CN107943879A - Fraud group detection method and system based on social networks - Google Patents
Fraud group detection method and system based on social networks Download PDFInfo
- Publication number
- CN107943879A CN107943879A CN201711125120.4A CN201711125120A CN107943879A CN 107943879 A CN107943879 A CN 107943879A CN 201711125120 A CN201711125120 A CN 201711125120A CN 107943879 A CN107943879 A CN 107943879A
- Authority
- CN
- China
- Prior art keywords
- social networks
- group detection
- fraud group
- social
- detection method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000001514 detection method Methods 0.000 title claims abstract description 39
- 238000012360 testing method Methods 0.000 claims abstract description 42
- 238000010801 machine learning Methods 0.000 claims description 7
- 238000000034 method Methods 0.000 abstract description 4
- 238000009412 basement excavation Methods 0.000 description 2
- 230000000295 complement effect Effects 0.000 description 2
- 238000012937 correction Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000011156 evaluation Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000012549 training Methods 0.000 description 2
- 238000001914 filtration Methods 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000003058 natural language processing Methods 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/901—Indexing; Data structures therefor; Storage structures
- G06F16/9024—Graphs; Linked lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/04—Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/01—Social networking
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- Theoretical Computer Science (AREA)
- Economics (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Tourism & Hospitality (AREA)
- Marketing (AREA)
- Entrepreneurship & Innovation (AREA)
- General Business, Economics & Management (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Game Theory and Decision Science (AREA)
- Databases & Information Systems (AREA)
- Development Economics (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Primary Health Care (AREA)
- Software Systems (AREA)
- Educational Administration (AREA)
- Data Mining & Analysis (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a kind of fraud group detection method and system based on social networks, wherein method includes the following steps:The step of S1 is used to obtain test source data by social graph;The step of S2 is used to be tested test source data to system under test (SUT) and generates prediction model;The step of S3 is used to perform operation by the fraud group detection technique based on social networks.Fraud group detection method and system provided by the present invention based on social networks, fraud group detection technique based on social networks, user can excavate potential colony according to social networks and cheat, predict fraud colony, be conducive to improve the global risk identification ability of network, avoid unnecessary risk loophole.
Description
Technical field
The present invention relates to computer software technical field, more particularly to fraud group detection method based on social networks and
System.
Background technology
Machine learning techniques based on figure are not only widely used in image, natural language processing, knowledge mapping, network peace
Congruent field, it is also proved to extremely effectively reliable in financial anti-fraud link.Especially in the market ring of current general favour finance
Under border, risk of fraud change is very frequent on line, single individual fraud in the past evolved into rapidly in a organized way, have the group of scale
Body is cheated and corresponding co-related risks.And traditional anti-fraudulent mean includes authentication, customer information logic verify, exterior letter
The modes such as the contrast verification of breath, blacklist filtering are main or in identification individual risk, can not be dug according to the relation of countless ties
Dig potential colony's fraud, it is impossible to predict " good " or the disaggregated model of " bad " people, can not network global risk identification
Ability covers the risk loophole of this part.
The content of the invention
The object of the present invention is to provide a kind of fraud group detection method and system based on social networks.
Fraud group detection method provided by the present invention based on social networks, includes the following steps:
The step of S1 is used to obtain test source data by social graph;
The step of S2 is used to be tested test source data to system under test (SUT) and generates prediction model;
The step of S3 is used to perform operation by the fraud group detection technique based on social networks.
Fraud group detecting system provided by the present invention based on social networks, including:For being obtained by social graph
Take the module of test source data;For test source data to test system under test (SUT) and generates the module of prediction model;With
In the module that operation is performed by the fraud group detection technique based on social networks.
In this way, the fraud group detection technique based on social networks, user can excavate potential group according to social networks
Body is cheated, and predicts fraud colony, is conducive to improve the global risk identification ability of network, is avoided unnecessary risk loophole.
Brief description of the drawings
The step of fraud group detection method based on social networks that Fig. 1,2 are provided by the embodiment of the present invention one, is illustrated
Figure;
Fig. 3 is the step schematic diagram that S1 described in the embodiment of the present invention one is used to obtain test source data by social graph;
Fig. 4 is used to be tested test source data to system under test (SUT) and generates prediction model for S2 described in the embodiment of the present invention one
Step schematic diagram.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, the technical solution in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is
Part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
All other embodiments obtained without making creative work, belong to the scope of protection of the invention.
Embodiment one
As shown in Figure 1, 2, the present embodiment provides a kind of fraud group detection method based on social networks, include the following steps:
The step of S1 is used to obtain test source data by social graph;
The step of S2 is used to be tested test source data to system under test (SUT) and generates prediction model;
The step of S3 is used to perform operation by the fraud group detection technique based on social networks.
It will be understood by those skilled in the art that it is described test source data can include user authorize address list, message registration,
The information such as short message record, programmed emergency.In this way, the fraud group detection technique based on social networks, user can be according to society
The potential colony's fraud of relation excavation is handed over, fraud colony is predicted, is conducive to improve the global risk identification ability of network, avoids
Unnecessary risk loophole.
As shown in figure 3, the S1 is used to include the step of obtaining test source data by social graph:
S11 applies the step of being collected to user social contact relation by social graph;
The data being collected into are established the step of relational network between user by S12 by machine learning engine;
S13 is by the generating algorithm model and rule of above-mentioned relation network and the step of be arranged at different scenes.
It will be understood by those skilled in the art that in scenes such as anti-frauds, can be complementary with common application, complete credit
The functions such as assessment, anti-fraud.The social graph application is to authorize address list by the collection user to user social contact relation, lead to
Record, the information such as short message record, programmed emergency are talked about, then establishes by machine learning engine relational network between user, and
From learning and training algorithm model and rule, applied to different business fields such as collections after credit evaluation, fraud identification, loan
Scape.
As shown in figure 4, the S2 is used to be tested test source data to system under test (SUT) and generates the step of prediction model
Suddenly include:
S21 will have the step of applicant marked whether promise breaking is set to primordial seed node;
S22 by using the semi-supervised algorithm based on figure, by whether the mark broken a contract is broadcast to the applicant of no label the step of;
S23 is according to the graph structure for having a small amount of label node, with the other step of tag class of the unmarked node of propagation algorithm prediction.
It will be understood by those skilled in the art that in financial business, each applicant, cell-phone number, equipment, IP address
It is the node in figure, and it is exactly the side in figure that applicant, which possesses the oriented contact such as equipment, cell-phone number calling handset number, side
Weight is associated tightness degree.In the fraud group detection technique based on social networks, those have what is marked whether promise breaking
Applicant is primordial seed node, by using the semi-supervised algorithm based on figure, whether the mark broken a contract is broadcast to no label
Applicant, extremely huge risk network can be thus constructed on the sample for having label on a small quantity, finally makes to be formed
Effectively reliable violation correction model.
Further, the S3 is used to wrap the step of performing operation by the fraud group detection technique based on social networks
Include:The step of S31 is used to social graph data are stored and calculated.
It will be understood by those skilled in the art that the fraud group detection technique based on social networks technology realization on, base
In frames such as Spark GraphX, Neo4j, it is established that the storage and calculating of social graph data, not only facilitate data technique people
Member's operation, also has business scope expert good interface, propulsion of the support team in modeling and model evolution.
Further, it is described to be used to include the step of social graph data are stored and calculated:S311 builds blacklist
The step of collection of illustrative plates.
Further, the step of S311 structures blacklist collection of illustrative plates includes:
The natural assumption that S3110 is set based on blacklist;
S3111 analyzes the characteristics of each subgraph;
S3112 establishes collection of illustrative plates computation model and corresponding strategy rule;
S3113 establishes the related client of blacklist client corresponding strategy of rejecting loans.
It will be understood by those skilled in the art that the blacklist application of the graphic chart of social networks structure, based on " it is near black that be influenced by close association
Person is black " natural assumption, the characteristics of each subgraph community of analyzing and researching, showed with reference to business, establish collection of illustrative plates computation model and corresponding
Policing rule, for the corresponding strategy of rejecting loans of client related with blacklist client foundation, reduces loss.It is for example, right
In the client of application, during application approval, its address list authorized, message registration etc. " relation " can be tagged in real time
In big data platform socialgram, if there is the black list user judged in system discovery client associated with it, have
Reason believes that the client there are credit risk and risk of fraud, considers, which exists with blacklist client from operational angle
It is closely connected, it is most likely that the problems such as being accused of group's fraud, joint liabilities.
Embodiment two
The present embodiment provides a kind of fraud group detecting system based on social networks, including:
For obtaining the module of test source data by social graph;
For test source data to test system under test (SUT) and generates the module of prediction model;
For performing the module of operation by the fraud group detection technique based on social networks.
It will be understood by those skilled in the art that it is described test source data can include user authorize address list, message registration,
The information such as short message record, programmed emergency.In this way, the fraud group detection technique based on social networks, user can be according to society
The potential colony's fraud of relation excavation is handed over, fraud colony is predicted, is conducive to improve the global risk identification ability of network, avoids
Unnecessary risk loophole.
Further, the module for being used to obtain test source data by social graph includes:
The submodule being collected to user social contact relation is applied by social graph;
The data being collected into are established by machine learning engine to the submodule of the relational network between user;
By the generating algorithm model and rule of above-mentioned relation network and it is arranged at the submodule of different scenes.
It will be understood by those skilled in the art that in scenes such as anti-frauds, can be complementary with common application, complete credit
The functions such as assessment, anti-fraud.The social graph application is to authorize address list by the collection user to user social contact relation, lead to
Record, the information such as short message record, programmed emergency are talked about, then establishes by machine learning engine relational network between user, and
From learning and training algorithm model and rule, applied to different business fields such as collections after credit evaluation, fraud identification, loan
Scape.
Further, it is described to be used to be tested test source data to system under test (SUT) and generate the module bag of prediction model
Include:
The submodule that will there is the applicant marked whether promise breaking to be set to primordial seed node;
By using the semi-supervised algorithm based on figure, judge whether that the mark of promise breaking is broadcast to the submodule of the applicant of no label
Block;
According to the graph structure for having a small amount of label node, with the other submodule of tag class of the unmarked node of propagation algorithm prediction.
It will be understood by those skilled in the art that in financial business, each applicant, cell-phone number, equipment, IP address
It is the node in figure, and it is exactly the side in figure that applicant, which possesses the oriented contact such as equipment, cell-phone number calling handset number, side
Weight is associated tightness degree.In the fraud group detection technique based on social networks, those have what is marked whether promise breaking
Applicant is primordial seed node, by using the semi-supervised algorithm based on figure, whether the mark broken a contract is broadcast to no label
Applicant, extremely huge risk network can be thus constructed on the sample for having label on a small quantity, finally makes to be formed
Effectively reliable violation correction model.
Further, the module for being used to perform operation by the fraud group detection technique based on social networks includes:
For the submodule that social graph data are stored and calculated.
It will be understood by those skilled in the art that the fraud group detection technique based on social networks technology realization on, base
In frames such as Spark GraphX, Neo4j, it is established that the storage and calculating of social graph data, not only facilitate data technique people
Member's operation, also has business scope expert good interface, propulsion of the support team in modeling and model evolution.
Further, the submodule for social graph data to be stored and calculated includes:Build blacklist figure
The modular unit of spectrum.
Further, building the modular unit of blacklist collection of illustrative plates includes:
The natural assumption set based on blacklist;
The characteristics of analyzing each subgraph;
Establish collection of illustrative plates computation model and corresponding strategy rule;
Corresponding strategy of rejecting loans is established to the related client of blacklist client.
It will be understood by those skilled in the art that the blacklist application of the graphic chart of social networks structure, based on " it is near black that be influenced by close association
Person is black " natural assumption, the characteristics of each subgraph community of analyzing and researching, showed with reference to business, establish collection of illustrative plates computation model and corresponding
Policing rule, for the corresponding strategy of rejecting loans of client related with blacklist client foundation, reduces loss.It is for example, right
In the client of application, during application approval, its address list authorized, message registration etc. " relation " can be tagged in real time
In big data platform socialgram, if there is the black list user judged in system discovery client associated with it, have
Reason believes that the client there are credit risk and risk of fraud, considers, which exists with blacklist client from operational angle
It is closely connected, it is most likely that the problems such as being accused of group's fraud, joint liabilities.
Finally it should be noted that:The above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although
The present invention is described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that:It still may be used
To modify to the technical solution described in foregoing embodiments, or equivalent substitution is carried out to which part technical characteristic;
And these modification or replace, do not make appropriate technical solution essence depart from various embodiments of the present invention technical solution spirit and
Scope.
Claims (12)
1. a kind of fraud group detection method based on social networks, it is characterised in that include the following steps:
The step of S1 is used to obtain test source data by social graph;
The step of S2 is used to be tested test source data to system under test (SUT) and generates prediction model;
The step of S3 is used to perform operation by the fraud group detection technique based on social networks.
2. the fraud group detection method based on social networks as claimed in claim 1, it is characterised in that the S1 is used to lead to
Crossing the step of social graph obtains test source data includes:
S11 applies the step of being collected to user social contact relation by social graph;
The data being collected into are established the step of relational network between user by S12 by machine learning engine;
S13 is by the generating algorithm model and rule of above-mentioned relation network and the step of be arranged at different scenes.
3. the fraud group detection method based on social networks as claimed in claim 2, it is characterised in that S2 is used for will test
Source data is tested system under test (SUT) and is included the step of generating prediction model:
S21 will have the step of applicant marked whether promise breaking is set to primordial seed node;
S22 by using the semi-supervised algorithm based on figure, by whether the mark broken a contract is broadcast to the applicant of no label the step of;
S23 is according to the graph structure for having a small amount of label node, with the other step of tag class of the unmarked node of propagation algorithm prediction.
4. the fraud group detection method based on social networks as claimed in claim 3, it is characterised in that the S3 is used to lead to
Crossing the step of fraud group detection technique based on social networks performs operation includes:S31 is used to carry out social graph data
The step of storage is with calculating.
5. the fraud group detection method based on social networks as claimed in claim 4, it is characterised in that described to be used for society
Intersection graph modal data is stored and included the step of calculating:S311 builds the step of blacklist collection of illustrative plates.
6. the fraud group detection method based on social networks as claimed in claim 5, it is characterised in that S311 builds black name
The step of free hand drawing is composed includes:
The natural assumption that S3110 is set based on blacklist;
S3111 analyzes the characteristics of each subgraph;
S3112 establishes collection of illustrative plates computation model and corresponding strategy rule;
S3113 establishes the related client of blacklist client corresponding strategy of rejecting loans.
7. a kind of fraud group detecting system based on social networks, including:
For obtaining the module of test source data by social graph;
For test source data to test system under test (SUT) and generates the module of prediction model;
For performing the module of operation by the fraud group detection technique based on social networks.
8. the fraud group detection method based on social networks as claimed in claim 7, it is characterised in that described to be used to pass through
The module that social graph obtains test source data includes:
The submodule being collected to user social contact relation is applied by social graph;
The data being collected into are established by machine learning engine to the submodule of the relational network between user;
By the generating algorithm model and rule of above-mentioned relation network and it is arranged at the submodule of different scenes.
9. the fraud group detection method based on social networks as claimed in claim 8, it is characterised in that for by test source
Data, which test system under test (SUT) and generate the module of prediction model, to be included:
The submodule that will there is the applicant marked whether promise breaking to be set to primordial seed node;
By using the semi-supervised algorithm based on figure, judge whether that the mark of promise breaking is broadcast to the submodule of the applicant of no label
Block;
According to the graph structure for having a small amount of label node, with the other submodule of tag class of the unmarked node of propagation algorithm prediction.
10. the fraud group detection method based on social networks as claimed in claim 9, it is characterised in that described to be used to lead to
Crossing the module of the fraud group detection technique execution operation based on social networks includes:For being stored to social graph data
With the submodule of calculating.
11. the fraud group detection method based on social networks as claimed in claim 10, it is characterised in that it is described be used for pair
The submodule that social graph data are stored and calculated includes:Build the modular unit of blacklist collection of illustrative plates.
12. the fraud group detection method based on social networks as claimed in claim 11, it is characterised in that structure blacklist
The modular unit of collection of illustrative plates includes:
The natural assumption set based on blacklist;
The characteristics of analyzing each subgraph;
Establish collection of illustrative plates computation model and corresponding strategy rule;
Corresponding strategy of rejecting loans is established to the related client of blacklist client.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711125120.4A CN107943879A (en) | 2017-11-14 | 2017-11-14 | Fraud group detection method and system based on social networks |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711125120.4A CN107943879A (en) | 2017-11-14 | 2017-11-14 | Fraud group detection method and system based on social networks |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107943879A true CN107943879A (en) | 2018-04-20 |
Family
ID=61932138
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711125120.4A Pending CN107943879A (en) | 2017-11-14 | 2017-11-14 | Fraud group detection method and system based on social networks |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107943879A (en) |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108681936A (en) * | 2018-04-26 | 2018-10-19 | 浙江邦盛科技有限公司 | A kind of fraud clique recognition methods propagated based on modularity and balance label |
CN108960304A (en) * | 2018-06-20 | 2018-12-07 | 东华大学 | A kind of deep learning detection method of network trading fraud |
CN109191281A (en) * | 2018-08-21 | 2019-01-11 | 重庆富民银行股份有限公司 | A kind of group's fraud identifying system of knowledge based map |
CN109299811A (en) * | 2018-08-20 | 2019-02-01 | 众安在线财产保险股份有限公司 | A method of the identification of fraud clique and Risk of Communication prediction based on complex network |
CN109377233A (en) * | 2018-09-10 | 2019-02-22 | 阿里巴巴集团控股有限公司 | A kind of risk monitoring method and device |
CN109447658A (en) * | 2018-09-10 | 2019-03-08 | 平安科技(深圳)有限公司 | The generation of anti-fraud model and application method, device, equipment and storage medium |
CN109598509A (en) * | 2018-10-17 | 2019-04-09 | 阿里巴巴集团控股有限公司 | The recognition methods of risk clique and device |
CN109635298A (en) * | 2018-12-11 | 2019-04-16 | 平安科技(深圳)有限公司 | Group's state identification method, device, computer equipment and storage medium |
CN110110093A (en) * | 2019-04-08 | 2019-08-09 | 深圳众赢维融科技有限公司 | A kind of recognition methods, device, electronic equipment and the storage medium of knowledge based map |
CN110232524A (en) * | 2019-06-14 | 2019-09-13 | 哈尔滨哈银消费金融有限责任公司 | Social networks cheats the construction method of model, antifraud method and apparatus |
CN110245875A (en) * | 2019-06-21 | 2019-09-17 | 深圳前海微众银行股份有限公司 | Risk of fraud appraisal procedure, device, equipment and storage medium |
CN110413901A (en) * | 2019-08-02 | 2019-11-05 | 深圳索信达数据技术有限公司 | A kind of assessing credit risks method based on social network analysis |
CN111131627A (en) * | 2019-12-20 | 2020-05-08 | 珠海高凌信息科技股份有限公司 | Method, device and readable medium for detecting personal harmful call based on streaming data atlas |
CN111178615A (en) * | 2019-12-24 | 2020-05-19 | 成都数联铭品科技有限公司 | Construction method and system of enterprise risk identification model |
CN111626887A (en) * | 2019-02-27 | 2020-09-04 | 北京奇虎科技有限公司 | Social relationship evaluation method and device |
CN111814064A (en) * | 2020-06-24 | 2020-10-23 | 平安科技(深圳)有限公司 | Abnormal user processing method and device based on Neo4j, computer equipment and medium |
CN111882330A (en) * | 2020-07-27 | 2020-11-03 | 山东协和学院 | Financial fraud prevention analysis method, device, equipment and storage medium |
CN113011990A (en) * | 2021-02-01 | 2021-06-22 | 深圳无域科技技术有限公司 | Virtual connection network system and information acquisition method thereof |
US20220230238A1 (en) * | 2021-01-19 | 2022-07-21 | PayU Credit B.V. | System and method for assessing risk |
CN110689423B (en) * | 2019-08-22 | 2023-08-11 | 平安科技(深圳)有限公司 | Credit evaluation method and device |
CN117688055A (en) * | 2023-11-08 | 2024-03-12 | 亿保创元(北京)信息科技有限公司 | Insurance black product identification and response system based on correlation network analysis technology |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130103823A1 (en) * | 2011-10-25 | 2013-04-25 | International Business Machines Corporation | Event prediction and preemptive action identification in a networked computing environment |
CN103368917A (en) * | 2012-04-01 | 2013-10-23 | 阿里巴巴集团控股有限公司 | Method and system for risk control of network virtual users |
CN106327209A (en) * | 2016-08-24 | 2017-01-11 | 上海师范大学 | Multi-standard collaborative fraud detection method based on credit accumulation |
CN107194623A (en) * | 2017-07-20 | 2017-09-22 | 深圳市分期乐网络科技有限公司 | A kind of discovery method and device of clique's fraud |
CN107292424A (en) * | 2017-06-01 | 2017-10-24 | 四川新网银行股份有限公司 | A kind of anti-fraud and credit risk forecast method based on complicated social networks |
-
2017
- 2017-11-14 CN CN201711125120.4A patent/CN107943879A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130103823A1 (en) * | 2011-10-25 | 2013-04-25 | International Business Machines Corporation | Event prediction and preemptive action identification in a networked computing environment |
CN103368917A (en) * | 2012-04-01 | 2013-10-23 | 阿里巴巴集团控股有限公司 | Method and system for risk control of network virtual users |
CN106327209A (en) * | 2016-08-24 | 2017-01-11 | 上海师范大学 | Multi-standard collaborative fraud detection method based on credit accumulation |
CN107292424A (en) * | 2017-06-01 | 2017-10-24 | 四川新网银行股份有限公司 | A kind of anti-fraud and credit risk forecast method based on complicated social networks |
CN107194623A (en) * | 2017-07-20 | 2017-09-22 | 深圳市分期乐网络科技有限公司 | A kind of discovery method and device of clique's fraud |
Non-Patent Citations (1)
Title |
---|
武翊等: "基于社会网络分析的拍卖网站信用共谋欺诈群体侦测研究", 《社会发展》 * |
Cited By (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108681936A (en) * | 2018-04-26 | 2018-10-19 | 浙江邦盛科技有限公司 | A kind of fraud clique recognition methods propagated based on modularity and balance label |
CN108960304A (en) * | 2018-06-20 | 2018-12-07 | 东华大学 | A kind of deep learning detection method of network trading fraud |
CN108960304B (en) * | 2018-06-20 | 2022-07-15 | 东华大学 | Deep learning detection method for network transaction fraud behaviors |
CN109299811B (en) * | 2018-08-20 | 2021-02-02 | 众安在线财产保险股份有限公司 | Complex network-based fraud group recognition and risk propagation prediction method |
CN109299811A (en) * | 2018-08-20 | 2019-02-01 | 众安在线财产保险股份有限公司 | A method of the identification of fraud clique and Risk of Communication prediction based on complex network |
CN109191281A (en) * | 2018-08-21 | 2019-01-11 | 重庆富民银行股份有限公司 | A kind of group's fraud identifying system of knowledge based map |
CN109377233A (en) * | 2018-09-10 | 2019-02-22 | 阿里巴巴集团控股有限公司 | A kind of risk monitoring method and device |
CN109447658A (en) * | 2018-09-10 | 2019-03-08 | 平安科技(深圳)有限公司 | The generation of anti-fraud model and application method, device, equipment and storage medium |
CN109377233B (en) * | 2018-09-10 | 2021-06-04 | 创新先进技术有限公司 | Risk monitoring method and device |
CN109598509A (en) * | 2018-10-17 | 2019-04-09 | 阿里巴巴集团控股有限公司 | The recognition methods of risk clique and device |
CN109598509B (en) * | 2018-10-17 | 2023-09-01 | 创新先进技术有限公司 | Identification method and device for risk group partner |
CN109635298A (en) * | 2018-12-11 | 2019-04-16 | 平安科技(深圳)有限公司 | Group's state identification method, device, computer equipment and storage medium |
CN109635298B (en) * | 2018-12-11 | 2022-12-30 | 平安科技(深圳)有限公司 | Group state identification method and device, computer equipment and storage medium |
CN111626887A (en) * | 2019-02-27 | 2020-09-04 | 北京奇虎科技有限公司 | Social relationship evaluation method and device |
CN110110093A (en) * | 2019-04-08 | 2019-08-09 | 深圳众赢维融科技有限公司 | A kind of recognition methods, device, electronic equipment and the storage medium of knowledge based map |
CN110232524A (en) * | 2019-06-14 | 2019-09-13 | 哈尔滨哈银消费金融有限责任公司 | Social networks cheats the construction method of model, antifraud method and apparatus |
CN110245875A (en) * | 2019-06-21 | 2019-09-17 | 深圳前海微众银行股份有限公司 | Risk of fraud appraisal procedure, device, equipment and storage medium |
CN110413901B (en) * | 2019-08-02 | 2023-05-26 | 深圳索信达数据技术有限公司 | Credit risk assessment method based on social network analysis |
CN110413901A (en) * | 2019-08-02 | 2019-11-05 | 深圳索信达数据技术有限公司 | A kind of assessing credit risks method based on social network analysis |
CN110689423B (en) * | 2019-08-22 | 2023-08-11 | 平安科技(深圳)有限公司 | Credit evaluation method and device |
CN111131627B (en) * | 2019-12-20 | 2021-12-07 | 珠海高凌信息科技股份有限公司 | Method, device and readable medium for detecting personal harmful call based on streaming data atlas |
CN111131627A (en) * | 2019-12-20 | 2020-05-08 | 珠海高凌信息科技股份有限公司 | Method, device and readable medium for detecting personal harmful call based on streaming data atlas |
CN111178615A (en) * | 2019-12-24 | 2020-05-19 | 成都数联铭品科技有限公司 | Construction method and system of enterprise risk identification model |
CN111178615B (en) * | 2019-12-24 | 2023-10-27 | 成都数联铭品科技有限公司 | Method and system for constructing enterprise risk identification model |
CN111814064A (en) * | 2020-06-24 | 2020-10-23 | 平安科技(深圳)有限公司 | Abnormal user processing method and device based on Neo4j, computer equipment and medium |
CN111882330A (en) * | 2020-07-27 | 2020-11-03 | 山东协和学院 | Financial fraud prevention analysis method, device, equipment and storage medium |
US20220230238A1 (en) * | 2021-01-19 | 2022-07-21 | PayU Credit B.V. | System and method for assessing risk |
CN113011990A (en) * | 2021-02-01 | 2021-06-22 | 深圳无域科技技术有限公司 | Virtual connection network system and information acquisition method thereof |
CN117688055A (en) * | 2023-11-08 | 2024-03-12 | 亿保创元(北京)信息科技有限公司 | Insurance black product identification and response system based on correlation network analysis technology |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107943879A (en) | Fraud group detection method and system based on social networks | |
CN111008592B (en) | Analyzing facial recognition data and social network data for user authentication | |
Rajan et al. | Developing a modified total interpretive structural model (M-TISM) for organizational strategic cybersecurity management | |
US7747494B1 (en) | Non-determinative risk simulation | |
Moreno-Sanchez et al. | Listening to whispers of ripple: Linking wallets and deanonymizing transactions in the ripple network | |
US7752125B1 (en) | Automated enterprise risk assessment | |
CN112053221A (en) | Knowledge graph-based internet financial group fraud detection method | |
Magistro et al. | Anthropological perspectives and policy implications of climate change research | |
CN109191281A (en) | A kind of group's fraud identifying system of knowledge based map | |
CN109034660A (en) | Based on the determination method and relevant apparatus of the risk control strategy of prediction model | |
CN109034661A (en) | User identification method, device, server and storage medium | |
CN109670936A (en) | Loan examination & approval processing method, platform, equipment and computer readable storage medium | |
CN110113314A (en) | Network safety filed knowledge mapping construction method and device for dynamic threats analysis | |
CN104504335B (en) | Fishing APP detection methods and system based on page feature and URL features | |
CN110493477A (en) | Swindle number identification method, device, equipment and storage medium | |
CN109831459B (en) | Method, device, storage medium and terminal equipment for secure access | |
CN109214177A (en) | A kind of anti-fake system of internet finance | |
CN112053222A (en) | Knowledge graph-based internet financial group fraud detection method | |
Kayode-Ajala | Applications of Cyber Threat Intelligence (CTI) in financial institutions and challenges in its adoption | |
Bakarich et al. | Something phish-y is going on here: A teaching case on business email compromise | |
CN112200583A (en) | Knowledge graph-based fraud client identification method | |
CN109598425A (en) | The method, device and equipment that a kind of pair of risk subjects are managed | |
AL-Hawamleh | Cyber resilience framework: Strengthening defenses and enhancing continuity in business security | |
Kuraku et al. | Safeguarding FinTech: Elevating Employee Cybersecurity Awareness in Financial Sector | |
Cavaliere et al. | The impact of internal control practices on minimizing fraud in companies |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180420 |