Senior Lecturer
Dept. of Comput. & Comm.
The Open University
Milton Keynes, UK
The only thing not changing is the change itself. My recent research is all about changes to do with software systems: changes at development time ("evolution"), changes at runtime ("adaptation"), changes among viewpoints ("meaningful"), changes to stakeholders ("requirements"), changes to the attack/defense ("security"), changes to the interests disclosure ("privacy"), and the bidirectional synchronisations of various kinds of changes ("invariant traceability").
You can see some details in these subjects here now, and your will see more in future !
  • From Bird Watching to Watching Bird
    If we'd used the cloud, we might know where MH370 is now
  • Right hammer versus right nail?
    Requirements and Architectures for Adaptive Twin Peaks
  • When and to whom shall you disclose private information?
    Privacy arguments: analysing selective disclosure requirements for mobile applications.
  • How to monitor classified states of goals?
    Stateful requirements monitoring for self-repairing socio-technical systems.
  • How to protect your changes in generated code?
    Maintaining invariant traceability through bi-directional transformations.
  • Can enterprise benefit from adaptive UI?
    Using interpreted runtime models for devising adaptive user interfaces of enterprise applications.
  • What changes matter to you?
    Specifying and detecting meaningful changes in programs.
  • Is your PIN entry device secure?
    RISA: a risk-based argumentation method for practical security.
  • Are your sites down?
    Requirements-driven self-tuning for the survivability of web systems.
  • What has happened to the Eclipse architecture over time?
    Assessing architectural evolution.
  • Can we model requirements together?
    Using OpenRE: the Open Requirements Engineering lab.
  • Requirements-driven design of autonomic application software received the Most Influential Paper Award from IBM sponsored conferences CASCON.
    Live Blackboxes: Requirements for Tracking and Verifying Aircraft in Motion
    The aftermath of mystery flight MH370: what can requirements engineers do?
    On Protecting Privacy in the Cloud
    The aftermath of mystery flight MH370: what can engineers do?
    How a hacker could hijack a plane from their seat
    Connecting animals to the cloud could help predict earthquakes
    If airlines offer in-flight Wi-Fi, they should invest in an extra black box for security
    Germanwings flight 4U9525: a victim of the deadlock between safety and security demands
    The (relatively) simple fix that could prevent planes like AirAsia QZ8501 from disappearing
    AirAsia flight QZ8501: how cloud computing could help prevent air disasters
    Deep learning could prevent you from drunk posting to Facebook
    OU Research at SET for BRITAIN
    Adaptive sharing for online social networks: a trade-off between privacy risk and social benefit Best Paper Award at IEEE TrustCom'14
    The 445 billion dollar question of how to tackle cyber crime
    Black box scuffle could mask the truth about flight MH17
    How to improve security and privacy so patients can use social media in hospitals?
    Strong presence of Open University Researchers at ICSE'14
    Ephraim Hardcastle, Daily Mail Online
    Interviewed by Dan Damon from BBC World Service
    Interviewed by John Humphrys from BBC Radio 4
    How to turn three pings into results in the hunt for MH370
    Geek of the Week (Exclusive interview)
    To Keep Track of Airplanes, Think of Them Like Bitcoins
    If we’d used the cloud, we might know where MH370 is now
    Best poster award at IEEE RE'13
    Best paper award at ACM SIGCHI EICS'13

    Email: y.yu@open.ac.uk Office: +44 (0) 1908 6 55562