Chinese scientists embraced by U.S. colleges worked with Chinese military-linked firms

American colleges have admitted Chinese scientists who worked at blacklisted Chinese tech firms that serve the CCP's military and intelligence apparatus, often co-funded by U.S. taxpayers.

Published: February 9, 2026 11:05pm

A recent watchdog report revealed that several top-ranked American universities have brought in Chinese academics who have links to Chinese military-linked technology firms like tech behemoth Huawei and other Chinese firms linked to the CCP’s state security endeavors.

A conservative non-profit watchdog group, the American Accountability Foundation, reported that it found nearly two dozen Chinese academics working at elite U.S. schools and labs “who, because of the dual-use threat of their research, close ties to the military research sector in China, and/or clear ties to the Chinese Communist Party" and as such "should be expelled from the United States or never be re-admitted."

The new AAF report pointed out that multiple Chinese students working at American universities had previously collaborated on projects with researchers at Huawei, including working with researchers at the Internal Cybersecurity Lab at Huawei.

"National champions" feed military programs

Just the News also found that at least one of the Chinese academics had also worked at iFlytek — a similarly blacklisted Chinese company which often collaborates with Huawei. The U.S. National Security Commission on Artificial Intelligence stated in 2021 that “national champion” firms such as Huawei and iFlytek help “lead development of AI technologies at home” and “advance state-directed priorities that feed military and security programs.”

The Congressional Executive Commission on China said in 2019 that “Chinese security authorities continued to work with domestic companies” — including Huawei and iFlytek — “to expand the reach and analytical power of government surveillance systems.”

Just the News previously detailed the fact that a number of U.S. colleges and universities have brought on members of the Chinese Communist Party as well as participants in the infamous “Thousand Talents Program” which has historically been used to steal U.S. technological and scientific know-how for the benefit of China.

The AAF report also pointed out that a Chinese scientist now working at an American university had previously worked at the Aviation Industry Corporation of China, or AVIC, a CCP defense conglomerate blacklisted by the U.S. government. The Chinese state-owned military company is considered to be among the largest defense companies in the world.

The report by AAF also pointed out that a Chinese scientist working at an American school had previously worked at China’s Center for High Pressure Science and Technology Advanced Research — also blacklisted by the U.S. government.

The new AAF research document — titled "Chinese Scientist Infiltration Threat Assessments" — says that Chinese students working at some of America’s top colleges, often receiving U.S. government funding to conduct research into advanced technologies, have troubling histories which could pose a risk to U.S. national security.

The U.S. colleges in question which have brought on the Chinese scientists linked to blacklisted CCP companies — Cornell University, Georgia Tech, the University of Southern California, and Purdue University — did not respond to emailed requests for comment from Just the News

None of the Chinese academics responded to requests for comment either.

The Huawei threat — now inside U.S. universities

The AAF report argued that Guangyao Chen “poses a high national-security and dual-use risk due to his expertise in adversarial machine learning” and that “this risk is amplified by his training at Peking University, PRC government funding, and collaborations with PRC universities and Huawei, placing his work squarely within China’s military-civil fusion ecosystem.”

Chen currently appears to be affiliated with Cornell. The ResearchGate page for Chen says that his “top co-authors” include Lin Du, a researcher at Huawei. Chen appears to have conducted multiple research projects with the Huawei researcher. The Huawei scientist’s ResearchGate profile lists Du’s skills and expertise as being “computer vision,” “object recognition,” and “machine learning.”

The House Intelligence Committee in 2012 assessed that “the risks associated with Huawei’s […] provision of equipment to U.S. critical infrastructure could undermine core U.S. national security interests” and said that Huawei poses “a security threat to the United States and to our systems.”

The heads of the FBI, CIA, NSA, the Office of the Director of National Intelligence, the Defense Intelligence Agency, and the National Geospatial-Intelligence Agency all warned in 2018 against using Huawei services or equipment. In addition, the Commerce Department concluded in 2020 that “Huawei is engaged in activities that are contrary to U.S. national security or foreign policy interests and its non-U.S. affiliates pose a significant risk of involvement in activities contrary to the national security of the United States.” 

The FCC added Huawei to its blacklist as well, concluding in 2020 that Huawei “poses a national security threat to our nation’s communications networks and the communications supply chain.”

Meng Wanzhou, Huawei’s CFO and the daughter of the company’s founder, was arrested by Canadian authorities in December 2018 at the request of the U.S., indicted in the Eastern District of New York in January 2019, and charged with bank fraud and wire fraud as well as conspiracy to commit both, but was allowed to walk free by the Biden Administration in 2021 in a deferred prosecution agreement wherein she admitted violating U.S. law. 

The GitHub profile for Chen says that “I’m currently a Postdoctoral Researcher at AI for Science Institute, Cornell University” and that he received his PhD from Peking University and his undergraduate degree from Wuhan University.

The Australian Strategic Policy Institute (ASPI) said that Peking University “is assessed as high risk for its high number of defense laboratories and defense research areas, strong relationship with the defense industry, supervision by SASTIND, secret-level security clearance, and links to China’s nuclear weapons program.”

Wuhan University the center of military research

The House Select Committee on the CCP assessed in 2025 that Wuhan University “conducts research in at least five designated defense research areas, trains People’s Liberation Army cyber warfare specialists, and plays a central role in China’s Beidou satellite system, which supports missile guidance and military intelligence operations.”

Chen is currently listed as a postdoctoral associate at Cornell’s school of chemical and biomolecular engineering through the Fengqui You Lab. Neither Chen nor Cornell responded to a request for comment.

Fengqui You, a Cornell professor, leads the Fengqui You Research Group at Cornell, which is “pushing the boundaries of systems engineering, artificial intelligence, and data science.”

Chen is listed as a member and Fengqui You is listed as the principal investigator for the lab. You attended Tsinghua University, which the House Select Committee on the CCP has warned about. You did not immediately respond to a request for comment.

The House Select Committee on the CCP warned in 2024 that Tsinghua is “co-supervised by the State Administration for Science, Technology, and Industry for National Defense, an arm of the Chinese government … which seeks to leverage these universities for defense purposes” and that Tsinghua “has a documented history of serving the PRC’s national security and defense apparatus, including involvement in defense research and alleged cyberattacks targeting various international entities.”

“His technical focus and institutional ties create a credible pathway for transferring adversarial-AI knowledge that could be used to compromise or weaponize AI systems critical to U.S. national security,” the report by AAF says of Chen.

Chinese academic with links to Huawei and iFlytek wins DARPA award in U.S.

The report by AAF said that Cen Zhang’s “prior work with Chinese entities and his influential role at Georgia Tech is highly concerning given the nature of computer science’s impact on U.S. national security.”

Zhang co-authored a 2021 paper on “Practical Binary Fuzzing Framework for Programs of IoT and Mobile Devices” — related to security vulnerabilities for mobile phones and other smart devices — with co-authors Xiaoxing Luo and Miaohua Li from the Internal Cyber Security Lab at Huawei Technologies.

Zhang has also conducted research with Hongxu Chen, who now lists himself as a lead engineer at Huawei, and who also went to Nanyang Technological University.

Zhang’s personal curriculum vitae also says he was previously an algorithm and engine development engineer for iFlytek. Zhang says on his GitHub page that he won the “Best New Employee Award of Year” at iFlytek in 2017.

The firm has long received state support and recognition from China’s government. The company was named a national “AI champion” by the Chinese Ministry of Science and Technology in 2018.

The Commerce Department said in October 2019 that iFlytek was among more than two dozen Chinese entities added to a U.S. blacklist, saying they were “implicated in human rights violations and abuses in the implementation of China’s campaign of repression, mass arbitrary detention, and high-technology surveillance against Uighurs, Kazakhs, and other members of Muslim minority groups.” Liu Qingfeng, iFlytek’s founder and CEO, is also a deputy to the National People’s Congress, the CCP’s rubber-stamp national legislature.

Liu told the Chinese state-run Global Times in 2020 that the blacklist against it had not slowed it down and touted his partnership with Huawei. A 2018 magazine article shared by Huawei asserted that “iFlytek and Huawei have formed a strategic partnership to develop practical applications for voice and AI technology.”

The Washington Post revealed in 2021 that Huawei, as part of a pitch to assist Chinese authorities in analyzing voices for “national security” purposes, made slides showing that an “iFlytek Voiceprint Management Platform” (developed by both Huawei and iFlytek) could identify individuals through a massive “voiceprint” database.

Fu Liting, the marketing director of the Public Security Division at the Smart City Business Group of iFlytek, told the CCP-run China Daily in 2022 that “we work with the police by applying our artificial intelligence.”

Human Rights Watch said in 2017 that iFlytek says it helped China’s Ministry of Public Security build a national voice pattern database and set up a ministry laboratory in AI voice technology to “solve cases” in Xinjiang and Tibet. The watchdog group said the company “is also the designated supplier of voice pattern collection systems purchased by Xinjiang and Anhui police bureaus.”

U.S. gov't rewards Chinese agents

Zhang’s U.S.-based team appears to have won a recent Defense Advanced Research Projects Agency competition called the AI Cyber Challenge (AIxCC). The DARPA challenge said it was “excited to have Anthropic, Google, Microsoft, OpenAI, the Linux Foundation, the Open Source Security Foundation, Black Hat USA, and DEF CON as collaborators in this effort.” The competition website said Team Atlantic — which Zhang was on — came in first place and won $4 million.

Team Atlanta said that it “claimed victory in DARPA’s AI Cyber Challenge, showcasing the capabilities of our autonomous security technology.” The JAVA software team lead was Zhang. 

The Team Atlanta page for Zhang said that “Atlantis-Java is a specialized bug-finding subsystem … specifically designed for Java CPV [CertPathValidator] detection in the AIxCC competition. It integrates fuzzing, program analysis, and LLM capabilities” — similar topics to the ones he had researched alongside Huawei co-authors.

DARPA did not immediately respond to a request for comment.

Zhang’s Github says that he received his PhD at Nanyang Technological University in Singapore. His curriculum vitae also says he received a master’s degree at the University of Science and Technology of China.

The Commerce Department’s Bureau of Industry and Security said in 2024 that that Chinese school was added to its blacklist “for acquiring and attempting to acquire U.S.-origin items in support of advancing China's quantum technology capabilities, which has serious ramifications for U.S. national security given the military applications of quantum technologies” and for being “involved in advancing China's nuclear program development.”

A paper written by Zhang when he was still at the Singapore university included seven co-authors from the Chinese Academy of Sciences. Other prior papers written by Zhang were often co-authored by scientists from the Chinese Academy of Sciences as well as Chinese universities such as Peking University, Huazhong University of Science and Technology, Xi'an Jiaotong University, and Zhejiang University.

Zhang’s GitHub page says he is currently a postdoctoral researcher at the Systems Software and Security Lab at Georgia Tech.

This lab says that its “Funding Support” includes federal government sources such as DARPA, NSF, Office of Naval Research, and Sandia National Laboratories, as well as tech companies such as Microsoft, Google, Facebook, and OpenAI.

Neither Zhang nor Georgia Tech responded to a request for comment.

The AAF report assessed that Zheng’s “inside knowledge of leading defense collaborators and AI platforms is a significant threat in the race between China and the U.S. for AI superiority.” 

Chinese scientist at U.S. college worked for China’s largest military aircraft company

The AAF report claims that Xiaobin Zhao “presents a high national-security risk because his research in quantum sensing, metrology, and communications directly supports technologies critical to next generation military systems, including areas explicitly identified by the U.S. government as strategically sensitive” and that “the risk is heightened by his funding from PRC state programs operating under military-civil fusion and his prior work with AVIC, a PLA-controlled defense conglomerate.”

The Google Scholar page for Zhao lists him at USC. Neither Zhao nor USC responded to a request for comment.

Zhao’s online bio says he interned at the Aviation Industry Corporation of China, or AVIC, in 2013. The Chinese state-owned military company is considered to be among the largest defense companies in the world.

A key AVIC subsidiary known as the China National Aero-Technology Import and Export Corporation, or CATIC, has also been considered a U.S. national security threat since 1990. President George H.W. Bush issued an order in January 1990 that concluded CATIC “might take action that threatens to impair the national security of the United States of America.”

The House Select Committee on China warned in 1998 about AVIC and its subsidiary CATIC, and the Government Accountability Office in 1996 detailed a scheme by CATIC to get U.S.-based McDonnell Douglas to “co-produce 40 MD-80 and MD-90 aircraft in China for the country’s domestic ‘trunk’ routes.”

CATIC was charged by the Justice Department in 1999 with violating the Export Administration Act and the International Emergency Economic Powers Act “regarding details of a 1994 sale of American machining equipment, some of which was diverted to a Chinese military site.”

The Commerce Department said in 2001 that TAL Industries was allegedly part of the "conspiracy" to export machine tools from the U.S. to CATIC.

The State Department said in 2002 that most of the charges related to CATIC were dismissed, but that "TAL Industries Inc., however, was convicted of violating the EAA and was sentenced on May 11, 2001, to five years of corporate probation" and "payment of a $1 million fine."

The AVIC website in 2015 made it clear that its business units included “defense” as well as aviation. The “AVIC Evolution” section said the company was the successor to the Chinese government’s Ministry of Aerospace Industry. Now-former Chinese defense minister Li Shangfu had previously been a board member of AVIC Avionics Equipment.

AVIC and its subsidiaries were blacklisted by the Pentagon in 2020 for being “Chinese Military Companies Operating in the United States.” AVIC Avionics was also sanctioned by the Treasury Department in 2021 and placed on the “Chinese Military-Industrial Complex Companies List.”

The blacklist added that the Chinese center is “operated by, or directly affiliated with, the Chinese Academy of Engineering Physics, which is the technology complex responsible for the research, development and testing of China's nuclear weapons.”

The House Select Committee on the CCP said in 2024 that AVIC is “the principal producer of military aircraft for the PLA.”

The House committee said that “major index providers and asset managers” in the U.S. “channel billions of dollars to PRC companies on U.S. government red-flag lists for advancing the PRC’s military and supporting the CCP’s human rights abuses” including $178 million from U.S. industry.

The committee also noted that AVIC sells aircraft to the Iranian regime’s Aerospace Force. AVIC has also supported Russia during its war with Ukraine.

Zhao previously attended Hong Kong University. He also attended Northwestern Polytechnical University according to his online biography. The latter university has long been on U.S. government blacklists, including being blacklisted by the Pentagon, and it has been dubbed one of the CCP’s “Seven Sons of National Defense.”

The Commerce Department in 2021 described the school as “a Chinese military university that is heavily involved in military research and works closely with the People’s Liberation Army on the advancement of its military capabilities.”

The USC lab is run by Quntao Zhuang, listed as the “Principal Investigator” at the lab, who graduated from Peking University. Zhuang did not immediately respond to a request for comment.

ASPI says that Peking University “is assessed as high risk for its high number of defence laboratories and defence research areas, strong relationship with the defense industry, supervision by SASTIND, secret-level security clearance, and links to China’s nuclear weapons program.”

The report by AAF said that “this combination of critical dual-use technical expertise, direct historical ties to PLA-aligned entities, and ongoing proximity to U.S. quantum research presents a credible pathway by which sensitive knowledge could be transferred to the PRC, materially enhancing China’s military modernization and undermining U.S. national security advantages.”

Another scientist from blacklisted Chinese tech research center comes to the U.S.

The report by AAF said that Bijuan Chen “is a leading researcher in an area of critical defense research who was trained at one of China’s leading military research institutes, which the U.S. government has labeled as a hostile actor who behaves in a way contrary to U.S. national security interests.”

The report alleged that “despite Bijuan Chen having the formative years of her career in an agency that the U.S. Government had declared acts in ways contrary to the national security interests of the United States, Chen still went to work with researchers working on defense-related research.”

Chen is now listed as working at Purdue University. Neither Chen nor Purdue responded to requests for comment.

Chen’s online profile at the Center for High Pressure Science and Technology Advanced Research, or HPSTAR, says that she received her PhD from the Institute of Physics at the Chinese Academy of Sciences and obtained her undergraduate degree at Sichuan University.

Chen’s “alumni” profile at the Chinese center says that “her research interests in HPSTAR mainly focus on the studies of mixed valent behaviors, exotic magnetism, quantum phase transition and superconductivity in electron materials under extreme pressures using  X-ray spectroscopy and neutron scattering.”

The Department of Commerce’s Bureau of Industry and Security assessed in 2020 that HPSTAR had been “determined by the U.S. Government to be acting contrary to the national security or foreign policy interests of the United States … on the basis of their procurement of U.S.-origin items for activities contrary to the national security or foreign policy interests of the United States.”

The blacklist added that HPSTAR “operated by, or directly affiliated with, the Chinese Academy of Engineering Physics, which is the technology complex responsible for the research, development and testing of China's nuclear weapons.” HPSTAR is also on the Pentagon’s list of “foreign institutions engaging in problematic activity” with the Defense Department saying the list is “an important continuing effort in highlighting and countering mechanisms of unwanted technology transfer to foreign countries of concern.”

Yang Ding’s former team leader at HPSTAR appears to have been a part of the Thousand Talents Program, with HPSTAR saying that Ding had received the “1000-Talents Award.”

Chen was previously listed as a “postdoctoral researcher” working on the “X-ray Science Group” led by Ding at HPSTAR. Ding is listed as the “PI” — likely standing for “principal investigator” — for the Chinese science group at the center, and Chen is listed as an “alumni” of Ding’s group. The HPSTAR page lists Chen and Ding as co-authors on research projects at HPSTAR.

The House Select Committee on the CCP said in 2025 that Sichuan University was “affiliated” with SASTIND, saying that these SASTIND schools “maintain specialized labs, programs, and departments dedicated to military research” and “SASTIND plays a critical role in managing China’s defense R&D outside the PLA.”

A host of institutes and centers at the Chinese Academy of Sciences have been blacklisted by the Commerce Department, including the Institute of Physics (where Chen received her PhD).

Chen’s LinkedIn profile says she has been a postdoctoral research fellow at Purdue since July 2025, and had been a postdoctoral fellow at Harvard.

She is listed as working at the Tongcang Li Research Group at Purdue, a “Quantum Sensing and Optomechanics Laboratory.”

The research group appears to have received millions of dollars in funding from the U.S. Department of Energy. Purdue and Tongcang Li were selected in 2024 by the Department of Energy to help “lead the Quantum Photonics Integrated Design Center Energy Frontier Research Center” in collaboration with Los Alamos National Laboratory and other partners.

Chen’s Google Scholar page also says she worked at Harvard, where she was part of the Yao Group at Harvard, which says that “our research lies at the interface between atomic, molecular, and optical physics, condensed matter, and quantum information science.” The AAF report concluded that “Chen still has ties to HPSTAR, and her continued work in this critical area represents a significant threat for transfer of vital research information aiding the Chinese at the expense of the United States.”

FBI Director Kash Patel told Just the News on Friday that “this FBI, under this leadership, has prioritized the threat against it by the CCP against us, and we've taken swift action.” It remains to be seen the extent to which the bureau’s efforts against Beijing will extend to American colleges welcoming Chinese academics linked to Huawei and other blacklisted Chinese firms.

Unlock unlimited access

  • No Ads Within Stories
  • No Autoplay Videos
  • VIP access to exclusive Just the News newsmaker events hosted by John Solomon and his team.
  • Support the investigative reporting and honest news presentation you've come to enjoy from Just the News.
  • Just the News Spotlight

    Support Just the News