Unlock instant, AI-driven research and patent intelligence for your innovation.

Network training method, risk user identification method, device, equipment and medium

A network training and user technology, applied in the field of data processing, can solve the problem of difficulty in risk identification network training

Active Publication Date: 2021-09-21
北京轻松怡康信息技术有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the embodiment of the present application is to provide a network training method, risk user identification method, device, electronic equipment and storage medium, aiming to solve the problem of difficulty in current risk identification network training

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network training method, risk user identification method, device, equipment and medium
  • Network training method, risk user identification method, device, equipment and medium
  • Network training method, risk user identification method, device, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0079] The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.

[0080] It should be noted that like numerals and letters denote similar items in the following figures, therefore, once an item is defined in one figure, it does not require further definition and explanation in subsequent figures. Meanwhile, in the description of the present application, the terms "first", "second" and the like are only used to distinguish descriptions, and cannot be understood as indicating or implying relative importance.

[0081] As described in the background technology, with the continuous improvement of computer computing power, deep learning networks are also applied to risk identification. The main purpose of risk identification is to identify high-risk users, so it is necessary to learn high-risk features of a large amount of high-risk user data during network training. H...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides a network training method, risk user identification method, device, electronic equipment, and storage medium. The training method includes: acquiring multiple low-risk user information; performing vector encoding on multiple low-risk user information to obtain multiple low-risk User vector; perform vector splicing and vector replacement on multiple low-risk user vectors, and construct the first normal user matrix, the second normal user matrix, and the abnormal user matrix; based on the first normal user matrix, the second normal user matrix, and the abnormal user matrix , train the preset pre-trained network until the loss function of the pre-trained network reaches the preset convergence condition, and obtain the risk feature extraction network. In this embodiment, an abnormal user matrix with high-risk features is constructed based on low-risk user information, thereby realizing the construction of a training sample set for a risk feature extraction network, reducing the difficulty of network training and improving the accuracy of network training.

Description

technical field [0001] The present application relates to the technical field of data processing, and specifically relates to a network training method, a risk user identification method, a device, an electronic device, and a storage medium. Background technique [0002] With the rapid development of Internet technology, more and more financial businesses conduct online transactions online. However, online transactions are accompanied by the risk of online financial fraud. Therefore, risk identification is an important means of guaranteeing the security of online financial services. important in prevention. [0003] At present, risk identification methods mainly use statistical models and machine learning models for risk assessment, such as support vector machines, random forests, and gradient boosting decision trees. With the continuous improvement of computer computing power, deep learning networks have also been applied to risk identification. The main purpose of risk i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q40/02
CPCG06Q40/03
Inventor 张翼温佳豪尤鸣宇韩煊
Owner 北京轻松怡康信息技术有限公司