":"Artificial Intelligence"},{"id":"153","name":"Computer Science\/Information Technology and Security"},{"id":"144","name":"Energy"},{"id":"135","name":"Research"}],"keywords":[{"id":"654","name":"College of Computing"},{"id":"166983","name":"School of Computational Science and Engineering"},{"id":"9153","name":"Research Horizons"},{"id":"187915","name":"go-researchnews"},{"id":"10199","name":"Daily Digest"},{"id":"181991","name":"Georgia Tech News Center"},{"id":"9167","name":"machine learning"},{"id":"2556","name":"artificial intelligence"},{"id":"187812","name":"artificial intelligence (AI)"},{"id":"663","name":"Department of Energy"}],"core_research_areas":[{"id":"193655","name":"Artificial Intelligence at Georgia Tech"},{"id":"39431","name":"Data Engineering and Science"},{"id":"39531","name":"Energy and Sustainable Infrastructure"}],"news_room_topics":[{"id":"71871","name":"Campus and Community"}],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003EBryant Wine, Communications Officer\u003Cbr\u003E\u003Ca href=\u0022mailto:bryant.wine@cc.gatech.edu\u0022\u003Ebryant.wine@cc.gatech.edu\u003C\/a\u003E\u003C\/p\u003E","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}},"688916":{"#nid":"688916","#data":{"type":"news","title":" Undergrads Earn National Recognition for Computing Research","body":[{"value":"\u003Cp\u003ETwo Georgia Tech undergraduates are being recognized for their contributions to computing research.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003ERyan\u0026nbsp;Punamiya\u003C\/strong\u003E\u0026nbsp;(CS 2025)\u0026nbsp;and \u003Cstrong\u003ESummer Abramson\u003C\/strong\u003E, a third-year\u0026nbsp;computational\u0026nbsp;media student, have been honored by the Computing Research Association (CRA) through its 2025\u20132026 \u003Ca href=\u0022https:\/\/cra.org\/about\/awards\/outstanding-undergraduate-researcher-award\/\u0022\u003E\u003Cstrong\u003EOutstanding Undergraduate Researcher Award (URA) program.\u0026nbsp;\u003C\/strong\u003E\u003C\/a\u003E\u003C\/p\u003E\u003Cp\u003EPunamiya\u0026nbsp;was named a runner-up for the prestigious award, while Abramson received an honorable mention among hundreds of applicants from universities across North America.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EThe\u0026nbsp;\u003Ca href=\u0022https:\/\/cra.org\/about\/awards\/outstanding-undergraduate-researcher-award\/\u0022\u003E\u003Cstrong\u003ECRA Outstanding Undergraduate Researcher Award program\u003C\/strong\u003E\u003C\/a\u003E\u0026nbsp;recognized eight awardees in 2026, along with eight runners-up, nine finalists, and over 200 honorable mentions from thousands of applications.\u0026nbsp;\u0026nbsp;\u003C\/p\u003E\u003Ch4\u003E\u003Cstrong\u003EAdvancing\u0026nbsp;Robotics Research\u0026nbsp;\u003C\/strong\u003E\u003C\/h4\u003E\u003Cp\u003EPunamiya\u0026nbsp;knew early on that he\u0026nbsp;didn\u2019t\u0026nbsp;want to wait until starting his Ph.D. to do meaningful and impactful robotics research.\u0026nbsp;\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EPunamiya\u0026nbsp;joined the Robot Learning and Reasoning Lab (RL2) directed by Assistant Professor\u0026nbsp;Danfei\u0026nbsp;Xu. While there, he contributed to the lab\u2019s Meta-sponsored\u0026nbsp;\u003Ca href=\u0022https:\/\/www.cc.gatech.edu\/news\/new-algorithm-teaches-robots-through-human-perspective\u0022\u003E\u003Cstrong\u003EEgoMimic\u003C\/strong\u003E\u003C\/a\u003E\u0026nbsp;project, which trains robots to perform human tasks using recordings captured by Meta\u2019s Project Aria research glasses.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EPunamiya\u0026nbsp;is\u0026nbsp;also the first author of a paper accepted to the 2025 Conference on Neural Information Processing Systems (NeurIPS),\u0026nbsp;one of the world\u2019s most prestigious artificial intelligence (AI) and machine learning conferences.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cRyan is the strongest undergraduate I\u0027ve worked with,\u201d Xu said, \u201cincluding students who went on to Stanford, Berkeley, and leadership roles in major tech companies.\u0026nbsp;He\u2019s\u0026nbsp;already\u0026nbsp;operating\u0026nbsp;at the level of a strong\u0026nbsp;third-year Ph.D.\u0026nbsp;student.\u201d\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EPunamiya\u0026nbsp;said it was a challenge to balance his undergraduate coursework with his research in Xu\u2019s lab.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cYou get out how much you put in,\u201d\u0026nbsp;he\u0026nbsp;said.\u0026nbsp;\u201cI built my class schedule to give myself as much time to do research as possible. It also boils down to having the right research mentors.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201c(Xu) never saw me as an\u0026nbsp;undergrad\u0026nbsp;who\u2019s\u0026nbsp;just there to do grunt work. I was\u0026nbsp;fortunate\u0026nbsp;he saw my curiosity and cultivated me as a researcher.\u0026nbsp;That\u2019s\u0026nbsp;really how\u0026nbsp;you get more\u0026nbsp;undergrads\u0026nbsp;motivated to research \u2014 giving them the chance to be independent and explore ideas of their own.\u201d\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EPunamiya\u0026nbsp;said his work in Xu\u2019s lab has already helped him identify the research areas he wants to focus on as he considers his next steps. He will continue developing generalized training models for robots using human data so they can perform tasks instantly upon deployment.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u0022The amount of data needed to train a robot is difficult to obtain even for top industry companies,\u0022 he said. \u0022We have embodied robot data available in billions of humans. With the advent of extended reality devices, we can get a scalable source of diverse interactions within environments.\u0022\u003C\/p\u003E\u003Cp\u003EPunamiya\u0026nbsp;graduated in December and recently started an internship at Nvidia. He mentioned he has been accepted into several Ph.D. programs, including Georgia Tech, and he is choosing where to continue his research.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cIt\u2019s the first time my research has been\u0026nbsp;acknowledged\u0026nbsp;externally by the robotics community,\u201d he said. \u201cIt\u2019s\u0026nbsp;good to\u0026nbsp;know\u0026nbsp;the problem\u0026nbsp;I\u2019m\u0026nbsp;working on is important, and that motivates me. Robotics is an exciting field. We are doing things now that two years ago were difficult to do.\u201d\u0026nbsp;\u003C\/p\u003E\u003Ch4\u003E\u003Cstrong\u003EResearching Inclusion in Computing Education\u0026nbsp;\u003C\/strong\u003E\u003C\/h4\u003E\u003Cp\u003EAbramson conducts research in the People-Agents Research for Computing Education (PARCE) Laboratory under the mentorship of\u0026nbsp;Pedro Guillermo Feij\u00f3o-Garc\u00eda, a faculty member\u0026nbsp;in the School of Computing Instruction. He and the Associate Dean for Undergraduate Education, Olufisayo Omojokun, nominated her for the award.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EHer work focuses on the intersection of computing education and human-AI interaction, where she\u2019s been exploring ways to create more equitable technology.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cThis is such a huge milestone, and I couldn\u0027t be prouder of Summer,\u201d Feij\u00f3o-Garc\u00eda said. \u201cMentoring her for almost two years has been an amazing experience.\u201d\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EAbramson has received the Georgia Tech President\u2019s Undergraduate Research Award (PURA) twice, which supports her research exploring how user-centered design curricula can help address attrition among women in computing.\u003C\/p\u003E\u003Cp\u003E\u201cI\u2019ve had the amazing opportunity to pursue research at the intersection of student identity, community belonging, and how we can build tools that support our diverse student population,\u201d Abramson said.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cDr. Pedro and I have a goal to build community through a human-first approach, and I could not be more grateful for his support and guidance in my own journey. The CRA highlights the best of what the computing discipline has to offer, and I am incredibly honored for our work to be recognized.\u201d\u003C\/p\u003E\u003Cp\u003EAbramson will spend the summer researching how user-centered design curricula can help promote confidence, belonging, and retention for women in computing.\u003C\/p\u003E\u003Cp\u003ENominees for the PURA program were recognized for contributing to multiple research projects, authoring or coauthoring papers, presenting at conferences, developing widely used software artifacts, and supporting their communities as teaching assistants, tutors, and mentors.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Cem\u003ESchool of Computing Instruction Communications Officer Emily Smith contributed to this story.\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cem\u003EMain Photo: Ryan Punamiya works with a robot during the 2025 International Conference on Robotics and Automation in Atlanta. Photo by Terence Rushin\/College of Computing.\u003C\/em\u003E\u003C\/p\u003E","summary":"","format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003E\u003Cstrong\u003ERyan\u0026nbsp;Punamiya\u003C\/strong\u003E\u0026nbsp;(CS 2025)\u0026nbsp;and \u003Cstrong\u003ESummer Abramson\u003C\/strong\u003E, a third-year\u0026nbsp;computational\u0026nbsp;media student, have been honored by the Computing Research Association (CRA) through its 2025\u20132026 \u003Ca href=\u0022https:\/\/cra.org\/about\/awards\/outstanding-undergraduate-researcher-award\/\u0022\u003E\u003Cstrong\u003EOutstanding Undergraduate Researcher Award (URA) program.\u0026nbsp;\u003C\/strong\u003E\u003C\/a\u003E\u003C\/p\u003E\u003Cp\u003EPunamiya\u0026nbsp;was named a runner-up for the prestigious award, while Abramson received an honorable mention among hundreds of applicants from universities across North America.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EThe\u0026nbsp;\u003Ca href=\u0022https:\/\/cra.org\/about\/awards\/outstanding-undergraduate-researcher-award\/\u0022\u003E\u003Cstrong\u003ECRA Outstanding Undergraduate Researcher Award program\u003C\/strong\u003E\u003C\/a\u003E\u0026nbsp;recognized eight awardees in 2026, along with eight runners-up, nine finalists, and over 200 honorable mentions from thousands of applications.\u0026nbsp;\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Ryan Punamiya (CS 2025) and Summer Abramson, a third-year computational media student, have been honored by the Computing Research Association (CRA) through its 2025\u20132026 Outstanding Undergraduate Researcher Award (URA) program. "}],"uid":"36530","created_gmt":"2026-03-13 14:57:26","changed_gmt":"2026-03-20 12:51:21","author":"Nathan Deen","boilerplate_text":"","field_publication":"","field_article_url":"","location":"Atlanta, GA","dateline":{"date":"2026-03-13T00:00:00-04:00","iso_date":"2026-03-13T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"679613":{"id":"679613","type":"image","title":"ICRA-2025_P9A0421-Enhanced-NR.jpg","body":null,"created":"1773413856","gmt_created":"2026-03-13 14:57:36","changed":"1773413856","gmt_changed":"2026-03-13 14:57:36","alt":"Ryan Punamiya","file":{"fid":"263795","name":"ICRA-2025_P9A0421-Enhanced-NR.jpg","image_path":"\/sites\/default\/files\/2026\/03\/13\/ICRA-2025_P9A0421-Enhanced-NR.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/2026\/03\/13\/ICRA-2025_P9A0421-Enhanced-NR.jpg","mime":"image\/jpeg","size":133995,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/2026\/03\/13\/ICRA-2025_P9A0421-Enhanced-NR.jpg?itok=r8p0C5IW"}}},"media_ids":["679613"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"1188","name":"Research Horizons"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"},{"id":"135","name":"Research"},{"id":"193158","name":"Student Competition Winners (academic, innovation, and research)"},{"id":"193157","name":"Student Honors and Achievements"},{"id":"8862","name":"Student Research"}],"keywords":[{"id":"187915","name":"go-researchnews"},{"id":"9153","name":"Research Horizons"},{"id":"101271","name":"Computing Research Association"},{"id":"22861","name":"undergraduate research awards"}],"core_research_areas":[],"news_room_topics":[{"id":"71871","name":"Campus and Community"}],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"687708":{"#nid":"687708","#data":{"type":"news","title":" Researchers Warn AI \u2018Blind Spot\u2019 Could Allow Attackers to Hijack Self-Driving Vehicles","body":[{"value":"\u003Cdiv\u003E\u003Cdiv\u003E\u003Cp\u003EA newly discovered vulnerability could allow cybercriminals to silently hijack the artificial intelligence (AI) systems in self-driving cars, raising concerns about the security of autonomous systems increasingly used on public roads.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;Georgia Tech cybersecurity researchers discovered the vulnerability, dubbed VillainNet, and found it can remain dormant in a self-driving vehicle\u2019s AI system until triggered by specific conditions.\u003C\/p\u003E\u003Cp\u003EOnce triggered, VillainNet is almost certain to succeed, giving attackers control of the targeted vehicle.\u003C\/p\u003E\u003Cp\u003EThe research finds that attackers could program almost any action within a self-driving vehicle\u2019s AI super network to trigger VillainNet. In one possible scenario, it could be triggered when a self-driving taxi\u2019s AI responds to rainfall and changing road conditions.\u003C\/p\u003E\u003Cp\u003EOnce in control, hackers could hold the passengers hostage and threaten to crash the taxi.\u003C\/p\u003E\u003Cp\u003EThe researchers discovered this new backdoor attack threat in the AI super networks that power autonomous driving systems.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cSuper networks are designed to be the Swiss Army knife of AI, swapping out tools, or in this case sub networks, as needed for the task at hand,\u0022 said \u003Ca href=\u0022https:\/\/davidoygenblik.github.io\/\u0022\u003E\u003Cstrong\u003EDavid Oygenblik\u003C\/strong\u003E\u003C\/a\u003E, Ph.D. student at Georgia Tech and the lead researcher on the project.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u0022However, we found that an adversary can exploit this by attacking just one of those tiny tools. The attack remains completely dormant until that specific subnetwork is used, effectively hiding across billions of other benign configurations.\u0022\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EThis backdoor attack is nearly guaranteed to work, according to Oygenblik. This blind spot is nearly undetectable with current tools and can impact any autonomous vehicle that runs on AI. It can also be hidden at any stage of development and include billions of scenarios.\u003C\/p\u003E\u003Cp\u003E\u201cWith VillainNet, the attacker forces defenders to find a single needle in a haystack that can be as large as 10 quintillion straws,\u0022 said Oygenblik.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u0022Our work is a call to action for the security community. As AI systems become more complex and adaptive, we must develop new defenses capable of addressing these novel, hyper-targeted threats.\u0022\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EThe hypothetical fix to the problem was to add security measures to the super networks. These networks contain billions of specialized subnetworks that can be activated on the fly, but Oygenblik wanted to see what would happen if he attacked a single subnetwork tool.\u003C\/p\u003E\u003Cp\u003EIn experiments, the VillainNet attack proved highly effective. It achieved a 99% success rate when activated while remaining invisible throughout the AI system.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EThe research also shows that detecting a VillainNet backdoor would require 66x more computing power and time to verify the AI system is safe. This challenge dramatically expands the search space for attack detection and is not feasible, according to the researchers.\u003C\/p\u003E\u003Cp\u003EThe project was \u003Ca href=\u0022https:\/\/www.youtube.com\/watch?v=H1fyPD8vWDo\u0022\u003Epresented\u003C\/a\u003E at the ACM Conference on Computer and Communications Security (CCS) in October 2025. The paper, \u003Ca href=\u0022https:\/\/davidoygenblik.github.io\/pdfs\/VNET.pdf\u0022\u003E\u003Cem\u003EVillainNet: Targeted Poisoning Attacks Against SuperNets Along the Accuracy-Latency Pareto Frontier\u003C\/em\u003E\u003C\/a\u003E, was co-authored by Oygenblik, master\u0027s students \u003Cstrong\u003EAbhinav Vemulapalli \u003C\/strong\u003Eand \u003Cstrong\u003EAnimesh Agrawal\u003C\/strong\u003E, Ph.D. student \u003Cstrong\u003EDebopam Sanyal\u003C\/strong\u003E, Associate Professor \u003Cstrong\u003EAlexey Tumanov\u003C\/strong\u003E, and Associate Professor \u003Cstrong\u003EBrendan Saltaformaggio\u003C\/strong\u003E.\u0026nbsp;\u003C\/p\u003E\u003C\/div\u003E\u003C\/div\u003E","summary":"","format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EA newly discovered vulnerability could allow cybercriminals to silently hijack the artificial intelligence (AI) systems in self-driving cars, raising concerns about the security of autonomous systems increasingly used on public roads.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;Georgia Tech cybersecurity researchers discovered the vulnerability, dubbed VillainNet, and found it can remain dormant in a self-driving vehicle\u2019s AI system until triggered by specific conditions.\u003C\/p\u003E\u003Cp\u003EOnce triggered, VillainNet is almost certain to succeed, giving attackers control of the targeted vehicle.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"A newly discovered vulnerability could allow cybercriminals to silently hijack the artificial intelligence (AI) systems in self-driving cars, raising concerns about the security of autonomous systems increasingly used on public roads."}],"uid":"36253","created_gmt":"2026-01-27 14:51:58","changed_gmt":"2026-02-19 17:34:58","author":"John Popham","boilerplate_text":"","field_publication":"","field_article_url":"","location":"Atlanta, GA","dateline":{"date":"2026-01-27T00:00:00-05:00","iso_date":"2026-01-27T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"hg_media":{"679102":{"id":"679102","type":"image","title":"Car-Blind-Spot.jpeg","body":null,"created":"1769525530","gmt_created":"2026-01-27 14:52:10","changed":"1769525530","gmt_changed":"2026-01-27 14:52:10","alt":"A car\u0027s side view mirror with a alert in the center of the mirror. ","file":{"fid":"263221","name":"Car-Blind-Spot.jpeg","image_path":"\/sites\/default\/files\/2026\/01\/27\/Car-Blind-Spot.jpeg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/2026\/01\/27\/Car-Blind-Spot.jpeg","mime":"image\/jpeg","size":467609,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/2026\/01\/27\/Car-Blind-Spot.jpeg?itok=6bYsIEkx"}}},"media_ids":["679102"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"1188","name":"Research Horizons"},{"id":"660367","name":"School of Cybersecurity and Privacy"}],"categories":[{"id":"194606","name":"Artificial Intelligence"},{"id":"153","name":"Computer Science\/Information Technology and Security"},{"id":"145","name":"Engineering"},{"id":"135","name":"Research"}],"keywords":[{"id":"182941","name":"cc-research; ic-cybersecurity; ic-hcc"},{"id":"175307","name":"Brendan Saltaformaggio"},{"id":"365","name":"Research"},{"id":"192863","name":"go-ai"},{"id":"188667","name":"go-"}],"core_research_areas":[{"id":"193655","name":"Artificial Intelligence at Georgia Tech"},{"id":"145171","name":"Cybersecurity"}],"news_room_topics":[{"id":"71881","name":"Science and Technology"}],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003E\u003Ca href=\u0022mailto:jpopham3@gatech.edu\u0022\u003EJohn Popham\u003C\/a\u003E\u003Cbr\u003ECommunications Officer II\u0026nbsp;\u003Cbr\u003ESchool of Cybersecurity and Privacy\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}},"687813":{"#nid":"687813","#data":{"type":"news","title":"From Fusion to Self-Driving Cars, High Performance Computing and AI are Everywhere in 2026","body":[{"value":"\u003Cp\u003EWhile not as highlight-reel worthy as the Winter Olympics and the World Cup, experts expect high-performance computing (HPC) to have an even bigger impact on daily life in 2026.\u003C\/p\u003E\u003Cp\u003EGeorgia Tech researchers say HPC and artificial intelligence (AI) advances this year are poised to improve how people power their homes, design safer buildings, and travel through cities.\u003C\/p\u003E\u003Cp\u003EAccording to\u0026nbsp;\u003Ca href=\u0022https:\/\/tangqi.github.io\/\u0022\u003EQi Tang\u003C\/a\u003E, scientists will take progressive steps toward cleaner, sustainable energy through nuclear fusion in 2026.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cI am very hopeful about the role of advanced computing and AI in making fusion a clean energy source,\u201d said Tang, an assistant professor in the\u0026nbsp;\u003Ca href=\u0022https:\/\/cse.gatech.edu\/\u0022\u003ESchool of Computational Science and Engineering (CSE)\u003C\/a\u003E.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cFusion systems involve many interconnected processes happening across different scales. Modern simulations, combined with data-driven methods, allow us to bring these pieces together into a unified picture.\u201d\u003C\/p\u003E\u003Cp\u003ETang\u2019s research connects HPC and machine learning with fusion energy and plasma physics. This year, Tang is continuing work on large-scale nuclear fusion models.\u003C\/p\u003E\u003Cp\u003EOnly a few experimental fusion reactors exist worldwide compared to more than 400 nuclear fission reactors. Tang\u2019s work supports a broader effort to turn fusion from a promising idea into a practical energy source.\u003C\/p\u003E\u003Cp\u003ENuclear fusion occurs in plasma, the fourth state of matter, where gas is heated to millions of degrees. In this extreme state, electrons are stripped from atoms, creating a hot soup of fast-moving ions and free electrons. In plasma, hydrogen atoms overcome their natural electrical repulsion, collide, and fuse together. This releases energy that can power cities and homes.\u003C\/p\u003E\u003Cp\u003EComputers interpret extreme temperatures, densities, pressures, and plasma particle motion as massive datasets. Tang works to assimilate these data types from computer models and real-world experiments.\u003C\/p\u003E\u003Cp\u003ETo do this, he and other researchers rely on machine learning approaches to analyze data across models and experiments more quickly and to produce more accurate predictions. Over time, this will allow scientists to test and improve fusion reactor designs toward commercial use.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EBeyond energy and nuclear engineering,\u0026nbsp;\u003Ca href=\u0022https:\/\/pk.linkedin.com\/in\/umarkhayaz\u0022\u003EUmar Khayaz\u003C\/a\u003E sees broader impacts for HPC in 2026.\u003C\/p\u003E\u003Cp\u003E\u201cHPC is the need of the day in every field of engineering sciences, physics, biology, and economics,\u201d said Khayaz, a CSE Ph.D. student in the\u0026nbsp;\u003Ca href=\u0022https:\/\/ce.gatech.edu\/\u0022\u003ESchool of Civil and Environmental Engineering\u003C\/a\u003E.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cHPC is important enough to say that we need to employ resources to also solve social problems.\u201d\u003C\/p\u003E\u003Cp\u003EKhayaz studies dynamic fracture and phase-field modeling. These areas explore how materials break under sudden, rapid loads.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003ELike nuclear fusion, Khayaz says dynamic fracture problems are complex and data-intensive. In 2026, he expects to see more computing resources and computational capabilities devoted to understanding these problems and other emerging civil engineering challenges.\u003C\/p\u003E\u003Cp\u003ECSE Ph.D. student\u0026nbsp;\u003Ca href=\u0022https:\/\/ahren09.github.io\/\u0022\u003EYiqiao (Ahren) Jin\u003C\/a\u003E sees a similar relationship between infrastructure and self-driving vehicles. He believes AI will innovate this area in 2026.\u003C\/p\u003E\u003Cp\u003EAt Georgia Tech, Jin develops efficient multimodal AI systems. An autonomous vehicle is a multimodal system that uses camera video, laser sensors, language instructions, and other inputs to navigate city streets under changing scenarios like traffic and weather patterns.\u003C\/p\u003E\u003Cp\u003EJin says multimodal research will move beyond performance benchmarks this year. This shift will lead to computer systems that can reason despite uncertainty and explain their decisions. In result, engineers will redefine how they evaluate and deploy autonomous systems in safety-critical settings.\u003C\/p\u003E\u003Cp\u003E\u201cMany foundational problems in perception, multimodal reasoning, and agent coordination are being actively addressed in 2026. These advances enable a transition from isolated autonomous systems to safer, coordinated autonomous vehicle fleets,\u201d Jin said.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cAs these systems scale, they have the potential to fundamentally improve transportation safety and efficiency.\u201d\u003C\/p\u003E","summary":"","format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EWhile not as highlight-reel worthy as the Winter Olympics and the World Cup, experts expect high-performance computing (HPC) to have an even bigger impact on daily life in 2026.\u003C\/p\u003E\u003Cp\u003EGeorgia Tech researchers say HPC and artificial intelligence (AI) advances this year are poised to improve how people power their homes, design safer buildings, and travel through cities.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Georgia Tech researchers say HPC and artificial intelligence (AI) advances this year are poised to improve how people power their homes, design safer buildings, and travel through cities."}],"uid":"36319","created_gmt":"2026-01-29 14:30:57","changed_gmt":"2026-02-19 15:53:29","author":"Bryant Wine","boilerplate_text":"","field_publication":"","field_article_url":"","location":"Atlanta, GA","dateline":{"date":"2026-01-29T00:00:00-05:00","iso_date":"2026-01-29T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"hg_media":{"679125":{"id":"679125","type":"image","title":"CSE-in-2026_2.jpg","body":null,"created":"1769704332","gmt_created":"2026-01-29 16:32:12","changed":"1769704332","gmt_changed":"2026-01-29 16:32:12","alt":"CSE in 2026","file":{"fid":"263246","name":"CSE-in-2026_2.jpg","image_path":"\/sites\/default\/files\/2026\/01\/29\/CSE-in-2026_2.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/2026\/01\/29\/CSE-in-2026_2.jpg","mime":"image\/jpeg","size":348721,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/2026\/01\/29\/CSE-in-2026_2.jpg?itok=JDq9Sr_p"}}},"media_ids":["679125"],"related_links":[{"url":"https:\/\/www.cc.gatech.edu\/news\/fusion-self-driving-cars-high-performance-computing-and-ai-are-everywhere-2026","title":"From Fusion to Self-Driving Cars, High Performance Computing and AI are Everywhere in 2026"}],"groups":[{"id":"47223","name":"College of Computing"},{"id":"1188","name":"Research Horizons"},{"id":"50877","name":"School of Computational Science and Engineering"}],"categories":[{"id":"194606","name":"Artificial Intelligence"},{"id":"142","name":"City Planning, Transportation, and Urban Growth"},{"id":"153","name":"Computer Science\/Information Technology and Security"},{"id":"144","name":"Energy"},{"id":"135","name":"Research"},{"id":"8862","name":"Student Research"}],"keywords":[{"id":"654","name":"College of Computing"},{"id":"172288","name":"School of Computational Science Engineering"},{"id":"167864","name":"School of Civil and Environmental Engineering"},{"id":"594","name":"college of engineering"},{"id":"9153","name":"Research Horizons"},{"id":"187915","name":"go-researchnews"},{"id":"10199","name":"Daily Digest"},{"id":"181991","name":"Georgia Tech News Center"},{"id":"15030","name":"high-performance computing"},{"id":"187812","name":"artificial intelligence (AI)"},{"id":"9167","name":"machine learning"},{"id":"192863","name":"go-ai"},{"id":"194384","name":"Tech AI"}],"core_research_areas":[{"id":"193655","name":"Artificial Intelligence at Georgia Tech"},{"id":"39431","name":"Data Engineering and Science"},{"id":"39531","name":"Energy and Sustainable Infrastructure"},{"id":"39541","name":"Systems"}],"news_room_topics":[{"id":"71881","name":"Science and Technology"}],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003EBryant Wine, Communications Officer\u003Cbr\u003E\u003Ca href=\u0022mailto:bryant.wine@cc.gatech.edu\u0022\u003Ebryant.wine@cc.gatech.edu\u003C\/a\u003E\u003C\/p\u003E","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}},"687892":{"#nid":"687892","#data":{"type":"news","title":"Georgia Tech Computing Hosts Venture Capital Summit to Push Research Beyond the Lab","body":[{"value":"\u003Cp\u003EThe College of Computing is forging new relationships with Atlanta\u2019s venture capital community to advance entrepreneurial opportunities for students.\u003C\/p\u003E\u003Cp\u003ENearly two dozen venture capital (VC) leaders based in Atlanta and the Southeast participated in a half-day summit at the College on Jan. 21.\u003C\/p\u003E\u003Cp\u003ECo-hosts Dean of Computing \u003Ca href=\u0022https:\/\/www.linkedin.com\/in\/vsarkar\/\u0022\u003E\u003Cstrong\u003EVivek Sarkar\u003C\/strong\u003E\u003C\/a\u003E and Noro-Moseley Partners General Partner\u0026nbsp;\u003Ca href=\u0022https:\/\/www.linkedin.com\/in\/alantaetle\/\u0022\u003E\u003Cstrong\u003EAlan Taetle\u003C\/strong\u003E\u003C\/a\u003E organized the invitation-only summit. Their goals were to:\u003C\/p\u003E\u003Cul\u003E\u003Cli\u003EShowcase the College\u2019s\u0026nbsp;\u003Ca href=\u0022https:\/\/www.cc.gatech.edu\/research-areas\u0022\u003E\u003Cstrong\u003Eresearch strengths\u003C\/strong\u003E\u003C\/a\u003E and\u0026nbsp;\u003Ca href=\u0022https:\/\/www.cc.gatech.edu\/entrepreneurship-gt-computing\u0022\u003E\u003Cstrong\u003Eentrepreneurial culture\u003C\/strong\u003E\u003C\/a\u003E\u003C\/li\u003E\u003Cli\u003EDeepen connections between academic innovation and startups\u003C\/li\u003E\u003Cli\u003EExplore opportunities for collaboration, commercialization, and startup growth\u003C\/li\u003E\u003C\/ul\u003E\u003Cp\u003EThe summit\u2019s guest list included founders, partners, and leaders from VC firms. Many of these firms focus on early-stage startups in SaaS, fintech, cybersecurity, and other emerging technology markets.\u003C\/p\u003E\u003Ch3\u003E\u003Cstrong\u003EResearch With Commercial Impact\u003C\/strong\u003E\u003C\/h3\u003E\u003Cp\u003ESarkar outlined the College of Computing\u2019s academic mission and research priorities during his opening remarks. He emphasized the College\u2019s role in advancing innovation in cybersecurity, artificial intelligence (AI), and other emerging research areas.\u003C\/p\u003E\u003Cp\u003E\u201cOne of the College\u2019s strategic pillars is what I call \u2018X to the power of Computing\u2019,\u201d Sarkar said. \u201cLook at any discipline or industry X to see where they\u0027re innovating and where their advances are being made, and that\u2019s where Computing meets that discipline.\u201d\u003C\/p\u003E\u003Cp\u003EAlong with remarks from the dean, the summit featured presentations highlighting Georgia Tech\u2019s entrepreneurial ecosystem and College-led research initiatives with strong commercialization potential.\u003C\/p\u003E\u003Ch3\u003E\u003Cstrong\u003EExpanding Support for Student Founders\u003C\/strong\u003E\u003C\/h3\u003E\u003Cp\u003E\u003Ca href=\u0022https:\/\/www.linkedin.com\/in\/jenniferwhitlow\/\u0022\u003E\u003Cstrong\u003EJen Whitlow\u003C\/strong\u003E\u003C\/a\u003E leads Community Partnerships at Fusen, a global platform for student founders created by Atlanta philanthropist\u0026nbsp;\u003Ca href=\u0022https:\/\/www.linkedin.com\/in\/chklaus\/\u0022\u003E\u003Cstrong\u003EChristopher W. Klaus\u003C\/strong\u003E\u003C\/a\u003E. She described Klaus\u2019s support for student entrepreneurship, including GT Computing\u2019s annual\u0026nbsp;\u003Ca href=\u0022https:\/\/www.cc.gatech.edu\/klaus-startup-challenge\u0022\u003E\u003Cstrong\u003EKlaus Startup Challenge\u003C\/strong\u003E\u003C\/a\u003E. In 2025,\u0026nbsp;\u003Ca href=\u0022https:\/\/www.cc.gatech.edu\/news\/klaus-startup-challenge-showcases-georgia-techs-rising-entrepreneurial-talent\u0022\u003E\u003Cstrong\u003EKlaus awarded five winning teams $150,000 each\u003C\/strong\u003E\u003C\/a\u003E to cover startup costs.\u003C\/p\u003E\u003Cp\u003EWhitlow also updated guests on Klaus\u2019s commitment, \u003Ca href=\u0022https:\/\/news.gatech.edu\/news\/2025\/05\/02\/tech-visionary-chris-klaus-empowers-georgia-tech-grads-launch-startups\u0022\u003Eannounced in May 2025\u003C\/a\u003E, to covering the incorporation costs for any graduating student who aspires to launch a startup.\u003C\/p\u003E\u003Cp\u003E\u201cMore than 600 graduates from last year\u2019s Spring and Fall Commencements have accepted the gift, and more than 225 recent graduates have completed their incorporation to date,\u201d Whitlow said. She added that a second cohort of Fall 2025 graduates is being processed over the next few weeks.\u003C\/p\u003E\u003Cp\u003EOffering an enterprise-level view, \u003Ca href=\u0022https:\/\/create-x.gatech.edu\/\u0022\u003E\u003Cstrong\u003ECREATE-X\u003C\/strong\u003E\u003C\/a\u003E \u003Ca href=\u0022https:\/\/www.linkedin.com\/in\/saxenar\/\u0022\u003E\u003Cstrong\u003ERahul Saxena\u003C\/strong\u003E\u003C\/a\u003E\u003Cstrong\u003E \u003C\/strong\u003Epresented recent updates to commercialization at Georgia Tech and efforts to streamline entrepreneurial processes.\u003C\/p\u003E\u003Cp\u003ESaxena emphasized the launch of\u0026nbsp;\u003Ca href=\u0022https:\/\/commercialization.gatech.edu\/velocity\u0022\u003E\u003Cstrong\u003EVelocity Startups\u003C\/strong\u003E\u003C\/a\u003E, an accelerator that provides the resources and infrastructure student startups need to bring their innovations to market.\u003C\/p\u003E\u003Ch3\u003E\u003Cstrong\u003EBuilding the Pipeline From Research to Startup\u003C\/strong\u003E\u003C\/h3\u003E\u003Cp\u003EFollowing these updates, GT Computing faculty delivered lightning-round presentations highlighting the College\u2019s research strengths in AI, cybersecurity, and high-performance computing.\u003C\/p\u003E\u003Cp\u003E\u201cThe tighter the local investing community is with Georgia Tech, the better off both are,\u201d said Taetle, who has been a member of the College\u2019s Advisory Board for more than 20 years.\u003C\/p\u003E\u003Cp\u003E\u201cIt\u2019s critical in this super-competitive world that we do everything that we can to support this fantastic university.\u201d\u003C\/p\u003E\u003Cp\u003ETaetle added that the summit was part of a broader effort to strengthen the College\u2019s entrepreneurial pipeline.\u003C\/p\u003E\u003Cp\u003E\u201cThere are some really big ideas here, which could turn into really big companies,\u201d he said. \u201cWe\u2019ve made some great strides on the commercialization front, but we still have that opportunity and challenge in front of us.\u201d\u003C\/p\u003E\u003Cp\u003EThe afternoon concluded with a discussion of next steps and engagement opportunities, led by Sarkar and \u003Ca href=\u0022https:\/\/www.linkedin.com\/in\/jzwang\/\u0022\u003E\u003Cstrong\u003EJason Zwang\u003C\/strong\u003E\u003C\/a\u003E, GT Computing\u2019s senior director of development. The discussion focused on research partnership opportunities, startup formation, and student involvement.\u003C\/p\u003E\u003Cp\u003EZwang emphasized the importance of investing in Atlanta\u2019s innovation ecosystem, citing the city\u2019s strong fundamentals and pro-growth climate for entrepreneurship.\u003C\/p\u003E\u003Cp\u003E\u201cThis gives us a unique opportunity to start working more closely with the local VC community, and it\u2019s also great for our students,\u201d Zwang said.\u003C\/p\u003E\u003Cp\u003ESarkar agreed, saying, \u201cThere\u2019s no downside for students to get involved in a startup. It might take off and be a bonanza. If not, the experience makes you a more competitive hire because of the breadth of experience you gain at a startup.\u201d\u003C\/p\u003E\u003Cp\u003ETo foster these opportunities for students, Zwang said that a key priority is to establish earlier, more intentional connections among students, startups, and investors.\u003C\/p\u003E\u003Cp\u003E\u201cThis is a pivotal moment,\u201d he said. \u201cWe can determine how to connect students with the VC and startup community earlier and ensure these investors remain involved with the College.\u201d\u003C\/p\u003E\u003Cp\u003ECollege leaders said the summit underscored Computing\u2019s commitment to fostering an entrepreneurial culture and to building lasting relationships that can help accelerate the real-world impact of its research beyond the Institute.\u003C\/p\u003E\u003Cp\u003E\u201cGeorgia Tech is a force multiplier for entrepreneurship,\u201d said Sarkar. \u201cWe\u2019re here to change the world. We want to inspire a culture of bold, big entrepreneurial thinking, and look forward to the next steps that will follow this VC summit.\u201d\u003C\/p\u003E","summary":"","format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003ENearly two dozen venture capital leaders from Atlanta and across the Southeast joined the College of Computing on Jan. 21 for a half-day VC summit focused on research, innovation, and collaboration.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"The College of Computing is working to connect student and faculty entrepreneurs with early-development startup support."}],"uid":"32045","created_gmt":"2026-02-02 15:57:16","changed_gmt":"2026-02-19 15:52:21","author":"Ben Snedeker","boilerplate_text":"","field_publication":"","field_article_url":"","location":"Atlanta, GA","dateline":{"date":"2026-02-02T00:00:00-05:00","iso_date":"2026-02-02T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"hg_media":{"679150":{"id":"679150","type":"image","title":"GT Computing 2026 Venture Capital Summit group photo","body":"\u003Cp\u003E\u003Cem\u003ETop executives from Atlanta\u0027s venture capital community participated in the College of Computing\u0027s first VC summit, held on Jan. 21. Photo by Terence Rushin\/GT Computing\u003C\/em\u003E\u003C\/p\u003E","created":"1770047844","gmt_created":"2026-02-02 15:57:24","changed":"1770047844","gmt_changed":"2026-02-02 15:57:24","alt":"Top executives from Atlanta\u0027s venture capital community participated in the College of Computing\u0027s first VC summit, held on Jan. 21.","file":{"fid":"263273","name":"Venture-Capitalists-_86A0835-copy.jpg","image_path":"\/sites\/default\/files\/2026\/02\/02\/Venture-Capitalists-_86A0835-copy.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/2026\/02\/02\/Venture-Capitalists-_86A0835-copy.jpg","mime":"image\/jpeg","size":205876,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/2026\/02\/02\/Venture-Capitalists-_86A0835-copy.jpg?itok=McAV65N9"}}},"media_ids":["679150"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"1188","name":"Research Horizons"}],"categories":[{"id":"135","name":"Research"},{"id":"133","name":"Special Events and Guest Speakers"}],"keywords":[{"id":"10199","name":"Daily Digest"},{"id":"181991","name":"Georgia Tech News Center"},{"id":"187915","name":"go-researchnews"},{"id":"137161","name":"CREATE-X"},{"id":"194105","name":"aspiring entrepreneurs"}],"core_research_areas":[{"id":"193655","name":"Artificial Intelligence at Georgia Tech"},{"id":"193658","name":"Commercialization"},{"id":"145171","name":"Cybersecurity"}],"news_room_topics":[{"id":"71871","name":"Campus and Community"}],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003E\u003Ca href=\u0022mailto:albert.snedeker@cc.gatech.edu\u0022\u003EBen Snedeker\u003C\/a\u003E, Senior Communications Manager\u003C\/p\u003E\u003Cp\u003EGeorgia Tech College of Computing\u003C\/p\u003E","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}},"686615":{"#nid":"686615","#data":{"type":"news","title":"Researchers Look to Maker Safer AI Through Google Awards","body":[{"value":"\u003Cp\u003EPeople seeking mental health support are increasingly turning to large language models (LLMs) for advice.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EHowever, most popular AI-powered chatbots are not trained to recognize when someone is in crisis. LLMs also cannot determine when to refer someone to a human specialist.\u003C\/p\u003E\u003Cp\u003ENew Georgia Tech research projects that address these issues may soon provide people seeking mental health support with safer experiences.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EGoogle has awarded research grants to three faculty members from the School of Interactive Computing to study artificial intelligence (AI), trust, safety, and security. The grants were among dozens awarded by the company to researchers across the country.\u003C\/p\u003E\u003Cp\u003EProfessor \u003Ca href=\u0022http:\/\/www.munmund.net\/\u0022\u003E\u003Cstrong\u003EMunmun De Choudhury\u003C\/strong\u003E\u003C\/a\u003E, Associate Professor \u003Ca href=\u0022https:\/\/sites.google.com\/view\/riarriaga\/home\u0022\u003E\u003Cstrong\u003ERosa Arriaga\u003C\/strong\u003E\u003C\/a\u003E, and Associate Professor \u003Ca href=\u0022https:\/\/aritter.github.io\/\u0022\u003E\u003Cstrong\u003EAlan Ritter\u003C\/strong\u003E\u003C\/a\u003E are among the recipients of the \u003Ca href=\u0022https:\/\/research.google\/programs-and-events\/google-academic-research-awards\/google-academic-research-award-program-recipients\/\u0022\u003E\u003Cstrong\u003E2025 Google Academic Research Awards\u003C\/strong\u003E\u003C\/a\u003E.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003ETheir projects will explore questions like:\u003C\/p\u003E\u003Cul\u003E\u003Cli\u003EWhat harms could occur if people consult LLMs for mental health advice?\u003C\/li\u003E\u003Cli\u003EWhich groups are most at risk of receiving harmful guidance?\u003C\/li\u003E\u003Cli\u003EWhen should an LLM stop responding and refer someone to a human professional?\u003C\/li\u003E\u003C\/ul\u003E\u003Cp\u003EDe Choudhury and Arriaga will examine how LLMs might harm people seeking mental health care.\u003C\/p\u003E\u003Cp\u003EDe Choudhury\u2019s work focuses on spotting when chatbot conversations go wrong and lead users toward self-harm. She is also studying design changes that could prevent these situations.\u003C\/p\u003E\u003Cp\u003EHer project,\u0026nbsp;\u003Cem\u003EExiting Harmful Reliance: Identifying Crises \u0026amp; Care Escalation Needs\u003C\/em\u003E, is in partnership with Angel Hsing-Chi Hwang from the University of Southern California. Together, they will review real and synthetic chat transcripts with clinicians to find language patterns that signal risk.\u003C\/p\u003E\u003Cp\u003E\u201cA chatbot will always give a response and keep talking to you for however long you want,\u201d De Choudhury said. \u201cThat may not be a good thing for someone in crisis. We need to know when the right response is to stop and suggest talking to a human.\u201d\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Ch4\u003E\u003Cstrong\u003EUnderstanding Risks for Low-Income Users\u003C\/strong\u003E\u003C\/h4\u003E\u003Cp\u003EArriaga\u2019s project,\u0026nbsp;\u003Cem\u003EDull, Dirty, Dangerous: Investigating Trust of Digital Resources Among Low-SES Mental Health Care Seekers\u003C\/em\u003E, looks at how LLMs affect people with low socioeconomic status (SES).\u003C\/p\u003E\u003Cp\u003EDull, dirty, and dangerous is a phrase used to describe work that is well-suited for robot automation because they are repetitive, physically taxing, or hazardous for humans. Arriaga said she adapted these terms for her research to create a taxonomy of the harms AI can cause to people seeking mental health care.\u003C\/p\u003E\u003Cp\u003EArriaga also wants to label the trust factors that chatbots have that attract low-SES users to seek their advice, and how these may differ for adults and adolescents across contexts.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cWe know one of the reasons some users go to LLMs is because they aren\u2019t insured and can\u2019t afford a therapist,\u201d she said. \u201cLLMs are available 24-7. Maybe it doesn\u2019t start as a trust issue. Maybe it starts with availability.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cSome of these human-AI conversations that result in harmful mental health advice didn\u2019t begin on the topic of mental health. In one case, the person started going to the machine for help with homework.\u003C\/p\u003E\u003Cp\u003E\u201cThen this relationship evolved into personal matters. Should we constrain the system to limit itself to helping someone with their homework and not wander off that subject into mental health matters?\u201d\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Ch4\u003E\u003Cstrong\u003EManaging Privacy Risks for Social Media\u003C\/strong\u003E\u003C\/h4\u003E\u003Cp\u003ERitter will use the Google award to advance research on social media privacy tools, including interactive AI agents that help people make more informed decisions about what they share online.\u003C\/p\u003E\u003Cp\u003EHis project, \u003Cem\u003EAI Tools to Help Users Make Informed Decisions About Online Information Sharing\u003C\/em\u003E, focuses on reducing privacy risks in both text and images by identifying when posts reveal more than users intend.\u003C\/p\u003E\u003Cp\u003E\u201cWe\u2019ve been developing methods to assess risks in text, and now we\u2019re extending that work to images,\u201d Ritter said. \u201cPeople post photos without realizing how easily they can be geolocated by advanced AI systems. A casual selfie near home might contain subtle cues about where you live, like a street sign, that reveal private details.\u201d\u003C\/p\u003E\u003Cp\u003EThe project aims to create AI agents that review content within user posts, flag elements that pose risk, and suggest safer alternatives. Ritter said he wants people to maintain control over their privacy without limiting freedom of expression.\u003C\/p\u003E\u003Cp\u003ERitter will deploy advanced reasoning models capable of probabilistic privacy estimation. These systems can infer how identifiable a piece of text might be or how likely an image is to reveal a user\u2019s location.\u003C\/p\u003E\u003Cp\u003EFor images, Ritter and his collaborators will use models that identify geolocatable features, allowing users to edit or hide them before posting.\u003C\/p\u003E\u003Cp\u003EFor more on Ritter\u2019s research,\u0026nbsp;\u003Ca href=\u0022https:\/\/www.cc.gatech.edu\/news\/new-large-language-model-can-protect-social-media-users-privacy\u0022\u003E\u003Cstrong\u003Eread how an LLM he co-developed protects the privacy of users on social media.\u003C\/strong\u003E\u003C\/a\u003E\u003C\/p\u003E","summary":"","format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EThree Georgia Tech faculty members from the School of Interactive Computing received Google Academic Research Awards to study how to make AI safer, focusing on minimizing harm to users seeking \u003Cstrong\u003Emental health support\u003C\/strong\u003E from large language models (LLMs) and improving \u003Cstrong\u003Esocial media privacy\u003C\/strong\u003E tools.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Three Georgia Tech faculty members received Google Academic Research Awards to study how to make AI safer."}],"uid":"36530","created_gmt":"2025-11-24 20:28:32","changed_gmt":"2026-01-09 13:38:21","author":"Nathan Deen","boilerplate_text":"","field_publication":"","field_article_url":"","location":"Atlanta, GA","dateline":{"date":"2025-11-24T00:00:00-05:00","iso_date":"2025-11-24T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"hg_media":{"678716":{"id":"678716","type":"image","title":"437249_Google-Research-Award-Graphic.jpg","body":null,"created":"1764016128","gmt_created":"2025-11-24 20:28:48","changed":"1764016128","gmt_changed":"2025-11-24 20:28:48","alt":"Google Research Awards","file":{"fid":"262784","name":"437249_Google-Research-Award-Graphic.jpg","image_path":"\/sites\/default\/files\/2025\/11\/24\/437249_Google-Research-Award-Graphic.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/2025\/11\/24\/437249_Google-Research-Award-Graphic.jpg","mime":"image\/jpeg","size":120957,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/2025\/11\/24\/437249_Google-Research-Award-Graphic.jpg?itok=QmSwvwkp"}}},"media_ids":["678716"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"1188","name":"Research Horizons"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[{"id":"194606","name":"Artificial Intelligence"},{"id":"153","name":"Computer Science\/Information Technology and Security"},{"id":"135","name":"Research"}],"keywords":[{"id":"194701","name":"go-resarchnews"},{"id":"9153","name":"Research Horizons"},{"id":"192863","name":"go-ai"},{"id":"193860","name":"Artifical Intelligence"},{"id":"187812","name":"artificial intelligence (AI)"},{"id":"192524","name":"ChatGPT"},{"id":"184554","name":"Google Research Award"},{"id":"167007","name":"health \u0026 well-being"},{"id":"10343","name":"mental health"},{"id":"169137","name":"chatbot"},{"id":"167543","name":"social media"},{"id":"114791","name":"Data Privacy"}],"core_research_areas":[],"news_room_topics":[{"id":"71901","name":"Society and Culture"}],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"686197":{"#nid":"686197","#data":{"type":"news","title":"New Software Center Director to Lead Next Wave of Scientific Discovery","body":[{"value":"\u003Cp\u003EScientists across Georgia Tech rely on powerful software tools to propel breakthroughs in fields ranging from physics to biology. Now, software experts who make that research possible are gaining a new leader.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EThe College of Computing named Professor\u0026nbsp;\u003Ca href=\u0022https:\/\/vuduc.org\/v2\/\u0022\u003ERich Vuduc\u003C\/a\u003E as director of the Center for Scientific Software Engineering (\u003Ca href=\u0022https:\/\/ssecenter.cc.gatech.edu\/\u0022\u003ECSSE\u003C\/a\u003E). The Georgia Tech hub is dedicated to building reliable, high-performance software for scientists. \u0026nbsp;\u003C\/p\u003E\u003Cp\u003EUnder Vuduc\u2019s leadership, CSSE strives to accelerate the pace and increase the quality of scientific discovery by developing custom software tools and best practices tailored to researchers\u2019 needs.\u003C\/p\u003E\u003Cp\u003E\u201cThere is a reproducibility and reliability problem right now with scientific software,\u201d Vuduc said. \u201cThe promise of CSSE is to leverage capabilities shared between Georgia Tech, Schmidt Sciences, and industry experts to address this problem.\u201d\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EIssues arise because scientists often need to develop their own software for experiments or data analysis. However, troubleshooting coding issues and other bugs can slow down research.\u003C\/p\u003E\u003Cp\u003ETo assist these scientists, CSSE receives their input to create custom software tools and best practices. The center employs professional software engineers who build and deliver products tailor-made to the needs of researchers at Georgia Tech and broader scientific communities.\u003C\/p\u003E\u003Cp\u003EBeyond its research focus, CSSE helps Georgia Tech fulfill its educational mission. The center provides students with direct access and exposure to real-world software engineering.\u003C\/p\u003E\u003Cp\u003EAs the center enters its third year, Vuduc wants to better prepare students for employment by enhancing their hands-on experience while learning from CSSE engineers.\u003C\/p\u003E\u003Cp\u003ETo achieve this goal, Vuduc is working to establish a \u003Ca href=\u0022https:\/\/gatech.infoready4.com\/#competitionDetail\/1999204\u0022\u003EPh.D. fellowship program\u003C\/a\u003E in which CSSE engineers mentor students. This program would connect academic inquiry with industry expertise, creating the next generation of dynamic leaders in computational science. \u0026nbsp;\u003C\/p\u003E\u003Cp\u003EVuduc also envisions pairing CSSE with Georgia Tech\u2019s\u0026nbsp;\u003Ca href=\u0022https:\/\/vip.gatech.edu\/\u0022\u003EVertically Integrated Projects (VIP) program\u003C\/a\u003E. This approach would allow undergraduate students to earn class credit while working with CSSE engineers on large software engineering projects spanning multiple semesters.\u003C\/p\u003E\u003Cp\u003E\u201cThe center gives our students access to something that is very unique to find in a university environment,\u201d Vuduc said.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cThe software engineers in CSSE mostly come from industry. They have over 65 years of combined experience doing real-world software engineering that students can learn from.\u201d\u003C\/p\u003E\u003Cp\u003EVuduc is a 2010 recipient of the\u0026nbsp;\u003Ca href=\u0022https:\/\/awards.acm.org\/bell\u0022\u003EGordon Bell Prize\u003C\/a\u003E and a leading expert in high-performance computing (HPC). He was a finalist for the award in 2020 and 2022.\u003C\/p\u003E\u003Cp\u003EThe Gordon Bell Prize, often referred to as the Nobel Prize in supercomputing due to the scope and magnitude of research it recognizes, celebrates achievement in HPC research and application.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EVuduc joined Georgia Tech in 2007 as one of the first faculty hired for the new Division of Computational Science and Engineering (CSE). Not a stranger of leading new units, he saw CSE begin offering M.S. and Ph.D. degrees in 2008 and\u0026nbsp;\u003Ca href=\u0022https:\/\/cse.gatech.edu\/founding-school\u0022\u003Eattain school status in 2010\u003C\/a\u003E. \u0026nbsp;\u003C\/p\u003E\u003Cp\u003ESince 2021, Vuduc has served as co-director of the Center for Research into Novel Computing Hierarchies (\u003Ca href=\u0022https:\/\/crnch.gatech.edu\/\u0022\u003ECRNCH\u003C\/a\u003E).\u0026nbsp;\u003C\/p\u003E\u003Cp\u003ECRNCH is an interdisciplinary research center at Georgia Tech that explores technologies and approaches that will usher the next generation of computing. Areas CRNCH studies include quantum computing, brain-inspired computing, and approximate computing.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EVuduc will step down as CRNCH co-director to fulfill his role as CSSE director. The College of Computing will lead a search for CRNCH\u2019s next co-director.\u003C\/p\u003E\u003Cp\u003E\u201cIn a sense, the CRNCH to CSSE transition was partly a natural one because one thing that contributes to software challenges is that hardware platforms are also changing and evolving very rapidly,\u201d said Vuduc.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cPeople are exploring radically new hardware systems and we will have to write software configured for those too. Centers, like CRNCH and CSSE, strongly position Georgia Tech to lead these endeavors.\u201d\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EAlessandro (Alex) Orso\u003C\/strong\u003E, the previous CSSE director, departed Georgia Tech earlier this year to become\u0026nbsp;\u003Ca href=\u0022https:\/\/news.uga.edu\/alex-orso-named-dean-of-ugas-college-of-engineering\/\u0022\u003Edean of the University of Georgia\u2019s College of Engineering\u003C\/a\u003E. Orso and Distinguished Professor \u003Cstrong\u003EIrfan Essa\u003C\/strong\u003E wrote the proposal to bring CSSE to Georgia Tech.\u003C\/p\u003E\u003Cp\u003EGeorgia Tech formed CSSE in 2022 after securing an $11 million grant from\u0026nbsp;\u003Ca href=\u0022https:\/\/www.schmidtsciences.org\/\u0022\u003ESchmidt Sciences\u003C\/a\u003E. Former Google CEO Eric Schmidt and his spouse, Wendy Schmidt, founded the philanthropic venture that funds science and technology research and talent networking programs.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EGeorgia Tech\u2019s CSSE is part of Schmidt Sciences\u2019\u0026nbsp;\u003Ca href=\u0022https:\/\/www.schmidtsciences.org\/viss\/\u0022\u003EVirtual Institute for Scientific Software (VISS) program\u003C\/a\u003E. This network helps scientists obtain more robust, flexible, scalable open-source software.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003ESchmidt Sciences is investing $40 million in VISS over five years at four universities: Georgia Tech, University of Washington, Johns Hopkins University, and University of Cambridge.\u003C\/p\u003E\u003Cp\u003ECSSE uses the funding to employ a software engineering lead, three senior and two junior software engineers. The Schmidt Sciences grant equips these engineers with computing resources to build scientific software. Along with the director, an advisory board guides the group\u2019s work to meet the point of need for scientists in the field.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cI am grateful to Schmidt Sciences for their support of CSSE. It aligns with our college\u2019s strategic goals and expertise in scientific software, and I am delighted that Rich has agreed to take on this important role,\u201d said Vivek Sarkar, Dean and John P. Imlay Jr. Chair of Computing.\u003C\/p\u003E\u003Cp\u003E\u201cI know that Rich is committed to growing CSSE\u0027s internal and external visibility and long-term sustainability. I am confident that he will also help further socialize CSSE among internal stakeholders across Georgia Tech.\u201d\u003C\/p\u003E","summary":"","format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EScientists across Georgia Tech rely on powerful software tools to propel breakthroughs in fields ranging from physics to biology. Now, software experts who make that research possible are gaining a new leader.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EThe College of Computing named Professor\u0026nbsp;\u003Ca href=\u0022https:\/\/vuduc.org\/v2\/\u0022\u003ERich Vuduc\u003C\/a\u003E as director of the Center for Scientific Software Engineering (\u003Ca href=\u0022https:\/\/ssecenter.cc.gatech.edu\/\u0022\u003ECSSE\u003C\/a\u003E). The Georgia Tech hub is dedicated to building reliable, high-performance software for scientists. \u0026nbsp;\u003C\/p\u003E\u003Cp\u003EUnder Vuduc\u2019s leadership, CSSE strives to accelerate the pace and increase the quality of scientific discovery by developing custom software tools and best practices tailored to researchers\u2019 needs.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"The College of Computing named Professor Rich Vuduc as director of the Center for Scientific Software Engineering (CSSE). The Georgia Tech hub is dedicated to building reliable, high-performance software for scientists.  "}],"uid":"36319","created_gmt":"2025-11-05 14:01:46","changed_gmt":"2026-01-09 13:38:07","author":"Bryant Wine","boilerplate_text":"","field_publication":"","field_article_url":"","location":"Atlanta, GA","dateline":{"date":"2025-11-03T00:00:00-05:00","iso_date":"2025-11-03T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"hg_media":{"678546":{"id":"678546","type":"image","title":"Vuduc-CSSE-Director.jpg","body":null,"created":"1762351373","gmt_created":"2025-11-05 14:02:53","changed":"1762351373","gmt_changed":"2025-11-05 14:02:53","alt":"Rich Vuduc CSSE Director","file":{"fid":"262598","name":"Vuduc-CSSE-Director.jpg","image_path":"\/sites\/default\/files\/2025\/11\/05\/Vuduc-CSSE-Director.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/2025\/11\/05\/Vuduc-CSSE-Director.jpg","mime":"image\/jpeg","size":82857,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/2025\/11\/05\/Vuduc-CSSE-Director.jpg?itok=o-JZUe-T"}}},"media_ids":["678546"],"related_links":[{"url":"https:\/\/www.cc.gatech.edu\/news\/new-software-center-director-lead-next-wave-scientific-discovery","title":"New Software Center Director to Lead Next Wave of Scientific Discovery"}],"groups":[{"id":"47223","name":"College of Computing"},{"id":"1188","name":"Research Horizons"},{"id":"50877","name":"School of Computational Science and Engineering"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"},{"id":"135","name":"Research"}],"keywords":[{"id":"654","name":"College of Computing"},{"id":"172288","name":"School of Computational Science Engineering"},{"id":"187915","name":"go-researchnews"},{"id":"181991","name":"Georgia Tech News Center"},{"id":"10199","name":"Daily Digest"},{"id":"183717","name":"Center for Research into Novel Computing Hierarchies"},{"id":"15030","name":"high-performance computing"},{"id":"170965","name":"software engineering"},{"id":"194841","name":"Center for Scientific Software Engineering"}],"core_research_areas":[{"id":"39431","name":"Data Engineering and Science"}],"news_room_topics":[{"id":"71871","name":"Campus and Community"}],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003EBryant Wine, Communications Officer\u003Cbr\u003E\u003Ca href=\u0022mailto:bryant.wine@cc.gatech.edu\u0022\u003Ebryant.wine@cc.gatech.edu\u003C\/a\u003E\u003C\/p\u003E","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}},"686843":{"#nid":"686843","#data":{"type":"news","title":"NSF Grant Funds Protein Research for Drug Discovery and Personalized Medicine","body":[{"value":"\u003Cp\u003EProteins, including antibodies, hemoglobin, and insulin, power nearly every vital aspect of life. Breakthroughs in protein research are producing vaccines, resilient crops, bioenergy sources, and other innovative technologies.\u003C\/p\u003E\u003Cp\u003EDespite their importance, most of what scientists know about proteins only comes from a small sample size. This stands in the way of fully understanding how most proteins work and unlocking their full potential.\u003C\/p\u003E\u003Cp\u003EGeorgia Tech\u2019s \u003Ca href=\u0022https:\/\/faculty.cc.gatech.edu\/~yunan\/\u0022\u003EYunan Luo\u003C\/a\u003E believes artificial intelligence (AI) could fill this knowledge gap. The National Science Foundation agrees. Luo is the recipient of an NSF Faculty Early Career Development (\u003Ca href=\u0022https:\/\/www.nsf.gov\/funding\/opportunities\/career-faculty-early-career-development-program\u0022\u003ECAREER\u003C\/a\u003E) award.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cSo much of biology depends on knowing what proteins do, but decades of research have concentrated on a relatively small set of well-studied proteins. This imbalance in scientific attention leads to a distorted view of the biological landscape that\u0026nbsp;quietly shapes our data and our algorithms,\u201d Luo said.\u003C\/p\u003E\u003Cp\u003E\u201cMy group\u2019s goal is to build machine learning (ML) models that actively close this gap by generating trustworthy\u0026nbsp;function predictions for the many proteins that remain understudied.\u201d\u003C\/p\u003E\u003Cp\u003E[Related: \u003Ca href=\u0022https:\/\/www.cc.gatech.edu\/news\/faculty-use-ai-protein-design-and-discovery-support-18-million-nih-grant\u0022\u003EYunan Luo to use AI for Protein Design and Discovery with Support of $1.8 Million NIH Grant\u003C\/a\u003E]\u003C\/p\u003E\u003Cp\u003EIn his \u003Ca href=\u0022https:\/\/www.nsf.gov\/awardsearch\/show-award\/?AWD_ID=2442063\u0026amp;HistoricalAwards=false\u0022\u003Eproposal to NSF\u003C\/a\u003E, Luo coined this rich-get-richer effect \u201cannotation inequality.\u201d\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EOne problem of annotation inequality is that it slows progress in disease prognosis, drug discovery, and other critical biomedical areas. It is challenging to innovate the few proteins that scientists already know so much about.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EA cascading effect of annotation inequality is that it diminishes the effectiveness of studying proteins with\u0026nbsp;AI. \u0026nbsp;\u003C\/p\u003E\u003Cp\u003EAI methods learn from existing experimental data. Datasets skewed toward well-known proteins propagate and become entrenched in models. Over time, this makes it harder for computers to research understudied proteins.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cProtein annotation inequality creates an effect analogous to a vast library where 95% of patrons only read the top 5% popular books, leaving the rest of the collection to gather dust,\u201d Luo said.\u003C\/p\u003E\u003Cp\u003E\u201cThis has resulted in knowledge disparities across proteins in current literature and databases, biasing our understanding of protein functions.\u201d\u003C\/p\u003E\u003Cp\u003EThe NSF CAREER award will fund Luo with over $770,000 for the next five years to tackle head-on the problem of protein annotation inequality.\u003C\/p\u003E\u003Cp\u003ELuo will use the grant to build an accurate, unbiased protein function prediction framework at scale. His project aims to:\u003C\/p\u003E\u003Cul\u003E\u003Cli\u003EReveal how annotation inequality affects protein function prediction systems\u003C\/li\u003E\u003Cli\u003ECreate ML techniques suited for biological data, which is often noisy, incomplete, and imbalanced \u0026nbsp;\u003C\/li\u003E\u003Cli\u003EIntegrate data and ML models into a scalable framework to accelerate discoveries involving understudied proteins\u003C\/li\u003E\u003C\/ul\u003E\u003Cp\u003EMore enduring than the ML framework, Luo will leverage the NSF award to support educational and outreach programs. His goal is to groom the next generation of researchers to study other challenges in computational biology, not just the annotation inequality problem.\u003C\/p\u003E\u003Cp\u003ELuo teaches graduate and undergraduate courses focused on computational biology and ML. Problems and methods developed through the CAREER project can be used as course material in his classes.\u003C\/p\u003E\u003Cp\u003ELuo also championed collaboration with Georgia Tech\u2019s Center for Education Integrating Science, Mathematics, and Computing (\u003Ca href=\u0022https:\/\/www.ceismc.gatech.edu\/\u0022\u003ECEISMC\u003C\/a\u003E) in his proposal.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EThrough this partnership, local high school teachers and students would gain access to his data and models. This promotes deeper learning of biology and data science through hands-on experience with real-world tools. \u0026nbsp;\u003C\/p\u003E\u003Cp\u003ELuo sees reaching students and the community as a way of paying forward the support he received from Georgia Tech colleagues.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cI am incredibly grateful for this recognition from the NSF,\u201d said Luo, an assistant professor in the \u003Ca href=\u0022https:\/\/cse.gatech.edu\/\u0022\u003ESchool of Computational Science and Engineering\u003C\/a\u003E (CSE).\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cThis would not have been possible without my students and collaborators, whose hard work laid the groundwork for this proposal.\u201d\u003C\/p\u003E\u003Cp\u003ELuo praised CSE faculty members \u003Ca href=\u0022https:\/\/faculty.cc.gatech.edu\/~badityap\/\u0022\u003EB. Aditya Prakash\u003C\/a\u003E, \u003Ca href=\u0022https:\/\/xiuweizhang.wordpress.com\/\u0022\u003EXiuwei Zhang\u003C\/a\u003E, and \u003Ca href=\u0022http:\/\/chaozhang.org\/\u0022\u003EChao Zhang\u003C\/a\u003E for their guidance. All three study \u003Ca href=\u0022https:\/\/cse.gatech.edu\/artificial-intelligence-and-machine-learning\u0022\u003Emachine learning\u003C\/a\u003E and \u003Ca href=\u0022https:\/\/cse.gatech.edu\/computational-bioscience-and-biomedicine\u0022\u003Ecomputational bioscience\u003C\/a\u003E, two of \u003Ca href=\u0022https:\/\/cse.gatech.edu\/research\u0022\u003ECSE\u2019s five core research areas\u003C\/a\u003E.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003ELuo also thanked \u003Ca href=\u0022https:\/\/faculty.cc.gatech.edu\/~hpark\/\u0022\u003EHaesun Park\u003C\/a\u003E for her support and recommendation for the CAREER award. Park is a Regents\u2019 Professor and the chair of the School of CSE.\u003C\/p\u003E","summary":"","format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EProteins, including antibodies, hemoglobin, and insulin, power nearly every vital aspect of life. Breakthroughs in protein research are producing vaccines, resilient crops, bioenergy sources, and other innovative technologies.\u003C\/p\u003E\u003Cp\u003EDespite their importance, most of what scientists know about proteins only comes from a small sample size. This stands in the way of fully understanding how most proteins work and unlocking their full potential.\u003C\/p\u003E\u003Cp\u003EGeorgia Tech\u2019s \u003Ca href=\u0022https:\/\/faculty.cc.gatech.edu\/~yunan\/\u0022\u003EYunan Luo\u003C\/a\u003E believes artificial intelligence (AI) could fill this knowledge gap. The National Science Foundation agrees. Luo is the recipient of an NSF Faculty Early Career Development (\u003Ca href=\u0022https:\/\/www.nsf.gov\/funding\/opportunities\/career-faculty-early-career-development-program\u0022\u003ECAREER\u003C\/a\u003E) award.\u0026nbsp;\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Yunan Luo is the recipient of an NSF Faculty Early Career Development (CAREER) award to use artificial intelligence to solve the protein annotation inequality problem."}],"uid":"36319","created_gmt":"2025-12-10 16:57:22","changed_gmt":"2026-01-09 13:37:31","author":"Bryant Wine","boilerplate_text":"","field_publication":"","field_article_url":"","location":"Atlanta, GA","dateline":{"date":"2025-12-10T00:00:00-05:00","iso_date":"2025-12-10T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"hg_media":{"678817":{"id":"678817","type":"image","title":"Yunan-Luo-NSF-CAREER_1.jpg","body":null,"created":"1765385865","gmt_created":"2025-12-10 16:57:45","changed":"1765385865","gmt_changed":"2025-12-10 16:57:45","alt":"Yunan Luo NSF CAREER Award","file":{"fid":"262902","name":"Yunan-Luo-NSF-CAREER_1.jpg","image_path":"\/sites\/default\/files\/2025\/12\/10\/Yunan-Luo-NSF-CAREER_1.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/2025\/12\/10\/Yunan-Luo-NSF-CAREER_1.jpg","mime":"image\/jpeg","size":108350,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/2025\/12\/10\/Yunan-Luo-NSF-CAREER_1.jpg?itok=j83dW4Sn"}},"678818":{"id":"678818","type":"image","title":"Yunan-Luo-NSF-CAREER_2.jpg","body":null,"created":"1765385967","gmt_created":"2025-12-10 16:59:27","changed":"1765385967","gmt_changed":"2025-12-10 16:59:27","alt":"Yunan Luo NSF CAREER Award","file":{"fid":"262903","name":"Yunan-Luo-NSF-CAREER_2.jpg","image_path":"\/sites\/default\/files\/2025\/12\/10\/Yunan-Luo-NSF-CAREER_2.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/2025\/12\/10\/Yunan-Luo-NSF-CAREER_2.jpg","mime":"image\/jpeg","size":100260,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/2025\/12\/10\/Yunan-Luo-NSF-CAREER_2.jpg?itok=CShGR6nJ"}}},"media_ids":["678817","678818"],"related_links":[{"url":"https:\/\/www.cc.gatech.edu\/news\/nsf-grant-funds-protein-research-drug-discovery-and-personalized-medicine","title":"NSF Grant Funds Protein Research for Drug Discovery and Personalized Medicine"}],"groups":[{"id":"47223","name":"College of Computing"},{"id":"1188","name":"Research Horizons"},{"id":"50877","name":"School of Computational Science and Engineering"}],"categories":[{"id":"194606","name":"Artificial Intelligence"},{"id":"138","name":"Biotechnology, Health, Bioengineering, Genetics"},{"id":"153","name":"Computer Science\/Information Technology and Security"},{"id":"146","name":"Life Sciences and Biology"},{"id":"135","name":"Research"}],"keywords":[{"id":"654","name":"College of Computing"},{"id":"166983","name":"School of Computational Science and Engineering"},{"id":"9153","name":"Research Horizons"},{"id":"187915","name":"go-researchnews"},{"id":"10199","name":"Daily Digest"},{"id":"181991","name":"Georgia Tech News Center"},{"id":"9167","name":"machine learning"},{"id":"187812","name":"artificial intelligence (AI)"},{"id":"2556","name":"artificial intelligence"},{"id":"362","name":"National Science Foundation"},{"id":"191934","name":"National Science Foundation (NSF)"},{"id":"170447","name":"Institute for Data Engineering and Science"},{"id":"176858","name":"machine learning center"},{"id":"173894","name":"ML@GT"}],"core_research_areas":[{"id":"193655","name":"Artificial Intelligence at Georgia Tech"},{"id":"39441","name":"Bioengineering and Bioscience"},{"id":"39431","name":"Data Engineering and Science"}],"news_room_topics":[{"id":"71871","name":"Campus and Community"}],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003EBryant Wine, Communications Officer\u003Cbr\u003E\u003Ca href=\u0022mailto:bryant.wine@cc.gatech.edu\u0022\u003Ebryant.wine@cc.gatech.edu\u003C\/a\u003E\u003C\/p\u003E","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}},"686720":{"#nid":"686720","#data":{"type":"news","title":"What if Hospitals Could Automatically Protect Patients from Cyber Threats?","body":[{"value":"\u003Cp\u003EA software update was missed for the program running your local hospital\u2019s X-ray machines. A hacker now controls all the machines and is demanding $500,000 in cryptocurrency be sent to an anonymous wallet; otherwise, he will shut down the entire radiology department.\u003C\/p\u003E\u003Cp\u003EThis scenario becomes more likely for hospitals of all sizes as medical technology advances, adding more devices to constantly growing networks.\u003C\/p\u003E\u003Cp\u003EWith the help of a contract award for up to $12 million from the Advanced Research Projects Agency for Health (ARPA-H) \u003Ca href=\u0022https:\/\/arpa-h.gov\/explore-funding\/programs\/upgrade\u0022\u003EUPGRADE\u003C\/a\u003E program, a team of researchers led by the School of Cybersecurity and Privacy at Georgia Tech will begin developing an advanced cybersecurity platform to help hospitals proactively identify and fix vulnerabilities in their software, devices, and networks.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cThis is a new area of security research,\u201d said Associate Professor \u003Cstrong\u003EBrendan Saltaformaggio\u003C\/strong\u003E. \u201cWe not only have to worry about the cybersecurity aspect, but the physical security as well. Our research must be very accurate to make sure patients are safe from cyberthreats.\u201d\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EStarting next month, the team of researchers on the Hospital-Integrated Vulnerability Identification and Proactive Remediation (H-VIPER) project will begin developing a system they are calling the Whole-Hospital Simulation (WHS).\u003C\/p\u003E\u003Cp\u003EThe system maps out the online network for hospitals of all sizes and enables IT teams to test their cyber capabilities before going live. The system can also identify threats, such as missed software updates, and alert the IT department.\u003C\/p\u003E\u003Cp\u003E\u201cHospitals have thousands of devices connected to their networks, including medical devices,\u201d said Saltaformaggio. \u201cA hospital like Children\u2019s has a huge attack surface. A smaller hospital might have different challenges, but possible entry points are still there.\u201d\u003C\/p\u003E\u003Cp\u003EThe team has already interviewed IT teams at Children\u2019s Healthcare of Atlanta and Hamilton Health Care System. Their findings have provided them with a better understanding of how to scale the WHS system to meet each hospital\u2019s specific needs.\u003C\/p\u003E\u003Cp\u003E\u201cHospitals IT processes are notoriously sensitive to disruption, because essentially any kind of down time for rebooting a system or lack of availability can create chaos in the clinical environment,\u201d said \u003Cstrong\u003EStoddard Manikin\u003C\/strong\u003E, chief information security officer for Children\u2019s Healthcare of Atlanta.\u003C\/p\u003E\u003Cp\u003E\u201cOur goal is to create very smooth processes and workflow for our patient facing staff and providers to deliver the best care possible. This research opportunity gives us a chance to develop news ways where we can look at these sensitive medical devices and things on the IT network in a healthcare environment and potentially remediate vulnerabilities without taking them out of service.\u201d\u0026nbsp;\u003C\/p\u003E\u003Cp\u003ESaltaformaggio and his colleagues found that, regardless of size, security remains retroactive and not proactive. By leveraging their diverse expertise, the research team will ensure that the H-VIPER project addresses vulnerabilities at every layer of hospital technology, from the network to the hardware.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EThe \u003Ca href=\u0022https:\/\/scp.cc.gatech.edu\/\u0022\u003ESchool of Cybersecurity and Privacy\u003C\/a\u003E will lead this initiative, with faculty from the H-VIPER project also representing the \u003Ca href=\u0022https:\/\/www.cc.gatech.edu\/\u0022\u003ECollege of Computing\u003C\/a\u003E, the \u003Ca href=\u0022https:\/\/coe.gatech.edu\/\u0022\u003ECollege of Engineering\u003C\/a\u003E, the \u003Ca href=\u0022https:\/\/ece.gatech.edu\/\u0022\u003ESchool of Electrical and Computer Engineering\u003C\/a\u003E, the \u003Ca href=\u0022https:\/\/www.scs.gatech.edu\/\u0022\u003ESchool of Computer Science\u003C\/a\u003E, and the \u003Ca href=\u0022https:\/\/gtri.gatech.edu\/\u0022\u003EGeorgia Tech Research Institute\u003C\/a\u003E, along with support from their Ph.D. students and postdoctoral researchers.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EAround 30 Georgia Tech researchers will partner with \u003Ca href=\u0022https:\/\/www.emory.edu\/home\/index.html\u0022\u003EEmory University\u003C\/a\u003E, \u003Ca href=\u0022https:\/\/www.choa.org\u0022\u003EChildren\u2019s Healthcare of Atlanta\u003C\/a\u003E, \u003Ca href=\u0022https:\/\/vitruvianhealth.com\/locations\/hamilton-medical-center\/\u0022\u003EHamilton Health Care System\u003C\/a\u003E, \u003Ca href=\u0022https:\/\/www.tufts.edu\/\u0022\u003ETufts University\u003C\/a\u003E, \u003Ca href=\u0022https:\/\/www.iastate.edu\/\u0022\u003EIowa State University\u003C\/a\u003E, and \u003Ca href=\u0022https:\/\/narfindustries.com\/\u0022\u003ENarf Industries\u003C\/a\u003E.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EGeorgia Tech faculty working on the project are:\u003C\/p\u003E\u003Cul\u003E\u003Cli\u003EAssociate Professor \u003Cstrong\u003EBrendan Saltaformaggio\u003C\/strong\u003E\u003C\/li\u003E\u003Cli\u003ERegents\u2019 Professor \u003Cstrong\u003EWenke Lee\u003C\/strong\u003E\u003C\/li\u003E\u003Cli\u003EProfessor \u003Cstrong\u003ETaesoo Kim\u003C\/strong\u003E\u003C\/li\u003E\u003Cli\u003EProfessor \u003Cstrong\u003EFabian Monrose\u003C\/strong\u003E\u003C\/li\u003E\u003Cli\u003EAssistant Professor \u003Cstrong\u003EFrank Li\u003C\/strong\u003E\u003C\/li\u003E\u003Cli\u003EAssociate Professor \u003Cstrong\u003ESaman Zonouz\u003C\/strong\u003E\u003C\/li\u003E\u003Cli\u003EAssociate Professor\u003Cstrong\u003E Daniel Genkin\u003C\/strong\u003E\u003C\/li\u003E\u003Cli\u003EResearch Professor \u003Cstrong\u003ESukarno Mertoguno\u003C\/strong\u003E\u003C\/li\u003E\u003Cli\u003ESenior Research Scientist \u003Cstrong\u003ETrevor Lewis\u003C\/strong\u003E \u0026nbsp;\u003C\/li\u003E\u003C\/ul\u003E","summary":"","format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EWith the help of a contract award for up to $12 million from the Advanced Research Projects Agency for Health (ARPA-H), a team of researchers led by the School of Cybersecurity and Privacy at Georgia Tech will begin developing an advanced cybersecurity platform to help hospitals proactively identify and fix vulnerabilities in their software, devices, and networks.\u0026nbsp;\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"With the help of a contract award for up to $12 million from ARPA-H, a team of researchers led by the School of Cybersecurity and Privacy at will begin developing an advanced cybersecurity platform to protect hospitals. "}],"uid":"36253","created_gmt":"2025-12-03 15:49:35","changed_gmt":"2025-12-08 17:08:45","author":"John Popham","boilerplate_text":"","field_publication":"","field_article_url":"","location":"Atlanta, GA","dateline":{"date":"2025-12-03T00:00:00-05:00","iso_date":"2025-12-03T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"hg_media":{"678753":{"id":"678753","type":"image","title":"Cyfi-Lab-Brendan.jpg","body":null,"created":"1764777096","gmt_created":"2025-12-03 15:51:36","changed":"1764777096","gmt_changed":"2025-12-03 15:51:36","alt":"A man points to a rack of computer monitors. Another man sits in front of a laptop with his back to the camera. ","file":{"fid":"262827","name":"Cyfi-No-Dict-1.jpg","image_path":"\/sites\/default\/files\/2025\/12\/03\/Cyfi-No-Dict-1.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/2025\/12\/03\/Cyfi-No-Dict-1.jpg","mime":"image\/jpeg","size":1596073,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/2025\/12\/03\/Cyfi-No-Dict-1.jpg?itok=nDkK4MSK"}}},"media_ids":["678753"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"1188","name":"Research Horizons"},{"id":"660367","name":"School of Cybersecurity and Privacy"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"},{"id":"135","name":"Research"}],"keywords":[{"id":"365","name":"Research"},{"id":"193109","name":"arpa-h"},{"id":"2634","name":"grant"},{"id":"127901","name":"Contract"},{"id":"1404","name":"Cybersecurity"},{"id":"344","name":"cyber"},{"id":"3532","name":"impact"},{"id":"4499","name":"hospitals"},{"id":"179869","name":"partners"},{"id":"340","name":"collaboration"},{"id":"1129","name":"healthcare"},{"id":"194701","name":"go-resarchnews"},{"id":"187915","name":"go-researchnews"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"},{"id":"39501","name":"People and Technology"}],"news_room_topics":[{"id":"71891","name":"Health and Medicine"}],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003EJohn Popham\u0026nbsp;Communications Officer II | School of Cybersecurity and Privacy\u003C\/p\u003E","format":"limited_html"}],"email":["jpopham3@gatech.edu"],"slides":[],"orientation":[],"userdata":""}},"686467":{"#nid":"686467","#data":{"type":"news","title":"Researchers Find Opportunities for 311 Chatbots to Foster Community Engagement","body":[{"value":"\u003Cp\u003E311 chatbots make it easier for people to report issues to their local government without long wait times on the phone. However, a new study finds that the technology might inhibit civic engagement.\u003C\/p\u003E\u003Cp\u003E311 systems allow residents to report potholes, broken fire hydrants, and other municipal issues. In recent years, the use of artificial intelligence (AI) to provide 311 services to community residents has boomed across city and state governments. This includes an artificial virtual assistant (AVA) developed by third-party vendors for \u003Ca href=\u0022https:\/\/www.atlantaga.gov\/government\/departments\/customer-service-atl311\/atl311-chatbot\u0022\u003E\u003Cstrong\u003Ethe City of Atlanta\u003C\/strong\u003E\u003C\/a\u003E in 2023.\u003C\/p\u003E\u003Cp\u003EThrough survey data, researchers from Tech\u2019s School of Interactive Computing found that many residents are generally positive about 311 chatbots. In addition to eliminating long wait times over the phone, they also offer residents quick answers to permit applications, waste collection, and other frequently asked questions.\u003C\/p\u003E\u003Cp\u003EHowever, the study, which was conducted in Atlanta, indicates that 311 chatbots could be causing residents to feel isolated from public officials and less aware of what\u2019s happening in their community.\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003EJieyu Zhou\u003C\/strong\u003E, a Ph.D. student in the School of IC, said it doesn\u2019t have to be that way.\u003C\/p\u003E\u003Ch4\u003E\u003Cstrong\u003EUniting Communities\u003C\/strong\u003E\u003C\/h4\u003E\u003Cp\u003EZhou and her advisor, Assistant Professor \u003Ca href=\u0022https:\/\/chrismaclellan.com\/\u0022\u003E\u003Cstrong\u003EChristopher MacLellan\u003C\/strong\u003E\u003C\/a\u003E, published a paper at the 2025 ACM Designing Interactive Systems (DIS) Conference that focuses on improving public service chatbot design and amplifying their civic impact. They collaborated with Professor \u003Ca href=\u0022https:\/\/www.carldisalvo.com\/\u0022\u003E\u003Cstrong\u003ECarl DiSalvo\u003C\/strong\u003E\u003C\/a\u003E, Associate Professor \u003Ca href=\u0022http:\/\/lynndombrowski.com\/\u0022\u003E\u003Cstrong\u003ELynn Dombrowsk\u003C\/strong\u003E\u003C\/a\u003Ei, and graduate students \u003Cstrong\u003ERui Shen\u003C\/strong\u003E and \u003Ca href=\u0022https:\/\/yueyu1030.github.io\/\u0022\u003E\u003Cstrong\u003EYue You\u003C\/strong\u003E\u003C\/a\u003E.\u003C\/p\u003E\u003Cp\u003EZhou said 311 chatbots have the potential to be agents that drive community organization and improve quality of life.\u003C\/p\u003E\u003Cp\u003E\u201cCurrent chatbots risk isolating users in their own experience,\u201d Zhou said. \u201cIn the 311 system, people tend to report their own individual issues but lose a sense of what is happening in their broader community.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cPeople are very positive about these tools, but I think there\u2019s an opportunity as we envision what civic chatbots could be. It\u2019s important for us to emphasize that social element \u2014 engaging people\u0026nbsp;within the community and connecting them with government representatives, community organizers, and other community members.\u201d\u003C\/p\u003E\u003Cp\u003EZhou and MacLellan said 311 chatbots can leave users wondering if others in their communities share their concerns.\u003C\/p\u003E\u003Cp\u003E\u201cIf people are at a town hall meeting, they can get a sense of whether the problems they are experiencing are shared by others,\u201d Zhou said. \u201cWe can\u2019t do that with a chatbot. It\u2019s like an isolated room, and we\u2019re trying to open the doors and the windows.\u201d\u003C\/p\u003E\u003Ch4\u003E\u003Cstrong\u003EAdding a Human Touch\u003C\/strong\u003E\u003C\/h4\u003E\u003Cp\u003EIn their paper, the researchers note that one of the biggest criticisms of 311 chatbots is they can\u2019t replace interpersonal interaction.\u003C\/p\u003E\u003Cp\u003EUnlike chatbots, people working in local government offices are likely to:\u003C\/p\u003E\u003Cul\u003E\u003Cli\u003EHave direct knowledge of issues\u003C\/li\u003E\u003Cli\u003EProvide appropriate referrals\u003C\/li\u003E\u003Cli\u003EEmpathize with the resident\u2019s concerns\u003C\/li\u003E\u003C\/ul\u003E\u003Cp\u003EMacLellan said residents are likely to grow frustrated with a chatbot when reporting issues that require this level of contextual knowledge.\u003C\/p\u003E\u003Cp\u003EOne person in the researchers\u2019 survey noted that the chatbot they used didn\u2019t understand that their report was about a sidewalk issue, not a street issue.\u003C\/p\u003E\u003Cp\u003E\u201cExplaining such a situation to a human representative is straightforward,\u201d MacLellan said. \u201cHowever, when the issue being raised does not fall within any of the categories the chatbot is built to address, it often misinterprets the query and offers information that isn\u2019t helpful.\u201d\u003C\/p\u003E\u003Cp\u003EThe researchers offer some design suggestions that can help chatbots foster community engagement and improve community well-being:\u003C\/p\u003E\u003Cul\u003E\u003Cli\u003EEscalation. Regarding the sidewalk report, the chatbot did not offer a way to escalate the query to a human who could resolve it. Zhou said that this is a feature that chatbots should have but often lack.\u003C\/li\u003E\u003Cli\u003ETransparency. Chatbots could provide details about recent and frequently reported community issues. They should inform users early in the call process about known problems to help avoid an overload of user complaints.\u003C\/li\u003E\u003Cli\u003EEducation. Chatbots can keep users updated about what\u2019s happening in their communities.\u003C\/li\u003E\u003Cli\u003ECollective action. Chatbots can help communities organize and gather ideas to address challenges and solve problems.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp\u003E\u201cGovernment agencies may focus mainly on fixing individual issues,\u201d Zhou said, \u201cBut recognizing community-level patterns can inspire collective creativity. For example, one participant suggested that if many people report a broken swing at a playground, it could spark an initiative to design a new playground together\u2014going far beyond just fixing it.\u201d\u003C\/p\u003E\u003Cp\u003EThese are just a few examples of things, the researchers argue, that 311 services were originally designed to achieve.\u003C\/p\u003E\u003Cp\u003E\u201cCommunities were already collaborating on identifying and reporting issues,\u201d Zhou said. \u201cThese chatbots should reflect the original intentions and collaboration practices of the communities they serve.\u003C\/p\u003E\u003Cp\u003E\u201cOur research suggests we can increase the positive impact of civic chatbots by including social aspects within the design of the system, connecting people, and building a community view.\u201d\u003C\/p\u003E","summary":"","format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EResearchers at the Georgia Institute of Technology found that while 311-style chatbots simplify the process of reporting municipal issues and reduce wait times, users can feel isolated from their community and less connected to broader civic awareness. They recommend redesigning these systems to include transparency about collective issues, provide pathways for human escalation, and support community-level action.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"AI-powered 311 chatbots may unitentionally reduce residents\u0027 sense of connection within their community."}],"uid":"36530","created_gmt":"2025-11-14 20:30:41","changed_gmt":"2025-11-14 20:35:50","author":"Nathan Deen","boilerplate_text":"","field_publication":"","field_article_url":"","location":"Atlanta, GA","dateline":{"date":"2025-11-14T00:00:00-05:00","iso_date":"2025-11-14T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"hg_media":{"678639":{"id":"678639","type":"image","title":"Jieyu-Zhou_86A8161-Enhanced-NR.jpg","body":null,"created":"1763152260","gmt_created":"2025-11-14 20:31:00","changed":"1763152260","gmt_changed":"2025-11-14 20:31:00","alt":"Jieyu Zhou","file":{"fid":"262697","name":"Jieyu-Zhou_86A8161-Enhanced-NR.jpg","image_path":"\/sites\/default\/files\/2025\/11\/14\/Jieyu-Zhou_86A8161-Enhanced-NR.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/2025\/11\/14\/Jieyu-Zhou_86A8161-Enhanced-NR.jpg","mime":"image\/jpeg","size":134034,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/2025\/11\/14\/Jieyu-Zhou_86A8161-Enhanced-NR.jpg?itok=909Uit6L"}}},"media_ids":["678639"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"1188","name":"Research Horizons"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[{"id":"194606","name":"Artificial Intelligence"},{"id":"142","name":"City Planning, Transportation, and Urban Growth"},{"id":"42901","name":"Community"},{"id":"153","name":"Computer Science\/Information Technology and Security"},{"id":"135","name":"Research"},{"id":"8862","name":"Student Research"}],"keywords":[{"id":"192863","name":"go-ai"},{"id":"187812","name":"artificial intelligence (AI)"},{"id":"188776","name":"go-research"},{"id":"187915","name":"go-researchnews"},{"id":"9153","name":"Research Horizons"},{"id":"169137","name":"chatbot"},{"id":"189306","name":"public service technology"},{"id":"1134","name":"City of Atlanta"},{"id":"188933","name":"Atlanta community."},{"id":"10614","name":"community organizing"}],"core_research_areas":[{"id":"193655","name":"Artificial Intelligence at Georgia Tech"},{"id":"39501","name":"People and Technology"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}},"686132":{"#nid":"686132","#data":{"type":"news","title":"New Research Will Move Us Closer to a Passwordless Society","body":[{"value":"\u003Cdiv\u003E\u003Cdiv\u003E\u003Cp\u003EAlthough they are currently essential to online security and privacy, the days of relying on password protection may be numbered, thanks to Assistant Professor \u003Cstrong\u003EFrank Li\u003C\/strong\u003E and his National Science Foundation (NSF) CAREER Award project.\u003C\/p\u003E\u003Cp\u003EWhile passwords have security limitations and can be challenging to use, emerging technologies such as Fast IDentity Online 2 (\u003Ca href=\u0022https:\/\/www.microsoft.com\/en-us\/security\/business\/security-101\/what-is-fido2\u0022\u003EFIDO2\u003C\/a\u003E) and other passkey authentication methods provide strong security and usability. For example, if you have ever used your smartphone\u2019s facial recognition feature to log in to your bank account instead of typing out the password, you have used a FIDO2 passkey.\u003C\/p\u003E\u003Cp\u003EUsers and online services, however, have been slow to adopt the new technology despite the benefits. Li\u2019s NSF CAREER Award project addresses this challenge. Along with advancing the technology, Li will also advocate for its use.\u003C\/p\u003E\u003Cp\u003E\u201cWe are not assuming that this technology is coming,\u201d said Li. \u201cIt is already here. The challenge is to get people to use this technology.\u201d\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EThis up-and-coming technology has been part of Li\u2019s research for some time. His prior work provided a new security analysis of the FIDO2 authentication protocol, which includes passkeys.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003ELi\u2019s CAREER project will investigate real-world uses of FIDO2\/passkeys and security and usability issues that can arise. A goal of his research is to identify and resolve problems before they become widespread and more difficult to address.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cThere\u2019s still a lot to do when it comes to authentication research, and there\u2019s even more to be done with passkeys,\u201d he said.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u201cOnline authentication is a core function needed for online security. Making any changes to it will have huge implications. For example, accounts that send spam and phishing attacks are often accounts with compromised passwords. A \u003Ca href=\u0022https:\/\/www.forbes.com\/sites\/tonybradley\/2025\/05\/01\/are-we-finally-entering-a-passwordless-era\/\u0022\u003Epasswordless future\u003C\/a\u003E will reduce that threat.\u201d\u003C\/p\u003E\u003Cp\u003EThe final component of Li\u2019s CAREER Award is an educational outreach program. The NSF wants researchers to inspire the next generation of scientists as a part of their projects. Li plans to reach out to Atlanta high schools and engage their computer science programs.\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\u0022https:\/\/www.nsf.gov\/funding\/opportunities\/career-faculty-early-career-development-program\u0022\u003ENSF CAREER Awards\u003C\/a\u003E are prestigious federal grants given to early career academic faculty and are widely recognized as a career defining moment. Li\u2019s project will be conducted in the School of Cybersecurity and Privacy as well as the School of Electrical and Computer Engineering.\u0026nbsp;\u003C\/p\u003E\u003C\/div\u003E\u003C\/div\u003E","summary":"","format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EAlthough they are currently essential to online security and privacy, the days of relying on password protection may be numbered, thanks to Assistant Professor \u003Cstrong\u003EFrank Li\u003C\/strong\u003E and his National Science Foundation (NSF) CAREER Award project.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Although they are currently essential to online security and privacy, the days of relying on password protection may be numbered, thanks to Assistant Professor Frank Li and his National Science Foundation (NSF) CAREER Award project."}],"uid":"36253","created_gmt":"2025-11-03 14:35:58","changed_gmt":"2025-11-03 14:41:22","author":"John Popham","boilerplate_text":"","field_publication":"","field_article_url":"","location":"Atlanta, GA","dateline":{"date":"2025-11-03T00:00:00-05:00","iso_date":"2025-11-03T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"hg_media":{"678516":{"id":"678516","type":"image","title":"Frank-Li_86A0205-Enhanced-NR-copy.jpg","body":"\u003Cp\u003EAssistant Professor Frank Li standing outside of the Coda Building in Tech Square. \u003Cem\u003EPhotos by Terence Rushin\/College of Computing\u003C\/em\u003E\u003C\/p\u003E","created":"1762180596","gmt_created":"2025-11-03 14:36:36","changed":"1762180596","gmt_changed":"2025-11-03 14:36:36","alt":"A man standing outside in a building breezeway. He is wearing glasses, a blue polo and is smiling.","file":{"fid":"262565","name":"Frank-Li_86A0205-Enhanced-NR-copy.jpg","image_path":"\/sites\/default\/files\/2025\/11\/03\/Frank-Li_86A0205-Enhanced-NR-copy.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/2025\/11\/03\/Frank-Li_86A0205-Enhanced-NR-copy.jpg","mime":"image\/jpeg","size":1195801,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/2025\/11\/03\/Frank-Li_86A0205-Enhanced-NR-copy.jpg?itok=4KqQsNnG"}}},"media_ids":["678516"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"1188","name":"Research Horizons"},{"id":"660367","name":"School of Cybersecurity and Privacy"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"},{"id":"135","name":"Research"}],"keywords":[],"core_research_areas":[{"id":"145171","name":"Cybersecurity"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003EJohn Popham\u0026nbsp;Communications Officer II | School of Cybersecurity and Privacy\u003C\/p\u003E","format":"limited_html"}],"email":["jpopham3@gatech.edu"],"slides":[],"orientation":[],"userdata":""}},"684748":{"#nid":"684748","#data":{"type":"news","title":"Psychological Fallout: DARPA-Backed Project Addresses Societal Toll of Cyberattacks","body":[{"value":"\u003Cdiv\u003E\u003Cdiv\u003E\u003Cp\u003EThe United States has prepared for decades to defend itself from every conceivable military conflict on its shores, but it turns out psychological warfare, not missiles, might pose the greatest threat to national security.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EThis is a challenge Assistant Professor \u003Ca href=\u0022https:\/\/sites.google.com\/view\/ryanshandler\u0022\u003ERyan Shandler\u003C\/a\u003E will spend the next two years exploring as a recipient of the Young Faculty Award from the Defense Advanced Research Projects Agency (DARPA).\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EDARPA uses this award to recognize up-and-coming early-career faculty it hopes to continue working with in the future.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003ECurrently, DARPA is concerned with cyberattacks from foreign countries aimed at provoking social unrest and eroding public trust in democratic institutions. In a study released last year by \u003Ca href=\u0022https:\/\/news.microsoft.com\/en-cee\/2024\/11\/29\/microsoft-digital-defense-report-600-million-cyberattacks-per-day-around-the-globe\/\u0022\u003EMicrosoft\u003C\/a\u003E, it was estimated that 600 million cyberattacks were launched everyday by criminals and \u003Ca href=\u0022https:\/\/www.cisa.gov\/topics\/cyber-threats-and-advisories\/nation-state-cyber-actors\u0022\u003Enation-state actors\u003C\/a\u003E from July 2023 to July 2024. \u0026nbsp;\u003C\/p\u003E\u003Cp\u003ETools built by cybersecurity engineers help mitigate the attacks made by criminals and in some cases even help \u003Ca href=\u0022https:\/\/www.cc.gatech.edu\/news\/follow-money-2-billion-crypto-scams-found-ethereum\u0022\u003Etrack down\u003C\/a\u003E stolen money. However, nation-state actors don\u2019t launch cyberattacks to score a payday.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EInstead, they attack things like \u003Ca href=\u0022https:\/\/www.resecurity.com\/blog\/article\/cyber-threats-against-energy-sector-surge-global-tensions-mount\u0022\u003Epower plants\u003C\/a\u003E or \u003Ca href=\u0022https:\/\/www.cnn.com\/2024\/11\/05\/us\/georgia-non-credible-bomb-threat-russia\u0022\u003Evoting precincts\u003C\/a\u003E as a show of strength. Exposing these vulnerabilities shows how unsafe life could be, and these actors want nothing more than to cause total panic.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003ESo now instead looking only to hardware and software for the solution to this problem, DARPA is investing in the human dimension of cybersecurity.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EThis area has long been a focus of \u003Ca href=\u0022https:\/\/www.cc.gatech.edu\/news\/knowing-half-battle-new-faculty-explores-human-dimension-cybersecurity\u0022\u003EShandler\u2019s research\u003C\/a\u003E, making him uniquely qualified to confront this previously overlooked vulnerability. His past experiments have already shown how cyberattacks generate severe public anxiety and prompt calls for physical military retaliation.\u003C\/p\u003E\u003Cp\u003EFor this new project, he will track a controlled population of several thousand people by exposing them to simulated cyberattacks. At no point will the participants be made to think the attacks are real. Shandler and his team will then interview the participants to gauge how their experience impacted their perception of security.\u003C\/p\u003E\u003Cp\u003E\u201cWe are looking to see which groups are more susceptible to this kind of cumulative threat. \u0026nbsp;Once we model the risk, the next step will be building countermeasures to defend against it,\u201d he said.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EHowever, creating a defense system that promotes societal resilience will be as challenging as it is revolutionary.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u0022I\u0027m fortunate to be conducting this research in an interdisciplinary unit like the School of Cybersecurity and Privacy. Tackling a challenge of this scale requires computer scientists and social scientists working side by side,\u201d Shandler said.\u003C\/p\u003E\u003Cp\u003E\u201cAlone, neither field stands a chance\u2014but together, we stand a real chance of success.\u0022\u003C\/p\u003E\u003Cp\u003EShandler is jointly appointed with the \u003Ca href=\u0022https:\/\/scp.cc.gatech.edu\/\u0022\u003ESchool of Cybersecurity and Privacy\u003C\/a\u003E and the \u003Ca href=\u0022https:\/\/inta.gatech.edu\/\u0022\u003ESam Nunn School of International Affairs\u003C\/a\u003E.\u003C\/p\u003E\u003C\/div\u003E\u003C\/div\u003E","summary":"","format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EGeorgia Tech Assistant Professor Ryan Shandler has received a DARPA Young Faculty Award to lead a two-year study on the psychological and societal impacts of cyberattacks. Unlike traditional cybersecurity efforts that focus on technical defenses, this project examines how cyberattacks\u2014especially by nation-state actors\u2014can erode public trust, create anxiety, and destabilize societies. Using controlled simulations with thousands of participants, the research will explore how different groups react to cyber threats and aim to identify ways to build societal resilience against the psychological fallout of such attacks.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Georgia Tech Assistant Professor Ryan Shandler has received a DARPA Young Faculty Award to lead a two-year study on the psychological and societal impacts of cyberattacks."}],"uid":"36253","created_gmt":"2025-09-11 14:11:28","changed_gmt":"2025-09-15 14:53:17","author":"John Popham","boilerplate_text":"","field_publication":"","field_article_url":"","location":"Atlanta, GA","dateline":{"date":"2025-09-10T00:00:00-04:00","iso_date":"2025-09-10T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"677976":{"id":"677976","type":"image","title":"Ryan-Shandler-2025-2.jpg","body":null,"created":"1757599954","gmt_created":"2025-09-11 14:12:34","changed":"1757599954","gmt_changed":"2025-09-11 14:12:34","alt":"A man with salt and pepper hair and beard stands in a hallway wearing a white buton up shirt. There is a modern wooden panel behind him which reflects light and the purple color from the other walls.","file":{"fid":"261943","name":"Ryan-Shandler-2025-2.jpg","image_path":"\/sites\/default\/files\/2025\/09\/11\/Ryan-Shandler-2025-2.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/2025\/09\/11\/Ryan-Shandler-2025-2.jpg","mime":"image\/jpeg","size":1418844,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/2025\/09\/11\/Ryan-Shandler-2025-2.jpg?itok=P7jqND27"}}},"media_ids":["677976"],"related_links":[{"url":"https:\/\/scp.cc.gatech.edu\/","title":"School of Cybersecurity and Privacy"}],"groups":[{"id":"47223","name":"College of Computing"},{"id":"1188","name":"Research Horizons"},{"id":"660367","name":"School of Cybersecurity and Privacy"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"},{"id":"151","name":"Policy, Social Sciences, and Liberal Arts"},{"id":"135","name":"Research"}],"keywords":[{"id":"365","name":"Research"},{"id":"1404","name":"Cybersecurity"},{"id":"167871","name":"social scientists"}],"core_research_areas":[{"id":"145171","name":"Cybersecurity"},{"id":"39481","name":"National Security"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003EJohn Popham\u0026nbsp;Communications Officer II | School of Cybersecurity and Privacy\u003C\/p\u003E","format":"limited_html"}],"email":["jpopham3@gatech.edu"],"slides":[],"orientation":[],"userdata":""}}}