User identification method, device, electronic device and storage medium

A user identification and user technology, which is applied in the direction of secure communication devices, character and pattern recognition, electrical components, etc., can solve the problems of less training data, low recognition accuracy, and low recognition efficiency, so as to reduce overfitting and improve The effect of training data volume, improving accuracy and recognition efficiency

Active Publication Date: 2022-04-22
BEIJING QIYI CENTURY SCI & TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Due to the large amount of data, the traditional recognition method removes the NaN (Not a Number, ambiguous numerical result) value in the data, resulting in less training data. The fitting situation leads to low recognition accuracy and low recognition efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identification method, device, electronic device and storage medium
  • User identification method, device, electronic device and storage medium
  • User identification method, device, electronic device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0055] The user identification method, device, electronic equipment, storage medium and computer program product including instructions provided in the embodiments of the present application.

[0056] The embodiment of this application provides a user identification method, see figure 1 , figure 1 It is the first schematic diagram of the user identification method in the embodiment of the present application, including the following steps:

[0057] In step 110, sample user data is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present application provides a user identification method, device, electronic equipment, storage medium, and computer program product containing instructions, which relate to the technical field of computer communication networks. By filling the abnormal data in the sample user data with the median, Splitting the data of the string type in the sample user data by One-Hot encoding and based on the cardinality of the data of the enumeration type in the sample user data The method of obtaining enumerated data of multiple feature dimensions preprocesses the sample user data to obtain the preprocessed sample user data, which increases the amount of training data for the deep learning network model and reduces the risk of overfitting In case of occurrence, the user data to be processed is input into the deep learning network model to identify illegal users, thereby improving the accuracy and recognition efficiency of illegal user identification.

Description

technical field [0001] The present application relates to the technical field of computer communication network, in particular to a user identification method, device, electronic equipment and storage medium. Background technique [0002] With the continuous development of Internet technology, multi-level network security threats and security risks are also increasing. Among them, black production refers to the use of the Internet as the medium and network technology as the main means to provide for the security of computer information systems and the order of cyberspace management. Even illegal acts that pose potential threats to national security and social and political stability, the users used on the computer network are black users. For example, there are a large number of unscrupulous users who upload videos on the video platform. These unscrupulous users may have the following characteristics: uploading videos in batches, uploading videos through blacklisted channels...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40G06K9/62
CPCH04L63/1416H04L63/1425G06F18/24323
Inventor 赵艳杰康林段效晨易帆秦占明
Owner BEIJING QIYI CENTURY SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products