Welcome to Dr. Bo Yuan's (袁波) Website

Bo Yuan, Ph.D. (袁波博士)
Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences
Rochester Institute of Technology
Rochester, New York 14623
E-mail:bo.yuan@rit.edu
Voice: 585-475-4468
Office: GOL-3705


Education:

Binghamton University, Binghamton, New York, Ph.D. in Systems Science, 1996
Shanghai Normal University, Shanghai, China, M.S. in Applied Mathematics, 1988
Shanghai Normal University, Shanghai, China, B.S. in Mathematics, 1985

Employment:

Professor, Department of Cybersecurity, Rochester Institute of Technology, September, 2003 - Present
Staff Scientist, Manning and Napier Information Services/Perspective Partners, Inc., July, 1997 - July, 2003
Assistant Professor, Department of Mathematics, Shanghai Normal University, September, 1988 - September, 1991

Research Interests:

Computing Security and Computational Intelligence

Grants:

  1. 2024, NSF CyberCorps® Scholarship for Service, #2336252, $6.5M, 2024-2029, PI: Bo Yuan, Co-PIs: Andy Meneely, and Rajendra Raj
  2. 2024, DoD Cyber Service Academy Scholarship Program, $423K, DoD, PI: Bo Yuan, Co-PI: Bill Stackpole
  3. 2023, DoD Cyber Scholarship Program, $681K, NSA, PI: Bo Yuan, Co-PI: Bill Stackpole
  4. 2022, DoD Cyber Scholarship Program, $598K, NSA, PI: Bo Yuan, Co-PI: Bill Stackpole
  5. 2021, DoD Cyber Scholarship Program, $341K, NSA, PI: Bo Yuan, Co-PI: Bill Stackpole
  6. 2020, DoD Cyber Scholarship Program, $346K, NSA, PI: Bo Yuan, Co-PI: Bill Stackpole
  7. 2019, NSF CyberCorps® Scholarship for Service, #1922169, $5.5M, 2019-2024, PI: Bo Yuan, Co-PIs: Andy Meneely and Rajendra Raj
  8. 2019, DoD Cyber Scholarship Program, $491K, NSA, PI: Bo Yuan, Co-PIs: Bill Stackpole, Ziming Zao, and Hanif Rahbari
  9. 2018, DoD Cyber Scholarship Program, $100K, NSA, PI: Bo Yuan, Co-PI: Bill Stackpole
  10. 2017, Northeast Collegiate Cyber Defense Competition, $10K, USAF/UTx, PI: Bo Yuan
  11. 2017, DoD Cyber Scholarship Program, $43K, NSA, PI: Bo Yuan, Co-PI: Bill Stackpole
  12. 2017, GenCyber Summer Camps: Cyber Defense and Offence, $99K, NSA, PI: Bo Yuan
  13. 2015, Cybersecurity Strategic Thinking and Tactics, $25K, Intel Gift Grant, PI: Bo Yuan
  14. 2014, NSF CyberCorps® Scholarship for Service, #1433736, $4.1M, 2015-2019, PI: Bo Yuan, Co-PIs: Andy Meneely and Rajendra Raj

Selected Publications:
Bo Yuan's Google Scholar Page

  1. Iorizzo, R. and B. Yuan (2024). Deep Graph Neural Networks for Malware Detection Using Ghidra P-Code. In: Proceedings of the 23rd European Conference on Cyber Warfare and Security. Ed. by M. Lehto. Vol. 23, pp.800–806
  2. Mosli, R., M. Wright, B. Yuan, and Y. Pan (2020). They Might NOT Be Giants Crafting Black- Box Adversarial Examples Using Particle Swarm Optimization. In: Computer Security – ESORICS 2020. Ed. by L. Chen, N. Li, K. Liang, and S. Schneider. Cham: Springer International Publishing, pp.439–459.
  3. Mosli, R., B. Yuan, and Y. Pan (2018). On the viability of data collection using Google Rapid Re- sponse for enterprise-level malware research. Digital Investigation 26, S139.
  4. Mosli, R., R. Li, B. Yuan, and Y. Pan (2017). A Behavior-Based Approach for Malware Detection. In: Advances in Digital Forensics XIII. Ed. by G. Peterson and S. Shenoi. Cham: Springer Interna- tional Publishing, pp.187–201.
  5. Mosli, R., R. Li, B. Yuan, and Y. Pan (2016). Automated malware detection using artifacts in forensic memory images. In: IEEE International Symposium on Technologies for Homeland Security.
  6. Huba, W., B. Yuan, Y. Pan, and S. Mishra (2013). Towards a web tracking profiling algorithm. In: Technologies for Homeland Security (HST), 2013 IEEE International Conference on, pp.12–17.
  7. Pan, Y., S. Mishra, B. Yuan, B. Stackpole, and D. Schwartz (2012). Game-based forensics course for first year students. In: Proceedings of the 13th annual conference on Information technology education. SIGITE ’12. New York, NY, USA: ACM, pp.13–18. http://doi.acm.org/10.1145/2380552.2350558 .
  8. Sanders, A., T. Sun, Y. Pan, and B. Yuan (2012). Correlating Risk Findings to Quantify Risk. In: Proceedings of the 2012 ASE/IEEE International Conference on Social Computing and 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust. SOCIALCOM-PASSAT ’12. Washington, DC, USA: IEEE Computer Society, pp.752–759. http://dx.doi.org/10.1109/SocialCom-PASSAT.2012.95 .
  9. T. Schellenberg, B. Yuan, and R. Zanibbi, Layout-based substitution tree indexing and retrieval for mathematical expressions, Document Recognition and Retrieval XIX. Edited by Chien, Liang-Chy; Lee, Sin-Doo; Wu, Ming Hsien. Proceedings of the SPIE, Volume 8297, article id. 82970I, 8 pp. (2012).
  10. W. Huba, B. Yuan, D. Johnson, and P. Lutz, A HTTP cookie covert channel, in Proc. of the 4th Intern. Conf. on Security of Information and Networks, ser. SIN ’11. New York, NY, USA: ACM, 2011, pp. 133–136.
  11. R. Zanibbi and B. Yuan, Keyword and image-based retrieval for mathematical expressions, in Proc. Document Recognition and Retrieval XVIII, Proc. SPIE, vol. 7874, 2011.
  12. E. Brown, B. Yuan, D. Johnson, and P. Lutz, Covert channels in the HTTP network protocol: Channel characterization and detecting man-in-the-middle attacks, The Journal of Information Warfare, vol. 9, no. 3, pp. 26–38, 2010.
  13. M. Robertson, Y. Pan, and B. Yuan, A social approach to security: Using social networks to help detect malicious web content, in Proc. of the Intern. Conf. on Intelligent Systems and Knowledge Engineering, 2010, pp. 436–441.
  14. C. Forbes, B. Yuan, D. Johnson, and P. Lutz, A covert channel in RTP protocol, in The 9th Intern. FLINS Conf. World Scientific, 2010, pp. 813–819.
  15. K. Stokes, B. Yuan, D. Johnson, and P. Lutz, ICMP covert channel resiliency, in Technological Developments in Networking, Education and Automation, K. Elleithy, et al, Eds. Springer Netherlands, 2010, pp. 503–506.
  16. D. Johnson, P. Lutz, and B. Yuan, Behavior-based covert channel in cyberspace, in Intelligent Decision Making Systems, E. A. Vanhoof, Ed. New Jersey: World Scientific, 2009, pp. 311–318.
  17. E. Golen, B. Yuan, and N. Shenoy, An evolutionary approach to underwater sensor deployment, International Journal of Computational Intelligence Systems, vol. 2, no. 3, pp. 182–201, 2009.
  18. B. Yuan, Secure communications with an asymptotic secrecy model, Knowledge Based Systems, vol. 20, no. 5, pp. 478–484, 2007.
  19. Bo Yuan (袁波) and Peter Lutz. A covert channel in packet switching data networks. In The Second Upstate New York Workshop on Communications and Networking, Rochester, NY, November 2005.
  20. George Klir and Bo Yuan (袁波). Fuzzy Sets and Fuzzy Logic:Theory and Applications. Prentice Hall, Upper Saddle River, NJ, 1995.
  21. George Klir, Ute St.Clair, and Bo Yuan (袁波). Fuzzy Theory and Applications. Prentice Hall, Upper Saddle River, NJ, 1997.
  22. D. Zrilic, J. Rameirez, and Bo Yuan (袁波). Hardware implementation of fuzzy membership functions, operations, and inference. Computer and Electrical Engineering, 20(1):85-105, 2000.
  23. Yin Pan (潘吟) and Bo Yuan (袁波). Bayesian inference of fuzzy probabilities. Intern. J. of General Systems, 26(1-2):73-90, 1997.
  24. D. Zrilic, G. Petrovic, and Bo Yuan (袁波). Simplified realization of delta-sigma decoder. Electronic Letters, 33(18):1515-1516, 1997.
  25. W. Wu (吴望名), H. The, and Bo Yuan (袁波). Reasoning with propositional knowledge based on fuzzy neural logic. Intern. J. Intelligent Systems, 11:251-265, 1996.
  26. W. Wu (吴望名), H. Lui, and Bo Yuan (袁波). Approximate reasoning based on regular inference functions. J. of Fuzzy Mathematics, 4(1):103-118, 1996.
  27. Bo Yuan (袁波), Yin Pan (潘吟), and Wangming Wu (吴望名). On normal form based interval-valued fuzzy sets and their applications to approximate reasoning. Intern. J. of General Systems, 23(3):421-254, 1995.
  28. Bo Yuan (袁波), Yin Pan (潘吟), and Wangming Wu (吴望名). Mp and invariant mp approximations of fuzzy inference rules. Intern. J. of General Systems, 23(2):255-269, 1995.
  29. Yin Pan (潘吟) and Bo Yuan (袁波). Generalized fuzzy method-of-cases. Intern. J. of Approximate Reasoning, 9(2):129-138, 1993.
  30. Bo Yuan (袁波) and George Klir. Intelligent Hybrid Systems: Fuzzy Logic, Neural Networks, and Genetic Algorithms, chapter Data-driven identification of key variables. Kluwer, Boston, 1997.
  31. Bo Yuan (袁波) and D. Zrilic. An intelligent fuzzy control system. In NAFIPS'97, Syracuse University, 1997.
  32. Bo Yuan (袁波) and George Klir. Approximate solutions of systems of fuzzy relation equations. In Proc. of FUZZ-IEEE'94, pages 1452-1457, Orlando, Florida, 1994.
  33. George Klir and Bo Yuan (袁波). On measures of conflict among set-valued statements. In Proc. World Congress on Neural Networks, pages 627-630, Portland, Oregon, July 11-15 1993.
  34. Bo Yuan (袁波) and Wangming Wu (吴望名). Fuzzy ideals on a distributive lattice. Fuzzy Sets and Systems, 35(2):231-240, 1990.


Bo Yuan 2024-02-07