Abnormal user identification method and device, storage medium and electronic equipment

A user identification and abnormal technology, applied in the field of data analysis, can solve problems such as no necessary connection, accidental damage to good customers, and difficulty in playing, so as to achieve the effect of improving recall rate and accuracy, expanding the scope of application, and reducing data requirements

Pending Publication Date: 2020-09-01
平安直通咨询有限公司
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the above three algorithms have their own defects and deficiencies in artificial intelligence (AI) risk detection. For example, there is usually no necessary connection between the groups divided by the clustering algorithm and the abnormalities; Positive rate) is too high, it is easy to accidentally injure good customers; the lack of strong rela

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormal user identification method and device, storage medium and electronic equipment
  • Abnormal user identification method and device, storage medium and electronic equipment
  • Abnormal user identification method and device, storage medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this application will be thorough and complete, and will fully convey the concepts of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided in order to give a thorough understanding of embodiments of the present disclosure. However, those skilled in the art will appreciate that the technical solutions of the present disclosure may be practiced without one or more of the specific details being omitted, or other methods, components, devices, steps, etc. may be adopted. In other instances, well-known technical solut...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of data analysis. The invention provides an abnormal user identification method. The method comprises the following steps: constructing a weighted fully connected graph for to-be-detected user group data; finding out risk nodes in the connected graph and finding out nodes associated with the risk nodes; and taking the nodes associated with the risk nodes and the risk nodes as suspicious nodes, determining communities where the suspicious nodes are located based on a community discovery algorithm, performing risk scoring on the communities where thesuspicious nodes are located, and finally determining abnormal user groups from the to-be-detected user groups. According to the embodiment of the invention, when the artificial intelligence technology is used for abnormal user identification, the recall rate and accuracy of risk identification are effectively improved, and the application field range of the risk monitoring method is expanded.

Description

technical field [0001] The present application relates to the technical field of data analysis, and specifically relates to an abnormal user identification method, an abnormal user identification device, a computer-readable storage medium, and electronic equipment. Background technique [0002] With the rise and vigorous development of the artificial intelligence (AI) boom, artificial intelligence technology is playing an increasingly important role in the field of financial anti-fraud, anti-money laundering and anti-fraud, hereinafter referred to as abnormality or risk. However, there are technical difficulties in using AI technology to detect risks such as fraud and money laundering, with few or no labels. Therefore, unsupervised learning technology is almost the only option. Among them, the three most widely used mainstream unsupervised learning algorithms are: Clustering algorithms, outlier detection algorithms, and complex network algorithms. [0003] However, the abov...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K9/62G06Q30/00G06Q40/04
CPCG06Q30/0185G06Q40/04G06F18/23213G06F18/22G06F18/24
Inventor 钟红发何振尹小亮古承炬林育芳陈炯其
Owner 平安直通咨询有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products