Research

CV;

 

Research Interests

  • Digital Image/Video Processing
  • H.265/HEVC
  • Machine Learning
  • Computer Vision;

 

Sponsored Projects and Contracts

  • PI: “Template Matching and Tracking for Objects in Motion”, Rifle Development Corp, $13,500, December 2017 – June 2019;
  • PI: “Camera on Gun System”, Meggitt Training Systems, $27,600, December 2017 – June 2019;
  • Senior Personnel: National Science Foundation Type – I Project, “Collaborative Research: Real World Relevant Security Labware for Mobile Threat Analysis and Protection Experience”, $140,002.00, 09/2013 – 08/2016, NSF Award #: 1244697.
  • Co-PI (PI Dr. Guillermo Francia): US National Science Foundation, Major Research Instrumentation Program, “MRI-R2: Acquisition for the Critical Infrastructure Security and Assessment Laboratory (CISAL)”, $415,600.00, 05/2010 – 04/2013, NSF Award #: 0959687;
  • Co-PI (PI Dr. Jidong Yang): SPSU Mini Grant “Analysis of Traffic Video Images for Safety Evaluation”, $20,000, February – June, 2014;
  • PI (co-PI: Dr. Monica Trifas), "Secure Patient Information and Privacy in Medical Images", US National Science Foundation, Collaborative Research Experience (NSF-CREU) Program, 10/2008 - 05/2009, $12,500 ($9,000 from NSF and $3,500 from JSU Matching Fund);
  • PI (co-PI: Dr. Monica Trifas), "Video Compression Techniques for Wireless Networks", Jacksonville State University Faculty Research Grant, 10/2009 - 08/2010, $5,460;

 

Journal Editorship

  • Editor-in-Chief: International Journal of Monitoring and Surveillance Technologies Research, 2013 – 2015;
  • Managing Editor: International Journal of Monitoring and Surveillance Technologies Research, 2015 – 2018;

 

Journal Publications

  1. M. Yang, et. al., " Machine Learning Based Coding Decision Making in H.265/HEVC CTU Division and Intra Prediction", International Journal of Mobile Computing and Multimedia Communication, Volume 11, Issue 2, 2020;
  2. Y. Li, St Chakravarty, S. Sun, Z. Tan, L. Sheng, M. Yang, X. Wu, “A Passive Detection and Tracking Divers Method Based on Energy Detection and EKF Algorithm”, Journal of Cluster Computing (Impact Factor 1.96), January 2018;
  3. Y. Li, Z. Jin, Y. Su*, M. Yang, S. Xiao “An Environment-Friendly Multipath Routing Protocol for Underwater Acoustic Sensor Networks”, Journal of Sensors (Impact Factor 2.033), 2017;
  4. Yang, M., Chen, L., Rawat, D., Hao, L., “HEVC/H.265 Rate Control in Real-time Transmission over 5G Mobile Networks”, IEEE Multimedia Communications Technical Committee (MMTC) E-Letter (invited paper);
  5. M. Yang, R. Rutherfoord, and E. Jung, “Learning Cloud Computing and Security through CloudSim Simulation”, Information Security Education Journal, Vol. 1, No. 1, June 2014;
  6. P. Bhattacharya, L. Yang, M. Guo, K. Qian, M. Yang, “Learning Mobile Security with Labware”, IEEE Security and Privacy Magazine, Volume 12, Issue 1, 2014;
  7. M. Yang, D. Wang, and N. Bourbakis, “Optimization Of Power Allocation In Multimedia Wireless Sensor Networks”, International Journal of Monitoring and Surveillance Technology Research, Volume 1, Issue 1, 2013;
  8. E. Jung, C.-C. Hung, M. Yang, and S. Choi “An Locking and Unlocking Primitive Function of FSM-modeled Sequential Systems Based on Extracting Logical Property”, INFORMATION - An International Interdisciplinary Journal, Volume 16, Issue 4, 2013;
  9. M. Yang, C.-C. Hung, and E. Jung, “Secure Information Delivery through High Bitrate Data Embedding within Digital Video and its Application to Audio/Video Synchronization”, International Journal of Information Security and Privacy, Volume 6, Issue 4, 2012;
  10. A. Rwabutaza, M. Yang, and N. Bourbakis, “A Comparative Survey On Cryptology- Based Methodologies”, International Journal of Information Security and Privacy, Volume 6, Issue 3, 2012;
  11. M. Yang, M. Trifas, L. Chen, L. Song, D. Buenos-Aires, and J. Elston, “Secure Patient Information and Privacy in Medical Imaging”, Journal of Systemics, Cybernetics and Informatics, Vol. 8, No. 3, pp. 63-66, 2010;
  12. M. Yang, M. Trifas, G. Francia, and L. Chen, “Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy”, International Journal of Information Security and Privacy, Vol. 3, Issue 3, 2009;
  13. L. Chen, W.C. Hu, M. Yang, and L. Zhang, “Security and Privacy Issues in Secure E- mail Standards and Services”, International Journal of Information Security and Privacy, Vol. 3, Issue 3, 2009;
  14. M. Yang and N. Bourbakis, "An Efficient Packet Loss Recovery Methodology for Video Streaming over IP Networks", IEEE Transactions on Broadcasting, Vol. 55, No. 2, pp. 190-201, June 2009;
  15. M. Yang and N. Bourbakis, “Analysis and Modeling of Network Traces for Video Transmission over IP Networks”, Journal of Integrated Design and Process Science, Vol. 11, No. 1, pp. 15-32, Mar 2009;
  16. M. Yang and N. Bourbakis, “High Bitrate Multimedia Information Hiding for Digital Image/Video under Lossy Compression”, SPIE Journal of Electronic Imaging, Vol. 16, Issue 1, 2007;
  17. M. Yang, S. Li, and N. Bourbakis, “Data-Image-Video Encryption”, IEEE Potentials Magazine, Vol. 23, No. 3, pp. 28-34, August 2004;

 

Book Chapters

  1. L. Chen, N. Shashidhar, S. Yuan, and M. Yang, “Security in Wireless Metropolitan Area Networks”, in Wireless Network Security: Theories and Applications, September 25, 2013, Springer, ISBN-10: 3642365108;
  2. W.-C. Hu, N. Kaabouch, L. Chen, and M. Yang, “Technologies for Location-Aware Mobile, Online Map Prefetching and Caching”, Wen-Chen Hu and Naima Kaabouch, editors, Sustainable ICTs and Management Systems for Green Computing, IGI Global, 2012;
  3. W.C. Hu, N. Kaabouch, L. Chen, and M. Yang, “M-320: Incremental Location Matching for Human Travel Route Anomaly Detection”, in Handbook of Research on Mobile Services, IGI Global, Editor: In Lee, 2012;
  4. L. Chen, W.C. Hu, M. Yang, and L. Zhang, "Security and Privacy Issues in Secure E- Mail Standards and Services", in Security and Privacy Assurance in Advancing Technologies: New Developments, pp. 174-185, Information Science Publishing (IGI Global), 2011. ISBN-13: 978-1609602000 (editor: Dr. Hamid Nemati);
  5. L. Chen, N. Shashidhar, S. Yuan, and M. Yang, “Security in Wireless Metropolitan Area Networks (WMANs)”, in Security and Privacy Assurance in Advancing Technologies: New Developments, pp. 174-185, Information Science Publishing (IGI Global), 2011. ISBN-13: 978-1609602000;
  6. M. Yang, M. Trifas, G. Francia, III, L. Chen, and Y. Hu, “Multimedia Information Security and Privacy – Theories and Applications”, Book Chapter, Security and Privacy Assurance in Advancing Technologies: New Developments, IGI Global Publishing, 2011;
  7. L. Chen, W.C. Hu, M. Yang, and L. Zhang, “Applied Cryptography in E-mail Services and Web Services”, Book Chapter, Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering, Publisher: IGI Global Publishing, 2010;
  8. L. Chen, S. Wu, Y. Ji, and M. Yang, “Mobile and Handheld Security”, Book Chapter, Handheld Computing for Mobile Commerce: Applications, Concepts and Technologies, Publisher: Information Science Reference, February 2010, ISBN-10: 1615207619;
  9. M. Yang, N. Bourbakis, M. Trifas, and L. Chen, “Multimedia Information Security – Cryptography and Steganography”, Book Chapter, Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering, IGI Global Publishing, 2009;

 

Conference Publications

  1. J. Li, W. Jiang, M. Yang, Y. Xie, Z. Li, " A Machine Learning Method for Optimizing Partition of Prediction Block in Coding Unit in H.265/HEVC", 12th EAI International Conference on Mobile Multimedia Communications, July 2020;
  2. L. Chen, M. Yang, H. Wimmer, B. Wilbert, " A Practical Low-Cost Security Solution for Log Management and File Integrity Monitoring", 12th EAI International Conference on Mobile Multimedia Communications, July 2020;
  3. Tseng, T.-T., Yang, M., et. al., "Packaging Method to Assist in the Distribution and Execution of Bioinformatics Software", 2019 National Conference of Undergraduate Research, April, 2019, Kennesaw, GA;
  4. Marktanner, M., Merkel, A., Yang, M., “The Use of Interactive Socioeconomic Data Visualization for a More Informed Public Debate”, 6th International Conference in Software Engineering Research and Innovation (CONISOFT’18), San Luis Potosi, Mexico, October 24-26, 2018.
  5. M. Yang, Y. Xie, J. Yu, Z. Wang, and T. Wu, "Using Deep Learning Neural Network for Block Partitioning in H.265/HEVC", 10th EAI International Conference on Mobile Multimedia Communications, Chongqing, China, June 20-22, 2018;
  6. Y. Xie, M. Yang, J. Yu, W. Jiang, and L. Hao, "Using CNN for Encoder Optimization in H.265/HEVC", 10th EAI International Conference on Mobile Multimedia Communications, Chongqing, China, July 13-14, 2017;
  7. L. Chen, M. Yang, L. Hao, and D. Rawat, "Framework and Challenges: H.265/HEVC Rate Control in Real-time Transmission over 5G Mobile Networks", 10th EAI International Conference on Mobile Multimedia Communications, Chongqing, China, July 13-14, 2017;
  8. L. Chen, N. Shashidhar, D. Rawat, M. Yang, and C. Kadlec, "Investigating the Security and Digital Forensics of Video Games and Gaming Systems", 2016 IEEE ICNC, SPAN Workshop, Kauai, Hawaii, February 15-18, 2016;
  9. L. Chen, S. Yuan, Q. Liu, M. Yang, and B. Wilbert, "A Practical Low-Cost Security Solution for Log Management and File Integrity Monitoring", 2015 IEEE ICCC, IWCSF Workshop, Shenzhen, November 2015;
  10. Liu, Y., Sung, A., Yang, M., Chen, L., and Liu Q., “A Method to Detect AAC Audio Forgery”, in proceedings of 8th International Conference on Mobile Multimedia Communications, Chengdu, China, May 2015;
  11. M. Yang, K. Qian, and R. Rutherfoord, “Learning Cloud Computing and Security through CloudSim Simulation”, 2014 Information Security Curriculum Development Forum (InfoSecCD 2014), Kennesaw, GA, October 2014;
  12. M. Yang, L. Chen, and W. Xiong, “Compression/Transmission Power Allocation In Multimedia Wireless Sensor Networks”, 2014 IEEE International Conference on Computing, Networking and Communications (ICNC 2014), Honolulu, HI, Feb. 2014;
  13. G. Francia, D. Lo, K. Qian, M. Yang, and X. Hu, “Learning Cloud Computing And Cloud Security By Simulation”, Technology for Education and Learning (TEL 2013), Marina del Rey, CA, USA, November 11 – 13, 2013;
  14. C.-C. Hung, E. Casper, B.-C. Kuo, W. Liu, E. Jung, M. Yang, “A Quantum-Modeled Fuzzy C-Means Clustering Algorithm For Remotely Sensed Multi-Band Image Segmentation”, IEEE International Geoscience and Remote Sensing Symposium, Melbourne, Australia, July 21 – 26, 2013;
  15. M. Guo, K. Qian, M. Yang, K.-S. Ma, L. Hong, and L. Yang, “Android-Based Mobile Sensory System Labware for Embedded System Education”, IEEE International Conference on Advanced Learning Technology, Beijing, China, July 15-18, 2013;
  16. K. Qian, M. Yang, M. Guo, P. Bhattacharya, and L. Tao, “Authentic Learning for Computer Network and Security with Mobile Device-based Hands-on Labware”, 18th Annual Conference on Innovation and Technology in Computer Science Education, University of Kent, Canterbury, UK, July 1-3, 2013;
  17. M. Yang, K. Qian, M. Guo, P. Bhattacharya, G. Francia, and L. Yang, “Enhance Computer Networks Learning with Hands-on Mobile Device Based Labware”, 2013 Special Interest Group on Computer Science Education: The Changing Face of Computing, Denver, CO, March 6-9, 2013;
  18. K. Qian, M. Yang, X. Hu, and L. Tao, “Learning Network Concepts with Mobile Based Labware”, World Congress on Engineering and Computer Science 2012 (WCECS 2012), San Francisco, 24 – 26, October, 2012;
  19. M. Guo, P. Bhattacharya, M. Yang, K. Qian, and L. Yang, “Work in Progress: Real World Relevant Security Labware for Mobile Threat Analysis and Protection Experience”, 2012 IEEE Conference on Frontiers in Education, Seattle, Oct. 2012;
  20. E. Jung, C.-C. Hung, S. Choi, and M. Yang, “An Efficient Locking and Unlocking Method of Sequential Systems”, 2012 ACM Research in Applied Computation Symposium (RACS 2012), San Antonio, TX, 23 – 26, October, 2012;
  21. E. Casper, C.-C. Hung, E. Jung, and M. Yang, “A Quantum-Modeled K-Means Clustering Algorithm for Multi-banded Image Segmentation”, 2012 ACM Research in Applied Computation Symposium (RACS 2012), San Antonio, TX, October, 2012;
  22. S. Yuan, L. Chen, and M. Yang, “Minimizing Inter-channel Attacks in WDM Optical Networks”, 2012 4th International Conference on Future Computer and Communication (ICFCC 2012), Hong Kong, China, 3 – 4, August, 2012;
  23. M. Yang, and D. Wang, “Optimization of Power Allocation in Multimedia Wireless Sensor Networks”, 2011 International Conference on Intelligent Network and Computing (ICINC 2011), Bangkok, Thailand, December 2-4, 2011;
  24. M. Trifas, G. Francia, and M. Yang, “The Joint Academic Program Between Jacksonville State University and Taizhou University: From Inception to Implementation”, The 8th International Conference on Cybernetics and Information Technologies, Systems and Applications (CITSA 2011), Orlando, FL, July, 2011;
  25. M. Yang, L. Chen, and S. Yuan, “Secure Processing and Delivery of  Medical Images for Patient Information Protection”, 10th International Conference on Security and Management (SAM'11), Las Vegas, NV, USA, July 18-21, 2011;
  26. M. Trifas, G. Francia, and M. Yang, “The Joint Academic Program Between Jacksonville State University and Taizhou University: From Inception to Implementation”, The 8th International Conference on Cybernetics and Information Technologies, Systems and Applications (CITSA 2011), Orlando, FL, July, 2011;
  27. M. Yang, L. Chen, and S. Yuan, “Secure Processing and Delivery of Medical Images for Patient Information Protection”, 10th International Conference on Security and Management (SAM'11), Las Vegas, NV, USA, July 18-21, 2011;
  28. M. Yang and N. Bourbakis, “H.264/AVC Intra-only Coding (iAVC) and Neural Network based Prediction Mode Decision”, 22 IEEE International Conference on Tools with Artificial Intelligence, Arras, France, October 27-29, 2010;
  29. G. Francia, M. Trifas, and M. Yang, “Global Collaboration and Joint Academic Programs: Design Issues and Constraints”, 14th World Multi-Conference on Systemics, Cybernetics and Informatics, Orlando, FL, USA, June 29 – July 2, 2010;
  30. M. Yang, M. Trifas, D. Buenos-Aires, and J. Elston, “Secure Patient Information in Medical Images”, 13th World Multi-Conference on Systemics, Cybernetics and Informatics, Orlando, Florida, USA, July 10th – 13th, 2009 (best paper award);
  31. N. Bourbakis, A. Rwabutaza, M. Yang, and T. Skondras, “A Synthetic Stegano-Crypto Scheme for Securing Multimedia Medical Records”, 16th IEEE International Conference on Digital Signal Processing, Santorini, Greece, July 5-7, 2009;
  32. G. Francia, M. Yang, M. Trifas, and L. Chen, “Applied Image Processing to Multimedia Information Security”, 2009 International Conference on Image Analysis and Signal Processing, Linhai, Zhejang, China. April 11-12, 2009;
  33. M. Yang, M. Trifas, an J. Rogers, “H.264/AVC Intra-only Coding (iAVC) Techniques for Video over Wireless Networks”, SPIE International Conference on Electronic Imaging, San Jose, CA, USA, 18 – 22, Jan. 2009;
  34. M. Yang, M. Trifas, C. Truitt, and G. Xiong, “Wavelet Domain Video Information Embedding”, 12th World Multi-Conference on Systemics, Cybernetics and Informatics, Orlando, Florida, USA, June 29th - July 2nd, 2008;
  35. M. Yang, N. Bourbakis, Z. Chen, and G. Francia III, "An Efficient Packet Loss Recovery Methodology for Video-over-IP", 7th IASTED International Conference on Signal and Image Processing, Honolulu, Hawaii, USA, August 18-22, 2007;
  36. M. Yang, M. Trifas, N. Bourbakis, and C. Cushing, "A Robust Information Hiding Methodology in Wavelet Domain", 7th IASTED International Conference on Signal and Image Processing, Honolulu, Hawaii, USA, August 18-22, 2007;
  37. Z. Chen, M. Yang, M. Trifas, and J. Dongarra, "An Efficient Recovery Scheme for Supercomputing Clusters and Grids" Proceeding of the 6th International Conference on Distributed Computing and Applications for Business, Engineering and Sciences (DCABES2007), Yichang, Hubei, P. R. China, August 14-17, 2007;
  38. M. Yang, N. Bourbakis, Z. Chen, and M. Trifas, "An Efficient Audio-Video Synchronization Methodology", IEEE International Conference on Multimedia and Expo 2007 (ICME 2007), Beijing, China, July 1-4, 2007;
  39. Z. Chen, M. Yang, G. Francia, and J. Dongarra, “Self Adapting Application Level Fault Tolerance for Parallel and Distributed Computing”, 12th IEEE Workshop on Dependable Parallel, Distributed and Network-Centric Systems, CA, 2007;
  40. M. Yang and N. Bourbakis, “A Prototyping Tool for Analysis and Modeling of Video Transmission Traces over IP Networks”, IEEE International Workshop on Rapid System Prototyping, Chania, Crete, Greece, June 2006;
  41. M. Yang and N. Bourbakis, “High Bitrate Information Hiding for Digital Video under H.264/AVC”, Proceeding of IEEE International Midwest Symposium on Circuits and Systems 2005, Cincinnati, Ohio, USA, August 7th-10th, 2005;
  42. M. Yang and N. Bourbakis, “An Overview of Lossless Image Compression Techniques”, Proceeding of IEEE International Midwest Symposium on Circuits and Systems 2005, Cincinnati, Ohio, USA, August 7th-10th, 2005;
  43. M. Yang and N. Bourbakis, “A High Bitrate Multimedia Information Hiding Algorithm in DCT Domain”, Proceeding of World Conference of Integrated Design and Process Technology (IDPT 2005), Beijing, China, Jun. 13th-17th, 2005;
  44. J. Lu, D. Goldman, M. Yang, and N. Bourbakis, "High Performance Neural Network Training on a PC Cluster", Proceeding of 2004 IEEE Workshop on High Performance Computing (HPCAsia 2004), Tokyo, Japan, Jul. 22nd-24th;
  45. D. Goldman, M. Yang, and N. Bourbakis, “A Neural Network-based Segmentation Tool for Color Images”, Proceeding of 14th IEEE International Conf. on Tools with Artificial Intelligence 2002, Nov. 4th-6th, Washington D.C., pp.500-511;
©