孙光 湖南财政经济学院信息技术与管理学院(财经大数据研究院)
	教授\书记、院长 
	 
	工作经历:
	2005年至今,湖南财政经济学院
	1995-2002,湖南信息职业技术学院
	标准化工作经验:参与起草国家标准两项,1、《信息技术虚拟现实应用软件基本要求和测试方法》GB/T 38258-2019;2、《信息技术计算机图形和图像处理可扩展三维组件(X3D)第2部分:场景访问接口(SAI) 》GB/T 28170.2-2021。
	 
	发表著作刊物:
	近十年来,发表学术论文114篇,专著2部。
	1. Analysis of CART Algorithmsin Data Mining
	Junqi Sun; Nianzu Jiang; Guang Sun; Wenbin Huang
	2023:548-5532023 2nd International Conference on Machine Learning,Cloud Computing and Intelligent
	Mining(MLCCIM)
	2. Performance Analysis of the CHAID Algorithm for Accuracy
	Yang Yeling; Yi Feng*; Deng Chuancheng; Guang Sun*
	2023:11(11):2558 Mathematics
	3. Enhanced E-commerce Fraud Prediction Based on a Convolutional Neural Network Model
	Sumin Xie; Ling Liu*; Guang Sun; Bin Pan; Lang Lin ... 2023:75(1):1107-1117 CMC
	4. A Big Data Based Dynamic Weight Approach for RFM Segmentation
	Lang Lin; Zhou Shuang; Zhong Minjuan*; Guang Sun; Bin Pan ... 2023:74(2):3503-3513 CMC
	5. Application of Time Serial Model in Water Quality Predicting
	Jiang Wu;Jianjun Zhang; Tan Wenwu; Hao Lan*; Zhang Sirao ... Guang Sun ... 2023:74(1):67-82 CMC
	6. Correlation Analysis of Turbidity and Total Phosphorusin Water Quality Monitoring Data
	Wenwu Tan;Jianjun Zhang*; Xing Liu;Jiang Wu; Yifu Sheng ... Guang Sun ... 2023:5(0):85-97 Journal on Big Data
	7. Dissolved Oxygen Prediction Based on PCA-LSTM
	Wenwu Tan;Jianjun Zhang; Xing Liu; Ziwen Yu; Ke Xiao* ... Guang Sun* ... 2022 2337(1):012012Journal of Physics: Conference Series
	8. Correlation Analysis of Water Temperature and Dissolved Oxygen Based on Water Quality
	Monitoring Data
	Tan Wenwu;Jianjun Zhang;Jiang Wu; Yifu Sheng; Liu Xing ... Guang Sun ... 2022:340-352Communicationsin Computer and Information Science
	9. Research on E-commerce Customer Churn Based on RFM Model and Naive Bayes Algorithm
	Yuan Tang; Yupeng Li; Guang Sun*
	2022:371-381LECTURE NOTES IN COMPUTER SCIENCE
	10. Prediction of the Total PhosphorusIndex Based on ARIMA
	3
	Jiang Wu;Jianjun Zhang; Tan Wenwu; Yifu Sheng; Zhang Sirao ... Guang Sun ... 2022:333-347LECTURE NOTES IN COMPUTER SCIENCE
	11. Using the FA-NAR Dynamic Neural Network Model and Big Data to Monitor Dam Safety
	Bin Pan; Zhitong Quan*; Huang Xueli; Guang Sun*
	2022:10 Frontiersin Physics
	12. Fair and Stable Matching Virtual Machine Resource Allocation Method
	Dai Liang; He Aosong; Guang Sun; Pan Yuxing*
	202232(3):1831-1842INTELLIGENT AUTOMATION AND SOFT COMPUTINGIF
	13. Application of CNN and Long Short-Term Memory Network in Water Quality Predicting
	Tan Wenwu;Jianjun Zhang*;Jiang Wu; Hao Lan; Liu Xing ... Guang Sun ... 2022:34(3):1943-1958INTELLIGENT AUTOMATION AND SOFT COMPUTINGIF
	14. Design of a Web Crawler for Water Quality Monitoring Data and Data Visualization
	Ziwen Yu;Jianjun Zhang*; Wenwu Tan; Ziyi Xiong; Peilun Li ... Guang Sun ... 2022:4(2):135-143 Journal on Big Data
	15. Research on the Application of Ant Colony Clustering in Commodity Classification
	Zuyan Li; Guang Sun*
	2022:321-332LECTURE NOTES IN COMPUTER SCIENCE
	16. Coverless Information Hiding Method Based on Combination Morse Code and Double Cycle
	Application of Starter
	Ya Wen;Jianjun Zhang*; Yan Xia; Lin Haijun; Guang Sun
	2021:299-311Communicationsin Computer and Information Science
	17. Application of Grey Forecasting Model to CPI Index Forecast
	Yifu Sheng;Jianjun Zhang*; Tan Wenwu;Jiang Wu; Lin Haijun ... Guang Sun ... 2021:312-321Communicationsin Computer and Information Science
	18. User-based Collaborative Filtering Algorithm Design and Implementation
	Hulong Wang; Zesheng Shen; Shuzhen Jiang; Guang Sun*; Ren Jie Zhang
	2021:1757(1):012168Journal of Physics: Conference Series
	19. Application of Quicksort Algorithm in Information Retrieval
	Jiajun Xie; Zuyan Li; Han Wu; Linhan Li; Bin Pan ... Guang Sun* ... 2021:3(4):135-145 Journal on Big Data
	4
	20. Stock Price Forecasting: An Echo State Network Approach
	Guang Sun; Lin Jingjing*; Yang Chen; Xiangyang Yin; Ziyu Li ... 2021:36(3):509-520 COMPUTER SYSTEMS SCIENCE AND ENGINEERING
	21. Application of Grey Model and Neural Network in Financial Revenue Forecast
	Yifu Sheng;Jianjun Zhang*; Tan Wenwu;Jiang Wu; Lin Haijun ... Guang Sun ... 2021:69(3):4043-4059 CMC
	22. Research on the Application of Big Data Technology in the Integration of Enterprise Business and
	Finance
	Hanbo Liu*; Guang Sun
	2021:3(4):175-182 Journal on Big Data
	23. Study of Wavelet Transform-based Image Fusion Methods
	Kairui Cheng; Longhao Yi; Long Li; Manzi Zhutian; Guang Sun
	2021:1757(1):012049 Journal of Physics: Conference Series
	24. Using Big Data to Discover Chaosin China's Futures Market During COVID-19
	Lin Tie; Bin Huang; Bin Pan; Guang Sun*
	2021:69(3):3095-3107 CMC
	25. LDA-based Topic Mining of Microblog Comments
	Xu Liu; Ying Gao; Ziyi Cao; Guang Sun
	2021:1757(1):012118Journal of Physics: Conference Series
	26. Internet Financial Fraud Detection Based on a Distributed Big Data Approach With Node2vec
	Hangjun Zhou; Guang Sun; Sha Fu*; Wang Linli;Juan Hu ... 2021:9:43378-43386 IEEE Access
	27. Design and Implementation of an Alarm Platform Based on Water Quality Big Data
	Yan Xia;Jianjun Zhang*; Weida Chen; Hua Wen; Guang Sun ... 2020:399-409Communicationsin Computer and Information Science
	28. Correlation Analysis of Chinese Pork Concept Stocks Based on Big Data
	Liu Yujiao; Lin He*; Li Duohui; Luo Xiaozhao; Peng Guo ... Guang Sun ... 2020:475-486 LECTURE NOTES IN COMPUTER SCIENCE
	29. Application of ARIMA Model in Financial Time Seriesin Stocks
	Cheng Jiajia; Deng Huiyun; Guang Sun*; Peng Guo;Jianjun Zhang
	5
	2020:232-243 LECTURE NOTES IN COMPUTER SCIENCE
	30. Visualization Analysisfor Business Performance of Chinese Listed Companies Based on Gephi
	Sun Guang; Lv Hongzhang*; Wang Dianyu; Fan Xiaoping; Zuo Yi ... 2020:63(2):959-977 CMC
	31. A Survey of Time Series Data Visualization Methods
	Wangdong Jiang;Jie Wu*; Guang Sun; Yuxin Ouyang;Jing Li ... 2020:2(2):105-117 Quantum
	32. A Distributed Approach of Big Data Mining for Financial Fraud Detection in a Supply Chain
	Hangjun Zhou*; Guang Sun; Sha Fu; Fan Xiaoping;Jiang Wangdong ... 2020:64(2):1091-1105 CMC
	33. On the build and application of bank customer churn warning model
	Jiang Wangdong; Yushan Luo*; Ying Cao; Guang Sun; Gong Chunhong
	2020:22(4):404 InternationalJournal of Computational Science and Engineering
	34. User Behavior Path Analysis Based on Sales Data
	Wangdong Jiang; Dongling Zhang*; Yapeng Peng; Guang Sun; Ying Cao ... 2020:2(2):79-90 Journal of Media
	35. Gender Forecast Based on the Information about People Who Violated Traffic Principle
	Rui Li; Guang Sun*;Jingyi He; Ying Jiang; Rui Sun ... 2020:2(2):65-73 Journal on Internet of Things
	36. Big Data Audit of Banks Based on Fuzzy Set Theory to Evaluate Risk Level
	Yilin Bi; Yuxin Ouyang; Guang Sun; Peng Guo;Jianjun Zhang ... 2020:2(1):9-18 Journal on Big Data
	37. Design and Analysis of a Water Quality Monitoring Data Service Platform
	Jianjun Zhang*; Yifu Sheng; Weida Chen; Lin Haijun; Guang Sun ... 2020:66(1):389-405 CMC
	38. Expanding Hot Code Path for Data Cleaning on Software Graph
	Sun Guang*; Fan Xiaoping;Jiang Wangdong; Zhou Hangjun; Li Fenghua ... 2020:63(2):743-753CMC
	39. On data visualization forsecuritiesinvestment fund analysis
	6
	Guang Sun; Fenghua Li;Jiayi Ren; Hongzhang Lv; Yanfei Xiao ... 2019:1–11 Proceedings of the ACM Turing Celebration Conference-China
	40. Survey on streaming data computing system
	Guang Sun; Yingjie Song; Ziqin Gong; Xiya Zhou; Xinyi Zhou ... 2019:1–8 Proceedings of the ACM Turing Celebration Conference-China
	41. A Scalable Approach for Fraud Detection in Online E-Commerce Transactions with Big Data
	Analytics
	Hangjun Zhou*; Guang Sun; Sha Fu;Jiang Wangdong; Xue Juan
	2019:60(1):179-192 CMC
	42. An Ui Design Optimization Strategy for General App in Big Data Environment
	Hangjun Zhou;Jieyu Zhou*; Guang Sun; Wangdong Jiang; Chuntian Luo ... 2019:1(2):65-80 Journal of Quantum Computing
	43. A Big Data Mining Approach of PSO-Based BP Neural Network for Financial Risk Management With
	IoT
	Hangjun Zhou*; Guang Sun; Sha Fu; Liu Jing; Xingxing Zhou ... 2019:7:154035-154043 IEEE Access
	44. Brief Talk About Big Data Graph Analysis and Visualization
	Guang Sun; Fenghua Li*; Wangdong Jiang
	2019:1(1):25-38 Journal on Big Data
	45. Obfuscation-Based Watermarking for Mobile Service Application Copyright Protection in the Cloud
	Guang Sun*; F. Xiaoping; Wangdong Jiang; L. Fenghua; YueweiJ. 2019:7:38162-38167 IEEE Access
	46. The Analysis of China’s Integrity Situation Based on Big Data
	Wangdong Jiang; Taian Yang*; Guang Sun; Yucai Li; Yixuan Tang ... 2019:1(3):117-134 Journal on Big Data
	47. A portable roadside vehicle detection system based on multi-sensing fusion
	Jianying Zheng; Xu Bin; Wang Xiang; Xueliang Fan; Xu Hao ... Guang Sun* ... 2019:29(1):38 InternationalJournal of Sensor Networks
	48. On Visualization Analysis of Stock Data
	Yue Cai; Zeying Song; Guang Sun*;Jing Wang; Ziyi Guo ...
	7
	2019:1(3):135-144 Journal on Big Data
	49. On Multi-Thread Crawler Optimization for Scalable Text Searching
	Guang Sun; Huanxin Xiang; Shuanghu Li*
	2019:1(2):89-106 Journal on Big Data
	50. Curriculum Reform in Big Data Education at Applied Technical Colleges and Universitiesin China
	Li Xin; Fan Xiaoping; Xilong Qu; Guang Sun; Yang Chen ... 2019:7:125511-125521 IEEE Access
	51. A Distributed LRTCO Algorithm in Large-Scale DVE Multimedia Systems
	Hangjun Zhou*; Guang Sun; Sha Fu;Jiang Wangdong; Tingting Xie ... 2018:56(1):73-89 CMC
	52. A Chaotic Searchable Image Encryption Scheme Integrating with Block Truncation Coding
	Jiang Mingfang; Guang Sun*
	2018:349-358 LECTURE NOTES IN COMPUTER SCIENCE
	53. A Study on Revenue Distribution of Information Sharing in the C2M Supply Chain
	Chunxia Liu; Youyu Chen; Tong Shu*;Jiang Wangdong; Guang Sun
	2018:543-552 LECTURE NOTES IN COMPUTER SCIENCE
	54. An IoT prototype system for environmentalsustainability
	Fu Cynthia; David Sta Cruz; Sun Bo; Guang Sun*
	2018:28(3):189InternationalJournal of Sensor NetworksIF: 1.1
	55. A Control Approach Using Network Latency Interval to Preserve Real-Time Causality
	Hangjun Zhou*; Guang Sun; Du Shuyang; Liu Feng; Yang Bo ... 2018:26-35 LECTURE NOTES IN COMPUTER SCIENCE
	56. A survey of distributed denial-of-service attack, prevention, and mitigation techniques
	Mahjabin Tasnuva; Xiao Yang; Guang Sun*;Jiang Wangdong
	2017:13(12) InternationalJournal of Distributed Sensor Networks
	57. 基于慕课研究视角的网络教学现状及措施
	黄会群; 孙光; 蒋望东
	2016:31(04):106-108广西科技师范学院学报
	8
	58. 基于粗糙集和条件信息熵的高校教师绩效评价研究
	付沙; 孙光; 周航军; 肖叶枝
	201632(03):29-35齐齐哈尔大学学报(自然科学版)
	59. Multi-attribute Decision-making Model of Grey Target for Information System Evaluation
	Sha Fu; Guang Sun; Yezhi Xiao
	2016:4(1):15-20 Computer Science and Information Technology
	60. 云计算环境约束下的软件水印方案
	孙光; 樊晓平; 蒋望东; 周航军; 刘胜宗 ... 2016:2(09):12-21网络与信息安全学报
	61. An Evaluation Study on Information System Based on Rough Set and Condition Information Entropy
	Sha Fu*; Guang Sun; Hangjun Zhou; Feng Yan
	2016:10(1):129-137Journal of Software Engineering
	62. Study on Security Risk Assessment for Information System Based on Fuzzy Set and Entropy Theory
	Sha Fu*; Liu Zhongli; Guang Sun; Hangjun Zhou; Wenbin Liu
	2015:9(4):818-827Journal of Software Engineering
	63. Software watermarking in the cloud: Analysis and rigoroustheoretic treatment
	Guang Sun*; Fan Xiaoping; Sha Fu; Yingjie Song; Luo Huifang
	2015:9(2):410-418Journal of Software Engineering
	64. 基于 Shamir秘密共享的密钥分发与恢复算法
	荣辉桂*; 莫进侠; 常炳国; 孙光; 龙飞
	2015:36(3):2015083-1-2015083-10通信学报
	65. Information Hiding Algorithm with Strong Security Based on Run Length
	Jianquan Xie*; Xiaoping Fan; Hui Peng; Qing Xie; Guang Sun
	2014:13(5):895-903 Information Technology Journal
	66. Research on a dynamic social network recommendation approach
	Hangjun Zhou; Zhongli Liu; Sha Fu; Guang Sun; Zhanhong Xiang
	2014:10(22)BioTechnology: An Indian Journal
	67. A real-time causal order delivery approach in largescale DVE systems
	9
	Zhongli Liu; Hangjun Zhou; Sha Fu; Guang Sun; Wei Zou
	201410BioTechnology: An Indian Journal
	68. A Real-time Causal Order Control Approach in a Large-scale DVE System with Asynchronous Clocks
	Hangjun Zhou*; Liu Zhongli; Sha Fu; Guang Sun
	2013:12(20):5941-5946 Information Technology Journal
	69. 扩展频繁执行路径上的 n-gram软件胎记
	孙光; 樊晓平; 刘钟理
	2013(2):57-60信息网络安全
	70. 基于频繁执行路径扩展的软件胎记方法
	孙光; 刘钟理
	2012:48(36):80-84,128计算机工程与应用
	71. 基于可靠特征的软件水印研究
	孙光
	2012湖南大学
	THESIS
	72. Print-Scan Resilient Text Image Watermarking Based on Stroke Direction Modulation for Chinese
	Document Authentication
	Tan Lina*; Sun Xingming; Sun Guang
	2012:21(1):170-181Radioengineering
	73. ERP software selection using the rough set and TPOSIS methods under fuzzy environment
	Huang Huiqun*; Guang Sun
	2012:4(3):111-118Advancesin Information Sciences and Services
	74. Hot Path Dataflow Approach to Software Watermarking
	Guang Sun; Xingming Sun*
	2011:3(2):121-131Advancesin Information Sciences and Services
	75. Encryption algorithm of RSH (Round Sheep Hash)
	Chaoqun Liu*; Zhou Yang; Yunhua Xiao; Guang Sun
	2011:10(3):686-690 Information Technology Journal
	10
	76. An Image Adaptive Semi-fragile Watermarking Algorithm Based on Visual Perception
	杨恒伏*; 孙光
	2011:38(2):51-58光电工程
	77. 结合视觉感知的 BTC域高容量数据隐藏方案
	杨恒伏; 孙光
	2011:47(33):165-168计算机工程与应用
	78. A Random Walk Approach to Accurate Condensed Co-Change Graph
	Guang Sun
	2010:1-32010 International Conference on E-Product E-Service and E-Entertainment
	79. Software birthmark based on component dependence graph cluster
	Guang Sun
	20108:v8-288-v8-2912010 International Conference on Computer Application and System
	80. Software Watermarking Based on Condensed Co-Change Graph Cluster
	Guang Sun; Xingming Sun*
	2010:9(5):949-955 Information Technology Journal
	81. On Steganalysis of Invisible Characters Hidden in Webpage
	Guang Sun*
	2010:5369-5372,2010 International Conference on Electrical and Control Engineering
	82. An Algorithm of Webpage Information Hiding Based on Class Selectors
	Guang Sun*
	2010:691-694,2010 Third International Symposium on Intelligent Information Technology and Security
	Informatics
	83. Lossless Authentication Watermarking Based on Adaptive Modular Arithmetic
	Yang Hengfu*; Sun Xingming; Sun Guang; Tian Zuwei
	2010:19(1):52-61Radioengineering
	84. 基于谓词代码的编译优化技术研究
	田祖伟; 孙光
	2010:37(5):130-133,138 Computer Science-AGH
	85. CST: P2P Anonymous Authentication System Based on Collaboration Signature
	11
	Xiaoliang Wang; Xingming Sun; Guang Sun; Dong Luo
	2010:1-72010 5th International Conference on Future Information Technology
	86. A semi-fragile watermarking algorithm using adaptive Least Significant Bitsubstitution
	Yang Hengfu*; Xingming Sun; Guang Sun
	2010: 9(1):20-26 Information Technology Journal
	87. A high-capacity image data hiding scheme using adaptive LSB substitution
	Yang Hengfu*; Sun Xingming; Sun Guang
	2009:18(4):509-516 Radioengineering
	88. 基于图像局部特性的自适应块截短编码算法
	杨恒伏; 孙光; 田祖伟
	2009:26(7):248-250,253微电子学与计算机
	89. JPEG2000 Image Coding Scheme Based on Embedded Linux
	杨恒伏; 孙光
	2009: 42(4):222-224通信技术
	90. 基于 HVS特性的自适应 K近邻均值滤波算法
	杨恒伏*; 孙光; 田祖伟
	2009:45(10):179-181计算机工程与应用
	91. Design of Wireless Terminal Data Communication System Based on CDMA 2000 Technology
	田祖伟; 孙光
	2009通信技术
	92. Evaluation of Academic Library Informationization Level Based on Genetic Algorithm Neural
	Network
	姜明芳; 孙光
	2009 Modern Computer
	93. 基于 HVS特性的图像自适应中值滤波算法
	杨恒伏; 孙光; 田祖伟
	2009: 35(11):231-233计算机工程
	94. A Combined Static and Dynamic Software Birthmark Based on Component Dependence Graph
	12
	Xiaoming Zhou*; Xingming Sun; Guang Sun; Ying Yang
	2008:1416-14212008 International Conference on Intelligent Information Hiding and Multimedia Signal
	Processing
	95. Software Watermarking Based on Dynamic Program Slicing
	邓小鸿*; Guowen Xu; 孙光;Junfeng Man
	2008:461-464东南大学学报. 自然科学版
	96. Dynamic K-Gram Based Software Birthmark
	Yameng Bai*; Xingming Sun; Guang Sun; Xiaohong Deng; Xiaoming Zhou
	2008:644-649 Australian Software Engineering Conference. Proceedings
	97. 类比教学模式在操作系统教学中的应用
	杨恒伏; 孙光; 田祖伟
	2008(24):76-77,56计算机教育
	98. 具有纠错编码特性的指令统计特征水印算法
	罗毅; 孙星明; 孙光; 艾解清
	2008:25(9):36-38计算机应用与软件
	99. 基于汇编语言的递归算法教学设计探讨
	田祖伟; 孙光
	2008(22):159-160+104计算机教育
	100. Fast Method and Application of Number System Conversion
	田祖伟; 孙光; 杨素萍
	2008电脑编程技巧与维护
	101. DCT Domain Image Encryption Scheme Based on Dual Chaotic Maps
	杨恒伏; 孙光; 田祖伟
	2008(21):5838-5840科学技术与工程
	102. Design and Application of the Security Architecture of E-bidding System
	李福; 孙星明; 孙光
	2008科学技术与工程
	13
	103. C语言中指针自增自减运算常见错误分析
	田祖伟; 孙光; 杨素萍
	2008(6):77-78现代远距离教育
	104. An Image Quality Assessment Method Based on HVS
	杨恒伏; 孙光; 田祖伟
	2008:38(6):81-83航空计算技术
	105. Detection of Hidden Information in Tags of Webpage Based on Tag-Mismatch
	Huang Hua Jun*; Xing Ming Sun; Guang Sun; Huang Jun Wei
	2007:1:257-260ScholarsJournal of Engineering and Technology
	106. An Algorithm of Webpage Information Hiding Based on Equal Tag
	孙星明*; 黄华军; 王保卫; 孙光; 黄俊伟
	2007:44(5):756计算机研究与发展
	107. Detection of Hidden Information in Webpage
	Huajun Huang*; Xingming Sun; Zishuai Li; Guang Sun
	2007:4:317-321Fourth International Conference on Fuzzy Systems and Knowledge Discovery(FSKD 2007)
	108. A stern-based collusion-secure software watermarking algorithm and itsimplementation
	Jieqing Ai*; Xingming Sun; Liu Yunhao; Cox IngemarJ.; Guang Sun ... 2007:813-8182007 International Conference on Multimedia and Ubiquitous Engineering(MUE'07)
	109. Detection of Steganographic Information in Tags of Webpage
	Huang Hua Jun*; Sun Xing Ming*; Sun Guang*; Huang Jun Wei*
	2007Proceedings of the 2nd International ICST Conference on Scalable Information Systems
	110. THE DESIGN AND IMPLEMENTATION OF BRANCHES-BASED SOFTWARE
	WATERMARKING
	邓小鸿; 孙光; 拜亚萌; 孙星明
	2006计算技术与自动化
	111. Positive Periodic Solution for a Class of Neutral Population Model with Multiple Delays
	Sun Guang
	2006湖州师范学院学报
	14
	向占宏; 孙光
	2006:28(1):38-41湖州师范学院学报
	112. A New Framework for Obfuscated Interpretation which Can Embed Watermarks
	孙光; 孙星明; 杨蓉; 黄华军
	2005(10):656-660科学技术与工程
	113. 工业以太网监控系统的软件设计及应用
	胡春华; 孙光
	2005:24(1):95-98计算技术与自动化
	114. Software protection technique based on software watermark and obfuscation
	Sun Guang*; Sun Xing Ming
	2005:32(suppl):177-180湖南大学学报. 自然科学版
	115. 可嵌入水印的混淆编译框架设计
	孙光
	2005湖南大学
	THESIS
	 
	所获荣誉及奖项:
	所获荣誉及专业奖|
	获湖南省科技进步二等奖2次。