CN107943879A - Fraud group detection method and system based on social networks - Google Patents

Fraud group detection method and system based on social networks Download PDF

Info

Publication number
CN107943879A
CN107943879A CN201711125120.4A CN201711125120A CN107943879A CN 107943879 A CN107943879 A CN 107943879A CN 201711125120 A CN201711125120 A CN 201711125120A CN 107943879 A CN107943879 A CN 107943879A
Authority
CN
China
Prior art keywords
social networks
group detection
fraud group
social
detection method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711125120.4A
Other languages
Chinese (zh)
Inventor
金家芳
陈斌
张俊飞
匡文豪
薛贤巨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Weixin Hui Chi Financial Technologies Ltd
Original Assignee
Shanghai Weixin Hui Chi Financial Technologies Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Weixin Hui Chi Financial Technologies Ltd filed Critical Shanghai Weixin Hui Chi Financial Technologies Ltd
Priority to CN201711125120.4A priority Critical patent/CN107943879A/en
Publication of CN107943879A publication Critical patent/CN107943879A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/901Indexing; Data structures therefor; Storage structures
    • G06F16/9024Graphs; Linked lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/04Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • Economics (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Tourism & Hospitality (AREA)
  • Marketing (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Business, Economics & Management (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Game Theory and Decision Science (AREA)
  • Databases & Information Systems (AREA)
  • Development Economics (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Software Systems (AREA)
  • Educational Administration (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of fraud group detection method and system based on social networks, wherein method includes the following steps:The step of S1 is used to obtain test source data by social graph;The step of S2 is used to be tested test source data to system under test (SUT) and generates prediction model;The step of S3 is used to perform operation by the fraud group detection technique based on social networks.Fraud group detection method and system provided by the present invention based on social networks, fraud group detection technique based on social networks, user can excavate potential colony according to social networks and cheat, predict fraud colony, be conducive to improve the global risk identification ability of network, avoid unnecessary risk loophole.

Description

Fraud group detection method and system based on social networks
Technical field
The present invention relates to computer software technical field, more particularly to fraud group detection method based on social networks and System.
Background technology
Machine learning techniques based on figure are not only widely used in image, natural language processing, knowledge mapping, network peace Congruent field, it is also proved to extremely effectively reliable in financial anti-fraud link.Especially in the market ring of current general favour finance Under border, risk of fraud change is very frequent on line, single individual fraud in the past evolved into rapidly in a organized way, have the group of scale Body is cheated and corresponding co-related risks.And traditional anti-fraudulent mean includes authentication, customer information logic verify, exterior letter The modes such as the contrast verification of breath, blacklist filtering are main or in identification individual risk, can not be dug according to the relation of countless ties Dig potential colony's fraud, it is impossible to predict " good " or the disaggregated model of " bad " people, can not network global risk identification Ability covers the risk loophole of this part.
The content of the invention
The object of the present invention is to provide a kind of fraud group detection method and system based on social networks.
Fraud group detection method provided by the present invention based on social networks, includes the following steps:
The step of S1 is used to obtain test source data by social graph;
The step of S2 is used to be tested test source data to system under test (SUT) and generates prediction model;
The step of S3 is used to perform operation by the fraud group detection technique based on social networks.
Fraud group detecting system provided by the present invention based on social networks, including:For being obtained by social graph Take the module of test source data;For test source data to test system under test (SUT) and generates the module of prediction model;With In the module that operation is performed by the fraud group detection technique based on social networks.
In this way, the fraud group detection technique based on social networks, user can excavate potential group according to social networks Body is cheated, and predicts fraud colony, is conducive to improve the global risk identification ability of network, is avoided unnecessary risk loophole.
Brief description of the drawings
The step of fraud group detection method based on social networks that Fig. 1,2 are provided by the embodiment of the present invention one, is illustrated Figure;
Fig. 3 is the step schematic diagram that S1 described in the embodiment of the present invention one is used to obtain test source data by social graph;
Fig. 4 is used to be tested test source data to system under test (SUT) and generates prediction model for S2 described in the embodiment of the present invention one Step schematic diagram.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, the technical solution in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is Part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art All other embodiments obtained without making creative work, belong to the scope of protection of the invention.
Embodiment one
As shown in Figure 1, 2, the present embodiment provides a kind of fraud group detection method based on social networks, include the following steps:
The step of S1 is used to obtain test source data by social graph;
The step of S2 is used to be tested test source data to system under test (SUT) and generates prediction model;
The step of S3 is used to perform operation by the fraud group detection technique based on social networks.
It will be understood by those skilled in the art that it is described test source data can include user authorize address list, message registration, The information such as short message record, programmed emergency.In this way, the fraud group detection technique based on social networks, user can be according to society The potential colony's fraud of relation excavation is handed over, fraud colony is predicted, is conducive to improve the global risk identification ability of network, avoids Unnecessary risk loophole.
As shown in figure 3, the S1 is used to include the step of obtaining test source data by social graph:
S11 applies the step of being collected to user social contact relation by social graph;
The data being collected into are established the step of relational network between user by S12 by machine learning engine;
S13 is by the generating algorithm model and rule of above-mentioned relation network and the step of be arranged at different scenes.
It will be understood by those skilled in the art that in scenes such as anti-frauds, can be complementary with common application, complete credit The functions such as assessment, anti-fraud.The social graph application is to authorize address list by the collection user to user social contact relation, lead to Record, the information such as short message record, programmed emergency are talked about, then establishes by machine learning engine relational network between user, and From learning and training algorithm model and rule, applied to different business fields such as collections after credit evaluation, fraud identification, loan Scape.
As shown in figure 4, the S2 is used to be tested test source data to system under test (SUT) and generates the step of prediction model Suddenly include:
S21 will have the step of applicant marked whether promise breaking is set to primordial seed node;
S22 by using the semi-supervised algorithm based on figure, by whether the mark broken a contract is broadcast to the applicant of no label the step of;
S23 is according to the graph structure for having a small amount of label node, with the other step of tag class of the unmarked node of propagation algorithm prediction.
It will be understood by those skilled in the art that in financial business, each applicant, cell-phone number, equipment, IP address It is the node in figure, and it is exactly the side in figure that applicant, which possesses the oriented contact such as equipment, cell-phone number calling handset number, side Weight is associated tightness degree.In the fraud group detection technique based on social networks, those have what is marked whether promise breaking Applicant is primordial seed node, by using the semi-supervised algorithm based on figure, whether the mark broken a contract is broadcast to no label Applicant, extremely huge risk network can be thus constructed on the sample for having label on a small quantity, finally makes to be formed Effectively reliable violation correction model.
Further, the S3 is used to wrap the step of performing operation by the fraud group detection technique based on social networks Include:The step of S31 is used to social graph data are stored and calculated.
It will be understood by those skilled in the art that the fraud group detection technique based on social networks technology realization on, base In frames such as Spark GraphX, Neo4j, it is established that the storage and calculating of social graph data, not only facilitate data technique people Member's operation, also has business scope expert good interface, propulsion of the support team in modeling and model evolution.
Further, it is described to be used to include the step of social graph data are stored and calculated:S311 builds blacklist The step of collection of illustrative plates.
Further, the step of S311 structures blacklist collection of illustrative plates includes:
The natural assumption that S3110 is set based on blacklist;
S3111 analyzes the characteristics of each subgraph;
S3112 establishes collection of illustrative plates computation model and corresponding strategy rule;
S3113 establishes the related client of blacklist client corresponding strategy of rejecting loans.
It will be understood by those skilled in the art that the blacklist application of the graphic chart of social networks structure, based on " it is near black that be influenced by close association Person is black " natural assumption, the characteristics of each subgraph community of analyzing and researching, showed with reference to business, establish collection of illustrative plates computation model and corresponding Policing rule, for the corresponding strategy of rejecting loans of client related with blacklist client foundation, reduces loss.It is for example, right In the client of application, during application approval, its address list authorized, message registration etc. " relation " can be tagged in real time In big data platform socialgram, if there is the black list user judged in system discovery client associated with it, have Reason believes that the client there are credit risk and risk of fraud, considers, which exists with blacklist client from operational angle It is closely connected, it is most likely that the problems such as being accused of group's fraud, joint liabilities.
Embodiment two
The present embodiment provides a kind of fraud group detecting system based on social networks, including:
For obtaining the module of test source data by social graph;
For test source data to test system under test (SUT) and generates the module of prediction model;
For performing the module of operation by the fraud group detection technique based on social networks.
It will be understood by those skilled in the art that it is described test source data can include user authorize address list, message registration, The information such as short message record, programmed emergency.In this way, the fraud group detection technique based on social networks, user can be according to society The potential colony's fraud of relation excavation is handed over, fraud colony is predicted, is conducive to improve the global risk identification ability of network, avoids Unnecessary risk loophole.
Further, the module for being used to obtain test source data by social graph includes:
The submodule being collected to user social contact relation is applied by social graph;
The data being collected into are established by machine learning engine to the submodule of the relational network between user;
By the generating algorithm model and rule of above-mentioned relation network and it is arranged at the submodule of different scenes.
It will be understood by those skilled in the art that in scenes such as anti-frauds, can be complementary with common application, complete credit The functions such as assessment, anti-fraud.The social graph application is to authorize address list by the collection user to user social contact relation, lead to Record, the information such as short message record, programmed emergency are talked about, then establishes by machine learning engine relational network between user, and From learning and training algorithm model and rule, applied to different business fields such as collections after credit evaluation, fraud identification, loan Scape.
Further, it is described to be used to be tested test source data to system under test (SUT) and generate the module bag of prediction model Include:
The submodule that will there is the applicant marked whether promise breaking to be set to primordial seed node;
By using the semi-supervised algorithm based on figure, judge whether that the mark of promise breaking is broadcast to the submodule of the applicant of no label Block;
According to the graph structure for having a small amount of label node, with the other submodule of tag class of the unmarked node of propagation algorithm prediction.
It will be understood by those skilled in the art that in financial business, each applicant, cell-phone number, equipment, IP address It is the node in figure, and it is exactly the side in figure that applicant, which possesses the oriented contact such as equipment, cell-phone number calling handset number, side Weight is associated tightness degree.In the fraud group detection technique based on social networks, those have what is marked whether promise breaking Applicant is primordial seed node, by using the semi-supervised algorithm based on figure, whether the mark broken a contract is broadcast to no label Applicant, extremely huge risk network can be thus constructed on the sample for having label on a small quantity, finally makes to be formed Effectively reliable violation correction model.
Further, the module for being used to perform operation by the fraud group detection technique based on social networks includes: For the submodule that social graph data are stored and calculated.
It will be understood by those skilled in the art that the fraud group detection technique based on social networks technology realization on, base In frames such as Spark GraphX, Neo4j, it is established that the storage and calculating of social graph data, not only facilitate data technique people Member's operation, also has business scope expert good interface, propulsion of the support team in modeling and model evolution.
Further, the submodule for social graph data to be stored and calculated includes:Build blacklist figure The modular unit of spectrum.
Further, building the modular unit of blacklist collection of illustrative plates includes:
The natural assumption set based on blacklist;
The characteristics of analyzing each subgraph;
Establish collection of illustrative plates computation model and corresponding strategy rule;
Corresponding strategy of rejecting loans is established to the related client of blacklist client.
It will be understood by those skilled in the art that the blacklist application of the graphic chart of social networks structure, based on " it is near black that be influenced by close association Person is black " natural assumption, the characteristics of each subgraph community of analyzing and researching, showed with reference to business, establish collection of illustrative plates computation model and corresponding Policing rule, for the corresponding strategy of rejecting loans of client related with blacklist client foundation, reduces loss.It is for example, right In the client of application, during application approval, its address list authorized, message registration etc. " relation " can be tagged in real time In big data platform socialgram, if there is the black list user judged in system discovery client associated with it, have Reason believes that the client there are credit risk and risk of fraud, considers, which exists with blacklist client from operational angle It is closely connected, it is most likely that the problems such as being accused of group's fraud, joint liabilities.
Finally it should be noted that:The above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although The present invention is described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that:It still may be used To modify to the technical solution described in foregoing embodiments, or equivalent substitution is carried out to which part technical characteristic; And these modification or replace, do not make appropriate technical solution essence depart from various embodiments of the present invention technical solution spirit and Scope.

Claims (12)

1. a kind of fraud group detection method based on social networks, it is characterised in that include the following steps:
The step of S1 is used to obtain test source data by social graph;
The step of S2 is used to be tested test source data to system under test (SUT) and generates prediction model;
The step of S3 is used to perform operation by the fraud group detection technique based on social networks.
2. the fraud group detection method based on social networks as claimed in claim 1, it is characterised in that the S1 is used to lead to Crossing the step of social graph obtains test source data includes:
S11 applies the step of being collected to user social contact relation by social graph;
The data being collected into are established the step of relational network between user by S12 by machine learning engine;
S13 is by the generating algorithm model and rule of above-mentioned relation network and the step of be arranged at different scenes.
3. the fraud group detection method based on social networks as claimed in claim 2, it is characterised in that S2 is used for will test Source data is tested system under test (SUT) and is included the step of generating prediction model:
S21 will have the step of applicant marked whether promise breaking is set to primordial seed node;
S22 by using the semi-supervised algorithm based on figure, by whether the mark broken a contract is broadcast to the applicant of no label the step of;
S23 is according to the graph structure for having a small amount of label node, with the other step of tag class of the unmarked node of propagation algorithm prediction.
4. the fraud group detection method based on social networks as claimed in claim 3, it is characterised in that the S3 is used to lead to Crossing the step of fraud group detection technique based on social networks performs operation includes:S31 is used to carry out social graph data The step of storage is with calculating.
5. the fraud group detection method based on social networks as claimed in claim 4, it is characterised in that described to be used for society Intersection graph modal data is stored and included the step of calculating:S311 builds the step of blacklist collection of illustrative plates.
6. the fraud group detection method based on social networks as claimed in claim 5, it is characterised in that S311 builds black name The step of free hand drawing is composed includes:
The natural assumption that S3110 is set based on blacklist;
S3111 analyzes the characteristics of each subgraph;
S3112 establishes collection of illustrative plates computation model and corresponding strategy rule;
S3113 establishes the related client of blacklist client corresponding strategy of rejecting loans.
7. a kind of fraud group detecting system based on social networks, including:
For obtaining the module of test source data by social graph;
For test source data to test system under test (SUT) and generates the module of prediction model;
For performing the module of operation by the fraud group detection technique based on social networks.
8. the fraud group detection method based on social networks as claimed in claim 7, it is characterised in that described to be used to pass through The module that social graph obtains test source data includes:
The submodule being collected to user social contact relation is applied by social graph;
The data being collected into are established by machine learning engine to the submodule of the relational network between user;
By the generating algorithm model and rule of above-mentioned relation network and it is arranged at the submodule of different scenes.
9. the fraud group detection method based on social networks as claimed in claim 8, it is characterised in that for by test source Data, which test system under test (SUT) and generate the module of prediction model, to be included:
The submodule that will there is the applicant marked whether promise breaking to be set to primordial seed node;
By using the semi-supervised algorithm based on figure, judge whether that the mark of promise breaking is broadcast to the submodule of the applicant of no label Block;
According to the graph structure for having a small amount of label node, with the other submodule of tag class of the unmarked node of propagation algorithm prediction.
10. the fraud group detection method based on social networks as claimed in claim 9, it is characterised in that described to be used to lead to Crossing the module of the fraud group detection technique execution operation based on social networks includes:For being stored to social graph data With the submodule of calculating.
11. the fraud group detection method based on social networks as claimed in claim 10, it is characterised in that it is described be used for pair The submodule that social graph data are stored and calculated includes:Build the modular unit of blacklist collection of illustrative plates.
12. the fraud group detection method based on social networks as claimed in claim 11, it is characterised in that structure blacklist The modular unit of collection of illustrative plates includes:
The natural assumption set based on blacklist;
The characteristics of analyzing each subgraph;
Establish collection of illustrative plates computation model and corresponding strategy rule;
Corresponding strategy of rejecting loans is established to the related client of blacklist client.
CN201711125120.4A 2017-11-14 2017-11-14 Fraud group detection method and system based on social networks Pending CN107943879A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711125120.4A CN107943879A (en) 2017-11-14 2017-11-14 Fraud group detection method and system based on social networks

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711125120.4A CN107943879A (en) 2017-11-14 2017-11-14 Fraud group detection method and system based on social networks

Publications (1)

Publication Number Publication Date
CN107943879A true CN107943879A (en) 2018-04-20

Family

ID=61932138

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711125120.4A Pending CN107943879A (en) 2017-11-14 2017-11-14 Fraud group detection method and system based on social networks

Country Status (1)

Country Link
CN (1) CN107943879A (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108681936A (en) * 2018-04-26 2018-10-19 浙江邦盛科技有限公司 A kind of fraud clique recognition methods propagated based on modularity and balance label
CN108960304A (en) * 2018-06-20 2018-12-07 东华大学 A kind of deep learning detection method of network trading fraud
CN109191281A (en) * 2018-08-21 2019-01-11 重庆富民银行股份有限公司 A kind of group's fraud identifying system of knowledge based map
CN109299811A (en) * 2018-08-20 2019-02-01 众安在线财产保险股份有限公司 A method of the identification of fraud clique and Risk of Communication prediction based on complex network
CN109377233A (en) * 2018-09-10 2019-02-22 阿里巴巴集团控股有限公司 A kind of risk monitoring method and device
CN109447658A (en) * 2018-09-10 2019-03-08 平安科技(深圳)有限公司 The generation of anti-fraud model and application method, device, equipment and storage medium
CN109598509A (en) * 2018-10-17 2019-04-09 阿里巴巴集团控股有限公司 The recognition methods of risk clique and device
CN109635298A (en) * 2018-12-11 2019-04-16 平安科技(深圳)有限公司 Group's state identification method, device, computer equipment and storage medium
CN110110093A (en) * 2019-04-08 2019-08-09 深圳众赢维融科技有限公司 A kind of recognition methods, device, electronic equipment and the storage medium of knowledge based map
CN110232524A (en) * 2019-06-14 2019-09-13 哈尔滨哈银消费金融有限责任公司 Social networks cheats the construction method of model, antifraud method and apparatus
CN110245875A (en) * 2019-06-21 2019-09-17 深圳前海微众银行股份有限公司 Risk of fraud appraisal procedure, device, equipment and storage medium
CN110413901A (en) * 2019-08-02 2019-11-05 深圳索信达数据技术有限公司 A kind of assessing credit risks method based on social network analysis
CN111131627A (en) * 2019-12-20 2020-05-08 珠海高凌信息科技股份有限公司 Method, device and readable medium for detecting personal harmful call based on streaming data atlas
CN111178615A (en) * 2019-12-24 2020-05-19 成都数联铭品科技有限公司 Construction method and system of enterprise risk identification model
CN111626887A (en) * 2019-02-27 2020-09-04 北京奇虎科技有限公司 Social relationship evaluation method and device
CN111814064A (en) * 2020-06-24 2020-10-23 平安科技(深圳)有限公司 Abnormal user processing method and device based on Neo4j, computer equipment and medium
CN111882330A (en) * 2020-07-27 2020-11-03 山东协和学院 Financial fraud prevention analysis method, device, equipment and storage medium
CN113011990A (en) * 2021-02-01 2021-06-22 深圳无域科技技术有限公司 Virtual connection network system and information acquisition method thereof
US20220230238A1 (en) * 2021-01-19 2022-07-21 PayU Credit B.V. System and method for assessing risk
CN110689423B (en) * 2019-08-22 2023-08-11 平安科技(深圳)有限公司 Credit evaluation method and device
CN117688055A (en) * 2023-11-08 2024-03-12 亿保创元(北京)信息科技有限公司 Insurance black product identification and response system based on correlation network analysis technology

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130103823A1 (en) * 2011-10-25 2013-04-25 International Business Machines Corporation Event prediction and preemptive action identification in a networked computing environment
CN103368917A (en) * 2012-04-01 2013-10-23 阿里巴巴集团控股有限公司 Method and system for risk control of network virtual users
CN106327209A (en) * 2016-08-24 2017-01-11 上海师范大学 Multi-standard collaborative fraud detection method based on credit accumulation
CN107194623A (en) * 2017-07-20 2017-09-22 深圳市分期乐网络科技有限公司 A kind of discovery method and device of clique's fraud
CN107292424A (en) * 2017-06-01 2017-10-24 四川新网银行股份有限公司 A kind of anti-fraud and credit risk forecast method based on complicated social networks

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130103823A1 (en) * 2011-10-25 2013-04-25 International Business Machines Corporation Event prediction and preemptive action identification in a networked computing environment
CN103368917A (en) * 2012-04-01 2013-10-23 阿里巴巴集团控股有限公司 Method and system for risk control of network virtual users
CN106327209A (en) * 2016-08-24 2017-01-11 上海师范大学 Multi-standard collaborative fraud detection method based on credit accumulation
CN107292424A (en) * 2017-06-01 2017-10-24 四川新网银行股份有限公司 A kind of anti-fraud and credit risk forecast method based on complicated social networks
CN107194623A (en) * 2017-07-20 2017-09-22 深圳市分期乐网络科技有限公司 A kind of discovery method and device of clique's fraud

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
武翊等: "基于社会网络分析的拍卖网站信用共谋欺诈群体侦测研究", 《社会发展》 *

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108681936A (en) * 2018-04-26 2018-10-19 浙江邦盛科技有限公司 A kind of fraud clique recognition methods propagated based on modularity and balance label
CN108960304A (en) * 2018-06-20 2018-12-07 东华大学 A kind of deep learning detection method of network trading fraud
CN108960304B (en) * 2018-06-20 2022-07-15 东华大学 Deep learning detection method for network transaction fraud behaviors
CN109299811B (en) * 2018-08-20 2021-02-02 众安在线财产保险股份有限公司 Complex network-based fraud group recognition and risk propagation prediction method
CN109299811A (en) * 2018-08-20 2019-02-01 众安在线财产保险股份有限公司 A method of the identification of fraud clique and Risk of Communication prediction based on complex network
CN109191281A (en) * 2018-08-21 2019-01-11 重庆富民银行股份有限公司 A kind of group's fraud identifying system of knowledge based map
CN109377233A (en) * 2018-09-10 2019-02-22 阿里巴巴集团控股有限公司 A kind of risk monitoring method and device
CN109447658A (en) * 2018-09-10 2019-03-08 平安科技(深圳)有限公司 The generation of anti-fraud model and application method, device, equipment and storage medium
CN109377233B (en) * 2018-09-10 2021-06-04 创新先进技术有限公司 Risk monitoring method and device
CN109598509A (en) * 2018-10-17 2019-04-09 阿里巴巴集团控股有限公司 The recognition methods of risk clique and device
CN109598509B (en) * 2018-10-17 2023-09-01 创新先进技术有限公司 Identification method and device for risk group partner
CN109635298A (en) * 2018-12-11 2019-04-16 平安科技(深圳)有限公司 Group's state identification method, device, computer equipment and storage medium
CN109635298B (en) * 2018-12-11 2022-12-30 平安科技(深圳)有限公司 Group state identification method and device, computer equipment and storage medium
CN111626887A (en) * 2019-02-27 2020-09-04 北京奇虎科技有限公司 Social relationship evaluation method and device
CN110110093A (en) * 2019-04-08 2019-08-09 深圳众赢维融科技有限公司 A kind of recognition methods, device, electronic equipment and the storage medium of knowledge based map
CN110232524A (en) * 2019-06-14 2019-09-13 哈尔滨哈银消费金融有限责任公司 Social networks cheats the construction method of model, antifraud method and apparatus
CN110245875A (en) * 2019-06-21 2019-09-17 深圳前海微众银行股份有限公司 Risk of fraud appraisal procedure, device, equipment and storage medium
CN110413901B (en) * 2019-08-02 2023-05-26 深圳索信达数据技术有限公司 Credit risk assessment method based on social network analysis
CN110413901A (en) * 2019-08-02 2019-11-05 深圳索信达数据技术有限公司 A kind of assessing credit risks method based on social network analysis
CN110689423B (en) * 2019-08-22 2023-08-11 平安科技(深圳)有限公司 Credit evaluation method and device
CN111131627B (en) * 2019-12-20 2021-12-07 珠海高凌信息科技股份有限公司 Method, device and readable medium for detecting personal harmful call based on streaming data atlas
CN111131627A (en) * 2019-12-20 2020-05-08 珠海高凌信息科技股份有限公司 Method, device and readable medium for detecting personal harmful call based on streaming data atlas
CN111178615A (en) * 2019-12-24 2020-05-19 成都数联铭品科技有限公司 Construction method and system of enterprise risk identification model
CN111178615B (en) * 2019-12-24 2023-10-27 成都数联铭品科技有限公司 Method and system for constructing enterprise risk identification model
CN111814064A (en) * 2020-06-24 2020-10-23 平安科技(深圳)有限公司 Abnormal user processing method and device based on Neo4j, computer equipment and medium
CN111882330A (en) * 2020-07-27 2020-11-03 山东协和学院 Financial fraud prevention analysis method, device, equipment and storage medium
US20220230238A1 (en) * 2021-01-19 2022-07-21 PayU Credit B.V. System and method for assessing risk
CN113011990A (en) * 2021-02-01 2021-06-22 深圳无域科技技术有限公司 Virtual connection network system and information acquisition method thereof
CN117688055A (en) * 2023-11-08 2024-03-12 亿保创元(北京)信息科技有限公司 Insurance black product identification and response system based on correlation network analysis technology

Similar Documents

Publication Publication Date Title
CN107943879A (en) Fraud group detection method and system based on social networks
CN111008592B (en) Analyzing facial recognition data and social network data for user authentication
Rajan et al. Developing a modified total interpretive structural model (M-TISM) for organizational strategic cybersecurity management
US7747494B1 (en) Non-determinative risk simulation
Moreno-Sanchez et al. Listening to whispers of ripple: Linking wallets and deanonymizing transactions in the ripple network
US7752125B1 (en) Automated enterprise risk assessment
CN112053221A (en) Knowledge graph-based internet financial group fraud detection method
Magistro et al. Anthropological perspectives and policy implications of climate change research
CN109191281A (en) A kind of group's fraud identifying system of knowledge based map
CN109034660A (en) Based on the determination method and relevant apparatus of the risk control strategy of prediction model
CN109034661A (en) User identification method, device, server and storage medium
CN109670936A (en) Loan examination & approval processing method, platform, equipment and computer readable storage medium
CN110113314A (en) Network safety filed knowledge mapping construction method and device for dynamic threats analysis
CN104504335B (en) Fishing APP detection methods and system based on page feature and URL features
CN110493477A (en) Swindle number identification method, device, equipment and storage medium
CN109831459B (en) Method, device, storage medium and terminal equipment for secure access
CN109214177A (en) A kind of anti-fake system of internet finance
CN112053222A (en) Knowledge graph-based internet financial group fraud detection method
Kayode-Ajala Applications of Cyber Threat Intelligence (CTI) in financial institutions and challenges in its adoption
Bakarich et al. Something phish-y is going on here: A teaching case on business email compromise
CN112200583A (en) Knowledge graph-based fraud client identification method
CN109598425A (en) The method, device and equipment that a kind of pair of risk subjects are managed
AL-Hawamleh Cyber resilience framework: Strengthening defenses and enhancing continuity in business security
Kuraku et al. Safeguarding FinTech: Elevating Employee Cybersecurity Awareness in Financial Sector
Cavaliere et al. The impact of internal control practices on minimizing fraud in companies

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180420