Model training method and device
A model training and model technology, applied in computer security devices, instruments, electrical digital data processing, etc., can solve problems such as prediction models without generalization ability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach
[0041] An optional implementation manner before step 101 is as follows:
[0042] (1) The first terminal sends the user identifiers of the multiple clicking users to the second terminal.
[0043] (2) The first terminal receives the multiple click user identifiers and encrypted tag values fed back by the second terminal.
[0044] The encrypted tag value of the clicked user is obtained by the second terminal after matching the converted user with the clicked user, and the encrypted tag value corresponds to the clicked data tag value or converted tag value, that is, the successfully matched clicked user The encrypted tag value corresponds to the conversion tag value, and the encrypted tag value of the unsuccessful click user corresponds to the click data tag value. Wherein, the encryption algorithm may be a homomorphic encryption algorithm.
[0045] The specific value of the user's tag value may include three types: exposure tag value, click data tag value, and conversion tag ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


