Bo Yuan Headshot

Bo Yuan

Department Chair
Department of Computing Security
Golisano College of Computing and Information Sciences

Office Location
Office Mailing Address
152 Lomb Memorial Drive Rochester, NY 14623

Bo Yuan

Department Chair
Department of Computing Security
Golisano College of Computing and Information Sciences


BS, MS, Shanghai Normal University (China); Ph.D., State University of New York at Binghamton


Bo Yuan is a professor and chair of Computing Security Department at Rochester Institute of Technology. His main interests are in cybersecurity education and research. His research areas are in computational intelligence and its application in cybersecurity. Dr. Yuan is the PI of multiple cybersecurity grants including the five-year, $4 million CyberCorps (R) Scholarship for Service grant funded by National Science Foundation (NSF). He is also the associate director of the Center for Cybersecurity at RIT and has led to RIT's recent successful designation as CAE-CD and CAE-R by NSA. Dr. Yuan is the current chair of IEEE Rochester joint chapters of computer and computational intelligence societies. Before he joined RIT in 2003, Dr. Yuan was a staff scientist at Manning & Napier Information Services for six years. He received a Ph.D. in system science from Binghamton University in 1996.


Areas of Expertise

Currently Teaching

0 Credits
Students will gain experience and a better understanding of the application of technologies discussed in classes by working in the field of computing security. Students will be evaluated by their employer. If a transfer student, they must have completed one term in residence at RIT and be carrying a full academic load.
3 Credits
This course offers an opportunity to learn about a specific seminar topic in more depth. The course description will be replaced by the specific instance of the seminar, as it is proposed by faculty.
0 - 3 Credits
This course explores current topics in computing security. It is intended as a place holder course for faculty to experiment new course offerings in Computing Security undergraduate program. Course specific details change with respect to each specific focal area proposed by faculty.
1 - 3 Credits
A student works with a faculty member to devise a plan of study on a topic in various areas of computing security. Deliverables, evaluation methods, and number of credits need to be specified in a written proposal. A final report and presentation in the form of a poster session is expected and graded at the end of the term.

Latest News

  • August 6, 2019

    Artist rendering of glass building.

    Global Cybersecurity Institute to open in 2020

    Cybercrime is costing the world trillions of dollars, and analysts say that there aren’t enough qualified professionals to prevent those attacks. To address this problem, RIT is creating the Global Cybersecurity Institute (GCI), aimed at meeting the demand for computing security and artificial intelligence professionals, while developing future technologies, protocols and human understanding needed to address the global cybersecurity crisis.

  • July 9, 2019

    Man wearing suit stands in upperlevel lobby.

    RIT’s CyberCorps cybersecurity scholarship program renewed by NSF grant

    RIT will use a $5.5 million federal grant to grow a program that trains the next generation of cybersecurity professionals who will help secure the nation. The National Science Foundation awarded RIT the five-year grant that will renew funding for the CyberCorps: Scholars for Service program.

Select Scholarship

Published Conference Proceedings
Mosli, Rayan, et al. "A Behavioral-Based Approach for Detecting Malware." Proceedings of the the Thirteenth IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, 2017. Ed. Gilbert Peterson and Sujeet Shenoi. Orlando, FL: Springer, 2017. Print.
Mosli, Rayan, et al. "Automated Malware Detection Using Artifacts in Forensic Memory Images." Proceedings of the IEEE Symposium on Technologies for Homeland Security (HST). Ed. IEEE. Waltham, MA: IEEE, 2016. Print.
Huba, William, et al. "Towards A Web Tracking Profiling Algorithm." Proceedings of the IEEE International Conference on Technologies for Homeland Security. Ed. Israel Soibelman. Waltham, MA: n.p., 2013. Print.
Schellenberg, Thomas, Bo Yuan, and Richard Zanibbi. "Layout-based Substitution Tree Indexing and Retrieval for Mathematical Expressions." Proceedings of the Document Recognition and Retrieval XIX. Ed. Christian Viard-Gaudin and Richard Zanibbi. Burlingame, California: Proc. SPIE 8297, 2012. Print.
Huba, William, et al. "A HTTP Cookie Covert Channel." Proceedings of the SIN '11 4th International Conference on Security of Information and Networks, 14-19 November 2011, Sydney, Australia. Ed. Mehmet A. Orgun, et al. New York, NY: ACM, 2011. Print.
Zanibbi, Richard and Bo Yuan. "Keyword and image-based retrieval for mathematical expressions." Proceedings of the Proc. Document Recognition and Retrieval XVIII. Ed. Gady Agam and Christian Viard-Gaudin. San Francisco, CA: SPIE, 2011. Print.
Journal Paper
Brown, Erik, et al. "Covert Channels in the HTTP Network Protocol: Channel Characterization and Detecting Man-in-the-Middle Attacks." The Journal of Information Warfare 9. 3 (2010): 26-38. Print.
Book Chapter
Pan, Yin, Bo Yuan, and Sumita Mishra. "Network Security Auditing." Network Security, Administration and Management: Advancing Technology and Practice. Ed. Dulal Chandra Kar and Mahbubur Rahman Syed. Hershey: IGI Global, 2011. 131-157. Print.