Fraud node identification method based on graph embedded representation and recurrent neural network

A technology of cyclic neural network and embedded representation, which is applied in the field of network security, can solve problems such as large network data volume and complex semi-structured data structure, and achieve the effect of reducing labor costs and reducing dimensions

Pending Publication Date: 2021-02-23
SHANGHAI JIAO TONG UNIV
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the advancement of information technology, the complex structure of semi-structured data such as social networks, paper networks, and webpage networks has brought great challenges to traditional graph data processing algorithms. At the same time, due to the huge volume of these network data , simply applying the neu

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fraud node identification method based on graph embedded representation and recurrent neural network
  • Fraud node identification method based on graph embedded representation and recurrent neural network
  • Fraud node identification method based on graph embedded representation and recurrent neural network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0058] In order to explain the purpose, technical solutions and main points of the present invention more clearly and in detail, the present invention will be further elaborated in detail. It should be understood that the implementation methods described here are only used to explain the specific methods of the present invention, rather than limit the present invention , those skilled in the art can implement and popularize according to the principles described in the present invention, and simply modify the user relationship network datasets that need to be processed, so that the present invention can be extended to similar application scenarios.

[0059]The present invention first preprocesses the original data, then uses the preprocessed data to train the graph neural network, and finally the trained neural network predicts the target label according to the test data, specifically including the preprocessing stage, the training model stage and the use of The three stages of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a fraud node identification method based on graph embedding representation and a recurrent neural network. The fraud node identification method comprises the following steps:1) obtaining a data set containing a relational network and node behaviors as an original data set; 2) preprocessing the original data set to obtain graph structure data and node labels; 3) generatingnode embedding representation by using the graph structure data at different time points; 4) inputting the node embedding representations of the same node at different time points into the recurrentneural network according to a time sequence to obtain a final node embedding representation; and 5) training the neural network model by using the final node embedded representation, and predicting the fraud risk of the user by using the trained neural network model. Compared with the prior art, the method has the advantages that features can be directly extracted from a user relationship networkstructure, user node features are not needed, dependence on external features is not needed, and the method adapts to a real environment dynamic graph.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a fraudulent node identification method based on graph embedding representation and cyclic neural network. Background technique [0002] With the advancement of information technology, the complex structure of semi-structured data such as social networks, paper networks, and webpage networks has brought great challenges to traditional graph data processing algorithms. At the same time, due to the huge volume of these network data , simply applying the neural network model for training will cause serious performance problems. In addition, the data in real life is often updated dynamically. The neighbor nodes of nodes and the structure of the entire network will change over time. How to deal with nodes The dynamic change in the time dimension is also a problem worthy of attention. Contents of the invention [0003] The object of the present invention is to provide a met...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F16/901G06F16/951G06F16/9536G06N3/04G06N3/08G06Q30/00G06Q50/00
CPCG06F16/9024G06F16/951G06F16/9536G06N3/08G06Q30/0185G06Q50/01G06N3/044G06N3/045
Inventor 唐嵩凯程帆张冬梅
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products