CN108681936B - Fraud group identification method based on modularity and balanced label propagation - Google Patents

Fraud group identification method based on modularity and balanced label propagation Download PDF

Info

Publication number
CN108681936B
CN108681936B CN201810382121.5A CN201810382121A CN108681936B CN 108681936 B CN108681936 B CN 108681936B CN 201810382121 A CN201810382121 A CN 201810382121A CN 108681936 B CN108681936 B CN 108681936B
Authority
CN
China
Prior art keywords
community
node
fraud
modularity
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810382121.5A
Other languages
Chinese (zh)
Other versions
CN108681936A (en
Inventor
高杨
唐迪佳
孙斌杰
王新根
鲁萍
黄滔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Bangsheng Technology Co.,Ltd.
Original Assignee
Zhejiang Bangsun Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Bangsun Technology Co ltd filed Critical Zhejiang Bangsun Technology Co ltd
Priority to CN201810382121.5A priority Critical patent/CN108681936B/en
Publication of CN108681936A publication Critical patent/CN108681936A/en
Application granted granted Critical
Publication of CN108681936B publication Critical patent/CN108681936B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0609Buyer or seller confidence or verification

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a cheating group identification method based on modularity and balanced label propagation, which comprises the following steps: calculating pairwise similarity of all users by using the ID characteristics and combining known fraud identifications of the users, establishing a similarity matrix, and establishing a correlation diagram through the similarity matrix; running a Louvain algorithm on the established graph to obtain community and level information of each node; and taking the community, the level information and the fraud identifier to which each node belongs as initial community information of each node, operating a balanced label propagation process to obtain the final community to which each node belongs, dividing the network according to whether the node belongs to the common community, and dividing the fraud group according to the fraud identifier obtained by propagation. The invention applies the fraud group recognition method based on modularity and balanced label propagation to the fields of application anti-fraud and transaction anti-fraud for the first time, utilizes information such as transaction correlation and the like to construct a correlation map, integrates community modularity information, and utilizes a balanced label propagation algorithm to detect fraud communities so as to prevent potential fraud transactions.

Description

Fraud group identification method based on modularity and balanced label propagation
Technical Field
The invention belongs to the field of transaction anti-fraud and application anti-fraud, and particularly relates to a fraud group identification method based on modularity and balance label propagation
Background
With the explosive growth of online services such as electronic commerce, third-party payment and the like, online fraud cases are rampant increasingly, trends of variable methods and diversified fields are presented, and how to effectively and timely identify frequently occurring online fraud behaviors becomes a problem which needs to be solved urgently. The traditional online fraud detection method usually implements fraud detection on relevant characteristics of constructed service flow aiming at each online transaction or merchant entity modeling, has excellent fraud effect on obvious characteristics of the transaction, ignores the group-partner relevance behind the fraud transaction, and has poor group-partner fraud identification capability on forging normal user information.
Community discovery is a technology for finding out potential contact rules of nodes in a complex network structure by identifying communities or sub-networks with specific rules in the complex network structure and further dividing the complex network. In the field of transaction anti-fraud and application anti-fraud, a client can construct a complex network for highlighting abnormal behaviors through transaction related information and application related information, and the network is analyzed and mined by utilizing a community discovery technology, so that fraudulent groups in the network can be effectively identified, and fraudulent behaviors are prevented.
Disclosure of Invention
The invention aims to provide a fraud group identification method based on modularity and balanced label propagation aiming at the defects of the prior art.
The purpose of the invention is realized by the following technical scheme: a fraudulent group identification method based on modularity and balanced tag propagation, the method comprising the steps of:
step 1, extracting ID characteristics in a scene of transaction anti-fraud or application anti-fraud;
step 2, calculating pairwise similarity of all users (including fraud blacklists and normal users) by using ID features extracted from transaction data or application data and combining known fraud identifications of the users, establishing a similarity matrix, and establishing a correlation diagram through the similarity matrix;
step 3, operating a Louvain algorithm on the established association graph to obtain community and level information of each node;
and 4, taking the community, the level information and the fraud identifier of each node as the initial community information of each node, operating a balanced label propagation process to obtain the final community to which each node belongs, dividing the network according to whether the node belongs to the common community, and dividing the fraud group according to the fraud identifier obtained by propagation.
Further, in step 2, the ID features include a card number, an account number, ip, and a device fingerprint.
Further, in the step 2, let n characteristics of the user i be Xi,1,Xi,2,Xi,3…Xi,nSimilarity w between user i and user ji,jThe definition can refer to the actual service situation, recommend to use common attributes, cosine distances, and the like, and can be optionally defined as follows:
common attributes:
wi,j=∑ku(Xi,k,Xj,k)(k=1…·n)/k
Figure BDA0001641303020000021
cosine distance:
wi,j=Cos(Xi,Xj)
for m users, the following similarity matrix is formed:
Figure BDA0001641303020000022
further, in step 2, setting 0 in the similarity matrix lower than the threshold p, establishing edge contact for user nodes not being 0, and constructing a graph structure, where the similarity between nodes is the weight of an edge.
Further, the step 3 comprises:
(1) initially, each node in the association graph is assumed to belong to an independent community;
(2) sequentially traversing all neighbor nodes of each node i in the association graph, and calculating the modularity variable quantity delta Q before and after distributing the node i to the community to which the neighbor node belongs; updating the maximum value max delta Q of the modularity change, wherein max _ j is a neighbor node corresponding to the maximum value max delta Q, when max delta Q is larger than 0, the node i is distributed to a community where max _ j is located, otherwise, the node i is kept unchanged;
(3) re-executing the step (2) until the node home community is not changed any more;
(4) merging nodes belonging to the same community in the association diagram into a super node to reconstruct a network, wherein the weight of the super node is converted by the weight of edges among nodes in the community, and the weight of the edges among the super nodes is converted by the weight of the edges among the community intervals, so that the compression of the association diagram is realized;
(5) and (4) re-executing the step (1) until the set iteration number or the modularity of the association diagram is not changed any more, and finally obtaining the community of each node in each level.
Further, the step 4 comprises:
(1) setting the initial attribution of each node in the association diagram established in the step 2 as a community to which each level obtained by a Louvain algorithm belongs to obtain < community id, probability value > information of each node, wherein the initial probability is equal to 1/(the number of communities to which the node belongs), and the community id is composed of the level, the community to which the level belongs and a fraud identifier;
(2) traversing all the neighbor nodes of each node, adding the probabilities corresponding to the same community id, and marking as b and bmaxAfter the probabilities are added<Community id, probability value>The maximum value of the median probability; according to the formula
Figure BDA0001641303020000031
Filtering the community id of each node in the association graph, wherein q is an adjustable parameter, and the value range of q is [0,1]]To (c) to (d);
(3) normalizing < community id, probability value > information of each node;
(4) repeating the step (2) until reaching the specified iteration number;
(5) and dividing the network according to whether the network belongs to the common community, and dividing the cheating group according to the cheating identification obtained by propagation.
The invention has the beneficial effects that: the invention applies the cheating group recognition method based on modularity and balance label propagation to the fields of application anti-cheating and transaction anti-cheating for the first time, combines the advantages of Louvain and balance label propagation algorithm, not only utilizes the associated information of the seed cheating node, but also considers the requirement of the community modularity to be optimal, and finally recognizes the cheating group with suspicious transaction behaviors and application actions, thereby having better community structure and excellent accuracy. The method has great research significance and use value in the fields of transaction anti-fraud and application anti-fraud.
Drawings
FIG. 1 is a schematic diagram of a correlation diagram established using a similarity matrix;
FIG. 2 is a schematic diagram of community and level information of each node according to the association graph;
FIG. 3 is the result of tag propagation in conjunction with a hierarchy and a rogue tag.
Detailed Description
The following detailed description of the present invention will be made with reference to the accompanying drawings and examples, which are provided for illustration of the present invention and are not intended to limit the scope of the present invention.
The invention provides a fraud group identification method based on modularity and balanced label propagation, which comprises the following steps:
step 1, extracting characteristics such as card numbers, account numbers, ip and device fingerprints; as shown in Table 1
TABLE 1 transaction characteristics Table
Figure BDA0001641303020000032
Figure BDA0001641303020000041
And 2, calculating pairwise similarity of all users (including a fraud blacklist and normal users) by using the features extracted from the transaction data, establishing a similarity matrix, and establishing a correlation diagram through the matrix, as shown in fig. 1, wherein circles in the diagram represent user nodes, numbers represent user IDs, and numbers on edges in the diagram represent edge weights calculated by the edge similarity matrix.
And 3, operating a Louvain algorithm on the established association graph to obtain community and level information of each node, wherein as shown in FIG. 2, a plurality of nodes at the upper left corner are divided into a community, and graph compression is performed for 3 times.
And 4, taking the community, the hierarchy information and the fraud identifier of each node as initial community information of each node, operating a balanced label propagation process to obtain a final community to which each node belongs, dividing a network according to whether the node belongs to a common community, and dividing fraud groups according to the fraud identifier obtained by propagation, wherein as shown in fig. 3, three communities are identified in total, wherein the black community at the upper left corner is a fraud group, the white community at the upper right corner is a normal user community, and the gray community at the lower part is a suspicion group.
Wherein the step 2 is implemented according to the following steps:
let the characteristic of user i be Xi,1,Xi,2,Xi,3…·Xi,nThe similarity definition between the user i and the user j can refer to the actual service condition, recommend to use common attributes, cosine distances and the like, and can be optionally defined as follows:
common attributes:
wi,j=∑ku(Xi,k,Xj,k)(k=1…n)/k
Figure BDA0001641303020000042
cosine distance:
wi,j=Cos(Xi,Xj)
for m users, the following similarity matrix is formed:
Figure BDA0001641303020000043
setting 0 in the similarity matrix lower than the threshold p, establishing edge relation for user nodes which are not 0, and constructing a graph structure, wherein the similarity between nodes is the weight of the edge, as shown in fig. 1, wherein a circle in the graph represents a user node, a number represents a user ID, and a number on the edge in the graph represents the edge weight calculated by the edge similarity matrix.
Wherein the step 3 is implemented according to the following steps:
(1) initially, each node in the association graph is assumed to belong to an independent community;
(2) sequentially traversing all neighbor nodes of each node i in the association graph, and calculating the modularity variable quantity delta Q before and after distributing the node i to the community to which the neighbor node belongs; updating the maximum value max delta Q of the modularity change, wherein max _ j is a neighbor node corresponding to the maximum value max delta Q, when max delta Q is larger than 0, the node i is distributed to a community where max _ j is located, otherwise, the node i is kept unchanged;
(3) re-executing the step (2) until the node home community is not changed any more;
(4) merging nodes belonging to the same community in the association diagram into a super node to reconstruct a network, wherein the weight of the super node is converted by the weight of edges among nodes in the community, and the weight of the edges among the super nodes is converted by the weight of the edges among the community intervals, so that the compression of the association diagram is realized;
(5) and (3) re-executing the step (1) until the set iteration number or the modularity of the association graph is not changed any more, and finally obtaining the community of each node in each level, wherein as shown in fig. 2, a plurality of nodes at the upper left corner are divided into communities, and graph compression is performed for 3 times.
The modularity measures the good or bad of a community network partition by calculating the difference between the edge number of the internal node of the community and the edge number under the random condition, and the value range of the community network partition is [ -1/2,1], which is defined as follows:
Figure BDA0001641303020000051
Figure BDA0001641303020000052
wherein A isi,jIs the weight of the edge between node i and node j; k is a radical ofi=∑jAi,jRepresents the sum of the weights of all edges connected to node i; c. CiRepresenting the community to which the node i belongs;
Figure BDA0001641303020000053
representing the sum of the weights of all edges.
In the formula
Figure BDA0001641303020000054
The probability that node j is connected to any one node is
Figure BDA0001641303020000055
Now node i has kiSo that the edges of nodes i and j are at random
Figure BDA0001641303020000056
Wherein Δ Q is defined as follows:
Figure BDA0001641303020000057
in the formula, sigma in represents the sum of the side weights of nodes with key points in the community, sigma tot represents the sum of the side weights in the incident community, and ki,inRepresenting the weighted sum of the incident communities of node i.
Wherein the step 4 is implemented according to the following steps:
(1) setting the initial attribution of each node in the association diagram established in the step 2 as a community to which each level obtained by a Louvain algorithm belongs to obtain < community id, probability value > information of each node, wherein the initial probability is equal to 1/(the number of communities to which the node belongs), and the community id is composed of the level, the community to which the level belongs and a fraud identifier;
(2) traversing all the neighbor nodes of each node, adding the probabilities corresponding to the same community id, and marking as b and bmaxAfter the probabilities are added<Community id, probability value>The maximum value of the median probability; according to the formula
Figure BDA0001641303020000061
Filtering the community id of each node in the association graph, wherein q is an adjustable parameter, and the value range of q is [0,1]]To (c) to (d);
(3) normalizing < community id, probability value > information of each node;
(4) repeating the step (2) until reaching the specified iteration number;
(5) and dividing a cheating group according to the cheating identification obtained by propagation and dividing the network according to whether the community belongs to the common community, wherein three communities are identified in total as shown in figure 3, wherein a black community at the upper left corner is a cheating group, a white community at the upper right corner is a normal user community, and a gray community at the lower part is an in-doubt group.
The invention provides a cheating group partner identification method based on modularity and balanced label propagation, which combines the advantages of Louvain and balanced label propagation algorithm, not only utilizes the associated information of seed cheating nodes, but also considers the requirement of optimal community modularity, finally identifies the cheating group partner with suspicious transaction behaviors and application actions, and has better community structure and excellent accuracy. The method has great research significance and use value in the fields of transaction anti-fraud and application anti-fraud.
The above embodiments are only for illustrating the invention and are not to be construed as limiting the invention, and those skilled in the art can make various changes and modifications without departing from the spirit and scope of the invention, therefore, all equivalent technical solutions also fall into the scope of the invention, and the scope of the invention is defined by the claims.

Claims (4)

1. A fraudulent group identification method based on modularity and balanced tag propagation, the method comprising the steps of:
step 1, extracting ID characteristics in a scene of transaction anti-fraud or application anti-fraud;
step 2, calculating pairwise similarity of all users including a fraud blacklist and normal users by using ID features extracted from transaction data or application data and combining known fraud identifications of the users, establishing a similarity matrix, and establishing a correlation diagram through the similarity matrix;
step 3, operating a Louvain algorithm on the established association graph to obtain community and level information of each node; the method comprises the following specific steps:
(1) initially, each node in the association graph is assumed to belong to an independent community;
(2) sequentially traversing all neighbor nodes of each node i in the association graph, and calculating the modularity variable quantity delta Q before and after distributing the node i to the community to which the neighbor node belongs; updating the maximum value max delta Q of the modularity change, wherein max _ j is a neighbor node corresponding to the maximum value max delta Q, when max delta Q is larger than 0, the node i is distributed to a community where max _ j is located, otherwise, the node i is kept unchanged;
(3) re-executing the step (2) until the node home community is not changed any more;
(4) merging nodes belonging to the same community in the association diagram into a super node to reconstruct a network, wherein the weight of the super node is converted by the weight of edges among nodes in the community, and the weight of the edges among the super nodes is converted by the weight of the edges among the community intervals, so that the compression of the association diagram is realized;
(5) re-executing the step (1) until the set iteration number or the modularity of the association diagram is not changed, and finally obtaining the community of each node at each level;
step 4, taking the community, the level information and the fraud identification of each node as the initial community information of each node, operating a balanced label propagation process to obtain the final community of each node, dividing the network according to whether the node belongs to the common community, and dividing the fraud group according to the fraud identification obtained by propagation; the method comprises the following specific steps:
(1) setting the initial attribution of each node in the association diagram established in the step 2 as a community to which each level obtained by a Louvain algorithm belongs to obtain < community id, probability value > information of each node, wherein the initial probability is equal to 1/(the number of communities to which the node belongs), and the community id is composed of the level, the community to which the level belongs and a fraud identifier;
(2) traversing all the neighbor nodes of each node, adding the probabilities corresponding to the same community id, and marking as b and bmaxAfter the probabilities are added<Community id, probability value>The maximum value of the median probability; according to the formula
Figure FDA0003154887910000011
Filtering the community id of each node in the association graph, wherein q is an adjustable parameter, and the value range of q is [0,1]]To (c) to (d);
(3) normalizing < community id, probability value > information of each node;
(4) repeating the step (2) until reaching the specified iteration number;
(5) and dividing the network according to whether the network belongs to the common community, and dividing the cheating group according to the cheating identification obtained by propagation.
2. A method of fraud group identification based on modularity and balanced tag propagation as claimed in claim 1, wherein in step 2 said ID features include card number, account number, ip and device fingerprint.
3. The method as claimed in claim 1, wherein in step 2, let n characteristics of user i be Xi,1,Xi,2,Xi,3…Xi,nThe similarity definition between user i and user j may refer to the actual service condition and adopt a common attribute or cosine distance.
4. The method for identifying fraudulent groups based on modularity and balanced label propagation as claimed in claim 1, wherein in step 2, setting 0 in the similarity matrix lower than the threshold p, where p is an adjustable parameter, the value range of p is between [0 and 1], and the user nodes not 0 establish edge relations, and construct a graph structure, and the similarity between nodes is the weight of the edge.
CN201810382121.5A 2018-04-26 2018-04-26 Fraud group identification method based on modularity and balanced label propagation Active CN108681936B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810382121.5A CN108681936B (en) 2018-04-26 2018-04-26 Fraud group identification method based on modularity and balanced label propagation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810382121.5A CN108681936B (en) 2018-04-26 2018-04-26 Fraud group identification method based on modularity and balanced label propagation

Publications (2)

Publication Number Publication Date
CN108681936A CN108681936A (en) 2018-10-19
CN108681936B true CN108681936B (en) 2021-11-02

Family

ID=63802082

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810382121.5A Active CN108681936B (en) 2018-04-26 2018-04-26 Fraud group identification method based on modularity and balanced label propagation

Country Status (1)

Country Link
CN (1) CN108681936B (en)

Families Citing this family (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109949046B (en) * 2018-11-02 2023-06-09 创新先进技术有限公司 Identification method and device for risk group partner
CN109816535A (en) * 2018-12-13 2019-05-28 中国平安财产保险股份有限公司 Cheat recognition methods, device, computer equipment and storage medium
CN109784636A (en) * 2018-12-13 2019-05-21 中国平安财产保险股份有限公司 Fraudulent user recognition methods, device, computer equipment and storage medium
CN109685132B (en) * 2018-12-20 2020-12-11 四川新网银行股份有限公司 Label propagation method based on bipartite graph
CN109754258B (en) * 2018-12-24 2023-05-12 同济大学 Online transaction fraud detection method based on individual behavior modeling
CN110020866B (en) * 2019-01-22 2023-06-13 创新先进技术有限公司 Training method and device for recognition model and electronic equipment
CN111666346A (en) * 2019-03-06 2020-09-15 京东数字科技控股有限公司 Information merging method, transaction query method, device, computer and storage medium
CN110070364A (en) * 2019-03-27 2019-07-30 北京三快在线科技有限公司 Method and apparatus, storage medium based on the fraud of graph model detection clique
CN110135890A (en) * 2019-04-15 2019-08-16 深圳壹账通智能科技有限公司 The product data method for pushing and relevant device of knowledge based relation excavation
CN111951021A (en) * 2019-05-15 2020-11-17 财付通支付科技有限公司 Method and device for discovering suspicious communities, storage medium and computer equipment
CN110232524A (en) * 2019-06-14 2019-09-13 哈尔滨哈银消费金融有限责任公司 Social networks cheats the construction method of model, antifraud method and apparatus
CN110245875A (en) * 2019-06-21 2019-09-17 深圳前海微众银行股份有限公司 Risk of fraud appraisal procedure, device, equipment and storage medium
CN110490730B (en) * 2019-08-21 2022-07-26 北京顶象技术有限公司 Abnormal fund aggregation behavior detection method, device, equipment and storage medium
CN110717828B (en) * 2019-09-09 2022-09-30 中国科学院计算技术研究所 Abnormal account detection method and system based on frequent transaction mode
CN110929509B (en) * 2019-10-16 2023-09-15 上海大学 Domain event trigger word clustering method based on louvain community discovery algorithm
CN110766091B (en) * 2019-10-31 2024-02-27 上海观安信息技术股份有限公司 Method and system for identifying trepanning loan group partner
CN111241297B (en) * 2020-01-06 2024-05-14 广州拉卡拉信息技术有限公司 Atlas data processing method and apparatus based on label propagation algorithm
CN113129010A (en) * 2020-01-10 2021-07-16 联洋国融(北京)科技有限公司 Fraud group mining system and method based on complex network model
CN111325350B (en) * 2020-02-19 2023-09-29 第四范式(北京)技术有限公司 Suspicious tissue discovery system and method
CN111325578B (en) * 2020-02-20 2023-10-31 深圳市腾讯计算机系统有限公司 Sample determination method and device of prediction model, medium and equipment
CN111428217B (en) * 2020-04-12 2023-07-28 中信银行股份有限公司 Fraudulent party identification method, apparatus, electronic device and computer readable storage medium
CN111612038B (en) * 2020-04-24 2024-04-26 平安直通咨询有限公司上海分公司 Abnormal user detection method and device, storage medium and electronic equipment
CN111641517A (en) * 2020-04-29 2020-09-08 深圳壹账通智能科技有限公司 Community division method and device for homogeneous network, computer equipment and storage medium
CN111581530A (en) * 2020-05-07 2020-08-25 北京互金新融科技有限公司 Community division method and device
CN111523831B (en) * 2020-07-03 2020-11-03 支付宝(杭州)信息技术有限公司 Risk group identification method and device, storage medium and computer equipment
CN111598713B (en) * 2020-07-24 2021-12-14 北京淇瑀信息科技有限公司 Cluster recognition method and device based on similarity weight updating and electronic equipment
CN112148767A (en) * 2020-09-11 2020-12-29 支付宝(杭州)信息技术有限公司 Group mining method, abnormal group identification method and device and electronic equipment
CN112184299A (en) * 2020-09-23 2021-01-05 中国建设银行股份有限公司 Arbitrage user identification method, apparatus, electronic device and medium
CN112910888A (en) * 2021-01-29 2021-06-04 杭州迪普科技股份有限公司 Illegal domain name registration group mining method and device
CN112785320B (en) * 2021-02-01 2023-09-19 北京互金新融科技有限公司 Credit risk determination method and device, storage medium and electronic equipment
CN113033966A (en) * 2021-03-03 2021-06-25 携程旅游信息技术(上海)有限公司 Risk target identification method and device, electronic equipment and storage medium
CN113326178A (en) * 2021-06-22 2021-08-31 北京奇艺世纪科技有限公司 Abnormal account number propagation method and device, electronic equipment and storage medium
CN113344697A (en) * 2021-06-29 2021-09-03 平安普惠企业管理有限公司 Group partner detection method, device, equipment and medium
CN114820219B (en) * 2022-05-23 2022-09-20 杭银消费金融股份有限公司 Complex network-based fraud community identification method and system
CN117575782B (en) * 2024-01-15 2024-05-07 杭银消费金融股份有限公司 Leiden community discovery algorithm-based group fraud identification method

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100185935A1 (en) * 2009-01-21 2010-07-22 Nec Laboratories America, Inc. Systems and methods for community detection
CN103729475B (en) * 2014-01-24 2016-10-26 福州大学 Multi-tag in a kind of social networks propagates overlapping community discovery method
CN107392559A (en) * 2016-05-16 2017-11-24 阿里巴巴集团控股有限公司 Institutional framework determination methods and device
CN107292424B (en) * 2017-06-01 2020-01-21 四川新网银行股份有限公司 Anti-fraud and credit risk prediction method based on complex social network
CN107590504A (en) * 2017-07-31 2018-01-16 阿里巴巴集团控股有限公司 Abnormal main body recognition methods and device, server
CN107730262B (en) * 2017-10-23 2021-09-24 创新先进技术有限公司 Fraud identification method and device
CN107943879A (en) * 2017-11-14 2018-04-20 上海维信荟智金融科技有限公司 Fraud group detection method and system based on social networks

Also Published As

Publication number Publication date
CN108681936A (en) 2018-10-19

Similar Documents

Publication Publication Date Title
CN108681936B (en) Fraud group identification method based on modularity and balanced label propagation
Liang et al. Data fusion approach for collaborative anomaly intrusion detection in blockchain-based systems
WO2022121145A1 (en) Ethereum phishing scam detection method and apparatus based on graph classification
CN113240509B (en) Loan risk assessment method based on multi-source data federal learning
CN108492173A (en) A kind of anti-Fraud Prediction method of credit card based on dual-mode network figure mining algorithm
CN110413707A (en) The excavation of clique&#39;s relationship is cheated in internet and checks method and its system
CN109754258B (en) Online transaction fraud detection method based on individual behavior modeling
Xie et al. A feature extraction method for credit card fraud detection
CN111738817B (en) Method and system for identifying risk community
CN109284988A (en) Data analysis system and method
CN108764943B (en) Suspicious user monitoring and analyzing method based on fund transaction network
CN109886334A (en) A kind of shared nearest neighbor density peak clustering method of secret protection
CN113159866A (en) Method for building network user trust evaluation model in big data environment
CN110458094B (en) Equipment classification method based on fingerprint similarity
CN110445772B (en) Internet host scanning method and system based on host relationship
CN115859187A (en) Object identification method and device, electronic equipment and storage medium
Wang et al. Local outlier detection based on information entropy weighting
Valehi et al. A graph matching algorithm for user authentication in data networks using image-based physical unclonable functions
CN116843342A (en) Financial fraud detection method, device, equipment and medium based on graph neural network
CN108984773B (en) Method and system for verifying blacklist multidimensional information under data missing condition, readable storage medium and device
CN110889467A (en) Company name matching method and device, terminal equipment and storage medium
CN115965466A (en) Sub-graph comparison-based Ethernet room account identity inference method and system
Chu et al. Exploiting spatial-temporal behavior patterns for fraud detection in telecom networks
CN112069392B (en) Method and device for preventing and controlling network-related crime, computer equipment and storage medium
Petrov Identification of unusual wallets on ethereum platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: Room ABCD, 17th floor, building D, Paradise Software Park, No.3 xidoumen Road, Xihu District, Hangzhou City, Zhejiang Province, 310012

Patentee after: Zhejiang Bangsheng Technology Co.,Ltd.

Address before: Room ABCD, 17th floor, building D, Paradise Software Park, No.3 xidoumen Road, Xihu District, Hangzhou City, Zhejiang Province, 310012

Patentee before: ZHEJIANG BANGSUN TECHNOLOGY Co.,Ltd.

CP01 Change in the name or title of a patent holder