Network training method, risk user identification method, device, equipment and medium
A network training and user technology, applied in the field of data processing, can solve the problem of difficulty in risk identification network training
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0079] The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.
[0080] It should be noted that like numerals and letters denote similar items in the following figures, therefore, once an item is defined in one figure, it does not require further definition and explanation in subsequent figures. Meanwhile, in the description of the present application, the terms "first", "second" and the like are only used to distinguish descriptions, and cannot be understood as indicating or implying relative importance.
[0081] As described in the background technology, with the continuous improvement of computer computing power, deep learning networks are also applied to risk identification. The main purpose of risk identification is to identify high-risk users, so it is necessary to learn high-risk features of a large amount of high-risk user data during network training. H...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


