Anti-fraud model training method, system and anti-fraud method based on transfer learning
A model training and transfer learning technology, applied in the field of computer information, can solve problems such as difficulty in adapting to needs, difficulty in machine learning, ignoring the complexity and diversity of electronic banking systems, and achieve the effect of improving the accuracy of fraud identification
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0061] This embodiment provides an anti-fraud model training method based on migration learning, which can be applied to anti-fraud identification systems in various e-bank business operations for anti-fraud model training, such as for online banking, mobile banking, The anti-fraud identification system in direct banking and / or WeChat banking operations conducts anti-fraud model training.
[0062] Specifically, such as figure 1 As shown, the method of the present embodiment includes the following steps:
[0063] S101: Obtain first characteristic data of an auxiliary business scenario and second characteristic data of a target business scenario.
[0064] Here, the first feature data is auxiliary data similar to the second feature data in service scenarios. The second characteristic data is the characteristic data of the target business scenario that requires anti-fraud analysis. Specifically, for example, when the anti-fraud model training method of the present application i...
Embodiment 2
[0084] Such as Figure 4 Shown is the second embodiment of the anti-fraud model training method described in this application, including the following steps:
[0085] S401: The acquiring module acquires an operation type.
[0086] Here, besides acquiring the first feature data and the second feature data, the acquiring module also acquires the operation type.
[0087] Here, the operation type can include basic operations and business operations;
[0088] The basic operations include registration or login;
[0089] The business operation includes transfer, payment or consumption.
[0090] S402 The first calculation module classifies the first characteristic data and the second characteristic data according to the operation type, and the first calculation module determines the operation type according to the first characteristic data and the second characteristic data of the same operation type The first value of the parameter in the corresponding anti-fraud model.
[0091]...
Embodiment 3
[0102] Such as Figure 5 Shown is a third embodiment of the anti-fraud model training method described in the present application, wherein the data preprocessing process includes the following steps:
[0103] S501: Perform vectorization processing on the first feature data and the second feature data.
[0104] Here, because the form of the original feature data is not standardized, it is not conducive to automatic processing by the computer, and the vectorized representation of the data is to convert the non-standard feature data into a format that is convenient for computer processing; for numerical features, directly use other The corresponding numerical representation corresponds to the feature data that is not numerical representation into a vector composed of 0 and 1.
[0105] S502: Perform data cleaning processing on the vectorized first feature data and the second feature data.
[0106] Here, errors and loss may occur in the process of feature data collection and tran...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


