Section Menu

 

RESEARCH INTERESTS

Computer security

  • Mobile Security

  • Intrusion Detection based on Bayesian Network

  • Reputation-based Wireless Routing

  • Fine-grained access control to heterogeneous database

Software design and engineering

  • Software architecture modeling and verification

Databases management

  • Adaptive mediation technique among heterogeneous databases

Web Analysis and Mining

  • Discover latent web topics

  • Social networks

 

EDUCATION

  • Ph.D. Computer Science, Florida International University, 2005

  • M.S. Computer Science, Florida International University, 2003

GRANTS

  • NIH, National Institute of Biomedical Imaging and Bioengineering, mStroke: Mobile Technology for Post-stroke Recurrence Prevention and Recovery (with Mina Sartipi as PI, and Nancy Fell), awarded, 2014/05-2017/04. 

  • NSF SaTC, EDU: Collaborative: Bolstering Security Education through Transiting Research into Browser Security (with Wenliang Du at Syracuse University as lead-PI and Xiaohong Yuan at NC A&T SU as PI), #1318439, PI, $119,869, awarded, 2013/09 - 2015/08. 

  • NSF S-STEM, Making Opportunities for Computer Science and Computer Engineering Students (MOCS) (with Joseph Kizza, Jack Thompson, Kathy Winters, Mina Sartipi), #1259873, PI, $585,020, awarded, 2013-2018.

  • Bioinformatics analysis of human genes associated with diseases at higher rates in African Americans (DHRAAs), Tennessee Higher Education Commission's Center of Excellence in Applied Computational Science and Engineering, PI, awarded, 2013-2014.

  • NSF SFS, Capacity Building in Mobile Security Through Curriculum and Faculty Development (with Joseph Kizza, Kai Qian, Prabir Bhattacharya and Fan Wu), #1241651, Lead-PI, $209,981, awarded, 2012-2015. 

  • NSF SFS, Collaborative Project: Developing Faculty Expertise in Information Assurance through Case Studies and Hands-on Experiences (with Xiaohong Yuan from NC A&T SU, Bill Chu from UNC Charlotte, Joseph Kizza and Kathy Winters from UTC), #1129444, PI, $100,000, awarded, 2011-2013. 

  • A Novel Authentication Framework in Mobile Devices, Tennessee Higher Education Commission's Center of Excellence in Applied Computational Science and Engineering, PI, awarded, 2012-2013.

  • NSF CCLI Type 1, Collaborative Project: Teaching Cryptography through Hand-on Learning and Case Studies, #0942581, Lead-PI, $99,984, awarded, 2010-2013.Resources.

  • Collaborative Research Experience for Undergraduates (CREU) (with Hong Qin at Spelman College), $33,500, awarded, 2010-2011.

  • Detecting Intrusions through Fusion of Program Behavior and Attacker Behavior, Oak Ridge National Laboratory, PI, awarded, 2009.

  • Emerging Infectious Disease: A Computational Multi-agent Model, Tennessee Higher Education Commission's Center of Excellence in Applied Computational Science and Engineering, PI, awarded, 2009 - 2010.

  • Department of Defense (DoD) IASP Scholarship grant (with Joseph Kizza, Kathy Winters), 2008-2010, awarded.

  • Sustainable and Scalable Wireless Sensor Network to Monitor Chemical Concentration, Odor Wheeler Foundation (with Mina Sartipi, Joseph Kizza), awarded, 2008-2009.

  • Faculty Summer Fellowship, University of Tennessee at Chattanooga, awarded, 2008.

  • Faculty Development Grant, University of Tennessee at Chattanooga, awarded, 2008.

  • A secure and reliable wireless ad-hoc network in disaster management, Tennessee Higher Education Commission's Center of Excellence in Applied Computational Science and Engineering under grants (with Joseph Kizza). PI, awarded, 2007-2008.

  • Lab Support for Undergraduate and Graduate Courses in Information Assurance, Instructional Excellence from University of Tennessee at Chattanooga (UTC), awarded, 2006-2007.

  • Faculty Development Grant at University of Tennessee at Chattanooga (UTC), awarded, 2006.

  • Information Communications Mediator Model in Disaster Management, Tennessee Higher Education Commission's Center of Excellence in Applied Computational Science and Engineering under grants (with Joseph Kizza), R04-1302-005, PI, awarded, 2006-2007.

  • Instructional Excellence at University of Tennessee at Chattanooga (UTC), awarded, 2005.

  • Travel Grant from Graduate Student Association in Florida International University (FIU), Miami, FL, awarded, 2004.

AWARDS AND HONORS

  • Research Award from the College of Engineering and Computer Science , University of Tennessee at Chattanooga (UTC), TN, 2007, 2010, 2011, 2012.

  • Exceptional Merit Faculty, University of Tennessee at Chattanooga, TN, 2006, 2007, 2008, 2009, 2010, 2011, 2012.
  • Excellent PhD. graduate student awards in SCS, FIU, Miami, FL, 2004 - 2005

PUBLICATIONS (selected)

Books

 Journals and Book Chapters

  • Prabir Bhattacharya, Li Yang, Minzhe Guo, Kai Qian, Ming Yang, Learning Mobile Security with Labware, Education column, IEEE Security and Privacy Magazine: Vol 12 No. 1, 2014. 

  • Wu He, Xiaohong Yuan, Li Yang, Supporting Case-based Learning in Information Security with Web-based Technology, Journal of Information Systems Education (JISE) Special Issue: Global Information Security and Assurance, Volume 24, Number 1, Spring 2013.

  • Joseph Kizza, Li Yang, Social History of Computing and Online Social Communities, the Encyclopedia of Social Network Analysis and Mining (ESNAM), 2013.

  • Joseph Kizza, Li Yang, Is the Cloud the Future of Computing?, a book chapter in "Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments", 2013.

  • Harkeerat Bedi, Li Yang, A Resilient Fair Electronic Contract Signing Protocol, Chapter 17, Security and Privacy Assurance in Advancing Technologies: New Developments, 2010. 
  • Li Yang, Managing Secure Database Systems, a book chapter in Readings and cases in information security: law and ethics, Whitman, M.E. & Mattord, H. J.,(editors), Course Technology, Cengage Learning, ISBN 1-435-44157-5, 2011. 

  • Ran Tao, Li Yang, et al., A Host-Based Intrusion Detection System Using Architectural Features to Improve Sophisticated Denial-of-Service Attack Detections,International Journal of Information Security and Privacy, 2010.

  • Li Yang, Alma Cemerlic,  Xiaohui Cui.  A fine-grained reputation system for reliable routing in wireless ad hoc network, Journal of Security and Communication Network, 2010.

  • L. Peng, L. Yang and B. Ramadass, Architectural Support for Enhancing Critical Secrets Protection in Chip-Multiprocessors,  a book chapter in Pervasive Information Security and Privacy Developments: Trends and Advancements, June 2010.  

  •  Raimund Ege, Li Yang, Richard Whitaker, Rewards and Risks in P2P Content Delivery, International Journal On Advances in Systems and Measurements, vol. 2, no. 2&3, pages 168-177, ISSN: 1942-261x, 2009.

  • Li Yang, Cryptographical Issues in Information Security and Privacy, Guest Editorial Preface, International Journal of Information Security and Privacy, Vol. 3, No. 3, ISSN: 1930-165-0, 2009.

  • Harkeerat Bedi, Li Yang, Fair Electronic Exchange Based on Fingerprint Biometrics, International Journal of Information Security and Privacy, Vol. 3, No. 3, pages 76-106, ISSN: 1930-165-0, 2009.

  • Li Yang, Lu Peng, and Balachandran Ramadass, SecCMP: Enhancing Critical Secrets Protection in Chip-Multiprocessors, International Journal of Information Security and Privacy, Volume 2, Issue 4, pp. 54-66, October-December 2008. 

  • Li Yang, Chang Phuong, Andy Novobilski, and Raimund Ege, Trust-based Usage Control in Collaborative Environment, International Journal of Information Security and Privacy, Volume 2, Issue 2, pp. 31-45, April-June 2008.

  • Li Yang, Raimund Ege, Lin Luo, Aspect-Oriented Analysis of Security in Object-Oriented Distributed Virtual Environments, Handbook of Research on Information Assurance and Security, Information Science Reference, ISBN: 978-1-59904-855-0, 2008.

  • Li Yang, Raimund K. Ege, Security Enforced Mediation Systems for Data Integration, INFOCOMP Journal, ISSN: 1807-4545, pages 1-10, March, 2006.

 Conference Proceedings 

  • Wenliang Du, Li Yang, Joseph Kizza, Xiaohong Yuan, New Hands-on Labs on Browser Security, poster SIGCSE 2014, Atlanta, GA. 

  • Xiaohong Yuan, Kenneth Williams, Huiming Yu, Bei-Tseng Chu, Audrey Rorer, Li Yang, Kathy Winters, Joseph Kizza, Developing Faculty Expertise in Information Assurance through Case Studies and Hands-on Experiences, the Proceedings of the 48th the Hawaii International Conference on System Sciences (HICSS), January 2014.  

  • Minzhe Guo, Prabir Bhattacharya, Kai Qian and Li Yang, WIP: Authentic Learning of Mobile Security with Case Studies, Frontiers in Education Conference (FIE), October 2013.

  • Li Yang and Xumin Liu, Work in Progress: Teaching Business Analytics, Frontiers in Education Conference (FIE), October 2013.

  • Minzhe Guo, Kai Qian, Ming Yang, KuoSheng Ma, Liang Hong, Li Yang, Android-Based Mobile Sensory System Labware for Embedded System Education, IEEE International Conference on Advanced Learning Technologies (ICALT), Beijing, China, July 2013.

  • Ming Yang, Kai Qian, Minzhe Guo, Prabir BhattacharyaGuillermo Francia, Li Yang, Enhance Computer Networks Learning with Hands-on Mobile Device Based Labware,Proceedings of the ACM Technical Symposium on Computer Science Education (SIGCSE), March 2013.

  • Minzhe GuoPrabir Bhattacharya, Ming Yang, Kai Qian, Li Yang, Learning Mobile Security with Android Security Labware, Proceedings of the ACM Technical Symposium on Computer Science Education (SIGCSE), March 2013.

  • David Schwab, Li Yang, User and Device Authentication in a Mobile Cloud Environment, The Proceedings of Cyber Security and Information Intelligence Research Workshop, ACM Digital Library, Oak Ridge, TN, January, 2013.

  • Wade Gasior and Li Yang, Exploring Covert Channel in Android Platform, Cyber Security Conference, Washington D.C., pages 516-520, December, 2012. 

  • Hong Qin, Alexander Shapiro, and Li Yang, Emerging Infectious Disease: A Computational Multi-agent Model, BioMedCom Conference, Washington D.C., pages 583-588, December, 2012. 

  • Kai Qian, Prabir Bhattacharya, Minzhe Guo, Li Yang, Work in Progress: Real World Relevant Security Labware for Mobile Threat Analysis and Protection Experience, Frontier in Education, Seattle, WA, November, 2012.

  • Li Yang, Joseph Kizza, Andy Wang, C. H. Chen, Teaching Cryptography Using Hands-on Labs, poster, The 43rd ACM Technical Symposium on Computer Science Education (SIGCSE), Raleigh, NC, March, 2012. 

  • Wade Gasior, Li Yang, Covert Channel in Smart Phones, Work in Progress (WiP), The 27th Annual Computer Security Applications Conference (ACSAC), Orlando, FL, December, 2011.

  • Rajeshwar Katipally, Li Yang, Anyi Liu, Attacker Behavior Analysis in Multi-stage Attack Detection, the Proceedings of Cyber Security and Information Intelligence Research Workshop, ACM Digital Library, Oak Ridge, TN October, 2011.

  • Wade Gasior, Li Yang, Network Covert Channels on the Android Platform, the Proceedings of Cyber Security and Information Intelligence Research Workshop, ACM Digital Library, Oak Ridge, TN October, 2011.

  • Li Yang, Mina Sartipi, Matt McNeely, Usable Protection to Healthcare Application, the Proceedings of Cyber Security and Information Intelligence Research Workshop, ACM Digital Library, Oak Ridge, TN October, 2011.

  • Swetha Dasireddy, Wade Gasior, Xiaohui Cui and Li Yang, Visualization and Clustering in Network-based Intrusion Detection, the Proceedings of Cyber Security and Information Intelligence Research Workshop, ACM Digital Library, Oak Ridge, TN 2010.

  • Rajeshwar Katipally, Wade Gasior, Xiaohui Cui and Li Yang, Multi stage attack Detection system for Network Administrators using Data Mining, the Proceedings of Cyber Security and Information Intelligence Research Workshop, ACM Digital Library, Oak Ridge, TN 2010.

  • Kai Qian, Li Yang, Innovative CS Capstone Project For Green Smart Computing With WSN In A Box, The 10th IEEE International Conference on Advanced Learning Technologies,  2010.

  • Li Yang, Wade Gasior, Woodlyn Madden, Mark Hairr, Ronald Bailey, Electronic Vehicle Simulation and Animation, 51st Annual Transportation Forum, March 2010.

  • Harkeerate Bedi, Li Yang, Joseph Kizza, Biometrics based Fair Electronic Exchange, the Proceedings of Cyber Security and Information Intelligence Research Workshop, ACM Digital Library, Oak Ridge, TN 2009.

  • Li Yang, Alma Cemerlic, Integrating Dirichlet Reputation into Usage Control, the Proceedings of Cyber Security and Information Intelligence Research Workshop, ACM Digital Library, Oak Ridge, TN 2009.

  • Li Yang, Feiqiong Liu, Joseph M. Kizza, Raimund K. Ege. Discovering Latent Topics from Dark Websites, IEEE Symposium on Computational Intelligence in Cyber Security, IEEE Xplore, April 2009. 

  • Ran Tao, Li Yang, Lu Peng, Bin Li, Alma Cemerlic. DoS Network Intrusion Detection through Multi-layer Features, IEEE Symposium on Computational Intelligence in Cyber Security, IEEE Xplore, April 2009. 

  • Raimund K. Ege, Li Yang, and Richard Whittaker, Extracting Value from P2P Content Delivery, Proceedings of The Fourth International Conference on Systems and Networks Communications (ICSNC), IEEE Xplore, France, March 2009.

  • Li Yang, Teaching Database Security and Auditing, Proceedings of the 40th ACM Technical Symposium on Computer Science Education (SIGCSE), Chattanooga TN, March 2009.

  • Alma Cemerlic, Li Yang, Joseph M. Kizza, Network Intrusion Detection Based on Bayesian Networks, Proceedings of Software Engineering and Knowledge Engineering (SEKE08), July 2008.

  • Li Yang, Raimund Ege, Integrating Trust Management into Usage Control in P2P Multimedia Delivery, Proceedings of Software Engineering and Knowledge Engineering (SEKE08), July 2008.

  •  Hong Qin, Li Yang, Detection of changes in transitive associations by shortest-path analysis of protein interaction networks integrated with gene expression profiles, The International Conference on BioMedical Engineering and Informatics (BMEI), IEEE publisher, Hainan, China, May, 2008.

  • Li Yang, Kathy Winters, Joseph M. Kizza, Biometrics Education with Hands-on Labs, Proceedings of the 46th annual southeast regional conference, ACM Digital Library, March, 2008.

  • Raimund Ege, Li Yang, Secure P2P Delivery of Multimedia, Proceedings of International Conference Telecommunications, Networks and Systems (TNS) from International Association for Development of the Information Society (IADIS), Lisbon, Portugal, July 2007.

  • Li Yang, Joseph M. Kizza, Alma Cemerlic, Feiqiong Liu, Fine-Grained Reputation-based Routing in Wireless Ad Hoc Networks, Proceedings of IEEE International Conference on Intelligence and Security Informatics, New Brunswick, NY, May 2007.

  • Li Yang, Lu Peng, SecCMP: A Secure Chip-Multiprocessor Architecture,  Proceedings of Workshop on Architectural and System Support for Improving Software Dependability (ASID), in conjunction with International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), ACM digital library, pages 72-76, San Jose, CA, October 2006.

  • Joseph M. Kizza, Li Yang, Andy Novobilski, Kathy Winters, Total Municipal Awareness Systems (TMAS) Capstone Project. Proceedings of Frontiers in Education, Worldcomp, June 26-29, 2006.

  • Li Yang, Joseph M. Kizza, Raimund K. Ege, Malek Adjouadi, A Relationship-based Flexible Authorization Framework for Mediation Systems, Proceedings of Software Engineering and Knowledge Engineering (SEKE), pages 381-385, San Francisco, CA, July, 2006.

  • Li Yang, Raimund K. Ege, Dynamic Integration Strategy for Mediation Framework. Proceedings of International Conference on Software Engineering and Knowledge Engineering (SEKE'05), Taipei, Taiwan, Republic of China, 2005.

  • Li Yang, Raimund K. Ege and Huiqun Yu, Modeling and Verifying Mediation Framework. Proceedings of The 10th IEEE International Conference on the Engineering of Complex Computer Systems (ICECCS), Shanghai, China, 2005.

  • Li Yang, Raimund K. Ege, and Huiqun Yu. Security specification and enforcement in heterogeneous databases. Proceedings of The 20th Annual ACM Symposium on Applied Computing (SAC'05), Computer Security Track, Santa Fe, New Mexico, March, 2005.

  • Li Yang and Raimund K. Ege.  A role-based access control model for information mediation, Proceedings of The 2004 IEEE International Conference on Information Reuse and Integration (IEEE IRI), Las Vegas, NV, pages 277-282, 2004.

  • Onyeka Ezenwoye, Raimund K. Ege, Li Yang, and Qasem Kharma.  A mediation framework for multimedia delivery. Proceedings of Third International Conference on Mobile and Ubiquitous Multimedia (MUM'04), ACM Digital Library, College Park, Maryland, October 2004.

  • Li Yang, Raimund K. Ege, and Huiqun Yu. Enhancing mediation security by aspect-oriented approach. Proceedings of Software Engineering and Knowledge Engineering (SEKE), Banff, Alberta, Canada, pages 155-160, June 2004.

  • Raimund K. Ege, Li Yang, Qasem Kharma, and Xudong Ni. Three-layered mediator architecture based on DHT. Proceedings of International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN), IEEE Computer Society Press, Hong Kong, May 2004.

  • Li Yang and Raimund K. Ege. Modeling and verification of real-time mediation systems. Proceedings of Advanced Simulation Technologies Conference (ASTC), Arlington, Virginia, pages 61-68, April 2004.

Abstract

  • Alma Cemerlic, Li Yang, Network Intrusion Detection Using Bayesian Network, ACM Middle-Southeast Conference, first-place of master student paper awards, Gatlinburg, TN, November, 2007.

  • Feiqiong Liu, Li Yang, LDA-based Dark Web Analysis, ACM Middle-Southeast Conference, Gatlinburg, TN, November, 2007.

  • Li Yang, Joseph M. Kizza, Raimund K. Ege, A Flexible Context-Aware Authorization Framework for Mediation Systems, Proceedings of IEEE Intelligence and Security Informatics Conference, San Diego, CA, pages 684-685, Lecture Notes in Computer Science, May, 2006.

  • Alma Cemerlic, Li Yang, Trust-based Routing in Wireless Ad-hoc Networks, Proceedings of ACM Middle-Southeast Conference, Second-place of master student paper awards, Gatlinburg, TN, November, 2006.

  • Li Yang, Raimund K. Ege, and Huiqun Yu. Mediation framework modeling and verification. Proceedings of The 20th Annual ACM Symposium on Applied Computing (SAC), Software Engineering Track, Santa Fe, New Mexico, March, 2005.

NSF Showcases

Capacity Building in Mobile Security Through Curriculum and Faculty Development, SIGCSE, 2014
Developing Faculty Expertise in Information Assurance through Case Studies and Hands-on Experiences, SIGCSE, 2013

RESEARCH EXPERIENCES

  • Serve on Panelist of National Science Foundation (NSF) , CRS, 2012. 

  • Serve on Panelist of National Science Foundation (NSF) CCLI, July 12th-13th 2007. 

  • Serve on Master Thesis Committee, since spring 2007. 

  • Contributed to establishment of Center of Academic Excellence in Information Security Education (CAE-IAE at the University of Tennessee at Chattanooga.

  • Advice two graduate research assistants on Computer Network Security, fall 2006 ~ present.

  • Attended Council of Undergraduate Research writing workshop, Richmond, VA, July, 2006.

  • Research Assistant in System Secure Architecture group, Florida International University, 2002-2005.

COURSES TAUGHT 

  • CPSC 1110 Data Structures and Problem Design

  • CPSC 2800 Introduction to Operating System

  • CPSC 3600 Principles of Information Security and Assurance

  • CPSC 4230/5230 Business Intelligence

  • CPSC 4550 Computer Networking

  • CPSC 4600 Biometrics and Cryptography

  • CPSC 4610 Information Security Management 

  • CPSC 4620 Computer Network Security

  • CPSC 4660 System Vulnerability Analysis and Auditing 

  • CPSC 4670 Database Security and Auditing 

  • CPSC 4999 Computer Gaming 

  • CPSC 5550 Client-Server Systems 

  • CPSC 5800 System Software

  • CPSC 5900 Graduate Project Course 

  • CPSC 5999 Master Thesis in Computer Science 

MASTER STUDENTS

Chang Phuong (2006), Feiqiong Liu (2007), Alma Cemerlic (2008) , Harkeerat Bedi (2009), Manju L Katragadda (2009), Rajeshwar Katipally (2010), Swetha Dasireddy (2010), Alexander Shapiro (2010), Tim Coy (2010), Wade Gasior (2011), David Bishop (2012), David Schwab (2013), Dan Kolb (2013), Andrea Schurr (2013), Dhaval Patel (2013), Eric Reinsmidt (2013), Yi Jiang (2014)      

CURRICULUM DEVELOPMENT

  • Proposed M.S. Computer Science on Information Security and Assurance (ISA), which was approved in 2007

  • Participated B.S. Computer Science on Information Security and Assurance (ISA) approved in 2006

  • CPSC3600 Principles of Information Security and Assurance

  • CPSC4600 Biometrics and Cryptography

  • CPSC4610 Information Security Management

  • CPSC4660 System Vulnerability Analysis and Auditing

  • CPSC4670 Database Security and Auditing

  • CPSC4230/5230 Business Intelligence

  • CPSC4999 Computer Gaming 

  • CPSC4240/5240 Principles of Data Analytics

SERVICES 

  • Serve as Graduate Program Coordinator in the Department of Computer Science and Engineering from 2008

  • Serve on Graduate Council from 2008-2012 

  • Serve on Graduate Curriculum Committee from 2008

  • Serve on University Institutional Review Board from 2008

  • Serve on University Research Committee in 2008

  • Serve on University Faculty Senate in 2008-2011

  • Serve on Dean's Search Committee in 2008

  • Serve on New Faculty Search Committee in 2010, 2013

PROFESSIONAL ACTIVITIES

  • Attended 2013 CAE Community meeting, Maryland, 2013

  • Attended 2013 IBM Big Data Analytics training, August, 2013

  • FIE program reviewer, 2013

  • CISSE program reviewer 2012, 2013 

  • Attended 2007 CNSS IA Courseware Evaluation (IACE) Award Ceremony to receive CNSS 4011 and 4012 certificates, Boston MA 2007

  • Attended Forensics Boot camp in CISSE, Boston, 2007

  • Attended NSF workshop, 2007

  • Attended CISCO Network Security Boot camp organized by Infosec Program at the University of Louisville Feb. 3-6, 2006

  • Attended Information Security Curriculum Development Conference (InfoSecCD 2005) at Kennesaw state University, Sept 22 - 23, 2005  

  • Attended Microsoft workshop, November 2005.  

  • Association for Computing Machinery (ACM) membership

  • IEEE membership 

  • SREC conference external program reviewers, 2006

  • ACM Middle-Southeast Conference session chair, 2006

  • ACM MSE conference anonymous program reviewers, 2004

©