CN108596630A - Fraudulent trading recognition methods, system and storage medium based on deep learning - Google Patents

Fraudulent trading recognition methods, system and storage medium based on deep learning Download PDF

Info

Publication number
CN108596630A
CN108596630A CN201810407275.5A CN201810407275A CN108596630A CN 108596630 A CN108596630 A CN 108596630A CN 201810407275 A CN201810407275 A CN 201810407275A CN 108596630 A CN108596630 A CN 108596630A
Authority
CN
China
Prior art keywords
layer
fraudulent trading
dimensionality reduction
rbm
rbm neural
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810407275.5A
Other languages
Chinese (zh)
Other versions
CN108596630B (en
Inventor
许泰清
盛帅
张文慧
曾征
曾卓然
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZHAOSHANG BANK CO Ltd
China Merchants Bank Co Ltd
Original Assignee
ZHAOSHANG BANK CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZHAOSHANG BANK CO Ltd filed Critical ZHAOSHANG BANK CO Ltd
Priority to CN201810407275.5A priority Critical patent/CN108596630B/en
Publication of CN108596630A publication Critical patent/CN108596630A/en
Application granted granted Critical
Publication of CN108596630B publication Critical patent/CN108596630B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/23Clustering techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • G06N3/088Non-supervised learning, e.g. competitive learning

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Accounting & Taxation (AREA)
  • Evolutionary Computation (AREA)
  • General Engineering & Computer Science (AREA)
  • Biomedical Technology (AREA)
  • Mathematical Physics (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Biophysics (AREA)
  • Computational Linguistics (AREA)
  • General Health & Medical Sciences (AREA)
  • Molecular Biology (AREA)
  • Computing Systems (AREA)
  • Evolutionary Biology (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Image Analysis (AREA)

Abstract

The invention discloses a kind of fraudulent trading recognition methods, system and storage medium based on deep learning, this method include:Training sample is obtained, the training sample is the transaction data for establishing fraudulent trading detection model;The RBM neural network structures stacked are built, and train the RBM neural network structures of the stacking based on the training sample, generate dimensionality reduction device;Dimensionality reduction is carried out to the training sample by the dimensionality reduction device, and the binary condition vector obtained by dimensionality reduction is clustered, to establish fraudulent trading detection model;Transaction data to be detected is obtained, and according to the fraudulent trading detection model, analyzes transaction data to be detected, to identify fraudulent trading.The present invention can improve the accuracy of fraudulent trading identification, without pre-defined method for measuring similarity, so as to reduce difficulty and cost, and to the tolerance of sample data height.

Description

Fraudulent trading recognition methods, system and storage medium based on deep learning
Technical field
The present invention relates to Financial Risk Control field more particularly to a kind of fraudulent trading identification sides based on deep learning Method, system and storage medium.
Background technology
Financial field is to the more demanding of transaction risk control.In the identification for carrying out fraudulent trading using deep learning, Detection model is generally trained using supervised learning algorithm at present, and is used to train detection model to be characterized in based on there is going through for label History transaction data and construct, therefore using supervised learning algorithm training detection model, can effectively identify history cheat class Type, and be to the general incapability of unknown fraud type (for example do not occurred or the fraudulent trading of mutation) for lacking fraud sample Power, this posteriority cause transaction risk identification to have hysteresis quality, accuracy relatively low.
On the other hand, when the existing progress fraudulent trading identification using unsupervised learning algorithm, K-Means algorithms are generally used Or density-based algorithms are directly clustered to data and (do not pass through dimensionality reduction), the essence of above-mentioned clustering algorithm is to be based on The metric learning (metric learning) of similarity, need to previously according to the distance between experience Manual definition's sample, however, For training the feature of detection model to belong to high dimensional feature, the data of high dimensional feature are manually difficult to determine suitable similarity Measure can only determine suitable similarity through a large number of experiments, take a substantial amount of time and manpower;And it is currently used Feature dimension reduction method is principal component analysis (PCA), and PCA is adapted to linear and Gaussian distributed data, in practical application Data are substantially nonlinear, it is difficult to meet the applicable conditions of PCA, PCA can not reach expected dimensionality reduction effect in practice Even fail.In short, existing carry out fraudulent trading knowledge otherwise by unsupervised learning algorithm, difficulty and cost are huge, and Harshness is required to sample data, the sample data provided in practical application is difficult to meet the requirements.
Invention content
The fraudulent trading recognition methods based on deep learning that the main purpose of the present invention is to provide a kind of, it is intended to solve existing There is fraudulent trading recognition methods not accurate enough, difficulty and cost are huge, and require sample data harsh technical problem.
To achieve the above object, the present invention provides a kind of fraudulent trading recognition methods based on deep learning, the method Including:
Training sample is obtained, the training sample is the transaction data for establishing fraudulent trading detection model;
The limited Boltzmann machine RBM neural network structures stacked are built, and the heap is trained based on the training sample Folded RBM neural network structures generate dimensionality reduction device;
Dimensionality reduction carried out to the training sample by the dimensionality reduction device, and by the binary condition vector obtained by dimensionality reduction into Row cluster, to establish fraudulent trading detection model;
Transaction data to be detected is obtained, and according to the fraudulent trading detection model, analyzes transaction data to be detected, to know Fraudulent trading is not gone out.
Optionally, the step of RBM neural network structures of the structure stacking include:
The output node number of the number of plies and each layer of RBM neural network of the RBM neural network structures of the stacking is set.
Optionally, the RBM neural network structures that the stacking is trained based on the training sample generate dimensionality reduction device Step includes:
The feature of the training sample is determined, and according to feature construction high dimensional feature vector, by the high dimensional feature Vector constitutes high-dimensional feature space;
Based on the high-dimensional feature space, each layer of RBM god in the RBM neural network structures of the stacking is trained one by one Through network;
Each layer RBM neural networks that training is completed are stacked, dimensionality reduction device is generated.
Optionally, described to be based on the high-dimensional feature space, in the RBM neural network structures for training the stacking one by one The step of each layer of RBM neural network includes:
Based on the high-dimensional feature space, each layer in RBM neural network structures by training the stacking one by one RBM neural networks, with the parameter of each layer RBM neural networks of determination.
Optionally, described to be based on the high-dimensional feature space, by the RBM neural network structures for training the stacking one by one In each layer of RBM neural network, include with the step of parameters of each layer RBM neural networks of determination:
The initial parameter value of first layer RBM neural networks is randomly generated using normal distribution;
First layer is trained using the dimension of the high-dimensional feature space as the input number of nodes of first layer RBM neural networks RBM neural networks obtain first layer RBM nerves by adjusting the initial parameter value of the first layer RBM neural networks when training The parameter of network;
After the parameter for obtaining N-1 layers of RBM neural networks, n-th layer RBM neural networks are randomly generated using normal distribution Initial parameter value;
It is instructed using the output node number of N-1 layers of RBM neural networks as the input number of nodes of n-th layer RBM neural networks Practice n-th layer neural network, by adjusting the initial parameter value of the n-th layer RBM neural networks when training, obtains n-th layer RBM god Parameter through network, to obtain the parameter of each layer RBM neural networks, wherein N >=2.
Optionally, each layer of RBM neural network includes visible layer and hidden layer, each layer of RBM neural network Parameter include weight matrix between the visible layer and hidden layer, in visible layer in the offset and hidden layer of visible node The offset of concealed nodes.
Optionally, described that dimensionality reduction, and two will obtained by dimensionality reduction are carried out to the training sample by the dimensionality reduction device The step of first state vector is clustered include:
By the dimensionality reduction device, the training sample is mapped as binary condition vector;
Training sample with identical binary condition vector is classified as same group, if so that the training sample is divided into Gan Ge groups.
Optionally, described that transaction data to be detected is analyzed according to the fraudulent trading detection model, to identify that fraud is handed over Easy step includes:
By the transaction data to be detected, substitutes into the fraudulent trading detection model and carry out dimensionality reduction and cluster successively, obtain To transaction group to be detected;
The corresponding probability of cheating of each transaction group to be detected is analyzed, needs to aggravate according to the determination of each probability of cheating of analysis The transaction group to be detected of audit, to identify fraudulent trading.
In addition, to achieve the above object, the present invention also provides a kind of fraudulent trading identifying system based on deep learning, institute Stating the fraudulent trading identifying system based on deep learning includes:It memory, processor and is stored on the memory and can be The fraudulent trading recognizer based on deep learning run on the processor, the fraudulent trading based on deep learning are known Other program realizes following steps when being executed by the processor:
Training sample is obtained, the training sample is the transaction data for establishing fraudulent trading detection model;
The limited Boltzmann machine RBM neural network structures stacked are built, and the heap is trained based on the training sample Folded RBM neural network structures generate dimensionality reduction device;
Dimensionality reduction carried out to the training sample by the dimensionality reduction device, and by the binary condition vector obtained by dimensionality reduction into Row cluster, to establish fraudulent trading detection model;
Transaction data to be detected is obtained, and according to the fraudulent trading detection model, analyzes transaction data to be detected, to know Fraudulent trading is not gone out.
In addition, to achieve the above object, the present invention also provides a kind of storage medium, being stored with and being based on the storage medium The fraudulent trading recognizer of deep learning, it is real when the fraudulent trading recognizer based on deep learning is executed by processor Existing following steps:
Training sample is obtained, the training sample is the transaction data for establishing fraudulent trading detection model;
The limited Boltzmann machine RBM neural network structures stacked are built, and the heap is trained based on the training sample Folded RBM neural network structures generate dimensionality reduction device;
Dimensionality reduction carried out to the training sample by the dimensionality reduction device, and by the binary condition vector obtained by dimensionality reduction into Row cluster, to establish fraudulent trading detection model;
Transaction data to be detected is obtained, and according to the fraudulent trading detection model, analyzes transaction data to be detected, to know Fraudulent trading is not gone out.
The present invention builds the RBM neural network structures stacked, based on unsupervised high dimensional data sample to RBM neural networks Structure is trained, and generates dimensionality reduction device;Then dimensionality reduction is carried out to unsupervised high dimensional data sample by the dimensionality reduction device of generation, and The binary condition vector obtained by dimensionality reduction is clustered, this process is not necessarily to pre-defined method for measuring similarity, reduces Difficulty and cost, and it is high to sample data tolerance, to establish fraudulent trading detection model, for analyzing transaction to be detected Data realize dimensionality reduction and cluster to transaction data to be detected based on fraudulent trading detection model, and this makes it possible to obtain with fresh Each transaction group to be detected of bright characteristic, then risk of fraud identification is carried out to each transaction group to be detected, can effectively it know The fraudulent trading of other history fraud type and unknown fraud type, improves the accuracy of fraudulent trading identification.
Description of the drawings
Fig. 1 is the terminal structure schematic diagram for the hardware running environment that the embodiment of the present invention is related to;
Fig. 2 is that the present invention is based on the flow diagrams of the fraudulent trading recognition methods first embodiment of deep learning;
Fig. 3 is 3 layers of RBM neural network structure schematic diagrames of the present invention;
Fig. 4 is that the present invention is based on the refinement flow diagrams of the fraudulent trading recognition methods first embodiment of deep learning;
Fig. 5 is the schematic diagram of each layer of RBM neural network of the present invention;
The present invention is based on the flow diagrams of the fraudulent trading recognition methods second embodiment of deep learning by Fig. 6.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific implementation mode
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The primary solutions of the embodiment of the present invention are:Training sample is obtained, the training sample is to be cheated for establishing The transaction data of transaction detection model;The RBM neural network structures stacked are built, and the heap is trained based on the training sample Folded RBM neural network structures generate dimensionality reduction device;Dimensionality reduction is carried out to the training sample by the dimensionality reduction device, and will be passed through The binary condition vector that dimensionality reduction obtains is clustered, to establish fraudulent trading detection model;Obtain transaction data to be detected, and root According to the fraudulent trading detection model, transaction data to be detected is analyzed, to identify fraudulent trading.
As shown in Figure 1, the terminal structure schematic diagram for the hardware running environment that Fig. 1, which is the embodiment of the present invention, to be related to.
Terminal of the embodiment of the present invention carries the fraudulent trading identifying system based on deep learning.
As shown in Figure 1, the terminal may include:Processor 1001, such as CPU, communication bus 1002, user interface 1003, network interface 1004, memory 1005.Wherein, communication bus 1002 is for realizing the connection communication between these components. User interface 1003 may include display screen (Display), input unit such as keyboard (Keyboard), optional user interface 1003 can also include standard wireline interface and wireless interface.Network interface 1004 may include optionally that the wired of standard connects Mouth, wireless interface (such as WI-FI interfaces).Memory 1005 can be high-speed RAM memory, can also be stable memory (non-volatile memory), such as magnetic disk storage.Memory 1005 optionally can also be independently of aforementioned processor 1001 storage device.
It will be understood by those skilled in the art that the restriction of the not structure paired terminal of terminal structure shown in Fig. 1, can wrap It includes than illustrating more or fewer components, either combines certain components or different components arrangement.
As shown in Figure 1, as may include that operating system, network are logical in a kind of memory 1005 of computer storage media Believe module, Subscriber Interface Module SIM and the fraudulent trading recognizer based on deep learning.
In terminal shown in Fig. 1, network interface 1004 is mainly used for connecting background server, is carried out with background server Data communicate;User interface 1003 is mainly used for connecting client (user terminal), with client into row data communication;And processor 1001 can be used for calling the fraudulent trading recognizer based on deep learning stored in memory 1005, and execute following behaviour Make:
Training sample is obtained, the training sample is the transaction data for establishing fraudulent trading detection model;
The RBM neural network structures stacked are built, and train the RBM neural networks of the stacking based on the training sample Structure generates dimensionality reduction device;
Dimensionality reduction carried out to the training sample by the dimensionality reduction device, and by the binary condition vector obtained by dimensionality reduction into Row cluster, to establish fraudulent trading detection model;
Transaction data to be detected is obtained, and according to the fraudulent trading detection model, analyzes transaction data to be detected, to know Fraudulent trading is not gone out.
Further, processor 1001 can call the fraudulent trading based on deep learning stored in memory 1005 to know Other program also executes following operation:
The output node number of the number of plies and each layer of RBM neural network of the RBM neural network structures of the stacking is set.
Further, processor 1001 can call the fraudulent trading based on deep learning stored in memory 1005 to know Other program also executes following operation:
The feature of the training sample is determined, and according to feature construction high dimensional feature vector, by the high dimensional feature Vector constitutes high-dimensional feature space;
Based on the high-dimensional feature space, each layer of RBM god in the RBM neural network structures of the stacking is trained one by one Through network;
Each layer RBM neural networks that training is completed are stacked, dimensionality reduction device is generated.
Further, processor 1001 can call the fraudulent trading based on deep learning stored in memory 1005 to know Other program also executes following operation:
Based on the high-dimensional feature space, each layer in RBM neural network structures by training the stacking one by one RBM neural networks, with the parameter of each layer RBM neural networks of determination.
Further, processor 1001 can call the fraudulent trading based on deep learning stored in memory 1005 to know Other program also executes following operation:
The initial parameter value of first layer RBM neural networks is randomly generated using normal distribution;
First layer is trained using the dimension of the high-dimensional feature space as the input number of nodes of first layer RBM neural networks RBM neural networks obtain first layer RBM nerves by adjusting the initial parameter value of the first layer RBM neural networks when training The parameter of network;
After the parameter for obtaining N-1 layers of RBM neural networks, n-th layer RBM neural networks are randomly generated using normal distribution Initial parameter value;
It is instructed using the output node number of N-1 layers of RBM neural networks as the input number of nodes of n-th layer RBM neural networks Practice n-th layer neural network, by adjusting the initial parameter value of the n-th layer RBM neural networks when training, obtains n-th layer RBM god Parameter through network, to obtain the parameter of each layer RBM neural networks, wherein N >=2.
Further, each layer of RBM neural network includes visible layer and hidden layer, each layer of RBM nerve net The parameter of network includes weight matrix between the visible layer and hidden layer, in visible layer visible node offset and hidden layer The offset of middle concealed nodes.
Further, processor 1001 can call the fraudulent trading based on deep learning stored in memory 1005 to know Other program also executes following operation:
By the dimensionality reduction device, the training sample is mapped as binary condition vector;
Training sample with identical binary condition vector is classified as same group, if so that the training sample is divided into Gan Ge groups.
Further, processor 1001 can call the fraudulent trading based on deep learning stored in memory 1005 to know Other program also executes following operation:
By the transaction data to be detected, substitutes into the fraudulent trading detection model and carry out dimensionality reduction and cluster successively, obtain To transaction group to be detected;
The corresponding probability of cheating of each transaction group to be detected is analyzed, needs to aggravate according to the determination of each probability of cheating of analysis The transaction group to be detected of audit, to identify fraudulent trading.
Based on above-mentioned hardware configuration, propose that the present invention is based on each implementations of the fraudulent trading recognition methods of deep learning Example.
With reference to Fig. 2, the present invention is based on the fraudulent trading recognition methods first embodiments of deep learning to provide a kind of be based on deeply The fraudulent trading recognition methods for spending study, the method includes:
Step S10, obtains training sample, and the training sample is the number of deals for establishing fraudulent trading detection model According to;
In the present embodiment, it is somebody's turn to do the fraudulent trading recognition methods based on deep learning and is applied to the fraud based on deep learning Transaction identification system.The present embodiment establishes fraudulent trading detection model using unsupervised learning method.
In the present embodiment, include the steps that the historical trading data acquired in a period of time before step S10, this is gone through History transaction data includes the essential informations such as exchange hour, transaction IP address, transaction area, transaction amount, traction equipment, will be acquired Historical trading data as the training sample for establishing fraudulent trading detection model, the training sample be one set, The element of set the inside is transaction data sample one by one, such as:
Training sample=transaction data sample 1, transaction data sample 2 ...
=(exchange hour 1, transaction IP address 1, transaction area 1, transaction amount 1, traction equipment 1), (exchange hour 2, Transaction IP address 2, transaction area 2, transaction amount 2, traction equipment 2) ... }.
That is, the high dimensional data that each sample in training sample is made of the essential information merchandised, and the training sample This does not have data label.
Step S20 builds the RBM neural network structures of stacking, and the RBM of the stacking is trained based on the training sample Neural network structure generates dimensionality reduction device;
In the present embodiment, the RBM neural network structures for needing structure to stack, and based on training sample to RBM nerves Network structure is trained.RBM (Restricted Boltzmann Machine, limited Boltzmann machine) be it is a kind of it is available with Machine neural network (Stochastic neural network) is come the probability graph model (Probabilistic that explains graphical model);It is so-called " random ", refer to neuron in this network it is probabilistic neural member, there are two types of outputs only State (un-activation, activation) is generally indicated with binary zero and 1, that is to say, that RBM each output node values 0 or 1, specific value need to be determined according to probability statistics rule;There is connectionless, interlayer in layer to connect entirely for connection between neuron The characteristics of connecing.It follows that RBM is the structure based on two points of (probability) figures.Can be arranged RBM neural network structures the number of plies and The output node number of each layer of RBM neural network, to build the RBM neural network structures of stacking, by taking Fig. 3 as an example, Fig. 3 is 3 layers RBM neural network structure schematic diagrames, i.e., the number of plies of RBM neural network structures is set as 3 layers, from bottom (first layer) under On and, the output node number of each layer of RBM neural network is respectively set to 6,4,3 successively.It later, can be according to training sample The RBM neural network structures of structure are trained, to generate dimensionality reduction device.Specifically, with reference to Fig. 4, it is based on the trained sample This trains the RBM neural network structures of the stacking, and the step of generating dimensionality reduction device includes:
Step S21 determines the feature of the training sample, and according to feature construction high dimensional feature vector, by described High dimensional feature vector constitutes high-dimensional feature space;
Step S22 is based on the high-dimensional feature space, trains one by one every in the RBM neural network structures of the stacking One layer of RBM neural network;
Step S23 stacks each layer RBM neural networks that training is completed, and generates dimensionality reduction device.
When it is implemented, needing the feature of determining training sample first.Since each sample in training sample is by handing over The high dimensional data of easy essential information composition, can construct high dimensional feature vector based on the essential information of transaction, high dimensional feature to Amount constitutes high-dimensional feature space.For example, each sample in training sample be by exchange hour, transaction IP address, transaction area, When 5 dimension data of transaction amount and traction equipment composition, for each sample, it can construct based on exchange hour, with merchandising IP Location, transaction area, transaction amount, traction equipment feature vector, as a result, each sample in training sample contain 5 Wei Te Levy space.
Based on high-dimensional feature space, each layer of RBM nerve net can be trained one by one from bottom (first layer) from bottom to top Network stacks each layer RBM neural networks that training is completed, and just generates a dimensionality reduction device.Pass through the dimensionality reduction device, training sample In the high-dimensional feature space of each sample can be mapped to a lower dimensional space.For example, with RBM neural networks shown in Fig. 3 For structure, have the RBM neural networks that have three layers, the output node number of top layer RBM neural networks is set as 3, then 5 dimensional features Space will be reduced to 3 dimensions after the processing of 3 layers of RBM neural networks.
Specifically, the step S22 may include:
Step S220 is based on the high-dimensional feature space, in the RBM neural network structures by training the stacking one by one Each layer of RBM neural network, with the parameter of each layer RBM neural networks of determination.
Wherein, step S220 may include:
Step S221 randomly generates the initial parameter value of first layer RBM neural networks using normal distribution;
Step S222, using the dimension of the high-dimensional feature space as the input number of nodes of first layer RBM neural networks Training first layer RBM neural networks obtain the by adjusting the initial parameter value of the first layer RBM neural networks when training The parameter of one layer of RBM neural network;
Step S223 randomly generates n-th layer after the parameter for obtaining N-1 layers of RBM neural networks using normal distribution The initial parameter value of RBM neural networks;
Step S224, using the output node number of N-1 layers of RBM neural networks as the input of n-th layer RBM neural networks Number of nodes trains n-th layer neural network, by adjusting the initial parameter value of the n-th layer RBM neural networks when training, obtains the The parameter of N layers of RBM neural networks, to obtain the parameter of each layer RBM neural networks, wherein N >=2.
The training to each layer of RBM neural network is this means that adjust the parameter of each layer of RBM neural network one by one.Reference Fig. 5, Fig. 5 are the schematic diagram of each layer of RBM neural network, and each layer of RBM neural network includes visible layer and hidden layer, each layer The parameter of RBM neural networks includes the weight matrix w between the visible layer and hidden layeri,j, wi,jIt indicates in visible layer i-th It can be seen that the connection weight in node (neuron) and hidden layer between j-th of concealed nodes (neuron);Each layer of RBM nerve net The parameter of network further includes the offset b=(b of visible node in visible layer1,b2,b3,…,bi), biIndicate visible layer in i-th can See the offset of node;The parameter of each layer of RBM neural network further includes the offset c=(c of concealed nodes in hidden layer1,c2, c3,…,cj), cjIndicate the offset of j-th of concealed nodes in hidden layer.
Specifically, the step of training each layer of RBM neural network one by one is as follows:
The parameter of bottom (first layer) RBM neural networks is initialized first, i.e., randomly generates bottom (the using normal distribution One layer) initial parameter values of RBM neural networks, that is to say, that the initial parameter value of bottom (first layer) RBM neural networks is next Random number from normal distribution (0,1), then using the dimension of above-mentioned high-dimensional feature space as bottom (first layer) RBM nerves The input number of nodes of network trains first layer RBM neural networks, learns to obtain bottom (first layer) RBM neural networks when training Parameter, the i.e. initial parameter value by adjusting the first layer RBM neural networks obtain bottom (first layer) RBM neural networks Parameter;After the parameter for obtaining bottom (first layer) RBM neural networks, second layer RBM god is randomly generated using normal distribution Initial parameter value through network, then using the output node number of bottom (first layer) RBM neural networks as second layer RBM god Input number of nodes through network trains second layer neural network, by adjusting the ginseng of the second layer RBM neural networks when training Number initial value, obtains the parameter of second layer RBM neural networks;And so on, that is, utilize the output of N-1 layers of RBM neural networks Number of nodes trains n-th layer neural network as the input number of nodes of n-th layer RBM neural networks, by adjusting the N when training The initial parameter value of layer RBM neural networks, obtains the parameter of n-th layer RBM neural networks, wherein N >=2, this makes it possible to obtain each layers The parameter of RBM neural networks, to complete the training of each layer of RBM neural network, by each layer RBM neural networks of training completion It is stacked, just generates a dimensionality reduction device.
Step S30 carries out dimensionality reduction, and the binary shape that will be obtained by dimensionality reduction by the dimensionality reduction device to the training sample State vector is clustered, to establish fraudulent trading detection model;Wherein, it is described by the dimensionality reduction device to the training sample into Row dimensionality reduction, and the step of binary condition vector obtained by dimensionality reduction is clustered may include:
The training sample is mapped as binary condition vector by step S31 by the dimensionality reduction device;
Step S32, the training sample with identical binary condition vector are classified as same group, so that the training sample is drawn It is divided into several groups.
After the present embodiment generates dimensionality reduction device, dimensionality reduction can be carried out to training sample by the dimensionality reduction device, in this way, training sample Each sample be mapped as a binary condition vector.Assuming that dimensionality reduction device will be dropped with the training sample of n dimensional feature spaces Dimension ties up (m≤n) to m, can theoretically generate 2mA binary condition vector.It should be noted that can be reached when only m≤n To the purpose of dimensionality reduction.In actual tests, the sample of one 2000 dimension is mapped as the binary condition vector of 35 dimensions: (11101111001011111110111111111111111), i.e., as n=2000, after dimensionality reduction device dimension-reduction treatment, m= 35.In the process, it is not necessarily to pre-defined method for measuring similarity, also just without manually determining high dimensional data by many experiments The similarity of sample, not only difficulty reduces, but also reduces cost.
Later, the binary condition vector obtained by dimensionality reduction is clustered, i.e., it will be with identical binary condition vector Training sample is classified as same group, and the training sample is divided into several groups's (being defined as G group), in this way, can To establish a fraudulent trading detection model with dimensionality reduction and the function of convergence.In addition, in actual tests, finally obtained group Number G is well below 2 for groupm, this also illustrates RBM very strong ability in feature extraction and noise processed ability, tolerates sample Degree is high.
In the present embodiment, it is a kind of unsupervised high dimensional data sample since training sample does not have data label, it can Effectively to represent data characteristics, the RBM neural network structures built in advance using this sample training, in addition RBM has very strong spy Sign extractability and noise processed ability, the accuracy of dimensionality reduction device greatly promote, to also improve fraudulent trading detection model Accuracy.
Step S40 obtains transaction data to be detected, and according to the fraudulent trading detection model, analyzes transaction to be detected Data, to identify fraudulent trading.
In the present embodiment, when receiving transaction data to be detected, so that it may be cheated with substituting into transaction data to be detected Transaction detection model, carries out dimensionality reduction and cluster successively, can obtain each transaction group to be detected, and then identify each group Transaction swindling risk, thus identifies fraudulent trading.
The RBM neural network structures that the present embodiment structure stacks, based on unsupervised high dimensional data sample to RBM nerve nets Network structure is trained, and generates dimensionality reduction device;Then dimensionality reduction is carried out to unsupervised high dimensional data sample by the dimensionality reduction device of generation, And cluster the binary condition vector obtained by dimensionality reduction, this process is not necessarily to pre-defined method for measuring similarity, drop Low difficulty and cost, and it is high to sample data tolerance, to establish fraudulent trading detection model, for analyzing test cross to be checked Easy data realize dimensionality reduction and cluster to transaction data to be detected based on fraudulent trading detection model, this makes it possible to obtain with Each transaction group to be detected of distinct characteristic, then risk of fraud identification is carried out to each transaction group to be detected, it can be effective The fraudulent trading for identifying history fraud type and unknown fraud type, improves the accuracy of fraudulent trading identification.
Further, with reference to Fig. 6, the present invention is based on the fraudulent trading recognition methods second embodiments of deep learning to provide one Fraudulent trading recognition methods of the kind based on deep learning, is based on above-mentioned embodiment shown in Fig. 2, and the step S40 can be wrapped It includes:
Step S41, by the transaction data to be detected, substitute into the fraudulent trading detection model carry out successively dimensionality reduction and Cluster, obtains transaction group to be detected;
Step S42 analyzes the corresponding probability of cheating of each transaction group to be detected, true according to each probability of cheating of analysis Surely the transaction group to be detected that audit need to be aggravated, to identify fraudulent trading.
In the present embodiment, when receiving transaction data to be detected, transaction data to be detected is substituted into fraudulent trading inspection It surveys and carries out dimensionality reduction and cluster in model, since fraudulent trading detection model is based on unsupervised high dimensional data sample, and tool There is the RBM of very strong ability in feature extraction and noise processed ability and establish, transaction data to be detected is detected by fraudulent trading After the dimensionality reduction and cluster of model, each transaction group to be detected with distinct characteristic can be obtained, is then analyzed each to be checked The corresponding probability of cheating of the easy group of test cross determines the transaction group to be detected that need to aggravate audit according to each probability of cheating of analysis Group, then identify fraudulent trading from the transaction group to be detected that need to aggravate audit, the accuracy of fraudulent trading identification can be improved.
In addition, the embodiment of the present invention also proposes a kind of storage medium.
The fraudulent trading recognizer based on deep learning is stored on institute's storage medium of the present invention, it is described to be based on depth Following operation is realized when the fraudulent trading recognizer of habit is executed by processor:
Training sample is obtained, the training sample is the transaction data for establishing fraudulent trading detection model;
The RBM neural network structures stacked are built, and train the RBM neural networks of the stacking based on the training sample Structure generates dimensionality reduction device;
Dimensionality reduction carried out to the training sample by the dimensionality reduction device, and by the binary condition vector obtained by dimensionality reduction into Row cluster, to establish fraudulent trading detection model;
Transaction data to be detected is obtained, and according to the fraudulent trading detection model, analyzes transaction data to be detected, to know Fraudulent trading is not gone out.
The specific embodiment of storage medium of the present invention is respectively implemented with the above-mentioned fraudulent trading recognition methods based on deep learning Example is essentially identical, and therefore not to repeat here.
It should be noted that herein, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that process, method, article or system including a series of elements include not only those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or system institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including this There is also other identical elements in the process of element, method, article or system.
The embodiments of the present invention are for illustration only, can not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical scheme of the present invention substantially in other words does the prior art Going out the part of contribution can be expressed in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that a station terminal equipment (can be mobile phone, computer, clothes Be engaged in device, air conditioner or the network equipment etc.) execute method described in each embodiment of the present invention.
It these are only the preferred embodiment of the present invention, be not intended to limit the scope of the invention, it is every to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of fraudulent trading recognition methods based on deep learning, which is characterized in that the method includes:
Training sample is obtained, the training sample is the transaction data for establishing fraudulent trading detection model;
The limited Boltzmann machine RBM neural network structures stacked are built, and the stacking is trained based on the training sample RBM neural network structures generate dimensionality reduction device;
Dimensionality reduction is carried out to the training sample by the dimensionality reduction device, and the binary condition vector obtained by dimensionality reduction is gathered Class, to establish fraudulent trading detection model;
Transaction data to be detected is obtained, and according to the fraudulent trading detection model, analyzes transaction data to be detected, to identify Fraudulent trading.
2. the fraudulent trading recognition methods based on deep learning as described in claim 1, which is characterized in that the structure stacks RBM neural network structures the step of include:
The output node number of the number of plies and each layer of RBM neural network of the RBM neural network structures of the stacking is set.
3. the fraudulent trading recognition methods based on deep learning as claimed in claim 2, which is characterized in that described based on described Training sample trains the RBM neural network structures of the stacking, and the step of generating dimensionality reduction device includes:
The feature of the training sample is determined, and according to feature construction high dimensional feature vector, by high dimensional feature vector Constitute high-dimensional feature space;
Based on the high-dimensional feature space, each layer of RBM nerve net in the RBM neural network structures of the stacking is trained one by one Network;
Each layer RBM neural networks that training is completed are stacked, dimensionality reduction device is generated.
4. the fraudulent trading recognition methods based on deep learning as claimed in claim 3, which is characterized in that described based on described High-dimensional feature space, one by one train the stacking RBM neural network structures in each layer of RBM neural network the step of wrap It includes:
Based on the high-dimensional feature space, each layer of RBM god in RBM neural network structures by training the stacking one by one Through network, with the parameter of each layer RBM neural networks of determination.
5. the fraudulent trading recognition methods based on deep learning as claimed in claim 4, which is characterized in that described based on described High-dimensional feature space, each layer of RBM neural network in RBM neural network structures by training the stacking one by one, with true The step of parameter of each layer RBM neural networks includes calmly:
The initial parameter value of first layer RBM neural networks is randomly generated using normal distribution;
Using the dimension of the high-dimensional feature space as the input number of nodes of first layer RBM neural networks training first layer RBM Neural network obtains first layer RBM nerve nets by adjusting the initial parameter value of the first layer RBM neural networks when training The parameter of network;
After the parameter for obtaining N-1 layers of RBM neural networks, the ginseng of n-th layer RBM neural networks is randomly generated using normal distribution Number initial value;
N is trained using the output node number of N-1 layers of RBM neural networks as the input number of nodes of n-th layer RBM neural networks Layer neural network obtains n-th layer RBM nerve nets by adjusting the initial parameter value of the n-th layer RBM neural networks when training The parameter of network, to obtain the parameter of each layer RBM neural networks, wherein N >=2.
6. the fraudulent trading recognition methods based on deep learning as claimed in claim 5, which is characterized in that each layer RBM neural networks include visible layer and hidden layer, and the parameter of each layer of RBM neural network includes the visible layer and hides Weight matrix between layer, in visible layer in the offset of visible node and hidden layer concealed nodes offset.
7. the fraudulent trading recognition methods based on deep learning as described in claim 1, which is characterized in that described by described Dimensionality reduction device carries out dimensionality reduction to the training sample, and the step of binary condition vector obtained by dimensionality reduction is clustered is wrapped It includes:
By the dimensionality reduction device, the training sample is mapped as binary condition vector;
Training sample with identical binary condition vector is classified as same group, so that the training sample is divided into several Group.
8. the fraudulent trading recognition methods based on deep learning as described in claim 1, which is characterized in that described in the basis Fraudulent trading detection model analyzes transaction data to be detected, and to identify fraudulent trading the step of includes:
By the transaction data to be detected, substitutes into the fraudulent trading detection model and carry out dimensionality reduction and cluster successively, waited for Detection transaction group;
The corresponding probability of cheating of each transaction group to be detected is analyzed, need to aggravate to audit according to the determination of each probability of cheating of analysis Transaction group to be detected, to identify fraudulent trading.
9. a kind of fraudulent trading identifying system based on deep learning, which is characterized in that the fraud based on deep learning is handed over System easy to identify includes:Memory, processor and be stored on the memory and can run on the processor based on The fraudulent trading recognizer of deep learning, the fraudulent trading recognizer based on deep learning are executed by the processor Shi Shixian following steps:
Training sample is obtained, the training sample is the transaction data for establishing fraudulent trading detection model;
The RBM neural network structures stacked are built, and train the RBM neural network knots of the stacking based on the training sample Structure generates dimensionality reduction device;
Dimensionality reduction is carried out to the training sample by the dimensionality reduction device, and the binary condition vector obtained by dimensionality reduction is gathered Class, to establish fraudulent trading detection model;
Transaction data to be detected is obtained, and according to the fraudulent trading detection model, analyzes transaction data to be detected, to identify Fraudulent trading.
10. a kind of storage medium, which is characterized in that be stored with the fraudulent trading identification based on deep learning on the storage medium Program, the fraudulent trading recognizer based on deep learning realize following steps when being executed by processor:
Training sample is obtained, the training sample is the transaction data for establishing fraudulent trading detection model;
The RBM neural network structures stacked are built, and train the RBM neural network knots of the stacking based on the training sample Structure generates dimensionality reduction device;
Dimensionality reduction is carried out to the training sample by the dimensionality reduction device, and the binary condition vector obtained by dimensionality reduction is gathered Class, to establish fraudulent trading detection model;
Transaction data to be detected is obtained, and according to the fraudulent trading detection model, analyzes transaction data to be detected, to identify Fraudulent trading.
CN201810407275.5A 2018-04-28 2018-04-28 Fraud transaction identification method, system and storage medium based on deep learning Active CN108596630B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810407275.5A CN108596630B (en) 2018-04-28 2018-04-28 Fraud transaction identification method, system and storage medium based on deep learning

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810407275.5A CN108596630B (en) 2018-04-28 2018-04-28 Fraud transaction identification method, system and storage medium based on deep learning

Publications (2)

Publication Number Publication Date
CN108596630A true CN108596630A (en) 2018-09-28
CN108596630B CN108596630B (en) 2022-03-01

Family

ID=63619471

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810407275.5A Active CN108596630B (en) 2018-04-28 2018-04-28 Fraud transaction identification method, system and storage medium based on deep learning

Country Status (1)

Country Link
CN (1) CN108596630B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109544163A (en) * 2018-11-30 2019-03-29 华青融天(北京)软件股份有限公司 A kind of risk control method, device, equipment and the medium of user's payment behavior
CN109784403A (en) * 2019-01-16 2019-05-21 武汉斗鱼鱼乐网络科技有限公司 A kind of method and relevant device identifying risk equipment
CN109858930A (en) * 2019-01-24 2019-06-07 同济大学 Online trading fraud detection method based on associated diagram spectrum representative learning
CN111275098A (en) * 2020-01-17 2020-06-12 同济大学 Encoder-LSTM deep learning model applied to credit card fraud detection and method thereof
CN111340509A (en) * 2020-05-22 2020-06-26 支付宝(杭州)信息技术有限公司 False transaction identification method and device and electronic equipment
CN111401393A (en) * 2019-01-02 2020-07-10 中国移动通信有限公司研究院 Data processing method and device, electronic equipment and storage medium
CN111415167A (en) * 2020-02-19 2020-07-14 同济大学 Network fraud transaction detection method and device, computer storage medium and terminal
CN111445259A (en) * 2018-12-27 2020-07-24 中国移动通信集团辽宁有限公司 Method, device, equipment and medium for determining business fraud behaviors
CN111507382A (en) * 2020-04-01 2020-08-07 北京互金新融科技有限公司 Sample file clustering method and device and electronic equipment
CN112330328A (en) * 2019-08-05 2021-02-05 四川大学 Credit card fraud detection method based on feature extraction
CN113052266A (en) * 2021-04-27 2021-06-29 中国工商银行股份有限公司 Transaction mode type identification method and device
CN113469695A (en) * 2020-03-30 2021-10-01 同济大学 Electronic fraud transaction identification method, system and device based on kernel supervision Hash model

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101894130A (en) * 2010-06-08 2010-11-24 浙江大学 Sparse dimension reduction-based spectral hash indexing method
US20140079297A1 (en) * 2012-09-17 2014-03-20 Saied Tadayon Application of Z-Webs and Z-factors to Analytics, Search Engine, Learning, Recognition, Natural Language, and Other Utilities
US20150260840A1 (en) * 2014-03-13 2015-09-17 Kustom Signals, Inc. Usb/wireless based traffic radar system
CN106033426A (en) * 2015-03-11 2016-10-19 中国科学院西安光学精密机械研究所 Image retrieval method based on latent semantic minimum hash
US20160378902A1 (en) * 2015-06-25 2016-12-29 Globalfoundries Inc. Generative learning for realistic and ground rule clean hot spot synthesis
CN106779094A (en) * 2017-01-13 2017-05-31 湖南文理学院 A kind of limitation Boltzmann machine learning method and device based on random feedback
WO2017120370A1 (en) * 2016-01-06 2017-07-13 Kla-Tencor Corporation Feature selection and automated process window monitoring through outlier detection
CN106997474A (en) * 2016-12-29 2017-08-01 南京邮电大学 A kind of node of graph multi-tag sorting technique based on deep learning
CN107044976A (en) * 2017-05-10 2017-08-15 中国科学院合肥物质科学研究院 Heavy metal content in soil analyzing and predicting method based on LIBS Yu stack RBM depth learning technologies
CN107679859A (en) * 2017-07-18 2018-02-09 中国银联股份有限公司 A kind of Risk Identification Method and system based on Transfer Depth study
CN107688201A (en) * 2017-08-23 2018-02-13 电子科技大学 Based on RBM earthquake prestack signal clustering methods

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101894130A (en) * 2010-06-08 2010-11-24 浙江大学 Sparse dimension reduction-based spectral hash indexing method
US20140079297A1 (en) * 2012-09-17 2014-03-20 Saied Tadayon Application of Z-Webs and Z-factors to Analytics, Search Engine, Learning, Recognition, Natural Language, and Other Utilities
US20150260840A1 (en) * 2014-03-13 2015-09-17 Kustom Signals, Inc. Usb/wireless based traffic radar system
CN106033426A (en) * 2015-03-11 2016-10-19 中国科学院西安光学精密机械研究所 Image retrieval method based on latent semantic minimum hash
US20160378902A1 (en) * 2015-06-25 2016-12-29 Globalfoundries Inc. Generative learning for realistic and ground rule clean hot spot synthesis
WO2017120370A1 (en) * 2016-01-06 2017-07-13 Kla-Tencor Corporation Feature selection and automated process window monitoring through outlier detection
CN106997474A (en) * 2016-12-29 2017-08-01 南京邮电大学 A kind of node of graph multi-tag sorting technique based on deep learning
CN106779094A (en) * 2017-01-13 2017-05-31 湖南文理学院 A kind of limitation Boltzmann machine learning method and device based on random feedback
CN107044976A (en) * 2017-05-10 2017-08-15 中国科学院合肥物质科学研究院 Heavy metal content in soil analyzing and predicting method based on LIBS Yu stack RBM depth learning technologies
CN107679859A (en) * 2017-07-18 2018-02-09 中国银联股份有限公司 A kind of Risk Identification Method and system based on Transfer Depth study
CN107688201A (en) * 2017-08-23 2018-02-13 电子科技大学 Based on RBM earthquake prestack signal clustering methods

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
FAN SHEN 等: "Investment time series prediction using a hybrid model based on RBMs and pattern clustering", 《2017 IEEE/ACIS 16TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS)》 *
KE ZHANG 等: "An optimized dimensionality reduction model for high-dimensional data based on Restricted Boltzmann Machines", 《THE 27TH CHINESE CONTROL AND DECISION CONFERENCE (2015 CCDC)》 *
丁卫星: "基于深度学习技术的信用卡交易欺诈侦测研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *
陈曦: "基于高斯伯努利受限玻尔兹曼机的过程监测研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109544163A (en) * 2018-11-30 2019-03-29 华青融天(北京)软件股份有限公司 A kind of risk control method, device, equipment and the medium of user's payment behavior
CN111445259A (en) * 2018-12-27 2020-07-24 中国移动通信集团辽宁有限公司 Method, device, equipment and medium for determining business fraud behaviors
CN111401393A (en) * 2019-01-02 2020-07-10 中国移动通信有限公司研究院 Data processing method and device, electronic equipment and storage medium
CN111401393B (en) * 2019-01-02 2023-04-07 中国移动通信有限公司研究院 Data processing method and device, electronic equipment and storage medium
CN109784403A (en) * 2019-01-16 2019-05-21 武汉斗鱼鱼乐网络科技有限公司 A kind of method and relevant device identifying risk equipment
CN109858930A (en) * 2019-01-24 2019-06-07 同济大学 Online trading fraud detection method based on associated diagram spectrum representative learning
CN109858930B (en) * 2019-01-24 2023-06-09 同济大学 Online transaction fraud detection method based on association graph characterization learning
CN112330328A (en) * 2019-08-05 2021-02-05 四川大学 Credit card fraud detection method based on feature extraction
CN111275098A (en) * 2020-01-17 2020-06-12 同济大学 Encoder-LSTM deep learning model applied to credit card fraud detection and method thereof
CN111415167A (en) * 2020-02-19 2020-07-14 同济大学 Network fraud transaction detection method and device, computer storage medium and terminal
CN113469695A (en) * 2020-03-30 2021-10-01 同济大学 Electronic fraud transaction identification method, system and device based on kernel supervision Hash model
CN113469695B (en) * 2020-03-30 2023-06-30 同济大学 Electronic fraud transaction identification method, system and device based on kernel supervision hash model
CN111507382A (en) * 2020-04-01 2020-08-07 北京互金新融科技有限公司 Sample file clustering method and device and electronic equipment
CN111507382B (en) * 2020-04-01 2023-05-05 北京互金新融科技有限公司 Sample file clustering method and device and electronic equipment
CN111340509B (en) * 2020-05-22 2020-08-21 支付宝(杭州)信息技术有限公司 False transaction identification method and device and electronic equipment
CN111340509A (en) * 2020-05-22 2020-06-26 支付宝(杭州)信息技术有限公司 False transaction identification method and device and electronic equipment
CN113052266A (en) * 2021-04-27 2021-06-29 中国工商银行股份有限公司 Transaction mode type identification method and device

Also Published As

Publication number Publication date
CN108596630B (en) 2022-03-01

Similar Documents

Publication Publication Date Title
CN108596630A (en) Fraudulent trading recognition methods, system and storage medium based on deep learning
CN108629593A (en) Fraudulent trading recognition methods, system and storage medium based on deep learning
CN108351985A (en) Method and apparatus for large-scale machines study
CN112700325A (en) Method for predicting online credit return customers based on Stacking ensemble learning
CN108717663A (en) Face label fraud judgment method, device, equipment and medium based on micro- expression
CN112927072B (en) Block chain-based money back-flushing arbitration method, system and related device
CN108304853A (en) Acquisition methods, device, storage medium and the electronic device for the degree of correlation of playing
CN114238659B (en) Method for intelligently designing network security architecture diagram
US12079825B2 (en) Automated learning of models for domain theories
CN114912510B (en) Online investigation sample quality evaluation system
Abdou et al. Credit scoring and decision making in Egyptian public sector banks
CN113724061A (en) Consumer financial product credit scoring method and device based on customer grouping
US20200394711A1 (en) Predicting market actions, directions of actions and engagement via behavioral iq analysis
Ramalingam et al. Efficient Player Prediction and Suggestion using Machine Learning for IPL Tournament
CN112488821A (en) Consumption credit scene fraud detection method based on ABC-SOM neural network
CN112926989B (en) Bank loan risk assessment method and equipment based on multi-view integrated learning
CN115293783A (en) Risk user identification method and device, computer equipment and storage medium
CN115496364A (en) Method and device for identifying heterogeneous enterprises, storage medium and electronic equipment
KR100727555B1 (en) Creating method for decision tree using time-weighted entropy and recording medium thereof
CN115130619A (en) Risk control method based on clustering selection integration
CN116451050A (en) Abnormal behavior recognition model training and abnormal behavior recognition method and device
CN114418604A (en) Method and device for predicting survival promotion success probability of palm silver easy-to-lose customers and storage medium
CN112418307B (en) Radiation source individual identification method combining deep learning and integrated learning
CN116563067B (en) Big data-based graduate crowd employment analysis method, system and medium
CN113256368B (en) Product pushing method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant