« RETURN TO DIRECTORY

Xiaohong Yuan

Professor/Chair

North Carolina Agricultural and Technical State University
College
College of Engineering

Department
Computer Science

Education
Radio Electronics / University of Science and Technology & Academia Sinica
B.S.Industry Automation / Huazhong University of Science and Technology
Ph.D.Computer and Information Sciences, General / Institute of Automation, Chinese Academy of Sciences
Ph.D.Computer Science / Florida Atlantic University

Research Interests

Information Assurance, Software Security, Mobile Computing, Health Informatics Security and Privacy, Computer Science Education

Recent Publications

  • Imano Williams, Xiaohong Yuan, Jeffrey McDonald, Mohd Anwar (A Method for Developing Abuse Cases and Its Evaluation). Journal of Software.
  • Jinsheng Xu, Xiaohong Yuan, Ashley Larkins (Developing a Course Module on HealthVault Application Development). Journal for Computing Sciences in Colleges.
  • Li Yang, Xiaohong Yuan, Dhaval Patel (Interactive Visualization Tools for Cross-Site Scripting and Cross-Site Request Forgery Attacks ). (, International Journal of Information Technology and Computer Science (IJITCS)) (3) 15,
  • Xiaohong Yuan, Kaushik Roy, Albert Esterline (Using a Long Short-Term Memory Recurrent Neural Network (LSTM-RNN) to Classify Network Attacks,). (5) 11, Information Journal, Special Issue on Machine Learning for Cyber-Security.
  • Francis Akowuah, Xiaohong Yuan, Jinsheng Xu, Hong Wang (2012). (A Survey of U.S. Laws for Health Information Security & Privacy). (4) 6, International Journal of Information Security and Privacy.
  • Francis Akowuah, Xiaohong Yuan, Jinsheng Xu, Hong Wang (2013). (A Survey of Security Standard Applicable to Health Information Systems). (4) 7, pp. 15. International Journal of Information Security and Privacy.
  • Lindsay Simpkins, Xiaohong Yuan, Jung Hee Kim (2014). (A Course Module on Click Jacking). (Information Security Education Journal) (2) 1, Society for Information Organization, Harrow. HA # 8NN, UK.
  • Perron Johnson, Philip Harris, Keheira Henderson, Xiaohong Yuan, Li Yang (2014). (A Course Module on Mobile Malware). (Information Security Education Journal) (2) 1, Society for Information Organization, Harrow. HA # 8NN, UK.
  • Wu He, Xiaohong Yuan (2014). (Behavioral Information Security Research with Emerging Technologies.). (Journal of Information Privacy and Security) (4) 10, Taylor and Francis Group.
  • Bilan Jones, Xiaohong Yuan, Emmanuel Nuakoh, Khadija Ibrahim (2014). (Survey of Open Source Health Information Systems). (Health Informatics – an International Journal) (1) 3, pp. 23-31. AIRCC Publishing Corporation.
  • Xiaohong Yuan, Emmanuel Nuakoh, Huiming Yu (2015). (Developing abuse cases based on threat modeling and attack patterns). (Journal of Software) (4) 10,
  • Imano Williams, Xiaohong Yuan (2015). (Evaluating the Effectiveness of Microsoft Threat Modeling Tool). (2) 2, Information Security Education Journal.
  • Francis Akowuah, Jerrisa Lake, Xiaohong Yuan, Emmanuel Nuakoh, Huiming Yu (2015). (, Testing the Security Vulnerabilities of OpenEMR4.1.1: A Case Study). (Journal of Computing Sciences in Colleges) (3) 30, ACM.
  • Kelvin Bryant, Xiaohong Yuan (2016). (A COURSE MODULE ON MOBILE PROGRAMMING). (5) 31, pp. 5-11. The Journal of Computing Sciences in Colleges.
  • Xiaohong Yuan, Li Yang, Bilan Jones, Huiming Yu, Bei-Tseng Chu (2016). (Secure Software Engineering Education: Knowledge Area, Curriculum and Resources.). (Journal of Cybersecurity Education, Research and Practice) Society for Information Organization, Harrow. HA # 8NN, UK.
  • Shearon Brown, Xiaohong Yuan (2016). (Techniques for Retaining Computer Science Students at Historical Black Colleges and Universities). (Setting a New Agenda for Student Engagement and Retention at HBCUs) IGI Global.
  • Francis Akowuah, Jonathan Land, Xiaohong Yuan, Li Yang, Jinsheng Xu (2018). (Standards and Guides for Implementing Security and Privacy for Health Information Technology). In IGI Global, USA,
  • Francis Akowuah, Jonathan Land, Xiaohong Yuan, Li Yang, Jinsheng Xu, Hong Wang (2018). (Standards and Guides for Implementing Security and Privacy for Health Information Technology). In Yassine Maleh, (Security and Privacy Management, Techniques, and Protocols) pp. 214-236. IGI Global.
  • Ling Li, Wu He, Li Xu, Ash Ivan, Mohd Anwar, Xiaohong Yuan (2019). (Investigating the Impact of Cybersecurity Policy Awareness on Employees’ Cybersecurity Behavior). (International Journal of Information Management) 45, pp. 13--24. Elsevier International Journal of Information Management.