Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for training risk identification model

A risk identification and model technology, applied in the field of training risk identification models, can solve problems such as network behavior security threats, and achieve the effect of saving computing resources and improving training efficiency

Inactive Publication Date: 2021-07-30
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the one hand, these behaviors may have certain risks; on the other hand, there are also some criminals who easily take advantage of the technical defects and legal defects of the Internet to carry out illegal activities.
These all pose a threat to the security of network behavior

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for training risk identification model
  • Method and device for training risk identification model
  • Method and device for training risk identification model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] The solutions provided in this specification will be described below in conjunction with the accompanying drawings.

[0073] Risk identification usually divides risk domains or risk types based on business, such as fraud risk, misappropriation risk, cheating risk, gambling risk, money laundering risk, etc. Risk subjects include, for example, risk users, risk merchants, risk accounts, and so on. Although the levels and nature of risk are different, there are some common characteristics. If the experience and knowledge of various risk types can be used to share algorithms and models, it will effectively improve the efficiency of model training and effectively save computing resources.

[0074] The specific implementation of the above idea is described below.

[0075] figure 1 A flowchart of a method for training a risk identification model according to an embodiment is shown. It can be understood that the method can be executed by any device, device, platform, or devi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a method and device for training a risk identification model. According to the method of the embodiment, firstly, determining a newly-added task; then determining the similarity between the newly added task and an existing task corresponding to a first risk identification model obtained by training; if the similarity meets a preset condition, modifying a structure in the first risk identification model according to the newly added task, the modified structure comprising a newly added structure and / or a deleted structure; and finally, updating model parameters of the first risk identification model containing the modified structure by using the newly added task by adopting an incremental learning algorithm to obtain a second risk identification model.

Description

technical field [0001] One or more embodiments of this specification relate to the technical field of computer applications, and in particular to methods and devices for training risk identification models in the technical field of machine learning. Background technique [0002] With the rapid development of Internet technology, people are increasingly using the Internet for communication, study, work, and even conduct economic activities such as transactions, payments, transfers, and investments through the Internet. On the one hand, these actions may have certain risks; on the other hand, some lawbreakers are likely to take advantage of the technical and legal defects of the Internet to conduct illegal activities. All of these pose a threat to the security of network behavior. In order to improve safety, risk identification is required in the daily prevention and control process, so how to train risk identification models with high efficiency and low consumption has becom...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K9/62G06Q20/40
CPCG06Q20/4016G06F18/22G06F18/24155G06F18/2415G06F18/2431G06F18/24G06F18/214
Inventor 赵宇琦陈彪刘腾飞陆逊张梦娇陈佩弦
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products