Academia is Not Perfect But It Can Be Transformative


That’s my office at the University of Illinois, Urbana-Champaign. Come say hi!

Academia is not perfect. But for many of us, it remains the most accessible and reliable system we have for helping people, especially students from disadvantaged backgrounds, achieve economic, social, and intellectual mobility.

This truth came into sharp focus again as I listened to the powerful 2025 Harvard commencement address by a fellow immigrant, born in Ethiopia. You can watch it here. Like the speaker, I came to the United States as an “alien”—driven by hope, hard work, and a belief that education could change lives. And it has. I’m now a Harvard-trained professor, and I can honestly say that academia has transformed not only my life but the lives of my family and friends. Thank you academia!

But I didn’t always feel this way.

There have been moments when I was ready to walk away from it all, when the “ivory tower” felt more like a fortress of burnout, ego, and misplaced priorities than a place for learning and growth. Let me share one example. It’s not the only one, but it’s seared into my memory.

Fall 2017: My Worst Semester in Graduate School

It was my hardest semester. Many friends (mostly at Harvard and MIT) were struggling. Struggling with research, personal issues, mental health. The pressure was suffocating. Then in October, a devastating event happened. An amazing Harvard undergraduate student that I knew passed away. It shook the community. You can read about one account of that time in this Crimson article. But the article only scratches the surface. Behind closed doors, people were hurting.

The very next day, I remember writing to a colleague: “I’m done with academia.” I was angry, heartbroken, and disillusioned. How could we call this a place of learning when the well-being of students seemed like an afterthought?

At one point, I told a friend: “Even if I finish my PhD, I can’t become a professor. There’s too much blood on the hands of professors. I don’t want to be part of a system that prioritizes awards, grants, and prestige over the health and wellness of students.”

That was my truth then.

The System Is Flawed—But We’re Also Part of It

The reality is that academia is both a system and a community. And like all systems, it reflects the values of those who participate in it. Professors, students, administrators: we all carry some responsibility. Systemic change requires constant reform. It also requires courage.

I often wonder why so many brilliant people end up in industry (e.g., Google Brain), seemingly leaving academia behind. For some, it’s about opportunity. For others, it’s about survival.

But over time, my perspective has shifted. I’ve encountered professors who are deeply committed to their students’ growth and well-being. I’ve seen programs and projects that genuinely change lives. And I’ve come to realize that as long as I can stay true to my principles, and use my position to help others, I’m okay with failing by some external metric. In fact, I welcome it.

Because anyone who isn’t failing at something is probably not trying hard enough.

Reaching Out and Reaching Forward

If you’re struggling in school, you’re not alone. Maybe you’re in school to support your family. That’s valid. Maybe you’re there because you love to learn. That’s valid too. There’s no “wrong” reason to be in school, only your own journey to make sense of.

As a professor, my job isn’t just to teach. It’s to help you grow and to build a support network around you. There will be hard times. But we can face them together.

Over the past few years, I’ve found the deepest meaning in my work with NaijaCoder, an initiative aimed at empowering young people in Nigeria through technical education. Watching our alumni grow and excel has been one of the greatest joys of my life. It reminds me that education is not about titles or tenure. It’s about transformation.

A Hopeful Commitment

Yes, the system needs fixing. But I haven’t given up on academia. Not because it’s perfect, but because it’s possible to make it better. Because there are still people who care more about students than status. Because in every classroom, in every lab, in every student from Lagos to Urbana-Champaign, I see potential.

To every student reading this: Relax, and reach out. You don’t have to do it alone. And to every professor: Let’s do better. Our legacy is not in our publications, but in the people we uplift.


P.S. If you’re in a tough place right now, please know that it’s OK to ask for help. Failing isn’t the end. It’s often the beginning of something more honest, more human, and more lasting.

Privacy and Security in Data Markets

At SIGMOD 2025, my collaborators and I are scheduled to give a tutorial on Privacy and Security in Distributed Data Markets. The core material that will be presented is summarized in the accompanying paper.

Abstract

Data markets play a pivotal role in modern industries by facilitating the exchange of data for predictive modeling, targeted marketing, and research. However, as data becomes a valuable commodity, privacy and security concerns have grown, particularly regarding the personal information of individuals. This tutorial explores privacy and security issues when integrating different data sources in data market platforms. As motivation for the importance of enforcing privacy requirements, we discuss attacks on data markets focusing on membership inference and reconstruction attacks. We also discuss security vulnerabilities in decentralized data marketplaces, including adversarial manipulations by buyers or sellers. We provide an overview of privacy and security mechanisms designed to mitigate these risks. In order to enforce the least amount of trust for buyers and sellers, we focus on distributed protocols. Finally, we conclude with opportunities for future research on understanding and mitigating privacy and security concerns in distributed data markets.

Schedule

Part I: Survey on Data Markets

Part II: Privacy and Security Risks

Part III: Privacy-Preserving Technologies and Security Tools

Part IV: Regulatory Considerations

Part V: Open Problems & Future Work

Part VI: Q & A

Leading up to the conference, I’m planning to post on different aspects of the tutorial.

Fall 2025: Topics in Information-Theoretic Cryptography

Since the beginning of this year, I have been developing a course on “Topics in Information-Theoretic Cryptography”. Recently, the course was approved for Fall 2025. I’m very excited to share some research with undergraduate/graduate students! Below, I list some relevant information for the proposed course.

Course Number and Title

ECE598DA: Topics in Information-Theoretic Cryptography

Description

In this course, we will study foundational and recent work on the use of information theory to design and analyze cryptographic protocols. We will begin by studying privacy attacks which motivate strong privacy and security definitions. Then, we will explore the basics of differential privacy and study some core works on zero-knowledge proofs. Finally, we will explore various applications, including watermarking of generative models.

Recommended Textbooks

  • Introduction to Cryptography with Coding Theory. By Wade Trappe, Lawrence C. Washington.
  • Tutorials on the Foundations of Cryptography. Edited by Yehuda Lindell.

Syllabus

Week 1: Introduction: motivations, one-time pad review, review of probability theory

Week 2: Attacks and Composition Theorems for Differential Privacy

Week 3: Standard Mechanisms for Differential Privacy

Week 4: Information-Theoretic Lower Bounds for Differential Privacy

Week 5: Differentially Private Statistical Estimation and Testing

Week 6: Zero-Knowledge Proofs

Week 7: Statistical Zero-Knowledge Proofs: Part I

Week 8: Statistical Zero-Knowledge Proofs: Part II

Week 9: Multi-Party Computation

Week 10: Multi-Party and Computational Differential Privacy

Week 11: Code-Based Cryptography: Part I

Week 12: Code-Based Cryptography: Part II

Week 13: More Applications

  • Watermarking of Generative Models
  • Proof Systems for Machine Learning
  • Bounded-Storage Cryptography
  • Quantum Cryptography

Week 14: Project Presentations