CYBER TRUST & RESILIENCE LAB (CTR Lab)
Advancing Intelligent Cyber Defense for Businesses, Communities, and Critical Systems
Where students and researchers tackle real-world security challenges together
Our Team
A passionate group tackling cybersecurity challenges through mentorship and innovation.


Jogu Pranavi
Pranavi is pursuing a Bachelor of Technology in Information Technology at Keshav Memorial Institute of Technology. My research focuses on artificial intelligence and deep learning, particularly in developing intelligent, human-centered systems. I’m exploring transformer architectures, neural networks, and generative AI for applications in accessibility, autonomous systems, and adaptive user interfaces.
Jayashree Rangu
Jayasree received her master's degree from University of Dayton and an Executive degree in Advanced AI & ML from IIITH. She is now working as software engineer. Her research focuses on applications of AI in diverse domains like biotech, drug discovery, astrophysics, robotics.


Ananya Sirandass
Ananya is pursuing a Bachelor of Technology in Information Technology at Keshav Memorial Institute of Technology. Her research focuses on AI applications. She is exploring neural networks, transformer architectures, and generative AI for accessibility solutions, medical imaging, and emergency response systems.


Yusuf Usman
Cybersecurity Researcher
Group Lead, Cyber Trust & Resilience Lab (CTR Lab)
Email: Author@yusufusman.net




Mentorship
Mentored projects where students develop hands-on skills, contribute to publications, and engage with cutting-edge security technologies.
Gallery
Snapshots from our lab's collaborative moments






Common Questions
Who can join?
Students and researchers passionate about cybersecurity and AI are welcome.
What projects exist?
We focus on AI-driven defense, data threat analysis, and real-world security challenges.
How is mentorship given?
I work closely with each member, guiding skills development, project impact, and collaboration opportunities.
Are publications supported?
Yes, we encourage and assist with conference papers and industry collaborations.
What backgrounds fit?
Members come from varied technical fields but unite around cybersecurity interests.
How can I get involved?
Reach out via email with your interests and background; we prioritize curiosity and commitment.
Get in Touch
Reach out to discuss cybersecurity projects, research collaborations, or mentorship opportunities.
