Unlock instant, AI-driven research and patent intelligence for your innovation.

A trusted subgraph mining method, device and equipment

A technology of credible subgraphs and subgraphs, applied in the computer field, can solve problems such as inability to describe commonly used information, lack of scalability, and loss of information

Active Publication Date: 2020-11-03
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of this specification provides a trusted subgraph mining method, device and equipment, which are used to solve the following technical problems: the precipitation of trusted data is often limited to certain fixed relationship pairs, lack of scalability, or the precipitation of trusted data In the process, a lot of information will be lost, or the common information of relationship pairs cannot be described, and the problem of dimension explosion is likely to occur when applying multi-subject relationship pairs represented by subgraphs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A trusted subgraph mining method, device and equipment
  • A trusted subgraph mining method, device and equipment
  • A trusted subgraph mining method, device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to enable those skilled in the art to better understand the technical solutions in this specification, the following will clearly and completely describe the technical solutions in the embodiments of this specification in conjunction with the drawings in the embodiments of this specification. Obviously, the described The embodiments are only a part of the embodiments of the present application, rather than all the embodiments. Based on the embodiments of this specification, all other embodiments obtained by those of ordinary skill in the art without creative work should fall within the protection scope of this application.

[0039] Trustworthiness refers to a model that can be deployed lightly in engineering, and the probability of occurrence of risks is stable and far lower than the probability of market risks. The accumulation of credible data can help the release of low-risk transaction events, which is of great significance. In the prior art, the deposition of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of this specification discloses a trusted subgraph mining method, device and equipment. The method includes: obtaining the subgraph corresponding to the graph data to be processed based on the business behavior and / or business relationship of the target point; traversing the subgraph based on the meta-credible recall strategy to obtain an alternative subgraph; A model that classifies the alternative subgraph, and obtains a characterization vector of the alternative subgraph, an overall representation of the alternative subgraph, and a first score of the alternative subgraph, wherein the The first score is used to classify the alternative subgraph to indicate whether the alternative subgraph is credible; based on the characterization vector of the alternative subgraph, the overall representation of the alternative subgraph , using the second model to obtain the second score of the alternative subgraph, wherein the second score represents the risk probability of the alternative subgraph; based on the first score and the second score value, perform subgraph precipitation on the alternative subgraph to obtain a credible subgraph.

Description

Technical field [0001] This specification relates to the field of computer technology, in particular to a method, device and equipment for mining trusted subgraphs. Background technique [0002] With the development of the Internet, advertising on e-commerce platforms, transactions in business processing, web page information, etc., can all be expressed in the form of graph data. In short, information in various scenarios can be converted into graphs for representation . Sub-graphs based on graph data can be used for the precipitation of credible data. The precipitation of credible data can help the release of low-risk transaction events, reduce the amount of analysis at the identification layer, and is of great significance for the identification of credible relationships of transaction events. For the mining of low-risk transaction events or credible data, seek a robust method for quick release, which can not only improve the experience of ordinary users, but also reserve mor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/2458G06N3/04G06N3/08
CPCG06F16/2465G06N3/08G06N3/045
Inventor 周璟宝鹏庆肖凯陆毅成吕乐赵闻飙王维强
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD