Bo Yuan Headshot

Bo Yuan

Department Chair

Department of Computing Security
Golisano College of Computing and Information Sciences

585-475-4468
Office Location
GCI-1781
Office Mailing Address
152 Lomb Memorial Drive Rochester, NY 14623

Bo Yuan

Department Chair

Department of Computing Security
Golisano College of Computing and Information Sciences

Education

BS, MS, Shanghai Normal University (China); Ph.D., State University of New York at Binghamton

Bio

Bo Yuan is a professor and chair of Computing Security Department at Rochester Institute of Technology. His main interests are in cybersecurity education and research. His research areas are in computational intelligence and its application in cybersecurity. Dr. Yuan is the PI of multiple cybersecurity grants including the five-year, $4 million CyberCorps (R) Scholarship for Service grant funded by National Science Foundation (NSF). He is also the associate director of the Center for Cybersecurity at RIT and has led to RIT's recent successful designation as CAE-CD and CAE-R by NSA. Dr. Yuan is the current chair of IEEE Rochester joint chapters of computer and computational intelligence societies. Before he joined RIT in 2003, Dr. Yuan was a staff scientist at Manning & Napier Information Services for six years. He received a Ph.D. in system science from Binghamton University in 1996.

585-475-4468

Areas of Expertise

Select Scholarship

Published Conference Proceedings
Mosli, Rayan, et al. "A Behavioral-Based Approach for Detecting Malware." Proceedings of the Thirteenth IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, 2017. Ed. Gilbert Peterson and Sujeet Shenoi. Orlando, FL: Springer, 2017. Print.
Mosli, Rayan, et al. "Automated Malware Detection Using Artifacts in Forensic Memory Images." Proceedings of the IEEE Symposium on Technologies for Homeland Security (HST). Ed. IEEE. Waltham, MA: IEEE, 2016. Print.
Huba, William, et al. "Towards A Web Tracking Profiling Algorithm." Proceedings of the IEEE International Conference on Technologies for Homeland Security. Ed. Israel Soibelman. Waltham, MA: n.p., 2013. Print.
Schellenberg, Thomas, Bo Yuan, and Richard Zanibbi. "Layout-based Substitution Tree Indexing and Retrieval for Mathematical Expressions." Proceedings of the Document Recognition and Retrieval XIX. Ed. Christian Viard-Gaudin and Richard Zanibbi. Burlingame, California: Proc. SPIE 8297, 2012. Print.
Huba, William, et al. "A HTTP Cookie Covert Channel." Proceedings of the SIN '11 4th International Conference on Security of Information and Networks, 14-19 November 2011, Sydney, Australia. Ed. Mehmet A. Orgun, et al. New York, NY: ACM, 2011. Print.
Zanibbi, Richard and Bo Yuan. "Keyword and image-based retrieval for mathematical expressions." Proceedings of the Proc. Document Recognition and Retrieval XVIII. Ed. Gady Agam and Christian Viard-Gaudin. San Francisco, CA: SPIE, 2011. Print.
Book Chapter
Pan, Yin, Bo Yuan, and Sumita Mishra. "Network Security Auditing." Network Security, Administration and Management: Advancing Technology and Practice. Ed. Dulal Chandra Kar and Mahbubur Rahman Syed. Hershey: IGI Global, 2011. 131-157. Print.
Journal Paper
Brown, Erik, et al. "Covert Channels in the HTTP Network Protocol: Channel Characterization and Detecting Man-in-the-Middle Attacks." The Journal of Information Warfare 9. 3 (2010): 26-38. Print.

Currently Teaching

CSEC-490
3 Credits
This is a capstone course for students in the information security and forensics program. Students will apply knowledge and skills learned and work on real world projects in various areas of computing security. Projects may require performing security analysis of systems, networks, and software, etc., devising and implementing security solutions in real world applications.
CSEC-759
3 Credits
This course explores current topics in Computing Security. It is intended as a place holder course for faculty to experiment new course offerings in Computing Security undergraduate program. Course specific details change with respect to each specific focal area proposed by faculty.
CSEC-599
1 - 6 Credits
Students will work with a supervising faculty member on a project of mutual interest. Project design and evaluation will be determined through discussion with the supervising faculty member and documented through completion of an independent study form to be filed with the department of computing security.

In the News

  • January 11, 2021

    professor wearing labcoat and examining a grow on a petri dish.

    RIT Sponsored Research garners $82 million

    RIT had its best year ever for sponsored research funding. For fiscal year 2020, which ended June 30, RIT received 382 new awards totaling $82 million. The record funding follows almost $58 million in research expenditures in fiscal year 2019, also a record.

  • July 9, 2019

    Man wearing suit stands in upperlevel lobby.

    RIT’s CyberCorps cybersecurity scholarship program renewed by NSF grant

    RIT will use a $5.5 million federal grant to grow a program that trains the next generation of cybersecurity professionals who will help secure the nation. The National Science Foundation awarded RIT the five-year grant that will renew funding for the CyberCorps: Scholars for Service program.