Nong Ye, Ph.D.

INTRODUCTION

CURRICULUM VITAE

PUBLICATIONS

RESEARCH AWARDS

**Out now!**
Secure Computer and Network Systems : Modeling, Analysis and Design by Nong Ye
Read more and buy online at Secure Computer and Network Systems : Modeling, Analysis and Design

 

NONG YE, Ph.D.

Professor, Department of Industrial Engineering

Director, Cluster on Data Exploration and Modeling for Brain Science

Director, Information and Systems Assurance Laboratory

Ira A. Fulton School of Engineering

ARIZONA STATE UNIVERSITY

Box 875906, Tempe, AZ 85287

Phone: (480) 965-7812, Fax: (480) 965-8692

Email: nongye@asu.edu, URL: http://enpub.fulton.asu.edu/ye/

 

INTRODUCTION

 

Dr. Nong Ye is a Professor of Industrial Engineering at Arizona State University (ASU), Tempe, Arizona. Dr. Ye received her Ph.D. degree (1991) in Industrial Engineering from Purdue University, West Lafayette, Indiana, and her M.S. degree (1988) and B.S. degree (1985) in Computer Science from the Chinese Academy of Sciences and Peking University in P. R. China, respectively.

Dr. Ye's past and current research activities, which have received over $8M external funding support and have produced seventy-six journal papers and three books (including Secure Computer and Network Systems: Modeling, Analysis and Design and The Handbook of Data Mining), fall into the following two areas.

·        Data and knowledge exploration, involving the following data and applications.

o       Computer and network data for real-time decision making to detect and assess cyber attacks and security risks on computer and network systems. Through data mining, statistical analysis and data modeling, attack-sensitive data variables are selected, statistical and mathematical features of data are extracted and examined to discover distinctive univariate and multivariate characteristics of cyber attack data, data models are defined to represent discovered data characteristics, and detection and assessment algorithms which incorporate data models are developed.

Two examples of sponsored research projects:

§         U. S. Intelligence Community Advanced Research and Development Activities/Air Force Research Laboratory, September 2003 – February 2005, $799,576, N. Ye (PI), “Cyber Signal/Noise Characteristics and Sensor Models for Early Cyber Indications and Warning.”

§         Defense Advanced Research Projects Agency, May 1999 – May 2001, $612,083, N. Ye (PI), “The Monitoring, Detection, Isolation and Assessment of Information Warfare Attacks through Multi-Level, Multi-Scale System Modeling and Model-based Technology.”

Two examples of publications:

§         X. Li, and N. Ye, “A supervised clustering and classification algorithm for mining data with mixed variables.” IEEE Transactions on Systems, Man, and Cybernetics, Part A, Vol. 36, No. 2, 2006, pp. 396-406.

§         N. Ye, Q. Chen, and C. Borror, “EWMA forecast of normal system activity for computer intrusion detection.” IEEE Transactions on Reliability, Vol. 53, No. 4, 2004, pp. 557-566.

o       Cognitive behavioral data for human-computer interface design. Through experimental design, statistical hypothesis testing and data mining, human behavioral and performance data in computer programming and manufacturing assembly tasks are collected and analyzed to understand expert-novice differences in knowledge representation which are then used to design user-friendly computer interface.

Two examples of sponsored research projects:

§         Office of Naval Research, October 1992 – September 1995, $730,000, N. Ye (co-PI), “MURI: Three-Dimensional Visualization and Interaction for the Design of Large-Scale Manufactured Objects.”

§         National Science Foundation, September 1992 – February 1996, $90,000, N. Ye (PI), “A Cognitive Engineering Approach to the Interface Design of Decision Support Systems for Machine Fault Diagnosis.”

Two examples of publications:

§         N. Ye, P. Banerjee, A. Banerjee, and F. Dech, “A comparative study of assembly planning in traditional and virtual environments.” IEEE Transactions on Systems, Man, and Cybernetics, Vol. 29, No. 4, 1999, pp. 546-555.

§         N. Ye, “The MDS-ANAVA technique for assessing knowledge representation differences between skill groups.” IEEE Transactions on Systems, Man and Cybernetics, Vol. 28, No. 5, 1998, pp. 586-600.

o       Biomedical data for brain science with applications in Brain-Machine Interface (BMI) for assisting people who have lost motor or sensory function and in prediction and treatment of brain-related diseases such as the Alzheimer disease and brain tumors. Through data mining, statistical analysis and data modeling, brain data (including electrical spike waveforms and structural/functional images) are analyzed to discover statistical/mathematical features and characteristics of brain neuron population dynamics, and data models are defined accordingly and employed in applications for BMI and disease prediction/treatment.

One example of sponsored research:

§         Ira A. Fulton School of Engineering, February 2007 - February 2009, N. Ye (Director), "Cluster of Data Exploration and Modeling for Brain Science."

o       Urban system and environment data for urban system sustainability. Through data mining, statistical analysis and data modeling, urban metabolic flow data (including data about water, materials, energy, waste, air quality, etc.) are analyzed to understand interrelationships of urban systems and to design sustainable urban system infrastructures.

·        Optimization and quality control of system process and operations, involving the following systems.

o       Computer and network systems for dependability, especially service stability and end-to-end delay guarantee. Though modeling, simulation and optimization of job scheduling, admission control and resource reservation, job waiting time variance is minimized at local and regional levels of computer and network services, and end-to-end delay guarantee is enabled at the global level of computer and network services.

Two examples of sponsored research projects:

§         Department of Defense and Air Force Office of Scientific Research, May 2001 – December 2006, $2,133,095, N. Ye (PI), “MURI CIP: A Complex Adaptive System Approach to QoS Assurance and Stateful Resource Management for Dependable Information Infrastructure.”

§         National Science Foundation, October 1998 – September 2003, $2,000,000, N. Ye (co-PI), “CAVERN - The CAVE Research Network.”

Two examples of publications:

§         X. Xu, and N. Ye, “Minimization of job waiting time variance on identical parallel machines.” IEEE Transactions on Systems, Man, and Cybernetics, Part C, in press.

§         N. Ye, Z. Yang, Y.-C. Lai, and Toni Farley, “Enhancing router QoS through job scheduling with weighted shortest processing time—adjusted.” Computers & Operations Research, Vol. 32, No. 9, 2005, pp. 2255-2269.

o       Manufacturing and supply chain enterprises for process monitoring and control. Through statistical analysis and system simulation, an understanding of information sharing and control effects on supply chain performance is established, and the statistical model for quality prediction is developed.

Two examples of sponsored research projects:

§         National Science Foundation, August 2000 – July 2001, $199,826, N. Ye (co-PI), “Scalable Theory of Enterprises: Control versus Emergence.”

§         Defense Advanced Research Projects Agency, January 2001 – December 2001, $80,000, N. Ye (PI), “Modeling, Analysis and Control of Heterogeneous-Agent Enterprise Systems in E-Commerce.”

Two examples of publications:

§         N. Ye, Q. Zhong, and G. Rahn, “Confidence assessment of quality prediction from process measurement in sequential manufacturing processes.” IEEE Transactions on Electronic Packaging  Manufacturing, Vol. 23, No. 3, 2000, pp. 177-184.

§         N. Ye, and T. Farley, “Information sharing and control in homogeneous and heterogeneous supply networks.” International Journal of Modeling and Simulation, Vol. 26, No. 2, 2006, pp. 160-168.

 

Dr. Nong Ye's core expertise lies in the areas of data mining, statistical analysis, real-time decision making, and systems engineering, with applications in information security, bioinformatics and bioengineering, human-computer interaction, urban system sustainability, manufacturing, and enterprise management. Research outcomes include statistical/mathematical characterization of data and engineering transformation of scientific knowledge about data characteristics into design and use of systems. Through sponsored research projects and proposal efforts, Dr. Nong Ye has worked with people whose expertise lies in the areas of quality/reliability engineering, operations research/optimization, human factors, system modeling and simulation, computer science, mathematics/statistics, bioengineering, electrical engineering, civil engineering, and business management. Dr. Nong Ye's research has been featured in

Dr. Nong Ye has served as:

·        Editor, IEEE Transactions on Systems, Man, and Cybernetics (2003-present)

·        Associate Editor, IEEE Transactions on Reliability (2003-2007)

·        Associate Editor, Information, Knowledge, and Systems Management (2004 – present)

·       Member, Editorial Board of International Journal of Human-Computer Interaction (1994-present), Information, Knowledge, Systems Management (2004 – present) and International Journal of Cognitive Ergonomics (1997-2002)

·        Co-Chair, The 8th INFORMS Computing Society Conference, 2003


CURRICULUM VITAE

 

Education

 

1991    Ph.D., Industrial Engineering, Purdue University, West Lafayette, Indiana, USA

1988    M.S., Computer Science, The Chinese Academy of Sciences, Beijing, China

1985    B.S., Computer Science, Peking University, Beijing, China

 

Academic Experience

 

2002-present    Professor of Industrial Engineering, Arizona State University, Tempe, Arizona

2002-2005       Affiliated Professor of Computer Science and Engineering, Arizona State University, Tempe, Arizona

2003-2005    Adjunct Professor of Electronics and Computer Science, Peking University, Beijing, P. R. China

1998-2002       Associate Professor of Industrial Engineering, Arizona State University, Tempe, Arizona

1994-1998             Assistant Professor of Industrial Engineering, University of Illinois at Chicago, Chicago, Illinois

1991-1994       Assistant Professor of Human Factors Engineering, Wright State University, Dayton, Ohio

 

Other Work Experience

 

2006                Consultant, General Dynamics C4 Systems, Scottsdale, Arizona

1997-1998             Visiting Scientist and Consultant, Manufacturing Systems Integration Division, National Institute of Standards and Technology, Gaithersburg, Maryland

1997                                Summer Faculty Fellow, Information Directorate, United States Air Force Research Laboratory, Rome, New York

1989-1991       NEC Research Fellow, Purdue University, West Lafayette, Indiana

 

Collaborative Work with Industry

 

Banner Alzheimer’s Institute and Samaritan PET Center, Symantec Corporation, General Dynamics C4 Systems, AT&T Research Labs, Motorola, Inc., Caterpillar Inc., BF Goodrich Aerospace Inc., Globe Products Inc., and Whirlpool Corporation

 

PUBLICATIONS

 

Refereed Archival Journal Papers

           

Published and Accepted Work: 76 papers

  

76.  N. Ye, and Q. Chen, “Attack-norm separation for detecting attack-induced quality problems on computers and networks.” Quality and Reliability Engineering International, Vol. 23, No. 5, 2007, pp. 545-553.

 

75.  X. Xu, and N. Ye, “Minimization of job waiting time variance on identical parallel machines.” IEEE Transactions on Systems, Man, and Cybernetics, Part C, Vol. 37, No. 5, 2007, pp. 917-927.

 

74.  N. Ye, T. Farley, X. Li, and B. Harish, “Batch scheduled admission control for computer and network systems.” Information, Knowledge, Systems Management, Vol. 5, No. 4, 2005/2006, pp. 211-226.

 

73. N. Ye, X. Li, T. Farley, and X. Xu, “Job scheduling methods for reducing waiting time variance.” Computers & Operations Research, Vol. 34, No. 10, 2007, pp. 3069-3083.

 

72. X. Li, N. Ye, X. Xu, and R. Sawhey, “Influencing factors of job waiting time variance on a single machine.” European Journal of Industrial Engineering, Vol. 1, No. 1, 2007, pp. 56-73.

 

71. X. Li, N. Ye, Tieming Liu, and Yang Sun, “Job scheduling to minimize the weighted waiting time variance of jobs.” Computers & Industrial Engineering, Vol. 52, No. 1, 2007, pp. 41-56.

 

70. N. Ye, C. Newman, and T. Farley, “A system-fault-risk framework for cyber attack classification.” Information, Knowledge, Systems Management, Vol. 5, No. 2, 2006, pp. 135-151.

 

69.  N. Ye, T. Farley, and D. K. Lakshminarasimhan, "An Attack-Norm Separation Approach for Detecting Cyber Attacks," Information Systems Frontiers, Vol. 8, No. 3, 2006, pp. 163-177.

 

68. Z. Yang, N. Ye, and Y.-C. Lai, “QoS model of a router with feedback control.” Quality and Reliability Engineering International, Vol. 22, No. 4., 2006, pp. 429-444.

 

67. N. Ye, and T. Farley, “Information sharing and control in homogeneous and heterogeneous supply networks.” International Journal of Modeling and Simulation, Vol. 26, No. 2, 2006, pp. 160-168.

 

66. N. Ye, D. Parmar, and C. M. Borror, “A hybrid SPC method with the Chi-square distance monitoring procedure for large-scale, complex process data.” Quality and Reliability Engineering International, Vol. 22, No. 4, 2006, pp. 393-402.

 

65. X. Li, and N. Ye, “A supervised clustering and classification algorithm for mining data with mixed variables.” IEEE Transactions on Systems, Man, and Cybernetics, Part A, Vol. 36, No. 2, 2006, pp. 396-406.

 

64. N. Ye, B. Harish, and T. Farley, “Attack profiles to derive data observables, features, and characteristics of cyber attacks.” Information, Knowledge, Systems Management, Vol. 5, No. 1, 2006, pp. 23-47.

 

63. N. Ye and T. Farley, “A scientific approach to cyberattack detection.” IEEE Computer, Vol. 38, No. 11, 2005, pp. 55-61.

 

62. N. Ye, Z. Yang, Y.-C. Lai, and Toni Farley, “Enhancing router QoS through job scheduling with weighted shortest processing time—adjusted.” Computers & Operations Research, Vol. 32, No. 9, 2005, pp. 2255-2269.

 

61. N. Ye, E. Gel, X. Li, T. Farley, and Y.-C. Lai, “Web-server QoS models: Applying scheduling rules from production planning.” Computers & Operations Research, Vol. 32, No. 5, 2005, pp. 1147-1164.

 

60. T. Wu, N. Ye, and D. Zhang, “Comparison of distributed methods for resource allocation.” International Journal of Production Research, Vol. 43, No. 3, 2005, pp. 515-536.

 

59. X. Li, and N. Ye, “A supervised clustering algorithm for mining normal and intrusive activity patterns in computer intrusion detection.” Knowledge and Information Systems, Vol. 8, No. 4, 2005, pp. 498-509.

 

58. L. Zhao, K. Park, Y.-C. Lai, and N. Ye, ``Tolerance of scale-free networks against attack-induced cascades.'' Physical Review E, Vol. 72, No. 2, 2005, pp. 025104-1 to 025104-4.

 

57. K. Park, Y.-C. Lai, and N. Ye, “Self-organized scale-free networks.” Physical Review E, Vol. 72, No. 2, 2005, pp. 026131-1 to 026131-5.

 

56. K. Park, Y.-C. Lai, L. Zhao, and N. Ye, ``Jamming in complex gradient networks.'' Physical Review E, Vol. 71, No. 6, 2005, pp. 065105-1 to 065105-4.

 

55. L. Zhao, Y.-C. Lai, K. Park, and N. Ye, “Onset of traffic congestion in complex networks.” Physical Review E, Vol. 71, No. 2, 2005, pp. 026125-1 to 026125-8.

 

54. N. Ye, Q. Chen, and C. Borror, “EWMA forecast of normal system activity for computer intrusion detection.” IEEE Transactions on Reliability, Vol. 53, No. 4, 2004, pp. 557-566.

 

53. N. Ye, Y. Zhang, and C. M. Borror, “Robustness of the Markov-chain model for cyber-attack detection.” IEEE Transactions on Reliability, Vol. 53, No. 1, 2004, pp. 116-123.

 

52. N. Ye and O. S. Saydjari, “Introduction to special section on: quality/reliability engineering of information systems,” IEEE Transactions on Reliability, Vol. 53, No. 1, 2004, pp. 102.

 

51. N. Ye, T. Farley, D. Aswath, “Data measures and collection points to detect traffic changes on large-scale computer networks.” Information, Knowledge, Systems Management, Vol. 4, No. 4, 2004, pp. 215-224.

 

50. K. Park, Y.-C. Lai, and N. Ye, “Characterization of weighted complex networks.” Physical Review E, Vol. 70, No. 2, 2004, pp. 026109-1 to026109-4.

 

49. Y. Chen, T. Farley, and N. Ye, “QoS requirements of network applications on the Internet.” Information, Knowledge, Systems Management, Vol. 4, No.1, 2004, pp. 55-76.

 

48. N. Ye, and Q. Chen, “Computer intrusion detection through EWMA for auto-correlated and uncorrelated data.” IEEE Transactions on Reliability, Vol. 52, No. 1, 2003, pp. 73-82.

 

47. N. Ye, C. Borror, and D. Parmar, “Scalable chi square distance versus conventional statistical distance for process monitoring with uncorrelated data variables.” Quality and Reliability Engineering International, Vol. 19, No. 6, 2003, pp. 505-515.

 

46. N. Ye, Y.-C. Lai, and T. Farley, “Dependable information infrastructures as complex adaptive systems.” Systems Engineering, Vol. 6, No. 4, 2003, pp.225-237.

 

45. N. Ye, “An information processing model for human-computer integrated assembly planning systems.” JCIIE, Vol. 20, No. 3, 2003, pp. 220-229.

 

44. Y.-C. Lai, Z. Liu, and N. Ye, ``Infection dynamics on growing networks.'' International Journal of Modern Physics B, Vol. 17, 2003, pp. 4045-4061.

 

43. Y.-C. Lai, and N. Ye, “Recent developments in chaotic time series analysis.” International Journal of Bifurcation and Chaos, Vol. 13, No. 6, 2003, pp. 1383-1422.

 

42. Z. Liu, Y.-C. Lai, and N. Ye, “Propagation and immunization of infection on general networks with both homogeneous and heterogeneous components.” Physical Review E, Vol. 67, 031911, 2003, pp. 031911-1 to 031911-5.

 

41. N. Ye, X. Li, and T. Farley, “A data mining technique for discovering distinct patterns of hand signs: Implications in User Training and Computer Interface Design.” Ergonomics, Vol. 46, No. 1-3, 2002, pp. 188-196.

 

40. N. Ye, C. Borror, and Y. Zhang, “EWMA techniques for computer intrusion detection through anomalous changes in event intensity.” Quality and Reliability Engineering International, Vol. 18, No. 6, 2002, pp. 443-451.

 

39. N. Ye, S. M. Emran, Q. Chen, and S. Vilbert, “Multivariate statistical analysis of audit trails for host-based intrusion detection.” IEEE Transactions on Computers, Vol. 51. No. 7, 2002, pp. 810-820.

 

38. N. Ye, and X. Li, “A scalable, incremental learning algorithm for classification problems.” Computers & Industrial Engineering Journal, Vol. 43, No. 4, 2002, pp. 677-692.

 

37. N. Ye, T. Ehiabor, and Y. Zhang, “First-order versus high-order stochastic models for computer intrusion detection.” Quality and Reliability Engineering International, Vol. 18, No. 3, 2002, pp. 243-250.

 

36. N. Ye, “Information infrastructure of engineering collaboration in a distributed virtual enterprise.” International Journal of Computer Integrated Manufacturing, Vol. 15, No. 3, 2002, pp. 265-273.

 

35. N. Ye, “QoS-centric stateful resource management in information systems.” Information Systems Frontiers, Vol. 4, No. 2, 2002, pp. 149-160.

 

34. S. M. Emran, and N. Ye, “Robustness of chi-square and Canberra techniques in detecting intrusions into information systems.” Quality and Reliability Engineering International, Vol. 18, No. 1, 2002, pp. 19-28.

 

33. X. Li, and N. Ye, “Grid- and dummy-cluster-based learning of normal and intrusive clusters for computer intrusion detection.” Quality and Reliability Engineering International, Vol. 18, No. 3, 2002, pp. 231-242.

 

32. Z. Liu, Y.-C. Lai, N. Ye, and P. Dasgupta, “Connectivity distribution and attack tolerance of general networks with both preferential and random attachments.” Physics Letters A, Vol. 303, 2002, pp. 337-344.

 

31.  Z. Liu, Y.-C. Lai, and N. Ye, “Statistical properties and attack tolerance of growing networks with algebraic preferential attachment.” Physical Review E, Vol. 66, 2002, pp. 036112-1 to 036112-7.

 

30. N. Ye, X. Li, Q. Chen, S. M. Emran, and M. Xu, “Probabilistic techniques for intrusion detection based on computer audit data.” IEEE Transactions on Systems, Man, and Cybernetics, Vol. 31, No. 4, 2001, pp. 266-274.

 

29. N. Ye, V. Nguyen, and G. Runger, “Assessment of operation plan performance under uncertainty.” IEEE Transactions on Systems, Man, and Cybernetics, Vol. 31, No. 2, 2001, pp. 256-260.

 

28.  N. Ye, J. Giordano, and J. Feldman, “A process control approach to cyber attack detection.” Communications of the ACM, Vol. 44, No. 8, 2001, pp. 76-82.

 

27.  N. Ye, and Q. Chen, “An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems.” Quality and Reliability Engineering International, Vol. 17, No. 2, 2001, pp. 105 - 112.

 

26.  N. Ye, “Robust intrusion tolerance for information systems.” Information Management and Computer Security, Vol. 9, No. 1, 2001, pp. 38-43.

 

25.  N. Ye, “A hierarchical, distributed architecture of command and control.” Information, Knowledge, Systems Management, Vol. 2, No. 3, 2001, pp. 261-269.

 

24.  X. Li, and N. Ye, “Decision tree classifiers for computer intrusion detection.” Journal of Parallel and Distributed Computing Practices, Vol. 4, No. 2, 2001, pp. 179-190.

 

23.  S. M. Emran, and N. Ye, “A system architecture for computer intrusion detection.” Information, Knowledge, Systems Management, Vol. 2, No. 3, 2001, pp. 271-290.

 

22.  N. Ye, Q. Zhong, and G. Rahn, “Confidence assessment of quality prediction from process measurement in sequential manufacturing processes.” IEEE Transactions on Electronic Packaging  Manufacturing, Vol. 23, No. 3, 2000, pp. 177-184.

 

21.  N. Ye, P. Banerjee, A. Banerjee, and F. Dech, “A comparative study of assembly planning in traditional and virtual environments.” IEEE Transactions on Systems, Man, and Cybernetics, Vol. 29, No. 4, 1999, pp. 546-555.

 

20.  A. Banerjee, P. Banerjee, N. Ye, and F. Dech, “Assembly planning effectiveness using virtual reality.” Presence: Teleoperators and Virtual Environments, Vol. 8, No. 2, 1999, pp. 204-217.

 

19.  N. Ye, “The MDS-ANAVA technique for assessing knowledge representation differences between skill groups.” IEEE Transactions on Systems, Man and Cybernetics, Vol. 28, No. 5, 1998, pp. 586-600.

 

18.  N. Ye, “Neural networks approach to user modeling and intelligent interface: A review and reappraisal.” International Journal of Human-Computer Interaction, Vol. 9, No. 1, 1997, pp. 3-24.

 

17.  N. Ye, “Objective and consistent analysis of group differences in knowledge representation.” International Journal of Cognitive Ergonomics, Vol. 1, No. 2, 1997, pp. 169-187.

 

16.  N. Ye, and B. Zhao, “Automatic setting of article format through neural networks.” International Journal of Human-Computer Interaction, Vol. 9, No. 1, 1997, pp. 81-100.

 

15.  N. Ye, “The presentation of knowledge and state information for system fault diagnosis.” IEEE Transactions on Reliability, Vol. 45, No. 4, 1996, pp. 638-645.

 

14.  N. Ye, “A hierarchy of system-oriented knowledge for diagnosis of manufacturing system faults.” Information and System Engineering, Vol. 2, No. 2, 1996, pp. 79-103.

 

13.  N. Ye, “Self-adapting decision support for interactive fault diagnosis of manufacturing systems.” International Journal of Computer Integrated Manufacturing, Vol. 9, No. 5, 1996, pp. 392-401.

 

12.  N. Ye, and D. A. Urzi, “Heuristic rules and strategies of assembly planning: Experiment and Implications in the design of assembly decision support system.” International Journal of Production Research, Vol. 34, No. 8, 1996, pp. 2211-2228.

 

11.  N. Ye, and G. Salvendy, “Expert-novice knowledge of computer programming at different levels of abstraction.” Ergonomics, Vol. 39, No. 3, 1996, pp. 461-481.

 

10.  N. Ye, and G. Salvendy, “An objective approach to exploring skill differences in strategies of computer program comprehension.” Behaviour & Information Technology, Vol. 15, No. 3, 1996, pp. 139-148.

 

9.  C. B. Swider, and N. Ye, “Effect of information at different stages of users’ training.” Perceptual and Motor Skills, Vol. 83, 1996, pp. 747-754.

 

8.  L. K. Hennings, and N. Ye, “Interaction of screen distances, screen letter heights and source document distances.” Interacting with computers, Vol. 8, No. 4, 1996, pp. 311-322.

 

7.  N. Ye, and B. Zhao, “A hybrid intelligent system for fault diagnosis of advanced manufacturing system.” International Journal of Production Research, Vol. 34, No. 2, 1996, pp. 555-576.

 

6.  R. D. Caldwell, N. Ye, and D. A. Urzi, “Re-engineering the product development cycle and future enhancements of the computer integrated manufacturing environment.” International Journal of Computer Integrated Manufacturing, Vol. 8, No. 6, 1995, pp. 441-447.

 

5.  N. Ye, and G. Salvendy, “Quantitative and qualitative differences between experts and novices in chunking computer software knowledge.” International Journal of Human-Computer Interaction, Vol. 6, No. 1, 1994, pp. 105-118.

 

4.  N. Ye, B. Zhao, and G. Salvendy, “Neural-networks-aided fault diagnosis in supervisory control of advanced manufacturing systems.” International Journal of Advanced Manufacturing Technology, Vol. 8, 1993, pp. 200-209.

 

3.  N. Ye, and G. Salvendy, “Cognitive engineering based knowledge representation in neural networks.” Behaviour & Information Technology, Vol. 10, No. 5, 1991, pp. 403-418.

 

2.  C. Zhong, and N. Ye “JSD methodology in software engineering.” Journal of Computer Science, No. 6, 1988, pp. 33-38.

 

1.  C. Zhong, and N. Ye, “The conceptual framework of software engineering.” Journal of Computer Science, No. 1, 1988, pp. 50-56.

  

Book Publishing

 

Books

 

3.   N. Ye, Secure Computer and Network Systems: Modeling, Analysis and Design, London, UK: John Wiley & Sons, 2008, ISBN 978-0-470-02324-2 (304 pages).

**Out now!** Read more and buy online at Secure Computer and Network Systems : Modeling, Analysis and Design

 

2.      N. Ye (ed.), The Handbook of Data Mining. Mahwah, New Jersey: Lawrence Erlbaum Associates, 2003, ISBN 0-8058-4081-8. (689 pages)

 

1.      H. K. Bhargava, and N. Ye (eds.), Computational Modeling and Problem Solving in the Networked World. Norwell, MA: Kluwar Academic Publishers, 2003, ISBN 1-4020-7295-3. (325 pages)

 

Book Chapters

 

6. X. Li, and N. Ye, “Chapter 16. Intrusion detection and information infrastructure protection,” in H. Chen, T.S. Raghu, R. Ramesh, A. Vinze, and D. Zeng (eds.), Handbooks in Information Systems, Vol. 2.Information Security, Elsevier, 2007.

 

5.      N. Ye, “Dependability of Computer and Network Systems”, in A. B. Badiru (ed.), The Handbook of Industrial and Systems Engineering, Boca Raton, Florida: CRC Press, 2005, ISBN 0-8493-2719-9, pp. 21-1 to 21-18.

 

4.      N. Ye, “Network security and quality of service,” in M. D. Licker (ed.), McGraw-Hill Yearbook of Science & Technology 2005, New York, New York: McGraw Hill, 2005, pp. 232-235. ISBN 0-07-144504-8 (426 pages)

 

3.      N. Ye, “Mining computer and network security data,” in N. Ye (ed.), The Handbook of Data Mining. Mahwah, New Jersey: Lawrence Erlbaum Associates, 2003, pp. 617-636. ISBN 0-8058-4081-8. (689 pages)

 

2.      Y.-C. Lai, Z. Liu, and N. Ye, “Nonlinear time series analysis,” in N. Ye (ed.), The Handbook of Data Mining. Mahwah, New Jersey: Lawrence Erlbaum Associates, 2003, pp. 305-340.

 

1.      N. Ye, “Process Control,” In B. Wang (ed.), Integrated Product, Process and Enterprise Design. Chapman & Hall, 1998, pp. 225-245.

 

Patents

 

1.      N. Ye, and X. Li, “Method for Classifying Data Using Clustering and Classification Algorithm Supervised,” United State Patent No. 6907436 (issued June 14, 2005), ASU Case No. M1-015.

 

2.      N. Ye, X. Li, T. Farley, and B. Harish, “Job Scheduling Techniques to Reduce the Variance of Waiting Time,” United State Patent Application No. 20040237087 (Patent exposure filed November 25, 2004; Patent filed May 10, 2006.), ASU Case No. M3-069 and ASU Case No. M3-080.

 

RESEARCH AWARDS

 

Sponsored Research – External Grants, Contracts and Awards: $8M+

 

1.      Department of Defense through Air Force Office of Scientific Research

MURI CIP: A Complex Adaptive System Approach to QoS Assurance and Stateful Resource Management for Dependable Information Infrastructure”

N. Ye (Principal Investigator)

May 2001 – December 2006

 

2.      Advanced Research and Development Activities/Air Force Research Laboratory

“Cyber Signal/Noise Characteristics and Sensor Models for Early Cyber Indications and Warning”

 N. Ye (Principal Investigator)

 September 2003 – February 2005

 Subcontractors: Symantec Corporations and AT&T Research Labs

 

3.      Air Force Office of Scientific Research

“Equipment for Research on Intrusion and Damage Assessment”

N. Ye (Principal Investigator)

May 2004 – April 2005

 

4.      Air Force Office of Scientific Research

“Automatic Extraction and Coordination of Audit Data and Features for Intrusion and Damage Assessment”

N. Ye (Principal Investigator)

January 2003 – December 2005

 

5.      Symantec Corporation

“Computer Network Security and QoS”

N. Ye (Principal Investigator)

April 2003 – March 2006

 

6.      Air Force Office of Scientific Research

“Equipment for Research on Dependable Information Infrastructure”

N. Ye (Principal Investigator)

May 2002 – April 2003

 

7.      National Science Foundation

“CAVERN - The CAVE Research Network”

N. Ye (co-PI)

October 1998 – September 2003

 

8.      United States Air Force Research Laboratory

“QoS and Control-Theoretic Techniques for Intrusion Tolerance”

N. Ye (Principal Investigator)

April 2001 – March 2002

 

9.      Air Force Office of Scientific Research

“A Process Engineering Approach to the Development and Integration of Intrusion Detection Techniques”

N. Ye (Principal Investigator)

April 1998 – December 2001

 

10.  Defense Advanced Research Projects Agency

“Modeling, Analysis and Control of Heterogeneous-Agent Enterprise Systems in E-Commerce”

N. Ye (Principal Investigator)

January 2001 – December 2001

 

11.  Symantec Corporation

“Internet Security Software Gifts”

N. Ye (Principal Investigator)

September 2001

 

12.  Microsoft Corporation

“Education Software Gifts”

N. Ye (co-PI)

September 2001

 

13.  National Institute of Standards and Technology

“Modeling and Simulation of Supply Chain Enterprises as Complex Adaptive Systems”

N. Ye (Principal Investigator)

September 2000 – September 2001

 

14.  National Science Foundation

“Scalable Theory of Enterprises: Control versus Emergence”

N. Ye (co-PI)

August 2000 – July 2001

 

15.  Defense Advanced Research Projects Agency

“The Monitoring, Detection, Isolation and Assessment of Information Warfare Attacks through Multi-Level, Multi-Scale System Modeling and Model-based Technology”

N. Ye (Principal Investigator)

May 1999 – May 2001

 

16.  Air Force Office of Scientific Research

“Computer Network Equipment for Intrusion Detection Research”

N. Ye (Principal Investigator)

March 1999 – March 2000

 

17.  Air Force Research Laboratory

“A Process Control and Diagnosis Approach to Indications and Warning of Attacks on Computer Networks”

N. Ye (Principal Investigator)

June 1998 – September 1999

 

18.  National Institute of Standards and Technology

“Simulation of Manual Assembly Operations”

N. Ye (Principal Investigator)

May 1999 – September 1999

 

19.  Air Force Office of Scientific Research

“Model-based Assessment of Campaign Plan Performance under Uncertainty”

N. Ye (Principal Investigator)

January 1998 – December 1998

 

20.  National Institute of Standards and Technology

“Production Systems Engineering Information Search and Archive”

N. Ye (Principal Investigator)

June 1998 – September 1998

 

21.  National Institute of Standards and Technology

“Production Systems Engineering”

N. Ye (Principal Investigator)

January 1998 – September 1998

 

22.  National Institute of Standards and Technology

“An Information Pipeline for Production Systems Engineering”

N. Ye (Principal Investigator)

December 1997 – September 1998

 

23.  Motorola Manufacturing Research Center

“Confidence Assessment of Product Quality from Process Measurement”

N. Ye (Principal Investigator)

August 1997 – August 1998

 

24.  National Science Foundation

“Evaluation of System Integration Solutions for Computer Aided Assembly Planning”

N. Ye (Principal Investigator)

July 1997 – June 1998

 

25.  National Institute of Standards and Technology

“Production Systems Engineering in Virtual Environments”

N. Ye (Principal Investigator)

June 1997 – August 1997

 

26.  National Science Foundation

“A Cognitive Engineering Approach to the Interface Design of Decision Support Systems for Machine Fault Diagnosis”

N. Ye (Principal Investigator)

September 1992 – February 1996

 

27.  Office of Naval Research

MURI: Three-Dimensional Visualization and Interaction for the Design of Large-Scale Manufactured Objects”

N. Ye (co-PI)

October 1992 – September 1995

 

28.  National Science Foundation

“Research Experience for Undergraduates”

N. Ye (Principal Investigator)

March 1993 – February 1994

 

(Last updated on September 5, 2007)