Method, device and storage medium for identifying malicious user
A technique for malicious users, users
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0044] refer to figure 1 , a method for identifying a malicious user in an embodiment of the present invention is introduced below. The method includes:
[0045] 101. Acquire a training sample set.
[0046]Wherein, the training sample set is a regression tree structure, the training sample set includes features of the training samples and labels corresponding to the training samples, and the labels corresponding to the training samples are used to identify whether the user is a malicious user.
[0047] In some implementations, the characteristics of the training samples include at least the number of user's abnormal barrage, the number of users playing, the number of comments published by the user within the first period, the number of identical comments issued by the user within the second period, and the balance of the user's account .
[0048] 102. Determine an optimal segmentation feature and segmentation threshold from the training sample set.
[0049] 103. Split the ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


