Skip to main content

Yi Yang

Associate Professor
Office: Ryan 414


  • PhD in Computer Science and Engineering, Pennsylvania State University (University Park), 2010


  • 2018, Faculty Member of Alpha Lambda Delta Honor Society, at Fontbonne University
  • 2016, Faculty Member of Phi Kappa Phi Honor Society, at Fontbonne University
  • 2013, Burns Faculty Fellowship, School of Engineering, the Catholic University of America, Washington DC
  • 2008, Research Assistant Award, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA

Courses Taught

  • CIS 432: Ethical Hacking, Fontbonne University
  • CIS 380: Web Development Security, Fontbonne University
  • CIS 250: Algorithms and Data Structures, Fontbonne University
  • CIS 215: Database Fundamental and Web Server Programming, Fontbonne University
  • CIS 120: Overview of Computer and Information Science, Fontbonne University

Scholarly Interests

  • Cybersecurity
  • Network Security
  • Computer Science


Jianqun Cui, Shuqin Cao, Yanan Chang, Libing Wu, Dan Liu, and Yi Yang, “An Adaptive Spray and Wait Routing Algorithm Based on Quality of Node in Delay Tolerant Network”, IEEE Access journal, 2019

Chu Huang, Sencun Zhu, and Yi Yang, “An Evaluation Framework for Moving Target Defense Based on Analytic Hierarchy Process”, EAI Endorsed Transactions on Security and Safety, Volume 4, Issue 13, 2018

Khoa Trieu and Yi Yang, “Artificial Intelligence-Based Passwords Brute Force Attack”, MWAIS 2018 (the 13th Midwest Association for Information Systems Annual Conference), St. Louis, MO, 2018

Yi Yang, Sencun Zhu, and Guohong Cao, “Improving Sensor Network Immunity under Worm Attacks: A Software Diversity Approach”, Ad Hoc Networks, 2016

Uthaiwan Srimongkolpitak, Yi Yang, and Hang Liu, “Sensor Source Location Privacy based on Random Perturbations”, International Journal of Software and Informatics (IJSI), Vol.8, No.2, Special Issue On Information and System Security, 2015

Justin Cappos, Lai Wang, Richard Weiss, Yi Yang, and Yanyan Zhuang, “BlurSense: Dynamic Fine-Grained Access Control for Smartphone Privacy”, IEEE Sensors Applications Symposium (IEEE SAS), 2014.

Conference Presentations

“Artificial Intelligence-Based Passwords Brute Force Attack and Its Defense”, presentation at MWAIS 2018 (the 13th Midwest Association for Information Systems Annual Conference), St. Louis, MO, 2018

“Sensor Worm Defense based on Software Diversity”, Invited Talk to St. Louis Unix Users Group (, July 2017

“How to Protect Yourself in a Cybersecurity Era”, invited talk to Wednesday’s all women’s Club in St. Louis, January 6, 2016

“Cybercrime and Forensics”, St. Louis Chapter of the High Tech Crime Investigators Association, June 2014

“Cyber Security: How to Keep You and Your Business Safe”, Clayton Chamber of Commerce, St Louis, MO, January 2014

“BlurSense: Dynamic Fine-Grained Access Control for Smartphone Privacy”, Presentation in KanSec 2013: Fourth Greater Kansas Area Security Workshop, November 2013

“Introduction to Cybercrime and Security”, Talk in St Louis Science Center, September 2013.

Professional Memberships

  • Women in Cybersecurity (WiCys)
  • ISACA (St. Louis Chapter)
We are using cookies to give you the best experience. You can find out more about which cookies we are using or switch them off in privacy settings.
AcceptPrivacy Settings


  • GDPR Privacy Policy
  • Google Analytics

GDPR Privacy Policy

Privacy Policy

Overall Policy

Thank you for visiting our website. We’re pleased to share our policy regarding the use of information received here. Privacy is a matter of concern to us. We are committed to protecting your privacy and the security of the information that you may provide to us.

Personal Information

We do not track individual users. Your email address or other personal information is not collected unless you provide it on a form, survey or application. We will not sell or otherwise make available any personally identifiable information to any organization not directly affiliated with us. We will comply with legitimate government or legal requests as necessary to protect our organization or to comply with laws.

Traffic Analysis

We analyze traffic to this site. We collect statistical data on an aggregated basis through Google Analytics. For example, we collect information about the domain names of servers that bring visitors to our site. We count the number of visitors and keep track of where they go on our site. Such information allows us to find out what areas users visit most frequently and what services they access the most, which enables us to create a better overall user experience. To gather such data, we use cookie technology, which collects data in aggregate form, not by individual user.


As referenced above, we use cookie technology for traffic analysis. Cookies are small pieces of information stored by your browser on your computer’s hard drive. The cookies placed by our server do not gather personal information about you, do not provide any way for us to contact you and do not gather information about your computer. The cookies simply allow us to enhance our site by letting us know what sections are visited most often. The use of cookies is common on the Internet, and our use of them is similar to that of other reputable online organizations.

Links To Other Sites

Our site contains links to other sites and Internet resources. We are not responsible for the privacy practices or the content of these third-party websites and Internet resources.

Updates To Privacy Policy

We may update the privacy policy periodically, and we encourage visitors to review them on a regular basis.

Last revised: June 2015

Google Analytics