Biography

Bruno Fonkeng is a Computer Science Ph.D. student at the University of North Dakota, advised by Dr. Jielun Zhang. His work sits at the intersection of probabilistic machine learning, cybersecurity, and high-performance computing, with a focus on generative models and adaptive defense for modern cyber threats. He is particularly interested in using GANs, VAEs, diffusion models, and related architectures to simulate realistic APT behavior on networks, malware traffic, and cloud infrastructures, and then coupling these simulations with reinforcement-learning–based defenders that can learn to respond in real time. Through teaching and research assistantships, he contributes to UND’s initiatives in advanced computing, applied AI, and secure systems engineering.

Before beginning his doctoral studies, Bruno earned a B.Sc. in Physics from the University of Bamenda, Cameroon, where he developed strong analytical and quantitative skills that sparked his interest in scientific computing and AI. The rigorous mathematical training from physics now underpins his research in probabilistic modeling, statistical reasoning, and algorithmic optimization.

At UND, he has completed graduate coursework spanning machine learning, applied machine learning, artificial intelligence, data visualization, predictive modeling, application layer security, ethical hacking, security for cloud computing, high-performance computing & paradigms, and computer forensics, along with key mathematics courses in linear algebra and statistical theory. He is actively deepening his expertise in HPC, probabilistic modeling, and formal methods to support his dissertation work.

Bruno’s current research explores probabilistic generative models for cybersecurity, including synthetic cyber-traffic and malware image generation, data augmentation for intrusion detection, and robust anomaly detection. His long-term goal is to develop a probabilistic simulation-to-defense framework that can generate realistic, large-scale cyber data and train self-improving defensive agents for cloud environments. By combining rigorous statistical modeling, scalable experimentation on HPC systems, and practical systems thinking, he aims to help close the gap between academic ML models and deployable, trustworthy security tools that protect real organizations.

I have contributed to peer-reviewed research on data quality and wireless communication, including work on masked autoencoders for improving data recovery in scientific workflows and a Bayesian neural network–based CSI feedback mechanism, accepted for publication at ISICN 2025. Through my research assistantship with the TrueNorth–John Deere partnership, I have worked on real-world data engineering problems such as ROI forecasting tools and integrating agricultural machinery data via API systems to support data-driven decision-making in precision agriculture.

Beyond research, I have served as a graduate teaching assistant for CSCI 330 (Systems Programming) and CSCI 389 (Computer and Network Security), strengthening my understanding of low-level computing, operating systems, and core security principles. These roles have sharpened my ability to explain complex technical ideas clearly and reflect my broader commitment to mentoring, community-building, and the advancement of computing education.

I am also the founder of EdgeMindStudio, where I create open-source tools, educational content, and applied AI projects. These include prototypes for fraud-detection pipelines, portfolio and analytics platforms, and culturally grounded applications aimed at community empowerment and the preservation of African stories and traditions. This work spans full-stack development, data engineering, and applied machine learning implementations.

Looking ahead, I aim to contribute to academia, industry, or national research labs through high-impact work in AI for cybersecurity, simulation-driven defense systems, and large-scale data engineering. My long-term vision is to develop reliable, mathematically grounded AI systems—rooted in probabilistic and generative modeling—that enhance the security, resilience, and interpretability of mission-critical infrastructures. I remain committed to producing rigorous, publishable research while building practical tools that push the boundaries of intelligent, secure computation.