欧宝游戏竞技

  • 当前位置:首页  English Version  Teachers  Biography of Prof. Jun Tang
  • Biography of Prof. Jun Tang

    • Biography of Prof. Jun Tang

      Name: Jun Tang(汤。                          

      E-mail: tangjunyes@qq.com

        

      Prof. Jun Tang has a Ph.D degree in Computer Science from Wuhan University of Technology. He also worked as Post Doctoral Scholar of Economics inFudanUniversity, which is located inShanghai, also is ranked the third among all universities in mainlandChina. He is currently a professor of Information School, Zhongnan University of Economics and Law, a university belongs to China Department of Education, and an appointed researcher of China Center for Anti-Money Laundering Studies at Fudan University.

        

      Prof. Jun Tang has been focusing on the AML/CFT compliance area since the year 2003. His research interests include behavior pattern recognition and suspicious financial transaction surveillance, the evolution of international standards for AML/CFT compliance, the characteristics of AML/CFT regulations in transition countries, risk-based AML regulation on internet payment services, etc. He has been keeping tight co-operations with the AML competent authorities inChina, including the Central Bank, and the Police Department, etc. He has done a lot of consultant jobs among financial institutions in mainlandChina.

        

      Publications

      §  Book:

      Machine Learning and Anti-Money Laundering, 2007, Press ofHarbinIndustrialUniversity

        

      §   Conference Papers and Article in Academic Journals:

      1. A Framework on Developing an Intelligent Discriminating System of Anti-Money Laundering,10th International Conference on Finance and Banking,Prague,Oct.10, 2005

      2. Intelligent Discriminative System of Anti-Money Laundering Using Unusual Behavior Detection Algorithm, Proceedings of International Machine Learning Conference 2005, Guangzhou, Aug. 2005

      3. A Cross Datasets Referring Outlier Detection Model Applied to Suspicious Financial Transaction Discrimination, April 2006,Springer-Verlag Publisher, LNCS 3971

      5. A Suspicious Transaction Detection Based on Peer Comparison Method, Proceedings of 18th International Pattern Recognition Conference, Hong Kong

      6. Suspicious Transaction Surveillance Employing Chaotic Time Series Prediction, Proceedings of 2008 Asian and Pacific Financial Engineering Conference, June 2008, Hong Kong

      7. Enhancing the Efficiency of AML System, Proceeding of 2008 AML Conference Hosted by Department of the People Bank ofChina

      8. An AML Surveillance and Analysis System Based on Customer Behavior Pattern Recognition, Jul.2005, Journal ofZhongnanUniversityof Economics and Law

      9. Designing a Self-Adaptive AML Information System, Transactions of Management, Jue.2005

      10. An Outlier Detection Model for Suspicious Financial Transaction Monitoring, April, 2004, Journal ofWuhanUniversityof Technology

      11. An Outlier Detection Technique Based on Decomposition of Wave Cycles. Jun.2006, Journal ofWuhanUniversity

      12. A suspicious financial transaction analyzing prototype based on Empirical Mode Decomposition Method, Transactions of Computer Science,Korea, Vol 33 No 1, Jul, 2006

      13. An Integration of AML and CRM Information Systems in Banks,Journal of China Financial Computer Technology, Sep.2007

      14. The international standards of customer due diligence and Chinese practice, Journal of Money Laundering Control Vol. 12 No. 4, 2009, Emerald Group Publishing Limited

      15. The latest development of AML intelligent techniques, Journal of South China Financial Computer Technology.Aug.2008

      16 Implementation of Enterprise-Wide AML Information System Based on Risk-Sensitive Principles, Journal ofZhongnanUniversityof Economics and Law, Nov.2008

      17. The Endeavors of International Organizations to Constructing AML/CFT Systems inCentral AsiaCountries, Journal of Xinjiang Social Science, Jan.2009

      18.Combating money laundering in transition countries: the inherent limitations and practical issues,Journal of Money Laundering Control Vol. 13 No. 3, 2010 pp. 215-225,Emerald Group Publishing Limited

      19. Risk-based AML regulation on internet payment services in China, Journal of Money Laundering Control Vol. 14 No. 1, 2011 pp. 93-101, Emerald Group Publishing Limited

        

      Research Projects

      1. A Study on Suspicious Financial Transaction Surveillance System Based on Behavior Pattern Recognition, a National Social Sciences Fund project, 2009

      2. A Study on Large Value and Unusual Financial Transaction Discriminative Techniques Based on Data Mining, a National Natural Sciences Fund project, 2008

      3. A Comparative Study on AML Systems in Transition Countries, a National Fund for Post-Doctoral Researches, 2007

      4. Characteristics of AML in Central China Areas, a project co-operated with the People Bank ofChina, 2007

      5. A Comparative Study of AML Regulations and Enforcement betweenChinaand Western Countries, a project co-operated with the People Bank ofChina, 2006


    欧宝游戏竞技【科技】有限公司