Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A social content risk identification method, device and equipment

A risk identification and content technology, applied in the field of social content risk identification, can solve problems such as threatening network security and social security, affecting normal users' online experience, etc., and achieve the effect of reliable identification

Active Publication Date: 2020-11-10
ADVANCED NEW TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In practical applications, some social content is risky, which will affect the normal user's online experience, and may threaten network security or even real social security in serious cases, such as violence, terror, or politically-related inappropriate behavior or inappropriate speech, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A social content risk identification method, device and equipment
  • A social content risk identification method, device and equipment
  • A social content risk identification method, device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The embodiment of this specification provides a social content risk identification method, device and equipment.

[0031] In order to enable those skilled in the art to better understand the technical solutions in this specification, the technical solutions in the embodiments of this specification will be clearly and completely described below in conjunction with the drawings in the embodiments of this specification. Obviously, the described The embodiments are only some of the embodiments of the present application, but not all of them. Based on the embodiments of this specification, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0032] In the embodiment of this specification, using a deep machine learning model to identify social content risks is more reliable than identifying keywords based on experience. Considering that in practical applications, the o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of this specification discloses a social content risk identification method, device and equipment. The solution includes: processing the stump-structured machine learning model to expand the feature dimension of the features of the social content data to be identified, and then input the obtained dimensionally expanded features into the deep machine learning model for prediction, so as to identify whether the social content data is risky .

Description

technical field [0001] This specification relates to the technical field of computer software, and in particular to a method, device and equipment for social content risk identification. Background technique [0002] With the rapid development of computer technology and Internet technology, more and more social activities are carried out based on the Internet, including but not limited to forum exchanges, instant messaging, online transactions and other activities. The corpus and other data are collectively referred to as social content here. [0003] In practical applications, some social content is risky and will affect normal users' online experience. In serious cases, it may threaten network security or even real social security, such as violence, terror, or politically-related inappropriate behavior or inappropriate speech. [0004] In the prior art, some keywords are often set based on experience, and risk identification is performed on social content through keyword ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q50/00G06K9/62
CPCG06Q50/01G06F18/2415G06F18/24G06Q10/067G06Q30/0185G06Q20/4016G06Q40/08G06Q20/384G06N20/00G06F40/30H04L51/046H04L51/52G06F18/2148
Inventor 王川
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products