<nodes> <node id="689263">  <title><![CDATA[Transformer Explainer Shows How AI is More Math than Human]]></title>  <uid>36319</uid>  <body><![CDATA[<p>While people use search engines, chatbots, and generative artificial intelligence tools every day, most don’t know how they work. This sets unrealistic expectations for AI and leads to misuse. It also slows progress toward building new AI applications.&nbsp;</p><p>Georgia Tech researchers are making AI easier to understand through their work on Transformer Explainer. The free, online tool shows non-experts how ChatGPT, Claude, and other large language models (LLMs) process language.&nbsp;</p><p><a href="https://poloclub.github.io/transformer-explainer/">Transformer Explainer</a> is easy to use and runs on any web browser. It quickly went viral after its debut, reaching 150,000 users in its first three months. More than 563,000 people worldwide have used the tool so far.</p><p>Global interest in Transformer Explainer continues when the team presents the tool at the 2026 Conference on Human Factors in Computing Systems (<a href="https://chi2026.acm.org/">CHI 2026</a>). CHI, the world’s most prestigious conference on human-computer interaction, will take place in Barcelona, April 13-17.</p><p>[<a href="https://sites.gatech.edu/research/chi-2026/">Related: GT @ CHI 2026</a>]</p><p>“There are moments when LLMs can seem almost like a person with their own will and personality, and that misperception has real consequences. For example, there have been cases where teenagers have made poor decisions based on conversations with LLMs,” said Ph.D. student&nbsp;<a href="https://aereeeee.github.io/">Aeree Cho</a>.</p><p>“Understanding that an LLM is fundamentally a model that predicts the probability distribution of the next token helps users avoid taking its outputs as absolute. What you put in shapes what comes out, and that understanding helps people engage with AI more carefully and critically.”</p><p>A transformer is a neural network architecture that changes data input sequence into an output. Text, audio, and images are forms of processed data, which is why transformers are common in generative AI models. They do this by learning context and tracking mathematical relationships between sequence components.</p><p>Transformer Explainer demystifies how transformers work. The platform uses visualization and interaction to show, step by step, how text flows through a model and produces predictions.</p><p>Using this approach, Transformer Explainer impacts the AI landscape in four main ways:</p><ul><li>It counters hype and misconceptions surrounding AI by showing how transformers work.</li><li>It improves AI literacy among users by removing technical barriers and lowering the entry for learning about AI.</li><li>It expands AI education by helping instructors teach AI mechanisms without extensive setup or computing resources.</li><li>It influences future development of AI tools and educational techniques by providing a blueprint for interpretable AI systems.</li></ul><p>“When I first learned about transformers, I felt overwhelmed. A transformer model has many parts, each with its own complex math. Existing resources typically present all this information at once, making it difficult to see how everything fits together,” said&nbsp;<a href="https://gracekimcy.github.io/">Grace Kim</a>, a dual B.S./M.S. computer science student.&nbsp;</p><p>“By leveraging interactive visualization, we use levels of abstraction to first show the big picture of the entire model. Then users click into individual parts to reveal the underlying details and math. This way, Transformer Explainer makes learning far less intimidating.”</p><p>Many users don’t know what transformers are or how they work. The Georgia Tech team found that people often misunderstand AI. Some label AI with human-like characteristics, such as creativity. Others even describe it as working like magic.</p><p>Furthermore, barriers make it hard for students interested in transformers to start learning. Tutorials tend to be too technical and overwhelm beginners with math and code. While visualization tools exist, these often target more advanced AI experts.</p><p>Transformer Explainer overcomes these obstacles through its interactive, user-focused platform. It runs a familiar GPT model directly in any web browser, requiring no installation or special hardware.&nbsp;</p><p>Users can enter their own text and watch the model predict the next word in real time. Sankey-style diagrams show how information moves through embeddings, attention heads, and transformer blocks.</p><p>The platform also lets users switch between high-level concepts and detailed math. By adjusting temperature settings, users can see how randomness affects predictions. This reveals how probabilities drive AI outputs, rather than creativity.</p><p>“Millions of people around the world interact with transformer-driven AI. We believe that it is crucial to bridge the gap between day-to-day user experience and the models' technical reality, ensuring these tools are not misinterpreted as human-like or seen as sentient,” said Ph.D. student&nbsp;<a href="https://www.alexkarpekov.com/">Alex Karpekov</a>.&nbsp;</p><p>“Explaining the architecture helps users recognize that language generated by models is a product of computation, leading to a more grounded engagement with the technology.”&nbsp;</p><p>Cho, Karpekov, and Kim led the development of Transformer Explainer. Ph.D. students&nbsp;<a href="https://alechelbling.com/">Alec Helbling</a>,&nbsp;<a href="https://seongmin.xyz/">Seongmin Lee</a>,&nbsp;<a href="https://bhoov.com/">Ben Hoover</a>, and alumni&nbsp;<a href="https://zijie.wang/">Zijie (Jay) Wang</a> (Ph.D. ML-CSE 2024) and <a href="https://minsuk.com/">Minsuk Kahng</a> (Ph.D. CS-CSE 2019) assisted on the project.&nbsp;</p><p>Professor&nbsp;<a href="https://poloclub.github.io/polochau/">Polo Chau</a> supervised the group and their work. His lab focuses on data science, human-centered AI, and visualization for social good.</p><p>Acceptance at CHI 2026 stems from the team winning the best poster award at the 2024 IEEE Visualization Conference. This recognition from one of the top venues in visualization research highlights Transformer Explainer’s effectiveness in teaching how transformers work.</p><p>“Transformer Explainer has reached over half a million learners worldwide,” said Chau, a faculty member in the School of Computational Science and Engineering.&nbsp;</p><p>“I'm thrilled to see it extend Georgia Tech's mission of expanding access to higher education, now to anyone with a web browser.”</p>]]></body>  <author>Bryant Wine</author>  <status>1</status>  <created>1774975377</created>  <gmt_created>2026-03-31 16:42:57</gmt_created>  <changed>1776452289</changed>  <gmt_changed>2026-04-17 18:58:09</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Georgia Tech researchers are making AI easier to understand through their work on Transformer Explainer. The free, online tool shows non-experts how ChatGPT, Claude, and other large language models (LLMs) process language, improving AI literacy.]]></teaser>  <type>news</type>  <sentence><![CDATA[Georgia Tech researchers are making AI easier to understand through their work on Transformer Explainer. The free, online tool shows non-experts how ChatGPT, Claude, and other large language models (LLMs) process language, improving AI literacy.]]></sentence>  <summary><![CDATA[<p>While people use search engines, chatbots, and generative artificial intelligence tools every day, most don’t know how they work. This sets unrealistic expectations for AI and leads to misuse. It also slows progress toward building new AI applications.&nbsp;</p><p>Georgia Tech researchers are making AI easier to understand through their work on Transformer Explainer. The free, online tool shows non-experts how ChatGPT, Claude, and other large language models (LLMs) process language.&nbsp;</p><p><a href="https://poloclub.github.io/transformer-explainer/">Transformer Explainer</a> is easy to use and runs on any web browser. It quickly went viral after its debut, reaching 150,000 users in its first three months. More than 563,000 people worldwide have used the tool so far.</p><p>Global interest in Transformer Explainer continues when the team presents the tool at the 2026 Conference on Human Factors in Computing Systems (<a href="https://chi2026.acm.org/">CHI 2026</a>). CHI, the world’s most prestigious conference on human-computer interaction, will take place in Barcelona, April 13-17.</p>]]></summary>  <dateline>2026-03-31T00:00:00-04:00</dateline>  <iso_dateline>2026-03-31T00:00:00-04:00</iso_dateline>  <gmt_dateline>2026-03-31 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[<p>Bryant Wine, Communications Officer<br><a href="mailto:bryant.wine@cc.gatech.edu">bryant.wine@cc.gatech.edu</a></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>679798</item>          <item>679799</item>      </media>  <hg_media>          <item>          <nid>679798</nid>          <type>image</type>          <title><![CDATA[Transformer-Explainer-Head-Image.jpg]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Transformer-Explainer-Head-Image.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2026/03/31/Transformer-Explainer-Head-Image.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/2026/03/31/Transformer-Explainer-Head-Image.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2026/03/31/Transformer-Explainer-Head-Image.jpg?itok=130OUqJ3]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[CHI 2026 Transformer Explainer]]></image_alt>                    <created>1774975392</created>          <gmt_created>2026-03-31 16:43:12</gmt_created>          <changed>1774975392</changed>          <gmt_changed>2026-03-31 16:43:12</gmt_changed>      </item>          <item>          <nid>679799</nid>          <type>image</type>          <title><![CDATA[Transformer-Explainer-Text-Image.jpg]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Transformer-Explainer-Text-Image.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2026/03/31/Transformer-Explainer-Text-Image.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/2026/03/31/Transformer-Explainer-Text-Image.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2026/03/31/Transformer-Explainer-Text-Image.jpg?itok=aZBsyuGc]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[CHI 2026 Transformer Explainer]]></image_alt>                    <created>1774975428</created>          <gmt_created>2026-03-31 16:43:48</gmt_created>          <changed>1774975428</changed>          <gmt_changed>2026-03-31 16:43:48</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[https://www.cc.gatech.edu/news/transformer-explainer-shows-how-ai-more-math-human]]></url>        <title><![CDATA[Transformer Explainer Shows How AI is More Math than Human]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>          <group id="50877"><![CDATA[School of Computational Science and Engineering]]></group>      </groups>  <categories>          <category tid="130"><![CDATA[Alumni]]></category>          <category tid="194606"><![CDATA[Artificial Intelligence]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="134"><![CDATA[Student and Faculty]]></category>          <category tid="8862"><![CDATA[Student Research]]></category>      </categories>  <news_terms>          <term tid="130"><![CDATA[Alumni]]></term>          <term tid="194606"><![CDATA[Artificial Intelligence]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="134"><![CDATA[Student and Faculty]]></term>          <term tid="8862"><![CDATA[Student Research]]></term>      </news_terms>  <keywords>          <keyword tid="654"><![CDATA[College of Computing]]></keyword>          <keyword tid="166983"><![CDATA[School of Computational Science and Engineering]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="9153"><![CDATA[Research Horizons]]></keyword>          <keyword tid="10199"><![CDATA[Daily Digest]]></keyword>          <keyword tid="181991"><![CDATA[Georgia Tech News Center]]></keyword>          <keyword tid="170447"><![CDATA[Institute for Data Engineering and Science]]></keyword>          <keyword tid="176858"><![CDATA[machine learning center]]></keyword>          <keyword tid="9167"><![CDATA[machine learning]]></keyword>          <keyword tid="187812"><![CDATA[artificial intelligence (AI)]]></keyword>          <keyword tid="14646"><![CDATA[human-computer interaction]]></keyword>          <keyword tid="192863"><![CDATA[go-ai]]></keyword>          <keyword tid="194384"><![CDATA[Tech AI]]></keyword>      </keywords>  <core_research_areas>          <term tid="193655"><![CDATA[Artificial Intelligence at Georgia Tech]]></term>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata><![CDATA[]]></userdata></node><node id="689428">  <title><![CDATA[Researchers Build AI Tutor Grounded in Course Materials]]></title>  <uid>36532</uid>  <body><![CDATA[<p>As students increasingly turn to artificial intelligence (AI) to help with coursework, some worry that their learning could be compromised. Georgia Tech researchers are working to counter this potential decline with an AI tool they hope will promote learning rather than hinder it.&nbsp;&nbsp;</p><p>TokenSmith is a citation-supported large language model (LLM) tutor that can be hosted locally on a user’s personal computer. The tutor only provides answers based on course materials, such as the textbook or lecture slides.&nbsp;&nbsp;</p><p>Associate Professor <a href="https://faculty.cc.gatech.edu/~jarulraj/"><strong>Joy Arulraj</strong></a> began the project with support from the <a href="https://research.gatech.edu/c21u-announces-inaugural-bill-kent-ai-higher-education-fellows"><strong>Bill Kent Family Foundation AI in Higher Education Faculty Fellowship</strong></a> last year. The fellowship, led by Georgia Tech’s Center for 21st Century Universities, supports faculty projects exploring innovative and ethical uses of AI in teaching.&nbsp;&nbsp;&nbsp;</p><p>Arulraj has enlisted assistant professors <a href="https://kexinrong.github.io/"><strong>Kexin Rong</strong></a> and <a href="https://steve.mussmann.us/"><strong>Steve Mussmann</strong></a> to help build TokenSmith.&nbsp;&nbsp;</p><p>Mussmann said TokenSmith is a synergistic blend of a database system and a machine learning system. The model stores textbooks, textbook annotations by course staff, common questions and answers, a learning state of the student, and student feedback in a structured database system. However, machine learning plays a key role in the answer generation as well as adapting the system to the student, course staff guidance, and user feedback.</p><p>"What excites me most is demonstrating how data-driven ML and principled database systems design can reinforce each other — one providing adaptability and flexibility, the other providing structure and traceability — in a way that benefits students," Mussmann said.</p><p>Keeping the model local has been an important focus of the project. The team wanted to create an AI tutor that helps students learn from their class resources rather than just giving answers. With each response, TokenSmith cites the origin of the answer in the provided documents.&nbsp;&nbsp;</p><p>“One problem with LLMs is that they can hallucinate and provide wrong answers, but in this controlled environment, we can add these guardrails to make sure it’s actually helpful in an educational setting,” Rong said.&nbsp;&nbsp;</p><p>Rong said she feels that students often undervalue textbooks, and she hopes TokenSmith can motivate students to make better use of them. &nbsp;</p><p>“Textbooks can sometimes be daunting, but maybe if we combine them with the model, students might be more willing to read a paragraph or page in the textbook, and that could help clarify something for them,” she said.&nbsp;&nbsp;</p><p>Running the model locally is more cost-effective and helps preserve the user’s privacy. But running the new tool locally comes with technical challenges.&nbsp;&nbsp;</p><p>One challenge with creating the model is speed. Since it is a locally based model, TokenSmith depends solely on the user’s computer memory. &nbsp;Tests have also shown that the tutor currently struggles to answer more complex questions.&nbsp;</p><p>“We are interested in pushing the boundaries of these local models so that they give students good answers and also run fast enough to keep students engaged,” Arulraj said.&nbsp;&nbsp;</p>]]></body>  <author>Morgan Usry</author>  <status>1</status>  <created>1775161502</created>  <gmt_created>2026-04-02 20:25:02</gmt_created>  <changed>1775161836</changed>  <gmt_changed>2026-04-02 20:30:36</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[TokenSmith is a citation-supported large language model (LLM) tutor that can be hosted locally on a user’s personal computer. The tutor only provides answers based on course materials, such as the textbook or lecture slides.  ]]></teaser>  <type>news</type>  <sentence><![CDATA[TokenSmith is a citation-supported large language model (LLM) tutor that can be hosted locally on a user’s personal computer. The tutor only provides answers based on course materials, such as the textbook or lecture slides.  ]]></sentence>  <summary><![CDATA[<p>TokenSmith is a citation-supported large language model (LLM) tutor that can be hosted locally on a user’s personal computer. The tutor only provides answers based on course materials, such as the textbook or lecture slides.&nbsp;&nbsp;</p><p>Associate Professor <a href="https://faculty.cc.gatech.edu/~jarulraj/"><strong>Joy Arulraj</strong></a> began the project with support from the <a href="https://research.gatech.edu/c21u-announces-inaugural-bill-kent-ai-higher-education-fellows"><strong>Bill Kent Family Foundation AI in Higher Education Faculty Fellowship</strong></a> last year. The fellowship, led by Georgia Tech’s Center for 21st Century Universities, supports faculty projects exploring innovative and ethical uses of AI in teaching.</p>]]></summary>  <dateline>2026-04-02T00:00:00-04:00</dateline>  <iso_dateline>2026-04-02T00:00:00-04:00</iso_dateline>  <gmt_dateline>2026-04-02 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[morgan.usry@cc.gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>Morgan Usry, Communications Officer</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>679842</item>      </media>  <hg_media>          <item>          <nid>679842</nid>          <type>image</type>          <title><![CDATA[AI-Tutor-Image.jpg.jpeg]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[AI-Tutor-Image.jpg.jpeg]]></image_name>            <image_path><![CDATA[/sites/default/files/2026/04/02/AI-Tutor-Image.jpg.jpeg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/2026/04/02/AI-Tutor-Image.jpg.jpeg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2026/04/02/AI-Tutor-Image.jpg.jpeg?itok=Xnge4x3r]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Graphic showing the researchers in front of a computer screen]]></image_alt>                    <created>1775161510</created>          <gmt_created>2026-04-02 20:25:10</gmt_created>          <changed>1775161510</changed>          <gmt_changed>2026-04-02 20:25:10</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>          <group id="50875"><![CDATA[School of Computer Science]]></group>      </groups>  <categories>          <category tid="194606"><![CDATA[Artificial Intelligence]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="42911"><![CDATA[Education]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="194606"><![CDATA[Artificial Intelligence]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="42911"><![CDATA[Education]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="193860"><![CDATA[Artifical Intelligence]]></keyword>          <keyword tid="192863"><![CDATA[go-ai]]></keyword>          <keyword tid="194701"><![CDATA[go-resarchnews]]></keyword>          <keyword tid="9153"><![CDATA[Research Horizons]]></keyword>          <keyword tid="10199"><![CDATA[Daily Digest]]></keyword>          <keyword tid="194394"><![CDATA[AI in Education]]></keyword>      </keywords>  <core_research_areas>          <term tid="193655"><![CDATA[Artificial Intelligence at Georgia Tech]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata><![CDATA[]]></userdata></node><node id="689256">  <title><![CDATA[New Study Shows Explainability is a Must for Older Adults to Trust AI]]></title>  <uid>36530</uid>  <body><![CDATA[<p>Voice-activated, conversational artificial intelligence (AI) agents must provide clear explanations for their suggestions, or older adults aren’t likely to trust them.</p><p>That’s one of the main findings from a study by AI Caring on what older adults expect from explainable AI (XAI).</p><p><a href="https://ai-caring.org/"><strong>AI Caring</strong></a> is one of three AI Institutions led by Georgia Tech and funded by the National Science Foundation (NSF). The institution supports AI research that benefits older adults and their caregivers.</p><p>Niharika Mathur, a Ph.D. candidate in the School of Interactive Computing, was the lead author of a paper based on the study. The paper will be presented in April at the <a href="https://chi2026.acm.org/"><strong>2026 ACM Conference on Human Factors in Computing Systems (CHI) in Barcelona</strong></a>.</p><p>Mathur worked with the <a href="https://empowerment.emory.edu/"><strong>Cognitive Empowerment Program at Emory University</strong></a> to interview 23 older adults who live alone and use voice-activated AI assistants like Amazon’s Alexa and Google Home.</p><p>Many of them told her they feel excluded from the design of these products.</p><p>“The assumption is that all people want interactions the same way and across all kinds of situations, but that isn’t true,” Mathur said. “How older people use AI and what they want from it are different from what younger people prefer.”</p><p>One example she gave is that young people tend to be informal when talking with AI. Older people, on the other hand, talk to the agent like they would a person.</p><p>“If Older adults are talking to their family members about Alexa, they usually refer to Alexa as ‘she’ instead of ‘it,’” Mathur said. “They tend to humanize these systems a lot more than young people.”</p><h4><strong>Good Explanations</strong></h4><p>The study evaluated AI explanations that drew information from four sources of data:</p><ul><li>User history (past conversations with the agent)</li><li>Environmental data (indoor temperature or the weather forecast)</li><li>Activity data (how much time a user spends in different areas of the home)</li><li>Internal reasoning (mathematical probabilities and likely outcomes)</li></ul><p>Mathur said older users trust the agent more when it bases its explanations on data from the first three sources. However, internal reasoning creates skepticism.</p><p>Internal reasoning means the AI doesn’t have enough data from the other sources to give an explanation. It provides a percentage to reflect its confidence based on what it knows.</p><p>“The overwhelming response was negative toward confidence scores,” Mathur said. “If the AI says it’s 92% confident, older adults want to know what that’s based on.”</p><p>This is another example that Mathur said points to generational preferences.</p><p>“There’s a lot of explainable AI research that shows younger people like to see numbers in explanations, and they also tend to rely too much on explanations that contain numerical confidence. Older adults are the opposite. It makes them trust it less.”</p><h4><strong>Knowing the Context</strong></h4><p>Mathur said that AI agents interacting with older adults should serve a dual purpose. They should provide users with companionship and support independence while reducing the caretaking burden often placed on family members.&nbsp;</p><p>Some studies have shown that engineers have tended to favor caretakers in the design of these tools. They prioritize daily tasks and routines, leaving some older adults to feel like they are merely a box to be checked.</p><p>She discovered that in urgent situations, older users prefer the AI to be straightforward, while in casual settings, they desire more conversation.</p><p>“How people interact with technological systems is grounded in what the stakes of the situation are,” she said. “If it had anything to do with their immediate sense of safety, they did not want conversational elaboration. They want the AI to be very direct and factual.”</p><h4><strong>Not Just Checking Boxes</strong></h4><p>Mathur said AI agents that interact with older adults are ideally constructed with a dual purpose. They should provide companionship and autonomy for the users while alleviating the burden of caretaking that is often placed on their family members.&nbsp;</p><p>Some studies have shown that engineers have strayed toward favoring caretakers in the design of these tools. They prioritize daily tasks and routines, leaving some older adults to feel like they are a box to be checked.</p><p>“They’re not being thought of as consumers,” Mathur said. “A lot of products are being made for them but not with them.”</p><p>She also said psychological well-being is one of the most important outcomes these tools should produce.&nbsp;</p><p>Showing older adults that they are listened to can significantly help in gaining their trust. Some interviewees told Mathur they want agents who are deliberate about understanding their preferences and don’t dismiss their questions.</p><p>Meeting these needs reduces the likelihood of protesting and creating conflict with family members.</p><p>“It highlights just how important well-designed explanations are,” she said. “We must go beyond a transparency checklist.”</p>]]></body>  <author>Nathan Deen</author>  <status>1</status>  <created>1774965667</created>  <gmt_created>2026-03-31 14:01:07</gmt_created>  <changed>1774965899</changed>  <gmt_changed>2026-03-31 14:04:59</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[A Georgia Tech study finds older adults are more likely to trust voice-activated AI systems when those systems clearly explain how and why they make decisions.]]></teaser>  <type>news</type>  <sentence><![CDATA[A Georgia Tech study finds older adults are more likely to trust voice-activated AI systems when those systems clearly explain how and why they make decisions.]]></sentence>  <summary><![CDATA[<p>An AI Caring study led by Georgia Tech researchers shows that older adults are more likely to trust conversational AI systems that provide them with clear explanations for their decision-making. The study also shows that including older adults more in the design process benefits their well-being and reduces the caretaking burden of family members</p>]]></summary>  <dateline>2026-03-31T00:00:00-04:00</dateline>  <iso_dateline>2026-03-31T00:00:00-04:00</iso_dateline>  <gmt_dateline>2026-03-31 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>679796</item>      </media>  <hg_media>          <item>          <nid>679796</nid>          <type>image</type>          <title><![CDATA[0A6A0355.jpg]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[0A6A0355.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2026/03/31/0A6A0355.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/2026/03/31/0A6A0355.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2026/03/31/0A6A0355.jpg?itok=eU9yywHp]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[An older couple sitting on a couch as a man helps them use Amazon's Alexa]]></image_alt>                    <created>1774965687</created>          <gmt_created>2026-03-31 14:01:27</gmt_created>          <changed>1774965687</changed>          <gmt_changed>2026-03-31 14:01:27</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>      </groups>  <categories>          <category tid="194606"><![CDATA[Artificial Intelligence]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="194606"><![CDATA[Artificial Intelligence]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="192863"><![CDATA[go-ai]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="9153"><![CDATA[Research Horizons]]></keyword>          <keyword tid="193860"><![CDATA[Artifical Intelligence]]></keyword>          <keyword tid="187812"><![CDATA[artificial intelligence (AI)]]></keyword>          <keyword tid="14342"><![CDATA[older adults]]></keyword>          <keyword tid="148721"><![CDATA[Amazon Alexa]]></keyword>      </keywords>  <core_research_areas>          <term tid="193655"><![CDATA[Artificial Intelligence at Georgia Tech]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata><![CDATA[]]></userdata></node><node id="689250">  <title><![CDATA[Researchers Look to Bolster Technology Support for Menopause]]></title>  <uid>36530</uid>  <body><![CDATA[<p>Women in need of supportive maternal and menstrual healthcare in patriarchal societies have increasingly found outlets for disclosure in online communities.</p><p>That support, however, begins to disappear in these restrictive cultures once women reach menopause, according to new research from Georgia Tech</p><p>Naveena Karusala, an assistant professor in Georgia Tech’s School of Interactive Computing, and master’s student Umme Ammara are working toward improving existing technologies and designing new ones for a demographic they believe has been neglected.</p><p>Karusala and Ammara co-authored a paper based on a study they conducted with women in urban Pakistan experiencing menopause.</p><p>“Women’s health is understudied in general, but menopause is more neglected than other women’s health issues,” Karusala said. “Our choice to focus on menopause is motivated by expanding how we holistically think about women’s well-being across their lifespan.”</p><p>Karusala and Ammara will present their paper in April at the 2026 ACM Conference on Human Factors in Computing Systems (CHI) in Barcelona.</p><h4><strong>Masking Symptoms</strong></h4><p>Menopause is diagnosed after 12 consecutive months without a period, vaginal bleeding, or spotting. The transition to menopause, called perimenopause, usually happens over two to eight years.</p><p>Hormone changes may cause symptoms such as irregular periods, vaginal dryness, hot flashes, night sweats, trouble sleeping, mood swings, and brain fog.</p><p>These symptoms can be debilitating in some cases and affect daily life. However, Ammara said women are pressured to remain silent, maintain appearances, and regulate their emotions to meet social expectations.</p><p>“Understanding menopause is important because a woman would be experiencing all these symptoms, and people will not understand those as actual symptoms,” Ammara said. “There’s been resistance to the idea of the medicalization of menopause. People don’t view it as an illness, but as a life transition and something that happens naturally.”</p><h4><strong>Feeling Isolated</strong></h4><p>The women interviewed by Karusala and Ammara either stayed at home full-time or were part of the workforce.</p><p>The researchers discovered that trusted family members might be the only sources women who stay at home and do not work turn to for disclosure.&nbsp;</p><p>“Women at home have the flexibility to take breaks or work at their own pace, so a lot of their experience is shaped by the emotional barriers they face,” Ammara said.&nbsp;</p><p>“That could come from their husbands and family members. Some are supportive and some are not. They might weaponize it and use that term against them, or they might dismiss what they’re going through.”</p><p>Ammara said it might be easier for women in the workforce to confide in their coworkers, but explaining to an employer that they need sick leave for menopause symptoms can be intimidating.</p><p>Even in online communities that have enabled women to anonymously share their health experiences, menopause is seldom discussed.</p><h4><strong>Raising Awareness</strong></h4><p>Karusala and Ammara argue in their paper that a public health approach could be the most effective way to spark conversation about menopause in a patriarchal culture in which technology use varies.</p><p>They said the challenge in implementing technologies geared toward menopause support is that the condition isn’t well understood in public. Improving maternal health, for example, is easier to promote within these societies because of the general understanding that motherhood is important.</p><p>“There must be an existing infrastructure to build on,” Karusala said. “For example, menstrual and maternal health are taught in schools and regularly discussed in primary care. Cultural and social meaning and importance are placed on motherhood.</p><p>“A lot of that doesn’t exist for menopause. Primary care doctors are unprepared to talk about menopause compared to other health issues.”</p><h4><strong>Design Solutions</strong></h4><p>Ammara said that the most effective way for technologies to make an impact on women going through menopause is to directly address systemic power structures around women’s health within Pakistani culture.</p><p>It can start with the husbands.&nbsp;</p><p>“Framing the issue for husbands to understand menopause should be at the forefront of designing technology solutions,” she said.&nbsp;</p><p>“In Islamic contexts, we suggest using faith-based framings. This has been proposed for maternal health in prior works that draw on Islamic principles to engage expectant fathers in providing care and support. Framing it around religious responsibility to involve men in the journey can also be done for menopause.”</p>]]></body>  <author>Nathan Deen</author>  <status>1</status>  <created>1774958953</created>  <gmt_created>2026-03-31 12:09:13</gmt_created>  <changed>1774963087</changed>  <gmt_changed>2026-03-31 13:18:07</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Georgia Tech researchers are looking at how technology can better support women experiencing menopause in urban Pakistan, where patriarchal norms leave them largely isolated and without resources for managing their symptoms.]]></teaser>  <type>news</type>  <sentence><![CDATA[Georgia Tech researchers are looking at how technology can better support women experiencing menopause in urban Pakistan, where patriarchal norms leave them largely isolated and without resources for managing their symptoms.]]></sentence>  <summary><![CDATA[<p>Georgia Tech assistant professor Naveena Karusala and master's student Umme Ammara are researching how to improve existing technologies and design new ones to better support women experiencing menopause. Their work is based on a study conducted with women in urban Pakistan, where patriarchal social norms pressure women to stay silent about menopause symptoms and limit their ability to seek support, even in online communities that have otherwise helped women discuss other health issues</p>]]></summary>  <dateline>2026-03-30T00:00:00-04:00</dateline>  <iso_dateline>2026-03-30T00:00:00-04:00</iso_dateline>  <gmt_dateline>2026-03-30 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[<p><a href="mailto:ndeen6@gatech.edu">Nathan Deen</a><br>College of Computing<br>Georgia Tech</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>679788</item>      </media>  <hg_media>          <item>          <nid>679788</nid>          <type>image</type>          <title><![CDATA[Ammara-Umme_86A2210.jpg]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Ammara-Umme_86A2210.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2026/03/31/Ammara-Umme_86A2210.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/2026/03/31/Ammara-Umme_86A2210.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2026/03/31/Ammara-Umme_86A2210.jpg?itok=CxqLrfAa]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Umme Ammar sits in a booth with laptop in front of her]]></image_alt>                    <created>1774958961</created>          <gmt_created>2026-03-31 12:09:21</gmt_created>          <changed>1774958961</changed>          <gmt_changed>2026-03-31 12:09:21</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="8900"><![CDATA[women&#039;s history month]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="9153"><![CDATA[Research Horizons]]></keyword>          <keyword tid="3543"><![CDATA[women&#039;s health]]></keyword>          <keyword tid="171911"><![CDATA[women of pakistan]]></keyword>      </keywords>  <core_research_areas>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71891"><![CDATA[Health and Medicine]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata><![CDATA[]]></userdata></node><node id="689175">  <title><![CDATA[Tech Swarms into Athens for Clean, Old-Fashioned Computing]]></title>  <uid>36319</uid>  <body><![CDATA[<p>The in-state rivalry between the Yellow Jackets and the Bulldogs usually heats up when Georgia Tech visits the University of Georgia. However, one Saturday last month, the focus shifted from competition to collaboration.&nbsp;</p><p>The Georgia Scientific Computing Symposium (GSCS) held its annual meeting on February 21 in Athens. Since 2009, the event has hosted researchers from across the Peach State to showcase homegrown advances in scientific computing.</p><p><a href="https://haoningwu.github.io/GSCS2026.html">The symposium</a> highlighted Georgia’s reputation as a computing innovation hub. People from around the world come to Georgia universities to lead computing research. By advancing science, engineering, medicine, and technology, their work improves communities at home and abroad.</p><p>Faculty and students from Georgia Tech, UGA, Georgia State University, and Emory University presented at the symposium. Georgia Tech participants came from the colleges of Computing, Engineering, and Sciences.</p><p>This year’s organizers agreed to meet in Atlanta for the 2027 symposium. Georgia Tech’s <a href="https://cse.gatech.edu/">School of Computational Science and Engineering (CSE)</a> will host the 19th GSCS.</p><p>“From healthcare to computer chip design, scientific computing underpins many of the technological advances we see in our lives,” said Professor&nbsp;<a href="https://faculty.cc.gatech.edu/~echow/">Edmond Chow</a>, associate chair of the School of CSE.</p><p>“Scientific computing provides the mathematical models, simulations, and data‑driven tools that make modern innovation possible. It allows people to analyze complex systems, test ideas virtually before building them, and make faster, more accurate decisions across nearly every sector of society.”</p><p>Professor&nbsp;<a href="https://hmzhou.math.gatech.edu/">Haomin Zhou</a> and Assistant Professor&nbsp;<a href="https://itshelenxu.github.io/">Helen Xu</a> delivered two of the symposium’s five plenary talks.&nbsp;</p><p>Zhou presented a new method for solving the Schrödinger equation, a landmark equation in quantum mechanics. Drawing inspiration from the mathematics used in generative artificial intelligence models, his approach develops an algorithm that more effectively simulates waves, particle motion, and other physical systems.</p><p>Xu focused on improving how computers move and organize data during complex calculations. Her work uses “cache-friendly” layouts that help computers access data more efficiently, boosting performance for scientific and engineering applications.</p><p>“Speaking at GSCS was a great opportunity,” Xu said. “The symposium fostered connections within the scientific computing community and gave us a chance to share exciting research.”</p><p>The symposium showcased student work through a poster blitz and a poster session. During the blitz, 36 students each had one minute to introduce their research to the full audience. They then shared more details about their research during the poster session.</p><p>The student projects showed the range of fields supported by scientific computing. The session also provided attendees with an opportunity to connect and expand their professional networks, helping grow the field’s future impact.</p><p>“As an aerospace engineer by training and aspiring computational scientist, GSCS gave me the platform to network with other researchers in the field while showcasing my own research,” said M.S. student <strong>Kashvi Mundra</strong>.&nbsp;</p><p>“I was able to connect with scientists across different disciplines whose work intersects with my own in unexpected ways. Those conversations pushed my thinking beyond my own lab's perspective, helping me see my work on physics-informed machine learning for inverse problems in a broader scientific computing context.”</p><p>Georgia Tech students who presented posters included:</p><p><strong>Abir Haque</strong> (CSE), <em>Massively Parallel Random Phase Approximation Correlation Energy via Lanczos Quadrature</em></p><p><strong>Antonio Varagnolo</strong> (CSE), <em>Physics-Enhanced Deep Surrogates for the Phonon Boltzmann Transport Equation</em></p><p><strong>Ben Burns</strong> (CSE), <em>Infinite-Dimensional Stein Variational Inference with Derivative-Informed Neural Operators</em></p><p><strong>Ben Wilfong</strong> (CSE), <em>Shocks without Shock Capturing; Compressible Flow at 1 quadrillion Degrees of Freedom without Loss of Accuracy</em></p><p><strong>Daniel Vickers</strong> (CSE), <em>Highly-Parallel Fluid-Solid Interactions for Compressible Flows</em></p><p><strong>Eric Fowler</strong> (CSE), <em>High-Performance Tensor Contractions in Computational Chemistry</em></p><p><strong>Haoran Yan</strong> (Math), <em>Understanding Denoising Autoencoders through the Manifold Hypothesis: A Geometric Perspective</em></p><p><strong>Kashvi Mundra</strong> (CSE), <em>Autoregressive Multifidelity Neural Surrogate Modeling under Scarce Data Regimes</em></p><p><strong>Sebastián Gutiérrez Hernández</strong> (Math/CSE), <em>PDPO: Parametric Density Path Optimization</em></p><p><strong>Vivian Zhang</strong> (AE), <em>Multifidelity Operator Inference: Non-Intrusive Reduced Order Modeling from Scarce Data</em></p><p><strong>Xian Mae Hadia</strong> (CSE), <em>Data Efficiency of Surrogate Models: Learning Physics Data from Full Field Data vs. Inductive Bias from Approximate PDE Solvers</em></p><p><strong>Xiangming Huang</strong> (CSE), <em>Neural Operator Accelerated Evolutionary Strategies for PDE-Constraint Optimization</em></p><p><strong>Zhaiming Shen</strong> (Math), <em>Understanding In-Context Learning on Structured Manifolds: Bridging Attention to Kernel Methods</em></p><p><strong>Zhongjie Shi</strong> (Math), <em>Towards Understanding Generalization in DP-GD: A Case Study in Training Two-Layer CNNs</em></p>]]></body>  <author>Bryant Wine</author>  <status>1</status>  <created>1774443853</created>  <gmt_created>2026-03-25 13:04:13</gmt_created>  <changed>1774467666</changed>  <gmt_changed>2026-03-25 19:41:06</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Researchers from universities across Georgia, including Georgia Tech, set aside rivalry to collaborate at the 2026 Georgia Scientific Computing Symposium, highlighting the state’s growing role as a hub for innovation in scientific computing.]]></teaser>  <type>news</type>  <sentence><![CDATA[Researchers from universities across Georgia, including Georgia Tech, set aside rivalry to collaborate at the 2026 Georgia Scientific Computing Symposium, highlighting the state’s growing role as a hub for innovation in scientific computing.]]></sentence>  <summary><![CDATA[<p>The in-state rivalry between the Yellow Jackets and the Bulldogs usually heats up when Georgia Tech visits the University of Georgia. However, one Saturday last month, the focus shifted from competition to collaboration.&nbsp;</p><p>The Georgia Scientific Computing Symposium (GSCS) held its annual meeting on February 21 in Athens. Since 2009, the event has hosted researchers from across the Peach State to showcase homegrown advances in scientific computing.</p><p><a href="https://haoningwu.github.io/GSCS2026.html">The symposium</a> highlighted Georgia’s reputation as a computing innovation hub. People from around the world come to Georgia universities to lead computing research. By advancing science, engineering, medicine, and technology, their work improves communities at home and abroad.</p>]]></summary>  <dateline>2026-03-25T00:00:00-04:00</dateline>  <iso_dateline>2026-03-25T00:00:00-04:00</iso_dateline>  <gmt_dateline>2026-03-25 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[<p>Bryant Wine, Communications Officer<br><a href="mailto:bryant.wine@cc.gatech.edu">bryant.wine@cc.gatech.edu</a></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>679732</item>          <item>679733</item>      </media>  <hg_media>          <item>          <nid>679732</nid>          <type>image</type>          <title><![CDATA[GSCS-2026-Head-Image.jpeg]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[GSCS-2026-Head-Image.jpeg]]></image_name>            <image_path><![CDATA[/sites/default/files/2026/03/25/GSCS-2026-Head-Image.jpeg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/2026/03/25/GSCS-2026-Head-Image.jpeg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2026/03/25/GSCS-2026-Head-Image.jpeg?itok=epVOcqtb]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[2026 Georgia Scientific Computing Symposium]]></image_alt>                    <created>1774443866</created>          <gmt_created>2026-03-25 13:04:26</gmt_created>          <changed>1774443866</changed>          <gmt_changed>2026-03-25 13:04:26</gmt_changed>      </item>          <item>          <nid>679733</nid>          <type>image</type>          <title><![CDATA[Kashvi-Mundra-Poster.jpeg]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Kashvi-Mundra-Poster.jpeg]]></image_name>            <image_path><![CDATA[/sites/default/files/2026/03/25/Kashvi-Mundra-Poster.jpeg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/2026/03/25/Kashvi-Mundra-Poster.jpeg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2026/03/25/Kashvi-Mundra-Poster.jpeg?itok=RJv8HI6y]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[2026 Georgia Scientific Computing Symposium]]></image_alt>                    <created>1774443901</created>          <gmt_created>2026-03-25 13:05:01</gmt_created>          <changed>1774443901</changed>          <gmt_changed>2026-03-25 13:05:01</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[https://www.cc.gatech.edu/news/tech-swarms-athens-clean-old-fashioned-computing]]></url>        <title><![CDATA[Tech Swarms into Athens for Clean, Old-Fashioned Computing]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>          <group id="50877"><![CDATA[School of Computational Science and Engineering]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="145"><![CDATA[Engineering]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="194611"><![CDATA[State Impact]]></category>          <category tid="8862"><![CDATA[Student Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="145"><![CDATA[Engineering]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="194611"><![CDATA[State Impact]]></term>          <term tid="8862"><![CDATA[Student Research]]></term>      </news_terms>  <keywords>          <keyword tid="654"><![CDATA[College of Computing]]></keyword>          <keyword tid="166983"><![CDATA[School of Computational Science and Engineering]]></keyword>          <keyword tid="9153"><![CDATA[Research Horizons]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="181991"><![CDATA[Georgia Tech News Center]]></keyword>          <keyword tid="10199"><![CDATA[Daily Digest]]></keyword>          <keyword tid="168681"><![CDATA[scientific computing]]></keyword>          <keyword tid="194970"><![CDATA[2026 Georgia Scientific Computing Symposium]]></keyword>      </keywords>  <core_research_areas>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39541"><![CDATA[Systems]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata><![CDATA[]]></userdata></node><node id="689185">  <title><![CDATA[Researchers Find Training Gaps Impacting Maritime Cybersecurity Readiness]]></title>  <uid>36253</uid>  <body><![CDATA[<p>Whether it’s a fire or a flood, a ship’s crew can only rely on itself and its training in emergencies at sea. The same is true for crews facing digital threats on oil tankers, cargo ships, and other commercial vessels.</p><p>New cybersecurity research from the Georgia Institute of Technology, however, revealed that crews aboard commercial vessels were often not adequately prepared to manage cyberattacks effectively due to systemic training gaps.</p><p>The findings are based on interviews conducted by researchers with more than 20 officer-level mariners to assess the maritime industry’s readiness to handle cybersecurity attacks at sea.</p><p>"Historically, cybersecurity research has focused heavily on cyber-physical systems like cars, factories, and industrial plants, but ships have largely been overlooked,” said <a href="https://annaraymaker.dad/"><strong>Anna Raymaker</strong></a>, Ph.D. student and lead researcher.</p><p>“That gap is concerning when more than 90% of the world’s goods travel by sea. Recent incidents, from GPS spoofing to ships linked to subsea cable disruptions, show that maritime systems are increasingly part of the global cyber threat landscape.”</p><p>The researchers proposed four practical strategies to strengthen maritime cyber defenses and close the training gaps. Their findings were presented recently at the <a href="https://www.sigsac.org/ccs/CCS2025/call-for-papers/">ACM SIGSAC Conference on Computer and Communications Security (CCS).</a></p><h6>1. Make Cybersecurity Training Actually Maritime</h6><p>Many of those interviewed for the study described current cybersecurity training as “boilerplate” — generic modules that don’t reflect real shipboard risks.&nbsp;</p><p>Researchers recommend:</p><ul><li>Role-specific instruction: Navigation officers should learn to detect and identify GPS spoofing. Engineers should focus on vulnerabilities in remotely monitored systems.</li><li>Bridging IT and Operational Technology: Crews need to understand how attacks on IT systems can trigger physical consequences in operational technology — including collisions, groundings, or explosions.</li><li>Hands-on delivery: Replace passive PowerPoints with drills and in-person exercises that build muscle memory.</li><li>Accessible standards: Training must account for the wide range of educational backgrounds across crews and be standardized across ranks.</li></ul><h6>2. Move Beyond “Call IT”</h6><p>At sea, crews can’t simply escalate a cyber incident to a shore-based IT department and wait. Operational resilience requires onboard readiness.</p><p>Researchers recommend:</p><ul><li>Vessel-specific response plans: Ships need clear, actionable protocols for threats such as AIS jamming or radar manipulation.</li><li>Military-style drills: Adopting MCON (Emission Control) exercises — used by the U.S. Military Sealift Command — can train crews to operate safely without electronic systems.</li><li>Stronger connectivity controls: High-bandwidth satellite systems like Starlink introduce new risks. Clear policies and network segregation are essential to prevent new entry points for attackers.</li></ul><blockquote><h6>Related Article: <a href="https://theconversation.com/when-gps-lies-at-sea-how-electronic-warfare-is-threatening-ships-and-their-crews-278181"><strong>When GPS lies at sea: How electronic warfare is threatening ships and their&nbsp;crews</strong></a><strong> by Anna Raymaker</strong></h6></blockquote><h6>3. Create Unified, Ship-Specific Regulations</h6><p>Maritime cybersecurity regulations are often reactive and fragmented. Researchers argue the industry needs a cohesive, domain-specific framework.</p><p>Key recommendations include:</p><ul><li>A unified global model: Like the energy sector’s NERC CIP standards, a maritime framework could mandate baseline controls such as encryption, network segmentation, and anonymous incident reporting.</li><li>Rules built for real crews: Regulations designed for large naval operations don’t translate well to smaller merchant or research vessels. Standards must reflect actual shipboard conditions.</li><li>Future-proofing requirements: Autonomous ships and remotely operated vessels expand the cyber-physical attack surface. Regulations must proactively address these emerging technologies.</li></ul><h6>4. Invest in Maritime-Specific Cyber Research</h6><p>Finally, the researchers stress that long-term resilience requires deeper technical research focused on maritime systems.</p><p>Priority areas include:</p><ul><li>Real-time intrusion detection systems tailored to shipboard protocols.</li><li>Proactive security risk assessments of interconnected onboard systems.</li><li>Cyber-physical modeling to better understand cascading failures in complex maritime environments.</li></ul><h6>The Bottom Line</h6><p>Cyber threats at sea are no longer hypothetical. Mariners report real-world incidents ranging from GPS spoofing to ransomware that disrupts global trade.</p><p>“Through our interviews with mariners, I saw firsthand how much dedication and pride they take in their work,” said Raymaker. “Our goal is for this research to serve as a call to action for researchers, policymakers, and industry to invest more attention in maritime cybersecurity and support the people who risk their lives every day to keep global trade, food, and energy moving."</p><p><a href="https://dl.acm.org/doi/10.1145/3719027.3744816"><em>A Sea of Cyber Threats: Maritime Cybersecurity from the Perspective of Mariners</em></a><em>&nbsp;</em>was presented at CCS 2025. It was written by Raymaker and her colleagues, Ph.D. students <strong>Akshaya Kumar</strong>, <strong>Miuyin Yong Wong</strong>, and <strong>Ryan Pickren</strong>; Research Scientist <strong>Animesh Chhotaray</strong>, Associate Professor <strong>Frank Li,</strong> Associate Professor <strong>Saman Zonouz</strong>, and Georgia Tech Provost and Executive Vice President for Academic Affairs <strong>Raheem Beyah</strong>.</p>]]></body>  <author>John Popham</author>  <status>1</status>  <created>1774457240</created>  <gmt_created>2026-03-25 16:47:20</gmt_created>  <changed>1774461690</changed>  <gmt_changed>2026-03-25 18:01:30</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Research from the Georgia Institute of Technology shows that commercial ship crews are often unprepared for cyberattacks due to inadequate, generic training, despite rising threats like GPS spoofing and ransomware.]]></teaser>  <type>news</type>  <sentence><![CDATA[Research from the Georgia Institute of Technology shows that commercial ship crews are often unprepared for cyberattacks due to inadequate, generic training, despite rising threats like GPS spoofing and ransomware.]]></sentence>  <summary><![CDATA[<p>Research from the Georgia Institute of Technology shows that commercial ship crews are often unprepared for cyberattacks due to inadequate, generic training, despite rising threats like GPS spoofing and ransomware. Because ships must handle incidents independently at sea, researchers recommend more practical, maritime-specific training, stronger onboard response plans, unified global cybersecurity regulations, and increased investment in ship-focused cyber research. These steps are critical to protecting maritime operations, which carry over 90% of global trade.</p>]]></summary>  <dateline>2026-03-25T00:00:00-04:00</dateline>  <iso_dateline>2026-03-25T00:00:00-04:00</iso_dateline>  <gmt_dateline>2026-03-25 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jpopham3@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Popham</p><p>Communications Officer II&nbsp;School of Cybersecurity and Privacy&nbsp;</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>679738</item>      </media>  <hg_media>          <item>          <nid>679738</nid>          <type>image</type>          <title><![CDATA[Cyber Navy]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[AdobeStock_1936842040.jpeg]]></image_name>            <image_path><![CDATA[/sites/default/files/2026/03/25/AdobeStock_1936842040.jpeg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/2026/03/25/AdobeStock_1936842040.jpeg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2026/03/25/AdobeStock_1936842040.jpeg?itok=7woleQVR]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[A graphic of a boat sailing across the globe with a cyber shield at its front. ]]></image_alt>                    <created>1774461240</created>          <gmt_created>2026-03-25 17:54:00</gmt_created>          <changed>1774461240</changed>          <gmt_changed>2026-03-25 17:54:00</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>          <group id="660367"><![CDATA[School of Cybersecurity and Privacy]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="145"><![CDATA[Engineering]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="8862"><![CDATA[Student Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="145"><![CDATA[Engineering]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="8862"><![CDATA[Student Research]]></term>      </news_terms>  <keywords>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39461"><![CDATA[Manufacturing, Trade, and Logistics]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata><![CDATA[]]></userdata></node><node id="687586">  <title><![CDATA[AI Tool Turns Disaster Zones Into Living Classrooms]]></title>  <uid>36613</uid>  <body><![CDATA[<p>An AI-powered tool is changing how researchers study disasters and how students learn from them.&nbsp;</p><p>In the <a href="https://atlas.gatech.edu/index.cfm?FuseAction=Programs.ViewProgramAngular&amp;id=10139"><strong>International Disaster Reconnaissance (IDR) course</strong></a>, students now use <a href="https://www.filio.io/"><em><strong>Filio</strong></em></a>, a platform built by School of Computing Instruction Senior Lecturer <strong>Max Mahdi Roozbahani</strong>, to capture immersive 360° media, photos, and video that transform real disaster sites in India and Nepal into living digital classrooms.&nbsp;</p><p>Offered by the School of Civil and Environmental Engineering and taught by IDR director and Regents’ Professor <strong>David Frost</strong>, the course pairs traditional fieldwork with Roozbahani’s expertise in immersive technology and data-driven learning, transforming on-the-ground observations into reusable, interactive educational resources.&nbsp;</p><h4><strong>How Computing Can Capture Data&nbsp;</strong></h4><p>Disasters are not only physical events; they are also information events, Roozbahani says. Effective response and long-term resilience depend on the ability to observe, record, and communicate critical data under pressure. Georgia Tech’s IDR course pairs structured on-campus preparation with international field experiences, enabling students to study the cascading effects of major disasters, including how local building practices, governance, and culture shape damage and recovery.&nbsp;</p><p>“When students step into a disaster zone, they learn quickly that resilience is a systems problem: physical, social, and informational. Our job in computing is to help them capture and reason about that system responsibly,” Roozbahani said.&nbsp;</p><h4><strong>Learning from the 2025 Himalayas Expedition&nbsp;</strong></h4><p>During spring break last year, the cohort traveled along the Teesta River corridor in Sikkim, India. The region is shaped by steep terrain, fast-moving water, and critical infrastructure in narrow valleys.&nbsp;</p><p>The visit followed the October 2023 glacial lake outburst flood from South Lhonak Lake, which destroyed the Teesta III hydropower dam and impacted downstream towns, including Dikchu and Rangpo. Field stops across India included Lachung, Chungthang, Dikchu, Rangpo, Gangtok, and New Delhi.&nbsp;</p><p>Students explored both upstream and downstream consequences.&nbsp;</p><p>Upstream, the team examined how steep terrain and river confinement amplify flood forces, creating cascading risks for infrastructure. Using Filio’s interactive 360° media, students captured conditions in Lachung and Chungthang, allowing viewers to explore the landscape through a <a href="https://app.filio.io/photo-viewer?src=https://visual.filio.io/f-67d1cabeb82b05102bf91a4c/_d6LpRAkr0ymi1OqCtGeAYrXo8xBGTJmACPN0SGXP50QlCE8FLR-f-67da18bc11c485642674bf73_=s0-photo-r0&amp;rotation=0&amp;type=360"><strong>360° photo</strong></a> and <a href="https://app.filio.io/video-viewer?src=https://visual.filio.io/f-67d1cabeb82b05102bf91a4c/_IX5yWxXjRjtueg1qeGFhV62K8GDhLlarQ6uFC9g4zkjIl7rCM3-f-67dcd50f11c485642674d269_=s0-video&amp;rotation=0&amp;type=360"><strong>360° video</strong></a> that reveal how topography and river dynamics intensify disaster impacts.&nbsp;</p><p>They studied community-scale effects downstream, including damaged buildings, disrupted access, and prolonged recovery timelines.&nbsp;</p><p>Rangpo offered a glimpse of recovery in motion, with materials staged for rebuilding bridges and roads essential to commerce and emergency response.</p><div><h4><strong>Using Immersive Media as a Learning Tool&nbsp;</strong></h4><p>Students documented their field experience using <em>Filio</em>, an AI-powered visual reporting platform developed by Roozbahani through Georgia Tech’s <a href="https://create-x.gatech.edu/"><strong>CREATE-X</strong></a> ecosystem. Filio captures high-resolution photos, video, and 360° immersive media, preserving both the facts and the context of disaster sites; what the site felt like, what was lost, and what communities prioritized in recovery.&nbsp;&nbsp;</p><p>“A 360° capture lets students return months later and ask better questions. That second look is where learning accelerates,” Roozbahani said.&nbsp;</p><p>Supported by alumni and faculty mentors, including Tech alumnus <strong>Chris Klaus</strong> and Georgia Tech mentor <strong>Bill Higginbotham</strong>, the platform is evolving into a reusable educational library for future courses on immersive technology, responsible AI, and global resilience.&nbsp;</p><h4><strong>Kathmandu: The Context of Culture&nbsp;</strong></h4><p>The course concluded in Kathmandu, Nepal, where students examined how heritage, governance, and the everyday use of public space shape resilience.&nbsp;</p><p>Through Filio’s immersive documentation — including a <a href="https://app.filio.io/photo-viewer?src=https://visual.filio.io/f-67d1cafeb82b05102bf91a4d/_n2OFrWLzHNcdTkMl6uD9j0tSrOPybGLZccsNcarj8vwZaZIbuu-f-67dedf3f11c485642674d820_=s0-photo-r0&amp;rotation=0&amp;type=360"><strong>360° photo</strong></a> and <a href="https://app.filio.io/video-viewer?src=https://visual.filio.io/f-67d1cafeb82b05102bf91a4d/_CD25dUToZ6BgfmfrayfHHtsThQGJIQWu82xqmzSy884UXHnbEB-f-67dd5a9b11c485642674d302_=s0-video&amp;rotation=0&amp;type=360"><strong>360° video</strong></a> from Kathmandu — the focus broadened from hazard impacts to cultural context, highlighting how recovery is not only about rebuilding structures, but also about preserving identity, memory, and community.</p><h4><strong>Looking Ahead: A Growing Resource for All Students&nbsp;</strong></h4><p>Frost and Roozbahani envision the IDR immersive media library as a reusable resource for students even when they cannot travel, supporting future courses on immersive technology, responsible AI, and global resilience. Spring 2026 cohorts will continue to build on this foundation by documenting, analyzing, and sharing insights that can improve education and real-world disaster response.&nbsp;</p></div>]]></body>  <author>Emily Smith</author>  <status>1</status>  <created>1769094674</created>  <gmt_created>2026-01-22 15:11:14</gmt_created>  <changed>1774011279</changed>  <gmt_changed>2026-03-20 12:54:39</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[An AI-powered tool is changing how researchers study disasters and how students learn from them. ]]></teaser>  <type>news</type>  <sentence><![CDATA[An AI-powered tool is changing how researchers study disasters and how students learn from them. ]]></sentence>  <summary><![CDATA[<p>An AI-powered tool is changing how researchers study disasters and how students learn from them.&nbsp;</p><p>In the <a href="https://atlas.gatech.edu/index.cfm?FuseAction=Programs.ViewProgramAngular&amp;id=10139"><strong>International Disaster Reconnaissance (IDR) course</strong></a>, students now use <a href="https://www.filio.io/"><em><strong>Filio</strong></em></a>, a platform built by School of Computing Instruction Senior Lecturer <strong>Max Mahdi Roozbahani</strong>, to capture immersive 360° media, photos, and video that transform real disaster sites in India and Nepal into living digital classrooms.&nbsp;</p>]]></summary>  <dateline>2026-01-22T00:00:00-05:00</dateline>  <iso_dateline>2026-01-22T00:00:00-05:00</iso_dateline>  <gmt_dateline>2026-01-22 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[<p><a href="mailto:emily.smith@cc.gatech.edu">Emily Smith</a><br>College of Computing<br>Georgia Tech</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>679052</item>          <item>679053</item>          <item>679054</item>          <item>679055</item>          <item>679056</item>      </media>  <hg_media>          <item>          <nid>679052</nid>          <type>image</type>          <title><![CDATA[1-IDR-Spring-2025---Lachung---Chungthang03182025.jpg]]></title>          <body><![CDATA[<p><em>Students visited Lachung and Chungthang in Sikkim, India. Upstream in the Teesta Valley, students examined how steep terrain and river confinement amplify flood forces and how failures can cascade across an entire corridor of infrastructure. </em><br> </p>]]></body>                      <image_name><![CDATA[1-IDR-Spring-2025---Lachung---Chungthang03182025.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2026/01/22/1-IDR-Spring-2025---Lachung---Chungthang03182025.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/2026/01/22/1-IDR-Spring-2025---Lachung---Chungthang03182025.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2026/01/22/1-IDR-Spring-2025---Lachung---Chungthang03182025.jpg?itok=bKQhpfuk]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Students visited Lachung and Chungthang in Sikkim, India. Upstream in the Teesta Valley, students examined how steep terrain and river confinement amplify flood forces and how failures can cascade across an entire corridor of infrastructure. ]]></image_alt>                    <created>1769095217</created>          <gmt_created>2026-01-22 15:20:17</gmt_created>          <changed>1769095217</changed>          <gmt_changed>2026-01-22 15:20:17</gmt_changed>      </item>          <item>          <nid>679053</nid>          <type>image</type>          <title><![CDATA[2-IDR-Spring-2025---Dikchu03172025.jpg]]></title>          <body><![CDATA[<p><em>Downstream in the town Dikchu in Sikkim, India, the class focused on community-scale consequences: damaged buildings, disrupted access, and long recovery timelines.</em><br> </p>]]></body>                      <image_name><![CDATA[2-IDR-Spring-2025---Dikchu03172025.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2026/01/22/2-IDR-Spring-2025---Dikchu03172025.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/2026/01/22/2-IDR-Spring-2025---Dikchu03172025.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2026/01/22/2-IDR-Spring-2025---Dikchu03172025.jpg?itok=NV3lQyPA]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Downstream in the town Dikchu in Sikkim, India, the class focused on community-scale consequences: damaged buildings, disrupted access, and long recovery timelines.]]></image_alt>                    <created>1769095217</created>          <gmt_created>2026-01-22 15:20:17</gmt_created>          <changed>1769095217</changed>          <gmt_changed>2026-01-22 15:20:17</gmt_changed>      </item>          <item>          <nid>679054</nid>          <type>image</type>          <title><![CDATA[3-IDR-Spring-2025---Rangpo03162025.jpg]]></title>          <body><![CDATA[<p><em>Rangpo in Sikkim, India offered a view of recovery in motion such as materials staged for rebuilding near bridges and roads that keep commerce and emergency response moving.</em><br> </p>]]></body>                      <image_name><![CDATA[3-IDR-Spring-2025---Rangpo03162025.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2026/01/22/3-IDR-Spring-2025---Rangpo03162025.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/2026/01/22/3-IDR-Spring-2025---Rangpo03162025.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2026/01/22/3-IDR-Spring-2025---Rangpo03162025.jpg?itok=SPJZ2ciD]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Rangpo in Sikkim, India offered a view of recovery in motion such as materials staged for rebuilding near bridges and roads that keep commerce and emergency response moving.]]></image_alt>                    <created>1769095217</created>          <gmt_created>2026-01-22 15:20:17</gmt_created>          <changed>1769095217</changed>          <gmt_changed>2026-01-22 15:20:17</gmt_changed>      </item>          <item>          <nid>679055</nid>          <type>image</type>          <title><![CDATA[4-IDR-Spring-2025---Kathmandu--Nepal03212025.jpg]]></title>          <body><![CDATA[<p><em>In Kathmandu Valley, Nepal, the course broadened from hazard impacts to cultural context, exploring how heritage, governance, and everyday use of public space shape resilience.</em><br> </p>]]></body>                      <image_name><![CDATA[4-IDR-Spring-2025---Kathmandu--Nepal03212025.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2026/01/22/4-IDR-Spring-2025---Kathmandu--Nepal03212025.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/2026/01/22/4-IDR-Spring-2025---Kathmandu--Nepal03212025.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2026/01/22/4-IDR-Spring-2025---Kathmandu--Nepal03212025.jpg?itok=JnYpC5dr]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[In Kathmandu Valley, Nepal, the course broadened from hazard impacts to cultural context, exploring how heritage, governance, and everyday use of public space shape resilience.]]></image_alt>                    <created>1769095217</created>          <gmt_created>2026-01-22 15:20:17</gmt_created>          <changed>1769095217</changed>          <gmt_changed>2026-01-22 15:20:17</gmt_changed>      </item>          <item>          <nid>679056</nid>          <type>image</type>          <title><![CDATA[cover-photo.jpg]]></title>          <body><![CDATA[<p><em>School of Civil and Environmental Engineering students captured 360 media, using Filio, to study disaster sites in India and Nepal. Photos provided by Roozbahani. </em><br> </p>]]></body>                      <image_name><![CDATA[cover-photo.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2026/01/22/cover-photo.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/2026/01/22/cover-photo.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2026/01/22/cover-photo.jpg?itok=YoPP1swD]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[School of Civil and Environmental Engineering students captured 360 media, using Filio, to study disaster sites in India and Nepal. Photos provided by Roozbahani. ]]></image_alt>                    <created>1769095217</created>          <gmt_created>2026-01-22 15:20:17</gmt_created>          <changed>1769095217</changed>          <gmt_changed>2026-01-22 15:20:17</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>          <group id="660374"><![CDATA[School of Computing Instruction]]></group>      </groups>  <categories>          <category tid="194606"><![CDATA[Artificial Intelligence]]></category>          <category tid="142"><![CDATA[City Planning, Transportation, and Urban Growth]]></category>          <category tid="42901"><![CDATA[Community]]></category>          <category tid="42911"><![CDATA[Education]]></category>          <category tid="145"><![CDATA[Engineering]]></category>          <category tid="154"><![CDATA[Environment]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="134"><![CDATA[Student and Faculty]]></category>          <category tid="8862"><![CDATA[Student Research]]></category>      </categories>  <news_terms>          <term tid="194606"><![CDATA[Artificial Intelligence]]></term>          <term tid="142"><![CDATA[City Planning, Transportation, and Urban Growth]]></term>          <term tid="42901"><![CDATA[Community]]></term>          <term tid="42911"><![CDATA[Education]]></term>          <term tid="145"><![CDATA[Engineering]]></term>          <term tid="154"><![CDATA[Environment]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="134"><![CDATA[Student and Faculty]]></term>          <term tid="8862"><![CDATA[Student Research]]></term>      </news_terms>  <keywords>          <keyword tid="654"><![CDATA[College of Computing]]></keyword>          <keyword tid="193866"><![CDATA[school of computing instruction]]></keyword>          <keyword tid="172752"><![CDATA[Georgia Tech School of Civil and Environmental Engineering]]></keyword>      </keywords>  <core_research_areas>          <term tid="193655"><![CDATA[Artificial Intelligence at Georgia Tech]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata><![CDATA[]]></userdata></node><node id="688391">  <title><![CDATA[Robot Pollinator Could Produce More, Better Crops for Indoor Farms]]></title>  <uid>36530</uid>  <body><![CDATA[<p>A new robot could solve one of the biggest challenges facing indoor farmers: manual pollination.</p><p>Indoor farms, also known as vertical farms, are popular among agricultural researchers and are expanding across the agricultural industry. Some benefits they have over outdoor farms include:</p><ul><li>Year-round production of food crops</li><li>Less water and land requirements</li><li>Not needing pesticides</li><li>Reducing carbon emissions from shipping</li><li>Reducing food waste</li></ul><p>Additionally,&nbsp;<a href="https://www.agritecture.com/blog/2021/7/20/5-ways-vertical-farming-is-improving-nutrition"><strong>some studies</strong></a> indicate that indoor farms produce more nutritious food for urban communities.&nbsp;</p><p>However, these farms are often inaccessible to birds, bees, and other natural pollinators, leaving the pollination process to humans. The tedious process must be completed by hand for each flower to ensure the indoor crop flourishes.</p><p><a href="https://research.gatech.edu/people/ai-ping-hu"><strong>Ai-Ping Hu</strong></a>, a principal research engineer at the Georgia Tech Research Institute (GTRI), has spent years exploring methods to efficiently pollinate flowering plants and food crops in indoor farms to find a way to efficiently pollinate flower plants and food crops in indoor farms.</p><p>Hu,&nbsp;<a href="https://research.gatech.edu/people/shreyas-kousik"><strong>Assistant Professor Shreyas Kousik of the George W. Woodruff School of Mechanical Engineering</strong></a>, and a rotating group of student interns have developed a robot prototype that may be up to the task.</p><p>The robot can efficiently pollinate plants that have both male and female reproductive parts. These plants only require pollen to be transferred from one part to the other rather than externally from another flower.</p><p>Natural pollinators perform this task outdoors, but Hu said indoor farmers often use a paintbrush or electric tootbrush to ensure these flowers are pollinated.&nbsp;</p><h4><strong>Knowing the Pose</strong></h4><p>An early challenge the research team addressed was teaching the robot to identify the “pose” of each flower. Pose refers to a flower’s orientation, shape, and symmetry. Knowing these details ensures precise delivery of the pollen to maximize reproductive success.&nbsp;</p><p>“It’s crucial to know exactly which way the flowers are facing,” Hu said.</p><p>“You want to approach the flower from the front because that’s where all the biological structures are. Knowing the pose tells you where the stem is. Our device grasps the stem and shakes it to dislodge the pollen.</p><p>“Every flower is going to have its own pose, and you need to know what that is within at least 10 degrees.”</p><h4><strong>Computer Vision Breakthrough</strong></h4><p><strong>Harsh Muriki</strong> is a robotics master’s student at Georgia Tech’s School of Interactive Computing, who used computer vision to solve the pose problem while interning for Hu and GTRI.</p><p>Muriki attached a camera to a FarmBot to capture images of strawberry plants from dozens of angles in a small garden in front of Georgia Tech’s Food Processing Technology Building. The&nbsp;<a href="https://farm.bot/?srsltid=AfmBOoqh1Z8vSs3WflZisgw5DsOUSo8shD4VtY0Y8_VmVpVyt0Iwalxo"><strong>FarmBot</strong></a> is an XYZ-axis robot that waters and sprays pesticides on outdoor gardens, though it is not capable of pollination.</p><p>“We reconstruct the images of the flower into a 3D model and use a technique that converts the 3D model into multiple 2D images with depth information,” Muriki said. “This enables us to send them to object detectors.”</p><p>Muriki said he used a real-time object detection system called YOLO (You Only Look Once) to classify objects. YOLO is known for identifying and classifying objects in a single pass.</p><p><strong>Ved Sengupta</strong>, a computer engineering major who interned with Muriki, fine-tuned the algorithms that converted 3D images into 2D.</p><p>“This was a crucial part of making robot pollination possible,” Sengupta said. “There is a big gap between 3D and 2D image processing.</p><p>“There’s not a lot of data on the internet for 3D object detection, but there’s a ton for 2D. We were able to get great results from the converted images, and I think any sector of technology can take advantage of that.”</p><p>Sengupta, Muriki, and Hu co-authored a paper about their work that was accepted to the 2025 International Conference on Robotics and Automation (ICRA) in Atlanta.</p><h4><strong>Measuring Success</strong></h4><p>The pollination robot, built in Kousik’s Safe Robotics Lab, is now in the prototype phase.&nbsp;</p><p>Hu said the robot can do more than pollinate. It can also analyze each flower to determine how well it was pollinated and whether the chances for reproduction are high.</p><p>“It has an additional capability of microscopic inspection,” Hu said. “It’s the first device we know of that provides visual feedback on how well a flower was pollinated.”</p><p>For more information about the robot, visit the&nbsp;<a href="https://saferoboticslab.me.gatech.edu/research/towards-robotic-pollination/"><strong>Safe Robotics Lab project page</strong></a>.</p>]]></body>  <author>Nathan Deen</author>  <status>1</status>  <created>1771527492</created>  <gmt_created>2026-02-19 18:58:12</gmt_created>  <changed>1774011241</changed>  <gmt_changed>2026-03-20 12:54:01</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[A research team that expands GTRI, the College of Engineering, and the College of Computing have developed a robot capable of pollinating flowers in indoor farms.]]></teaser>  <type>news</type>  <sentence><![CDATA[A research team that expands GTRI, the College of Engineering, and the College of Computing have developed a robot capable of pollinating flowers in indoor farms.]]></sentence>  <summary><![CDATA[<p>Manual pollination is one of the biggest challenges for indoor farmers. These farms are often inaccessible to birds, bees, and other natural pollinators, leaving the pollination process to humans. The tedious process must be completed by hand for each flower to ensure the indoor crop flourishes.</p><p>A Georgia Tech research led by Ai-Ping Hu and Shreyas Kousik team is working to solve that. A robot they've developed can efficiently pollinate plants that have both male and female reproductive parts. These plants only require pollen to be transferred from one part to the other rather than externally from another flower.</p>]]></summary>  <dateline>2026-02-19T00:00:00-05:00</dateline>  <iso_dateline>2026-02-19T00:00:00-05:00</iso_dateline>  <gmt_dateline>2026-02-19 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[<p><a href="mailto:ndeen6@gatech.edu">Nathan Deen</a><br>College of Computing<br>Georgia Tech</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>679370</item>      </media>  <hg_media>          <item>          <nid>679370</nid>          <type>image</type>          <title><![CDATA[Harsh-Muriki_86A0006.jpg]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Harsh-Muriki_86A0006.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2026/02/19/Harsh-Muriki_86A0006.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/2026/02/19/Harsh-Muriki_86A0006.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2026/02/19/Harsh-Muriki_86A0006.jpg?itok=WJg8YQi9]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Harsh Muriki]]></image_alt>                    <created>1771527500</created>          <gmt_created>2026-02-19 18:58:20</gmt_created>          <changed>1771527500</changed>          <gmt_changed>2026-02-19 18:58:20</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>      </groups>  <categories>          <category tid="194606"><![CDATA[Artificial Intelligence]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="145"><![CDATA[Engineering]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="152"><![CDATA[Robotics]]></category>      </categories>  <news_terms>          <term tid="194606"><![CDATA[Artificial Intelligence]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="145"><![CDATA[Engineering]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="152"><![CDATA[Robotics]]></term>      </news_terms>  <keywords>          <keyword tid="9153"><![CDATA[Research Horizons]]></keyword>          <keyword tid="187991"><![CDATA[go-robotics]]></keyword>          <keyword tid="192863"><![CDATA[go-ai]]></keyword>          <keyword tid="11506"><![CDATA[computer vision]]></keyword>          <keyword tid="180840"><![CDATA[computer vision systems]]></keyword>          <keyword tid="669"><![CDATA[agriculture]]></keyword>          <keyword tid="194392"><![CDATA[AI in Agriculture]]></keyword>          <keyword tid="170254"><![CDATA[urban gardening]]></keyword>          <keyword tid="94111"><![CDATA[farming]]></keyword>          <keyword tid="14913"><![CDATA[urban farming]]></keyword>          <keyword tid="23911"><![CDATA[bees]]></keyword>          <keyword tid="6660"><![CDATA[flowers]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>      </keywords>  <core_research_areas>          <term tid="193655"><![CDATA[Artificial Intelligence at Georgia Tech]]></term>          <term tid="193653"><![CDATA[Georgia Tech Research Institute]]></term>          <term tid="39521"><![CDATA[Robotics]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71911"><![CDATA[Earth and Environment]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata><![CDATA[]]></userdata></node><node id="688487">  <title><![CDATA[New Study Could Show How TikTok’s Algorithm Affects Youth Mental Health]]></title>  <uid>36530</uid>  <body><![CDATA[<div><div><p>Meta CEO Mark Zuckerberg&nbsp;<a href="https://www.latimes.com/california/story/2026-02-18/mark-zuckerberg-tesimony-la-social-media-trial?utm_source=chatgpt.com"><strong>took the witness stand</strong></a> last week in Los Angeles County Superior Court to defend his company from accusations that social media harms children.</p><p>A lawsuit filed by a 20-year-old plaintiff alleges Instagram and other social media apps are designed to make young users addicted to their platforms.</p><p>Meanwhile, social media experts believe the algorithms that drive content on these platforms play a role in hooking users and keeping them scrolling for extensive periods of time.</p><p>A new study led by Georgia Tech might confirm this suspicion.</p><p>Using recently acquired data from more than 10,000 adolescent users,&nbsp;<a href="http://www.munmund.net/"><strong>Munmun De Choudhury</strong></a> will audit TikTok’s recommendation algorithm and study its impact on young people’s behavior and mental health.</p><p>De Choudhury is leading a multi-institutional research team on a four-year, $1.7 million grant from the Huo Family Foundation.</p><p>“We hope to learn the different types of negative exposures that young people experience when using TikTok,” De Choudhury said. “This can help us characterize what they’re watching and build computational methods to understand the consumption behaviors of these participants and how they’re affected by the algorithm.”</p><p>De Choudhury, a professor in Georgia Tech’s School of Interactive Computing, is collaborating with Amy Orben, a professor at the University of Cambridge, and Homa Hosseinmardi, an assistant professor at UCLA, on the project.</p><p>Social media platforms have become increasingly reluctant to share their data in recent years, posing a challenge for researchers like De Choudhury.</p><p>“We can’t do the type of studies we did 10 years ago with X (formerly Twitter) because the API is much more restrictive,” she said. “There are limited ways to programmatically access people’s data now.</p><p>“We must go through a tedious, manual process to get around declining access to social media data. This data-gathering process is essential given the sensitive nature of mental health research. You want data that is shared with consent.”</p><p>Orben collected TikTok data from more than 10,000 young people in the UK who consented to provide their personal data archives in accordance with the European Union’s General Data Protection Regulation (GDPR).</p><p>The collected data includes watch histories, which De Choudhury said distinguishes this research from other social media studies that focus on what users post.</p><p>“We don’t understand passive social media consumption very well, so we hope to close that gap and learn what that looks like,” she said. “That could complement or contrast what we know about people’s active engagement on these platforms. Is what they’re consuming directly related to what they’re posting? How does passive consumption affect young people’s mental health?”</p><p>A clearer picture of how algorithm-based content affects young people could result in design interventions to minimize negative effects. De Choudhury said studying data from young people is critical because it’s not too late to steer them away from unhealthy behavioral patterns.</p><p>“Some of the earliest signs or symptoms of mental health conditions appear in adolescence,” she said. “If appropriate care and support are provided, maybe it’s possible to prevent these symptoms from becoming full-blown in the future.”</p><h4><strong>Beyond TikTok</strong></h4><p>What the research team learns about TikTok could also provide broader insight into other social media platforms.</p><p>TikTok has been influential in how social media platforms display video content. Competitors like Instagram and X modeled their video presentation after TikTok’s, which can easily lead to doomscrolling.</p><p>“Our hope is that our findings can be generalized, with the caveat the data we have is exclusively from TikTok,” De Choudhury said. “Other platforms have similar video-sharing and consumption features where the video automatically plays from one to the next. We hope what we learn from TikTok will be applicable to people’s activities elsewhere, though it will require future work beyond this project to draw concrete conclusions.”</p><h4><strong>Simulating Feeds with AI</strong></h4><p>De Choudhury said an additional part of the study will be using artificial intelligence (AI) to simulate video feeds.</p><p>In 2024, Hosseinmardi led a study at the University of Pennsylvania on YouTube’s recommendation algorithm and used bots that either followed or ignored the recommendations.</p><p>De Choudhury said they will use a similar method for TikTok.</p><p>“The feeds will be realistic but generated by AI to see the potential pathways to consumption rabbit holes,” she said. “This should give us some insight into how algorithms influence the negative and positive exposures people might be having on TikTok.”</p><h4><strong>Foundation Expands Reach</strong></h4><p>Based in the UK and established in 2009, the Huo Family Foundation supports community education initiatives in the UK, the U.S., and China.</p><p>The organization announced in January its launch of the Huo Family Foundation Science Programme.&nbsp;<a href="https://huofamilyfoundation.org/news/updates/huo-family-foundation-awards-17-6m-for-groundbreaking-research/"><strong>The new program is committing $17.6 million to fund 20 new multi-year research grants</strong></a> that explore the impact of digital technology on the brain development, social behavior, and mental health of young people.</p><p>“Digital technology is profoundly shaping childhood and young adulthood, yet there is limited causal evidence of its effects,”&nbsp;said Yan Huo, founder of the Huo Family Foundation, in a press release.&nbsp;“We are proud to support exceptional researchers advancing vital scientific understanding.”</p></div></div>]]></body>  <author>Nathan Deen</author>  <status>1</status>  <created>1771943368</created>  <gmt_created>2026-02-24 14:29:28</gmt_created>  <changed>1774011172</changed>  <gmt_changed>2026-03-20 12:52:52</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[A Georgia Tech-led research team is conducting a multi-year study using data from more than 10,000 adolescents to investigate how TikTok’s recommendation algorithm and passive content consumption impact youth mental health.]]></teaser>  <type>news</type>  <sentence><![CDATA[A Georgia Tech-led research team is conducting a multi-year study using data from more than 10,000 adolescents to investigate how TikTok’s recommendation algorithm and passive content consumption impact youth mental health.]]></sentence>  <summary><![CDATA[<div><div dir="ltr"><p>Led by Georgia Tech professor Munmun De Choudhury, a multi-institutional research team is launching a $1.7 million study to examine how TikTok’s recommendation algorithm influences the mental health of adolescent users. The project focuses on passive consumption by analyzing the watch histories of over 10,000 young participants and using AI to simulate content "rabbit holes." By identifying patterns of negative exposure, the researchers aim to develop design interventions that can steer teenagers away from unhealthy behavioral patterns and support early mental health care.</p></div></div>]]></summary>  <dateline>2026-02-24T00:00:00-05:00</dateline>  <iso_dateline>2026-02-24T00:00:00-05:00</iso_dateline>  <gmt_dateline>2026-02-24 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>679406</item>      </media>  <hg_media>          <item>          <nid>679406</nid>          <type>image</type>          <title><![CDATA[208A9267-2.jpg]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[208A9267-2.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2026/02/24/208A9267-2.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/2026/02/24/208A9267-2.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2026/02/24/208A9267-2.jpg?itok=EzUbj3qp]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Munmun De Choudhury]]></image_alt>                    <created>1771943377</created>          <gmt_created>2026-02-24 14:29:37</gmt_created>          <changed>1771943377</changed>          <gmt_changed>2026-02-24 14:29:37</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>      </groups>  <categories>          <category tid="194606"><![CDATA[Artificial Intelligence]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="143"><![CDATA[Digital Media and Entertainment]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="194606"><![CDATA[Artificial Intelligence]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="143"><![CDATA[Digital Media and Entertainment]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="9153"><![CDATA[Research Horizons]]></keyword>          <keyword tid="167543"><![CDATA[social media]]></keyword>          <keyword tid="190947"><![CDATA[tiktok]]></keyword>          <keyword tid="10343"><![CDATA[mental health]]></keyword>          <keyword tid="10824"><![CDATA[Children And Adolescents]]></keyword>          <keyword tid="5660"><![CDATA[algorithms]]></keyword>      </keywords>  <core_research_areas>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71901"><![CDATA[Society and Culture]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata><![CDATA[]]></userdata></node><node id="688516">  <title><![CDATA[ Is This Your AI? Researchers Crack AI Blackbox]]></title>  <uid>36253</uid>  <body><![CDATA[<div><div><p>Artificial intelligence (AI) systems power everything from chatbots to security cameras, yet many of the most advanced models operate as “black boxes.” Companies can use them, but outsiders can’t see how they were built, where they came from, or whether they contain hidden flaws.</p><p>This lack of transparency creates real risks. A model could contain security vulnerabilities or hidden backdoors. It could also be a lightly modified version of an open-source system — repackaged in violation of its license — with no easy way to prove it.</p><p>Researchers at the Georgia Institute of Technology have developed a new framework, ZEN, to help solve this problem. The tool can recover a model’s unique “fingerprint” directly from its memory, allowing experts to trace its origins and reconstruct how it was assembled.</p><p>“Analyzing a proprietary AI model without identifying where it came from and how it is constructed is like trying to fix a car engine with the hood welded shut,” said <a href="https://davidoygenblik.github.io/"><strong>David Oygenblik</strong></a>, a Ph.D. student at Georgia Tech and the study’s lead author.</p><p>“ZEN not only X-rays the engine but also provides the complete wiring diagram.”</p><p>ZEN works by taking a snapshot of a running AI system and extracting information about both its mathematical structure and the code that defines it. It compares that fingerprint against a database of known open-source models to determine the system’s origin.</p><p>If it finds a match, ZEN identifies the exact changes and generates software patches that allow investigators to recreate a working replica of the proprietary model for testing.</p><p>That capability has major implications for both security and intellectual property protection.</p><p>“With ZEN, a security analyst can finally test a black-box model for hidden backdoors, and a company can gather concrete evidence to prove its software license was infringed,” Oygenblik said.</p><p>To evaluate the system, the research team tested ZEN on 21 state-of-the-art AI models, including Llama 3, YOLOv10, and other well-known systems.</p><p>ZEN correctly traced every customized model back to its original open-source foundation — achieving 100% attribution accuracy. Even when models had been heavily modified — differing by more than 83% from their original versions — ZEN successfully identified the changes and enabled full reconstruction for security testing.</p><p>The researchers will present their findings at the 2026 <a href="https://www.ndss-symposium.org/">Network and Distributed System Security (NDSS) Symposium</a>. The paper, <a href="https://www.ndss-symposium.org/ndss-paper/achieving-zen-combining-mathematical-and-programmatic-deep-learning-model-representations-for-attribution-and-reuse/"><em>Achieving Zen: Combining Mathematical and Programmatic Deep Learning Model Representations for Attribution and Reuse</em></a>, was authored by Oygenblik, master’s student <strong>Dinko Dermendzhiev</strong>, Ph.D. students <strong>Filippos Sofias</strong>, <strong>Mingxuan Yao</strong>, <strong>Haichuan Xu</strong>, and <strong>Runze Zhang</strong>, post-doctorate scholars <strong>Jeman Park</strong>, and <strong>Amit Kumar Sikder</strong>, as well as Associate Professor <strong>Brendan Saltaformaggio</strong>.</p></div></div>]]></body>  <author>John Popham</author>  <status>1</status>  <created>1772040800</created>  <gmt_created>2026-02-25 17:33:20</gmt_created>  <changed>1774011162</changed>  <gmt_changed>2026-03-20 12:52:42</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Researchers have developed a technique to identify the origins of proprietary “black-box” AI models, even when their internal structure and training data are hidden.]]></teaser>  <type>news</type>  <sentence><![CDATA[Researchers have developed a technique to identify the origins of proprietary “black-box” AI models, even when their internal structure and training data are hidden.]]></sentence>  <summary><![CDATA[<div><div><div><div><div><div><p>Researchers have developed a technique to identify the origins of proprietary “black-box” AI models, even when their internal structure and training data are hidden. Because many commercial AI systems cannot be externally inspected, it is difficult to detect security vulnerabilities, intellectual property theft, licensing violations, or trace a model’s lineage. The new approach enables researchers to attribute models, determine whether one was derived from another, and identify potential misuse of protected data. By improving transparency and enabling verification of model provenance, the work strengthens accountability and trust in AI systems.</p></div></div></div></div></div></div>]]></summary>  <dateline>2026-02-25T00:00:00-05:00</dateline>  <iso_dateline>2026-02-25T00:00:00-05:00</iso_dateline>  <gmt_dateline>2026-02-25 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jpopham3@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Popham</p><p>Communications Officer II&nbsp;School of Cybersecurity and Privacy&nbsp;</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>679429</item>      </media>  <hg_media>          <item>          <nid>679429</nid>          <type>image</type>          <title><![CDATA[Is-this-your-AI.jpg]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Is-this-your-AI.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2026/02/25/Is-this-your-AI.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/2026/02/25/Is-this-your-AI.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2026/02/25/Is-this-your-AI.jpg?itok=6Ayh_YfB]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[A graphic showing an AI model in an outstretched hand. ]]></image_alt>                    <created>1772040810</created>          <gmt_created>2026-02-25 17:33:30</gmt_created>          <changed>1772040810</changed>          <gmt_changed>2026-02-25 17:33:30</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[https://www.ndss-symposium.org/wp-content/uploads/2026-s1628-paper.pdf]]></url>        <title><![CDATA[Read the Paper]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>          <group id="660367"><![CDATA[School of Cybersecurity and Privacy]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="2835"><![CDATA[ai]]></keyword>          <keyword tid="193860"><![CDATA[Artifical Intelligence]]></keyword>          <keyword tid="192863"><![CDATA[go-ai]]></keyword>          <keyword tid="365"><![CDATA[Research]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>      </keywords>  <core_research_areas>          <term tid="193655"><![CDATA[Artificial Intelligence at Georgia Tech]]></term>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata><![CDATA[]]></userdata></node><node id="688223">  <title><![CDATA[Department of Energy Award to Power Nuclear Research With Machine Learning]]></title>  <uid>36319</uid>  <body><![CDATA[<p>The future of clean energy depends on algorithms as much as it does atoms.</p><p>Georgia Tech’s&nbsp;<a href="https://cse.gatech.edu/people/qi-tang"><strong>Qi Tang</strong></a> is building machine learning (ML) models to accelerate nuclear fusion research, making it more affordable and more accurate. Backed by a grant from the U.S. Department of Energy (DOE), Tang’s work brings clean, sustainable energy closer to reality.</p><p>Tang has received an&nbsp;<a href="https://science.osti.gov/early-career"><strong>Early Career Research Program (ECRP) award</strong></a> from the DOE Office of Science. The grant supports Tang with $875,000 disbursed over five years to craft ML and data processing tools that help scientists analyze massive datasets from nuclear experiments and simulations.</p><p>Tang is the first faculty member from Georgia Tech’s College of Computing and School of Computational Science and Engineering (CSE) to receive the ECRP. He is the seventh Georgia Tech researcher to earn the award and the only GT awardee among this year’s 99 recipients.</p><p>More than a milestone, the award reflects a shift in how nuclear research is done. Today, progress depends on computing and data science as much as on physics and engineering.</p><p>“I am honored and excited to receive the ECRP award through DOE’s Advanced Scientific Computing Research program, an organization I care about deeply,” said Tang, an assistant professor in the School of CSE.&nbsp;</p><p>“I am grateful to my former colleagues at Los Alamos National Laboratory and collaborators at other national laboratories, including Lawrence Livermore, Sandia, and Argonne. I am also thankful for my Ph.D. students at Georgia Tech, whose dedication and creativity make this award possible.”</p><p>[Related:&nbsp;<a href="https://www.cc.gatech.edu/news/new-faculty-applies-high-performance-computing-scientific-machine-learning-interests-studies"><strong>New Faculty Applies High-Performance Computing, Scientific Machine Learning Interests to Studies in Plasma Physics</strong></a>]</p><p>A problem in nuclear research is that fusion simulations are challenging to understand and use. These simulations generate enormous datasets that are too large to store, move, and analyze efficiently.</p><p><a href="https://pamspublic.science.energy.gov/WebPAMSExternal/Interface/Common/ViewPublicAbstract.aspx?rv=a756f612-3409-44b8-89ea-7421bf0840e5&amp;rtc=24&amp;PRoleId=10"><strong>In his ECRP proposal to DOE</strong></a>, Tang introduced new ML methods to improve the analysis and storage of particle data.</p><p>Tang’s approach balances shrinking data so it is easier to store and transfer while preserving the most important scientific features. His multiscale ML models are informed by physics, so the reduced data still reflects how fusion systems really behave.</p><p>With Tang’s research, scientists can run larger, more realistic fusion models and analyze results more quickly. This accelerates progress toward practical fusion energy.</p><p>“In contrast to generic black-box-type compression tools, we aim at preserving the intrinsic structures of the particle dataset during the data reduction processes,” Tang said.&nbsp;</p><p>“Taking this approach, we can meet our goal of achieving high-fidelity preservation of critical physics with minimum loss of information.”</p><p>Computing is essential in modern research because of the amount of data produced and captured from experiments and simulations. In the era of exascale supercomputers, data movement is a greater bottleneck than actual computation.</p><p>DOE operates three of the world’s four exascale supercomputers. These machines can calculate one quintillion (a billion billion) operations per second.</p><p>The exascale era began in 2022 with the launch of Frontier at Oak Ridge National Laboratory. Aurora followed in 2023 at Argonne National Laboratory. El Capitan arrived in 2024 at Lawrence Livermore National Laboratory.</p><p>With Tang’s data reduction approaches, all of DOE’s supercomputers spend more time on science and less time waiting for data transfers.</p><p>“Qi’s work in computational plasma physics and nuclear fusion modeling has been groundbreaking,” said <strong>Haesun Park</strong>, Regents’ Professor and Chair of the School of CSE.&nbsp;</p><p>“We are proud of Qi and what this award means for him, Georgia Tech, and the Department of Energy toward leveraging computation to solve challenges in science and engineering, such as sustainable energy."</p><p>&nbsp;</p><h6><strong>Previous Georgia Tech recipients of DOE Early Career Research Program awards include:</strong></h6><p><a href="https://www.gatech.edu/news/2024/09/26/doe-recognizes-georgia-tech-researchers-prestigious-early-career-awards"><strong>Itamar Kimchi</strong></a>, assistant professor, School of Physics</p><p><a href="https://www.gatech.edu/news/2024/09/26/doe-recognizes-georgia-tech-researchers-prestigious-early-career-awards"><strong>Sourabh Saha</strong></a>, assistant professor, George W. Woodruff School of Mechanical Engineering</p><p><a href="https://cos.gatech.edu/news/wenjing-liao-awarded-doe-early-career-award-model-simplification-deep-learning"><strong>Wenjing Lao</strong></a>, associate professor, School of Mathematics</p><p><a href="https://chbe.gatech.edu/news/2018/06/professor-lively-receives-does-early-career-award"><strong>Ryan Lively</strong></a>, Thomas C. DeLoach Professor, School of Chemical &amp; Biomolecular Engineering</p><p><a href="https://www.mse.gatech.edu/people/josh-kacher"><strong>Josh Kacher</strong></a>, associate professor, School of Materials Science and Engineering</p><p><a href="https://khabar.com/community-newsmakers/devesh-ranjan-receives-early-career-award-from-u-s-department-of-energy/"><strong>Devesh Ranjan</strong></a>, Eugene C. Gwaltney Jr. School Chair and professor, Woodruff School of Mechanical Engineering</p>]]></body>  <author>Bryant Wine</author>  <status>1</status>  <created>1770909115</created>  <gmt_created>2026-02-12 15:11:55</gmt_created>  <changed>1774011151</changed>  <gmt_changed>2026-03-20 12:52:31</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Georgia Tech's Qi Tang has received an Early Career Research Program award from the Department of Energy's Office of Science. The $875,000 grant supports Tang for five years to craft ML tools that analyze data from nuclear experiments and simulations. ]]></teaser>  <type>news</type>  <sentence><![CDATA[Georgia Tech's Qi Tang has received an Early Career Research Program award from the Department of Energy's Office of Science. The $875,000 grant supports Tang for five years to craft ML tools that analyze data from nuclear experiments and simulations. ]]></sentence>  <summary><![CDATA[<p>Georgia Tech’s&nbsp;<a href="https://cse.gatech.edu/people/qi-tang">Qi Tang</a> is building machine learning (ML) models to accelerate nuclear fusion research, making it more affordable and more accurate. Backed by a grant from the U.S. Department of Energy (DOE), Tang’s work brings clean, sustainable energy closer to reality.</p><p>Tang has received an&nbsp;<a href="https://science.osti.gov/early-career">Early Career Research Program (ECRP) award</a> from the DOE Office of Science. The grant supports Tang with $875,000 disbursed over five years to craft ML and data processing tools that help scientists analyze massive datasets from nuclear experiments and simulations.</p><p>Tang is the first faculty member from Georgia Tech’s College of Computing and School of Computational Science and Engineering (CSE) to receive the ECRP. He is the seventh Georgia Tech researcher to earn the award and the only GT awardee among this year’s 99 recipients.</p>]]></summary>  <dateline>2026-02-12T00:00:00-05:00</dateline>  <iso_dateline>2026-02-12T00:00:00-05:00</iso_dateline>  <gmt_dateline>2026-02-12 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[<p>Bryant Wine, Communications Officer<br><a href="mailto:bryant.wine@cc.gatech.edu">bryant.wine@cc.gatech.edu</a></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>679267</item>      </media>  <hg_media>          <item>          <nid>679267</nid>          <type>image</type>          <title><![CDATA[Qi-TangStory-Cover.jpg]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Qi-TangStory-Cover.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2026/02/12/Qi-TangStory-Cover.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/2026/02/12/Qi-TangStory-Cover.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2026/02/12/Qi-TangStory-Cover.jpg?itok=b0qDlm0w]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[DOE ECRP Qi Tang]]></image_alt>                    <created>1770909124</created>          <gmt_created>2026-02-12 15:12:04</gmt_created>          <changed>1770909124</changed>          <gmt_changed>2026-02-12 15:12:04</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[https://www.cc.gatech.edu/news/department-energy-award-power-nuclear-research-machine-learning]]></url>        <title><![CDATA[Department of Energy Award to Power Nuclear Research with Machine Learning]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>          <group id="50877"><![CDATA[School of Computational Science and Engineering]]></group>      </groups>  <categories>          <category tid="194606"><![CDATA[Artificial Intelligence]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="144"><![CDATA[Energy]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="194606"><![CDATA[Artificial Intelligence]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="144"><![CDATA[Energy]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="654"><![CDATA[College of Computing]]></keyword>          <keyword tid="166983"><![CDATA[School of Computational Science and Engineering]]></keyword>          <keyword tid="9153"><![CDATA[Research Horizons]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="10199"><![CDATA[Daily Digest]]></keyword>          <keyword tid="181991"><![CDATA[Georgia Tech News Center]]></keyword>          <keyword tid="9167"><![CDATA[machine learning]]></keyword>          <keyword tid="2556"><![CDATA[artificial intelligence]]></keyword>          <keyword tid="187812"><![CDATA[artificial intelligence (AI)]]></keyword>          <keyword tid="663"><![CDATA[Department of Energy]]></keyword>      </keywords>  <core_research_areas>          <term tid="193655"><![CDATA[Artificial Intelligence at Georgia Tech]]></term>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39531"><![CDATA[Energy and Sustainable Infrastructure]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71871"><![CDATA[Campus and Community]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata><![CDATA[]]></userdata></node><node id="688916">  <title><![CDATA[ Undergrads Earn National Recognition for Computing Research]]></title>  <uid>36530</uid>  <body><![CDATA[<p>Two Georgia Tech undergraduates are being recognized for their contributions to computing research.&nbsp;</p><p><strong>Ryan&nbsp;Punamiya</strong>&nbsp;(CS 2025)&nbsp;and <strong>Summer Abramson</strong>, a third-year&nbsp;computational&nbsp;media student, have been honored by the Computing Research Association (CRA) through its 2025–2026 <a href="https://cra.org/about/awards/outstanding-undergraduate-researcher-award/"><strong>Outstanding Undergraduate Researcher Award (URA) program.&nbsp;</strong></a></p><p>Punamiya&nbsp;was named a runner-up for the prestigious award, while Abramson received an honorable mention among hundreds of applicants from universities across North America.&nbsp;</p><p>The&nbsp;<a href="https://cra.org/about/awards/outstanding-undergraduate-researcher-award/"><strong>CRA Outstanding Undergraduate Researcher Award program</strong></a>&nbsp;recognized eight awardees in 2026, along with eight runners-up, nine finalists, and over 200 honorable mentions from thousands of applications.&nbsp;&nbsp;</p><h4><strong>Advancing&nbsp;Robotics Research&nbsp;</strong></h4><p>Punamiya&nbsp;knew early on that he&nbsp;didn’t&nbsp;want to wait until starting his Ph.D. to do meaningful and impactful robotics research.&nbsp;&nbsp;</p><p>Punamiya&nbsp;joined the Robot Learning and Reasoning Lab (RL2) directed by Assistant Professor&nbsp;Danfei&nbsp;Xu. While there, he contributed to the lab’s Meta-sponsored&nbsp;<a href="https://www.cc.gatech.edu/news/new-algorithm-teaches-robots-through-human-perspective"><strong>EgoMimic</strong></a>&nbsp;project, which trains robots to perform human tasks using recordings captured by Meta’s Project Aria research glasses.&nbsp;</p><p>Punamiya&nbsp;is&nbsp;also the first author of a paper accepted to the 2025 Conference on Neural Information Processing Systems (NeurIPS),&nbsp;one of the world’s most prestigious artificial intelligence (AI) and machine learning conferences.&nbsp;</p><p>“Ryan is the strongest undergraduate I've worked with,” Xu said, “including students who went on to Stanford, Berkeley, and leadership roles in major tech companies.&nbsp;He’s&nbsp;already&nbsp;operating&nbsp;at the level of a strong&nbsp;third-year Ph.D.&nbsp;student.”&nbsp;</p><p>Punamiya&nbsp;said it was a challenge to balance his undergraduate coursework with his research in Xu’s lab.&nbsp;</p><p>“You get out how much you put in,”&nbsp;he&nbsp;said.&nbsp;“I built my class schedule to give myself as much time to do research as possible. It also boils down to having the right research mentors.&nbsp;</p><p>“(Xu) never saw me as an&nbsp;undergrad&nbsp;who’s&nbsp;just there to do grunt work. I was&nbsp;fortunate&nbsp;he saw my curiosity and cultivated me as a researcher.&nbsp;That’s&nbsp;really how&nbsp;you get more&nbsp;undergrads&nbsp;motivated to research — giving them the chance to be independent and explore ideas of their own.”&nbsp;</p><p>Punamiya&nbsp;said his work in Xu’s lab has already helped him identify the research areas he wants to focus on as he considers his next steps. He will continue developing generalized training models for robots using human data so they can perform tasks instantly upon deployment.&nbsp;</p><p>"The amount of data needed to train a robot is difficult to obtain even for top industry companies," he said. "We have embodied robot data available in billions of humans. With the advent of extended reality devices, we can get a scalable source of diverse interactions within environments."</p><p>Punamiya&nbsp;graduated in December and recently started an internship at Nvidia. He mentioned he has been accepted into several Ph.D. programs, including Georgia Tech, and he is choosing where to continue his research.&nbsp;</p><p>“It’s the first time my research has been&nbsp;acknowledged&nbsp;externally by the robotics community,” he said. “It’s&nbsp;good to&nbsp;know&nbsp;the problem&nbsp;I’m&nbsp;working on is important, and that motivates me. Robotics is an exciting field. We are doing things now that two years ago were difficult to do.”&nbsp;</p><h4><strong>Researching Inclusion in Computing Education&nbsp;</strong></h4><p>Abramson conducts research in the People-Agents Research for Computing Education (PARCE) Laboratory under the mentorship of&nbsp;Pedro Guillermo Feijóo-García, a faculty member&nbsp;in the School of Computing Instruction. He and the Associate Dean for Undergraduate Education, Olufisayo Omojokun, nominated her for the award.&nbsp;</p><p>Her work focuses on the intersection of computing education and human-AI interaction, where she’s been exploring ways to create more equitable technology.&nbsp;</p><p>“This is such a huge milestone, and I couldn't be prouder of Summer,” Feijóo-García said. “Mentoring her for almost two years has been an amazing experience.”&nbsp;</p><p>Abramson has received the Georgia Tech President’s Undergraduate Research Award (PURA) twice, which supports her research exploring how user-centered design curricula can help address attrition among women in computing.</p><p>“I’ve had the amazing opportunity to pursue research at the intersection of student identity, community belonging, and how we can build tools that support our diverse student population,” Abramson said.&nbsp;</p><p>“Dr. Pedro and I have a goal to build community through a human-first approach, and I could not be more grateful for his support and guidance in my own journey. The CRA highlights the best of what the computing discipline has to offer, and I am incredibly honored for our work to be recognized.”</p><p>Abramson will spend the summer researching how user-centered design curricula can help promote confidence, belonging, and retention for women in computing.</p><p>Nominees for the PURA program were recognized for contributing to multiple research projects, authoring or coauthoring papers, presenting at conferences, developing widely used software artifacts, and supporting their communities as teaching assistants, tutors, and mentors.&nbsp;</p><p><em>School of Computing Instruction Communications Officer Emily Smith contributed to this story.</em></p><p><em>Main Photo: Ryan Punamiya works with a robot during the 2025 International Conference on Robotics and Automation in Atlanta. Photo by Terence Rushin/College of Computing.</em></p>]]></body>  <author>Nathan Deen</author>  <status>1</status>  <created>1773413846</created>  <gmt_created>2026-03-13 14:57:26</gmt_created>  <changed>1774011081</changed>  <gmt_changed>2026-03-20 12:51:21</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Ryan Punamiya (CS 2025) and Summer Abramson, a third-year computational media student, have been honored by the Computing Research Association (CRA) through its 2025–2026 Outstanding Undergraduate Researcher Award (URA) program. ]]></teaser>  <type>news</type>  <sentence><![CDATA[Ryan Punamiya (CS 2025) and Summer Abramson, a third-year computational media student, have been honored by the Computing Research Association (CRA) through its 2025–2026 Outstanding Undergraduate Researcher Award (URA) program. ]]></sentence>  <summary><![CDATA[<p><strong>Ryan&nbsp;Punamiya</strong>&nbsp;(CS 2025)&nbsp;and <strong>Summer Abramson</strong>, a third-year&nbsp;computational&nbsp;media student, have been honored by the Computing Research Association (CRA) through its 2025–2026 <a href="https://cra.org/about/awards/outstanding-undergraduate-researcher-award/"><strong>Outstanding Undergraduate Researcher Award (URA) program.&nbsp;</strong></a></p><p>Punamiya&nbsp;was named a runner-up for the prestigious award, while Abramson received an honorable mention among hundreds of applicants from universities across North America.&nbsp;</p><p>The&nbsp;<a href="https://cra.org/about/awards/outstanding-undergraduate-researcher-award/"><strong>CRA Outstanding Undergraduate Researcher Award program</strong></a>&nbsp;recognized eight awardees in 2026, along with eight runners-up, nine finalists, and over 200 honorable mentions from thousands of applications.&nbsp;</p>]]></summary>  <dateline>2026-03-13T00:00:00-04:00</dateline>  <iso_dateline>2026-03-13T00:00:00-04:00</iso_dateline>  <gmt_dateline>2026-03-13 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>679613</item>      </media>  <hg_media>          <item>          <nid>679613</nid>          <type>image</type>          <title><![CDATA[ICRA-2025_P9A0421-Enhanced-NR.jpg]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[ICRA-2025_P9A0421-Enhanced-NR.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2026/03/13/ICRA-2025_P9A0421-Enhanced-NR.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/2026/03/13/ICRA-2025_P9A0421-Enhanced-NR.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2026/03/13/ICRA-2025_P9A0421-Enhanced-NR.jpg?itok=vnBCPFhq]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Ryan Punamiya]]></image_alt>                    <created>1773413856</created>          <gmt_created>2026-03-13 14:57:36</gmt_created>          <changed>1773413856</changed>          <gmt_changed>2026-03-13 14:57:36</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="193158"><![CDATA[Student Competition Winners (academic, innovation, and research)]]></category>          <category tid="193157"><![CDATA[Student Honors and Achievements]]></category>          <category tid="8862"><![CDATA[Student Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="193158"><![CDATA[Student Competition Winners (academic, innovation, and research)]]></term>          <term tid="193157"><![CDATA[Student Honors and Achievements]]></term>          <term tid="8862"><![CDATA[Student Research]]></term>      </news_terms>  <keywords>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="9153"><![CDATA[Research Horizons]]></keyword>          <keyword tid="101271"><![CDATA[Computing Research Association]]></keyword>          <keyword tid="22861"><![CDATA[undergraduate research awards]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>          <topic tid="71871"><![CDATA[Campus and Community]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata><![CDATA[]]></userdata></node><node id="687708">  <title><![CDATA[ Researchers Warn AI ‘Blind Spot’ Could Allow Attackers to Hijack Self-Driving Vehicles]]></title>  <uid>36253</uid>  <body><![CDATA[<div><div><p>A newly discovered vulnerability could allow cybercriminals to silently hijack the artificial intelligence (AI) systems in self-driving cars, raising concerns about the security of autonomous systems increasingly used on public roads.</p><p>&nbsp;Georgia Tech cybersecurity researchers discovered the vulnerability, dubbed VillainNet, and found it can remain dormant in a self-driving vehicle’s AI system until triggered by specific conditions.</p><p>Once triggered, VillainNet is almost certain to succeed, giving attackers control of the targeted vehicle.</p><p>The research finds that attackers could program almost any action within a self-driving vehicle’s AI super network to trigger VillainNet. In one possible scenario, it could be triggered when a self-driving taxi’s AI responds to rainfall and changing road conditions.</p><p>Once in control, hackers could hold the passengers hostage and threaten to crash the taxi.</p><p>The researchers discovered this new backdoor attack threat in the AI super networks that power autonomous driving systems.&nbsp;</p><p>“Super networks are designed to be the Swiss Army knife of AI, swapping out tools, or in this case sub networks, as needed for the task at hand," said <a href="https://davidoygenblik.github.io/"><strong>David Oygenblik</strong></a>, Ph.D. student at Georgia Tech and the lead researcher on the project.&nbsp;</p><p>"However, we found that an adversary can exploit this by attacking just one of those tiny tools. The attack remains completely dormant until that specific subnetwork is used, effectively hiding across billions of other benign configurations."&nbsp;</p><p>This backdoor attack is nearly guaranteed to work, according to Oygenblik. This blind spot is nearly undetectable with current tools and can impact any autonomous vehicle that runs on AI. It can also be hidden at any stage of development and include billions of scenarios.</p><p>“With VillainNet, the attacker forces defenders to find a single needle in a haystack that can be as large as 10 quintillion straws," said Oygenblik.&nbsp;</p><p>"Our work is a call to action for the security community. As AI systems become more complex and adaptive, we must develop new defenses capable of addressing these novel, hyper-targeted threats."&nbsp;</p><p>The hypothetical fix to the problem was to add security measures to the super networks. These networks contain billions of specialized subnetworks that can be activated on the fly, but Oygenblik wanted to see what would happen if he attacked a single subnetwork tool.</p><p>In experiments, the VillainNet attack proved highly effective. It achieved a 99% success rate when activated while remaining invisible throughout the AI system.&nbsp;</p><p>The research also shows that detecting a VillainNet backdoor would require 66x more computing power and time to verify the AI system is safe. This challenge dramatically expands the search space for attack detection and is not feasible, according to the researchers.</p><p>The project was <a href="https://www.youtube.com/watch?v=H1fyPD8vWDo">presented</a> at the ACM Conference on Computer and Communications Security (CCS) in October 2025. The paper, <a href="https://davidoygenblik.github.io/pdfs/VNET.pdf"><em>VillainNet: Targeted Poisoning Attacks Against SuperNets Along the Accuracy-Latency Pareto Frontier</em></a>, was co-authored by Oygenblik, master's students <strong>Abhinav Vemulapalli </strong>and <strong>Animesh Agrawal</strong>, Ph.D. student <strong>Debopam Sanyal</strong>, Associate Professor <strong>Alexey Tumanov</strong>, and Associate Professor <strong>Brendan Saltaformaggio</strong>.&nbsp;</p></div></div>]]></body>  <author>John Popham</author>  <status>1</status>  <created>1769525518</created>  <gmt_created>2026-01-27 14:51:58</gmt_created>  <changed>1771522498</changed>  <gmt_changed>2026-02-19 17:34:58</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[A newly discovered vulnerability could allow cybercriminals to silently hijack the artificial intelligence (AI) systems in self-driving cars, raising concerns about the security of autonomous systems increasingly used on public roads.]]></teaser>  <type>news</type>  <sentence><![CDATA[A newly discovered vulnerability could allow cybercriminals to silently hijack the artificial intelligence (AI) systems in self-driving cars, raising concerns about the security of autonomous systems increasingly used on public roads.]]></sentence>  <summary><![CDATA[<p>A newly discovered vulnerability could allow cybercriminals to silently hijack the artificial intelligence (AI) systems in self-driving cars, raising concerns about the security of autonomous systems increasingly used on public roads.</p><p>&nbsp;Georgia Tech cybersecurity researchers discovered the vulnerability, dubbed VillainNet, and found it can remain dormant in a self-driving vehicle’s AI system until triggered by specific conditions.</p><p>Once triggered, VillainNet is almost certain to succeed, giving attackers control of the targeted vehicle.</p>]]></summary>  <dateline>2026-01-27T00:00:00-05:00</dateline>  <iso_dateline>2026-01-27T00:00:00-05:00</iso_dateline>  <gmt_dateline>2026-01-27 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[<p><a href="mailto:jpopham3@gatech.edu">John Popham</a><br>Communications Officer II&nbsp;<br>School of Cybersecurity and Privacy</p><p>&nbsp;</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>679102</item>      </media>  <hg_media>          <item>          <nid>679102</nid>          <type>image</type>          <title><![CDATA[Car-Blind-Spot.jpeg]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Car-Blind-Spot.jpeg]]></image_name>            <image_path><![CDATA[/sites/default/files/2026/01/27/Car-Blind-Spot.jpeg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/2026/01/27/Car-Blind-Spot.jpeg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2026/01/27/Car-Blind-Spot.jpeg?itok=pckjSeql]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[A car's side view mirror with a alert in the center of the mirror. ]]></image_alt>                    <created>1769525530</created>          <gmt_created>2026-01-27 14:52:10</gmt_created>          <changed>1769525530</changed>          <gmt_changed>2026-01-27 14:52:10</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>          <group id="660367"><![CDATA[School of Cybersecurity and Privacy]]></group>      </groups>  <categories>          <category tid="194606"><![CDATA[Artificial Intelligence]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="145"><![CDATA[Engineering]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="194606"><![CDATA[Artificial Intelligence]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="145"><![CDATA[Engineering]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="182941"><![CDATA[cc-research; ic-cybersecurity; ic-hcc]]></keyword>          <keyword tid="175307"><![CDATA[Brendan Saltaformaggio]]></keyword>          <keyword tid="365"><![CDATA[Research]]></keyword>          <keyword tid="192863"><![CDATA[go-ai]]></keyword>          <keyword tid="188667"><![CDATA[go-]]></keyword>      </keywords>  <core_research_areas>          <term tid="193655"><![CDATA[Artificial Intelligence at Georgia Tech]]></term>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata><![CDATA[]]></userdata></node><node id="687813">  <title><![CDATA[From Fusion to Self-Driving Cars, High Performance Computing and AI are Everywhere in 2026]]></title>  <uid>36319</uid>  <body><![CDATA[<p>While not as highlight-reel worthy as the Winter Olympics and the World Cup, experts expect high-performance computing (HPC) to have an even bigger impact on daily life in 2026.</p><p>Georgia Tech researchers say HPC and artificial intelligence (AI) advances this year are poised to improve how people power their homes, design safer buildings, and travel through cities.</p><p>According to&nbsp;<a href="https://tangqi.github.io/">Qi Tang</a>, scientists will take progressive steps toward cleaner, sustainable energy through nuclear fusion in 2026.&nbsp;</p><p>“I am very hopeful about the role of advanced computing and AI in making fusion a clean energy source,” said Tang, an assistant professor in the&nbsp;<a href="https://cse.gatech.edu/">School of Computational Science and Engineering (CSE)</a>.&nbsp;</p><p>“Fusion systems involve many interconnected processes happening across different scales. Modern simulations, combined with data-driven methods, allow us to bring these pieces together into a unified picture.”</p><p>Tang’s research connects HPC and machine learning with fusion energy and plasma physics. This year, Tang is continuing work on large-scale nuclear fusion models.</p><p>Only a few experimental fusion reactors exist worldwide compared to more than 400 nuclear fission reactors. Tang’s work supports a broader effort to turn fusion from a promising idea into a practical energy source.</p><p>Nuclear fusion occurs in plasma, the fourth state of matter, where gas is heated to millions of degrees. In this extreme state, electrons are stripped from atoms, creating a hot soup of fast-moving ions and free electrons. In plasma, hydrogen atoms overcome their natural electrical repulsion, collide, and fuse together. This releases energy that can power cities and homes.</p><p>Computers interpret extreme temperatures, densities, pressures, and plasma particle motion as massive datasets. Tang works to assimilate these data types from computer models and real-world experiments.</p><p>To do this, he and other researchers rely on machine learning approaches to analyze data across models and experiments more quickly and to produce more accurate predictions. Over time, this will allow scientists to test and improve fusion reactor designs toward commercial use.&nbsp;</p><p>Beyond energy and nuclear engineering,&nbsp;<a href="https://pk.linkedin.com/in/umarkhayaz">Umar Khayaz</a> sees broader impacts for HPC in 2026.</p><p>“HPC is the need of the day in every field of engineering sciences, physics, biology, and economics,” said Khayaz, a CSE Ph.D. student in the&nbsp;<a href="https://ce.gatech.edu/">School of Civil and Environmental Engineering</a>.&nbsp;</p><p>“HPC is important enough to say that we need to employ resources to also solve social problems.”</p><p>Khayaz studies dynamic fracture and phase-field modeling. These areas explore how materials break under sudden, rapid loads.&nbsp;</p><p>Like nuclear fusion, Khayaz says dynamic fracture problems are complex and data-intensive. In 2026, he expects to see more computing resources and computational capabilities devoted to understanding these problems and other emerging civil engineering challenges.</p><p>CSE Ph.D. student&nbsp;<a href="https://ahren09.github.io/">Yiqiao (Ahren) Jin</a> sees a similar relationship between infrastructure and self-driving vehicles. He believes AI will innovate this area in 2026.</p><p>At Georgia Tech, Jin develops efficient multimodal AI systems. An autonomous vehicle is a multimodal system that uses camera video, laser sensors, language instructions, and other inputs to navigate city streets under changing scenarios like traffic and weather patterns.</p><p>Jin says multimodal research will move beyond performance benchmarks this year. This shift will lead to computer systems that can reason despite uncertainty and explain their decisions. In result, engineers will redefine how they evaluate and deploy autonomous systems in safety-critical settings.</p><p>“Many foundational problems in perception, multimodal reasoning, and agent coordination are being actively addressed in 2026. These advances enable a transition from isolated autonomous systems to safer, coordinated autonomous vehicle fleets,” Jin said.&nbsp;</p><p>“As these systems scale, they have the potential to fundamentally improve transportation safety and efficiency.”</p>]]></body>  <author>Bryant Wine</author>  <status>1</status>  <created>1769697057</created>  <gmt_created>2026-01-29 14:30:57</gmt_created>  <changed>1771516409</changed>  <gmt_changed>2026-02-19 15:53:29</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Georgia Tech researchers say HPC and artificial intelligence (AI) advances this year are poised to improve how people power their homes, design safer buildings, and travel through cities.]]></teaser>  <type>news</type>  <sentence><![CDATA[Georgia Tech researchers say HPC and artificial intelligence (AI) advances this year are poised to improve how people power their homes, design safer buildings, and travel through cities.]]></sentence>  <summary><![CDATA[<p>While not as highlight-reel worthy as the Winter Olympics and the World Cup, experts expect high-performance computing (HPC) to have an even bigger impact on daily life in 2026.</p><p>Georgia Tech researchers say HPC and artificial intelligence (AI) advances this year are poised to improve how people power their homes, design safer buildings, and travel through cities.</p>]]></summary>  <dateline>2026-01-29T00:00:00-05:00</dateline>  <iso_dateline>2026-01-29T00:00:00-05:00</iso_dateline>  <gmt_dateline>2026-01-29 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[<p>Bryant Wine, Communications Officer<br><a href="mailto:bryant.wine@cc.gatech.edu">bryant.wine@cc.gatech.edu</a></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>679125</item>      </media>  <hg_media>          <item>          <nid>679125</nid>          <type>image</type>          <title><![CDATA[CSE-in-2026_2.jpg]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[CSE-in-2026_2.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2026/01/29/CSE-in-2026_2.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/2026/01/29/CSE-in-2026_2.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2026/01/29/CSE-in-2026_2.jpg?itok=0wuKznLw]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[CSE in 2026]]></image_alt>                    <created>1769704332</created>          <gmt_created>2026-01-29 16:32:12</gmt_created>          <changed>1769704332</changed>          <gmt_changed>2026-01-29 16:32:12</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[https://www.cc.gatech.edu/news/fusion-self-driving-cars-high-performance-computing-and-ai-are-everywhere-2026]]></url>        <title><![CDATA[From Fusion to Self-Driving Cars, High Performance Computing and AI are Everywhere in 2026]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>          <group id="50877"><![CDATA[School of Computational Science and Engineering]]></group>      </groups>  <categories>          <category tid="194606"><![CDATA[Artificial Intelligence]]></category>          <category tid="142"><![CDATA[City Planning, Transportation, and Urban Growth]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="144"><![CDATA[Energy]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="8862"><![CDATA[Student Research]]></category>      </categories>  <news_terms>          <term tid="194606"><![CDATA[Artificial Intelligence]]></term>          <term tid="142"><![CDATA[City Planning, Transportation, and Urban Growth]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="144"><![CDATA[Energy]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="8862"><![CDATA[Student Research]]></term>      </news_terms>  <keywords>          <keyword tid="654"><![CDATA[College of Computing]]></keyword>          <keyword tid="172288"><![CDATA[School of Computational Science Engineering]]></keyword>          <keyword tid="167864"><![CDATA[School of Civil and Environmental Engineering]]></keyword>          <keyword tid="594"><![CDATA[college of engineering]]></keyword>          <keyword tid="9153"><![CDATA[Research Horizons]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="10199"><![CDATA[Daily Digest]]></keyword>          <keyword tid="181991"><![CDATA[Georgia Tech News Center]]></keyword>          <keyword tid="15030"><![CDATA[high-performance computing]]></keyword>          <keyword tid="187812"><![CDATA[artificial intelligence (AI)]]></keyword>          <keyword tid="9167"><![CDATA[machine learning]]></keyword>          <keyword tid="192863"><![CDATA[go-ai]]></keyword>          <keyword tid="194384"><![CDATA[Tech AI]]></keyword>      </keywords>  <core_research_areas>          <term tid="193655"><![CDATA[Artificial Intelligence at Georgia Tech]]></term>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>          <term tid="39531"><![CDATA[Energy and Sustainable Infrastructure]]></term>          <term tid="39541"><![CDATA[Systems]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71881"><![CDATA[Science and Technology]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata><![CDATA[]]></userdata></node><node id="687892">  <title><![CDATA[Georgia Tech Computing Hosts Venture Capital Summit to Push Research Beyond the Lab]]></title>  <uid>32045</uid>  <body><![CDATA[<p>The College of Computing is forging new relationships with Atlanta’s venture capital community to advance entrepreneurial opportunities for students.</p><p>Nearly two dozen venture capital (VC) leaders based in Atlanta and the Southeast participated in a half-day summit at the College on Jan. 21.</p><p>Co-hosts Dean of Computing <a href="https://www.linkedin.com/in/vsarkar/"><strong>Vivek Sarkar</strong></a> and Noro-Moseley Partners General Partner&nbsp;<a href="https://www.linkedin.com/in/alantaetle/"><strong>Alan Taetle</strong></a> organized the invitation-only summit. Their goals were to:</p><ul><li>Showcase the College’s&nbsp;<a href="https://www.cc.gatech.edu/research-areas"><strong>research strengths</strong></a> and&nbsp;<a href="https://www.cc.gatech.edu/entrepreneurship-gt-computing"><strong>entrepreneurial culture</strong></a></li><li>Deepen connections between academic innovation and startups</li><li>Explore opportunities for collaboration, commercialization, and startup growth</li></ul><p>The summit’s guest list included founders, partners, and leaders from VC firms. Many of these firms focus on early-stage startups in SaaS, fintech, cybersecurity, and other emerging technology markets.</p><h3><strong>Research With Commercial Impact</strong></h3><p>Sarkar outlined the College of Computing’s academic mission and research priorities during his opening remarks. He emphasized the College’s role in advancing innovation in cybersecurity, artificial intelligence (AI), and other emerging research areas.</p><p>“One of the College’s strategic pillars is what I call ‘X to the power of Computing’,” Sarkar said. “Look at any discipline or industry X to see where they're innovating and where their advances are being made, and that’s where Computing meets that discipline.”</p><p>Along with remarks from the dean, the summit featured presentations highlighting Georgia Tech’s entrepreneurial ecosystem and College-led research initiatives with strong commercialization potential.</p><h3><strong>Expanding Support for Student Founders</strong></h3><p><a href="https://www.linkedin.com/in/jenniferwhitlow/"><strong>Jen Whitlow</strong></a> leads Community Partnerships at Fusen, a global platform for student founders created by Atlanta philanthropist&nbsp;<a href="https://www.linkedin.com/in/chklaus/"><strong>Christopher W. Klaus</strong></a>. She described Klaus’s support for student entrepreneurship, including GT Computing’s annual&nbsp;<a href="https://www.cc.gatech.edu/klaus-startup-challenge"><strong>Klaus Startup Challenge</strong></a>. In 2025,&nbsp;<a href="https://www.cc.gatech.edu/news/klaus-startup-challenge-showcases-georgia-techs-rising-entrepreneurial-talent"><strong>Klaus awarded five winning teams $150,000 each</strong></a> to cover startup costs.</p><p>Whitlow also updated guests on Klaus’s commitment, <a href="https://news.gatech.edu/news/2025/05/02/tech-visionary-chris-klaus-empowers-georgia-tech-grads-launch-startups">announced in May 2025</a>, to covering the incorporation costs for any graduating student who aspires to launch a startup.</p><p>“More than 600 graduates from last year’s Spring and Fall Commencements have accepted the gift, and more than 225 recent graduates have completed their incorporation to date,” Whitlow said. She added that a second cohort of Fall 2025 graduates is being processed over the next few weeks.</p><p>Offering an enterprise-level view, <a href="https://create-x.gatech.edu/"><strong>CREATE-X</strong></a> <a href="https://www.linkedin.com/in/saxenar/"><strong>Rahul Saxena</strong></a><strong> </strong>presented recent updates to commercialization at Georgia Tech and efforts to streamline entrepreneurial processes.</p><p>Saxena emphasized the launch of&nbsp;<a href="https://commercialization.gatech.edu/velocity"><strong>Velocity Startups</strong></a>, an accelerator that provides the resources and infrastructure student startups need to bring their innovations to market.</p><h3><strong>Building the Pipeline From Research to Startup</strong></h3><p>Following these updates, GT Computing faculty delivered lightning-round presentations highlighting the College’s research strengths in AI, cybersecurity, and high-performance computing.</p><p>“The tighter the local investing community is with Georgia Tech, the better off both are,” said Taetle, who has been a member of the College’s Advisory Board for more than 20 years.</p><p>“It’s critical in this super-competitive world that we do everything that we can to support this fantastic university.”</p><p>Taetle added that the summit was part of a broader effort to strengthen the College’s entrepreneurial pipeline.</p><p>“There are some really big ideas here, which could turn into really big companies,” he said. “We’ve made some great strides on the commercialization front, but we still have that opportunity and challenge in front of us.”</p><p>The afternoon concluded with a discussion of next steps and engagement opportunities, led by Sarkar and <a href="https://www.linkedin.com/in/jzwang/"><strong>Jason Zwang</strong></a>, GT Computing’s senior director of development. The discussion focused on research partnership opportunities, startup formation, and student involvement.</p><p>Zwang emphasized the importance of investing in Atlanta’s innovation ecosystem, citing the city’s strong fundamentals and pro-growth climate for entrepreneurship.</p><p>“This gives us a unique opportunity to start working more closely with the local VC community, and it’s also great for our students,” Zwang said.</p><p>Sarkar agreed, saying, “There’s no downside for students to get involved in a startup. It might take off and be a bonanza. If not, the experience makes you a more competitive hire because of the breadth of experience you gain at a startup.”</p><p>To foster these opportunities for students, Zwang said that a key priority is to establish earlier, more intentional connections among students, startups, and investors.</p><p>“This is a pivotal moment,” he said. “We can determine how to connect students with the VC and startup community earlier and ensure these investors remain involved with the College.”</p><p>College leaders said the summit underscored Computing’s commitment to fostering an entrepreneurial culture and to building lasting relationships that can help accelerate the real-world impact of its research beyond the Institute.</p><p>“Georgia Tech is a force multiplier for entrepreneurship,” said Sarkar. “We’re here to change the world. We want to inspire a culture of bold, big entrepreneurial thinking, and look forward to the next steps that will follow this VC summit.”</p>]]></body>  <author>Ben Snedeker</author>  <status>1</status>  <created>1770047836</created>  <gmt_created>2026-02-02 15:57:16</gmt_created>  <changed>1771516341</changed>  <gmt_changed>2026-02-19 15:52:21</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[The College of Computing is working to connect student and faculty entrepreneurs with early-development startup support.]]></teaser>  <type>news</type>  <sentence><![CDATA[The College of Computing is working to connect student and faculty entrepreneurs with early-development startup support.]]></sentence>  <summary><![CDATA[<p>Nearly two dozen venture capital leaders from Atlanta and across the Southeast joined the College of Computing on Jan. 21 for a half-day VC summit focused on research, innovation, and collaboration.</p>]]></summary>  <dateline>2026-02-02T00:00:00-05:00</dateline>  <iso_dateline>2026-02-02T00:00:00-05:00</iso_dateline>  <gmt_dateline>2026-02-02 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[<p><a href="mailto:albert.snedeker@cc.gatech.edu">Ben Snedeker</a>, Senior Communications Manager</p><p>Georgia Tech College of Computing</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>679150</item>      </media>  <hg_media>          <item>          <nid>679150</nid>          <type>image</type>          <title><![CDATA[GT Computing 2026 Venture Capital Summit group photo]]></title>          <body><![CDATA[<p><em>Top executives from Atlanta's venture capital community participated in the College of Computing's first VC summit, held on Jan. 21. Photo by Terence Rushin/GT Computing</em></p>]]></body>                      <image_name><![CDATA[Venture-Capitalists-_86A0835-copy.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2026/02/02/Venture-Capitalists-_86A0835-copy.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/2026/02/02/Venture-Capitalists-_86A0835-copy.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2026/02/02/Venture-Capitalists-_86A0835-copy.jpg?itok=wyHniDH3]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Top executives from Atlanta's venture capital community participated in the College of Computing's first VC summit, held on Jan. 21.]]></image_alt>                    <created>1770047844</created>          <gmt_created>2026-02-02 15:57:24</gmt_created>          <changed>1770047844</changed>          <gmt_changed>2026-02-02 15:57:24</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>      </groups>  <categories>          <category tid="135"><![CDATA[Research]]></category>          <category tid="133"><![CDATA[Special Events and Guest Speakers]]></category>      </categories>  <news_terms>          <term tid="135"><![CDATA[Research]]></term>          <term tid="133"><![CDATA[Special Events and Guest Speakers]]></term>      </news_terms>  <keywords>          <keyword tid="10199"><![CDATA[Daily Digest]]></keyword>          <keyword tid="181991"><![CDATA[Georgia Tech News Center]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="137161"><![CDATA[CREATE-X]]></keyword>          <keyword tid="194105"><![CDATA[aspiring entrepreneurs]]></keyword>      </keywords>  <core_research_areas>          <term tid="193655"><![CDATA[Artificial Intelligence at Georgia Tech]]></term>          <term tid="193658"><![CDATA[Commercialization]]></term>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71871"><![CDATA[Campus and Community]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata><![CDATA[]]></userdata></node><node id="686615">  <title><![CDATA[Researchers Look to Maker Safer AI Through Google Awards]]></title>  <uid>36530</uid>  <body><![CDATA[<p>People seeking mental health support are increasingly turning to large language models (LLMs) for advice.&nbsp;</p><p>However, most popular AI-powered chatbots are not trained to recognize when someone is in crisis. LLMs also cannot determine when to refer someone to a human specialist.</p><p>New Georgia Tech research projects that address these issues may soon provide people seeking mental health support with safer experiences.&nbsp;</p><p>Google has awarded research grants to three faculty members from the School of Interactive Computing to study artificial intelligence (AI), trust, safety, and security. The grants were among dozens awarded by the company to researchers across the country.</p><p>Professor <a href="http://www.munmund.net/"><strong>Munmun De Choudhury</strong></a>, Associate Professor <a href="https://sites.google.com/view/riarriaga/home"><strong>Rosa Arriaga</strong></a>, and Associate Professor <a href="https://aritter.github.io/"><strong>Alan Ritter</strong></a> are among the recipients of the <a href="https://research.google/programs-and-events/google-academic-research-awards/google-academic-research-award-program-recipients/"><strong>2025 Google Academic Research Awards</strong></a>.&nbsp;</p><p>Their projects will explore questions like:</p><ul><li>What harms could occur if people consult LLMs for mental health advice?</li><li>Which groups are most at risk of receiving harmful guidance?</li><li>When should an LLM stop responding and refer someone to a human professional?</li></ul><p>De Choudhury and Arriaga will examine how LLMs might harm people seeking mental health care.</p><p>De Choudhury’s work focuses on spotting when chatbot conversations go wrong and lead users toward self-harm. She is also studying design changes that could prevent these situations.</p><p>Her project,&nbsp;<em>Exiting Harmful Reliance: Identifying Crises &amp; Care Escalation Needs</em>, is in partnership with Angel Hsing-Chi Hwang from the University of Southern California. Together, they will review real and synthetic chat transcripts with clinicians to find language patterns that signal risk.</p><p>“A chatbot will always give a response and keep talking to you for however long you want,” De Choudhury said. “That may not be a good thing for someone in crisis. We need to know when the right response is to stop and suggest talking to a human.”</p><p>&nbsp;</p><h4><strong>Understanding Risks for Low-Income Users</strong></h4><p>Arriaga’s project,&nbsp;<em>Dull, Dirty, Dangerous: Investigating Trust of Digital Resources Among Low-SES Mental Health Care Seekers</em>, looks at how LLMs affect people with low socioeconomic status (SES).</p><p>Dull, dirty, and dangerous is a phrase used to describe work that is well-suited for robot automation because they are repetitive, physically taxing, or hazardous for humans. Arriaga said she adapted these terms for her research to create a taxonomy of the harms AI can cause to people seeking mental health care.</p><p>Arriaga also wants to label the trust factors that chatbots have that attract low-SES users to seek their advice, and how these may differ for adults and adolescents across contexts.&nbsp;</p><p>“We know one of the reasons some users go to LLMs is because they aren’t insured and can’t afford a therapist,” she said. “LLMs are available 24-7. Maybe it doesn’t start as a trust issue. Maybe it starts with availability.&nbsp;</p><p>“Some of these human-AI conversations that result in harmful mental health advice didn’t begin on the topic of mental health. In one case, the person started going to the machine for help with homework.</p><p>“Then this relationship evolved into personal matters. Should we constrain the system to limit itself to helping someone with their homework and not wander off that subject into mental health matters?”</p><p>&nbsp;</p><h4><strong>Managing Privacy Risks for Social Media</strong></h4><p>Ritter will use the Google award to advance research on social media privacy tools, including interactive AI agents that help people make more informed decisions about what they share online.</p><p>His project, <em>AI Tools to Help Users Make Informed Decisions About Online Information Sharing</em>, focuses on reducing privacy risks in both text and images by identifying when posts reveal more than users intend.</p><p>“We’ve been developing methods to assess risks in text, and now we’re extending that work to images,” Ritter said. “People post photos without realizing how easily they can be geolocated by advanced AI systems. A casual selfie near home might contain subtle cues about where you live, like a street sign, that reveal private details.”</p><p>The project aims to create AI agents that review content within user posts, flag elements that pose risk, and suggest safer alternatives. Ritter said he wants people to maintain control over their privacy without limiting freedom of expression.</p><p>Ritter will deploy advanced reasoning models capable of probabilistic privacy estimation. These systems can infer how identifiable a piece of text might be or how likely an image is to reveal a user’s location.</p><p>For images, Ritter and his collaborators will use models that identify geolocatable features, allowing users to edit or hide them before posting.</p><p>For more on Ritter’s research,&nbsp;<a href="https://www.cc.gatech.edu/news/new-large-language-model-can-protect-social-media-users-privacy"><strong>read how an LLM he co-developed protects the privacy of users on social media.</strong></a></p>]]></body>  <author>Nathan Deen</author>  <status>1</status>  <created>1764016112</created>  <gmt_created>2025-11-24 20:28:32</gmt_created>  <changed>1767965901</changed>  <gmt_changed>2026-01-09 13:38:21</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Three Georgia Tech faculty members received Google Academic Research Awards to study how to make AI safer.]]></teaser>  <type>news</type>  <sentence><![CDATA[Three Georgia Tech faculty members received Google Academic Research Awards to study how to make AI safer.]]></sentence>  <summary><![CDATA[<p>Three Georgia Tech faculty members from the School of Interactive Computing received Google Academic Research Awards to study how to make AI safer, focusing on minimizing harm to users seeking <strong>mental health support</strong> from large language models (LLMs) and improving <strong>social media privacy</strong> tools.</p>]]></summary>  <dateline>2025-11-24T00:00:00-05:00</dateline>  <iso_dateline>2025-11-24T00:00:00-05:00</iso_dateline>  <gmt_dateline>2025-11-24 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>678716</item>      </media>  <hg_media>          <item>          <nid>678716</nid>          <type>image</type>          <title><![CDATA[437249_Google-Research-Award-Graphic.jpg]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[437249_Google-Research-Award-Graphic.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2025/11/24/437249_Google-Research-Award-Graphic.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/2025/11/24/437249_Google-Research-Award-Graphic.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2025/11/24/437249_Google-Research-Award-Graphic.jpg?itok=qXR59Azs]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Google Research Awards]]></image_alt>                    <created>1764016128</created>          <gmt_created>2025-11-24 20:28:48</gmt_created>          <changed>1764016128</changed>          <gmt_changed>2025-11-24 20:28:48</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>      </groups>  <categories>          <category tid="194606"><![CDATA[Artificial Intelligence]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="194606"><![CDATA[Artificial Intelligence]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="194701"><![CDATA[go-resarchnews]]></keyword>          <keyword tid="9153"><![CDATA[Research Horizons]]></keyword>          <keyword tid="192863"><![CDATA[go-ai]]></keyword>          <keyword tid="193860"><![CDATA[Artifical Intelligence]]></keyword>          <keyword tid="187812"><![CDATA[artificial intelligence (AI)]]></keyword>          <keyword tid="192524"><![CDATA[ChatGPT]]></keyword>          <keyword tid="184554"><![CDATA[Google Research Award]]></keyword>          <keyword tid="167007"><![CDATA[health &amp; well-being]]></keyword>          <keyword tid="10343"><![CDATA[mental health]]></keyword>          <keyword tid="169137"><![CDATA[chatbot]]></keyword>          <keyword tid="167543"><![CDATA[social media]]></keyword>          <keyword tid="114791"><![CDATA[Data Privacy]]></keyword>      </keywords>  <core_research_areas>      </core_research_areas>  <news_room_topics>          <topic tid="71901"><![CDATA[Society and Culture]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata><![CDATA[]]></userdata></node><node id="686197">  <title><![CDATA[New Software Center Director to Lead Next Wave of Scientific Discovery]]></title>  <uid>36319</uid>  <body><![CDATA[<p>Scientists across Georgia Tech rely on powerful software tools to propel breakthroughs in fields ranging from physics to biology. Now, software experts who make that research possible are gaining a new leader.&nbsp;</p><p>The College of Computing named Professor&nbsp;<a href="https://vuduc.org/v2/">Rich Vuduc</a> as director of the Center for Scientific Software Engineering (<a href="https://ssecenter.cc.gatech.edu/">CSSE</a>). The Georgia Tech hub is dedicated to building reliable, high-performance software for scientists. &nbsp;</p><p>Under Vuduc’s leadership, CSSE strives to accelerate the pace and increase the quality of scientific discovery by developing custom software tools and best practices tailored to researchers’ needs.</p><p>“There is a reproducibility and reliability problem right now with scientific software,” Vuduc said. “The promise of CSSE is to leverage capabilities shared between Georgia Tech, Schmidt Sciences, and industry experts to address this problem.”&nbsp;</p><p>Issues arise because scientists often need to develop their own software for experiments or data analysis. However, troubleshooting coding issues and other bugs can slow down research.</p><p>To assist these scientists, CSSE receives their input to create custom software tools and best practices. The center employs professional software engineers who build and deliver products tailor-made to the needs of researchers at Georgia Tech and broader scientific communities.</p><p>Beyond its research focus, CSSE helps Georgia Tech fulfill its educational mission. The center provides students with direct access and exposure to real-world software engineering.</p><p>As the center enters its third year, Vuduc wants to better prepare students for employment by enhancing their hands-on experience while learning from CSSE engineers.</p><p>To achieve this goal, Vuduc is working to establish a <a href="https://gatech.infoready4.com/#competitionDetail/1999204">Ph.D. fellowship program</a> in which CSSE engineers mentor students. This program would connect academic inquiry with industry expertise, creating the next generation of dynamic leaders in computational science. &nbsp;</p><p>Vuduc also envisions pairing CSSE with Georgia Tech’s&nbsp;<a href="https://vip.gatech.edu/">Vertically Integrated Projects (VIP) program</a>. This approach would allow undergraduate students to earn class credit while working with CSSE engineers on large software engineering projects spanning multiple semesters.</p><p>“The center gives our students access to something that is very unique to find in a university environment,” Vuduc said.&nbsp;</p><p>“The software engineers in CSSE mostly come from industry. They have over 65 years of combined experience doing real-world software engineering that students can learn from.”</p><p>Vuduc is a 2010 recipient of the&nbsp;<a href="https://awards.acm.org/bell">Gordon Bell Prize</a> and a leading expert in high-performance computing (HPC). He was a finalist for the award in 2020 and 2022.</p><p>The Gordon Bell Prize, often referred to as the Nobel Prize in supercomputing due to the scope and magnitude of research it recognizes, celebrates achievement in HPC research and application.&nbsp;</p><p>Vuduc joined Georgia Tech in 2007 as one of the first faculty hired for the new Division of Computational Science and Engineering (CSE). Not a stranger of leading new units, he saw CSE begin offering M.S. and Ph.D. degrees in 2008 and&nbsp;<a href="https://cse.gatech.edu/founding-school">attain school status in 2010</a>. &nbsp;</p><p>Since 2021, Vuduc has served as co-director of the Center for Research into Novel Computing Hierarchies (<a href="https://crnch.gatech.edu/">CRNCH</a>).&nbsp;</p><p>CRNCH is an interdisciplinary research center at Georgia Tech that explores technologies and approaches that will usher the next generation of computing. Areas CRNCH studies include quantum computing, brain-inspired computing, and approximate computing.&nbsp;</p><p>Vuduc will step down as CRNCH co-director to fulfill his role as CSSE director. The College of Computing will lead a search for CRNCH’s next co-director.</p><p>“In a sense, the CRNCH to CSSE transition was partly a natural one because one thing that contributes to software challenges is that hardware platforms are also changing and evolving very rapidly,” said Vuduc.&nbsp;</p><p>“People are exploring radically new hardware systems and we will have to write software configured for those too. Centers, like CRNCH and CSSE, strongly position Georgia Tech to lead these endeavors.”&nbsp;</p><p><strong>Alessandro (Alex) Orso</strong>, the previous CSSE director, departed Georgia Tech earlier this year to become&nbsp;<a href="https://news.uga.edu/alex-orso-named-dean-of-ugas-college-of-engineering/">dean of the University of Georgia’s College of Engineering</a>. Orso and Distinguished Professor <strong>Irfan Essa</strong> wrote the proposal to bring CSSE to Georgia Tech.</p><p>Georgia Tech formed CSSE in 2022 after securing an $11 million grant from&nbsp;<a href="https://www.schmidtsciences.org/">Schmidt Sciences</a>. Former Google CEO Eric Schmidt and his spouse, Wendy Schmidt, founded the philanthropic venture that funds science and technology research and talent networking programs.&nbsp;</p><p>Georgia Tech’s CSSE is part of Schmidt Sciences’&nbsp;<a href="https://www.schmidtsciences.org/viss/">Virtual Institute for Scientific Software (VISS) program</a>. This network helps scientists obtain more robust, flexible, scalable open-source software.&nbsp;</p><p>Schmidt Sciences is investing $40 million in VISS over five years at four universities: Georgia Tech, University of Washington, Johns Hopkins University, and University of Cambridge.</p><p>CSSE uses the funding to employ a software engineering lead, three senior and two junior software engineers. The Schmidt Sciences grant equips these engineers with computing resources to build scientific software. Along with the director, an advisory board guides the group’s work to meet the point of need for scientists in the field.&nbsp;</p><p>“I am grateful to Schmidt Sciences for their support of CSSE. It aligns with our college’s strategic goals and expertise in scientific software, and I am delighted that Rich has agreed to take on this important role,” said Vivek Sarkar, Dean and John P. Imlay Jr. Chair of Computing.</p><p>“I know that Rich is committed to growing CSSE's internal and external visibility and long-term sustainability. I am confident that he will also help further socialize CSSE among internal stakeholders across Georgia Tech.”</p>]]></body>  <author>Bryant Wine</author>  <status>1</status>  <created>1762351306</created>  <gmt_created>2025-11-05 14:01:46</gmt_created>  <changed>1767965887</changed>  <gmt_changed>2026-01-09 13:38:07</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[The College of Computing named Professor Rich Vuduc as director of the Center for Scientific Software Engineering (CSSE). The Georgia Tech hub is dedicated to building reliable, high-performance software for scientists.  ]]></teaser>  <type>news</type>  <sentence><![CDATA[The College of Computing named Professor Rich Vuduc as director of the Center for Scientific Software Engineering (CSSE). The Georgia Tech hub is dedicated to building reliable, high-performance software for scientists.  ]]></sentence>  <summary><![CDATA[<p>Scientists across Georgia Tech rely on powerful software tools to propel breakthroughs in fields ranging from physics to biology. Now, software experts who make that research possible are gaining a new leader.&nbsp;</p><p>The College of Computing named Professor&nbsp;<a href="https://vuduc.org/v2/">Rich Vuduc</a> as director of the Center for Scientific Software Engineering (<a href="https://ssecenter.cc.gatech.edu/">CSSE</a>). The Georgia Tech hub is dedicated to building reliable, high-performance software for scientists. &nbsp;</p><p>Under Vuduc’s leadership, CSSE strives to accelerate the pace and increase the quality of scientific discovery by developing custom software tools and best practices tailored to researchers’ needs.</p>]]></summary>  <dateline>2025-11-03T00:00:00-05:00</dateline>  <iso_dateline>2025-11-03T00:00:00-05:00</iso_dateline>  <gmt_dateline>2025-11-03 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[<p>Bryant Wine, Communications Officer<br><a href="mailto:bryant.wine@cc.gatech.edu">bryant.wine@cc.gatech.edu</a></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>678546</item>      </media>  <hg_media>          <item>          <nid>678546</nid>          <type>image</type>          <title><![CDATA[Vuduc-CSSE-Director.jpg]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Vuduc-CSSE-Director.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2025/11/05/Vuduc-CSSE-Director.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/2025/11/05/Vuduc-CSSE-Director.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2025/11/05/Vuduc-CSSE-Director.jpg?itok=FlGBpo2o]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Rich Vuduc CSSE Director]]></image_alt>                    <created>1762351373</created>          <gmt_created>2025-11-05 14:02:53</gmt_created>          <changed>1762351373</changed>          <gmt_changed>2025-11-05 14:02:53</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[https://www.cc.gatech.edu/news/new-software-center-director-lead-next-wave-scientific-discovery]]></url>        <title><![CDATA[New Software Center Director to Lead Next Wave of Scientific Discovery]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>          <group id="50877"><![CDATA[School of Computational Science and Engineering]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="654"><![CDATA[College of Computing]]></keyword>          <keyword tid="172288"><![CDATA[School of Computational Science Engineering]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="181991"><![CDATA[Georgia Tech News Center]]></keyword>          <keyword tid="10199"><![CDATA[Daily Digest]]></keyword>          <keyword tid="183717"><![CDATA[Center for Research into Novel Computing Hierarchies]]></keyword>          <keyword tid="15030"><![CDATA[high-performance computing]]></keyword>          <keyword tid="170965"><![CDATA[software engineering]]></keyword>          <keyword tid="194841"><![CDATA[Center for Scientific Software Engineering]]></keyword>      </keywords>  <core_research_areas>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71871"><![CDATA[Campus and Community]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata><![CDATA[]]></userdata></node><node id="686843">  <title><![CDATA[NSF Grant Funds Protein Research for Drug Discovery and Personalized Medicine]]></title>  <uid>36319</uid>  <body><![CDATA[<p>Proteins, including antibodies, hemoglobin, and insulin, power nearly every vital aspect of life. Breakthroughs in protein research are producing vaccines, resilient crops, bioenergy sources, and other innovative technologies.</p><p>Despite their importance, most of what scientists know about proteins only comes from a small sample size. This stands in the way of fully understanding how most proteins work and unlocking their full potential.</p><p>Georgia Tech’s <a href="https://faculty.cc.gatech.edu/~yunan/">Yunan Luo</a> believes artificial intelligence (AI) could fill this knowledge gap. The National Science Foundation agrees. Luo is the recipient of an NSF Faculty Early Career Development (<a href="https://www.nsf.gov/funding/opportunities/career-faculty-early-career-development-program">CAREER</a>) award.&nbsp;</p><p>“So much of biology depends on knowing what proteins do, but decades of research have concentrated on a relatively small set of well-studied proteins. This imbalance in scientific attention leads to a distorted view of the biological landscape that&nbsp;quietly shapes our data and our algorithms,” Luo said.</p><p>“My group’s goal is to build machine learning (ML) models that actively close this gap by generating trustworthy&nbsp;function predictions for the many proteins that remain understudied.”</p><p>[Related: <a href="https://www.cc.gatech.edu/news/faculty-use-ai-protein-design-and-discovery-support-18-million-nih-grant">Yunan Luo to use AI for Protein Design and Discovery with Support of $1.8 Million NIH Grant</a>]</p><p>In his <a href="https://www.nsf.gov/awardsearch/show-award/?AWD_ID=2442063&amp;HistoricalAwards=false">proposal to NSF</a>, Luo coined this rich-get-richer effect “annotation inequality.”&nbsp;</p><p>One problem of annotation inequality is that it slows progress in disease prognosis, drug discovery, and other critical biomedical areas. It is challenging to innovate the few proteins that scientists already know so much about.&nbsp;</p><p>A cascading effect of annotation inequality is that it diminishes the effectiveness of studying proteins with&nbsp;AI. &nbsp;</p><p>AI methods learn from existing experimental data. Datasets skewed toward well-known proteins propagate and become entrenched in models. Over time, this makes it harder for computers to research understudied proteins.&nbsp;</p><p>“Protein annotation inequality creates an effect analogous to a vast library where 95% of patrons only read the top 5% popular books, leaving the rest of the collection to gather dust,” Luo said.</p><p>“This has resulted in knowledge disparities across proteins in current literature and databases, biasing our understanding of protein functions.”</p><p>The NSF CAREER award will fund Luo with over $770,000 for the next five years to tackle head-on the problem of protein annotation inequality.</p><p>Luo will use the grant to build an accurate, unbiased protein function prediction framework at scale. His project aims to:</p><ul><li>Reveal how annotation inequality affects protein function prediction systems</li><li>Create ML techniques suited for biological data, which is often noisy, incomplete, and imbalanced &nbsp;</li><li>Integrate data and ML models into a scalable framework to accelerate discoveries involving understudied proteins</li></ul><p>More enduring than the ML framework, Luo will leverage the NSF award to support educational and outreach programs. His goal is to groom the next generation of researchers to study other challenges in computational biology, not just the annotation inequality problem.</p><p>Luo teaches graduate and undergraduate courses focused on computational biology and ML. Problems and methods developed through the CAREER project can be used as course material in his classes.</p><p>Luo also championed collaboration with Georgia Tech’s Center for Education Integrating Science, Mathematics, and Computing (<a href="https://www.ceismc.gatech.edu/">CEISMC</a>) in his proposal.&nbsp;</p><p>Through this partnership, local high school teachers and students would gain access to his data and models. This promotes deeper learning of biology and data science through hands-on experience with real-world tools. &nbsp;</p><p>Luo sees reaching students and the community as a way of paying forward the support he received from Georgia Tech colleagues.&nbsp;</p><p>“I am incredibly grateful for this recognition from the NSF,” said Luo, an assistant professor in the <a href="https://cse.gatech.edu/">School of Computational Science and Engineering</a> (CSE).&nbsp;</p><p>“This would not have been possible without my students and collaborators, whose hard work laid the groundwork for this proposal.”</p><p>Luo praised CSE faculty members <a href="https://faculty.cc.gatech.edu/~badityap/">B. Aditya Prakash</a>, <a href="https://xiuweizhang.wordpress.com/">Xiuwei Zhang</a>, and <a href="http://chaozhang.org/">Chao Zhang</a> for their guidance. All three study <a href="https://cse.gatech.edu/artificial-intelligence-and-machine-learning">machine learning</a> and <a href="https://cse.gatech.edu/computational-bioscience-and-biomedicine">computational bioscience</a>, two of <a href="https://cse.gatech.edu/research">CSE’s five core research areas</a>.&nbsp;</p><p>Luo also thanked <a href="https://faculty.cc.gatech.edu/~hpark/">Haesun Park</a> for her support and recommendation for the CAREER award. Park is a Regents’ Professor and the chair of the School of CSE.</p>]]></body>  <author>Bryant Wine</author>  <status>1</status>  <created>1765385842</created>  <gmt_created>2025-12-10 16:57:22</gmt_created>  <changed>1767965851</changed>  <gmt_changed>2026-01-09 13:37:31</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Yunan Luo is the recipient of an NSF Faculty Early Career Development (CAREER) award to use artificial intelligence to solve the protein annotation inequality problem.]]></teaser>  <type>news</type>  <sentence><![CDATA[Yunan Luo is the recipient of an NSF Faculty Early Career Development (CAREER) award to use artificial intelligence to solve the protein annotation inequality problem.]]></sentence>  <summary><![CDATA[<p>Proteins, including antibodies, hemoglobin, and insulin, power nearly every vital aspect of life. Breakthroughs in protein research are producing vaccines, resilient crops, bioenergy sources, and other innovative technologies.</p><p>Despite their importance, most of what scientists know about proteins only comes from a small sample size. This stands in the way of fully understanding how most proteins work and unlocking their full potential.</p><p>Georgia Tech’s <a href="https://faculty.cc.gatech.edu/~yunan/">Yunan Luo</a> believes artificial intelligence (AI) could fill this knowledge gap. The National Science Foundation agrees. Luo is the recipient of an NSF Faculty Early Career Development (<a href="https://www.nsf.gov/funding/opportunities/career-faculty-early-career-development-program">CAREER</a>) award.&nbsp;</p>]]></summary>  <dateline>2025-12-10T00:00:00-05:00</dateline>  <iso_dateline>2025-12-10T00:00:00-05:00</iso_dateline>  <gmt_dateline>2025-12-10 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[<p>Bryant Wine, Communications Officer<br><a href="mailto:bryant.wine@cc.gatech.edu">bryant.wine@cc.gatech.edu</a></p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>678817</item>          <item>678818</item>      </media>  <hg_media>          <item>          <nid>678817</nid>          <type>image</type>          <title><![CDATA[Yunan-Luo-NSF-CAREER_1.jpg]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Yunan-Luo-NSF-CAREER_1.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2025/12/10/Yunan-Luo-NSF-CAREER_1.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/2025/12/10/Yunan-Luo-NSF-CAREER_1.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2025/12/10/Yunan-Luo-NSF-CAREER_1.jpg?itok=La5LFMII]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Yunan Luo NSF CAREER Award]]></image_alt>                    <created>1765385865</created>          <gmt_created>2025-12-10 16:57:45</gmt_created>          <changed>1765385865</changed>          <gmt_changed>2025-12-10 16:57:45</gmt_changed>      </item>          <item>          <nid>678818</nid>          <type>image</type>          <title><![CDATA[Yunan-Luo-NSF-CAREER_2.jpg]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Yunan-Luo-NSF-CAREER_2.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2025/12/10/Yunan-Luo-NSF-CAREER_2.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/2025/12/10/Yunan-Luo-NSF-CAREER_2.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2025/12/10/Yunan-Luo-NSF-CAREER_2.jpg?itok=ZVW74YH1]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Yunan Luo NSF CAREER Award]]></image_alt>                    <created>1765385967</created>          <gmt_created>2025-12-10 16:59:27</gmt_created>          <changed>1765385967</changed>          <gmt_changed>2025-12-10 16:59:27</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[https://www.cc.gatech.edu/news/nsf-grant-funds-protein-research-drug-discovery-and-personalized-medicine]]></url>        <title><![CDATA[NSF Grant Funds Protein Research for Drug Discovery and Personalized Medicine]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>          <group id="50877"><![CDATA[School of Computational Science and Engineering]]></group>      </groups>  <categories>          <category tid="194606"><![CDATA[Artificial Intelligence]]></category>          <category tid="138"><![CDATA[Biotechnology, Health, Bioengineering, Genetics]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="146"><![CDATA[Life Sciences and Biology]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="194606"><![CDATA[Artificial Intelligence]]></term>          <term tid="138"><![CDATA[Biotechnology, Health, Bioengineering, Genetics]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="146"><![CDATA[Life Sciences and Biology]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="654"><![CDATA[College of Computing]]></keyword>          <keyword tid="166983"><![CDATA[School of Computational Science and Engineering]]></keyword>          <keyword tid="9153"><![CDATA[Research Horizons]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="10199"><![CDATA[Daily Digest]]></keyword>          <keyword tid="181991"><![CDATA[Georgia Tech News Center]]></keyword>          <keyword tid="9167"><![CDATA[machine learning]]></keyword>          <keyword tid="187812"><![CDATA[artificial intelligence (AI)]]></keyword>          <keyword tid="2556"><![CDATA[artificial intelligence]]></keyword>          <keyword tid="362"><![CDATA[National Science Foundation]]></keyword>          <keyword tid="191934"><![CDATA[National Science Foundation (NSF)]]></keyword>          <keyword tid="170447"><![CDATA[Institute for Data Engineering and Science]]></keyword>          <keyword tid="176858"><![CDATA[machine learning center]]></keyword>          <keyword tid="173894"><![CDATA[ML@GT]]></keyword>      </keywords>  <core_research_areas>          <term tid="193655"><![CDATA[Artificial Intelligence at Georgia Tech]]></term>          <term tid="39441"><![CDATA[Bioengineering and Bioscience]]></term>          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71871"><![CDATA[Campus and Community]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata><![CDATA[]]></userdata></node><node id="686720">  <title><![CDATA[What if Hospitals Could Automatically Protect Patients from Cyber Threats?]]></title>  <uid>36253</uid>  <body><![CDATA[<p>A software update was missed for the program running your local hospital’s X-ray machines. A hacker now controls all the machines and is demanding $500,000 in cryptocurrency be sent to an anonymous wallet; otherwise, he will shut down the entire radiology department.</p><p>This scenario becomes more likely for hospitals of all sizes as medical technology advances, adding more devices to constantly growing networks.</p><p>With the help of a contract award for up to $12 million from the Advanced Research Projects Agency for Health (ARPA-H) <a href="https://arpa-h.gov/explore-funding/programs/upgrade">UPGRADE</a> program, a team of researchers led by the School of Cybersecurity and Privacy at Georgia Tech will begin developing an advanced cybersecurity platform to help hospitals proactively identify and fix vulnerabilities in their software, devices, and networks.&nbsp;</p><p>“This is a new area of security research,” said Associate Professor <strong>Brendan Saltaformaggio</strong>. “We not only have to worry about the cybersecurity aspect, but the physical security as well. Our research must be very accurate to make sure patients are safe from cyberthreats.”&nbsp;</p><p>Starting next month, the team of researchers on the Hospital-Integrated Vulnerability Identification and Proactive Remediation (H-VIPER) project will begin developing a system they are calling the Whole-Hospital Simulation (WHS).</p><p>The system maps out the online network for hospitals of all sizes and enables IT teams to test their cyber capabilities before going live. The system can also identify threats, such as missed software updates, and alert the IT department.</p><p>“Hospitals have thousands of devices connected to their networks, including medical devices,” said Saltaformaggio. “A hospital like Children’s has a huge attack surface. A smaller hospital might have different challenges, but possible entry points are still there.”</p><p>The team has already interviewed IT teams at Children’s Healthcare of Atlanta and Hamilton Health Care System. Their findings have provided them with a better understanding of how to scale the WHS system to meet each hospital’s specific needs.</p><p>“Hospitals IT processes are notoriously sensitive to disruption, because essentially any kind of down time for rebooting a system or lack of availability can create chaos in the clinical environment,” said <strong>Stoddard Manikin</strong>, chief information security officer for Children’s Healthcare of Atlanta.</p><p>“Our goal is to create very smooth processes and workflow for our patient facing staff and providers to deliver the best care possible. This research opportunity gives us a chance to develop news ways where we can look at these sensitive medical devices and things on the IT network in a healthcare environment and potentially remediate vulnerabilities without taking them out of service.”&nbsp;</p><p>Saltaformaggio and his colleagues found that, regardless of size, security remains retroactive and not proactive. By leveraging their diverse expertise, the research team will ensure that the H-VIPER project addresses vulnerabilities at every layer of hospital technology, from the network to the hardware.&nbsp;</p><p>The <a href="https://scp.cc.gatech.edu/">School of Cybersecurity and Privacy</a> will lead this initiative, with faculty from the H-VIPER project also representing the <a href="https://www.cc.gatech.edu/">College of Computing</a>, the <a href="https://coe.gatech.edu/">College of Engineering</a>, the <a href="https://ece.gatech.edu/">School of Electrical and Computer Engineering</a>, the <a href="https://www.scs.gatech.edu/">School of Computer Science</a>, and the <a href="https://gtri.gatech.edu/">Georgia Tech Research Institute</a>, along with support from their Ph.D. students and postdoctoral researchers.&nbsp;</p><p>Around 30 Georgia Tech researchers will partner with <a href="https://www.emory.edu/home/index.html">Emory University</a>, <a href="https://www.choa.org">Children’s Healthcare of Atlanta</a>, <a href="https://vitruvianhealth.com/locations/hamilton-medical-center/">Hamilton Health Care System</a>, <a href="https://www.tufts.edu/">Tufts University</a>, <a href="https://www.iastate.edu/">Iowa State University</a>, and <a href="https://narfindustries.com/">Narf Industries</a>.&nbsp;</p><p>Georgia Tech faculty working on the project are:</p><ul><li>Associate Professor <strong>Brendan Saltaformaggio</strong></li><li>Regents’ Professor <strong>Wenke Lee</strong></li><li>Professor <strong>Taesoo Kim</strong></li><li>Professor <strong>Fabian Monrose</strong></li><li>Assistant Professor <strong>Frank Li</strong></li><li>Associate Professor <strong>Saman Zonouz</strong></li><li>Associate Professor<strong> Daniel Genkin</strong></li><li>Research Professor <strong>Sukarno Mertoguno</strong></li><li>Senior Research Scientist <strong>Trevor Lewis</strong> &nbsp;</li></ul>]]></body>  <author>John Popham</author>  <status>1</status>  <created>1764776975</created>  <gmt_created>2025-12-03 15:49:35</gmt_created>  <changed>1765213725</changed>  <gmt_changed>2025-12-08 17:08:45</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[With the help of a contract award for up to $12 million from ARPA-H, a team of researchers led by the School of Cybersecurity and Privacy at will begin developing an advanced cybersecurity platform to protect hospitals. ]]></teaser>  <type>news</type>  <sentence><![CDATA[With the help of a contract award for up to $12 million from ARPA-H, a team of researchers led by the School of Cybersecurity and Privacy at will begin developing an advanced cybersecurity platform to protect hospitals. ]]></sentence>  <summary><![CDATA[<p>With the help of a contract award for up to $12 million from the Advanced Research Projects Agency for Health (ARPA-H), a team of researchers led by the School of Cybersecurity and Privacy at Georgia Tech will begin developing an advanced cybersecurity platform to help hospitals proactively identify and fix vulnerabilities in their software, devices, and networks.&nbsp;</p>]]></summary>  <dateline>2025-12-03T00:00:00-05:00</dateline>  <iso_dateline>2025-12-03T00:00:00-05:00</iso_dateline>  <gmt_dateline>2025-12-03 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jpopham3@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Popham&nbsp;Communications Officer II | School of Cybersecurity and Privacy</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>678753</item>      </media>  <hg_media>          <item>          <nid>678753</nid>          <type>image</type>          <title><![CDATA[Cyfi-Lab-Brendan.jpg]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Cyfi-No-Dict-1.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2025/12/03/Cyfi-No-Dict-1.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/2025/12/03/Cyfi-No-Dict-1.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2025/12/03/Cyfi-No-Dict-1.jpg?itok=4G7fie_e]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[A man points to a rack of computer monitors. Another man sits in front of a laptop with his back to the camera. ]]></image_alt>                    <created>1764777096</created>          <gmt_created>2025-12-03 15:51:36</gmt_created>          <changed>1764777096</changed>          <gmt_changed>2025-12-03 15:51:36</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>          <group id="660367"><![CDATA[School of Cybersecurity and Privacy]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="365"><![CDATA[Research]]></keyword>          <keyword tid="193109"><![CDATA[arpa-h]]></keyword>          <keyword tid="2634"><![CDATA[grant]]></keyword>          <keyword tid="127901"><![CDATA[Contract]]></keyword>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="344"><![CDATA[cyber]]></keyword>          <keyword tid="3532"><![CDATA[impact]]></keyword>          <keyword tid="4499"><![CDATA[hospitals]]></keyword>          <keyword tid="179869"><![CDATA[partners]]></keyword>          <keyword tid="340"><![CDATA[collaboration]]></keyword>          <keyword tid="1129"><![CDATA[healthcare]]></keyword>          <keyword tid="194701"><![CDATA[go-resarchnews]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>          <topic tid="71891"><![CDATA[Health and Medicine]]></topic>      </news_room_topics>  <files></files>  <related></related>  <userdata><![CDATA[]]></userdata></node><node id="686467">  <title><![CDATA[Researchers Find Opportunities for 311 Chatbots to Foster Community Engagement]]></title>  <uid>36530</uid>  <body><![CDATA[<p>311 chatbots make it easier for people to report issues to their local government without long wait times on the phone. However, a new study finds that the technology might inhibit civic engagement.</p><p>311 systems allow residents to report potholes, broken fire hydrants, and other municipal issues. In recent years, the use of artificial intelligence (AI) to provide 311 services to community residents has boomed across city and state governments. This includes an artificial virtual assistant (AVA) developed by third-party vendors for <a href="https://www.atlantaga.gov/government/departments/customer-service-atl311/atl311-chatbot"><strong>the City of Atlanta</strong></a> in 2023.</p><p>Through survey data, researchers from Tech’s School of Interactive Computing found that many residents are generally positive about 311 chatbots. In addition to eliminating long wait times over the phone, they also offer residents quick answers to permit applications, waste collection, and other frequently asked questions.</p><p>However, the study, which was conducted in Atlanta, indicates that 311 chatbots could be causing residents to feel isolated from public officials and less aware of what’s happening in their community.</p><p><strong>Jieyu Zhou</strong>, a Ph.D. student in the School of IC, said it doesn’t have to be that way.</p><h4><strong>Uniting Communities</strong></h4><p>Zhou and her advisor, Assistant Professor <a href="https://chrismaclellan.com/"><strong>Christopher MacLellan</strong></a>, published a paper at the 2025 ACM Designing Interactive Systems (DIS) Conference that focuses on improving public service chatbot design and amplifying their civic impact. They collaborated with Professor <a href="https://www.carldisalvo.com/"><strong>Carl DiSalvo</strong></a>, Associate Professor <a href="http://lynndombrowski.com/"><strong>Lynn Dombrowsk</strong></a>i, and graduate students <strong>Rui Shen</strong> and <a href="https://yueyu1030.github.io/"><strong>Yue You</strong></a>.</p><p>Zhou said 311 chatbots have the potential to be agents that drive community organization and improve quality of life.</p><p>“Current chatbots risk isolating users in their own experience,” Zhou said. “In the 311 system, people tend to report their own individual issues but lose a sense of what is happening in their broader community.&nbsp;</p><p>“People are very positive about these tools, but I think there’s an opportunity as we envision what civic chatbots could be. It’s important for us to emphasize that social element — engaging people&nbsp;within the community and connecting them with government representatives, community organizers, and other community members.”</p><p>Zhou and MacLellan said 311 chatbots can leave users wondering if others in their communities share their concerns.</p><p>“If people are at a town hall meeting, they can get a sense of whether the problems they are experiencing are shared by others,” Zhou said. “We can’t do that with a chatbot. It’s like an isolated room, and we’re trying to open the doors and the windows.”</p><h4><strong>Adding a Human Touch</strong></h4><p>In their paper, the researchers note that one of the biggest criticisms of 311 chatbots is they can’t replace interpersonal interaction.</p><p>Unlike chatbots, people working in local government offices are likely to:</p><ul><li>Have direct knowledge of issues</li><li>Provide appropriate referrals</li><li>Empathize with the resident’s concerns</li></ul><p>MacLellan said residents are likely to grow frustrated with a chatbot when reporting issues that require this level of contextual knowledge.</p><p>One person in the researchers’ survey noted that the chatbot they used didn’t understand that their report was about a sidewalk issue, not a street issue.</p><p>“Explaining such a situation to a human representative is straightforward,” MacLellan said. “However, when the issue being raised does not fall within any of the categories the chatbot is built to address, it often misinterprets the query and offers information that isn’t helpful.”</p><p>The researchers offer some design suggestions that can help chatbots foster community engagement and improve community well-being:</p><ul><li>Escalation. Regarding the sidewalk report, the chatbot did not offer a way to escalate the query to a human who could resolve it. Zhou said that this is a feature that chatbots should have but often lack.</li><li>Transparency. Chatbots could provide details about recent and frequently reported community issues. They should inform users early in the call process about known problems to help avoid an overload of user complaints.</li><li>Education. Chatbots can keep users updated about what’s happening in their communities.</li><li>Collective action. Chatbots can help communities organize and gather ideas to address challenges and solve problems.</li></ul><p>“Government agencies may focus mainly on fixing individual issues,” Zhou said, “But recognizing community-level patterns can inspire collective creativity. For example, one participant suggested that if many people report a broken swing at a playground, it could spark an initiative to design a new playground together—going far beyond just fixing it.”</p><p>These are just a few examples of things, the researchers argue, that 311 services were originally designed to achieve.</p><p>“Communities were already collaborating on identifying and reporting issues,” Zhou said. “These chatbots should reflect the original intentions and collaboration practices of the communities they serve.</p><p>“Our research suggests we can increase the positive impact of civic chatbots by including social aspects within the design of the system, connecting people, and building a community view.”</p>]]></body>  <author>Nathan Deen</author>  <status>1</status>  <created>1763152241</created>  <gmt_created>2025-11-14 20:30:41</gmt_created>  <changed>1763152550</changed>  <gmt_changed>2025-11-14 20:35:50</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[AI-powered 311 chatbots may unitentionally reduce residents' sense of connection within their community.]]></teaser>  <type>news</type>  <sentence><![CDATA[AI-powered 311 chatbots may unitentionally reduce residents' sense of connection within their community.]]></sentence>  <summary><![CDATA[<p>Researchers at the Georgia Institute of Technology found that while 311-style chatbots simplify the process of reporting municipal issues and reduce wait times, users can feel isolated from their community and less connected to broader civic awareness. They recommend redesigning these systems to include transparency about collective issues, provide pathways for human escalation, and support community-level action.</p>]]></summary>  <dateline>2025-11-14T00:00:00-05:00</dateline>  <iso_dateline>2025-11-14T00:00:00-05:00</iso_dateline>  <gmt_dateline>2025-11-14 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[]]></email>  <location></location>  <contact><![CDATA[]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>678639</item>      </media>  <hg_media>          <item>          <nid>678639</nid>          <type>image</type>          <title><![CDATA[Jieyu-Zhou_86A8161-Enhanced-NR.jpg]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Jieyu-Zhou_86A8161-Enhanced-NR.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2025/11/14/Jieyu-Zhou_86A8161-Enhanced-NR.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/2025/11/14/Jieyu-Zhou_86A8161-Enhanced-NR.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2025/11/14/Jieyu-Zhou_86A8161-Enhanced-NR.jpg?itok=vlJ5wKyW]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[Jieyu Zhou]]></image_alt>                    <created>1763152260</created>          <gmt_created>2025-11-14 20:31:00</gmt_created>          <changed>1763152260</changed>          <gmt_changed>2025-11-14 20:31:00</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>          <group id="50876"><![CDATA[School of Interactive Computing]]></group>      </groups>  <categories>          <category tid="194606"><![CDATA[Artificial Intelligence]]></category>          <category tid="142"><![CDATA[City Planning, Transportation, and Urban Growth]]></category>          <category tid="42901"><![CDATA[Community]]></category>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="135"><![CDATA[Research]]></category>          <category tid="8862"><![CDATA[Student Research]]></category>      </categories>  <news_terms>          <term tid="194606"><![CDATA[Artificial Intelligence]]></term>          <term tid="142"><![CDATA[City Planning, Transportation, and Urban Growth]]></term>          <term tid="42901"><![CDATA[Community]]></term>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="135"><![CDATA[Research]]></term>          <term tid="8862"><![CDATA[Student Research]]></term>      </news_terms>  <keywords>          <keyword tid="192863"><![CDATA[go-ai]]></keyword>          <keyword tid="187812"><![CDATA[artificial intelligence (AI)]]></keyword>          <keyword tid="188776"><![CDATA[go-research]]></keyword>          <keyword tid="187915"><![CDATA[go-researchnews]]></keyword>          <keyword tid="9153"><![CDATA[Research Horizons]]></keyword>          <keyword tid="169137"><![CDATA[chatbot]]></keyword>          <keyword tid="189306"><![CDATA[public service technology]]></keyword>          <keyword tid="1134"><![CDATA[City of Atlanta]]></keyword>          <keyword tid="188933"><![CDATA[Atlanta community.]]></keyword>          <keyword tid="10614"><![CDATA[community organizing]]></keyword>      </keywords>  <core_research_areas>          <term tid="193655"><![CDATA[Artificial Intelligence at Georgia Tech]]></term>          <term tid="39501"><![CDATA[People and Technology]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata><![CDATA[]]></userdata></node><node id="686132">  <title><![CDATA[New Research Will Move Us Closer to a Passwordless Society]]></title>  <uid>36253</uid>  <body><![CDATA[<div><div><p>Although they are currently essential to online security and privacy, the days of relying on password protection may be numbered, thanks to Assistant Professor <strong>Frank Li</strong> and his National Science Foundation (NSF) CAREER Award project.</p><p>While passwords have security limitations and can be challenging to use, emerging technologies such as Fast IDentity Online 2 (<a href="https://www.microsoft.com/en-us/security/business/security-101/what-is-fido2">FIDO2</a>) and other passkey authentication methods provide strong security and usability. For example, if you have ever used your smartphone’s facial recognition feature to log in to your bank account instead of typing out the password, you have used a FIDO2 passkey.</p><p>Users and online services, however, have been slow to adopt the new technology despite the benefits. Li’s NSF CAREER Award project addresses this challenge. Along with advancing the technology, Li will also advocate for its use.</p><p>“We are not assuming that this technology is coming,” said Li. “It is already here. The challenge is to get people to use this technology.”&nbsp;</p><p>This up-and-coming technology has been part of Li’s research for some time. His prior work provided a new security analysis of the FIDO2 authentication protocol, which includes passkeys.&nbsp;</p><p>Li’s CAREER project will investigate real-world uses of FIDO2/passkeys and security and usability issues that can arise. A goal of his research is to identify and resolve problems before they become widespread and more difficult to address.&nbsp;</p><p>“There’s still a lot to do when it comes to authentication research, and there’s even more to be done with passkeys,” he said.&nbsp;</p><p>“Online authentication is a core function needed for online security. Making any changes to it will have huge implications. For example, accounts that send spam and phishing attacks are often accounts with compromised passwords. A <a href="https://www.forbes.com/sites/tonybradley/2025/05/01/are-we-finally-entering-a-passwordless-era/">passwordless future</a> will reduce that threat.”</p><p>The final component of Li’s CAREER Award is an educational outreach program. The NSF wants researchers to inspire the next generation of scientists as a part of their projects. Li plans to reach out to Atlanta high schools and engage their computer science programs.</p><p><a href="https://www.nsf.gov/funding/opportunities/career-faculty-early-career-development-program">NSF CAREER Awards</a> are prestigious federal grants given to early career academic faculty and are widely recognized as a career defining moment. Li’s project will be conducted in the School of Cybersecurity and Privacy as well as the School of Electrical and Computer Engineering.&nbsp;</p></div></div>]]></body>  <author>John Popham</author>  <status>1</status>  <created>1762180558</created>  <gmt_created>2025-11-03 14:35:58</gmt_created>  <changed>1762180882</changed>  <gmt_changed>2025-11-03 14:41:22</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Although they are currently essential to online security and privacy, the days of relying on password protection may be numbered, thanks to Assistant Professor Frank Li and his National Science Foundation (NSF) CAREER Award project.]]></teaser>  <type>news</type>  <sentence><![CDATA[Although they are currently essential to online security and privacy, the days of relying on password protection may be numbered, thanks to Assistant Professor Frank Li and his National Science Foundation (NSF) CAREER Award project.]]></sentence>  <summary><![CDATA[<p>Although they are currently essential to online security and privacy, the days of relying on password protection may be numbered, thanks to Assistant Professor <strong>Frank Li</strong> and his National Science Foundation (NSF) CAREER Award project.</p>]]></summary>  <dateline>2025-11-03T00:00:00-05:00</dateline>  <iso_dateline>2025-11-03T00:00:00-05:00</iso_dateline>  <gmt_dateline>2025-11-03 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[]]></sidebar>  <email><![CDATA[jpopham3@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Popham&nbsp;Communications Officer II | School of Cybersecurity and Privacy</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>678516</item>      </media>  <hg_media>          <item>          <nid>678516</nid>          <type>image</type>          <title><![CDATA[Frank-Li_86A0205-Enhanced-NR-copy.jpg]]></title>          <body><![CDATA[<p>Assistant Professor Frank Li standing outside of the Coda Building in Tech Square. <em>Photos by Terence Rushin/College of Computing</em></p>]]></body>                      <image_name><![CDATA[Frank-Li_86A0205-Enhanced-NR-copy.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2025/11/03/Frank-Li_86A0205-Enhanced-NR-copy.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/2025/11/03/Frank-Li_86A0205-Enhanced-NR-copy.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2025/11/03/Frank-Li_86A0205-Enhanced-NR-copy.jpg?itok=MSO0AEyB]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[A man standing outside in a building breezeway. He is wearing glasses, a blue polo and is smiling.]]></image_alt>                    <created>1762180596</created>          <gmt_created>2025-11-03 14:36:36</gmt_created>          <changed>1762180596</changed>          <gmt_changed>2025-11-03 14:36:36</gmt_changed>      </item>      </hg_media>  <related>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>          <group id="660367"><![CDATA[School of Cybersecurity and Privacy]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata><![CDATA[]]></userdata></node><node id="684748">  <title><![CDATA[Psychological Fallout: DARPA-Backed Project Addresses Societal Toll of Cyberattacks]]></title>  <uid>36253</uid>  <body><![CDATA[<div><div><p>The United States has prepared for decades to defend itself from every conceivable military conflict on its shores, but it turns out psychological warfare, not missiles, might pose the greatest threat to national security.&nbsp;</p><p>This is a challenge Assistant Professor <a href="https://sites.google.com/view/ryanshandler">Ryan Shandler</a> will spend the next two years exploring as a recipient of the Young Faculty Award from the Defense Advanced Research Projects Agency (DARPA).&nbsp;</p><p>DARPA uses this award to recognize up-and-coming early-career faculty it hopes to continue working with in the future.&nbsp;</p><p>Currently, DARPA is concerned with cyberattacks from foreign countries aimed at provoking social unrest and eroding public trust in democratic institutions. In a study released last year by <a href="https://news.microsoft.com/en-cee/2024/11/29/microsoft-digital-defense-report-600-million-cyberattacks-per-day-around-the-globe/">Microsoft</a>, it was estimated that 600 million cyberattacks were launched everyday by criminals and <a href="https://www.cisa.gov/topics/cyber-threats-and-advisories/nation-state-cyber-actors">nation-state actors</a> from July 2023 to July 2024. &nbsp;</p><p>Tools built by cybersecurity engineers help mitigate the attacks made by criminals and in some cases even help <a href="https://www.cc.gatech.edu/news/follow-money-2-billion-crypto-scams-found-ethereum">track down</a> stolen money. However, nation-state actors don’t launch cyberattacks to score a payday.&nbsp;</p><p>Instead, they attack things like <a href="https://www.resecurity.com/blog/article/cyber-threats-against-energy-sector-surge-global-tensions-mount">power plants</a> or <a href="https://www.cnn.com/2024/11/05/us/georgia-non-credible-bomb-threat-russia">voting precincts</a> as a show of strength. Exposing these vulnerabilities shows how unsafe life could be, and these actors want nothing more than to cause total panic.&nbsp;</p><p>So now instead looking only to hardware and software for the solution to this problem, DARPA is investing in the human dimension of cybersecurity.&nbsp;</p><p>This area has long been a focus of <a href="https://www.cc.gatech.edu/news/knowing-half-battle-new-faculty-explores-human-dimension-cybersecurity">Shandler’s research</a>, making him uniquely qualified to confront this previously overlooked vulnerability. His past experiments have already shown how cyberattacks generate severe public anxiety and prompt calls for physical military retaliation.</p><p>For this new project, he will track a controlled population of several thousand people by exposing them to simulated cyberattacks. At no point will the participants be made to think the attacks are real. Shandler and his team will then interview the participants to gauge how their experience impacted their perception of security.</p><p>“We are looking to see which groups are more susceptible to this kind of cumulative threat. &nbsp;Once we model the risk, the next step will be building countermeasures to defend against it,” he said.&nbsp;</p><p>However, creating a defense system that promotes societal resilience will be as challenging as it is revolutionary.&nbsp;</p><p>"I'm fortunate to be conducting this research in an interdisciplinary unit like the School of Cybersecurity and Privacy. Tackling a challenge of this scale requires computer scientists and social scientists working side by side,” Shandler said.</p><p>“Alone, neither field stands a chance—but together, we stand a real chance of success."</p><p>Shandler is jointly appointed with the <a href="https://scp.cc.gatech.edu/">School of Cybersecurity and Privacy</a> and the <a href="https://inta.gatech.edu/">Sam Nunn School of International Affairs</a>.</p></div></div>]]></body>  <author>John Popham</author>  <status>1</status>  <created>1757599888</created>  <gmt_created>2025-09-11 14:11:28</gmt_created>  <changed>1757947997</changed>  <gmt_changed>2025-09-15 14:53:17</gmt_changed>  <promote>0</promote>  <sticky>0</sticky>  <teaser><![CDATA[Georgia Tech Assistant Professor Ryan Shandler has received a DARPA Young Faculty Award to lead a two-year study on the psychological and societal impacts of cyberattacks.]]></teaser>  <type>news</type>  <sentence><![CDATA[Georgia Tech Assistant Professor Ryan Shandler has received a DARPA Young Faculty Award to lead a two-year study on the psychological and societal impacts of cyberattacks.]]></sentence>  <summary><![CDATA[<p>Georgia Tech Assistant Professor Ryan Shandler has received a DARPA Young Faculty Award to lead a two-year study on the psychological and societal impacts of cyberattacks. Unlike traditional cybersecurity efforts that focus on technical defenses, this project examines how cyberattacks—especially by nation-state actors—can erode public trust, create anxiety, and destabilize societies. Using controlled simulations with thousands of participants, the research will explore how different groups react to cyber threats and aim to identify ways to build societal resilience against the psychological fallout of such attacks.</p>]]></summary>  <dateline>2025-09-10T00:00:00-04:00</dateline>  <iso_dateline>2025-09-10T00:00:00-04:00</iso_dateline>  <gmt_dateline>2025-09-10 00:00:00</gmt_dateline>  <subtitle>    <![CDATA[]]>  </subtitle>  <sidebar><![CDATA[<div><h5>Learn More About How SCP Faculty Make the World Safer</h5></div><div><div><ul><li><a href="https://www.cc.gatech.edu/news/follow-money-2-billion-crypto-scams-found-ethereum">‘Follow the Money!’ $2 Billion of Crypto Scams Found on Ethereum</a></li><li><a href="https://www.cc.gatech.edu/news/department-energy-awards-42-million-guard-power-grid-cyber-threats">Department of Energy Awards $4.2 Million to Guard Power Grid from Cyber Threats</a></li><li><a href="https://www.cc.gatech.edu/news/special-edition-calls-less-doom-more-data-cybersecurity">Special Edition Calls for Less Doom, More Data in Cybersecurity</a></li></ul></div></div>]]></sidebar>  <email><![CDATA[jpopham3@gatech.edu]]></email>  <location></location>  <contact><![CDATA[<p>John Popham&nbsp;Communications Officer II | School of Cybersecurity and Privacy</p>]]></contact>  <boilerplate></boilerplate>  <boilerplate_text><![CDATA[]]></boilerplate_text>  <media>          <item>677976</item>      </media>  <hg_media>          <item>          <nid>677976</nid>          <type>image</type>          <title><![CDATA[Ryan-Shandler-2025-2.jpg]]></title>          <body><![CDATA[]]></body>                      <image_name><![CDATA[Ryan-Shandler-2025-2.jpg]]></image_name>            <image_path><![CDATA[/sites/default/files/2025/09/11/Ryan-Shandler-2025-2.jpg]]></image_path>            <image_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/2025/09/11/Ryan-Shandler-2025-2.jpg]]></image_full_path>            <image_740><![CDATA[http://hg.gatech.edu/sites/default/files/styles/740xx_scale/public/sites/default/files/2025/09/11/Ryan-Shandler-2025-2.jpg?itok=bida7nTV]]></image_740>            <image_mime>image/jpeg</image_mime>            <image_alt><![CDATA[A man with salt and pepper hair and beard stands in a hallway wearing a white buton up shirt. There is a modern wooden panel behind him which reflects light and the purple color from the other walls.]]></image_alt>                    <created>1757599954</created>          <gmt_created>2025-09-11 14:12:34</gmt_created>          <changed>1757599954</changed>          <gmt_changed>2025-09-11 14:12:34</gmt_changed>      </item>      </hg_media>  <related>          <link>        <url><![CDATA[https://scp.cc.gatech.edu/]]></url>        <title><![CDATA[School of Cybersecurity and Privacy]]></title>      </link>      </related>  <files>      </files>  <groups>          <group id="47223"><![CDATA[College of Computing]]></group>          <group id="1188"><![CDATA[Research Horizons]]></group>          <group id="660367"><![CDATA[School of Cybersecurity and Privacy]]></group>      </groups>  <categories>          <category tid="153"><![CDATA[Computer Science/Information Technology and Security]]></category>          <category tid="151"><![CDATA[Policy, Social Sciences, and Liberal Arts]]></category>          <category tid="135"><![CDATA[Research]]></category>      </categories>  <news_terms>          <term tid="153"><![CDATA[Computer Science/Information Technology and Security]]></term>          <term tid="151"><![CDATA[Policy, Social Sciences, and Liberal Arts]]></term>          <term tid="135"><![CDATA[Research]]></term>      </news_terms>  <keywords>          <keyword tid="365"><![CDATA[Research]]></keyword>          <keyword tid="1404"><![CDATA[Cybersecurity]]></keyword>          <keyword tid="167871"><![CDATA[social scientists]]></keyword>      </keywords>  <core_research_areas>          <term tid="145171"><![CDATA[Cybersecurity]]></term>          <term tid="39481"><![CDATA[National Security]]></term>      </core_research_areas>  <news_room_topics>      </news_room_topics>  <files></files>  <related></related>  <userdata><![CDATA[]]></userdata></node></nodes>