Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yin Pan is active.

Publication


Featured researches published by Yin Pan.


International Journal of General Systems | 1996

ON THE COMPUTATION OF UNCERTAINTY MEASURE IN DEMPSTER-SHAFER THEORY

David Harmanec; Germano Resconi; George J. Klir; Yin Pan

An algorithm for computing the recently proposed measure of uncertainly AU for Dempster-Shafer theory is presented. The correctness of the algorithm is proven. The algorithm is illustrated by simple examples. Some implementation issues are also discussed.


International Journal of General Systems | 1997

BAYESIAN INFERENCE OF FUZZY PROBABILITIES

Yin Pan; Bo Yuan

Abstract In this paper, we propose a new method to generalize Bayesian methods both for fuzzy likelihood and fuzzy prior probabilities. Based on interval Bayesian inference developed by Pan and Klir [1996], the proposed method overcomes the difficulty in developing a normalized fuzzy Bayesian inference recognized in the literature [Friihwirth-Schnatter, 1993].


conference on information technology education | 2008

Decentralized virtualization in systems administration education

Bill Stackpole; Jason Koppe; Thomas Haskell; Laura Guay; Yin Pan

The Networking and Systems Administration Laboratories are vital components of the applied academic experience of the students of the Networking, Security and Systems Administration Department. Students are currently able to implement multiple heterogeneous computing infrastructures using Symantecs Ghost Solution Suite. This paper presents and explores virtual lab environments that support alternative preparation solutions that will increase laboratory utilization, student productivity, and provide students with exposure to virtualization technology.


Proceedings of the 4th conference on Information technology curriculum | 2003

Forensic course development

Luther Troell; Yin Pan; Bill Stackpole

In recent years, digital technology has experienced dramatic growth. Many of these advances have also provided malicious users with the ability to conceal their activities and destroy evidence of their actions. This has raised the need of developing specialists in computer digital forensics -- the preservation, identification, extraction and documentation of evidence stored in the form of digitally encoded information (data).In this paper, we present the procedures and rationale used in the development of forensic courses at both the undergraduate and the graduate levels. We also demonstrate our decision making process of selecting topics included in each course.


ieee international conference on fuzzy systems | 1996

Bayesian inference based on fuzzy probabilities

Yin Pan; George J. Klir; Bo Yuan

We propose fuzzy Bayesian inference on the basis of interval Bayesian inference developed by Pan and Klir. The proposed method overcomes the difficulty in developing a normalized fuzzy Bayesian inference recognized in the literature.


Journal of Intelligent and Fuzzy Systems | 1997

Bayesian Inference Based on Interval-Valued Prior Distributions and Likelihoods

Yin Pan; George J. Klir

Although Bayesian inference has been successful in many applications, its serious limitation is the requirement that exact prior probabilities be available. It has increasingly been recognized that this requirement is often not realistic. To overcome this limitation of classical Bayesian inference, we investigate a generalized Bayesian inference, in which prior probabilities as well as likelihoods are interval-valued. Employing the tools of interval analysis and the theory of imprecise probabilities, we develop a method for exact calculation of interval-valued posterior probabilities for given interval-valued prior probabilities and precise or interval-valued likelihoods. This method is further generalized for fuzzy likelihood and fuzzy probabilities later. The classical Bayesian inference is a special case of our method.


global communications conference | 2005

Route robustness of a multi-meshed tree routing scheme for Internet MANETs

Nirmala Shenoy; Yin Pan; Darren Narayan; David S. Ross; Carl V. Lutzer

We propose a layer 2 routing and forwarding scheme called multi-meshed tree (MMT) routing for MANETs connected to Internet. The specifications of this scheme were drawn from unique features of Internet MANETs. Evaluation of the robustness of routes in this scheme is provided along with the route failure notification delays, which is an important performance parameter of this scheme. Where available we have substantiated our results with simulation data. The results clearly show the significance of the redundant routes offered by MMT


conference on information technology education | 2004

Forensic course development: one year later

Luther Troell; Yin Pan; Bill Stackpole

In a paper presented in 2003, <i>Forensic Course Development</i>, the authors described the procedures and rationale used for the development of an undergraduate and a graduate computer and network forensic course at Rochester Institute of Technology (RIT). After the undergraduate course was taught in the spring quarter of 2003, the contents of the lecture and lab materials, outcomes of the course, and student feedback were reviewed. This feedback will help improve both the instructional materials and their delivery. This papers focus is on the development of the computer and network forensic course, as well as the changes made during the review process to improve the computer and network forensic course.


2016 IEEE Symposium on Technologies for Homeland Security (HST) | 2016

Automated malware detection using artifacts in forensic memory images

Rayan Mosli; Rui Li; Bo Yuan; Yin Pan

Malware is one of the greatest and most rapidly growing threats to the digital world. Traditional signature-based detection is no longer adequate to detect new variants and highly targeted malware. Furthermore, dynamic detection is often circumvented with anti-VM and/or anti-debugger techniques. Recently heuristic approaches have been explored to enhance detection accuracy while maintaining the generality of a model to detect unknown malware samples. In this paper, we investigate three feature types extracted from memory images - registry activity, imported libraries, and API function calls. After evaluating the importance of the different features, different machine learning techniques are implemented to compare performances of malware detection using the three feature types, respectively. The highest accuracy achieved was 96%, and was reached using a support vector machine model, fitted on data extracted from registry activity.


conference on information technology education | 2012

Game-based forensics course for first year students

Yin Pan; Sumita Mishra; Bo Yuan; Bill Stackpole; David I. Schwartz

This paper focuses on the design and development of a game-based forensics course. This course uses the game-based learning (GBL) approach that builds the game in a real computing environment that has direct access to actual forensics tools from a forensics machine and the evidence from a suspect machine. Interactive visualizations will be used to help students to understand the intangible and inaccessible abstract concepts such as deleted/hidden/encrypted/over-written digital evidence.

Collaboration


Dive into the Yin Pan's collaboration.

Top Co-Authors

Avatar

Bo Yuan

Rochester Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Sumita Mishra

Rochester Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Bill Stackpole

Rochester Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Nirmala Shenoy

Rochester Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

David I. Schwartz

Rochester Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Luther Troell

Rochester Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Daryl Johnson

Rochester Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge