Integrated Search Menu

Nong Ye

Profile photo
Professor
Faculty, TEMPE Campus, Mailcode 8809
Biography

Nong Ye is a professor in the School of Computing, Informatics, and Decision Systems Engineering​in Ira A. Fulton Schools of Engineering at Arizona State University. She is also the undergraduate program chair for engineering management and industrial engineering.

Ye's research aims at developing new data mining and analytical algorithms to discover useful information and knowledge from data of large, complex systems, with applications to cyber security including cyber attack detection, STEM education for enineering retention and success, and energy system modeling for energy use and production efficiency. Professor Ye’s past and current research activities have received more than $8M external funding support and have produced 85 journal papers and five books, including "Data Mining: Theories, Algorithms, and Examples." Her recent research focuses on developing data mining algorithms to discover multivariate data associations capturing both partial-value and full-value variable associations as well as both individual and interactive effects of multiple variables. New algorithms have been applied to cyber attack detection, engineering retention and education, and energy system modeling.

 

Education
  • Ph.D. Industrial Engineering, Purdue University 1991
  • M.S. Computer Science, The Chinese Academy of Sciences, Beijing, China 1988
  • B.S. Computer Science, Peking University, Beijing, China 1985
Research Interests

Data mining and machine learning, big data analytics, cyber attack detection, information and systems assurance, engineering retention and education, energy system modeling

Publications
  • N. Ye and T. Wu, Developing Windows based and Web-Enabled Information Systems, Boca Raton, Florida: CRC Press – A Taylor & Francis Company, 2014,
  • N. Ye, Data Mining: Theories, Algorithms, and Examples, Boca Raton, Florida: CRC Press – A Taylor & Francis Company, 2013, ISBN: 978-1-4398-0838-2.
  • N. Ye, Secure Computer and Network Systems: Modeling, Analysis and Design, London, UK: John Wiley & Sons, 2008, ISBN 978-0-470-02324-2.
  • N. Ye (ed.), The Handbook of Data Mining. Mahwah, New Jersey: Lawrence Erlbaum Associates, 2003, ISBN 0-8058-4081-8.
  • H. K. Bhargava, and N. Ye (eds.), Computational Modeling and Problem Solving in the Networked World. Norwell, MA: Kluwar Academic Publishers, 2003, ISBN 1-4020-7295-3.
  • N. Ye, “Analytical techniques for anomaly detection through features, signal-noise separation and partial-value associations,” Proceedings of Machine Learning Research, Vol. 77, pp. 1-10, 2017.
  • N. Ye, “A reverse engineering algorithm for mining a causal system model from system data.” International Journal of Production Research, Vol. 55, No. 3, pp. 828-844, 2017. Published online in July 27, 2016. Eprint link:http://dx.doi.org/10.1080/00207543.2016.1213913.
  • N. Ye, “The partial-value association discovery algorithm to learn multi-layer structural system models from system data.” IEEE Transactions on Systems, Man, and Cybernetics: Systems, in press.
  • N. Ye, “Reverse engineering: Mining structural system models from system data,” Information, Knowledge, Systems Management, 2015, Vol, 12, pp. 205-208.
  • N. Ye, B. M. Aranda, and P. Hurley, “System impact characteristics of cyber services, security mechanisms, and attacks and implications in cyber system survivability,” Information, Knowledge, Systems Management, Vol. 12, No. 1, 2013, pp. 75-95.
  • N. Ye, S. S. Yang, B. M. Aranda, “The analysis of service provider-user coordination for resource allocation in cloud computing,” Information, Knowledge, Systems Management. Vol. 12, No.1, 2013, pp. 1-24.
  • N. Ye, B. M. Aranda, S. Yau, D. Huang, “Analysis and modeling of service impacts on system activities, resource workloads and service performance on computer and network systems,” Information, Knowledge, Systems Management. Vol. 11, No. 3, 2012, pp. 255-274.
  • N. Ye, S. S. Yau, D. Huang, M. Baydogan, B. M. Aranda, A. Roontiva, and P. Hurey, “Models of dynamic relations among service activities, system state and service quality on computer and network systems,” Information, Knowledge, Systems Management, Vol. 9, 2010, pp. 99-116.
  • S. S. Yau, N. Ye, H. Sarjoughian, D. Huang, A. Roontiva, M. G. Baydogan, and M. Quqsith, “Towards development of adaptive service-based software systems,” IEEE Transactions on Services Computing, Vol. 2, No. 3, 2009, pp. 247-260.
  • N. Ye, X. Xu, and P. Hurley, “QoS protocols for end-to-end delay guarantee of instantaneous jobs on computer networks,” Information, Knowledge, Systems Management, Vol. 7, No. 4, 2008, pp. 429-451.
  • X. Xu, and N. Ye, “Minimization of job waiting time variance on identical parallel machines.” IEEE Transactions on Systems, Man, and Cybernetics, Part C, Vol. 37, No. 5, 2007, pp. 917-927.
  • N. Ye, and Q. Chen, “Attack-norm separation for detecting attack-induced quality problems on computers and networks.” Quality and Reliability Engineering International, Vol. 23, No. 5, 2007, pp. 545-553.
  • N. Ye, X. Li, T. Farley, and X. Xu, “Job scheduling methods for reducing waiting time variance.” Computers & Operations Research, Vol. 34, No. 10, 2007, pp. 3069-3083.
  • X. Li, N. Ye, X. Xu, and R. Sawhey, “Influencing factors of job waiting time variance on a single machine.” European Journal of Industrial Engineering, Vol. 1, No.1, 2007, pp. 56-73.
  • X. Li, N. Ye, Tieming Liu, and Yang Sun, “Job scheduling to minimize the weighted waiting time variance of jobs.” Computers & Industrial Engineering, Vol. 52, No. 1, 2007, pp. 41-56.
  • N. Ye, T. Farley, X. Li, and B. Harish, “Batch scheduled admission control for computer and network systems.” Information, Knowledge, Systems Management, Vol. 5, No. 4, 2005/2006, pp. 211-226.
  • N. Ye, C. Newman, and T. Farley, “A system-fault-risk framework for cyber attack classification.” Information, Knowledge, Systems Management, Vol. 5, No. 2, 2005/2006, pp. 135-151.
  • N. Ye, T. Farley, and D. K. Lakshminarasimhan, "An attack-norm separation approach for detecting cyber attacks," Information Systems Frontiers, Vol. 8, No. 3, 2006, pp. 163-177.
  • N. Ye, and T. Farley, “Information sharing and control in homogeneous and heterogeneous supply networks.” International Journal of Modeling and Simulation, Vol. 26, No. 2, 2006, pp. 160-168.
  • Z. Yang, N. Ye, and Y.-C. Lai, “QoS model of a router with feedback control.” Quality and Reliability Engineering International, Vol. 22, No. 4., 2006, pp. 429-444.
  • N. Ye, D. Parmar, and C. M. Borror, “A hybrid SPC method with the Chi-square distance monitoring procedure for large-scale, complex process data.” Quality and Reliability Engineering International, Vol. 22, No. 4, 2006, pp. 393-402.
  • X. Li, and N. Ye, “A supervised clustering and classification algorithm for mining data with mixed variables.” IEEE Transactions on Systems, Man, and Cybernetics, Part A, Vol. 36, No. 2, 2006, pp. 396-406.
  • N. Ye, B. Harish, and T. Farley, “Attack profiles to derive data observables, features, and characteristics of cyber attacks.” Information, Knowledge, Systems Management, Vol. 5, No. 1, 2005/2006, pp. 23-47.
  • N. Ye and T. Farley, “A scientific approach to cyberattack detection.” IEEE Computer, Vol. 38, No. 11, 2005, pp. 55-61.
  • N. Ye, Z. Yang, Y.-C. Lai, and Toni Farley, “Enhancing router QoS through job scheduling with weighted shortest processing time—adjusted.” Computers & Operations Research, Vol. 32, No. 9, 2005, pp. 2255-2269.
  • N. Ye, E. Gel, X. Li, T. Farley, and Y.-C. Lai, “Web-server QoS models: Applying scheduling rules from production planning.” Computers & Operations Research, Vol. 32, No. 5, 2005, pp. 1147-1164.
  • T. Wu, N. Ye, and D. Zhang, “Comparison of distributed methods for resource allocation.” International Journal of Production Research, Vol. 43, No. 3, 2005, pp. 515-536.
  • X. Li, and N. Ye, “A supervised clustering algorithm for mining normal and intrusive activity patterns in computer intrusion detection.” Knowledge and Information Systems, Vol. 8, No. 4, 2005, pp. 498-509.
  • K. Park, Y.-C. Lai, and N. Ye, “Self-organized scale-free networks.” Physical Review E, Vol. 72, No. 2, 2005, pp. 026131-1 to 026131-5.
  • L. Zhao, Y.-C. Lai, K. Park, and N. Ye, “Onset of traffic congestion in complex networks.” Physical Review E, Vol. 71, No. 2, 2005, pp. 026125-1 to 026125-8.
  • N. Ye, Q. Chen, and C. Borror, “EWMA forecast of normal system activity for computer intrusion detection.” IEEE Transactions on Reliability, Vol. 53, No. 4, 2004, pp. 557-566.
  • N. Ye, Y. Zhang, and C. M. Borror, “Robustness of the Markov-chain model for cyber-attack detection.” IEEE Transactions on Reliability, Vol. 53, No. 1, 2004, pp. 116-123.
  • N. Ye and O. S. Saydjari, “Introduction to special section on: quality/reliability engineering of information systems,” IEEE Transactions on Reliability, Vol. 53, No. 1, 2004, pp. 102.
  • N. Ye, T. Farley, D. Aswath, “Data measures and collection points to detect traffic changes on large-scale computer networks.” Information, Knowledge, Systems Management, Vol. 4, No. 4, 2004, pp. 215-224.
  • K. Park, Y.-C. Lai, and N. Ye, “Characterization of weighted complex networks.” Physical Review E, Vol. 70, No. 2, 2004, pp. 026109-1 to026109-4.
  • Y. Chen, T. Farley, and N. Ye, “QoS requirements of network applications on the Internet.” Information, Knowledge, Systems Management, Vol. 4, No.1, 2004, pp. 55-76.
  • N. Ye, and Q. Chen, “Computer intrusion detection through EWMA for auto-correlated and uncorrelated data.” IEEE Transactions on Reliability, Vol. 52, No. 1, 2003, pp. 73-82.
  • N. Ye, C. Borror, and D. Parmar, “Scalable chi square distance versus conventional statistical distance for process monitoring with uncorrelated data variables.” Quality and Reliability Engineering International, Vol. 19, No. 6, 2003, pp. 505-515.
  • N. Ye, Y.-C. Lai, and T. Farley, “Dependable information infrastructures as complex adaptive systems.” Systems Engineering, Vol. 6, No. 4, 2003, pp.225-237.
  • N. Ye, “An information processing model for human-computer integrated assembly planning systems.” JCIIE, Vol. 20, No. 3, 2003, pp. 220-229.
  • Y.-C. Lai, Z. Liu, and N. Ye, ``Infection dynamics on growing networks.'' International Journal of Modern Physics B, Vol. 17, 2003, pp. 4045-4061.
  • Y.-C. Lai, and N. Ye, “Recent developments in chaotic time series analysis.” International Journal of Bifurcation and Chaos, Vol. 13, No. 6, 2003, pp. 1383-1422.
  • Z. Liu, Y.-C. Lai, and N. Ye, “Propagation and immunization of infection on general networks with both homogeneous and heterogeneous components.” Physical Review E, Vol. 67, 031911, 2003, pp. 031911-1 to 031911-5.
  • N. Ye, X. Li, and T. Farley, “A data mining technique for discovering distinct patterns of hand signs: Implications in User Training and Computer Interface Design.” Ergonomics, Vol. 46, No. 1-3, 2002, pp. 188-196.
  • N. Ye, C. Borror, and Y. Zhang, “EWMA techniques for computer intrusion detection through anomalous changes in event intensity.” Quality and Reliability Engineering International, Vol. 18, No. 6, 2002, pp. 443-451.
  • N. Ye, S. M. Emran, Q. Chen, and S. Vilbert, “Multivariate statistical analysis of audit trails for host-based intrusion detection.” IEEE Transactions on Computers, Vol. 51. No. 7, 2002, pp. 810-820.
  • N. Ye, and X. Li, “A scalable, incremental learning algorithm for classification problems.” Computers & Industrial Engineering Journal, Vol. 43, No. 4, 2002, pp. 677-692.
  • N. Ye, T. Ehiabor, and Y. Zhang, “First-order versus high-order stochastic models for computer intrusion detection.” Quality and Reliability Engineering International, Vol. 18, No. 3, 2002, pp. 243-250.
  • N. Ye, “Information infrastructure of engineering collaboration in a distributed virtual enterprise.” International Journal of Computer Integrated Manufacturing, Vol. 15, No. 3, 2002, pp. 265-273.
  • N. Ye, “QoS-centric stateful resource management in information systems.” Information Systems Frontiers, Vol. 4, No. 2, 2002, pp. 149-160.
  • S. M. Emran, and N. Ye, “Robustness of chi-square and Canberra techniques in detecting intrusions into information systems.” Quality and Reliability Engineering International, Vol. 18, No. 1, 2002, pp. 19-28.
  • X. Li, and N. Ye, “Grid- and dummy-cluster-based learning of normal and intrusive clusters for computer intrusion detection.” Quality and Reliability Engineering International, Vol. 18, No. 3, 2002, pp. 231-242.
  • Z. Liu, Y.-C. Lai, N. Ye, and P. Dasgupta, “Connectivity distribution and attack tolerance of general networks with both preferential and random attachments.” Physics Letters A, Vol. 303, 2002, pp. 337-344.
  • Z. Liu, Y.-C. Lai, and N. Ye, “Statistical properties and attack tolerance of growing networks with algebraic preferential attachment.” Physical Review E, Vol. 66, 2002, pp. 036112-1 to 036112-7.
  • N. Ye, X. Li, Q. Chen, S. M. Emran, and M. Xu, “Probabilistic techniques for intrusion detection based on computer audit data.” IEEE Transactions on Systems, Man, and Cybernetics, Vol. 31, No. 4, 2001, pp. 266-274.
  • N. Ye, V. Nguyen, and G. Runger, “Assessment of operation plan performance under uncertainty.” IEEE Transactions on Systems, Man, and Cybernetics, Vol. 31, No. 2, 2001, pp. 256-260.
  • N. Ye, J. Giordano, and J. Feldman, “A process control approach to cyber attack detection.” Communications of the ACM, Vol. 44, No. 8, 2001, pp. 76-82.
  • N. Ye, and Q. Chen, “An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems.” Quality and Reliability Engineering International, Vol. 17, No. 2, 2001, pp. 105 - 112.
  • N. Ye, “Robust intrusion tolerance for information systems.” Information Management and Computer Security, Vol. 9, No. 1, 2001, pp. 38-43.
  • N. Ye, “A hierarchical, distributed architecture of command and control.” Information, Knowledge, Systems Management, Vol. 2, No. 3, 2001, pp. 261-269.
  • X. Li, and N. Ye, “Decision tree classifiers for computer intrusion detection.” Journal of Parallel and Distributed Computing Practices, Vol. 4, No. 2, 2001, pp. 179-190.
  • S. M. Emran, and N. Ye, “A system architecture for computer intrusion detection.” Information, Knowledge, Systems Management, Vol. 2, No. 3, 2001, pp. 271-290.
  • N. Ye, Q. Zhong, and G. Rahn, “Confidence assessment of quality prediction from process measurement in sequential manufacturing processes.” IEEE Transactions on Electronic Packaging  Manufacturing, Vol. 23, No. 3, 2000, pp. 177-184.
  • N. Ye, P. Banerjee, A. Banerjee, and F. Dech, “A comparative study of assembly planning in traditional and virtual environments.” IEEE Transactions on Systems, Man, and Cybernetics, Vol. 29, No. 4, 1999, pp. 546-555.
  • A. Banerjee, P. Banerjee, N. Ye, and F. Dech, “Assembly planning effectiveness using virtual reality.” Presence: Teleoperators and Virtual Environments, Vol. 8, No. 2, 1999, pp. 204-217.
  • N. Ye, “The MDS-ANAVA technique for assessing knowledge representation differences between skill groups.” IEEE Transactions on Systems, Man and Cybernetics, Vol. 28, No. 5, 1998, pp. 586-600.
  • N. Ye, “Neural networks approach to user modeling and intelligent interface: A review and reappraisal.” International Journal of Human-Computer Interaction, Vol. 9, No. 1, 1997, pp. 3-24.
  • N. Ye, “Objective and consistent analysis of group differences in knowledge representation.” International Journal of Cognitive Ergonomics, Vol. 1, No. 2, 1997, pp. 169-187.
  • N. Ye, and B. Zhao, “Automatic setting of article format through neural networks.” International Journal of Human-Computer Interaction, Vol. 9, No. 1, 1997, pp. 81-100.
  • N. Ye, “The presentation of knowledge and state information for system fault diagnosis.” IEEE Transactions on Reliability, Vol. 45, No. 4, 1996, pp. 638-645.
  • N. Ye, “A hierarchy of system-oriented knowledge for diagnosis of manufacturing system faults.” Information and System Engineering, Vol. 2, No. 2, 1996, pp. 79-103.
  • N. Ye, “Self-adapting decision support for interactive fault diagnosis of manufacturing systems.” International Journal of Computer Integrated Manufacturing, Vol. 9, No. 5, 1996, pp. 392-401.
  • N. Ye, and D. A. Urzi, “Heuristic rules and strategies of assembly planning: Experiment and Implications in the design of assembly decision support system.” International Journal of Production Research, Vol. 34, No. 8, 1996, pp. 2211-2228.
  • N. Ye, and G. Salvendy, “Expert-novice knowledge of computer programming at different levels of abstraction.” Ergonomics, Vol. 39, No. 3, 1996, pp. 461-481.
  • N. Ye, and G. Salvendy, “An objective approach to exploring skill differences in strategies of computer program comprehension.” Behaviour & Information Technology, Vol. 15, No. 3, 1996, pp. 139-148.
  • C. B. Swider, and N. Ye, “Effect of information at different stages of users’ training.” Perceptual and Motor Skills, Vol. 83, 1996, pp. 747-754.
  • L. K. Hennings, and N. Ye, “Interaction of screen distances, screen letter heights and source document distances.” Interacting with computers, Vol. 8, No. 4, 1996, pp. 311-322.
  • N. Ye, and B. Zhao, “A hybrid intelligent system for fault diagnosis of advanced manufacturing system.” International Journal of Production Research, Vol. 34, No. 2, 1996, pp. 555-576.
  • R. D. Caldwell, N. Ye, and D. A. Urzi, “Re-engineering the product development cycle and future enhancements of the computer integrated manufacturing environment.” International Journal of Computer Integrated Manufacturing, Vol. 8, No. 6, 1995, pp. 441-447.
  • N. Ye, and G. Salvendy, “Quantitative and qualitative differences between experts and novices in chunking computer software knowledge.” International Journal of Human-Computer Interaction, Vol. 6, No. 1, 1994, pp. 105-118.
  • N. Ye, B. Zhao, and G. Salvendy, “Neural-networks-aided fault diagnosis in supervisory control of advanced manufacturing systems.” International Journal of Advanced Manufacturing Technology, Vol. 8, 1993, pp. 200-209.
  • N. Ye, and G. Salvendy, “Cognitive engineering based knowledge representation in neural networks.” Behaviour & Information Technology, Vol. 10, No. 5, 1991, pp. 403-418.
  • C. Zhong, and N. Ye “JSD methodology in software engineering.” Journal of Computer Science, No. 6, 1988, pp. 33-38.
  • C. Zhong, and N. Ye, “The conceptual framework of software engineering.” Journal of Computer Science, No. 1, 1988, pp. 50-56.
Research Activity
  • Ye,Nong*, James Collofello. Identifying and Validating Interactive and Uncommon Characteristics of Retention and Success in Engineering Education. DOD-AFRL(4/30/2008 - 10/30/2010).
  • Ye,Nong*. Models of Quality of Service and Quality of Information Assurance towards Their Dynamic Adaptation. DOD-AFRL(4/30/2008 - 10/30/2010).
  • Yau,Sik-Sang*, Sarjoughian,Hessam Seyed, Ye,Nong. SoD: Design of Service-based Software Systems with Qos Monitoring and Adaptation and Adaptation. NSF-CISE(8/1/2007 - 7/31/2011).
  • Ye,Nong*. Equipment for Research on Intrusion and Damage Assessment. DOD-AFOSR(5/1/2004 - 4/30/2005).
  • Ye,Nong*. SENSOR GRADE, MODELLING AND PREDICTION IN PRE-ATTACK PHASES FOR EARLY CYBER INDICATION WARNING. DOD-AFRL(9/23/2003 - 3/23/2005).
  • Ye,Nong*. AUTOMATIC EXTRACTION AND COORDINATION OF AUDIT DATA AND FEATURES FOR INTRUSION AND DAMAGE ASSESSMENT. DOD-AFOSR(1/1/2003 - 3/31/2006).
  • Ye,Nong*, Dasgupta,Partha, Lai,Ying-Cheng, Lai,Ying-Cheng. EQUIPMENT FOR RESEARCH ON DEPENDABLE INFORMATION INFRASTRUCTURE. DOD-AFOSR(6/1/2002 - 5/31/2003).
  • Ye,Nong*, Dasgupta,Partha, Lai,Ying-Cheng, Lai,Ying-Cheng. A COMPLEX ADAPTIVE SYSTEM APPROACH TO QOS ASSURANCE AND STATEFUL RESOURCE MANAGEMENT FOR DEPENDABLE INFORMATION INFRASTRUCTURE. DOD-AFOSR(4/9/2001 - 12/31/2006).
  • Ye,Nong*. QOS AND CONTROL-THEORETIC TECHNIQUES FOR INTRUSION TOLERANCE. DOD-AFRL(4/2/2001 - 9/30/2002).
  • Ye,Nong*. MODELING AND SIMULATION OF SUPPLY CHAIN ENTERPRISES AS COMPLEX ADAPTIVE SYSTEMS. DOC - NIST(9/15/2000 - 9/15/2001).
  • Choi,Thomas Younghoon*, Dooley,Kevin John, Ye,Nong. SCALABLE ENTERPRISE SYSTEMS: CONTROL VERSUS EMERGENCE. NSF-ENG(8/1/2000 - 8/31/2002).
  • Ye,Nong*. THE SIMULATION OF MANUAL ASSEMBLY OPERATION. DOC - NIST(5/16/1999 - 9/30/1999).
  • Ye,Nong*, Bhattacharya,Sourav. THE MONITORING DETECTION, ISOLATION AND ASSESSMENT OF INFORMATION WARFARE ATTACKS THROUGH MULTI-LEVEL, MULTI-SCALE SYSTEM MODELING. DOD-AFRL(5/4/1999 - 5/3/2001).
  • Ye,Nong*. COMPUTER NETWORK EQUIPMENT FOR INTRUSION DETECTION RESEARCH. DOD-AIR FORCE(3/1/1999 - 2/29/2000).
  • Ye,Nong*. A PROCESS ENGINEERING APPROACH TO THE DEVELOPMENT AND INTEGRATION OF INTRUSION DETECTION TECHNIQUES. DOD-AIR FORCE(10/1/1998 - 12/31/2001).
  • Ye,Nong*. A PROCESS CONTROL & DIAGNOSIS APPROACH TO INDICATIONS & WARNING OF ATTACKS ON COMPUTER NETWORKS. UNIV OF ILLINOIS-CHICAGO(10/1/1998 - 9/30/1999).
  • Ye,Nong*. MODEL-BASED ASSESSMENT OF CAMPAIGN PLAN PERFORMANCE UNDER UNCERTAINTY. RESEARCH & DEVELOPMENT LABS(1/1/1998 - 3/31/1999).
Fall 2019
Course NumberCourse Title
ASU 101-CSEThe ASU Experience
IEE 506Web-Enabled Decn Support Systs
IEE 580Practicum
IEE 584Internship
IEE 595Continuing Registration
IEE 784Internship
IEE 792Research
IEE 795Continuing Registration
IEE 799Dissertation
Summer 2019
Course NumberCourse Title
IEE 584Internship
Spring 2019
Course NumberCourse Title
IEE 305Information Systems Engr
IEE 580Practicum
IEE 584Internship
IEE 595Continuing Registration
IEE 599Thesis
IEE 792Research
IEE 795Continuing Registration
Fall 2018
Course NumberCourse Title
IEE 506Web-Enabled Decn Support Systs
IEE 580Practicum
IEE 595Continuing Registration
IEE 784Internship
IEE 792Research
IEE 795Continuing Registration
IEE 799Dissertation
Summer 2018
Course NumberCourse Title
IEE 580Practicum
IEE 584Internship
IEE 795Continuing Registration
Spring 2018
Course NumberCourse Title
IEE 580Practicum
IEE 584Internship
IEE 599Thesis
IEE 792Research
IEE 795Continuing Registration
Fall 2017
Course NumberCourse Title
IEE 580Practicum
IEE 595Continuing Registration
IEE 784Internship
IEE 792Research
IEE 795Continuing Registration
IEE 799Dissertation
Summer 2017
Course NumberCourse Title
IEE 580Practicum
IEE 584Internship
IEE 795Continuing Registration
Spring 2017
Course NumberCourse Title
IEE 305Information Systems Engr
IEE 580Practicum
IEE 584Internship
IEE 595Continuing Registration
IEE 599Thesis
IEE 605Foundations of Information Sys
IEE 795Continuing Registration
Fall 2016
Course NumberCourse Title
IEE 305Information Systems Engr
IEE 506Web-Enabled Decn Support Systs
IEE 580Practicum
IEE 595Continuing Registration
IEE 784Internship
IEE 792Research
IEE 795Continuing Registration
IEE 799Dissertation
Summer 2016
Course NumberCourse Title
IEE 580Practicum
IEE 584Internship
IEE 795Continuing Registration
Spring 2016
Course NumberCourse Title
IEE 305Information Systems Engr
IEE 506Web-Enabled Decn Support Systs
IEE 580Practicum
IEE 584Internship
IEE 595Continuing Registration
IEE 599Thesis
IEE 795Continuing Registration
Fall 2015
Course NumberCourse Title
IEE 305Information Systems Engr
IEE 580Practicum
IEE 595Continuing Registration
IEE 605Foundations of Information Sys
IEE 784Internship
IEE 790Reading and Conference
IEE 792Research
IEE 795Continuing Registration
IEE 799Dissertation
Summer 2015
Course NumberCourse Title
IEE 580Practicum
IEE 584Internship
Spring 2015
Course NumberCourse Title
IEE 305Information Systems Engr
IEE 506Web-Enabled Decn Support Systs
IEE 580Practicum
IEE 584Internship
IEE 590Reading and Conference
IEE 595Continuing Registration
IEE 599Thesis
IEE 784Internship
IEE 795Continuing Registration
Presentations
  • Ye, Nong. Keynote speaker, “The PVAD Algorithm to Learn Partial-Value Variable Associations,” The 5th International Conference on Big Data Analysis and Data Mining, June 20-21, 2018, Rome, Italy.
  • Ye, Nong. Keynote speaker, “Targeted profiling and partial-value associations for anomaly detection,” The 2017 KDD Workshop on Anomaly Detection in Finance, Halifax, Nova Scotia, Canada, August 14, 2017.
  • Ye, Nong. “Mathematical/Statistical Models of Computer and Network Data for Cyber Attack Detection and Research on Partial-Value Association Discovery,” National Institute of Standards and Technology, Gaithersburg, Maryland, December 13, 2016.
  • Ye, Nong. “Intrusion Detection and Assessment through Mining and Learning Data Characteristics of Cyber Attacks and Normal Use Activities,” Applied Computer Security Annual Conference 2008, Anaheim, California, December 8, 2008.
  • Ye, Nong. Mathematical/Statistical Characteristics and Modeling of Computer and Network Data for Cyber Attack Identification. Invited Seminar at University of Illinois at Urbana-Champaign (May 2006).
  • Ye, Nong. Cyber Attack and Norm Data Characteristics and Sensor Models for Cyber Attack Detection. Invited Seminar at Northwestern University (Feb 2006).
  • Ye, Nong. Attach and Norm Data Characteristics and Sensor Models for Cyber Attack Detection and Identification. Seminar at General Dynamics Decision Systems (Sep 2005).
  • Ye, Nong. Attack and Norm Data Characteristics and Sensor Models for Cyber Attack Identification. Seminar at Air Force Research Laboratory (Aug 2005).
  • Ye, Nong. Automatic Extraction and Coordination of Audit Data and Features for Intrusion and Damage Assessment. The AFOSR Software & Systems Program PI Meeting (Aug 2005).
  • Ye, Nong. CIP: A Complex Adaptive System Approach to QoS Assurance and Stateful Resource Management for Dependable Information Infrastructure. The AFOSR Software & Systems Program PI Meeting (Aug 2005).
  • Ye, Nong. Quality-of-Service Design of Computer/Network Systems for Dependability. Seminar at Air Force Research Laboratory (Aug 2005).
  • Ye, Nong. Cyber Attack and Norm Data Characteristics and Sensor Models for Cyber I&W. The ARDA Advanced Information Assurance Program PI Meeting (Jul 2005).
  • Ye, Nong. Characteristics of Cyber Signal/Noise and Signal-Noise Separation Approach to Cyber Attack Detection. Seminar at Symantec Corporation (Feb 2005).
  • Ye, Nong. Cyber Signal/Noise Characteristics and Signal Detection Models. The ARDA Advanced Information Assurance Joint PI Meeting (Jan 2005).
  • Ye, Nong. Quality of Service Design and Process Monitoring of Computer and Network Systems for Dependability and Security. Seminar at the Chinese University of Hong Kong, Hong (Dec 2004).
  • Ye, Nong. A Complex Adaptive System Approach to QoS Assurance and Stateful Resource Management for Dependable Information Infrastructure. Department of Defense (DoD), Critical Infrastructure Protection - High Confidence Adaptable Software (Aug 2004).
  • Ye, Nong. Scalable Chi-square Distance versus Conventional Statistical Distance for Process Control with Uncorrelated Data Variables. The 12th INFORMS/APS Conference (Jun 2004).
  • Ye, Nong. Quality of Service Design and Process Monitoring of Computer and Network Systems for Dependability and Security. Seminar at University of Wisconsin (May 2004).
  • Ye, Nong. QoS Assurance on Computers and Networks. Seminar at Tsinghua University (Dec 2003).
  • Ye, Nong. Cyber Signal/Noise Characteristics and Sensor Models for Cyber I&W. ARDA PI Kickoff Meeting (Nov 2003).
  • Ye, Nong. Cyber Signal/Noise Characteristics and Sensor Models for Cyber Indications and Warning. ARDA Government Day (Sep 2003).
  • Ye, Nong. A Complex Adaptive System Approach to QoS Assurance and Stateful Resource Management for Dependable Information Infrastructure. AFOSR Software & Systems Program PI Meeting (Jun 2003).
  • Ye, Nong. Automatic Extraction and Coordination of Audit Data and Features for Intrusion and Damage Assessment. AFOSR Software & Systems Program PI Meeting (Jun 2003).
  • Ye, Nong. Security and QoS of Computer and Network Systems. Seminar at Authentic Corporation (May 2003).
  • Ye, Nong. Security and QoS of Computer and Network Systems. Seminar at Security and QoS of Computer and Network Systems (Apr 2003).
  • Ye, Nong. Quality of Service Design and Process Monitoring of Computer and Network Systems for Dependability and Security. Seminar at the Chinese University of Hong Kong, Hong
  • Ye, Nong. QoS Assurance on Computers and Networks. Seminar at Tsinghua University
  • Ye, Nong. Cyber Signal/Noise Characteristics and Signal Detection Models. The ARDA Advanced Information Assurance Joint PI Meeting
Service
  • Editor, CRC Book Series on Data-Enabled Engineering
  • Associate Editor, IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2012 – 2016 
  • Associate Editor, Information, Knowledge, Systems Management, 2004 – 2014
  • Associate Editor, IEEE Transactions on Systems, Man, and Cybernetics, 2003 – 2012 
  • Associate Editor, IEEE Transactions on Reliability, 2003 – 2007
  • Guest Editor, Special Issue on Quality/Reliability Engineering of Information Systems, IEEE Transactions on Reliability, Vol. 53, No. 1, 2004
  • Guest Editor, Special Issue on Secure, Reliable Computer and Network Systems, Quality and Reliability Engineering International, Vol. 18, No. 3, 2002
  • Guest Editor, Special Issue on Artificial Neural Networks in Human-Computer Interaction International Journal of Human-Computer Interaction, Vol. 9, No. 1, 1997
  • Co-Chair, The 8th INFORMS Computing Society Conference, Chandler, Arizona, 2003
  • Member of Conference Organizing Committee, The 5th International Conference on Big Data Analysis and Data Mining, June 20-21, 2018, Rome, Italy
  • Member of Conference Program Committee, The International Conference on Biological Information and Biomedical Engineering (BIBE 2018), July 6-8, 2018, Shanghai, China
  • Member of Conference Program Committee, The 13th International Conference on Computational Intelligence and Security (CIS'17), December 15 – 18, 2017, Hong Kong
  • Member of Conference Program Committee, The 12th International Conference on Computational Intelligence and Security (CIS'16), December 17 – 18, 2016, Wuxi, China
  • Member of Conference Program Committee, The 11th International Conference on Computational Intelligence and Security (CIS'15), December 19 – 20, 2015, Shenzhen, China
  • Member of Conference Program Committee, The 6th International Conference on Advances in System Simulation, October 12 – 16, 2014, Nice, France
  • Member of Conference Program Committee, The 5th International Conference on Advances in System Simulation, October 27 – November 1, 2013, Venice, Italy
  • Member of Conference Program Committee, The 3rd International Conference on Simulation and Modeling Methodologies, Technologies and Applications (SIMULTECH 2013), July 29-31, 2013, Reykjavik, Iceland
  • Member of Conference Program Committee, The 8th International Conference on Computational Intelligence and Security (CIS'12), November 17-18, 2012, Guangzhou, China
  • Member of Conference Program Committee, The IEEE International Conference on Intelligence and Security Informatics (ISI 2012), June 11-14, 2012, Washington, DC, USA
  • Member of Conference Program Committee, The 2nd International Conference on Simulation and Modeling Methodologies, Technologies and Applications (SIMULTECH 2012), July 28-31, 2012, Rome, Italy
  • Member of Conference Technical Program Committee, The 2011 International Conference on Computational Intelligence and Security (CIS'11), December 3-4, 2011, Sanya, Hainan, China
  • Member of Conference Program Committee, The 1st International Conference on Simulation and Modeling Methodologies, Technologies and Applications (SIMULTECH 2011), July 29-31, 2011, Noordwijkerhout, The Netherlands
  • Member of Conference Program Committee, The 6th China International Conference on Information Security and Cryptology, October 20-23, 2010, Shanghai, China