Welcome to Dr. Bo Yuan's (袁波) Website
Bo Yuan, Ph.D. (袁波博士)
Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences
Rochester Institute of Technology
Rochester, New York 14623
E-mail:bo.yuan@rit.edu
Voice: 585-475-4468
Office: GOL-3705
Education:
Binghamton University, Binghamton, New York, Ph.D. in Systems Science, 1996
Shanghai Normal University, Shanghai, China, M.S. in Applied Mathematics, 1988
Shanghai Normal University, Shanghai, China, B.S. in Mathematics, 1985
Employment:
Professor, Department of Cybersecurity,
Rochester Institute of Technology,
September, 2003 - Present
Staff Scientist, Manning and Napier Information Services/Perspective
Partners, Inc., July, 1997 - July, 2003
Assistant Professor, Department of Mathematics, Shanghai Normal
University, September, 1988 - September, 1991
Research Interests:
Computing Security and Computational Intelligence
Grants:
- 2024, NSF CyberCorps®
Scholarship for Service, #2336252, $6.5M, 2024-2029, PI: Bo Yuan, Co-PIs: Andy Meneely, and Rajendra Raj
- 2024, DoD Cyber Service Academy Scholarship Program, $423K, DoD, PI: Bo Yuan, Co-PI: Bill Stackpole
- 2023, DoD Cyber Scholarship Program, $681K, NSA, PI: Bo Yuan, Co-PI: Bill Stackpole
- 2022, DoD Cyber Scholarship Program, $598K, NSA, PI: Bo Yuan, Co-PI: Bill Stackpole
- 2021, DoD Cyber Scholarship Program, $341K, NSA, PI: Bo Yuan, Co-PI: Bill Stackpole
- 2020, DoD Cyber Scholarship Program, $346K, NSA, PI: Bo Yuan, Co-PI: Bill Stackpole
- 2019, NSF CyberCorps®
Scholarship for Service, #1922169, $5.5M, 2019-2024, PI: Bo Yuan, Co-PIs: Andy
Meneely and Rajendra Raj
- 2019, DoD Cyber Scholarship Program, $491K, NSA, PI: Bo Yuan, Co-PIs: Bill Stackpole,
Ziming Zao, and Hanif Rahbari
- 2018, DoD Cyber Scholarship Program, $100K, NSA, PI: Bo Yuan, Co-PI: Bill Stackpole
- 2017, Northeast Collegiate Cyber Defense Competition, $10K, USAF/UTx, PI: Bo Yuan
- 2017, DoD Cyber Scholarship Program, $43K, NSA, PI: Bo Yuan, Co-PI: Bill Stackpole
- 2017, GenCyber Summer Camps: Cyber Defense and Offence, $99K, NSA, PI: Bo Yuan
- 2015, Cybersecurity Strategic Thinking and Tactics, $25K,
Intel Gift Grant, PI: Bo Yuan
- 2014, NSF CyberCorps®
Scholarship for Service, #1433736, $4.1M, 2015-2019, PI: Bo Yuan, Co-PIs: Andy
Meneely and Rajendra Raj
Selected Publications:
Bo Yuan's Google Scholar Page
- Iorizzo, R. and B. Yuan (2024). Deep Graph Neural Networks for Malware Detection Using
Ghidra P-Code. In: Proceedings of the 23rd European Conference on Cyber Warfare and Security. Ed.
by M. Lehto. Vol. 23, pp.800–806
- Mosli, R., M. Wright, B. Yuan, and Y. Pan (2020). They Might NOT Be Giants Crafting Black-
Box Adversarial Examples Using Particle Swarm Optimization. In: Computer Security – ESORICS
2020. Ed. by L. Chen, N. Li, K. Liang, and S. Schneider. Cham: Springer International Publishing,
pp.439–459.
- Mosli, R., B. Yuan, and Y. Pan (2018). On the viability of data collection using Google Rapid Re-
sponse for enterprise-level malware research. Digital Investigation 26, S139.
-
Mosli, R., R. Li, B. Yuan, and Y. Pan (2017). A Behavior-Based Approach for Malware Detection.
In: Advances in Digital Forensics XIII. Ed. by G. Peterson and S. Shenoi. Cham: Springer Interna-
tional Publishing, pp.187–201.
- Mosli, R., R. Li, B. Yuan, and Y. Pan (2016). Automated malware detection using artifacts in
forensic memory images. In: IEEE International Symposium on Technologies for Homeland Security.
- Huba, W., B. Yuan, Y. Pan, and S. Mishra (2013). Towards a web tracking profiling algorithm. In:
Technologies for Homeland Security (HST), 2013 IEEE International Conference on, pp.12–17.
- Pan, Y., S. Mishra, B. Yuan, B. Stackpole, and D. Schwartz (2012). Game-based forensics course
for first year students. In: Proceedings of the 13th annual conference on Information technology education.
SIGITE ’12. New York, NY, USA: ACM, pp.13–18. http://doi.acm.org/10.1145/2380552.2350558 .
- Sanders, A., T. Sun, Y. Pan, and B. Yuan (2012). Correlating Risk Findings to Quantify Risk. In:
Proceedings of the 2012 ASE/IEEE International Conference on Social Computing and 2012 ASE/IEEE
International Conference on Privacy, Security, Risk and Trust. SOCIALCOM-PASSAT ’12. Washington,
DC, USA: IEEE Computer Society, pp.752–759. http://dx.doi.org/10.1109/SocialCom-PASSAT.2012.95 .
- T. Schellenberg, B. Yuan, and R. Zanibbi, Layout-based substitution tree
indexing and retrieval for mathematical expressions, Document
Recognition and Retrieval XIX. Edited by Chien, Liang-Chy; Lee, Sin-Doo; Wu,
Ming Hsien. Proceedings of the SPIE, Volume 8297, article id. 82970I, 8 pp.
(2012).
- W. Huba, B. Yuan, D. Johnson, and P. Lutz, A HTTP cookie covert channel,
in Proc. of the 4th Intern. Conf. on Security of Information and
Networks, ser. SIN ’11. New York, NY, USA: ACM, 2011, pp. 133–136.
- R. Zanibbi and B. Yuan, Keyword and image-based retrieval for mathematical
expressions, in Proc. Document Recognition and
Retrieval XVIII, Proc. SPIE, vol. 7874, 2011.
- E. Brown, B. Yuan, D. Johnson, and P. Lutz, Covert channels in the HTTP
network protocol: Channel characterization and detecting
man-in-the-middle attacks, The Journal of Information Warfare, vol. 9,
no. 3, pp. 26–38, 2010.
- M. Robertson, Y. Pan, and B. Yuan, A social approach to security: Using
social networks to help detect malicious web content, in
Proc. of the Intern. Conf. on Intelligent Systems and Knowledge
Engineering, 2010, pp. 436–441.
- C. Forbes, B. Yuan, D. Johnson, and P. Lutz, A covert channel in RTP
protocol, in The 9th Intern. FLINS Conf. World Scientific, 2010, pp.
813–819.
- K. Stokes, B. Yuan, D. Johnson, and P. Lutz, ICMP covert channel
resiliency, in Technological Developments in Networking, Education
and Automation, K. Elleithy, et al, Eds. Springer Netherlands, 2010, pp. 503–506.
- D. Johnson, P. Lutz, and B. Yuan, Behavior-based covert channel in
cyberspace, in Intelligent Decision Making Systems, E. A. Vanhoof,
Ed. New Jersey: World Scientific, 2009, pp. 311–318.
- E. Golen, B. Yuan, and N. Shenoy, An evolutionary approach to underwater
sensor deployment, International Journal of Computational
Intelligence Systems, vol. 2, no. 3, pp. 182–201, 2009.
- B. Yuan, Secure communications with an asymptotic secrecy model,
Knowledge Based Systems, vol. 20, no. 5, pp. 478–484, 2007.
- Bo Yuan (袁波) and Peter Lutz. A covert channel in packet
switching data networks. In The Second Upstate New York
Workshop on Communications and Networking, Rochester, NY, November 2005.
- George Klir and Bo Yuan (袁波). Fuzzy Sets and Fuzzy
Logic:Theory and Applications. Prentice Hall, Upper Saddle River, NJ, 1995.
- George Klir, Ute St.Clair, and Bo Yuan (袁波). Fuzzy
Theory and Applications. Prentice Hall, Upper Saddle River, NJ, 1997.
- D. Zrilic, J. Rameirez, and Bo Yuan (袁波). Hardware
implementation of fuzzy membership functions, operations, and
inference. Computer and Electrical Engineering, 20(1):85-105,
2000.
- Yin Pan (潘吟) and Bo Yuan (袁波). Bayesian inference of fuzzy
probabilities. Intern. J. of General Systems, 26(1-2):73-90,
1997.
- D. Zrilic, G. Petrovic, and Bo Yuan (袁波). Simplified
realization of delta-sigma decoder. Electronic Letters,
33(18):1515-1516, 1997.
- W. Wu (吴望名), H. The, and Bo Yuan (袁波). Reasoning with
propositional knowledge based on fuzzy neural logic. Intern.
J. Intelligent Systems, 11:251-265, 1996.
- W. Wu (吴望名), H. Lui, and Bo Yuan (袁波). Approximate reasoning
based on regular inference functions. J. of Fuzzy Mathematics, 4(1):103-118, 1996.
- Bo Yuan (袁波), Yin Pan (潘吟), and Wangming Wu (吴望名). On normal
form based interval-valued fuzzy sets and their applications to approximate
reasoning. Intern. J. of General Systems, 23(3):421-254,
1995.
- Bo Yuan (袁波), Yin Pan (潘吟), and Wangming Wu (吴望名). Mp and
invariant mp approximations of fuzzy inference rules. Intern. J. of General
Systems, 23(2):255-269, 1995.
- Yin Pan (潘吟) and Bo Yuan (袁波). Generalized fuzzy
method-of-cases. Intern. J. of Approximate Reasoning,
9(2):129-138, 1993.
- Bo Yuan (袁波) and George Klir. Intelligent Hybrid
Systems:
Fuzzy Logic, Neural Networks, and Genetic Algorithms, chapter
Data-driven identification of key variables. Kluwer, Boston, 1997.
- Bo Yuan (袁波) and D. Zrilic. An intelligent fuzzy control
system. In NAFIPS'97, Syracuse University, 1997.
- Bo Yuan (袁波) and George Klir. Approximate solutions of
systems of fuzzy relation equations. In Proc. of
FUZZ-IEEE'94, pages 1452-1457, Orlando, Florida, 1994.
- George Klir and Bo Yuan (袁波). On measures of conflict among
set-valued statements. In Proc. World Congress on Neural
Networks, pages 627-630, Portland, Oregon, July 11-15 1993.
- Bo Yuan (袁波) and Wangming Wu (吴望名). Fuzzy ideals on a
distributive lattice. Fuzzy Sets and Systems, 35(2):231-240,
1990.
Bo Yuan
2024-02-07