Guang Sun

Orcid: 0000-0002-2675-3778

According to our database1, Guang Sun authored at least 45 papers between 2007 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Characteristics of an Eight-Quadrant Corner Reflector Involving a Reconfigurable Active Metasurface.
Sensors, 2022

Disturbance observer-based saturated fixed-time pose tracking for feature points of two rigid bodies.
Autom., 2022

Prediction of the Total Phosphorus Index Based on ARIMA.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

Research on E-commerce Customer Churn Based on RFM Model and Naive Bayes Algorithm.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

Research on the Application of Ant Colony Clustering in Commodity Classification.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

2021
Using improved RFM model to classify consumer in big data environment.
Int. J. Embed. Syst., 2021

Stock Price Forecasting: An Echo State Network Approach.
Comput. Syst. Sci. Eng., 2021

Internet Financial Fraud Detection Based on a Distributed Big Data Approach With Node2vec.
IEEE Access, 2021

2020
General process of big data analysis and visualisation.
Int. J. Comput. Sci. Eng., 2020

On the build and application of bank customer churn warning model.
Int. J. Comput. Sci. Eng., 2020

Correlation Analysis of Chinese Pork Concept Stocks Based on Big Data.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

Application of ARIMA Model in Financial Time Series in Stocks.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

2019
A portable roadside vehicle detection system based on multi-sensing fusion.
Int. J. Sens. Networks, 2019

A Big Data Mining Approach of PSO-Based BP Neural Network for Financial Risk Management With IoT.
IEEE Access, 2019

Obfuscation-Based Watermarking for Mobile Service Application Copyright Protection in the Cloud.
IEEE Access, 2019

Curriculum Reform in Big Data Education at Applied Technical Colleges and Universities in China.
IEEE Access, 2019

Survey on streaming data computing system.
Proceedings of the ACM Turing Celebration Conference - China, 2019

On data visualization for securities investment fund analysis.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
An evolutionary learning and network approach to identifying key metabolites for osteoarthritis.
PLoS Comput. Biol., 2018

An IoT prototype system for environmental sustainability.
Int. J. Sens. Networks, 2018

Singular Value Decomposition-Based Generalized Side Lobe Canceller Beamforming Method for Ultrasound Imaging.
Int. J. Pattern Recognit. Artif. Intell., 2018

A Control Approach Using Network Latency Interval to Preserve Real-Time Causality.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A Study on Revenue Distribution of Information Sharing in the C2M Supply Chain.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A Chaotic Searchable Image Encryption Scheme Integrating with Block Truncation Coding.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
A survey of distributed denial-of-service attack, prevention, and mitigation techniques.
Int. J. Distributed Sens. Networks, 2017

The research of compression and generation of high-precision dynamic focusing delay data for ultrasound beamformer.
Clust. Comput., 2017

2016
Metabolomics Differential Correlation Network Analysis of Osteoarthritis.
Proceedings of the Biocomputing 2016: Proceedings of the Pacific Symposium, 2016

2013
A New Worst-Case Throughput Bound for Oblivious Routing in Odd Radix Mesh Network.
IEEE Comput. Archit. Lett., 2013

An Improved Ant Colony Clustering Method for Network Intrusion Detection.
Proceedings of the IEEE Eighth International Conference on Networking, 2013

2012
An Oblivious Routing Algorithm for 3D Mesh Networks to Achieve a New Worst-Case Throughput Bound.
IEEE Embed. Syst. Lett., 2012

An on-chip global broadcast network design with equalized transmission lines in the 1024-core era.
Proceedings of the International Workshop on System Level Interconnect Prediction, 2012

Oblivious routing design for mesh networks to achieve a new worst-case throughput bound.
Proceedings of the 30th International IEEE Conference on Computer Design, 2012

2011
Performance-Aware Hybrid Algorithm for Mapping IPs onto Mesh-Based Network on Chip.
IEICE Trans. Inf. Syst., 2011

UWB-based Wireless Body Area Networks channel modeling and performance evaluation.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

2010
Convex-Based DOR Routing for Virtualization of NoC.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2010

Energy-aware run-time mapping for homogeneous NoC.
Proceedings of the 2010 International Symposium on System on Chip, SoC 2010, Tampere, 2010

An Algorithm of Webpage Information Hiding Based on Class Selectors.
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010

Game Theory Based Bandwidth Allocation Scheme for Network Virtualization.
Proceedings of the Global Communications Conference, 2010

2008
A Combined Static and Dynamic Software Birthmark Based on Component Dependence Graph.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Software Watermarking Based on Dynamic Program Slicing.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Dynamic K-Gram Based Software Birthmark.
Proceedings of the 19th Australian Software Engineering Conference (ASWEC 2008), 2008

2007
A Stern-based Collusion-Secure Software Watermarking Algorithm and Its Implementation.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Detection of steganographic information in tags of webpage.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

Detection of Hidden Information in Tags of Webpage Based on Tag-Mismatch.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Detection of Hidden Information in Webpage.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007


  Loading...