Welcome to Dr. Bo Yuan's (袁波) Website

Bo Yuan, Ph.D. (袁波博士)

Professor

Department of Computing Security

ESL Global Cybersecurity Institute

Golisano College of Computing and Information Sciences

Rochester Institute of Technology

Rochester, New York 14623

E-mail:bo.yuan@rit.edu

Voice: 585-475-4468

Office: GOL-3705

Education:

Binghamton University, Binghamton, New York, Ph.D. in Systems Science, 1996

Shanghai Normal University, Shanghai, China, M.S. in Applied Mathematics, 1988

Shanghai Normal University, Shanghai, China, B.S. in Mathematics, 1985

Employment:

Professor, Department of Computing Security,
Rochester Institute of Technology,
September, 2003 - Present

Staff Scientist, Manning and Napier Information Services/Perspective
Partners, Inc., July, 1997 - July, 2003

Assistant Professor, Department of Mathematics, Shanghai Normal
University, September, 1988 - September, 1991

Research Interests:

Computing Security and Computational Intelligence

Grants:

- 2021, DoD Cyber Scholarship Program, $341K, NSA, PI: Bo Yuan, Co-PI: Bill Stackpole
- 2020, DoD Cyber Scholarship Program, $346K, NSA, PI: Bo Yuan, Co-PI: Bill Stackpole
- 2019, NSF CyberCorps® Scholarship for Service, #1922169, $5.5M, 2019-2024, PI: Bo Yuan, Co-PIs: Andy Meneely and Rajandra Raj
- 2019, DoD Cyber Scholarship Program, $491K, NSA, PI: Bo Yuan, Co-PIs: Bill Stackpole, Ziming Zao, and Hanif Rahbari
- 2018, DoD Cyber Scholarship Program, $100K, NSA, PI: Bo Yuan, Co-PI: Bill Stackpole
- 2017, Northeast Collegiate Cyber Defense Competition, $10K, USAF/UTx, PI: Bo Yuan
- 2017, DoD Cyber Scholarship Program, $43K, NSA, PI: Bo Yuan, Co-PI: Bill Stackpole
- 2017, GenCyber Summer Camps: Cyber Defense and Offence, $99K, NSA, PI: Bo Yuan
- 2015, Cybersecurity Strategic Thinking and Tactics, $25K, Intel Gift Grant, PI: Bo Yuan
- 2014, NSF CyberCorps® Scholarship for Service, #1433736, $4.1M, 2015-2019, PI: Bo Yuan, Co-PIs: Andy Meneely and Rajandra Raj

Selected Publications:

Bo Yuan's Google Scholar Page

- Mosli, R., M. Wright, B. Yuan, and Y. Pan (2020). They Might NOT Be Giants Crafting Black- Box Adversarial Examples Using Particle Swarm Optimization. In: Computer Security – ESORICS 2020. Ed. by L. Chen, N. Li, K. Liang, and S. Schneider. Cham: Springer International Publishing, pp.439–459.
- Mosli, R., B. Yuan, and Y. Pan (2018). On the viability of data collection using Google Rapid Re- sponse for enterprise-level malware research. Digital Investigation 26, S139.
- Mosli, R., R. Li, B. Yuan, and Y. Pan (2017). A Behavior-Based Approach for Malware Detection. In: Advances in Digital Forensics XIII. Ed. by G. Peterson and S. Shenoi. Cham: Springer Interna- tional Publishing, pp.187–201.
- Mosli, R., R. Li, B. Yuan, and Y. Pan (2016). Automated malware detection using artifacts in forensic memory images. In: IEEE International Symposium on Technologies for Homeland Security.
- Huba, W., B. Yuan, Y. Pan, and S. Mishra (2013). Towards a web tracking profiling algorithm. In: Technologies for Homeland Security (HST), 2013 IEEE International Conference on, pp.12–17.
- Pan, Y., S. Mishra, B. Yuan, B. Stackpole, and D. Schwartz (2012). Game-based forensics course for first year students. In: Proceedings of the 13th annual conference on Information technology education. SIGITE ’12. New York, NY, USA: ACM, pp.13–18. http://doi.acm.org/10.1145/2380552.2350558 .
- Sanders, A., T. Sun, Y. Pan, and B. Yuan (2012). Correlating Risk Findings to Quantify Risk. In: Proceedings of the 2012 ASE/IEEE International Conference on Social Computing and 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust. SOCIALCOM-PASSAT ’12. Washington, DC, USA: IEEE Computer Society, pp.752–759. http://dx.doi.org/10.1109/SocialCom-PASSAT.2012.95 .
- T. Schellenberg, B. Yuan, and R. Zanibbi, Layout-based substitution tree indexing and retrieval for mathematical expressions, Document Recognition and Retrieval XIX. Edited by Chien, Liang-Chy; Lee, Sin-Doo; Wu, Ming Hsien. Proceedings of the SPIE, Volume 8297, article id. 82970I, 8 pp. (2012).
- W. Huba, B. Yuan, D. Johnson, and P. Lutz, A HTTP cookie covert channel, in Proc. of the 4th Intern. Conf. on Security of Information and Networks, ser. SIN ’11. New York, NY, USA: ACM, 2011, pp. 133–136.
- R. Zanibbi and B. Yuan, Keyword and image-based retrieval for mathematical expressions, in Proc. Document Recognition and Retrieval XVIII, Proc. SPIE, vol. 7874, 2011.
- E. Brown, B. Yuan, D. Johnson, and P. Lutz, Covert channels in the HTTP network protocol: Channel characterization and detecting man-in-the-middle attacks, The Journal of Information Warfare, vol. 9, no. 3, pp. 26–38, 2010.
- M. Robertson, Y. Pan, and B. Yuan, A social approach to security: Using social networks to help detect malicious web content, in Proc. of the Intern. Conf. on Intelligent Systems and Knowledge Engineering, 2010, pp. 436–441.
- C. Forbes, B. Yuan, D. Johnson, and P. Lutz, A covert channel in RTP protocol, in The 9th Intern. FLINS Conf. World Scientific, 2010, pp. 813–819.
- K. Stokes, B. Yuan, D. Johnson, and P. Lutz, ICMP covert channel resiliency, in Technological Developments in Networking, Education and Automation, K. Elleithy, et al, Eds. Springer Netherlands, 2010, pp. 503–506.
- D. Johnson, P. Lutz, and B. Yuan, Behavior-based covert channel in cyberspace, in Intelligent Decision Making Systems, E. A. Vanhoof, Ed. New Jersey: World Scientific, 2009, pp. 311–318.
- E. Golen, B. Yuan, and N. Shenoy, An evolutionary approach to underwater sensor deployment, International Journal of Computational Intelligence Systems, vol. 2, no. 3, pp. 182–201, 2009.
- B. Yuan, Secure communications with an asymptotic secrecy model, Knowledge Based Systems, vol. 20, no. 5, pp. 478–484, 2007.
- Bo Yuan (袁波) and Peter Lutz. A covert channel in packet switching data networks. In The Second Upstate New York Workshop on Communications and Networking, Rochester, NY, November 2005.
- George Klir and Bo Yuan (袁波). Fuzzy Sets and Fuzzy Logic:Theory and Applications. Prentice Hall, Upper Saddle River, NJ, 1995.
- George Klir, Ute St.Clair, and Bo Yuan (袁波). Fuzzy Theory and Applications. Prentice Hall, Upper Saddle River, NJ, 1997.
- D. Zrilic, J. Rameirez, and Bo Yuan (袁波). Hardware implementation of fuzzy membership functions, operations, and inference. Computer and Electrical Engineering, 20(1):85-105, 2000.
- Yin Pan (潘吟) and Bo Yuan (袁波). Bayesian inference of fuzzy probabilities. Intern. J. of General Systems, 26(1-2):73-90, 1997.
- D. Zrilic, G. Petrovic, and Bo Yuan (袁波). Simplified realization of delta-sigma decoder. Electronic Letters, 33(18):1515-1516, 1997.
- W. Wu (吴望名), H. The, and Bo Yuan (袁波). Reasoning with propositional knowledge based on fuzzy neural logic. Intern. J. Intelligent Systems, 11:251-265, 1996.
- W. Wu (吴望名), H. Lui, and Bo Yuan (袁波). Approximate reasoning based on regular inference functions. J. of Fuzzy Mathematics, 4(1):103-118, 1996.
- Bo Yuan (袁波), Yin Pan (潘吟), and Wangming Wu (吴望名). On normal form based interval-valued fuzzy sets and their applications to approximate reasoning. Intern. J. of General Systems, 23(3):421-254, 1995.
- Bo Yuan (袁波), Yin Pan (潘吟), and Wangming Wu (吴望名). Mp and invariant mp approximations of fuzzy inference rules. Intern. J. of General Systems, 23(2):255-269, 1995.
- Yin Pan (潘吟) and Bo Yuan (袁波). Generalized fuzzy method-of-cases. Intern. J. of Approximate Reasoning, 9(2):129-138, 1993.
- Bo Yuan (袁波) and George Klir. Intelligent Hybrid Systems: Fuzzy Logic, Neural Networks, and Genetic Algorithms, chapter Data-driven identification of key variables. Kluwer, Boston, 1997.
- Bo Yuan (袁波) and D. Zrilic. An intelligent fuzzy control system. In NAFIPS'97, Syracuse University, 1997.
- Bo Yuan (袁波) and George Klir. Approximate solutions of systems of fuzzy relation equations. In Proc. of FUZZ-IEEE'94, pages 1452-1457, Orlando, Florida, 1994.
- George Klir and Bo Yuan (袁波). On measures of conflict among set-valued statements. In Proc. World Congress on Neural Networks, pages 627-630, Portland, Oregon, July 11-15 1993.
- Bo Yuan (袁波) and Wangming Wu (吴望名). Fuzzy ideals on a distributive lattice. Fuzzy Sets and Systems, 35(2):231-240, 1990.

Bo Yuan 2022-08-02