black and white bed linen

CYBER TRUST & RESILIENCE LAB (CTR Lab)

Advancing Intelligent Cyber Defense for Businesses, Communities, and Critical Systems

Where students and researchers tackle real-world security challenges together

Our Team

A passionate group tackling cybersecurity challenges through mentorship and innovation.

Jogu Pranavi

Pranavi is pursuing a Bachelor of Technology in Information Technology at Keshav Memorial Institute of Technology. My research focuses on artificial intelligence and deep learning, particularly in developing intelligent, human-centered systems. I’m exploring transformer architectures, neural networks, and generative AI for applications in accessibility, autonomous systems, and adaptive user interfaces.

Jayashree Rangu

Jayasree received her master's degree from University of Dayton and an Executive degree in Advanced AI & ML from IIITH. She is now working as software engineer. Her research focuses on applications of AI in diverse domains like biotech, drug discovery, astrophysics, robotics.

Ananya Sirandass

Ananya is pursuing a Bachelor of Technology in Information Technology at Keshav Memorial Institute of Technology. Her research focuses on AI applications. She is exploring neural networks, transformer architectures, and generative AI for accessibility solutions, medical imaging, and emergency response systems.

Yusuf Usman

Cybersecurity Researcher

Group Lead, Cyber Trust & Resilience Lab (CTR Lab)
Email: Author@yusufusman.net

Mentorship

Mentored projects where students develop hands-on skills, contribute to publications, and engage with cutting-edge security technologies.

Gallery

Snapshots from our lab's collaborative moments

A researcher presenting AI-driven defense system results on a whiteboard
A researcher presenting AI-driven defense system results on a whiteboard
Close-up of hands coding on a laptop with cybersecurity algorithms visible
Close-up of hands coding on a laptop with cybersecurity algorithms visible

Common Questions

Who can join?

Students and researchers passionate about cybersecurity and AI are welcome.

What projects exist?

We focus on AI-driven defense, data threat analysis, and real-world security challenges.

How is mentorship given?

I work closely with each member, guiding skills development, project impact, and collaboration opportunities.

Are publications supported?

Yes, we encourage and assist with conference papers and industry collaborations.

What backgrounds fit?

Members come from varied technical fields but unite around cybersecurity interests.

How can I get involved?

Reach out via email with your interests and background; we prioritize curiosity and commitment.

Get in Touch

Reach out to discuss cybersecurity projects, research collaborations, or mentorship opportunities.