Shanchieh Yang Headshot

Shanchieh Yang

Department Head
Department of Computer Engineering
Kate Gleason College of Engineering

585-475-6434
Office Location
Office Mailing Address
GLE-3475

Shanchieh Yang

Department Head
Department of Computer Engineering
Kate Gleason College of Engineering

Education

BS, National Chiao-Tung University (Taiwan); MS, Ph.D., University of Texas at Austin

Bio

Dr. S. Jay Yang received his BS degree in Electronics Engineering from National Chaio-Tung University in Taiwan in 1995, and MS and Ph.D. degrees in Electrical and Computer Engineering from the University of Texas at Austin in 1998 and 2001, respectively. He is currently a Professor and the Department Head for the Department of Computer Engineering at Rochester Institute of Technology. He also serves as the Director of Global Outreach in the Center of Cybersecurity at RIT, and a Co-Director of the Networking and Information Processing (NetIP) Laboratory. His research group has developed several pioneering machine learning, attack modeling, and simulation systems to provide predictive analysis of cyberattacks, enabling anticipatory or proactive cyber defense. His earlier works included FuSIA, VTAC, ViSAw, F-VLMM, and attack obfuscation modeling. More recently, his team is developing a holistic body of work that encompasses ASSERT to provide timely separation and prediction of critical attack behaviors, CASCASE to simulate synthetic cyberattack scenarios that integrates data-driven and theoretically grounded understanding of adversary behaviors, and CAPTURE to forecast cyberattacks before they happen using unconventional signals in the public domain. Dr. Yang has published more than sixty papers and worked on eighteen sponsored research projects. He has served on organizing committees for several conferences and as a guest editor and a reviewer for a number of journals and textbooks. He was invited as a keynote or panel speaker for several venues. He was a recipient of Norman A. Miles Outstanding Teaching Awards, and a key contributor to the development of two Ph.D. programs at RIT and several global partnership programs. 

Currently Teaching

CMPE-792
1 - 3 Credits
Graduate Project is a scholarly undertaking that addresses an immediate and practical problem with tangible outcomes. A formal report, presentation, or demonstration is required. The student must obtain the approval of an appropriate faculty adviser to guide the project before registering.
CMPE-799
1 - 3 Credits
Allows graduate students an opportunity to independently investigate, under faculty supervision, aspects of the field of computer engineering that are not sufficiently covered in existing courses. Proposals for independent study activities are subject to approval by both the faculty member supervising the independent study and the department head.
CMPE-790
1 - 9 Credits
Thesis research investigates an independent problem to demonstrate professional maturity. A formal written thesis and an oral defense are required. The student must obtain the approval of an appropriate faculty adviser to guide the thesis before registering.
CMPE-699
0 Credits
Graduate co-op aims to enhance the educational experience of graduate students through full-time paid employment during an academic quarter at positions in the Computer Engineering field. Registration is optional and is recommended for summer term only after the completion of all course work.
CMPE-599
1 - 4 Credits
Allows upper-level undergraduate students an opportunity to independently investigate, under faculty supervision, aspects of the field of computer engineering that are not sufficiently covered in existing courses. Proposals for independent study activities must be approved by both the faculty member supervising the independent study and the department head.
CMPE-499
0 Credits
After completing Co-op Seminar (EGEN-099) or Co-op Workshop as well as meeting Co-op enrollment requirements, Computer Engineering students should register for CMPE-499 for each term of full-time, paid employment in the Computer Engineering field. Students who take on Spring-Summer or Summer-Fall Co-ops must register for both the semester term and the summer term. Students must obtain permission from the Computer Engineering office for any exception to the assigned Co-op blocks.

Select Scholarship

Journal Paper
Moskal, Stephen, Shanchieh Jay Yang, and Michael Kuhl. "Cyber Threat Assessments via Attack Scenario Simulation over Integrated Adversary and Network Models." Journal of Defense Modeling and Simulation 15. 1 (2018): 13-29. Print.
Published Conference Proceedings
Chan, Neil Wong Hon and Shanchieh Jay Yang. "SCANNER: Sequence Clustering of Android Resource Accesses." Proceedings of the IEEE Conference on Dependable and Secure Computing. Ed. IEEE. Taipei, Taiwan: IEEE, 2017. Print.
Cui, Biru, Shanchieh Jay Yang, and Chris Homan. "Modeling Information Sharing Behavior on Q&A Forums." Proceedings of the The Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD). Ed. ACM. Jeju, South Korea: ACM, 2017. Print.
Werner, Gordon, Shanchieh Jay Yang, and Katie McConky. "Time Series Forecasting of Cyber Attack Intensity." Proceedings of the The 12th Annual Conference on Cyber and Information Security Research. Ed. ACM. Oak Ridge, TN: ACM, 2017. Print.
Okutan, Ahmet, Shanchieh Jay Yang, and Katie McConky. "Predicting Cyber Attacks with Bayesian Networks Using Unconventional Signals." Proceedings of the The 12th Annual Conference on Cyber and Information Security Research. Ed. ACM. Oak Ridge, TN: ACM, 2017. Print.
Krall, Alex, et al. "Estimating the Likelihood of Cyber Attack Penetration using Rare-Event Simulation." Proceedings of the IEEE Symposium Series on Computational Intelligence. Athens, Greece: IEEE, 2016. Print.
Zhao, L., et al. "Privacy Sensitive Resource Access Monitoring for Android Systems." Proceedings of the The 5th International Workshop on Privacy, Security and Trust in Mobile and Wireless Systems (MobiPST 2015), in conjunction with IEEE ICCCN 2015, August 3-6, 2015, Las Vegas, Nevada, USA. Ed. NA. Piscataway, New Jersey: IEEE, Web.
Cui, Biru, Shanchieh Jay Yang, and Chris Homan. "Non-independent Cascade Formation: Temporal and Spatial Effects (Short Paper)." Proceedings of the ACM International Conference on Information and Knowledge Management (CIKM14). Ed. Unknown. Shanghai, China: ACM, 2014. Print.
Cui, Biru and Shanchieh Jay Yang. "NRE: Suppress Selective Forwarding Attacks in Wireless Sensor Networks." Proceedings of the IEEE Conference on Communications and Network Security (CNS14). Ed. Unknown. San Francisco, CA: IEEE, 2014. Print.
Moskal, Steven, et al. "Context Model Fusion for Multistage Network Attack Simulation." Proceedings of the IEEE Military Communications Conference (MILCOM14). Ed. Unknown. Baltimore, MD: IEEE, 2014. Print.
Du, Haitao and Shanchieh Jay Yang. "Probabilistic Inference for Obfuscated Network Attack Sequences." Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN14). Ed. Unknown. Atlanta, GA: IEEE, 2014. Print.
Strapp, Steven and Shanchieh Jay Yang. "Segmenting Large-scale Cyber Attacks for Online Behavior Model Generation." Proceedings of the 2014 International Conference on Social Computing, Behavioral-Cultural Modeling, & Prediction (SBP14). Ed. William G. Kennedy, Nitin Agarwal, and Shanchieh Jay Yang. Washington, DC: Springer, 2014. Print.
Cui, Biru and Shanchieh Jay Yang. "Who Will Follow a New Topic Tomorrow?" Proceedings of the 2014 International Conference on Social Computing, Behavioral-Cultural Modeling, & Prediction (SBP14). Ed. William G. Kennedy, Nitin Agarwal, and Shanchieh Jay Yang. Washington, DC: Springer, 2014. Print.
Moskal, Stephen, et al. "Simulating Attack Behaviors in Enterprise Networks." Proceedings of the IEEE Communications and Network Security. Ed. Wenjing Lou and Wade Trappe. Washington, DC: IEEE, 2013. Web.
Cui, Biru, Shanchieh Jay Yang, and Ivan Kadar. "Influence versus Intent for Predictive Analytics in Situation Awareness." Proceedings of the SPIE Symposium on Defense, Security and Sensing, Vol. 8745. Ed. Ivan Kadar. Baltimore, MD: SPIE, 2013. Print.
Du, Haitao and Shanchieh Jay Yang. "Sequential Modeling for Obfuscated Network Attack Action Sequences." Proceedings of the IEEE Communications and Network Security. Ed. Wenjing Lou and Wade Trappe. Washington, DC: IEEE, 2013. Web.
Cheng, R.G., et al. "Design and Implementation of a Skype Protocol Analyzer." Proceedings of the IEEE Communications and Network Security. Ed. Wenjing Lou and Wade Trappe. Washington, DC: IEEE, 2013. Web.
Blasch, Erik P., et al. "Summary of Human Social, Cultural, Behavioral (HSCB) Modeling for Information Fusion Panel Discussion." Proceedings of the SPIE Symposium on Defense, Security and Sensing, Vol. 8745. Ed. Ivan Kadar. Baltimore, MD: SPIE, 2013. Print.
Du, Haitao and Shanchieh Jay Yang. "Characterizing Transition Behaviors in Internet Attack Sequences." Proceedings of the IEEE International Conference on Computer Communication Networks, Maui, HI USA, August 1-4, 2011. Ed. George Rouskas and Xiaobo Zhou. Red Hook, NY: IEEE, Print.
Tong, Khiem, et al. "Optimizing Collection Requirements Through Analysis of Plausible Impact." Proceedings of the ISIF/IEEE International Conference on Information Fusion, July 5-8, 2011, Chicago IL, USA,. Ed. Lance Kaplan and Neil Gordon. Chicago, IL: IEEE, Web.
Du, Haitao and Shanchieh Jay Yang. "Discovering Collaborative Cyber Attack Patterns Using Social Network Analysis." Proceedings of the 2011 International Conference on Social Computing, Behavioral-Cultural Modeling, & Prediction (SBP11), Mach 29-31, College Park, MD. Ed. John Salerno, et al. USA: Springer LNCS, Print.
Peer Reviewed/Juried Poster Presentation
Yang, Shanchieh. "Towards Automatic Extraction and Synthesis of Cyber Attack Behavior Models." Proceedings of the USENIX Security. Austin, TX: USENIX.
Yang, Shanchieh, et al. "CASCADES: Modeling and Simulation of Cyber Attacker Behaviors for Network Threat Analysis." Proceedings of the 2016 Annual Computer Security Applications Conference (ACSAC). Ed. N/A. Los Angeles, CA: n.p..
Yang, Shanchieh and Neil Wong Hon Chan. "SCANNER: Sequence Clustering of Android Resource Accesses." Proceedings of the 2016 Annual Computer Security Applications Conference (ACSAC). Los Angeles, CA: n.p..
Book Chapter
Holsopple, Jared, S. J. Yang, and M. Sudit. "Mission Impact Assessment for Cyber Warfare." Intelligent Methods for Cyber Warfare. Ed. R. R. Yager, M. Z. Reformat, and N. Alajlan. NA, Switzerland: Springer International Publishing, 2015. 239-266. Print.
Du, Haito, et al. "Cyber Insider Mission Detection for Situation Awareness." Intelligent Methods for Cyber Warfare. Ed. R. R. Yager, M. Z. Reformat, and N. Alajlan. NA, Switzerland: Springer International Publishing, 2015. 201-218. Print.
Yang, Shanchieh Jay, et al. "Attack Projection for Predictive Cyber Situation Awareness." Cyber Defense and Situational Awareness Advances in Information Security Volume 62. Ed. Alexander Kott, Cliff Wang, and Robert F. Erbacher. Unknown, Switzerland: Springer, 2014. 239-261. Print.
Holsopple, Jared, Shanchieh Jay Yang, and Moises Sudit. "Top-down Driven Cyber Impact Assessment." Cyber Defense and Situational Awareness Advances in Information Security Volume 62. Ed. Alexander Kott, Cliff Wang, and Robert F. Erbacher. Unknown, Switzerland: Springer, 2014. 219-238. Print.
Du, Haitao and Shanchieh Jay Yang. "Temporal and Spatial Analyses of Large Scale Cyber Attacks." Handbook of Computational Approaches to Counterterrorism. Ed. V.S. Subrahmanian. New York, NY: Springer, 2013. 559-578. Print.
Invited Keynote/Presentation
Yang, Shanchieh Jay. "Characterizing Attack Behavior for Cyber Situation Awareness." International Conference on Cyber Security. Fordham University and FBI. New York, NY. 10 Jan. 2012. Conference Presentation.
Yang, Shanchieh Jay. "Characterizing Large-scale Attack Behavior for Predictive Cyber Situation Awareness." SPIE Defense, Security, and Sensing Symposium. SPIE. Baltimore, MD. 25 Apr. 2012. Conference Presentation.
Yang, Shanchieh Jay. "Characterizing Attack Behavior for Cyber Situation Awareness." Invited Seminar. SUNY Binghamton. SUNY Binghamton, Binghamton, NY. 29 Nov. 2011. Guest Lecture.
Yang, Shanchieh Jay. "Cyber Situation Awareness and Threat Anticipation." Taiwan. National Taiwan University. NTU campus, Taipei, Taiwan. 20 Jan. 2011. Guest Lecture.
Yang, Shanchieh Jay. "Characterizing Hacker Behavior for Cyber Situation Awareness." The 11th Emerging Information and Technology Conference, July 28-29, Chicago IL. EITC. Chicago, Chicago, IL. 28 Aug. 2011. Conference Presentation.
Published Article
Holsopple, Jared, Michael Nusinov, Daniel Liu, Haitao Du, Shanchieh Yang, and Moises Sudit.“Enhancing Situation Awareness via Automated Situation Assessment.” IEEECommunication Magazine, 48.3 (2010): 146-152. Web. † *
Du, Haitao, Daniel Liu, Jared Holsopple, and Shanchieh Yang. “Toward Ensemble Characterization and Projection of Multistage Cyber Attacks.” Proceedings of 19th International Conferenceon Computer Communications and Networks(IEEE ICCCN), 2-5 Aug. 2010. n.p. Print. † *