Research Interests: Machine Learning and Data Analytics, Supply Chain Design and Planning, Precision and Sustainable Agriculture, Manufacturing System Design and Modeling, Healthcare and Welfare Analytics
Research Interests: Cyber-physical systems, chemical reaction control, threat modeling, cyber risk assessment
Research Interests: Cybersecurity, Digital and Cyber Forensics, User and Data Privacy, Artificial Intelligence in Cyber Forensics and Security, Forensic Intelligence
- August 6, 2025
They’re proud George Mason University graduates doing impactful work for the National Football League’s (NFL) Washington Commanders and helping to change the face of professional football.
Research Interests: Operations research, Bilevel optimization, Plant breeding, Crop modeling, Data analytics, Digital twin
Research Interests: Mathematical Modeling, Data Visualization, Systems Thinking, Systems Engineering, Engineering Design
- August 6, 2025
Through hands-on exploration of artificial intelligence (AI) and robotics, students in the ACCESS Academy AI Summer Camp can imagine and begin preparing for technology-sector careers.
- August 4, 2025
George Mason University’s science, technology, engineering, and mathematics (STEM) summer camps, programs, and workshops are dedicated to inspiring the next generation of scientists and researchers with STEM-focused curriculum and hands-on learning experiences.
- August 4, 2025
Each year, academic professionals teach and conduct research abroad through the highly competitive Fulbright Scholar Program. George Mason University has a rich history of sending and hosting faculty and staff through the program, which is funded by the U.S. Department of State. This year, Frank Krueger of the College of Science, Nathalia Peixoto of the College of Engineering and Computing, and Yali Pan of the Office of International Programs and Services, received Fulbright awards.
- July 31, 2025
The Country to Country (C2C) Capture the Flag (CTF) contest is an international competition that issues challenges to code, decrypt, search, hack, and reverse engineer their way through as many challenges as possible.