孙光 湖南财政经济学院信息技术与管理学院(财经大数据研究院)
教授\书记、院长
工作经历:
2005年至今,湖南财政经济学院
1995-2002,湖南信息职业技术学院
标准化工作经验:参与起草国家标准两项,1、《信息技术虚拟现实应用软件基本要求和测试方法》GB/T 38258-2019;2、《信息技术计算机图形和图像处理可扩展三维组件(X3D)第2部分:场景访问接口(SAI) 》GB/T 28170.2-2021。
发表著作刊物:
近十年来,发表学术论文114篇,专著2部。
1. Analysis of CART Algorithmsin Data Mining
Junqi Sun; Nianzu Jiang; Guang Sun; Wenbin Huang
2023:548-5532023 2nd International Conference on Machine Learning,Cloud Computing and Intelligent
Mining(MLCCIM)
2. Performance Analysis of the CHAID Algorithm for Accuracy
Yang Yeling; Yi Feng*; Deng Chuancheng; Guang Sun*
2023:11(11):2558 Mathematics
3. Enhanced E-commerce Fraud Prediction Based on a Convolutional Neural Network Model
Sumin Xie; Ling Liu*; Guang Sun; Bin Pan; Lang Lin ... 2023:75(1):1107-1117 CMC
4. A Big Data Based Dynamic Weight Approach for RFM Segmentation
Lang Lin; Zhou Shuang; Zhong Minjuan*; Guang Sun; Bin Pan ... 2023:74(2):3503-3513 CMC
5. Application of Time Serial Model in Water Quality Predicting
Jiang Wu;Jianjun Zhang; Tan Wenwu; Hao Lan*; Zhang Sirao ... Guang Sun ... 2023:74(1):67-82 CMC
6. Correlation Analysis of Turbidity and Total Phosphorusin Water Quality Monitoring Data
Wenwu Tan;Jianjun Zhang*; Xing Liu;Jiang Wu; Yifu Sheng ... Guang Sun ... 2023:5(0):85-97 Journal on Big Data
7. Dissolved Oxygen Prediction Based on PCA-LSTM
Wenwu Tan;Jianjun Zhang; Xing Liu; Ziwen Yu; Ke Xiao* ... Guang Sun* ... 2022 2337(1):012012Journal of Physics: Conference Series
8. Correlation Analysis of Water Temperature and Dissolved Oxygen Based on Water Quality
Monitoring Data
Tan Wenwu;Jianjun Zhang;Jiang Wu; Yifu Sheng; Liu Xing ... Guang Sun ... 2022:340-352Communicationsin Computer and Information Science
9. Research on E-commerce Customer Churn Based on RFM Model and Naive Bayes Algorithm
Yuan Tang; Yupeng Li; Guang Sun*
2022:371-381LECTURE NOTES IN COMPUTER SCIENCE
10. Prediction of the Total PhosphorusIndex Based on ARIMA
3
Jiang Wu;Jianjun Zhang; Tan Wenwu; Yifu Sheng; Zhang Sirao ... Guang Sun ... 2022:333-347LECTURE NOTES IN COMPUTER SCIENCE
11. Using the FA-NAR Dynamic Neural Network Model and Big Data to Monitor Dam Safety
Bin Pan; Zhitong Quan*; Huang Xueli; Guang Sun*
2022:10 Frontiersin Physics
12. Fair and Stable Matching Virtual Machine Resource Allocation Method
Dai Liang; He Aosong; Guang Sun; Pan Yuxing*
202232(3):1831-1842INTELLIGENT AUTOMATION AND SOFT COMPUTINGIF
13. Application of CNN and Long Short-Term Memory Network in Water Quality Predicting
Tan Wenwu;Jianjun Zhang*;Jiang Wu; Hao Lan; Liu Xing ... Guang Sun ... 2022:34(3):1943-1958INTELLIGENT AUTOMATION AND SOFT COMPUTINGIF
14. Design of a Web Crawler for Water Quality Monitoring Data and Data Visualization
Ziwen Yu;Jianjun Zhang*; Wenwu Tan; Ziyi Xiong; Peilun Li ... Guang Sun ... 2022:4(2):135-143 Journal on Big Data
15. Research on the Application of Ant Colony Clustering in Commodity Classification
Zuyan Li; Guang Sun*
2022:321-332LECTURE NOTES IN COMPUTER SCIENCE
16. Coverless Information Hiding Method Based on Combination Morse Code and Double Cycle
Application of Starter
Ya Wen;Jianjun Zhang*; Yan Xia; Lin Haijun; Guang Sun
2021:299-311Communicationsin Computer and Information Science
17. Application of Grey Forecasting Model to CPI Index Forecast
Yifu Sheng;Jianjun Zhang*; Tan Wenwu;Jiang Wu; Lin Haijun ... Guang Sun ... 2021:312-321Communicationsin Computer and Information Science
18. User-based Collaborative Filtering Algorithm Design and Implementation
Hulong Wang; Zesheng Shen; Shuzhen Jiang; Guang Sun*; Ren Jie Zhang
2021:1757(1):012168Journal of Physics: Conference Series
19. Application of Quicksort Algorithm in Information Retrieval
Jiajun Xie; Zuyan Li; Han Wu; Linhan Li; Bin Pan ... Guang Sun* ... 2021:3(4):135-145 Journal on Big Data
4
20. Stock Price Forecasting: An Echo State Network Approach
Guang Sun; Lin Jingjing*; Yang Chen; Xiangyang Yin; Ziyu Li ... 2021:36(3):509-520 COMPUTER SYSTEMS SCIENCE AND ENGINEERING
21. Application of Grey Model and Neural Network in Financial Revenue Forecast
Yifu Sheng;Jianjun Zhang*; Tan Wenwu;Jiang Wu; Lin Haijun ... Guang Sun ... 2021:69(3):4043-4059 CMC
22. Research on the Application of Big Data Technology in the Integration of Enterprise Business and
Finance
Hanbo Liu*; Guang Sun
2021:3(4):175-182 Journal on Big Data
23. Study of Wavelet Transform-based Image Fusion Methods
Kairui Cheng; Longhao Yi; Long Li; Manzi Zhutian; Guang Sun
2021:1757(1):012049 Journal of Physics: Conference Series
24. Using Big Data to Discover Chaosin China's Futures Market During COVID-19
Lin Tie; Bin Huang; Bin Pan; Guang Sun*
2021:69(3):3095-3107 CMC
25. LDA-based Topic Mining of Microblog Comments
Xu Liu; Ying Gao; Ziyi Cao; Guang Sun
2021:1757(1):012118Journal of Physics: Conference Series
26. Internet Financial Fraud Detection Based on a Distributed Big Data Approach With Node2vec
Hangjun Zhou; Guang Sun; Sha Fu*; Wang Linli;Juan Hu ... 2021:9:43378-43386 IEEE Access
27. Design and Implementation of an Alarm Platform Based on Water Quality Big Data
Yan Xia;Jianjun Zhang*; Weida Chen; Hua Wen; Guang Sun ... 2020:399-409Communicationsin Computer and Information Science
28. Correlation Analysis of Chinese Pork Concept Stocks Based on Big Data
Liu Yujiao; Lin He*; Li Duohui; Luo Xiaozhao; Peng Guo ... Guang Sun ... 2020:475-486 LECTURE NOTES IN COMPUTER SCIENCE
29. Application of ARIMA Model in Financial Time Seriesin Stocks
Cheng Jiajia; Deng Huiyun; Guang Sun*; Peng Guo;Jianjun Zhang
5
2020:232-243 LECTURE NOTES IN COMPUTER SCIENCE
30. Visualization Analysisfor Business Performance of Chinese Listed Companies Based on Gephi
Sun Guang; Lv Hongzhang*; Wang Dianyu; Fan Xiaoping; Zuo Yi ... 2020:63(2):959-977 CMC
31. A Survey of Time Series Data Visualization Methods
Wangdong Jiang;Jie Wu*; Guang Sun; Yuxin Ouyang;Jing Li ... 2020:2(2):105-117 Quantum
32. A Distributed Approach of Big Data Mining for Financial Fraud Detection in a Supply Chain
Hangjun Zhou*; Guang Sun; Sha Fu; Fan Xiaoping;Jiang Wangdong ... 2020:64(2):1091-1105 CMC
33. On the build and application of bank customer churn warning model
Jiang Wangdong; Yushan Luo*; Ying Cao; Guang Sun; Gong Chunhong
2020:22(4):404 InternationalJournal of Computational Science and Engineering
34. User Behavior Path Analysis Based on Sales Data
Wangdong Jiang; Dongling Zhang*; Yapeng Peng; Guang Sun; Ying Cao ... 2020:2(2):79-90 Journal of Media
35. Gender Forecast Based on the Information about People Who Violated Traffic Principle
Rui Li; Guang Sun*;Jingyi He; Ying Jiang; Rui Sun ... 2020:2(2):65-73 Journal on Internet of Things
36. Big Data Audit of Banks Based on Fuzzy Set Theory to Evaluate Risk Level
Yilin Bi; Yuxin Ouyang; Guang Sun; Peng Guo;Jianjun Zhang ... 2020:2(1):9-18 Journal on Big Data
37. Design and Analysis of a Water Quality Monitoring Data Service Platform
Jianjun Zhang*; Yifu Sheng; Weida Chen; Lin Haijun; Guang Sun ... 2020:66(1):389-405 CMC
38. Expanding Hot Code Path for Data Cleaning on Software Graph
Sun Guang*; Fan Xiaoping;Jiang Wangdong; Zhou Hangjun; Li Fenghua ... 2020:63(2):743-753CMC
39. On data visualization forsecuritiesinvestment fund analysis
6
Guang Sun; Fenghua Li;Jiayi Ren; Hongzhang Lv; Yanfei Xiao ... 2019:1–11 Proceedings of the ACM Turing Celebration Conference-China
40. Survey on streaming data computing system
Guang Sun; Yingjie Song; Ziqin Gong; Xiya Zhou; Xinyi Zhou ... 2019:1–8 Proceedings of the ACM Turing Celebration Conference-China
41. A Scalable Approach for Fraud Detection in Online E-Commerce Transactions with Big Data
Analytics
Hangjun Zhou*; Guang Sun; Sha Fu;Jiang Wangdong; Xue Juan
2019:60(1):179-192 CMC
42. An Ui Design Optimization Strategy for General App in Big Data Environment
Hangjun Zhou;Jieyu Zhou*; Guang Sun; Wangdong Jiang; Chuntian Luo ... 2019:1(2):65-80 Journal of Quantum Computing
43. A Big Data Mining Approach of PSO-Based BP Neural Network for Financial Risk Management With
IoT
Hangjun Zhou*; Guang Sun; Sha Fu; Liu Jing; Xingxing Zhou ... 2019:7:154035-154043 IEEE Access
44. Brief Talk About Big Data Graph Analysis and Visualization
Guang Sun; Fenghua Li*; Wangdong Jiang
2019:1(1):25-38 Journal on Big Data
45. Obfuscation-Based Watermarking for Mobile Service Application Copyright Protection in the Cloud
Guang Sun*; F. Xiaoping; Wangdong Jiang; L. Fenghua; YueweiJ. 2019:7:38162-38167 IEEE Access
46. The Analysis of China’s Integrity Situation Based on Big Data
Wangdong Jiang; Taian Yang*; Guang Sun; Yucai Li; Yixuan Tang ... 2019:1(3):117-134 Journal on Big Data
47. A portable roadside vehicle detection system based on multi-sensing fusion
Jianying Zheng; Xu Bin; Wang Xiang; Xueliang Fan; Xu Hao ... Guang Sun* ... 2019:29(1):38 InternationalJournal of Sensor Networks
48. On Visualization Analysis of Stock Data
Yue Cai; Zeying Song; Guang Sun*;Jing Wang; Ziyi Guo ...
7
2019:1(3):135-144 Journal on Big Data
49. On Multi-Thread Crawler Optimization for Scalable Text Searching
Guang Sun; Huanxin Xiang; Shuanghu Li*
2019:1(2):89-106 Journal on Big Data
50. Curriculum Reform in Big Data Education at Applied Technical Colleges and Universitiesin China
Li Xin; Fan Xiaoping; Xilong Qu; Guang Sun; Yang Chen ... 2019:7:125511-125521 IEEE Access
51. A Distributed LRTCO Algorithm in Large-Scale DVE Multimedia Systems
Hangjun Zhou*; Guang Sun; Sha Fu;Jiang Wangdong; Tingting Xie ... 2018:56(1):73-89 CMC
52. A Chaotic Searchable Image Encryption Scheme Integrating with Block Truncation Coding
Jiang Mingfang; Guang Sun*
2018:349-358 LECTURE NOTES IN COMPUTER SCIENCE
53. A Study on Revenue Distribution of Information Sharing in the C2M Supply Chain
Chunxia Liu; Youyu Chen; Tong Shu*;Jiang Wangdong; Guang Sun
2018:543-552 LECTURE NOTES IN COMPUTER SCIENCE
54. An IoT prototype system for environmentalsustainability
Fu Cynthia; David Sta Cruz; Sun Bo; Guang Sun*
2018:28(3):189InternationalJournal of Sensor NetworksIF: 1.1
55. A Control Approach Using Network Latency Interval to Preserve Real-Time Causality
Hangjun Zhou*; Guang Sun; Du Shuyang; Liu Feng; Yang Bo ... 2018:26-35 LECTURE NOTES IN COMPUTER SCIENCE
56. A survey of distributed denial-of-service attack, prevention, and mitigation techniques
Mahjabin Tasnuva; Xiao Yang; Guang Sun*;Jiang Wangdong
2017:13(12) InternationalJournal of Distributed Sensor Networks
57. 基于慕课研究视角的网络教学现状及措施
黄会群; 孙光; 蒋望东
2016:31(04):106-108广西科技师范学院学报
8
58. 基于粗糙集和条件信息熵的高校教师绩效评价研究
付沙; 孙光; 周航军; 肖叶枝
201632(03):29-35齐齐哈尔大学学报(自然科学版)
59. Multi-attribute Decision-making Model of Grey Target for Information System Evaluation
Sha Fu; Guang Sun; Yezhi Xiao
2016:4(1):15-20 Computer Science and Information Technology
60. 云计算环境约束下的软件水印方案
孙光; 樊晓平; 蒋望东; 周航军; 刘胜宗 ... 2016:2(09):12-21网络与信息安全学报
61. An Evaluation Study on Information System Based on Rough Set and Condition Information Entropy
Sha Fu*; Guang Sun; Hangjun Zhou; Feng Yan
2016:10(1):129-137Journal of Software Engineering
62. Study on Security Risk Assessment for Information System Based on Fuzzy Set and Entropy Theory
Sha Fu*; Liu Zhongli; Guang Sun; Hangjun Zhou; Wenbin Liu
2015:9(4):818-827Journal of Software Engineering
63. Software watermarking in the cloud: Analysis and rigoroustheoretic treatment
Guang Sun*; Fan Xiaoping; Sha Fu; Yingjie Song; Luo Huifang
2015:9(2):410-418Journal of Software Engineering
64. 基于 Shamir秘密共享的密钥分发与恢复算法
荣辉桂*; 莫进侠; 常炳国; 孙光; 龙飞
2015:36(3):2015083-1-2015083-10通信学报
65. Information Hiding Algorithm with Strong Security Based on Run Length
Jianquan Xie*; Xiaoping Fan; Hui Peng; Qing Xie; Guang Sun
2014:13(5):895-903 Information Technology Journal
66. Research on a dynamic social network recommendation approach
Hangjun Zhou; Zhongli Liu; Sha Fu; Guang Sun; Zhanhong Xiang
2014:10(22)BioTechnology: An Indian Journal
67. A real-time causal order delivery approach in largescale DVE systems
9
Zhongli Liu; Hangjun Zhou; Sha Fu; Guang Sun; Wei Zou
201410BioTechnology: An Indian Journal
68. A Real-time Causal Order Control Approach in a Large-scale DVE System with Asynchronous Clocks
Hangjun Zhou*; Liu Zhongli; Sha Fu; Guang Sun
2013:12(20):5941-5946 Information Technology Journal
69. 扩展频繁执行路径上的 n-gram软件胎记
孙光; 樊晓平; 刘钟理
2013(2):57-60信息网络安全
70. 基于频繁执行路径扩展的软件胎记方法
孙光; 刘钟理
2012:48(36):80-84,128计算机工程与应用
71. 基于可靠特征的软件水印研究
孙光
2012湖南大学
THESIS
72. Print-Scan Resilient Text Image Watermarking Based on Stroke Direction Modulation for Chinese
Document Authentication
Tan Lina*; Sun Xingming; Sun Guang
2012:21(1):170-181Radioengineering
73. ERP software selection using the rough set and TPOSIS methods under fuzzy environment
Huang Huiqun*; Guang Sun
2012:4(3):111-118Advancesin Information Sciences and Services
74. Hot Path Dataflow Approach to Software Watermarking
Guang Sun; Xingming Sun*
2011:3(2):121-131Advancesin Information Sciences and Services
75. Encryption algorithm of RSH (Round Sheep Hash)
Chaoqun Liu*; Zhou Yang; Yunhua Xiao; Guang Sun
2011:10(3):686-690 Information Technology Journal
10
76. An Image Adaptive Semi-fragile Watermarking Algorithm Based on Visual Perception
杨恒伏*; 孙光
2011:38(2):51-58光电工程
77. 结合视觉感知的 BTC域高容量数据隐藏方案
杨恒伏; 孙光
2011:47(33):165-168计算机工程与应用
78. A Random Walk Approach to Accurate Condensed Co-Change Graph
Guang Sun
2010:1-32010 International Conference on E-Product E-Service and E-Entertainment
79. Software birthmark based on component dependence graph cluster
Guang Sun
20108:v8-288-v8-2912010 International Conference on Computer Application and System
80. Software Watermarking Based on Condensed Co-Change Graph Cluster
Guang Sun; Xingming Sun*
2010:9(5):949-955 Information Technology Journal
81. On Steganalysis of Invisible Characters Hidden in Webpage
Guang Sun*
2010:5369-5372,2010 International Conference on Electrical and Control Engineering
82. An Algorithm of Webpage Information Hiding Based on Class Selectors
Guang Sun*
2010:691-694,2010 Third International Symposium on Intelligent Information Technology and Security
Informatics
83. Lossless Authentication Watermarking Based on Adaptive Modular Arithmetic
Yang Hengfu*; Sun Xingming; Sun Guang; Tian Zuwei
2010:19(1):52-61Radioengineering
84. 基于谓词代码的编译优化技术研究
田祖伟; 孙光
2010:37(5):130-133,138 Computer Science-AGH
85. CST: P2P Anonymous Authentication System Based on Collaboration Signature
11
Xiaoliang Wang; Xingming Sun; Guang Sun; Dong Luo
2010:1-72010 5th International Conference on Future Information Technology
86. A semi-fragile watermarking algorithm using adaptive Least Significant Bitsubstitution
Yang Hengfu*; Xingming Sun; Guang Sun
2010: 9(1):20-26 Information Technology Journal
87. A high-capacity image data hiding scheme using adaptive LSB substitution
Yang Hengfu*; Sun Xingming; Sun Guang
2009:18(4):509-516 Radioengineering
88. 基于图像局部特性的自适应块截短编码算法
杨恒伏; 孙光; 田祖伟
2009:26(7):248-250,253微电子学与计算机
89. JPEG2000 Image Coding Scheme Based on Embedded Linux
杨恒伏; 孙光
2009: 42(4):222-224通信技术
90. 基于 HVS特性的自适应 K近邻均值滤波算法
杨恒伏*; 孙光; 田祖伟
2009:45(10):179-181计算机工程与应用
91. Design of Wireless Terminal Data Communication System Based on CDMA 2000 Technology
田祖伟; 孙光
2009通信技术
92. Evaluation of Academic Library Informationization Level Based on Genetic Algorithm Neural
Network
姜明芳; 孙光
2009 Modern Computer
93. 基于 HVS特性的图像自适应中值滤波算法
杨恒伏; 孙光; 田祖伟
2009: 35(11):231-233计算机工程
94. A Combined Static and Dynamic Software Birthmark Based on Component Dependence Graph
12
Xiaoming Zhou*; Xingming Sun; Guang Sun; Ying Yang
2008:1416-14212008 International Conference on Intelligent Information Hiding and Multimedia Signal
Processing
95. Software Watermarking Based on Dynamic Program Slicing
邓小鸿*; Guowen Xu; 孙光;Junfeng Man
2008:461-464东南大学学报. 自然科学版
96. Dynamic K-Gram Based Software Birthmark
Yameng Bai*; Xingming Sun; Guang Sun; Xiaohong Deng; Xiaoming Zhou
2008:644-649 Australian Software Engineering Conference. Proceedings
97. 类比教学模式在操作系统教学中的应用
杨恒伏; 孙光; 田祖伟
2008(24):76-77,56计算机教育
98. 具有纠错编码特性的指令统计特征水印算法
罗毅; 孙星明; 孙光; 艾解清
2008:25(9):36-38计算机应用与软件
99. 基于汇编语言的递归算法教学设计探讨
田祖伟; 孙光
2008(22):159-160+104计算机教育
100. Fast Method and Application of Number System Conversion
田祖伟; 孙光; 杨素萍
2008电脑编程技巧与维护
101. DCT Domain Image Encryption Scheme Based on Dual Chaotic Maps
杨恒伏; 孙光; 田祖伟
2008(21):5838-5840科学技术与工程
102. Design and Application of the Security Architecture of E-bidding System
李福; 孙星明; 孙光
2008科学技术与工程
13
103. C语言中指针自增自减运算常见错误分析
田祖伟; 孙光; 杨素萍
2008(6):77-78现代远距离教育
104. An Image Quality Assessment Method Based on HVS
杨恒伏; 孙光; 田祖伟
2008:38(6):81-83航空计算技术
105. Detection of Hidden Information in Tags of Webpage Based on Tag-Mismatch
Huang Hua Jun*; Xing Ming Sun; Guang Sun; Huang Jun Wei
2007:1:257-260ScholarsJournal of Engineering and Technology
106. An Algorithm of Webpage Information Hiding Based on Equal Tag
孙星明*; 黄华军; 王保卫; 孙光; 黄俊伟
2007:44(5):756计算机研究与发展
107. Detection of Hidden Information in Webpage
Huajun Huang*; Xingming Sun; Zishuai Li; Guang Sun
2007:4:317-321Fourth International Conference on Fuzzy Systems and Knowledge Discovery(FSKD 2007)
108. A stern-based collusion-secure software watermarking algorithm and itsimplementation
Jieqing Ai*; Xingming Sun; Liu Yunhao; Cox IngemarJ.; Guang Sun ... 2007:813-8182007 International Conference on Multimedia and Ubiquitous Engineering(MUE'07)
109. Detection of Steganographic Information in Tags of Webpage
Huang Hua Jun*; Sun Xing Ming*; Sun Guang*; Huang Jun Wei*
2007Proceedings of the 2nd International ICST Conference on Scalable Information Systems
110. THE DESIGN AND IMPLEMENTATION OF BRANCHES-BASED SOFTWARE
WATERMARKING
邓小鸿; 孙光; 拜亚萌; 孙星明
2006计算技术与自动化
111. Positive Periodic Solution for a Class of Neutral Population Model with Multiple Delays
Sun Guang
2006湖州师范学院学报
14
向占宏; 孙光
2006:28(1):38-41湖州师范学院学报
112. A New Framework for Obfuscated Interpretation which Can Embed Watermarks
孙光; 孙星明; 杨蓉; 黄华军
2005(10):656-660科学技术与工程
113. 工业以太网监控系统的软件设计及应用
胡春华; 孙光
2005:24(1):95-98计算技术与自动化
114. Software protection technique based on software watermark and obfuscation
Sun Guang*; Sun Xing Ming
2005:32(suppl):177-180湖南大学学报. 自然科学版
115. 可嵌入水印的混淆编译框架设计
孙光
2005湖南大学
THESIS
所获荣誉及奖项:
所获荣誉及专业奖|
获湖南省科技进步二等奖2次。