Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Suspicious community discovery method and device, storage medium and computer equipment

A discovery method and community technology, applied in the field of suspicious community discovery methods and devices, storage media and computer equipment, can solve the problems of low community quality, lack of business experience, and inability to accurately discover suspicious communities.

Pending Publication Date: 2020-11-17
TENPAY PAID TECH
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For different suspicious types, it is necessary to formulate different suspicious degree calculation methods; for undiscovered risk types, due to lack of relevant business experience, such methods cannot accurately detect suspicious associations
In addition, the unsupervised suspicious community discovery algorithm still has the problem that the quality of the discovered communities is often low. In the social payment scenario, the magnitude of the mined communities is at least one million, so even if 1% of them are manually verified , it also requires a lot of manpower
[0007] For the above-mentioned supervised suspicious community detection algorithm, due to the low coverage of recorded fraudulent accounts as labels, only a small number of suspicious communities can be associated, and there is a problem of low efficiency in finding suspicious communities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Suspicious community discovery method and device, storage medium and computer equipment
  • Suspicious community discovery method and device, storage medium and computer equipment
  • Suspicious community discovery method and device, storage medium and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] Embodiments of the present application provide a suspicious community discovery method and device, a storage medium, and a computer device, which are used to improve the quality and efficiency of suspicious community discovery.

[0044] In order to make the purpose, features, and advantages of the embodiments of the present application more obvious and understandable, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, The embodiments described below are only some of the embodiments of the present application, but not all of them. All other embodiments obtained by those skilled in the art based on the embodiments in the embodiments of the present application belong to the protection scope of the embodiments of the present application.

[0045]The terms "comprising" and "having" in the description and claims of the em...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a suspicious community discovery method and device, a storage medium and computer equipment, which are used for improving the discovery quality and discoveryefficiency of suspicious communities. The embodiment of the invention provides a suspicious community discovery method, which comprises the following steps: constructing a directed weighted network according to transaction snapshots among a plurality of accounts, with each node in the directed weighted network corresponding to one account of the plurality of accounts, and connecting edges of two nodes to indicate that a transaction event occurs between accounts associated with the two nodes, wherein the direction of the edge indicates an execution direction of the transaction event; acquiringa community sequence according to the directed weighted network, wherein the community sequence comprises a plurality of communities extracted from the directed weighted network, and each community comprises a plurality of nodes and edges connecting the two nodes; and obtaining similarity parameters of any two communities from the community sequence, and determining at least two communities of which the similarity parameters exceed a similarity threshold as suspicious communities.

Description

technical field [0001] The embodiments of the present application relate to the field of computer technology, and in particular to a method and device for discovering suspicious communities, a storage medium, and computer equipment. Background technique [0002] In the current social payment scenario, there are transactions between many users, and there are many types of suspicious communities in the transactions between multiple users. For example, typical suspicious communities include: brushing orders, gambling, pyramid schemes, lending and Fraudulent associations of all kinds. In order to ensure the accuracy of strikes, the general strike process includes three steps: discovering suspicious associations, searching for reliable evidence, and attacking suspicious associations. [0003] In the current schemes for discovering suspicious communities, they can be divided into unsupervised suspicious community discovery algorithms and supervised suspicious community discovery ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q30/00G06Q40/02G06Q50/00G06K9/62
CPCG06Q30/0185G06Q50/01G06Q40/03G06F18/22
Inventor 肖葭凯赵强吴鸣
Owner TENPAY PAID TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products